Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, system and device for determining keys and ciphertexts

A key and key parameter technology, applied in security devices, electrical components, wireless communication, etc., can solve problems such as insufficient use of RNBearerID, insufficient number of RNBearerIDs, and reduce the security of the Un port, so as to achieve the effect of improving security

Active Publication Date: 2011-05-11
DATANG MOBILE COMM EQUIP CO LTD
View PDF3 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the same bearer ID cannot be used on different bearers using the same key, this limits the number of UEs allowed to access when only a pair of AS keys are used on the Un interface
At present, the RN Bearer ID can only represent a small number of values. When a large number of UEs access the RN equipment in the candidate architecture 4 and need to establish multiple RN wireless bearers, the RN Bearer ID may not be enough to use, thereby reducing the security of the Un interface. sex
[0012] To sum up, in the current LTE-A system, when a large number of UEs access RN devices of candidate architecture 4 and multiple RN radio bearers need to be established, the number of RN Bearer IDs is likely to be insufficient, thereby reducing the number of Un ports. safety

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and device for determining keys and ciphertexts
  • Method, system and device for determining keys and ciphertexts
  • Method, system and device for determining keys and ciphertexts

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] Aiming at the problem that the number of RN Bearer IDs in candidate architecture 4 may not be sufficient, the embodiment of the present invention proposes two solutions.

[0047] Solution 1: In the embodiment of the present invention, after the user terminal initiates an attach request, the first network-side device configures a key parameter for the user terminal, and the first network-side device and the second network-side device connected to the first network-side device respectively according to The key parameters configured by the first network side device and the preset encryption parameters determine a pair of access layer AS keys corresponding to the user terminal. Since a different key can be assigned to each user terminal according to the accessed user terminal, in the LTE-A system, when a large number of UEs access the RN equipment in candidate architecture 4, multiple RN radio bearers need to be established In this case, the security of the Un port is impro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention relates to radio communication technology, in particular to a method, a system and a device for determining keys and ciphertexts, which are used for increasing the number of keys so as to improve the security of an Un port when a plurality of pieces of user equipment (UE) access relay node (RN) equipment and a plurality of relay node (RN) radio bearers are requiredto be established in a long term evolution-advanced (LTE-A) system. The method for determining the key comprises that: after a user terminal initiates an attachment request, first network equipment configures a key parameter for the user terminal; and the first network equipment and second network equipment respectively determine a pair of access stratum (AS) keys corresponding to the user terminal according to the key parameter configured by the first network equipment and a preset encryption parameter. Through the embodiment of the invention, according to accessed user terminals, a different pair of AS keys is allocated to each user terminal, so that the security of the Un port is improved when the plurality of pieces of user equipment (UE) access relay node (RN) equipment and the plurality of relay node (RN) radio bearers are required to be established in the long term evolution-advanced (LTE-A) system.

Description

technical field [0001] The present invention relates to wireless communication technology, in particular to a method, system and device for determining keys and ciphertexts. Background technique [0002] The LTE-A (Long Term Evolution-Advanced, long-term evolution upgrade) system introduces the network architecture of RN (relay node) equipment, such as figure 1 as shown, [0003] The RN equipment is connected to the core network through a DeNB (base station). The RN equipment and the core network have no direct wireless interface, and each RN equipment can control one or more cells. Under this architecture, the interface between UE (User Terminal) and RN equipment is called Uu interface, and the interface between RN equipment and DeNB is called Un interface. [0004] exist figure 1 In the network architecture of RN, RN has dual identities: [0005] First, the RN device has the identity of the UE, that is, when the RN starts up, it is similar to the start-up attach proces...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/04H04W12/0431H04W12/0433
Inventor 杨义刘佳敏房家奕
Owner DATANG MOBILE COMM EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products