Unlock instant, AI-driven research and patent intelligence for your innovation.

A method for realizing terminal secondary authentication

A secondary authentication and terminal technology, applied in the field of communication security, can solve the problem of not giving, and achieve the effect of preventing theft of user privacy

Active Publication Date: 2021-07-30
GUANGDONG CHUTIAN DRAGON SMART CARD +2
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since the 3GPP protocol only provides an optional end-to-end secondary authentication EAP channel, and how to implement the secondary authentication through the secondary authentication EAP channel, the existing technology has not given it, so industry users do not know how To deploy an AAA server that meets the bandwidth, delay, and number of connections of its own application scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for realizing terminal secondary authentication
  • A method for realizing terminal secondary authentication
  • A method for realizing terminal secondary authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0080] Please refer to figure 1 The embodiment of the present invention provides a method of implementing the secondary authentication of the terminal, which includes the steps of:

[0081] S101, after checking the primary authentication, the terminal initiates a secondary authentication request to the AAA server through the EAP channel of the 5G network, the secondary authentication request to trigger the AAA server to determine the second authentication data corresponding to the terminal. And the second authentication data is sent to the terminal in the form of a message;

[0082] It should be noted that when the symmetric algorithm is authenticated, only the second authentication data corresponding to the terminal can determine the secondary authentication data corresponding to the terminal, and when the non-symmetric algorithm is authenticated. Between the AAA server and the terminal need to return to each other until the handshake protocol can determine the second authenticat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for realizing secondary authentication of a terminal, which includes that after checking that the primary authentication has passed, the terminal initiates a secondary authentication request to the AAA server through the EAP channel of the 5G network, and the secondary authentication request is used to trigger the The AAA server determines the secondary authentication data corresponding to the terminal, and sends the secondary authentication data to the terminal in the form of a message; the terminal uses the secondary authentication data according to the application scenario where it is located The data is authenticated, and a response is generated and returned to the AAA server to determine the secondary authentication result of the terminal. A method for implementing secondary authentication of terminals provided by the present invention can provide customized secondary authentication services for terminals that require secondary authentication in different application scenarios, and guide industry users to deploy bandwidth, delay, and connection in line with their own application scenarios. AAA servers with the same number of requirements, to prevent attackers from stealing user privacy at the network layer.

Description

Technical field [0001] Embodiments of the present invention relate to the field of communication safety, and more particularly to a method of implementing terminal secondary authentication. Background technique [0002] 5G technology is the development direction of new generation information communication technology, not only has stronger performance, but also has a richer application scenario, from traditional people to human communication, covering the intelligent interconnection between people and things It is a key infrastructure for the future economic and social digital transformation. [0003] Based on the main certification, the 5G technology can provide network slices to the industry, allowing industry deployment AAA (AuthenticationAuthorizationAccounting, verification, authorization, and accounting) servers to perform secondary certification to complete industry-specific access authentication. Among them, the main certification refers to the authentication authenticatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W12/069H04W12/10H04L9/32H04L29/06
CPCH04W12/06H04W12/10H04L9/3247H04L63/0892H04L63/0823H04L63/0869H04W12/069
Inventor 蒋曲明王志红邬亮兰天杨洋王俊张力
Owner GUANGDONG CHUTIAN DRAGON SMART CARD