Apex Standards Claim Construction


Patent: US7233664B2
Filed: 2003-03-13
Issued: 2007-06-19
Patent Holder: (Original Assignee) New Mexico Tech Research Foundation     (Current Assignee) MOXCHANGE LLC
Inventor(s): Hamdy Soliman

Title: Dynamic security authentication for wireless communication networks

Abstract: In a first embodiment, a dynamic computer system security method and system using dynamic encryption and full synchronization between system nodes. A data record created by a source user is encrypted with an initial dynamic session key. A new dynamic session key is generated based upon a data record and a previous dynamic session key. A central authority is used to synchronize and authenticate both source and destination users with constantly regenerated dynamic authentication keys. In a second embodiment, a method of providing dynamic security authentication between wireless communication network nodes. An initial authentication key and an address are assigned to certain of the nodes. The address along with information encrypted by the initial authentication key is sent to an authentication server. The authentication server and node or nodes synchronously regenerate authentication keys based upon the initial authentication key. Secure handovers occur between nodes via an authentication key.

The First Claim: 1. A method of providing secure authentication between wireless communication network nodes, the method comprising: providing a node identifier comprising an address and an initial authentication key; installing the node identifier at a first network node; storing the node identifier at a second network node; sending node identifier information from a first network node to a second network node; and synchronously regenerating an authentication key at two network nodes based upon node identifier information.


Disclaimer: The promise of Apex Standards Claim Construction (CC) is that it will conduct the Broadest Reasonable, Ordinary, or Customary Interpretation for the claim elements of a target patent or the technical specification languages of an industrial standard. Therefore, a top-down, apriori evaluation is enabled, allowing stakeholders to swiftly and effectively analyze the relevance and scope of terms and phrases under consideration prior to making complex, high-value judgments. CC is intended to alleviate the initial burden of evidence by providing an exhaustive list of contextual semantic understandings that can be used as building blocks in the development of a prosecution-ready, licensing-ready, or litigation-ready work product. Stakeholders can then utilize the CC to revise the original claim or technical languages, as well as to find more relevant arts in order to build strategy and accomplish additional goals.



Reference Claim Element / Subject Matter Feature Meaning Claim Construction & Interpretation
[1] 1 .

