Apex Standards validityGPT − the key to unlocking enhanced legal judgments and high-quality IPR strategies. Harness the power of iterative claim chart refinement and rapid GPT-driven insights. Stay informed with timely and precise intelligence, enabling accurate comparisons, strategic acquisitions, fair licensing, robust defense, and trend forecasting. Empower your patent portfolio with researcher-preferred capabilities for success in any scenario.
Apex Standards validity-GPT Factsheet: PDF
Apex Standards Domain-specific GPT Factsheet: PDF
Reference: Unified Patents PATROLL (July 3, 2023) v. US-10,171,433-B2 (PACid Technologies, LLC), priority date: April 24, 2018
validityGPT answered:
Perspective 1
The method for
authenticating a user in the question appears to be similar to certain aspects
of the following patents:
1. [Patent 10057053, Claim 9,
based on USPTO LEGAL GROUND 35 USC 102(a)] teaches a process of authenticating a mobile device
on a wireless network. It does so by obtaining a secret key associated with the
mobile device, evaluating a message authentication code based on the secret key
to produce an output value, and determining that a response from the mobile
device matches an expected response. This seems similar to the method in the
question where an application running on a mobile phone receives a unique user
input, processes it, and generates a secret. This secret is then stored on the
mobile phone and can be retrieved when the unique user input is received again.
2. [Patent 10958631, Claim 4,
based on USPTO LEGAL GROUND 35 USC 102(a)] mentions a subscriber hardware module for use in a
user device that stores a shared secret key, uses the shared secret key in an
authentication procedure, and derives a further secret key. This is similar to
the process in the question where a secret is generated from a unique user
input and stored on the mobile phone.
3. [Patent 9628481, Claim 1,
based on USPTO LEGAL GROUND 35 USC 102(a)] discloses a base station that receives an access
request message from a mobile unit. The message includes a message
authentication code formed using a first key, which is derived from a second
key. Access is granted to the mobile unit based on the message authentication code
and the value of a first counter. This seems to have a semantic similarity to
the process in the question where the mobile phone receives a first
communication from a remote computer-based station asking for user credentials.
4. [Patent 9288310, Claim 11,
based on USPTO LEGAL GROUND 35 USC 102(a)] discusses a smart card that sends a first request to
a roaming entity in a telecommunication network and receives a response from an
application server. The response includes a personalization command and an
admin code. If the admin code is valid, a secure session is established with a
personalization server. This patent claim seems to have a semantic overlap with
the question where the mobile phone receives a first communication from a
remote computer-based station.
In conclusion, the four patent claims listed above exhibit overlapping or
similar technical features with the method for authenticating a user described
in the question. These features include the generation and storage of secret
keys for authentication, the reception and processing of requests and responses
for user credentials, and the establishment of secure sessions for
communication.
Perspective 2
Based on the provided
context, several patents have claims that could be similar or overlapping with
the method for authenticating a user described in the question. The relevant
patents are:
1. Patent 10057053, Claim 9: The claim describes a process for authenticating a
mobile device where a secret key associated with the mobile device is used to
produce an output value. This output value is used to obtain a session key and
an expected response. This is similar to the process described in the question
where a unique user input is processed to generate a secret, that is stored and
used for subsequent authentications. [Patent 10057053, Claim 9 based on LEGAL GROUND 35 USC
103(a)]
2. Patent 10958631, Claim 4 and Claim 1: These claims describe a process where
a shared secret key is used for authentication and a further secret key is
derived for subsequent local authentication. This is comparable to the method
in the question where a secret is generated and stored for future
authentications. [Patent
10958631, Claim 4 and Claim 1 based on LEGAL GROUND 35 USC 102(a)]
3. Patent 9628481, Claim 1 and Claim 19: These claims involve a process where a
first key is derived from a second key and a counter, and this first key is
used for the formation of a message authentication code. Even though the method
of generating the key is different, the principle of generating a key for
authentication is similar to the method described in the question. [Patent 9628481, Claim 1 and Claim 19 based on LEGAL
GROUND 35 USC 102(c)]
4. Patent 7430414, Claim 2: This claim discusses a method of providing an
identifier to a server for request establishment. Though this does not
specifically involve generating and storing a secret, the concept of using an
identifier for subsequent access is parallel to the described method in the
question. [Patent 7430414, Claim 2
based on LEGAL GROUND 35 USC 102(b)]
In summary, while there are similarities in the concept of using a generated
secret or key for subsequent authentications, the specifics of how the secret
or key is generated and used vary among the claims. As a patent lawyer, you
would need to carefully scrutinize the exact method and process described in
the question against each claim to determine potential overlaps or conflicts.
