Method for negotiating key share between user and peripheral apparatus
A technology of peripheral devices and shared keys, applied in key distribution, can solve the problems of encrypted transmission, difficult information, and impossible shared keys of peripheral devices, and achieve the effect of preventing tampering or theft
Active Publication Date: 2010-09-08
HUAWEI TECH CO LTD
View PDF0 Cites 0 Cited by
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
However, there is no better way to protect this information at present, because it is impossible to pre-save and store all peripheral information in the UE because the user cannot predict which devices will access the UE when purchasing a UICC card or UE. The shared key of the device, since there is no corresponding protection key with the peripheral device to transmit information, it is difficult to encrypt and transmit the information between the UE and the peripheral device
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View moreImage
Smart Image Click on the blue labels to locate them in the text.
Smart ImageViewing Examples
Examples
Experimental program
Comparison scheme
Effect test
Embodiment Construction
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More PUM
Login to View More Abstract
This invention relates to user UE and outside negotiation common key method, which comprises the following steps: a, outside device sends connection demands to UE portable with outside device label; b, UE tests valid part BSF common keys, outside device to compute first local interface common key according to UE and executive deification; c, by network side and according to UE and BSF common key getting said outside label to compute second local interface common key with first local interface to provide outside devices.
Description
technical field The invention relates to the technical field of 3GPP general authentication framework (GAA), in particular to a method for negotiating a shared key between a user (UE) and a peripheral device. Background technique In the third-generation wireless communication standard, the general authentication framework (GAA) is a general structure used by various application service entities to complete the verification of user identities. Check and verify identity. The various application services mentioned above may be multicast or broadcast services, user certificate services, instant information provision services, etc., or proxy services. Figure 1 shows the structure of the general authentication framework. The general authentication framework is usually composed of the user (UE), the entity (BSF) that performs the initial check and verification of the user identity, the user home network server (HSS) and the network service application entity (NAF). The BSF is u...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More Application Information
Patent Timeline
Login to View More Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L2209/80H04L63/0853H04L9/0844H04L63/062H04L2209/56H04W12/04H04L9/3273H04W12/43H04W12/0431
Inventor 杨艳梅
Owner HUAWEI TECH CO LTD
