Method and device for device identity authentication
A technology for device identity and authentication, applied in electrical components, security devices, wireless communications, etc., and can solve problems such as low authentication security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0042] At present, the process of authentication and authentication between the terminal and the core network before communication is as follows: the terminal pre-sets a master key, and shares the master key with the core network equipment, and the core network equipment maintains the identity of the master key. safety. When data transmission is required, the terminal sends an authentication request to the core network device, and the terminal and the core network device implement mutual authentication between the two parties through the shared master key and the AKA protocol. And after the authentication and authentication are passed, the terminal and the core network device derive the encryption key and the integrity key based on the master keys maintained by them, so that the terminal and the core network device are ensured according to the encryption key and the integrity key Secure data transfer between.
[0043] However, the main problem with the above-mentioned method ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



