Unlock instant, AI-driven research and patent intelligence for your innovation.

An initialization setup method for secret key survival counter between different access systems

A counter and initialization technology, applied in the field of mobile communication, can solve problems such as continuous accumulation of UE counters and extended key lifetime

Inactive Publication Date: 2012-09-05
XUZHOU NAILI MACROMOLECULE TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] In the prior art, when the cell is reselected between UTRAN and EUTRAN, UE counters are not continuously added to each other, but the initial value of the counter is directly set to 0, so that after TAU, the life cycle of the key does not include its parent The lifetime of the key, resulting in a security hole where the lifetime of the key is extended

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An initialization setup method for secret key survival counter between different access systems
  • An initialization setup method for secret key survival counter between different access systems
  • An initialization setup method for secret key survival counter between different access systems

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0028] This embodiment is a method for initializing the counter when the UE moves from the UTRAN to the EUTRAN in an idle state and needs to perform cell reselection. Its signaling process is as follows figure 1 shown, including the following steps:

[0029] Step 101: UE to START -NAS To initialize the settings, make START -NAS =START, then use START -NAS to COUNT -NAS Perform initialization settings;

[0030] to COUNT -NAS During initial setup, about to START -NAS value as COUNT -NAS The value of the high-order significant bit of , can be expressed as MSB(COUNT -NAS ) = START -NAS , COUNT -NAS The rest of the bit positions are 0.

[0031] In this step, UE also needs to use IK and CK to generate K -ASME , K NAS-int and K NAS-enc , because this key needs to be used for integrity protection in subsequent TAU ​​requests.

[0032] Step 102: The UE sends a TAU request to the target MME, and at the same time sends the START -NAS Send to the target MME;

[0033] Step...

no. 2 example

[0040] This embodiment is a method for initializing the counter when the UE moves from EUTRAN and UTRAN in an idle state and needs to perform TAU. like figure 2 shown, including the following steps:

[0041] Step 201: When the UE decides to reselect the cell to the UMTS network, use COUNT -NAS The value of initialize START and set START -NAS , coming to COUNT -NAS The value of the high-order significant bit (also known as the high-order effective value) plus 2 (here can also add other integers not less than 1) and assign it to START -NAS , which can be expressed as START -NAS = MSB 20 (COUNT -NAS )+2, while initializing START, START=START -NAS ;

[0042] Step 202: UE sends a TAU request to the target SGSN;

[0043] Step 203: the target SGSN sends a context request to the source MME;

[0044] Step 204: The source MME sends a context response to the target SGSN;

[0045] Step 205: The target SGSN sends a cell reselection confirmation to the UE, notifying the UE that ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Provided is an initialization setting method of a key subsistence counter used between different access systems, in which a user equipment is moved from an evolutional land wireless access network to a land wireless access network, when re-selection is required, following steps are performed: the user equipment determines that a UMTS network is selected during cell re-selection, a high bit virtual value of a counter COUNT-NAS is at least added one to be used as an initial value of a counter START, then, a cell re-selection request is sent to a target service UMTS network; wherein, the counter START is a subsistence counter of an integrality key IK and an encryption key CK of the land wireless access network, the counter COUNT-NAS is a counter recording a non-access layer integrality protection key KNAS-int of the evolutional land wireless access network and the signaling number of a network access server protected by an encryption protection key KNAC-enc. The invention is capable of avoiding a safety loophole that the key subsistence period is prolonged when the UE initiates the cell re-selection between UTRAN and EURAN.

Description

technical field [0001] The invention relates to the field of mobile communication, in particular to a method for initializing and setting key survival counters between different access systems. Background technique [0002] 3GPP (3rd Generation Partnership Project, 3rd Generation Partnership Project) Evolved Packet System (EPS for short) consists of Evolved UMTS Terrestrial Radio Access Network (EUTRAN for short) and EPS core network ( Evolved Packet Core, EPC for short). [0003] The EPC includes a Mobility Management Entity (MME), and the Mobility Management Entity is responsible for mobility management, non-access stratum signaling processing, and user security mode management and other related work on the control plane. Among them, MME saves the root key K of EUTRAN ASME (Key Access Security Management Entity, access security management entity key), and by K ASME Generated non-access stratum integrity protection key K NAS-int (Key Non Access Stratum integrity) and co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/08H04L9/08H04W12/04
Inventor 张旭武甘露
Owner XUZHOU NAILI MACROMOLECULE TECH CO LTD