Unlock instant, AI-driven research and patent intelligence for your innovation.

Synchronous flow optimization method and system

A technology of synchronization process and optimization method, which is applied in the field of communication security, and can solve problems such as consuming HLR/AUC resources, illegal synchronization, and false hanging of HLR/AUC

Active Publication Date: 2010-05-19
CHINA MOBILE COMM GRP CO LTD +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In the above attack process, although the HLR / AUC can identify that the synchronization is illegal in step 5, the identification process itself consumes the resources of the HLR / AUC, and also includes the communication between the VLR / SGSN and the HLR / AUC. Resources consumed by protocol interaction
If the attacker keeps changing the user's identity to create false synchronization, then it may cause HLR / AUC to be busy processing the synchronization process, and have no time to take care of other business requests, which will lead to false hanging of HLR / AUC

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Synchronous flow optimization method and system
  • Synchronous flow optimization method and system
  • Synchronous flow optimization method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] image 3 It is a specific flow chart of the synchronization process optimization method in Embodiment 1 of the present invention. Such as image 3 As shown, the method includes:

[0043] Step 301, during authentication, the VLR / SGSN on the network side sends the corresponding authentication parameters in the authentication tuple received from the HLR / AUC to the terminal.

[0044] In this step, the authentication tuple may include a random number RAND, an expected response XRES and an authentication token AUTN. Wherein, the corresponding authentication parameters sent to the terminal include RAND and AUTN.

[0045] Specifically, when the HLR / AUC generates the authentication tuple, it uses the RAND generated by the random number generator and the second authentication key KI stored by itself to calculate XRES respectively, and according to RAND, KI, serial number SQNHE, authentication management field AMF produces AUTN.

[0046] In this embodiment, the generated AUTN...

Embodiment 2

[0075] In this embodiment, when the terminal authenticates the network, it further includes judging whether the received SQNHE is acceptable, and when judging that the SQNHE in the AUTN is not within the acceptable range, generates a resynchronization flag and sends a resynchronization flag to the network side Synchronization request, additionally added steps to update SQNMS.

[0076] Figure 5 It is a specific flow chart of the synchronization process optimization method in the second embodiment of the present invention. Such as Figure 5 As shown, the method includes:

[0077] Step 501 , during authentication, the network side sends an authentication request to the terminal, and sends corresponding authentication parameters in the generated corresponding authentication tuple to the terminal.

[0078] Specifically, the HLR / AUC generates a random number RAND according to the random number generator, and respectively calculates the expected response XRES, the encryption key ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a synchronous process optimize method, wherein when terminal sends synchronous request command, the synchronous mark contains identification response check code; network usesaccess position register / service general group wireless service support node VLR / SGSN to judge the legality of received synchronous command, if it is illegal, ending the process, or else, VLR / SGSN sends legal synchronous command to the attachment position register / identifier center HLR / AUC; therefore, when network receives illegal synchronous request command, VLR / SGSN can effectively filter it, toavoid it being used to attack network HLR / AUC. The invention also provides relative synchronous process optimize system, the method for generating synchronous mark, the method for processing synchronous request by VLR / SGSN, and the method for processing synchronous request by HLR / AUC.

Description

technical field [0001] The invention relates to communication security technology, in particular to a synchronization process optimization method and system in the authentication process. Background technique [0002] In the existing third-generation mobile communication system, the international mobile subscriber identity IMSI, authentication key KI and serial number SQNMS are stored in the mobile terminal, and the home location register / authentication center (HLR / AUC) on the network side is for this The mobile terminal correspondingly saves the IMSI, KI and sequence number SQNHE for mutual authentication between the mobile terminal and the network. To distinguish the terminal from the authentication key stored by the HLR / AUC, the KI stored by the terminal is called the first authentication key, and the KI stored by the HLR / AUC is called the second authentication key. [0003] The existing authentication process of the 3G communication system is mainly as follows: HLR / AUC ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W12/06H04W12/10H04W12/106
Inventor 刘利军刘斐魏冰王正伟
Owner CHINA MOBILE COMM GRP CO LTD