Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and secure system for authenticating the radio evolution network

A wireless evolution and security system technology, applied in the field of wireless communication system security, can solve problems such as long development time, security mechanism cannot meet the requirements of roaming across access systems, and complex signaling and user data protection

Inactive Publication Date: 2007-10-17
HUAWEI TECH CO LTD
View PDF0 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] 3) The protection of signaling and user data is more complicated, requiring the protection of certain fields of certain signaling rather than protecting the entire message, which brings difficulties to the judgment and processing of the system;
[0011] 4) The above security mechanism cannot meet the requirements of roaming across access systems
[0025] In the authentication scheme of the existing evolved network shown in Figure 2, two ways of carrying EAP are proposed. The first authentication method is to directly carry EAP on the CDMA2000 link layer. The disadvantage of this method is that there is no existing The standard encapsulation standard of EAP bears the weight of EAP on the CDMA2000 link layer, and a new protocol must be redeveloped. In this way, a long development time is required, and the workload is relatively large; and the use of the first authentication method will make the access authentication and The link layer is coupled, so that the first authentication mechanism is only applicable to the CDMA2000 evolution network, which is very unfavorable for the need to roam between different access systems in the network evolution
[0026] The second authentication method is to use PANA to encapsulate EAP. In the conference data recording scheme, the functions of EP and PAA are realized by CAP. In this way, the CAP must control the data packets of MS before authentication to prevent unauthorized data. Packet access to the network increases the load on the CAP
However, there are many other signaling and user data, such as resource management signaling between MS and BTS, which need to be protected, which are not solved in the existing solutions
[0027] In addition, this existing solution cannot solve the problem of how the MS completes authentication and how to protect signaling and user data in the case of cross-access system roaming

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and secure system for authenticating the radio evolution network
  • Method and secure system for authenticating the radio evolution network
  • Method and secure system for authenticating the radio evolution network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0089] The core idea of ​​the present invention is: after the mobile station establishes a connection with the wireless evolution access network, the mobile station performs two-way authentication with the wireless evolution network through the core network signaling entity in the wireless evolution core network, and generates a shared key; The station and the core network signaling entity use the generated shared key to establish a security association.

[0090] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and preferred embodiments.

[0091] FIG. 3 is a schematic diagram of the evolved network security system of the present invention. The present invention is described based on the evolved network structure shown in FIG. 1 as an example, but is not limited to be applied to the evolved network shown in FIG. 1 .

[0092]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for realizing identification in a wireless evolutionary network, comprising: establishing a connection between a mobile station and a wireless evolutionary accessing network, performing two-way identification between the mobile station and a wireless evolutionary network via a wireless evolutionary core network signaling entity, and generating a shared secret key; establishing a safe alliance between the mobile station and the wireless evolutionary core network signaling entity by means of the generated shared secret key. The invention also discloses a wireless evolutionary network safety system in which a safe alliance between the mobile station and the wireless evolutionary core network signaling entity is established for protecting interaction signaling and user data. The invention is based on a developping trend of the wireless evolutionary network, realizes two-way identification between a mobile terminal and the network, the identification is performed in a network layer independent of link layer technic, thereby the identification has general-utility.

Description

technical field [0001] The invention relates to the safety technology of a wireless communication system, in particular to a method and a safety system for realizing authentication of a wireless evolution network. Background technique [0002] The current third generation (3G) communication system such as Code Division Multiple Access 2000 (CDMA2000) network has its own security system and mechanism. The early version of the CDMA2000 1x system, or 1x system for short, uses an authentication method based on CAVE (Cellular Authentication and Voice Encryption) in the circuit domain. When a user requests circuit domain services and location updates, the mobile switching center ( MSC) will initiate user authentication, which is only a one-way authentication of the user by the network; after the authentication is successful, the MSC will send the negotiated key to the base station (BS) to protect the mobile station (MS) and BS This protection only protects the integrity and confi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/38H04L9/00H04L29/06H04W12/041H04W12/0431H04W12/06H04W12/069
Inventor 李志明
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products