Key consulting method and its system for customer end and server

A key negotiation and server technology, applied in the field of client and server key negotiation methods and systems thereof, can solve the problems of easy interception of login passwords, insecurity, and easy interception of communication passwords.

Inactive Publication Date: 2006-11-08
HUAWEI TECH CO LTD
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] There are serious security problems in the existing mobile system: the client and the server cannot securely negotiate the communication key
During this process, the login password is easily intercepted, and the communication password is also easily intercepted, which makes the communication of the entire system unsafe.
[0009] In addition, if the client provides an illegal user card IMSI when registering with the server, for example, user Zhang San steals the user card IMSI of user Li Si, in this case, the server cannot determine whether the IMSI is legal
[0010] Compared with the security of negotiating keys between the terminal and the network in the mobile communication system, the process of negotiating keys between the current accompanying e-walking server and the client is too insecure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key consulting method and its system for customer end and server
  • Key consulting method and its system for customer end and server
  • Key consulting method and its system for customer end and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] According to the key agreement method described in the present invention, the client generates the key it needs to negotiate according to the authentication key KI stored in the user card, and the server generates the key it needs to negotiate according to the authentication key KI stored in HLR / AUC. The negotiated key. The server requests the generated authentication tuple from the HLR / AUC, and the server can simulate a roaming MSC / VLR requesting the authentication tuple from the HLR / AUC when the server generates the authentication tuple. When generating the authentication tuple, the server first generates a random number RAND, and generates the authentication tuple according to the RAND and the KI stored by itself. According to the authentication tuple, the server contains the temporary key needed when the server and the client negotiate the key. For example, the temporary key can be the encryption key Kc for the 2G GSM system, and for the 3G WCDMA system , which can...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention discloses a cryptpgraphic key negotiation method and a system for the customer end and a server, in which, the method includes: a, sending an IMSI of a user card to a server, b, the server sends IMSI to the HLR / AUC, c, the HLR / AUC generates a random number RAND to generate a temporary key tempK based on its own stored KI and the RAND and sends the generated RAND and the tempK to the server, d, the server sends the RAND to the user card after getting the RAND and tempK, e, th user card generates a tempK based on its own stored KI and the received RAND, f, the customer end gets the tempK from the user card and gets its own key to be negotiated.

Description

technical field [0001] The invention relates to communication security technology, in particular to a key agreement method and system between a client and a server. Background technique [0002] China Mobile has launched the accompanying e-travel service, which refers to: China Mobile provides wireless Internet access cards or mobile phones, which can be connected to China Mobile's current or future mobile phones through GPRS, or 3G technology, or WLAN, or WiMAX technology. Wireless network, the user directly inserts the card into the PC (portable or desktop), or connects the mobile phone with Internet access function to the PC through the serial port, Bluetooth or infrared function, and then the PC can access the Internet through the wireless network card or mobile phone , in order to realize the needs of users to access the Internet conveniently through a wireless network by using a PC. The accompanying e-travel service is realized through the broadband accompanying e-tra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08
Inventor 王正伟
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products