Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method, base station, user equipment and core network element

A technology of user equipment and core network, applied in the field of communication, can solve problems such as waste of transmission resources, illegal UE, no UE, etc., achieve the effect of improving security, saving transmission resources, and preventing illegal UE data from reaching the core network

Active Publication Date: 2018-05-25
HUAWEI TECH CO LTD
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the wireless transmission of the prior art, when the base station receives the uplink data, it only forwards the uplink data packet according to the user equipment identifier carried in the uplink data packet, and does not authenticate the UE transmitting the uplink data packet, which will cause Unauthenticated UE data is sent to the core network, causing security issues. In addition, if the core network determines that the UE that sent the data is illegal after receiving the data, it needs to discard the received data, resulting in a waste of transmission resources.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, base station, user equipment and core network element
  • Authentication method, base station, user equipment and core network element
  • Authentication method, base station, user equipment and core network element

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0124] The invention provides an authentication method, a base station, user equipment and core network elements. When performing connectionless transmission between the UE and the core network, the UE calculates the authentication result according to parameters (such as authentication code, UCLSI), and sends the authentication result to the base station in the uplink data, and the base station sends the authentication result to the core network The authentication results calculated by the network elements are compared. If the two authentication results are the same, the base station forwards the uplink data to the network element of the core network. Otherwise, the base station discards the received uplink data.

[0125] The authentication method, base station, user equipment and core network element provided by the present invention are mainly applied to various wireless communication systems, such as Long Term Evolution (LTE), Universal Mobile Telecommunications System (Univ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an authentication method, a base station, user equipment and a core network element. The authentication method comprises the steps that: the base station receives a first message sent by the user equipment; the first message includes uplink data, a user equipment identifier and a first authentication result; an authentication request message is sent to the core network element; the authentication request message includes the user equipment identifier, a group identifier of a group, which the user equipment belongs to, or a cell identifier of a cell, which the user equipment belongs to; an authentication response message sent by the core network element is received; the authentication response message includes a second authentication result; the second authentication result is an authentication result calculated by the core network element according to the authentication request message; the first authentication result is compared with the second authenticationresult; and, if the first authentication result and the second authentication result are same, the uplink data is sent to the core network element. The base station performs security verification on the user equipment; the problem that data of illegal UE reaches the core network element can be avoided; therefore, the security is improved; and simultaneously, compared with the prior art, transmission resources are saved.

Description

technical field [0001] The present invention relates to the communication field, in particular to an authentication method, a base station, user equipment and a core network element. Background technique [0002] When the user equipment (User Equipment, UE) in the idle state needs to transmit uplink data, the UE first needs to establish a radio resource control (Radio Resource Control, RRC) connection with the base station through random access, and enter the RRC connection state to obtain an uplink authorization (Uplink Grant) before the subsequent uplink data transmission can be performed, however. The RRC connection establishment process involved in the UE state transition will bring a lot of delay. In order to meet the delay requirements of services in the 5G communication network, the application of some scenarios in the prior art uses connectionless transmission, that is, the UE in the idle state When uplink data transmission is required, it does not perform random ac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04L29/06H04W12/069
CPCH04L63/0876H04W12/06H04L63/104H04W12/069H04W72/1268H04L9/40
Inventor 许斌权威
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products