Method, network equipment, user equipment and communication system for ensuring forward security

A user equipment, forward security technology, applied in the field of communication, can solve problems such as forward insecurity, and achieve the effect of simplifying the process and solving the problem of forward insecurity

Active Publication Date: 2010-06-16
HUAWEI TECH CO LTD
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to solve the problem of forward insecurity in the handover process, the embodiment of the present invention provides a method for ensuring forward security, network equipment, user equipment and communication system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, network equipment, user equipment and communication system for ensuring forward security
  • Method, network equipment, user equipment and communication system for ensuring forward security
  • Method, network equipment, user equipment and communication system for ensuring forward security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] see figure 1 , the embodiment of the present invention provides a method for ensuring forward security, the method may include:

[0041] 101: Receive the first negotiation parameter sent by the user equipment through the source base station;

[0042] The execution subject of this step may be the target base station.

[0043] 102: Select a second negotiation parameter;

[0044] The execution subject of this step may be the target base station.

[0045] 103: Send the second negotiation parameter to the user equipment through the source base station; the second negotiation parameter can be used by the user equipment to derive the access layer key by using the first negotiation parameter and the second negotiation parameter after receiving the second negotiation parameter;

[0046] The execution subject of this step may be the target base station.

[0047] 104: Acquire an access layer key according to the first negotiation parameter and the second negotiation parameter,...

Embodiment 2

[0060] An embodiment of the present invention provides a method for ensuring forward security. The applicable scenario of the method may be: the user equipment UE and the eNB support ECC (Ellipse Curve Cryptosystems, elliptic curve cryptosystem), such as figure 2 As shown, the method may specifically include:

[0061] 201: After the UE receives the message that the eNB is to be switched, the UE sends a Measurement report (measurement report) and a signature of the first negotiation parameter xP to the source eNB.

[0062] 202: The source eNB receives the measurement report and xP signature sent by the UE, and determines the target eNB for handover according to the current state of the UE carried in the measurement report and the strength of the service signal of each eNB detected by the UE.

[0063] 203: The source eNB sends a handover request message to the target eNB;

[0064] The current RRC (Radio Resource Control, radio resource control) / UP (User Plane, user plane) algo...

Embodiment 3

[0081] see image 3 , the embodiment of the present invention provides a method for ensuring forward security, the applicable scenario of the method may be: UE and eNB support ECC, the method may specifically include:

[0082] 301: After the UE receives the message that the eNB is to be switched, the UE sends a Measurement report and a signature of the first negotiation parameter xP to the source eNB.

[0083] 302: The source eNB receives the measurement report and the xP signature sent by the UE, and determines the target eNB for UE handover according to the current state of the UE carried in the measurement report and the strength of the service signal of each eNB detected by the UE;

[0084] And, the source eNB according to the key K currently used by the UE and the source eNB eNB and the Cell ID (cell ID) of the target cell, use KDF deduction to calculate K eNB * ;

[0085] 303: The source eNB sends a handover request message to the target eNB;

[0086] Carry K in the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a method, network equipment, user equipment and a communication system for ensuring forward security. The method for ensuring the forward secrecy comprises the following steps of: receiving a first negotiation parameter sent by the user equipment through a source base station; selecting a second negotiation parameter; sending the second negotiation parameter to the user equipment through the source base station; and acquiring an access layer key according to the first negotiation parameter and the second negotiation parameter. The network equipment comprises a first receiving module, a selecting module, a sending module and an access layer key acquiring module. The user equipment comprises a generation module, a first sending module, a receiving module and an acquiring module. The communication system comprises the user equipment, the source base station and a target base station. The embodiment of the invention effectively solves the problem of forward insecurity in the process of the user equipment switching eNB and also simplifies the process of the traditional scheme.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method for ensuring forward security, network equipment, user equipment and a communication system. Background technique [0002] In the SAE (System Architecture Evolution, system architecture evolution) / LTE (Long Term Evolution, long-term evolution) network, whether it is in the AS (Access Stratum, access layer) or NAS (Non Access Stratum, non-access layer), it is required Deduce the corresponding key to encrypt or integrity protect the transmitted signaling and data. UE (User Equipment, user equipment) often undergoes eNB (EvolvedNode B, evolved base station) handover in the SAE / LTE network. We call the eNB before the handover the source eNB, and the eNB after the handover is called the target eNB. To switch from a source eNB to a target eNB, it is necessary to deduce the key on the target eNB. Since the parameters used by the UE and the target eNB to deduce the new ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/32H04L12/56H04W36/00
Inventor 宋成庄小君尹瀚王绍斌
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products