Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

A communication method and device

A technology of information elements and reference information, which is applied in the field of communication and can solve problems such as terminal device attacks

Active Publication Date: 2021-01-05
HUAWEI TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] This application provides a communication method and device to solve the problem of terminal equipment being attacked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A communication method and device
  • A communication method and device
  • A communication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0088] The application will be described in further detail below in conjunction with the accompanying drawings.

[0089] The embodiments of the present application may be applicable to the following mobile communication systems, for example: Long Term Evolution (Long Term Evolution, LTE) system, Advanced long term evolution (Advanced long term evolution, LTE-A) system, Universal Mobile Telecommunication System (Universal Mobile Telecommunication System, UMTS), an evolved Long Term Evolution (eLTE) system, a 5G system, or other mobile communication systems that will evolve in the future.

[0090]The following takes the 5G system as an example to illustrate a schematic diagram of a 5G system architecture applicable to the embodiments of the present application. The system architecture can be applied to various embodiments of the present application without limitation.

[0091] Such as figure 1 In the system architecture shown, a terminal device 101 can communicate with a core n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a communication method and device, wherein the method includes: a terminal device receives a first authentication request from a safety function network element; the terminal device obtains authentication reference information according to the first authentication request, and the authentication reference The information is a response value or a resynchronization identifier or a cause indication value; the terminal device sends an authentication response message to the security function network element, and the authentication response message includes a first information element for carrying the response value, for carrying The second information element of the resynchronization identifier and the third information element used to carry a cause indication value, the authentication reference information is carried in the information element corresponding to the authentication reference information.

Description

technical field [0001] The present application relates to the technical field of communication, and in particular to a communication method and device. Background technique [0002] At present, pseudo-base station technology poses a great threat to the security of communication systems. For example, pseudo-base stations can obtain the identity of a terminal device, which can be an International Mobile Subscriber Identification Number (IMSI). Further, the fake base station may also attack the terminal device according to its identity, for example, track the location of the terminal device, thereby causing privacy leakage of the user of the terminal device. [0003] For example, the fake base station may use the obtained IMSI to apply for an authentication vector (Authentication Vector, AV) from the core network, generate an authentication request according to the authentication vector, and send the authentication request to the terminal device. If the terminal device is a te...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04L29/06H04W12/02H04W12/69
CPCH04W12/02H04L9/32H04W12/06H04L63/0892H04W12/041H04L9/3271H04L63/08H04L2209/80H04W12/04
Inventor 潘凯陈璟
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products