Key configuration method, device and system

A configuration method and key technology, applied in the field of communication, can solve the problems that the negotiation mechanism of LTE cannot be directly applied to 5G communication, does not support business-based security policy negotiation, and does not support differentiated security protection, etc.

Active Publication Date: 2018-11-13
HUAWEI TECH CO LTD
View PDF4 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be seen that the existing technology does not support differentiated security protection, and all business data on the base station side need to be unified security protection
[0004] In addition, in the future 5G planning, network elements in the 5G network are required to support service-based securit

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key configuration method, device and system
  • Key configuration method, device and system
  • Key configuration method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0274] Possibility 1: If the AMF does not need indicator information in the process of determining the user plane protection mechanism, the UE may not send the indicator to the network side (or the indicator may not be included in the attachment request).

[0275] Possibility 2: This embodiment does not limit the sequence of the above process steps. For example, AMF can determine the user plane protection mechanism before the two-way authentication (that is, step 4 can be placed before step 3).

[0276] It should also be noted that the above image 3 The embodiment is only an example and should not be regarded as a limitation to the present invention.

[0277] It can be seen that the implementation of the embodiments of the present invention can realize the communication architecture based on the future 5G. In the process of attaching to the network, the UE-AN completes the policy negotiation, and the AMF is used according to the security requirements of the user equipment side (inclu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a key configuration method, a device and a system, and the method comprises the following steps: a strategy function network element receives a request of communication between user equipment and network equipment; based on the request, and UE registration information, subscribed service data and service security demands, the strategy function network element determines a user plane protection mechanism; when the network equipment is CN equipment, the strategy function network element sends the user plane protection mechanism to an algorithm network element; the algorithm network element determines a security protection algorithm based on the user plane protection mechanism, generates a first user plane protection key based on the security protection algorithm, sends the first user plane protection key to the CN equipment and sends the security protection algorithm to the user equipment, and the user equipment generate a second user plane protection key based on the security protection algorithm. By implementation of the key configuration method, the device and the system provided by the embodiment of the invention, the user equipment and the network equipment can respectively complete configuration of the user plane protection key in the 5G communication, security of user plane data transmission is improved, and network security protection is realized.

Description

Technical field [0001] The present invention relates to the field of communications, in particular to a key configuration method, device and system. Background technique [0002] In the existing network security architecture, the data security protection adopts a hop-by-hop method, that is, segmented security protection. Take the data transmission link from the terminal equipment-base station-serving gateway-PDN gateway as an example. The terminal equipment-base station performs a security protection, the base station-serving gateway implements a security protection, and the serving gateway-PDN gateway In the process of data transmission, if the intermediate node has a problem, it may cause data leakage. [0003] In addition, in the existing network security architecture, the PDCD air interface protection mechanism is adopted between the terminal equipment and the base station. The PDCD air interface protection mechanism only supports one set of user data protection mechanism, th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/02H04L29/06H04L9/28H04L9/14H04L9/08H04W12/041
CPCH04L9/0863H04L9/14H04L63/0428H04W12/02G06F21/602H04W12/033H04W12/041H04W12/106H04W12/37
Inventor 张博吴荣甘露李岩
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products