A method [1]
method [1] [Meaning 1] process
[Meaning 2] system
[Meaning 3] methods
[Meaning 4] communication method
[Meaning 5] computerized method
[Meaning 6] method capable
[Interpretation 1] system for providing secure authentication between wireless communication network nodes and methods of use thereof claim 11 is the method
[Interpretation 2] node identifier comprising an address and an initial authentication key for use in wireless communication network authentication and the method
[Interpretation 3] wireless communication network comprising at least two wireless communication network nodes connected to at least one server and the method
[Interpretation 4] secure authentication method for wireless communication networks and apparatus for use therein which includes the method
[Interpretation 5] secure authentication method for wireless communication networks which is in the process
[Interpretation 6] wireless communication network node comprising an apparatus and method capable
[Interpretation 7] computer program product comprising instructions for carrying out the method
[2] of providing (implementing, supporting, conducting, ensuring, achieving) secure authentication [2] authentication [2] [Meaning 1] communication
[Meaning 2] connectivity
[Meaning 3] wireless communication
[Meaning 4] authentication and communication
[Meaning 5] authentication of data transmitted
[Meaning 6] communication of authentication keys
[Interpretation 1] authentication of wireless communication network nodes and of providing secure data transfer
[Interpretation 2] wireless communication between wireless communication network nodes by establishing trust
[3] between wireless communication network nodes [3] communication network nodes [3] [Meaning 1] networks
[Meaning 2] devices
[Meaning 3] nodes
[Meaning 4] terminals
[Meaning 5] communications devices
[Meaning 6] access points
[Interpretation 1] networks comprising at least one first network node and at least one second network node connected by an access point
[Interpretation 2] access points and wireless access terminals in an ad hoc wireless network
[Interpretation 3] communication networks comprising at least one wireless node and two network nodes
[Interpretation 4] communication devices and network nodes in an wireless communication network
[Interpretation 5] access points and wireless client devices in wireless communication networks
[4] , the method [1] comprising (comprises, having, includes, involving, including) : providing a node identifier [4] node identifier [4] [Meaning 1] token
[Meaning 2] node
[Meaning 3] certificate
[Meaning 4] message
[Meaning 5] device identifier
[Meaning 6] network identifier
[Interpretation 1] wireless communication network comprising at least two wireless communication network nodes and at least one node identifier the node identifier
[Interpretation 2] secure authentication key for use in authentic with one or more wireless communication network nodes using an initial node identifier
[5] comprising an address [5] address [5] [Meaning 1] identity
[Meaning 2] identifier
[Meaning 3] algorithm
[Meaning 4] identification code
[Meaning 5] authentication token
[Meaning 6] identity module identifier
[Interpretation 1] identifier of the first network node and an identifier of the second network node respectively associated
[Interpretation 2] identifier of the wireless communication network node associated with the node identifier
[Interpretation 3] identification of the wireless communication network node to which it is attached
[Interpretation 4] identification of the first network node to be authenticated first
[Interpretation 5] authentication key pair comprising at least an integrity protection key
[Interpretation 6] initial node identifier and an initial node identifier value pair
[6] and an initial authentication key [6] authentication key [6] [Meaning 1] value
[Meaning 2] signature
[Meaning 3] password
[Meaning 4] random number
[Meaning 5] encryption key
[Meaning 6] node key
[Interpretation 1] random number for the node identifier and an authentication key comprising an initial random number for the node identifier key
[Interpretation 2] random number for the node and an authentication key for authentic authentic the node identifier information
[Interpretation 3] random number for use in generating an authentication key for network nodes
[Interpretation 4] value for an authentication key to be used at two network nodes
[7] ; installing (storing, detecting, generating, obtaining, identifying) the node identifier [4] at a first network node [7] network node [7] [Meaning 1] node
[Meaning 2] network
[Meaning 3] communication node
[Meaning 4] node network
[Meaning 5] wireless node
[Meaning 6] mobile network node
[Interpretation 1] wireless communication network node and storing the node identifier in its memory
[Interpretation 2] wireless communication network node and at the first network node
[Interpretation 3] authentication server for use in authentic with the first node
[8] ; storing (installing, acquiring, identifying, removing, activating) the node identifier [4] at a second network node [7] ; sending (transmitting, passing, communicating, exchanging, broadcasting) node identifier information [8] node identifier information [8] [Meaning 1] data
[Meaning 2] packets
[Meaning 3] messages
[Meaning 4] information
[Meaning 5] authentication information
[Meaning 6] node identifier
[Interpretation 1] authentication key information from the first network node to the second network node or sending an initial authentication key information
[Interpretation 2] and receiving data between the first network node and the second network node to authenticate communications
[Interpretation 3] an authentication request to the first network node to obtain the node identifier for secure authentication
[Interpretation 4] at least one of the node identifier and the initial authentication key
[Interpretation 5] the node identifier at the first network node as an authentication request
[Interpretation 6] the node identifier in response to an authentication request message
[Interpretation 7] an authentication request message comprising the stored node identifier information
[9] from a first network node [7] to a second network node [7] ; and synchronously regenerating (updating, computing, generating, exchanging, calculating) an authentication key [6] at two network nodes [9] network nodes [9] [Meaning 1] points
[Meaning 2] node
[Meaning 3] locations
[Meaning 4] different nodes
[Meaning 5] networks nodes
[Meaning 6] wireless network nodes
[Interpretation 1] wireless communication network nodes based upon node identifier information and authentic authentic the authentication key at the second network node
[Interpretation 2] or more nodes in the wireless communication network based upon the node identifier information or synchronously generating an authentication key
[Interpretation 3] or more of the nodes to provide an authentication key for authentic with the node identifier
[Interpretation 4] nodes by using the initial authentication key of the first node and
[Interpretation 5] or more of the first network node and the second network node
[Interpretation 6] network nodes based upon the initial authentication key and an authentication key
[Interpretation 7] of the nodes to provide secure authentication between two of the nodes
[10] based upon node identifier information [8] .