Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Cipher key updating method and device under active state

A key update and state technology, applied in the field of communication, can solve problems such as not involving new keys

Active Publication Date: 2009-04-01
HUAWEI TECH CO LTD
View PDF0 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

All of the methods are based on the premise that the key has been successfully updated to a new key, but none of them involve the process of how to obtain the new key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cipher key updating method and device under active state
  • Cipher key updating method and device under active state
  • Cipher key updating method and device under active state

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 3

[0061] The key update process in Embodiment 3 is described as follows:

[0062] Step s501. When the eNB finds that the key needs to be updated according to the above security requirements, it sends a key update request message to the MME, requesting the MME to generate a new K eNB ; MME will start from K ASME Derive new K from eNB ;

[0063] The key update request message may be: (1) a request message specifically for the eNB to request the MME to update the key, and the request message requires a response from the MME. (2) A notification type message. Informing the MME that a key needs to be updated, the notification message does not require a response from the MME.

[0064] Step s502, MME according to the situation for the key K eNB to update. where K eNB It can be MME through the existing K ASME Derived, it may also be that the MME has updated K through the AKA process ASME calculated later.

[0065] Step s503, the MME sends the new K eNB sent to eNB. The MME ca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secret key updating method under active state comprising following steps: user terminal under active state or network side starts a secret key updating when satisfying preset condition; the network side and user terminal update secret key and consult start time of new secret key. The invention also discloses a secret key updating device under active state. The user terminal and network side actively starts secret key updating procedure, and solves problem of secret key updating of session under active state.

Description

technical field [0001] The present invention relates to the technical field of communications, in particular to a method and device for renewing keys in an active state. Background technique [0002] In order to ensure the future 3GPP (3 rd Generation Partnership Project, the third generation) The competitiveness of the system, an access technology evolution work is being carried out within the 3GPP organization. Especially in order to strengthen the ability of the 3GPP system to handle the rapidly growing IP data services, the use of packet technology in the 3GPP system needs to be further enhanced. Some of the most important parts of this type of technological evolution include: reduced delay and response time, higher user data rates, enhanced system capacity and coverage, and reduced overall cost for operators. Moreover, the backward compatibility of the evolved network structure to the existing network is also an important indicator. In terms of security, it is requir...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04L29/06H04W12/0431H04W12/0433
CPCH04L63/068H04L2209/80H04W12/04H04L9/0844H04L9/0891H04L9/08H04W12/08H04W12/06H04W12/0431H04W12/041H04L63/08
Inventor 杨艳梅黄敏
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products