Key update methods and related entities
A key update and key technology, applied in the communication field, can solve problems such as vulnerability to attack, untrustworthy security capabilities, and AMF vulnerability to attack
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0063] figure 1 This is a schematic diagram of an application scenario based on the key update method provided by the embodiment of the present invention. In a possible scenario, the AMF changes when the UE is in the connected state. For example, in a mobile communication system, when UE101 is in a session, the movement of UE101 will cause a handover process, so that UE101 accesses target radio access entity 103 from source radio access entity 102. During the handover process, it may also cause core network The entity changes, for example, the core network entity AMF in the next generation mobile communication network may change, and the source AMF104 is switched to the target AMF105. UE101 and source AMF104 store Kamf used to generate NAS and AS keys, where Kamf is the key of UE101 used on source AMF104, when AMF changes, in order to ensure backward security, target AMF105 should obtain source AMF104 The updated Kamf is updated, so that the target AMF 105 generates updated ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


