Key negotiation method and equipment in mobile communication

A mobile device and mobile communication technology, applied in wireless communication, secure communication device, key distribution, and can solve the problems of high computing and communication overhead, stealing, security risks, etc.

Active Publication Date: 2018-10-02
BEIJING INFORMATION SCI & TECH UNIV
View PDF14 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the current session key negotiation method between MTCD and HSS, on the one hand, needs to generate a large amount of signaling, resulting in excessive calculation and communication overhead; on the other hand, during the session key negotiation process, the session key It is easy to be attacked and stolen, leading to security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key negotiation method and equipment in mobile communication
  • Key negotiation method and equipment in mobile communication
  • Key negotiation method and equipment in mobile communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0019] The embodiment of the present invention provides a key agreement method in mobile communication, refer to figure 2 , the method is a method on the mobile device side, including: S21, generating a first random number, generating a pseudo-identity according to the first random number, a shared key with the server, and a pre-assigned mobile d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the invention provides a key negotiation method and key negotiation equipment in mobile communication. The key negotiation method comprises the steps of: generating a pseudo identifier at a mobile equipment side according to a shared password and mobile equipment identifiers in real time, transmitting the pseudo identifier and a group identifier of a mobile equipment group to a server side, acquiring the mobile equipment identifiers by means of the server side according to the pseudo identifier, generating an encrypted key according to random numbers, generating a session keyaccording to the mobile equipment identifiers, the group identifier, a server identifier of the server, an acquired mobile management entity identifier and the encrypted key, returning the server identifier and the mobile management entity identifier to the mobile equipment side, and generating a session key by means of the mobile equipment side through using an algorithm the same as the server side. Through generating the pseudo identifier at the mobile equipment side and using the pseudo identifier for interaction in the signal interaction process, the security of the signal interaction process is improved; and the mobile equipment side and the server side generate the session keys just by adopting the plurality of the identifiers and the random numbers, and save the computational overhead and communication overhead.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of communications, and more specifically, to a method and device for key agreement in mobile communications. Background technique [0002] With the continuous development of mobile communications, higher requirements have been put forward for information security in mobile communications. From 2G to 3G, security features and security services have been gradually improved. In order to further promote 3G technology, improve spectrum efficiency, reduce delay and optimize packet data, LTE (Long Time Evolution), a long-term evolution of 3G system, came into being. [0003] Machine Type Communications (Machine Type Communications, MTC) is an important application of the Internet of Things, which has a huge market and application prospects. The MTC network model in the LTE network is as follows: figure 1 As shown, multiple mobile devices (MTCD) communicate with the Mobility Management Ent...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L5/00H04W4/70H04W12/04H04W12/041
CPCH04L5/0053H04L9/0838H04L9/0869H04L9/0894H04W4/70H04W12/04
Inventor 杜冰陈昕李卓陈莹
Owner BEIJING INFORMATION SCI & TECH UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products