Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication and cryptographic key negotiation method, authentication method, system and equipment

A technology of key negotiation and authentication, applied in the field of authentication technology, which can solve the problem of inability to resist replay attacks

Active Publication Date: 2008-09-24
HUAWEI TECH CO LTD
View PDF0 Cites 88 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At this time, if the illegal network intercepts the authentication challenge message of the user's last authentication and performs a replay attack, the terminal will mistake the illegal message as a legitimate authentication challenge message, that is, it cannot resist the replay attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication and cryptographic key negotiation method, authentication method, system and equipment
  • Authentication and cryptographic key negotiation method, authentication method, system and equipment
  • Authentication and cryptographic key negotiation method, authentication method, system and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] In order to make the purpose, technical solution and advantages of the present invention clearer, the following will further describe the implementation of the present invention in detail in conjunction with the accompanying drawings.

[0058] The first embodiment of the present invention relates to an authentication and key agreement AKA method. Compared with the existing AKA, the biggest difference between the two lies in the different SQN parameter setting methods. In the existing AKA, SQN is a counter concept. Both the user side and the network side maintain a counter and ensure synchronization. The user terminal can send the counter value (ie SQN) from the network side and the locally maintained counter value ( SQN) is consistent to determine whether the network device sending the SQN is legal. This method requires a user to uniformly maintain a SQN. When the SQN is stored on the user card, no matter how many terminals the user changes, the SQN can be maintained u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of commutation and discloses an authentication and key negotiation method, an authentication method, a system and a device, which leads a user card to be capable of resisting the playback attack during the process of an AKA under the situation of not supporting SQN storing. In the invention, when a network side receives the authentication request of a terminal, a random number, a first sequence number SQN1 and a first authentication code MAC are sent to the terminal according to the shared key, the random number and the first authentication code MAC generated by the first sequence number SQN1, the first authentication code MAC represents the current system time at the network side; if a second authentication code XMAC is the same as the first authentication code MAC, and the difference value of a second sequence number SQN2 representing the current system time at the terminal side and the first sequence number SQN1 meet a preset condition, the terminal determines the network side legal according to the key shared with the network side, the received random number and the first authentication code MAC generated by the first sequence number SQN1.

Description

technical field [0001] The invention relates to the communication field, in particular to authentication technology. Background technique [0002] With the advancement of technology, the evolution from traditional core network to all-IP network has become the trend of network development. The IP-based Multimedia Subsystem (IMS) proposed by the 3rd Generation Partnership Project (3GPP) in the R5 / R6 standard is specifically designed for the next generation of all-IP The multimedia mobile network design system focuses on using IP network to carry mobile multimedia services, enabling operators and end users to obtain faster and more flexible applications from the innovation of multimedia services, thereby increasing revenue and creating profits for operators. [0003] The 3rd Generation Partnership Project 2 (3rd Generation Partnership Project 2, "3GPP2" for short) has formulated a corresponding IMS specification, that is, a Multimedia Domain (Multimedia Domain, "MMD" for short...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06H04L12/28H04Q7/38H04W12/0431H04W12/06
CPCH04L9/3271H04L9/0844H04L9/12
Inventor 赵洁尤昉刘文宇
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products