A method embodiment for network authentication includes selecting, by a user equipment (UE), an access network for establishing a network connection and receiving one or more network authentication status indications for a network associated with the access network. The method further includes implementing a network authentication and selection policy in accordance with the one or more network authentication status indications.
|
1. A method for network authentication and selection comprising:
determining, by a network device, an authentication status of a network associated with the network device; and
transmitting, by the network device to a user equipment (UE), one or more network authentication status indications in accordance with the authentication status of the network, the one or more network authentication status indications providing information for the UE to determine whether to continue an authentication process with the network, and one of the network authentication status indications being an access network query protocol (ANQP) information element comprising a payload field indicating overload information about the network.
5. A network device comprising:
a non-transitory memory storage comprising instructions; and
one or more processors in communication with the non-transitory memory storage, wherein the one or more processors execute the instructions to:
determine an authentication status of a network associated with the network device; and
transmit, to a user equipment (UE), one or more network authentication status indications in accordance with the authentication status of the network, wherein the one or more network authentication status indications provide information for the UE to determine whether to continue an authentication process with the network, and wherein one of the network authentication status indications is an access network query protocol (ANQP) information element comprising a payload field indicating overload information about the network.
9. A method for network authentication and selection comprising:
selecting, by a user equipment (UE), an access network for establishing a network connection;
receiving, by the UE, one or more network authentication status indications for a first network associated with the access network, one of the network authentication status indications being an access network query protocol (ANQP) information element comprising a payload field indicating overload information about the first network; and
implementing, by the UE, a network authentication and selection policy in accordance with the one or more network authentication status indications, the implementing comprising:
deciding, by the UE, whether to continue an authentication process with the access network in accordance with the one or more network authentication status indications; and
implementing, by the UE, an authentication retry policy in response to the UE deciding not to continue the authentication process with the access network.
0. 17. A method for network authentication and selection comprising:
selecting, by a user equipment (UE), a first network for establishing a network connection;
initiating, by the UE, an authentication process with a second network using the selected first network;
receiving, by the UE, in response to the initiating the authentication process, a message comprising one or more network authentication status indications for the second network, one of the network authentication status indications comprising a payload field indicating overload information about the second network; and
implementing, by the UE, a network authentication retry policy in accordance with the one or more network authentication status indications, the implementing comprising:
deciding, by the UE, to retry an authentication process with the first network in accordance with the one or more network authentication status indications and the authentication retry policy; and
implementing, by the UE, the authentication retry policy in response to the UE deciding to retry the authentication process with the first network.
13. A user equipment (UE) comprising:
a non-transitory memory storage comprising instructions; and
one or more processors in communication with the non-transitory memory storage, wherein the one or more processors execute the instructions to:
select an access network for establishing a network connection;
receive one or more network authentication status indications for a first network associated with the access network, wherein one of the network authentication status indications is an access network query protocol (ANQP) information element comprising a payload field indicating overload information about the first network; and
implement a network authentication and selection policy in accordance with the one or more network authentication status indications, wherein the one or more processors executing the instructions to implement the network authentication and selection policy comprises the one or more processors executing the instructions to:
decide whether to continue an authentication process with the access network in accordance with the one or more network authentication status indications; and
implement an authentication retry policy in response to the UE deciding not to continue the authentication process with the access network.
0. 24. A user equipment (UE) comprising:
a non-transitory memory storage comprising instructions; and
one or more processors in communication with the non-transitory memory storage, wherein the one or more processors execute the instructions to:
select a first network for establishing a network connection;
initiate an authentication process with a second network using the selected first network;
receive, in response to the initiating the authentication process, a message comprising one or more network authentication status indications for the second network, one of the network authentication status indications comprising a payload field indicating overload information about the second network; and
implement a network authentication retry policy in accordance with the one or more network authentication status indications, wherein the one or more processors executing the instructions to implement the network authentication retry policy comprises the one or more processors executing the instructions to:
decide to retry an authentication process with the first network in accordance with the one or more network authentication status indications and the authentication retry policy; and
implement the authentication retry policy in response to the UE deciding to retry the authentication process with the first network.
