Supercharge Your Innovation With Domain-Expert AI Agents!

Base station authentication method and device

An authentication method and authentication device technology, applied in the field of base station authentication methods and devices, can solve problems such as lack of security authentication, communication network security threats, etc., and achieve the effect of ensuring security

Active Publication Date: 2020-06-05
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] For this reason, the present invention provides a base station authentication method and device to solve the lack of security authentication of the base station to be accessed by the base station in the existing way of terminal access to the base station, resulting in hackers using false identity terminal nodes to access the base station, which in turn leads to the entire Threats to Communication Network Security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Base station authentication method and device
  • Base station authentication method and device
  • Base station authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0056]The base station authentication method and device provided in this embodiment, considering the lack of security authentication for the access terminal by the base station in the current method of terminal access to the base station, it is easy to cause hackers to use false identity terminal nodes to access the base station and launch an attack on the communication network. , so that before the terminal accesses the base station, the base station first authenticates the reliability and legitimacy of the terminal to be accessed, and the terminal accesses the base station only after the terminal passes the authentication.

[0057] figure 1 This is a flowchar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a base station authentication method and device, and belongs to the technical field of communication. The base station authentication method comprises the steps: broadcasting acredibility evaluation request to a blockchain network, wherein the credibility evaluation request comprises a blockchain identifier of a current micro base station, a blockchain identifier of a terminal, a terminal mobile phone number and deadline; receiving a credible evaluation result returned by the micro base station except the current micro base station in the blockchain network and a blockchain identifier of the micro base station, the credible evaluation result comprises a credible evaluation value of homomorphic encryption, and the credible evaluation value is a numerical value obtained based on a historical connection record of the micro base station and the terminal mobile phone number; calculating a credible evaluation average value based on the credible evaluation result, anddetermining whether to allow the terminal to access according to the credible evaluation average value. According to the base station authentication method, the reliability and legality of the to-be-accessed terminal of the micro base station are verified, and the security of a communication network can be ensured to a certain extent.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a base station authentication method and device. Background technique [0002] With the development of communication network technology, the speed of network upgrading is getting faster and faster, and mobile communication technology has also developed from the first generation of mobile communication technology in the 1980s to the fifth generation of mobile communication technology today. People have entered the 5G (5th-Generation) communication era. Compared with previous generations of mobile communication technologies, the data transmission speed and data transmission quality in 5G mobile communication technology have been greatly improved, thereby improving user perception. However, in addition to paying attention to data transmission speed and transmission quality, people are also increasingly aware of the importance of communication security. Therefore, op...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/08H04W12/12H04L29/06H04L29/08H04L9/32H04L9/00H04W12/121
CPCH04W12/08H04W12/12H04L63/0876H04L67/104H04L9/3247H04L9/008H04W12/068H04L9/50
Inventor 田新雪肖征荣马书惠杨子文董慧
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More