Authentication method, terminal and server

A server and authentication technology, applied in the field of communications, to simplify the authentication process, reduce manual participation, and reduce manual participation.

Active Publication Date: 2017-09-26
HUAWEI TECH CO LTD
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the authentication of non-card devices strongly relies on manual interaction intervention, which is not suitable for the unattended communication characteristics of M2M type

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, terminal and server
  • Authentication method, terminal and server
  • Authentication method, terminal and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0056] The terms "component", "module", "system" and the like are used in this specification to refer to a computer-related entity, hardware, firmware, a combination of hardware and software, software, or software in execution. For example, a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and / or a computer. By way of illustration, both an application ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authentication method, terminal and server, and the method, terminal and server can reduce the manual participation degree of terminal equipment in an authentication process of an access network. The method is used in a system for the authentication through a safety secret key and a server. The method comprises the steps that first equipment transmits a first access request message to the server in a first time period, wherein the first equipment is equipment which does not hold a shared secret key; the first equipment receives a first authentication challenge message transmitted by the server based on the first access request message, wherein the first authentication challenge message carries authentication parameters, and the authentication parameters are used for generating a derived secret key; the first equipment transmits an authentication assurance request message to assurance equipment, wherein the authentication assurance request message comprises authentication parameters; the first equipment receives a first derived secret key transmitted by the assurance equipment based on the authentication assurance request message, wherein the first derived secret key is generated by the assurance equipment based on the first safety secret key and the authentication parameters; the first equipment transmits the first derived secret key to the server, so as to carry out the authentication with the server.

Description

technical field [0001] The present invention relates to the communication field, and more specifically, to an authentication method, terminal and server. Background technique [0002] The security issues of mobile communication are attracting more and more attention. Currently, the Third Generation Partnership Project (3 rd The terminal access mechanism of the Generation Partnership Project, referred to as "3GPP") Internet Protocol Multimedia Subsystem (Internet Protocol Multimedia Subsystem, referred to as "IMS") is a typical card access mechanism. That is, a single terminal has a built-in IMS user identity module (IP MultimediaServices Identity Module, referred to as "IMIS") card, and the network pre-issues a key shared with the network for each terminal. Based on this key, each terminal interacts with the network side to complete network access certified. In other words, the authentication system requires the network to require a pre-issued key for each device. [00...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/00H04W12/06
CPCH04W12/06
Inventor 谢潜
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products