Adaptive terminal authentication method and system based on APN (Access Point Name)
An adaptive terminal and authentication method technology, applied in the field of APN-based adaptive terminal authentication methods and systems, can solve problems such as security performance defects, and achieve the effects of enhancing flexibility, saving deployment costs, and expanding usage scenarios
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0025] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.
[0026] In this embodiment, an APN-based adaptive terminal authentication method is provided, including the following steps:
[0027] Step S1: The AKA core encryption algorithm Ek adopted by the terminal UE is anchored in the APN signed by the terminal;
[0028] Step S2: The terminal UE encapsulates the pre-configured APN and the AKA core encryption algorithm Ek in a NAS message and transmits it to the MME / AMF;
[0029] Step S3: The MME / AMF encapsulates the APN and the proposed AKA core encryption algorithm Ek in an Authenticationmessage and transmits it to the HSS / UDM; the HSS / UDM verifies the APN and the AKA core encryption algorithm Ek reported by the terminal based on the contract information;
[0030] Step S4: If the contracted APN and AKA core encryption algorithm are the same as the value reported by the terminal, the HSS / UDM uses the AKA core en...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


