Unlock instant, AI-driven research and patent intelligence for your innovation.

Adaptive terminal authentication method and system based on APN (Access Point Name)

An adaptive terminal and authentication method technology, applied in the field of APN-based adaptive terminal authentication methods and systems, can solve problems such as security performance defects, and achieve the effects of enhancing flexibility, saving deployment costs, and expanding usage scenarios

Active Publication Date: 2022-01-11
STATE GRID FUJIAN ELECTRIC POWER CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are major flaws in the safety performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Adaptive terminal authentication method and system based on APN (Access Point Name)
  • Adaptive terminal authentication method and system based on APN (Access Point Name)
  • Adaptive terminal authentication method and system based on APN (Access Point Name)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0026] In this embodiment, an APN-based adaptive terminal authentication method is provided, including the following steps:

[0027] Step S1: The AKA core encryption algorithm Ek adopted by the terminal UE is anchored in the APN signed by the terminal;

[0028] Step S2: The terminal UE encapsulates the pre-configured APN and the AKA core encryption algorithm Ek in a NAS message and transmits it to the MME / AMF;

[0029] Step S3: The MME / AMF encapsulates the APN and the proposed AKA core encryption algorithm Ek in an Authenticationmessage and transmits it to the HSS / UDM; the HSS / UDM verifies the APN and the AKA core encryption algorithm Ek reported by the terminal based on the contract information;

[0030] Step S4: If the contracted APN and AKA core encryption algorithm are the same as the value reported by the terminal, the HSS / UDM uses the AKA core en...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an adaptive terminal authentication method based on an APN (Access Point Name). An AKA core encryption algorithm Ek and bidirectional authentication authentication are selected in a self-adaptive manner based on the APN. After the self-adaptive terminal authentication method is adopted, the flexibility of terminal authentication can be effectively enhanced, and the use scene is expanded.

Description

technical field [0001] The invention relates to the field of self-adaptive terminal authentication, in particular to an APN-based self-adaptive terminal authentication method and system. Background technique [0002] Before the terminal accesses the wireless network, two-way authentication based on cryptographic technology is required between the SIM card unit in the terminal and the core network to ensure the legitimacy of the identities of both parties. At present, the wireless public network 3G / 4G / 5G terminals of domestic operators use the AES algorithm to realize the above authentication process. But there are bigger flaws on the security performance. [0003] In some specific industry application scenarios and in some private networks, it is necessary to use domestic security algorithms to achieve security authentication on the terminal side and the network side, so as to enhance the isolation strength between virtual networks and improve the information security prote...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/10H04W12/041
CPCH04W12/06H04W12/10H04W12/041Y02D30/70
Inventor 张松磊贾强陈爽倪文书刘刚陈人楷林昱陈均陈小倩詹璇
Owner STATE GRID FUJIAN ELECTRIC POWER CO LTD