Method for negotiating key share between user and peripheral apparatus

A peripheral device and shared key technology, applied in key distribution, can solve problems such as encrypted transmission, difficult information, impossible shared key of peripheral devices, etc., and achieve the effect of preventing tampering or stealing

Active Publication Date: 2007-03-14
HUAWEI TECH CO LTD
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is no better way to protect this information at present, because it is impossible to pre-save and store all peripheral information in the UE because the user cannot predict which devices will access the UE when purchasing a UI

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for negotiating key share between user and peripheral apparatus
  • Method for negotiating key share between user and peripheral apparatus
  • Method for negotiating key share between user and peripheral apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] Referring to FIG. 4 below, the flow chart of the first embodiment of the present invention using GAA to realize the key negotiation between the UE and the peripheral device, wherein, the NAF is used as the key server to negotiate the local interface shared key Ks_Local between the UE and the peripheral device, And the local interface shared key Ks_Local is distributed to peripheral devices by NAF. Among them, when the NAF communicates with the peripheral device, the public key / symmetric key of the peripheral device can be used for integrity and digital signature protection, and the secret data sent by the NAF to the peripheral device can be protected by a random key generated by the NAF, while The transmission of the random key needs to be encrypted and protected with the public key / symmetric key of the peripheral device.

[0065] In this embodiment, the shown UE and the peripheral device belong to the same user. Taking the use of UICC on the UE as an example, the prese...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention relates to user UE and outside negotiation common key method, which comprises the following steps: a, outside device sends connection demands to UE portable with outside device label; b, UE tests valid part BSF common keys, outside device to compute first local interface common key according to UE and executive deification; c, by network side and according to UE and BSF common key getting said outside label to compute second local interface common key with first local interface to provide outside devices.

Description

technical field [0001] The invention relates to the technical field of 3GPP general authentication framework (GAA), in particular to a method for negotiating a shared key between a user (UE) and a peripheral device. Background technique [0002] In the third-generation wireless communication standard, the general authentication framework (GAA) is a general structure used by various application service entities to complete the verification of user identities. Check and verify identity. The various application services mentioned above may be multicast or broadcast services, user certificate services, instant information provision services, etc., or proxy services. [0003] Figure 1 shows the structure of the general authentication framework. The general authentication framework is usually composed of the user (UE), the entity (BSF) that performs the initial check and verification of the user identity, the user home network server (HSS) and the network service application ent...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08
CPCH04L2209/80H04L63/0853H04L9/0844H04L63/062H04L2209/56H04W12/04H04L9/3273H04W12/43H04W12/0431
Inventor 杨艳梅
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products