The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Aug. 02, 2016

Filed:

Apr. 27, 2011
Applicants:

Karl Norrman, Stockholm, SE;

Rolf Blom, Järfälla, SE;

Mats Näslund, Bromma, SE;

Inventors:

Karl Norrman, Stockholm, SE;

Rolf Blom, Järfälla, SE;

Mats Näslund, Bromma, SE;

Assignee:
Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
G06F 7/04 (2006.01); G06F 15/16 (2006.01); G06F 17/30 (2006.01); H04L 29/06 (2006.01); H04W 12/06 (2009.01);
U.S. Cl.
CPC ...
H04L 63/08 (2013.01); H04L 63/20 (2013.01); H04W 12/06 (2013.01);
Abstract

There is disclosed a system for authentication of a device in a network by establishing a second security context between the device and a serving network node when a first security context has previously been established, assisted by an authentication server, based on a random value and a secret shared between an identity module associated with the device and the authentication server. First re-use information from the establishment of the first security context is stored at the authentication server and at the device, the first re-use information enabling secure generation of the second security context from the random value and the secret. Second re-use information may be generated or stored at the device. A context regeneration request is generated at the device, the context regeneration request authenticated at least partly based on the secret. The context regeneration request is sent to the serving network node. The context regeneration request is sent from the serving network node to the authentication server. The context regeneration request is verified at the authentication server. The second security context is generated at the authentication server based on at least the secret, the random value, and the first and second re-use information. The second security context is communicated from the authentication server to the serving network node.


Find Patent Forward Citations

Loading…