Communication security processing method, device and system

A communication security and processing method technology, applied in the field of devices and systems, and communication security processing methods, to achieve the effect of cost saving

Active Publication Date: 2017-11-21
HUAWEI TECH CO LTD
View PDF7 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The current security mechanism mainly includes authentication, non-access stratum (non-access stratum, NAS) security and access stratum (access stratum, AS) security. It is necessary to update the AS security key. In this

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication security processing method, device and system
  • Communication security processing method, device and system
  • Communication security processing method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The technical solutions in the embodiments of the present application will be clearly described below in conjunction with the accompanying drawings. Apparently, the described embodiments are only some of the embodiments of the present application, not all of them. Based on the embodiments in this application, other embodiments obtained by persons of ordinary skill in the art without making creative efforts all belong to the protection scope of this application.

[0051] 1) Terminal, also known as User Equipment (UE) or Mobile Equipment (ME), is a device that provides voice and / or data connectivity to users, for example, a handheld device with wireless connection function type equipment, vehicle equipment, etc. Common terminals include, for example: mobile phones, tablet computers, notebook computers, palmtop computers, mobile internet devices (mobile internet device, MID), wearable devices, such as smart watches, smart bracelets, pedometers, and the like.

[0052] 2) A...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a communication security processing method which is applied to AS (Access Stratum) security processing when a terminal switches from a source cell to a target cell. The communication security processing method comprises the steps of acquiring a derivation parameter, deriving a target AS root key according to a source AS root key and the derivation parameter, calculating an AS security key used in the target cell according to the target AS root key, wherein the source AS root key is an AS root key used in the source cell, the target AS root key is an AS root key used in the target cell, the derivation parameter is used for deriving the AS root key and corresponds to an RAN node, an RAN node group or a region where the target cell is located, and cells in the same RAN node, the same RAN node group or the same region have the same derivation parameter. Therefore, a terminal does not need to update an AS security key when switching in the same RAN node, the same ARN node group or the same region, and the overhead required for updating the AS security key is saved.

Description

technical field [0001] The present application relates to the technical field of communication, and in particular to a communication security processing method, device and system. Background technique [0002] With the development of wireless communication technology, the number of wireless network users is increasing day by day, and people pay more and more attention to the security of wireless communication. Therefore, the wireless network provides a security mechanism to improve the security of information transmission. The current security mechanism mainly includes authentication, non-access stratum (non-access stratum, NAS) security and access stratum (access stratum, AS) security. It is necessary to update the AS security key. In this way, as the number of cells increases and the coverage of the cell decreases, the update frequency of the AS security key will continue to increase. This frequent update of the AS security key will bring a lot of overhead . Contents o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/04H04W36/04
CPCH04W12/04H04W36/04H04W36/0038H04W36/08H04W84/042H04W12/0433H04W12/041H04W36/38
Inventor 蔺波应江威
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products