Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method and authentication device

An authentication method and authentication equipment technology, applied in user identity/authority verification, security devices, electrical components, etc., can solve problems such as attacker attacks, insecure channels, and inability to guarantee security, and achieve the effect of improving security protection capabilities

Inactive Publication Date: 2015-09-30
HUAWEI TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the insecurity of the channel between the RN device and the USIM, simple AKA authentication is easy to be attacked by attackers, and the security cannot be guaranteed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and authentication device
  • Authentication method and authentication device
  • Authentication method and authentication device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0027] figure 1 It is a schematic flow diagram of the method of the first embodiment of the present invention, including:

[0028] Step 11: RN's MME (MME_RN) obtains the first key generated after signing and authentication, and obtains the second key generated after platform authentication;

[0029] Step 12: MME_RN performs key derivation a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides an authentication method and device. The method includes: obtaining a first key generated after subscription authentication and obtaining a second key generated after platform authentication; and carrying out key deduction so as to obtain a third key according to the first key and the second key, and deducing an NAS key and an AS root key according to the third key, wherein the NAS key is used for protecting an NAS message, the AS root key is used for deducing an AS key and the AS key is used for protecting an AS message and data. The embodiments of the present invention can improve the security protection ability.

Description

technical field [0001] The present invention relates to mobile communication technology, in particular to an authentication method and authentication equipment. Background technique [0002] In the Long Term Evolution (LTE) system, the user equipment (UserEquipment, UE) needs to complete the subscription authentication (subscription authentication), that is, complete the global subscriber identity module (Universal Subscriber Identity Module, USIM) authentication, and the authentication is performed by the UE The authentication and key agreement (Authentication and Key Agreement, AKA) process between the card and the mobile management entity (Mobile Management Entity, MME) is completed. When the evolved base station (evolution NodeB, eNB) starts, it can perform certificate-based key exchange (Internet Key Exchange, IKE) authentication with network elements with interfaces, that is, platform authentication (platform authentication), and establish an IPsec security tunnel, or ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04W12/04H04W12/06H04W12/041H04W12/069
CPCH04W12/06H04W12/04H04W12/0433H04W12/0431H04W12/041H04W12/069
Inventor 张冬梅陈璟
Owner HUAWEI TECH CO LTD