US 11,968,530 B2
Network authentication for user equipment access to an edge data network
Shu Guo, Beijing (CN); Dawei Zhang, Saratoga, CA (US); Fangli Xu, Beijing (CN); Haijing Hu, Los Gatos, CA (US); Huarui Liang, Beijing (CN); Mona Agnel, Guildford (GB); Ralf Rossbach, Munich (DE); Sudeep Manithara Vamanan, Nuremberg (DE); Xiangying Yang, Cupertino, CA (US); and Yuqin Chen, Beijing (CN)
Assigned to Apple Inc., Cupertino, CA (US)
Appl. No. 17/593,499
Filed by Apple Inc., Cupertino, CA (US)
PCT Filed Aug. 6, 2020, PCT No. PCT/CN2020/107571
§ 371(c)(1), (2) Date Sep. 20, 2021,
PCT Pub. No. WO2022/027517, PCT Pub. Date Feb. 10, 2022.
Prior Publication US 2022/0312206 A1, Sep. 29, 2022
Int. Cl. H04L 29/06 (2006.01); H04W 12/06 (2021.01); H04W 60/00 (2009.01)
CPC H04W 12/068 (2021.01) [H04W 60/00 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method, comprising:
at an authentication server function (AUSF):
generating a first credential based on a second credential, the second credential generated for a procedure between a user equipment (UE) and a cellular network corresponding to the AUSF;
receiving an identifier associated with the first credential from a network exposure function (NEF) in response to the UE transmitting an application registration request to a server associated with an edge data network;
retrieving the first credential based on the identifier;
receiving a multi-access edge computing (MEC) authorization parameter;
verifying the MEC authorization parameter; and
transmitting an authentication verification response to the NEF.