Identity authentication method and system of evolved node B
An evolved node and identity authentication technology, which is applied in the identity authentication method and system field of evolved node B, can solve problems such as separation process and complexity, and achieve the effect of reducing complexity and avoiding security holes
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0048] After the legitimate eNB accesses the network, the network side authenticates the identity of the eNB and assigns it an IP address. At the same time, the eNB authenticates the network side. After the two-way authentication is successful, the eNB normally uses the services provided by the operator's network. Figure 4 is a schematic diagram of a method for authenticating a legal eNB according to an embodiment of the present invention, as shown in Figure 4 As shown, the specific implementation process of the method for authenticating the legal eNB is as follows:
[0049] Step S402, when the eNB accesses the network, it first initiates a DHCP process to apply for a legal IP address for itself, so as to communicate with the Mobility Management Entity (MME) / S-GW / Operation Management Center (Operation Management Center, Communication with network elements such as OMC). The eNB sends a DHCP Discover (DHCP discovery) message to the network.
[0050] Step S404, after receivin...
Embodiment 2
[0061] When an illegal eNB accesses the network, the network side fails to authenticate the identity of the eNB, and then the network side will refuse to assign an IP address to the eNB, and the eNB will not be able to use the services provided by the operator's network. Figure 5 is a schematic diagram of a method for authenticating an illegal eNB according to an embodiment of the present invention, as shown in Figure 5 As shown, the specific implementation process of the method for identity authentication of illegal eNBs is as follows:
[0062] Step S502, when an illegal eNB accesses the network, it first initiates a DHCP process to apply for a legal IP address for itself, so as to communicate with network elements such as MME / S-GW / OMC. The illegal eNB sends a DHCP Discover message to the network.
[0063] Step S504, after receiving the DHCP Discover message, the DHCP Server in the network randomly generates a character string random_string_1 with a length of 32 bytes, and...
Embodiment 3
[0070] The legal eNB accesses the illegal network, and the illegal network defaults to the identity authentication of the eNB, and assigns an IP address to it, so that the legal eNB can access the illegal network to steal user sensitive information. Figure 6 is a schematic diagram of a method for identity authentication when a legal eNB accesses an illegal network according to an embodiment of the present invention, as shown in Figure 6 As shown, the specific implementation process of the method for performing identity authentication when a legitimate eNB accesses an illegal network is as follows:
[0071] In step S602, the operator deploys an eNB, and assigns a unique eNB Identity and a corresponding eNB Password to the eNB.
[0072] Step S604, when the eNB accesses the network, it first initiates a DHCP process to apply for a legal IP address for itself, so as to communicate with network elements such as MME / S-GW / OMC. The eNB sends a DHCP Discover (DHCP discovery) message...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 