Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mobile equipment security authentication method and system based on bilinear pairing

A mobile device and security authentication technology, applied in the field of information security, can solve the problems of vulnerability to attacks and low security performance, and achieve the effects of security assurance, avoiding counterfeiting attacks, and avoiding replay attacks

Active Publication Date: 2021-05-18
北京电信易通信息技术股份有限公司
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the existing technology, D2D communication is vulnerable to attacks, and the security performance is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile equipment security authentication method and system based on bilinear pairing
  • Mobile equipment security authentication method and system based on bilinear pairing
  • Mobile equipment security authentication method and system based on bilinear pairing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] figure 2 It is a schematic diagram of the authentication process in Embodiment 1 of the present invention, such as figure 2 As shown, the security authentication process between mobile devices disclosed in this embodiment is as follows:

[0061] Step 100: The access and mobility management function module of the 5G network generates a temporary ID for the successfully authenticated user equipment, and sends it to the corresponding user equipment through a secure channel.

[0062] Step 200: The first user equipment generates the first public key of the first user equipment using the elliptic curve cryptographic algorithm, generates the first signature of the first user equipment according to the temporary identity ID of the first user equipment, and sends the first message Broadcast out. in, is the temporary identity ID of the first user equipment, is the first signature of the first user equipment, is the first public key of the first user equipment, is the...

Embodiment 2

[0071] Compared with Embodiment 1, this embodiment discloses specific methods of each public key, signature and authentication. image 3 It is a schematic diagram of the authentication process in Embodiment 2 of the present invention, such as image 3 As shown, the security authentication process between mobile devices disclosed in this embodiment is as follows:

[0072] Step 1: The user equipment UE is initialized, and then the user equipment UE is authenticated through the protocol 5G-AKA protocol and the 5G network, and a secure channel is established after the authentication is successful. At this time, the AMF module generates the temporary identity ID of the user equipment UE, calculates S=H(ID), M=sS, and then sends M and ID to the user equipment UE through a secure channel.

[0073] Step 2: User Equipment First choose a random number a and calculate the public key =aP, for user equipment temporary status Perform signature calculation to get signature , then ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a mobile equipment security authentication method and system based on bilinear pairings. Aiming at one-to-one mobile equipment communication, user equipment carries out user identity authentication through a 5G authentication and key agreement protocol in a 5G network, and if the authentication is passed, a security channel is established between the user equipment and the 5G network, and the user equipment is initialized through the security channel. When the user equipment prepares to communicate with each other, the user equipment verifies the identity between the equipment through a signature and performs key negotiation by using a bilinear pairing algorithm, so that the equipment can establish connection and communicate with each other through the negotiated key. According to the method, common attacks such as eavesdropping and counterfeiting are effectively resisted, and the forward and backward security of a key is also improved. According to the invention, the mobile devices can communicate with one another safely and efficiently.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and system for security authentication of mobile equipment based on bilinear pairing. Background technique [0002] The next generation of mobile communication, namely 5G wireless mobile network, not only brings solutions to the growing demand for big data traffic and large-scale connected devices such as the Internet of Things, but also brings new services. One of the very promising solutions is that device-to-device (D2D) communication, that is, communication between mobile devices, is expected to play a key role with the advantages of improved efficiency and low latency. Communication between mobile devices is a point-to-point communication mechanism between devices without intermediate nodes. Communication between mobile devices has many advantages in mobile networks. First, it can expand the coverage of each cell in the cellular network and act as a c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/32H04L9/08H04L29/06H04W4/40H04W4/70
CPCH04L9/0869H04L9/3066H04L9/3236H04L9/3247H04L9/3297H04L63/0428H04L63/0869H04W4/40H04W4/70
Inventor 沈玉勤杨涛周鹏兵王帅
Owner 北京电信易通信息技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products