Samsung electronics co., ltd. (20240163666). METHOD AND DEVICE FOR AUTHENTICATING NETWORK ACCESS REQUEST THROUGH TERMINAL-TO-TERMINAL CONNECTION IN MOBILE COMMUNICATION SYSTEM simplified abstract

From WikiPatents
Jump to navigation Jump to search

METHOD AND DEVICE FOR AUTHENTICATING NETWORK ACCESS REQUEST THROUGH TERMINAL-TO-TERMINAL CONNECTION IN MOBILE COMMUNICATION SYSTEM

Organization Name

samsung electronics co., ltd.

Inventor(s)

Jicheol Lee of Suwon-si (KR)

Jungje Son of Suwon-si (KR)

Duckey Lee of Suwon-si (KR)

METHOD AND DEVICE FOR AUTHENTICATING NETWORK ACCESS REQUEST THROUGH TERMINAL-TO-TERMINAL CONNECTION IN MOBILE COMMUNICATION SYSTEM - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240163666 titled 'METHOD AND DEVICE FOR AUTHENTICATING NETWORK ACCESS REQUEST THROUGH TERMINAL-TO-TERMINAL CONNECTION IN MOBILE COMMUNICATION SYSTEM

Simplified Explanation

The present disclosure describes a method performed by an Access and Mobility Management Function (AMF) in a wireless communication system to support a higher data transmission rate, specifically for UE-network relay communication.

  • Receiving a relay key request message from a relay User Equipment (UE) including an identifier of a remote UE.
  • Identifying if the relay UE is authorized to provide a UE-network relay service.
  • Identifying an Authentication Server Function (AUSF) related to the remote UE based on its identifier.
  • Transmitting an authentication request message to the AUSF including the identifier of the remote UE.
  • Acquiring a Proximity-based Services (ProSe) session encryption key established between the remote UE and the relay UE upon successful authentication.
  • Transmitting the ProSe session encryption key to the relay UE.

Potential Applications

This technology can be applied in various industries such as telecommunications, IoT, smart cities, and autonomous vehicles.

Problems Solved

This technology solves the problem of securely establishing communication between relay UEs and remote UEs in a wireless communication system.

Benefits

The benefits of this technology include enhanced data transmission rates, improved security for relay communication, and efficient management of access and mobility functions.

Potential Commercial Applications

Potential commercial applications of this technology include 5G and 6G networks, IoT devices, smart infrastructure, and connected vehicles.

Possible Prior Art

One possible prior art could be the use of encryption keys in wireless communication systems to establish secure communication channels between devices.

Unanswered Questions

How does this technology impact network latency in wireless communication systems?

This article does not address the specific impact of this technology on network latency in wireless communication systems.

What are the potential challenges in implementing this method in existing communication networks?

The article does not discuss the potential challenges that may arise in implementing this method in current communication networks.


Original Abstract Submitted

the present disclosure relates to a 5g or 6g communication system for supporting a higher data transmission rate. a method performed by an access and mobility management function (amf) in a wireless communication system according to an embodiment of the present disclosure comprises: receiving, from a relay user equipment (ue) for a ue-network relay communication, a relay key request message including an identifier of a remote ue for the ue-network relay communication; identifying whether the relay ue is authorized to provide a ue-network relay service; identifying an authentication server function (ausf) related to the remote ue, based on the identifier of the remote ue; transmitting, to the ausf, an authentication request message including the identifier of the remote ue; in case that an authentication procedure for the remote ue based on the identifier of the remote ue is successfully performed, acquiring a proximity-based services (prose) session encryption key established between the remote ue and the relay ue; and transmitting, to the relay ue, the prose session encryption key.