Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Management method and system of vent key

A technology of air interface keys and management methods, applied in security devices, electrical components, wireless communications, etc.

Inactive Publication Date: 2010-06-16
ZTE CORP
View PDF3 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, in the current 3GPP standard, none of the prior art supports K ASMEU 、CK U and IK U The generation and distribution method of

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Management method and system of vent key
  • Management method and system of vent key
  • Management method and system of vent key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0093] This embodiment describes an example in which the user equipment and the base station distribute the air interface key through the key distribution process. In this embodiment, after the SGSN+ or MSC / VLR+ generates the air interface key, it distributes the key to the Node B+. The specific process is as follows: image 3 Shown:

[0094] Step 301, SGSN+ or MSC / VLR+ calculates the intermediate key K according to the encryption key CK and integrity key IK received from the HSS ASMEU .

[0095] Optionally, this step also includes: SGSN+ or MSC / VLR+ decides the allowed encryption algorithm set and / or integrity algorithm set. The encryption algorithm set and / or the integrity algorithm set used by the SGSN+ or MSC / VLR+ may be a predetermined algorithm or a re-determined algorithm.

[0096] where the K ASMEU The generation parameters of can also include one or more of the following parameters:

[0097] Random number NONCE generated by SGSN+ or MSC / VLR+, service network ident...

Embodiment 2

[0125] This embodiment describes another example in which the user equipment and the base station distribute the air interface key through the key distribution process, such as Figure 4 shown. The difference between this embodiment and Embodiment 1 is that the encryption key CK of HSPA+ U and integrity key IK U Generated at Node B+. At this time, SGSN+ or MSC / VLR+ needs to set K ASMEU Sent to Node B+ in a key distribution message. If K ASMEU The generation parameters of the parameter include the random number NONCE, and the NONCE is generated by SGSN+ or MSC / VLR+, and needs to be delivered to Node B+ along with the key distribution message. If CK U / IK U The generation parameters of the parameter include the random number NONCE, and the NONCE is generated by Node B+, and needs to be sent to the user equipment along with the key distribution message.

[0126] Step 401, SGSN+ or MSC / VLR+ calculates K according to the encryption key CK and integrity key IK received from ...

Embodiment 3

[0152] This example illustrates the calculation of K from IK and CK ASMEU An example of . K ASMEU In addition to IK and CK, the generation parameters include one of the following or any combination thereof: random number NONCE generated by SGSN+ or MSC / VLR+ or Node B+, service network identifier (SN ID), serial number SQN, hidden key AK , authentication management field AMF, user identity (such as IMSI, IMEI, TMSI), encryption algorithm identifier enc-int-ID, integrity algorithm identifier int-alg-ID, re-entry counter COUNTER.

[0153] K ASMEU = F1(CK, IK, NONCE);

[0154] or K ASMEU = F1(CK, IK, SN ID);

[0155] or K ASMEU =F1(CK, IK, SN ID, SQN, AK);

[0156] or K ASMEU =F1(CK, IK, SN ID, SQN);

[0157] or K ASMEU = F1(CK, IK, SN ID, AK);

[0158] or K ASMEU = F1(CK, IK, SQN, AK);

[0159] or K ASMEU = F1(CK, IK, SQN, AK);

[0160] or K ASMEU = F1(CK, IK, COUNTER).

[0161] where the K ASMEU The generated parameter COUNTER is the number of re-entry times, w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides management method and system of a vent key, relating to the field of communication. The method comprises the following steps of: sending a key distributing message to a Node B+ by an service GPRS supporting node (SGSN+) or an mobile services switching center with visitor location register (MSC / VLR+), and carrying at least one of a middle key KASMEU, or an encrypt key CKU and a complete key IKU.

Description

technical field [0001] The present invention relates to the communication field, in particular to an air interface key management method and system. Background technique [0002] 3GPP (3rd Generation Partnership Project, Third Generation Partnership Project) adopted OFDM and MIMO technology in Release7 to complete HSDPA (High Speed ​​Downlink Packet Access, high-speed downlink packet access) and HSUPA (High Speed ​​Uplink Packet Access, high-speed uplink HSPA+ is the future evolution of HSPA+. HSPA+ is an enhanced technology of 3GPPHSPA (including HSDPA and HSUPA), which provides HSPA operators with a low-complexity and low-cost smooth evolution path from HSPA to LTE. [0003] HSPA+ improves the peak data rate and spectrum efficiency by adopting technologies such as high-order modulation (downlink 64QAM, uplink 16QAM), MIMO, and the combination of high-order modulation and MIMO. On the other hand, in order to better support packet services, HSPA+ also adopts a series of ot...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W92/10H04W12/0431
CPCH04W92/10H04W12/04H04W12/041H04W12/0431
Inventor 冯成燕甘露
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products