Unlock instant, AI-driven research and patent intelligence for your innovation.

Secret key determination method and device

A technology for determining methods and keys, which is applied in the field of communication to achieve the effects of high operating efficiency, wide applicability, and security

Active Publication Date: 2020-09-08
ZTE CORP
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides a key determination method and device to at least solve the problem that the SUCI-based encryption technology in the related art can only be realized based on the terminal device body The problem with shared keys

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret key determination method and device
  • Secret key determination method and device
  • Secret key determination method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] In this embodiment, a method for determining a key is provided, figure 2 is a flowchart of a method for determining a key according to an embodiment of the present invention, such as figure 2 As shown, the process includes the following steps:

[0042] Step S202, during the network registration process, the terminal sends RANDs obtained by encrypting the random number RANDm to the network-side device, wherein the RANDm is used by the network-side device to determine an intermediate anchor key;

[0043] Step S204, the terminal receives the network authentication request fed back by the network side device, and determines the intermediate anchor key according to RANDm.

[0044] It should be noted that the aforementioned network-side devices include but are not limited to one of the following: AUSF, UDM / ARPF.

[0045] Specifically, the terminal first sends a network registration request to the base station during the network registration process, and then the base stat...

Embodiment 2

[0061] Another key determination method is provided in this embodiment, image 3 is a flow chart of another method for determining a key according to an embodiment of the present invention, such as image 3 As shown, the process includes the following steps:

[0062] Step S302, the network side device receives the RANDs sent by the terminal during the network registration process, and decrypts the RANDs to obtain the random number RANDm;

[0063] Step S304, the network side device determines an intermediate anchor key according to the RANDm;

[0064] Step S306, the network side device feeds back a network authentication request to the terminal, so that the terminal determines an intermediate anchor key according to the RANDm. Optionally, the network side device decrypts the updated encrypted user subscription identifier SUCI of the terminal to obtain the permanent user identifier SUPI and the RANDm.

[0065] Optionally, after the network side device determines the intermedi...

Embodiment 3

[0115] In this embodiment, a device for determining a key is also provided, and the device is used to implement the above embodiments and preferred implementation modes, and what has been explained will not be repeated here. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.

[0116] Figure 6 is a structural block diagram of a device for determining a key according to an embodiment of the present invention, such as Figure 6 shown, located at the terminal, the device consists of:

[0117] The sending module 62 is configured to send RANDs obtained by encrypting the random number RANDm to the network side device during the network registration process, wherein the RANDm is used for the network side devi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a secret key determination method and a device. Specifically, the secret key determination method comprises the steps that: in a network registration process, a terminal transmits RANDs obtained by encrypting a random number RANDm to network side equipment, wherein the RANDm is used for the network side equipmentto determine an intermediate anchoring key; and the terminal receives a network authentication request fed back by the network side equipment, and determines the intermediate anchoring key according to the RANDm. According to the secret key determination method and the device, the problem that the secret key can only be shared based on an equipment body of the terminal on the basis of a SUCI encryption technology is solved, so that the security of generatingthe session secret key is guaranteed, the applicability is wide, and the operation efficiency of security protection of the session is high.

Description

technical field [0001] The present invention relates to the field of communications, in particular to a method and device for determining a key. Background technique [0002] The 3rd Generation Partnership Project (3rd Generation Partnership Project, 3GPP) has formulated various mobile network specifications, including the authentication and key agreement process (Authentication and Key Agreement, referred to as the AKA process), which is used for mutual communication between the UE and the network. Authenticate and establish a common key. [0003] figure 1 is a schematic structural diagram of a mobile system in related technologies, such as figure 1 As shown, it includes terminal, base station, authentication function, authentication service function and subscription data management function. Among them, the base station provides communication and other services provided by the mobile network for the terminal, such as eNB or gNB; the authentication function is the softwa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/06H04L29/06
CPCH04L9/0869H04L9/0863H04L63/0428H04L63/083H04L9/0643H04L9/08H04L9/06H04L9/40
Inventor 游世林谢振华彭锦余万涛林兆骥刘建华王继刚闫新成张博山
Owner ZTE CORP