Method for realizing intra-mobile entity authentication and cipher key negotiation using short message

A technology of key agreement and mobile entity, which is applied in the direction of public key for secure communication, user identity/authority verification, radio/inductive link selection arrangement, etc. Message non-repudiation and anonymity, increase the processing delay of SMS system, etc., to achieve the effect of less communication overhead, easy operation, and broad application prospects

Inactive Publication Date: 2007-12-05
BEIJING UNIV OF TECH
View PDF0 Cites 47 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The main problems of this scheme are: 1) what is provided is not end-to-end security, and the security gateway is a safe connection point; 2) the scheme increases the processing delay of the SMS system; 3) the security gateway is the bottleneck of the system, and any of its Performance or security issues may affect all users and applications; 4) Its key management and authentication protocols cannot directly establish a trust relationship between users and servers, and are not suitable for applications with many entities and diverse security requirements. Provide message non-repudiation and anonymity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing intra-mobile entity authentication and cipher key negotiation using short message
  • Method for realizing intra-mobile entity authentication and cipher key negotiation using short message

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] What Fig. 1 represented is the overall flow chart of the present invention. Firstly, the mobile terminal and the application server respectively submit service application requests 100 and 200 , then perform the first authentication and key agreement process 300 , and then perform the re-authentication and key agreement process 400 .

[0027] Figure 2 shows the process of the mobile terminal applying for services from the TAA before the authentication and key agreement process officially starts. The mobile terminal 110 submits a service application request to the TAA 500 through the network or in written form. The application service request at least includes: mobile phone number, name of the owner of the mobile terminal, ID number and mailing address.

[0028] The TAA500 produces an authentication smart card (ASC, Authentication Smart Card) 120 that can represent the identity of the mobile terminal, and issues it to the mobile terminal. The mobile terminal 110 insert...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for entity authentication and key consultation by short message, which belongs to security domain of motion network. The characteristic is: using the identity information in the short message and the last value of the Hasche chain in the TAA public key encryption as the key when doing the fisrt certification and call between the mobile termination of the credible authentication center TAA and the application server. After that, can just shift the length of the Hasche chain to be bigger than 0 to do the Hasche operation once more by the short message. Verify the termination identity comparing with the former Hasche value as the new key for identity. The invention has few expenses, simple operation, without bottleneck, the support of anonymous and secure merit.

Description

technical field [0001] The invention belongs to the field of mobile network security, and in particular relates to an authentication and key negotiation method realized by using short messages, which can be used between a mobile terminal and an application server or between a mobile terminal and a mobile terminal. Background technique [0002] Mobile network applications make full use of the mobility, convenience and individuality of the network and mobile terminals, overcome the limitations of traditional network applications in terms of space distance, save time, funds and other costs of network applications, and promote the global integration of the economy , providing users and merchants with a broader and more convenient transaction channel. Mobile network applications involve huge economic interests of individuals and society, so security is a key factor in the development of mobile network applications. Two-way authentication between mobile network application entiti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30H04Q7/22H04W12/0431H04W12/069
Inventor 姜楠王健
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products