Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for implementing authentication by entity authentication centre

An authentication center and authentication method technology, which is applied in user identity/authority verification and key distribution, can solve problems such as inconvenient billing, inability to adapt to business development, and inability to obtain derived keys

Inactive Publication Date: 2010-05-12
HUAWEI TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing general authentication framework does not divide the security level of authentication and key negotiation between EAC and business entities, so that EAC cannot provide business entities with authentication of different security levels, so that derived keys that meet the business security level requirements cannot be obtained. key, it is not convenient for operators to carry out more reasonable and accurate billing for services with different security level requirements, and cannot well adapt to the needs of business development

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing authentication by entity authentication centre
  • Method for implementing authentication by entity authentication centre
  • Method for implementing authentication by entity authentication centre

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0108] Embodiment 1, the service communication between the SS and the SP is realized by sending a service request message from the SS to the SP, Figure 4 It is a flow chart of Embodiment 1 of realizing service communication between SS and SP of the present invention, specifically including the following steps:

[0109] Step 400: the SS sends a service request message to the SP, and the service request message carries the temporary identity of the SS and the UID corresponding to the service applied by the SS.

[0110] In this step, assuming that the security level field storing the security level required by the SS is set in the temporary identity, the SS can search for the security level requirements corresponding to the requested service through the service security level list stored by itself, and find the security level that meets the security level. The temporary identity associated with the shared key Ks.

[0111] If the security level field is not set in the temporary ...

Embodiment 2

[0126] Embodiment 2, the service communication between SS and SP is realized by sending an authentication request message to EAC through SS, Figure 5 It is a flow chart of Embodiment 2 of implementing business communication between SS and SP in the present invention, specifically including the following steps:

[0127] Step 500: When the SS sends an authentication request message to the EAC, the authentication request message also carries the PID of the SS and the UID corresponding to the applied service.

[0128] The authentication request message may also carry authentication capability information of the service entity, that is, supported authentication modes.

[0129] Step 501: After receiving the authentication request message, the EAC queries the preset service security level list to obtain the security level corresponding to the received UID. If the temporary identity of the SP can be obtained through the information stored in association with the security level, it me...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses an authentication method realized by an entity authentication center(EAC) including: the EAC gets an authentication mode meeting the safety grade supported by EAC and said service entity based on the required safety grade and signed information of said entity, EAC and said entity authenticate in the mode and negotiate to generate a shared cryptographic key, EAC distributessafety grade to the key and distributes related information to the entity asking for authentication and stores the association of the related information, shared key and its safety grade in EAC and said service entity, in this invention, EAC provides authentication of different safety grades to service entities and different services among different entities set up trust relationship of differentsafety levels for communication.

Description

technical field [0001] The invention relates to general authentication technology, in particular to a method for implementing authentication by an Entity Authentication Center (EAC, EntityAuthentication Center). Background technique [0002] figure 1 is a schematic diagram of the existing technology end-to-end communication authentication architecture, such as figure 1 As shown, the architecture is applicable to different mobile network standards, and its function is to establish mutual trust relationship between different types of entities, and it is a universal authentication framework in the true sense. figure 1 In addition to the three business entities involved in the network elements shown in the authentication architecture: Service Subscriber (SS, Service Subscriber), Service Subscriber / Provider (SSP, Service Subscriber and Provider), and Service Provider (SP, Service Provider), In the operator's network, an EAC and an Entity Subscription Database (ESD, Entity Subsc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L63/105H04L63/062H04L63/08
Inventor 杨艳梅位继伟
Owner HUAWEI TECH CO LTD