Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for enhancing cross-network access security, device thereof and system

A cross-network and network technology, applied in the field of communication, can solve problems such as attacks and burdens, and achieve the effects of reducing communication load, ensuring network security, and enhancing access security

Active Publication Date: 2020-07-28
HUAWEI TECH CO LTD
View PDF9 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If a malicious UE continues to initiate an authentication request to the second network through the first network even though it cannot pass the authentication of the second network, it will cause a great burden on the networks of the first network and the second network
If a large number of UEs are captured and at the same time frequently initiate authentication requests to the second network, it is easy to cause distributed denial of service (distributed denial of service, DDoS) attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for enhancing cross-network access security, device thereof and system
  • Method for enhancing cross-network access security, device thereof and system
  • Method for enhancing cross-network access security, device thereof and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application. Among them, in the description of this application, unless otherwise specified, " / " indicates that the objects associated with each other are an "or" relationship, for example, A / B can indicate A or B; in this application, "and / or "It is just an association relationship describing associated objects, which means that there can be three kinds of relationships, for example, A and / or B, which can mean: A exists alone, A and B exist at the same time, and B exists alone. , B can be singular or plural. And, in the description of the present application, unless otherwise specified, "plurality" means two or more than two. "At least one of the following" or similar expressions refer to any combination of these items, including any combination of single or plural items. For example, at least one item (piece) ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a method for enhancing cross-network access security, a device thereof and a system. In a scenario in which a UE accesses a second network through a first network, according to the embodiment of the invention, the security event (such as the authentication condition) of the UE is recorded in the second network, and the decision result is determined for thesubsequent behavior of the UE; and the first network of the decision result is notified, so that the first network performs security processing on subsequent behaviors of the UE for the second network, and security linkage of the first network and the second network is realized. The malicious UE is managed near the first network, the communication load of the first network and the second network is reduced, and the network security of the second network is guaranteed.

Description

technical field [0001] The present application relates to the technical field of communications, and in particular to a method, device and system for enhancing cross-network access security. Background technique [0002] In order to meet the communication needs of vertical industries, 5G communication technology supports Non-Public Networks (NPN). Only authorized users can access the non-public network, and authorized users can access both the NPN network and the public land mobile network (PLMN) network. 5G communication technology supports features such as roaming, mobility, and service continuity of UEs between NPN and PLMN networks. For example, UEs can access non-public networks through PLMN networks, or access PLMN networks through non-public networks. [0003] In the existing mechanism, the NPN network is deployed based on the 5G system architecture. For the scenario where an authorized user can access both the NPN network and the PLMN network, credentials of the NP...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/08H04L29/06H04W28/08H04W12/06
CPCH04W12/08H04L63/10H04L63/1458H04W12/06H04L63/102H04L2463/142H04W12/71H04L67/14
Inventor 郭龙华李赫
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products