Certifying and key consulting method and its device based on TTP

A key agreement and key material technology, which is applied in the field of TTP-based authentication and key agreement, can solve the problems of the Diffie-Hellman key exchange protocol being irresistible, and achieve the effect of preventing midway interception and leakage, and preventing man-in-the-middle attacks

Inactive Publication Date: 2007-10-10
HUAWEI TECH CO LTD
View PDF0 Cites 65 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0031] However, as can be seen from the above description, the Diffie-Hell...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Certifying and key consulting method and its device based on TTP
  • Certifying and key consulting method and its device based on TTP
  • Certifying and key consulting method and its device based on TTP

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] Hereinafter, the present invention will be described in detail with reference to the accompanying drawings.

[0067] 3 and 4 below illustrate the principle of the present invention.

[0068] It can be seen from the description of related technologies above that the TTP-based authentication and negotiation model can effectively prevent the man-in-the-middle attack in the Diffie-Hellman key exchange protocol by adding TTP to authenticate the identities of the communicating parties. In addition, it can be seen from the above descriptions of related technologies that drawing on the idea of ​​the Diffie-Hellman key exchange protocol can effectively solve the possible Flaws that were intercepted and cracked.

[0069] Therefore, the present invention proposes a solution: the idea of ​​Diffie-Hellman key exchange protocol is adopted in the TTP-based authentication and negotiation model, so that the shared key is directly generated locally by both communication parties without ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The method comprises: a) the service subscriber generates a first parameter used in generating a session key, and sends a service request containing the first parameter to the entity authentication center; b) according to the content of the request, the entity authentication center relays the service requested in the service request to its corresponding service provider; c) the service provider generates a second parameter used in generating a session key, and sends a service confirmation containing the second parameter to the entity authentication center; d) with the first and second parameters, the service provider uses a predetermined algorithm to generate a session key; e) the entity authentication center relays the service confirmation to the service subscriber; f) after receiving the service confirmation, with the first and second parameters, the service subscriber uses a predetermined algorithm to calculate a session key.

Description

technical field [0001] The present invention relates to the field of wireless communication, more specifically, to a TTP-based authentication and key agreement method and device thereof for wireless network end-to-end communication security. Background technique [0002] In end-to-end communication of wireless network services, in order to protect communication content, a communication authentication scheme has been developed. The method for end-to-end communication authentication of wireless network services in the related art will be described below with reference to FIG. 1 . [0003] FIG. 1 is a schematic diagram of an end-to-end communication authentication framework 100 in a related art wireless mobile network. This framework is applicable to different mobile network standards, and its role is to establish mutual trust relationships between different types of entities. A truly universal authentication framework. In addition to the three types of business entities invo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 范絮妍李超位继伟
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products