Unlock instant, AI-driven research and patent intelligence for your innovation.

Key update methods and related entities

A key update and key technology, applied in the communication field, can solve problems such as vulnerability to attack, untrustworthy security capabilities, and AMF vulnerability to attack

Active Publication Date: 2020-11-17
HUAWEI TECH CO LTD
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the next-generation mobile communication network, the core network entity AMF may also be deployed at the edge of the network, resulting in greatly reduced security and vulnerability to attacks. Therefore, when the AMF changes, the key Kamf on the AMF needs to be updated, but during the handover process Or how to trigger the UE to generate an updated Kamf corresponding to the network side in the idle state is an unresolved problem in the prior art. Further, since the AMF is vulnerable to attacks, during the handover process based on the Xn and N2 interfaces, the security of the UE obtained from the AMF Capability information and security capabilities verified by AMF are also untrustworthy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key update methods and related entities
  • Key update methods and related entities
  • Key update methods and related entities

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] figure 1 This is a schematic diagram of an application scenario based on the key update method provided by the embodiment of the present invention. In a possible scenario, the AMF changes when the UE is in the connected state. For example, in a mobile communication system, when UE101 is in a session, the movement of UE101 will cause a handover process, so that UE101 accesses target radio access entity 103 from source radio access entity 102. During the handover process, it may also cause core network The entity changes, for example, the core network entity AMF in the next generation mobile communication network may change, and the source AMF104 is switched to the target AMF105. UE101 and source AMF104 store Kamf used to generate NAS and AS keys, where Kamf is the key of UE101 used on source AMF104, when AMF changes, in order to ensure backward security, target AMF105 should obtain source AMF104 The updated Kamf is updated, so that the target AMF 105 generates updated ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention relates to a key update method and related entities. The method includes: after the first AMF receives the first message, when the first AMF determines that the second AMF serving the UE does not belong to the same set as the first AMF, the first AMF bases at least the first parameter and the currently used The first key of the UE generates the second key of the UE on the first AMF to update the first key; the first AMF sends a second message to the second AMF, the second message includes the second key, so that the second AMF sends the first parameter to the UE after receiving the second message, the first parameter is used by the UE at least based on the symmetry of the first parameter and the first key currently used on the UE The key generates a symmetric key of the second key; the first parameter is identification information of the second AMF, or address information of the second AMF, or capability information of the second AMF. The embodiment of the present invention can trigger the UE to generate an updated key corresponding to the network side.

Description

technical field [0001] The present invention relates to the field of communication, in particular to a key update method and related entities. Background technique [0002] In a mobile communication system, when a user equipment (User Equipment, UE) is in a session, the movement of the UE will cause a handover process, so that the UE accesses the target radio access entity from the source radio access entity, so that in this process, the UE A new security context needs to be established with the target radio access entity to protect signaling and data transmitted between the UE and the target radio access entity. During the handover process, it may also cause changes in the core network entity, such as the access and mobility management function (Access and Mobility Management Function, AMF) of the core network entity in the next-generation mobile communication network may change, and it is useful to save on the UE and the AMF To generate the Kamf of the non-access stratum ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04L9/08H04W12/041H04W12/0431
Inventor 衣强龙水平
Owner HUAWEI TECH CO LTD