US Patent Application 18348834. KEY IDENTIFIER GENERATION METHOD AND RELATED APPARATUS simplified abstract
Contents
KEY IDENTIFIER GENERATION METHOD AND RELATED APPARATUS
Organization Name
Inventor(s)
KEY IDENTIFIER GENERATION METHOD AND RELATED APPARATUS - A simplified explanation of the abstract
This abstract first appeared for US patent application 18348834 titled 'KEY IDENTIFIER GENERATION METHOD AND RELATED APPARATUS
Simplified Explanation
- The patent application describes a function called AUSF that manages authentication requests. - AUSF receives an authentication request message from AMF, which includes a concealed identifier called SUCI. - AUSF sends a request message to UDM to obtain an authentication vector, which includes authentication and key management information for an application. - AUSF receives a response message from UDM, which includes the authentication vector and an indication of the key management for the application (AKMA). - Based on the AKMA indication information, AUSF generates an authentication and key management for application-key identifier. - The authentication and key management for application-key identifier is based on a routing indicator (RID) in the SUCI.
Original Abstract Submitted
An authentication management function AUSF receives an authentication request message from an access and mobility management function AMF, where the authentication request message carries a subscription concealed identifier SUCI. The AUSF sends an authentication vector get request message to a unified data management UDM function, where the authentication vector get request message carries the SUCI. The AUSF receives an authentication vector get response message from the UDM, where the authentication vector get response message includes authentication and key management for application AKMA indication information. The AUSF generates, based on the AKMA indication information, an authentication and key management for application-key identifier based on a routing indicator RID in the SUCI.