Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity authentication method and system of evolved node B

An evolved node and identity authentication technology, which is applied in the identity authentication method and system field of evolved node B, can solve problems such as separation process and complexity, and achieve the effect of reducing complexity and avoiding security holes

Active Publication Date: 2014-06-11
ZTE CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The main purpose of the present invention is to provide an identity authentication scheme for evolved Node B, so as to at least solve the problem in the related art that the identity authentication of eNB is usually separated from the access process of eNB, resulting in complicated procedures

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and system of evolved node B
  • Identity authentication method and system of evolved node B
  • Identity authentication method and system of evolved node B

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] After the legitimate eNB accesses the network, the network side authenticates the identity of the eNB and assigns it an IP address. At the same time, the eNB authenticates the network side. After the two-way authentication is successful, the eNB normally uses the services provided by the operator's network. Figure 4 is a schematic diagram of a method for authenticating a legal eNB according to an embodiment of the present invention, as shown in Figure 4 As shown, the specific implementation process of the method for authenticating the legal eNB is as follows:

[0049] Step S402, when the eNB accesses the network, it first initiates a DHCP process to apply for a legal IP address for itself, so as to communicate with the Mobility Management Entity (MME) / S-GW / Operation Management Center (Operation Management Center, Communication with network elements such as OMC). The eNB sends a DHCP Discover (DHCP discovery) message to the network.

[0050] Step S404, after receivin...

Embodiment 2

[0061] When an illegal eNB accesses the network, the network side fails to authenticate the identity of the eNB, and then the network side will refuse to assign an IP address to the eNB, and the eNB will not be able to use the services provided by the operator's network. Figure 5 is a schematic diagram of a method for authenticating an illegal eNB according to an embodiment of the present invention, as shown in Figure 5 As shown, the specific implementation process of the method for identity authentication of illegal eNBs is as follows:

[0062] Step S502, when an illegal eNB accesses the network, it first initiates a DHCP process to apply for a legal IP address for itself, so as to communicate with network elements such as MME / S-GW / OMC. The illegal eNB sends a DHCP Discover message to the network.

[0063] Step S504, after receiving the DHCP Discover message, the DHCP Server in the network randomly generates a character string random_string_1 with a length of 32 bytes, and...

Embodiment 3

[0070] The legal eNB accesses the illegal network, and the illegal network defaults to the identity authentication of the eNB, and assigns an IP address to it, so that the legal eNB can access the illegal network to steal user sensitive information. Figure 6 is a schematic diagram of a method for identity authentication when a legal eNB accesses an illegal network according to an embodiment of the present invention, as shown in Figure 6 As shown, the specific implementation process of the method for performing identity authentication when a legitimate eNB accesses an illegal network is as follows:

[0071] In step S602, the operator deploys an eNB, and assigns a unique eNB Identity and a corresponding eNB Password to the eNB.

[0072] Step S604, when the eNB accesses the network, it first initiates a DHCP process to apply for a legal IP address for itself, so as to communicate with network elements such as MME / S-GW / OMC. The eNB sends a DHCP Discover (DHCP discovery) message...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses an identity authentication method and system for an evolved Node B (eNB), and the method includes the following steps: when an eNB applies to a server for an Internet Protocol (IP) address, it sends identity authentication information to the server; after receiving the identity authentication information, the server authenticates the eNB by the identity authentication information; and if the authentication succeeded, the server allocates the IP address to the eNB. The present invention reduces network complexity caused by separated processing of access and authentication.

Description

technical field [0001] The present invention relates to the communication field, in particular, to an identity authentication method and system of an evolved Node B. Background technique [0002] Wireless communication systems have been deployed and applied more and more due to their open network architecture. With the popularity of wireless communication systems, security issues in communication systems have gradually become the focus of users' attention. With the emergence of application modes such as home base stations, evolved Node B (Evolved Node B, referred to as eNB) may be in a physically untrusted area. In order to prevent counterfeit eNBs from accessing the network, sensitive information on the entire wireless communication system and users To pose a threat, to authenticate the legal identity of the eNB and ensure that only legal eNBs can access the operator's network has become the primary mechanism to ensure the security of the wireless communication system. [...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/00H04L29/06H04L29/12H04W12/06
CPCH04W88/08H04W12/10H04W12/06H04W88/005H04L63/126H04W12/106H04W12/068H04W12/069
Inventor 朱永升杜高鹏
Owner ZTE CORP