Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, device and system for preventing authentication vector from being abused

An authentication vector, user technology, applied in security devices, transmission systems, user identity/authority verification, etc., can solve problems such as user attacks and theft

Active Publication Date: 2011-11-16
HUAWEI TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, when a user accesses EPS through a non-3GPP network, if the entity in the non-3GPP access network is compromised, or the Evolved Packet Data Gateway (Evolved Packet Data Gateway, ePDG) connected to the untrusted non-3GPP network is compromised , the AV delivered by the AAA server may be stolen by the attacker, causing the attacker to apply this AV to other non-3GPP networks to carry out further attacks on users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for preventing authentication vector from being abused
  • Method, device and system for preventing authentication vector from being abused
  • Method, device and system for preventing authentication vector from being abused

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Embodiment 1 of the present invention provides a method for preventing authentication vectors from being abused. It is assumed here that the user accesses the EPS through the Wimax network, such as figure 1 As shown, the method includes:

[0026] Step 101: When the user accesses the EPS through the Wimax network, connect to the AAA server through the interface between the trusted non-3GPP network and the AAA server. The AAA server reports the radio access technology (Radio Access Technology, RAT) of the non-3GPP network accessed by the user to the HSS. In this embodiment, the RAT indicates that the accessed non-3GPP network is a Wimax network.

[0027] In this embodiment, AAA may use letters or numbers to represent different RATs, or use other forms to represent. As long as it can represent the radio access technology of the non-3GPP network accessed by the user, there is no restriction on the specific form used to represent it.

[0028] In this embodiment, the AAA ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method for preventing an authentication vector from being abused, and a system and a device capable of achieving the method. In the embodiment of the invention, by bonding the access network information of a non-3GPP network of a user with the authentication vector of the user, when the user accesses EPS by the non-3GPP network, even an entity in the non-3GPP access network is decoded, or an evolved packet data gateway (ePDG) connected with an unauthentic non-3GPP network is decoded, attackers can not apply stolen AV to other non-3GPP networks.

Description

technical field [0001] The invention relates to the technical field of mobile communication, in particular to a method, device and system for preventing authentication vectors from being abused. Background technique [0002] Currently, in the study of the Evolved Packet System (EPS) by the 3rd Generation Partnership Project (3rd Generation Partnership Project, 3GPP), a requirement for non-3GPP networks (non-3GPP networks) to access the EPS is proposed. The non-3GPP system mainly includes trusted non-3GPP networks (trusted non-3GPP networks) and untrusted non-3GPP networks (untrusted non-3GPP networks). Wherein, the trusted non-3GPP network may include Wimax network and CDMA2000 network, etc., and the untrusted non-3GPP network may include WLAN network, etc. [0003] When the non-3GPP network accesses the EPS, the trusted non-3GPP network and the untrusted non-3GPP network are respectively connected to the AAA server of the EPS through different interfaces. The AAA server (...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04L9/32H04W12/122
CPCH04W12/12H04L9/08H04W12/10H04L2209/80H04W12/04H04L9/32H04W12/0431H04W12/128
Inventor 杨艳梅许怡娴陈璟
Owner HUAWEI TECH CO LTD