摘要:
In one embodiment, a method is provided for managing secure registration of a mobile communications device, the method comprising registering, at a network node, the mobile communications device using a first registration process, the first registration process requiring an authentication key associated with the mobile communications device; processing a request from the mobile communications device, the request including an indication that the mobile communications device is changing to a second registration process; and clearing the authentication key associated with the mobile communications device upon expiration of a time window.
摘要:
In one embodiment, a method operable on a mobile communications device is disclosed, the method comprising generating an authentication key for securing a personalized indicium assigned to the mobile communications device, wherein the personalized indicium comprises a Personal Information Number (PIN) that is mapped to at least one identifier associated with the mobile communications device; transmitting a registration request to a network node operable with a wireless network, the registration request having a registration request payload including the authentication key; receiving a challenge message from the network node, the challenge message generated when the network node detects a change of the IP address associated with the mobile communications device, and responsive to receiving the challenge message, executing a challenge response including an authentication value of a challenge string transmitted in the challenge message, wherein the authentication value is created using the authentication key.
摘要:
In one embodiment, a scheme is provided for managing secure registration of a mobile communications device. Upon being provided with an upgraded registration process that requires encryption, the mobile communications device has the option of continuing to register with a network node using a downgraded registration process within a specified time window which involves unencrypted registration requests and responses. Thereafter, the mobile communications device is operable to select between the upgraded and downgraded registration processes.
摘要:
In one embodiment, a method operable on a mobile communications device is disclosed, the method comprising generating an authentication key for securing a personalized indicium assigned to the mobile communications device, wherein the personalized indicium comprises a Personal Information Number (PIN) that is mapped to at least one identifier associated with the mobile communications device; transmitting a registration request to a network node operable with a wireless network, the registration request having a registration request payload including the authentication key; receiving a challenge message from the network node, the challenge message generated when the network node detects a change of the IP address associated with the mobile communications device, and responsive to receiving the challenge message, executing a challenge response including an authentication value of a challenge string transmitted in the challenge message, wherein the authentication value is created using the authentication key.
摘要:
In one embodiment, a scheme is provided for securing a personalized indicium assigned to a mobile communications device. Upon detecting at a network node that an address associated with the mobile communications device has changed, a challenge-and-response procedure is negotiated between the mobile communications device and the network node for authenticating the personalized indicium using a shared authentication key.
摘要:
In one embodiment, a method is provided for managing secure registration of a mobile communications device, the method comprising registering, at a network node, the mobile communications device using a first registration process, the first registration process requiring an authentication key associated with the mobile communications device; processing a request from the mobile communications device, the request including an indication that the mobile communications device is changing to a second registration process; and clearing the authentication key associated with the mobile communications device upon expiration of a time window.
摘要:
A system and method for retrieving certificates and/or verifying the revocation status of certificates. In one embodiment, when a user opens a digitally signed message, a certificate that is required to verify the digital signature on the message may be automatically retrieved if it is not stored on the user's computing device (e.g. a mobile device), eliminating the need for users to initiate the task manually. Verification of the digital signature may also be automatically performed by the application after the certificate is retrieved. Verification of the revocation status of a certificate may also be automatically performed if it is determined that the time that has elapsed since the status was last updated exceeds a pre-specified limit.
摘要:
A system includes a wireless-enabled smart card reader able to be connected concurrently to at least two devices and a mobile device able to be connected wirelessly to the smart card reader and to control connections of the smart card reader.
摘要:
A system includes a first wireless-enabled device that transparently stores confidential information and a second wireless-enabled device that stores the same confidential information. The confidential information is to be used to secure a wireless communication link between the first device and the second device. One or both of the first device and the second device is to delete the confidential information upon fulfillment of one or more conditions related to the communication link. The conditions include general timeout, device inactivity, loss of connection over the communication link, a decline in signal strength, and a predefined number of transactions having occurred between the first device and the second device.
摘要:
A wireless communication device (and its related method of operation) includes, if invoked, password protected access to data stored therewithin and/or to normal device operations and further includes duress password checking logic that automatically causes a duress message to be sent if a duress password has been entered. The duress message is preferably sent without maintaining any user accessible indication of such sending. It is also preferred that the password checking logic automatically cause an end-of-duress message to be sent if a normal password is entered after a duress password has been entered. A plurality of different duress passwords may be entered into a duress password portion of data memory in the device.