Faster authentication with parallel message processing
First Claim
1. In a communication system comprising at least one network, including network entities which provide connectivity to user equipment, a method of connecting the user equipment to the at least one network comprising:
- establishing a secure tunnel which provides connection between the user equipment and one of the network entities; and
authenticating the user equipment with another of the network entities, whereinthe authenticating of the user equipment with the another of the network entities occurs at least partially simultaneously with a phase of the establishing of the secure tunnel, wherein the phase is determined based on a protocol or authentication method,wherein establishing the secure tunnel begins before authenticating the user and wherein during a time between a beginning of establishing the secure tunnel with one of the network entities and a beginning of authenticating the user equipment with another of the network entities, the at least one network communicates with the user equipment to confirm that the request from the user equipment to establish a secure tunnel is not part of a denial of service attack, and whereincommunication during the time includes at least one of a request for an identification of the user equipment and a request for capability of the user equipment to support at least one data protocol.
4 Assignments
0 Petitions
Accused Products
Abstract
The invention is a method of connecting user equipment to at least one network, a communication system, and a user equipment. In a communication system comprising at least one network, including network entities which provide connectivity to user equipment, a method of connecting the user equipment to the at least one network in accordance with the invention includes establishing a secure tunnel which provides connection between the user equipment and one of the network entities; and authenticating the user equipment with another of the network entities; and wherein the authenticating of the user equipment with the another of the network entities occurs at least partially simultaneously with the establishing of the secure tunnel.
65 Citations
18 Claims
-
1. In a communication system comprising at least one network, including network entities which provide connectivity to user equipment, a method of connecting the user equipment to the at least one network comprising:
-
establishing a secure tunnel which provides connection between the user equipment and one of the network entities; and authenticating the user equipment with another of the network entities, wherein the authenticating of the user equipment with the another of the network entities occurs at least partially simultaneously with a phase of the establishing of the secure tunnel, wherein the phase is determined based on a protocol or authentication method, wherein establishing the secure tunnel begins before authenticating the user and wherein during a time between a beginning of establishing the secure tunnel with one of the network entities and a beginning of authenticating the user equipment with another of the network entities, the at least one network communicates with the user equipment to confirm that the request from the user equipment to establish a secure tunnel is not part of a denial of service attack, and wherein communication during the time includes at least one of a request for an identification of the user equipment and a request for capability of the user equipment to support at least one data protocol. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A communication system comprising at least one network including network entities which provide connectivity to user equipment and wherein:
-
a secure tunnel is established which provides connection between the user equipment and one of the network entities, the user equipment is authenticated with another of the network entities, and the authenticating of the user equipment with the another of the network entities occurs at least partially simultaneously with a phase of the establishing of the secure tunnel, wherein the phase is determined based on protocol or authentication method, wherein the establishing the secure tunnel begins before authenticating the user equipment with the network and wherein during a time between a beginning of establishing the secure tunnel with one of the network entities and a beginning of authenticating the user equipment with another of the network entities, the at least one network communicates with the user equipment to confirm that the request from the user equipment to establish a secure tunnel is not part of a denial of service attack, and wherein communication during the time includes at least one of a request for an identification of the user equipment and a request for capability of the user equipment to support at least one data protocol. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A user equipment in a communication system comprising at least one network, including network entities which provide connectivity to the user equipment and wherein:
-
a secure tunnel is established which provides connection between the user equipment and one of the network entities, the user equipment is authenticated with another of the network entities, and the authenticating of the user equipment with the another of the network entities occurs at least partially simultaneously with a phase of the establishing of the secure tunnel, wherein the phase is determined based on a protocol or authentication method, wherein the establishing the secure tunnel begins before the authenticating the user equipment with the network and wherein during a time between a beginning of establishing the secure tunnel with one of the network entities and a beginning of authenticating the user equipment with another of the network entities, the at least one network communicates with the user equipment to confirm that the request from the user equipment to establish a secure tunnel is not part of a denial of service attack, and wherein communication during the time includes at least one of a request for an identification of the user equipment and a request for capability of the user equipment to support at least one data protocol. - View Dependent Claims (15, 16, 17, 18)
-
Specification