Check patentability & draft patents in minutes with Patsnap Eureka AI!

Machine-to-machine (M2M) terminal authentication system and M2M terminal authentication method

A terminal authentication and terminal technology, applied in the machine-to-machine field, can solve the problems of reducing communication quality, unable to guarantee M2M service quality, difficult to meet M2M terminals, etc. Effect

Active Publication Date: 2011-10-19
ZTE CORP
View PDF3 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the 3GPP network, if each M2M terminal independently completes authentication and data transmission with the network according to the existing authentication method, then the 3GPP network will face the situation that it cannot handle such a huge number of user requests, which seriously reduces the The quality of service of M2M services, meanwhile, the quality of communication between people will be greatly affected
[0006] Due to the current 3GPP network authentication method, it is difficult to meet the increasingly large number of M2M terminals in the future. Moreover, due to the substantial increase in the number of signaling required, the service quality of M2M services cannot be guaranteed, thereby reducing the communication quality.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Machine-to-machine (M2M) terminal authentication system and M2M terminal authentication method
  • Machine-to-machine (M2M) terminal authentication system and M2M terminal authentication method
  • Machine-to-machine (M2M) terminal authentication system and M2M terminal authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] figure 1 It is a schematic diagram of the composition and structure of the M2M terminal authentication system of the present invention, such as figure 1 As shown in , it mainly includes M2M terminal gateways, M2M terminals and operator networks, among which,

[0042] The M2M terminal gateway is used to complete mutual authentication with the operator network and the M2M terminal respectively according to the key allocated by the equipment vendor and the key allocated by the operator.

[0043] The M2M terminal is used to complete mutual authentication with the M2M terminal gateway according to the key allocated by the equipment vendor and the key allocated by the operator.

[0044] The operator's network is used to complete mutual authentication with the M2M terminal gateway according to the key allocated by the equipment vendor and the key allocated by the operator.

[0045] The communication mode between the M2M terminal gateway and the M2M terminal may be, but not l...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a machine-to-machine (M2M) terminal authentication system and an M2M terminal authentication method. In the system, by adoption of a layered authentication mechanism, the authentication of an operator network on an M2M terminal gateway is realized, wherein the authentication comprises the authentication of equipment and the authentication of users, so the M2M terminal gateway is prevented from being falsified, attacked or cloned by a malicious user; and then the authentication of the M2M terminal gateway on the M2M terminal is realized, wherein the authentication correspondingly comprises the authentication of the equipment and the authentication of the users. By the M2M terminal authentication system, the greatly-increased signaling load of the operator network caused by supporting of M2M service is greatly reduced, so the quality of the M2M service is guaranteed, and the quality of communication is further guaranteed.

Description

technical field [0001] The present invention relates to machine-to-machine (M2M) technology, in particular to an M2M terminal authentication system and authentication method. Background technique [0002] With the development and maturity of M2M technology and the diversification of M2M applications, the number of M2M terminals will increase sharply. It is estimated that the number of M2M terminals will reach two orders of magnitude of the number of handheld terminals. [0003] At present, the authentication of the handheld terminal in the 3GPP network is based on the two-way authentication of the shared key: [0004] Both the mobile terminal side and the network side pre-store the shared key. Every time the terminal needs to access the network, the network needs to generate the authentication vector RAND‖XRES‖CK‖IK‖AUTN according to the shared key between it and the handheld terminal. RAND is a random number. CK is the encryption key, IK is the integrity key, AUTN is the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06
CPCH04W12/06H04W4/70H04W12/126
Inventor 朱允文田甜韦银星高峰
Owner ZTE CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More