Authentication information processing method, terminal and network equipment

An information processing method and technology of network equipment, applied in the field of authentication information processing method, terminal and network equipment, can solve the problems of inaccessibility of attackers, correlation attack, consumption of large computing resources, etc.

Active Publication Date: 2020-10-27
CHINA MOBILE COMM LTD RES INST +1
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The two authentication methods of 5G-AKA and EAP-AKA′ are subject to correlation attacks because UE may send two different types of error messages when authentication network fails
[0003] In the related technology to solve the association attack, when the UE fails to authenticate the network, the information encrypted by the public key of the trial network is used to indicate the error message type, because this message is encrypted, the attacker cannot get the content of this message, so the attacker cannot launch a correlation attack
However, although this method can solve the problem of correlation attack, it requires operators to deploy public key infrastructure (PKI, Public Key Infrastructure); and this method uses asymmetric algorithm for encryption, which consumes a lot of computing resources, which is very important for It is not applicable to IoT terminals that require a long battery life

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication information processing method, terminal and network equipment
  • Authentication information processing method, terminal and network equipment
  • Authentication information processing method, terminal and network equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0076] Before elaborating the authentication information processing method of the embodiment of the present invention in detail, a brief introduction to correlation attacks is given first.

[0077] figure 1 It is a schematic diagram of the flow of correlation attacks in related technologies; figure 1 A 4G network (such as an LTE network) is taken as an example for illustration. Such as figure 1 shown, including:

[0078] Step 101: a Mobility Management Entity (MME, Mobility Management Entity) sends an authentication request message to the UE, and the authentication request message includes a random challenge (RAND, Random challenge) and an authentication token (AUTN). In this step, the attacker may intercept the authentication request message, obtain and store the random challenge (RAND) and authentication token (AUTN) in the authentication request message.

[0079]Step 102: the UE performs network authentication, and after the network authentication is completed, the UE s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an authentication information processing method, a terminal and network equipment. The method comprises the following steps that a terminal performs encryption and integrity protection on first indication information containing an error message type based on an encryption key and an integrity key respectively under the condition that network authenticationfails, wherein the encryption key and the integrity key are obtained based on a session root key, the session root key is generated under the condition that the first authentication between the terminal and the first network equipment succeeds, and different error message types correspond to the first indication information in the same format; and the terminal sends the encrypted first indicationinformation to the first network device, wherein the encrypted indication information is sent to the first network device through a second network device.

Description

technical field [0001] The present invention relates to wireless communication technology, in particular to an authentication information processing method, terminal and network equipment. Background technique [0002] In the mobile communication system, user equipment (UE, User Equipment) and the network side are authenticated through an Authentication and Key Agreement (AKA, Authentication and Key Agreement) protocol. The authentication methods between the UE and the network side in the 5G system include the following two authentication methods: 5G-AKA and EAP-AKA′. The former is developed from the authentication protocol Evolved Packet System Authentication and Key Agreement (EPS-AKA, Evolved Packet System-Authentication and Key Agreement) based on Long Term Evolution (LTE, LongTerm Evolution), while the latter is developed from the Internet Engineering Task Force (IETF , The Internet Engineering Task Force) defines an authentication protocol used in a 4G network for a U...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L63/0428H04L63/08H04L9/085H04L63/123H04L9/0838H04L9/08H04L9/40
Inventor 刘福文
Owner CHINA MOBILE COMM LTD RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products