This analysis would form the basis of any legal interpretations or
explanations.
▮
References
1 US Patent 9628481: Claim Element 10. Filed by Alcatel Lucent on
2015-11-17 and published on 2017-04-18
Method of
providing fresh keys for message authentication
Paragraph: A non-transitory
computer readable medium embodying a set of executable instructions, the set of
executable instructions to manipulate a computer system to perform a process
comprising: receiving, from a mobile unit, at least one access request message
including information indicative of a first counter and a message
authentication code formed using a first key, the first key being derived from
a second key and the first counter, the second key being derived from a third
key established for a security session between the mobile unit and an
authenticator; determining whether to grant access to the mobile unit based on
the message authentication code and the value of the first counter; and
providing a message indicating whether access is granted to the mobile unit in
response to determining whether to grant access to the mobile unit.
Keywords:
non-transitory computer readable medium embodying a set of executable
instructions
2 US Patent 9628481: Claim Element 19. Filed by Alcatel Lucent on
2015-11-17 and published on 2017-04-18
Method of
providing fresh keys for message authentication
Paragraph: A mobile unit,
comprising: an electronic computing device configured to: transmit at least one
access request message including information indicative of a first counter and
a message authentication code formed using a first key, the first key being
derived from a second key and the first counter, the second key being derived
from a third key established for a security session between the mobile unit and
an authenticator; and receive a message from a base station indicating whether
access is granted to the mobile unit in response to the base station
determining whether to grant access to the mobile unit based on the message
authentication code and the value of the first counter.
Keywords: A mobile
unit, comprising: an electronic computing device configured to: transmit at
least one access request message
3 US Patent 9628481: Claim Element 1. Filed by Alcatel Lucent on
2015-11-17 and published on 2017-04-18
Method of
providing fresh keys for message authentication
Paragraph: A base station,
comprising: an electronic computing device configured to: receive, from a
mobile unit, at least one access request message including information
indicative of a first counter and a message authentication code formed using a
first key, the first key being derived from a second key and the first counter,
the second key being derived from a third key established for a security
session between the mobile unit and an authenticator; determine whether to
grant access to the mobile unit based on the message authentication code and
the value of the first counter; and provide a message indicating whether access
is granted to the mobile unit in response to determining whether to grant
access to the mobile unit.
Keywords: A base
station,
4 US Patent 7787867: Claim Element 5. Filed by Nokia Corporation on
2003-02-10 and published on 2010-08-31
Message
accessing
Paragraph: A method
comprising at a mobile electronic device, receiving data that (a) identifies a
remotely stored message belonging to a user of the mobile electronic device and
(b) includes information that (i) associates the
message with the user and (ii) is encoded to restrict unauthorized access by
others, in response to a request by the user for retrieval of the message,
returning the encoded information to a server for use in authentication, and
providing a selected message for display in the presentation mode associated
with the selected message without further user interaction beyond selection of
the selected message.
Keywords:
authentication
5 US Patent 10057053: Claim Element 1. Filed by Certicom
Corp. on 2015-01-23 and published on 2018-08-21
Key
agreement for wireless communication
Paragraph: A method
performed by a computer system of a wireless network operator, the method
comprising: the computer system receiving an identifier of a mobile device; the
computer system obtaining a challenge: the computer system accessing, based on
the identifier, a secret key stored in a database, the secret key associated
with the mobile device; the computer system evaluating a message authentication
code (MAC) function based on the secret key and the challenge to produce an
output value; the computer system obtaining a session key and an expected
response based on the output value; the computer system transmitting a message
to the mobile device, the message including the challenge: the computer system
receiving from the mobile device a response generated by the mobile device
based on the secret key and the challenge; and in response to determining that
the response received from the mobile device matches the expected response,
utilizing a secure communication channel with the mobile device that utilizes
the session key.
