Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety ability negotiation method in super mobile broadband system

A technology of mobile broadband and security capabilities, applied in transmission systems and key distribution, can solve problems such as difficult to meet, lack of security capabilities, lack of choice flexibility, and multiple algorithm configuration capabilities, and achieve the effect of maintaining integrity

Inactive Publication Date: 2010-06-16
ZTE CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, currently in the UMB system specification, only an AES encryption protocol based on the AES (Advanced Encryption Standard, Advanced Encryption Standard) block encryption algorithm and an AES CMAC (Cipher-based Message Authentication Code, based on ciphertext) message are defined for this purpose. authentication code) function integrity protection protocol, but the lack of a security capability negotiation process makes the encryption algorithm and integrity protection algorithm currently used by AT and eBS the only choice for the system, so it is difficult to meet the password management regulations of different regions or countries needs, lack of flexibility in selection and ability to configure multiple algorithms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety ability negotiation method in super mobile broadband system
  • Safety ability negotiation method in super mobile broadband system
  • Safety ability negotiation method in super mobile broadband system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The idea of ​​the present invention is as follows: when the terminal AT initially accesses the network and completes the establishment of the UMB session with the session reference controller SRNC, the SRNC sends an identity request message to the AT to trigger the authentication process; or the SRNC detects that this The lifetime of the master session key has expired, and the SRNC sends an identity request message to the AT, triggering a new authentication process; or when the access gateway is switched, the new SRNC will send an identity request message to the AT, triggering a new authentication process process. During the authentication process, through the home authentication center HAAA, complete the security capability negotiation between the AT and the SRNC, the AT and the evolved base station eBS, and select a set of encryption algorithms and integrity protection algorithms that are jointly supported according to a certain strategy, and securely 1. Sending the s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safety ability negotiation method in the ultra mobile broadband system which comprises that: 1) after a terminal AT receives an identity request message, the terminal AT triggers an authentication process and finishes the safety ability negotiation between the AT and an SRNC, between the AT and eBS through an HAAA, a group of encryption algorithm and integrity protectionalgorithm which are commonly supported are selected, and a selected algorithm identifier is assigned to the SRNC, the eBS and the AT; 2) according to the confirmed encryption algorithm and integrity protection algorithm as well as an encryption key and an integrity key which are produced during the key exchange , the AT and the eBS make integrity protection to a subsequent sent signaling message and encrypts a subsequent sent sensitive message, and a receiving party makes integrity check and encryption to the received messages. The invention can achieve the encryption algorithm and the integrity protection algorithm used between the terminal and the access network, and furthest maintains the integrity of the main content of the prior specification.

Description

technical field [0001] The invention relates to the technical field of fusion of mobile communication technology and information security technology, in particular to a method for negotiating security capabilities in a UMB (Ultra Mobile Broadband, Ultra Mobile Broadband) system. Background technique [0002] As one of the new-generation mobile communication systems currently under development, UMB protects the air interface between the terminal AT (Access Terminal) and the evolved base station eBS (Evolved Base Station), and between the AT and the session reference controller SRNC (Session Reference Controller). Such as figure 1 As shown, it is a schematic diagram of the main parts of the UMB system, including AT 100, eBS 101 and 102, SRNC 103, home authentication center HAAA (Home Authentication Authorization Accounting) 104, etc., wherein the connections between entities except AT 100 are wired connections, Indicated by a thicker solid line. It is assumed that a wireles...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06
Inventor 彭志威张万帅陈刚徐子华
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products