Key distribution and authentication method, device and system

A key distribution and key technology, which is applied in the field of communication, can solve problems such as not supporting USIM cards and authentication methods that cannot be applied, and achieve the effect of reducing the burden

Active Publication Date: 2020-07-21
HUAWEI TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides a key distribution and authentication method, device and system to solve the problem that the existing root key deployment and authentication methods cannot be applied to smart devices that do not support USIM cards

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key distribution and authentication method, device and system
  • Key distribution and authentication method, device and system
  • Key distribution and authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0401] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0402] The terms "comprising" and "having" and any variations thereof in the description and claims of the present invention are intended to cover a non-exclusive inclusion, for example, a process, method, system, product or device comprising a series of steps or units It is not necessarily limited to those steps or elements explicitly listed, but...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the present invention provides a key distribution and authentication method, device and system, the method includes: the business center server receives the first key request message sent by the user management server, and generates the key request message of the user management server according to the first key request message. The first layer key, and send the first layer key to the user management server; the user management server generates the second layer key of the terminal device according to the first layer key, and sends the second layer key of the terminal device to The terminal device enables the terminal device to perform mutual authentication with the network authentication server according to the second layer key. The service center server and the user management server distribute different keys to each terminal device, and then each terminal device performs mutual authentication with the network authentication center based on its own key, and finally obtains the communication key between the terminal device and the functional network element, which is the terminal device A method for establishing a secure communication channel is provided, and has a wide range of applications.

Description

technical field [0001] The present invention relates to the communication field, in particular to a key distribution and authentication method, device and system. Background technique [0002] With the development of communication network technology, more and more devices have begun to join the network and send and receive data through the communication network, such as mobile phones, computers, drones and other Internet of Things devices. There are also more and more enterprises that realize the communication between the management center of the enterprise and the various intelligent devices that realize the business of the enterprise through the communication network, such as the electric power company, the water supply company or the heating company, etc. [0003] In order to ensure secure communication, smart devices and the network usually perform mutual authentication based on the root key to establish a secure channel. The root key used in the mutual authentication pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0825H04L9/0838H04L63/064H04L63/0869H04L63/0876H04W12/04H04W12/50H04L9/40H04L9/0869H04L9/3242
Inventor 张博吴荣甘露王海光
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products