Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for realizing customized confidentiality and integrity protection algorithm of UE (User Equipment)

An integrity protection and protection algorithm technology, applied in the field of realizing UE customized confidentiality and integrity protection algorithms, can solve the problems of no defined priority, no support, no priority selection algorithm, etc., to improve flexibility and availability. The effect of scalability and applicability

Pending Publication Date: 2022-03-22
BEIHANG UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] 1) The UE does not support the selection algorithm on the UE side
[0016] 2) Algorithms supported by the UE side, no priority is defined
[0017] 3) During the UE boot registration process, the message format of the UE security capability report does not distinguish between priorities
[0018] 4) The base station does not support the algorithm priority selection algorithm defined by the UE

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for realizing customized confidentiality and integrity protection algorithm of UE (User Equipment)
  • Method and device for realizing customized confidentiality and integrity protection algorithm of UE (User Equipment)
  • Method and device for realizing customized confidentiality and integrity protection algorithm of UE (User Equipment)

Examples

Experimental program
Comparison scheme
Effect test

example

[0113] Example: According to Table 9 or Table 10, the SMC signaling includes the following algorithms:

[0114] SecurityModeCommand

[0115] {……

[0116] IntegrityProtAlgorithm: NIA4

[0117] Ciphering Algorithm: NEA4

[0118]}.

[0119] Step 2: Algorithm selection during handover: When mobility is cross-site or cross-system, according to the definition in 3GPP TS38.311, HandoverRequest (or other related handover signaling) carries UE Security Capabilities (as shown in Table 9), and UE security capabilities It is transmitted to the target base station, and if the target base station judges that it also supports the algorithm, it negotiates with the UE on the selected security algorithm through the RRCreconfig message. If the target station judges that it does not support the UE highest priority algorithm, the highest priority in the intersection of the base station priority and the UE security capability will be used as the algorithm of both parties and sent to the UE thro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of wireless communication security, in particular to a method and a device for realizing a user equipment (UE) customized confidentiality and integrity protection algorithm, and the method comprises the following steps: step 1, a user selects an algorithm and an algorithm priority to form an algorithm priority list; and step 2, reporting the algorithm priority to a core network. And step 3, the terminal reports the highest priority algorithm at the service signaling stage. And step 4, the core network transmits the algorithm to the base station. And step 5, the base station selects an algorithm according to the algorithm priority, namely the algorithm stored in the base station and the priority, and issues the algorithm to the terminal. And step 6, the base station receives and returns a confirmation message, and algorithm negotiation is completed. According to the invention, under the condition that both the base station and the terminal support, the user can customize the security algorithm used by the user, the user customization function emphasized by the 5G technical field is realized, and the defect that the current 5G security algorithm is still limited by the security of the base station is overcome.

Description

technical field [0001] The present application relates to the technical field of wireless communication security, in particular to a method and a device for implementing a UE-customized confidentiality and integrity protection algorithm. Background technique [0002] In order to adapt to the explosive growth of massive mobile terminals and mobile data, and promote the implementation of industries such as the Internet of Things, the fifth generation communication technology (5G) has emerged as the times require. According to the law of communication development, 5G technology will be significantly improved in terms of terminal capacity, reliability, delay, transmission rate and user experience. Applications in future use scenarios such as networking services can meet the development needs of mobile Internet, Internet of Things and other technologies in the next ten years. Compared with previous generations of mobile communications, 5G has richer service provision capabilitie...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/30H04W12/10
CPCH04W12/30H04W12/10
Inventor 刘建伟姜勇刘懿中邢馨心孙钰关振宇杨林
Owner BEIHANG UNIV