Method, system, device and terminal for processing secret keys

A processing method and key technology, which is applied to the public key and key distribution of secure communication, can solve the problems of reducing the network security of the access network, and achieve the effect of improving network security and avoiding repeated use

Inactive Publication Date: 2009-12-23
HUAWEI TECH CO LTD
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the process of researching the existing technology, the inventor found that when the UE switches back and forth between different access networks, the keys in the same type of access network are completely consistent, that is, the same key will be used in the same type of access network In particular, when switching between access networks in a short period of time, the repeated use of this key will lead to when an access network is compromised, the access network of the same type is also compromised at the same time , thereby reducing the network security of the access network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system, device and terminal for processing secret keys
  • Method, system, device and terminal for processing secret keys
  • Method, system, device and terminal for processing secret keys

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Embodiments of the present invention provide a key processing method, system, device, and terminal. On the network side, after receiving the handover request message, the second key of the first network is obtained according to the first key of the first network and network parameters, and is sent to the The second network sends a handover request message including the second key; the second network acquires the key of the second network according to the second key, and sends a handover request response message to the first network.

[0036] On the terminal side, after receiving the switching command, obtain the second key of the first network according to the saved first key and network parameters of the first network, and obtain the key of the second network according to the second key of the first network. In order to enable those skilled in the art to better understand the technical solutions provided by the embodiments of the present invention, the technical solutio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method, a system, a device and a terminal for processing secret keys, wherein the method for processing secret keys comprises the following steps: receiving a handover request message; acquiring a second secret key of a first network according to a first secret key and network parameters of the first network; and sending a handover request message containing the second secret key to a second network. By applying the embodiment of the invention to process the secret keys, when a UE is handed over among different access networks, secret keys of various access networks are ensured to be different before and after handover by inputting network parameters of the access networks in functions for educing the secret keys, thereby the same secret key is repeatedly used in the same kind of access networks, especially the problem that the same kind of access networks are also broken through as a certain access network is broken through when the access networks are handed over in a shorter period, and the network security of the access networks is improved.

Description

technical field [0001] The present invention relates to the technical field of communications, in particular to a key processing method, system, device and terminal during network switching. Background technique [0002] The existing 3GPP (Third Generation Partnership Project, Third Generation Partnership Project) wireless network is divided into two parts according to the network, the wireless access network and the core network; the wireless access network is divided into 2G access network GERAN according to the type , 3G access network UTRAN and LTE ((Long Term Evolution, Long Term Evolution) access network EUTRAN. For example figure 1 Shown is a schematic structural diagram of a 3GPP wireless network, which shows the above three wireless access networks, the core network corresponding to GERAN and UTRAN is PS (packet domain), and the core network corresponding to EUTRAN is SAE (system architecture evolution). [0003] Taking 3G access network UTRAN and LTE access netwo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/30
Inventor 何承东
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products