Method, device and network system for secure algorithm negotiation

A security algorithm and algorithm technology, applied in the field of communication, can solve the problem of inability to negotiate a security algorithm

Active Publication Date: 2008-08-13
北京禾怡管理咨询有限公司
View PDF0 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the existing SAE/LTE system, security algorithms cannot be negotiated, namely

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and network system for secure algorithm negotiation
  • Method, device and network system for secure algorithm negotiation
  • Method, device and network system for secure algorithm negotiation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Embodiments of the present invention will be described in detail below with reference to the accompanying drawings.

[0031] refer to figure 2 , the security algorithm negotiation method provided by Embodiment 1 of the present invention includes:

[0032] Implement a middle layer 3 message. Taking the initial layer 3 message as an example, the initial layer 3 message is carried in the radio resource connection (Radio Resource Connection, RRC) request message, and the initial layer 3 response information is carried in the RRC setup message, and the MME selects the NAS Security algorithm, the eNodeB selects the AS security algorithm;

[0033] Step 201, the UE sends a radio resource connection RRC request message to the eNodeB, the request message includes: AS security capability and initial layer 3 message, the initial layer 3 message carries NAS security capability; wherein, the AS security capability is the AS that the UE can support Security algorithm information, t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security algorithm negotiation method, which is used in system architecture of evolution / long-term evolution system. The method includes: receiving security algorithm information supported by user terminals; selecting security algorithm based on mentioned security algorithm information; sending identifier of the mentioned security algorithm to the user terminal. Meanwhile, the invention also discloses device and network system for security algorithm negotiation. Security algorithm for non-access layer and access layer can be generated in the SAE/LTE system with the inventive scheme.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method, device and network system for negotiation of security algorithms. Background technique [0002] In the Universal Mobile Telecommunication System (UMTS), the radio network controller (Radio Network Controller, RNC) and the user terminal (User Equipment, UE) are required to perform encryption / decryption and integrity protection operations, that is, the The data provides confidentiality protection, and the signaling between UE and RNC provides confidentiality and integrity protection. Since the encryption / decryption and integrity algorithms supported by different UEs are different, the encryption / decryption algorithm and the integrity algorithm need to be negotiated before encryption / decryption and integrity protection. Since the UMTS system only needs to provide protection at the access (Access Stratum, AS) layer, the UMTS system negotiates encryption / decryption a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04Q7/38H04L9/32H04W12/0431
CPCH04L2209/80H04W12/04H04L9/00H04L63/06H04L63/205
Inventor 杨艳梅陈璟
Owner 北京禾怡管理咨询有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products