Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for providing security from a radio access network

A technology for radio access and network systems, applied in the field of providing security and systems from a radio access network, can solve problems such as unfavorable security viewpoints, few base stations, and endangering communication security.

Active Publication Date: 2016-08-03
KONINK KPN NV +1
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] This approach is disadvantageous from a security point of view
Although the AuC element or AuC part of the core network system is a highly secure and strictly protected environment, it is less for the base station
Therefore, storing secret keys in each base station may compromise communication security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for providing security from a radio access network
  • Method and system for providing security from a radio access network
  • Method and system for providing security from a radio access network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0076] figure 1 A schematic illustration of a telecommunications system 1 is shown. The telecommunication system 1 comprises a radio access network system 2 (in figure 1 Also indicated as E-UTRAN or RAN) and a control network system 3 comprising various elements or nodes as described in further detail below.

[0077] exist figure 1 In the telecommunication system of , three generations of networks are schematically depicted together for the sake of brevity. A more detailed description of the architecture and overview can be found in 3GPP TS 23.002, which is incorporated by reference in this application in its entirety.

[0078] figure 1 The lower subdivision of represents a GPRS or UMTS network.

[0079] For a GSM / GPRS network, the radio access network system 2 includes a number of base stations (a combination of BSCs and BTSs) and one or more radio network controllers (RNCs), not shown separately in figure 1 middle. The core network system 3 includes a Gateway GPRS Sup...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The disclosure relates to a security method and system in a telecommunications network comprising a radio access network system and a core network system. The radio access network system is configured to provide a wireless radio interface for at least one user device, wherein a shared secret key is stored in both the user device and the core network system. At least one vector is received from the core network system comprising one or more values derived from the shared secret key. At least one of an authentication procedure and a key agreement procedure is performed in the radio access network system for the user device over the wireless radio interface using the one or more values of the received vector for establishing a connection between the user device and the radio access network system.

Description

technical field [0001] The present invention relates to a method and system for providing security from a radio access network. More specifically, the present invention relates to a method and system for providing security from a radio access network in situations where security functionality is not available or not available from a core network system. Background technique [0002] During the last decade, mobile telecommunications has become the dominant form of communication, and further growth is expected in the next few years. Mobile telecommunications relies on the existence of radio access network systems that provide radio coverage through base stations (eg (e)NodeBs) in areas through which mobile user equipment can move. The base station is connected to the core network system of the telecommunications provider in order to allow the establishment of communication services. The core network system includes several further telecommunications nodes. [0003] One such...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W4/22H04W4/90
CPCH04W88/08H04L63/0884G06F16/22H04W12/0431H04W12/062H04W12/06H04W12/04H04L63/0428H04L63/083
Inventor F.弗兰森
Owner KONINK KPN NV