18149826. Secondary Authentication of a User Equipment simplified abstract (Telefonaktiebolaget LM Ericsson (publ))

From WikiPatents
Jump to navigation Jump to search

Secondary Authentication of a User Equipment

Organization Name

Telefonaktiebolaget LM Ericsson (publ)

Inventor(s)

Noamen Ben Henda of Vällingby (SE)

David Castellanos Zamora of Madrid (ES)

Vesa Torvinen of Sauvo (FI)

Secondary Authentication of a User Equipment - A simplified explanation of the abstract

This abstract first appeared for US patent application 18149826 titled 'Secondary Authentication of a User Equipment

Simplified Explanation

The patent application describes a system where a network node in a wireless network authenticates a User Equipment (UE) using a secondary authentication process. This process involves the network node acting as an EAP authenticator and exchanging EAP messages with the UE and an external EAP server.

  • The network node operates a Session Management Function (SMF) in the control plane of a core network.
  • The SMF acts as an EAP authenticator for the secondary authentication process.
  • The UE is separately authenticated with another network node in the control plane through a primary authentication process.
  • The EAP server used for secondary authentication is located outside of the core network.
  • The SMF authorizes a data session between the UE and the external network based on successful authentication via both primary and secondary processes.

Potential Applications

  • This technology can be applied in wireless networks to enhance security and authentication processes.
  • It can be used in various industries that rely on wireless networks, such as telecommunications, IoT, and mobile computing.

Problems Solved

  • The system solves the problem of securely authenticating User Equipment in a wireless network.
  • It addresses the need for a secondary authentication process to enhance security and prevent unauthorized access.

Benefits

  • Improved security: The use of a secondary authentication process adds an extra layer of security to the network.
  • Enhanced user authentication: The system ensures that the User Equipment is authenticated both through the primary and secondary processes, reducing the risk of unauthorized access.
  • Flexibility: The ability to use an external EAP server outside of the core network provides flexibility in the authentication process.


Original Abstract Submitted

A network node operates a Session Management Function (SMF) in a control plane of a core network of a wireless network. The network node authenticates a User Equipment (UE) with an Extensible Authentication Protocol (EAP) server in a secondary authentication process that uses the SMF as an EAP authenticator. The EAP server is outside of the core network and the UE is separately authenticated with a further network node in the control plane of the core network via a primary authentication process. Authenticating the UE in the secondary authentication process comprises exchanging EAP messages between the SMF and the UE and between the SMF and the EAP server. The SMF authorizes a data session between the UE and the external network through a user plane of the core network based on the UE having successfully authenticated via both the primary authentication process and the secondary authentication process.