Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method, device and system

An authentication method and equipment authentication technology, applied in the field of authentication methods, devices and systems, can solve the problems that the authentication method cannot guarantee the legitimacy of RN as a base station and the low security of user equipment, and achieve the effect of ensuring legitimacy and improving security

Inactive Publication Date: 2015-07-22
ZTE CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] The main purpose of the present invention is to provide an authentication method, device and system to solve the problem that the authentication method in the related art cannot guarantee the legitimacy of the RN as a base station, which in turn leads to relatively low security of the user equipment served by the RN

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, device and system
  • Authentication method, device and system
  • Authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0068] In this embodiment, the above embodiments and preferred implementation modes are combined, and this embodiment provides a device authentication method, which includes:

[0069] Step 1: The HSS generates the device authentication data required for RN device authentication and sends it to the MME. The MME initiates a device authentication request to the RN. The message carries the device authentication data. The RN receives the device authentication response value generated according to the device authentication data and passes it. The device authentication response message is sent to the network side, and the network side verifies the response value of the RN device to confirm whether the RN device authentication is successful.

[0070] Preferably, the device authentication process initiated by the MME to the RN may reuse the EPS AKA process or use a new message process.

[0071] Preferably, the device authentication data in step 1 can be generated in at least one of the...

Embodiment 2

[0085] In this embodiment, the above-mentioned embodiments and preferred implementation modes are combined. This embodiment provides a device authentication method. The device authentication process in this embodiment reuses the existing AKA process, and the verification is carried in the request message. The information element expects the device response to be generated by the HSS and verified on the MME side; at the same time, the HSS generates a device association key before device authentication. Figure 5 is a device authentication process according to a preferred embodiment of the present invention Figure 1 ,Such as Figure 5 As shown, the method includes:

[0086] Step S501: the RN initiates a NAS message (such as an Attach request) to the MME, and the message carries the device identification information IMEI of the RN.

[0087] Step S503: MME initiates an authentication data request (Authentication data Request) message to the HSS after receiving it, and the messa...

Embodiment 3

[0094] In this embodiment, the above-mentioned embodiments and preferred implementation modes are combined. This embodiment provides a device authentication method. In this embodiment, the device authentication process reuses the existing AKA process, and the verification is carried in the request message. The information element and the input parameters for generating the device response. It is expected that the device response will be generated by the HSS and verified on the MME side; in addition, the MME will generate the device association after the device authentication is completed. Figure 6 is a device authentication process according to a preferred embodiment of the present invention Figure II ,Such as Figure 6 As shown, the method includes:

[0095] Step S601: Same as step S501 in the second embodiment.

[0096] Step S603: Same as step S503 in the second embodiment.

[0097] Step S605: The HSS generates the device authentication data AUTH_NW of the device correspo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method, device and system for authentication is disclosed by the present invention, and the method comprises: a Relay-Node (RN) receives an equipment authentication request, which carries equipment authentication data generated by random data; the RN generates corresponding equipment authentication response values according to the equipment authentication data, and transmits the equipment authentication response values to a network side for authenticating the RN. The invention can ensure the legality of the RN as a base station, and improve the security of the user equipment served by the RN.

Description

technical field [0001] The present invention relates to the communication field, in particular, to an authentication method, device and system. Background technique [0002] Long Term Evolution (LTE for short) network, such as figure 1 As shown, it is composed of an Evolved Universal Terrestrial Radio Access Network (Evolved Universal Terrestrial Radio Access Network, E-UTRAN for short) and an Evolved Packet Core (EPC for short), and the network is flat. EUTRAN is connected with EPC through S1 interface. Among them, EUTRAN is composed of multiple interconnected evolved base stations (Evolved NodeB, referred to as eNB), and each eNB is connected through an X2 interface; EPC is composed of a Mobility Management Entity (Mobility Management Entity, referred to as MME) and a serving gateway entity ( Serving Gateway, referred to as S-GW). In addition, there is a Home Environment (HE for short) in the system architecture, that is, a Home Subscriber Server (HSS for short) or a Ho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W8/04H04W12/04H04W12/06H04W12/041H04W12/069
CPCH04W12/06H04W84/047H04W88/08H04W12/069
Inventor 和峰甘露冯成燕
Owner ZTE CORP