Keywords: utilizing a
secure communication channel with the mobile device that utilizes the session
key.
6 US Patent 10057053: Claim Element 9. Filed by Certicom
Corp. on 2015-01-23 and published on 2018-08-21
Key
agreement for wireless communication
Paragraph: A wireless
network operator system comprising: a communication interface operable to
receive an identifier of a mobile device, and a response from the mobile
device; data processing apparatus operable to: obtain a challenge; access,
based on the identifier, a secret key stored in a database, the secret key
associated with the mobile device; evaluate a message authentication code (MAC)
function based on the secret key and the challenge to produce an output value;
obtain a session key and an expected response based on the output value;
transmit a message to the mobile device, the message including the challenge;
determine that the response from the mobile device matches the expected
response, wherein the response received from the mobile device is based on the
secret key and the challenge; in response to determining that the response
received from the mobile device matches the expected response, utilize a secure
communication channel with the mobile device that utilizes the session key.
Keywords: wireless
network operator system
7 US Patent 9628271: Claim Element 15. Filed by TELEFONAKTIEBOLAGET
LM ERICSSON (PUBL) on 2015-10-30 and published on 2017-04-18
Key
management for secure communication
Paragraph: A first key
management apparatus (KMA), the first KMA comprising: a receiver for receiving
a key request message, transmitted by a first user device, for obtaining from
the first KMA keying information for use in enabling the first user device to
securely communicate with a second user device; a transmitter; and a processor,
wherein the first KMA is configured such that, in response to the first KMA
receiving the key request message transmitted by the first user device, the KMA
employs the transmitter to communicate to the first user device keying
information and a voucher comprising a key identifier for retrieving the keying
information, and the first KMA is further configured to: store in a storage
unit the keying information in association with the key identifier, and in response
to receiving a message transmitted by the second user device and comprising
said key identifier, i) retrieve from the storage
unit the keying information and ii) use the transmitter to communicate the
retrieved keying information towards the second user device, wherein the keying
information comprises at least one of a) a key (Kab)
and b) information from which the key (Kab) can be
calculated.
Keywords: first key
management apparatus
8 US Patent 9596275: Claim Element 1. Filed by Telefonaktiebolaget
LM Ericsson (publ) on 2015-07-01 and
published on 2017-03-14
Method for
registering multi-contact devices
Paragraph: A method of
registering in an IP multimedia Subsystem (IMS)-enabled network, two or more
user agents associated with a multi-contact user device, the method comprising
the steps of: associating with each of the two or more user agents, a unique user
device identification (ID) that is unique to the multi-contact user device,
wherein the unique user device ID is derived from a global permanent identifier
associated with the multi-contact user device; and providing, by each of the
two or more user agents, the device ID to the IMS-enabled network; wherein when
a communication request is directed towards the multi-contact user device, a
serving node in the IMS enabled network manages the communication request
according to a predetermined handling scheme that prevents redirection of the
communication request from one registered user agent to another in response to
the detection of identical user device IDs.
Keywords: identical
user device IDs.
9 US Patent 8068788: Claim Element 3. Filed by Fujitsu Limited on
2005-09-15 and published on 2011-11-29
Communication
method in mobile communication system, and mobile station and base station in
the same system
Paragraph: A communication
method in a mobile communication system including at least one mobile station
and a base station, said method comprising: on the base station, transmitting,
when an user identification portion identifying each mobile station and a data
portion which is a message body, which are included in the uplink data
transmitted from the mobile station, are correctly decoded, permission for the
following uplink data transmission, together with reply information indicating
a normal reception, to a mobile station identified by information of the user
identification portion; and transmitting, when the user identification portion
is correctly decoded but the data portion is not correctly decoded, permission
for the following uplink data transmission, together with reply information
indicating an abnormal reception, to a mobile station identified by information
of the user identification portion.
