Apex Standards validityGPT − the key to unlocking enhanced legal judgments and high-quality IPR strategies. Harness the power of iterative claim chart refinement and rapid GPT-driven insights. Stay informed with timely and precise intelligence, enabling accurate comparisons, strategic acquisitions, fair licensing, robust defense, and trend forecasting. Empower your patent portfolio with researcher-preferred capabilities for success in any scenario.


Apex Standards validity-GPT Factsheet: PDF


Apex Standards Domain-specific GPT Factsheet: PDF

 

Reference: Unified Patents PATROLL (July 3, 2023) v. US-10,171,433-B2 (PACid Technologies, LLC), priority date: April 24, 2018


validityGPT answered:


Perspective 1

 

The method for authenticating a user in the question appears to be similar to certain aspects of the following patents:

1. 
[Patent 10057053, Claim 9, based on USPTO LEGAL GROUND 35 USC 102(a)] teaches a process of authenticating a mobile device on a wireless network. It does so by obtaining a secret key associated with the mobile device, evaluating a message authentication code based on the secret key to produce an output value, and determining that a response from the mobile device matches an expected response. This seems similar to the method in the question where an application running on a mobile phone receives a unique user input, processes it, and generates a secret. This secret is then stored on the mobile phone and can be retrieved when the unique user input is received again.

2. 
[Patent 10958631, Claim 4, based on USPTO LEGAL GROUND 35 USC 102(a)] mentions a subscriber hardware module for use in a user device that stores a shared secret key, uses the shared secret key in an authentication procedure, and derives a further secret key. This is similar to the process in the question where a secret is generated from a unique user input and stored on the mobile phone.

3. 
[Patent 9628481, Claim 1, based on USPTO LEGAL GROUND 35 USC 102(a)] discloses a base station that receives an access request message from a mobile unit. The message includes a message authentication code formed using a first key, which is derived from a second key. Access is granted to the mobile unit based on the message authentication code and the value of a first counter. This seems to have a semantic similarity to the process in the question where the mobile phone receives a first communication from a remote computer-based station asking for user credentials.

4. 
[Patent 9288310, Claim 11, based on USPTO LEGAL GROUND 35 USC 102(a)] discusses a smart card that sends a first request to a roaming entity in a telecommunication network and receives a response from an application server. The response includes a personalization command and an admin code. If the admin code is valid, a secure session is established with a personalization server. This patent claim seems to have a semantic overlap with the question where the mobile phone receives a first communication from a remote computer-based station.

In conclusion, the four patent claims listed above exhibit overlapping or similar technical features with the method for authenticating a user described in the question. These features include the generation and storage of secret keys for authentication, the reception and processing of requests and responses for user credentials, and the establishment of secure sessions for communication.


Perspective 2

 

Based on the provided context, several patents have claims that could be similar or overlapping with the method for authenticating a user described in the question. The relevant patents are:

1. Patent 10057053, Claim 9: The claim describes a process for authenticating a mobile device where a secret key associated with the mobile device is used to produce an output value. This output value is used to obtain a session key and an expected response. This is similar to the process described in the question where a unique user input is processed to generate a secret, that is stored and used for subsequent authentications. 
[Patent 10057053, Claim 9 based on LEGAL GROUND 35 USC 103(a)]

2. Patent 10958631, Claim 4 and Claim 1: These claims describe a process where a shared secret key is used for authentication and a further secret key is derived for subsequent local authentication. This is comparable to the method in the question where a secret is generated and stored for future authentications. 
[Patent 10958631, Claim 4 and Claim 1 based on LEGAL GROUND 35 USC 102(a)]

3. Patent 9628481, Claim 1 and Claim 19: These claims involve a process where a first key is derived from a second key and a counter, and this first key is used for the formation of a message authentication code. Even though the method of generating the key is different, the principle of generating a key for authentication is similar to the method described in the question. 
[Patent 9628481, Claim 1 and Claim 19 based on LEGAL GROUND 35 USC 102(c)]

