Key generation method and system in switching process

A switching process and key generation technology, which is applied to electrical components, security devices, wireless communications, etc., can solve problems such as potential safety hazards in communication systems, improve security, and avoid illegal acquisition of the next-hop key KeNB Likelihood, the effect of guaranteeing forward security

Inactive Publication Date: 2013-06-05
ZTE CORP
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The source eNB can derive the key KeNB when the next hop of the UE changes, which may be used, thus causing security risks to the communication system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key generation method and system in switching process
  • Key generation method and system in switching process
  • Key generation method and system in switching process

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The basic idea of ​​the present invention is: during the X2 handover process, the source eNB no longer derives the next hop key for the target eNB, and the source eNB only provides the next hop counter NCC value for the target eNB. The target eNB uses the NCC value to keep the NHs in the UE and MME entities synchronized, so that the same KeNB is saved in the UE and the MME. The target eNB uses the NCC value to apply to the MME for the same KeNB as the UE, so as to keep its own KeNB consistent with the UE's KeNB. During the handover process, the NH no longer leaves the MME, the eNB cannot obtain the NH, and the eNB has no ability to deduce the NH (the calculation of the NH must have Kasme), so the source eNB cannot obtain the KeNB of the target eNB in ​​the next hop transition, which solves the forward security question.

[0057] In order to make the purpose, technical solutions and advantages of the present invention more clear, the following examples are given and the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a key generation method and system in a switching process. The method includes that a network side uses next hop parameter NH to generate next hop secret key evolved node B (KeNB) in user equipment (UE) switching process; a base station is not informed of the NH generated by the network side; the network side and the UE side respectively use next hop chaining counter (NCC) values informed by a target base station to synchronize with next hop KeNB; and the target base station is informed of the next hop KeNB generated by the network side. The base station can not acquire NH, so that the next hop KeNB can not be generated, the possibility of illegally acquiring next hop KeNB is reduced, and the forward security is guaranteed. By means of the method and the system, the safety of a communication system is greatly improved.

Description

technical field [0001] The invention relates to key generation technology, in particular to a method and system for key generation during handover. Background technique [0002] The Evolved Packet System (EPS, Evolved Packet System) of the 3rd Generation Partnership Project (3GPP, 3rd Generation Partnership Project) is composed of the Evolved Universal Terrestrial Radio Access Network (E-UTRAN, Evolved Universal Terrestrial Radio Access Network) and the EPS core Network (Evolved Packet Core) composition. E-UTRAN is composed of base station equipment-evolved Node B (eNB, Evolved Node B) and core network equipment-mobility management entity (MME, Mobility Management Entity). A user equipment (UE, User Equipment) communicates with an eNB through a wireless air interface, and communicates with an MME through the eNB. [0003] In the communication protocol architecture of the Long Term Evolution (LTE, Long Term Evolution) system, the protocol layer is divided into an access str...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W92/12H04W92/20H04W12/041H04W12/106
CPCH04W12/04H04W36/0038H04W12/041
Inventor 曹岚健余万涛
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products