System, apparatus and method for authentication

An authentication and algorithm technology, applied in the field of authentication systems, can solve problems such as potential safety hazards and attacks

Inactive Publication Date: 2007-10-31
HUAWEI TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in this scheme, since IPSEC is not established, there are potential security risks, and destructive attacks may be realized by using IP address spoofing, such as counterfeiting users to perform operations such as deregistration

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System, apparatus and method for authentication
  • System, apparatus and method for authentication
  • System, apparatus and method for authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0140] The invention provides a system, device and method for authentication. A detailed description will be given below in conjunction with the accompanying drawings.

[0141] As shown in FIG. 6 , it is a flow chart of the first embodiment of the authentication method of the present invention.

[0142] Step 1: the user terminal (UE) sends a registration request to the call session control function (CSCF), requesting to register to the IMS network;

[0143] Step 2: CSCF requests authentication data from Home Subscriber Server (HSS);

[0144] Step 3: HSS requests authentication data from the Home Location Register (HLR);

[0145] Step 4: HLR generates random number Randr, and uses CAVE algorithm to generate authentication data Authr according to the random number Randr, and feeds back the authentication data Authr to HSS;

[0146] Step 5: HSS uses Authr to generate a key and Randr to generate Rand, and uses the AKA algorithm to calculate the 5-tuple authentication vector AV ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A system which is used to check authority includes the first entity, the second entity, the third entity, thereinto: the first entity and the second entity possess credit mechanism, the second mechanism and the third mechanism can exchange random number which is associated with the first random number; said third entity is used to generate the first check authority data based on the first random number with the first arithmetic, and generate the second check authority data based on the first check authority data; said first entity is used to generate the first check authority data based on the first random number with the first arithmetic; said second entity is used to generate the third check authority data according to the first check authority data come from the first entity; said third entity and said second entity check authority by said second check authority data and said third check authority data. The invention also provides a device and method for checking authority. The invention can make check authority between user terminal and IMS network more reliable.

Description

technical field [0001] The present invention relates to the field of wireless communication networks, in particular to a system, device and method for authentication. Background technique [0002] With the evolution to the next generation network (NGN), the IP-based network architecture will inevitably make the mobile network face some security problems inherent in IP networks. The mobile communication network will eventually evolve into an open network, which can provide users with an open application program interface to meet the individual needs of users. Due to the openness of the network and the characteristics of wireless transmission, security issues will become one of the core issues of the entire mobile communication system. [0003] WCDMA, CDMA2000, TD-SCDMA will be the mainstream technology of the third generation mobile communication. The security norms of WCDMA and TD-SCDMA are formulated by 3GPP (3GPartnershipProject) with Europe as the main body, and the sec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/28
Inventor 刘文宇徐杰
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products