Method for getting service key

A service key and service technology, applied in the field of authentication, can solve the problems of reducing network security, operator losses, user and NAF threats, etc., to eliminate security risks, reduce losses, improve service reliability and network security. Effect

Active Publication Date: 2007-12-19
HUAWEI TECH CO LTD
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0023] From the process shown in Figure 2 and Figure 3, it can be seen that the Ks used by the NAF to initiate the Push service is the same as that used by the UE when the UE initiates the service, and the calculation method of using Ks to calculate the NAF-related key is the same, and the resulting NAF-related The key is also the same, so the problem is: if the UE has initiated the service to the NAF before the NAF initiates the Push service to the UE, the NAF must have saved the NAF-related key used for communication with the UE. Therefore, when the NAF initiates the push service, it does not need to initiate a key request to the BSF, but directly uses the NAF-related key used by the UE to initiate the service for the push service, which will allow the NAF to use the Push service without subscribing to the Push service. service, or make NAF use the Push service to pretend to be a service initiated by the UE when subscribing to the push service. In the former case, it is obvious that the NAF will use network resources free of charge and cause losses to the operator; for the latter In this case, if the usage fee of the Push service is higher than the usage fee of the service initiated by the UE, it will also cause losses to the operator
In addition, if the service initiated by the UE to the NAF and the push service initiated by the NAF to the UE share the same key, the key leakage of one of the services will cause the other service to be attacked, which will also affect the user and the NAF itself. poses a threat and reduces network security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for getting service key
  • Method for getting service key
  • Method for getting service key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] The present invention will be further described in detail below in conjunction with the drawings and specific embodiments.

[0058] Fig. 4 is a flowchart of obtaining the service key of the push service initiated by NAF under GAA according to the first embodiment of the present invention. As shown in Fig. 4, the specific steps are as follows:

[0059] Step 401: NAF determines to initiate a push service to a certain UE.

[0060] Step 402: NAF judges whether it saves the push service key corresponding to the UE, if yes, execute step 407; otherwise, execute step 403.

[0061] If the NAF stores the push service key, the NAF associates the push service key with the UE's B-TID, and at the same time stores the corresponding relationship between the B-TID and the UE's permanent identity.

[0062] If the NAF has initiated a Push message to the UE, the NAF may save the push service key corresponding to the UE.

[0063] Step 403: NAF sends a key request message to BSF, which carries U...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention discloses a method for obtaining service keys including: NAF determines services to be initiated to send a push service key request to BSF, which applies the key computation method to compute the obtained push service key based on the obtained push service key and returns it to the NAF to send the push information to UE, which computes to get the push service key. This invention can differentiate the service key initiated actively by NAF and that initiated by UE by altering the computation formula of the service key started up by UE or adding a push service authorization label parameter for the push service key so as to avoid that NAF not ordering the push service uses the service.

Description

Technical field [0001] The present invention relates to the field of authentication technology, in particular to a method for obtaining a service key applied in a service initiated by a network side. Background technique [0002] In the third-generation wireless communication standard, the General Authentication Framework (GAA) is a user identity verification structure used by multiple application service entities and provides a key for secure communication for users to access application services. Application services can be multicast / broadcast services, user certificate services, instant information provision services, etc., or agency services. [0003] Figure 1 is a schematic diagram of the GAA structure. As shown in Figure 1, GAA is usually composed of a user terminal (UE) 101, a guided authentication server entity (BSF) 102 that performs initial check and verification of user identity, a user home server (HSS) 103, and positioning The subscriber entity (SLF) 104 and the netw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/22H04L9/00H04L9/30H04W12/0431
CPCH04L63/06
Inventor 何承东杨艳梅
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products