摘要:
In one embodiment, a scheme is provided for managing secure registration of a mobile communications device (116). Upon being provided with an upgraded registration process that requires encryption, the mobile communications device (116) has the option of continuing to register with a network node (216) using a downgraded registration process within a specified time window which involves unencrypted registration requests and responses. Thereafter, the mobile communications device (116) is operable to select between the upgraded and downgraded registration processes.
摘要:
In one embodiment, a scheme is provided for porting a personalized indicium, i.e., a Personal Information Number or PIN, from a first mobile communications device to a second mobile communications device. Upon receiving identity information from the first mobile communications device via a secure peer-to-peer communication session (414, 416), the second mobile communications device is operable to negotiate (450, 452, 454) with a network node (216) using at least a portion of the received identity information for reassigning the PIN to an identifier associated therewith. Upon successfully porting the PIN to the second mobile communications device, a service provisioning database (219) is accordingly updated (456).
摘要:
A communication system exchanges key generation parameters for secure communications. An internet service and communications device of a user are in communication with each other. The internet service includes an account authentication mechanism for a user and includes a database having stored cryptographic keys and key generation parameters. A device client operates on the communications device and initiates a request to the internet service that authenticates the user and establishes a secure communications channel between the internet service and communications device and determine key generation parameters based on an authenticated user identifier and transmits the key generation parameters for initiating key generation and securely establishing a cryptographic key between the internet service and communications device.
摘要:
In one embodiment, a scheme is provided for porting a personalized indicium, i.e., a Personal Information Number or PIN, from a first mobiles communications device to a second mobile communications device. Upon receiving identity information from the first mobile communications device via a secure pcer-to-peer communication session (414, 416), the second mobile communications device is operable to negotiate (450, 452, 454) with a network node (216) using at least a portion of the received identity information for reassigning the PIN to an identifier associated therewith. Upon successfully porting the PIN to the second mobile communications device a service provisioning database (219) is accordingly updated (456).
摘要:
In one embodiment, a scheme is provided for securing a personalized indicium assigned to a mobile communications device (116). Upon detecting at a network node (502) that an address associated with the mobile communications device (116) has changed, a challenge-and-response procedure (516, 518) is negotiated between the mobile communications device (116) and the network node (502) for authenticating the personalized indicium using a shared authentication key.
摘要:
One illustrative method for use by a host server in pushing messages to a mobile communication device involves the steps of causing a message to be sent to a relay network for delivery to the mobile communication device through one of a plurality of wireless communication networks which are communicatively coupled to the relay network; receiving, from the relay network, a result message when the mobile communication device is unavailable to receive the message through the wireless communication network, the result message comprising a message identifier which uniquely corresponds to the message; maintaining storage of the message in memory accessible by the host server after the result message is received; receiving, from the relay network, a status message which indicates that the mobile communication device is available to receive the message when the mobile communication device is available to receive the message through the wireless communication device; and causing the message to be sent again to the relay network for delivery to the mobile communication device in response to receiving the status message. During the unavailability of the mobile device, the relay network refrains from maintaining storage of the message in memory of the relay network.