CN102083062A - Method and system for encrypting service flow - Google Patents

Method and system for encrypting service flow Download PDF

Info

Publication number
CN102083062A
CN102083062A CN2009102462447A CN200910246244A CN102083062A CN 102083062 A CN102083062 A CN 102083062A CN 2009102462447 A CN2009102462447 A CN 2009102462447A CN 200910246244 A CN200910246244 A CN 200910246244A CN 102083062 A CN102083062 A CN 102083062A
Authority
CN
China
Prior art keywords
indication information
business stream
base station
sends
aaa
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2009102462447A
Other languages
Chinese (zh)
Other versions
CN102083062B (en
Inventor
颜文波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN200910246244.7A priority Critical patent/CN102083062B/en
Priority to JP2012541306A priority patent/JP5795591B2/en
Priority to KR1020127010617A priority patent/KR101695050B1/en
Priority to PCT/CN2010/079093 priority patent/WO2011066779A1/en
Publication of CN102083062A publication Critical patent/CN102083062A/en
Application granted granted Critical
Publication of CN102083062B publication Critical patent/CN102083062B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0892Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method and system for encrypting a service flow. The method comprises the following steps of: sending indication information for indicating whether to need encryption or not to an authenticating, authorizing and charging client (AAA Client) by an authenticating, authorizing and charging server (AAA Server); sending indication information to a service flow authorization anchor point Anchor SFA (Spatial Frequency Analyzer) by the AAA Client; sending the indication information to a base station by the Anchor SFA; and encrypting or not encrypting the service flow by the base station according to the indication information. The invention meets the safety requirement on configuring the service flow according to the user information and QoS (Quality of Service) attributes.

