Abstract
An example technique may include controlling receiving, by a second node from a first node in a wireless network, a request to offload authentication of the first node with the core network to the second node, controlling receiving, by the second node from the first node, data to be forwarded to the core network, performing, by the second node based on the request, an authentication with the core network on behalf of the first node while the first node is not connected with the second node, and controlling forwarding the received data from the second node to the core network while the first node is not connected with the second node.
Original language | English |
---|---|
IPC | H04W 76/ 06 A I |
Patent number | US2017164194 |
Priority date | 26/06/2014 |
Priority number | WO2014EP63527 |
Publication status | Published - 8 Jun 2017 |
Bibliographical note
Priority number(s): WO2014EP63527 20140626Also published as:
JP2017525251 (A) KR20170021876 (A) WO2015197121 (A1)