Claims
- 1. A method of authenticating a subscriber unit in a wireless communication system comprsing the steps of:
- receiving a request for authentication of the subscriber unit from a first communication system;
- determining that the first communication system uses a first system authentication protocol different from a second system authentication protocol used in the subscriber unit; and
- generating authentication information in the first system authentication protocol by generating a challenge and a response and by converting the challenge and response from the second system authentication protocol into a challenge and response in the first system authentication protocol.
- 2. A method of generating authentication information for use in autheticating a subscriber unit of a wireless communication system, the method comprising the steps of:
- receiving a request for service from the subscriber unit;
- generating a first authentication challenge based on a first authentication protocol; and
- converting the first authentication challenge into a second authentication challenge in a second authentication protocol.
- 3. The method of claim 2, further comprising generating a first response based on the first authentication challenge.
- 4. The method of claim 3, further comprising converting the first response into a second response in the second protocol.
- 5. The method of claim 4, further comprising sending the second authentication challenge and the second response to the subscriber unit.
- 6. The method of claim 2, wherein the first authentication protocol is used in a first communication system and the second authentication protocol is used in a second communication system.
Parent Case Info
This is a continuation of application Ser. No. 08/282,832, filed on Jul. 29, 1994 now U.S. Pat. No. 5,537,474.
US Referenced Citations (1)
Number |
Name |
Date |
Kind |
5537474 |
Brown et al. |
Jul 1996 |
|
Continuations (1)
|
Number |
Date |
Country |
Parent |
282832 |
Jul 1994 |
|