Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication methods for common authentication mechanisms

A general authentication mechanism and authentication method technology, applied in the authentication field of the general authentication mechanism, can solve the problem of large network resource occupation

Active Publication Date: 2017-05-31
CHINA MOBILE COMM GRP CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, when authenticating a communication group, it is necessary to initiate an authentication based on a general authentication mechanism for each node in the communication group; since this method needs to repeat the authentication process many times, it brings a lot of trouble to the network. Large signaling overhead makes network resources occupy a lot

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication methods for common authentication mechanisms
  • Authentication methods for common authentication mechanisms
  • Authentication methods for common authentication mechanisms

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0096] The embodiment of the present invention discloses an authentication method of a general authentication mechanism. In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and examples.

[0097] refer to figure 1 , in the embodiment of the present invention, the GBA-based authentication method, when the general authentication mechanism authentication is initialized, includes the steps:

[0098] S11. The group gateway and each node in the group perform two-way authentication in the group, so that the group gateway and each node in the group mutually recognize the validity of each other's identities;

[0099] One of the application scenarios of the embodiment of the present invention includes smart meter reading applications. Specifically, meters (such as water meters, electricity meters, and gas meters) in the same geographic ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This embodiment discloses an authentication method based on a general authentication mechanism. When the general authentication mechanism authentication is initialized, it includes the steps: the group gateway and each node in the group perform two-way authentication in the group, so that the group gateway and each node in the group mutually Recognize the validity of the identity of the other party; after the group gateway requests access to the network application function NAF service server, it performs two-way authentication with the NAF service server outside the group; because in the embodiment of the present invention, each node in the group There is no need to perform authentication with the NAF service server separately; therefore, the number of authentications with the NAF service server is effectively reduced, thereby saving the overhead of network transmission signaling caused by the authentication.

Description

technical field [0001] The invention relates to the field of communication networks, in particular to an authentication method of a general authentication mechanism. Background technique [0002] GBA (General Bootstrapping Architecture, general authentication mechanism) is a method for generating a shared key between a network application and a mobile terminal to ensure communication security between the client and the application server. GBA describes how to use the AKA (Authentication and Key Agreement) mechanism to provide pre-shared keys between nodes and application servers in the network in a mobile context. [0003] The GBA introduces a network element BSF (BootStrapping Function, bootstrapping function) server, which obtains user security information and authentication information through an interface with an AUC (Authentication Centre, authentication center). [0004] Among them, the AUC stores a database for recording all user-related data; the BSF server and the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/08H04W12/04H04W12/06H04L29/06H04L9/32H04L9/08H04W12/041H04W12/0431
Inventor 刘斐田野朱红儒阎军智
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products