End-to-end authentication and key negotiation method, device and system

A technology of key negotiation and authentication algorithm, applied in the field of end-to-end authentication and key negotiation, to achieve the effect of improving communication security, simple protocol interaction, and high transmission efficiency

Active Publication Date: 2019-06-18
HUAWEI TECH CO LTD
View PDF6 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the ION network architecture, when performing end-to-end communication between hosts based on identity and location separation, in order to ensure communication security, it is necessary to perform

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • End-to-end authentication and key negotiation method, device and system
  • End-to-end authentication and key negotiation method, device and system
  • End-to-end authentication and key negotiation method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0081] The technical solutions in the embodiments of the present application will be described below with reference to the accompanying drawings.

[0082] The embodiment of this application provides a method for end-to-end authentication and key agreement applicable to the ION network architecture based on identity and location separation. The method can be applied to figure 1 The ION network architecture shown. refer to figure 1 As shown, the ION network architecture includes communication devices (also referred to as node devices) and generic identity services (generic resilient id services, GRIDS). Communication devices can be understood as the data plane of the ION network architecture, and communication devices in the ION network architecture can perform end-to-end communication, such as figure 1 The first communication device may perform end-to-end communication with the second communication device through a radio access network (radio access network, RAN), a user plan...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an end-to-end authentication and key negotiation method, device and system, the system comprises a first communication device and a second communication device, the first communication device is used for sending a first message to the second communication device, and the first message comprises a first key generation parameter; the second communication equipment is used for performing identity authentication on the first communication equipment; the second communication device receives thefirst message sent by the first communication device and generates a security parameter according to the second key generation parameter and a first key generation parameter included in the first message, the second communication device sends a second message to the first communication device, and the second message includes the second key generation parameter; and the first communication device is used for carrying out identity authentication on the second communication device, receiving the second message, and generating a security parameter according to the first key generation parameter and a second key generation parameter included in the second message so as to realize end-to-end identity authentication and key negotiation.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products