Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for implementing an attachment process

A technology for implementing methods and processes, applied in the field of implementing methods and devices for attaching processes, can solve problems such as man-in-the-middle attacks, lack of integrity protection of public keys, and inability to prevent correlation attacks, and achieve the effect of satisfying security requirements and eliminating security threats.

Active Publication Date: 2021-07-16
CHINA MOBILE COMM LTD RES INST +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1) It cannot prevent active attacks. This scheme uses the DH key exchange protocol between UE and SEAF. Since the exchanged public key has no integrity protection, this scheme is vulnerable to man-in-the-middle attacks, that is, it cannot prevent active attacks
[0006] 2) Cannot prevent association attacks, this scheme does not have any mechanism for preventing association attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for implementing an attachment process
  • A method and device for implementing an attachment process
  • A method and device for implementing an attachment process

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0120] In order to understand the characteristics and technical contents of the embodiments of the present invention in more detail, the implementation of the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. The attached drawings are only for reference and description, and are not intended to limit the embodiments of the present invention.

[0121] The attachment process is an important step for the UE to access the network. It can be divided into three stages according to its different functions: (1) identity management, which is used to determine the identity of the UE on the network side, (2) authentication between the UE and the network and key management (AKA, Authentication and Key Agreement), used for mutual authentication and deriving session keys, (3) Security Mode Command (SMC, Security Mode Command), used for negotiation of cryptographic algorithms and protection of activation messages. Although mos...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for implementing an attach process, comprising: a first network element receives an attach request message sent by a UE, calculates a DH public key of the first network element, and sends a signature request message to a second network element, The signature request message includes the DH public key of the first network element; receiving the signature response message sent by the second network element, the signature response message includes the first The DH public key of the network element; sending an identity request message to the UE, the identity request message including the DH public key of the first network element signed by the private key of the second network element; if the UE uses the The public key of the second network element successfully verifies the signature, and then receives the identity response message sent by the UE, and the identity response message includes the identity information of the UE encrypted by the encryption key; based on its own DH public key calculating the encryption key, and obtaining the identity information of the UE from the identity response message based on the encryption key.

Description

technical field [0001] The invention relates to the attachment technology in the field of mobile communication, in particular to a method and device for realizing an attachment process. Background technique [0002] The fifth generation mobile communication technology (5G, 5 th The goal pursued by Generation Mobile Communication Technology is to meet the business needs of 2020 and beyond. Through 5G, it is expected to shape a fully mobile and fully connected society, and promote social and economic reforms in many aspects that are unimaginable today, such as production efficiency and sustainability. development etc. The properties that 5G must deliver include: greater throughput, ultra-low latency, extreme reliability, higher connection density, and higher mobility range. This enhanced performance is expected to provide the ability to operate in highly heterogeneous network environments and ensure security, trust, identity and privacy. [0003] The evolution of Long Term...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30H04L9/32H04L29/06
CPCH04L9/30H04L9/3247H04L63/0428H04L63/06H04L63/083H04L63/0876
Inventor 刘福文彭晋左敏庄小君
Owner CHINA MOBILE COMM LTD RES INST