18466261. METHODS FOR AUTHENTICATION AND KEY MANAGEMENT IN A WIRELESS COMMUNICATIONS NETWORK AND RELATED APPARATUSES simplified abstract (Telefonaktiebolaget LM Ericsson (publ))
Contents
- 1 METHODS FOR AUTHENTICATION AND KEY MANAGEMENT IN A WIRELESS COMMUNICATIONS NETWORK AND RELATED APPARATUSES
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 METHODS FOR AUTHENTICATION AND KEY MANAGEMENT IN A WIRELESS COMMUNICATIONS NETWORK AND RELATED APPARATUSES - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Abstract Explanation
- 1.6 Potential Applications
- 1.7 Problems Solved
- 1.8 Benefits
- 1.9 Original Abstract Submitted
METHODS FOR AUTHENTICATION AND KEY MANAGEMENT IN A WIRELESS COMMUNICATIONS NETWORK AND RELATED APPARATUSES
Organization Name
Telefonaktiebolaget LM Ericsson (publ)
Inventor(s)
Noamen Ben Henda of VÄLLINGBY (SE)
Helena Vahidi Mazinani of LUND (SE)
METHODS FOR AUTHENTICATION AND KEY MANAGEMENT IN A WIRELESS COMMUNICATIONS NETWORK AND RELATED APPARATUSES - A simplified explanation of the abstract
This abstract first appeared for US patent application 18466261 titled 'METHODS FOR AUTHENTICATION AND KEY MANAGEMENT IN A WIRELESS COMMUNICATIONS NETWORK AND RELATED APPARATUSES
Simplified Explanation
Abstract Explanation
The abstract describes a method performed by a network server for authentication and key management for a terminal device in a wireless communication network. The method involves authenticating the terminal device, obtaining a key, and generating bootstrapping security parameters.
- The method authenticates the terminal device during a primary authentication session.
- If the authentication is successful, a first key is obtained.
- Bootstrapping security parameters are generated, which include a second key derived from the first key and a temporary identifier.
- The temporary identifier is used to identify the terminal device and the bootstrapping security parameters.
Potential Applications
- Wireless communication networks
- Terminal devices in wireless networks
- Network server authentication and key management
Problems Solved
- Ensuring secure authentication and key management for terminal devices in wireless networks
- Generating bootstrapping security parameters for secure communication
Benefits
- Enhanced security for terminal devices in wireless networks
- Efficient authentication and key management process
- Secure communication between network server and terminal devices
Original Abstract Submitted
A method performed by a network server is provided for authentication and key management for a terminal device in a wireless communication network. The method includes authenticating the terminal device during a primary authentication session for the terminal device. The method further includes responsive to a successful authentication of the terminal device, obtaining a first key. The method further includes generating bootstrapping security parameters. The parameters include a second key derived from the first key and a temporary identifier. The temporary identifier identifies the terminal device and the bootstrapping security parameters.