Unlock instant, AI-driven research and patent intelligence for your innovation.

Verification method and device using shared secret key, public key and private key

A communication device and public land mobile technology, which is applied to security devices, secure communication devices, and key distribution, and can solve problems such as counterfeiting attacks and lack of verification mechanisms

Active Publication Date: 2020-03-20
HUAWEI TECH CO LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, if figure 2 As shown in the 5G key architecture, there is no authentication mechanism between the AMF of the serving network and the UDM of the home network
This makes the communication between the AMF of the serving network and the UDM of the home network potentially vulnerable to spoofing attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method and device using shared secret key, public key and private key
  • Verification method and device using shared secret key, public key and private key
  • Verification method and device using shared secret key, public key and private key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0150] Embodiments of the present application are described below with reference to the drawings in the embodiments of the present application.

[0151] First introduce the UE authentication and registration process:

[0152] When the UE roams to a service network, the UE registers with the visited network, such as Figure 3a or Figure 3b As shown, the authentication and registration process is as follows:

[0153] S301. The UE sends a registration request (registration request) to the AMF, where the registration request includes a user identifier (for example, SubID or SUPI).

[0154] S302. After receiving the UE's registration request, the AMF sends an authentication initiation request (authentication initiation request) to the AUSF. The authentication initiation request includes a user ID and a service network-related ID (eg, PLMNID or AMF ID).

[0155] S303. After receiving the initial authentication request, the AUSF sends an authentication information request (authen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A verification method and device using shared key, public key and private key. The verification method using a shared key includes: the first network element receives a registration request message from the second network element, the registration request message includes user identification, first network identification information and second network identification information, and the first network element The second network identification information is obtained by processing the first network identification information with a shared key, where the shared key is a key used between the first network element and the second network element; The first network element uses the shared key to verify the registration request message; the first network element sends a registration response message to the second network element. The corresponding verification method and device using public key and private key are also disclosed. When the home network receives the registration request from the visited network, it uses the shared key to verify the registration request message, which can prevent counterfeiting attacks from the visited network.

Description

technical field [0001] The present application relates to the field of communication technology, and in particular to a verification method and device using a shared key, a public key and a private key. Background technique [0002] Such as Figure 1a and Figure 1b As shown in , roaming scenarios under the architecture of the fifth generation (5th generation, 5G) mobile communication system are defined. When the terminal device registers with the visited network, the access and mobility management function (AMF) entity of the visited network sends an authentication initial request to the authentication server function (authentication server function, AUSF) entity of the home network. After receiving the initial authentication request sent by the AMF, the AUSF sends an authentication request message to a unified data management (UDM) entity of the home network to request an authentication vector. After receiving the authentication request message sent by the AUSF, the UDM ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W60/00H04W60/06H04L9/08
CPCH04L9/085H04W12/06H04W60/00H04W60/06H04W12/041H04L9/3242H04L2209/80H04W88/182H04W92/02H04W8/04H04W12/037H04W12/0433H04W12/40H04L9/30H04W12/08H04W84/042
Inventor 何承东李华
Owner HUAWEI TECH CO LTD