Description

Business Stream cipher processing method and system
Technical field
The present invention relates to the communications field, in particular to a kind of Business Stream cipher processing method and system.
Background technology
Micro-wave access to global intercommunication (Worldwide Interoperability for Microwave Access abbreviates WiMAX as) provides perfect security mechanism to guarantee operator and user's interests as the wireless access wide band technology of a new generation.For example, the 802.16e agreement provides the data encryption transmission mechanism of eating dishes without rice or wine, and guarantees the confidentiality of transfer of data under open wireless environment, can prevent effectively that sensitive information from illegally being stolen.
Data are based on connection in the transmission of eating dishes without rice or wine in the WiMAX system, and each connects and all has specific service quality (Quality ofService abbreviates QoS as) attribute.The Business Stream of every activation is connected corresponding one by one with professional transmission.The Qos attribute of Business Stream when inserting by authentication and authorization charging (Authentication Authorization Accounting, abbreviating AAA as) server (Server) distributes and sends to base station (Base Station, abbreviate BS as), BS uses when setting up Business Stream.If certain bar Business Stream of certain user has high demand for security, need the encrypted transmission data, for example, pre-configured two (Best Effort that do one's best, abbreviate BE as) user A and pre-configured two unsolicited grant service (Unsolicited Grant Service of Business Stream, abbreviate UGS as) the user B of Business Stream, user A has relatively high expectations in the safety of transmission of eating dishes without rice or wine to data, and user B does not require; Perhaps pre-configured the user C of many Business Streams (comprising BE and UGS), the data of the professional transmission of its UGS are had higher demand for security, and the data of transmitting on the BE Business Stream are not had security requirement.
In the existing NWG procotol in R3 and the R6 message interface not the demand for security to Business Stream be described, be not easy to realize based on the encrypted data transmission demand that connects.If the demand for security of Business Stream (connection) is described or configuration at BS, BS is as a distributed access point, do not know in advance user profile with and the Qos attribute that is connected, so the demand for security that can not dispose specific user's given traffic streams according to user's information and QoS attribute in the base station.
Summary of the invention
Can not come the problem of configuration service demand for security to propose the present invention according to user's information and QoS attribute at base station in the correlation technique, for this reason, main purpose of the present invention be to provide a kind of Business Stream encryption scheme, to address the above problem.
To achieve these goals, according to an aspect of the present invention, provide a kind of Business Stream cipher processing method.
Business Stream cipher processing method according to the present invention comprises: authentication and authorization charging server AAA Server is used to indicate Business Stream whether to need the indication information of encrypting to authentication and authorization charging customer end A AA Client transmission; AAA Client sends indication information to service flow authorization anchor point Anchor SFA; Anchor SFA sends to the base station with indication information; Encrypt or not encryption Business Stream according to indication information the base station.
Preferably, AAA Server comprises to AAA Client transmission indication information: AAA Server accepts to carry indication information in the Access Accept message in access; AAA Server sends to AAA Client with Access Accept message.
Preferably, AAA Server carries indication information and comprises in Access Accept message: increase TLV in subtype/length/numeric format TLV of the service quality descriptor QoS-Descriptor of Access Accept message, whether the TLV of increase is used to indicate Business Stream to need to encrypt.
Preferably, AAA Client comprises to Anchor SFA transmission indication information: AAA Client carries indication information in the traffic flow parameters of resource reservation request RR-Req message; AAA Client sends to Anchor SFA with RR-Req message.
Preferably, Anchor SFA sends to the base station with indication information and comprises: Anchor SFA carries indication information in the traffic flow parameters of the data channel registration request Path_Reg_Req message that sends to the base station.
Preferably, the base station is carried out encryption according to indication information to Business Stream and comprised: a security alliance SA is determined in the base station; The base station is carried out the sign ID of SA and Business Stream related, and the ID of SA that will be related with Business Stream sends travelling carriage; Base station and/or travelling carriage use the SA of ID correspondence that the data flow of Business Stream is encrypted and/or deciphered.
To achieve these goals, according to a further aspect in the invention, also provide a kind of Business Stream encryption system.
According to Business Stream encryption of the present invention system, comprising: AAA Server, AAAClient, Anchor SFA, base station; AAA Server is used to indicate Business Stream whether to need the indication information of encrypting to AAA Client transmission; AAA Client sends indication information to Anchor SFA; Anchor SFA sends to the base station with indication information; Encrypt or not encryption Business Stream according to indication information the base station.
Preferably, AAA Server comprises: first is provided with module, is used in Access Accept message indication information being set; First sending module is used for Access Accept message is sent to AAA Client.
