Key generation method and apparatus

A key and a derived technology, applied in the field of key derivation methods and devices, can solve the problem that the slicing function cannot be implemented normally, etc.

Active Publication Date: 2018-02-06
ZTE CORP
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The embodiment of the present invention provides a key derivation method and device to at least solve the problem that network slices with different related technologies may use the same intermediate key and the slice function cannot be realized normally.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key generation method and apparatus
  • Key generation method and apparatus
  • Key generation method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] According to an embodiment of the present invention, an embodiment of a key derivation method is also provided. It should be noted that the steps shown in the flow charts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and , although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0052] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, figure 2 It is a block diagram of the hardware structure of a computer terminal according to a key derivation method in the embodiment of the present invention. Such as figure 2 As shown, the computer terminal 10 may include one or more (only one is shown in the figure) processors 102 (the...

Embodiment 2

[0072] In this embodiment, a device for deriving a key is also provided, which is used to implement the above embodiments and preferred implementation modes, and what has already been described will not be repeated. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.

[0073] Figure 4 is a structural block diagram (1) of a key derivation device according to Embodiment 2 of the present invention, such as Figure 4 shown, including:

[0074] An obtaining module 40, configured to obtain a slice identifier corresponding to a network slice to which the user terminal is currently attached, wherein the slice identifier is used to uniquely identify the network slice;

[0075] The sending module 42 is configur...

Embodiment 3

[0088] In the embodiment of the present invention, a key derivation method is also provided. Figure 7 is another flowchart of the key derivation method according to Embodiment 1 of the present invention, such as Figure 7 shown, including the following steps:

[0089] Step S702, receiving a slice identifier sent by the network slice, wherein the slice identifier is used to uniquely identify the network slice;

[0090] Step S704, deriving the intermediate key required for the network slice according to the above slice identifier.

[0091] Through the above steps, the slice identifier can be sent to the designated communication device, and then the designated communication device can derive the intermediate key corresponding to the network slice according to the received slice identifier, which solves the problem of different network slices in related technologies. The problem that the slicing function cannot be realized normally due to the use of the same intermediate key ca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a key generation method and apparatus. The method includes: obtaining a slice identifier corresponding to a network slice currently attached to a user terminal, wherein the slice identifier is used for identifying the network slice in a unique manner; and sending the slice identifier to a specified communication device, wherein the slice identifier is used for indicating generation of an intermediate key required by the network slice according to the slice identifier to the specified communication device. By employing the above technical scheme, the problem that in the related technology, different network slices possibly use the same intermediate key so that the functions of the slices cannot be normally realized is solved, different network slices correspond to different intermediate keys, and the condition that the functions of the slices cannot be normally used since the same intermediate key is distributed to different network slices is avoided.

Description

technical field [0001] The present invention relates to the field of communication, in particular to a key derivation method and device. Background technique [0002] Mobile communication has developed rapidly in more than 20 years, which has brought a huge impact on people's life style, work style, social politics, economy and other aspects. Human society has entered an efficient information age, and the demand for various business applications has shown explosive growth, which has brought huge challenges to the future wireless mobile broadband system in terms of frequency, technology, and operation. [0003] In addition to providing services for everyone's communication, the future mobile network will also provide access services for more and more IoT terminals. IoT access brings new challenges and opportunities to mobile networks. Different types of IoT have different demands on the network. Some require the network to provide high real-time and highly reliable services...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/06H04W12/041
CPCH04W12/02H04W12/06H04L9/0861H04W12/40H04W12/037H04W12/041
Inventor 游世林林兆骥彭锦刘红军赵孝武
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products