Method and system for generating cryptographic-key identification identifier

A technology of identity identification and identifier, which is applied in the field of key identity identifier generation, which can solve the problems that the key has no identity identifier and cannot be reused

Inactive Publication Date: 2008-11-05
ZTE CORP
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The technical problem to be solved by the present invention is to provide a method and system for generating a key identity identifier when the UE transfers between different access systems, so as to solve the problem in the prior art after the UE transfers from EUTRAN to UTRAN or GERAN due to generated during transfer by K ASME The mapped key has no identifier and cannot be reused

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for generating cryptographic-key identification identifier
  • Method and system for generating cryptographic-key identification identifier
  • Method and system for generating cryptographic-key identification identifier

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0072] figure 2 It is the first embodiment of the method of the present invention. This embodiment is a method flow for generating a key identity identifier when EUTRAN is transferred to UTRAN in an idle state, including the following steps:

[0073] Step S201, the UE decides to transfer to UTRAN when idle, and sends a request message for transferring to UTRAN when idle, and the request message can be a routing area update request or an attach request;

[0074] Step S202, after receiving the idle transfer to UTRAN request message sent by the UE, the SGSN sends a request message to the MME, and the request message corresponds to the received transfer request message type, which is a corresponding context request or an authentication request;

[0075] Step S203, after the MME receives the request message sent by the SGSN, it sends the KSI ASME The value of is assigned to KSI, that is, KSI=KSI ASME , and use K ASME Generate CK and IK;

[0076] Step S204, MME sends context re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a cipher key identification identifiers generating method, including: the user equipment UE transfers from the Evolved Universal Terrestrial Radio Access Network (EUTRAN) to the Universal Terrestrial Radio Access Network (UTRAN) or global mobile communications system or enhancement type data velocity GSM Evolved Terrestrial Radio Access Network (ETRAN), the UE uses the identification identifiers accessing in the safety management entity cipher key to map and generate an identification identifier of the transferred system cipher key; the mobile management entity uses the identification identifiers accessing in the safety management entity cipher key to map and generate an identification identifier of the encryption key and integrality cipher key, and transmits them to the service GPRS supporting node (SGSN); when the user equipment is transferred from the EUTRAN to the UTRAN, the SGSN stores the encryption key, integrality cipher key and their identification identifiers; and when the user equipment is transferred from the EUTRAN to the GERAN, the SGSN will assign the identification identifier values of the encryption key and integrality cipher key to the identification identifiers of the encryption key of the GERAN.

Description

technical field [0001] The present invention relates to the field of mobile communications, and in particular, to a method for transferring a UE (User Equipment, user equipment) from an evolved terrestrial radio access network (Evolved UMTS Terrestrial Radio Access Network, EUTRAN for short) to a universal terrestrial radio access network When transferring from EUTRAN to GERAN (Universal Terrestrial Radio Access Network, UTRAN for short) or transferring from EUTRAN to GERAN (GSM / EDGE Radio Access Network, Global System for Mobile Communications or Enhanced Data Rates for GSM Evolution Radio Access Network), the key identity identifier generation method and system. Background technique [0002] The 3GPP Evolved Packet System (EPS, Evolved Packet System) is composed of an Evolved Terrestrial Radio Access Network EUTRAN and an EPS Core Network (EPC, Evolved Packet Core). [0003] The EPC includes a mobility management entity (MME, mobility management entity), which is responsi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04Q7/38H04W12/041
CPCH04L2209/80H04W12/04H04L9/083H04L9/321H04L2463/061H04W12/041H04W12/0471H04L63/08H04L2463/041H04W36/0038
Inventor 张旭武黄庆
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products