Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for authenticating UE during interoperation from EPS to 5GS

A 5GS and interoperable technology, applied in the field of interoperability between EPS and 5GS, can solve the problems of waste of air interface resources, increase module coupling, etc., achieve the effects of reducing coupling, ensuring network security, and reducing message length

Active Publication Date: 2020-05-29
SPREADTRUM COMM (SHANGHAI) CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006]Since the 4G NAS TAU request message is carried in the 5G NAS message, the UE needs to consider how to obtain or construct the TAU request message in the 5G NAS message. The TAU request message contains the mandatory fields and optional fields, and some fields such as GUTI (Globally Unique Temporary UE Identity, Globally Unique Temporary UE Identity), UE networkcapability (data transmission capability supported by UE), etc. are longer in length. After these fields are sent to MME, MME will not Parsing does not care about the specific content of these fields. Therefore, carrying these fields will not only cause a waste of air interface resources, but also use 4G NAS messages in the 5G NAS module, which greatly increases the coupling between modules.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for authenticating UE during interoperation from EPS to 5GS
  • Method and system for authenticating UE during interoperation from EPS to 5GS
  • Method and system for authenticating UE during interoperation from EPS to 5GS

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058] Optionally, as in figure 2 As shown, in this embodiment, the UE mainly carries the first source information and the encrypted information in the registration request message, or only carries the encrypted information; then the MME decrypts the encrypted information in the same way after receiving it, and performs Compare and verify, if they are consistent, the UE is successfully authenticated.

[0059] Wherein, the encrypted information can be derived by presetting the derived key, or using a key generation algorithm to generate a derived key for encryption, and the input is parameter 1 to parameter n, and the number and specific content of the input parameters can be set as required. Then, use the derived key and the encryption algorithm to encrypt the first source information, and output the encrypted information (first encrypted information RES, first encrypted information).

[0060] Optionally, the UE sending the encryption information, or the encryption informati...

Embodiment 2

[0077] Such as Figure 6 As shown, the method described in this embodiment authenticates the UE through the MME performing an integrity check on the second source information, that is, the UE carries the second source information and the MAC (the first integrity of the second source information) in the registration request message. verification result). After receiving it, the MME uses the same method to generate a MAC (second integrity check result) for the second source information, and compares and verifies it with the MAC (first integrity check result) on the UE side, and authenticates if they are consistent UE succeeded.

[0078] Optionally, sending the second source information carried by the UE in the 5GS registration request message and the first integrity check result corresponding to the second source information obtained through a preset algorithm to the MME via the AMF includes:

[0079] The random number RAND generated by the UE is used as the second source info...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and system for authenticating UE during interoperation from EPS to 5GS. The method comprises the steps that UE carries encrypted information in 5GS registration requestinformation, or the encrypted information and first source information are sent to an MME through an AMF, then the MME decrypts the encrypted information to obtain decrypted information and the decrypted information is compared and verified with the first source information of the UE to complete UE authentication, or the UE carries second source information in the 5GS registration request message, obtains a first integrity check result corresponding to the second source information through a preset algorithm and sends the first integrity check result to the MME through the AMF, and then the MME obtains a second integrity check result corresponding to the second source information through a preset algorithm according to the obtained second source information and compares the second integrity check result with the first integrity check result to complete UE authentication. According to the invention, air interface resources can be saved, network burden and coupling between modules are effectively reduced, and efficient integration of 4G and 5G networks is promoted.

Description

technical field [0001] The present invention relates to the technical field of interoperability between EPS and 5GS, and in particular to a method and system for authenticating UE during interoperation from EPS to 5GS. Background technique [0002] Currently, the 5G (5th-Generation, fifth-generation mobile communication technology) protocol is being formulated, among which is the interoperability between 5GS (5G System, 5G System) and EPS (Evolved Packet System, Evolved Packet System). The concept of registration mode is introduced. The registration mode in 5G is divided into two types: single registration and dual registration. In single registration mode, UE (User Equipment, user equipment) maintains a single registration state in 5GS and EPS. In dual registration mode, UE maintains a single registration state in 5GC (5G core network, 5G core network). and EPC (Evolved Packet Core, the all-IP packet core network is the 4G core network) to maintain their own independent re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02H04W12/04H04W12/06H04W12/10H04W36/00H04W36/14H04W12/041H04W12/0431H04W12/108
CPCH04W12/02H04W12/04H04W12/06H04W12/10H04W36/0022H04W36/0038H04W36/0066H04W36/14
Inventor 陈伟金逸
Owner SPREADTRUM COMM (SHANGHAI) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products