Security negotiation method and apparatus when switching between different wireless access technologies

A wireless access technology and security technology, which can be used in security devices, radio/induction link selection arrangements, access restrictions, etc., and can solve problems such as switching to LTE systems for unsuitable terminals.

Active Publication Date: 2008-11-19
HUAWEI TECH CO LTD
View PDF0 Cites 45 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When switching between 2G and 3G, the security information processed on the SGSN side only involves the AS, not the security information of the NAS. Therefore, the above-mentioned process of negotiating between the terminal and the 2G or 3G system cannot be applied to the terminal switching from 2G or 3G to LTE systematic process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security negotiation method and apparatus when switching between different wireless access technologies
  • Security negotiation method and apparatus when switching between different wireless access technologies
  • Security negotiation method and apparatus when switching between different wireless access technologies

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Embodiments of the present invention provide a method and device for security negotiation when switching between different wireless access technologies.

[0041]The handover of the terminal between different radio access technologies in the embodiment of the present invention includes the handover of the terminal from a different system to the LTE system. The following uses the handover of the terminal from the UTRAN system to the LTE system as an example to illustrate the method and device in the embodiment of the present invention.

[0042] In the embodiment of the present invention, when the terminal switches from the UTRAN system to the LTE system, the TargetMME (Mobile Management Entity, target mobile management entity) generates information related to NAS security and sends it to the Target eNB (target evolved base station), and the Target eNB also Generate information related to AS security, and form a TransparentContainer according to the security information of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a method for security negotiation when switching is performed among different wireless access technologies, and the device thereof. The method mainly comprises that the security information of an NAS (non access stratum) and an AS (access stratum) which are selected by a target system is included in a transparent container when the terminal performs switching among different wireless access technologies; the content in the transparent container is transmitted to the terminal, and the terminal performs security negotiation according to the content in the transparent container and the target system. The device mainly comprises an eNB (eNB) equipment and a resource access network equipment. Through the invention, when the foreign system is switched to the LTE (long term evolution) system at the terminal, the terminal can obtain the parameter information of the cryptographic keys of the NAS and the AS selected by the LTE system, and performs security negotiation with LTE system.

Description

technical field [0001] The invention relates to the field of mobile communication, in particular to a method and device for security negotiation when switching between different wireless access technologies. Background technique [0002] In a mobile communication system, when a terminal moves from a local base station to a target base station, handover between base stations is usually involved. The wireless access network of the base station includes 2G (Second Generation, second generation mobile communication), 3G (Third Generation , third-generation mobile communications) and future LTE (Long Term Evolve, long-term evolution) systems, etc., and the security protection levels and protection measures between terminals and various wireless access networks are different. [0003] The schematic diagram of the structure of the two security-related layers in the LTE system is as follows: figure 1 shown, from figure 1 It can be seen that the Xu interface, S1-C, S1-U, and X2 int...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/38H04Q7/34H04L12/22H04L9/08H04L12/28H04L12/56H04W12/00H04W12/04H04W36/00H04W36/14
CPCH04B1/406H04W36/0038H04W12/04H04W48/18H04W12/08H04W88/06H04W12/0431H04W12/041H04W12/108H04L9/14H04L2209/24H04W36/08H04W88/08H04L63/06H04L63/10H04W36/0022
Inventor 徐小英陈璟
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products