$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Local authentication of mobile subscribers outside their home systems 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
  • H04K-001/00
  • H04L-009/08
  • H04L-009/28
  • H04L-029/06
  • H04L-009/32
  • G06F-021/00
  • G06F-007/04
  • H04M-011/00
  • H04M-001/66
  • H04W-004/00
출원번호 UP-0142994 (2005-06-01)
등록번호 US-7751567 (2010-07-26)
발명자 / 주소
  • Quick, Jr., Roy F.
  • Rose, Gregory G.
출원인 / 주소
  • QUALCOMM Incorporated
대리인 / 주소
    Choi, Jae-Hee
인용정보 피인용 횟수 : 32  인용 특허 : 28

초록

Methods and apparatus are presented for providing local authentication of subscribers traveling outside their home systems. A subscriber identification token 230 provides authentication support by generating a signature 370 based upon a key that is held secret from a mobile unit 220. A mobile unit 2

대표청구항

What is claimed is: 1. A subscriber identification token for providing local authentication of a subscriber in a visited communication system, comprising: a memory; and a processor configured to implement a set of instructions stored in the memory, the set of instructions for: generating a pluralit

이 특허에 인용된 특허 (28)

  1. Butler Theodore ; Wong Marcus, Apparatus and method for encryption key generation.
  2. Nessett, Danny M.; Young, Albert; O'Hara, Bob; Tsai, Joe; Chen, Bofu, Authenticated diffie-hellman key agreement protocol where the communicating parties share a secret key with a third party.
  3. Juopperi Jari,FIX, Authentication between communicating parties in a telecommunications network.
  4. Reeds ; III James A. (New Providence) Treventi Philip A. (Murray Hill) Yu I-Hsiang (Cedar Knolls NJ), Cellular telephony authentication arrangement.
  5. Deindl Michael,DEX ; Hanel Walter,DEX ; Schaal Albert,DEX, Certification of cryptographic keys for chipcards.
  6. Jobst, Matthias; Stage, Erling Bugge, Data transfer verification based on unique ID codes.
  7. Jones Michael F. (Nashua NH), Encrypted data transmission system employing means for randomly altering the encryption keys.
  8. Dean Lauran F. ; Jones David A. ; Marcovici Michael, Invalid mobile telephone call terminating system and method.
  9. Rose, Gregory G.; Quick, Jr., Roy Franklin, Limiting delays associated with the generation of encryption stream ciphers.
  10. DeTreville, John, Method and apparatus for authenticating an open system application to a portable IC device.
  11. Rogaway Phillip W. (Austin TX), Method and apparatus for entity authentication and key distribution secure against off-line adversarial attacks.
  12. Gregory G. Rose AU, Method and apparatus for generating encryption stream ciphers.
  13. Mizikovsky, Semyon B., Method and apparatus for performing a key update using bidirectional validation.
  14. Diffie Whitfield (Mountain View CA) Aziz Ashar (Fremont CA), Method and apparatus for privacy and authentication in wireless networks.
  15. Rose Gregory G.,AUX ; Quick Roy F., Method and apparatus for providing authentication security in a wireless communication system.
  16. Faccin, Stefano M.; Le, Franck, Method and system for security mobility between different cellular systems.
  17. Rose, Gregory G., Method for negotiating weakened keys in encryption systems.
  18. Marcovici, Michael; Mizikovsky, Semyon B, Method for repeated authentication of a user subscription identity module.
  19. Floden Anders,SEX ; Darroch John,SEX ; Johansson Lena,SEX ; Johannsen Berndt Ove,SEX, Method, and associated apparatus, for selectively permitting access by a mobile terminal to a packet data network.
  20. Dahlman, Erik; Beming, Per; Gustafsson, Maria, Random access in a mobile telecommunications system.
  21. Zhang, Minda; Takahashi, Richard J., Secure communication over a link.
  22. Reeds ; III James A. (New Providence NJ) Treventi Philip A. (Murray Hill NJ), Service provision authentication protocol.
  23. Gilhousen Klein S. (San Diego CA) Jacobs Irwin M. (La Jolla CA) Weaver ; Jr. Lindsay A. (San Diego CA), Spread spectrum multiple access communication system using satellite or terrestrial repeaters.
  24. Gilhousen Klein S. (San Diego CA) Jacobs Irwin M. (La Jolla CA) Padovani Roberto (San Diego CA) Weaver ; Jr. Lindsay A. (San Diego CA) Wheatley ; III Charles E. (Del Mar CA) Viterbi Andrew J. (La Jol, System and method for generating signal waveforms in a CDMA cellular telephone system.
  25. Kroon, Jeffrey, System and method prioritizing message packets for transmission.
  26. Samar Vipin, System and method to transparently integrate private key operations from a smart card with host-based encryption service.
  27. Quick ; Jr. Roy Franklin, Wireless subscription portability.
  28. Quick ; Jr. Roy Franklin, Wireless subscription portability.