4. Patent 7430414, Claim 2: This claim discusses a method of providing an identifier to a server for request establishment. Though this does not specifically involve generating and storing a secret, the concept of using an identifier for subsequent access is parallel to the described method in the question. 
[Patent 7430414, Claim 2 based on LEGAL GROUND 35 USC 102(b)]

In summary, while there are similarities in the concept of using a generated secret or key for subsequent authentications, the specifics of how the secret or key is generated and used vary among the claims. As a patent lawyer, you would need to carefully scrutinize the exact method and process described in the question against each claim to determine potential overlaps or conflicts. This analysis would form the basis of any legal interpretations or explanations.



References

1 US Patent 9628481: Claim Element 10. Filed by Alcatel Lucent on 2015-11-17 and published on 2017-04-18
Method of providing fresh keys for message authentication
Paragraph: A non-transitory computer readable medium embodying a set of executable instructions, the set of executable instructions to manipulate a computer system to perform a process comprising: receiving, from a mobile unit, at least one access request message including information indicative of a first counter and a message authentication code formed using a first key, the first key being derived from a second key and the first counter, the second key being derived from a third key established for a security session between the mobile unit and an authenticator; determining whether to grant access to the mobile unit based on the message authentication code and the value of the first counter; and providing a message indicating whether access is granted to the mobile unit in response to determining whether to grant access to the mobile unit.
Keywords: non-transitory computer readable medium embodying a set of executable instructions

2
 US Patent 9628481: Claim Element 19. Filed by Alcatel Lucent on 2015-11-17 and published on 2017-04-18
Method of providing fresh keys for message authentication
Paragraph: A mobile unit, comprising: an electronic computing device configured to: transmit at least one access request message including information indicative of a first counter and a message authentication code formed using a first key, the first key being derived from a second key and the first counter, the second key being derived from a third key established for a security session between the mobile unit and an authenticator; and receive a message from a base station indicating whether access is granted to the mobile unit in response to the base station determining whether to grant access to the mobile unit based on the message authentication code and the value of the first counter.
Keywords: A mobile unit, comprising: an electronic computing device configured to: transmit at least one access request message

3
 US Patent 9628481: Claim Element 1. Filed by Alcatel Lucent on 2015-11-17 and published on 2017-04-18
Method of providing fresh keys for message authentication
Paragraph: A base station, comprising: an electronic computing device configured to: receive, from a mobile unit, at least one access request message including information indicative of a first counter and a message authentication code formed using a first key, the first key being derived from a second key and the first counter, the second key being derived from a third key established for a security session between the mobile unit and an authenticator; determine whether to grant access to the mobile unit based on the message authentication code and the value of the first counter; and provide a message indicating whether access is granted to the mobile unit in response to determining whether to grant access to the mobile unit.
Keywords: A base station,

4
 US Patent 7787867: Claim Element 5. Filed by Nokia Corporation on 2003-02-10 and published on 2010-08-31
Message accessing
Paragraph: A method comprising at a mobile electronic device, receiving data that (a) identifies a remotely stored message belonging to a user of the mobile electronic device and (b) includes information that (i) associates the message with the user and (ii) is encoded to restrict unauthorized access by others, in response to a request by the user for retrieval of the message, returning the encoded information to a server for use in authentication, and providing a selected message for display in the presentation mode associated with the selected message without further user interaction beyond selection of the selected message.
Keywords: authentication

5
 US Patent 10057053: Claim Element 1. Filed by Certicom Corp. on 2015-01-23 and published on 2018-08-21
Key agreement for wireless communication
Paragraph: A method performed by a computer system of a wireless network operator, the method comprising: the computer system receiving an identifier of a mobile device; the computer system obtaining a challenge: the computer system accessing, based on the identifier, a secret key stored in a database, the secret key associated with the mobile device; the computer system evaluating a message authentication code (MAC) function based on the secret key and the challenge to produce an output value; the computer system obtaining a session key and an expected response based on the output value; the computer system transmitting a message to the mobile device, the message including the challenge: the computer system receiving from the mobile device a response generated by the mobile device based on the secret key and the challenge; and in response to determining that the response received from the mobile device matches the expected response, utilizing a secure communication channel with the mobile device that utilizes the session key.
Keywords: utilizing a secure communication channel with the mobile device that utilizes the session key.

