Authentication method, related equipment and system
An authentication method and technology of terminal equipment, applied in the field of communication
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach
[0072] As a possible implementation, the identity management entity may also include:
[0073] The verification unit 504 is configured to verify whether the certificate request message received by the receiving unit 501 is a legal message, and when the verification unit 504 verifies that the certificate request message is a legal message, trigger the generation unit 502 to generate a digital certificate for TE.
[0074] As a possible implementation, the certificate request message carries the TE's identity, encrypted identity signature, and encrypted signature public key;
[0075] Verification unit 504 may include:
[0076] The first decryption subunit 5041 is configured to use a symmetric key to decrypt the encrypted identity signature received by the receiving unit 501 and the encrypted signature public key to obtain the identity signature and signature public key of the TE. The symmetric key is managed by the identity Entity-determined secret key used to establish NAS comm...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


