Method and system for creating secret key as interconnecting GERAN with enhanced UTRAN

An interconnection, intermediate key technology, applied in wireless communication, wireless network protocols, electrical components, etc., can solve the problem of insecurity, security is not particularly high

Active Publication Date: 2010-12-15
ZTE CORP
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Because in the HSPA+ architecture, all RNC functions are delegated to Node B+ of the base station, the encryption and ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for creating secret key as interconnecting GERAN with enhanced UTRAN
  • Method and system for creating secret key as interconnecting GERAN with enhanced UTRAN
  • Method and system for creating secret key as interconnecting GERAN with enhanced UTRAN

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0091] This embodiment illustrates an example of the air interface key management process when the terminal moves from GERAN to enhanced UTRAN. In this embodiment, the target SGSN+ is responsible for deriving K RNC , the target RNC+ is responsible for deriving the enhanced key CK U and IK U ,Such as Figure 3a with Figure 4 shown, including the following steps:

[0092] Step 101, the source BSC decides to switch from the GERAN network to the target enhanced UTRAN network;

[0093] Step 102, the source BSC sends a handover requirement message to the source SGSN;

[0094] Step 103, the source SGSN sends a handover message to the target SGSN+, if the source SGSN is R99+SGSN, the message carries security-related parameters CK / IK; if the source SGSN is R98-SGSN, the message carries security-related parameters Kc;

[0095] Step 104, if the target SGSN supports the enhanced security function of HSPA+, that is: if the target SGSN is SGSN+, then the target SGSN+ derives the inter...

Embodiment 2

[0123] This embodiment describes an example of an enhanced air interface key establishment process when a terminal moves from GERAN to enhanced UTRAN. The difference between this embodiment and Example 1 is that: the source SGSN and the target SGSN+ are the same SGSN, and both are enhanced SGSNs, that is, SGSN+. Such as Figure 5 shown, including the following steps:

[0124] All steps are basically the same as in Embodiment 1, except that the processing in the source SGSN and the target SGSN+ in Embodiment 1 is in the SGSN+ of this embodiment, and there is no signaling interaction between the source SGSN and the target SGSN+ in Embodiment 1 .

Embodiment 3

[0126] This embodiment describes an example of an enhanced air interface key establishment process when a terminal moves from GERAN to enhanced UTRAN. The difference between this embodiment and Example 1 is: the enhanced air interface integrity key IK U and air interface encryption key CK U Generated at the target SGSN+, and sent to the target RNC+ in the relocation request message through the target SGSN+. Such as Image 6 shown, including the following steps:

[0127] Steps 301-303 are the same as Steps 101-103 of Embodiment 1;

[0128] Step 304, if the target SGSN supports enhanced security functions, that is: if the target SGSN is SGSN+, then:

[0129] The target SGSN+ derives K from the received keys IK and CK RNC ; If the target SGSN+ receives Kc, then the target SGSN+ first derives IK / CK based on Kc, and then derives K based on the IK / CK RNC ;

[0130] Then according to the intermediate key K RNC Derivation of enhanced air interface integrity key IK U and / or ai...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for creating a secret key as interconnecting a GERAN with an enhanced UTRAN. The method comprises the following steps of: obtaining a safety related parameter to an enhanced SGSN of the enhanced UTRAN service from the GERAN when a user device is moved to the enhanced UTRAN from the GERAN, generating an empty secret key of the enhanced UTRAN according to the safety related parameter, and/or generating the empty secret key of the GERAN for the enhanced SGSN of the enhanced UTRAN service and sending to the GERAN when the user device is moved to the GERAN from the enhanced UTRAN. The invention provides a system for creating a secret key as interconnecting GERAN with enhanced UTRAN.

Description

technical field [0001] The present invention relates to the field of wireless communication, in particular to a method and system for establishing an enhanced air interface key when a terminal moves from GERAN to enhanced UTRAN and from enhanced UTRAN to GERAN in a wireless communication system. Background technique [0002] 3GPP (3rd Generation Partnership Project, 3rd Generation Partnership Project) adopted Orthogonal Frequency Division Multiplexing (OFDM) and Multiple-Input Multiple-Output (MIMO) in Release7. The technology completes the future evolution road HSPA+ of HSDPA (High Speed ​​Downlink Packet Access, High Speed ​​Downlink Packet Access) and HSUPA (High Speed ​​Uplink Packet Access, High Speed ​​Uplink Packet Access). HSPA+ is an enhanced technology of 3GPP HSPA (including HSDPA and HSUPA), which provides HSPA operators with a low-complexity and low-cost smooth evolution path from HSPA to LTE. [0003] HSPA+ improves the peak data rate and spectral efficiency b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/04H04W12/041
CPCH04W12/04H04W88/14H04W80/02H04W12/0431H04W12/041
Inventor 李阳
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products