Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access layer and non-access layer secret key safety isolation device and method thereof

A non-access layer key and access layer key technology, applied in the field of communication, can solve problems such as the inability of wireless communication network system to be implemented, and achieve the effect of realizing security isolation, ensuring security, and improving security.

Active Publication Date: 2017-03-22
THE PLA INFORMATION ENG UNIV
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Based on the above-mentioned problems in the prior art, there is an urgent need for a key security isolation scheme between the access layer and the non-access layer, which can make the attack method similar to stealing the access network key by the core network in the wireless communication network system unfeasible

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access layer and non-access layer secret key safety isolation device and method thereof
  • Access layer and non-access layer secret key safety isolation device and method thereof
  • Access layer and non-access layer secret key safety isolation device and method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] Embodiment one, see figure 1 As shown, an access layer and non-access layer key security isolation device includes a key generation module and a key update module, and the key generation module includes access layer keys that generate keys independently of each other A generation unit, a non-access stratum key generation unit, wherein, the access stratum key generation unit, the terminal and the access point generate the key used for the air communication link between the terminal and the access point based on the characteristics of the wireless communication channel of both parties The access stratum key; the non-access stratum key generation unit, the terminal and the control center generate the non-access stratum key for use in the communication link between the terminal and the control center based on the terminal identity information;

[0037] The key updating module includes an access stratum key updating unit and a non-access stratum key updating unit that comple...

Embodiment 2

[0040] Embodiment two, see Figure 1~2 As shown, a security isolation method for access layer and non-access layer keys includes the following steps:

[0041] Step A, key generation, the terminal and the access point generate the access layer key based on the characteristics of the wireless communication channel of both parties; the terminal and the control center generate the non-access layer key based on the terminal identity information; the generation of the access layer key and the non-access layer key The generation of the access layer key is completed independently of each other;

[0042] Step B, key use, the access layer key completes information encryption and integrity protection in the air communication link between the terminal and the access point; the non-access layer key completes the information encryption and integrity protection in the communication link between the terminal and the control center Encryption and integrity protection of information on the roa...

Embodiment 3

[0045] Embodiment three, see Figure 1-7 As shown, a security isolation method for access layer and non-access layer keys includes the following content:

[0046] First, key generation, including: the generation of the access layer key and the generation of the non-access layer key are completed independently of each other, and the specific content is as follows:

[0047] 1) Access layer key generation: The terminal and the access point generate an access layer key based on the characteristics of the wireless communication channel between the two parties, including the following:

[0048] Step A1, the terminal and the access point respectively transmit pre-agreed transmission signals to each other in the same time slot;

[0049] Step A2: The terminal and the access point respectively obtain the first channel impulse response and the second channel impulse response according to the received signal and the pre-agreed transmission signal in step A1;

[0050] Step A3: The terminal...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an access layer and non-access layer secret key safety isolation device and a method thereof. The method comprises steps that an access layer secret key is generated by a terminal and an access point on the basis of both-way radio communication channel characteristics; a non-access layer secret key is generated by a terminal and a control center on the basis of the terminal identity information; an update process of the access layer secret key and an update process of the non-access layer secret key are completely independent, the access layer secret key can be randomly updated according to change of the radio communication channel characteristics. According to the method, uniqueness, reciprocity and time-dependent nature of a radio channel are utilized, the physical secret key for access layer encryption and integrity protection is generated, updated and managed by the access point and the terminal, the secret key for non-access layer encryption and integrity protection is generated, updated and managed by the safety control center and the terminal on the basis of identity identification, so not only can safety isolation of the access layer secret key and the non-access layer secret key be realized, radio communication safety is improved, but also access layer secret key distribution can be avoided, and system transmission efficiency is improved.

Description

technical field [0001] The invention belongs to the technical field of communication, and in particular relates to an access layer and non-access layer key security isolation device and method thereof. Background technique [0002] At present, the IP-based mobile communication network has made the core network more open, and application developers and interactive services will have more access to the core network and databases, and the application of IP technology enables thieves to The software and hardware transformation of the equipment, imitation, camouflage, and tampering of the core network network nodes, to achieve the purpose of illegal monitoring or stealing data. Secondly, in the current mobile communication system, the access layer key or its generation parameters are generated by the core network nodes through the terminal identity information and distributed to the access point, so the core network nodes store the access layer key or its generation parameters ....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02H04W12/04H04W12/10H04W12/0433
CPCH04W12/02H04W12/04H04W12/10
Inventor 赵华金梁黄开枝汤红波朱可云周游王晓雷钟州游伟杨梅樾赵宇陈丹
Owner THE PLA INFORMATION ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products