US Patent Application 18017002. METHODS AND SYSTEMS FOR IDENTIFYING AUSF AND ACCESSING RELATED KEYS IN 5G PROSE simplified abstract

From WikiPatents
Jump to navigation Jump to search

METHODS AND SYSTEMS FOR IDENTIFYING AUSF AND ACCESSING RELATED KEYS IN 5G PROSE

Organization Name

Samsung Electronics Co., Ltd.


Inventor(s)

R Rohini of Bangalore (IN)


Nivedya Parambath Sasi of Bangalore (IN)


Rajavelsamy Rajadurai of Bangalore (IN)


METHODS AND SYSTEMS FOR IDENTIFYING AUSF AND ACCESSING RELATED KEYS IN 5G PROSE - A simplified explanation of the abstract

This abstract first appeared for US patent application 18017002 titled 'METHODS AND SYSTEMS FOR IDENTIFYING AUSF AND ACCESSING RELATED KEYS IN 5G PROSE

Simplified Explanation

- The patent application describes methods and systems for identifying and accessing Authentication Server Function (AUSF) and related keys in 5G ProSe (Proximity Services). - The AUSF is identified by an Access and Mobility Management Function (AMF) based on a routing indicator or Subscriber Key Identifier (SKI). - The AUSF is responsible for managing keys for ProSe UE-to-Network relay communication. - The AUSF authorizes a remote UE to access a 5G core network through one or more UE-to-network relays. - The authorization of the remote UE is based on a Subscription Permanent Identifier (SUPI) obtained from a User Data Management (UDM) system. - Once authorized, the AUSF can derive authentication keys for the remote UE to access the 5G core network through the UE-to-network relays. - The derived keys include a REAR key, K1, K2, and K3. - The patent application aims to simplify the process of identifying and accessing AUSF and related keys in 5G ProSe, enhancing the security and efficiency of ProSe communication.


Original Abstract Submitted

Methods and systems for identifying AUSF and accessing related keys in 5G ProSe. The AUSF corresponding to a remote UE is identified by an AMF based on routing indicator or SKI. The AUSF is capable of key management of ProSe UE-to-Network relay communication. The AUSF authorizes the remote UE to access a 5G core network through one or more UE-to-network relays. The authorization of the remote UE is performed based on a SUPI corresponding to the remote UE. The SUPI is obtained from a UDM. Once the remote UE is authorized, the AUSF can derive keys that enable the remote UE to access the 5G core network through the one or more UE-to-network relays. The keys derived by the AUSF can be referred to as authentication keys. The derived keys include REAR key, K, K, and K.