Multi-type terminal access and handover authentication method and system, equipment and application

A technology for terminal access and handover authentication, which is applied in the field of communication network security, and can solve the problems of not realizing complete forward key, backward security key separation, launching network attacks, and excessive authentication delay.

Active Publication Date: 2021-01-15
XIDIAN UNIV
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] (4) Most of the current satellite network authentication standards are based on the improvement of ground 4G / 5G network authentication protocols, and there are some security loopholes, such as the complete forward and backward security of keys and the separation of front and rear keys, which cannot guarantee terminal security. , Efficient access to the network and seamless and secure switching of terminals, while overcoming the defects of the current access and switching authentication security protocols, to achieve safe and efficient access and seamless switching of multiple types of terminals
[0009] (1) At present, satellite communication adopts open link communication, and any network entity can monitor, tamper and forge the communication content, and even pretend to be a legitimate user for unauthorized access, information theft, and launching network attacks, etc.
[0010] (2) At present, there are many problems in the satellite communication authentication mechanism, such as a large number of interactions and too long authentication delay.
[0011] (3) There are security loopholes in the authentication mechanism adopted by the current satellite communication network. For example, the complete forward and backward security of the key and the separation of the front and rear keys have not been realized, which cannot guarantee the safe and efficient access of the terminal to the network and the wireless terminal. Seam security switching and other issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-type terminal access and handover authentication method and system, equipment and application
  • Multi-type terminal access and handover authentication method and system, equipment and application
  • Multi-type terminal access and handover authentication method and system, equipment and application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0118] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0119] Aiming at the problems existing in the prior art, the present invention provides a multi-type terminal access and handover authentication method, system, device and application. The present invention will be described in detail below with reference to the accompanying drawings.

[0120] Such as figure 1 As shown, the multi-type terminal access and handover authentication method provided by the present invention includes the following steps:

[0121] S101: Entities such as ordinary terminals, special terminals, and Ka terminals interact with the entity identity management system to execute the entity registration pro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of communication network security, and discloses a multi-type terminal access and handover authentication method and system, equipment and application. Themethod comprises the steps of entity registration; ground-based common terminal access authentication; space-based special terminal access authentication; ka terminal access authentication; terminalhandover authentication. According to the method, a common terminal can safely and efficiently access a ground network by executing a ground-based common terminal access authentication process; for special terminals, such as important / high-speed users and the like, a space-based special terminal access authentication process can be used to quickly access a network by presetting an authentication vector in advance without participation of a home network, so that the problem that network service cannot be provided due to faults of the home network is avoided; the access authentication process based on the Ka terminal is used for the Ka terminal, so that high reliability of network access of the Ka terminal is guaranteed, the access authentication efficiency is greatly improved, and access authentication and handover of various different types of terminals are realized.

Description

technical field [0001] The invention belongs to the technical field of communication network security, and in particular relates to a multi-type terminal access and switching authentication method, system, equipment and application. Background technique [0002] At present, with the popularization of 5G communication technology and the rapid growth of Internet of Things devices, people's demand for mobile communication services continues to increase. Satellite communication networks are used to cover special communication scenarios such as mountainous areas and oceans, and to build information that integrates satellite networks and ground networks. The network is conducive to the deep interconnection of the global information network. Among the existing satellite communication systems, the Iridium system is a relatively mature satellite communication system in the early stage. The Iridium system belongs to the low-orbit satellite mobile communication system. It was proposed ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/03H04W12/02H04W12/04H04W12/06H04W12/12H04W48/20H04W60/00H04W84/06
CPCH04W12/02H04W12/06H04W48/20H04W60/00H04W84/06
Inventor 曹进马如慧李晖关键
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products