Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

End-to-end authentication and key negotiation method, device and system

A technology of key negotiation and authentication algorithm, applied in the field of end-to-end authentication and key negotiation, to achieve the effect of improving communication security, simple protocol interaction, and high transmission efficiency

Active Publication Date: 2019-06-18
HUAWEI TECH CO LTD
View PDF6 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the ION network architecture, when performing end-to-end communication between hosts based on identity and location separation, in order to ensure communication security, it is necessary to perform security authentication and key negotiation on the hosts of end-to-end communication. However, there is currently no applicable ION End-to-end authentication and key agreement method of network architecture

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • End-to-end authentication and key negotiation method, device and system
  • End-to-end authentication and key negotiation method, device and system
  • End-to-end authentication and key negotiation method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0081] The technical solutions in the embodiments of the present application will be described below with reference to the accompanying drawings.

[0082] The embodiment of this application provides a method for end-to-end authentication and key agreement applicable to the ION network architecture based on identity and location separation. The method can be applied to figure 1 The ION network architecture shown. refer to figure 1 As shown, the ION network architecture includes communication devices (also referred to as node devices) and generic identity services (generic resilient id services, GRIDS). Communication devices can be understood as the data plane of the ION network architecture, and communication devices in the ION network architecture can perform end-to-end communication, such as figure 1 The first communication device may perform end-to-end communication with the second communication device through a radio access network (radio access network, RAN), a user plan...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an end-to-end authentication and key negotiation method, device and system, the system comprises a first communication device and a second communication device, the first communication device is used for sending a first message to the second communication device, and the first message comprises a first key generation parameter; the second communication equipment is used for performing identity authentication on the first communication equipment; the second communication device receives thefirst message sent by the first communication device and generates a security parameter according to the second key generation parameter and a first key generation parameter included in the first message, the second communication device sends a second message to the first communication device, and the second message includes the second key generation parameter; and the first communication device is used for carrying out identity authentication on the second communication device, receiving the second message, and generating a security parameter according to the first key generation parameter and a second key generation parameter included in the second message so as to realize end-to-end identity authentication and key negotiation.

Description

technical field [0001] The present application relates to the technical field of communications, and in particular to an end-to-end authentication and key agreement method, device and system. Background technique [0002] Identity network (id-oriented networking, ION) is a new type of network architecture for future networks. [0003] In ION's network architecture, the identity (identity, ID) and location (locator or IPaddress) of the host are separated, and through the decoupling of identity and location, the session connection based on identity can cross multiple address boundaries, regardless of the communication address. limits. In the network architecture of ION, a unified control management layer is also established to manage related services. The control management layer is deployed in a distributed manner in the network for unified management of the host's identity, location and other information. [0004] In the ION network architecture, when performing end-to-end...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L9/08H04L9/32
Inventor 姚惠娟万荣飞刘冰洋
Owner HUAWEI TECH CO LTD
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More