Unlock instant, AI-driven research and patent intelligence for your innovation.

Cryptographic key distribution method and system in mobile communication system

A mobile communication system and key distribution technology, applied in the field of key distribution, can solve the problems of wasting time and air interface resources, and achieve the effect of saving air interface resources and reducing the required time

Active Publication Date: 2010-05-26
HUAWEI TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0025] The present invention proposes a key distribution method and system in a mobile communication system, which solves the problem of wasting time and air interface resources in the process of service authorization

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cryptographic key distribution method and system in mobile communication system
  • Cryptographic key distribution method and system in mobile communication system
  • Cryptographic key distribution method and system in mobile communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] In order to make the object, technical solution and advantages of the present invention clearer, the specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0060] refer to image 3 , introduces the first embodiment of the present invention, and proposes a key distribution method in a mobile communication system, which is applied when the HA is located in a visited network. In this embodiment, the shared key MN-HA-Key between the MN and the HA is generated by the HAAA server during the MN access authentication, and the specific method steps are as follows:

[0061] Step 301: the MN sends an access authentication request message to the AAA server.

[0062] Step 302: The AAA server authenticates the MN. When the authentication is successful, the HAAA server generates a random number Nonce, and generates MN-HA-Key1 according to the Nonce, and the HAAA server sends an authentication...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a key distribution method in the mobile communication system which comprises that: a home network is authenticated and authorized, a charging HAAA server generates a first key,the first key is sent to a visiting network for authentication and authorization, and a charging VAAA server is arranged. A mobile node MN interacts with a home agent HA, the HA requests the VAAA server to authenticate and assign a second key; the VAAA server authenticates and assigns the second key to the HA, the HA obtains the second key and then establishes a security mechanism with the MN. Theinvention also provides a mobile communication system. The invention reduces the time needed by MIPv6 service authorization. When the IPSec SA is used to protect the BU / BA message, the invention canreduce the time that the MN visits the home network, does not need a plurality of EAP process service authorizations during the key distribution, and saves the finite air interface resource of the wireless network.

Description

technical field [0001] The invention relates to the field of mobile communication, in particular to a key distribution technology in a mobile communication system. Background technique [0002] Mobile IP (Mobile Internet Protocol, MIP) is a solution to provide mobile functions on IP networks. The original intention of this protocol is to provide host mobility at the network layer, so that the movement of hosts on the IP network remains transparent to higher-level protocols. MIP is used by the third generation communication (3 rd Generation, 3G) standard technology framework, and has been promoted along with the deployment of 3G networks. [0003] From Internet Protocol Version 4 (Internbet Protocol Version 4, IPv4) to Internet Protocol Version 6 (Internet Protocol Version 6, IPv6), MIP technology itself has undergone tremendous development and solved many problems. Compared with IPv4, the new features of IPv6 protocol, such as "address automatic configuration" and "neighb...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W12/06H04W80/04H04W12/041H04W12/0431
Inventor 邹国辉夏斌
Owner HUAWEI TECH CO LTD