Check patentability & draft patents in minutes with Patsnap Eureka AI!

Multi-party communication authentication method and system

A multi-party communication and authentication technology, applied in the field of system security, can solve the problems of increasing technical application limitations, high communication costs, and difficulty in resolving payment disputes between mobile users and operators

Inactive Publication Date: 2017-01-11
LIAONING MOBILE COMM
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Although the above-mentioned encrypted group call technology based on the TD-LTE trunking communication system can improve the security of the group call to a certain extent, there are still the following defects: First, the encrypted group call technology based on LTE / SAE uses a symmetric key system instead of a public Key system, because this cryptographic system adopts the management method of shared keys, when the number of members in the group is large, there will be problems with the security management of authentication keys, which will easily cause payment disputes between mobile users and operators that are difficult to resolve ; Therefore, this method has many limitations on the encryption of communication information itself
Secondly, the participants of the group call must be in a cluster of cells in the group call area, which increases the limitations of technical applications
Finally, every time a new member joins or leaves, all keys must be updated centrally. Every time the key update process requires all users to interact with HSS again, the communication cost is relatively high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-party communication authentication method and system
  • Multi-party communication authentication method and system
  • Multi-party communication authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0091] Embodiment 1 is the multi-party communication authentication method provided by the present invention when the number of UEs is three. figure 1 and figure 2 A schematic diagram of the implementation flow of the multi-party communication authentication method provided in Embodiment 1 of the present invention, such as figure 1 and figure 2 As shown, the method includes:

[0092] Step 110: Bidirectional authentication is performed between the user terminal UE and the network.

[0093] Here, each UE that accesses the family group chat needs to first perform the two-way authentication in step 110 to ensure the reliability and accuracy of the UE side and the network side; the UE may specifically be a mobile phone, a smart terminal, a multimedia devices and streaming devices.

[0094] Specifically, as figure 2 As shown, before step 110, that is, before a plurality of the UEs access the family group chat, the method further includes:

[0095] Step 101: The UE sends a u...

Embodiment 2

[0126] Embodiment 2 is the multi-party communication authentication method provided by the present invention when the number of UEs is greater than three. image 3 A schematic diagram of the implementation flow of the multi-party communication authentication method provided in Embodiment 2 of the present invention, such as image 3 As shown, the method includes:

[0127] Step 210: Bidirectional authentication is performed between the user terminal UE and the network.

[0128] Step 220: Calculate the transmission session key of the UE according to a multi-party communication key agreement algorithm and a membership change algorithm, wherein the multi-party communication key agreement algorithm negotiates the transmission session key based on an asymmetric key system, and the The membership change algorithm calculates the transmission session key when a member joins, a member leaves, merges between groups and splits between groups based on the cluster structure.

[0129] Step ...

Embodiment 3

[0132] Embodiment 3 describes the multi-party communication key agreement algorithm, and the communication key agreement algorithm is only applicable to the multi-party communication key agreement between three UEs.

[0133] Specifically, when the three UEs perform multi-party communication key negotiation, the three UEs use the multi-party communication key agreement algorithm to calculate a transmission session key for communication between the UEs; the multi-party communication key The key agreement algorithm includes the following steps:

[0134] Step 310: After the network authentication is successful, the first UE uses the first IMSI as the first public key, and uses f (the first IMSI) as the first private key s 1 ; The second UE uses the second IMSI as the second public key, and uses f (the second IMSI) as the second private key s 2 ; The third UE uses the third IMSI as the third public key, and uses f (the third IMSI) as the third private key s 3 .

[0135] In step ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a multi-party communication authentication method. The authentication method comprises steps of: carrying out mutual authentication between a user end (UE) and a network; calculating a transmission session key of the UE according to a multi-party communication key negotiation algorithm, wherein the multi-party communication key negotiation algorithm is based on an asymmetrical key system negotiation transmission session key; and after the UE acquires the transmission session key, encrypting the transmission data and carrying out multi-party communication. The invention also discloses a multi-party communication authentication system.

Description

technical field [0001] The invention relates to the field of system security in the Time-division Long Term Evolution (TD-LTE, Time-division Long Term Evolution) communication technology, and in particular, to a multi-party communication authentication method and system. Background technique [0002] With the continuous strengthening of the family concept, family group activities are becoming more and more frequent, and the communication between family groups is increasing day by day. The simple two-party call has been limited by communication. Therefore, the two-party call mode is increasingly unable to meet the communication of family users. need. The family group chat can further tap the potential of the communication market by providing the function of multi-party calls for the whole family, and the communication security issues in the process of family group chat have also received more and more attention. [0003] At present, the main security threats faced in network...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/06H04L29/06H04L9/08
CPCH04L63/0869H04W12/06H04L9/0838H04L63/0442
Inventor 章启星李慧王海明
Owner LIAONING MOBILE COMM
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More