Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication method, system and device, electronic equipment and readable medium

A technology of identity authentication and authentication vector, which is applied in the field of network security, can solve the problems of cumbersome network access authentication process information is easy to be stolen and re-authentication process, so as to improve efficiency, reduce the risk of information leakage, and reduce the cost of calculation and analysis links Effect

Pending Publication Date: 2022-03-01
CHINA TELECOM CORP LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The present disclosure provides an identity authentication method, system, device, electronic device and readable medium, at least to a certain extent, overcoming the problems in related technologies that the network access authentication process information is easy to be stolen and the re-authentication process is cumbersome

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, system and device, electronic equipment and readable medium
  • Identity authentication method, system and device, electronic equipment and readable medium
  • Identity authentication method, system and device, electronic equipment and readable medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.

[0031]Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus repeated descriptions thereof will be omitted. Some of the block diagrams shown in the drawings are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identity authentication method, system and device, electronic equipment and a readable medium, and the identity authentication method comprises the steps: receiving a network access authentication request from a terminal, the network access authentication request comprising a user identifier and an encrypted terminal serial number; the encrypted terminal serial number is decrypted, and the decrypted terminal serial number is stored in the local UDM network element; when a serial number synchronization failure message returned by the terminal according to the first network side authentication vector is received, searching the terminal serial number of the terminal locally from the UDM network element according to the user identifier; and generating a second network side authentication vector according to the terminal serial number, and sending the second network side authentication vector to the terminal, so that the terminal authenticates a second network serial number contained in the second network side authentication vector. By encrypting the terminal serial number, the security of information transmission in the authentication process is improved, the terminal serial number is stored in the local UDM network element, and the security of information transmission in the authentication process and the efficiency of the re-authentication process are improved.

Description

technical field [0001] The present disclosure relates to the technical field of network security, and in particular to an identity authentication method, system, device, electronic equipment and readable medium. Background technique [0002] AKA (authentication and key agreement) uses the challenge response mechanism to complete the identity authentication between the terminal and the network, and negotiates the communication encryption key based on the identity authentication. [0003] In the prior art, in the two-way authentication process between the terminal and the network, the network sends an authentication request response to the terminal, including the authentication quintuple vector (RAND, AUTN, XRES, CK, IK), and the terminal will verify the AUTN, including the network side Verification of message authentication code MAC and network serial number SQN. If the SQN is not within the correct range, the terminal will report to the network that the reason for authentic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40H04L9/08
CPCH04L63/0876H04L63/0869H04L9/0866
Inventor 张越王锦华黄铖斌薛伟佳王聪丽
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products