Unlock instant, AI-driven research and patent intelligence for your innovation.

Cryptographic key generation method, switching method, mobile management entity and customer equipment

A mobile management entity and key generation technology, applied in security devices, communication between multiple stations, electrical components, etc., can solve problems such as replay attacks and security risks, and achieve the effect of strengthening security

Inactive Publication Date: 2014-06-11
ZTE CORP
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] Considering that the same IK and CK that exist in the related art are prone to generate the same keystream, are vulnerable to replay attacks, and have serious security risks, the present invention is proposed. For this reason, the main purpose of the present invention is to provide a cryptographic Key generation method and device, to solve the above problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cryptographic key generation method, switching method, mobile management entity and customer equipment
  • Cryptographic key generation method, switching method, mobile management entity and customer equipment
  • Cryptographic key generation method, switching method, mobile management entity and customer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The present invention will be described in detail below with reference to the accompanying drawings.

[0042] method embodiment

[0043] According to an embodiment of the present invention, a method for generating a key is provided.

[0044] figure 2 is a flowchart of a method for generating a key according to an embodiment of the present invention, such as figure 2 As shown, the method includes the following steps:

[0045] Step S202, the mobile management equipment (MME) acquires a temporary cell identity, wherein the temporary cell identity includes at least one of the following: cell radio network temporary identity (C-RNTI), cell identity (CELLID);

[0046] In step S204, the MME uses the Access Security Management Entity Key (KASME) and the obtained cell temporary identifier to generate an integrity protection key and a first encryption key using a key generation function.

[0047] Through the technical solution provided by the embodiment of the present inven...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cipher key generating method, which includes: a mobile management entity acquires sub-district temporary mark; the mobile management entity adopts cipher key accessing the safety management entity and the obtained sub-district temporary mark, and uses a cipher key generating function to generate integrality protection cipher key and first encryption key. The present invention also provides a switch method, a mobile management entity and user equipment. The invention can generate non-repeated cipher key by using KASME and C-RNTI and / or CELLID, so that the signaling and / or data can be effectively protected and the security of the network can be strengthened.

Description

technical field [0001] The present invention relates to the communication field, in particular to a key generation method, a handover method, a mobility management entity and user equipment. Background technique [0002] The Evolved Packet System (EPS) of the 3rd Generation Partnership Project (3rd Generation Partnership Project, 3GPP for short) is developed by the Evolved UMTS Terrestrial Radio Access Network (Evolved UMTS Terrestrial Radio Access Network, Evolved for short). -UTRAN) and EPS evolved packet core network (Evolved Packet Core, EPC for short). [0003] Among them, the base station equipment in the E-UTRAN is an evolved node (evolved Node B, referred to as eNB), and the EPC can support users from the global system for mobile communication enhanced data rate GSM evolution radio access network (GSM / EDGE Radio Access Network, That is, the access of Global System for Mobile Communication / Enhanced Data Rate for GSM Evolution radio access network (GERAN for short) an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/00H04B7/26H04W12/041H04W12/10
Inventor 甘露黄庆
Owner ZTE CORP