2. The method of
4. The method of
6. The network device of
7. The network device of
8. The network device of
10. The method of
11. The method of
12. The method of
14. The UE of
15. The UE of
16. The UE of
0. 18. The method of claim 17, wherein the network authentication retry policy is received from the network.
0. 19. The method of claim 17, wherein the network authentication retry policy is pre-configured on the UE.
0. 20. The method of claim 17, wherein implementing, by the UE, the authentication retry policy comprises implementing a retry timer.
0. 21. The method of claim 20, wherein the retry timer has a duration established in accordance with the network authentication status indication.
0. 22. The method of claim 17, wherein the second network is a home network of the UE.
0. 23. The method of claim 17, wherein the second network is a network having a roaming relationship with the UE.
0. 25. The method of claim 24, wherein the one more processors execute the instruction further to receive the network authentication retry policy from the network.
0. 26. The method of claim 24, wherein the network authentication retry policy is pre-configured on the UE.
0. 27. The method of claim 24, wherein the one or more processors executing the instructions to implement the network authentication retry policy comprises the one or more processors executing the instructions to implement a retry timer.
0. 28. The method of claim 27, wherein the retry timer has a duration established in accordance with the network authentication status indication.
0. 29. The method of claim 24, wherein the second network is a home network of the UE.
0. 30. The method of claim 24, wherein the second network is a network having a roaming relationship with the UE.
|
This application is a Reissue Application of patent application Ser. No. 15/953,178, filed Apr. 13, 2018, now issued as U.S. Pat. No. 10,674,433, which is a continuation of U.S. patent application Ser. No. 15/211,361, filed on Jul. 15, 2016, entitled “System and Method for WiFi Authentication and Selection,” which is a continuation of U.S. patent application Ser. No. 14/203,252, filed on Mar. 10, 2014, entitled “System and Method for WiFi Authentication and Selection” (now U.S. Pat. No. 9,432,910, issued Aug. 30, 2016), which claims the benefit of U.S. Provisional Application No. 61/776,521, filed on Mar. 11, 2013, entitled “System and Method for WiFi Authentication,” all of which applications are hereby incorporated herein by reference.
The present invention relates generally to a system and method for wireless communications, and, in particular embodiments, to a system and method for WiFi authentication and selection.
Cellular operators are motivated to integrate WiFi access into their existing cellular networks to help meet market demand and increase their competitive edge. Many mobile devices have dual mode (WiFi and cellular) capability. The WiFi Alliance is currently defining a Hotspot 2.0 specification to help dual mode or WiFi-only devices better select a compatible WiFi network that is owned by, subscribed to, or has roaming relationship with the device's cellular operator. This network selection technology may be based on IEEE 802.11u. The Third Generation Partnership Project (3GPP) also defines several mechanisms for a mobile device to select a wireless local area network (WLAN) (e.g., in fixed network) via operator-defined policies that may be statically pre-configured on the UE or dynamically set via an Access Network Discovery and Selection Function (ANDSF) within the network.
To connect to WiFi and cellular networks, devices generally use authentication procedures (e.g., based on a subscriber identity module (SIM) card), which may be carried out seamlessly with little to no input required from the end-user. When devices switch between a WiFi and cellular network or between different WiFi networks, access attempts may lead to a large amount of signalling traffic, for example, during authentication storms. During authentication storms, many authentication requests are sent to the network by multiple devices near one location. The influx of authentication requests may overload affected access networks (ANs) and authentication servers. Authentication storms may be caused by numerous issues with current authentication procedures. For example, authentication procedures are carried out by a device each time it moves to a new AN. Devices that do not have Wi-Fi in its subscription plan may still attempt to authenticate. Authentication storms may also be caused by rapid movement of many devices between different ANs in a short period of time.
There are various proposed solutions to address the issue of authentication storms, and these include solutions on both the network side and the device side. For solutions on the device side, a user equipment (UE) needs to be aware of the overload situation in the authentication server so that the UE may respond accordingly. However, current UEs lack a mechanism to know of an overload before the UE starts an authenticate procedure with the overloaded server, at which time it may be too late for the UE to respond accordingly. Furthermore, when the authentication server is overloaded, it may better for the network to control or influence UE behaviour to avoid worsening the situation. However, current networks lack a mechanism for controlling or influencing UE authentication behaviour.
