Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method and system, ProSe (Proximity-based Service) functional entities and UE (User Equipment)

A technology of functional entities and authentication methods, applied in short-distance communication services, security devices, electrical components, etc., can solve problems such as exposure of user privacy information, increasing the risk of users being attacked by attackers, and business request errors.

Inactive Publication Date: 2015-09-16
ZTE CORP
View PDF2 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] In the prior art, the MSISDN parameters are only subscribed by the HSS and can be downloaded to the control network element of the EPC. Generally, the UE does not have the MSISDN parameters subscribed to, but the MSISDN parameters in the UE can be freely configured by the user. In this case, if the configuration If the wrong MSISDN is entered, it will lead to an error in the discovery service request; in addition, if the IMSI is used to implement authentication and authentication, the IMSI will be exposed in the discovery service request message, which will lead to the exposure of the user's private information and increase the user's chances of being attacked by an attacker. risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and system, ProSe (Proximity-based Service) functional entities and UE (User Equipment)
  • Authentication method and system, ProSe (Proximity-based Service) functional entities and UE (User Equipment)
  • Authentication method and system, ProSe (Proximity-based Service) functional entities and UE (User Equipment)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0124] Embodiment 1 of the present invention provides an authentication authentication method, such as image 3 As shown, the method includes the following steps:

[0125] Step 301: the first ProSe functional entity sends configuration parameters to the UE;

[0126] The first ProSe functional entity here refers to the ProSe functional entity under the HPLMN of the UE. After the UE establishes a secure connection with the first ProSe functional entity, the UE sends a discovery service request message to the first ProSe functional entity;

[0127] The first ProSe functional entity sends configuration parameters to the UE, the configuration parameters include: a list of PLMN identities supported by the UE and the D2D service temporary identifier allocated for the UE by the first ProSe functional entity, or the configuration parameters only include A list of PLMN identifiers supported by the UE;

[0128] When the configuration parameters delivered to the UE include: a list of PLMN...

Embodiment 2

[0197] Embodiment 2 of the present invention provides an authentication authentication method, the method flow Figure 7 As shown, the method includes the following steps:

[0198] Step 701: the first ProSe functional entity sends configuration parameters to the UE;

[0199] Specifically, the configuration parameters issued by the first ProSe functional entity to the UE may include a list of PLMN identities supported by the UE and the temporary D2D service identifier allocated to the UE by the first ProSe functional entity, or the configuration parameters may only include the A list of PLMN identifiers supported by the UE;

[0200] Wherein, the D2D service temporary identifier may be a ProSe functional entity identifier or a parameter uniquely corresponding to the UE, and the parameter may adopt any representation form that can be used to uniquely identify a UE; specifically, in the actual distribution of the D2D service temporary identifier In , the parameters can be assign...

Embodiment 3

[0218] Embodiment 3 of the present invention provides an authentication method, the flow chart of the method is as follows Figure 8 As shown, the method includes the following steps:

[0219] Step 801: UE receives the configuration parameters issued by the first ProSe functional entity;

[0220] Specifically, the configuration parameters include a list of PLMN identities supported by the UE and the D2D service temporary identities allocated to the UE by the ProSe functional entity, or the configuration parameters only include a list of PLMN identities supported by the UE;

[0221] Wherein, the D2D service temporary identifier may be a ProSe functional entity identifier or a parameter uniquely corresponding to the UE, and the parameter may adopt any representation form that can be used to uniquely identify a UE; specifically, in the actual distribution of the D2D service temporary identifier In , the parameters can be assigned to the UE sequentially or randomly assigned to th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed is an authentication method. The method comprises: a first proximity-based service (ProSe) functional entity delivering a configuration parameter to a user equipment (UE); and the UE initiating an authentication process to the first ProSe functional entity according to the configuration parameter, and after the first ProSe functional entity successfully authenticates the UE, the first ProSe functional entity allocating a D2D service temporary identifier to the UE. Also disclosed are an authentication system, the UE, and the ProSe functional entity.

Description

technical field [0001] The present invention relates to the field of mobile communication, in particular to an authentication method and system, a ProSe functional entity and a UE. Background technique [0002] In order to maintain the competitiveness of the third-generation mobile communication system in the communication field, provide users with faster rate, lower delay, and more personalized mobile communication services, and at the same time, in order to reduce the operating costs of operators, the third-generation cooperation The standard working group of the Partnership Project (3GPP, 3rd Generation Partnership Project) is working on the research of the Evolved Packet System (EPS, Evolved Packet System). The entire EPS includes a radio access network (E-UTRAN, Evolved Universal Terrestrial Radio Access Network) and a mobile core network (EPC, Evolved Packet Core Networking), where the EPC includes a Home Subscriber Server (HSS, Home Subscriber Server), mobility Manag...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/72H04W12/75
CPCH04W12/06H04W4/80H04W12/068
Inventor 游世林梁爽蔡继燕林兆骥
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products