Negotiation method for safety algorithm

A security algorithm and network-side technology, applied in the field of security algorithm negotiation, can solve problems such as inability to support operator security algorithms, lack of scalability, and inability to satisfy operators

Inactive Publication Date: 2008-12-24
HUAWEI TECH CO LTD
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since the algorithm identifier in the existing standard is represented by a 4-digit binary number, it can only support up to 15 encryption algorithms or integrity algorithms
At present, there are hundreds of operators in the world, and 15 encryption algorithms obviously cannot meet the needs of operators to use custom security algorithms
Therefore, the existing algorithm negotiation method does not have good scalability and cannot support operators to use custom security algorithms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Negotiation method for safety algorithm
  • Negotiation method for safety algorithm
  • Negotiation method for safety algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to realize the technical problems raised in the background art and enable operators to adopt self-defined security algorithms, the embodiments of the present invention provide a security algorithm negotiation method. The method includes:

[0031] The network side obtains a security algorithm supported by the user equipment and associated with the identification information of the PLMN to which the network side belongs;

[0032] The network side selects the security algorithm used for communicating with the user equipment according to the security algorithm supported by the user equipment and associated with the identification information of the PLMN to which the network side belongs, and the security algorithm supported by the network side itself;

[0033] The network side notifies the user equipment of the selected security algorithm.

[0034] In the above embodiments, by associating the security algorithm with the identification information of the PLMN, diff...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a negotiation method of safe algorithm and a terminal for realizing the method, and aims to provide a safe algorithm negotiation method for supporting an operator to use a custom setup safe algorithm. The negotiation method comprises the following steps: a network side acquires a safe algorithm supported by a user device and related to the PLMN identification information to which the network side belongs; the network side selects the safe algorithm used by user device communication according to the safe algorithm supported by the user device and relates to the PLMN identification information to which the network side belongs and a safe algorithm supported by the network side itself; and the network sides informs the user device of the selected safe algorithm. The terminal provided by the embodiment of the invention comprises a storage unit, a receiving unit, an execution unit and a sending unit. Through the method and the terminal disclosed by the embodiment of the invention, the operator can use custom setup safe algorithm without conflict.

Description

technical field [0001] The invention relates to the technical field of wireless communication, in particular to the technology of security algorithm negotiation. Background technique [0002] In a UMTS (Universal Mobile Telecommunications System, Universal Mobile Telecommunications System) network, in order to protect the communication security of the air interface, the user equipment (UE, User Equipment) and the radio network controller (RNC, Radio Network Controller) need to monitor the air interface The data and signaling are protected by encryption to prevent attackers from eavesdropping, and the signaling on the air interface needs to be integrity protected to prevent attackers from tampering with the signaling on the air interface. [0003] In order to perform encryption protection and integrity protection on data and signaling on the air interface, the user equipment and the network side need to negotiate an encryption algorithm and an integrity algorithm. The negoti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L29/06H04Q7/38
Inventor 陈璟
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products