18647527. HOME TRIGGERED PRIMARY AUTHENTICATION FOR INTER-WORKING NETWORKS simplified abstract (ZTE CORPORATION)

From WikiPatents
Jump to navigation Jump to search

HOME TRIGGERED PRIMARY AUTHENTICATION FOR INTER-WORKING NETWORKS

Organization Name

ZTE CORPORATION

Inventor(s)

Zhen Xing of Shenzhen (CN)

Shilin You of Shenzhen (CN)

Yuze Liu of Shenzhen (CN)

Zhaoji Lin of Shenzhen (CN)

HOME TRIGGERED PRIMARY AUTHENTICATION FOR INTER-WORKING NETWORKS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18647527 titled 'HOME TRIGGERED PRIMARY AUTHENTICATION FOR INTER-WORKING NETWORKS

Simplified Explanation: The patent application describes a method for deriving an authentication key for a home network to enable interworking between different network types, such as from Evolved Packet System (EPS) to 5GS. This process ensures seamless authentication even when security contexts and authentication methods differ between network types.

  • Primary authentication procedure triggered for deriving an authentication key for a home network
  • Authentication key used for interworking between different network types
  • Ensures compatibility and seamless authentication when user equipment moves between network types
  • Addresses potential issues like missing authentication keys and varying authentication processes
  • Supports reauthentication process when necessary

Key Features and Innovation: - Triggering primary authentication for deriving authentication key - Facilitating interworking between different network types - Seamless authentication for user equipment moving between networks - Addressing compatibility issues with authentication keys - Supporting reauthentication process when needed

Potential Applications: This technology can be applied in various networking environments where seamless authentication and interworking between different network types are required. It can be beneficial in mobile networks, IoT devices, and other wireless communication systems.

Problems Solved: - Incompatibility between security contexts and authentication methods in different network types - Missing authentication keys when transitioning between networks - Varying registration and authentication processes based on authentication key support

Benefits: - Enhanced security and authentication in home networks - Seamless interworking between different network types - Improved user experience when moving between networks - Efficient reauthentication process when needed

Commercial Applications: Title: Seamless Authentication Technology for Interworking Networks This technology can be utilized by telecommunications companies, IoT device manufacturers, and network operators to ensure secure and seamless authentication for users moving between different network types. It can improve network efficiency and user experience, leading to increased customer satisfaction and loyalty.

Prior Art: Readers interested in exploring prior art related to this technology can start by researching authentication methods in mobile networks, interworking protocols, and security contexts in wireless communication systems.

Frequently Updated Research: Researchers in the field of network security and authentication protocols may have ongoing studies related to seamless authentication methods for interworking between different network types. Stay updated on the latest advancements in this area for potential insights and developments.

Questions about Seamless Authentication Technology for Interworking Networks: 1. How does this technology ensure compatibility between different network types during authentication processes? 2. What are the potential challenges in implementing seamless authentication for user equipment moving between networks?


Original Abstract Submitted

A primary authentication procedure is triggered to derive an authentication key for a home network. The authentication key may be used for interworking between network types. For example, a home network primary authentication mechanism may be triggered for interworking from Evolved Packet System (EPS) to 5GS. When a user equipment (UE) moves between network types, the security context and authentication may be different or incompatible. For example, an authentication key may be missing, which may be needed for authentication in one of the network types. Authentication key support may be determined and registration/authentication may vary based on that support. When there is no support for the authentication key, a reauthentication process may be performed.