Method for negotiating about cipher key shared by users and application server

An application server and shared key technology, applied in the field of negotiating shared keys, can solve problems such as attacks, lack of user authentication in one-way authentication, and achieve the effect of two-way authentication

Inactive Publication Date: 2005-11-16
ZTE CORP
View PDF0 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] 2G users use SIM for authentication, and SIM can only achieve one-way authentication
One-way authentication lacks the user's authentication of the network, so it will lead to a large number of "pseudo-

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for negotiating about cipher key shared by users and application server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Below in conjunction with accompanying drawing, the implementation of technical scheme is described in further detail:

[0031] 1. The user device initiates an access request to the application server. At this time, the user and the application server do not share a valid pre-shared key.

[0032] 2. The application server sends a response to the user, requesting the user to perform a self-guidance process with the self-guidance server.

[0033] 3. The user equipment sends a negotiation key request to the bootstrap server, which contains the identity of the user.

[0034] 4. The bootstrap server requests the authentication vector from the home environment according to the identity of the user.

[0035] 5. Attribution environment According to the identity of the user, the user is a 2G user, and the corresponding authentication vector is generated as a GSM triplet (RAND, SRES, Kc).

[0036] 6. The home environment sends the authentication vector to the bootstrap server. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Using cipher key Kc in triple of 2G authentication self-booted server deduces cipher key CK and IK useful for 3G. Using IK to calculate out MAC value, self-booted server sends MAC and RAND together to 2G users. Based on RAND, 2G users calculate out Kc. Using a method same as the way utilized by self-booted server to deduce cipher key CK and IK deduces out cipher key CK and IK from Kc. using IK calculates out value of XMAC. Comparing the received MAC with XMAC realizes authenticating network for user. The invention makes both of 2G users and 3G users possible to negotiate about sharing cipher key in advance with self-booted server as well as realizes bi-directional authentication between user and network.

Description

technical field [0001] The present invention relates to a method for negotiating a shared key between a user and an application server in the communication field, and in particular to providing a negotiated shared key between a 2G user and an application server for legacy 2G users in a third-generation mobile communication system. method of the key. Background technique [0002] At present, people's demand for mobile communication is no longer satisfied with telephone and message services, and a large number of multimedia applications have emerged with the rapid development of the Internet. Most of the authentication methods of these applications require a secret key to be shared in advance between the user and the application server. 3GPP proposes a method of Generic Bootstrap Architecture (GBA), which provides a method for negotiating a pre-shared key between a 3G user and an application server. The GBA method is briefly described as follows: [0003] (1) The user first...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/12
Inventor 陈璟赵洁
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products