Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Network residing method, network residing system and terminal

A terminal and network technology, applied in the field of communication, can solve the problems of inability to judge the authenticity of the network, misleading users to stay in the terminal, and users unable to use the operator's services normally.

Inactive Publication Date: 2016-06-29
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of communication technology, when the pseudo base station equipment is running, it usually operates at a higher power than the base station of the core network, thereby misleading the user terminal to reside in the pseudo base station network, causing the user to be unable to use the services provided by the operator normally, and the pseudo base station is forced to Short messages such as scams and advertisements sent by the user terminal not only affect the normal communication of the user, but even cause financial losses to the user
[0003] In related technologies, the terminal performs neighbor cell measurement and cell reselection judgment according to the network protocol specification, and because the network authentication is a one-way authentication, the terminal does not authenticate the network, so the terminal cannot judge the network status. authenticity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network residing method, network residing system and terminal
  • Network residing method, network residing system and terminal
  • Network residing method, network residing system and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0104] In the 2G network, the mobile subscriber directory number (MDN, MobileDirectoryNumber) is the number dialed when the calling subscriber calls a mobile subscriber, and the IMSI (InternationalMobileSubscriberIdentification, International Mobile Station Identity) is the number that uniquely identifies a mobile subscriber in the mobile network , taking the CDMA (CodeDivisionMultipleAccess: code division multiple access communication technology) network 2G stage as an example, when the terminal is powered on and registered, the CAVE algorithm is used, and the parameters IMSI, ESN (UIMID), SSD-A (shared encrypted data) and RAND (random data) are entered. ), calculate AUTHR (calculation result). The terminal sends registration signaling, including authentication data: RAND, AUTHR. Among them, the CAVE algorithm is a cellular authentication and voice encryption (CellularAuthenticationVoiceEncryption) algorithm, which is an authentication encryption algorithm authorized by a CDM...

Embodiment 2

[0106] After entering the 3G evolution stage, there are two different technical routes for 3G evolution, one is 1xEV-DO (EvolutionDataonly: the first stage of CDMA2000 evolution), the other is 1xEV-DV (EvolutionDataandVoice: the second stage of CDMA2000 evolution), 1xEV-DO The access authentication method adopts the CHAP (Challenge Handshake Authentication Protocol) authentication based on the MD5 (Message Digest5) algorithm, and a new authentication device is added in the 1xEV-DO network to support the MD5 algorithm.

Embodiment 3

[0108] After entering the LTE (LongTermEvolution, long-term evolution) 4G era, the authentication vector includes RAND (a 128-bit random number), XERS (a 64-bit expected response), AUTH (authentication token), KASME (access security management entity K value), using the Milenage algorithm based on AES-128 cyclic shift + XOR to realize the authentication process.

[0109] Figure 6 A schematic flowchart of a network residency solution according to an embodiment of the present invention is shown.

[0110] Such as Figure 6 As shown, the network residency scheme according to the embodiment of the present invention: step 602, the terminal searches for the operating frequency point of the base station after powering on; step 604, sends the location area update request to the target base station; step 606, obtains the authentication information fed back by the target base station Authorization random parameter; Step 608, generate the first authentication parameter according to the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network residing method, a network residing system and a terminal. The network residing method comprises the following steps: when that a trigger condition of a location area update is satisfied is detected, acquiring a working frequency point of a base station in an area where the terminal is located; sending a location area update request to a target base station corresponding to the working frequency point; acquiring an authentication random parameter fed back by the target base station; generating a first authentication parameter according to identification information of a subscriber identification card of the terminal, the authentication random parameter and a specified authentication algorithm, and generating a second authentication parameter which is different from the first authentication parameter; transmitting the second authentication parameter to the target base station; and judging whether the target base station is a pseudo base station or a core network base station according to a feedback instruction of the target base station specific to the second authentication parameter. Through the technical scheme of the invention, the probability that a user terminal resides in the pseudo base station is lowered; the interference of the pseudo base station on communication services of the user terminal is lowered; and the use security of the user terminal is improved.

Description

technical field [0001] The present invention relates to the technical field of communications, and in particular, to a network resident method, a network resident system and a terminal. Background technique [0002] With the development of communication technology, when the pseudo base station equipment is running, it usually operates at a higher power than the base station of the core network, thereby misleading the user terminal to reside in the pseudo base station network, causing the user to be unable to use the services provided by the operator normally. Short messages such as scams and advertisements sent by the user terminal not only affect the normal communication of the user, but may even cause financial losses to the user. [0003] In related technologies, the terminal performs neighbor cell measurement and cell reselection judgment according to the network protocol specification, and because the network authentication is a one-way authentication, the terminal does...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/08H04W12/12H04W12/122
CPCH04W12/06H04W12/08H04W12/12
Inventor 张祖辉
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products