Unlock instant, AI-driven research and patent intelligence for your innovation.
Synchronous flow optimization method and system
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A technology of synchronization process and optimization method, which is applied in the field of communication security, and can solve problems such as consuming HLR/AUC resources, illegal synchronization, and false hanging of HLR/AUC
Active Publication Date: 2010-05-19
CHINA MOBILE COMM GRP CO LTD +1
View PDF5 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0006] In the above attack process, although the HLR / AUC can identify that the synchronization is illegal in step 5, the identification process itself consumes the resources of the HLR / AUC, and also includes the communication between the VLR / SGSN and the HLR / AUC. Resources consumed by protocol interaction
If the attacker keeps changing the user's identity to create false synchronization, then it may cause HLR / AUC to be busy processing the synchronization process, and have no time to take care of other business requests, which will lead to false hanging of HLR / AUC
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0042] image 3 It is a specific flow chart of the synchronization process optimization method in Embodiment 1 of the present invention. Such as image 3 As shown, the method includes:
[0043] Step 301, during authentication, the VLR / SGSN on the network side sends the corresponding authentication parameters in the authentication tuple received from the HLR / AUC to the terminal.
[0044] In this step, the authentication tuple may include a random number RAND, an expected response XRES and an authentication token AUTN. Wherein, the corresponding authentication parameters sent to the terminal include RAND and AUTN.
[0045] Specifically, when the HLR / AUC generates the authentication tuple, it uses the RAND generated by the random number generator and the second authentication key KI stored by itself to calculate XRES respectively, and according to RAND, KI, serial number SQNHE, authentication management field AMF produces AUTN.
[0046] In this embodiment, the generated AUTN...
Embodiment 2
[0075] In this embodiment, when the terminal authenticates the network, it further includes judging whether the received SQNHE is acceptable, and when judging that the SQNHE in the AUTN is not within the acceptable range, generates a resynchronization flag and sends a resynchronization flag to the network side Synchronization request, additionally added steps to update SQNMS.
[0076] Figure 5 It is a specific flow chart of the synchronization process optimization method in the second embodiment of the present invention. Such as Figure 5 As shown, the method includes:
[0077] Step 501 , during authentication, the network side sends an authentication request to the terminal, and sends corresponding authentication parameters in the generated corresponding authentication tuple to the terminal.
[0078] Specifically, the HLR / AUC generates a random number RAND according to the random number generator, and respectively calculates the expected response XRES, the encryption key ...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention relates to a synchronous process optimize method, wherein when terminal sends synchronous request command, the synchronous mark contains identification response check code; network usesaccess position register / service general group wireless service support node VLR / SGSN to judge the legality of received synchronous command, if it is illegal, ending the process, or else, VLR / SGSN sends legal synchronous command to the attachment position register / identifier center HLR / AUC; therefore, when network receives illegal synchronous request command, VLR / SGSN can effectively filter it, toavoid it being used to attack network HLR / AUC. The invention also provides relative synchronous process optimize system, the method for generating synchronous mark, the method for processing synchronous request by VLR / SGSN, and the method for processing synchronous request by HLR / AUC.
Description
technical field [0001] The invention relates to communication security technology, in particular to a synchronization process optimization method and system in the authentication process. Background technique [0002] In the existing third-generation mobile communication system, the international mobile subscriber identity IMSI, authentication key KI and serial number SQNMS are stored in the mobile terminal, and the home location register / authentication center (HLR / AUC) on the network side is for this The mobile terminal correspondingly saves the IMSI, KI and sequence number SQNHE for mutual authentication between the mobile terminal and the network. To distinguish the terminal from the authentication key stored by the HLR / AUC, the KI stored by the terminal is called the first authentication key, and the KI stored by the HLR / AUC is called the second authentication key. [0003] The existing authentication process of the 3G communication system is mainly as follows: HLR / AUC ...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.