Unlock instant, AI-driven research and patent intelligence for your innovation.

An authentication method and device based on an access node group

A technology of access nodes and authentication methods, which is applied in the directions of security devices, wireless communications, and electrical components, and can solve problems such as the inability to meet UE's fast and safe access to a centerless dynamic access node group.

Active Publication Date: 2022-05-06
DATANG MOBILE COMM EQUIP CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the future 5G system, especially in the UDN scenario or UUDN scenario, the security access authentication algorithm in the existing 4G network can no longer meet the UE's fast and secure access to a centerless dynamic access node group.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An authentication method and device based on an access node group
  • An authentication method and device based on an access node group
  • An authentication method and device based on an access node group

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In a UDN or UUDN network scenario, a terminal accesses a group of access nodes dynamically formed by access nodes. Due to the dynamic nature and decentralization of the access node group, the members in the access node group are mutually independent, diverse and self-sufficient in deployment, and one access node may belong to multiple access node groups, so illegal access cannot be ruled out. The joining of access nodes and the problem of counterfeiting of legal access nodes may carry out security attacks on terminals and network entities, such as the security threats brought about by terminals being hijacked and connected to illegal access nodes. Therefore, for a terminal to perform secure and reliable access, it is an essential prerequisite to form a secure and reliable access node group around the terminal.

[0029]The embodiment of this application proposes a security authentication mechanism for terminals to access decentralized access node groups, which can solve ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application discloses an authentication method and device based on an access node group. The method includes: the LSC receives a service request, and the service request is used to request a designated access node to provide services for a designated terminal; the LSC sends a block chain consensus calculation command to the designated access node, and receives The consensus result returned by the block chain consensus calculation command; LSC determines whether the designated access node is credible according to the consensus result, and adds the designated access node to serve as the Designate the access node group for which the terminal provides services, and send the group identifier of the access node group to the designated access node; select a preferred access node in the access node group, and trigger the preferred access node The node performs authentication with the specified terminal, and the authentication result of the authentication is propagated among the access nodes in the access node group based on the block chain propagation mechanism.

Description

technical field [0001] The present invention relates to the technical field of wireless communication, in particular to an authentication method and device based on an access node group. Background technique [0002] In the future network, the data traffic of mobile data services in hotspot areas is increasing rapidly, and the ultra-dense network (UDN) technology used to increase the density of access points (APs) per unit area is considered to be the solution to 5G Effective means for the rapid growth of mobile data traffic in hotspots in the network. In the UDN scenario, the number of access nodes may have a considerable density with the terminal (user equipment, UE, also called user equipment), which poses new challenges to the future 5G network architecture and security mechanism. [0003] The user-centric ultra-dense network (UUDN) is dedicated to organizing a group of access nodes to form a dynamically changing access node group (dynamic APsgroup, APG), which follows ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W12/08
CPCH04W12/06H04W12/08
Inventor 徐晖陈中林陈山枝
Owner DATANG MOBILE COMM EQUIP CO LTD