Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and network node for obtaining a permanent identity for authenticating a wireless device

A technology for wireless devices and network nodes, applied in the field of permanent device identity, which can solve problems such as trouble

Active Publication Date: 2018-12-04
TELEFON AB LM ERICSSON (PUBL)
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this can be very cumbersome in cases where pseudonyms and / or fast re-authentication identities are used instead of permanent identities including IMSI

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and network node for obtaining a permanent identity for authenticating a wireless device
  • Method and network node for obtaining a permanent identity for authenticating a wireless device
  • Method and network node for obtaining a permanent identity for authenticating a wireless device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Hereinafter, embodiments of the present invention will be described in more detail with reference to the accompanying drawings. For purposes of explanation and not limitation, specific details are disclosed, such as of specific scenarios and techniques, to provide a thorough understanding.

[0036] The various steps described below in connection with the figures should be understood primarily in a logical sense, while each step may include the communication of one or more specific messages depending on the implementation and protocol used. Embodiments to which this disclosure relates generally relate to the field of EAP authentication using EAP-SIM, EAP-AKA or EAP-AKA' authentication frameworks. However, it must be understood that the same principle can be applied in other authentication frameworks with similar signaling flows. In this disclosure, the term wireless device is used generally. A wireless device or user equipment UE as the term is used in 3GPP specificati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Where only an alias is provided for the wireless device, a network node (2) such as a Wi-Fi access point / authenticator is able to obtain a permanent device identity of the wireless device (1) requesting authentication. The network node does this by intercepting an authentication message from the wireless device, wherein the authentication message includes the signaled identity of the wireless device, and extracting the signaled identity. In case the extracted identity is an alias rather than the wireless device's permanent identity, the network node operates at least one other authentication message to cause the wireless device to signal the permanent device identity in a subsequent authentication message.

Description

technical field [0001] The invention relates to a method in a network node for obtaining a permanent device identity of a wireless device requesting authentication, and to a network node for performing said method. Background technique [0002] In 3GPP systems, a wireless device is allowed to attach and access a wireless communication network if the wireless device is associated with a subscription that allows the wireless communication network to authenticate the wireless device. The 3rd Generation Partnership Project 3GPP Wireless Local Area Network WLAN interaction specifies network access authentication based on Extensible Authentication Protocol EAP. The EAP authentication framework provides support for different authentication methods. The protocol is carried directly on the Data Link Layer (DLL) and is currently widely adopted especially in wired and wireless local area networks. EAP-S1M (Subscriber Identity Module) is a method of authentication and session key dist...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W8/20H04W84/12H04W88/06H04W92/02
CPCH04W12/06H04W84/12H04W88/06H04W92/02H04L63/162H04W12/75H04W12/72H04L63/0853
Inventor 菲利普·麦斯塔诺夫伊卡罗·L·J·达席尔瓦王宇
Owner TELEFON AB LM ERICSSON (PUBL)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products