Unlock instant, AI-driven research and patent intelligence for your innovation.

Security updating method, network equipment and terminal

An update method and a safe technology, applied in the communication field, can solve problems such as reconstruction process failure, RRC reconstruction message cannot be decrypted, etc., and achieve the effect of ensuring reliability

Pending Publication Date: 2020-02-21
VIVO MOBILE COMM CO LTD
View PDF11 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] Embodiments of the present invention provide a security update method, network equipment, and terminal to solve the problem of when the terminal obtains K from the original serving cell. gNB* and the K derived from the UE side gNB* When it is different, the RRC reconstruction message cannot be decrypted and the reconstruction process fails

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security updating method, network equipment and terminal
  • Security updating method, network equipment and terminal
  • Security updating method, network equipment and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in detail below with reference to the accompanying drawings and specific embodiments.

[0053] Under the current mechanism, the current cell cannot know whether the security key on the network side is the same as that on the UE side. Therefore, the present invention hopes to enhance the method for the current cell to obtain the security key for the next safe use, so that the network side and the UE side can use the same security key to decrypt and verify the integrity of the RRC reconstruction message, thereby ensuring that the RRC reconstruction process is always complete. It is possible to succeed.

[0054] Such as figure 1 As shown, the embodiment of the present invention provides a security update method, which is applied to the first cell where the terminal initiates a radio resource control RRC reestablishment request, including...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security updating method, network equipment and a terminal, and relates to the technical field of communication. The security updating method is applied to a first cell of which a terminal initiates a radio resource control (RRC) reconstruction request, and comprises the following steps: acquiring security parameters sent by a second cell, the security parameters being used for an integrity protection function and an encryption function in an RRC reconstruction process; and processing an RRC reconstruction message according to the security parameter, and sending the RRC reconstruction message to the terminal. The scheme can guarantee that the terminal accurately decrypts the RRC reconstruction message, can guarantee that the RRC reconstruction process is carried out successfully, and then can guarantee the reliability of network communication.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a security update method, network equipment and terminal. Background technique [0002] When the security mechanism is used to verify the security of information transmission during the radio resource control (Radio Resource Control, RRC) re-establishment process, the main implementation of the RRC re-establishment process includes: [0003] Step 1, the user equipment (User Equipment, UE) in the connected state has activated security (that is, obtains the security key KgNB and the RRC message integrity protection key K derived based on KgNB RRCint , RRC message encryption key K RRCenc ), and the reestablishment conditions are met, for example, radio link failure (Radio Link Failure, RLF), handover failure, RRC reconfiguration failure, etc.; an RRC reestablishment request message (RRRCRestablishmentRequest) is initiated in the current cell, wherein the RRC reestablishment ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02H04W12/04H04W12/06H04W12/10H04W36/00H04W36/08H04W76/19H04W12/041H04W12/106
CPCH04W12/02H04W12/04H04W12/06H04W12/10H04W36/0038H04W36/08H04W76/19
Inventor 郑倩柯小婉
Owner VIVO MOBILE COMM CO LTD