Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for network authentication and authentication

A network authentication and authentication vector technology, applied in the field of network authentication and authentication, can solve problems such as vulnerability to attacks

Active Publication Date: 2019-10-25
CHINA IWNCOMM
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

During this process, the authentication vector traverses different networks and is vulnerable to attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for network authentication and authentication
  • Method and device for network authentication and authentication
  • Method and device for network authentication and authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] In order to improve the security of the LTE network authentication process and prevent authentication parameters from being stolen or tampered with during transmission between network elements, an embodiment of the present invention provides a method for network authentication. In this method, the network The authentication vector passed between elements is signed by the signature private key, and both parties use the consistency check key to perform message integrity calculation, and then verify the message integrity calculation result to achieve authentication, ensuring that the authentication information is transmitted The security in the process and the reliability of authentication.

[0062] The technical solutions provided by the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0063] A network authentication method provided by an embodiment of the present invention is as follows: figure 1 As ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and equipment for network authentication. The method includes: the access network element sends to the terminal through the access network element authentication vector information signed by the second network element signature private key; the terminal verifies the signature of the authentication vector information, and after the verification is successful, generates two Consistency check key, respectively use these two consistency check keys to perform message integrity calculation, and compare with the message integrity calculation results sent by the first network element and the access network element respectively; after the comparison is correct, Then use these two consistency check keys to perform message integrity calculation again, and send the calculation results to the access network element and the first network element respectively; the access network element and the first network element respectively use the consistency Check the key to calculate the integrity of the message, and compare the calculation result with the calculation result sent by the terminal to achieve authentication. The security of the authentication vector information in the transmission process and the reliability of the authentication are guaranteed.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a method and equipment for network authentication. Background technique [0002] The authentication phase of the Long Term Evolution (LTE, Long Term Evolution) network adopts the AKA protocol. In the existing LTE network, there are security loopholes in the authentication and authentication phase, which are specifically reflected in: [0003] Authentication vectors are vulnerable to attacks while in transit. Especially when the terminal roams across the Public Land Mobile Network (PLMN, Public Land Mobile Network), in order to authenticate the terminal, the network element of the home network will send the authentication vector to the network element of the roaming network. During this process, the authentication vector traverses different networks and is vulnerable to attack. Contents of the invention [0004] The purpose of the present invention is to provid...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W12/06H04L9/32H04W12/041H04W12/0471H04W12/069H04W12/10
CPCH04W12/04H04W12/06H04W12/041H04W12/0431H04W12/069
Inventor 赖晓龙曹军铁满霞
Owner CHINA IWNCOMM