Secret key updating method, device and system

A key update and session key technology, applied in the communication field, can solve problems such as waste of network resources, achieve the effect of improving efficiency and saving network resources

Inactive Publication Date: 2017-08-29
ZTE CORP
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a key update method, device and system to at least solve the problem of waste of network resources cau

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret key updating method, device and system
  • Secret key updating method, device and system
  • Secret key updating method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0049] Hereinafter, the present invention will be described in detail with reference to the drawings and in conjunction with the embodiments. It should be noted that the embodiments in this application and the features in the embodiments can be combined with each other if there is no conflict.

[0050] It should be noted that the terms "first" and "second" in the specification and claims of the present invention and the above-mentioned drawings are used to distinguish similar objects, and not necessarily used to describe a specific sequence or sequence.

[0051] In this embodiment, a key update method is provided, figure 1 Is a flowchart of a key update method according to an embodiment of the present invention, such as figure 1 As shown, the process includes the following steps:

[0052] Step S102: The server receives the user identity information of the Internet of Things IOT device, and determines whether the time point of receiving the user identity information is within a valid ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a secret key updating method, a device and a system. The method comprises the steps of receiving the user identity information of IOT equipment of the Internet of Things by a server, and judging whether the time point for receiving the user identity information is within an effective duration or not, wherein the effective duration is a duration set by the server after the IOT equipment completes the access authentication each time; on the condition that the judgment result is yes, sending the specified information used for generating the session secret key of the IOT equipment to the IOT equipment by the server. According to the technical scheme of the invention, the problem in the prior art that the IOT equipment of the Internet of Things must be authenticated when the IOT equipment is accessing to the Internet of Things for sending data so as to cause the waste of network resources can be solved. Furthermore, the effect of saving network resources is realized. The secret key updating efficiency is improved.

Description

Technical field [0001] The present invention relates to the field of communications, and in particular to a method, device and system for updating a key. Background technique [0002] At present, in the Enhanced Data Rate for GSM Evolution (EGPRS) technology, authentication and key agreement are completed in an authentication and key agreement (Authentication and Key Agreement, AKA) process of. For Internet of Things (IoT) devices, they do not need to continuously send data, so they do not need to be online all the time, but only need to access the network when sending data. Every time it accesses the network, IoT devices need to be authenticated and key negotiation to ensure communication security. Authentication and key agreement are completed in an AKA process. [0003] However, in the Cellular Internet of Things (CIoT) system, there are a huge number of IoT devices, and the IoT devices may continuously but intermittently send data. The system needs to perform authentication...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04W12/04H04L9/08
CPCH04L9/0891H04L63/06H04W12/04H04L9/08H04W12/0433H04W12/041H04L9/40
Inventor 余万涛
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products