Key negotiation method, apparatus, and system

A technology of key agreement and key, which is applied in the field of communication, can solve problems such as poor key security, and achieve the effect of reducing the possibility and solving the problem of poor key security

Inactive Publication Date: 2019-02-26
ZTE CORP
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides a key agreement method, device, and system to at least solve the technical problem of poor key security caused by the transmission of the key in plain text in the related art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key negotiation method, apparatus, and system
  • Key negotiation method, apparatus, and system
  • Key negotiation method, apparatus, and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] In this embodiment, a key agreement method is provided, figure 1 is a flowchart of a key agreement method according to an embodiment of the present invention, such as figure 1 As shown, the process includes the following steps:

[0044] Step S102, the first network element sends the first public key PubK1 to the second network element, and receives the second public key PubK2 and the random character string RAND from the second network element;

[0045] Step S104, the first network element generates a signaling key SK based on PubK2, and sends a response string RES to the second network element;

[0046] Step S106, the first network element receives the shared key Ks from the second network element, or, the first network element receives the encrypted shared key EKs from the second network element, and generates the shared key Ks based on SK and EKs.

[0047] Through the above steps, since the first network element and the second network element negotiate the transmis...

Embodiment 2

[0091] In this embodiment, a key agreement device and system are also provided, which are used to implement the above embodiments and preferred implementation modes, and those that have already been described will not be repeated. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.

[0092] image 3 is a structural block diagram of a key agreement device according to an embodiment of the present invention, such as image 3 As shown, applied in the first network element, the device includes:

[0093] The transmission module 30 is configured to send the first public key PubK1 to the second network element, and receive the second public key PubK2 and the random character string RAND from the second network...

Embodiment 3

[0110] This embodiment is an optional embodiment according to the present invention, and is used to fully explain and illustrate this application by gathering specific scenarios:

[0111] Figure 6 It is a schematic flow chart of the core network-based key transfer method according to the embodiment of the present invention figure 1 ,Such as Figure 6 As shown, the long-term key LTK or shared key Ks already exists between the second network element and the third network element, and the process includes:

[0112] Step 601: the first network element, the visited network (such as the mobility management function MMF, or the security anchor function SEAF, or the access management entity AMF, etc.) sends the second network element, the home network (such as the authentication service function AUSF, or the authentication authorization Accounting AAA, or authentication vector storage function ARPF, or HSS, etc.) sends a shared key establishment request, such as sending an Authenti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a key negotiation method, apparatus, and system. According to one embodiment, the method comprises the following steps that: a first network element sends a first public key PubK1 to a second network element and receives second public key PubK2 and a random character string RAND from a second network element; the first network element generates a signaling key SK based on the PubK2 and sends a response character string RES to the second network element; and the first network element receives a shared key Ks from the second network element or the first network element receives an encrypted shared key EKs from the second network element and generates a shared key Ks based on the SK and the EKs. Therefore, a technical problem that the key safety is poor because of key transmission based on a plaintext according to the related technique is solved.

Description

technical field [0001] The present invention relates to the communication field, in particular to a key agreement method, device and system. Background technique [0002] The 3rd Generation Partnership Project (3GPP, 3rd Generation Partnership Project) proposed a mobile network authentication scheme. The key agreement scheme between network elements is relatively simple, and the key agreement scheme in related technologies only focuses on protecting terminals and their direct access For example, only focus on the connection between the terminal and the visited network, while the signaling connection between the home network and the visited network is basically in an unprotected state. The mobile network authentication process in related technologies requires the home network to The key used between the terminal and the visited network is passed to the visited network, which often causes the key to be transmitted in plain text, resulting in leaks. [0003] Aiming at the abov...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04L9/08H04W12/0431
CPCH04L9/0825H04L9/0838H04W12/04H04L9/08
Inventor 谢振华
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products