18239364. HANDLING OF MULTIPLE AUTHENTICATION PROCEDURES IN 5G simplified abstract (Telefonaktiebolaget LM Ericsson (publ))

From WikiPatents
Jump to navigation Jump to search

HANDLING OF MULTIPLE AUTHENTICATION PROCEDURES IN 5G

Organization Name

Telefonaktiebolaget LM Ericsson (publ)

Inventor(s)

Noamen Ben Henda of VÄLLINGBY (SE)

David Castellanos Zamora of MADRID (ES)

Monica Wifvesson of LUND (SE)

Vesa Lehtovirta of ESPOO (FI)

HANDLING OF MULTIPLE AUTHENTICATION PROCEDURES IN 5G - A simplified explanation of the abstract

This abstract first appeared for US patent application 18239364 titled 'HANDLING OF MULTIPLE AUTHENTICATION PROCEDURES IN 5G

Simplified Explanation

The abstract describes a method used by a home PLMN (Public Land Mobile Network) to communicate with electronic devices. The method involves receiving authentication requests from different PLMNs (Public Land Mobile Networks) for the same electronic device and obtaining security keys for message integrity protection. The method also includes determining the latest security key and using it to protect a message associated with a message protection request.

  • The method is used by a home PLMN to communicate with electronic devices.
  • Authentication requests are received from different PLMNs for the same electronic device.
  • Security keys are obtained for message integrity protection.
  • The latest security key is determined.
  • The latest security key is used to protect a message associated with a message protection request.

Potential Applications

  • This method can be used in mobile network systems to ensure secure communication between a home PLMN and electronic devices.
  • It can be applied in various industries that rely on mobile networks, such as telecommunications, IoT (Internet of Things), and smart home systems.

Problems Solved

  • Ensures secure communication between a home PLMN and electronic devices by obtaining and using the latest security key.
  • Solves the problem of managing multiple security keys for the same electronic device when authenticating with different PLMNs.

Benefits

  • Enhances the security of communication between a home PLMN and electronic devices by using the latest security key.
  • Simplifies the management of security keys by determining the latest key to be used.
  • Improves the efficiency and reliability of message protection in mobile network systems.


Original Abstract Submitted

A method by an AUSF of a home PLMN configured to communicate through an interface with electronic devices is provided. A first authentication request is received from a first PLMN that is authenticating an electronic device. A first security key used for integrity protection of messages delivered from the home PLMN to the electronic device is obtained. A second authentication request is received from a second PLMN that is authenticating the electronic device. A second security key used for integrity protection of the messages delivered from the home PLMN to the electronic device is obtained. A message protection request is received. Which of the first security key and the second security key is a latest security key is determined. The latest security key is used to protect a message associated with the message protection request.