Cipher key replacing method, system and device

A key and key group technology, applied in electrical components, wireless communications, security devices, etc., can solve problems such as UP data cannot be correctly decrypted, UE cannot be decrypted, user data errors, etc., to improve user communication quality and avoid Effect of loss of user communication data

Active Publication Date: 2009-07-08
ZTE CORP
View PDF3 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] The first question, currently TS33.401 stipulates that the key pointed to by the eKSI carried by the SMC is used to protect the integrity of the message. Since step 102, all AS messages are in the state of encryption and integrity protection using the old key , therefore, the message in step 105 must use the old key for encryption and integrity verification, so as to ensure that it can pass the processing of the UE, otherwise the UE will discard the message. In the case where the key is processed, there is a contradiction
[0016] The second problem is that the UE and eNB data keys are not synchronized in the user plane
All these processes need a period of time to complete. In this period of time, the user data between the UE and the network is not terminated and will always be transmitted. The UE user plane data can only be encrypted and decrypted with the old key, but at this time The UP data received from the eNB is all encrypted with the new key, so the UE cannot decrypt the received message, which will cause part of the UP data to be unable to be decrypted correctly due to key replacement
Simply put, there is a time difference between the UE and the eNB using the new key for the UP data, resulting in errors in user data and a decrease in communication quality

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cipher key replacing method, system and device
  • Cipher key replacing method, system and device
  • Cipher key replacing method, system and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] In this embodiment, the AS SMC message and the AS security mode completion message are protected by the old key group, and the uplink and downlink UP data and the uplink subsequent RRC message are protected by the new key group after the AS security mode completion message, and the downlink subsequent RRC message After the AS SMC message, the new key group is used for protection, and the RRC message and UP data enable the new key group at different times.

[0050] figure 2 It is a schematic diagram of the implementation flow of Embodiment 1 of the key replacement method in the running state of the present invention, including the following steps:

[0051] Step 201: the eNB determines to start the key replacement process in the running state;

[0052] Generally, there are three situations that can trigger the key replacement mechanism: ①The PDCP counter reaches the threshold value; ②MME generates a new AKA and changes the root key; ③When the UE switches from other netw...

Embodiment 2

[0065] In this embodiment, the AS SMC message and the AS security mode completion message are protected by the old key group, and the uplink and downlink UP data and the subsequent RRC messages of the uplink and downlink are all protected by the new key group after the AS security mode completion message, and the RRC message Enable the new key group at the same time as the UP data.

[0066] image 3 It is a schematic diagram of the implementation flow of Embodiment 2 of the key replacement method in the running state of the present invention, including the following steps:

[0067] Step 301: the eNB determines to start the key replacement process in the running state;

[0068] Generally, there are three situations that can trigger the key replacement mechanism: ①The PDCP counter reaches the threshold value; ②MME generates a new AKA and changes the root key; ③When the UE switches from other networks to the LTE / SAE network, the MME finds that it and the UE have a common cache ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a key alternation method which comprises the following procedures: evolution nodes send access stratum safe mode command information which is encrypted and wholly protected through an old key set to user equipment; after successfully processing the access stratum safe mode information with the old key set, the user equipment sends the finished access stratum safe mode information which is encrypted and wholly protected through an old key set to the evolution nodes, and next, the user equipment begins encrypting or decrypting user plane data with a new key; after processing the finished access stratum safe mode information with the old key set, the evolution nodes begins encrypting or decrypting user plane data with a new key. The invention also discloses a key alternation system and the composition equipment. The invention can be used for ensuring that the key used by the user equipment is synchronous with the key used by the network user information when keys are alternated, thus avoiding user communication data from losing lead by the de-synchrony between the key used by the user equipment and the network key, and fatherly raising the communication quality of users.

Description

technical field [0001] The present invention relates to a key replacement technology in a mobile communication system, in particular to a key replacement method, system and device for a user equipment (UE) and a network in a radio resource control (RRC) connection state. Background technique [0002] The access security of the 3rd Generation Partnership Project (3GPP) Long Term Evolution (LTE, Long Term Evolution) system / system architecture evolution (SAE, System Architecture Evolution) adopts a two-layer security architecture, that is, the access layer (AS, The security mechanisms of Access Stratum) and Non-Access Stratum (NAS, Non Access Stratum) are separate, and each has its own independent security context. Wherein, the security context includes: a key, a key identifier, a security algorithm, and a value of an uplink and downlink counter. The AS security context is terminated at the evolved node (eNB, evolved Node B), and the eNB is responsible for generating, establis...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/0433
Inventor 张旭武甘露
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products