Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for updating air-interface keys in idle mode

An air interface key and idle mode technology, applied in security devices, electrical components, data exchange details, etc., can solve system security risks, mobile terminals cannot successfully complete key updates, etc., and achieve the effect of enhancing security

Inactive Publication Date: 2011-11-09
ZTE CORP
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] There are big differences in security processing between traditional control stations / terminals and advanced control stations / terminals. Taking 16e and 16m standards as examples, the key generation methods of mobile terminals and control stations are completely different in the two standards. After entering the network, and the 802.16m key derivation has been modified accordingly, when the mobile terminal enters the idle mode and moves between the control stations connected to the traditional network and / or the advanced network, the mobile terminal cannot successfully complete the key update, causing There is a security risk in the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for updating air-interface keys in idle mode
  • Method and system for updating air-interface keys in idle mode
  • Method and system for updating air-interface keys in idle mode

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] figure 2 A flow chart of a method for updating an air interface key in idle mode according to this embodiment is shown, including the following steps:

[0044] Step S202, the terminal increments the value of the advanced re-entry counter AK_COUNT, and calculates the modified authorization key AK* according to AK and the updated AK_COUNT value;

[0045] If the terminal in this step saves CMAC_KEY_COUNT, the terminal can convert CMAC_KEY_COUNT to AK_COUNT first, and then increment; or increment CMAC_KEY_COUNT first, and then convert CMAC_KEY_COUNT to AK_COUNT;

[0046] Step S204, the terminal calculates air interface keys such as CMAC KEYS and / or TEK according to AK*;

[0047] Step S206, the terminal sends a ranging request message to the control station, and the message carries the message integrity verification code CMAC of the ranging request message calculated by using the updated CMAC KEYS;

[0048] Step S208, after receiving the ranging request message, the contr...

Embodiment 2

[0061] image 3 It shows the flow chart of the method for updating the air interface key in the idle mode according to this embodiment. In this method, when the terminal entering the idle mode needs to perform location update or network re-entry, it is judged that the access network connected by the current control station belongs to Which type, if the current control station belongs to the traditional access network, perform the following steps:

[0062] Step S302, the terminal calculates AK based on the ABSID of the current control station and the AMSID of the terminal;

[0063] Step S304, if the terminal saves CMAC_KEY_COUNT, the terminal converts CMAC_KEY_COUNT into AK_COUNT, and then the terminal increments the value of the re-entry counter AK_COUNT; the terminal calculates the modified authorization key AK* according to the updated AK and AK_COUNT values; wherein the value of calculating AK and incrementing AK_COUNT Operations are in no particular order;

[0064] Step ...

Embodiment 3

[0077] Figure 4 It shows the flow chart of the method for updating the air interface key in the idle mode according to this embodiment. In this method, when the terminal enters the idle mode or performs location update, the paging controller or authenticator saves the AMSID* information of the terminal . When a terminal entering idle mode needs to perform location update or network re-entry, it is judged whether the current control station is the same as the control station that performed location update last time or the service control station before the terminal entered idle mode (if the terminal has not yet entered idle mode). have performed location update) whether the connected access networks are of the same type, if they are all advanced access networks, perform the following steps:

[0078] Step S402, the terminal calculates AK based on the ABSID of the current control station and the AMSID* information of the terminal;

[0079] Step S404, the terminal increments th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and system for updating air-interface keys in the idle mode, belonging to the field of wireless communication. The method comprises the step as follows: when a terminal in the idle mode carries out location update or network reentry in a serving cell of a control station, the terminal and the control station respectively generate variant authorization keys according to authorization keys and update respective air-interface keys according to the variant authorization keys. By using the method and system, the problem that the terminal can not smoothly complete the update of the air-interface key when the traditional access network is introduced is solved; and the security of the system is enhanced.

Description

technical field [0001] The invention relates to the field of wireless communication, in particular to a method and system for updating an air interface key in an idle mode. Background technique [0002] In a wireless communication system, a base station (Base Station, BS for short) uses a designated wireless channel to provide wireless coverage within a certain geographic range, and this geographic range is called a cell. Usually, in theory, the base station is located in the center of the cell. According to the coverage area, base stations can be divided into macro base stations (Macro BS), micro base stations (PICO BS), and pico base stations (FEMTOCELL BS). In addition, in order to extend coverage or expand capacity, one or more relay stations can be placed between the mobile station and the base station. For the mobile station, the relay station is equivalent to a base station. When a mobile station moves from one cell to another, handover is required in order to main...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/04H04L12/06H04W92/10H04W12/0433
CPCH04W12/08H04W60/04H04W12/04H04W12/63
Inventor 冯成燕陈琳谢峰刘扬陈玉芹甘露江辉
Owner ZTE CORP