Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An air interface encryption method and device in a fail soft mode

A fault weakening and mode technology, applied in the field of communication, can solve problems such as inability to provide point-to-point and point-to-multipoint security functions at the NAS layer and AS layer, lack of point-to-point and point-to-multipoint service key derivation and distribution mechanisms, etc.

Inactive Publication Date: 2019-05-07
POTEVIO INFORMATION TECH CO LTD
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, in the process of realizing the invention, the inventors found that the prior art only provides the security of point-to-point and point-to-multipoint signaling and data in the normal mode, and in the weakened mode, the base station and the core network The communication has been interrupted, both the base station and the UE end the ongoing service and delete the context. At this time, there is no key derivation and distribution mechanism for point-to-point and point-to-multipoint services, and it is impossible to provide point-to-point and point-to-multipoint at the NAS layer and AS layer. security features

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An air interface encryption method and device in a fail soft mode
  • An air interface encryption method and device in a fail soft mode
  • An air interface encryption method and device in a fail soft mode

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0034] In order to facilitate the understanding of the air interface encryption method in the fault weakening mode provided by the present invention, firstly, the point-to-point and point-to-multipoint air interface encryption processes in the normal mode in the prior art are explained.

[0035] The hierarchical structure of the LTE point-to-point key is as follows: figure 1 As shown, where K is a permanent key, which is stored in both the terminal USIM card a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an air interface encryption method and device in a fail soft mode. In the method, a base station can determine a point-to-point root key according to a privateidentifier reported by UE; a terminal and the base station can carry out key derivation according to the root key; after point-to-point security is activated, a group root key is generated for a group according to group information carried in a cluster registration request sent by the terminal, then the terminal and the base station respectively carry out key derivation according to the group root key, and encryption and decryption are carried out by using the key in point-to-point and point-to-multipoint signaling and data transmission processes. Therefore, a point-to-point and point-to-multipoint key derivation and distribution mechanism can be executed in a fail-soft mode, and point-to-point and point-to-multipoint signaling and data transmission security in the mode is ensured. And the security mechanism in the existing normal working mode is slightly changed, so that the method provided by the embodiment of the invention is simple and easy to implement, and the configuration of the existing network is not greatly influenced.

Description

technical field [0001] Embodiments of the present invention relate to the field of communication technologies, and in particular to an air interface encryption method and device in a fault weakening mode. Background technique [0002] The private network cluster system is a dedicated wireless communication system developed to meet the command and dispatch needs of industry users and is oriented to specific industry applications. It has very high requirements for reliability and invulnerability. When the communication between the base station and the core network is interrupted due to abnormal events such as natural disasters and construction accidents, or when the core network system fails, the base station should be able to maintain communication services with acceptable quality of service for users within the coverage area of ​​the base station , support trunking basic services such as single call, group call, and broadcast call, that is, provide fault weakening function, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W92/10
Inventor 李晓华曾朝晖郄卫军赵顾良
Owner POTEVIO INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products