Unlock instant, AI-driven research and patent intelligence for your innovation.

Data processing method, visited network element and terminal equipment

A technology for visiting network and terminal equipment, applied in the field of visiting network elements and terminal equipment, and data processing methods, which can solve problems such as sending errors

Active Publication Date: 2020-10-13
HUAWEI TECH CO LTD
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in some scenarios, the home network side may issue wrong SUPI to the visited network side. For example, when performing authentication of the first terminal device, the AUSF on the home network side sends the SUPI of the second terminal device to the The SEAF on the visited network side, the SEAF on the visited network side generates a corresponding key according to the SUPI of the second terminal device, so that the SEAF on the visited network side cannot provide normal network services to the UE through the key. Therefore, there is an urgent need for a A method for enabling the visited network side to identify whether the SUPI issued by the home network side is wrong

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method, visited network element and terminal equipment
  • Data processing method, visited network element and terminal equipment
  • Data processing method, visited network element and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0094] The present application provides a data processing method, a network element of a visited network, and a terminal device, so that the visited network side can identify whether the second identity information issued by the home network side is wrong.

[0095] Embodiments of the present application are described below in conjunction with the accompanying drawings.

[0096] The terms "first", "second" and the like in the specification and claims of the present application and the above drawings are used to distinguish similar objects, and are not necessarily used to describe a specific sequence or sequence. It should be understood that the terms used in this way can be interchanged under appropriate circumstances, and this is merely a description of the manner in which objects with the same attribute are described in the embodiments of the present application. Furthermore, the terms "comprising" and "having", as well as any variations thereof, are intended to cover a non-e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a data processing method, a visited network element and terminal equipment, and by using the technical scheme provided by the embodiment of the invention, a visited network side can identify whether second identity information issued by a home network side is wrong or not. The method comprises the following steps: a visited network element receives a firstparameter sent by the terminal equipment; the visited network element receives second identity information sent by a home network element, wherein the second identity information is used for identifying the terminal equipment; the visited network element calculates the second identity information by using a hash algorithm to obtain a second parameter; and if the first parameter is not equal to the second parameter, the visited network element determines that the second identity information is wrong.

Description

technical field [0001] The present application relates to a communication system, in particular to a data processing method, a visited network element and a terminal device. Background technique [0002] In order to cope with the explosive growth of mobile data traffic, massive device connections, and emerging various new services and application scenarios, the fifth-generation mobile communication system (5th-generation, 5G) has emerged as the times require. 5G authentication and key agreement (5G-Authentication and Key Agreement, 5G-AKA) is a cryptographic protocol used to verify the authenticity of the identity of communicating entities in real time. [0003] In 5G-AKA, when the authentication server function (authentication server function, AUSF) of the home network side compares and judges the response value RES* sent by the terminal device and the expected response sent by the unified data management network element (united data management, UDM) The XRES* is the same,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04W12/00H04W12/06
CPCH04L9/3236H04W12/06
Inventor 李飞
Owner HUAWEI TECH CO LTD