Service access authentication method and system

A server and authentication key technology, applied in the field of service access authentication methods and systems, can solve the problems of spending user time, increasing server access delay, expensive users, operators and other service providers, and achieving reduced delay, simplified effect of the way

Inactive Publication Date: 2009-05-06
HUAWEI TECH CO LTD
View PDF0 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are problems in this service authentication method: first, if there are many services used, the user needs to hold credentials for different services, and it is inconvenient to manage these credentials; It is very expensive compared to other service providers, and at the same time, it will cost the user some time
Therefore, the service authentication key generation process greatly increases the d

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Service access authentication method and system
  • Service access authentication method and system
  • Service access authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0070] Embodiment one:

[0071] In this embodiment, an implementation manner of generating a preliminary key during an access authentication process to generate a service authentication key is described in detail. Moreover, in this embodiment, the network model of the Internet network is taken as an example for description.

[0072] EAP is an authentication framework that provides an end-to-end authentication mechanism and supports multiple authentication methods, such as: Extended Authentication Protocol-Message-Digest Algorithm 5 (EAP-MD5), Extended Authentication Protocol-Transport Layer Security (EAP-TLS), Extensible Authentication Protocol-Subscriber Identity Module (EAP-SIM), Extended Authentication Protocol-Tunneled Transport Layer Security (EAP-TTLS) and Extended Authentication Protocol-Authentication and Key Agreement (EAP-AKA), etc., and have good scalability. EAP can run directly on the data link layer, such as Point-to-Point Protocol (PPP) and the Institute of Ele...

Example Embodiment

[0125] Embodiment two:

[0126] At present, the cellular mobile communication network is providing services for more than 1 billion users worldwide. The communication network refers to the second-generation mobile communication network and the third-generation network. One of the main advantages of the cellular mobile communication network lies in its wide coverage and vast user group. In the cellular mobile communication system, the authentication mechanisms adopted are SIM card authentication and AKA authentication methods. The following uses the network model of the Universal Mobile Telecommunications System (UMTS) as an example to illustrate specific implementations of the method, system and device for generating a service authentication key in the embodiments of the present invention.

[0127]In this embodiment, the process of generating a service authentication key and using the key for service authentication is divided into two processes: a bootstrap process and a serv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the invention discloses a service authentication key generating method which comprises the following steps: generating a prepared key in the service authentication key hierarchy which is effective in a preset life cycle by a user device and key generator with trust relationship; and generating a service authentication key in the service authentication hierarchy sheared by user device and server according to the prepared key in the service authentication key hierarchy which is effective in the current life cycle when the user device accesses the service. The embodiment of the invention also discloses a service authentication key generating system, a user device and key generator. The method, system and device disclosed by the embodiment of the invention have the advantages of simplifying the generating mode of service authentication key, reducing the delay of server access, and avoiding the condition that two authentications are executed in each accessing.

Description

technical field [0001] The invention relates to authentication technology, in particular to a service access authentication method and system. Background technique [0002] With the development of telecommunications and networks, many users now use more and more services on the Internet network, and cellular operators are also providing some new services, such as the development of many IMS-based core networks. New services such as presence and instant messaging. For the above-mentioned services, on the one hand, the user needs to be authenticated by the service provider to use the corresponding service; on the other hand, the service provider needs to know which user is using the service, so as to implement billing for the user. [0003] Based on the requirements of the above two aspects, the traditional service authentication method is: when a user needs to access a certain service, the user needs to hold the credential that will use the service, for example, the user nam...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W4/24H04L9/32
Inventor 侯保花姚忠辉刘壮
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products