A method and system for consulting new authentication secret key

An authentication key and new key technology, which is applied in the field of negotiating new authentication keys, can solve problems such as leaking key data, no remedial measures, leaking root keys, etc., and achieve the effect of solving potential safety hazards

Inactive Publication Date: 2007-05-30
CHINA MOBILE COMM GRP CO LTD +1
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 1. The root key was written by the card dealer, and the staff of the card dealer leaked the root key;
[0007] 2. The root key is written by the operator during operation, and the operator's staff leaked the root key
[0008] 3. The ma

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for consulting new authentication secret key
  • A method and system for consulting new authentication secret key
  • A method and system for consulting new authentication secret key

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0049] Example one:

[0050] FIG. 3 is a flowchart of a method for negotiating a new authentication key in Embodiment 1 of the present invention. As shown in Figure 3, the process includes:

[0051] Step 301: The first module generates a random number RAND.

[0052] Step 302: Generate a first new key (NewAK1) and authentication parameters, and send the authentication parameters to the authentication agent.

[0053] In this step, the first module can generate NewAK1 according to RAND and the stored first key (AK1), or select one of multiple keys stored by itself as NewAK1; and the generated authentication parameters include RAND and MAC- A, and update key request information.

[0054] Wherein, in this embodiment, MAC-A is generated based on RAND and AK1 stored in the first module.

[0055] The key update request information can be represented by a bit in RAND, or can also be represented by a bit in MAC-A. When represented by a bit in RAND, the setting of this bit can be performed be...

Example Embodiment

[0085] Embodiment two:

[0086] In this embodiment, the first module further stores the first serial number SQN1, and the second module further stores the second serial number SQN2; the authentication parameters transmitted by the first module to the authentication agent further include the first serial number SQN1 and the desired authentication Right response (XRES), and the first module uses the serial number in the first module when generating the authentication parameters. When the authentication agent sends an authentication request to the second module, SQN1 is further carried, that is, RAND, MAC-A and SQN1 are carried, and the authentication of the first module to the second module is completed in the authentication agent.

[0087] Fig. 5 is a flowchart of the method for negotiating a new authentication key in the second embodiment of the present invention. As shown in Figure 5, the process includes:

[0088] Step 501: The first module generates a random number RAND.

[008...

Example Embodiment

[0120] Embodiment three:

[0121] In this embodiment, the generated authentication parameters further include the authentication management domain AMF.

[0122] Fig. 6 is a flowchart of the method for negotiating a new authentication key in the third embodiment of the present invention. As shown in Figure 6, the process includes:

[0123] In step 601, the first module generates a random number RAND.

[0124] Step 602: Generate a first new key (NewAK1) and authentication parameters, and send the authentication parameters to the authentication agent.

[0125] In this step, the first module can generate NewAK1 according to the generated RAND and the stored first key (AK1), or it can select one of the multiple keys stored by itself as NewAK1; and the generated authentication parameters include RAND, MAC-A and XRES, and update key request information.

[0126] Among them, in this embodiment, MAC-A is generated based on the random number RAND, AK1, SQN1 stored in the first module, and t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention discloses one agreement authorization key method, which comprises the following steps: first module sends authorization parameters at agent with update key information; agent receives parameters and sends the require with update information to second module; second module processes accordance test to generate second new key and then uses the second key to generate simultaneous codes to first one; first module gets first new key to edit information and to determine second module successful response. This invention also discloses one agreement new authorization key system.

Description

Technical field [0001] The invention relates to the technical field of communication security, in particular to a method and system for negotiating a new authentication key. Background technique [0002] With the rapid popularization of communication systems and the increasing number of business types, especially the demand for data services such as e-commerce and electronic trade, the status of information security in communication systems has become increasingly prominent. The two core issues of information security in communication systems are authentication and encryption. Among them, authentication is the main means to identify the authenticity of communication participants, and the safe and effective negotiation of keys is an important prerequisite for ensuring communication security. [0003] In existing authentication methods, such as AKA (Authentication and Key Agreement) in 3GPP, a fixed root key mechanism is adopted, that is, the root key is always kept unchanged. This...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08
Inventor 刘利军刘斐魏冰王正伟李杨
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products