Check patentability & draft patents in minutes with Patsnap Eureka AI!

Method for commanding initial security modes of network attached storage (NAS) and automatic scanning (AS)

A security mode command and security mode technology, applied in security devices, electrical components, wireless communications, etc., can solve problems such as wasting system resources, save system resources, reduce operations such as integrity protection checks, and simplify signaling interactions Effect

Active Publication Date: 2015-05-20
ZTE CORP
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0021] In summary, it can be seen that during the initial security mode command process of NAS and AS, UE performs air interface signaling interaction with E-UTRAN many times, wasting system resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for commanding initial security modes of network attached storage (NAS) and automatic scanning (AS)
  • Method for commanding initial security modes of network attached storage (NAS) and automatic scanning (AS)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The technical solution of the present invention will be described in more detail below with reference to the drawings and embodiments.

[0048] The basic concept of the method of the present invention is: after the eNodeB on the E-UTRAN side completes the UE authentication, it requests the MME to reply the security algorithm of the NAS layer (including the encryption algorithm and the integrity protection algorithm of the NAS layer) and the Replayed field information; eNodeB sends the local AS layer security algorithm, the received NAS layer security algorithm and the Replayed field information to the UE through the SecurityModeCommand message; after receiving it, the UE performs integrity protection verification and the Replayed field on the message Comparison, if the integrity protection check passes and the value of the Replayed field is consistent with the value of the corresponding field in the attach request, the security modes of the AS layer and the NAS layer are...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for commanding the initial security modes of network attached storage (NAS) and automatic scanning (AS), which is applied to Ethernet-universal terrestrial radio access network (E-UTRAN) in a long term evolution (LTE) system. The method comprises the following steps of: requesting a mobile management entity (MME) to reply the security algorithm and the Replayed field information of an NAS layer to evolution node B (eNode B) after the eNode B accomplishes the authentication for user equipment (UE); notifying the security algorithm of the local AS layer and the received security algorithm and the Replayed field information of the NAS layer to the UE through a Security Mode Command message after the eNode B receives the security algorithm and the Replayed field information; and carrying out integrity protecting verification and Replayed field comparison on the message by using the UE after the UE receives the message, if the integrity protecting verification is passed and the values of Replayed fields are consistent with the values of the corresponding fields in the attached request, activating the security modes of the AS layer and the NAS layer. With the method, the system resources can be saved.

Description

technical field [0001] The present invention relates to mobile communication technology, in particular to a method for NAS (Non-Access Stratum, NAS) and AS (Access Stratum, AS) initial security mode command process. Background technique [0002] LTE (Long Term Evolution, mobile communication long-term evolution) system network side E-UTRAN (Evolved Universal Terrestrial Radio Access, evolved universal terrestrial radio access network) consists of base station equipment eNodeB (evolved node B) and core network equipment MME (Mobility ManagementEntity, Mobility Management Entity), a user equipment (User Equipment, UE) performs signaling and data interaction with the eNodeB and the MME through a wireless air interface. [0003] In the LTE protocol framework, the protocol layer is divided into the non-access layer and the access layer. The security protection mechanism in the LTE system uses different security mode command procedures in the non-access stratum and access stratum...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/08H04W12/06H04W12/106
Inventor 董志
Owner ZTE CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More