Preferably, first is provided with module is used for increasing TLV at the sub-TLV of the QoS-Descriptor of Access Accept message, and whether the TLV of increase is used to indicate Business Stream to need to encrypt.
Preferably, AAA Client comprises: second is provided with module, is used for carrying indication information in the traffic flow parameters of RR-Req message; Second sending module is used for RR-Req message is sent to Anchor SFA.
By the present invention, demand for security is configured to Business Stream on AAA Server in employing, and send to the base station, having solved in the correlation technique base station can not come the problem of configuration service stream demand for security according to user's information and QoS attribute, and then has realized the demand for security according to user profile and QoS attribute configuration Business Stream.
Other features and advantages of the present invention will be set forth in the following description, and, partly from specification, become apparent, perhaps understand by implementing the present invention.Purpose of the present invention and other advantages can realize and obtain by specifically noted structure in the specification of being write, claims and accompanying drawing.
Description of drawings
Accompanying drawing described herein is used to provide further understanding of the present invention, constitutes the application's a part, and illustrative examples of the present invention and explanation thereof are used to explain the present invention, do not constitute improper qualification of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart according to the Business Stream cipher processing method of the embodiment of the invention;
Fig. 2 is the flow chart according to the Business Stream of the foundation encryption of the embodiment of the invention;
Fig. 3 is the structured flowchart according to the Business Stream encryption system of the embodiment of the invention.
Embodiment
Need to prove that under the situation of not conflicting, embodiment and the feature among the embodiment among the application can make up mutually.Describe the present invention below with reference to the accompanying drawings and in conjunction with the embodiments in detail.
In following examples, can in computer system, carry out in the step shown in the flow chart of accompanying drawing such as a set of computer-executable instructions, and, though there is shown logical order in flow process, but in some cases, can carry out step shown or that describe with the order that is different from herein.
According to embodiments of the invention, a kind of Business Stream encryption method is provided, Fig. 1 is the flow chart according to the Business Stream encryption method of the embodiment of the invention, as shown in Figure 1, this method comprises that following step S102 is to step S108:
Step S102, AAA Server is used to indicate Business Stream whether to need the indication information of encrypting to AAA Client transmission.Because AAA Server itself is exactly the centrostigma of a recording user Qos information, whether needs are encrypted can business to be set according to the information of record on the AAA Server herein.Need illustrate, AAA Client is as carrying out mutual module with AAA Server, can be arranged on the inside of service flow authorization anchor point (Anchor Service Flow Authorization abbreviates Anchor SFA as), also can be arranged among other network elements.
Step S104, AAA Client sends indication information to Anchor SFA (or being called described point data channel functional entity Anchor DPF).
Step S106, Anchor SFA sends to the base station with indication information.
Step S108, encrypt or not encryption Business Stream according to indication information the base station.
Need be encrypted as example with Business Stream below, above-mentioned steps is described in detail in conjunction with the flow process of setting up of Business Stream.
Fig. 2 is that as shown in Figure 2, this flow process comprises the steps: according to the flow chart of the Business Stream of the foundation encryption of the embodiment of the invention
Step S201, extended authentication agreement (Extensible Authentication Protocol begins just, abbreviate EAP as) after the authentication success, AAA Server sends R3 to AAA client (Client) and inserts acceptance (Access Accept) message, carry indicating services stream in this message and whether need the indication information encrypted, wherein, AAA Client also can be called authenticator (Authenticator).Preferably, AAA Server can be used to indicate Business Stream whether to need the indication information of encrypting to AAA Client transmission by Access Accept message, can send this indication information by other message, for example, message by a redetermination, just one of the message that can carry indication information is illustrated in this Access Accept message, but be not limited to this, be used to indicate Business Stream whether to need the message of the indication information encrypted to serve the same role so long as can carry.Certainly, use Access Accept message to realize more or less freely.
Preferably, under the situation of carrying above-mentioned indication information of using Access Accept message, can in the sub-TLV of the service quality descriptor (QoS-Descriptor) of Access Accept message, increase new TLV level of security (Security Level) (in the communication basin, according to format organization's data of " data type, data length, value data ", represent to be exactly " Type type; Length length; Value value " with English, be called for short the TLV form), size is 1 byte.The meaning of Security Level sees Table 1,0 and shows that the user does not have security requirement to the data of transmitting on this Business Stream; 1 shows that the user has security requirement to the data of transmitting on this Business Stream.Need illustrate to use whether the indicating services stream that comes of other bytes needs to encrypt in this message, be that example describes with TLV Security Level below.
Table 1
Figure B2009102462447D0000071
