Key generating and distributing method and system
A key and medium key technology, applied in wireless communication, electrical components, security devices, etc., can solve the problems of lack of mobile IP channels and the inability to establish keys for user authentication, and achieve the effect of ensuring continuity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0062] In the present invention, when the terminal accesses the WiMAX core network through the WiFi network, in the process of access authentication, the MSK and EMSK of the WiFi network are generated between the terminal and the AAA server of the WiMAX core network; the AAA server will MSK, and the key derived from EMSK are sent to the authenticator of the WiFi network; the authenticator of the WiFi network uses the MSK for air interface authentication; when the terminal initiates a PMIP (Proxy Mobile IP, proxy mobile IP) registration , the authenticator of the WiFi network passes the key derived from the EMSK required for PMIP registration to the interworking unit for user authentication of the mobile IP channel between the interworking unit and the gateway of the WiMAX core network;
[0063] In addition, for the same subscriber, the terminal, the AAA server and gateway of the WiMAX core network support only one set of keys to support two sets of keys, one set of keys is used...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 