Negotiation method of authentication and key negotiation algorithm, network side equipment and user equipment

A network-side device and key negotiation technology, which is applied in the field of negotiation between network-side devices and user devices, authentication and key agreement algorithms, can solve problems such as equipment discarding, and achieve the effect of ensuring security

Pending Publication Date: 2016-02-03
CHINA MOBILE COMM GRP CO LTD
View PDF10 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] For the pluggable USIM card, the above security threats can be avoided by discarding it and replacing it with a new one that is pre-installed with other secure authentication and key agreement algorithms; and for the eSIM that is welded on the IoT device when it leaves the factory card, there is no remedy, because the eSIM card is not pluggable, which directly leads to the discarding of the device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Negotiation method of authentication and key negotiation algorithm, network side equipment and user equipment
  • Negotiation method of authentication and key negotiation algorithm, network side equipment and user equipment
  • Negotiation method of authentication and key negotiation algorithm, network side equipment and user equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0135] In this embodiment, according to the reported IMSI of the Subscriber Identity Card, the HSS searches for the IMSI corresponding to the IMSI of the Subscriber Identity Card from the pre-stored IMSI of the Subscriber Identity Card and the corresponding relationship between the authentication and key agreement algorithms that it can support. Authentication and key agreement algorithm, and select an authentication and key agreement algorithm that can be supported by both the user identification card and the HSS as the authentication and key agreement algorithm between the user identification card and the HSS. For details, refer to figure 1 , figure 1 It is a schematic flowchart of an authentication and key agreement algorithm in Embodiment 1 of the present invention, and the method includes the following steps:

[0136] Step S101: storing the corresponding relationship between the IMSI of the subscriber identity card and the authentication and key agreement algorithms it ca...

Embodiment 2

[0150] In this implementation, the HSS selects an authentication and key agreement algorithm that can be supported by both the subscriber identity card and the HSS according to the information of the authentication and key agreement algorithm reported by the subscriber identity card, as the authentication and key agreement algorithm between the subscriber identity card and the HSS. Key agreement algorithm, please refer to image 3 , image 3 It is a schematic flow diagram of the authentication and key agreement algorithm in Embodiment 2 of the present invention, and the method includes the following steps:

[0151] Step S301: the subscriber identity card reports the authentication and key agreement algorithm information it can support to the ME.

[0152] Step S302: After the ME receives the information about the authentication and key agreement algorithms it can support reported by the subscriber identity card, it sends an attach or location update message to the MME, and the...

Embodiment 3

[0164] In this implementation, the subscriber identity card protects the authentication and key agreement algorithm information it can support and then reports it to the network side. The protection method can be: use its own private key to sign the information or use the key shared by the card and HSS to calculate the HMAC value for the authentication and key agreement algorithm information supported by the user identification card and then report it to the network. When the HSS receives the information of the protected authentication and key agreement algorithm reported by the user identification card, it first verifies the signature or HMAC value, and only after the verification is successful, it selects an authentication and key that both the user identification card and the HSS can support. Negotiation algorithm, as the authentication and key agreement algorithm between the subscriber identity card and HSS, please refer to Figure 4 , Figure 4 It is a schematic flow dia...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a negotiation method of an authentication and key negotiation algorithm, network side equipment and user equipment. The method comprises the following steps: acquiring information of the authentication and key negotiation algorithm that a user identification card can support by the network side equipment; selecting an authentication and key negotiation algorithm that the user identification card and an HSS (Home Subscriber Server) can both support by the network side equipment according to the authentication and key negotiation algorithm that the user identification card and the Home Subscriber Server HSS can support; and taking the selected algorithm as the authentication and key negotiation algorithm between the user identification card and the HSS by the network side equipment. By adopting the negotiation method of the authentication and key negotiation algorithm, the network side equipment and the user equipment provided by the invention, the HSS and the user identification card can negotiate the authentication and key negotiation algorithm used by the HSS and the user identification card.

Description

technical field [0001] The invention relates to the field of network and information security, in particular to a method for negotiating an authentication and key agreement algorithm, network side equipment and user equipment. Background technique [0002] In 3GPP (Third Generation Partnership Project, Third Generation Partnership Project), the key architecture and key generation mechanism of 3G and LTE (Long Term Evolution, Long Term Evolution) are defined. In order to protect the root key shared between the USIM (UniversalSubscriberIdentityModule, user identification card) and HSS (HomeSubscriberServer, home customer server), when the UE (UserEquipment, user equipment) and the network side device perform authentication, the USIM card and HSS will be based on The root key uses the authentication and key agreement algorithm (currently in 3G / LTE, the authentication and key agreement algorithm is the Milenage algorithm) to generate encryption keys Ck and IK, and Ck / IK is used ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08
Inventor 庄小君朱红儒
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products