Access through non-3GPP access networks
First Claim
Patent Images
1. A method performed by a user equipment for communication through an access network, the method comprising:
- receiving an Extensible Authentication Protocol Authentication and Key Agreement Prime (EAP AKA′
) message, from an authentication server related to the user equipment, in an authentication procedure being part of setting up a connection from the user equipment through the access network; and
setting up an IP Security tunnel between the user equipment and an evolved Packet Data Gateway responsive to the EAP AKA′
message indicating that the access network is untrusted.
2 Assignments
0 Petitions
Accused Products
Abstract
A user equipment receives an Extensible Authentication Protocol Authentication and Key Agreement Prime (EAP AKA′) message, from an authentication server related to the user equipment, in an authentication procedure being part of setting up a connection from the user equipment through an access network. The user equipment sets up an IP Security tunnel between the user equipment and an evolved Packet Data Gateway responsive to the EAP AKA′ message indicating that the access network is untrusted.
-
Citations
12 Claims
-
1. A method performed by a user equipment for communication through an access network, the method comprising:
-
receiving an Extensible Authentication Protocol Authentication and Key Agreement Prime (EAP AKA′
) message, from an authentication server related to the user equipment, in an authentication procedure being part of setting up a connection from the user equipment through the access network; andsetting up an IP Security tunnel between the user equipment and an evolved Packet Data Gateway responsive to the EAP AKA′
message indicating that the access network is untrusted. - View Dependent Claims (2, 3, 4)
-
-
5. A user equipment for communication through an access network, the user equipment comprising:
one or more processing circuits configured to; receive an Extensible Authentication Protocol Authentication and Key Agreement Prime (EAP AKA′
) message, from an authentication server related to the user equipment, in an authentication procedure being part of setting up a connection from the user equipment through the access network; andset up an IP Security tunnel between the user equipment and an evolved Packet Data Gateway responsive to the EAP AKA′
message indicating that the access network is untrusted.- View Dependent Claims (6, 7, 8)
-
9. An authentication server related to a user equipment, the authentication server comprising:
one or more processing circuits configured to; participate in an authentication procedure that establishes connectivity from the user equipment through an access network; generate an Extensible Authentication Protocol Authentication and Key Agreement Prime (EAP AKA′
) message indicating whether or not the access network is trusted;send the EAP AKA′
message to the user equipment, as part of the authentication procedure, before the user equipment has established a connection through the access network.- View Dependent Claims (10, 11, 12)
Specification