A satellite network terminal security access authentication method, device and system

A satellite network and access authentication technology, applied in the field of satellite communications, can solve problems such as limited satellite resources, complex data transmission, and difficulty in ensuring security strength

Active Publication Date: 2022-02-25
TSINGHUA UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the existing technology, the following two methods are usually used for access authentication. The first method is central authentication, that is, access authentication is performed through the security control center. In this method, the terminal needs to pass the authentication request information through the satellite communication base station and satellite Transmission to the security management and control center, therefore, the data transmission of method 1 is complicated, and it is easy to cause a large authentication transmission delay
The second way is to rely on satellites for authentication, that is, access authentication through satellites. However, satellite resources are limited, and it is difficult to ensure sufficient security strength due to the limitation of relatively high authentication lightweight requirements.
Some of the above disadvantages in the existing authentication methods will affect the access authentication performance and user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A satellite network terminal security access authentication method, device and system
  • A satellite network terminal security access authentication method, device and system
  • A satellite network terminal security access authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] refer to figure 1 , which shows an interactive schematic diagram of a satellite network terminal security access authentication provided in Embodiment 1 of the present invention. In this embodiment, the method includes:

[0058] S101: If the terminal is applying for network access for the first time, generate registration request information, and send the registration request information to the security control center;

[0059] In this embodiment, the registration request information of the terminal includes relevant information that characterizes the identity of the terminal, for example including: terminal device number ID e and terminal verification information info, but the registration request information of the terminal is not limited to these two kinds of information.

[0060] In this embodiment, the channels for the terminal to send the registration request information to the security management and control center may include various channels, such as a satelli...

Embodiment 2

[0151] refer to figure 2 , which shows a schematic flowchart of a satellite network terminal security access authentication method provided in Embodiment 2 of the present invention. In this embodiment, the satellite network system includes:

[0152] Terminals, satellite communication base stations, satellites and security control centers;

[0153] The method includes:

[0154] S201: After the terminal successfully registers with the security management and control center, when the terminal needs to access the satellite network, generate access authentication request information, and send the access authentication request information to the Satcom base station; the access authentication request information is at least Including: anonymous identity information, a first token parameter and a second token verification parameter, wherein the anonymous identity information and the first token parameter are generated according to the real identity of the terminal, and the second to...

Embodiment approach

[0156] In this embodiment, the access authentication request information includes at least anonymous identity information, a first token parameter, and a second token verification parameter, wherein the anonymous identity information can be generated according to the real identity of the terminal. In one embodiment, The real identity of the terminal and the second random number generated by the terminal can be used as parameters for calculating the anonymous identity information, for example, the anonymous identity information can be calculated through the above formula 7). The first token parameter is also calculated based on the real identity. In one embodiment, the first token parameter can be calculated based on the real identity of the terminal, the public parameters of the authentication token, and the validity period corresponding to the public parameters of the authentication token. , for example, the hash operation can be performed on the real identity, public paramete...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a satellite network terminal security access authentication method, device and system. After the terminal has successfully registered with the security management and control center, if it needs to access the satellite network, it generates access authentication request information and sends the access authentication request The information is sent to the Satcom base station; the access authentication request information includes at least: anonymous identity information, the first token parameter and the second token verification parameter, the anonymous identity information and the first token parameter are generated according to the real identity of the terminal , the second token verification parameter is generated according to the second token parameter and related authentication request parameters. The Satcom base station can verify the authentication request information according to the preset relationship between the second token verification parameter and the first token parameter. If the verification is passed, an authentication response message is generated and sent to the corresponding terminal for verification. Therefore, the main access authentication calculation is moved forward to the Satcom base station, which effectively reduces the authentication transmission delay and improves the access authentication performance.

Description

technical field [0001] The invention relates to the field of satellite communication, in particular to a satellite network terminal security access authentication method, device and system. Background technique [0002] With the development of communication technology, the application of satellite communication is more and more extensive, and the terminal needs to perform access authentication before accessing the satellite network for communication. [0003] In the existing technology, the following two methods are usually used for access authentication. The first method is central authentication, that is, access authentication is performed through the security control center. In this method, the terminal needs to pass the authentication request information through the satellite communication base station and satellite Transmission to the security management and control center, therefore, the data transmission of method 1 is complicated, and it is easy to cause a large auth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04W12/06H04B7/185H04W84/06
CPCH04L9/3213H04B7/18593H04W12/06H04L2209/42H04W84/06H04L2209/80
Inventor 许晋王丽敏裴玉奎殷柳国
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products