Multi-party communication authentication method and system
A multi-party communication and authentication technology, applied in the field of system security, can solve the problems of increasing technical application limitations, high communication costs, and difficulty in resolving payment disputes between mobile users and operators
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0091] Embodiment 1 is the multi-party communication authentication method provided by the present invention when the number of UEs is three. figure 1 and figure 2 A schematic diagram of the implementation flow of the multi-party communication authentication method provided in Embodiment 1 of the present invention, such as figure 1 and figure 2 As shown, the method includes:
[0092] Step 110: Bidirectional authentication is performed between the user terminal UE and the network.
[0093] Here, each UE that accesses the family group chat needs to first perform the two-way authentication in step 110 to ensure the reliability and accuracy of the UE side and the network side; the UE may specifically be a mobile phone, a smart terminal, a multimedia devices and streaming devices.
[0094] Specifically, as figure 2 As shown, before step 110, that is, before a plurality of the UEs access the family group chat, the method further includes:
[0095] Step 101: The UE sends a u...
Embodiment 2
[0126] Embodiment 2 is the multi-party communication authentication method provided by the present invention when the number of UEs is greater than three. image 3 A schematic diagram of the implementation flow of the multi-party communication authentication method provided in Embodiment 2 of the present invention, such as image 3 As shown, the method includes:
[0127] Step 210: Bidirectional authentication is performed between the user terminal UE and the network.
[0128] Step 220: Calculate the transmission session key of the UE according to a multi-party communication key agreement algorithm and a membership change algorithm, wherein the multi-party communication key agreement algorithm negotiates the transmission session key based on an asymmetric key system, and the The membership change algorithm calculates the transmission session key when a member joins, a member leaves, merges between groups and splits between groups based on the cluster structure.
[0129] Step ...
Embodiment 3
[0132] Embodiment 3 describes the multi-party communication key agreement algorithm, and the communication key agreement algorithm is only applicable to the multi-party communication key agreement between three UEs.
[0133] Specifically, when the three UEs perform multi-party communication key negotiation, the three UEs use the multi-party communication key agreement algorithm to calculate a transmission session key for communication between the UEs; the multi-party communication key The key agreement algorithm includes the following steps:
[0134] Step 310: After the network authentication is successful, the first UE uses the first IMSI as the first public key, and uses f (the first IMSI) as the first private key s 1 ; The second UE uses the second IMSI as the second public key, and uses f (the second IMSI) as the second private key s 2 ; The third UE uses the third IMSI as the third public key, and uses f (the third IMSI) as the third private key s 3 .
[0135] In step ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



