Unlock instant, AI-driven research and patent intelligence for your innovation.

Update method and system of session key

A technology of session key and update method, applied to the field of communication, can solve problems such as inability to guarantee user communication security, and achieve the effect of reducing security risks and enhancing security

Active Publication Date: 2011-04-13
苏州医疗器械产业发展集团有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the current user's key is intercepted, fast re-authentication cannot guarantee the user's subsequent communication security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Update method and system of session key
  • Update method and system of session key
  • Update method and system of session key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] This embodiment introduces the process of updating the session key according to the parent key of the current session key (i.e. key A), such as image 3 shown, including the following steps:

[0038] Step 300: After successful security authentication between the terminal and the authentication server, the terminal and the authentication server respectively obtain fast re-authentication information, generate key material (including key A), and further generate other key materials according to key A. Subkey A1 (ie session key);

[0039] Step 310: The terminal sends a fast re-authentication request to the authentication server, and the fast re-authentication request includes fast re-authentication information;

[0040] Step 320: Based on the fast re-authentication information, the terminal and the authentication server authenticate each other;

[0041] During the authentication process, the authentication server authenticates with the terminal based on the existing user ...

Embodiment 2

[0047] This embodiment introduces the process of updating the session key according to the sibling key (i.e. key B) of the parent key of the current session key, such as Figure 4 shown, including the following steps:

[0048] Step 400: After successful security authentication between the terminal and the authentication server, the terminal and the authentication server respectively obtain fast re-authentication information, and generate key materials (including keys A and B), and further generate Its subkey A1 (ie session key);

[0049] Step 410: The terminal sends a fast re-authentication request to the authentication server, and the fast re-authentication request includes fast re-authentication information;

[0050] Step 420: Based on the fast re-authentication information, the terminal and the authentication server authenticate each other;

[0051] The authentication server authenticates each other with the terminal according to the existing user information and fast re-...

Embodiment 3

[0057] What this embodiment introduces is that the terminal and the Transport Authentication and authorization functional entity (TAA, Transport Authentication and authorization functional entity) in the ITU-T NGN perform the key update process in the fast re-authentication process, such as Figure 5 , including the following steps:

[0058] Step 500: the terminal sends a security authentication request to the TAA;

[0059] Step 510: ATT authenticates the terminal and returns an authentication response, and the terminal and ATT are completely authenticated successfully;

[0060] In the above-mentioned full authentication process, the terminal and the server respectively obtain fast re-authentication information, generate key materials (including key A), and further generate their subkey A1 (ie session key) according to key A;

[0061] Step 520: The terminal sends a fast re-authentication request to the TAA, and the fast re-authentication request includes fast re-authenticatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses update method and system of a session key, relating to the technical field of communication. The update method disclosed by the invention comprises the following step of: generating a new session key together by a terminal and an authentication server according to fast re-authentication identity information and a key material which generates the current session key during the fast re-authentication process, wherein the new session key takes into effect when rapid re-authentication is successful. In the technical scheme, users do not use the current session key after fast re-authentication, and the new session key is generated, therefore, potential safety hazard brought by key reuse is reduced and session security is improved.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a method and system for updating a session key. Background technique [0002] NGN (Next Generation Network, next-generation communication network), as an evolved network framework based on packet switching, has received more and more attention. The international standard organization ITU-T and other regional standard organizations (ETSI, ATIS, etc.) have conducted extensive research and standardization work on the NGN framework model, services and related fields. [0003] NGN can support heterogeneous network access, inter-network roaming and seamless handover. When the mobile user terminal is handed over, it is necessary to ensure the continuity of the service, and at the same time ensure the privacy and integrity of the signaling data and user data between the mobile user terminal and the NGN network access point. In the current NGN network, after the mobile user termin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/06H04W12/041
CPCH04L63/0892H04L63/0823H04L9/0891H04L9/32
Inventor 王鸿彦韦银星
Owner 苏州医疗器械产业发展集团有限公司