Method, device and system for authenticating relay node
一种中继节点、认证方法的技术,应用在中继节点的认证方法,装置及系统领域,能够解决没有网络安全解决方案等问题,达到保证安全性的效果
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0044] An embodiment of the present invention provides a method for relay node authentication, such as figure 1 As shown, the method includes:
[0045] 101. The relay node sends an authentication request message to the peer node, and the authentication request message includes the certificate of the relay node, so that the peer node implements the relaying of the relay node according to the certificate of the relay node. Node authentication, wherein the peer node is a network side node or a security gateway of a security domain where the network side node is located.
[0046] Since the relay node needs to communicate with many network nodes after joining the network, in order to ensure the security of communication between the relay node and each network node, it is necessary to Nodes perform mutual authentication before data transmission; during the authentication process, the relay node communicates end-to-end with each network node, so in the process of mutual authenticati...
Embodiment 2
[0058] An embodiment of the present invention provides an RN (Relay Node, relay node) authentication method, wherein there are 4 RN architectures in the network joined by the RN, and the distribution of the user plane and control plane interfaces of the RN's architecture 1 and architecture 3 Similarly, the process of user plane data transmission is also basically the same; the distribution of user plane and control plane interfaces of RN framework 2 and framework 4 is the same, and the process of user plane data transmission is also basically the same; the embodiment of the present invention specifically uses RN framework 1 and The framework 3 is taken as an example, and the authentication of the RN under this framework is described in detail.
[0059] Embodiments of the present invention specifically combine image 3 and Figure 4 Explain the distribution of user plane and control plane interfaces of RN architecture 1 and architecture 3, and the process of user plane data tr...
Embodiment 3
[0100] The embodiment of the present invention provides an RN (Relay Node, relay node) authentication method. The embodiment of the present invention specifically takes RN framework 2 and framework 4 as examples, and specifically describes the authentication method for the RN under the framework.
[0101] Embodiments of the present invention specifically combine Figure 7 and Figure 8 Explain the distribution of user plane and control plane interfaces of RN architecture 1 and architecture 3, and the process of user plane data transmission:
[0102] The distribution of user plane and control plane interfaces is as follows Figure 7 As shown, the S1 interface of the RN is located on the eNB and the MME of the RN, and the S1 interface of the UE under the RN is terminated on the MME of the RN and the UE. The eNB to which the RN belongs needs to parse the S1 message of the UE and modify the packet header.
[0103] The process of user plane data transmission, taking the process o...
PUM

Abstract
Description
Claims
Application Information

- Generate Ideas
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com