These and other problems are generally solved or circumvented, and technical advantages are generally achieved, by preferred embodiments of the present invention which provides a system and method for WiFi authentication.
In accordance with an embodiment, a method for network authentication includes selecting by a user equipment (UE), an access network for establishing a network connection and receiving one or more network authentication status indications for a network associated with the access network. The method further includes implementing a network authentication and selection policy in accordance with the one or more network authentication status indications in accordance with the one or more network authentication status indications.
In accordance with another embodiment, a network device includes a processor and a computer readable storage medium storing programming for execution by the processor. The programming including instructions to select an access network for establishing a network connection and receive one or more network authentication status indications for a network associated with the access network. The programming includes further instructions to implement a network authentication and selection policy in accordance with the one or more network authentication status indications.
In accordance with another embodiment, a method includes determining, by a network device, an authentication status of a network associated with the network device. The method further includes transmitting, to a user equipment (UE), one or more network authentication status indications in accordance with the authentication status of the network.
In accordance with yet another embodiment, a network device includes a processor and a computer readable storage medium storing programming for execution by the processor. The programming including instructions to determine an authentication status of a network associated with the network device. The programming includes further instructions to transmit, to a user equipment (UE), one or more network authentication status indications in accordance with the authentication status of the network.
For a more complete understanding of the present invention, and the advantages thereof, reference is now made to the following descriptions taken in conjunction with the accompanying drawings, in which:
The making and using of the presently preferred embodiments are discussed in detail below. It should be appreciated, however, that the present invention provides many applicable inventive concepts that can be embodied in a wide variety of specific contexts. The specific embodiments discussed are merely illustrative of specific ways to make and use the invention, and do not limit the scope of the invention.
An embodiment provides signaling storm recovery for WiFi authentication processes with an integrated evolved packet core (EPC) network. An embodiment provides IEEE 802.11 Access Network Query Protocol (ANQP)-based authentication signaling storm prevention mechanisms, which may include providing network authentication status indications to a user equipment (UE). For example, in some embodiments, when a UE attempts to connect to a particular wireless local area network (WLAN), an access network (AN) indicates whether the authentication, authorization, and accounting (AAA) server is overload in the WLAN domain. If so, the UE implements an authentication retry policy (e.g., as set by the network) or selects another network rather than attempting to connect to the overloaded domain. The authentication retry policy may include implementing a retry timer or selecting another AN belonging to another operator to connect to after a maximum number of authentication attempts. In other embodiments, an AN may transmit an indication for whether authentication by a new user is permitted. If new user authentication is not currently permitted, the UE may implement an authentication retry policy or select another network. These indications may be transmitted by the AN using IEEE 802.11 ANQP. Other embodiments may also use a server's Access Network Discovery and Selection Function (ANDSF) policy to transmit the network authentication status indications and/or to configure authentication retry policies on UEs.
UE 102 may be any of the devices illustrated in
The overload indication may be transmitted using any suitable format. In some embodiments, the overload indication is transmitted as an independent ANQP information element. For example,
Payload field 314 is a variable length field containing information specific to the information element and may be used to indicate AAA server 108 (or another authentication server) is overloaded. The value of Payload field 314 may also be an overload percentage, other relative quantity measure (e.g., an index), or other relevant information. The implemented network authentication and selection policy may vary depending on the values of payload field 314. Different overload percentages (or other relative overload conditions) may trigger different network authentication and selection policies/authentication retry policies. For example, a UE retry timer maybe shorter for slightly overloaded servers compared to very overloaded servers. In other embodiments, the overload indication may be transmitted using a different information element format, which may include more or less fields than fields 302 through 314 as illustrated in
In other embodiments, the overload indication may be added as an additional field in an existing ANQP network authentication type information element, 3GPP cellular network information element, another information element associated with the device's home network, or the like. For example, the overload indication may be included in a field added to a wide area network (WAN) metric information element, a network access indicator (NAI) home realm query information element, or another suitable information element.
