Safety ability negotiation method in super mobile broadband system
A technology of mobile broadband and security capabilities, applied in transmission systems and key distribution, can solve problems such as difficult to meet, lack of security capabilities, lack of choice flexibility, and multiple algorithm configuration capabilities, and achieve the effect of maintaining integrity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0024] The idea of the present invention is as follows: when the terminal AT initially accesses the network and completes the establishment of the UMB session with the session reference controller SRNC, the SRNC sends an identity request message to the AT to trigger the authentication process; or the SRNC detects that this The lifetime of the master session key has expired, and the SRNC sends an identity request message to the AT, triggering a new authentication process; or when the access gateway is switched, the new SRNC will send an identity request message to the AT, triggering a new authentication process process. During the authentication process, through the home authentication center HAAA, complete the security capability negotiation between the AT and the SRNC, the AT and the evolved base station eBS, and select a set of encryption algorithms and integrity protection algorithms that are jointly supported according to a certain strategy, and securely 1. Sending the s...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com