6
 US Patent 10057053: Claim Element 9. Filed by Certicom Corp. on 2015-01-23 and published on 2018-08-21
Key agreement for wireless communication
Paragraph: A wireless network operator system comprising: a communication interface operable to receive an identifier of a mobile device, and a response from the mobile device; data processing apparatus operable to: obtain a challenge; access, based on the identifier, a secret key stored in a database, the secret key associated with the mobile device; evaluate a message authentication code (MAC) function based on the secret key and the challenge to produce an output value; obtain a session key and an expected response based on the output value; transmit a message to the mobile device, the message including the challenge; determine that the response from the mobile device matches the expected response, wherein the response received from the mobile device is based on the secret key and the challenge; in response to determining that the response received from the mobile device matches the expected response, utilize a secure communication channel with the mobile device that utilizes the session key.
Keywords: wireless network operator system

7
 US Patent 9628271: Claim Element 15. Filed by TELEFONAKTIEBOLAGET LM ERICSSON (PUBL) on 2015-10-30 and published on 2017-04-18
Key management for secure communication
Paragraph: A first key management apparatus (KMA), the first KMA comprising: a receiver for receiving a key request message, transmitted by a first user device, for obtaining from the first KMA keying information for use in enabling the first user device to securely communicate with a second user device; a transmitter; and a processor, wherein the first KMA is configured such that, in response to the first KMA receiving the key request message transmitted by the first user device, the KMA employs the transmitter to communicate to the first user device keying information and a voucher comprising a key identifier for retrieving the keying information, and the first KMA is further configured to: store in a storage unit the keying information in association with the key identifier, and in response to receiving a message transmitted by the second user device and comprising said key identifier, i) retrieve from the storage unit the keying information and ii) use the transmitter to communicate the retrieved keying information towards the second user device, wherein the keying information comprises at least one of a) a key (Kab) and b) information from which the key (Kab) can be calculated.
Keywords: first key management apparatus

8
 US Patent 9596275: Claim Element 1. Filed by Telefonaktiebolaget LM Ericsson (publ) on 2015-07-01 and published on 2017-03-14
Method for registering multi-contact devices
Paragraph: A method of registering in an IP multimedia Subsystem (IMS)-enabled network, two or more user agents associated with a multi-contact user device, the method comprising the steps of: associating with each of the two or more user agents, a unique user device identification (ID) that is unique to the multi-contact user device, wherein the unique user device ID is derived from a global permanent identifier associated with the multi-contact user device; and providing, by each of the two or more user agents, the device ID to the IMS-enabled network; wherein when a communication request is directed towards the multi-contact user device, a serving node in the IMS enabled network manages the communication request according to a predetermined handling scheme that prevents redirection of the communication request from one registered user agent to another in response to the detection of identical user device IDs.
Keywords: identical user device IDs.

9
 US Patent 8068788: Claim Element 3. Filed by Fujitsu Limited on 2005-09-15 and published on 2011-11-29
Communication method in mobile communication system, and mobile station and base station in the same system
Paragraph: A communication method in a mobile communication system including at least one mobile station and a base station, said method comprising: on the base station, transmitting, when an user identification portion identifying each mobile station and a data portion which is a message body, which are included in the uplink data transmitted from the mobile station, are correctly decoded, permission for the following uplink data transmission, together with reply information indicating a normal reception, to a mobile station identified by information of the user identification portion; and transmitting, when the user identification portion is correctly decoded but the data portion is not correctly decoded, permission for the following uplink data transmission, together with reply information indicating an abnormal reception, to a mobile station identified by information of the user identification portion.
Keywords: communication method in a mobile communication system

