Message authentication method

A message authentication and message technology, applied in the direction of user identity/authority verification, security devices, electrical components, etc., can solve the sender identity authentication, reduce the security of RSA authentication, RSA authentication rejects message recognition, etc., to improve security. Effect

Inactive Publication Date: 2006-07-12
HUAWEI TECH CO LTD
View PDF1 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] It can be seen from the above process that although the RSA authentication rejection message returned by the BS to the MS includes the signature of the BS private key, after receiving the RSA authentication rejection message, the MS cannot use the private key of the BS because it does not have the digital certificate of the BS. The signature authenticates the message, so that when the attacker sends an RSA authentication rejection message to the MS, the MS cannot identify the false RSA authentication rejection message through authentication; and, because there is no digital certificate of the BS, the MS will After rejecting the message, the BS cannot be authenticated. When the attacker pretends to be the BS and sends the RSA authentication rejection message to the MS, the MS cannot authenticate the identity of the sender, thus preventing the MS from accessing the network normally and reducing the risk of RSA authentication. safety

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Message authentication method
  • Message authentication method
  • Message authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0044] The main idea of ​​the present invention is that in the RSA authentication process, the base station receives the authentication request message from the terminal, and after authenticating the message, sends an authentication reply message including the digital certificate and private key signature of the base station to the terminal; After receiving the message including digital certificate and private key signature from the base station, authenticate the message according to the digital certificate and private key signature in the message, and judge whether the authentication is passed, and discard the message from the base station after judging that it has not passed the authentication information.

[0045] The present invention is described in detail be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Present invention discloses a message authenticating method used in termination MS and base station BS. It contains MS transmitting authenticating request message to BS, BS transmitting authenticating reversion message including BS digit certificate and private key sign to MS after received said authenticating request message and authenticating, MS authenticating said message according to digit certificate and private key signature after receiving said authenticating reversion message, judging whether passing authenticating, and dropping said message from BS judging out it not passing authenticating. Said invention raises RSA authenticating security.

Description

technical field [0001] The invention relates to a technique for improving the security of a wireless communication system, in particular to a message authentication method between MS and BS. Background technique [0002] In a communication system, security is an important indicator to evaluate the performance of a communication system, especially in a wireless communication system, due to the characteristics of openness and mobility of a wireless communication system, the security of a wireless communication system is particularly important . With the development of cryptography and cryptanalysis, the security of the wireless communication system can be improved by encrypting the data transmitted on the air interface (air interface for short) of the wireless communication system. [0003] IEEE 802.16d / e series protocols define protocol standards for wireless broadband fixed and mobile access air interfaces. In order to ensure the security of air interface data transmission...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/38H04L9/32H04W12/06H04W12/069
Inventor 李永茂肖正飞
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products