Authentication information processing method, terminal and network equipment

An information processing method and technology of network equipment, applied in the field of terminal and network equipment, authentication information processing method, can solve the problems of consuming large computing resources, being unavailable to attackers, and unable to initiate correlation attacks by attackers.

Active Publication Date: 2020-10-27
CHINA MOBILE COMM LTD RES INST +1
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The two authentication methods of 5G-AKA and EAP-AKA′ are subject to correlation attacks because UE may send two different types of error messages when authentication network fails
[0003] In the related technology to solve the association attack, when the UE fails to authenticate the network, the information encrypted by the public key of the trial network is used to indicate the error message type, because this message is encrypted, the attacker cannot get the content of this message, so the attacker cannot launch a correlation attack
However, although this method can solve the problem of correlation attack, it requires operators to deploy public key infrastructure (PKI, Public Key Infrastructure); and this method uses asymmetric algorithm for encryption, which consumes a lot of computing resources, which is very important for It is not applicable to IoT terminals that require a long battery life

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication information processing method, terminal and network equipment
  • Authentication information processing method, terminal and network equipment
  • Authentication information processing method, terminal and network equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0082] Before describing in detail the authentication information processing method of the embodiment of the present invention, first, a brief introduction to the association attack is made.

[0083] figure 1 Schematic diagram of the process of correlation attacks in related technologies; figure 1 Take 4G network (such as LTE network) as an example for description. Such as figure 1 Shown, including:

[0084] Step 101: The mobility management entity (MME, Mobility Management Entity) sends an authentication request message to the UE, and the authentication request message includes a random password (RAND) and an authentication token (AUTN). In this step, the attacker may intercept the authentication request message, obtain and store the random password (RAND) and authentication token (AUTN) in the authentication request message.

[0085] Step 102: The UE performs network authentication. After the network authentication is completed, the UE sends an authentication response message to t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an authentication information processing method, a terminal and network equipment. The method comprises the following steps that a terminal performs encryption and integrity protection on first indication information containing an error message type based on an encryption key and an integrity key respectively under the condition that network authenticationfails; the encryption key and the integrity key are obtained based on a shared key; different error message types correspond to the first indication information in the same format; the terminal sendsthe encrypted first indication information to a first network device, wherein the encrypted first indication information is sent to the first network device through a second network device.

Description

Technical field [0001] The present invention relates to wireless communication technology, in particular to an authentication information processing method, terminal and network equipment. Background technique [0002] In the mobile communication system, the user equipment (UE, User Equipment) and the network side are authenticated through the authentication and key agreement (AKA, Authentication and Key Agreement) protocol. The authentication methods between the UE and the network side in the 5G system include the following two authentication methods: 5G-AKA and EAP-AKA'. The former is based on the Long Term Evolution (LTE) authentication protocol evolved packet system authentication and key agreement (EPS-AKA, Evolved Packet System-Authentication and Key Agreement) development, while the latter is the Internet Engineering Task Force (IETF) , The authentication protocol defined by The Internet Engineering Task Force is used for the UE in the 4G network to use Wireless-Fidelity ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/04H04W12/10
CPCH04W12/02H04W12/04H04W12/10H04L9/32H04L9/30
Inventor 刘福文
Owner CHINA MOBILE COMM LTD RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products