In order better present embodiment to be described, at first Security Association (Security Alliance abbreviates SA as) traffic encryption keys (tek) (Traffic Encryption Key abbreviates TEK as) is described at this.
In SA TEK three steps handshake phase, travelling carriage (Mobile Station abbreviates MS as) and BS consult to generate the security alliance SA with cryptographic attributes, wherein, have described enciphering and deciphering algorithm at data crypt type.The TEK that MS finishes this SA with key request (Key-Request), key answer (Key-Reply) message is mutual, has identical TEK key between MS and the BS after the success.TEK is used for the key of encryption and decryption traffic data.
Step S202, at the Business Stream establishment stage, Authenticator sends RR_Req message to SFA, and every traffic flow parameters is carried newly-increased TLV Security Level among the RR_Req.Need illustrate, in this step, Authenticator can carry in RR_Req message and is used to indicate every Business Stream whether to need the indication information of encrypting (TLV Security Level is illustrating this indication information), also can carry above-mentioned indication information in other message.
Step S203, SFA send data channel registration request Path_Reg_Req message to BS, increase TLV Security Level newly in every traffic flow parameters among the Path_Reg_Req.In this step, SFA can carry above-mentioned indication information in Path_Reg_Req message, certainly, can carry above-mentioned indication information in other message, and in the present embodiment, Path_Reg_Req message is just explained to this one.
Step S204, at the Security Level value in every Business Stream, if Security Level is 0, show the unnecessary encryption of the data of on this Business Stream, transmitting so, so needn't be the security alliance SA of the related cryptographic attributes of this Business Stream, the SAID among the DSA_Req can be 0xFFFF (showing the SA association that discord is encrypted) so; If SecurityLevel is 1, show that so the data of transmitting have demand for security, need encrypted transmission on this Business Stream.BS is according to strategy, selects a SA of data encryption type (Date Crypt Type) non-0 from the SA that three step handshake phase consult to generate, with its SAID therewith the bar Business Stream associate, and carry to MS by DSA_Req message.
Foundation has all the other steps of the Business Stream of security attribute, and to set up process consistent with existing business stream, do not repeat them here.After this, BS receives has demand for security (promptly, need to encrypt) data flow of Business Stream, then find the SA (comprising corresponding TEK) that this Business Stream is associated with, then, cryptographic algorithm with data crypt type appointment among this SA, adopt TEK encrypted media data, and assembling MAC PDU, the EC bit in the PDU head puts 1, show that this MAC PDU through encrypting, sends to MS by eating dishes without rice or wine.MS receives MAC PDU, and identification EC position is 1, is judged to be encrypted packet.Find corresponding SA according to the link information in the PDU head,, adopt TEK decrypt media data with the decipherment algorithm of data crypt type appointment among the SA.In like manner, MS uses similarly to handle when receiving the data flow of the Business Stream with demand for security and gets final product, and does not repeat them here.
To step S204, in network element AAA Server, the Security Level of every traffic flow parameters configuration determines whether need transmit in the mode of encrypting in the data of eating dishes without rice or wine to transmit by above-mentioned steps S201.At AAA Server, operator can dispose specific Qos attribute based on the user, so equally can be based on user's the specific security attribute of connection configuration.
Corresponding with the foregoing description, a kind of Business Stream encryption system also is provided, comprise: AAA Server, AAA Client, Anchor SFA, base station, in this system, AAA Server sends to AAA Client and is used to indicate Business Stream whether to need the indication information of encrypting; AAA Client sends indication information to Anchor SFA; Anchor SFA sends to the base station with indication information; Encrypt or not encryption Business Stream according to indication information the base station.
Fig. 3 is that as shown in Figure 3, AAA Server comprises according to the structured flowchart of the Business Stream encryption system of the embodiment of the invention: first is provided with module 32, and this module is used in Access Accept message indication information being set; First sending module 34, this module are used for Access Accept message is sent to AAA Client.
Preferably, first is provided with module 32 is used for increasing TLV at the sub-TLV of the QoS-Descriptor of Access Accept message, and whether the TLV of increase is used to indicate Business Stream to need to encrypt.
As shown in Figure 3, AAA Client comprises: second is provided with module 36, and this module is used for carrying indication information in the traffic flow parameters of resource reservation request RR-Req message; Second sending module 38, this module are used for RR-Req message is sent to Anchor SFA.In this system, the processing procedure between AAA Server, AAA Client, Anchor SFA, the base station has been described in detail in the embodiment that submits a written statement to a higher authority, and does not repeat them here.
In sum, in the present embodiment, can carry Security Level parameter by the Qos Profile parameter in the Access Accept message of AAA Server transmission.Thereby in setting up the process of Business Stream, every Business Stream of user all has a Security Level value.The base station can connect data in corresponding professional transmission according to the decision of Security Level value, and whether needs transmit in the mode of encrypting.Since Qos Profile usually on AAA Server based on the user be connected configurable, so Business Stream whether encrypted transmission also can conveniently realize based on the user be connected configurable.
