18227852. METHOD AND APPARATUS FOR AUTHENTICATING AN ATTACK OF FALSE BASE STATION IN A WIRELESS COMMUNICATION SYSTEM simplified abstract (SAMSUNG ELECTRONICS CO., LTD.)

From WikiPatents
Jump to navigation Jump to search

METHOD AND APPARATUS FOR AUTHENTICATING AN ATTACK OF FALSE BASE STATION IN A WIRELESS COMMUNICATION SYSTEM

Organization Name

SAMSUNG ELECTRONICS CO., LTD.

Inventor(s)

Hongjin Choi of Suwon-si (KR)

Duckey Lee of Suwon-si (KR)

METHOD AND APPARATUS FOR AUTHENTICATING AN ATTACK OF FALSE BASE STATION IN A WIRELESS COMMUNICATION SYSTEM - A simplified explanation of the abstract

This abstract first appeared for US patent application 18227852 titled 'METHOD AND APPARATUS FOR AUTHENTICATING AN ATTACK OF FALSE BASE STATION IN A WIRELESS COMMUNICATION SYSTEM

Simplified Explanation

The abstract describes a method for authenticating a base station in a 5th or 6th generation communication system to support higher data transmission rates. The method involves receiving system information from the base station and determining if it includes signature information. If the signature information is not included, the method stores information about whether the signature information is included. It then obtains information about the signing capability for the system information of the base station and determines whether to continue an attach procedure with the base station based on the presence of signature information and the signing capability.

  • The method is for authenticating a base station in a 5G or 6G communication system.
  • It involves receiving system information from the base station.
  • The method determines if the system information includes signature information.
  • If the signature information is not included, the method stores information about its inclusion.
  • It obtains information about the signing capability for the system information of the base station.
  • The method determines whether to continue an attach procedure with the base station based on the presence of signature information and the signing capability.

Potential applications of this technology:

  • Enhancing security in 5G and 6G communication systems.
  • Ensuring the authenticity of base stations in high-speed data transmission networks.
  • Preventing unauthorized access and attacks on communication networks.

Problems solved by this technology:

  • Mitigating the risk of unauthorized base stations gaining access to communication networks.
  • Protecting against malicious attacks and data breaches.
  • Ensuring the integrity and reliability of communication systems.

Benefits of this technology:

  • Improved security and authentication in 5G and 6G networks.
  • Enhanced trust in the communication infrastructure.
  • Safeguarding sensitive data and preventing unauthorized access.
  • Maintaining the integrity and reliability of communication systems.


Original Abstract Submitted

The disclosure relates to a 5th generation (5G) or 6th generation (6G) communication system for supporting a higher data transmission rate. The disclosure provides a base station authentication method which includes receiving system information from a base station, determining whether the system information includes signature information, in case that the signature information is not included, storing information of whether the signature information is included, obtaining information regarding signing capability for the system information of the base station, and determining whether to continue an attach procedure with the base station, based on at least one of the information of whether the signature information is included and the signing capability for the system information of the base station.