US 12,192,759 B2
Fifth generation (5G) authentication and key agreement user equipment authentication
Eugen Octavian Nicoara, Highlands Ranch, CO (US); and Nam Kim, Dunwoody, GA (US)
Assigned to Cisco Technology, Inc.
Filed by Cisco Technology, Inc., San Jose, CA (US)
Filed on Jul. 22, 2022, as Appl. No. 17/814,406.
Prior Publication US 2024/0031804 A1, Jan. 25, 2024
Int. Cl. H04W 12/06 (2021.01); H04W 12/0431 (2021.01)
CPC H04W 12/06 (2013.01) [H04W 12/0431 (2021.01)] 15 Claims
OG exemplary drawing
 
1. A method comprising:
executing an Authentication Server Function (AUSF) at an edge of a network;
requesting, by the AUSF, an Authentication Vector (AV) from a Unified Data Management (UDM);
receiving the AV from the UDM;
caching the AV at an AV cache;
receiving an authentication request from an Access and Mobility Management Function (AMF);
providing the AV from the AV cache to the AMF; and
determining the UDM is inaccessible, wherein providing the AV from the AV cache to the AMF is in response to determining the UDM is inaccessible.