Unlock instant, AI-driven research and patent intelligence for your innovation.

Password updating method, user equipment (UE), user position server and domain router

An update method and a technology of user equipment, applied in the field of communication, can solve the problems of low password security and the like

Active Publication Date: 2016-12-07
HUAWEI TECH CO LTD
View PDF6 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although the new user password is encrypted and sent to the server, if the old user password is obtained by an attacker, the encrypted information is easily intercepted by the attacker and the new user password is obtained through an offline dictionary attack, thereby making the password update less secure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password updating method, user equipment (UE), user position server and domain router
  • Password updating method, user equipment (UE), user position server and domain router
  • Password updating method, user equipment (UE), user position server and domain router

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0169] figure 2 It is a flow chart of the password updating method provided by Embodiment 1 of the present invention. The method is executed by UE. The method of the present embodiment comprises the steps:

[0170] S201. The UE receives a first key negotiation parameter sent by the SLS; the first key negotiation parameter is generated by the SLS using a key exchange algorithm according to a private key of the SLS.

[0171] Optionally, the SLS may be an SLS in the UIP domain where the UE is located. The first key negotiation parameter may be a key negotiation parameter of the SLS, and the first key negotiation parameter may be used as first challenge information to generate a master session key between the UE and the SLS. The first key agreement parameter may be denoted as ChallengeSLS. The private key of the SLS may be a random value generated by the SLS. The key exchange algorithm may be a Diffie-Hellman key exchange algorithm.

[0172] For example, the SLS may obtain ...

Embodiment 2

[0208] Embodiment 2 of the present invention also provides a password update method. image 3 It is a flow chart of the password updating method provided by Embodiment 2 of the present invention. Such as image 3 As shown, the method, in S203 of the first embodiment above, the UE obtaining the protection identifier of the second key negotiation parameter according to the second key negotiation parameter and the original password may include:

[0209] S301. The UE obtains a protection identifier of the second key negotiation parameter according to a product of the second key negotiation parameter and a hash value of the original password.

[0210] The UE may obtain the protection identifier of the second key negotiation parameter by using the following formula (7) according to the second key negotiation parameter and the hash value of the original password.

[0211] ChallengeUE * =(ChallengeUE)*(PWold) formula (7)

[0212] Among them, ChallengeUE * is the protection identi...

Embodiment 3

[0264] Embodiment 3 of the present invention also provides a password update method. Figure 4It is a flow chart of the password update method provided by Embodiment 3 of the present invention. Such as Figure 4 As shown, on the basis of any password update method in the second embodiment above, the method may also include:

[0265] S401. The UE receives the random value sent by the DR, the first integrity verification code, and the identity of the DR; the first integrity verification code is generated by the DR according to the first verification key, the identity of the DR, and the random value hash authentication code.

[0266] Wherein, the first verification key is generated by the DR according to the first session subkey; the first session subkey is generated by the DR using a pseudo-random function according to the first switching subkey; the first switching The subkey is generated and sent to the DR by using a key generation function according to the first handover r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiments of the invention provide a password updating method, user equipment (UE), a user position server and a domain router. The password updating method comprises the following steps: receiving first secret key negotiation parameters sent by an SLS, wherein the first secret key negotiation parameters are generated by the SLS according to a secret key of the SLS by use of a secret key exchange algorithm; according to a secret key of UE, generating second secret key negotiation parameters by use of the secret key exchange algorithm; according to the second secret key negotiation parameters and an original password, obtaining protection identifications of the second secret key negotiation parameters; according to the first secret key negotiation parameters, the secret key of the UE and a destination password, obtaining a protection identification of the destination password; and sending the protection identifications of the second secret key negotiation parameters and the protection identification of the destination password to the SLS, wherein the protection identifications of the second secret key negotiation parameters are used for enabling the SLS to obtain the destination password according to the original password, the second secret key negotiation parameters, the secret key of the SLS and the protection identification of the destination password. According to the embodiments of the invention, the password updating security can be improved.

Description

technical field [0001] The embodiment of the present invention relates to communication technology, and in particular to a password updating method, user equipment, user location server and domain router. Background technique [0002] With the development of network technology, network-based applications such as e-commerce and instant network communication are sweeping the world, and network security problems are becoming more and more serious. In the current network, user access control is often used to verify the legitimacy of user identity. The most common access control method is to verify user identity by matching user passwords. This requires the user to set a user password when registering, and the server side saves the user password of the user so that the user can be authenticated when accessing the network. If the user changes the user password, the server needs to be notified, so that the server updates the saved user password to the changed user password. [0...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/08
Inventor 李兴华李鑫何文裕
Owner HUAWEI TECH CO LTD