Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, device and system for authenticating relay node

一种中继节点、认证方法的技术,应用在中继节点的认证方法,装置及系统领域,能够解决没有网络安全解决方案等问题,达到保证安全性的效果

Inactive Publication Date: 2011-08-03
HUAWEI TECH CO LTD
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There is currently no solution for the security of the network where the RN is located

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for authenticating relay node
  • Method, device and system for authenticating relay node
  • Method, device and system for authenticating relay node

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] An embodiment of the present invention provides a method for relay node authentication, such as figure 1 As shown, the method includes:

[0045] 101. The relay node sends an authentication request message to the peer node, and the authentication request message includes the certificate of the relay node, so that the peer node implements the relaying of the relay node according to the certificate of the relay node. Node authentication, wherein the peer node is a network side node or a security gateway of a security domain where the network side node is located.

[0046] Since the relay node needs to communicate with many network nodes after joining the network, in order to ensure the security of communication between the relay node and each network node, it is necessary to Nodes perform mutual authentication before data transmission; during the authentication process, the relay node communicates end-to-end with each network node, so in the process of mutual authenticati...

Embodiment 2

[0058] An embodiment of the present invention provides an RN (Relay Node, relay node) authentication method, wherein there are 4 RN architectures in the network joined by the RN, and the distribution of the user plane and control plane interfaces of the RN's architecture 1 and architecture 3 Similarly, the process of user plane data transmission is also basically the same; the distribution of user plane and control plane interfaces of RN framework 2 and framework 4 is the same, and the process of user plane data transmission is also basically the same; the embodiment of the present invention specifically uses RN framework 1 and The framework 3 is taken as an example, and the authentication of the RN under this framework is described in detail.

[0059] Embodiments of the present invention specifically combine image 3 and Figure 4 Explain the distribution of user plane and control plane interfaces of RN architecture 1 and architecture 3, and the process of user plane data tr...

Embodiment 3

[0100] The embodiment of the present invention provides an RN (Relay Node, relay node) authentication method. The embodiment of the present invention specifically takes RN framework 2 and framework 4 as examples, and specifically describes the authentication method for the RN under the framework.

[0101] Embodiments of the present invention specifically combine Figure 7 and Figure 8 Explain the distribution of user plane and control plane interfaces of RN architecture 1 and architecture 3, and the process of user plane data transmission:

[0102] The distribution of user plane and control plane interfaces is as follows Figure 7 As shown, the S1 interface of the RN is located on the eNB and the MME of the RN, and the S1 interface of the UE under the RN is terminated on the MME of the RN and the UE. The eNB to which the RN belongs needs to parse the S1 message of the UE and modify the packet header.

[0103] The process of user plane data transmission, taking the process o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method, a device and a system for authenticating a relay node, and relates to the field of communication, so that mutual authentication of a node on a network side and the relay node is realized, security association is correspondingly established, and the security of a network where the relay node is positioned is guaranteed. The method comprises the following steps that: the relay node transmits an authentication request message to an opposite node, the authentication request message comprises a certificate of the relay node, so that the opposite node can authenticate the relay node according to the certificate of the relay node, wherein the opposite node is a node on the network side or a security gateway of a security domain where the node on the network side is positioned; and the relay node receives an authentication response message transmitted by the opposite node, wherein the authentication response message comprises a certificate of the opposite node, and the opposite node is authenticated the certificate of the opposite end node.

Description

technical field [0001] The present invention relates to the communication field, in particular to a relay node authentication method, device and system. Background technique [0002] For network devices, IKE (Internet Key Exchange, Internet Key Exchange) connections and ESP (Encapsulated Security Protocol, Encapsulated Security Protocol) security associations need to be established between them and other network elements or security gateways in the network before they can communicate with the above-mentioned other network devices. The element establishes the interface. Network elements in different security domains need to go through the security gateways of their respective security domains to establish security associations hop by hop before establishing interfaces with other network elements. [0003] RN (Relay Node, relay node) is one of the technical features of LTE-Advanced. The RN not only has UE (User Equipment, user equipment) characteristics, can wirelessly acces...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W88/04H04W12/069
CPCH04L63/0823H04W12/06H04W76/15H04W12/069H04L9/3263
Inventor 张冬梅张爱琴毕晓宇刘菁
Owner HUAWEI TECH CO LTD
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More