US Patent Application 17752182. SELECTIVE NETWORK SLICE AUTHENTICATION AND AUTHORIZATION IN A MOBILE NETWORK ENVIRONMENT simplified abstract

From WikiPatents
Jump to navigation Jump to search

SELECTIVE NETWORK SLICE AUTHENTICATION AND AUTHORIZATION IN A MOBILE NETWORK ENVIRONMENT

Organization Name

Cisco Technology, Inc.

Inventor(s)

Vimal Srivastava of Bangalore (IN)

Sri Gundavelli of San Jose CA (US)

Ravi Kiran Guntupalli of Cumming GA (US)

SELECTIVE NETWORK SLICE AUTHENTICATION AND AUTHORIZATION IN A MOBILE NETWORK ENVIRONMENT - A simplified explanation of the abstract

This abstract first appeared for US patent application 17752182 titled 'SELECTIVE NETWORK SLICE AUTHENTICATION AND AUTHORIZATION IN A MOBILE NETWORK ENVIRONMENT

Simplified Explanation

The patent application describes techniques for selective network slice authentication and authorization in a mobile network environment.

  • The techniques aim to simplify the authentication process for user equipment seeking access to multiple network slices.
  • The method involves obtaining a registration request from the user equipment, which identifies the network slices requiring authentication.
  • If authentication with a first network slice is successful, authentication with other network slices can be skipped.
  • This selective authentication process helps to reduce the authentication overhead and improve efficiency.
  • The access management element of the mobile network is responsible for implementing these techniques.
  • The method ensures that once authentication with the first network slice is successful, the user equipment can access the other network slices without going through the authentication process again.


Original Abstract Submitted

Presented herein are techniques to provide selective network slice authentication and authorization in a mobile network environment. In one example, a method may include obtaining, by an access management element of a mobile network, a registration request from a user equipment, wherein the registration request identifies a plurality of network slices with which the user equipment seeks authentication; determining that if authentication for the user equipment with a first network slice is successful, authentication for the user equipment with one or more other network slices can be skipped; and upon successful authentication for the user equipment with the first network slice, skipping authentication for the user equipment with the one or more other network slices.