Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

AMF based on MEC and identity authentication method, construction method and device thereof

An identity authentication and two-way authentication technology, applied in the field of mobile communications, can solve the problems of ineffective reduction of access authentication delay and inefficiency, and achieve the effect of avoiding network congestion and reducing signaling overhead

Active Publication Date: 2020-10-02
北京东方通网信科技有限公司
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In order to solve the existing authentication and key agreement (AKA) standard, there is a large amount of signaling overhead when multiple MEC users request access authentication from the same service network at the same time, and when the same terminal authenticates the same service network multiple times Inefficiency of the authentication process; this disclosure solves the technical problem that the user’s access authentication delay cannot be effectively reduced in the above communication scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • AMF based on MEC and identity authentication method, construction method and device thereof
  • AMF based on MEC and identity authentication method, construction method and device thereof
  • AMF based on MEC and identity authentication method, construction method and device thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0077] Such as figure 1 As shown, a MEC-based AMF entity identity authentication method includes:

[0078] S101: The AMF entity built on the edge physical infrastructure receives an identity authentication request sent by at least one terminal;

[0079] Among them, the AMF entity is constructed as follows:

[0080] Select edge physical infrastructure;

[0081] Leverage NFV to build AMF entities on edge physical infrastructure;

[0082] Calculate the network element security value of the AMF entity in real time;

[0083] When the network element security value of the AMF entity does not meet the predetermined requirement, replace the edge physical infrastructure on which the AMF entity is constructed until the network element security value of the AMF entity meets the predetermined requirement.

[0084] Such as figure 2 AMF entities are shown built on edge physical infrastructure (i.e. figure 2 "Edge AMF") network architecture.

[0085] MEC uses the computing and stora...

Embodiment 2

[0133] Such as Figure 4 As shown, Embodiment 1 of the present disclosure can also be improved as follows:

[0134] The method also includes:

[0135] S105: When the two-way authentication fails, the AMF entity reselects a terminal from the at least one terminal as a two-way authentication terminal; and performs two-way authentication on the reselected two-way authentication terminal.

Embodiment 3

[0137] Based on the same inventive idea as in Embodiment 1, as Figure 5 As shown, the present disclosure also provides a MEC-based AMF entity, including:

[0138] An authentication request receiving module 100, configured to receive an identity authentication request sent by at least one terminal;

[0139] An authentication selection module 200, configured to select a terminal from the at least one terminal as a two-way authentication terminal;

[0140] A two-way authentication module 300, configured to perform two-way authentication with the two-way authentication terminal;

[0141] The one-way authentication module 400 is configured to use the successful result of the two-way authentication to perform one-way authentication on other terminals in the at least one terminal except the two-way authentication terminal.

[0142] Among them, the AMF entity is constructed as follows:

[0143] Select edge physical infrastructure;

[0144] Leverage NFV to build AMF entities on ed...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an AMF based on MEC and an identity authentication method, construction method and device thereof. The identity authentication method comprises the steps that an AMF entity receives an identity authentication request sent by at least one terminal; the AMF entity selects one terminal from the at least one terminal as a two-way authentication terminal; the AMF entity performstwo-way authentication with the bidirectional authentication terminal; the AMF entity performs one-way authentication on other terminals except the two-way authentication terminal in the at least oneterminal by using the success result of the two-way authentication, wherein the AMF entity is constructed according to the following mode: selecting edge physical infrastructure and constructing an AMF entity on the edge physical infrastructure by using network function virtualization (NFV). Conventional authentication and key agreement standards are simplified, and low-delay secure access authentication is performed on the terminals based on edge computing in the scene that the plurality of terminals authenticate the same service network at the same time, so that signaling overhead is reduced, and network congestion is avoided.

Description

technical field [0001] The present disclosure relates to the technical field of mobile communication, and more specifically, the present disclosure relates to an MEC-based AMF and its identity authentication method, construction method and device. Background technique [0002] 5G has three typical application scenarios, namely eMBB (enhanced Mobile Broadband) that supports mobile Internet services, mMTC (massiveMachine-type Communications) that supports IoT services, and high-reliability and low-latency communications Scenario uRLLC (ultra Reliable LowLatency Communications). Different application scenarios have different requirements for network performance. [0003] In application scenarios that require low latency, Multi-Access Edge Computing (MEC) technology, as an evolution of cloud computing, can move applications from centralized data centers to the edge of the network and access the network through wireless Provide users with nearby mobile services. MEC technology...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04L9/32
CPCH04L9/3273H04L2209/80H04W12/06
Inventor 崔婷婷厉芸张雪菲陈乔肖丽
Owner 北京东方通网信科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products