Supercharge Your Innovation With Domain-Expert AI Agents!

Authentication algorithm selection method and device

An authentication algorithm and authentication technology, applied in the field of authentication algorithm selection method and device

Active Publication Date: 2020-03-17
DATANG MOBILE COMM EQUIP CO LTD
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The purpose of the present invention is to provide a method and device for selecting an authentication algorithm to solve the problem of authentication algorithm coordination and ensure that user equipment successfully accesses the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication algorithm selection method and device
  • Authentication algorithm selection method and device
  • Authentication algorithm selection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] The following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0065] refer to figure 1 As shown, in the embodiment of the present invention, the detailed process for selecting the authentication algorithm is as follows:

[0066] Step 100: the UE sends a NAS message to the AMF, the NAS carrying the first set of authentication algorithms supported by the UE.

[0067] Specifically, in the embodiment of the present invention, the UE sends an access request (Network Access Security, NAS) message to a mobility...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of communication, in particular to an authentication algorithm selection method and device. The invention used for solving the negotiation problem of an authentication algorithm and ensures UE smoothly passes the authentication service and gets access to network. The method comprises the following steps of: enabling an AUSF to obtain a first authentication algorithm set used by the UE; and extracting a first intersection of the first authentication algorithm set and a second authentication algorithm set which is locally supported to be used, sending the firstintersection to the UDM, triggering the UDM to select a target authentication algorithm used by the UE based on the first intersection and a second intersection of the third authentication algorithmset. Thus, when the authentication algorithm supported by the UE is not completely the same as the authentication algorithm selected by the UDM, the UDM selects the authentication algorithm. Accordingto the embodiment of the invention, the proper target authentication algorithm can be selected through negotiation between the UE and the UDM, the problem of authentication failure easily caused under the condition that the UE changes the ME or the ME supports multiple authentication algorithms is effectively solved, the selection of the authentication algorithms is enriched, and the UE is ensured to successfully access the network.

Description

technical field [0001] The invention relates to the communication field, in particular to a method and device for selecting an authentication algorithm. Background technique [0002] With the rapid development of mobile communication technology, a variety of authentication algorithms are defined in the fifth generation mobile communication system (Fifth Generation, 5G) next generation core network (Next Generation Core, NGC), for example, the third generation partnership project ( The Third Generation Partnership Project (3GPP) standard stipulates that the authentication methods that must be supported include the improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA') and 5G-Authentication and Key Agreement (5G-Authentication and Key Agreement, 5G-AKA) 5G-AKA. Various other methods, such as Extensible Authentication Protocol Method for Subscriber Identity Module (EAP-SIM), Extensible Authentication Protocol Method fo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/06H04W12/08H04W48/08H04W68/00H04L29/08
CPCH04W12/06H04W12/08H04W48/08H04W68/005H04L67/02
Inventor 吴鹏程
Owner DATANG MOBILE COMM EQUIP CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More