Unlock instant, AI-driven research and patent intelligence for your innovation.

A network authentication method, device and system

A technology of network authentication and authentication vector, which is applied in the field of network authentication methods, devices and systems, and can solve the problems that pre-shared keys cannot be applied to users and limit the application range of keys.

Active Publication Date: 2018-11-23
CHINA MOBILE COMM GRP CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] For certificate-based TLS / DTLS handshake protocol authentication, it must be based on the certificate system, which is not applicable to users who use pre-shared keys;
[0011] In summary, although the above three authentication methods can solve the authentication problem and generate keys at the same time, due to the limitations of their respective applications, the scope of application of the keys is limited.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network authentication method, device and system
  • A network authentication method, device and system
  • A network authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] The following will clearly and completely describe the technical solution of the present invention in conjunction with the accompanying drawings of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0076] see figure 1 , is a schematic flow diagram of the network authentication provided by the embodiment of the present invention, the flow includes:

[0077] Step 101, acquire the authentication vector sent by the authentication server.

[0078] Receiving the client greeting message sent by the terminal, obtaining the ID information carried in the message, and sending a request message to the authentication server according to the ID information, requesting to obtain the authent...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network authentication method, device and system applied to transport layer security (TLS) protocols / data transport layer security (DTLS) protocols. The method comprises the steps that an authentication vector sent by an authentication server is obtained; authentication fields in the authentication vector are utilized for constructing server key exchange information of a DH-PSK type, and the server key exchange information carried in server greeting information is sent to a terminal; client key exchange information, sent by the terminal, of the DH-PSK type is received, and res information carried in the client key exchange information is obtained; whether the res information is matched with XRES information in the authentication vector is determined; when it is determined that the res information is matched with the XRES information in the authentication vector, authentication success of the terminal is determined, a notification message of the authentication success is sent to the user terminal, and therefore users using pre-shared keys are authenticated.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a network authentication method, device and system. Background technique [0002] In the prior art, the network authentication technology mainly refers to the process of confirming the terminal identity in the network, while the so-called interactive authentication technology mainly refers to two-way authentication, that is, in addition to the network confirming the terminal identity, the terminal can also confirm the identity of the network server. Through the interactive technology of identity network authentication, the network can know the correct identity of the user, prevent illegal user access, and also enable the terminal to confirm the correct identity of the network, preventing attackers from posing as the network to trick users into accessing. The key generation method is combined with authentication, and the information generated by authentication is us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0838H04L63/08
Inventor 齐旻鹏朱红儒
Owner CHINA MOBILE COMM GRP CO LTD