Reference | Claim Element / Subject Matter | Feature | Meaning | Claim Construction & Interpretation |
---|---|---|---|---|
[1] |
1 . A method [1] |
method [1] |
[Meaning 1] process [Meaning 2] system [Meaning 3] methods [Meaning 4] communication method [Meaning 5] computerized method [Meaning 6] method capable |
[Interpretation 1] system for providing secure authentication between wireless communication network nodes and methods of use thereof claim 11 is the method [Interpretation 2] node identifier comprising an address and an initial authentication key for use in wireless communication network authentication and the method [Interpretation 3] wireless communication network comprising at least two wireless communication network nodes connected to at least one server and the method [Interpretation 4] secure authentication method for wireless communication networks and apparatus for use therein which includes the method [Interpretation 5] secure authentication method for wireless communication networks which is in the process [Interpretation 6] wireless communication network node comprising an apparatus and method capable [Interpretation 7] computer program product comprising instructions for carrying out the method |
[2] | of providing (implementing, supporting, conducting, ensuring, achieving) secure authentication [2] | authentication [2] |
[Meaning 1] communication [Meaning 2] connectivity [Meaning 3] wireless communication [Meaning 4] authentication and communication [Meaning 5] authentication of data transmitted [Meaning 6] communication of authentication keys |
[Interpretation 1] authentication of wireless communication network nodes and of providing secure data transfer [Interpretation 2] wireless communication between wireless communication network nodes by establishing trust |
[3] | between wireless communication network nodes [3] | communication network nodes [3] |
[Meaning 1] networks [Meaning 2] devices [Meaning 3] nodes [Meaning 4] terminals [Meaning 5] communications devices [Meaning 6] access points |
[Interpretation 1] networks comprising at least one first network node and at least one second network node connected by an access point [Interpretation 2] access points and wireless access terminals in an ad hoc wireless network [Interpretation 3] communication networks comprising at least one wireless node and two network nodes [Interpretation 4] communication devices and network nodes in an wireless communication network [Interpretation 5] access points and wireless client devices in wireless communication networks |
[4] | , the method [1] comprising (comprises, having, includes, involving, including) : providing a node identifier [4] | node identifier [4] |
[Meaning 1] token [Meaning 2] node [Meaning 3] certificate [Meaning 4] message [Meaning 5] device identifier [Meaning 6] network identifier |
[Interpretation 1] wireless communication network comprising at least two wireless communication network nodes and at least one node identifier the node identifier [Interpretation 2] secure authentication key for use in authentic with one or more wireless communication network nodes using an initial node identifier |
[5] | comprising an address [5] | address [5] |
[Meaning 1] identity [Meaning 2] identifier [Meaning 3] algorithm [Meaning 4] identification code [Meaning 5] authentication token [Meaning 6] identity module identifier |
[Interpretation 1] identifier of the first network node and an identifier of the second network node respectively associated [Interpretation 2] identifier of the wireless communication network node associated with the node identifier [Interpretation 3] identification of the wireless communication network node to which it is attached [Interpretation 4] identification of the first network node to be authenticated first [Interpretation 5] authentication key pair comprising at least an integrity protection key [Interpretation 6] initial node identifier and an initial node identifier value pair |
[6] | and an initial authentication key [6] | authentication key [6] |
[Meaning 1] value [Meaning 2] signature [Meaning 3] password [Meaning 4] random number [Meaning 5] encryption key [Meaning 6] node key |
[Interpretation 1] random number for the node identifier and an authentication key comprising an initial random number for the node identifier key [Interpretation 2] random number for the node and an authentication key for authentic authentic the node identifier information [Interpretation 3] random number for use in generating an authentication key for network nodes [Interpretation 4] value for an authentication key to be used at two network nodes |
[7] | ; installing (storing, detecting, generating, obtaining, identifying) the node identifier [4] at a first network node [7] | network node [7] |
[Meaning 1] node [Meaning 2] network [Meaning 3] communication node [Meaning 4] node network [Meaning 5] wireless node [Meaning 6] mobile network node |
[Interpretation 1] wireless communication network node and storing the node identifier in its memory [Interpretation 2] wireless communication network node and at the first network node [Interpretation 3] authentication server for use in authentic with the first node |
[8] | ; storing (installing, acquiring, identifying, removing, activating) the node identifier [4] at a second network node [7] ; sending (transmitting, passing, communicating, exchanging, broadcasting) node identifier information [8] | node identifier information [8] |
[Meaning 1] data [Meaning 2] packets [Meaning 3] messages [Meaning 4] information [Meaning 5] authentication information [Meaning 6] node identifier |
[Interpretation 1] authentication key information from the first network node to the second network node or sending an initial authentication key information [Interpretation 2] and receiving data between the first network node and the second network node to authenticate communications [Interpretation 3] an authentication request to the first network node to obtain the node identifier for secure authentication [Interpretation 4] at least one of the node identifier and the initial authentication key [Interpretation 5] the node identifier at the first network node as an authentication request [Interpretation 6] the node identifier in response to an authentication request message [Interpretation 7] an authentication request message comprising the stored node identifier information |
[9] | from a first network node [7] to a second network node [7] ; and synchronously regenerating (updating, computing, generating, exchanging, calculating) an authentication key [6] at two network nodes [9] | network nodes [9] |
[Meaning 1] points [Meaning 2] node [Meaning 3] locations [Meaning 4] different nodes [Meaning 5] networks nodes [Meaning 6] wireless network nodes |
[Interpretation 1] wireless communication network nodes based upon node identifier information and authentic authentic the authentication key at the second network node [Interpretation 2] or more nodes in the wireless communication network based upon the node identifier information or synchronously generating an authentication key [Interpretation 3] or more of the nodes to provide an authentication key for authentic with the node identifier [Interpretation 4] nodes by using the initial authentication key of the first node and [Interpretation 5] or more of the first network node and the second network node [Interpretation 6] network nodes based upon the initial authentication key and an authentication key [Interpretation 7] of the nodes to provide secure authentication between two of the nodes |
[10] | based upon node identifier information [8] . |