Unlock instant, AI-driven research and patent intelligence for your innovation.

Key transmission method and device

A transmission method and transmission device technology, applied in the field of communication, can solve the problems of key leakage, affecting security, affecting service response time, etc.

Active Publication Date: 2018-07-10
ZTE CORP
View PDF8 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] In related technologies, if the core network element is hacked and the transmitted signaling information can be stolen, the core network element can modify any field content in the signaling information, so that the information received by the receiver is not actually sent by the sender. information, if it changes PubK to its own public key, the next-generation base station system 2 will use the modified public key to encrypt Ks, and the core network element can use its own private key to decrypt Ks after receiving the authentication data response. Therefore, Ks can be used to decrypt the keys in the authentication vector, causing these keys to be leaked, thereby affecting security. This attack method is a man-in-the-middle attack
In addition, in the corresponding process, all steps are serial, resulting in low signaling efficiency and affecting business response time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key transmission method and device
  • Key transmission method and device
  • Key transmission method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0111] Figure 5 Schematic diagram of the flow of the key transmission method according to the embodiment of the present invention Figure Four ,Such as Figure 5 As shown, the process includes:

[0112] Step 501: When the terminal UE executes the service through the next-generation base station system 2, the authentication vector issuing network element will issue the authentication vector to the next-generation base station system 2 through the core network element, where Knp is encrypted, the encryption key is Ks, and at the same time Calculate F1(Ks) and use the public key PubK of the next-generation base station system 2 to encrypt F1(Ks) to obtain E PubK (F1(Ks)), the purpose is to avoid the leakage of Ks during transmission, which will eventually lead to the leakage of Knp. The authentication vector can also include E PubK (Ks), the core network element caches the authentication vector and E in this process PubK (F1(Ks)), you can also cache E PubK (Ks);

[0113] The F1(Ks...

Embodiment 2

[0129] Image 6 Schematic diagram of the flow of the key transmission method according to the embodiment of the present invention Figure 5 ,Such as Image 6 As shown, the process includes:

[0130] Step 601: When the terminal UE executes the service through the next-generation base station system 2, the authentication vector issuing network element will issue the authentication vector to the next-generation base station system 2 through the core network element, where Knp is replaced with E PubK (F1(Knp)), which is obtained by encrypting F1(Knp) with the public key PubK of the next-generation base station system 2. The purpose is to avoid the leakage of Knp during transmission, which will eventually lead to the leakage of Knp. The authentication vector can also include E PubK (Knp), the core network element caches the authentication vector and E in this process PubK (F1(Knp)), E can also be cached PubK (Knp);

[0131] The F1 (Knp) generation method in the above steps may be tha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a key transmission method and device. The method comprises steps: a core network element receives a public key (PubK) from a second base station system; the core network element transmits a cipher key, first content information (IE1), and the PubK to a first base station system, wherein the IE1 is generated based on an encrypted key in the cipher key; and the core network element receives second content information (IE2) from the first base station system, and forwards the IE2 to the second base station system, wherein the IE2 is generated by the first base station system using the IE1. The first base station system receives the cipher key, the IE1, and the PUbK transmitted by the core network element, and the IE1 is generated based on the encrypted key in the cipher key; and the first base station system transmits the IE2 to the core network element, and the IE2 is generated based on the IE1. The second base station system transmits the PubK to the core networkelement; and the second base station system receives the IE2 transmitted by the core network element, and the IE2 is configured to generate a key with a private key of the second base station system.

Description

Technical field [0001] The present invention relates to the field of communications, and in particular to a method and device for key transmission of a mobile network. Background technique [0002] The 3rd Generation Partnership Project (3GPP) proposed a mobile network location area update plan, such as figure 1 As shown, the terminal UE has previously performed a certain service through the next-generation base station system 2 (such as the next-generation base station node gNB, or the enhanced evolved base station node evolved eNB, etc.), so that the authentication vector is cached in the next-generation base station system 2. The process of the district renewal plan includes the following steps: [0003] Step 101: The terminal UE sends a location area update to the next-generation base station system 1 at its current location, for example, sends a Tracking Area Update message; [0004] Step 102: The next generation base station system 1 sends the combined location area update and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04W12/02
CPCH04L9/0822H04L9/0861H04W12/02H04L9/08H04W12/03H04W12/041
Inventor 谢振华
Owner ZTE CORP