10
 US Patent 10958631: Claim Element 1. Filed by Koninklijke KPN N.V. / Nederlandse Organisatie voor Toegepast-Natuurwetenschappelijk Onderzoek TNO on 2019-02-06 and published on 2021-03-23
Method and system for providing security from a radio access network
Paragraph: A user device configured for operating within a radio access network system, the radio access network system comprising one or more base stations providing a wireless radio interface for at least one user device, wherein a shared secret key is stored in both the user device and a core network system of a telecommunications network, wherein the user device comprises: a receiver configured for receiving one or more values provided over the radio interface from the radio access system, wherein one or more of one or more values provided over the radio interface to the user device are received as an authentication vector for the user device; a storage storing the shared secret key; and a computer system configured for: performing a first authentication procedure using the authentication vector and the shared secret key; and deriving a further secret key from the shared secret key and at least one of the one or more values received by the receiver, wherein the user device is configured to transmit a connection request to the radio access network system and to perform a local subsequent authentication procedure using the derived further secret key.
Keywords: telecommunications network

11
 US Patent 9596275: Claim Element 10. Filed by Telefonaktiebolaget LM Ericsson (publ) on 2015-07-01 and published on 2017-03-14
Method for registering multi-contact devices
Paragraph: A communication system comprising: a single multi-contact user device having a unique user device identification (ID) that is unique to the multi-contact user device, wherein the unique user device ID is derived from a global permanent identifier associated with the multi-contact user device; and at least two user agents, each user agent acting for the single multi-contact user device, and each user agent being configured to provide the unique user device ID to an IP multimedia Subsystem (IMS)-enabled network during registration of the user agent; wherein when a communication request is directed towards the multi-contact user device, a serving node in the IMS enabled network manages the communication request according to a predetermined handling scheme that prevents redirection of the communication request from one registered user agent to another in response to the detection of identical user device IDs.
Keywords: identical user device IDs.

12
 US Patent 7430414: Claim Element 2. Filed by Microsoft Corporation on 2005-08-05 and published on 2008-09-30
Using call establishment signaling to request data
Paragraph: A computer program product for use in a mobile computer system that can request the establishment of voice connections over a voice channel and can receive data over a data channel, the computer program product comprising one or more physical computer-readable storage media having stored computer-executable instructions which, when executed by a processor of the mobile computer system, implement a method for requesting data, wherein the method comprises: an act of requesting establishment of a voice connection to a voice server, and at the same time the mobile computer system automatically providing an identifier to the voice server that is associated with the mobile computer system and that is used to determine a specific IP address having data of interest that is associated with the mobile computer system, such that a user of the mobile computer system does not need to enter this identifier independently and subsequent to initiating a request to establish the voice connection; and an act of receiving the data of interest that is available at the specific IP address in response to providing the identifier identifying the mobile computer system, and without providing additional input, so as to thereby reduce input required from a user of the mobile computer system to access the data of interest available at the specific IP address from the mobile computer system.
Keywords: computer program product for use in a mobile computer system that can request the establishment of voice connections over a voice channel and can receive data over a data channel

13
 US Patent 9178696: Claim Element 15. Filed by Telefonaktiebolaget L M Ericsson (publ) on 2007-11-30 and published on 2015-11-03
Key management for secure communication
Paragraph: A first key management apparatus, the first key management apparatus comprising: a receiver; a transmitter; and a processor configured to: use the transmitter to communicate keying information and a voucher comprising an identifier for retrieving the keying information to the a communication device in response to receiving a key request transmitted by the communication device; store in a storage unit the keying information in association with the identifier; in response to receiving from a second key management apparatus a message comprising said identifier i) retrieve from the storage unit the keying information and ii) use the transmitter to communicate the retrieved keying information to the second key management apparatus, wherein the keying information comprises at least one of a) a key (Kab) and b) information from which the key (Kab) can be calculated, the key request comprises: a first user identifier that identifies a first user; a second user identifier that identifies a second user; and a bootstrapping transaction identifier (B-TID) that is separate and distinct from the first and second user identifiers.
Keywords: A first key management apparatus,

