Unlock instant, AI-driven research and patent intelligence for your innovation.

An end-to-end communication authentication method and device

An authentication method and authentication mode technology, which is applied in the field of network security, can solve problems such as unreasonable, inability to handle authentication methods in a unified way, and duplication of interactive messages, and achieve the effect of simplifying authentication steps and flexible content

Active Publication Date: 2010-05-12
HUAWEI TECH CO LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0017] In order to solve the problem that the division of authentication steps in the prior art is too rigid and the authentication process is inflexible, the interactive messages of the authentication steps are repeated and unreasonable, and various authentication methods cannot be handled in a unified manner, and cannot be well compatible with various existing mechanisms. Problem, the present invention provides an end-to-end communication authentication method and device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An end-to-end communication authentication method and device
  • An end-to-end communication authentication method and device
  • An end-to-end communication authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The present invention will be further described below with reference to the accompanying drawings and examples, but it is not intended to limit the present invention.

[0049] The end-to-end communication authentication method of the present invention is as follows:

[0050] First define the authentication mode:

[0051]The E2E authentication mode is mainly determined by the authentication methods of SS and EAC, and sometimes also by the authentication methods of SS and SP. In the authentication mode, the authentication method of SS and EAC, the authentication method of SP and EAC, the authentication method between SS and SP, and the session key generation method are set; for different authentication modes, only the above authentication methods can be set one or more of. For example, in the case where SS and SP can directly authenticate and establish a secure connection, there is no need to perform authentication between SS and EAC and SP and EAC, then only need to se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The provided P2P certification method comprises: sending certification request, selecting and transmitting mode, and certifying data. It also provides the relative three modes for certification. Thisinvention overcomes defects in current technology, and is compatible to all prior art.

Description

technical field [0001] The invention belongs to the field of network security, in particular to a method and device for end-to-end communication authentication. Background technique [0002] The end-to-end communication authentication framework is a general authentication framework applicable to different mobile network standards, and its function is to establish mutual trust relationship between different types of entities. see figure 1 , the network elements involved in this framework include three business entities: SS-Service Provider (101), SSP-Service Subscriber and Provider (102), service provider In addition to the SP-Service Provider (103), there should also be an Entity Authentication Center (EAC-Entity Authentication Center) (104) and an Entity Subscription Information Database (ESD-Entity Subscription Database) (105) in the operator network. ). [0003] Before the service provider can provide services to other entities, or the service contractor requests servi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
Inventor 范絮妍位继伟
Owner HUAWEI TECH CO LTD