Authentication of cellular telephone device by providing a first one-time
pad cryptological table to a security server which has multiple sequenced
One Time Pad value entries including a previous use indicator initialized
as "unused", and providing a second one-time pad cryptological table to
an authentic device initially synchronized with the first table. A cloned
copy of the second table is stored in an inauthentic cellular telephone
device, these third table being initially synchronized with the second
table. The authentic device selects an unused entry in the second table
and transmits it to the server when requesting service. If the received
entry matches a next sequential unused entry in the first table, the
server grants service, and both server and authentic device mark that
entry as used. If the received entry does not match a sequentially next
unused entry in the first table, service is denied to the requesting
device.