Search

EP-4740530-A1 - METHOD AND SYSTEM FOR AUTHENTICATING A USER EQUIPMENT (UE)

EP4740530A1EP 4740530 A1EP4740530 A1EP 4740530A1EP-4740530-A1

Abstract

The present disclosure relates to a method [400] and a system [300] for authenticating a User Equipment, the method [400] comprising receiving, by a transceiver unit [302], a request for performing an authentication procedure from the User Equipment [102] The method comprises retrieving, by a collection unit [304], a quantum random number from the QRNG module [308]. The method comprises performing, by an authentication unit [106], the authentication of the User Equipment [102] based at least on the quantum random number received from the QRNG module [308].

Inventors

  • JHA, ADITYAKAR
  • ELANGOVAN, Elanchezhiyan
  • BHATNAGAR, AAYUSH
  • REDDY, Boddireddy Ajith
  • KATHURIA, Deepak
  • CHAUHAN, Himanshu Singh
  • VERMA, NITIN
  • VASHISHTH, Yog
  • MISHRA, SOMYA
  • SHARMA, Smridhi

Assignees

  • Jio Platforms Limited

Dates

Publication Date
20260513
Application Date
20240703

Claims (8)

  1. 1. A method [400] for authenticating a User Equipment (UE), the method [400] comprising: receiving, by a transceiver unit [302], a request for performing an authentication procedure from the User Equipment [102]; retrieving, by a collection unit [304], a quantum random number from a Quantum Random Number Generation (QRNG) module [308]; and performing, by an authentication unit [306], the authentication of the User Equipment [102] based at least on the quantum random number received from the QRNG module [308],
  2. 2. The method [400] as claimed in claim 1, wherein the transceiver unit [302], the collection unit [304], and the authentication unit [306] are implemented in a network server, and wherein the network server is one of a unified data management (UDM) server, a home subscriber server (HSS), and a home location register (HLR) server.
  3. 3. The method [400] as claimed in claim 1, wherein post the retrieving, by the collection unit [304], the quantum random number from the QRNG module [308], the method [400] comprises: storing, by the collection unit [304] in a storage unit [310], the quantum random number received from the QRNG module [308],
  4. 4. A system [300] for authenticating a User Equipment (UE), the system comprising: a transceiver unit [302] configured to receive a request for performing an authentication procedure from the User Equipment [102]; a collection unit [304] connected to at least the transceiver unit [302], the collection unit [304] configured to retrieve a quantum random number from a Quantum Random Number Generation (QRNG) module [308]; and an authentication unit [306] connected at least to the collection unit [304], the authentication unit [306] configured to perform the authentication of the User Equipment [102] based at least on the quantum random number received from the QRNG module [308],
  5. 5. The system [300] as claimed in claim 4, wherein the system [300] is one of a unified data management (UDM) server, a home subscriber server (HSS), and a home location register (HLR) server.
  6. 6. The system [300] as claimed in claim 4, the system further comprising a storage unit [310] configured to store the quantum random number received from the QRNG module [308], post the retrieving, by the collection unit [304], the quantum random number from the QRNG module [308],
  7. 7. A User Equipment (UE) comprising a: a memory; and a processor coupled to the memory, wherein the processor is to: transmit, to a network server, a request to perform an authentication procedure by the network server, wherein the authentication procedure is performed by the network server based on: on receiving the request, from UE, retrieving a quantum random number from a Quantum Random Number Generation (QRNG) module [308]; and performing the authentication of the UE based at least on the quantum random number received from the QRNG module.
  8. 8. A non-transitory computer-readable storage medium storing instructions for authenticating a User Equipment (UE), the instructions comprising executable code which, when executed by one or more units of a system [300], causes: a transceiver unit [302] to receive a request for performing an authentication procedure from the User Equipment [102]; a collection unit [304] to retrieve a quantum random number from a Quantum Random Number Generation (QRNG) module [308]; and an authentication unit [306] to perform the authentication of the User Equipment [102] based at least on the quantum random number received from the QRNG module [308],

Description

METHOD AND SYSTEM FOR AUTHENTICATING A USER EQUIPMENT (UE) CROSS-REFERENCE TO RELATED APPLICATIONS [0001] This application is related to the co-pending Indian Patent Application No. 202321045216 filed on 5 July 2023. The contents of this application may be read in conjunction with the specification of the afore-mentioned co-pending application. FIELD OF INVENTION [0002] Embodiments of the present disclosure relate generally to the field of wireless communication systems. More particularly, embodiments of the present disclosure relate to methods and systems for authenticating a User Equipment (UE). BACKGROUND [0003] The following description of the related art is intended to provide background information pertaining to the field of the disclosure. This section may include certain aspects of the art that may be related to various features of the present disclosure. However, it should be appreciated that this section is used only to enhance the understanding of the reader with respect to the present disclosure, and not as admissions of the prior art. [0004] Wireless communication technology has rapidly evolved over the past few decades, with each generation bringing significant improvements and advancements. The first generation of wireless communication technology was based on analog technology and offered only voice services. However, with the advent of the second generation (2G) technology, digital communication and data services became possible, and text messaging was introduced. The third generation (3G) technology marked the introduction of high-speed internet access, mobile video calling, and location-based services. The fourth generation (4G) technology revolutionized wireless communication with faster data speeds, better network coverage, and improved security. Currently, the fifth generation (5G) technology is being deployed, promising even faster data speeds, low latency, and the ability to connect multiple devices simultaneously. With each generation, wireless communication technology has become more advanced, sophisticated, and capable of delivering more services to its users. [0005] When a device is switched ON, or when any periodic authentication of a User Equipment is performed by network servers such as unified data management (UDM) server, etc., authentication keys are generated by the system. These authentication keys may be based on any of the existing techniques, for example, the pseudo-random number keys. However, standard pseudo-random number generators in many cases are not able to withstand cryptographic attacks as pseudo-random numbers are generated by a deterministic computer algorithm. [0006] The unified data management (UDM)/ home subscriber server (HSS)/ home location register (HLR) servers require a high level of data authentication as they store data credentials for authentication of subscribers. Further, a lot of keys are also generated for further communication and other authentication purposes. These authentication keys are generated for protecting the confidential data. [0007] The authentication keys generated for protecting confidential data are generated using random numbers, more specifically, pseudo-random numbers. The pseudo-random numbers can be predicted by using quantum computers in a very short time. Further, over a period of time, various solutions have been developed to generate random numbers which have a high degree of randomness, for example, true pseudo-random number generators. However, there are certain challenges with existing solutions. The existing techniques have a drawback that they can still be predicted by computers, or by some or the other means, especially by the high-performance quantum computing systems. [0008] Thus, there exists an imperative need in the art to provide methods and systems that are able to generate authentication keys using some random number generators in a unified data management (UDM)/ home subscriber server (HSS)/ home location register (HLR) server, where the random numbers do not follow a predictable pattern and therefore are not vulnerable to cryptographic attacks, which the present disclosure aims to address. SUMMARY [0009] This section is provided to introduce certain aspects of the present disclosure in a simplified form that are further described below in the detailed description. This summary is not intended to identify the key features or the scope of the claimed subject matter. [0010] An aspect of the present disclosure may relate to a method for a User Equipment, the method comprising receiving, by a transceiver unit, a request for performing an authentication procedure from the User Equipment. The method further comprises retrieving, by a collection unit, a quantum random number from the QRNG module. The method furthermore comprises performing, by an authentication unit, the authentication of the User Equipment based at least on the quantum random number received from the QRNG module. [0011] In an exemplary asp