Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Optimization method for acquiring authentication cryptographic key during position updating process

An authentication key and update process technology, applied in security devices, electrical components, wireless communications, etc., can solve the problem of low processing efficiency, achieve the effects of optimizing the process, simplifying the message process, and improving network processing efficiency

Inactive Publication Date: 2011-07-13
ZTE CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For each location update, the anchor PC will perform the above steps to obtain the AK context from the anchor Authenticator, and the processing efficiency is relatively low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Optimization method for acquiring authentication cryptographic key during position updating process
  • Optimization method for acquiring authentication cryptographic key during position updating process
  • Optimization method for acquiring authentication cryptographic key during position updating process

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The present invention is based on the release1.0.0 related protocol specifications (including Stage2 and Stage3) released by NWG.

[0049] For the MS that enters the idle mode, the anchor PC saves its relevant information, so the anchor PC can store the AK context, and through appropriate judgment processing, to ensure that the correct AK context is provided to the BS, and it is not necessary to obtain it from the Authenticator.

[0050] The main idea of ​​the present invention is that when the MS enters the idle mode, the anchor PC saves the AK context of the serving BS, and when the MS performs location update, the anchor PC decides whether to initiate the acquisition of the AK context through corresponding judgment. The method specifically includes the following steps:

[0051] (a) An optional field AK context (AK Context) is added to the idle mode entry response (IM_Entry_State_Change_Rsp) message;

[0052] (b) When the MS enters the idle mode, the tracking local p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an optimization method of acquiring an authorization key in the process of location update. When a mobile terminal enters the idle mode, an anchored paging controller (PC) saves relevant authorization key context, namely the AK context of the mobile terminal. When the mobile terminal begins location update, if an anchored PC judges that the acquisition of the AK context is not required to be launched, then the locally saved context is sent to the service base station of the mobile terminal. The invention provides a set of optimization mechanism for acquiring the AK context via the anchored PC, which optimizes the process for the acquisition of the AK context by the anchored PC, simplifies the information process, enhances the processing efficiency of the network, and reduces the probability of failure.

Description

technical field [0001] The present invention relates to an anchor paging controller (Anchor PC, Anchor PagingController) and an anchor authenticator (Anchor Authenticator) in a WiMAX (World Interoperability for Microwave Access, global microwave access interoperability) network. An optimized method for obtaining the authentication key (AK, Authentication Key) in the process. Background technique [0002] The formulation and research of the WiMAX network architecture specification is carried out in the Network Working Group (NWG, Network Working Group) of the WiMAX Forum. According to the development needs, it is divided into three stages. Currently, Release1.0.0 has been released. [0003] The WiMAX network reference model is based on IEEE802.16 and consists of three logical entities: Registered Terminal / Mobile Terminal (SS / MS), Access Service Network (ASN) and Connection Service Network (CSN). Each logical entity represents a A group of functional entities, each function c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W12/06H04W12/63
Inventor 霍玉臻刘俊羿
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products