Verification method and device using shared secret key, public key and private key
A communication device and public land mobile technology, which is applied to security devices, secure communication devices, and key distribution, and can solve problems such as counterfeiting attacks and lack of verification mechanisms
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0150] Embodiments of the present application are described below with reference to the drawings in the embodiments of the present application.
[0151] First introduce the UE authentication and registration process:
[0152] When the UE roams to a service network, the UE registers with the visited network, such as Figure 3a or Figure 3b As shown, the authentication and registration process is as follows:
[0153] S301. The UE sends a registration request (registration request) to the AMF, where the registration request includes a user identifier (for example, SubID or SUPI).
[0154] S302. After receiving the UE's registration request, the AMF sends an authentication initiation request (authentication initiation request) to the AUSF. The authentication initiation request includes a user ID and a service network-related ID (eg, PLMNID or AMF ID).
[0155] S303. After receiving the initial authentication request, the AUSF sends an authentication information request (authen...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


