Authentication and key negotiation method, and authentication method, system and equipment

一种认证方法、设备的技术,应用在认证技术领域,能够解决无法抵抗重放攻击等问题

Inactive Publication Date: 2012-08-15
HUAWEI TECH CO LTD
View PDF4 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At this time, if the illegal network intercepts the authentication challenge message of the user's last authentication and performs a replay attack, the terminal will mistake the illegal message as a legitimate authentication challenge message, that is, it cannot resist the replay attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication and key negotiation method, and authentication method, system and equipment
  • Authentication and key negotiation method, and authentication method, system and equipment
  • Authentication and key negotiation method, and authentication method, system and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] In order to make the purpose, technical solution and advantages of the present invention clearer, the following will further describe the implementation of the present invention in detail in conjunction with the accompanying drawings.

[0058] The first embodiment of the present invention relates to an authentication and key agreement AKA method. Compared with the existing AKA, the biggest difference between the two lies in the different SQN parameter setting methods. In the existing AKA, SQN is a counter concept. Both the user side and the network side maintain a counter and ensure synchronization. The user terminal can send the counter value (ie SQN) from the network side and the locally maintained counter value ( SQN) is consistent to determine whether the network device sending the SQN is legal. This method requires a user to uniformly maintain a SQN. When the SQN is stored on the user card, no matter how many terminals the user changes, the SQN can be maintained u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of communications and discloses an authentication and key negotiation method, and an authentication method, a system and equipment, so that the replay attack in the process authentication and key agreement (AKA) can be resisted under the condition that a user card does not support save of sequence numbers (SQN). In the method, when a network side receives an authentication request of a terminal, a first authentication code MAC is generated according to a shared key of the terminal, a random number, and a first SQN1 which represents the current system time of the network side, and the random number, the first SQN1 and the first authentication code MAC are transmitted to the terminal; the terminal generates a second authentication code MAC according to a shared key of the network side, the received random number and the random number, if the second authentication code MAC is the same as the first authentication code MAC, a difference between a second SQN2 of the current system time of the terminal side and the first SQN1 meets the preset condition, the terminal determines that the network side is legal.

Description

technical field [0001] The invention relates to the communication field, in particular to authentication technology. Background technique [0002] With the advancement of technology, the evolution from traditional core network to all-IP network has become the trend of network development. The IP-based Multimedia Subsystem (IMS) proposed by the 3rd Generation Partnership Project (3GPP) in the R5 / R6 standard is specifically designed for the next generation of all-IP The multimedia mobile network design system focuses on using IP network to carry mobile multimedia services, enabling operators and end users to obtain faster and more flexible applications from the innovation of multimedia services, thereby increasing revenue and creating profits for operators. [0003] The 3rd Generation Partnership Project 2 (3rd Generation Partnership Project 2, "3GPP2" for short) has formulated a corresponding IMS specification, that is, a Multimedia Domain (Multimedia Domain, "MMD" for short...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/06H04W12/0431
CPCH04L9/0844H04L9/12H04L9/3271
Inventor 赵洁尤昉刘文宇
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products