Access control method and device
An access control and message technology, applied in the field of communication, can solve problems such as inability to respond to service requests in a timely manner, low security of network communication, and damage to the integrity of bills, etc., to reduce the probability of denial of service attacks, improve security, and reduce the number of Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0074] In this embodiment, one master key is used to generate note data encryption key information and note integrity encryption key information. For ease of description, the master key in this embodiment is called TPK, and the two key information generated by the above-mentioned TPK are called Ke and Ka.
[0075] The generation process of MIKEY-TICKET is as follows:
[0076] Check the integrity of the entire MIKEY-TICKET according to MPK, Ka and RAND to get the MAC;
[0077] Using Ka to encrypt the MPK;
[0078] Use Ke to encrypt information other than the MPK in the KEMAC field.
[0079] The initiator sends the MIKEY-TICKET, and when the network signaling node in the network receives the MIKEY-TICKET, its processing flow is as follows, as follows: Figure 4 Shown:
[0080] Step 401, according to the configured corresponding relationship between the MIKEY-TICKET key identifier and TPK, obtain the master key corresponding to the MIKEY-TICKET.
[0081] The MIKEY-TICKET key...
Embodiment 2
[0097] In this embodiment, two master keys are used to generate the ticket data encryption key information and the ticket integrity encryption key information respectively, wherein the two master keys are independent of each other. For ease of description, the above two key information are referred to as TPKe and TPKa.
[0098] The generation process of MIKEY-TICKET is as follows:
[0099] Check the integrity of the entire MIKEY-TICKET according to MPK, Ka and RAND to get the MAC;
[0100] Using TKa to encrypt the MPK;
[0101] Use TKe to encrypt other information in the KEMAC field except MPK.
[0102] The initiator sends the MIKEY-TICKET, and when the network signaling node in the network receives the MIKEY-TICKET, its processing flow is as follows, as follows: Figure 5 Shown:
[0103] Step 501, according to the corresponding relationship between the configured MIKEY-TICKET key identifier and TPKa, obtain the decrypted MPK from the MIKEY-TICKET;
[0104] Step 502: Perf...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
