Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An authentication method and device

An authentication method and technology of an authentication device, applied in the field of communication, can solve problems such as reducing signaling efficiency, and achieve the effect of improving signaling efficiency

Active Publication Date: 2022-04-15
ZTE CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] In the prior art, the authentication process is not introduced in the handover process, so that the authentication operation can only be performed after the handover, which reduces the signaling efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An authentication method and device
  • An authentication method and device
  • An authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0071] Embodiment 1 (the first network functional entity is a target base station system, and the second network functional entity is a core network element)

[0072] Figure 4 It is a schematic flowchart of an authentication method based on a core network handover according to an embodiment of the present invention, as shown in Figure 4 As shown, the process includes:

[0073] Step 401: The terminal UE accesses the mobile network, and the authentication data delivery network element initiates the authentication process for the terminal UE through the source base station system, or executes this embodiment or Figure 5 In the handover process in the embodiment, the source base station system caches these authentication data;

[0074] Step 402: The source base station system decides to initiate a handover process, and sends a handover request to a core network element (such as a mobility management function MMF, or MME), such as sending a Handover Required message, carrying ...

Embodiment 2

[0081] Embodiment 2 (the first network functional entity is the target base station system, and the second network functional entity is the source base station system)

[0082] Figure 5 It is a schematic flowchart of an authentication method based on an access network handover according to an embodiment of the present invention, as shown in Figure 5 As shown, the process includes:

[0083] Step 501: The terminal UE accesses the mobile network, and the authentication data delivery network element initiates the authentication process for the terminal UE through the source base station system, or executes this embodiment or Figure 4 In the handover process in the embodiment, the source base station system caches these authentication data;

[0084] Step 502: The source base station system decides to initiate a handover process, and sends a handover request to the target base station system, such as sending a Handover Request message, carrying cached authentication data;

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication method and device. The method comprises: a first network function entity receives a handover preparation message sent by a second network function entity, and the handover preparation message carries authentication data; the first network function entity sending a handover notification message to the second network function entity, where the handover notification message carries an authentication parameter, and the authentication parameter is generated based on the authentication data; the first network function entity receives a handover completion message from the terminal, and the The handover complete message carries authentication information, and the authentication information is generated based on the authentication parameters; the first network function entity verifies the authentication information based on the authentication data.

Description

technical field [0001] The present invention relates to the communication field, in particular to an authentication method and device when switching is performed. Background technique [0002] The 3rd Generation Partnership Project (3GPP, 3rd Generation Partnership Project) proposes a mobile network authentication scheme, such as figure 1 As shown, the process of the authentication scheme includes the following steps: [0003] Step 101: The core network element (such as the mobility management entity MME) sends an authentication data request to the home network element (such as the home subscription service HSS), such as sending an Authentication Data Request message, and the message carries the identity of the user to be authenticated, such as an international mobile The station identifies the IMSI and carries the public key PubK of the core network element; [0004] Step 102: The home network element (such as HSS) obtains the authentication vector of one or a group of us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W36/00
CPCH04W12/06H04W36/0016H04W36/00H04W12/062H04W12/069
Inventor 谢振华
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products