Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for authenticating NF by SEPP in 5G core network

A core network and 5G technology, applied in the field of SEPP authentication NF in the 5G core network, it can solve the problems of NF data leakage and illegal manipulation, and achieve the effect of enhancing security and protecting NF data.

Active Publication Date: 2020-11-27
IPLOOK NETWORKS CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a method for SEPP authentication of NF in the 5G core network, which can solve the problem in the prior art that illegal NF accesses the inside of the PLMN, causing data leakage or illegal manipulation of the NF inside the PLMN

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for authenticating NF by SEPP in 5G core network
  • Method for authenticating NF by SEPP in 5G core network
  • Method for authenticating NF by SEPP in 5G core network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Embodiments of the present disclosure will be described in detail below in conjunction with the accompanying drawings.

[0032] Embodiments of the present disclosure are described below through specific examples, and those skilled in the art can easily understand other advantages and effects of the present disclosure from the contents disclosed in this specification. Apparently, the described embodiments are only some of the embodiments of the present disclosure, not all of them. The present disclosure can also be implemented or applied through different specific implementation modes, and various modifications or changes can be made to the details in this specification based on different viewpoints and applications without departing from the spirit of the present disclosure. It should be noted that, in the case of no conflict, the following embodiments and features in the embodiments can be combined with each other. Based on the embodiments in the present disclosure, a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for authenticating an NF by an SEPP in a 5G core network. The method comprises the following steps of: when a pSEPP of a service supply side receives a service requestmessage, carrying out legality authentication on a network function cNF of a service consumer side sending the service request message; if the legality authentication is passed, forwarding the service request message to the network function pNF of the corresponding service supply side for service request processing by the security edge protection proxy pSEPP of the service supply end; otherwise,discarding the service request message. According to the method, the legality of the cNF of the service consumer side sending the service request message is authenticated, malicious applications are effectively prevented from being illegally disguised as the cNF of the service consumer side and further transmitting a control plane message to a network function pNF in the service supply side pPLMN,the NF data in the service supply side pPLMN is protected, and the security of the PLMN in the 5G core network is enhanced.

Description

technical field [0001] The invention relates to the technical field of mobile communication, in particular to a method for SEPP authentication of NF in a 5G core network. Background technique [0002] In the 5G 3GPP standard, in order to strengthen the internal security of each public land mobile network (hereinafter referred to as PLMN), a security edge protection proxy (hereinafter referred to as SEPP) is added. SEPP is to ensure the security of control plane messages between 5G network functions (hereinafter referred to as NFs) across PLMNs, so as to protect the security of the PLMN network where SEPP is located from external attacks. [0003] In the TS 3GPP 33501-g30 protocol specification, the functions and requirements of SEPP are specified in detail, but the authentication and authorization between SEPP and NF only stay at the network layer and physical layer under the PLMN ID and application layer. Data identification does not authenticate whether the NF subject exi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06
CPCH04L67/10H04L67/1097H04L63/08H04L67/60
Inventor 邱权冠苏国章
Owner IPLOOK NETWORKS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products