Method for storing a security start value in a wireless communications system

A starting value and safe technology, applied in wireless communication, security devices, transmission systems, etc., can solve the problem of wasting radio resources and achieve the effect of saving radio resources

Active Publication Date: 2007-08-15
INNOVATIVE SONIC
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

And the above method forces the generation of new keys, which requires the exchange of information on the radio interface, which also leads to unnecessary waste of radio resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for storing a security start value in a wireless communications system
  • Method for storing a security start value in a wireless communications system
  • Method for storing a security start value in a wireless communications system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] Please refer to FIG. 6; FIG. 6 is a simple block diagram of a wireless device 100 according to a preferred embodiment of the present invention, wherein the wireless device 100 includes a central processing unit (CPU) 130 and an input connected to it and receiving its control Output (I / O) hardware 110, a radio transceiver 120, a memory 140, the above-mentioned I / O hardware 110 includes output components such as a display or a speaker, or input components such as a keyboard and a microphone; the above-mentioned radio transceiver 120 uses The wireless device 100 can transmit and receive wireless signals; in addition, the above-mentioned CPU 130 can also control the functions of the wireless device 100 after the program 142 in the memory 140 performs calculation processing; and the important thing is that the program 142 contained in the memory 140 must Do update processing to realize the work purpose to be accomplished by the present invention.

[0052] The wireless device 1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A wireless device first successfully completes an Inter-RAT procedure, which is either an Inter-RAT handover, Inter-RAT cell reselection or Inter-RAT cell change order from UTRAN procedure. The wireless device then determines if a USIM is present. If the USIM is present, the wireless device determines if a new security key set was received and unused for ciphering and integrity functions during a current RRC connection. If a new key set was present and unused, the wireless device stores a value of zero into the USIM as a security START value for the CN domain associated with the RRC connection.

Description

technical field [0001] The present invention relates to a wireless communication device, in particular to a wireless communication device storing a safe initial value in a non-volatile memory. Background technique [0002] 3GPPTS 25.331 V3.12.0 (2002-09) "Radio Resource Control Specification" and 3GPP TS 33.102 V3.12.0 "Security Architecture" of the 3rd Generation Partnership Project (3GPP) specifications )" both provide a technical description of the Global Mobile Communication System (Universal MobileTelecommunication System; UMTS) and its related security protocols. UMTS is disclosed in wireless communication, including a device (usually a mobile device) called a user equipment (User Equipment; UE) and one or more base stations. These base stations (so-called Node Bs) and their corresponding radio network controllers (Radio Network Controllers; RNCs) are collectively referred to as a UMTS Terrestrial Radio Access Network (UMTS Terrestrial Radio Access Network; UTRAN). G...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/14H04L9/00H04W12/00
CPCH04W12/00H04W12/04H04W12/02H04W12/10H04W12/086H04W12/03H04W12/40
Inventor 吴志祥
Owner INNOVATIVE SONIC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products