Keywords:
communication method in a mobile communication system
10 US Patent 10958631: Claim Element 1. Filed by Koninklijke
KPN N.V. / Nederlandse Organisatie
voor Toegepast-Natuurwetenschappelijk
Onderzoek TNO on 2019-02-06 and published on
2021-03-23
Method and
system for providing security from a radio access network
Paragraph: A user device
configured for operating within a radio access network system, the radio access
network system comprising one or more base stations providing a wireless radio
interface for at least one user device, wherein a shared secret key is stored
in both the user device and a core network system of a telecommunications
network, wherein the user device comprises: a receiver configured for receiving
one or more values provided over the radio interface from the radio access
system, wherein one or more of one or more values provided over the radio
interface to the user device are received as an authentication vector for the
user device; a storage storing the shared secret key; and a computer system
configured for: performing a first authentication procedure using the
authentication vector and the shared secret key; and deriving a further secret
key from the shared secret key and at least one of the one or more values
received by the receiver, wherein the user device is configured to transmit a
connection request to the radio access network system and to perform a local
subsequent authentication procedure using the derived further secret key.
Keywords:
telecommunications network
11 US Patent 9596275: Claim Element 10. Filed by Telefonaktiebolaget
LM Ericsson (publ) on 2015-07-01 and
published on 2017-03-14
Method for
registering multi-contact devices
Paragraph: A communication
system comprising: a single multi-contact user device having a unique user
device identification (ID) that is unique to the multi-contact user device,
wherein the unique user device ID is derived from a global permanent identifier
associated with the multi-contact user device; and at least two user agents,
each user agent acting for the single multi-contact user device, and each user
agent being configured to provide the unique user device ID to an IP multimedia
Subsystem (IMS)-enabled network during registration of the user agent; wherein
when a communication request is directed towards the multi-contact user device,
a serving node in the IMS enabled network manages the communication request
according to a predetermined handling scheme that prevents redirection of the
communication request from one registered user agent to another in response to
the detection of identical user device IDs.
Keywords: identical
user device IDs.
12 US Patent 7430414: Claim Element 2. Filed by Microsoft Corporation on
2005-08-05 and published on 2008-09-30
Using call
establishment signaling to request data
Paragraph: A computer
program product for use in a mobile computer system that can request the
establishment of voice connections over a voice channel and can receive data
over a data channel, the computer program product comprising one or more
physical computer-readable storage media having stored computer-executable
instructions which, when executed by a processor of the mobile computer system,
implement a method for requesting data, wherein the method comprises: an act of
requesting establishment of a voice connection to a voice server, and at the
same time the mobile computer system automatically providing an identifier to
the voice server that is associated with the mobile computer system and that is
used to determine a specific IP address having data of interest that is
associated with the mobile computer system, such that a user of the mobile
computer system does not need to enter this identifier independently and
subsequent to initiating a request to establish the voice connection; and an
act of receiving the data of interest that is available at the specific IP
address in response to providing the identifier identifying the mobile computer
system, and without providing additional input, so as to thereby reduce input
required from a user of the mobile computer system to access the data of interest
available at the specific IP address from the mobile computer system.
Keywords: computer
program product for use in a mobile computer system that can request the
establishment of voice connections over a voice channel and can receive data
over a data channel
13 US Patent 9178696: Claim Element 15. Filed by Telefonaktiebolaget
L M Ericsson (publ) on 2007-11-30 and
published on 2015-11-03
Key
management for secure communication
Paragraph: A first key
management apparatus, the first key management apparatus comprising: a
receiver; a transmitter; and a processor configured to: use the transmitter to
communicate keying information and a voucher comprising an identifier for
retrieving the keying information to the a communication device in response to
receiving a key request transmitted by the communication device; store in a
storage unit the keying information in association with the identifier; in
response to receiving from a second key management apparatus a message comprising
said identifier i) retrieve from the storage unit the
keying information and ii) use the transmitter to communicate the retrieved
keying information to the second key management apparatus, wherein the keying
information comprises at least one of a) a key (Kab)
and b) information from which the key (Kab) can be
calculated, the key request comprises: a first user identifier that identifies
a first user; a second user identifier that identifies a second user; and a
bootstrapping transaction identifier (B-TID) that is separate and distinct from
the first and second user identifiers.
