Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method, device, authentication center and system

An authentication method and an authentication device technology, applied in the field of communication, can solve the problems of inapplicability to the Internet of Things, reduce the availability of Internet of Things services, etc., and achieve the effect of improving the usability

Active Publication Date: 2011-11-09
CHINA MOBILE COMM GRP CO LTD
View PDF2 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing authentication methods are not suitable for IoT and may reduce the availability of IoT services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, device, authentication center and system
  • Authentication method, device, authentication center and system
  • Authentication method, device, authentication center and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0043] method embodiment

[0044] figure 2 It is a flow chart of Embodiment 1 of the authentication method according to the present invention, such as figure 2 As shown, this embodiment includes:

[0045]Step S102: The network side preliminarily forms a group of terminal nodes with the same behavior characteristics / behavior capabilities in the Internet of Things, specifically, for example, monitoring devices with shooting and capture characteristics form the same group; and save information in different groups , such as information such as the group, the nodes in the group, and the group key for authentication of the group, at least one representative node can b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication method, an authentication device, an authentication center and an authentication system. The method comprises the following steps of: receiving at least one access request, and acquiring sub-key information from the access request; generating a group key according to the acquired sub-key information; and performing interaction with a network side to realize group authentication according to the group key. By the authentication method, the authentication device, the authentication center and the authentication system, the problem of network burden caused by one-to-one authentication in the prior art can be solved, and a plurality of nodes can be authenticated at a time so as to reduce seized network resources, the calculation resources of a server and the network burden; applicability to the authentication of terminal nodes in the Internet of things can be achieved; and the availability of services of the Internet of things can be greatly improved.

Description

technical field [0001] The invention relates to network security technology in the field of communication, in particular to an authentication method, device, authentication center and system. Background technique [0002] Existing communication network authentication mechanisms are mostly one-to-one two-way authentication methods, including single-key-based authentication and key agreement (Authentication and Key Agreement, AKA) authentication mechanisms, and public-key-based certificate authentication mechanisms. [0003] Such as figure 1 As shown, the single-key authentication mechanism includes: storing the shared key K between the user node and the corresponding home server (HLR / HSS) node; interactive authentication with the corresponding home server node when the user accesses the network; after the authentication is passed, the network The side can only determine the identity of the user node. [0004] The certificate authentication mechanism based on the public key ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08H04W4/70
CPCH04W12/06H04L63/065H04L9/085H04L63/08H04L9/0833H04W4/005H04L63/0884H04W4/70H04W12/069
Inventor 朱红儒齐旻鹏焦文娟
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products