14
 US Patent 9332436: Claim Element 20. Filed by APPLE INC. on 2015-02-23 and published on 2016-05-03
Network access control methods and apparatus
Paragraph: A non-transitory computer readable storage medium including a set of instructions executable by a processor, wherein the instructions, when executed, cause the processor to perform operations, comprising: receiving, from a mobile device, a message including a temporary identification associated with the mobile device; transmitting the temporary identifier to a core network; receiving, from the core network, an unencrypted unique International Mobile Subscriber Identity (IMSI) associated with the mobile device; and granting access to the core network by the mobile device via the femtocell, wherein an operator of the femtocell is unable to access the unencrypted unique IMSI information.
Keywords: A non-transitory computer readable storage medium including a set of instructions executable by a processor,

15
 US Patent 7430414: Claim Element 18. Filed by Microsoft Corporation on 2005-08-05 and published on 2008-09-30
Using call establishment signaling to request data
Paragraph: A mobile computer system that can request the establishment of voice connections over a voice channel and can receive data over a data channel and that is configured for implementing a method for requesting data, the mobile computer system comprising: a processor; and memory having stored thereon one or more computer-executable instructions that, when executed by the processor, implement the method for requesting data, wherein the method for requesting data includes: an act of requesting establishment of a voice connection to a voice server, and at the same time the mobile computer system automatically providing an identifier to the voice server that is associated with the mobile computer system and that is used to determine a specific IP address having data of interest that is associated with the mobile computer system, such that a user of the mobile computer system does not need to enter this identifier independently and subsequent to initiating a request to establish the voice connection; and an act of receiving the data of interest that is available at the specific IP address in response to providing the identifier identifying the mobile computer system, and without providing additional input, so as to thereby reduce input required from a user of the mobile computer system to access the data of interest available at the specific IP address from the mobile computer system.
Keywords: mobile computer system that can request the establishment of voice connections over a voice channel and can receive data over a data channel

16
 US Patent 8122250: Claim Element 20. Filed by Nokia Corporation on 2008-12-04 and published on 2012-02-21
Authentication in data communication
Paragraph: A non-transitory computer readable medium that stores a computer program configured to control an apparatus to perform operations comprising: receiving client identity information comprising a subscriber identity for a client; in response to receiving the subscriber identity, obtaining an authentication vector comprising at least one challenge and at least one first secret based at least on the subscriber identity for the client; generating a first authentication key using the at least one first secret; encrypting first credentials using the first authentication key; and providing data to the client, the data comprising the at least one challenge and the encrypted first credentials to the client, wherein the provided data enables the client to derive a client version of the first authentication key with the provided data for use in authenticating the client independent of any response based on a client's secret from the client.

17
 US Patent 10958631: Claim Element 4. Filed by Koninklijke KPN N.V. / Nederlandse Organisatie voor Toegepast-Natuurwetenschappelijk Onderzoek TNO on 2019-02-06 and published on 2021-03-23
Method and system for providing security from a radio access network
Paragraph: A subscriber hardware module for use in a user device, wherein the user device is configured for operating within a radio access network system the radio access network system comprising one or more base stations providing a wireless radio interface for at least one user device, wherein a shared secret key is stored in both the user device and a core network system of a telecommunications network, wherein the subscriber hardware module is configured to: store the shared secret key; receive a first authentication request causing the subscriber hardware module to use the shared secret key in a first authentication procedure and causing the hardware subscriber module to derive a further secret key; and receive a second authentication request, subsequent to the first authentication request, causing the subscriber hardware module to use the further secret key for a local authentication procedure, and wherein the user device is configured to perform the local authentication procedure using the derived further secret key.
Keywords: subscriber hardware module for use in a user device

