Unlock instant, AI-driven research and patent intelligence for your innovation.
An initialization setup method for secret key survival counter between different access systems
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A counter and initialization technology, applied in the field of mobile communication, can solve problems such as continuous accumulation of UE counters and extended key lifetime
Inactive Publication Date: 2012-09-05
XUZHOU NAILI MACROMOLECULE TECH CO LTD
View PDF0 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0008] In the prior art, when the cell is reselected between UTRAN and EUTRAN, UE counters are not continuously added to each other, but the initial value of the counter is directly set to 0, so that after TAU, the life cycle of the key does not include its parent The lifetime of the key, resulting in a security hole where the lifetime of the key is extended
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
no. 1 example
[0028] This embodiment is a method for initializing the counter when the UE moves from the UTRAN to the EUTRAN in an idle state and needs to perform cell reselection. Its signaling process is as follows figure 1 shown, including the following steps:
[0029] Step 101: UE to START -NAS To initialize the settings, make START -NAS =START, then use START -NAS to COUNT -NAS Perform initialization settings;
[0030] to COUNT -NAS During initial setup, about to START -NAS value as COUNT -NAS The value of the high-order significant bit of , can be expressed as MSB(COUNT -NAS ) = START -NAS , COUNT -NAS The rest of the bit positions are 0.
[0031] In this step, UE also needs to use IK and CK to generate K -ASME , K NAS-int and K NAS-enc , because this key needs to be used for integrity protection in subsequent TAU requests.
[0032] Step 102: The UE sends a TAU request to the target MME, and at the same time sends the START -NAS Send to the target MME;
[0033] Step...
no. 2 example
[0040] This embodiment is a method for initializing the counter when the UE moves from EUTRAN and UTRAN in an idle state and needs to perform TAU. like figure 2 shown, including the following steps:
[0041] Step 201: When the UE decides to reselect the cell to the UMTS network, use COUNT -NAS The value of initialize START and set START -NAS , coming to COUNT -NAS The value of the high-order significant bit (also known as the high-order effective value) plus 2 (here can also add other integers not less than 1) and assign it to START -NAS , which can be expressed as START -NAS = MSB 20 (COUNT -NAS )+2, while initializing START, START=START -NAS ;
[0042] Step 202: UE sends a TAU request to the target SGSN;
[0043] Step 203: the target SGSN sends a context request to the source MME;
[0044] Step 204: The source MME sends a context response to the target SGSN;
[0045] Step 205: The target SGSN sends a cell reselection confirmation to the UE, notifying the UE that ...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
Provided is an initialization setting method of a key subsistence counter used between different access systems, in which a user equipment is moved from an evolutional land wireless access network to a land wireless access network, when re-selection is required, following steps are performed: the user equipment determines that a UMTS network is selected during cell re-selection, a high bit virtual value of a counter COUNT-NAS is at least added one to be used as an initial value of a counter START, then, a cell re-selection request is sent to a target service UMTS network; wherein, the counter START is a subsistence counter of an integrality key IK and an encryption key CK of the land wireless access network, the counter COUNT-NAS is a counter recording a non-access layer integrality protection key KNAS-int of the evolutional land wireless access network and the signaling number of a network access server protected by an encryption protection key KNAC-enc. The invention is capable of avoiding a safety loophole that the key subsistence period is prolonged when the UE initiates the cell re-selection between UTRAN and EURAN.
Description
technical field [0001] The invention relates to the field of mobile communication, in particular to a method for initializing and setting key survival counters between different access systems. Background technique [0002] 3GPP (3rd Generation Partnership Project, 3rd Generation Partnership Project) Evolved Packet System (EPS for short) consists of Evolved UMTS Terrestrial Radio Access Network (EUTRAN for short) and EPS core network ( Evolved Packet Core, EPC for short). [0003] The EPC includes a Mobility Management Entity (MME), and the Mobility Management Entity is responsible for mobility management, non-access stratum signaling processing, and user security mode management and other related work on the control plane. Among them, MME saves the root key K of EUTRAN ASME (Key Access Security Management Entity, access security management entity key), and by K ASME Generated non-access stratum integrity protection key K NAS-int (Key Non Access Stratum integrity) and co...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.