Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Subscriber security setup maintenance method and system

A user and security technology, applied in security devices, user identity/authority verification, selection devices, etc., can solve problems such as GUSS error update, non-checking, etc., to prevent problems and reduce maintenance burden

Inactive Publication Date: 2007-05-23
HUAWEI TECH CO LTD
View PDF1 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the existing solution, before the BSF and HSS update the GUSS, they do not check which contents of the USS have been modified by the NAF. As a result, the NAF has the absolute right to insert, update or delete the USS, and can make changes to the data in the USS. Arbitrary modification, so it may cause GUSS to be updated incorrectly

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Subscriber security setup maintenance method and system
  • Subscriber security setup maintenance method and system
  • Subscriber security setup maintenance method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039]In the present invention, when the NAF maintains (including inserts, updates, and deletes) the USS, after the BSF determines that the NAF has the legal identity to maintain the USS, it further judges whether the NAF has the right to operate according to the contents of the USS, and only for The content in the USS of the operation performs the described operation. Referring to the NAF maintenance USS flowchart of the present invention shown in FIG. 2 , it includes the following steps:

[0040] Step 201: After receiving a request from a NAF to maintain (update / delete / insert) the USS, the BSF judges whether the NAF has a legal identity to maintain the USS, if so, executes the next step, otherwise returns a response message to the NAF.

[0041] Step 202: The BSF determines which USS content the NAF needs to maintain, and determines whether the NAF has the corresponding authority for each content in turn, and only maintains the content of the USS with the authority. For the c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for maintaining USS, which comprises that: BSF receives the maintain request from NAF to maintain one USS; judges said legality of NAF; BSF checks the contents of maintained USS and finds out the USS content which can be operated by NAF, and operates the USS content; BSF sends operated USS to HSS, to store the USS of GUSS, and provide the system for maintaining USS. With said invention, NAF can correctly modify the USS of GUSS, to reduce HSS maintain load and support enough freedom to the NAF.

Description

technical field [0001] The invention relates to the technical field of 3GPP general authentication framework (GAA), in particular to a method and system for maintaining user security settings (USS). Background technique [0002] In the third-generation wireless communication standard, a Generic Authentication Architecture (GAA, Generic Authentication Architecture) is a general structure used by various application service entities to complete authentication of user identities. Checking and verifying the identity of users of application services can be realized through the general authentication framework. The various application services mentioned above may be multicast / broadcast services, user certificate services, instant information provision services, etc., or proxy services. [0003] Figure 1 shows the structure of the general authentication framework. The general authentication framework usually consists of user equipment (UE), entity (BSF) that performs initial chec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/38H04L9/32H04W12/06H04W12/122
Inventor 杨艳梅曹淑华
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products