Verifying method and system based on general weight discrimination framework

An authentication method and framework technology, applied in the direction of user identity/authority verification, radio/induction link selection arrangement, selection device, etc. The effect of reducing the burden of storage and encryption and decryption operations, ensuring reliability, and improving generality

Active Publication Date: 2006-11-08
HONOR DEVICE CO LTD
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013]The purpose of this invention is to provide an authentication method based on a general authentication framework, aiming at solving the problem of how to use public Authentication and key agreement using the key mechanism, poor implementability and applicability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verifying method and system based on general weight discrimination framework
  • Verifying method and system based on general weight discrimination framework
  • Verifying method and system based on general weight discrimination framework

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0059] In the present invention, the service entity and the EAC perform mutual authentication and key negotiation based on the public key mechanism. After the authentication is completed, the service entity and the EAC generate Ks for protecting the service communication between the service entity and the EAC.

[0060] figure 2 It shows the implementation process of mutual authentication and key agreement between the business entity and the EAC in the first embodiment of the present invention, and the specific content is as follows:

[0061] 1. The business entity negotiates with the EAC to deter...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention provides a certification method and a system based on a general authority authentication frame including an entity certification center connected with the service entity and a database storing the service entity agreement information, in which, the method includes: A, the entity certification center negotiates with the service entity about the certification mode and a cipher algorithm to determine applying a mode of public key to mutually certificate, B, the entity certification center verifies the certificate of the service entity to get its public key, C, the center and the service entity certify each other by the public key of the opposite to generate a share cryptographic key.

Description

technical field [0001] The invention belongs to the field of mobile communication, in particular to an authentication method and system based on a general authentication framework. Background technique [0002] The general authentication framework is a common structure used by various application services in the third-generation wireless communication standards to complete the verification of user identities, such as figure 1 shown. The framework is applicable to different mobile network standards, and its function is to establish mutual trust relationship between different types of entities. The network elements involved in it include three types of service entities: Service Subscriber (SS), Service Subscriber and Provider (SSP), and Service Provider (SP). [0003] SS is generally an ordinary mobile user and can send service requests to SP. The SP is the application service provider of the operator's network or the service provider of the external network, receives the s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04Q7/38H04W12/041H04W12/0431H04W12/069
Inventor 位继伟范絮妍李超
Owner HONOR DEVICE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products