Check patentability & draft patents in minutes with Patsnap Eureka AI!

Method for encrypting authentication failure plaintext information in 5G security protocol

A technology of plaintext information and authentication failure, applied in the field of communication, can solve problems such as poor security

Pending Publication Date: 2021-11-02
SHENZHEN POWER SUPPLY BUREAU
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to propose an encryption of authentication failure plaintext information in the 5G security protocol, and solve the technical problem of poor security caused by sending plaintext information of authentication failure in the prior art when verification fails

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for encrypting authentication failure plaintext information in 5G security protocol
  • Method for encrypting authentication failure plaintext information in 5G security protocol
  • Method for encrypting authentication failure plaintext information in 5G security protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0039] Such as figure 1 As shown, the authentication process of the 5G AKA security authentication protocol is as follows:

[0040] 1) The home network HN generates the security authentication vector AV(RAND, AUTN, HXRES*, K AUSF ), and then send the authentication vector to the service network SN;

[0041] 2) The SN sends the two parameters RAND and AUTN in the AV, and the remaining two parameters ngKSI and ABBA in the combined authentication, and sends these information to the UE;

[0042] 3) UE performs message authentication code MAC verification and synchronization sequence number SQN verification. If both MAC and SQN are verified, it calculates and generates a response code RES* and sends it to SN, and then sends it to HN for two-way verification;

[0043...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for encrypting authentication failure plaintext information in a 5G security protocol, which comprises the following steps: S1, a service network sends an authentication request message to terminal equipment, wherein the terminal equipment verifies the authentication request message to generate a verification result, wherein the verification result comprises success or failure; S2, when the verification result is failure, the terminal equipment generates plaintext information and generates a random encryption value through a preset random function and a serial number of the terminal equipment, and encrypts the plaintext information according to the random encryption value; and S3, the terminal equipment sends the encrypted plaintext information to the service network. According to the invention, the effect of protecting plaintext information which fails in 5G security protocol authentication is realized.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to an encryption method for authentication failure plaintext information in a 5G security protocol. Background technique [0002] With the rapid development of information technology and mobile communication technology, mobile communication technology has gradually become an important part of our daily life. Our current mobile devices rely on the development and application of mobile communication technology when connecting to the Internet. From the previous 3G technology to 4G technology, we know that 4G technology has largely promoted the development of the mobile Internet, and has given birth to many emerging Internet industries. 4G has been developed and applied for many years. On this basis, 5G has emerged as the times require. 5G is developing rapidly in China and even the whole world with its characteristics of faster speed, larger bandwidth, and Internet of Everything...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/03H04W12/06H04W12/10
CPCH04W12/03H04W12/06H04W12/10
Inventor 车向北李曼欧阳宇宏林子钊康文倩
Owner SHENZHEN POWER SUPPLY BUREAU
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More