Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An authentication method, base station, user equipment and core network element

A technology of user equipment and core network, applied in the field of communication, can solve the problems of waste of transmission resources, illegal UE, no UE, etc., achieve the effect of improving security, saving transmission resources, and preventing illegal UE data from reaching the core network

Active Publication Date: 2020-09-18
HUAWEI TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the wireless transmission of the prior art, when the base station receives the uplink data, it only forwards the uplink data packet according to the user equipment identifier carried in the uplink data packet, and does not authenticate the UE transmitting the uplink data packet, which will cause Unauthenticated UE data is sent to the core network, causing security issues. In addition, if the core network determines that the UE that sent the data is illegal after receiving the data, it needs to discard the received data, resulting in a waste of transmission resources.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An authentication method, base station, user equipment and core network element
  • An authentication method, base station, user equipment and core network element
  • An authentication method, base station, user equipment and core network element

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0124] The invention provides an authentication method, a base station, user equipment and core network elements. When performing connectionless transmission between the UE and the core network, the UE calculates the authentication result according to parameters (such as authentication code, UCLSI), and sends the authentication result to the base station in the uplink data, and the base station sends the authentication result to the core network The authentication results calculated by the network elements are compared. If the two authentication results are the same, the base station forwards the uplink data to the network element of the core network. Otherwise, the base station discards the received uplink data.

[0125] The authentication method, base station, user equipment and core network element provided by the present invention are mainly applied to various wireless communication systems, such as Long Term Evolution (LTE), Universal Mobile Telecommunications System (Univ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an authentication method, a base station, user equipment and core network elements. The authentication method includes: the base station receives the first message sent by the user equipment, the first message includes uplink data, the user equipment identifier and the first authentication result; sends an authentication request message to the network element of the core network, the authentication request message includes the user The device identifier or the group identifier of the group to which the user equipment belongs or the cell identifier of the cell to which the user equipment belongs; receiving an authentication response message sent by the network element of the core network, where the authentication response message includes a second authentication result, and the second authentication The result is the authentication result calculated by the network element of the core network according to the authentication request message; comparing the first authentication result and the second authentication result, if they are the same, sending uplink data to the network element of the core network. The security verification of the user equipment by the base station prevents the data of the illegal UE from reaching the network elements of the core network, improves security, and saves transmission resources compared with the prior art.

Description

technical field [0001] The present invention relates to the communication field, in particular to an authentication method, a base station, user equipment and a core network element. Background technique [0002] When the user equipment (User Equipment, UE) in the idle state needs to transmit uplink data, the UE first needs to establish a radio resource control (Radio Resource Control, RRC) connection with the base station through random access, and enter the RRC connection state to obtain an uplink authorization (Uplink Grant) before the subsequent uplink data transmission can be performed, however. The RRC connection establishment process involved in the UE state transition will bring a lot of delay. In order to meet the delay requirements of services in the 5G communication network, the application of some scenarios in the prior art uses connectionless transmission, that is, the UE in the idle state When uplink data transmission is required, it does not perform random ac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04L29/06H04W12/069
CPCH04L63/0876H04W12/06H04L63/104H04W12/069H04W72/1268H04L9/40
Inventor 许斌权威
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products