Method for realizing safety model of access authentication in mobile internet

A mobile Internet and security model technology, applied in the security field of the mobile Internet, can solve the problem of large data transmission volume, achieve the effects of small authentication delay, load balance, and prevent denial of service attacks

Inactive Publication Date: 2011-11-23
NANJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The introduction of P2P technology has led to an increasing amount of data transmission, and data security issues w

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing safety model of access authentication in mobile internet
  • Method for realizing safety model of access authentication in mobile internet
  • Method for realizing safety model of access authentication in mobile internet

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] 1. System structure:

[0031] The entire authentication scheme is for the user terminal to quickly access the mobile Internet and realize the two-way authentication of the user and the network node. The authentication process includes user access to the network, user authentication network service node, service node authentication user node, session key generation and other parts. Due to the need to realize information exchange between two different platforms, two sets of TCP-based socket transmissions are established. One group of sockets is used to realize the information transmission between the user terminal and the management node, and the other group of sockets is used to realize the authentication service between the user terminal and the authentication server. All other functional modules are implemented separately on the two platforms.

[0032] 2. Method flow

[0033] 2.1 Introduction to Authentication Scenarios

[0034] In order to facilitate the descr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for realizing a safety model of access authentication in the mobile internet. In the method provided by the invention, an authentication server with a P2P (Peer 2 Peer) framework is arranged in the mobile internet; the access authentication safety of the mobile internet is solved by utilizing an AKA (Also Known As) authentication mechanism; the concrete flow of AKA in the mobile internet is described; the whole authentication course is realized through C knowledge programming by utilizing socket; the core framework of the mobile internet is realized by combining the distributed techniques such as a P2P technique and the like; an operator can establish a carrier-class network capacity platform capable of being expanded and providing multimedia applications and content applications; the framework based on the P2P technique can still provide the service for users under the condition of actual effects of a single node; the mobile internet can collect network bandwidth resources for the service through the P2P technique, thereby improving the throughput capacity of the service flow; and the P2P technique is the development direction of the mobile internet, thus the realization of the research for the AKA authentication mechanism based on the P2P framework extremely has reality significances.

Description

technical field [0001] The present invention is a security solution for the access authentication mechanism in the mobile Internet. The mobile Internet architecture targeted by the present invention adopts P2P technology, which is mainly used to improve the security of the access authentication in the mobile Internet, and belongs to the mobile Internet. field of security technology. Background technique [0002] Mobile Internet is the product of the integration of Internet, mobile terminal equipment and mobile communication technology. According to CNNIC's survey, as of the end of June 2009, the number of mobile Internet users in China was 155 million. According to the survey, as of the end of August 2009, China's mobile Internet users accounted for 34.2% of the total number of mobile phone users, with a total scale of 180 million, and the trend of steady growth is still maintained. The integration of mobile communication technology and Internet technology is bringing peopl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/06H04W12/08H04W80/04
Inventor 肖甫徐国兴王汝传孙力娟韩志杰林巧民邵星李鹏
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products