Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Digest Authentication Method for Non-Access Stratum in Trunking Communication System

A cluster communication and non-access layer technology, applied in the field of communication, can solve the problems of large security risks in the cluster communication system

Active Publication Date: 2020-10-30
POTEVIO INFORMATION TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] It can be seen that in the prior art, if an illegal user logs in to the trunking communication system by using a legitimate trunking terminal to counterfeit or counterfeit a trunking user, he or she can perform trunking services, and the trunking communication system has a great security risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Digest Authentication Method for Non-Access Stratum in Trunking Communication System
  • A Digest Authentication Method for Non-Access Stratum in Trunking Communication System
  • A Digest Authentication Method for Non-Access Stratum in Trunking Communication System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are the Some, but not all, embodiments are invented.

[0025] It should be noted that in this article, the words "first", "second", "third", and "fourth" are only used to distinguish the same names, not to imply the relationship between these names or order.

[0026] Each embodiment of the present invention follows the following premises and descriptions 1-4:

[0027] 1. After the user equipment (User Equipment, UE) (also referred to as user terminal) attaches to the LTE access network, the non-access stratum (Non-Access Stratum, NAS) signaling is all transmitted over the air interface in an encrypted manner. The authentication ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a non-access stratum digest authentication method in a trunking communication system, comprising: UE sends a trunking registration request message to a target T-CN, the message carries login authentication indication information and a first Inquiry parameter value, so that the target T-CN feeds back the cluster registration acceptance message to the UE based on the login authentication indication information; the UE authenticates the target T-CN based on the first response parameter value for authenticating the network carried in the cluster registration acceptance message. -CN; if the authentication is successful, the UE obtains the second response parameter value for authenticating the UE based on the second challenge parameter value carried in the cluster registration acceptance message for inquiring the UE; the UE sends the cluster to the target T-CN A registration complete message, which carries a second response parameter value, so that the target T-CN authenticates the UE based on the second response parameter value, and implements non-access stratum digest authentication. The invention can realize two-way authentication between UE and T-CN.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a non-access stratum digest authentication method in a cluster communication system. Background technique [0002] The trunking communication system is a dedicated wireless communication system developed to meet the command and dispatch needs of industry users and is oriented to specific industry applications. In the trunking communication system, a large number of wireless users share a small number of wireless channels, and the command and dispatch business is the main application. It is a multi-purpose, high-efficiency wireless communication system that utilizes frequency resources. The trunking communication system has a wide range of application markets in the fields of government departments, public safety, emergency communications, electric power, civil aviation, petrochemical and military. LTE (Long Term Evolution, long-term evolution) broadband multimedia trunking...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06
CPCH04W12/06
Inventor 周波王磊
Owner POTEVIO INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products