Key distribution and authentication methods, devices and systems

A key distribution and key technology, applied in the field of communications, can solve the problems of not supporting USIM cards, and the authentication method cannot be applied, and achieve the effect of reducing the burden

Active Publication Date: 2017-11-03
HUAWEI TECH CO LTD
View PDF5 Cites 37 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This technology allows users or customers (called clients) access their own device's data through an internet connection without having to remember multiple passwords on each phone they are accessing it from one country where another person has established upgrades with mobile phones. It simplifies this process because instead of requiring all new ones at once, only necessary parts like those used during previous versions have been generated.

Problems solved by technology

This patents discuss how current techniques for securizing wireless networks involve creation of new keys from scratch when upgraded into older ones without supporting any specific fuzzy identification numbers called UICCs. These technical problem addressed in this patented solution can result in poor security measures being established due to lack of knowledge about what kind of equipment they've been connected upstream during their lifetime.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key distribution and authentication methods, devices and systems
  • Key distribution and authentication methods, devices and systems
  • Key distribution and authentication methods, devices and systems

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0401] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0402] The terms "comprising" and "having" and any variations thereof in the description and claims of the present invention are intended to cover a non-exclusive inclusion, for example, a process, method, system, product or device comprising a series of steps or units It is not necessarily limited to those steps or elements explicitly listed, but...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the invention provide key distribution and authentication methods, devices and systems. The methods comprise the following steps that a business center server receives a first key request message sent by a user management server, generates a first-layer key of the user management server according to the first key request message and sends the first-layer key to the user management server; and the user management server generates a second-layer key of a terminal device according to the first-layer key and sends the second-layer key of the terminal device to the terminal device in order to make the terminal device and a network authentication server carry out mutual authentication according to the second-layer key. The business center server and the user management server distribute the different keys to each terminal device, each terminal device carries out mutual authentication with the network authentication center based on the respective key, and a communication key of the terminal device and a function network element is finally obtained, a method for establishing a safety communication channel is provided for the terminal device, and the application range is wide.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products