Unlock instant, AI-driven research and patent intelligence for your innovation.

Key processing method and device

A processing method and key technology, applied in the field of communication, can solve the problems of inability to provide protection in a secure context and affecting the smooth progress of business

Active Publication Date: 2017-03-15
ZTE CORP
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The present invention provides a key processing method and device to at least solve the problem in the prior art that when a terminal supporting different network standards switches network standards, it cannot provide protection for the security context and affects the smooth progress of services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key processing method and device
  • Key processing method and device
  • Key processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Hereinafter, the present invention will be described in detail with reference to the drawings and examples. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0025] In this embodiment, a key processing method is provided, figure 1 is a flowchart of a key processing method according to an embodiment of the present invention, such as figure 1 As shown, the process includes the following steps:

[0026] Step S102, obtaining a first key corresponding to the authentication type of the source network according to the authentication type of the source network, for example, the source network may be the Global System for Mobile Communications (GSM);

[0027] Step S104, obtain one or more second keys corresponding to the authentication type of the target network according to the above-mentioned first key, for example, the target network may be the Universal Mobi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a key processing method and device. The method includes: obtaining a first key corresponding to the source network's authentication type according to the source network's authentication type; and obtaining the target network's authentication key according to the first key. One or more second keys corresponding to the right type; when the service is switched from the source network to the target network, the service is keyed according to one or more second keys, and the present invention solves the problems of the prior art When switching between different network standards, the terminal cannot provide protection for the security context in a timely manner, which affects the smooth operation of the business, and thus achieves the timely provision of correct information for multi-standard terminals when switching between different systems. Key, so as to ensure the smooth progress of terminal business.

Description

technical field [0001] The present invention relates to the communication field, in particular, to a key processing method and device. Background technique [0002] In mobile communication, authentication has two functions: identifying identity and providing keys for establishing a security context. At the beginning of the authentication process, the network side sends a string of random numbers to the mobile terminal, and the mobile terminal uses the random number and the mobile terminal's International Mobile Subscriber Identification Number (IMSI for short), and according to the authentication algorithm, calculates The authentication response is sent to the network side. In addition, the terminal also needs to calculate the key needed to establish the security context, so that the service data can be encrypted and integrity protected during the service process. For example, in the standard of the Global System for Mobile Communications (GSM system for short), an encrypt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W12/069
Inventor 唐磊
Owner ZTE CORP