US 12,335,728 B2
Non-public network authentication in 5G
Noamen Ben Henda, Vällingby (SE); Monica Wifvesson, Lund (SE); David Castellanos Zamora, Madrid (ES); Vesa Lehtovirta, Espoo (FI); and Peter Hedman, Helsingborg (SE)
Assigned to Telefonaktiebolaget LM Ericsson (publ), Stockholm (SE)
Appl. No. 17/432,835
Filed by TELEFONAKTIEBOLAGET LM ERICSSON (PUBL), Stockholm (SE)
PCT Filed Feb. 24, 2020, PCT No. PCT/EP2020/054749
§ 371(c)(1), (2) Date Aug. 20, 2021,
PCT Pub. No. WO2020/173863, PCT Pub. Date Sep. 3, 2020.
Claims priority of provisional application 62/811,494, filed on Feb. 27, 2019.
Prior Publication US 2022/0159460 A1, May 19, 2022
Int. Cl. H04W 12/069 (2021.01); H04W 12/041 (2021.01); H04W 12/084 (2021.01)
CPC H04W 12/069 (2021.01) [H04W 12/041 (2021.01); H04W 12/084 (2021.01)] 20 Claims
OG exemplary drawing
 
1. A method by a first core network node of a core network of a wireless communication system for authenticating a user equipment, UE, to the core network, comprising:
receiving a first authentication request to authenticate the UE to the core network;
transmitting an identifier associated with the UE to a second core network node in response to receiving the first authentication request;
receiving a message from the second core network node instructing the first core network node to transmit the authentication request to an external authentication entity;
determining that the UE should be authenticated by the external authentication entity that is external to the wireless communication system;
transmitting a second authentication request to the external authentication entity, the second authentication request identifying the UE;
receiving an authentication response from the external authentication entity verifying authenticity of the UE, the authentication response including a master key; and
deriving a first key for securing communications with the UE from the master key.