Unlock instant, AI-driven research and patent intelligence for your innovation.
Method and system for generating cryptographic key
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A key generation and key technology, applied in the field of communication, to achieve the effect of strengthening security
Inactive Publication Date: 2008-11-12
ZTE CORP
View PDF0 Cites 29 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0008] The technical problem to be solved by the present invention is to propose a key generation method and system for the defect of generating the same IK and CK when moving between different access systems in the prior art to improve security
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0040] image 3 It is a signaling flowchart of a key generation method according to Embodiment 1 of the present invention. This embodiment shows a flowchart of a key generation method for UE handover from E-UTRAN to UTRAN, including the following steps:
[0041] Step 302, the source eNB makes a handover decision.
[0042] Step 304, the source eNB sends a handover request to the source MME.
[0043] Step 306, after receiving the handover request, the source MME uses K ASME And NAS counter, generate IK, CK.
[0044] Step 308, the source ME forwards the relocation request to the target SGSN, and sends IK and CK at the same time.
[0045] Step 310, the target SGSN sends a relocation request to the target RNC (Radio Network Controller), and at the same time sends IK and CK.
[0046] Step 312, the target RNC starts to use IK and CK.
[0047] Step 314, the target RNC sends a relocation request confirmation to the target SGSN.
[0048] Step 316, the target SGSN forwards the relo...
Embodiment 2
[0058] Figure 4 It is a signaling flowchart of a key generation method according to Embodiment 2 of the present invention, and this embodiment shows a signaling flowchart of a key generation method according to a preferred embodiment of the present invention. Such as Figure 4 As shown, this embodiment shows a flowchart of a key generation method for UE handover from E-UTRAN to GERAN, and this embodiment includes:
[0059] In step 402, the source eNB initiates a handover decision.
[0060] Step 404, the source eNB sends a handover request to the source MME.
[0061] Step 406, the source MME uses K ASME and the value of the NAS counter generate IK, CK.
[0062] Step 408, the source MME forwards the relocation request to the target SGSN, and sends IK and CK to the target SGSN at the same time.
[0063] Step 409, the target SGSN uses IK, CK to generate Kc.
[0064] In step 410, the target SGSN sends a packet domain switching request to the target BSS, and sends Kc at the s...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention provides a generation method of a secret key, and the users equipment is updated to universal terrestrial radio access networks or global system for mobile communication or enhanced data rate for GSM evolved radio access network from the switching or tracking area of evolved terrestrial radio access networks; wherein, mobility management entities and the users equipment use secret keys needed by the generation of universal terrestrial radio access networks or the global system for mobile communication or the enhanced data rateGSM evolved radio access network through prefixing parameters which comprise the root key of the evolved terrestrial radio access networks and the value of a non-access stratum counter. The method of the invention also provides a secret key generationsystem for generating the secret key.
Description
technical field [0001] The invention relates to key generation technology in the communication field, in particular to a key generation method and system when moving between different systems. Background technique [0002] The Evolved Packet System (EPS) of the 3rd Generation Partnership Project (3rd Generation Partnership Project, 3GPP for short) consists of the Evolved UMTS Terrestrial Radio Access Network (E-UTRAN for short) and the EPS An evolved packet core network (Evolved Packet Core, EPC for short). The base station device in the E-UTRAN is an eNB (evolved Node B, evolved Node B). EPC can support users from Global System for Mobile Communications or Enhanced Data RateGSM Evolution Radio Access Network (GSM / EDGE RadioAccess Network, that is, Global System for Mobile Communication / Enhanced DataRate for GSM Evolution radio access network, referred to as GERAN) and Universal Terrestrial Wireless Access to an access network (Universal Terrestrial Radio Access Network, ...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.