Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for generating traffic encryption key

An encryption key and key technology, applied in the field of traffic encryption key generation, can solve problems such as interruption of traffic data transmission and reduction of communication service quality.

Inactive Publication Date: 2010-03-24
MEDIATEK INC
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, during the period after the handover message is sent until the TEK is received and decrypted, the transmission of traffic data is inevitably interrupted
Prolonged outages severely degrade the quality of communication services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating traffic encryption key
  • Method for generating traffic encryption key
  • Method for generating traffic encryption key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The embodiments described below are only used to illustrate the implementation of the present invention and explain the technical features of the present invention, and are not intended to limit the scope of the present invention. Any changes or equivalence arrangements that can be easily accomplished by those skilled in the art belong to the scope of the present invention, and the scope of rights of the present invention should be determined by the claims.

[0023] figure 1 Shown is a schematic diagram of a network topology of a wireless communication system according to an embodiment of the present invention. like figure 1 As shown, the wireless communication system 100 includes one or more base stations (base station 101 and base station 102) located in one or more sections (section 105 and section 106), and the base station 101 and base station 102 receive wireless communication signals , send, repeat (repeat) and other operations, and provide multiple services to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A mobile station is provided. The mobile station includes one or more radio transceiver module and a processor. The processor performs a handover negotiation procedure with a serving base station so as to handover communication services to a target base station by transm itting and r eceiving a plurality of handover negotiation messages via the radio transceiver m odule, and generates an Authorization Key (AK) context and derives at least one Traffic Encryption Key (TEK) for the target base station. The AK context includes a plurality of keys shared with the target base station for encryptingmessages to be transmitted to the target base station, and the TEK is a secret key shared with the target base station for encrypting traffic data.

Description

technical field [0001] The present invention relates to a method for deriving a traffic encryption key (Traffic Encryption Key, TEK), more specifically, a method for generating a TEK in a seamless handover procedure. Background technique [0002] In a wireless communication system, a base station (Base Station, BS) provides multiple services for multiple terminals located in a geographical area. Usually, the base station broadcasts information on the air interface to assist the terminal in identifying necessary system information and service configurations, thereby obtaining necessary network entry information, and providing information on whether to use multiple information provided by the base station. service decision. [0003] In the Worldwide Interoperability for Microwave Access (WiMAX) communication system, or applicable to IEEE802.16 and similar systems, if data encryption has been negotiated between the base station and the terminal, it is allowed to generate Then...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W88/00
CPCH04L9/0822H04L2209/80H04W12/04H04W36/08H04L9/0844H04L63/08H04L63/06H04L9/08H04W12/06H04W12/062H04W12/041
Inventor 吴怜仪李吉真傅宜康
Owner MEDIATEK INC