Certifying method and its device for radio network end-to-end communication
An authentication method and wireless network technology, applied in the field of wireless network end-to-end communication authentication, can solve the problems of not being able to well prevent password guessing attacks, heavy burden on mobile terminals, and easy interception and cracking of shared keys and tickets , to achieve the effect of enhancing implementability and overcoming security threats
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0144] Refer below Figure 7 To illustrate the first embodiment according to the present invention: SS and EAC apply for SGT during mutual authentication.
[0145] Figure 7 It shows the Kerberos end-to-end authentication mechanism based on mobile network service communication according to the first embodiment of the present invention.
[0146] The process of applying for SGT during mutual authentication between SS and EAC is as follows:
[0147] In step S402, when the service signatory SS sends the authentication or re-authentication request to the entity authentication center EAC, it carries the type label of the service it is about to apply for or frequently uses, and the public identity of the service provider providing the service Parameters such as UID are sent to EAC.
[0148] In step S404, the EAC and the SS negotiate an authentication method supported by both parties according to the operator's policy, the authentication information in the subscription information ...
no. 2 example
[0159] The following will refer to Figure 8 Hereinafter, the second embodiment according to the present invention is described: the SS and the EAC mutually authenticate each other and then apply for the SGT.
[0160] Figure 8 It shows the Kerberos end-to-end authentication mechanism based on mobile network service communication according to the second embodiment of the present invention.
[0161] The process of applying for SGT after mutual authentication between SS and EAC is as follows:
[0162] In step S502, when the service signatory SS needs to request a certain service, if it does not save the SGT abstract proving that it has the right to apply for this service locally, it should first send a service permission ticket request to the entity authentication center EAC, The message carries parameters such as its own ISR-ID, the type label of the service to be applied for, and the public identity UID of the service provider providing the service.
[0163] In step S504, a...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com