이 특허를 인용한 특허 (32)

  1. Chastain, Walter Cooper, Apparatus and method for managing security domains for a universal integrated circuit card.
  2. Chastain, Walter Cooper; Chin, Stephen Emille; King, Samuel; Suozzo, Michael; Vondrak, Nicholas; Wane, Ismaila, Apparatus and method for managing use of secure tokens.
  3. Chastain, Walter Cooper; Chin, Stephen Emille; King, Samuel; Suozzo, Michael; Vondrak, Nicholas; Wane, Ismaila, Apparatus and method for managing use of secure tokens.
  4. Chastain, Walter Cooper; Chin, Stephen Emille; King, Samuel; Suozzo, Michael; Vondrak, Nicholas; Wane, Ismaila, Apparatus and method for managing use of secure tokens.
  5. Chastain, Walter Cooper; Chin, Stephen Emille, Apparatus and method for secure authentication of a communication device.
  6. Chastain, Walter Cooper; Chin, Stephen Emille, Apparatus and method for secure authentication of a communication device.
  7. Chastain, Walter Cooper; Chin, Stephen Emille, Apparatus and method for secure delivery of data from a communication device.
  8. Chastain, Walter Cooper; Chin, Stephen Emille, Apparatus and method for secure delivery of data from a communication device.
  9. Chastain, Walter Cooper; Chin, Stephen Emille, Apparatus and method for secure delivery of data from a communication device.
  10. Chastain, Walter Cooper; Chin, Stephen Emille, Apparatus and method for secure over the air programming of a communication device.
  11. Chastain, Walter Cooper; Chin, Stephen Emille, Apparatus and method for secure over the air programming of a communication device.
  12. Chastain, Walter Cooper; Chin, Stephen Emille, Apparatus and method for secure over the air programming of a communication device.
  13. Chastain, Walter Cooper; Chin, Stephen Emille, Apparatus and method for secure provisioning of a communication device.
  14. Chastain, Walter Cooper; Chin, Stephen Emille, Apparatus and method for secure provisioning of a communication device.
  15. Chastain, Walter Cooper; Chin, Stephen Emille, Apparatus and method for secure provisioning of a communication device.
  16. Chastain, Walter Cooper; Chin, Stephen Emille, Apparatus and method for securely managing the accessibility to content and applications.
  17. Chastain, Walter Cooper; Chin, Stephen Emille, Apparatus and method for securely managing the accessibility to content and applications.
  18. Chastain, Walter Cooper; Chin, Stephen Emille, Apparatus and method for securely managing the accessibility to content and applications.
  19. Sentinelli, Mauro, Method and system for the authentication of a user of a data processing system.
  20. Chastain, Walter Cooper; Campbell, Clifton Ashman; Chin, Stephen Emille; Harber, David; Rainer, Brian Keith; Smith, David K.; Wang, Shih-Ming, Methods for provisioning universal integrated circuit cards.
  21. Chastain, Walter Cooper; Campbell, Clifton; Chin, Stephen; Harber, David; Rainer, Brian Keith; Smith, David K.; Wang, Shih-Ming, Methods for provisioning universal integrated circuit cards.
  22. Tepper, Clinton S., Surrogate key generation using cryptographic hashing.
  23. Ibrahim, Mamdouh; Ramanathan, Sri; Som, Tapas K.; Trevathan, Matthew B., System and method to support identity theft protection as part of a distributed service oriented ecosystem.
  24. Ibrahim, Mamdouh; Ramanathan, Sri; Som, Tapas K.; Trevathan, Matthew B., System and method to support identity theft protection as part of a distributed service oriented ecosystem.
  25. Chastain, Walter Cooper; Chin, Stephen Emille, System and methods for UICC-based secure communication.
  26. Chastain, Walter Cooper; Chin, Stephen Emille, System and methods for UICC-based secure communication.
  27. Chastain, Walter Cooper; Chin, Stephen Emille, System and methods for UICC-based secure communication.
  28. Chastain, Walter Cooper; Campbell, Clifton Ashman; Chin, Stephen Emille; Harber, David; Rainer, Brian Keith; Smith, David K.; Wang, Shih-Ming, Systems for provisioning universal integrated circuit cards.
  29. Chastain, Walter Cooper; Campbell, Clifton Ashman; Chin, Stephen Emille; Harber, David; Rainer, Brian Keith; Smith, David K.; Wang, Shih-Ming, Systems for provisioning universal integrated circuit cards.
  30. Chastain, Walter Cooper; Campbell, Clifton; Chin, Stephen; Harber, David; Rainer, Brian Keith; Smith, David K.; Wang, Shih-Ming, Systems for provisioning universal integrated circuit cards.
  31. Tepper, Clinton S., Unique surrogate key generation using cryptographic hashing.
  32. Tepper, Clinton S., Unique surrogate key generation using cryptographic hashing.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로