Unlock instant, AI-driven research and patent intelligence for your innovation.

Methods supporting authentication in wireless communication networks and related network nodes and wireless terminals

A technology of wireless communication network and wireless terminal, which is applied in the field of wireless terminal and wireless communication, can solve problems such as low efficiency, and achieve the effect of improving performance

Active Publication Date: 2019-06-18
TELEFON AB LM ERICSSON (PUBL)
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, current proposals for future use may be inefficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods supporting authentication in wireless communication networks and related network nodes and wireless terminals
  • Methods supporting authentication in wireless communication networks and related network nodes and wireless terminals
  • Methods supporting authentication in wireless communication networks and related network nodes and wireless terminals

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The inventive concept will be described more fully hereinafter with reference to the accompanying drawings, in which examples of embodiments of the inventive concept are shown. Inventive concepts may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the inventive concept to those skilled in the art. It should also be noted that these embodiments are not mutually exclusive. Components from one embodiment may by default be present / used in another embodiment.

[0043] For purposes of illustration and explanation only, these and other embodiments of the inventive concept are described herein in the context of operating in a wireless communication network that provides communications over a radio communication channel with wireless terminals (also referred to as for UE) commu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Some methods in a wireless communication network may include providing a first authentication key, and deriving a second authentication key based on the first authentication key, with the second authentication key being associated with the wireless terminal. Responsive to deriving the second authentication key, a key response message may be transmitted including the second authentication key and / or an EAP-Finish / Re-auth message. Some other methods in a wireless communication network may include receiving a key response message including a core network mobility management authentication key andan EAP-Finish / Re-auth message. Responsive to receiving the key response message, the network may initiate transmission of an EAP-Finish / Re-auth message and / or a freshness parameter used to derive thecore network mobility management authentication key from the wireless communication network to the wireless terminal responsive to the key response message. Related wireless terminal methods are alsodiscussed.

Description

technical field [0001] The present disclosure relates generally to communications, and more particularly to wireless communications and related methods, network nodes and wireless terminals. Background technique [0002] 3GPP is exploring the opportunity to use the EAP authentication framework as a unified authentication method for the next generation of communications, known as 5G or fifth generation communications. [0003] According to TR 23.799 [Ref. 1], it is possible to provide as figure 1 A possible next-generation architecture is shown. [0004] There are also a number of security features defined in 3GPP SA3 TR 33.899 [Ref 2], including: [0005] - ARPF; the ARPF stores the UE's profile and the UE's security related information. ARPF interacts with AUSF. [0006] - AUSF; an authentication function that interacts with ARPF and terminates requests from SEAF. AUSF should reside in the secure environment of the operator's network or third-party system and not be ex...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/06H04L9/08
CPCH04W12/04H04W12/062H04L63/08H04L63/162H04W8/08H04W12/06H04W36/0038H04W12/041H04W12/0433
Inventor 莫尼卡·威弗森
Owner TELEFON AB LM ERICSSON (PUBL)