The network authentication and selection policy may include UE 102 deciding to continue authentication with AN 104, implement an authentication retry policy, select another network, and the like. For example, if the received authentication permission indication indicates new user authentication attempts are not currently allowed, UE 102 may decide not to continue the authentication process. Accordingly, UE 102 may implement an authentication retry policy. For example, the UE may wait for a retry timer to expire before another authentication attempt with AN 104 or select another AN (e.g., belonging to another operator) to connect to if a maximum number of authentication attempts has been made. Alternatively, if the received authentication permission indication indicates new user authentication attempts are not currently allowed, UE 102 may simply select another operator's network to connect to. As another example, if the ANQP response indicates new users authentication attempts are permitted, UE 102 may continue the authentication process with AN 104. Although
Furthermore, the authentication permission indication may be transmitted in lieu of or in addition to the overload indication. For example, in some situations a server may still allow new users even though it is overloaded. Thus, both an overload indication and an authentication permission indication may be transmitted. The UE may decide whether to continue authentication with the network based on a policy (e.g., an ANDSF policy), which may be configured by the UE's operator.
In some embodiments, multiple authentication permission indications may be transmitted. For example, an AN may provide a connection to a WLAN owned by a first operator, and the AN also provide home network access to another operator's network (e.g., when the other operator's UEs are in a roaming mode). A first authentication permission indication may be transmitted for the first operator's WLAN, which may be used to indicate whether new users of the first operator may authentication with the AN or WLAN. The first authentication permission indication may be transmitted in a response message or broadcast message. A second authentication permission indication may be transmitted for home network access to users of the second operator. The second authentication permission indication may be used to indicate whether the second operator's users may access the second operator's home network directly or indirectly using the AN. The second indication may be based on server load of both the first operator's WLAN and the second operator's network. The second authentication permission indication may be transmitted as an ANQP response associated with the second operator's home network information in a UE's ANQP query. Thus, multiple authentication permission indications may be transmitted by an AN.
In some embodiments, the authentication permission indication may be transmitted as a separate information element. For example, format 300 of
Furthermore, while
The authentication retry policy may include a backoff or retry timer (e.g., 1 minute), a maximum number (e.g., 3) of authentication attempts with the selected network, and the like. If UE 102 cannot successfully connect to the selected network after the maximum number of authentication attempts, UE 102 may select another network (e.g., belonging to another operator) to connect to. When UE 102 is on a roaming connection, the authentication retry policy may also include a policy that indicates whether UE 102 is allowed to select another network if the initial connection attempt fails or if another connection attempt may be made after the duration (e.g., 1 min) set by the retry timer expires. Other authentication retry policies may implement retry timers of different lengths and/or implement a different maximum number of authentication attempts. Furthermore, other authentication retry policies may implement different authentication retry parameters.
In step 504, UE 102 fails to authenticate with the selected network. Selection of WiFi A may be done by UE 102 based on selection criteria also set by the ANDSF policy. Failure to authenticate with WiFi A may include UE 102 failing to establish a connection, receiving an overload indication indicating the authentication server is overloaded, receiving an authentication permission indication indicating new user authentication attempts are not permitted, and the like. In step 506, UE 102 waits for a retry timer to expire (e.g., after 1 min) before attempting to connect to WiFi A again. After the retry timer expires, in step 508, UE 102 attempts the authentication procedure again with WiFi A. If after the maximum number of authentication attempts all end in failure, UE 102 may select another network (e.g., belonging to another operator) to connect to.
In step 606, the user's device implements a network authentication and selection policy based on the received network authentication status indications. For example, when the user's device receives a authentication status indication indicating the authentication server is overloaded or that the network is not currently allowing authentication attempts by new users, the user's device may decide not to continue the authentication process or selects a different AN (e.g., belonging to a different operator) to connect to. If the user decides not to continue authentication, the user's device may implement an authentication retry policy. The authentication retry policy may include a retry timer before another authentication attempt with the selected network. The authentication retry policy may also include a maximum number of authentication attempts before selecting another AN (e.g., belonging to a different operator) to connect to. As another example, if the user device decides to continue the authentication process, the user's device authenticates and connects with the selected network through the selected AN.
