User authentication in a communications network

作者: David Anthony Roberts , Richard Paul Swale , Jonathan Crispin Ranger , Richard Middleton Hicks , John Rabson

DOI:

关键词: Computer networkChallenge–response authenticationComputer scienceChallenge-Handshake Authentication ProtocolData Authentication AlgorithmMulti-factor authenticationHash-based message authentication codeAuthentication protocolChip Authentication ProgramGeneric Security Service Algorithm for Secret Key Transaction

摘要: An authentication system of a terminal on public switched telephone network comprises security node associated with local exchange (10) and (14). For one-way authentication, the (14) responds to call initiation by sending unique code (R) comprising number (m) secret key (Sj) encrypted according first algorithm (F), being specific terminal. The constructs expected (E) from (m), using (F) second which is function identification (TN), compares received (R). In two-way transaction (n) (fj). generates as (n). sent back node. compared one in same way. both cases, match between codes (E R) constitutes (14), allowing user access network.

参考文章(20)
M. Walker, Security in mobile and cordless telecommunications annual european computer conference. pp. 493- 496 ,(1992) , 10.1109/CMPEUR.1992.218434
John Janis Goba, Howard Molyneux Flint, William Henry Davis, Abraham Zeewy, Dean Devere Riggs, Fraudulent card intercept system ,(1984)
Michael J. Schellinger, Method for validating a communication link ,(1995)
David W. Abmayr, Barrie O. Morgan, Recipient and message authentication method and system ,(1979)