Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for key generation during handover

A technology for handover process and key generation, which is applied in electrical components, security devices, wireless communications, etc., can solve problems such as hidden dangers of communication system security, improve security, and avoid illegally obtaining the key KeNB of the next hop. Possibilities, Effects of Guaranteed Forward Safety

Inactive Publication Date: 2018-03-30
ZTE CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The source eNB can derive the key KeNB when the next hop of the UE changes, which may be used, thus causing security risks to the communication system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for key generation during handover
  • Method and system for key generation during handover
  • Method and system for key generation during handover

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The basic idea of ​​the present invention is: during the X2 handover process, the source eNB no longer derives the next hop key for the target eNB, and the source eNB only provides the next hop counter NCC value for the target eNB. The target eNB uses the NCC value to keep the NHs in the UE and MME entities synchronized, so that the same KeNB is saved in the UE and the MME. The target eNB uses the NCC value to apply to the MME for the same KeNB as the UE, so as to keep its own KeNB consistent with the UE's KeNB. During the handover process, the NH no longer leaves the MME, the eNB cannot obtain the NH, and the eNB has no ability to deduce the NH (the calculation of the NH must have Kasme), so the source eNB cannot obtain the KeNB of the target eNB in ​​the next hop transition, which solves the forward security question.

[0057] In order to make the purpose, technical solutions and advantages of the present invention more clear, the following examples are given and the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a key generation method and system in the handover process. The method includes: in the UE handover process, the network side uses the next hop parameter NH to generate the next hop key KeNB; wherein, the network side The generated NH does not notify the base station; the network side and the UE side respectively use the next hop counter NCC value notified by the target base station to synchronize the next hop key KeNB; the network side uses the generated next hop The changed key KeNB notifies the target base station. Since the base station cannot obtain the NH, it cannot generate the next-hop key KeNB, which avoids the possibility of illegally obtaining the next-hop key KeNB and ensures forward security. The invention greatly improves the security of the communication system.

Description

technical field [0001] The invention relates to key generation technology, in particular to a method and system for key generation during handover. Background technique [0002] The Evolved Packet System (EPS, Evolved Packet System) of the 3rd Generation Partnership Project (3GPP, 3rd Generation Partnership Project) is composed of the Evolved Universal Terrestrial Radio Access Network (E-UTRAN, Evolved Universal Terrestrial Radio Access Network) and the EPS core network (Evolved Packet Core) composition. E-UTRAN is composed of base station equipment-evolved Node B (eNB, Evolved Node B) and core network equipment-mobility management entity (MME, Mobility Management Entity). A user equipment (UE, User Equipment) communicates with an eNB through a wireless air interface, and communicates with an MME through the eNB. [0003] In the communication protocol architecture of the Long Term Evolution (LTE, Long Term Evolution) system, the protocol layer is divided into an access str...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W92/12H04W92/20H04W12/041H04W12/106
CPCH04W36/0038H04W12/041
Inventor 曹岚健余万涛
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products