18546809. User Equipment Authentication and Authorization Procedure for Edge Data Network simplified abstract (Apple Inc.)
Contents
- 1 User Equipment Authentication and Authorization Procedure for Edge Data Network
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 User Equipment Authentication and Authorization Procedure for Edge Data Network - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Key Features and Innovation
- 1.6 Potential Applications
- 1.7 Problems Solved
- 1.8 Benefits
- 1.9 Commercial Applications
- 1.10 Prior Art
- 1.11 Frequently Updated Research
- 1.12 Questions about Edge Data Network Access
- 1.13 Original Abstract Submitted
User Equipment Authentication and Authorization Procedure for Edge Data Network
Organization Name
Inventor(s)
Dawei Zhang of Saratoga CA (US)
Haijing Hu of Los Gatos CA (US)
Sudeep Manithara Vamanan of Uttenreuth (DE)
User Equipment Authentication and Authorization Procedure for Edge Data Network - A simplified explanation of the abstract
This abstract first appeared for US patent application 18546809 titled 'User Equipment Authentication and Authorization Procedure for Edge Data Network
Simplified Explanation
A user equipment (UE) generates credentials to access an edge data network, including generating an identifier and a message authentication code. The UE then sends an application registration request to a server associated with the network and receives an authentication response.
Key Features and Innovation
- UE generates credentials based on a second credential for network access.
- UE creates an identifier and message authentication code for security.
- Application registration request includes credentials and network identifier.
- Authentication response from the server determines access to the network.
Potential Applications
This technology can be applied in various industries such as telecommunications, IoT, and edge computing for secure network access and authentication processes.
Problems Solved
This technology addresses the need for secure and efficient authentication procedures for user equipment accessing edge data networks.
Benefits
- Enhanced security for user equipment accessing edge data networks.
- Streamlined authentication processes for network access.
- Improved user experience with secure connections.
Commercial Applications
- Telecommunications companies can use this technology to enhance network security.
- IoT devices can benefit from secure access to edge data networks.
- Edge computing providers can improve authentication processes for their clients.
Prior Art
Information on prior art related to this technology is not available at this time.
Frequently Updated Research
There is ongoing research in the field of network security and authentication protocols that may impact the development and implementation of this technology.
Questions about Edge Data Network Access
Question 1
How does the UE generate credentials for accessing the edge data network?
The UE generates credentials based on a second credential and creates an identifier and message authentication code for secure access.
Question 2
What is the role of the server associated with the edge data network in the authentication process?
The server receives the application registration request from the UE, validates the credentials, and sends an authentication response determining access to the network.
Original Abstract Submitted
A user equipment (UE) may attempt to access an edge data network. The UE generates a first credential based on a second credential that was generated for a procedure between the UE and a network. The UE then generates an identifier corresponding to the first credential and generates a message authentication code based on the first credential and a count, wherein the count is associated with an identifier of an edge network client running on the UE. The UE then transmits an application registration request, message to a server associated with an edge data network, the application registration request message including the count, the message authentication code, the identifier corresponding to the first credential, and a public land mobile network identifier (PLMN ID) of the network. The UE then receives an authentication accept message or an authentication reject message from the server associated with the edge data network.
- Apple Inc.
- Shu Guo of Beijing (CN)
- Dawei Zhang of Saratoga CA (US)
- Haijing Hu of Los Gatos CA (US)
- Hao Duo of Beijing (CN)
- Huarui Liang of Beijing (CN)
- Lanpeng Chen of Beijing (CN)
- Mona Agnel of Guildford (GB)
- Ralf Rossbach of Munich (DE)
- Sudeep Manithara Vamanan of Uttenreuth (DE)
- Xiaoyu Qiao of Beijing (CN)
- H04W12/069
- H04L9/32
- H04W12/106
- H04W12/71
- H04W12/72
- CPC H04W12/069