Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication method and system for 5G communication network

An identity authentication and communication network technology, applied in user identity/authority verification, transmission system, wireless communication, etc., can solve the problems of resource consumption, computing overhead and public key infrastructure, etc.

Active Publication Date: 2021-02-05
北京电信易通信息技术股份有限公司
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although security has been enhanced compared to previous generations, some unrealistic system assumptions that are critical to security have been found, and edge cases of the protocol make 5G communication systems vulnerable to multiple attacks, Such as: using different failure reasons (MAC or synchronization), resulting in the tracking of the target user; in order to provide privacy protection and prevent leakage of user identity, 5G-AKA implements an elliptic curve integrated encryption scheme (ECIES), however, this will lead to Computational overhead and public key infrastructure (PKI) issues; denial of service (DOS) attacks lead to resource consumption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and system for 5G communication network
  • Identity authentication method and system for 5G communication network
  • Identity authentication method and system for 5G communication network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0072] The purpose of the present invention is to provide an identity authentication method and system for 5G communication network, so as to improve the security and efficiency of 5G communication network communication.

[0073] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an identity authentication method and system for a 5G communication network. A security anchor function sends a first random number and a service identifier to the user equipment, the user equipment and the authentication credential storage and processing function module respectively select a second random number and a third random number, the freshness of the message is ensured by replacing a serial number (SQN) with the random numbers, and for synchronization failure, different failure messages do not need to be sent. Therefore, the possibility of tracking is avoided; when the user equipment encrypts the permanent identifier of the user, the shared key is directly used for encryption, so that some problems of computation overhead and public key infrastructure (PKI) are directly avoided; when the authentication credential storage and processing function module authenticates the user equipment, if the identity authentication information comes from an attacker,resource consumption can be avoided; and entities participating in authentication are mutually authenticated, so that counterfeit attacks are avoided, and the communication security is ensured. According to the invention, a user can carry out identity authentication safely and efficiently.

Description

technical field [0001] The present invention relates to the field of information security, in particular to an identity authentication method and system for 5G communication networks. Background technique [0002] The fifth-generation mobile communication technology (5th-Generation, 5G) is committed to building a user-centered all-round information ecosystem and realizing the intelligent interconnection of people and everything. While enjoying the convenience brought by 5G, it should be realized that the access device of the system is no longer a single communication device, but also includes IoT devices for specific applications. These devices will collect users' private information, such as health information and life footprints. Wait. Therefore, in order to ensure that users' private information is not leaked, the 5G communication system will provide more reliable security protection. On the basis of inheriting the security of the Long Term Evolution (LTE) system, the 5...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/06H04L9/32
CPCH04L9/3213H04L9/3242H04L2209/80
Inventor 沈玉勤焦显伟
Owner 北京电信易通信息技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products