Method for acquring authentication cryptographic key context from object base station

A target base station and authentication key technology, which is applied to the target service base station to obtain the context information of the authentication key, and can solve problems such as serial number information inconsistency

Inactive Publication Date: 2006-08-16
HUAWEI TECH CO LTD
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0025] The present invention provides a method for the target base station to obtain authentication key context information during the handover process of the mobile terminal, so as to solve the problem of the serial number information in the context of the AK generated by the target base station in the prior art and the sequence in the AK context saved by the mobile terminal side. The problem of inconsistency of number information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for acquring authentication cryptographic key context from object base station
  • Method for acquring authentication cryptographic key context from object base station
  • Method for acquring authentication cryptographic key context from object base station

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0085] Such as image 3 As shown, the serving BS1 and the target BS2 belong to different Authenticators / Key Distributors, and the Authenticator / Key Distributor to which the target BS2 belongs does not save the current AK and its context information of the MSS, and the service authenticator / key distributor receives the switching request message Afterwards, the handover preparation message will be exchanged with the target BS2, and the target BS will learn the address information of the service authenticator / key distributor during this process.

[0086] Then BS2 will carry the address information of the serving Authenticator / Key Distributor in the key request message sent to the home target Authenticator / Key Distributor;

[0087] The target Authenticator / Key Distributor sends a key request message to the service Authenticator / Key Distributor according to the address information of the service Authenticator / Key Distributor carried in the key request message of BS2, and the message...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention involves the mobile communication field, a method that the aiming base station gets the context information of the identified-right secret key, to solve the inconsistent problem in the relating sequence number of the aiming base station identified-right secret key context and the mobile terminal in the existing technology. The method including: the identified righter / the provider of the secret key create the context information of the identified-right secret key when the mobile terminal request cut, the context information includes the current sequence number of the identified-right secret key, the sequence number of the upward managing information authentication code and / or the current sequence number of the downward managing information authentication code; the identified righter / the provider of the secret key send the identified-right secret key and the relating sequence number to the aiming base station when the aiming base station that the mobile terminal ready to cut request the identified-right secret key. Thus maintained the continuity of the sequence number information, ensure the secure communication with the mobile terminal, and prevent effectively the possibly appearing replay attack, ensure the conversation security after restore.

Description

technical field [0001] The invention relates to the technical field of mobile communication, and particularly discloses a method for obtaining authentication key context information by a target serving base station of a mobile terminal during a handover process of a mobile terminal user. Background technique [0002] With the vigorous development of Internet services and the wide application of wireless networks, the security of mobile users has put forward more and more requirements for wireless systems: In addition to some previous issues such as device authentication, user authentication, and service authorization, wireless The establishment of a secure channel between the user and the AP (Access Point, access point) or BS (Base Station, base station), the exchange of confidential information, and between the BS and the key Distributor / Authenticator (distributor / authenticator) Issues such as the confidential channel between the Distributor / Authenticator and the Authentica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/38
CPCH04L63/08
Inventor 肖正飞
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products