H Wang, J Shi, X Kang - US Patent 10,931,445, 2021 - Google Patents
Embodiments of the invention provide methods and appa ratuses for session key generation, which use Diffie-Hellman procedure in both user equipment and network to …
SV Allavarpu, AJ Bhalerao - US Patent 6,950,935, 2005 - Google Patents
A system and method for authenticating users over a network. At least one pluggable authentication module (PAM) is used to authenticate users of network services. Each PAM …
A Medvinsky - US Patent 7,231,663, 2007 - Google Patents
The present invention provides a method of providing a client with a copy of authorization data that can be accessed and utilized by the client. The method includes the steps of …
S Nair, A Jerichow, NS Bykampadi - US Patent App. 17/267,243, 2021 - Google Patents
A request is received at an authorization entity for access to a service producer by a service consumer. The request comprises a public key of the service consumer. The authorization …
S Patel - US Patent 7,558,957, 2009 - Google Patents
The present invention provides a method of key material generation in which the key material is used to authenticate communication for user equipment and at least one network …
RR Gilman, RL Robinson - US Patent 7,353,388, 2008 - Google Patents
(57) ABSTRACT A packet-switched communications device in an enterprise network is provided. The packet-switched communications device has a corresponding unique …
D Mikel, M Wilkins - US Patent 7,281,128, 2007 - Google Patents
A system and method for secure network communication. In various embodiments of the present invention, data needed for authentication an encryption is included in each …
JR Breau, JE Belser, GJ Rieschick, RR Doerr - US Patent 8,838,488, 2014 - Google Patents
(57) ABSTRACT A method is provided for maintaining a common billing identifier for a user session in a communication network. In the method, an authentication request associated …
H Haverinen - US Patent 8,122,250, 2012 - Google Patents
Method of authenticating a client comprising the steps of sending a subscriber identity to an authentication server; obtaining at least one challenge and at least one first secret to the …