Method and system for implementing synchronous binding of safe secret keys
A technology for security keys and keys, applied in the field of security authentication, can solve the problems of inability to ensure the data security of RN and network communication, and inability to realize user authentication and device binding of the RN, and achieve the effect of protecting security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0055] Figure 4 The flow chart of the method for realizing the synchronous binding of security keys in the present invention includes the following steps:
[0056] Step 400: MME notifies RN to perform security key binding.
[0057] In this step, the MME may send a NAS message to the RN to notify the RN to bind the security key. Wherein, the NAS message can reuse the existing NAS message, such as the NAS security mode command (NAS SMC, NAS Security Mode Command) message, or the user authentication request (User Authentication Request) message, etc.; the NAS message can also be a new message, For example, a key binding request message.
[0058] If the RN and the network side agree that after the NAS message used to notify the RN to bind the security key, the security key binding process must be performed, then the NAS message in this step does not need to carry any information, it is a notification Instruction, that is, the RN and the network use an implicit method to bind t...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com