17920540. TECHNIQUE FOR AUTHENTICATING OPERATORS OF WIRELESS TERMINAL DEVICES simplified abstract (Telefonaktiebolaget LM Ericsson (publ))

From WikiPatents
Jump to navigation Jump to search

TECHNIQUE FOR AUTHENTICATING OPERATORS OF WIRELESS TERMINAL DEVICES

Organization Name

Telefonaktiebolaget LM Ericsson (publ)

Inventor(s)

Enrico De Luca of Caserta (IT)

Daniele Gaito of Napoli (IT)

Maria Pia Cancro of Salerno (IT)

TECHNIQUE FOR AUTHENTICATING OPERATORS OF WIRELESS TERMINAL DEVICES - A simplified explanation of the abstract

This abstract first appeared for US patent application 17920540 titled 'TECHNIQUE FOR AUTHENTICATING OPERATORS OF WIRELESS TERMINAL DEVICES

Simplified Explanation

The abstract describes a technique for authenticating the operator of a wireless terminal device using biometric data and a subscriber identity module (SIM). Here are the key points:

  • The technique involves a wireless terminal device with a SIM card that stores a subscription identifier.
  • The method starts by receiving the subscription identifier or a temporary identifier associated with it.
  • The operator of the terminal device enters a first set of biometric data, which is then sent along with the identifier to a subscriber database in the core network domain of a wireless communication system.
  • In response to the database request, a second set of biometric data associated with the identifier is received from the subscriber database.
  • The first set of biometric data is authenticated based on the second set of biometric data, resulting in a first authentication result.

Potential applications of this technology:

  • Mobile device security: This technique can enhance the security of mobile devices by ensuring that only authorized operators can access them.
  • Access control systems: The authentication method can be applied to access control systems, such as building entry systems or secure areas, to verify the identity of individuals.
  • Financial transactions: By authenticating the operator using biometric data, this technique can be used to secure financial transactions on mobile devices.

Problems solved by this technology:

  • Unauthorized access: The technique helps prevent unauthorized access to wireless terminal devices by requiring biometric authentication.
  • Identity theft: By using biometric data for authentication, the method reduces the risk of identity theft or impersonation.
  • SIM card security: Storing the subscription identifier in the SIM card adds an extra layer of security to the authentication process.

Benefits of this technology:

  • Enhanced security: The use of biometric data adds a high level of security to the authentication process, making it difficult for unauthorized individuals to access the device.
  • User convenience: The operator only needs to enter their biometric data once, and subsequent authentication can be done automatically using the stored data.
  • Scalability: The technique can be implemented in a wireless communication system with a large number of subscribers, making it suitable for widespread use.


Original Abstract Submitted

A technique of authenticating an operator of a wireless terminal device is presented, wherein the first terminal device comprises a subscriber identity module (SIM) and wherein a subscription identifier is stored in the SIM. A method aspect of this technique comprises receiving the subscription identifier or a temporary identifier associated with the subscription identifier. The method aspect also comprises receiving a first set of biometric data of the operator, wherein the first set of biometric data has been entered by the operator at the terminal device, and sending a database request towards a subscriber database in a core network domain of a wireless communication system, the database request including the subscription identifier or the temporary identifier. The method further comprises receiving, in response to the database request, a second set of biometric data associated in the subscriber database with the subscription identifier or the temporary identifier, and authenticating the first set of biometric data on the basis of the second set of biometric data so as to obtain a first authentication result.