Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for establishing security association and communication network system

A security association and communication network technology, applied in the field of establishment of security association, can solve problems such as no suitable method for relay station and network security association, inapplicability, and many security keys, so as to ensure security and ease of use Effect

Active Publication Date: 2009-08-05
HUAWEI TECH CO LTD
View PDF0 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] In the existing LTE system, there are more security keys in the LTE system than in the IEEE 16j system, and the key generation process is more complicated
Therefore, when the LTE system introduces the relay station, there is no suitable method for establishing a security association between the relay station and the network, and it is not suitable to use the security procedures in the prior art to establish a security association between the relay station and the network.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for establishing security association and communication network system
  • Method for establishing security association and communication network system
  • Method for establishing security association and communication network system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 approach

[0019] refer to figure 2 , introducing the first embodiment of the present invention, regarding a method for establishing a security association, this method is preferably applicable to LTE and its evolved systems. In this method, the relay station informs the network-side entity of its own capability information, and the network-side entity can be a functional entity or a physical entity. The network-side entity may include a base station, a relay authentication server, and a relay information storage unit. Both the relay authentication server and the relay information storage unit are located in the network-side entity, and they can exist independently or coexist in a network node as a logical unit. above; in the follow-up process, the network-side entity establishes a security association according to the capability information of the relay station, and the specific process includes:

[0020] Step 201: the relay station sends an access request message to the base station,...

no. 3 approach

[0050] The third embodiment of the present invention is introduced below. Regarding a communication network, refer to image 3 , the communication network system 300 includes: a first receiving unit 301, configured to receive an access request message sent by a relay station, where the access request message includes relay station capability information;

[0051] a negotiating unit 302, configured to negotiate a shared root key with the relay station;

[0052] The derivation unit 303 is configured to derive the base station key according to the shared root key obtained by the negotiation unit 302 .

[0053] A selection unit 304, configured to select a security algorithm according to the relay station capability information obtained by the first receiving unit 301;

[0054] The first sending unit 305 is configured to send the security algorithm selected by the selecting unit 304 to the relay station, and use the base station key obtained by the deriving unit 303 for protection...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a safety technology in the field of wireless communication and discloses a method for establishing a security association. The method includes the following steps: a network entity receives an access request message sent by a relay station; the request information includes performance information of the relay station; the network entity and the relay station share a root key through negotiation; the network entity selects a safe algorithm according to the performance information of the relay station; a base station key is derived by the network entity according to the shared root key; the selected safe algorithm is sent to the relay station; and protection is carried out in the sending process according to the secret key of the base station. The invention further discloses a communication network. The proposal provided by the invention solves the problem about how to establish the security association between the relay station and the network after the relay station is introduced in the LTE system and also inherits the security mechanism of LTE, thus ensuring the security and usability of the system without increasing the complexity of the system.

Description

technical field [0001] The present invention relates to the field of wireless communication, in particular to a technology for establishing a security association. Background technique [0002] In order to improve the link budget and the coverage of the cellular system, user terminals can receive services through relay stations. The introduction of relay stations derives new functions of the air interface and further enhances the distributed processing characteristics of the system. The deployment of relay stations can improve the wireless access performance of the system, cover shadow areas, expand the wired coverage radius of base stations, and enhance data rates in specific areas. [0003] In the LTE system and its subsequent evolution, the wireless access technology itself is strengthened in multiple directions, and the wireless relay station is one of the important directions. Since the relay station is introduced in the LTE system, the process of establishing a securi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/04H04W12/10H04W28/18H04B7/14H04W12/03H04W12/037H04W12/0431H04W12/106
CPCH04L2209/80H04W12/08H04L9/32H04L9/08H04W12/0431H04W12/041
Inventor 陈璟徐小英
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products