Client registration and key sharing method, device and system based on GBA

A key sharing and client-side technology, applied in the field of communication, can solve problems such as counterfeit computing and storage resources

Active Publication Date: 2020-04-21
刘高峰
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0025] The main purpose of the present invention is to provide a GBA-based client registration and key sharing method, device and system, aiming to provide a secure registration method, device and system for third-party application clients running in user terminals, Solve the problem that third-party application servers counterfeit and malicious requests consume the computing and storage resources of the guidance service server BSF and other third-party application servers, and then solve the problem that third-party application clients can easily calculate other third-party applications on the same user terminal The problem of applying the client's application key, so that the GBA architecture can be applied in the field of Internet technology more safely and effectively

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Client registration and key sharing method, device and system based on GBA
  • Client registration and key sharing method, device and system based on GBA
  • Client registration and key sharing method, device and system based on GBA

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0284] Specifically, the user terminal transfers the NAF_Id to the guidance service server BSF may include various implementation manners, for example may include:

[0285] In the first implementation manner, during the security authentication process of the user terminal to the guidance service server BSF, the user terminal transmits the NAF_Id to the guidance service server BSF.

[0286] The user terminal transmits the NAF_Id to the guidance service server BSF, and may send the NAF_Id to the guidance service server BSF in a separate sending request, or send the NAF_Id to the guidance service server BSF in combination with other sending requests. For example, taking Embodiment 1 of the above-mentioned GBA-based client registration and key sharing method as an example, it may be incorporated into the security authentication request in step 210 above, or the B- TID and the information of generating the first authentication key, or / and in the step of sending the information of g...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a client registration and key sharing method, device and system based on GBA, and the method comprises the steps: a user terminal operating a third-party application client carries out safety authentication with a bootstrapping server function (BSF) based on a B-TID obtained in a GBA bootstrapping process and a generated main key; and after the security authentication succeeds, the BSF provides secure registration information and service for the third-party application client, and further generates a user token or an application key for the third-party application client. According to the invention, the problem that a third-party application server counterfeits a malicious request to consume computing and storage resources of the bootstrapping service function (BSF)and other third-party application servers is solved, and the problem that the third-party application client can compute application keys of other third-party application clients on the same user terminal is further solved.

Description

【Technical field】 [0001] The present invention relates to the field of communication technology and Internet technology, in particular to a method, device and system for client registration and key sharing based on Generic Bootstrapping Architecture (GBA). 【Background technique】 [0002] The 3GPP specification TS 33.220 defines a generic security authentication mechanism applicable to mobile networks—Generic Bootstrapping Architecture (GBA), which is part of the Generic Authentication Architecture (GAA). [0003] GBA provides a general mechanism for establishing an application key between a user equipment (UE) and a network application function (NAF) based on an authentication and key agreement (AKA). [0004] The GBA architecture is mainly divided into two processes: GBA initialization and application key negotiation: [0005] The first process is the GBA initialization process (GBA Bootstrapping): between the UE and the bootstrapping server function (BSF), BSF and the hom...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/00H04W12/02H04W12/06H04W60/00H04L9/08H04L9/32H04W12/041H04W12/069
CPCH04W12/06H04W12/02H04W60/00H04L9/0838H04L9/0866H04L9/3213H04W12/03H04W12/0431H04W12/041
Inventor 不公告发明人
Owner 刘高峰
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products