Method and system for implementing synchronous binding of safe secret keys

A technology for security keys and keys, applied in the field of security authentication, can solve the problems of inability to ensure the data security of RN and network communication, and inability to realize user authentication and device binding of the RN, and achieve the effect of protecting security.

Active Publication Date: 2011-01-12
ZTE CORP
View PDF3 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the existing legality authentication for RN cannot guarantee that a legal USIM card is inserted into a legal RN device, that is, the user authentication of RN and the binding of devices cannot be realized, so that the communication data security between RN and the network side cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for implementing synchronous binding of safe secret keys
  • Method and system for implementing synchronous binding of safe secret keys
  • Method and system for implementing synchronous binding of safe secret keys

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] Figure 4 The flow chart of the method for realizing the synchronous binding of security keys in the present invention includes the following steps:

[0056] Step 400: MME notifies RN to perform security key binding.

[0057] In this step, the MME may send a NAS message to the RN to notify the RN to bind the security key. Wherein, the NAS message can reuse the existing NAS message, such as the NAS security mode command (NAS SMC, NAS Security Mode Command) message, or the user authentication request (User Authentication Request) message, etc.; the NAS message can also be a new message, For example, a key binding request message.

[0058] If the RN and the network side agree that after the NAS message used to notify the RN to bind the security key, the security key binding process must be performed, then the NAS message in this step does not need to carry any information, it is a notification Instruction, that is, the RN and the network use an implicit method to bind t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for implementing synchronous binding of safe secret keys, comprising the following steps: after an RN is identified by a user, an MME notifies the RN to carry out safe secret key binding; and after receiving the notification, the RN carries out safe secret key binding the same as that of the network side to acquire the safe secret key bound with the equipment, and response to the MME. By the method of the invention, the safe secret key bound with the equipment obtained by the safe secret key binding, or other secret keys which are bound with the equipment and derived from the safe secret key are utilized, thus ensuring the communication data safety between the RN and the network side; and by means of the safe secret key bound with the equipment, the RN user identification and the equipment binding are realized and the RN communicated with the network side is ensured to be a legal RN with a legal USIM card, thus an illegal attacker can not decode the communication data.

Description

technical field [0001] The invention relates to a security authentication technology in an LTE network, in particular to a method and a system for realizing synchronous binding of a security key. Background technique [0002] figure 1 It is a schematic diagram of the composition structure of the Long Term Evolution (LTE, Long Term Evolution) network, such as figure 1 As shown, the LTE network is composed of Evolved Universal Terrestrial Radio Access Network (E-UTRAN, Evolved Universal Terrestrial Radio Access Network) and Evolved Packet Core (EPC, Evolved Packet Core), and the network is flat. EUTRAN is connected with EPC through S1 interface. [0003] Among them, EUTRAN is composed of multiple interconnected evolved base stations (eNB, Evolved NodeB), and each eNB is connected through the X2 interface; EPC is composed of a mobility management entity (MME, Mobility Management Entity) and a serving gateway entity (S-GW, Serving Gateway) composition. In addition, there is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/06H04W12/041
CPCH04W12/04H04W12/12H04W12/041H04W12/122
Inventor 和峰冯成燕
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products