Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An organization structure and maintenance method of security context in media accessing control system

A medium access control, context technology, applied in security devices, key distribution

Active Publication Date: 2012-03-21
INST OF COMPUTING TECH CHINESE ACAD OF SCI
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the IEEE802.16e standard clearly defines the process for terminals to initiate authentication authorization requests and communication encryption key requests, it does not provide a method for organizing and maintaining security contexts in this process. Therefore, it is necessary to provide an efficient organization and maintenance of security contexts. maintenance method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An organization structure and maintenance method of security context in media accessing control system
  • An organization structure and maintenance method of security context in media accessing control system
  • An organization structure and maintenance method of security context in media accessing control system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0126] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0127] The security context corresponding to the terminal is divided into the authorization key (AK) context and the communication encryption key (TEK) context. The key context includes key value, key serial number, key life cycle and other information.

[0128] As an implementable manner, the organizational structure of the security context in the media access control system of the present invention includes:

[0129] A hash table of Connection IDs (CIDs) used to manage authorization key contexts.

[0130] Preferably, the connection identifier (CID) hash table is indexed by the main management connection identifier of the terminal, and its entry points to a queue composed of authorized key context nodes (AkNode), and the authorized key context node (AkNode ) to save the authorization key context, including the following information:...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safe context organizing structure and a maintaining method in broadband wireless metropolitan area network base station medium accessed to a control system. The organizing structure comprises a connection identifiers hashtable which is used for managing the context of authorization keys and a safety association identifying hashtable which is used for managing the context of communication secret keys. The maintaining method operates on the connection identifiers hashtable and the safety association identifying hashtable respectively when can authenticate the expandable authentication agreement to terminals, when in the process of safety association-communication encryption secret key shaking hands and when terminals distributes secret keys and create service flow. The invention can realize the organization and maintenance of safety context and high-speed searching. When terminals are in large number and the data amount is large, the maintaining efficiency of data can be improved to a large extent.

Description

technical field [0001] The invention relates to wireless communication technology, in particular to an organizational structure and maintenance method of a security context (Security Context) in a base station media access control system of a broadband wireless metropolitan area network. Background technique [0002] The broadband wireless metropolitan area network is a broadband network that can provide high-speed wireless access within the metropolitan area. From Document 1 "Part 16: Air Interface for Fixed and Mobile Broadband WirelessAccess Systems, IEEE Std 802.16e TM -2005", it can be seen that the authentication and authorization process in the media access control system of the base station implements the IEEE 802.16e TM - Part of the functions of the Security Sublayer in the 2005 standard, including: base station authentication and authorization of terminals, base station distribution of communication encryption keys for terminals, and security-related operations ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04W12/04H04W12/0433
Inventor 周俊庞迪胡金龙周继华石晶林
Owner INST OF COMPUTING TECH CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products