Authentication method, authentication system and relevant device

An authentication and equipment technology, applied in the field of communication, can solve the problem of not really reaching the security level of 128bit key length, and achieve the effect of improving security

Active Publication Date: 2011-04-20
HUAWEI TECH CO LTD
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, in fact, Keymaterial only has a security level of 64bit key length (that is, the length of AKASEED), and does not really meet the security level requirements of 128bit key length for AKA authentication.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, authentication system and relevant device
  • Authentication method, authentication system and relevant device
  • Authentication method, authentication system and relevant device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The embodiment of the present invention provides an authentication method, an authentication system and related equipment, which are used to improve the security of the MD5-based AKA authentication process.

[0041] see figure 1 , an embodiment of the authentication method in the embodiment of the present invention includes:

[0042] 101. The mobile terminal processes according to the first CHAP-Response to obtain a second CHAP-Response;

[0043] In this embodiment, when performing the MD5-based AKA authentication process, the mobile terminal can obtain the first CHAP-Response from the UIM, and the mobile terminal can process the first CHAP-Response to obtain the second CHAP-Response, The specific processing process will be described in detail in the subsequent embodiments.

[0044] It should be noted that the UIM can generate the first CHAP-Response by running the MD5 algorithm.

[0045] 102. The mobile terminal sends the second CHAP-Response to the authentication d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an authentication method, an authentication system and a relevant device which are used for improving the safety of an authentication process. The method comprises the following steps: a mobile terminal processes a first CHAP-Response to obtain a second CHAP-Response, and transmits the second CHAP-Response to an authentication device by a WAG (wireless local area network access gateway); the authentication device compares the second CHAP-Response with a fourth CHAP-Response to carry out an MD5 authentication; and then, the authentication device and the mobile terminal respectively generate an AKA (authentication and key agreement) base key, generate authentication vectors based on the AKA base keys and perfrom AKA authentication. The embodiment ofthe invention also provides the authentication system and the relevant device. The embodiment of the invention can effectively improve the safety of an authentication process.

Description

technical field [0001] The present invention relates to the communication field, in particular to an authentication method, an authentication system and related equipment. Background technique [0002] With the development of network technology, in order to ensure the security of data communication, both communication parties need to perform necessary authentication. [0003] An authentication and key agreement (AKA, Authentication and Key Agreement) authentication method based on message-digest (MD, Message-DigestAlgorithm) 5 in the existing process is generally as follows: [0004] (1) The mobile terminal (MS, MobileSubscriber) first sends a Register message; [0005] (2) After the Wireless Local Area Network Access Gateway (WAG, WirelesslocalareanetworkAccessGateway) receives the Register message, it initiates a Challenge Handshake Authentication Protocol (CHAP, Challenge Handshake Authentication Protocol) random number and CHAPID of the RandomChallenge, and sends it to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/04H04W12/06H04W88/02H04W12/041H04W12/069
Inventor 何承东
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products