摘要:
In one embodiment, a scheme is provided for assigning a personalized indicium to a mobile communications device which includes logic means operable to generate a temporary Personal Information Number (PIN) for transmitting in a request to a network node. Upon validating the request, a response is provided by the network node to the mobile communications device, the response including a permanent PIN assigned to the mobile communications device.
摘要:
In one embodiment, a scheme is provided for assigning a personalized indicium to a mobile communications device which includes logic means operable to generate a temporary Personal Information Number (PIN) for transmitting in a request to a network node. Upon validating the request, a response is provided by the network node to the mobile communications device, the response including a permanent PIN assigned to the mobile communications device.
摘要:
In one embodiment, a scheme is provided for assigning a personalized indicium to a mobile communications device which includes logic means operable to generate a temporary Personal Information Number (PIN) for transmitting in a request to a network node. Upon validating the request, a response is provided by the network node to the mobile communications device, the response including a permanent PIN assigned to the mobile communications device.
摘要:
In one embodiment, a scheme is provided for assigning a personalized indicium to a mobile communications device which includes logic means operable to generate a temporary Personal Information Number (PIN) for transmitting in a request to a network node. Upon validating the request, a response is provided by the network node to the mobile communications device, the response including a permanent PIN assigned to the mobile communications device.
摘要:
In one embodiment, a method operable on a mobile communications device is disclosed, the method comprising generating an authentication key for securing a personalized indicium assigned to the mobile communications device, wherein the personalized indicium comprises a Personal Information Number (PIN) that is mapped to at least one identifier associated with the mobile communications device; transmitting a registration request to a network node operable with a wireless network, the registration request having a registration request payload including the authentication key; receiving a challenge message from the network node, the challenge message generated when the network node detects a change of the IP address associated with the mobile communications device, and responsive to receiving the challenge message, executing a challenge response including an authentication value of a challenge string transmitted in the challenge message, wherein the authentication value is created using the authentication key.
摘要:
In one embodiment, a scheme is provided for securing a personalized indicium assigned to a mobile communications device. Upon detecting at a network node that an address associated with the mobile communications device has changed, a challenge-and-response procedure is negotiated between the mobile communications device and the network node for authenticating the personalized indicium using a shared authentication key.
摘要:
In one embodiment, a scheme is provided for porting a personalized indicium, i.e., a Personal Information Number or PIN, from a first mobile communications device to a second mobile communications device. Upon receiving identity information from the first mobile communications device via a secure peer-to-peer communication session, the second mobile communications device is operable to negotiate with a network node using at least a portion of the received identity information for reassigning the PIN to an identifier associated therewith. Upon successfully porting the PIN to the second mobile communications device, a service provisioning database is accordingly updated.
摘要:
In one embodiment, a method operable on a mobile communications device is disclosed, the method comprising generating an authentication key for securing a personalized indicium assigned to the mobile communications device, wherein the personalized indicium comprises a Personal Information Number (PIN) that is mapped to at least one identifier associated with the mobile communications device; transmitting a registration request to a network node operable with a wireless network, the registration request having a registration request payload including the authentication key; receiving a challenge message from the network node, the challenge message generated when the network node detects a change of the IP address associated with the mobile communications device, and responsive to receiving the challenge message, executing a challenge response including an authentication value of a challenge string transmitted in the challenge message, wherein the authentication value is created using the authentication key.
摘要:
In one embodiment, a scheme is provided for porting a personalized indicium, i.e., a Personal Information Number or PIN, from a first mobile communications device to a second mobile communications device. Upon receiving identity information from the first mobile communications device via a secure peer-to-peer communication session, the second mobile communications device is operable to negotiate with a network node using at least a portion of the received identity information for reassigning the PIN to an identifier associated therewith. Upon successfully porting the PIN to the second mobile communications device, a service provisioning database is accordingly updated.
摘要:
In one embodiment, a scheme is provided for securing a personalized indicium assigned to a mobile communications device. Upon detecting at a network node that an address associated with the mobile communications device has changed, a challenge-and-response procedure is negotiated between the mobile communications device and the network node for authenticating the personalized indicium using a shared authentication key.