Check patentability & draft patents in minutes with Patsnap Eureka AI!

Method and device for device identity authentication

A technology for device identity and authentication, applied in electrical components, security devices, wireless communications, etc., and can solve problems such as low authentication security

Active Publication Date: 2022-02-25
HUAWEI TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This application provides a method and device for device identity authentication, so as to avoid the problem of low security in authentication and authentication in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for device identity authentication
  • Method and device for device identity authentication
  • Method and device for device identity authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] At present, the process of authentication and authentication between the terminal and the core network before communication is as follows: the terminal pre-sets a master key, and shares the master key with the core network equipment, and the core network equipment maintains the identity of the master key. safety. When data transmission is required, the terminal sends an authentication request to the core network device, and the terminal and the core network device implement mutual authentication between the two parties through the shared master key and the AKA protocol. And after the authentication and authentication are passed, the terminal and the core network device derive the encryption key and the integrity key based on the master keys maintained by them, so that the terminal and the core network device are ensured according to the encryption key and the integrity key Secure data transfer between.

[0043] However, the main problem with the above-mentioned method ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention discloses a device identity authentication method and device. The method includes: the terminal obtains the preset information of the core network; the terminal generates the an authentication key; sending to the core network device an authentication request message encrypted by the public key preset by the terminal, the authentication request message including the authentication key, wherein the public key Corresponding to the private key preset by the core network; receiving an authentication response message fed back by the core network device for the authentication request message, and when the authentication response message indicates that the terminal has passed the authentication , to communicate with the core network device. In this method, the core network equipment will no longer store the master key of the terminal, which protects the security of the master key of the terminal and improves the communication security.

Description

technical field [0001] The present application relates to the technical field of wireless communication, and in particular to a method and device for device identity authentication. Background technique [0002] In the wireless communication scenario, before the terminal transmits data to the core network, the core network device needs to authenticate the terminal, so as to prevent the core network from being subjected to illegal access and attacks, and avoid affecting other legitimate terminals to normally access core network resources. Currently, the existing authentication method is to make both the terminal and the core network share a master key in advance. Then, the two parties use the master key and the AKA (Authentication and key agreement, authentication and key agreement) protocol to realize the two-way authentication between the terminal and the core network device. After the authentication and authentication are passed, the terminal and the core network device d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/041H04W12/0433H04W12/06H04W12/03H04W12/122H04W12/126
CPCH04W12/06
Inventor 欧锻灏
Owner HUAWEI TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More