摘要:
The present invention provides a method of operating a mobile unit in a wireless communication system. Embodiments of the method may include providing access request message(s) including information indicative of a first counter and a message authentication code formed using a first key. The first key is derived from a second key and the first counter. The second key is derived from a third key established for a security session between the mobile unit and an authenticator. The first counter is incremented in response to each access request provided by the mobile unit.
摘要:
The present invention provides a method for communication involving a supplicant, an authenticator, and an authentication server having an established security association based on a first key. The supplicant and the authenticator also have an established security association based on a second key. The method may include modifying the second key using the first key in response to determining that a challenge response from the supplicant is valid.
摘要:
The present invention provides a method of operating a mobile unit in a wireless communication system. Embodiments of the method may include providing access request message(s) including information indicative of a first counter and a message authentication code formed using a first key. The first key is derived from a second key and the first counter. The second key is derived from a third key established for a security session between the mobile unit and an authenticator. The first counter is incremented in response to each access request provided by the mobile unit.
摘要:
The present invention provides a method of wireless communication involving at least one first base station associated with a first access serving network and at least one second base station associated with a second access serving network is provided. The method may include generating a first key associated with the first access serving network and the second base station, receiving information indicating that the first key is temporary, and establishing a communication link with the second base station using the first key.
摘要:
The specification relates to the encryption of data transmitted over a broadband multiple access bi-directional hybrid fiber/coax (HFC) network. The method supports downstream broadcast encryption from headend to cable modem, and also provides for encryption of transmissions from cable modems back to the headend. Although the present invention is described in relation to an HFC network, it is also equally applicable to a cellular wireless communications environment or any other digital broadcast medium. The invention is implemented in two subdivisions, a slow but secure software encrypting algorithm, and a fast but less secure hardware encrypting algorithm. The combination produces the security of the software subdivision, with the encrypting speed of the hardware subdivision. The encryption method and apparatus supports the various access and transmission modes, such as STM, ATM, and VL. The present invention utilizes a virtual random number generator at the individual cable modems to reduce cable modem hardware. The authentication and key generation process between headend and cable modem produces a mutually authenticated and mutually generated permanent key. The present invention features a cryptosync clock at the headend which is transmitted to individual cable modems as a broadcast clock, thus eliminating a need for a clock at each cable modem.
摘要:
The present invention provides a method of cryptographic synchronization. The method may include providing information indicative of a first counter to a first one of a plurality of base stations. The first counter is incremented prior to each message transmitted to each of the plurality of base stations. The method may also include authenticating at least one first message received from the first one of the plurality of base stations in response to providing the information indicative of first counter.
摘要:
A digital processor (16) is disclosed for improving the statistical characteristics of nondeterministic random-like binary sequence. The basic elements of the digital processor are a feedback loop comprising a delay (17) and a signal combiner (18) and a subsampler (19). Maximum performance of the digital processor is achieved when a relatively prime relationship exists between number of cells in the delay (17) and ratio of the original signaling rate to the output signaling rate of the subsampler (19). Mathematical analysis is presented for showing that the digital processor improves both the equidistribution of the binary variable and autocorrelation statistic of output signal over the nondeterministic random-like binary signal. A further improvement in statistical properties is obtained by using two digital processors (116 and 121) in serial fashion.