Realization method and device of attachment procedure

A technology for implementing methods and processes, applied in the field of implementing methods and devices for attaching processes, can solve problems such as lack of integrity protection of public keys, man-in-the-middle attacks, and inability to prevent active attacks.

Active Publication Date: 2018-11-23
CHINA MOBILE COMM LTD RES INST +1
View PDF4 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1) It cannot prevent active attacks. This scheme uses the DH key exchange protocol between UE and SEAF. Since the exchanged public key has no integrity protection, this scheme is vulnerable to man-in-the-middle attacks, that is, it cannot prevent active attacks
[0006] 2) Cannot prevent association attacks, this scheme does not have any mechanism for preventing association attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Realization method and device of attachment procedure
  • Realization method and device of attachment procedure
  • Realization method and device of attachment procedure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0120] In order to understand the characteristics and technical contents of the embodiments of the present invention in more detail, the implementation of the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. The attached drawings are only for reference and description, and are not intended to limit the embodiments of the present invention.

[0121] The attachment process is an important step for the UE to access the network. It can be divided into three stages according to its different functions: (1) identity management, which is used to determine the identity of the UE on the network side, (2) authentication between the UE and the network and key management (AKA, Authentication and Key Agreement), used for mutual authentication and deriving session keys, (3) Security Mode Command (SMC, Security Mode Command), used for negotiation of cryptographic algorithms and protection of activation messages. Although mos...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a realization method and device of attachment procedure. The method comprises the following steps: receiving an attachment request message sent by UE through a first network element, computing a DH public key of the first network element, and sending a signature request message to the second network element, wherein the signature request message comprises the DH public keyof the first network element; receiving a signature response message sent by the second network element, wherein the signature response message comprises the DH public key of the first network elementsigned by a private key of the second network element; sending an identity request message to the UE, wherein the identity request message comprises the DH public key of the first network element signed by the private key of the second network element; if the UE successfully verifies the signature by using the public key of the second network element, receiving the identity response message sentby the UE, wherein the identity response message comprises the identity information, encrypted by the encrypted key, of the UE; and computing the encrypted key based on the own DH public key, and acquiring the identity information of the UE from the identity response message based on the encrypted key.

Description

technical field [0001] The invention relates to the attachment technology in the field of mobile communication, in particular to a method and device for realizing an attachment process. Background technique [0002] The fifth generation mobile communication technology (5G, 5 th The goal pursued by Generation Mobile Communication Technology is to meet the business needs of 2020 and beyond. Through 5G, it is expected to shape a fully mobile and fully connected society, and promote social and economic reforms in many aspects that are unimaginable today, such as production efficiency and sustainability. development etc. The properties that 5G must deliver include: greater throughput, ultra-low latency, extreme reliability, higher connection density, and higher mobility range. This enhanced performance is expected to provide the ability to operate in highly heterogeneous network environments and ensure security, trust, identity and privacy. [0003] The evolution of Long Term...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/32H04L29/06
CPCH04L9/30H04L9/3247H04L63/0428H04L63/06H04L63/083H04L63/0876
Inventor 刘福文彭晋左敏庄小君
Owner CHINA MOBILE COMM LTD RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products