Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Non-access stratum abstract authentication method in trunking communication system

A cluster communication and non-access layer technology, applied in the field of communication, can solve the problems of large security risks in the cluster communication system

Active Publication Date: 2018-03-13
POTEVIO INFORMATION TECH
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] It can be seen that in the prior art, if an illegal user logs in to the trunking communication system by using a legitimate trunking terminal to counterfeit or counterfeit a trunking user, he or she can perform trunking services, and the trunking communication system has a great security risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Non-access stratum abstract authentication method in trunking communication system
  • Non-access stratum abstract authentication method in trunking communication system
  • Non-access stratum abstract authentication method in trunking communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are the Some, but not all, embodiments are invented.

[0025] It should be noted that in this article, the words "first", "second", "third", and "fourth" are only used to distinguish the same names, not to imply the relationship between these names or order.

[0026] Each embodiment of the present invention follows the following premises and descriptions 1-4:

[0027] 1. After the user equipment (User Equipment, UE) (also referred to as user terminal) attaches to the LTE access network, the non-access stratum (Non-Access Stratum, NAS) signaling is all transmitted over the air interface in an encrypted manner. The authentication ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a non-access stratum abstract authentication method in a trunking communication system, the method comprises the following steps: UE sends a cluster registration request message to a target T-CN, the message carries a login authentication indicating information and a first interpellation parameter value for interpellating a network, and thus, the target T-CN is enabled to feed back a cluster registration accepting message to the UE based on the login authentication indicating information; the UE authenticates the target T-CN based on a first response parameter value which is used for authenticating the network and carried in the cluster registration accepting message; if authentication is successful, based on a second interpellation parameter value which is used forinterpellating the UE and carried in the cluster registration accepting message, the UE obtains a second response parameter value used for authenticating the UE; the UE sends a cluster registration completed message to the target T-CN, the message carries the second response parameter value, thus, the target T-CN is enabled to authenticate the UE based on the second response parameter value, andnon-access stratum abstract authentication is realized. The method provided by the invention can realize bidirectional authentication of UE and T-CN.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a non-access stratum digest authentication method in a cluster communication system. Background technique [0002] The trunking communication system is a dedicated wireless communication system developed to meet the command and dispatch needs of industry users and is oriented to specific industry applications. In the trunking communication system, a large number of wireless users share a small number of wireless channels, and the command and dispatch business is the main application. It is a multi-purpose, high-efficiency wireless communication system that utilizes frequency resources. The trunking communication system has a wide range of application markets in the fields of government departments, public safety, emergency communications, electric power, civil aviation, petrochemical and military. LTE (Long Term Evolution, long-term evolution) broadband multimedia trunking...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/06
CPCH04W12/06
Inventor 周波王磊
Owner POTEVIO INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products