Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication processing method and device

A processing method and business technology, applied in the field of communication, can solve problems such as waste of resources, and achieve the effect of saving resources

Active Publication Date: 2017-07-14
HUAWEI TECH CO LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This security process wastes resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication processing method and device
  • Authentication processing method and device
  • Authentication processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The technical solutions of the embodiments of the present invention will be described in further detail below with reference to the drawings and embodiments.

[0033] figure 1 It is a flowchart of an authentication processing method according to an embodiment of the present invention. Such as figure 1 As shown, this embodiment specifically includes the following steps:

[0034] Step 101, when the non-access stratum count value is close to the maximum value, detect the local information;

[0035] Step 102. Determine whether to trigger an authentication and key agreement process with the user equipment according to local information.

[0036] Wherein, when the NAS count value is close to the maximum value, it means that the NAS count value is about to wrap around, and the authentication and key agreement process may be an EPS AKA process.

[0037] The executor of the above two steps may be the MME. When the downlink or uplink NAS count value is about to wrap around, t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention relates to an authentication processing method and device, wherein a method includes: in the case of failure to execute the authentication and key agreement process, decide to release the connection or continue to execute the current service according to local information and network policies. In the embodiment of the present invention, if the EPS AKA process authentication fails, the connection will not be released immediately, but the connection will be released according to local information and network policies or the current service will continue to be executed, which avoids releasing unnecessary connections and saves resources.

Description

technical field [0001] Embodiments of the present invention relate to the communication field, and in particular, to an authentication processing method and device. Background technique [0002] The Non-Access Stratum (Non-Access Stratum, NAS for short) count (COUNT) is a part of the security context in the Long Term Evolution (Long Term Evolution, LTE for short) system. In the LTE system, the NAS count can be used as the life cycle of the key to make the key fresh; at the same time, the NAS count can ensure the synchronization between the user equipment (User Equipment, referred to as: UE) and the network side key, with anti-replay The role of the attack. Each set of Evolved Packet System (EPS for short) security context includes two independent NAS count values: an uplink NAS count value and a downlink NAS count value. The two NAS counters are independently maintained by the UE and a mobility management entity (Mobility Management Entity, MME for short). [0003] The NA...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W12/04H04W12/0431
Inventor 毕晓宇张爱琴张冬梅
Owner HUAWEI TECH CO LTD