Key generation method and equipment

A key generation and key technology, applied in the field of network information security, can solve problems such as key generation, and achieve the effects of reducing signaling interaction overhead, improving freshness and anti-replay attack capabilities.

Active Publication Date: 2021-07-23
CHINA MOBILE COMM LTD RES INST +1
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At least one embodiment of the present invention provides a key generation method, terminal and network equipment, which solves the problem of key generation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key generation method and equipment
  • Key generation method and equipment
  • Key generation method and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] Exemplary embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present invention are shown in the drawings, it should be understood that the invention may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present invention and to fully convey the scope of the present invention to those skilled in the art.

[0075] The terms "first", "second" and the like in the specification and claims of the present application are used to distinguish similar objects, and are not necessarily used to describe a specific order or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the application described herein, for example, can be practiced in sequences other than those illustrate...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A key generation method and equipment are disclosed, the method comprising: after a terminal completes initial registration authentication, an AUSF generates an authentication and key management for applications (AKMA) intermediate key KAKMA and generates a key identifier of the KAKMA according to an AUSF key KAUSF and preset parameters generated in the initial registration authentication of the terminal. According to the key generation method and equipment provided by the embodiment of the invention, the RAND sum in an authentication vector is used as an input parameter, so that the freshness and the replay attack resistance of the intermediate key are improved, and the freshness and the replay attack resistance of the application layer session key deduced by the AKMA intermediate key are improved. Besides, the key identifier of the intermediate key in the embodiment of the invention is synchronously generated with the intermediate key after the terminal is successfully authenticated for the first time, so that the signaling interaction overhead in a mode of generating the key identifier as required can be reduced.

Description

technical field [0001] The invention relates to the technical field of network information security, in particular to a method and device for generating a key. Background technique [0002] An important feature is introduced in 5G security technology, which is to use the authentication and security mechanism of the operator network to provide authentication and session key capabilities for third-party applications, that is, application layer authentication and session key management (AKMA, Authentication and Key Management for Applications, to ensure the session security between the user terminal and the application server. At present, the generation method of the relevant key has not yet been determined. Contents of the invention [0003] At least one embodiment of the present invention provides a key generation method, a terminal and a network device, which solve the problem of key generation. [0004] According to one aspect of the present invention, at least one embod...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0861H04L65/1073H04L63/08H04L63/06H04L9/08H04W12/04H04L9/40
Inventor 黄晓婷
Owner CHINA MOBILE COMM LTD RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products