Safety negotiation method and device during switching among different wireless access technologies

A wireless access technology and security technology, applied in security devices, wireless communications, electrical components, etc., can solve problems such as inapplicable terminal switching to LTE system

Active Publication Date: 2011-10-05
HUAWEI TECH CO LTD
View PDF1 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When switching between 2G and 3G, the security information processed on the SGSN side only involves the AS, not the security information of the NAS. Therefore, the above-mentioned process of negotiating between the terminal and the 2G or 3G system cannot be applied to the terminal switching from 2G or 3G to LTE systematic process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety negotiation method and device during switching among different wireless access technologies
  • Safety negotiation method and device during switching among different wireless access technologies
  • Safety negotiation method and device during switching among different wireless access technologies

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Embodiments of the present invention provide a method and device for security negotiation when switching between different wireless access technologies.

[0041] The handover of the terminal between different radio access technologies in the embodiment of the present invention includes the handover of the terminal from a different system to the LTE system. The following uses the handover of the terminal from the UTRAN system to the LTE system as an example to illustrate the method and device in the embodiment of the present invention.

[0042] In the embodiment of the present invention, when the terminal is handed over from the UTRAN system to the LTE system, the Target MME (Mobile Management Entity, target mobile management entity) generates information related to NAS security and sends it to the Target eNB (target evolved base station), and the Target eNB Information related to AS security is also generated, and a Transparent Container is formed according to the security...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a safety negotiation method and device during switching among different wireless access technologies, wherein the method mainly comprises the following steps: when a terminal is switched among different wireless access technology, containing security information of NAS (non access stratum) and AS (access stratum) selected by a target system into a Transparent Container; and transmitting the content in the Transparent Container to a terminal, and carrying out security negotiation with the target system by the terminal according to the content in the Transparent Container. The device mainly comprises eNB (evolved node B) equipment and source Access Network equipment. According to the invention, the terminal can obtain secret key parameter information of the NAS and AS selected by an LTE (long term evolution) system when being switched from a direct return system (universal terrestrial radio access network) into the LTE system, so as to carry out security negotiation with the LTE system.

Description

technical field [0001] The invention relates to the field of mobile communication, in particular to a method and device for security negotiation when switching between different wireless access technologies. Background technique [0002] In a mobile communication system, when a terminal moves from a local base station to a target base station, handover between base stations is usually involved. The wireless access network of the base station includes 2G (Second Generation, second generation mobile communication), 3G (Third Generation Generation, third-generation mobile communication) and future LTE (Long Term Evolve, long-term evolution) systems, etc., and the security protection levels and protection measures between terminals and various wireless access networks are different. [0003] The schematic diagram of the structure of the two security-related layers in the LTE system is as follows: figure 1 shown, from figure 1 It can be seen that the Xu interface, S1-C, S1-U, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W36/14H04W12/041H04W12/0431
Inventor 徐小英陈璟
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products