Unlock instant, AI-driven research and patent intelligence for your innovation.

An emergency call-based authentication method, device and system

A technology for emergency calls and authentication data, applied in emergency/dangerous communication services, connection management, electrical components, etc., can solve the problems of poor safety of emergency calls, and achieve the effect of improving safety and ensuring safety

Active Publication Date: 2018-05-11
ZTE CORP
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] Embodiments of the present invention provide an emergency call-based authentication method, device, and system, which are used to solve the problem in the prior art that when a user terminal sends an emergency call request to the network side in the case of emergency attachment, the network side does not security authentication of user terminals, resulting in poor security of emergency calls

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An emergency call-based authentication method, device and system
  • An emergency call-based authentication method, device and system
  • An emergency call-based authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] Such as figure 2 As shown, it is a flow chart of an emergency call-based authentication method according to Embodiment 1 of the present invention, and the method includes:

[0049] Step 101: The MME receives the emergency call request message carrying the access network identifier sent by the user terminal, and sends the received access network identifier in the query request to the HSS.

[0050] Wherein, the access network identifier is the IMEI identifier of the user terminal.

[0051] In step 101, when the user terminal is under call restriction or does not have a SIM card / USIM card inserted, and needs to initiate an emergency call request, the user terminal carries its own IMEI identifier as the access network identifier in the emergency call request message and sends it to the MME .

[0052] Preferably, when receiving the emergency call request message sent by the user, the MME instructs the user terminal to report the access network identifier, so as to identif...

Embodiment 2

[0084] Such as image 3 As shown, it is a schematic structural diagram of an emergency call-based authentication device according to Embodiment 2. The device includes: a first receiving module 11, a second receiving module 12, a third receiving module 13 and a comparison module 14, wherein:

[0085] The first receiving module 11 is configured to receive the emergency call request message carrying the access network identifier sent by the user terminal, and carry the received access network identifier in the query request and send it to the HSS;

[0086]The second receiving module 12 is configured to receive the query result returned by the HSS that carries the verification information and the first authentication data, and the first authentication data is calculated by the HSS from the searched security key and the generated verification information, wherein , the security key includes a device key, and the device key is determined by the HSS according to the correspondence be...

Embodiment 3

[0098] Such as Figure 4 As shown, it is a schematic structural diagram of an HSS according to the third embodiment. The HSS includes: a receiving module 21, a first authentication data calculation module 22 and a sending module 23, wherein:

[0099] The receiving module 21 is configured to receive a query request sent by the MME, the query request includes an access network identifier, and the access network identifier is carried when the user terminal sends an emergency call request message to the MME;

[0100] The first authentication data calculation module 22 is configured to determine the device key corresponding to the access network identifier contained in the query request according to the correspondence between the locally stored access network identifier and the device key, and use the The security key of the key and the randomly generated verification information are calculated to obtain the first authentication data;

[0101] The sending module 23 is configured t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses an authentication method, device and system based on an emergency call. The main content includes: by storing the corresponding relationship between the IMEI identifier of the user terminal and the device key in the local user terminal and the HSS respectively, in the user terminal When sending an emergency call request message to the MME, the MME obtains the security key including the device key from the HSS, and calculates the first authentication data obtained by calculating the random verification information, and receives the locally stored security key sent by the user terminal. key and the second authentication data calculated by the received authentication message, and compare the first authentication data with the second authentication data, and when the comparison results are the same, it is determined that the authentication is passed and the user terminal is allowed to access the communication network, thus avoiding the Illegal user terminals maliciously use the communication network in the emergency call mode, which improves the security of the emergency call and ensures the application security of the communication network.

Description

technical field [0001] The present invention relates to the field of wireless communication, in particular to an emergency call-based authentication method, device and system. Background technique [0002] Emergency call is a unique voice service in the mobile communication system, which allows mobile users to call through the mobile communication network covered by the location when the mobile terminal is in a restricted call or the user identification card (ie SIM card) is not inserted. The emergency call center provided by the operator, such as: 120 center, 119 fire alarm, etc., among them, the situation that the mobile terminal is in a restricted call or the subscriber identification card (ie SIM card) is not inserted is called an emergency attachment situation. [0003] In the prior art, when the mobile terminal sends an emergency call to the network side in case of emergency attachment, the network side can usually ignore the mobile terminal's International Mobile Subs...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/90H04W8/04H04W12/04H04W12/06H04W76/27H04W12/041
CPCH04W12/06H04W4/90H04W76/50H04W12/71H04W12/03
Inventor 谢仕云曹岚健
Owner ZTE CORP