Supercharge Your Innovation With Domain-Expert AI Agents!

Wireless network authentication method and core network element, access network element, and terminal

A wireless network and access network technology, applied in the field of communication, can solve the problems of not being able to support business well and taking a long time

Inactive Publication Date: 2017-03-22
ZTE CORP
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] When the number of UEs is large, it may take longer due to the influence of hardware processing delay
[0016] The types of existing wireless communication services continue to grow, and many of them have strict requirements on end-to-end delays, such as online games, Internet of Vehicles, virtual reality, etc., and the requirements on end-to-end delays are usually in the tens of Milliseconds or even less, and the delay index of the existing LTE system cannot support these types of services well

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless network authentication method and core network element, access network element, and terminal
  • Wireless network authentication method and core network element, access network element, and terminal
  • Wireless network authentication method and core network element, access network element, and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0167] Taking the 3GPP EPC architecture combined with the LTE access network as an example, the authentication vector generator and the key derivation function KDF are loaded for the eNB (evolved base station), so that the eNB has the ability to calculate the authentication vector and generate the secret key. Such as figure 1 shown, including the following steps:

[0168] Step 201, select the eNB that meets the authorization conditions and pre-select the UE, the feasible selection methods and rules include:

[0169] The time that a UE resides in a certain eNB range exceeds the preset threshold one, and the time can be continuous or cumulative; then the UE can be used as a pre-selected UE, and the eNB can be considered to meet the authorization conditions;

[0170] If the frequency of the same UE entering the range of an eNB exceeds the preset threshold two, the UE can be used as a pre-selected UE, and the eNB can be considered to meet the authorization conditions;

[0171] T...

Embodiment 2

[0202] Taking the 3GPP EPC architecture combined with the LTE access network as an example, the key derivation function KDF is loaded for the eNB, so that the eNB has the ability to generate a key. Such as figure 2 shown, including the following steps:

[0203] Step 301, count the eNBs and pre-selected UEs that meet the authorization conditions, the feasible statistical methods and rules can refer to Embodiment 1, and will not be repeated here.

[0204] Step 302: The MME asks the HSS for authentication information in the HSS corresponding to the qualified pre-selected UE, specifically including: an intermediate authentication vector corresponding to the target UE; the HSS sends the authentication information to the MME.

[0205] Step 303, the MME sends authentication and security control information to the eNB that meets the authorization conditions, including:

[0206] The eNB can perform authentication authorization on the user equipment;

[0207] The eNB can execute the...

Embodiment 3

[0229] Embodiment 3 adopts the same flow process as Embodiment 2, and its difference is:

[0230] In Embodiment 2, the authentication information and NAS security establishment information in the authentication and security control information received by the eNB in ​​step 303 may remain valid until updated or deauthorized by the MME.

[0231] In Embodiment 3, the authentication information and NAS security establishment information in the authentication and security control information received by the eNB in ​​step 303 are only valid once, and before the next authentication of the pre-selected UE starts, the MME acquires the UE from the HSS in advance The intermediate authentication vector, MME updates the selection of NAS encryption and integrity protection algorithms to form new authentication and NAS security establishment information and sends it to eNB; eNB uses the updated authentication in the next UE authentication Information and NAS security establishment informatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a wireless network authentication method and a core network element, an access network element, and a terminal. The method includes sending authentication and security control information to an access network element, and indicating the access network element to execute authentication of preselected user equipment or an NAS security establishing process according to the authentication and security control information. Through the wireless network authentication method provided by the invention, delay of end-to-end wireless communication can be effectively reduced.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a wireless network authentication method, a core network element, an access network element, and a terminal. Background technique [0002] The existing LTE (Long Term Evolution, long-term evolution) system adopts the EPC (Evolved Packet Core, evolved packet core) network architecture, and the UE (user equipment) needs to complete the connection establishment of the air interface and the connection with the core in the process of establishing a connection with the network side. The network connection is established, and there are a lot of control plane signaling that needs to be interacted with. Take the 3GPP (The 3rd Generation Partnership Project, 3rd Generation Partnership Project) LTE attach process as an example. [0003] The attachment process of the existing EPC system includes: [0004] - Registration to EPS network (Registration to MME, Mobility Management...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/06H04W12/084H04W12/10
CPCH04W12/04H04W12/06H04W12/043H04W12/041H04W12/062
Inventor 戴谦
Owner ZTE CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More