Cryptographic key generation method, switching method, mobile management entity and customer equipment
A mobile management entity and key generation technology, applied in security devices, communication between multiple stations, electrical components, etc., can solve problems such as replay attacks and security risks, and achieve the effect of strengthening security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0041] The present invention will be described in detail below with reference to the accompanying drawings.
[0042] method embodiment
[0043] According to an embodiment of the present invention, a method for generating a key is provided.
[0044] figure 2 is a flowchart of a method for generating a key according to an embodiment of the present invention, such as figure 2 As shown, the method includes the following steps:
[0045] Step S202, the mobile management equipment (MME) acquires a temporary cell identity, wherein the temporary cell identity includes at least one of the following: cell radio network temporary identity (C-RNTI), cell identity (CELLID);
[0046] In step S204, the MME uses the Access Security Management Entity Key (KASME) and the obtained cell temporary identifier to generate an integrity protection key and a first encryption key using a key generation function.
[0047] Through the technical solution provided by the embodiment of the present inven...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 