FIELD: information technology.
SUBSTANCE: authentication token has a microprocessor (11), memory (12), a stored secret key (Ki) and a set of instructions for controlling the microprocessor (11) into performing an authentication calculation based on a received random number (RAND) and based on the stored secret key, said token including a memory location meant for storing a counter value, where said memory contains instructions, where during use for each authentication calculation, said instructions alter the counter value.
EFFECT: detecting attempts to clone an authentication token.
13 cl, 2 dwg
Title | Year | Author | Number |
---|---|---|---|
OBJECT AUTHENTICATION METHOD | 2002 |
|
RU2225676C1 |
PROTECTED BOOTSTRAPPING FOR WIRELESS COMMUNICATION | 2006 |
|
RU2374778C2 |
METHOD AND SYSTEM FOR GSM-AUTHENTICATION DURING ROAMING IN WIRELESS LOCAL NETWORKS | 2002 |
|
RU2295200C2 |
METHOD FOR DETECTING COPIED INTERNATIONAL MOBILE SUBSCRIBER IDENTITY (IMSI) CODE IN MOBILE COMMUNICATION NETWORK AND MOBILE COMMUNICATION NETWORK COMPONENT | 1998 |
|
RU2204219C2 |
SECURE DATA TRANSMISSION SYSTEM | 2018 |
|
RU2684488C1 |
EXPANSION OF SIGNALING COMMUNICATIONS PROTOCOL | 2005 |
|
RU2384018C2 |
TOKEN-BASED TRANSACTION AUTHENTICATION | 2011 |
|
RU2565368C2 |
AUTHENTICATION METHOD FOR CELL COMMUNICATION NETWORKS, SYSTEM FOR REALIZATION OF SAID METHOD AND UNITS OF SAID SYSTEM | 2006 |
|
RU2316117C1 |
TELECOMMUNICATION CHIP-CARD | 2013 |
|
RU2628492C2 |
CODING IN CDMA AND GSM NETWORKS | 2004 |
|
RU2366094C2 |
Authors
Dates
2012-01-27—Published
2007-02-15—Filed