Method and system for negotiating and initiating safety context

A contextual and secure technology, applied in transmission systems, digital transmission systems, and key distribution, can solve problems such as key inconsistency, duplicate numbers, and communication interruptions

Active Publication Date: 2009-01-28
ZTE CORP
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the length of the identity identifier of the key is only three bits, and the values ​​of the identity identifier of the mapping key and the identity identifier of the cached key are allocated in different network elements, there will be a difference between the mapping key and the cached key. The identity identifier is the same, but there is a duplicate number, which causes the UE and the network to negotiate and enable the security context, and the key identity identifier used by the UE and the network is the same but the key is inconsistent, resulting in communication interruption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for negotiating and initiating safety context
  • Method and system for negotiating and initiating safety context
  • Method and system for negotiating and initiating safety context

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0081] The present invention will be described in detail below with reference to the accompanying drawings and in combination with embodiments.

[0082] The main idea of ​​the method for negotiating a security context in the present invention is that when the user equipment sends a routing area update request message or an attach message, the message carries a security context type indicator and a key identifier to indicate the security context type selected by the user equipment, and the SGSN After receiving, judge the security context type selected by the user equipment according to the indicator, and select the security context.

[0083] figure 1 A diagram showing the correspondence between a security context type indicator (Security Context Type Indicator, referred to as an indicator for short) and a key identifier, wherein the indicator field is used to indicate whether the user equipment selects the cache context or the mapping context, that is, the key identifier Wheth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a method for the negotiated invocation of a security context. User equipment is shifted from an evolved universal terrestrial radio access network to a universal terrestrial radio access network or global system for mobile communications enhanced data rate GSM evolved entity radio access network GERAN. The method comprises that the user equipment dispatches a routing area refresh request message or an attachment request message to a service GPRS support node SGSN; a type designator and a key identifier of the security context are carried in the message; the type designator of the security context indicates that the security context selected by the user equipment is a mapping security context or a cache security context. The user equipment and the network side negotiate the security context by the method to ensure the sameness of the security contexts at the two sides.

Description

technical field [0001] The present invention relates to the field of mobile communication, in particular to a method and system for negotiating and enabling a security context when a UE transfers between different wireless access systems. Background technique [0002] The 3GPP Long Term Evolution system (LTE, Long Term Evolution) consists of an Evolved Terrestrial Radio Access Network (EUTRAN, Evolved UMTS Terrestrial Radio Access Network) and an Evolved Packet System (Evolved Packet System, EPS) core network (Evolved Packet Core, referred to as EPC). [0003] Among them, the EPC includes a mobility management entity (MME, mobility management entity), which is responsible for mobility management, non-access stratum signaling processing, and user security mode management and other related work on the control plane. Among them, MME saves the root key K of EUTRAN ASME (KeyAccess Security Management Entity, access security management entity key), and use K ASME and uplink NAS...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/38H04Q7/22H04L12/56H04L9/08H04L29/06
Inventor 张旭武卢飞甘露
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products