Unlock instant, AI-driven research and patent intelligence for your innovation.

A network authentication method and system

A network authentication, network technology, applied in the field of communication, can solve the problem of not providing

Inactive Publication Date: 2020-08-07
HUAWEI TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] It can be seen from the above description that the related art only provides a method for direct authentication with network equipment in the operator network when the UE accesses the operator network, and does not provide a method for UE access to the operator network and authentication method when the LTE-U network exists. Method for network authentication in LTE-U network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network authentication method and system
  • A network authentication method and system
  • A network authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0076] In order to make the purpose, technical solution and advantages of the present application clearer, the implementation manners of the present application will be further described in detail below in conjunction with the accompanying drawings.

[0077] Before explaining and describing the embodiments of the present invention in detail, the application scenarios of the embodiments of the present invention are firstly introduced. At present, organizations such as enterprises, hospitals, and government units can deploy their own network equipment in a certain area and use unlicensed spectrum in order to facilitate internal employee communication, or to push specific information and services to service users , communicate through deployed network devices, where the unlicensed spectrum may be the same spectrum as a Wireless Fidelity (WIreless-Fidelity, WIFI) spectrum. These networks, which are composed of network equipment deployed by third parties and use unlicensed spectrum...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application discloses a network authentication method and system, belonging to the technical field of communication. The method includes: when the MME of the LTE-U network receives the first attachment request, adding the network identifier of the LTE-U network to the first attachment request to generate a second attachment request, and sending it to the MME of the LTE network; The MME of the network sends an authentication data request carrying the network identifier of the LTE-U network and the network identifier of the LTE network to the HSS based on the second attach request; the HSS generates an authentication vector based on the authentication data request, and sends it to the MME: The MME of the LTE network interacts with the UE and the MME of the LTE-U network based on the authentication vector to implement network authentication. That is to say, through the method provided in this application, the UE can complete the authentication with the operator network and the LTE-U network at one time when accessing the operator network and the LTE-U network.

Description

technical field [0001] The present application relates to the field of communication technologies, and in particular to a network authentication method and system. Background technique [0002] An unlicensed (Long Term Evolution-Unlicensed, LTE-U) network based on long-term evolution refers to a network composed of network devices deployed by third parties in addition to network devices deployed by operators and users. For example, a hospital deploys LTE-U base station (Evolved Node B, eNB), LTE-U mobility management entity (Mobility Management Entity, MME), LTE-U gateway (Gateway, GW) and other network equipment within the hospital, These network devices constitute an LTE-U network, and user equipment (User Equipment, UE) within the scope of the hospital can communicate by accessing the LTE-U network. In order to ensure that the UE can use the network services provided by the operator network such as the Long Term Evolution (LTE) network while accessing the LTE-U network, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06
CPCH04W12/06
Inventor 李赫诸华林靳维生
Owner HUAWEI TECH CO LTD