Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method for triggering network authentication and related devices

A network device and network authentication technology, applied in the field of triggering network authentication, can solve problems such as terminal security threats, achieve convenient and fast decryption, avoid stealing or tampering, and ensure security

Inactive Publication Date: 2019-02-26
HUAWEI TECH CO LTD
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problem in the prior art that when the authentication process is triggered, the terminal provides the permanent identity to the AMF entity without encrypting the security of the terminal.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for triggering network authentication and related devices
  • Method for triggering network authentication and related devices
  • Method for triggering network authentication and related devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] The embodiments of the present application will be further described in detail below in conjunction with the accompanying drawings.

[0074]Before explaining the embodiment of the present application in detail, the application scenarios involved in the embodiment of the present application will be introduced first. Currently, a terminal can access a network through a 3GPP technology or a non-3GPP technology. Among them, 3GPP technology refers to the air interface technology formulated by 3GPP standards. For example, the air interface access technology of our commonly used 3G, 4G and 5G networks is 3GPP technology. The non-3GPP technology refers to an air interface access technology not formulated by the 3GPP standard, for example, an air interface technology represented by wireless fidelity access point (WIFI AP). When a terminal accesses a 5G network, whether it is accessed through 3GPP technology or non-3GPP technology, the terminal needs to send an attach message ca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a method for triggering network authentication and related devices, and belongs to the field of communication technologies. The method includes that: a first networkdevice receives a first message from a terminal, wherein the first message carries first identity information and identity information, the first identity information is obtained in a way that the terminal encrypts identity information of the permanent identity of the terminal based on a public key, and the identity information is used for identifying whether the first identity information is encrypted identity information and / or an encryption mode of the first identity information; the first network device sends a second message to a first security function entity based on the first identityinformation, and the second message is used to trigger authentication on the terminal, wherein the second message carries the identifier information. The present application provides a scheme for triggering an authentication process when encrypting identity information, and since the identity information sent by the terminal to the first network device is encrypted identity information, the identity information is prevented from being stolen or tampered during the transmission process so as to ensure the security of the terminal.

Description

technical field [0001] The present application relates to the field of communication technologies, and in particular to a method for triggering network authentication and related equipment. Background technique [0002] Currently, a terminal can access a network through a 3GPP technology or a non-3GPP technology. Among them, when the terminal accesses the 5G network and registers for the first time, whether it is accessed through 3GPP technology or through non-3GPP technology, the terminal needs to send an attach message carrying permanent identity information to the core network equipment, so that the core network The device triggers an authentication process according to the attach message, thereby authenticating the terminal. [0003] In related technologies, when a terminal accesses a 5G network and registers for the first time, the terminal can connect to the core network through a next-generation base station (next generation node basestaion, gNB) or a non-3GPP interw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/06H04W12/02
CPCH04W12/02H04W12/06H04L9/3226H04L2209/80H04L9/30H04L63/08H04L9/32
Inventor 李赫陈璟李欢吴义壮
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products