Update method and system of session key
A technology of session key and update method, applied to the field of communication, can solve problems such as inability to guarantee user communication security, and achieve the effect of reducing security risks and enhancing security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0037] This embodiment introduces the process of updating the session key according to the parent key of the current session key (i.e. key A), such as image 3 shown, including the following steps:
[0038] Step 300: After successful security authentication between the terminal and the authentication server, the terminal and the authentication server respectively obtain fast re-authentication information, generate key material (including key A), and further generate other key materials according to key A. Subkey A1 (ie session key);
[0039] Step 310: The terminal sends a fast re-authentication request to the authentication server, and the fast re-authentication request includes fast re-authentication information;
[0040] Step 320: Based on the fast re-authentication information, the terminal and the authentication server authenticate each other;
[0041] During the authentication process, the authentication server authenticates with the terminal based on the existing user ...
Embodiment 2
[0047] This embodiment introduces the process of updating the session key according to the sibling key (i.e. key B) of the parent key of the current session key, such as Figure 4 shown, including the following steps:
[0048] Step 400: After successful security authentication between the terminal and the authentication server, the terminal and the authentication server respectively obtain fast re-authentication information, and generate key materials (including keys A and B), and further generate Its subkey A1 (ie session key);
[0049] Step 410: The terminal sends a fast re-authentication request to the authentication server, and the fast re-authentication request includes fast re-authentication information;
[0050] Step 420: Based on the fast re-authentication information, the terminal and the authentication server authenticate each other;
[0051] The authentication server authenticates each other with the terminal according to the existing user information and fast re-...
Embodiment 3
[0057] What this embodiment introduces is that the terminal and the Transport Authentication and authorization functional entity (TAA, Transport Authentication and authorization functional entity) in the ITU-T NGN perform the key update process in the fast re-authentication process, such as Figure 5 , including the following steps:
[0058] Step 500: the terminal sends a security authentication request to the TAA;
[0059] Step 510: ATT authenticates the terminal and returns an authentication response, and the terminal and ATT are completely authenticated successfully;
[0060] In the above-mentioned full authentication process, the terminal and the server respectively obtain fast re-authentication information, generate key materials (including key A), and further generate their subkey A1 (ie session key) according to key A;
[0061] Step 520: The terminal sends a fast re-authentication request to the TAA, and the fast re-authentication request includes fast re-authenticatio...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 