Enhanced key update method, device and user equipment
A technology for enhancing keys and user equipment, applied in security devices, wireless communications, electrical components, etc., can solve the problem of communication security cannot be guaranteed, and achieve the effect of ensuring communication security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0053] Such as Figure 7 , 8 As shown, the principle of the present invention is: when using the horizontal key chain, the source RNC updates the enhanced key, and sends the updated enhanced key to the target RNC for use; when using the vertical key chain, the source RNC will store the The next hop enhanced key is sent to the target RNC for use. Wherein, the condition for deriving the horizontal key chain is: when the source RNC does not save the next-hop enhanced key. The condition for deriving the vertical key chain is: when the source RNC stores the next-hop enhanced key.
[0054]The present invention provides a method for updating an enhanced key, which includes: when the next-hop enhanced key is not saved at the source RNC during the migration process of the serving radio network controller, the source RNC updates the enhanced key, and the updated The enhanced key is sent to the target RNC.
[0055] Wherein, when the source RNC stores the next-hop enhanced key, the so...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


