Key processing method, device and equipment in fail soft scene and storage medium

A technology of fault weakening and processing methods, applied in the field of communication, can solve problems such as counterfeiting and low security, and achieve the effect of improving security and reducing risks

Pending Publication Date: 2022-06-21
TD TECH COMM TECH LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides a key processing method, device, device and storage medium in a fault weakening scenario to solve the problem of counterfeiting risk and low security in the prior art due to the empty algorithm carried in the process of initial security activation of the base station question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key processing method, device and equipment in fail soft scene and storage medium
  • Key processing method, device and equipment in fail soft scene and storage medium
  • Key processing method, device and equipment in fail soft scene and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be described clearly and completely below with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of the present application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by those of ordinary skill in the art without creative work fall within the protection scope of this application.

[0066] Before introducing the embodiments of the present application, the background of the present application is explained first.

[0067] With the rapid development of mobile Internet, trunking communication has been widely used in all walks of life, and is gradually entering the era of a new generation of broadband multimedia trunking syste...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a key processing method, device and equipment in a fail soft scene and a storage medium, and the method comprises the steps: receiving an RRC connection establishment completion message sent by UE in the fail soft scene; and then, according to an encryption and integrity protection key generated by the ASU MME according to the stored basic key of the UE, an initial security activation process is carried out, and an initial context is established for the UE. Wireless capability information of the UE is then obtained and a security mode command is sent to the UE. And finally, receiving a security mode completion message returned by the UE, and completing the attachment of the UE. In the method, the base station receives the RRC connection establishment completion message carrying the NAS message sent by the UE, thereby realizing the attachment to the UE, reducing the risk of being counterfeited in the initialization security activation process, and improving the security.

Description

technical field [0001] The present application relates to the field of communication technologies, and in particular, to a key processing method, apparatus, device and storage medium in a fault weakening scenario. Background technique [0002] The fault weakening scenario means that in the Long Term Evolution (LTE) Broadband Trunking Communication (BTrunC) system network, when the communication between the base station and the core network is interrupted, or the core network fails, the base station can Handles the registration and service requests of users within the coverage area of ​​the base station, and supports scenarios such as single call and group call. [0003] In the prior art, the implementation of the fault mitigation scenario mainly involves establishing a connection between a base station and a user equipment (User Equipment, UE) and performing initial security activation, and then performing cluster registration on the user. [0004] However, in the prior art...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/03H04W12/041H04W12/06H04W12/106H04W24/04H04W76/19
CPCH04W12/06H04W24/04H04W76/19
Inventor 刘胜国
Owner TD TECH COMM TECH LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products