Unlock instant, AI-driven research and patent intelligence for your innovation.

Network authentication method, device and system

A network authentication and service network technology, which is applied in the field of security countermeasures for attacking EPSAKA*, and can solve problems such as RES damage

Active Publication Date: 2019-11-19
HUAWEI TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Mismatches in the first half of the RES may reoccur due to corruption of the correct RES during transmission over the wireless interface
However, as stated in clause 5.2.4.22.3 of TR 33.899 [1], this is very rare

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network authentication method, device and system
  • Network authentication method, device and system
  • Network authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0078] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention. Apparently, the described embodiments are some, but not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0079] A method for reducing the attack will be described below.

[0080] method 1

[0081] An attacker's user equipment (user equipment, UE) changes a part of the RES corresponding to an expected user response (expected user response, XRES) that cannot be checked by the service network (service network, SN). For this, the attacker's UE must know which part of the XRES the SN received from the home network (HN). Therefore, to reduce attacks, the UE should not know which...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the communication field, in particular to a network authentication system. The system includes a user equipment (user equipment, UE), a service network (service network, SN) and a home network (home network, HN), where the HN is used to generate an expected user response (expected user response) based on the identifier of the UE. response, XRES) and generate an indication; send a part of the XRES and the indicator to the SN; the SN is used to receive a part of the XRES and the indication; receive a user response (user response) from the UE , RES); the SN is used to compare the RES with the XRES based on the indication; the SN is used to send a confirmation message to the HN when the comparison is successful.

Description

technical field [0001] The present invention relates to the communication field, in particular to a security countermeasure for attacking EPS AKA*. Background technique [0002] In the Long Term Evolution (LTE) scenario, the service network (service network, SN) rejects the Attach Request (Attach Request) of the User Equipment (User Equipment, UE), and then the International Mobile Subscriber Identity (IMSI) in the UE ( The location update (Update Location) message of the International Mobile Subscriber Identity, IMSI) is sent to the home network (home network, HN). Subsequently, the visited SN sends the charging record of the user with the IMSI to the HN, even though the visited SN does not provide any service to the roaming user. [0003] To reduce this type of fraud, 3GPP SA3 plans to adopt a new approach to the authentication and key agreement (AKA) procedure described in solution clause 2.22 "EPS AKA confirmed by UE authentication" in TR 33.899 [1]. Variants. This so...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W12/069
CPCH04W12/06
Inventor 菲利普·金兹伯格瓦特里·尼米张博
Owner HUAWEI TECH CO LTD