Cipher key updating method of universal leading frame

An update method and general guidance technology, applied in key distribution, can solve the problem of inconsistent key identifiers, and achieve the effect of a simple and effective generation method

Inactive Publication Date: 2007-09-26
HUAWEI TECH CO LTD
View PDF0 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0028] In view of this, the main purpose of the present invention is to provide a key update method in the general guidance framework, to solve the problem in the prior art that the key identifiers used by the ordinary GBA process and the Ks_(ext)_NAF update process are not uniform

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cipher key updating method of universal leading frame
  • Cipher key updating method of universal leading frame
  • Cipher key updating method of universal leading frame

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] In the GBA specification, B-TID is generated by BSF. B-TID generation includes the following two forms, base64encode(AKA_Challenge)@BSF_servers_domain_name and base64encode(RAND)@BSF_servers_domain_name, where AKA_Challenge is a random number generated by BSF, and RAND is AKA Random number in the authentication vector generated by HSS in (Authentication and Key Agreement, authentication and key agreement). The above-mentioned first form is used for a flow based on CAVE (Cellular Authentication and Voice Encryption, cellular authentication and voice encryption protocol) or MN-AAA, and the second is used for a flow based on AKA. Although there are some differences, they are all composed of "base64 encoded random number" concatenated with "@" concatenated with "BSF domain name".

[0064] The generation method in the prior art of B-TID has been analyzed above. In the present invention, when generating a new Ks_(ext)_NAF, a new B-TID is generated at the same time, so that th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a refresh method of general guided framework key, MN and BSF store the common Ks, MN and NAF store the common derivative key Ks_(ext)_NAF and the relative key mark B-TID, when MN uses the new business of original NAF or accesses the new NAF, includes: MN starts the communication with the NAF, changes the key derivative parameters with the NAF; MN and NAF generate the new Ks_(ext)_NAF according to the Ks, key derivative parameters, NAF identifier, and MN identifier; and generate the new B-TID to mark the new Ks_(ext)_NAF; NAF and MN uses the new Ks_(ext)_NAF to protect the following data communication. Using the invention, it solves the skimble-scamble problems of key identifier existed in the general GBA flow and the refresh flow of Ks_(ext)_NAF.

Description

technical field [0001] The invention relates to the technical field of the general guidance framework (GBA) in the third generation wireless communication standard, in particular to a key update method in the general guidance framework. Background technique [0002] In the third-generation wireless communication standard, the General Authentication Framework (GAA) is a general structure used by various application business entities to complete the verification of user identities. The application of the General Authentication Framework can realize the communication between entities providing services and users. identity mutual authentication. The various application services mentioned above may be multicast or broadcast services, user certificate services, instant information provision services, etc., or proxy services. Generic Bootstrapping Framework (GBA) is a pre-shared key based authentication method in GAA. [0003] Figure 1 shows the structure of the general guide fra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 赵洁
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products