Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mutual authentication method and device

A mutual authentication and verified technology, applied in the field of mutual authentication, can solve the problems of inability to meet the individual needs of users, single point of failure, etc.

Pending Publication Date: 2022-03-15
HUAWEI TECH CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Existing communication networks are all centered on the network, and users adapt to the network, that is, users can only choose the functions provided by the network, especially the functions provided by the centralized core network are of large granularity, which cannot meet the individual needs of users
Existing centralized core network network element entities can generally handle a large number of users, and are deployed centrally. They have a relatively high status in the network and there is a risk of single point failure, such as mobility management, session management, user data management, Network elements such as policy management

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mutual authentication method and device
  • Mutual authentication method and device
  • Mutual authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The technical solution in this application will be described below with reference to the accompanying drawings.

[0041] The embodiments of the present application can be applied to various communication systems, such as a wireless local area network system (wireless local area network, WLAN), a narrowband Internet of Things system (narrow band-internet of things, NB-IoT), a global system for mobile communication (global system for mobile communications, GSM), enhanced data rate for gsm evolution (EDGE), wideband code division multiple access (WCDMA), code division multiple access 2000 (code division multiple access, CDMA2000 ), time division-synchronization code division multiple access (TD-SCDMA), long term evolution system (long term evolution, LTE), satellite communication, fifth generation (5th generation, 5G) system or will appear in the future new communication systems, etc.

[0042] The terminal devices involved in the embodiments of the present application may...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a mutual authentication method and device, which can avoid user information leakage. The method comprises: a DR sending a first message to a terminal device, the first message comprising a first DR public key, the first DR public key being a public key of the DR signed by using a private key of an attribution network; the DR encrypts a first random number by using a second terminal device public key, the first random number being generated by the DR, and the second terminal device public key being a public key of the terminal device verified by using a public key of an attribution network; the DR sends a second message to the terminal device, wherein the second message comprises a first random number encrypted by using a public key of a second terminal device; the DR receives a second response message sent by the terminal equipment, the second response message comprises a first random number encrypted by using a second DR public key, and the second DR public key is the public key of the DR obtained after the first DR public key is verified by using the public key of the home network; and the DR decrypts the encrypted first random number by using the private key of the DR to obtain the first random number.

Description

technical field [0001] The present application relates to the communication field, and more specifically, to a method and device for mutual authentication. Background technique [0002] Existing communication networks are all centered on the network, and users adapt to the network, that is, users can only choose the functions provided by the network, especially the functions provided by the centralized core network are of large granularity, which cannot meet the individual needs of users. Existing centralized core network network element entities can generally handle a large number of users, and are deployed centrally. They have a relatively high status in the network and there is a risk of single point failure, such as mobility management, session management, user data management, Network elements such as policy management. [0003] At present, the network architecture of user-centric network (UCN) is proposed, digital reflection (DR) is deployed on the edge cloud, each UE...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40H04L9/08H04L9/32
CPCH04L63/0869H04L63/0838H04L9/0825H04L9/0869H04L9/3228H04L63/00H04L2209/80H04L9/3247H04L9/3273H04L63/126H04L63/0823H04L63/062H04L63/0442H04W12/0431H04W12/069H04W12/108H04L9/30
Inventor 赵明宇严学强
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products