Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Certifying method and its device for radio network end-to-end communication

An authentication method and wireless network technology, applied in the field of wireless network end-to-end communication authentication, can solve the problems of not being able to well prevent password guessing attacks, heavy burden on mobile terminals, and easy interception and cracking of shared keys and tickets , to achieve the effect of enhancing implementability and overcoming security threats

Active Publication Date: 2010-04-21
HUAWEI TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0027] 1. Since the user and the AS request authentication through passwords, password guessing attacks cannot be well prevented;
[0028] 2. In a wireless network, when the service requester is a mobile terminal, the transmission of shared keys and tickets over the air interface is easy to be intercepted and cracked; and
[0029] 3. It is necessary to apply for a ticket twice to obtain the service, which is too burdensome for the mobile terminal
[0030] Therefore, the Kerberos model of the above-mentioned related technologies cannot be well applied to wireless networks, and people need to provide a solution that can solve the problems in the above-mentioned related technologies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Certifying method and its device for radio network end-to-end communication
  • Certifying method and its device for radio network end-to-end communication
  • Certifying method and its device for radio network end-to-end communication

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0144] Refer below Figure 7 To illustrate the first embodiment according to the present invention: SS and EAC apply for SGT during mutual authentication.

[0145] Figure 7 It shows the Kerberos end-to-end authentication mechanism based on mobile network service communication according to the first embodiment of the present invention.

[0146] The process of applying for SGT during mutual authentication between SS and EAC is as follows:

[0147] In step S402, when the service signatory SS sends the authentication or re-authentication request to the entity authentication center EAC, it carries the type label of the service it is about to apply for or frequently uses, and the public identity of the service provider providing the service Parameters such as UID are sent to EAC.

[0148] In step S404, the EAC and the SS negotiate an authentication method supported by both parties according to the operator's policy, the authentication information in the subscription information ...

no. 2 example

[0159] The following will refer to Figure 8 Hereinafter, the second embodiment according to the present invention is described: the SS and the EAC mutually authenticate each other and then apply for the SGT.

[0160] Figure 8 It shows the Kerberos end-to-end authentication mechanism based on mobile network service communication according to the second embodiment of the present invention.

[0161] The process of applying for SGT after mutual authentication between SS and EAC is as follows:

[0162] In step S502, when the service signatory SS needs to request a certain service, if it does not save the SGT abstract proving that it has the right to apply for this service locally, it should first send a service permission ticket request to the entity authentication center EAC, The message carries parameters such as its own ISR-ID, the type label of the service to be applied for, and the public identity UID of the service provider providing the service.

[0163] In step S504, a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Being in use to implement authentication end-to-end in Kerberos model of wireless network, the method includes following steps: (1) the party to a contract of service sends authentication request (AR)to entity authentication center (EAC); AR includes id of public identity of service provider corresponding to services requested by the party to a contract; (2) EAC makes out authentication responsecorresponding to AR based on information contained in AR; (3) if authentication response validates AR, then EAC sends out service request carrying certification that the party to a contract of servicehas passed authentication, and credence entitled to the use the service; (4) the party to a contract of service makes out service response to the service request; (5) if service response is successful, corresponding service starts to carry out between the party to a contract of service and the service provider.

Description

technical field [0001] The present invention relates to the field of wireless communication, and more specifically relates to a method and a device for applying the Kerberos model to wireless network end-to-end communication authentication. Background technique [0002] In end-to-end communication of wireless network services, in order to protect communication content, a communication authentication scheme has been developed. The following will refer to figure 1 A method for end-to-end communication authentication of a wireless network service in the related art will be described. [0003] figure 1 Shown is a schematic diagram of an end-to-end communication authentication framework 100 in a wireless mobile network in the related art. This framework is applicable to different mobile network standards, and its function is to establish mutual trust relationship between different types of entities. It is a real A common authentication framework in the sense. In addition to t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 范絮妍位继伟李超
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products