Public key password system based LTE wireless network security certification system

A public-key cryptosystem and security authentication technology, which is applied in wireless communication, security devices, electrical components, etc., can solve the problems of insufficient security, cost, and poor scalability, so as to improve scalability and enhance security , the effect of high flexibility

Inactive Publication Date: 2015-07-01
HOHAI UNIV
View PDF3 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This new way described in this patented describes how it makes sure that an ephemeral communication link between two devices works properly even if there are many other connections being used simultaneously or at different times during operation (such as when transmitting data). It also allows users to easily switch from one connection mode to another without disrupting their sessions on both ends connected through these same links. Overall, this innovation provides better protection against attacks like denial-of service attacks while still allowing them to work effectively over longer periods of time.

Problems solved by technology

The technical problem addressed in this patented text relates to current systems used for securely communicating over different types of channels like Wireless Local Area Network Access Protocol (WLAN) or Long Term Evolution Unlicensed Mobile Communications System (UMTS). These existing solutions are vulnerable due to their low level of security features and lack of efficient implementation methods.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Public key password system based LTE wireless network security certification system
  • Public key password system based LTE wireless network security certification system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] Such as figure 1 As shown, the authentication and key agreement process of the protocol is improved in the present invention. There are three entities involved in authentication and key negotiation: UE, MME and HSS. K represents the shared key between UE and HSS, K0 represents the pre-shared symmetric key between MME and HSS, PKU and PKM represent the public keys of UE and MME respectively, and PKU -1 , PKM -1 Denote the private keys of UE and MME respectively.

[0029] The concrete steps that adopt the method provided by the invention to carry out security authentication are:

[0030] (1) The UE initiates an access request to the MME. The request contains the UE's HSS ID HSS , IMSI and R1 encrypted with the MME public key PKM. Wherein, R1 is a random number generated by the UE, which is used for identity verification and participation in key generation.

[0031] (2) After the MME receives the UE's access request message, it decrypts to obtain the IMSI and the ra...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a public key password system based LTE wireless network security certification system. The method comprises the steps of distributing public key certificates to an entity UE and MME participating in the AKA process; improving the process of EPS AKA protocol; encrypting through the public key password system; synchronously removing the sequence number SQN system of the original protocol, and verifying by the random number answer mode; simplifying the calculation of authentication vector AV, namely, removing the original MAC, XRES and AUTN and other parameters. With the adoption of the method, the security of the EPS AKA protocol can be improved, and the expandability can be improved; the method is relatively high in flexibility; as the development of the LTE technology, the method can be applied to a plurality of situations, in particular suitable for LET enterprise exclusive network with high security requirement, such as power wireless exclusive network.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner HOHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products