Mutual anonymous authentication and key agreement protocol in mobile network

A technology of mutual authentication and key agreement, applied in the field of anonymous mutual authentication and key agreement protocol, which can solve problems such as insecurity

Inactive Publication Date: 2017-11-17
HARBIN INST OF TECH SHENZHEN GRADUATE SCHOOL
View PDF4 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In many current studies, many protocols have been proved to have security problems, and time-consuming symmetric encryption algorithms are used for those without security problems, and many of them are based on smart cards. The latest research shows that the information of general smart cards is It can be stolen, so the smart card-based protocol is also proven to be insecure, and it is impossible to develop an absolutely safe smart card under the existing technical conditions and resource considerations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mutual anonymous authentication and key agreement protocol in mobile network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0025] figure 1 As shown, an anonymous mutual authentication and key agreement protocol in a mobile network, which includes the following steps:

[0026] A. Registration stage: The legal mobile device will first send identity information to the server for registration. The specific steps are as follows:

[0027] A1: Mobile device choose yourself , sent to the server through a secret channel ;

[0028] A2: The server generates the key , and then calculate , and store [ ], the server sends [ ] to the mobile device.

[0029] A3: The mobile device receives and stores [ ].

[0030] B. Authentication and key agreement phase, assuming two legally registe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a mutual anonymous authentication and key agreement protocol in a mobile network. The protocol is implemented as follows: step A, at a registration stage, a legal mobile device user initiates a request to register own information to a server; step B, the operation is carried out at an authentication and key agreement stage. Therefore, a server in a mobile network carries out authentication of an anonymous mobile device and session key sharing is established, so that privacy information of the two communication sides is protected from leakage; and security of the information transmission between the mobile devices is guaranteed. The protocol has high security and efficiency in the same kinds of protocols.

Description

technical field [0001] The invention relates to an anonymous mutual authentication and key agreement protocol in a mobile network. Background technique [0002] At present, with the continuous development of network communication technology, more and more people communicate through the network connection of mobile devices. However, in such an environment, the information sent by communication is likely to be stolen by attackers, resulting in the loss of privacy information of communication users. Leakage, which will cause huge losses to users, and even use the user's private information to carry out illegal activities. In order to protect the user's private information and communication content, anonymous authentication is proposed. It can anonymize the user's identity and can also be the user's Realize anonymous mutual authentication and establish a shared key through the server. [0003] The anonymous authentication and key agreement protocol in the mobile network can pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/06
CPCH04W12/04H04W12/06
Inventor 陈建铭吴祖扬王光杰王景行
Owner HARBIN INST OF TECH SHENZHEN GRADUATE SCHOOL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products