The bus may be one or more of any type of several bus architectures including a memory bus or memory controller, a peripheral bus, video bus, or the like. The CPU may comprise any type of electronic data processor. The memory may comprise any type of system memory such as static random access memory (SRAM), dynamic random access memory (DRAM), synchronous DRAM (SDRAM), read-only memory (ROM), a combination thereof, or the like. In an embodiment, the memory may include ROM for use at boot-up, and DRAM for program and data storage for use while executing programs.
The mass storage device may comprise any type of storage device configured to store data, programs, and other information and to make the data, programs, and other information accessible via the bus. The mass storage device may comprise, for example, one or more of a solid state drive, hard disk drive, a magnetic disk drive, an optical disk drive, or the like.
The video adapter and the I/O interface provide interfaces to couple external input and output devices to the processing unit. As illustrated, examples of input and output devices include the display coupled to the video adapter and the mouse/keyboard/printer coupled to the I/O interface. Other devices may be coupled to the processing unit, and additional or fewer interface cards may be utilized. For example, a serial interface such as Universal Serial Bus (USB) (not shown) may be used to provide an interface for a printer.
The processing unit also includes one or more network interfaces, which may comprise wired links, such as an Ethernet cable or the like, and/or wireless links to access nodes or different networks. The network interface allows the processing unit to communicate with remote units via the networks. For example, the network interface may provide wireless communication via one or more transmitters/transmit antennas and one or more receivers/receive antennas. In an embodiment, the processing unit is coupled to a local-area network or a wide-area network for data processing and communications with remote devices, such as other processing units, the Internet, remote storage facilities, or the like.
While this invention has been described with reference to illustrative embodiments, this description is not intended to be construed in a limiting sense. Various modifications and combinations of the illustrative embodiments, as well as other embodiments of the invention, will be apparent to persons skilled in the art upon reference to the description. It is therefore intended that the appended claims encompass any such modifications or embodiments.
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
7185360, | Aug 01 2000 | HEREUARE COMMUNICATIONS, INC | System for distributed network authentication and access control |
8009586, | Jun 29 2004 | Damaka, Inc. | System and method for data transfer in a peer-to peer hybrid communication network |
8660004, | Feb 16 2011 | Calix, Inc.; CALIX, INC | Systems and methods for multicast admission control |
9554233, | Oct 05 2012 | LG Electronics Inc | Method and device for controlling multipriority in wireless communication system |
20040246933, | |||
20060053944, | |||
20060059344, | |||
20070036120, | |||
20090217048, | |||
20110228671, | |||
20120054840, | |||
20120236709, | |||
20120320827, | |||
20130035084, | |||
20130088956, | |||
20130094484, | |||
20130143542, | |||
20130231151, | |||
20140092731, | |||
20140119353, | |||
20140254454, | |||
20140293780, | |||
CN101166363, | |||
CN101990279, | |||
CN102883315, | |||
WO2012030467, | |||
WO2012030467, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Feb 16 2022 | Futurewei Technologies, Inc. | (assignment on the face of the patent) | / |
Date | Maintenance Fee Events |
Feb 16 2022 | BIG: Entity status set to Undiscounted (note the period is included in the code). |
Date | Maintenance Schedule |
Jan 16 2027 | 4 years fee payment window open |
Jul 16 2027 | 6 months grace period start (w surcharge) |
Jan 16 2028 | patent expiry (for year 4) |
Jan 16 2030 | 2 years to revive unintentionally abandoned end. (for year 4) |
Jan 16 2031 | 8 years fee payment window open |
Jul 16 2031 | 6 months grace period start (w surcharge) |
Jan 16 2032 | patent expiry (for year 8) |
Jan 16 2034 | 2 years to revive unintentionally abandoned end. (for year 8) |
Jan 16 2035 | 12 years fee payment window open |
Jul 16 2035 | 6 months grace period start (w surcharge) |
Jan 16 2036 | patent expiry (for year 12) |
Jan 16 2038 | 2 years to revive unintentionally abandoned end. (for year 12) |