Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, system and equipment for confirming AS key

A key and device determination technology, applied in electrical components, wireless communication, connection management and other directions, can solve the problems affecting the security of UE and target base station, increase the call drop rate of UE and target base station, etc. The effect of improving user experience and ensuring security

Active Publication Date: 2011-06-01
DATANG MOBILE COMM EQUIP CO LTD
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the handover fails, the UE reselects a cell and initiates an RRC connection re-establishment request, which will cause the UE to still use the AS key used by the source cell. If the UE reselects a cell that is not under the source base station, there may be a The AS algorithm and the AS algorithm selected by the target base station are inconsistent, so that the target base station refuses UE access, or the target base station requires the UE to perform intra-cell handover because of the need to change the AS algorithm after successful reconstruction, thus affecting the security between the UE and the target base station , also increases the call drop rate between the UE and the target base station

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and equipment for confirming AS key
  • Method, system and equipment for confirming AS key
  • Method, system and equipment for confirming AS key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In the embodiment of the present invention, when the network side device allows the user terminal to access the cell corresponding to the message integrity check code, it sends the AS algorithm information to the user terminal, and the user terminal determines the AS key according to the AS algorithm information. Since it can be guaranteed that the AS key used by the user terminal is the same as the AS key used by the target network side device, the reconstruction can be successful even when the cell reselected by the user terminal UE is not the cell under the source base station, and the user terminal does not need to carry out intra-cell Handover, thereby ensuring the security between the user terminal and the target base station, and also reducing the call drop rate between the user terminal and the target base station.

[0025] Wherein, the method, system and device of the embodiments of the present invention may be applied in an LTE system, an LTE-A (Long Term Evolu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention relates to a wireless communication technology, in particular to a method, system and equipment for confirming an AS key. The invention is used for solving the problems that the safety between UE (User Equipment) and a target base station is influenced and the call dropping rate between the UE and the target base station is increased because an AS algorithm used bythe UE and an AS algorithm selected by the target base station are inconsistent with each other in the prior art. The method disclosed by the embodiment of the invention comprises the following steps: network side equipment receives a message integrity check code derived from the user terminal; and the network side equipment transmits AS algorithm information to the user terminal when allowing the user terminal to be accessed into a cell corresponding to the message integrity check code so as to indicate the user terminal to confirm an AS key according to the AS algorithm information. By adopting the embodiment of the invention, the safety between the user terminal and the target base station can be ensured, and the call dropping rate between the user terminal and the target base station can be reduced.

Description

technical field [0001] The present invention relates to wireless communication technology, in particular to a method, system and equipment for determining an AS (Access Stratum, Access Stratum) key. Background technique [0002] In the LTE (Long Term Evolution, long-term evolution) system, when UE (user terminal) performs handover between eNBs (base stations), including X2 handover and S1 handover, the source eNB initiates a handover request to the target eNB, and then the target eNB Generate a handover command and send it to the UE through the source eNB. The handover command includes the AS algorithm identifier selected by the target eNB, and the UE can determine the AS key used in the target cell according to the AS algorithm identifier. After the UE successfully switches to the target cell, the air interface signaling and data are protected according to the determined AS key. [0003] If the handover of the UE fails, the UE needs to perform an RRC connection re-establi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W76/02H04W12/0433H04W12/106
Inventor 杨义梁靖
Owner DATANG MOBILE COMM EQUIP CO LTD