Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Network authentication method, network device, terminal device and storage medium

A technology of terminal equipment and network equipment, applied in the field of communication, can solve the problems of network authentication efficiency, long network authentication chain, HSS load pressure and other problems

Active Publication Date: 2022-04-22
HUAWEI INT
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the one hand, this centralized storage has caused severe load pressure on the HSS; on the other hand, the network authentication process requires the interaction between the terminal device, MME, and HSS to be realized, resulting in a long network authentication chain, resulting in The Problem of Network Authentication Efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network authentication method, network device, terminal device and storage medium
  • Network authentication method, network device, terminal device and storage medium
  • Network authentication method, network device, terminal device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0121] The terminal devices involved in this application can be called Internet of things (IoT) devices, and the terminal devices can be computers, mobile phones, printers, refrigerators, robots, sensors, electricity meters, water meters, etc., which can be connected to IoT terminal equipment.

[0122]The network device involved in this application is a device that can perform network authentication with a terminal device. The network device may be an access network device, such as a Base Transceiver Station (BTS) in Global System of Mobile communication (GSM for short) or Code Division Multiple Access (CDMA for short). In , it may also be a base station (NodeB, NB) in Wideband Code Division Multiple Access (WCDMA for short), or an evolved NodeB in a Long Term Evolution (Long Term Evolution, LTE) network, An eNB for short), an access point (Access Point, AP) or a relay station, may also be a base station in a 5G network or a new generation of wireless access technology (New R...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provides a network authentication method, network equipment, terminal equipment and storage media. On the one hand, in this application, the network device generates a symmetric key by itself, and generates the correct serial number of the terminal device in real time through the first serial number. That is to say, in this application, the network device does not need to store the symmetric key and the correct serial number of the terminal device, but generates the symmetric key in real time and determines the correct serial number of the terminal device to be generated in real time. Therefore, the storage load of the HSS in the prior art can be reduced, and since the terminal device and the network device do not need to perform network authentication between the terminal device and the network device, the network authentication chain can be shortened, thereby improving the network authentication efficiency. On the other hand, in this application, the first network device acquires the identity of the terminal device, and based on this, determines the target network authentication method to be adopted between the network side device and the terminal device, and then sends instruction information to the second network device for instructing The target network authentication method. Therefore, the present application also solves the problem of notifying the network device which network authentication method is adopted.

Description

technical field [0001] The present application relates to the technical field of communications, and in particular to a network authentication method, network equipment, terminal equipment and storage media. Background technique [0002] The Internet of Things (IoT) is an important application scenario of the fifth-generation mobile communication technology (5th-Generation, 5G). The terminal equipment in the IoT needs to perform network authentication when accessing the 5G network. figure 1 It is a schematic diagram of interaction of terminal equipment performing network authentication in the prior art, and the authentication process is as follows: [0003] Step S101: the terminal device sends a network access request to a mobility management entity (Mobility Management Entity, MME). Step S102: the MME sends a network access data request to a Home Subscriber Server (HSS). Step S103: The HSS receives the network access data request and determines the symmetric key K corresp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/041H04W12/06H04W12/084H04L9/32H04W88/18
CPCH04L9/32H04W12/06H04W88/18H04L63/123H04W56/0015H04L63/0435H04L63/0823H04W8/02H04W56/001H04W12/041H04W12/69H04W12/0431
Inventor 康鑫王海光雷中定刘斐
Owner HUAWEI INT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products