Unlock instant, AI-driven research and patent intelligence for your innovation.

Key distribution and authentication method, device and system

A key and network authentication technology, applied in the field of communication, can solve the problems that the authentication method cannot be applied and the USIM card is not supported.

Active Publication Date: 2021-08-31
HUAWEI TECH CO LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides a key distribution and authentication method, device and system to solve the problem that the existing root key deployment and authentication methods cannot be applied to smart devices that do not support USIM cards

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key distribution and authentication method, device and system
  • Key distribution and authentication method, device and system
  • Key distribution and authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0565] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0566] The terms "comprising" and "having" and any variations thereof in the description and claims of the present invention are intended to cover a non-exclusive inclusion, for example, a process, method, system, product or device comprising a series of steps or units It is not necessarily limited to those steps or elements explicitly listed, but...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention provide a key distribution and authentication method, device, and system. The key distribution and authentication method includes: the business center server receives the first key request message sent by the user management server, and according to the first key request message Generate the first key of the terminal device, and send the first key to the user management server; the user management server receives the first key of the terminal device sent by the business center server, and sends the first key of the terminal device to The terminal device is configured to enable the terminal device to perform mutual authentication with the network authentication server according to the first key. The service center server distributes different keys to each terminal device, and then each terminal device performs mutual authentication with the network authentication center based on its own key, and finally obtains the communication key between the terminal device and the functional network element, providing secure communication for the terminal device The channel establishment method has a wide range of applications.

Description

technical field [0001] The present invention relates to the communication field, in particular to a key distribution and authentication method, device and system. Background technique [0002] With the development of communication network technology, more and more devices have begun to join the network and send and receive data through the communication network, such as mobile phones, computers, drones and other Internet of Things devices. There are also more and more enterprises that realize the communication between the management center of the enterprise and the various intelligent devices that realize the business of the enterprise through the communication network, such as the electric power company, the water supply company or the heating company, etc. [0003] In order to ensure secure communication, smart devices and the network usually perform mutual authentication based on the root key to establish a secure channel. The root key used in the mutual authentication pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32H04L29/06
CPCH04L9/0827H04L9/0861H04L9/0869H04L9/3273H04L63/062H04L63/0869H04L9/083H04L9/0866H04L9/0872H04L9/08H04L9/0841H04L9/3242H04L63/0428H04L63/0853H04L63/0892H04L2463/061H04L2463/062
Inventor 吴荣张博甘露王海光
Owner HUAWEI TECH CO LTD