Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for authenticating users

A legality and user technology, applied in the direction of user identity/authority verification, wireless communication, digital transmission system, etc., can solve the problems of not specifying the composition of TID, increasing user key theft, and unable to manage TID, so as to reduce the number of keys Possibility of theft, effect of increasing security

Active Publication Date: 2007-05-09
SNAPTRACK
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0018] The defect of the existing technical solution is that the TID assigned to the user by the BSF is only used as a bridge for establishing a trust relationship between the NAF and the user, but does not stipulate how the TID should be composed and which information should be associated with it. At the same time, the NAF cannot manage the TID
Moreover, as long as the user obtains a legal TID once, he can use the TID to communicate with NAF indefinitely, which reduces the security of the system and increases the possibility of the user key being stolen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for authenticating users
  • Method for authenticating users
  • Method for authenticating users

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] The BSF assigns a TID valid for more than one NAF to the user at the same time, and does not encrypt the TID.

[0061] FIG. 3 is a flow chart of verifying user legitimacy according to Embodiment 1 of the present invention.

[0062] Step 301, the user sends a service application request message to the NAF;

[0063] Step 302, after receiving the message, the NAF notifies the user to go to the BSF for initial authentication;

[0064] Step 303, the user sends an authentication request message to the BSF;

[0065] Step 304, after receiving the user's authentication request message, the BSF queries the HSS for the user's authentication information and Profile;

[0066] Step 305: After receiving the response message sent by the HSS that contains the searched information, the BSF uses the found information to perform AKA mutual authentication with the user. The user and the user have a shared key Ks;

[0067] Step 306, the BSF assigns a TID including only the identification...

Embodiment 2

[0079] The BSF allocates a TID valid only for a certain NAF to the user, and the TID is encrypted. The method of assigning a TID to a user that is valid only for a certain NAF has been described in detail in the invention patent titled "A Method for Allocating Conversational Transaction Identifiers" submitted by the applicant on the same day;

[0080] FIG. 4 is a flow chart of verifying user legitimacy according to Embodiment 2 of the present invention.

[0081] Step 401, the user sends a service application request message to the NAF;

[0082] Step 402, after receiving the message, the NAF notifies the user to go to the BSF for initial authentication;

[0083] Step 403, the user sends an authentication request message to the BSF;

[0084] Step 404, after receiving the user's authentication request message, the BSF queries the HSS for the user's authentication information and Profile;

[0085] Step 405, after the BSF receives the response message sent by the HSS that contai...

Embodiment 3

[0096] The BSF allocates a TID valid only for a certain NAF to the user, and does not encrypt the TID.

[0097] FIG. 5 is a flow chart of verifying user legitimacy according to Embodiment 3 of the present invention.

[0098] Step 501, the user sends a service application request message to the NAF;

[0099] Step 502, after receiving the message, the NAF notifies the user to go to the BSF for initial authentication;

[0100] Step 503, the user sends an authentication request message to the BSF;

[0101] Step 504, after receiving the user's authentication request message, the BSF queries the HSS for the user's authentication information and Profile;

[0102] Step 505, after the BSF receives the response message sent by the HSS containing the searched information, it uses the found information to perform AKA mutual authentication with the user. The user and the user have a shared key Ks;

[0103] In step 506, the BSF allocates an identification number valid only for a certain...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method includes following steps: TID is used to be as the trust relation bridge between NAF and user; BSF allots period of validity for TID to increase the function of TID; in this way NAF can check the period of validity for TID used by subscriber to identify the user validation. The invention avoids one TID is permanently validity for NAV and reduces dangerous due to stealing of TID or relevant cipher key.

Description

technical field [0001] The invention relates to the technical field of third-generation wireless communication, in particular to a method for verifying user legitimacy. Background technique [0002] In the third-generation wireless communication standard, the general authentication framework is a general structure used by various application business entities to complete the verification of user identities. The application of the general authentication framework can realize the inspection and verification of users of application services identity. The various application services mentioned above can be multicast / broadcast services, user certificate services, instant information provision services, etc., or agency services, such as multiple services connected to an agent. This general authentication framework treats agents as a kind of The organizational structure can be very flexible, and the general authentication framework can also be applied to the newly developed busine...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04B7/00H04L9/32H04L9/08H04L29/06H04W12/06H04W12/12
CPCH04L63/0869H04L9/0844H04W12/12H04W12/06H04W12/126
Inventor 黄迎新
Owner SNAPTRACK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products