Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for confirming identification using key when user accessing identification proxy

A technology of access authentication and key, which is applied to the public key and key distribution of secure communication, which can solve the problems of non-compliance with AS's authentication security, key non-compliance, and key non-compliance.

Inactive Publication Date: 2007-03-14
HUAWEI TECH CO LTD
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the key used for the above authentication between the AP and the UE is not specified.
Different ASs may require different keys for authentication, which may cause the keys required by different ASs for authentication to be inconsistent with the keys used in actual authentication between the AP and the UE.
As a result, the key used by the AP and the UE for authentication may not meet the authentication key required by the AS to be accessed, thus failing to meet the security requirements of the AS for authentication.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for confirming identification using key when user accessing identification proxy
  • Method and system for confirming identification using key when user accessing identification proxy
  • Method and system for confirming identification using key when user accessing identification proxy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In advance, the AP configures the requirements for the type of keys required for authentication for each associated AS, and the configuration information can be configured in the authentication requirement information configured by the AP for the AS. This configuration information is used to specify the requirements of the AS for the key type required for authentication, which can be one of Ks_NAF, Ks_ext_NAF, Ks_int_NAF; or a preferred type. During configuration, associate and save the AS authentication requirement information with the corresponding AS name. So that the AP can retrieve the corresponding authentication requirement information according to the AS name.

[0041] The key types required for authentication are configured for each AS as described above, which can also be configured in the BSF (configurable by the operator), and then sent to the AP after configuration.

[0042] After the above information is configured, when communicating between the AP and t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention relates to UE interface agent AP to determine key method, which comprises the following steps: a, UE sends identification demands to AP; the demands has UE interface AS label; b, AP finds recorded needed key type according to identification demands; c, AP determines needed GAA derivative keys according to needed key type. This invention provides one system for AP identification with UE interfaced.

Description

technical field [0001] The present invention relates to the technical field of 3GPP General Authentication Framework (GAA), in particular to a method and system for determining a key used for authentication when a UE accesses an AP. Background technique [0002] In the third-generation wireless communication standard, the general authentication framework (GAA) is a general structure used by various application service entities to complete the verification of user identities. Check and verify identity. The various application services mentioned above may be multicast / broadcast services, user certificate services, instant information provision services, etc., or proxy services. [0003] Figure 1 shows the structure of the general authentication framework. The general authentication framework is usually composed of the user (UE), the entity (BSF) that performs the initial check and verification of the user identity, the user home network server (HSS) and the network service a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/30
Inventor 杨艳梅
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products