Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method based on the end-to-end communication of the mobile network

An authentication method and mobile network technology, applied in the field of authentication based on mobile network end-to-end communication, can solve the problems of unsuccessful mutual authentication, non-compliance with business security requirements, and lack of detailed regulations, and achieve increased flexibility and versatility. Effect

Inactive Publication Date: 2007-08-01
HUAWEI TECH CO LTD
View PDF0 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] 1. The NAF in the General Authentication Framework (GAA) can only be used as a functional entity in the mobile network, but not as a functional entity in the open network, so that the UE cannot fully use the service resources in the network;
[0011] 2. With the increasing storage and processing capabilities of mobile terminals, in addition to using services provided by other entities, they may also provide services themselves, and GAA cannot support this situation
As a result, the mobile terminal cannot upgrade its own functions and carry out business and provide services
[0012] 3. The mutual authentication mechanism between UE and BSF can only use authentication and key agreement protocol (AKA); it cannot select the appropriate authentication method for the authentication method supported by the business entity and the service security level requirements used or provided by the entity authentication mechanism
Some business entities may not support this single AKA authentication method, or the AKA authentication method cannot meet the security level requirements of the business, resulting in mutual authentication failure or failure to meet the business security requirements
[0013] 4. The private identity is carried in the re-authentication request, which is easy to leak the confidentiality of the UE identity;
[0014] 5. The mutual authentication process between UE and NAF based on the derived key is not specified in detail. If the two parties use the derived key to directly conduct business communication, the communication between the two parties may fail due to inconsistent use of the derived key, resulting in a decrease in the success rate of the communication between the two.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method based on the end-to-end communication of the mobile network
  • Authentication method based on the end-to-end communication of the mobile network
  • Authentication method based on the end-to-end communication of the mobile network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0099] The present invention is further described below with reference to the accompanying drawings and embodiments, but is not intended to limit the present invention.

[0100] Figure 2 shows the mobile network-based end-to-end communication authentication framework according to the present invention. This framework is suitable for different mobile network standards, and its function is to establish mutual trust between different types of business entities, and it is a real general authentication framework. The network elements involved are in addition to three types of service entities: Service Subscriber (SS) 201 , Service Subscriber and Provider (SSP) 202 , Service Provider (SP) 203 Besides, in the operator's network, there are also an entity authentication center (Entity Authentication Center, EAC) 204 and an entity subscription information database (Entity Subscription Database, ESD) 205 .

[0101] When most application servers provide a certain service to mobile users,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The related certification method bases on mobile network P2P communication to define a general certification frame fit to different mobile network standards that entities can build accredit relation, wherein it includes steps as negotiating certification way, mutual certifying and querying certification. This invention adds flexibility and security strategy for based-derived-key further mutual certification and one dialogue key for one time dialogue, and can simplify the re-certification process on some conditions.

Description

technical field [0001] The invention belongs to the technical field of network communication services, in particular to an authentication method based on mobile network end-to-end communication. Background technique [0002] When most application servers provide a service to mobile users, they should first establish a mutual trust relationship with users, such as between mobile users and authentication agents, mobile users and public key infrastructure (PKI-Public Key-Infrastructure) certificates Between institutions, between mobile users and content providing servers, etc. Generally, this trust relationship is established during the two-way authentication process between the mobile user and the application server. [0003] In the third-generation wireless communication standard, the general authentication framework (GAA-GeneralAuthentication Architecture) is a general structure used by various application business entities to verify user identity. users to check and verif...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04Q7/38H04L9/00H04L29/06H04W12/0431H04W12/069
Inventor 位继伟范絮妍
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products