Method, system and equipment for authentication

An authentication method and equipment technology, applied in electrical components, wireless communication, safety devices, etc., can solve problems such as AP equipment authentication

Inactive Publication Date: 2012-08-01
CHINA ACAD OF TELECOMM TECH
View PDF4 Cites 49 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0017] Embodiments of the present invention provide an authentication meth

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and equipment for authentication
  • Method, system and equipment for authentication
  • Method, system and equipment for authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0077] In order to realize authentication of an AP device by a UE and authentication of a UE by an AP device, an embodiment of the present invention provides an authentication method. In this method, a terminal and an AP device use an AKA algorithm to authenticate each other.

[0078] The embodiments of the present invention can be applied in the newly introduced long-term evolution local area network (Local Area Network, LTE-LAN) system, and can also be applied in other systems including UE, AP equipment, gateway equipment and HSS.

[0079] Such as Figure 2A As shown, in the LTE-LAN ​​system, the AP device is a new access device. The existing LTE physical layer technology is used on the air interface. After the synchronization between the AP devices is completed, the gateway device accesses the Internet. The frequency band used by the AP device There is no overlap with the frequency band of the macro base station (eNB). In the LTE-LAN ​​system, the UE completes the data ser...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention, which relates to the wireless communication technology field, discloses a method, a system and equipment for authentication, so that a problem of how to carry out authentication between a terminal and an access point (AP) device can be solved. According to the invention, a terminal sends identification information of the terminal to an AP device; the AP device sends an authentication request carrying the identification information of the terminal to a home subscriber server (HSS) through gateway (GW) equipment; the HSS determines a root key that is arranged for the terminal corresponding to the terminal identification in advance; according to the root key and an authentication and key agreement (AKA) algorithm, an AKA authentication vector is obtained by calculation; the AKA authentication vector is sent to the AP device through GW equipment; and the AP device sends the AKA authentication vector to the terminal and the terminal uses the AKA algorithm to carry out verification on the AKA authentication vector and determines whether the AP device is legal or not according to the verification result. Therefore, the authentication on the AP device by the terminal is realized.

Description

technical field [0001] The present invention relates to the technical field of wireless communication, in particular to an authentication method, system and equipment. Background technique [0002] In recent years, with the popularity of the mobile Internet (Mobile Internet) and smart phones, the demand for mobile data traffic has grown rapidly, and indoor data services account for a considerable proportion. Indoor and hotspot data services are characterized by the fact that users are usually fixed or move at a very low speed, and do not have high requirements for mobility; on the other hand, data services are mainly Internet services based on the Internet Protocol (Internet Protocol, IP). Service, QoS) requirements are relatively simple, and far lower than the requirements of carrier-class services for QoS. The traditional cellular mobile communication system is mainly designed for high-speed mobility and seamless switching of carrier-class services. When it carries large ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/06H04W12/0433H04W12/069
Inventor 徐晖艾明赵瑾波秦飞
Owner CHINA ACAD OF TELECOMM TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products