Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and arrangement in a telecommunication system

A technology for user equipment and evolved packet systems, applied in the field of security keys for protecting RRC/UP services, and security solutions, which can solve problems such as the additional complexity of a single serial number and the impossibility of deriving K_eNB

Active Publication Date: 2010-08-11
TELEFON AB LM ERICSSON (PUBL)
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the disadvantage of this known solution is that if no explicit NAS service acceptance message from MME to UE is defined, as in figure 1 As in the exemplary conventional EPS signaling flow in , then it is impossible for the UE to derive the same K_eNB as the MME
However, the disadvantage of this solution is the additional complexity of a separate sequence number, since it has to be kept in both UE and MME in order to prevent replay attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and arrangement in a telecommunication system
  • Method and arrangement in a telecommunication system
  • Method and arrangement in a telecommunication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In the following description, specific details are set forth, such as a specific architecture and sequence of steps, in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced in other embodiments that may depart from these specific details.

[0026] Furthermore, it will be apparent that the described functions may be implemented using software running in conjunction with a programmed microprocessor or general purpose computer, and / or using application specific integrated circuits. Where the invention has been described in the form of a method, the invention can also be embodied in a computer program product as well as in a system comprising a computer processor and memory in which one or more programs that can perform the described functions are utilized to encode the memory.

[0027] The idea of ​​the invention is to derive the security key K_eNB from the A...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A security key, K_eNB, for protecting RRC / UP traffic between a User Equipment, UE, (11) and a serving eNodeB (12) is established by a method and an arrangement in a Mobility Management Entity (13), MME, and in said UE (11), of an Evolved Packet System, EPS. The MME and the UE derives the security key, K_eNB, from at least an NAS uplink sequence number, NAS_U_SEQ, sent from the UE to the MME, and from an Access Security Management Entity-key, K_ASME, shared between the MME and the UE.

Description

technical field [0001] The present invention relates to methods and devices in telecommunication systems, and in particular to the implementation of UE-triggered service requests in EPS (Evolved Packet System), namely E-UTRAN (Evolved UMTS Terrestrial Radio Access Network) and EPC (Evolved Packet Core Network) security solutions. More specifically, the present invention relates to a method and apparatus for establishing security keys for protecting RRC / UP traffic in MME (Mobility Management Entity) and UE (User Equipment) of EPS (Evolved Packet System). Background technique [0002] In the EPS architecture, user authentication is performed between UE and MME (Mobility Management Entity), and the MME manages eg mobility, UE identity and security parameters. The basis for defining security procedures in the EPS is the security key K_ASME, which is shared between the MME and the UE and established when the UE is authenticated. A functional entity of the EPS architecture calle...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06H04L9/32
CPCH04L2209/80H04W8/20H04L9/08H04W92/10H04W12/04H04L63/062H04L9/083H04L2463/061H04W12/041H04W12/0471H04L9/0816H04L2209/24H04L9/0869
Inventor R·布洛姆G·米尔德K·诺尔曼
Owner TELEFON AB LM ERICSSON (PUBL)