Unlock instant, AI-driven research and patent intelligence for your innovation.
Method, system and device for improving system security
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A technology for system security and security capabilities, applied in the field of improving system security, can solve problems such as resource occupation and security issues
Active Publication Date: 2010-06-09
DATANG MOBILE COMM EQUIP CO LTD
View PDF0 Cites 15 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0006] The disadvantage of the existing technology is that when the MME finds that the UE capability information has been tampered with, an alarm will be generated without further processing of this security situation, and the eNB continues to retain the UE context information, which not only occupies resources, but also raise security concerns
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0043] Such as image 3 As shown, it is a flowchart of a method for improving system security in Embodiment 1 of the present invention. This embodiment is described by taking X2 interface switching as an example, and includes the following steps:
[0044] In step S301, the MME receives the security capability information of the UE sent by the target eNB. In this embodiment, the target eNB may send the security capability information of the UE to the MME through a path switch request message.
[0045] In step S302, the MME judges whether the security capability information of the UE has been tampered with according to the security capability information of the UE sent by the target eNB.
[0046] Step S303, if the MME judges that the security capability information of the UE has been tampered with, the MME returns a path switch failure (path switch failure) message to the target eNB, and the path switch failure message carries a cause IE indicating that the UE security capabilit...
Embodiment 2
[0051] Such as Figure 4 As shown, it is a flowchart of a method for improving system security in Embodiment 2 of the present invention. This embodiment is described by taking S1 interface switching as an example, and includes the following steps:
[0052] Step S401, the source eNB sends the security capability information of the UE to the target MME through the source MME.
[0053] In step S402, the target MME receives the security capability information of the UE sent by the target eNB.
[0054] In step S403, the target MME judges whether the security capability information of the UE has been tampered with according to the security capability information of the UE sent by the target eNB.
[0055] Step S404, if the target MME judges that the security capability information of the UE has been tampered with, the target MME sends an error indication (Error indication) message to the target eNB, and the error indication message carries a cause IE indicating that the security cap...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention discloses a method for improving system security, which comprises the following steps of: judging whether the security capability information of a UE is juggled or not by an MME according to the security capability information of the UE sent by a target eNB; if the MME judges that the security capability information of the UE is juggled, then notifying the target eNB to release the UE contextual information stored in the target eNB by the MME. The invention solves the problem that the MME notifies the target eNB when the security capability information of the UE is juggled in the switching process, so that the target eNB can release the UE context after finding an unsafe phenomenon, thereby avoiding the target eNB from being attacked and saving target eNB resources.
Description
technical field [0001] The present invention relates to the technical field of mobile communication, and in particular to a method, system and device for improving system security during UE (User Equipment, user equipment) handover. Background technique [0002] The Long Term Evolution (LTE) project is the evolution of 3G (Third GenerationWireless Communication, third-generation mobile communication), which improves and enhances the air access technology of 3G, and adopts OFDM (Orthogonal Frequency Division Multiplexing, orthogonal frequency division Multiplexing) and MIMO (Multiple-Input Multiple-Out-put, Multiple-Input-Multiple-Output) are the standards for the evolution of its wireless network. [0003] In the LTE system, the security capability information of the UE is included in the UE network capability information, which is passed to the MME (Mobility Management Entity) by the UE through the attach request (attach request) NAS (Non Access Stratum) message during the...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.