Unlock instant, AI-driven research and patent intelligence for your innovation.

Exception handling in cellular authentication

A technology of cellular terminal and authentication request, which is applied in the field of exception handling, and can solve problems such as authentication signaling delaying the completion of network registration process, module failure to connect, and user failure to establish a telecommunications connection.

Active Publication Date: 2020-05-12
NOKIA TECH OY
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This will cause error conditions that are not encountered today and need to be resolved in order to avoid modules not connecting at all
[0006] Although necessary for security, authentication signaling unfortunately delays the completion of the network registration process
Furthermore, the inventors have now determined that in certain combinations of cellular terminal equipment, network configuration, and cryptographic authentication protocols, a cellular terminal may enter a permanent failure loop such that its user cannot establish a telecommunications connection at all

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Exception handling in cellular authentication
  • Exception handling in cellular authentication
  • Exception handling in cellular authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] by referring to the attached Figures 1 to 4 Understand example embodiments of the invention and its potential advantages. In this document, the same reference symbols denote the same parts or steps.

[0075] figure 1 An architectural diagram of a system of an example embodiment is shown. A cellular terminal 100 is shown with a user equipment 110 and a secure element comprising a USIM 120 . In an example embodiment, the USIM is an application on a software-implemented secure element. The system further comprises a cellular telecommunication network 200 comprising E-UTRAN or eNB 210, Mobility Management Entity MME 220, Home Subscriber Server HSS 230 (e.g. Home Location Register HLR, Authentication Center AuC), Serving Gateway 240, Serving Gateway Support Node SGSN 250 , Universal Terrestrial Radio Access Network UTRAN 260 and GSM EDGE Radio Access Network GERAN 270 .

[0076] figure 2 A flowchart illustrating the processing of an example embodiment. In step 21, t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The cellular terminal sends a request to the cellular network for an authentication procedure trigger and responsively receives an authentication request message from the cellular network, the authentication request message having an indication of a selected encryption algorithm from a set of a plurality of encryption algorithms. The cellular terminal attempts to decode the authentication request message into a decoded authentication request according to the selected encryption algorithm and based on a shared secret known to the cellular terminal and the cellular terminal's network operator. the cellular terminal generating a determination of whether the attempt was successful and whether the cellular terminal supports the selected encryption algorithm in authenticating to the cellular network; and if the determination is affirmative, based on the decoded authenticating the request, the shared secret, and the selected encryption algorithm, generating and encrypting an authentication response message and sending the authentication response message to the cellular network; and in the event of a negative determination, generating a fault report and The fault report is sent to the cellular network.

Description

technical field [0001] This application relates generally to exception handling in cellular authentication. Background technique [0002] This section illustrates useful background information and is not an admission that any technology described herein represents prior art. [0003] Cellular networks, or more precisely cellular telecommunication networks, are ubiquitous in modern society. In order for a cellular terminal to initiate communication over a cellular network, the cellular terminal needs to attach or register with the network during a network registration process. During network registration, cellular terminals typically use the USIM application on the UICC, exchanging signals for authenticating themselves, or more precisely their subscriptions. During network registration, the cellular terminal obtains SIM access information, such as a session key, from the network, which the cellular terminal can then use to communicate in the cellular network. The access in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04L9/08H04L9/32H04L69/40H04W12/04
CPCH04L9/12H04L9/14H04L9/3226H04L9/3234H04L9/3271H04L2209/80H04L69/40G06Q20/3576H04L63/06H04W12/06H04W12/04H04W24/04
Inventor H·贝吉乌斯S·奥尔特曼斯
Owner NOKIA TECH OY