Supercharge Your Innovation With Domain-Expert AI Agents!

IoT network security optimization method, user terminal and network side equipment

A technology for user terminal and network security, which is applied in the field of narrowband Internet of Things, user terminal and network side equipment, Internet of Things network security optimization methods, can solve problems such as the heavy burden of the security core network, and achieve saving signaling overhead and key management The effect of spending

Active Publication Date: 2019-08-27
EXTRA DIMENSIONS TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Considering the connection density of IoT devices, this will generate a large amount of key generation process and signaling overhead, which will have a relatively large burden on the core network from a security perspective

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • IoT network security optimization method, user terminal and network side equipment
  • IoT network security optimization method, user terminal and network side equipment
  • IoT network security optimization method, user terminal and network side equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The content of the present invention will be described below through specific examples. The objects and functions of the present invention and methods for achieving the objects and functions will be clarified by referring to the exemplary embodiments. However, the present invention is not limited to the exemplary embodiments disclosed below; it can be implemented in various forms. The essence of the description is only to help those skilled in the relevant art comprehensively understand the specific details of the present invention.

[0040] Hereinafter, embodiments of the present invention will be described with reference to the accompanying drawings. In the drawings, the same reference numerals represent the same or similar components, or the same or similar steps.

[0041] Here, it should also be noted that, in order to avoid obscuring the present invention due to unnecessary details, only the structures and / or processing steps closely related to the solution accor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a network security optimization method for the Internet of Things, a user terminal, and network-side equipment. The method includes: when the RRC connection between the user terminal and the base station is established, the base station receives an IBC-based identification code from the user terminal. bearer request, and send an IBC-based bearer request carrying the user terminal identifier to the authentication unit of the core network; after the authentication unit has passed the security authentication of the user terminal, it sends an IBC-based bearer request without a security key and without wireless encryption to the base station A radio access bearer request: the base station requests the user terminal to establish a wireless data bearer without a security key and without wireless encryption based on the radio access bearer request.

Description

technical field [0001] The present invention relates to the technical field of the Internet of Things, in particular to the narrowband Internet of Things, and in particular to a network security optimization method for the Internet of Things, a user terminal and a network side device. Background technique [0002] The NBIoT (Narrow Band Internet of Things) basic network platform includes a wireless access network and a core network, providing the entire Internet of Things service transmission channel. In the existing LTE network architecture, the base station (eNB) is connected to the base station through the X2 interface, and the base station is connected to the mobile control entity (MME: Mobility Management Entity) through the S1 interface, such as figure 1 shown. [0003] Narrowband Internet of Things (NBIoT) technology provides a network access method with narrow bandwidth (180kHz) and subcarrier spacing of 3.75kHz or 15kHz. It is based on the existing LTE network arch...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04W12/04H04W12/06H04L5/00H04W12/0431
CPCH04L5/0053H04W12/02H04W12/04H04W12/06
Inventor 张源王放
Owner EXTRA DIMENSIONS TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More