Obviously, those skilled in the art should be understood that, above-mentioned each module of the present invention or each step can realize with the general calculation device, they can concentrate on the single calculation element, perhaps be distributed on the network that a plurality of calculation element forms, alternatively, they can be realized with the executable program code of calculation element, thereby, they can be stored in the storage device and carry out by calculation element, perhaps they are made into each integrated circuit modules respectively, perhaps a plurality of modules in them or step are made into the single integrated circuit module and realize.Like this, the present invention is not restricted to any specific hardware and software combination.
The above is the preferred embodiments of the present invention only, is not limited to the present invention, and for a person skilled in the art, the present invention can have various changes and variation.Within the spirit and principles in the present invention all, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. a Business Stream cipher processing method is characterized in that, comprising:
Authentication and authorization charging server AAA Server is used to indicate Business Stream whether to need the indication information of encrypting to authentication and authorization charging customer end A AA Client transmission;
Described AAA Client sends described indication information to service flow authorization anchor point Anchor SFA;
Anchor SFA sends to the base station with described indication information;
Encrypt or not encryption described Business Stream according to described indication information described base station.
2. method according to claim 1 is characterized in that, described AAA Server sends described indication information to described AAA Client and comprises:
Described AAA Server accepts to carry described indication information in the Access Accept message in access;
Described AAA Server sends to described AAA Client with described Access Accept message.
3. method according to claim 2 is characterized in that, described AAA Server carries described indication information and comprises in described Access Accept message:
Increase TLV in subtype/length/numeric format TLV of the service quality descriptor QoS-Descriptor of described Access Accept message, whether the TLV of described increase is used to indicate described Business Stream to need to encrypt.
4. according to claim 1 or 3 described methods, it is characterized in that described AAA Client sends described indication information to described Anchor SFA and comprises:
Described AAA Client carries described indication information in the traffic flow parameters of resource reservation request RR-Req message;
Described AAA Client sends to described Anchor SFA with described RR-Req message.
5. according to claim 1 or 3 described methods, it is characterized in that Anchor SFA sends to described base station with described indication information and comprises:
Described Anchor SFA carries described indication information in the traffic flow parameters of the data channel registration request Path_Reg_Req message that sends to described base station.
6. method according to claim 1 is characterized in that, described base station is carried out encryption according to described indication information to described Business Stream and comprised:
A security alliance SA is determined in described base station;
Described base station is carried out the sign ID of described SA and described Business Stream related, and the ID of SA that will be related with described Business Stream sends travelling carriage;
Described base station and/or travelling carriage use the SA of described ID correspondence that the data flow of described Business Stream is encrypted and/or deciphered.
7. Business Stream encryption system comprises: AAA Server, AAA Client, Anchor SFA, base station, it is characterized in that,
Described AAA Server is used to indicate Business Stream whether to need the indication information of encrypting to described AAA Client transmission;
Described AAA Client sends described indication information to described Anchor SFA;
Described Anchor SFA sends to described base station with described indication information;
Encrypt or not encryption described Business Stream according to described indication information described base station.
8. system according to claim 7 is characterized in that, described AAA Server comprises:
First is provided with module, is used in Access Accept message described indication information being set;
First sending module is used for described Access Accept message is sent to described AAA Client.
9. system according to claim 8 is characterized in that, described first is provided with module is used for increasing TLV at the sub-TLV of the QoS-Descriptor of described Access Accept message, and whether the TLV of described increase is used to indicate described Business Stream to need to encrypt.
10. according to claim 7 or 9 described systems, it is characterized in that described AAA Client comprises:
Second is provided with module, is used for carrying described indication information in the traffic flow parameters of RR-Req message;
Second sending module is used for described RR-Req message is sent to described Anchor SFA.
CN200910246244.7A 2009-12-01 2009-12-01 Method and system for encrypting service flow Active CN102083062B (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
CN200910246244.7A CN102083062B (en) 2009-12-01 2009-12-01 Method and system for encrypting service flow
JP2012541306A JP5795591B2 (en) 2009-12-01 2010-11-24 Service flow encryption processing method and system
KR1020127010617A KR101695050B1 (en) 2009-12-01 2010-11-24 Method and system for service flow encrypton processing
PCT/CN2010/079093 WO2011066779A1 (en) 2009-12-01 2010-11-24 Method and system for service flow encrypton processing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200910246244.7A CN102083062B (en) 2009-12-01 2009-12-01 Method and system for encrypting service flow

