Supercharge Your Innovation With Domain-Expert AI Agents!

A method and device for selecting an authentication algorithm

An authentication algorithm and an authentication technology are applied in the field of selection methods and devices of authentication algorithms to achieve the effects of enriching selection and increasing probability

Active Publication Date: 2021-08-27
DATANG MOBILE COMM EQUIP CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The purpose of the present invention is to provide a method and device for selecting an authentication algorithm to solve the problem of authentication algorithm coordination and ensure that user equipment successfully accesses the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for selecting an authentication algorithm
  • A method and device for selecting an authentication algorithm
  • A method and device for selecting an authentication algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] The following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0065] refer to figure 1 As shown, in the embodiment of the present invention, the detailed process for selecting the authentication algorithm is as follows:

[0066] Step 100: the UE sends a NAS message to the AMF, the NAS carrying the first set of authentication algorithms supported by the UE.

[0067] Specifically, in the embodiment of the present invention, the UE sends an access request (Network Access Security, NAS) message to a mobility...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the communication field, in particular to a method and device for selecting an authentication algorithm. It is used to solve the negotiation problem of the authentication algorithm and ensure that the UE successfully passes the authentication service and successfully accesses the network. Support the first intersection of the second set of authentication algorithms used, and send the first intersection to the UDM, triggering the UDM to select the second set of authentication algorithms used by the UE based on the first intersection and the second intersection of the third set of authentication algorithms Target authentication algorithm. In this way, when the authentication algorithm supported by the UE is not exactly the same as the authentication algorithm selected by the UDM, the appropriate target authentication algorithm can be selected through negotiation between the UE and the UDM, which effectively solves the problem that the UE replaces the ME or the ME supports multiple authentication methods. In the case of the authentication algorithm, it is easy to cause authentication failure, which enriches the selection of authentication algorithms and ensures that the UE can successfully access the network.

Description

technical field [0001] The invention relates to the communication field, in particular to a method and device for selecting an authentication algorithm. Background technique [0002] With the rapid development of mobile communication technology, a variety of authentication algorithms are defined in the fifth generation mobile communication system (Fifth Generation, 5G) next generation core network (Next Generation Core, NGC), for example, the third generation partnership project ( The Third Generation Partnership Project (3GPP) standard stipulates that the authentication methods that must be supported include the improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA') and 5G-Authentication and Key Agreement (5G-Authentication and Key Agreement, 5G-AKA) 5G-AKA. Various other methods, such as Extensible Authentication Protocol Method for Subscriber Identity Module (EAP-SIM), Extensible Authentication Protocol Method fo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W12/08H04W12/40H04W48/08H04L29/08
CPCH04W12/06H04W12/08H04W48/08H04W68/005H04L67/02
Inventor 吴鹏程
Owner DATANG MOBILE COMM EQUIP CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More