Key distribution method and device, mobile terminal, communication equipment and storage medium

A mobile terminal and terminal equipment technology, applied in the field of communication, can solve problems such as low communication security and inability to obtain authentication keys

Pending Publication Date: 2019-12-03
ZTE CORP
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides a method for issuing a key and its device, a mobile terminal, a communication device, and a storage medium to solve the p

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key distribution method and device, mobile terminal, communication equipment and storage medium
  • Key distribution method and device, mobile terminal, communication equipment and storage medium
  • Key distribution method and device, mobile terminal, communication equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0077] See figure 1 , the key distribution method provided by this embodiment, this method is mainly applied on the mobile terminal, and the specific implementation steps are as follows:

[0078] S11. Extract authentication information and a user key according to the received authentication schedule.

[0079] In practical applications, the authentication information includes at least one of a random character string RAND, an authentication parameter AUTN, a challenge response RES, and a session key, and may even be a secret key directly generated by the mobile terminal. The user key is simultaneously stored in the mobile terminal, the base station and the mobile network.

[0080] S12. Generate a first verification key according to the authentication information and the user key.

[0081] In this step, a certain algorithm needs to be combined to obtain the calculation. The preferred algorithm can be some key calculation algorithm, or some encryption algorithm. Specifically, t...

Embodiment 2

[0153] See figure 2 , the method for issuing keys provided in this embodiment, the method is mainly applied on one end of the mobile network, the mobile network side includes the first core network and the second core network, and the specific implementation steps are as follows:

[0154] S21. Receive a key provision request from the mobile terminal side.

[0155] S22. Generate a second verification key according to the key generation rule according to the key provision request and the user key.

[0156] S23. Encrypt the first key information stored in the first core network on the mobile network side based on the second verification key to obtain third key information.

[0157] S24. Return the third key information to the mobile terminal.

[0158] In this embodiment, the authentication information for generating the second verification key can be obtained in two ways, one is generated by the mobile terminal, and then sent to the device on the mobile network side; the other...

Embodiment 3

[0204] This embodiment provides a mobile terminal, see image 3 As shown, the mobile terminal includes a call module 31, a first key generation module 32, a first communication module 33 and a decryption module 34, wherein

[0205] Call module 31, for extracting authentication information and user key according to the received authentication schedule;

[0206] The first key generation layer module 32 is configured to generate a first verification key according to the key generation rules according to the authentication information and the user key;

[0207] The first communication module 33 is configured to return an authentication response message to the mobile network side; and receive third key information sent by the mobile network side, where the third key information is provided by the mobile network side according to the Key information obtained after the authentication response message and the second verification key generated by the key generation rule encrypt the fi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a key distribution method and device, a mobile terminal, communication equipment and a storage medium. The method comprises the following steps: extracting authentication information and a user key according to received authentication scheduling; generating a first verification key according to a key generation rule; and returning an authentication responsemessage to the mobile network side, after receiving the authentication response message, enabling the mobile network side to send the authentication response message; acquiring corresponding authentication information and a user key to generate a second verification key; encrypting the first secret key information; obtaining a third secret key and returning the third secret key to the mobile terminal; and enabling the mobile terminal to decrypt the third key information according to the first verification key. According to the method and the system, the security problem of the mobile terminalwhen the mobile terminal accesses the mobile network is solved by issuing the secret key based on the mutual mode, the real-time updating of the secret key is ensured, the tampering of the secret keyis reduced, the security is further improved, and the security performance of the system is also greatly improved.

Description

technical field [0001] The embodiment of the present invention relates to but not limited to the technical field of communication, specifically, relates to but not limited to a method and device for issuing a key, a mobile terminal, a communication device and a storage medium. Background technique [0002] The 3rd Generation Partnership Project (3rd Generation Partnership Project, 3GPP) has formulated various mobile network specifications, and the mobile networks deployed according to these specifications are also being attacked by various pseudo base stations, which is one of the main reasons why the attack can be implemented That is, the mobile terminal cannot authenticate the authenticity of the base station, and thus accepts various instructions sent by the false base station. [0003] In order to authenticate the base station, key information must be issued on the base station and the mobile terminal, so that the base station can protect the message or part of the conte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/02H04W12/06H04W12/10H04L9/32H04L9/08H04W12/03H04W12/0431
CPCH04W12/02H04W12/06H04L9/0819H04L9/0822H04L9/3226H04W12/10
Inventor 谢振华
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products