Publications (2)

Publication Number Publication Date
CN102083062A true CN102083062A (en) 2011-06-01
CN102083062B CN102083062B (en) 2015-05-20

Family

ID=44088777

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200910246244.7A Active CN102083062B (en) 2009-12-01 2009-12-01 Method and system for encrypting service flow

Country Status (4)

Country Link
JP (1) JP5795591B2 (en)
KR (1) KR101695050B1 (en)
CN (1) CN102083062B (en)
WO (1) WO2011066779A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104780531A (en) * 2014-01-15 2015-07-15 佳能株式会社 Communication apparatus and control method therefor
US9241254B2 (en) 2012-01-17 2016-01-19 Zte Corporation Method and system for determining reachability of terminal group
WO2019090492A1 (en) * 2017-11-07 2019-05-16 Oppo广东移动通信有限公司 Data processing method and network device
US11317291B2 (en) 2018-03-15 2022-04-26 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Data processing method, access network device, and core network device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101128061B (en) * 2007-09-27 2013-02-27 中兴通讯股份有限公司 Method and system for mobile management unit, evolving base station and identifying whether UI is encrypted
CN101488847B (en) * 2008-01-18 2011-09-14 华为技术有限公司 Method, apparatus and system for data ciphering
EP2101526A1 (en) * 2008-03-10 2009-09-16 Nokia Siemens Networks Oy Indication of entry decisions to local networks
CN101345679B (en) * 2008-08-21 2013-01-16 中兴通讯股份有限公司 QoS guarantee method and system of dynamic business, AAA and Anchor SFA

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9241254B2 (en) 2012-01-17 2016-01-19 Zte Corporation Method and system for determining reachability of terminal group
CN104780531A (en) * 2014-01-15 2015-07-15 佳能株式会社 Communication apparatus and control method therefor
WO2019090492A1 (en) * 2017-11-07 2019-05-16 Oppo广东移动通信有限公司 Data processing method and network device
CN111164997A (en) * 2017-11-07 2020-05-15 Oppo广东移动通信有限公司 Method and network device for processing data
CN111641946A (en) * 2017-11-07 2020-09-08 Oppo广东移动通信有限公司 Method for processing data, network device and computer storage medium
US11317291B2 (en) 2018-03-15 2022-04-26 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Data processing method, access network device, and core network device
US11722899B2 (en) 2018-03-15 2023-08-08 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Data processing method, access network device, and core network device

Also Published As

Publication number Publication date
JP5795591B2 (en) 2015-10-14
WO2011066779A1 (en) 2011-06-09
JP2013512631A (en) 2013-04-11
CN102083062B (en) 2015-05-20
KR20120117731A (en) 2012-10-24
KR101695050B1 (en) 2017-01-10

Similar Documents

Publication Publication Date Title
CN101512537B (en) Method and system for secure processing of authentication key material in an ad hoc wireless network
JP4649513B2 (en) Authentication method for wireless portable internet system and related key generation method
US7945777B2 (en) Identification information protection method in WLAN inter-working
US8924716B2 (en) Communication device and communication method
US8447978B2 (en) Wireless communication method using WPS
EP1972125B1 (en) Apparatus and method for protection of management frames
EP1887730B1 (en) Apparatus and method for managing stations associated with WPA-PSK wireless network
US9392453B2 (en) Authentication
JP5480890B2 (en) Control signal encryption method
US8000478B2 (en) Key handshaking method and system for wireless local area networks
JP5855127B2 (en) Method and apparatus for encrypting short text data in a wireless communication system
JP2010158030A (en) Method, computer program, and apparatus for initializing secure communication among and for exclusively pairing device
CN102144371A (en) Method for selectively encrypting control signal
CN103533539A (en) Virtual SIM (subscriber identity module) card parameter management method and device
KR100707805B1 (en) Authentication system being capable of controlling authority based of user and authenticator
US11962692B2 (en) Encrypting data in a pre-associated state
CN102083062B (en) Method and system for encrypting service flow
WO2020087286A1 (en) Key generation method, device, and system
US20090136043A1 (en) Method and apparatus for performing key management and key distribution in wireless networks
KR101451163B1 (en) System and method for access authentication for wireless network
CN115037504A (en) Communication method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant