Supercharge Your Innovation With Domain-Expert AI Agents!

Method for generating secret key and device thereof

A technology for generating keys and communication keys, applied to security devices, secure communication devices, and key distribution, which can solve problems affecting HSS development and HSS service pressure, reduce signaling overhead, improve transmission performance, and ensure security Effect

Inactive Publication Date: 2020-07-28
HUAWEI TECH CO LTD
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In general, in order to effectively guarantee the security between the terminal device and the application function network element, the shared key between the terminal device and the application function network element will be updated frequently. Obtain AV to complete AKA certification, so that frequent visits to HSS will cause business pressure on HSS, which may affect the development of other services of HSS

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating secret key and device thereof
  • Method for generating secret key and device thereof
  • Method for generating secret key and device thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0189] The technical solution in this application will be described below with reference to the accompanying drawings.

[0190] In the embodiments of the present application, "at least one" means one or more, and "multiple" means two or more. "And / or" describes the association relationship of associated objects, indicating that there may be three types of relationships, for example, A and / or B, which can mean: A exists alone, A and B exist simultaneously, and B exists alone, where A, B can be singular or plural. The character " / " generally indicates that the contextual objects are an "or" relationship. "At least one of the following" or similar expressions refer to any combination of these items, including any combination of single or plural items. For example, at least one item (unit) in a, b or c can represent: a, b, c, a-b, a-c, b-c or a-b-c, wherein a, b, c can be single or multiple. "A belongs to B" can mean that A is a subset of B, or that the content of A is the same...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for generating a secret key and a device thereof. In this method, key updating parameters used for generating a communication key are introduced; when the communicationkey needs to be generated or updated, the communication key is updated; a terminal device and an anchor function network element can generate a communication key based on the key update parameter. Thus, the AV does not need to be frequently acquired again from the UDM or the HSS, so that the communication security is ensured, the burden of the UDM or the HSS is reduced, the signaling overhead generated by acquiring the AV again is reduced, and the transmission performance of the service is effectively improved.

Description

technical field [0001] The present application relates to the field of communication, and more specifically, to a method and device for generating a key in the field of communication. Background technique [0002] As a generic bootstrapping architecture (generic bootstrapping architecture, GBA) for mobile communications, the GBA technology can be used to establish a secure tunnel between a terminal device and an application function network element (eg, a network application function (NAF)). Wherein, the GBA technology includes GBA authentication and key agreement (authentication and key agreement, AKA) authentication. [0003] In the defined AKA authentication, an authentication vector (authentication vector,AV) to complete the AKA authentication. After the AKA authentication is completed, both the terminal device and the anchor function network element will derive a shared key shared between the terminal device and the anchor function network element, and then the termin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0844H04L9/0861H04L9/0891H04L9/3242H04L9/08H04L9/32H04W12/04
Inventor 王勇张博陈璟
Owner HUAWEI TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More