Telefonaktiebolaget LM Ericsson (publ)
HANDLING OF MULTIPLE AUTHENTICATION PROCEDURES IN 5G
Last updated:
Abstract:
A method by an AUSF of a home PLMN configured to communicate through an interface with electronic devices is provided. A first authentication request is received from a first PLMN that is authenticating an electronic device. A first security key used for integrity protection of messages delivered from the home PLMN to the electronic device is obtained. A second authentication request is received from a second PLMN that is authenticating the electronic device. A second security key used for integrity protection of the messages delivered from the home PLMN to the electronic device is obtained. A message protection request is received. Which of the first security key and the second security key is a latest security key is determined. The latest security key is used to protect a message associated with the message protection request.
Utility
20 Jan 2021
13 May 2021