Method and system for negotiating new discrimination key
An authentication key and new key technology, which is applied in the field of negotiating new authentication keys, can solve the problems of leaking key data, no remedial measures, leaking root keys, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0101] FIG. 3 is a flowchart of a method for negotiating a new authentication key in Embodiment 1 of the present invention. As shown in Figure 3, the process includes:
[0102] Step 301, the first module generates a random number RAND.
[0103] Step 302: Generate a first new key (NewAK1) and authentication parameters according to the generated random number RAND and the saved first key (AK1), and send the authentication parameters to the authentication agent.
[0104] In this step, NewAK1 can be generated according to RAND and AK1; and the generated authentication parameters include RAND, MAC-A and SXRES, and key update request information.
[0105] Wherein, in this embodiment, MAC-A is generated according to RAND and AK1 stored in the first module, and SXRES is generated according to NewAK1;
[0106] The key update request information may be represented by a bit in RAND, or may also be represented by a bit in MAC-A. When represented by a bit in RAND, the setting of this bi...
Embodiment 2
[0141] In this embodiment, the first module further stores the first serial number SQN1, and the second module further stores the second serial number SQN2; the authentication parameter transmitted by the first module to the authentication agent further includes the first serial number SQN1, And the first module utilizes the serial number in the first module when generating the authentication parameter. The authentication agent further carries SQN1 when sending the authentication request to the second module, that is, carries RAND, MAC-A and SQN1.
[0142] FIG. 5 is a flowchart of a method for negotiating a new authentication key in Embodiment 2 of the present invention. As shown in Figure 5, the process includes:
[0143] Step 501, the first module generates a random number RAND.
[0144] Step 502, generate a first new key (NewAK1) and authentication parameters according to the generated random number RAND, the saved first key (AK1), and the serial number (SQN1), and send t...
Embodiment 3
[0172] In this embodiment, the generated authentication parameters further include an authentication management field AMF.
[0173] FIG. 6 is a flowchart of a method for negotiating a new authentication key in Embodiment 3 of the present invention. As shown in Figure 6, the process includes:
[0174] Step 601, the first module generates a random number RAND.
[0175] Step 602, generate the first new key (NewAK1) and authentication parameters according to the generated random number RAND, the saved first key (AK1), the serial number (SQN1) and the set AMF, and send the authentication parameters to Authentication proxy.
[0176] In this step, NewAK1 can be generated according to RAND and AK1; and the generated authentication parameters include RAND, MAC-A and SXRES, and key update request information.
[0177] Wherein, in the present embodiment, MAC-A is generated according to the random number RAND, AK1, SQN1 and the AMF set in the first module, and SXRES is generated accord...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 