Key transmission method and device
A transmission method and transmission device technology, applied in the field of communication, can solve the problems of key leakage, affecting security, affecting service response time, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0111] Figure 5 Schematic diagram of the flow of the key transmission method according to the embodiment of the present invention Figure Four ,Such as Figure 5 As shown, the process includes:
[0112] Step 501: When the terminal UE executes the service through the next-generation base station system 2, the authentication vector issuing network element will issue the authentication vector to the next-generation base station system 2 through the core network element, where Knp is encrypted, the encryption key is Ks, and at the same time Calculate F1(Ks) and use the public key PubK of the next-generation base station system 2 to encrypt F1(Ks) to obtain E PubK (F1(Ks)), the purpose is to avoid the leakage of Ks during transmission, which will eventually lead to the leakage of Knp. The authentication vector can also include E PubK (Ks), the core network element caches the authentication vector and E in this process PubK (F1(Ks)), you can also cache E PubK (Ks);
[0113] The F1(Ks...
Embodiment 2
[0129] Image 6 Schematic diagram of the flow of the key transmission method according to the embodiment of the present invention Figure 5 ,Such as Image 6 As shown, the process includes:
[0130] Step 601: When the terminal UE executes the service through the next-generation base station system 2, the authentication vector issuing network element will issue the authentication vector to the next-generation base station system 2 through the core network element, where Knp is replaced with E PubK (F1(Knp)), which is obtained by encrypting F1(Knp) with the public key PubK of the next-generation base station system 2. The purpose is to avoid the leakage of Knp during transmission, which will eventually lead to the leakage of Knp. The authentication vector can also include E PubK (Knp), the core network element caches the authentication vector and E in this process PubK (F1(Knp)), E can also be cached PubK (Knp);
[0131] The F1 (Knp) generation method in the above steps may be tha...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