18
 US Patent 8428554: Claim Element 9. Filed by Alcatel Lucent on 2008-01-25 and published on 2013-04-23
Method for authenticating a mobile unit attached to a femtocell that operates according to code division multiple access
Paragraph: A method involving a femtocell that operates according to code division multiple access (CDMA) standards, the femtocell is also configured to communicate with an Internet Protocol Multimedia Subsystem (IMS) network, comprising: authenticating, at a first secure entity in the IMS network, a mobile unit using a global authentication response received from the mobile unit, wherein the global authentication response is generated by the mobile unit using a first random number and a first security key that is unknown to the femtocell; receiving, at the first secure entity and from a CDMA-based authentication server connected to the IMS network, at least one encryption key formed based on the global challenge; transmitting a unique challenge comprising a second random number from the first secure entity to the mobile unit via the femtocell; receiving, at the first secure entity and from the femtocell, a unique challenge response generated by the mobile unit using the second random number and the first security key; and providing said at least one encryption key to the femtocell in response to the first secure entity authenticating the mobile unit based on the second random number.
Keywords: code division multiple access (CDMA) standards,

19
 US Patent 9288310: Claim Element 11. Filed by Alcatel Lucent on 2013-08-23 and published on 2016-03-15
Smart card initial personnalization with local generation of keys
Paragraph: A smart card coupled with a communication device of a user who is not yet a subscriber of any telecommunication network, a temporary international identity and a temporary authentication key being stored in the smart card and in a home location register connected to a roaming entity of a telecommunication network to which the communication device is able to be attached, the smart card comprising a non-transitory computer-readable storage device storing computer-executable instructions which, when executed by a processor of a computing device, cause the processor perform the operations of: sending a first request to the roaming entity, the first request being forwarded to the home location register that authenticates the user by means of the temporary international identity and the temporary authentication key, the roaming entity allowing the smart card to use resources of the telecommunication network; sending a second request for smart card personalization to an application server connected to the telecommunication network; receiving a response from the application server, the response comprising a personalization command and an admin code interpreting the personalization command to establish a secure session with a personalization server via the application server, if the admin code is valid; negotiating with the personalization server to agree on an initial authentication key, by exchanging messages containing values derived from random secrets; receiving a message (Mes 3 ) containing an initial international identity from the personalization server; and replacing the temporary international identity and the temporary authentication key by the initial international identity and the initial authentication key.
Keywords: smart card coupled with a communication device of a user who is not yet a subscriber of any telecommunication network

20
 US Patent 7660417: Claim Element 24. Filed by Telefonaktiebolaget LM Ericsson (publ) on 2004-09-10 and published on 2010-02-09
Enhanced security design for cryptography in mobile communication systems
Paragraph: In an arrangement in which a mobile terminal receives wireless communication services from a wireless network, a method to operate said mobile terminal, comprising: said mobile terminal generating a basic security key by performing an authenticate and key agreement (AKA) procedure using a shared key as an input to said AKA procedure, both said shared key and said AKA procedure being common to said mobile terminal and said wireless network; said mobile terminal transferring a list of one or more security algorithms supported by said mobile terminal to said wireless network, each of said one or more security algorithms being a data transformation algorithm that transforms input data to output data in which said transformation is dependent on a key input to said data transformation algorithm; said mobile terminal receiving selection information from said wireless network indicating a selection of one of said one or more security algorithms; said mobile terminal generating an algorithm-specific security key by applying said basic security key and said selection information as inputs to a key-modifying function which generates said algorithm-specific security key based on aid basic security key and said selection information applied as inputs; and said mobile terminal applying said algorithm-specific security key as said key input to said selected data transformation algorithm for communication between said mobile terminal and said wireless network; wherein both said basic and algorithm-specific keys are valid for protected communication between said mobile terminal and said wireless network.
Keywords: said mobile terminal generating a basic security key by performing an authenticate and key agreement