Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secondary authentication enhancement and end-to-end encryption method and system based on edge UPF

A secondary authentication and encryption method technology, which is applied in wireless communication, electrical components, security devices, etc., can solve the problems of data being eavesdropped, unable to fully guarantee the security of information transmission, and not having the ability to encrypt end-to-end information transmission. Achieve the effects of preventing eavesdropping or interception, reducing protocol complexity, and promoting development

Active Publication Date: 2020-12-29
上海微波技术研究所(中国电子科技集团公司第五十研究所)
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the whole, the current 3GPP standard does not have the ability to encrypt and transmit information end-to-end, and cannot fully guarantee the security of information transmission, and there is still a risk of data being eavesdropped

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secondary authentication enhancement and end-to-end encryption method and system based on edge UPF
  • Secondary authentication enhancement and end-to-end encryption method and system based on edge UPF
  • Secondary authentication enhancement and end-to-end encryption method and system based on edge UPF

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] The present invention will be described in detail below in conjunction with specific embodiments. The following examples will help those skilled in the art to further understand the present invention, but do not limit the present invention in any form. It should be noted that those skilled in the art can make several changes and improvements without departing from the concept of the present invention. These all belong to the protection scope of the present invention.

[0062] The invention improves the traditional UPF, and designs an edge UPF with enhanced security for vertical industries. On the basis of the standard edge UPF, a secondary authentication and key distribution module and a business data encryption and decryption module are added. In order to reduce the protocol complexity between different modules, the present invention adopts the design scheme of integrated deployment, and adds a secondary authentication and key distribution module for security enhancem...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a secondary authentication enhancement and end-to-end encryption method and system based on an edge UPF, an edge UPF secondary authentication and key distribution module carriesout secondary authentication on UE through an EAP protocol, and the vertical industry can adopt a customized algorithm to complete authentication, key distribution and encryption and decryption functions. After the secondary authentication succeeds, the edge UPF secondary authentication and key distribution module determines the access permission of the UE, generates a shared session key with theUE, and then distributes the user, session and key associated information to the data processing and forwarding module. The data processing and forwarding module can call the service of the encryption and decryption module to realize the encryption and decryption functions of the data. On the basis of secondary authentication in the 3GPP standard, information encryption and decryption functions are realized, malicious users are prevented from eavesdropping or intercepting the information, the confidentiality of data is ensured, the communication security is improved, and the method plays an important role in the development of a 5G secure communication technology.

Description

technical field [0001] The present invention relates to the technical field of 5G communication, in particular, to an edge UPF-based secondary authentication enhancement and end-to-end encryption method and system. Background technique [0002] The application of 5G technology has greatly promoted the development of vertical industries, and with the increase of information volume, information security has become more and more important. [0003] To meet the security requirements of vertical industries and improve the security of vertical industry applications, 3GPP has introduced a secondary authentication process on the basis of access authentication and authentication. The secondary authentication is the authentication performed after the terminal UE completes the network access authentication and before accessing specific services. After the authentication is passed, the data service is allowed to use, which further improves the security of the 5G system. For example, pa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/06
CPCH04W12/06
Inventor 周昌盛石雨轩李闯刘源张勇马阳
Owner 上海微波技术研究所(中国电子科技集团公司第五十研究所)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products