白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Secured authenticated communication between an initiator and a responder

專利號
US11997078B2
公開日期
2024-05-28
申請人
Telefonaktiebolaget LM Ericsson (publ)(SE Stockholm)
發(fā)明人
Vesa Lehtovirta; Mohit Sethi
IPC分類
H04L9/40
技術(shù)領(lǐng)域
responder,initiator,n3iwf,party,ue,ike_auth,eap,in,message,secure
地域: Stockholm

摘要

Secure, authenticated communication is enabled between an initiator (12) (e.g., a user equipment) and a responder (14) (e.g., an authentication server function, AUSF, or a subscription de-concealing function, SIDF). The initiator (12) transmits a message (20) to the responder (14) over a secure communication channel (16). The message (20) may include information indicating a third party (18) whose signing of data (e.g., bound to the secure communication channel (16)) will authenticate the responder (14) to the initiator (12). The responder (14) correspondingly retrieves from the third party (18) data that is signed by the third party (18) and transmits a response (24) to the initiator (12) that includes the retrieved data. The initiator (12) receives this response (24) and determines whether or not the responder (14) is authenticated by determining whether or not the response (24) includes data that is signed by the third party (18).

說明書

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of a communication system that includes an initiator and a responder according to some embodiments.

FIG. 2 is call flow diagram of a process for setting up an IPSec tunnel between a user equipment (UE) as an initiator and a non-3GPP interworking function (N3IWF) as a responder according to some embodiments.

FIG. 3 is call flow diagram of a process for setting up an IPSec tunnel between a user equipment (UE) as an initiator and a non-3GPP interworking function (N3IWF) as a responder according to other embodiments.

FIG. 4 is a logic flow diagram of a method performed by an initiator according to some embodiments.

FIG. 5 is a logic flow diagram of a method performed by a responder according to some embodiments.

FIG. 6 is a logic flow diagram of a method performed by third party equipment of a third party according to some embodiments.

FIG. 7A is a block diagram of an initiator according to some embodiments.

FIG. 7B is a block diagram of an initiator according to other embodiments.

FIG. 8A is a block diagram of a responder according to some embodiments.

FIG. 8B is a block diagram of a responder according to other embodiments.

權(quán)利要求

1
微信群二維碼
意見反饋