Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for key negotiation when terminal equipment is switched

A terminal device and device key technology, applied in the field of communication, can solve the problems of UIP domain security reduction, connection interruption, business interruption, etc.

Active Publication Date: 2018-06-19
HUAWEI TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] For a long time, the Internet Protocol (IP) address is not only an identifier, that is, the identity of the host, but also a locator, that is, the location of the network, so that the separation between the transport layer and the network layer is not complete enough, and multiple network cards of the same host are connected simultaneously. In the mobile network, IP address reassignment may be caused when the terminal moves, resulting in connection interruption and re-establishment. For the scenario where one user has multiple devices in the future, it is required that the service When traffic is seamlessly switched between multiple devices, the traditional Transmission Control Protocol / Internet Protocol (TCP / IP) network cannot support it. Therefore, it is necessary to strip the host identity identification function of the IP address and introduce The new identifier assumes the function of host identity identification, and the user identifier (User ID) introduced in the User Identity Protocol (User Identity Protocol, UIP) can assume the function of host identity identification
[0003] Among them, a UIP network consists of one or more UIP domains, and a UIP domain consists of a location server (Subscriber Location Server, SLS), one or more routers (Domain Router, DR) and one or more gateways (Gateway, GW) For a user with multiple devices, the UserID is assigned by the operator and remains unchanged. One UserID can be associated with multiple device identifiers (DeviceID). However, in this network architecture, the attacker breaks the same user After the key of a certain device is obtained, the key of this device can be used to attack other devices of the user; if the current session key between the user and DR is compromised, the switched terminal device may be attacked, making Reduced security for UIP domains

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for key negotiation when terminal equipment is switched
  • Method and device for key negotiation when terminal equipment is switched
  • Method and device for key negotiation when terminal equipment is switched

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0083] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0084] Such as figure 1 As shown, the UIP (User Identity Protocol, User Identity Protocol) network architecture is composed of one or more UIP domains, and one UIP domain is composed of one location server SLS, one or more routers DR, and one or more gateways GW. Among them, DR saves the user identifier User ID of the user and the mapping relationship between the user's locator Locator, user data forwarding and message address conversion, routers are connected...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention provide a method and device for key negotiation when terminal devices are switched, which relate to the communication field and can improve the security of communication between devices in a user identity protocol network architecture. The method is: receive an access request message sent by the router, the access request message includes a user identifier and a terminal device identifier, and send a first authentication request message to the router, so that after the router receives the first authentication request message, it sends The terminal device sends a second authentication request message. Both the first authentication request message and the second authentication request message include a random value generated by the location server, and a device key is generated according to the random value, the shared key, and the terminal device identifier, and the shared key Corresponding to the user identifier, and then sending an access response message to the router, wherein the access response message includes the device key, so that the router generates a session key according to the device key. The embodiment of the present invention is used for key negotiation when terminal equipment is switched.

Description

technical field [0001] The present invention relates to the communication field, in particular to a method and device for negotiating keys when terminal equipment is switched. Background technique [0002] For a long time, the Internet Protocol (IP) address is not only an identifier, that is, the identity of the host, but also a locator, that is, the location of the network, so that the separation between the transport layer and the network layer is not complete enough, and multiple network cards of the same host are connected simultaneously. In the mobile network, IP address reassignment may be caused when the terminal moves, resulting in connection interruption and re-establishment. For the scenario where one user has multiple devices in the future, it is required that the service When traffic is seamlessly switched between multiple devices, the traditional Transmission Control Protocol / Internet Protocol (TCP / IP) network cannot support it. Therefore, it is necessary to str...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06
Inventor 何文裕何承东
Owner HUAWEI TECH CO LTD