Key generation method and apparatus
A key and a derived technology, applied in the field of key derivation methods and devices, can solve the problem that the slicing function cannot be implemented normally, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0051] According to an embodiment of the present invention, an embodiment of a key derivation method is also provided. It should be noted that the steps shown in the flow charts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and , although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0052] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, figure 2 It is a block diagram of the hardware structure of a computer terminal according to a key derivation method in the embodiment of the present invention. Such as figure 2 As shown, the computer terminal 10 may include one or more (only one is shown in the figure) processors 102 (the...
Embodiment 2
[0072] In this embodiment, a device for deriving a key is also provided, which is used to implement the above embodiments and preferred implementation modes, and what has already been described will not be repeated. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.
[0073] Figure 4 is a structural block diagram (1) of a key derivation device according to Embodiment 2 of the present invention, such as Figure 4 shown, including:
[0074] An obtaining module 40, configured to obtain a slice identifier corresponding to a network slice to which the user terminal is currently attached, wherein the slice identifier is used to uniquely identify the network slice;
[0075] The sending module 42 is configur...
Embodiment 3
[0088] In the embodiment of the present invention, a key derivation method is also provided. Figure 7 is another flowchart of the key derivation method according to Embodiment 1 of the present invention, such as Figure 7 shown, including the following steps:
[0089] Step S702, receiving a slice identifier sent by the network slice, wherein the slice identifier is used to uniquely identify the network slice;
[0090] Step S704, deriving the intermediate key required for the network slice according to the above slice identifier.
[0091] Through the above steps, the slice identifier can be sent to the designated communication device, and then the designated communication device can derive the intermediate key corresponding to the network slice according to the received slice identifier, which solves the problem of different network slices in related technologies. The problem that the slicing function cannot be realized normally due to the use of the same intermediate key ca...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com