Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Method for Realizing Security Guarantee in Evolved Access Network

A network access and security technology, applied in the field of security assurance, can solve the problems of data packet loss, vulnerability to malicious attacks, etc.

Active Publication Date: 2012-02-22
北京璟石知识产权管理有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Since the channel of the air interface is an extremely unstable channel, the possibility of data packet loss on this channel is very high; in addition, due to the wireless characteristics of the air interface, an attacker can easily initiate packet insertion on the air interface , packet deletion and other attacks; in addition, the eNodeB is in an unsafe physical location and is extremely vulnerable to malicious attacks. Therefore, it is urgent to provide a security guarantee solution in E-UTRAN to ensure that the user terminal (UE, User Equipment) ) is consistent with the amount of uplink and downlink data between E-UTRAN

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method for Realizing Security Guarantee in Evolved Access Network
  • A Method for Realizing Security Guarantee in Evolved Access Network
  • A Method for Realizing Security Guarantee in Evolved Access Network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0038] In the present invention, the UE and the evolved access network respectively maintain one or more counters, and the counter values ​​are used to indicate the amount of data transmitted between the UE and the evolved access network, that is, the counter value varies with the distance between the UE and the evolved access network. When the set conditions are satisfied, the evolved access network initiates a data volume check to the UE, and the UE or the evolved access network compares the counter value provided by the opposite end with the counter value maintained by itself. The evolved access network performs subsequent processing according to the checking result of whether there are counters with inconsistent values.

[0039] The counter mentioned above can...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for realizing security assurance in an evolved access network. The UE and the evolved access network respectively maintain more than one counter, and the counter value is used to represent the data transmitted between the UE and the evolved access network The method includes: when the set condition is satisfied, the evolved access network initiates a data volume check to the UE, the UE or the evolved access network compares the counter value maintained by itself with the counter value provided by the opposite end, and the evolved access network Subsequent processing is performed according to the check result of whether there are counters with inconsistent values, so that the security of the evolved access network can be determined according to the check result. In addition, the information or signaling and messages transmitted between the UE and the evolved access network are integrity protected using the key shared between the UE and the evolved access network, and periodic local authentication is further realized through the integrity protection.

Description

technical field [0001] The present invention relates to the evolution access network technology, in particular to a method for realizing security guarantee in the evolution access network. Background technique [0002] In order to maintain the competitiveness of the access system of the 3rd Generation Partnership Project (3GPP, 3rd Generation Partnership Project), research on long-term evolution (LTE, Long Term Evolution) and system architecture evolution (SAE, System Architecture Evolution) in network evolution is ongoing . The goal of network evolution is to simplify the network structure and reduce the access time delay. [0003] figure 1 A schematic diagram of the LTE / SAE access network architecture is shown, as shown in figure 1 As shown, the aGW (E-UTRAN Access Gateway) is the access gateway of the Evolved Global Terrestrial Radio Access Network (E-UTRAN, Enhanced Universal Terrestrial Radio Access Network), located in a safe physical location, and the eNodeB or evo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/123
Inventor 汤斌淞陈璟
Owner 北京璟石知识产权管理有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products