Zte corporation (20240284173). HOME TRIGGERED PRIMARY AUTHENTICATION FOR INTER-WORKING NETWORKS simplified abstract

From WikiPatents
Jump to navigation Jump to search

HOME TRIGGERED PRIMARY AUTHENTICATION FOR INTER-WORKING NETWORKS

Organization Name

zte corporation

Inventor(s)

Zhen Xing of Shenzhen (CN)

Shilin You of Shenzhen (CN)

Yuze Liu of Shenzhen (CN)

Zhaoji Lin of Shenzhen (CN)

HOME TRIGGERED PRIMARY AUTHENTICATION FOR INTER-WORKING NETWORKS - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240284173 titled 'HOME TRIGGERED PRIMARY AUTHENTICATION FOR INTER-WORKING NETWORKS

Simplified Explanation

The patent application describes a method for deriving an authentication key for a home network to enable interworking between different network types, such as from EPS to 5G. This process ensures seamless authentication even when security contexts and authentication methods differ between networks.

  • The primary authentication procedure triggers the derivation of an authentication key for a home network.
  • The authentication key allows for interworking between different network types, such as EPS and 5G.
  • It addresses issues where security contexts and authentication methods may be incompatible when a UE moves between networks.
  • The system determines authentication key support and adjusts registration/authentication processes accordingly.
  • If there is no support for the authentication key, a reauthentication process is initiated.

Key Features and Innovation

  • Seamless authentication key derivation for interworking between different network types.
  • Dynamic adjustment of registration/authentication processes based on authentication key support.
  • Ensures compatibility and security when a UE moves between networks.

Potential Applications

This technology can be applied in various industries where seamless authentication between different network types is required, such as telecommunications, IoT, and smart home systems.

Problems Solved

  • Addressing compatibility issues between security contexts and authentication methods in different network types.
  • Ensuring secure and seamless authentication for users moving between networks.

Benefits

  • Enhanced security for home networks.
  • Seamless interworking between different network types.
  • Improved user experience when transitioning between networks.

Commercial Applications

Title: Seamless Authentication Key Derivation for Interworking Networks This technology can be commercialized by telecommunications companies, IoT device manufacturers, and smart home system providers to offer secure and seamless authentication for users moving between different network types. It can enhance the overall user experience and security of home networks.

Questions about Seamless Authentication Key Derivation for Interworking Networks

How does the authentication key support vary based on network types?

The authentication key support is determined by the system, and registration/authentication processes are adjusted accordingly. If there is no support for the authentication key in a specific network type, a reauthentication process is initiated.

What are the potential implications of this technology on IoT devices?

This technology can improve the security and seamless connectivity of IoT devices, ensuring a smooth transition between different network types without compromising authentication processes.


Original Abstract Submitted

a primary authentication procedure is triggered to derive an authentication key for a home network. the authentication key may be used for interworking between network types. for example, a home network primary authentication mechanism may be triggered for interworking from evolved packet system (eps) to 5gs. when a user equipment (ue) moves between network types, the security context and authentication may be different or incompatible. for example, an authentication key may be missing, which may be needed for authentication in one of the network types. authentication key support may be determined and registration/authentication may vary based on that support. when there is no support for the authentication key, a reauthentication process may be performed.