Keywords: A first key
management apparatus,
14 US Patent 9332436: Claim Element 20. Filed by APPLE INC. on
2015-02-23 and published on 2016-05-03
Network
access control methods and apparatus
Paragraph: A non-transitory
computer readable storage medium including a set of instructions executable by
a processor, wherein the instructions, when executed, cause the processor to
perform operations, comprising: receiving, from a mobile device, a message
including a temporary identification associated with the mobile device;
transmitting the temporary identifier to a core network; receiving, from the
core network, an unencrypted unique International Mobile Subscriber Identity
(IMSI) associated with the mobile device; and granting access to the core
network by the mobile device via the femtocell, wherein an operator of the
femtocell is unable to access the unencrypted unique IMSI information.
Keywords: A
non-transitory computer readable storage medium including a set of instructions
executable by a processor,
15 US Patent 7430414: Claim Element 18. Filed by Microsoft Corporation on
2005-08-05 and published on 2008-09-30
Using call
establishment signaling to request data
Paragraph: A mobile
computer system that can request the establishment of voice connections over a
voice channel and can receive data over a data channel and that is configured
for implementing a method for requesting data, the mobile computer system
comprising: a processor; and memory having stored thereon one or more
computer-executable instructions that, when executed by the processor,
implement the method for requesting data, wherein the method for requesting
data includes: an act of requesting establishment of a voice connection to a
voice server, and at the same time the mobile computer system automatically
providing an identifier to the voice server that is associated with the mobile
computer system and that is used to determine a specific IP address having data
of interest that is associated with the mobile computer system, such that a
user of the mobile computer system does not need to enter this identifier
independently and subsequent to initiating a request to establish the voice
connection; and an act of receiving the data of interest that is available at
the specific IP address in response to providing the identifier identifying the
mobile computer system, and without providing additional input, so as to
thereby reduce input required from a user of the mobile computer system to
access the data of interest available at the specific IP address from the
mobile computer system.
Keywords: mobile
computer system that can request the establishment of voice connections over a
voice channel and can receive data over a data channel
16 US Patent 8122250: Claim Element 20. Filed by Nokia Corporation on
2008-12-04 and published on 2012-02-21
Authentication
in data communication
Paragraph: A non-transitory
computer readable medium that stores a computer program configured to control
an apparatus to perform operations comprising: receiving client identity
information comprising a subscriber identity for a client; in response to
receiving the subscriber identity, obtaining an authentication vector
comprising at least one challenge and at least one first secret based at least
on the subscriber identity for the client; generating a first authentication
key using the at least one first secret; encrypting first credentials using the
first authentication key; and providing data to the client, the data comprising
the at least one challenge and the encrypted first credentials to the client,
wherein the provided data enables the client to derive a client version of the
first authentication key with the provided data for use in authenticating the client
independent of any response based on a client's secret from the client.
17 US Patent 10958631: Claim Element 4. Filed by Koninklijke
KPN N.V. / Nederlandse Organisatie
voor Toegepast-Natuurwetenschappelijk
Onderzoek TNO on 2019-02-06 and published on
2021-03-23
Method and
system for providing security from a radio access network
Paragraph: A subscriber
hardware module for use in a user device, wherein the user device is configured
for operating within a radio access network system the radio access network
system comprising one or more base stations providing a wireless radio interface
for at least one user device, wherein a shared secret key is stored in both the
user device and a core network system of a telecommunications network, wherein
the subscriber hardware module is configured to: store the shared secret key;
receive a first authentication request causing the subscriber hardware module
to use the shared secret key in a first authentication procedure and causing
the hardware subscriber module to derive a further secret key; and receive a
second authentication request, subsequent to the first authentication request,
causing the subscriber hardware module to use the further secret key for a
local authentication procedure, and wherein the user device is configured to
perform the local authentication procedure using the derived further secret
key.
