Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for updating safety alliance information after mobile terminal switching

A mobile terminal, switching technology, applied in the direction of security devices, wireless communications, electrical components, etc., can solve the problem of not providing processing procedures, and achieve the effect of ensuring reliability

Inactive Publication Date: 2011-04-06
HUAWEI TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in response to the above needs, there is no corresponding processing process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for updating safety alliance information after mobile terminal switching
  • Method for updating safety alliance information after mobile terminal switching
  • Method for updating safety alliance information after mobile terminal switching

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The core of the present invention is to accurately define the SA Context (the context of SA) and the corresponding SA_TEK_UPDATE (Security Association Encryption Key Update) field, and through the clear definition, obtain the TEK after switching, so that the mobile terminal switches In the process, the existing technology can be fully utilized to save the process of TEK generation, so as to effectively reduce air interface message interaction, save air interface resources, and improve air interface communication performance.

[0031] In the method of the present invention, the mobile terminal sends a security association encryption key request message to the base station, and after the base station receives the request message, the base station sends a security association encryption key response message to the mobile terminal, in which the security association encryption key The updated SA_TEK_UPDATE field carries the updated SA information according to the original SA ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention relates to approach of updating security alliance information in mobile terminal switching. The inventions mostly include the following: Firstly, let the mobile terminal send security alliance encryption key request information to the base station, after that, when the base station receives the request news, it will update the kept original information according to mobile terminal and send the update security alliance information to mobile terminal. Therefore, the invention's realization can make sure that mobile terminal's security alliance information keeps consistent with the base station's security alliance information when terminal mobile switch in the wireless communication systems, that is to say it can exactly and timely update the terminal mobile's security alliance information. So when the condition that the setting omits TEK creating, it can make the terminal mobile's TEK consistent with the base station's TEK, then ensure the reliability of the communication.

Description

technical field [0001] The invention relates to the technical field of wireless communication, in particular to a method for updating security association information after a mobile terminal is handed over. Background technique [0002] IEEE802.16 is an air interface standard of WiMAX (Worldwide Interoperability for Microwave Access), and its current HO Process Optimization (handover process optimization) parameter provides some configuration bits, which can indicate steps that can be omitted. For example, it may be specified to omit the generation process of TEK (Telecommunication Encryption Key). However, TEK is still needed in the communication process between MSS (mobile terminal) and base station. If the exchange process of TEK is omitted, the content of SA must be updated to MSS after the target base station receives the old SA (Security Association). side. [0003] In addition, when the SA is transmitted from the serving base station to the target base station, sinc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W12/0431H04W36/08
Inventor 单长虹李永茂林志斌张俊
Owner HUAWEI TECH CO LTD