Authentication method, device and system
An authentication method and equipment authentication technology, applied in the field of authentication methods, devices and systems, can solve the problems that the authentication method cannot guarantee the legitimacy of RN as a base station and the low security of user equipment, and achieve the effect of ensuring legitimacy and improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0068] In this embodiment, the above embodiments and preferred implementation modes are combined, and this embodiment provides a device authentication method, which includes:
[0069] Step 1: The HSS generates the device authentication data required for RN device authentication and sends it to the MME. The MME initiates a device authentication request to the RN. The message carries the device authentication data. The RN receives the device authentication response value generated according to the device authentication data and passes it. The device authentication response message is sent to the network side, and the network side verifies the response value of the RN device to confirm whether the RN device authentication is successful.
[0070] Preferably, the device authentication process initiated by the MME to the RN may reuse the EPS AKA process or use a new message process.
[0071] Preferably, the device authentication data in step 1 can be generated in at least one of the...
Embodiment 2
[0085] In this embodiment, the above-mentioned embodiments and preferred implementation modes are combined. This embodiment provides a device authentication method. The device authentication process in this embodiment reuses the existing AKA process, and the verification is carried in the request message. The information element expects the device response to be generated by the HSS and verified on the MME side; at the same time, the HSS generates a device association key before device authentication. Figure 5 is a device authentication process according to a preferred embodiment of the present invention Figure 1 ,Such as Figure 5 As shown, the method includes:
[0086] Step S501: the RN initiates a NAS message (such as an Attach request) to the MME, and the message carries the device identification information IMEI of the RN.
[0087] Step S503: MME initiates an authentication data request (Authentication data Request) message to the HSS after receiving it, and the messa...
Embodiment 3
[0094] In this embodiment, the above-mentioned embodiments and preferred implementation modes are combined. This embodiment provides a device authentication method. In this embodiment, the device authentication process reuses the existing AKA process, and the verification is carried in the request message. The information element and the input parameters for generating the device response. It is expected that the device response will be generated by the HSS and verified on the MME side; in addition, the MME will generate the device association after the device authentication is completed. Figure 6 is a device authentication process according to a preferred embodiment of the present invention Figure II ,Such as Figure 6 As shown, the method includes:
[0095] Step S601: Same as step S501 in the second embodiment.
[0096] Step S603: Same as step S503 in the second embodiment.
[0097] Step S605: The HSS generates the device authentication data AUTH_NW of the device correspo...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 