Certifying method and its device for radio network end-to-end communication
An authentication method and wireless network technology, applied in the field of wireless network end-to-end communication authentication, can solve the problems such as the inability to prevent password guessing attacks, the heavy burden of mobile terminals, and the easy interception and cracking of shared keys and tickets. , to achieve the effect of enhancing implementability and overcoming security threats
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0139] Referring to FIG. 7 , the first embodiment of the present invention is described below: applying for SGT during mutual authentication between SS and EAC.
[0140] Fig. 7 shows a Kerberos end-to-end authentication mechanism based on mobile network service communication according to the first embodiment of the present invention.
[0141] The process of applying for SGT during mutual authentication between SS and EAC is as follows:
[0142] In step S402, when the service signatory SS sends the authentication or re-authentication request to the entity authentication center EAC, it carries the type label of the service it is about to apply for or frequently uses, and the public identity of the service provider providing the service Parameters such as UID are sent to EAC.
[0143] In step S404, the EAC and the SS negotiate an authentication method supported by both parties according to the operator's policy, the authentication information in the subscription information of t...
no. 2 example
[0154] The second embodiment according to the present invention will be described below with reference to FIG. 8: the SS and the EAC mutually authenticate and then apply for the SGT.
[0155] Fig. 8 shows a Kerberos end-to-end authentication mechanism based on mobile network service communication according to the second embodiment of the present invention.
[0156] The process of applying for SGT after mutual authentication between SS and EAC is as follows:
[0157] In step S502, when the service signatory SS needs to request a certain service, if it does not save the SGT abstract proving that it has the right to apply for this service locally, it should first send a service permission ticket request to the entity authentication center EAC, The message carries parameters such as its own ISR-ID, the type label of the service to be applied for, and the public identity UID of the service provider providing the service.
[0158] In step S504, after the EAC receives the ticket req...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com