Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and device for NAS message processing and cell list update

A message processing and cell list technology, applied in wireless communication, electrical components, etc., can solve problems that affect the normal use of UE, network equipment cannot provide services, etc.

Active Publication Date: 2021-02-12
HUAWEI TECH CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, at present, the UE cannot distinguish whether the received NAS rejection message without integrity protection is sent by a real network device or a fake network device, so the UE will adopt a consistent processing method, that is, it will think that the network device cannot Provide services, thus affecting the normal use of UE

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for NAS message processing and cell list update
  • A method and device for NAS message processing and cell list update
  • A method and device for NAS message processing and cell list update

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0146] See Image 6 .

[0147] 1. The user equipment in the idle state initiates a radio resource control (Radio Resource Control, RRC) connection establishment process to the access network device of the serving cell (such as the base station of the serving cell) in the current serving cell. In this process, The user equipment sends an initial NAS request (Initial NAS request) message to the access network device, and the access network device forwards the initial NAS request message to the mobility management network element. The initial NAS request message may include, for example, an Attach Request (Attach Request) Message, location update request message, or service request (Service Request) message and other different messages.

[0148] Optionally, for a 2G or 3G circuit switching domain (Circuit Switching Domain, CS), the location update request message may include a location domain update request (Location Area Update Request) message, for a 2G or 3G packet switching ...

example 2

[0174] See Figure 7 .

[0175] Wherein, the content of steps 1, 3, 4, and 6-9 in Example 2 can refer to the description of the corresponding steps in Example 1. To avoid repetition, only the steps different from those in Example 1 are introduced below.

[0176] 2. After sending the initial NAS request message, the user equipment resets the current pseudo-network probability value, for example, it can be reset to 0.

[0177] Optionally, this step may also occur before step 1, that is, before the current serving cell performs step 1 for the first time, the user equipment resets the pseudo-network probability value to 0.

[0178] Typically, the pseudo-network probability value can be applied to a serving cell, and if the user equipment initiates a new initial NAS request message in a new serving cell, the user equipment can also reset the pseudo-network probability value first.

[0179] 5. After receiving the non-integrity-protected NAS rejection message, the user equipment up...

example 3

[0185] See Figure 8 .

[0186] Wherein, the content of steps 1-9 in Example 3 can refer to the description of the corresponding steps in Example 1. To avoid repetition, only the steps different from those in Example 1 are introduced below. in addition, Figure 8 Only the steps mentioned below are shown, as for steps 1-9, refer to Image 6 Description of the corresponding steps.

[0187] 10. If the value of the pseudo-network counter reaches the pre-configured value N, the user equipment may consider the current serving network device as a pseudo-network device, that is, determine that the current serving cell is a cell provided by the pseudo-network device. The user equipment saves the identity of the current serving cell, and may try to reselect another suitable cell for access in the current location area or a new location area. The user equipment does not perform the action indicated by the rejection reason value carried in the NAS rejection message.

[0188] 11. The ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and device for NAS message processing and cell list update, which are used to solve the technical problem that user equipment will be attacked by a fake network device; after the user equipment sends a NAS message to a serving network device, if the received NAS rejection message does not pass through Integrity protection, the user equipment can determine that the serving network device is a fake network device, and then the user equipment can select another cell to re-initiate the NAS message. In this way, if the rejection message is forged by the fake network device, the user equipment can re-select to another cell to initiate the NAS message. NAS messages, so as to obtain normal network services, and try to prevent the user equipment from being attacked by DoS, so as to avoid affecting the normal use of the user equipment.

Description

technical field [0001] The present invention relates to the technical field of mobile communication, in particular to a method and device for NAS message processing and cell list updating. Background technique [0002] In an Evolved Packet System (Evolved Packet System, EPS) network, encryption protection is generally not performed on a Non Access Stratum (Non Access Stratum, NAS) request message initiated by a user equipment (User Equipment, UE) from an idle state. However, if a legal NAS security context has been negotiated between the UE and the core network device, integrity protection will be performed for all NAS messages initiated by the UE. Generally speaking, if the NAS message sent by the UE has undergone integrity protection, When the network device replies with a NAS rejection message to the UE, the NAS rejection message should also be integrity protected. However, in some cases, such as the loss of the negotiated NAS security context due to a faulty restart of t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W74/00
CPCH04W74/00
Inventor 舒林埃雷罗.贝隆.克里斯蒂安
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products