Security authentication method, related equipment and system

A technology for security authentication and authentication information, which is applied in the fields of related equipment and systems, and security authentication methods to simplify the authentication process, reduce delays, and improve authentication efficiency.

Active Publication Date: 2019-07-19
HUAWEI TECH CO LTD
View PDF7 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, researchers still face serious technical challenges

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication method, related equipment and system
  • Security authentication method, related equipment and system
  • Security authentication method, related equipment and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] The embodiments of the present application will be described in detail below in conjunction with the accompanying drawings and specific implementation manners.

[0068] see Figure 1A -1D, Figure 1A -1D is a schematic diagram of several communication systems involved in the embodiment of the present invention. The communication system involved in the embodiment of the present invention mainly includes the following parts:

[0069] (1) Mobile Node (MobileNode, MN): In the embodiment of the present invention, MN is a logical entity used to represent a mobile terminal, specifically a terminal device (Terminal), a user equipment (User Equipment) and an Internet of Things (Internet of Things) , IoT) devices, etc., any one or a combination of multiple types. Wherein, the terminal device may be a desktop computer (computer), a notebook computer (notebook), a tablet computer (PAD) and the like. The user equipment may be a smart phone (smart phone), a smart watch (smart watch...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security authentication method, related equipment and a communication system. The communication system comprises MN, CN, UAG and GRIDS systems. The method comprises: the UAGreceiving a BU message sent by the MN and a signature of the MN, and the signature of the MN being obtained by calculating the BU message by using a private key of the MN; calculating the BU message,the signature of the MN and the identifier of the UAG by using the private key of the UAG to obtain the signature of the UAG; sending the BU message, the signature of the MN and the signature of the UAG to the CN; receiving a BU response message and a signature of the CN sent by the CN, wherein the BU response message comprises a result obtained by verifying the signatures of the UAG and the MN; and sending the BU response message and the signature of the CN to the MN. By implementing the method and the device, the security authentication problem after the ID is added to the network layer canbe solved, rapid authentication and network switching based on the ID are realized, the authentication process is simplified, the authentication efficiency is improved, and the switching time delay isreduced.

Description

technical field [0001] The present application relates to the technical field of communication, and in particular to a security authentication method, related equipment and a system. Background technique [0002] In today's TCP / IP protocol, the transport layer and the network layer are closely combined, and the two do not really realize their respective functions independently. The IP address at the network layer serves not only as an addressing function, but also as an identification of a communication device. This dual function determines that when the IP address changes, not only the route will change, but also the identity of the communication device will change. A change in device identity can easily lead to application failure and network connection interruption. With the increasing demand for mobile communications, IP addresses often change in pan-mobile scenarios. Therefore, IP addresses, which have dual attributes of location and identity, have many disadvantages ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/06H04L9/32H04W12/10
CPCH04L63/0869H04L63/0876H04W12/06H04L9/3255H04L9/3247H04L9/32H04L9/40
Inventor 万荣飞笪斌王闯
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products