Cipher key replacing method, system and device
A key and key group technology, applied in electrical components, wireless communications, security devices, etc., can solve problems such as UP data cannot be correctly decrypted, UE cannot be decrypted, user data errors, etc., to improve user communication quality and avoid Effect of loss of user communication data
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0049] In this embodiment, the AS SMC message and the AS security mode completion message are protected by the old key group, and the uplink and downlink UP data and the uplink subsequent RRC message are protected by the new key group after the AS security mode completion message, and the downlink subsequent RRC message After the AS SMC message, the new key group is used for protection, and the RRC message and UP data enable the new key group at different times.
[0050] figure 2 It is a schematic diagram of the implementation flow of Embodiment 1 of the key replacement method in the running state of the present invention, including the following steps:
[0051] Step 201: the eNB determines to start the key replacement process in the running state;
[0052] Generally, there are three situations that can trigger the key replacement mechanism: ①The PDCP counter reaches the threshold value; ②MME generates a new AKA and changes the root key; ③When the UE switches from other netw...
Embodiment 2
[0065] In this embodiment, the AS SMC message and the AS security mode completion message are protected by the old key group, and the uplink and downlink UP data and the subsequent RRC messages of the uplink and downlink are all protected by the new key group after the AS security mode completion message, and the RRC message Enable the new key group at the same time as the UP data.
[0066] image 3 It is a schematic diagram of the implementation flow of Embodiment 2 of the key replacement method in the running state of the present invention, including the following steps:
[0067] Step 301: the eNB determines to start the key replacement process in the running state;
[0068] Generally, there are three situations that can trigger the key replacement mechanism: ①The PDCP counter reaches the threshold value; ②MME generates a new AKA and changes the root key; ③When the UE switches from other networks to the LTE / SAE network, the MME finds that it and the UE have a common cache ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com