A Security Enhancement Method Based on EAP-AKA 'for Inter-Network Element Authentication Process in Core Network
An EAP-AKA, core network technology, applied to security devices, secure communication devices, and key distribution, can solve problems such as information theft, and achieve the effects of enhanced security, low push protection, and low cost
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0093] Embodiment 1 of the present invention discloses a method for enhancing security of an authentication process between network elements of a core network based on EAP-AKA', comprising the following steps:
[0094] The visited network side sends an authentication request to the home network side;
[0095] The home network side generates an authentication vector according to the received authentication request; uses the push protection key K T1 Encrypting the key information in the authentication vector, updating the authentication vector, and generating an authentication response message; sending the authentication response message to the visited network side;
[0096] The visited network side receives the authentication response message fed back by the home network side, calculates the feedback information, and judges whether the authentication on the visited network side passes the authentication according to the feedback information; if passed, sends a terminal authenti...
Embodiment 2
[0100] Embodiment 2 of the present invention discloses an EAP-AKA'-based method for enhancing the security of the authentication process between network elements of the core network applied to the home network side, and the steps are as follows:
[0101] Receive the authentication request sent by the visited network side;
[0102] Generate an authentication vector according to the received authentication request;
[0103] Encrypt the key information in the authentication vector by using the push protection key, update the authentication vector, and generate an authentication response message;
[0104] Sending the authentication response message to the visited network side, so that the visited network side calculates feedback information and generates a terminal authentication request;
[0105] According to the terminal authentication request sent by the visited network side, it is judged whether the home network side has passed the authentication.
[0106] Compared with the ...
Embodiment 3
[0107] Embodiment 3 of the present invention discloses that when the authentication method is EAP-AKA', the following operations are performed inside the home network side:
[0108] The AUSF receives the authentication request sent by the visited network side, and sends the authentication request to the UDM;
[0109] UDM generates an authentication vector, and the authentication vector is RAND||XRES||CK'||IK'||AUTN;
[0110] Protect key K with push T1 Encrypt the key information CK’||IK’ to obtain the encrypted key information (CK’||IK’)’;
[0111] UDM replaces the CK'||IK' in the authentication vector with the encrypted key information (CK'||IK')', obtains the protected authentication vector, and sends the protected authentication vector to AUSF;
[0112] AUSF receives the protected authentication vector sent by UDM, and pushes the protection key K T1 Decrypt (CK'||IK')' in the protected authentication vector;
[0113] AUSF conducts the derivation and calculation of EAP ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com