Client registration and secret key sharing method, device and system based on GBA

A key sharing and client-side technology, applied in the field of communication, can solve problems such as counterfeit computing and storage resources

Inactive Publication Date: 2019-01-01
刘高峰
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0025] The main purpose of the present invention is to provide a GBA-based client registration and key sharing method, device and system, aiming to provide a secure registration method, device and system for third-party application clients running in user terminals, Solve the problem that third-party application servers counterfeit and malicious requests consume the computing an...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Client registration and secret key sharing method, device and system based on GBA
  • Client registration and secret key sharing method, device and system based on GBA
  • Client registration and secret key sharing method, device and system based on GBA

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0050] 1. Schematic diagram of the implementation environment structure

[0051] Please refer to figure 2 , which shows a schematic structural diagram of an implementation environment involved in a GBA-based client registration and key sharing method provided by an embodiment of the present invention. The implementation environment includes a bootstrap service server BSF, user terminals, and third-party application clients.

[0052] Boot service server BSF: BSF is usually provided by the communication operator service provider, which is connected to the user terminal and the third-p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a client registration and secret key sharing method, device and system based on GBA (Generic Bootstrapping Architecture). The method comprises the steps of: operating auser terminal with a third-party application client to send a client registration request to a guidance business server BSF (Bootstrapping Server Function), wherein the client registration request comprises a B-TID (Bootstrapping Transaction Identifier) and a first request signature value; and verifying the validness of the first request signature value in the client registration terminal according to the B-TID and the corresponding secret key, and after the verification is valid, providing safe registration information and service for the third-party application client after, and generatingan application secret key for the third-party application client.

Description

technical field [0001] The present invention relates to the field of communication technology and Internet technology, in particular to a method, device and system for client registration and key sharing based on Generic Bootstrapping Architecture (GBA). Background technique [0002] The 3GPP specification TS 33.220 defines a general security authentication mechanism applicable to mobile networks—GBA architecture (Generic Bootstrapping Architecture, general bootstrapping architecture), which is part of the GAA (Generic Authentication Architecture, general authentication architecture) framework. [0003] GBA provides a general mechanism for establishing an application key between UE (User Equipment, user terminal) and NAF (Network Application Function, network application server) based on AKA (Authentication and Key Agreement, authentication and key agreement mechanism). [0004] The GBA architecture is mainly divided into two processes: GBA initialization and application key...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/04H04W12/06H04W12/041H04W12/069
CPCH04W12/06H04W12/02H04W60/00H04L9/0838H04L9/0866H04L9/3213H04W12/03H04W12/0431H04W12/041
Inventor 刘高峰
Owner 刘高峰
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products