Generating keys for protection in next generation mobile networks
First Claim
Patent Images
1. A method comprising:
- producing a set of associated keys for an authentication process to be performed in a second network based on a random value used in an authentication process of a first network.
2 Assignments
0 Petitions
Accused Products
Abstract
A set of associated keys for an authentication process to be performed in a second network is calculated based on a random value used in an authentication process of a first network.
-
Citations
19 Claims
-
1. A method comprising:
producing a set of associated keys for an authentication process to be performed in a second network based on a random value used in an authentication process of a first network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
9. A network device comprising:
-
a receiving unit configured to receive a random value used in an authentication process of a first network; and a calculating unit configured to calculate a set of associated keys for an authentication process to be performed in a second network based on the random value. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A network device comprising:
a transmitting unit configured to transmit a random value used in an authentication process of a first network to a network device of a second network during a handover process of a user equipment from the first network to the second network. - View Dependent Claims (15)
-
16. A user equipment comprising:
-
a receiving unit configured to receive identities of network entities of a second network, the network entities being associated through an authentication process to be performed in the second network; and a calculating unit configured to calculate a set of associated keys for the authentication process to be performed in the second network using the identities of the network entities.
-
-
17. A network device comprising:
-
a receiving unit configured to receive keys of an authentication process of a first network; a calculating unit configured to calculate modified keys based on the keys; and a transmitting unit configured to transmit the modified keys to a network element of a second network in which an authentication process is to be performed. - View Dependent Claims (18, 19)
-
Specification