Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for mobile device security authentication based on bilinear pairing

A mobile device and security authentication technology, applied in the field of information security, can solve the problems of being vulnerable to attacks and low security performance, and achieve the effects of security assurance, avoiding counterfeit attacks and ensuring security.

Active Publication Date: 2021-07-02
北京电信易通信息技术股份有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the existing technology, D2D communication is vulnerable to attacks, and the security performance is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for mobile device security authentication based on bilinear pairing
  • Method and system for mobile device security authentication based on bilinear pairing
  • Method and system for mobile device security authentication based on bilinear pairing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] figure 2 It is a schematic diagram of the authentication process in Embodiment 1 of the present invention, such as figure 2 As shown, the security authentication process between mobile devices disclosed in this embodiment is as follows:

[0061] Step 100: The access and mobility management function module of the 5G network generates a temporary ID for the successfully authenticated user equipment, and sends it to the corresponding user equipment through a secure channel.

[0062] Step 200: The first user equipment generates the first public key of the first user equipment using the elliptic curve cryptographic algorithm, generates the first signature of the first user equipment according to the temporary identity ID of the first user equipment, and sends the first message Broadcast out. in, is the temporary identity ID of the first user equipment, is the first signature of the first user equipment, is the first public key of the first user equipment, is the...

Embodiment 2

[0071] Compared with Embodiment 1, this embodiment discloses specific methods of each public key, signature and authentication. image 3 It is a schematic diagram of the authentication process in Embodiment 2 of the present invention, such as image 3 As shown, the security authentication process between mobile devices disclosed in this embodiment is as follows:

[0072] Step 1: The user equipment UE is initialized, and then the user equipment UE is authenticated through the protocol 5G-AKA protocol and the 5G network, and a secure channel is established after the authentication is successful. At this time, the AMF module generates the temporary identity ID of the user equipment UE, calculates S=H(ID), M=sS, and then sends M and ID to the user equipment UE through a secure channel.

[0073] Step 2: User Equipment First choose a random number a and calculate the public key =aP, for user equipment temporary status Perform signature calculation to get signature , then ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a mobile device security authentication method and system based on bilinear pairing. For one-to-one mobile device communication, the user device performs user identity authentication through the 5G authentication and key agreement protocol in the 5G network. After passing the authentication, A secure channel is established between the user equipment and the 5G network, and the user equipment is initialized through the secure channel. When the user devices are ready to communicate, the user devices verify the identities between the devices through signatures, and use the bilinear pairing algorithm to carry out key negotiation, so that the devices can establish a connection and communicate through the negotiated key. This method effectively resists common attacks such as eavesdropping and counterfeiting, and also improves the forward and backward security of the key. By using the invention, mobile devices can communicate safely and efficiently.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and system for security authentication of mobile equipment based on bilinear pairing. Background technique [0002] The next generation of mobile communication, namely 5G wireless mobile network, not only brings solutions to the growing demand for big data traffic and large-scale connected devices such as the Internet of Things, but also brings new services. One of the very promising solutions is that device-to-device (D2D) communication, that is, communication between mobile devices, is expected to play a key role with the advantages of improved efficiency and low latency. Communication between mobile devices is a point-to-point communication mechanism between devices without intermediate nodes. Communication between mobile devices has many advantages in mobile networks. First, it can expand the coverage of each cell in the cellular network and act as a c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30H04L9/32H04L9/08H04L29/06H04W4/40H04W4/70
CPCH04L9/0869H04L9/3066H04L9/3236H04L9/3247H04L9/3297H04L63/0428H04L63/0869H04W4/40H04W4/70
Inventor 沈玉勤杨涛周鹏兵王帅
Owner 北京电信易通信息技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products