Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secret key processing method for switching between different mobile access systems

A processing method and access system technology, applied in the field of mobile communications, can solve problems such as increased handover delay, unresolved key processing issues, and impact on user service continuity, and achieve the effect of improving configuration management efficiency

Active Publication Date: 2012-07-04
王萍
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0019] The 3GPP SA3#47 meeting proposed that when switching between EUTRAN and non-3GPP IP access networks, if the authentication process is performed again, the switching delay will be increased, which will affect the continuity of user services
[0020] At present, the problem of key handling when switching between different networks such as EUTRAN and non-3GPP IP access networks has not been solved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret key processing method for switching between different mobile access systems
  • Secret key processing method for switching between different mobile access systems
  • Secret key processing method for switching between different mobile access systems

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0044] Example 1: UE handover from EUTRAN to non-3GPP IP access network

[0045] like Figure 4 In this case, the following processing is included:

[0046] Step S402 (step 1), the UE reports its non-3GPP IP access network access capability information after attaching through EUTRAN;

[0047] Step S404 (step 2), if the UE supports non-3GPP IP access network access, then after the authentication is successful, the HSS and the UE use the key derivation function and the access security management entity key (K ASME ), respectively derive the master key (MK) required by the non-3GPP IP access network; wherein, when the UE supports non-3GPP IP access network access, and the UE is a non-3GPP IP access network subscriber, derive the non-3GPP IP access network The MK required by the 3GPP IP access network;

[0048] Step S406 (step 3), the HSS sends the MK to the 3GPP authentication, authorization and accounting server (3GPP AAA Server), and the UE and the 3GPP AAA Server use the MK...

example 2

[0064] Example 2: UE handover from non-3GPP IP access network to EUTRAN

[0065] like Image 6 In this case, the following processing is included:

[0066] Step S602 (step 1), the UE reports its own EUTRAN access capability information after initializing access through the non-3GPP IP access network;

[0067] Step S604 (step 2), if the UE supports EUTRAN access, after the authentication is successful, the HSS and the UE use the key derivation function and the master key (MK) and public land mobile network identity (PLMN) generated during the authentication process, respectively K needed to export EUTRAN ASME ; Among them, only when the UE supports EUTRAN access and the UE is a EUTRAN subscriber, the K required by EUTRAN is derived ASME ;

[0068] Step S606 (step 3), the HSS sends K ASME Sent to MME, when UE and MME switch to EUTRAN, use K ASME ; Specifically, the UE initiates an attach request to the MME, which includes deriving the K ASME information; the MME requests ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a secret key treatment method when switched between different mobile access systems, wherein before the switch over from an Evolved UMTS Terrestrial Radio Access Network (EUTERAN) to a non-3GPP IP access network and / or from the non-3GPP IP access network to the EUTERAN, a user equipment and an Evolved Packet System (EPS) core network use a current secret key and the same secret key indicator functions to guide a new secret key for use after the switch over, wherein an entity of the new secret key guided by the EPS core network is an attribution user register. Though above scheme, when the UE is switched between different access networks (such as EUTRAN and the non-3GPP IP access network), the invention can effectively treat the secret key and thus ensure the successful switch over operation.

Description

technical field [0001] The invention relates to the technical field of mobile communication, in particular to a key processing method when switching between different mobile access systems. Background technique [0002] like figure 1 As shown, in the 3GPP evolved packet system (EPS, Evolved Packet System), the access network is the evolved UTRAN (EUTRAN, Evolved UMTS Terrestrial Radio Access Network, UMTS Terrestrial Radio Access Network), EPS The core network consists of Mobility Management Entity (MME, Mobility Management Entity), Serving Gateway (S-GW, Serving Gateway), Packet Data Network Gateway (PDN GW, Packet Data Network), Home Subscriber Server (HSS, Home Subscriber Server), 3GPP Authentication, authorization and accounting server (3GPP AAA Server), and other supporting nodes. [0003] Among them, the MME is responsible for mobility management, processing of non-access stratum signaling, management of user mobility management context, management of Long Term Evolv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04L9/32H04W8/04H04W12/0433H04W12/08
Inventor 甘露朱戈
Owner 王萍
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products