Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for realizing safety warranty in evolution accessing network

A network access and security technology, applied in the field of security assurance, can solve problems such as being attacked, vulnerable to malicious attacks, and data packet loss

Active Publication Date: 2007-09-19
北京禾怡管理咨询有限公司
View PDF0 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Figure 1 shows a schematic diagram of the LTE / SAE access network architecture, as shown in Figure 1, aGW (E-UTRAN Access Gateway) is an access network of the Evolved Global Terrestrial Radio Access Network (E-UTRAN, Enhanced Universal Terrestrial Radio Access Network) The ingress gateway is located in a safe physical location, and the eNodeB or evolved Node B is an evolved base station in E-UTRAN, which is located in an unsafe physical location and is very likely to be attacked
[0004] Since the channel of the air interface is an extremely unstable channel, the possibility of data packet loss on this channel is very high; in addition, due to the wireless characteristics of the air interface, an attacker can easily initiate packet insertion on the air interface , packet deletion and other attacks; in addition, the eNodeB is in an unsafe physical location and is extremely vulnerable to malicious attacks. Therefore, it is urgent to provide a security guarantee solution in E-UTRAN to ensure that the user terminal (UE, User Equipment) ) is consistent with the amount of uplink and downlink data between E-UTRAN

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing safety warranty in evolution accessing network
  • Method for realizing safety warranty in evolution accessing network
  • Method for realizing safety warranty in evolution accessing network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0035] In the present invention, the UE and the evolved access network respectively maintain one or more counters, and the counter values ​​are used to indicate the amount of data transmitted between the UE and the evolved access network, that is, the counter value varies with the distance between the UE and the evolved access network. When the set conditions are satisfied, the evolved access network initiates a data volume check to the UE, and the UE or the evolved access network compares the counter value provided by the opposite end with the counter value maintained by itself. The evolved access network performs subsequent processing according to the checking result of whether there are counters with inconsistent values.

[0036] The counter mentioned above can...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a method of realizing security assurance in an evolutive access network, a UE and the evolutive access network separately maintain more than one arithmometers which are used for expressing data flow transmitted between the UE and the evolutive access network. The method comprises: when the evolutive access network satisfies the scheduled qualifications, an inspection of data flow is executed to the UE; the UE or the evolutive access network compares the arithmometer value from themselves with that from the opposite terminal; the evolutive access network performs the following disposal based on the comparing result of that whether there exists an conflicting arithmometer value; and the security of the evolutive access network is ensured with basis of the inspection results. Furthermore, information or commands, messages transmitted between the UE and the evolutive access network are totally protected by a shared secret-key therebetween, thus a periodic authentication is realized by this total protection.

Description

technical field [0001] The present invention relates to the evolution access network technology, in particular to a method for realizing security guarantee in the evolution access network. Background technique [0002] In order to maintain the competitiveness of the access system of the 3rd Generation Partnership Project (3GPP, 3rd Generation Partnership Project), research on long-term evolution (LTE, Long Term Evolution) and system architecture evolution (SAE, System Architecture Evolution) in network evolution is ongoing . The goal of network evolution is to simplify the network structure and reduce the access time delay. [0003] Figure 1 shows a schematic diagram of the LTE / SAE access network architecture, as shown in Figure 1, aGW (E-UTRAN Access Gateway) is an access network of the Evolved Global Terrestrial Radio Access Network (E-UTRAN, Enhanced Universal Terrestrial Radio Access Network) The ingress gateway is located in a safe physical location, and the eNodeB or...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/123
Inventor 汤斌淞陈璟
Owner 北京禾怡管理咨询有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products