Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for realizing safety communication between user equipment and network service application entity

A technology for network services and application entities, which is applied in the direction of public keys for secure communication, and can solve problems such as not providing a key selection mechanism

Active Publication Date: 2006-12-20
HUAWEI TECH CO LTD
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the current standard does not provide a key selection mechanism

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing safety communication between user equipment and network service application entity
  • Method for realizing safety communication between user equipment and network service application entity
  • Method for realizing safety communication between user equipment and network service application entity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The invention specifies different protection key types used by different applications, and when a user wants to use a certain application to communicate with NAF, a corresponding key is generated according to the protection key type specified by the user.

[0044] When the UE needs to use a certain application, the process of realizing the communication between the UE and the NAF is divided into the following stages:

[0045] The first part: in advance, both the network and the UE store the information of different protection key types used at the Ua interface specified by different applications. This information can be called the key attribute information of the application;

[0046] The second part: before the communication, the UE and the BSF perform a two-way authentication process to generate a shared key Ks;

[0047] The third part: UE uses Ks to generate a derived key and selects which derived key to use according to the key management function of UICC and the ke...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for realizing safe communication between UE and NAF, which comprises: A, the network and UE store the different key types used in Ua port; B, when UE uses one application, UE and BSF identify the priority to generate the shared key Ks to be shored by them; C, based on UICC character, stored applied key type and the shared key Ks, UE generates derived key; D, the network with NAF, based on the UCC character, stored applied key type and the shared key Ks of UE, generates the derived key stored in NAF; E, UE and NAF uses generated derived key to communicate via the Ua port. The invention can realize the communication protected by appointed key type when communicating one application via Ua port.

Description

technical field [0001] The invention relates to the technical field of 3GPP general authentication framework, in particular to a method for realizing secure communication between user equipment (UE) and network service application entity (NAF). Background technique [0002] In the third-generation wireless communication standard, the general authentication framework is a general structure used by various application business entities to complete the verification of user identities. The application of the general authentication framework can realize the inspection and verification of users of application services identity. The various application services mentioned above may be multicast / broadcast services, user certificate services, instant information provision services, etc., or proxy services. [0003] figure 1 The structure of the generic authentication framework is shown. The general authentication framework usually consists of user equipment (UE), entity (BSF) that ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30
Inventor 杨艳梅黄迎新
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products