Patent application number | Description | Published |
20080313455 | KEY SUPPORT FOR PASSWORD-BASED AUTHENTICATION MECHANISMS - According to an example embodiment, a session key (e.g., MSK/EMSK) may be determined for a password-based authentication method based on a secret and one or more security parameters used for peer authentication of the method. For example, a session key (e.g., EMSK) may be determined for a EAP-MSCHAP (Extensible Authentication Protocol-Microsoft PPP CHAP Extension) protocol family method between a peer node and an EAP server, the determining being based on a secret and one or more security parameters used for the EAP-MSCHAP protocol family peer authentication. | 12-18-2008 |
20100182985 | Methods, Apparatuses and Computer Program Product For User Equipment Authorization Based on Matching Network Access Technology Specific Identification Information - It is disclosed a method including providing a relation of network access technology-specific identification information (NATSII) of a user equipment or user and network identity-related information (NIRI) of the user equipment, receiving an inquiry comprising network identity-related inquiry information (NIRII), resolving the received NIRII based on the provided relation, and sending a response including the NATSII according to a result of the resolved NIRII; a method including receiving a registration request comprising NIRII from a user equipment or user, obtaining NATSII based on the received NIRII, appending the received NIRII with the obtained NATSII, and sending the appended NIRII; and a method receiving a registration request comprising first NATSII and NIRI, obtaining second NATSII based on the received NIRI, matching the received first NATSII against the obtained second NATSII, and authorizing access for a user equipment based on a result of matching. | 07-22-2010 |
20100251330 | Optimized relaying of secure network entry of small base stations and access points - A method, apparatus, and computer program product, are provided to receive an authentication message initiated by a network access request to access a connectivity network. The authentication message may include a first communication protocol that is converted into at least one additional different protocol, and forwarded to an authentication function of a gateway of an access network prior to the authentication message being forwarded to the connectivity network. | 09-30-2010 |
20100299423 | METHOD AND DEVICE FOR DATA INTERCEPTION AND COMMUNICATION SYSTEM COMPRISING SUCH DEVICE - A method and a device for data interception in a network are provided. The network includes a mechanism and/or a functionality according to an Extensible Authentication Protocol (EAP). The method includes a first network element provides session information to a third network element; a second network element provides identity information to the third network element; and the third network element processes and/or forwards at least a portion of the session information and/or identity information provided. | 11-25-2010 |
20130090087 | Method of Protecting an Identity of a Mobile Station in a Communications Network - A method of protecting an identity of a mobile station in a communications network is provided, where the communications network includes an access node and a gateway node. The method includes receiving a first mobile station identifier value at the access node, storing the first value in the access node, receiving a second mobile station identifier value, correlating the second identifier value with the first identifier value in the access node, sending the first and second identifier values from the access node to the gateway node over an interface, storing the first identifier value and the second identifier value in the gateway node, and correlating the second identifier value with the first identifier value in the gateway node. | 04-11-2013 |
20130104207 | Method of Connecting a Mobile Station to a Communcations Network - A method of connecting a mobile station to a communications network is provided, and includes performing an authentication of the mobile station at the network. A secure identifier, generated at the mobile station, is received at a gateway node and at an access node from an authentication node of the network if it is determined by the authentication that the mobile station is a subscriber to the network. A first secure communications tunnel is established from the access node to the mobile station using a value of the secure identifier and a second secure communications tunnel is established from the access node to the gateway node of the network using the value of the secure identifier. The first and second communications tunnels are bound together to form a communications path between the mobile station and the network. | 04-25-2013 |