Method and device for network authentication and authentication
A network authentication and authentication vector technology, applied in the field of network authentication and authentication, can solve problems such as vulnerability to attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0061] In order to improve the security of the LTE network authentication process and prevent authentication parameters from being stolen or tampered with during transmission between network elements, an embodiment of the present invention provides a method for network authentication. In this method, the network The authentication vector passed between elements is signed by the signature private key, and both parties use the consistency check key to perform message integrity calculation, and then verify the message integrity calculation result to achieve authentication, ensuring that the authentication information is transmitted The security in the process and the reliability of authentication.
[0062] The technical solutions provided by the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.
[0063] A network authentication method provided by an embodiment of the present invention is as follows: figure 1 As ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


