Method, device and system for updating key

A technology for updating keys and keys, applied in the field of communications, can solve the problems of increasing BSF load and service server load, etc., to reduce the key update load and avoid frequent updates.

Active Publication Date: 2011-05-18
CHINA MOBILE COMM GRP CO LTD
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0036] The root key Ks is limited by the validity period of the service key Ks_NAF and is constantly updated, which causes the UE to frequently visit the BSF, and also leads to frequent updates of the Ks_NAF service key, which increases the load on the BSF and the service server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for updating key
  • Method, device and system for updating key
  • Method, device and system for updating key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] In the technical solution provided by the embodiment of the present invention, the core idea is that the NAF receives the guided service identifier from the user equipment, and when it finds that there is no service key locally or the service key is not within the validity period according to the guided service identifier, it queries the BSF for the root key. The BSF receives the guidance service identifier from the NAF, and queries whether the root key is within the validity period according to the guidance service identification; if the root key is not within the validity period, returns an error message to the user equipment, and performs common guidance with the user equipment Architecture GBA initialization; if the root key is within the validity period, generate a random number, obtain a service key according to the random number, and send the service key, the validity period of the service key and the random number For the NAF, make the NAF perform two-way authen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a method for updating a key. The method comprises the following steps: receiving a bootstrapping service identifier from network application function (NAF) and inquiring whether a root key is in the valid period according to the bootstrapping service identifier; if the root key is not in the valid period, returning the error message to user equipment (UE) by NAF and ensuring NAF to initiate generic bootstrapping architecture (GBA) with the UE; and if the root key is in the valid period, generating a random number, obtaining a service key according to the random number, sending the service key, the valid period of the service key and the random number to NAF and ensuring NAF to carry out two-way authentication with the UE according to the service key and the random number. The embodiment of the invention reduces the load of bootstrapping server function (BSF) and the load of a service server. The embodiment of the invention also discloses a device and system applying the method.

Description

technical field [0001] The present invention relates to the technical field of communication, in particular to a method, device and system for updating keys. Background technique [0002] With the development of communication technology, the communication system has higher and higher requirements for network security, and the use of shared keys is an important means to ensure network security. GBA (Generic Bootstrapping Architecture) defined in 3GPP (3rd Generation Partnership Project, 3rd Generation Partnership Project) provides a common mechanism for establishing a shared key between UE (User Equipment, user equipment) and the server, The mechanism is implemented based on the AKA (Authentication and Key Agreement, authentication and key agreement) authentication mechanism. The AKA authentication mechanism is a mutual authentication and key agreement mechanism used in 2G (2ndGeneration, second-generation mobile communication technology) / 3G (3rd Generation, third-generation...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/041H04W12/0433H04W12/06
Inventor 彭华熹
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products