Method for realizing GBA secret key and pluggable equipment of terminal
A device and key technology, applied in the direction of synchronous sending/receiving encryption devices, digital transmission systems, electrical components, etc., can solve the problems of poor GBA shared key security, and achieve the effect of ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0036] In the embodiment of the present invention, it is necessary to configure the shared key Km in the pluggable device of the UE and the BSF device in advance, and improve the Ks or / and RES generation algorithm in the UE and BSF device, so that the UE side and the network side A unified algorithm is used to generate Ks or / and RES, and the shared Km and the random number generated by the UE pluggable device are used when generating Ks or / and RES.
[0037] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.
[0038] see image 3 , a schematic flow chart of the GBA initialization stage of the 3G network provided by the embodiment of the present invention, the flow includes:
[0039] In step 301, the UE client sends a GBA registration request (Bootstrapping_Register_REQ) message to the BSF, which carries a user identifier (such as IMPI).
[0040]In step 302, the BSF returns a GBA registration response (Bootstra...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 