http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-11039312-B2
Outgoing Links
Predicate | Object |
---|---|
assignee | http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_26e69ef7b7bc98bfe778e419ccd664c9 |
classificationCPCInventive | http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04W12-106 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04W12-0431 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04W12-06 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04W12-0433 |
classificationIPCInventive | http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04M1-66 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04W12-106 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04W12-06 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04W12-0431 |
filingDate | 2021-01-20-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
grantDate | 2021-06-15-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
inventor | http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_903781e035a2de57072cbddb85394ea1 http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_c65fa97068b6c9c5ac73ebe7d2623f44 http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_49670e96b2dc6eb5f0ab01fdbf19a390 http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_c266c52fef7f4fcf8e23a03557b01475 |
publicationDate | 2021-06-15-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber | US-11039312-B2 |
titleOfInvention | Handling of multiple authentication procedures in 5G |
abstract | A method by an AUSF of a home PLMN configured to communicate through an interface with electronic devices is provided. A first authentication request is received from a first PLMN that is authenticating an electronic device. A first security key used for integrity protection of messages delivered from the home PLMN to the electronic device is obtained. A second authentication request is received from a second PLMN that is authenticating the electronic device. A second security key used for integrity protection of the messages delivered from the home PLMN to the electronic device is obtained. A message protection request is received. Which of the first security key and the second security key is a latest security key is determined. The latest security key is used to protect a message associated with the message protection request. |
isCitedBy | http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-2023136693-A1 |
priorityDate | 2019-04-29-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
type | http://data.epo.org/linked-data/def/patent/Publication |
Incoming Links
Total number of triples: 26.