Password updating method, user equipment (UE), user position server and domain router
An update method and a technology of user equipment, applied in the field of communication, can solve the problems of low password security and the like
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0169] figure 2 It is a flow chart of the password updating method provided by Embodiment 1 of the present invention. The method is executed by UE. The method of the present embodiment comprises the steps:
[0170] S201. The UE receives a first key negotiation parameter sent by the SLS; the first key negotiation parameter is generated by the SLS using a key exchange algorithm according to a private key of the SLS.
[0171] Optionally, the SLS may be an SLS in the UIP domain where the UE is located. The first key negotiation parameter may be a key negotiation parameter of the SLS, and the first key negotiation parameter may be used as first challenge information to generate a master session key between the UE and the SLS. The first key agreement parameter may be denoted as ChallengeSLS. The private key of the SLS may be a random value generated by the SLS. The key exchange algorithm may be a Diffie-Hellman key exchange algorithm.
[0172] For example, the SLS may obtain ...
Embodiment 2
[0208] Embodiment 2 of the present invention also provides a password update method. image 3 It is a flow chart of the password updating method provided by Embodiment 2 of the present invention. Such as image 3 As shown, the method, in S203 of the first embodiment above, the UE obtaining the protection identifier of the second key negotiation parameter according to the second key negotiation parameter and the original password may include:
[0209] S301. The UE obtains a protection identifier of the second key negotiation parameter according to a product of the second key negotiation parameter and a hash value of the original password.
[0210] The UE may obtain the protection identifier of the second key negotiation parameter by using the following formula (7) according to the second key negotiation parameter and the hash value of the original password.
[0211] ChallengeUE * =(ChallengeUE)*(PWold) formula (7)
[0212] Among them, ChallengeUE * is the protection identi...
Embodiment 3
[0264] Embodiment 3 of the present invention also provides a password update method. Figure 4It is a flow chart of the password update method provided by Embodiment 3 of the present invention. Such as Figure 4 As shown, on the basis of any password update method in the second embodiment above, the method may also include:
[0265] S401. The UE receives the random value sent by the DR, the first integrity verification code, and the identity of the DR; the first integrity verification code is generated by the DR according to the first verification key, the identity of the DR, and the random value hash authentication code.
[0266] Wherein, the first verification key is generated by the DR according to the first session subkey; the first session subkey is generated by the DR using a pseudo-random function according to the first switching subkey; the first switching The subkey is generated and sent to the DR by using a key generation function according to the first handover r...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 