Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication and secure channel setup for communication handoff scenarios

A communication layer and continuous communication technology, applied in the direction of security devices, wireless communication, electrical components, etc., can solve problems such as seamless switching difficulties

Inactive Publication Date: 2013-11-13
INTERDIGITAL PATENT HLDG INC
View PDF12 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This makes it difficult to achieve seamless switching

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication and secure channel setup for communication handoff scenarios
  • Authentication and secure channel setup for communication handoff scenarios
  • Authentication and secure channel setup for communication handoff scenarios

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0098] According to one embodiment, if application-layer security is to be re-established after a handover (e.g., an access-layer handover), binding the security credentials used for such subsequent application-layer authentication to the Forward bootstrapping of security credentials such as those used in handover access layer authentication, certificates used in previous application layer authentication, or even pre-handover access layer authentication.

[0099] In the embodiments described herein, independent identity providers may be used. For example, MNO A 323 may not be an OpenID identity provider and / or identity management functions may be performed by another third party. A third-party identity provider may use a pre-established relationship with the MNO A 323 to act in the role of an OpenID Provider, and use a protocol such as OpenID / EAP-SIM or OpenID / GBA bootstrapping capabilities to provide access stratum credentials 330 from the MNO A 323 Authenticate and Bootstra...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Persistent communication layer credentials generated on a persistent communication layer at one network may be leveraged to perform authentication on another. For example, the persistent communication layer credentials may include application-layer credentials derived on an application layer. The application-layer credentials may be used to establish authentication credentials for authenticating a mobile device for access to services at a network server. The authentication credentials may be derived from the application-layer credentials of another network to enable a seamless handoff from one network to another. The authentication credentials may be derived from the application-layer credentials using reverse bootstrapping or other key derivation functions. The mobile device and / or network entity to which the mobile device is being authenticated may enable communication of authentication information between the communication layers to enable authentication of a device using multiple communication layers.

Description

[0001] Cross References to Related Applications [0002] This application claims the benefit of US Provisional Patent Application No. 61 / 428,663, filed December 30, 2010, which is hereby incorporated by reference in its entirety. Background technique [0003] Users can generally continue to use services while roaming between networks. Handover may be performed, for example at the access layer, when a user moves from a location served by a current network to a location served by a target network. When performing a handover, the user may need to be authenticated to the target network that is serving the location into which the user is moving. Authentication at the access layer can occur at each handover, and the user device can use pre-provisioned credentials to access the target network at the access layer. [0004] A user's communication device may communicate using a layered communication mechanism. In many cases, the different communication layers each require their own s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04W36/00
CPCH04L63/0892H04L63/0209H04W36/0038H04L63/0815H04W12/06H04L63/18H04W12/04H04W12/0431H04L63/08H04L63/10H04W12/08
Inventor Y·C·沙阿I·查A·施米特L·J·古乔内L·凯斯A·莱切尔Y·塔加利
Owner INTERDIGITAL PATENT HLDG INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products