18466261. METHODS FOR AUTHENTICATION AND KEY MANAGEMENT IN A WIRELESS COMMUNICATIONS NETWORK AND RELATED APPARATUSES simplified abstract (Telefonaktiebolaget LM Ericsson (publ))

From WikiPatents
Jump to navigation Jump to search

METHODS FOR AUTHENTICATION AND KEY MANAGEMENT IN A WIRELESS COMMUNICATIONS NETWORK AND RELATED APPARATUSES

Organization Name

Telefonaktiebolaget LM Ericsson (publ)

Inventor(s)

Noamen Ben Henda of VÄLLINGBY (SE)

Helena Vahidi Mazinani of LUND (SE)

Vesa Lehtovirta of ESPOO (FI)

METHODS FOR AUTHENTICATION AND KEY MANAGEMENT IN A WIRELESS COMMUNICATIONS NETWORK AND RELATED APPARATUSES - A simplified explanation of the abstract

This abstract first appeared for US patent application 18466261 titled 'METHODS FOR AUTHENTICATION AND KEY MANAGEMENT IN A WIRELESS COMMUNICATIONS NETWORK AND RELATED APPARATUSES

Simplified Explanation

Abstract Explanation

The abstract describes a method performed by a network server for authentication and key management for a terminal device in a wireless communication network. The method involves authenticating the terminal device, obtaining a key, and generating bootstrapping security parameters.

  • The method authenticates the terminal device during a primary authentication session.
  • If the authentication is successful, a first key is obtained.
  • Bootstrapping security parameters are generated, which include a second key derived from the first key and a temporary identifier.
  • The temporary identifier is used to identify the terminal device and the bootstrapping security parameters.

Potential Applications

  • Wireless communication networks
  • Terminal devices in wireless networks
  • Network server authentication and key management

Problems Solved

  • Ensuring secure authentication and key management for terminal devices in wireless networks
  • Generating bootstrapping security parameters for secure communication

Benefits

  • Enhanced security for terminal devices in wireless networks
  • Efficient authentication and key management process
  • Secure communication between network server and terminal devices


Original Abstract Submitted

A method performed by a network server is provided for authentication and key management for a terminal device in a wireless communication network. The method includes authenticating the terminal device during a primary authentication session for the terminal device. The method further includes responsive to a successful authentication of the terminal device, obtaining a first key. The method further includes generating bootstrapping security parameters. The parameters include a second key derived from the first key and a temporary identifier. The temporary identifier identifies the terminal device and the bootstrapping security parameters.