Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for realizing user and network authentication and key distribution based on public key

A network authentication and key distribution technology, which is applied in the field of mutual authentication between users and the network and key distribution in communication, can solve the problems of user identity leakage, authentication vectors are easy to be intercepted, and data signatures are not supported, so as to simplify the key The effect of hierarchy

Inactive Publication Date: 2011-04-27
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF4 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] The purpose of the present invention is to propose an improved authentication and key distribution method based on the public key system, which can further solve the existing mechanism of user identity leakage, authentication vector is easily intercepted, long-term shared key K and does not support The problem of data signature, improve the security performance of communication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing user and network authentication and key distribution based on public key
  • Method for realizing user and network authentication and key distribution based on public key
  • Method for realizing user and network authentication and key distribution based on public key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The method of the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0041] In the method of the present invention, both the UE (user equipment) and the network can obtain the other party's certificate, thereby using the other party's public key to protect the authentication message, and using their own private key to sign the message. After the sender's message is transmitted to the receiver, the receiver uses the sender's public key to perform signature verification, and then uses the receiver's private key to decrypt the message. In this way, two-way authentication between the user and the network can be achieved.

[0042] The present invention is based on the public key authentication and key distribution mechanism, and the premise is that a set of public key infrastructure PKI needs to be configured in the communication network. On this basis, as figure 1 As shown, the CA generates the pub...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for realizing user and network authentication and key distribution based on a public key. The method comprises the following steps that: 1) a set of public key infrastructure (PKI) is installed in a communication network, and a certificate authentication centre issues a public key certificate to a communication entity in the network; 2) user equipment and a network mobility management entity perform mutual authentication by checking the public key certificates; 3) the user equipment and a network affiliation user server respectively generate a random number and a session key, wherein the session keys are deduced by the user equipment and the network affiliation user server according to the two random number; and the session keys deduced by the network affiliation user server is transmitted to the network mobility management entity; and 4) the user equipment and the network mobility management entity protect communication data through the session keys. The method can further solve the problem that the existing system easily leaks user identifies, that the authentication vector is easily captured, that the key K is shared for a long time and that a data sign is not supported, and enhance the safety of communication.

Description

technical field [0001] The invention is mainly applied in the communication field, and specifically relates to a public key-based method for realizing mutual authentication between a user and a network and key distribution in communication. Background technique [0002] LTE / SAE (Long Term Evolution / System architecture evolution) is 3GPP's evolution technology for UMTS (Universal Mobile Telecommunications System), which supports 100Mbps downlink and 50Mbps peak uplink under 20MHz spectrum bandwidth rate. The LTE / SAE network consists of user equipment, access network and core network. [0003] In the UMTS system, the mutual authentication between UE (User Equipment) and the network adopts AKA (Authentication and Key Agreement) authentication. The authentication process of the EPS (Evolved Packet System) system is basically the same as the AKA authentication process in UMTS. It adopts the Milenage algorithm, inherits the advantages of the quintuple authentication mechanism in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/06H04W12/0431
Inventor 冯秀涛朱文涛周春芳
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products