摘要:
A method and apparatus for over-the-air provisioning of authentication credentials at an access device via a first access system, wherein the authentication credentials are for a second access system lacking an over-the-air provisioning procedure. For example, the second access system may be a 3GPP system using AKA authentication methods. The first access system may be CDMA, using an OTASP or IOTA procedure. Provisioning the authentication credentials may include provisioning any of a 3GPP AKA authentication root key (K), AKA authentication related parameters, an AKA authentication algorithm to be used in the 3GPP authentication, or authentication algorithm customization parameters.
摘要:
Disclosed is a method for authentication of a remote station by a management station using a secure element. In the method, the remote station receives an identity request from the secure element. The identity request includes a first challenge provided to the secure element by the management station. The remote station forwards an identity response to the secure element. The identity response includes a response to the first challenge that is signed by a key of the remote station, and the signed response to the first challenge is for use by the management station to authenticate the remote station.
摘要:
Disclosed is a method for authentication of a remote station by a management station using a secure element. In the method, the remote station receives an identity request from the secure element. The identity request includes a first challenge provided to the secure element by the management station. The remote station forwards an identity response to the secure element. The identity response includes a response to the first challenge that is signed by a key of the remote station, and the signed response to the first challenge is for use by the management station to authenticate the remote station.
摘要:
A method of operating a computer system includes: obtaining, at the computer system, verification-input information associated with each of multiple hardware components of the computer system; cryptographically processing, at the computer system, the verification-input information to obtain a cryptographic result; and determining, at the computer system, whether to allow or inhibit, depending upon a comparison of the cryptographic result with a verification value, further operation of at least one of the hardware components.
摘要:
A method of operating a computer system includes: obtaining, at the computer system, verification-input information associated with each of multiple hardware components of the computer system; cryptographically processing, at the computer system, the verification-input information to obtain a cryptographic result; and determining, at the computer system, whether to allow or inhibit, depending upon a comparison of the cryptographic result with a verification value, further operation of at least one of the hardware components.
摘要:
A mutual authentication method is provided for securely agreeing application-security keys with mobile terminals supporting legacy Subscriber Identity Modules (e.g., GSM SIM and CDMA2000 R-UIM, which do not support 3G AKA mechanisms). A challenge-response key exchange is implemented between a bootstrapping server function (BSF) and mobile terminal (MT). The BSF generates an authentication challenge and sends it to the MT under a server-authenticated public key mechanism. The MT receives the challenge and determines whether it originates from the BSF based on a bootstrapping server certificate. The MT formulates a response to the authentication challenge based on keys derived from the authentication challenge and a pre-shared secret key. The BSF receives the authentication response and verifies whether it originates from the MT. Once verified, the BSF and MT independently calculate an application security key that the BSF sends to a requesting network application function to establish secure communications with the MT.
摘要:
A method and apparatus for providing policy control in a wireless communication system. A mobile station generates a resource request for a communication service, where the resource request includes an identifier uniquely identifying a type of communication service. A packet data serving node receives the resource request for the communication service and selects a policy control entity to process the resource request. The selection by the packet data serving node is based at least on the identifier. The selected policy control entity performs policy control on the resource request.
摘要:
A mobile station for wireless communication includes a control processor configured to generate a message for transmission on a reverse signaling channel, the message including a Station Class Mark field having a plurality of bits, a portion of the Station Class Mark field indicating that the mobile station is uniquely identified by a Mobile Station Equipment Identifier.
摘要:
Systems and techniques are disclosed relating to wireless communications. The systems and techniques involve wireless communications wherein a packet data session may be established between a wireless communications device and a packet data serving node to support a network connection to a packet-switched network. The wireless communications device may be configured to receive a notification of an incoming call from a circuit-switched network even when the network connection is active.
摘要:
Certain aspects of the present disclosure propose methods for identifying machine to machine (M2M) devices and services. Each device may indicate its M2M functionality either for each of the services performed by the device or for all of its services to a core network. The core network may report the M2M functionality of the device to other nodes in the network that may be involved with the M2M functionality of the device.