Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and network node for obtaining a permanent identity of an authenticating wireless device

A technology of network nodes and wireless devices, applied in network topology, wireless communication, network data management, etc., can solve problems such as trouble

Active Publication Date: 2015-10-14
TELEFON AB LM ERICSSON (PUBL)
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this can be very cumbersome in cases where pseudonyms and / or fast re-authentication identities are used instead of permanent identities including IMSI

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and network node for obtaining a permanent identity of an authenticating wireless device
  • Method and network node for obtaining a permanent identity of an authenticating wireless device
  • Method and network node for obtaining a permanent identity of an authenticating wireless device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Hereinafter, embodiments of the present invention will be described in more detail with reference to the accompanying drawings. For the purpose of explanation and not limitation, specific details (such as specific scenarios and technologies) are disclosed to provide a thorough understanding.

[0036] The multiple steps described below in conjunction with the drawings should be understood mainly in a logical sense, and each step may include communication of one or more specific messages depending on the implementation and protocol used. The embodiments involved in the present disclosure generally relate to the field of EAP authentication using EAP-SIM, EAP-AKA or EAP-AKA' authentication framework. However, it must be understood that the same principle can be applied in other authentication frameworks with similar signaling flows. In this disclosure, the term wireless device is generally used. A wireless device or user equipment UE, which is a term used in the 3GPP specifi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A network node (2), such as a Wi-Fi Access Point / Authenticator, is able to obtain a permanent device identity of a wireless device (1) requesting authentication, in case the wireless device has only provided an alias. This is achieved by the network node intercepting an authentication message from the wireless device, wherein the authentication message comprises a signaled identity of the wireless device, and extracts the signaled identity. In case the extracted identity is an alias and not a permanent identity of the wireless device, the network node manipulates at least one further authentication message to cause the wireless device the signal its permanent identity in a subsequent authentication message.

Description

Technical field [0001] The present invention relates to a method for obtaining a permanent device identity of a wireless device requesting authentication in a network node, and to a network node for performing the method. Background technique [0002] In the 3GPP system, if the wireless device is associated with a subscription that allows the wireless communication network to authenticate the wireless device, the wireless device is allowed to attach and access the wireless communication network. The 3rd Generation Partnership Project 3GPP wireless local area network WLAN interaction specifies network access authentication based on the Extensible Authentication Protocol EAP. The EAP authentication framework provides support for different authentication methods. The protocol is directly carried on the data link layer (DLL), and is currently widely used especially in wired and wireless local area networks. EAP-S1M (Subscriber Identity Module) is a method of authentication and sess...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W8/20H04W84/12H04W88/06H04W92/02
CPCH04W12/06H04W84/12H04W88/06H04W92/02H04L63/162H04W12/75H04W12/72H04L63/0853
Inventor 菲利普·麦斯塔诺夫伊卡罗·L·J·达席尔瓦王宇
Owner TELEFON AB LM ERICSSON (PUBL)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products