Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for dynamically selecting length of authentication vector set

A technology of authentication vector and group length, applied in the field of dynamic selection of authentication vector group length, can solve the problems of errors, non-unique acquired values, and small length space of the authentication vector group to be selected, so as to improve the coping ability and reasonably optimize the configuration. Effect

Inactive Publication Date: 2014-09-24
TIANJIN UNIVERSITY OF TECHNOLOGY
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to solve the problem that the length space of the authentication vector group to be selected in the existing method is small, the obtained value is not unique and there is a certain error, and based on the operation of the network, a method for dynamically selecting the length of the authentication vector group is provided. At the same time, message traffic and bit traffic are used as measurement factors to improve the utilization of the entire network resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for dynamically selecting length of authentication vector set
  • Method for dynamically selecting length of authentication vector set
  • Method for dynamically selecting length of authentication vector set

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The following will refer to Figure 1-8 Embodiments of the present invention will be described.

[0035] Taking EPS AKA as an example, such as figure 1 shown. In the actual network operation, three problems must be solved: first, how to obtain the mathematical relationship between the length of the authentication vector group and the bit traffic and message traffic. The second is how to establish an actual network model and determine the method of obtaining the authentication amount M in the previous time T under different network states. The third is how to design and select the length of the authentication vector group after the authentication amount M in the previous time T is known.

[0036] For problem 1, establish the mathematical relationship between bit traffic, message traffic and the length K of the authentication vector group:

[0037]From the perspective of the number of message exchanges and the bit length occupied by the interactive messages during EPS...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for dynamically selecting the length K of an EPS AKA authentication vector set. According to the method, a network model is designed with message communication traffic and bit communication traffic as measurement factors, and an integrally optimal value K which meets the requirements of the message communication traffic and the bit communication traffic is selected as the authentication vector length; consequently, the defects that by the adoption of an existing method, the length to be selected of the authentication vector set is limited, an obtained value is non-unique, and a certain error exists. Through the method, an existing scheme only with the message communication traffic as a measurement standard is optimized, the coping capacity of a network at the time of a sudden change of network traffic is effectively improved, and reasonable optimal configuration of whole network resources is achieved.

Description

technical field [0001] The invention belongs to the technical field of mobile communication, in particular to a method for dynamically selecting the length of an authentication vector group when a user safely accesses a mobile communication network. Background technique [0002] The security frameworks of the third-generation mobile communication system UMTS (Universal Mobile Telecommunication System) and the fourth-generation mobile communication system LTE (Long Term Evolution) both use the AKA (Authentication and Key Agreement) protocol mechanism to ensure users' safe access to the network. In the AKA protocol, the home network HE / HLR (Home Environment / Home Location Register) transmits multiple authentication vectors once to the service network SN / MME (Service Network / Mobility Management Entity) to form a vector group. The length K of the authentication vector group will directly affect the resource optimization configuration of the entire network. [0003] The 3GPP prot...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/06
Inventor 白媛王倩贾其兰
Owner TIANJIN UNIVERSITY OF TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products