Authentication Interworking
First Claim
Patent Images
1. A method, comprising:
- receiving, from a communication device, a request for services from a core network, the communication device foreign to the core network; and
providing authentication internetworking to the foreign device to enable access to services provided by the core network.
16 Assignments
0 Petitions
Accused Products
Abstract
The present disclosure includes a method and system for authentication interworking. In some embodiments, a method includes receiving, from a communication device, a request for services from a core network. The communication device is foreign to the core network. Authentication internetworking is provided to the foreign device to enable access to services provided by the core network.
119 Citations
28 Claims
-
1. A method, comprising:
-
receiving, from a communication device, a request for services from a core network, the communication device foreign to the core network; and providing authentication internetworking to the foreign device to enable access to services provided by the core network. - View Dependent Claims (2, 3)
-
-
4. A method, comprising:
-
receiving, from a first device, a request for services from a core network, the communication device foreign to the core network; identifying information for authenticating a second device with the core network, the second device configured to receive services from the core network; and representing the first device as the second device to the core network for authenticating the first device with the core network. - View Dependent Claims (5, 6, 7)
-
-
8. A method, comprising:
-
receiving a message to authenticate a first network device associated with a first communication technology, the authentication message from a second network device associated with a second communication technology, the first communication technology different from the second communication technology; automatically identifying information for authenticating the first network device, the authentication information associated with a third network device, the third network device associated with the second communication technology; and automatically transmitting the authentication information to the second network device associated with the second communication technology for authenticating the first network device associated with the first communication technology. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system, comprising:
-
a receiver configured to receive, from a communication device, a request for services from a core network, the communication device foreign to the core network; and an authentication element configured to provide authentication internetworking to the foreign device to enable access to services provided by the core network. - View Dependent Claims (16, 17)
-
-
18. A system, comprising:
-
a receiver configured to receiving, from a first device, a request for services from a core network, the communication device foreign to the core network; and an authentication element configured to; identify information for authenticating a second device with the core network, the second device configured to receive services from the core network; and represent the first device as the second device to the core network for authenticating the first device with the core network. - View Dependent Claims (19, 20, 21)
-
-
22. A system, comprising:
-
a receiver configured to receive a message to authenticate a first network device associated with a first communication technology, the authentication message from a second network device associated with a second communication technology, the first communication technology different from the second communication technology; an authentication element configured to automatically identify information for authenticating the first network device, the authentication information associated with a third network device, the third network device associated with the second communication technology; and a transmitter configured to automatically transmit the authentication information to the second network device associated with the second communication technology for authenticating the first network device associated with the first communication technology. - View Dependent Claims (23, 24, 25, 26, 27, 28)
-
Specification