Authentication method, key distribution method, and authentication and key distribution method
An authentication method and key distribution technology, which is applied in the field of authentication and key distribution, and can solve problems such as incomplete compliance
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0054] Several exemplary embodiments are described in detail below in conjunction with the accompanying drawings to further describe the present invention in detail.
[0055] The term "mobile station (UE)" used in the present invention below may also mean a "mobile station" (mobile station, MS) or an "advanced mobile station" (advanced mobile station, AMS), or an MTC device, and The MTC device is, for example, a vehicle-mounted communication device, a sensor, a water meter, a gas meter, an electric meter, a sensor device, a digital camera device, a mobile phone, a smart phone, a personal computer (personal computer, PC), a notebook PC, a netbook PC, a digital TV, Tablet PC and so on. In addition, the term "network application entity (NAF)" used in the present invention below may also mean "MTC server".
[0056] Figure 4 It is a schematic flowchart of a device authentication method according to the first exemplary embodiment of the present invention. The device authenticati...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 