Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method, key distribution method, and authentication and key distribution method

An authentication method and key distribution technology, which is applied in the field of authentication and key distribution, and can solve problems such as incomplete compliance

Inactive Publication Date: 2011-12-28
IND TECH RES INST
View PDF8 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing technology does not fully meet the requirements of the above authentication mechanism

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, key distribution method, and authentication and key distribution method
  • Authentication method, key distribution method, and authentication and key distribution method
  • Authentication method, key distribution method, and authentication and key distribution method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] Several exemplary embodiments are described in detail below in conjunction with the accompanying drawings to further describe the present invention in detail.

[0055] The term "mobile station (UE)" used in the present invention below may also mean a "mobile station" (mobile station, MS) or an "advanced mobile station" (advanced mobile station, AMS), or an MTC device, and The MTC device is, for example, a vehicle-mounted communication device, a sensor, a water meter, a gas meter, an electric meter, a sensor device, a digital camera device, a mobile phone, a smart phone, a personal computer (personal computer, PC), a notebook PC, a netbook PC, a digital TV, Tablet PC and so on. In addition, the term "network application entity (NAF)" used in the present invention below may also mean "MTC server".

[0056] Figure 4 It is a schematic flowchart of a device authentication method according to the first exemplary embodiment of the present invention. The device authenticati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an authentication method, a key distribution method, and an authentication and key distribution method. The method is suitable for machine-to-machine communication and includes the following steps. At least one mobile station transmits an application program request including at least one first security authentication data to a network application entity, and the first security authentication data is not a key directly obtained by a startup procedure of the universal startup framework. The network application entity generates a second security authentication data according to the first security authentication data, and the second security authentication data is not the key. The network application entity replies an application response including at least the second security authentication data to the mobile station. In addition, the network application entity authenticates the mobile station according to the second security authentication data, or the mobile station authenticates the network application entity according to the second security authentication data.

Description

technical field [0001] The present invention relates to an authentication method (device authentication method), a key distribution method (key distribution method), and an authentication and key distribution method that can be used in machine-to-machine communication (Machine type communication, MTC). Background technique [0002] Machine-to-machine communication (MTC) refers to a communication technology that exchanges information between machines without (or with little) human intervention by means of wireless communication technology. figure 1 An MTC network architecture is shown. Please refer to figure 1 , in this MTC network architecture, the MTC network architecture includes the Internet (Internet) 11, MTC users 120, and MTC devices 101, 102, 103, 104 and so on. In practice, an MTC network can support a large number of MTC devices. The Internet (Internet) 11 also includes a centralized MTC server 110 . The MTC user 120 usually accesses the data of the MTC server 1...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08H04W12/04H04W12/06H04W12/0431
CPCH04W12/06H04W12/04H04L2209/80H04L9/083H04L9/0822H04L63/062H04L63/08H04L63/123H04W4/70H04W12/0431
Inventor 王瑞堂黄贵笠休布朗修·辛格葛达·史蒂芬杨人顺
Owner IND TECH RES INST