Method, apparatus and system for establishing security context
A contextual and secure technology, applied in the field of communication, can solve the problems of Uu’ interface without security protection, unable to guarantee the security of user plane data transmission, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0087] The embodiment of the present invention provides a method for establishing a security context, such as figure 1 As shown, the method includes the following steps:
[0088] 101. The base station acquires the encryption algorithm of the Hi AP.
[0089] The encryption algorithm is used to encrypt and protect the user plane data transmitted on the SCC. In the embodiment of the present invention, an Advanced Encryption Standard (AES) algorithm is used as the encryption algorithm as an example for illustration, and there is no limitation to this in practical applications.
[0090] 102. The base station acquires the root key.
[0091] The root key is used to derive an encryption key.
[0092] 103. The base station deduces the encryption key of the Hi AP according to the root key and the encryption algorithm.
[0093] Both the Hi AP and the UE need to deduce the encryption key. This step is a description of deriving the Hi AP encryption key. The encryption key on the UE sid...
Embodiment 2
[0103] The embodiment of the present invention provides a method for establishing a security context, the method is a further extension of the first embodiment, as figure 2 As shown, the method includes the following steps:
[0104] 201. The base station acquires the encryption algorithm of the Hi AP.
[0105] The encryption algorithm is used to encrypt and protect the user plane data transmitted on the SCC. In the embodiment of the present invention, the AES algorithm is used as the encryption algorithm as an example for description, and this is not limited in practical applications.
[0106] The base station can obtain the encryption algorithm in at least two ways:
[0107] 1) The base station receives the AES algorithm selected by the Hi AP, and the AES algorithm is an encryption algorithm with the highest priority selected by the Hi AP according to its own security capability, security policy, and UE security capability. Before receiving the AES algorithm selected by t...
Embodiment 3
[0133] The embodiment of the present invention provides a method for establishing a security context, such as image 3 As shown, the method includes the following steps:
[0134] 301. The Hi AP receives the encryption key sent by the base station.
[0135] Both the Hi AP and the UE need to deduce the encryption key. This step is a description of the Hi AP receiving the encryption key derived by the base station, and the encryption key on the UE side is independently deduced by the UE.
[0136] It should be noted that the embodiment of the present invention is described using the symmetric key encryption method as an example, so the root key used for deriving the encryption key on the base station side and the UE side is the same. In practical applications, the root key on the base station side After the key is authenticated, the MME sends it to the base station, and the base station deduces the encryption key for the Hi AP according to the root key and encryption algorithm. ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


