Base station secure accessing method of mobile communication system

A mobile communication system and secure access technology, applied in the secure access field of base stations, can solve problems affecting security, information monitoring, affecting the security of base stations and base station content, etc., and achieve the effect of improving security levels and ensuring security.

Inactive Publication Date: 2009-10-07
GCI SCI & TECH
View PDF2 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Especially in the suburbs, rural areas, mountainous areas and other areas, it is not only inconvenient to lay out wired cables in these areas, but also consumes a lot of manpower and material resources
Therefore, in these areas, the base station usually communicates with the base station through wireless means. Since the base station and the base station can transmit through wireless means, it is possible to illegally obtain information sent by other base stations by forging the base station, or to illegally obtain information sent by other base stations. Monitor the content transmitted between the base station and the base station, affecting the security of the content transmitted between the base station and the base station
For example, when users switch between base stations, in order to achieve the purpose of reducing the packet loss rate and seamless handover, they need to transfer sensitive data such as keys between base stations. If the content transmitted between base stations is not kept secret, Key information will face the risk of being monitored, affecting security
[0004] In order to solve the security problem of mobile communication system transmission, the solutions to the security problem proposed by the mobile communication system in the prior art are all solutions for the security problem between the user terminal and the base station. For example, the application Two patent applications with Nos. 200810027928.3 and 200810027930.0 respectively provide a secure access method for a wireless metropolitan area network, both of which are solutions for the security between the user terminal and the base station. There is no effective solution to the security problem of information transmission between the base station and the base station

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Base station secure accessing method of mobile communication system
  • Base station secure accessing method of mobile communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] The secure access method of the base station of the mobile communication system in the present invention is to ensure the security of the information transmitted between the base stations when the information is transmitted between the base stations. In order to achieve this goal, the solution of the present invention is realized by establishing a mutual trust relationship and a safe channel between two base stations that need to communicate, wherein, since the networks of the current mobile communication systems all conform to the cellular structure, the base station usually only needs to Communicate with its adjacent neighbor base stations. Therefore, the base station only needs to establish mutual trust relationships and security channels with its neighbor base stations, and does not need to establish mutual trust relationships and security channels with all other base stations, so as to reduce the need to establish mutual trust relationships between base stations. an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Base station secure accessing method of mobile communication system, including steps: a first base station sends negotiate request message of security capability; a neighbor base station judging the security capability matches whether or not with security capability of the first base station, if matching, then sending response message; the first base station accomplishes access identity identification with the neighbor base station and consulting exit passageway identification cipher key; the base station and the neighbor base station respectively identifying encryption key of cipher key derivation generating passageway via the exit passageway and passageway integrality cipher key thereby establishing exit passageway of the first base station and the neighbor base station via passageway encryption key, passageway integrality cipher key. The passageway encryption key accomplishes encrypt to data, passageway integrality cipher key assures integrality of data and non-repudiation of the information senders so that assuring safety between the first base station and the neighbor base station, improving security gradation of mobile communication system.

Description

technical field [0001] The invention relates to the technical field of mobile communication, in particular to a method for safely accessing a base station of a mobile communication system. Background technique [0002] With the development of communication technology, the application of mobile communication technology in people's life is becoming more and more extensive. Almost all aspects of people's life have been applied to wireless communication technology. In order to ensure the normal operation and operation of the mobile communication system , manageable and billable. The mobile communication system needs to authenticate the equipment and users accessing the system. Only authenticated equipment and users can be allowed to access the system network, use system network resources, and access system network resources. service provided. In a wireless broadband access system, there are generally three types of entities: terminal (Terminal), base station (Base Station, BS),...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/06H04W28/18H04W48/20H04W88/08H04W12/0431H04W12/069
Inventor 张永强林凡
Owner GCI SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products