Unlock instant, AI-driven research and patent intelligence for your innovation.

Method of authenticating request message and related equipment

A request message and authentication technology, applied in the field of communication, can solve the problems of increasing application response delay and many interactive messages, and achieve the effect of improving the speed and simplifying the authentication process.

Active Publication Date: 2008-04-16
HUAWEI TECH CO LTD
View PDF0 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this case, according to the existing authentication method, the UE needs to perform the above-mentioned key negotiation and security association process according to different ASs, and there are too many interactive messages, which increases the delay of the application response

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of authenticating request message and related equipment
  • Method of authenticating request message and related equipment
  • Method of authenticating request message and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] An embodiment of the present invention provides an authentication scheme for a request message, which will be described in detail below from the perspectives of an authentication service device, an application server, and a terminal.

[0034] The authentication method of the authentication service device for the request message in the embodiment of the present invention refers to FIG. 2 , including:

[0035] A1. Negotiate key information with the terminal, and assign an authentication transaction identifier and an authentication random number corresponding to the key information to the terminal.

[0036]This embodiment does not limit the key negotiation method between the authentication service device and the terminal, as long as the two parties can obtain the shared key information through negotiation, it is only necessary to expand the negotiation method used so that the authentication service can be The authentication random number allocated by the device is delivere...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for authenticating request messages. An authentication service device centrally distributes and manages authentication uniform random numbers, and when a terminal uses the protected service, only by performing one-time key negotiation process, authentications with a plurality of application servers can be ordinally fulfilled according to the using policy of the authentication uniform random numbers. The invention also provides a corresponding authentication service device, application servers and terminals. The invention simplifies the authentication process between the terminals and applications and increases the response speed of the applications.

Description

technical field [0001] The present invention relates to the technical field of communication, and in particular to an authentication method for request messages by authentication service equipment, an authentication method for terminal requests by an application server, an authentication method for terminals, and corresponding authentication service equipment, application servers and terminals. Background technique [0002] With the continuous enrichment and development of communication services, both operators and users need a reliable security mechanism to ensure the legal use of services. For example, in the multimedia broadcast / multicast service (MBMS: Multimedia Broadcast / Multicast Service) based on the Internet Protocol (IP: Internet Protocol) multimedia subsystem (IMS: IP Multimedia Subsystem), when the user needs to access the protected In the case of MBMS services, the terminal is usually authenticated. A commonly used authentication process can refer to Figure 1, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06
CPCH04L67/02H04L9/3213H04L63/062H04L63/168H04L9/083H04L63/0823H04L29/0809H04L63/08
Inventor 孙超
Owner HUAWEI TECH CO LTD