Supercharge Your Innovation With Domain-Expert AI Agents!

Routing method, device and system

A routing and configuration modification technology, applied in the field of communication, can solve problems such as lack of flexibility and inability to adapt to 5G business requirements

Active Publication Date: 2019-06-04
HUAWEI TECH CO LTD
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this static configuration method lacks flexibility, and in many scenarios of 5G networks, it cannot adapt to the rich business requirements of 5G

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Routing method, device and system
  • Routing method, device and system
  • Routing method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0082] First of all, the technical terms involved in the embodiment of this application are given:

[0083] SUPI: The user identity in 5G is used to represent the real identity of the user, and its function is similar to the IMSI in LTE.

[0084] SUCI: In 5G, in order to avoid the problem that plaintext SUPI is easily stolen by attackers, SUPI is encrypted with a public key, and the encrypted ciphertext forms SUCI. Subsequently, the network-side device can use the private key paired with the encrypted public key to decrypt the SUCI to obtain the SUPI, so as to know the real identity of the user. Such as figure 1 As shown, it is the structure of SUCI defined in 3GPP 23.003. Among them, the SUCI includes a 3-digit mobile country code (mobile country code, MCC), a 3-digit mobile network code (mobile network code, MNC) and RI, and the MCC is used to address the country where the user belongs to the UDM. The MNC is used to address the network to which the user's UDM belongs (for e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a routing method, device and system, relates to the technical field of communication, and can solve the problem that when a user migrates to a new user unified data management network element (UDM), if a routing instruction in a user hidden identifier changes, the routing instruction in the user hidden identifier is updated. The method comprises the following steps: an authentication server function (AUSF) network element sends a first authentication vector acquisition request to a first unified data management (UDM) network element, and if the AUSF network element receives a routing indication (RI) sent by the first UDM network element, the AUSF network element sends the RI to an access and mobility management function (AMF) network element. The method is applied tothe RI updating process of the terminal.

Description

technical field [0001] The present application relates to the technical field of communications, and in particular to a routing method, device and system. Background technique [0002] Usually, in order to ensure the security of the network and the terminal, when the terminal accesses the network, two-way authentication is required between the network and the terminal, that is, the network needs to verify the legitimacy of the terminal, and the terminal also needs to verify the security of the network. In a Long Term Evolution (LTE) network, before the two-way authentication is completed, when the security context has not been established between the terminal and the network side, the user's International Mobile Subscriber Identifier (IMSI) is in plain text on the air interface As a result, the attacker can obtain the IMSI from the air interface to carry out a series of attacks. [0003] The fifth generation (5th-Generation, 5G) mobile communication technology uses the encr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W40/02H04W12/106
CPCH04W40/02H04W12/06
Inventor 李华张博
Owner HUAWEI TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More