Unlock instant, AI-driven research and patent intelligence for your innovation.

Security key generation for dual connectivity

A security key and dual-connection technology, which is applied in the field of security keys in dual-connection scenarios

Active Publication Date: 2017-10-17
TELEFON AB LM ERICSSON (PUBL)
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this approach creates problems related to the handling of security keys used for confidentiality and integrity protection of data transmitted to and from the mobile terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security key generation for dual connectivity
  • Security key generation for dual connectivity
  • Security key generation for dual connectivity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The inventive concept will now be described more fully hereinafter with reference to the accompanying drawings, in which examples of embodiments of the inventive concept are shown. These inventive concepts may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the inventive concept to those skilled in the art. It should also be noted that these embodiments are not mutually exclusive. Components from one embodiment may be implicitly assumed to be present in, or used in, another embodiment.

[0040] For purposes of illustration and explanation only, these and other aspects of the inventive concept are described herein in the context of operating in a radio access network (RAN) communicating with mobile terminals (also referred to as wireless terminals or UEs) over radio comm...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Techniques for the secure generation of a set of encryption keys to be used for communication between a wireless terminal and an assisting base station in a dual-connectivity scenario. An example method includes generating (810) an assisting security key for the assisting base station, based on an anchor base station key. The generated assisting security key is sent (820) to the assisting base station, for use by the assisting base station in encrypting data traffic sent to the wireless terminal or in generating one or more additional assisting security keys for encrypting data traffic sent to the wireless terminal while the wireless terminal is dually connected to the anchor base station and the assisting base station. The anchor base station key, or a key derived from the anchor base station key, is used (830) for encrypting data sent to the wireless terminal by the anchor base station.

Description

[0001] This application is a divisional application of an invention patent application with an application date of January 30, 2014, an application number of 201480006530.5, and an invention title of "Security Key Generation for Dual Connectivity". technical field [0002] The techniques disclosed herein relate generally to wireless telecommunications networks, and more particularly to techniques for handling security keys in dual connectivity scenarios, ie, scenarios in which a mobile terminal is simultaneously connected to multiple base stations. Background technique [0003] In a typical cellular radio system, mobile terminals (also referred to as user equipment UE, wireless terminal, and / or mobile station) communicate via a radio access network (RAN) with one or more core networks, which The core network provides access to data networks, such as the Internet, and / or to the Public Switched Telecommunications Network (PSTN). The RAN covers a geographical area divided into ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/04
CPCH04L63/061H04W12/04H04W36/0069H04W12/041H04W12/0433H04L9/0869H04L2209/80H04L9/14H04L9/0643H04L2209/24H04L69/08
Inventor S·瓦格尔V·维尔基O·特耶布N·约翰逊K·诺曼
Owner TELEFON AB LM ERICSSON (PUBL)