Method, equipment and system for updating group cipher key

A technology of group key and root key, applied in the field of communication, can solve the problems of adjusting the security policy of users, increasing the threat of attackers guessing the real identity of users, etc., to achieve the effect of reducing the threat

Active Publication Date: 2009-08-19
CHINA MOBILE COMM GRP CO LTD +1
View PDF0 Cites 39 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the user's group is immutable, and the network side cannot adjust the user's group according

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, equipment and system for updating group cipher key
  • Method, equipment and system for updating group cipher key
  • Method, equipment and system for updating group cipher key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0066] In the embodiment of the present invention, all users under the jurisdiction of the home network entity (HSS or HLR, HSS is taken as an example in this embodiment, and the processing procedure of HLR is similar to HSS) are randomly divided into different groups, and each group is represented by GID (Group ID) is uniquely identified, and the number of users in each group can be configured according to the security policy of HSS. Users in the group share a group key GK with the HSS, which is used for encryption protection of IMSI.

[0067] In the embodiment of the present invention, the parameters or functions used mainly include:

[0068] SK GID , the local root key of the HSS, used to deduce the group key GK. SK GID It is the core secret of the group, storage and GK deduction SK GID The process is carried out in HSS.

[0069] KV (64bit), t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for updating group key which includes steps as follows: an attribute network entity obtains GK according with a version number KV of a group sign GID and a group key GK, and a local boot key SK(GID) for deciphering an internal mobile user identifying code IMSI encrypted by GK provided by an user equipment; the attribute network entity generates new group key GKn according with GID, KVn, SK(GID) when KV differs from the local version number KVn; the attribute network entity generates updating key UK according with IMSI, user's authentication key K, uses UK for encrypting GID, KVn and GKn, and providing to an user equipment; the user equipment generates UK according with IMSI, K, deciphers out GID, KVn and GKn, updates the group key GK and the version number KV. The invention also discloses the attribute network entity and a communication system. The method can improve IMSI security and solve threaten of exposing IMSI.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a group key update method, device and system. Background technique [0002] In 2G (2 Generation, second-generation mobile communication network), 3G (3 Generation, third-generation mobile communication network), and LTE (Long Term Evolution, long-term evolution network) systems, IMSI (International Mobile Subscriber Identity, international mobile subscriber Identification code) is transmitted in clear text on the air interface, the attacker can obtain the user's IMSI by eavesdropping or actively attacking by requesting the user to send the IMSI. Once the IMSI is intercepted, an attacker can use this vulnerability to collect the IMSI of a certain area (such as an airport) to track the user's location information. [0003] In 3G and LTE systems, the TMSI (Temporary Mobile Subscriber Identity, Temporary Mobile Station Identity) mechanism is adopted for user identity security,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/02H04W12/04H04W12/0433
Inventor 彭华熹谢进柳王妮娜
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products