Multi-user authentication method and system for mobile communication scene and information processing terminal

An authentication method and a mobile communication technology, applied in the field of equipment and information processing terminals, media, multi-user authentication methods, and systems, can solve the problems of not being able to handle a large number of devices requesting network services at the same time, and not considering inter-domain switching scenarios, etc. , to achieve the effect of reducing communication overhead, reducing computing overhead, and reducing the probability of channel congestion

Pending Publication Date: 2022-04-05
XIAN UNIV OF POSTS & TELECOMM
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] (1) The standardized identity authentication protocol 5G-AKA defined in the existing 5G network only supports a single user to perform the authentication process independently, which usually requires several rounds of signaling interaction and complex switching key management mechanism, and cannot handle a large number of The case where devices request network services at the same time
[0007] (2) At present, group-oriented authentication and key agreement schemes have been proposed to support multi-user access. However, when these schemes are implemented in actual communication scenarios, there are still some problems in terms of security and performance, and most schemes Inter-domain switching scenarios are not considered

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-user authentication method and system for mobile communication scene and information processing terminal
  • Multi-user authentication method and system for mobile communication scene and information processing terminal
  • Multi-user authentication method and system for mobile communication scene and information processing terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0093] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0094] The present invention combines the advantages of Mobile Edge Computing (MEC) and Software Defined Networking (SDN), uses the aggregated message authentication code technology with detection function based on bi-orthogonal codes to realize mutual authentication, and uses the n-BDHE difficult problem to realize group For key negotiation and update, a multi-user authentication scheme suitable for intra-domain handover and inter-domain handover scenarios is designed.

[0095] The technical solutions of the present invention will be further described below in conjunction with specific embodiments.

[0096] First, in the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of network communication, and discloses a multi-user authentication method and system for a mobile communication scene and an information processing terminal. An initial authentication stage; and switching the authentication stage. According to the method, a multi-user authentication scheme is designed by using an aggregation message authentication code with a detection function and a contribution-based broadcast encryption technology based on MEC and SDN technologies, so that the channel congestion probability is reduced, the calculation overhead and communication overhead of switching authentication are reduced, the switching authentication time delay is reduced, and the safety performance of group authentication is improved. According to the invention, the network architecture integrated by the SDN and the MEC server can monitor the network state in real time according to the dynamic topology of the user in advance to make a switching decision, a large amount of calculation overhead can be completed before switching authentication, and the switching authentication time delay is effectively reduced. And the group messages are aggregated, so that the number of times of signaling interaction can be effectively reduced, and the possibility of channel congestion is reduced.

Description

technical field [0001] The invention belongs to the technical field of network communication, and in particular relates to a multi-user authentication method, system, medium, equipment and information processing terminal in a mobile communication scene. Background technique [0002] At present, with the improvement of the technical standards of the Internet of Things industry and the continuous breakthroughs in key technologies, the connection of a large number of intelligent terminals and other network edge devices is bound to generate a large amount of real-time data. If this type of data processing and analysis is handed over to the cloud, the distance between the cloud and the device will result in high bandwidth consumption and processing delay, which is unacceptable for many delay-sensitive edge-side data. The MEC technology solves such problems to a certain extent by sinking computing, storage, and business service capabilities to the edge of the network, which is of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/041H04W12/0431H04W12/0433H04W12/06H04W12/122
Inventor 赖成喆马逸霄张应辉曹进郑东
Owner XIAN UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products