Keywords: subscriber
hardware module for use in a user device
18 US Patent 8428554: Claim Element 9. Filed by Alcatel Lucent on
2008-01-25 and published on 2013-04-23
Method for
authenticating a mobile unit attached to a femtocell that operates according to
code division multiple access
Paragraph: A method
involving a femtocell that operates according to code division multiple access
(CDMA) standards, the femtocell is also configured to communicate with an
Internet Protocol Multimedia Subsystem (IMS) network, comprising:
authenticating, at a first secure entity in the IMS network, a mobile unit
using a global authentication response received from the mobile unit, wherein
the global authentication response is generated by the mobile unit using a
first random number and a first security key that is unknown to the femtocell;
receiving, at the first secure entity and from a CDMA-based authentication
server connected to the IMS network, at least one encryption key formed based
on the global challenge; transmitting a unique challenge comprising a second
random number from the first secure entity to the mobile unit via the
femtocell; receiving, at the first secure entity and from the femtocell, a
unique challenge response generated by the mobile unit using the second random
number and the first security key; and providing said at least one encryption
key to the femtocell in response to the first secure entity authenticating the
mobile unit based on the second random number.
Keywords: code
division multiple access (CDMA) standards,
19 US Patent 9288310: Claim Element 11. Filed by Alcatel Lucent on
2013-08-23 and published on 2016-03-15
Smart card
initial personnalization with local generation of
keys
Paragraph: A smart card
coupled with a communication device of a user who is not yet a subscriber of
any telecommunication network, a temporary international identity and a
temporary authentication key being stored in the smart card and in a home
location register connected to a roaming entity of a telecommunication network
to which the communication device is able to be attached, the smart card
comprising a non-transitory computer-readable storage device storing
computer-executable instructions which, when executed by a processor of a
computing device, cause the processor perform the operations of: sending a
first request to the roaming entity, the first request being forwarded to the
home location register that authenticates the user by means of the temporary
international identity and the temporary authentication key, the roaming entity
allowing the smart card to use resources of the telecommunication network;
sending a second request for smart card personalization to an application
server connected to the telecommunication network; receiving a response from
the application server, the response comprising a personalization command and
an admin code interpreting the personalization command to establish a secure
session with a personalization server via the application server, if the admin
code is valid; negotiating with the personalization server to agree on an
initial authentication key, by exchanging messages containing values derived
from random secrets; receiving a message (Mes 3 )
containing an initial international identity from the personalization server;
and replacing the temporary international identity and the temporary
authentication key by the initial international identity and the initial
authentication key.
Keywords: smart card
coupled with a communication device of a user who is not yet a subscriber of
any telecommunication network
20 US Patent 7660417: Claim Element 24. Filed by Telefonaktiebolaget
LM Ericsson (publ) on 2004-09-10 and
published on 2010-02-09
Enhanced
security design for cryptography in mobile communication systems
Paragraph: In an
arrangement in which a mobile terminal receives wireless communication services
from a wireless network, a method to operate said mobile terminal, comprising:
said mobile terminal generating a basic security key by performing an authenticate
and key agreement (AKA) procedure using a shared key as an input to said AKA
procedure, both said shared key and said AKA procedure being common to said
mobile terminal and said wireless network; said mobile terminal transferring a
list of one or more security algorithms supported by said mobile terminal to
said wireless network, each of said one or more security algorithms being a
data transformation algorithm that transforms input data to output data in
which said transformation is dependent on a key input to said data
transformation algorithm; said mobile terminal receiving selection information
from said wireless network indicating a selection of one of said one or more
security algorithms; said mobile terminal generating an algorithm-specific
security key by applying said basic security key and said selection information
as inputs to a key-modifying function which generates said algorithm-specific
security key based on aid basic security key and said selection information
applied as inputs; and said mobile terminal applying said algorithm-specific
security key as said key input to said selected data transformation algorithm
for communication between said mobile terminal and said wireless network;
wherein both said basic and algorithm-specific keys are valid for protected
communication between said mobile terminal and said wireless network.
Keywords: said mobile
terminal generating a basic security key by performing an authenticate and key
agreement