Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for generating cryptographic-key identification identifier when transferring user equipment

A technology of identity identification and user equipment, which is applied in the field of mobile communication and can solve problems such as keys without identity identifiers

Inactive Publication Date: 2012-10-10
GLOBAL INNOVATION AGGREGATORS LLC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The technical problem to be solved by the present invention is to provide a method and a system for generating a key identity identifier during user equipment transfer, which can solve the problems caused by K during the transfer process after the user equipment is transferred from EUTRAN to UTRAN or GERAN ASME The problem that the mapped key has no identifier

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for generating cryptographic-key identification identifier when transferring user equipment
  • Method and system for generating cryptographic-key identification identifier when transferring user equipment
  • Method and system for generating cryptographic-key identification identifier when transferring user equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0079] The technical solution of the present invention will be described in more detail below with reference to the drawings and embodiments.

[0080] The method for generating the key identity identifier during UE transfer provided by the present invention includes:

[0081] When the user equipment is transferred from the evolved terrestrial wireless access network to the target system, the mobility management unit sends the identity identifier of the access security management entity key to the serving GPRS support node, and both the serving GPRS support node and the user equipment send the KSI ASME Maps to the key identifier of the target system.

[0082] Wherein, the mapping method may include: directly making the key identifier of the target system equal to the KSI ASME , or let the key identifier of the target system be equal to KSI ASME sum with a constant;

[0083] The serving GPRS support node and the user equipment agree on a mapping method and constants.

[0084...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and system for generating cipher key identification identifier when transferring user equipment. The method includes: when the user equipment transfers from an evolution terrestrial radio access network to a target system, a mobile management unit transmits identification identifiers accessing to safety management entity cipher key, to service universal packet radio service (GPRS) supporting nodes, the service GPRS supporting nodes and user equipment map the identification identifiers accessing to safety management entity cipher key as cipher key identification identifiers of the target system. The method can resolve the problem in the prior technology of no identification identifier in the cipher key mapped from the access safety management entity cipher key produced in the transfer process, after the user equipment transfers from the evolution terrestrial radio access network to a terrestrial radio access network or a GPRS / improved data rate GSM service radio access network.

Description

technical field [0001] The present invention relates to the field of mobile communication, in particular to a method and system for generating a key identity identifier when user equipment is transferred. Background technique [0002] In a mobile communication system, when UE (User Equipment) transfers between different access systems, the security parameters of the Source Service Network (Source Service Network) need to be mapped to security parameters that can be identified and used by the Target Service network , to make the transfer successful and open for business. These security parameters include keys, key identifiers, counters, security algorithms, etc. [0003] The 3GPP evolved packet system (EPS, Evolved Packet System) is composed of an evolved terrestrial radio access network (EUTRAN, Evo1ved UMTS Terrestrial Radio Access Network) and an EPS core network (EPC, Evolved Packet Core). [0004] Among them, the EPC includes a mobility management entity (MME, mobility...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L12/56H04L12/28H04W12/04H04W12/041H04W12/08H04W36/00H04W36/12
CPCH04W12/04H04W36/12H04W36/0038H04L12/6418H04W12/043H04W12/041
Inventor 张旭武甘露黄庆
Owner GLOBAL INNOVATION AGGREGATORS LLC