Check patentability & draft patents in minutes with Patsnap Eureka AI!

A method for SEPP authentication NF in 5G core network

A core network, 5G technology, applied in the field of SEPP authentication NF in the 5G core network, can solve the problems of illegal manipulation, NF data leakage, etc., to achieve the effect of enhancing security and protecting NF data

Active Publication Date: 2021-11-02
IPLOOK NETWORKS CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a method for SEPP authentication of NF in the 5G core network, which can solve the problem in the prior art that illegal NF accesses the inside of the PLMN, causing data leakage or illegal manipulation of the NF inside the PLMN

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for SEPP authentication NF in 5G core network
  • A method for SEPP authentication NF in 5G core network
  • A method for SEPP authentication NF in 5G core network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Embodiments of the present disclosure will be described in detail below in conjunction with the accompanying drawings.

[0029] Embodiments of the present disclosure are described below through specific examples, and those skilled in the art can easily understand other advantages and effects of the present disclosure from the contents disclosed in this specification. Apparently, the described embodiments are only some of the embodiments of the present disclosure, not all of them. The present disclosure can also be implemented or applied through different specific implementation modes, and various modifications or changes can be made to the details in this specification based on different viewpoints and applications without departing from the spirit of the present disclosure. It should be noted that, in the case of no conflict, the following embodiments and features in the embodiments can be combined with each other. Based on the embodiments in the present disclosure, a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for SEPP authentication of NF in a 5G core network: when the security edge protection agent pSEPP of the service provider receives a service request message, it performs legality authentication on the network function cNF of the service consumer that sends the service request message ; If the legality authentication is passed, the security edge protection proxy pSEPP of the service provider forwards the service request message to the corresponding network function pNF of the service provider to process the service request; otherwise, the service request message is discarded. The present invention effectively prevents malicious applications from illegally masquerading as the cNF of the service consumer by authenticating the cNF of the service consumer that sends the service request message, and then transmits control plane messages to the network function pNF in the pPLMN of the service provider, protecting The NF data inside the pPLMN of the service provider is protected, and the security of the PLMN in the 5G core network is enhanced.

Description

technical field [0001] The invention relates to the technical field of mobile communication, in particular to a method for SEPP authentication of NF in a 5G core network. Background technique [0002] In the 5G 3GPP standard, in order to strengthen the internal security of each public land mobile network (hereinafter referred to as PLMN), a security edge protection proxy (hereinafter referred to as SEPP) is added. SEPP is to ensure the security of control plane messages between 5G network functions (hereinafter referred to as NFs) across PLMNs, so as to protect the security of the PLMN network where SEPP is located from external attacks. [0003] In the TS 3GPP 33501-g30 protocol specification, the functions and requirements of SEPP are specified in detail, but the authentication and authorization between SEPP and NF only stay at the network layer and physical layer under the PLMN ID and application layer. Data identification does not authenticate whether the NF subject exi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L29/06
CPCH04L67/10H04L67/1097H04L63/08H04L67/60
Inventor 邱权冠苏国章
Owner IPLOOK NETWORKS CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More