CN100461974C - Method and apparatus for triggering key updating - Google Patents
Method and apparatus for triggering key updating Download PDFInfo
- Publication number
- CN100461974C CN100461974C CNB2007100974899A CN200710097489A CN100461974C CN 100461974 C CN100461974 C CN 100461974C CN B2007100974899 A CNB2007100974899 A CN B2007100974899A CN 200710097489 A CN200710097489 A CN 200710097489A CN 100461974 C CN100461974 C CN 100461974C
- Authority
- CN
- China
- Prior art keywords
- key
- generation
- session
- updating
- parameter
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention provides a key updating and triggering method and device. Wherein, the key updating and triggering method includes the following steps: S302, a user equipment and a network share at least one generating key for generating a conversation key, in which, each generating key is respectively used to produce at least one conversation key, and the user equipment respectively provides a corresponding first key failure parameter for each each generating key; S304, in the circumstances of any of the at least one generating keys achieving the survival period, the user equipment will set the first key failure parameter corresponding to the generating key as invalid; and S306, if necessary, the user equipment notifies that network elements in the network key are invalid to trigger the key update. According to the present invention, it can facilitate the completion of invalid settings of the generating key shared between the user equipment and network for generating the conversation key, which can further provide the basis for the key update.
Description
Technical field
The present invention relates to the communications field, relate more specifically to a kind of key updating triggering method and device.
Background technology
More and more at the network element that today that communication network becomes increasingly complex and terminal have security association, following user and network element cipher key shared are also more and more.In these keys, some is the session key (as encryption key and Integrity Key) that is used for carrying out with network element session, and some is the generation key that is used to generate session key, and also some key is the generation key that is used to generate key.How to the rational stale value of these cipher key settings, utilizing these stale value to trigger key updatings then is new problems.
Summary of the invention
The object of the present invention is to provide a kind of key updating triggering method and device, inefficacy setting with the generation key of conveniently finishing between travelling carriage and the access security management entity generation session key of sharing, and conveniently finish between travelling carriage and the Mobility Management Entity and the inefficacy setting of the session key between travelling carriage and the base station, and then provide foundation for key updating.
Key updating triggering method according to the present invention may further comprise the steps: S302, subscriber equipment and network are shared at least one and are used to generate the generation key of session key, wherein, each generates key and is respectively applied at least one session key of generation, and subscriber equipment is respectively each and generates the first key inefficacy parameter that key provides correspondence; S304 generates in key any one at least one and generates key and reach under the situation of life cycle, and it is invalid that the first key inefficacy parameter that subscriber equipment generates the key correspondence is set to; And S306, under the situation of needs, the network element key in the notification of user equipment network lost efficacy to trigger key updating.
Another kind of key updating triggering method according to the present invention may further comprise the steps: S402, subscriber equipment and network are shared at least one and are used to generate the generation key of session key, wherein, each generates key and is respectively applied at least one session key of generation, and subscriber equipment is respectively each and generates one the second key inefficacy parameter that key provides all session keys that generate corresponding to same generation key; S404, any one session key in all session keys reaches under the situation of life cycle, and it is invalid that the second key inefficacy parameter of all session key correspondences of subscriber equipment is set to; And S406, under the situation of needs, the network element key in the notification of user equipment network lost efficacy to trigger key updating.
Another key updating triggering method according to the present invention may further comprise the steps: S702, subscriber equipment and network are shared at least one and are used to generate the generation key of session key, wherein, each generates key and is respectively applied at least one session key of generation, subscriber equipment is respectively each and generates one the second key inefficacy parameter that key provides all session keys that generate corresponding to same generation key for each generates the first key inefficacy parameter that key provides a correspondence; S704, any one generation key at least one generation key reaches life cycle or any one session key in all session keys reaches under the situation of life cycle, it is invalid that the first key inefficacy parameter that subscriber equipment generates the key correspondence is set to, and it is invalid that the second key inefficacy parameter that maybe generates all session key correspondences that key generates is set to; And S706, under the situation of needs, the network element key in the notification of user equipment network lost efficacy to trigger key updating.
Wherein, in step S704, reach under the situation of life cycle at all generation keys that generate in the key, it is invalid that the first key inefficacy parameter that subscriber equipment generates the key correspondence is set to, and the second key inefficacy parameter of all session key correspondences is set to invalidly, and loses efficacy to trigger key updating by the network element key in the network.
Wherein, subscriber equipment transfers to network element with the first key inefficacy parameter and/or the second key inefficacy parameter.
According to key updating trigger equipment of the present invention, be positioned at user equipment side, comprise: key parameter is provided with module, be used to preserve that subscriber equipment and network share that at least one is used to generate the generation key of session key, wherein, each generates key and is respectively applied at least one session key of generation, and be respectively each and generate the first key inefficacy parameter that key provides a correspondence, be respectively each and generate one the second key inefficacy parameter that key provides all session keys that generate corresponding to same generation key; Key state is provided with module, any one generation key at least one generation key reaches life cycle or any one session key in all session keys reaches under the situation of life cycle, it is invalid that the first key inefficacy parameter that subscriber equipment generates the key correspondence is set to, and it is invalid that the second key inefficacy parameter that maybe generates all session key correspondences that key generates is set to; And the key updating trigger module, the send a notice network element key of network of the situation at needs of being used for lost efficacy to trigger key updating.
Wherein, generate in keys one at all and generate keys and reach under the situation of life cycle, it is invalid that the first key inefficacy parameter that the key state module generates the key correspondence is set to, and the second key inefficacy parameter of all session key correspondences be set to invalid.
Wherein, the key updating trigger module transfers to network element with the first key inefficacy parameter and/or the second key inefficacy parameter.
By the present invention, can conveniently finish the inefficacy setting of the generation key of the generation session key of sharing between travelling carriage and the access security management entity, and conveniently finish between travelling carriage and the Mobility Management Entity and the inefficacy setting of the session key between travelling carriage and the base station, and then can provide foundation for key updating.Compared to existing two kinds of key inefficacy parameter setting methods, the present invention had both had certain flexibility, made that again the key updating flow process is simpler.
Description of drawings
Accompanying drawing described herein is used to provide further understanding of the present invention, constitutes the application's a part, and illustrative examples of the present invention and explanation thereof are used to explain the present invention, do not constitute improper qualification of the present invention.In the accompanying drawings:
Fig. 1 is the key generation graph of a relation according to the embodiment of the invention;
Fig. 2 is according to the key of the embodiment of the invention and inefficacy parameter corresponding relation figure;
Fig. 3 is the flow chart according to the key updating triggering method of the embodiment of the invention;
Fig. 4 is the flow chart of key updating triggering method according to another embodiment of the present invention;
Fig. 5 is the key generation graph of a relation according to further embodiment of this invention;
Fig. 6 is according to key of further embodiment of this invention and inefficacy parameter corresponding relation figure;
Fig. 7 is the flow chart according to the key updating triggering method of further embodiment of this invention; And
Fig. 8 is the block diagram according to the key update device of the embodiment of the invention.
Embodiment
Below with reference to accompanying drawing, describe the specific embodiment of the present invention in detail.
With reference to figure 1, illustrate that the key according to the embodiment of the invention generates relation.As shown in Figure 1, in user and n shared generation key K that is used to generate session key of network
CR1, K
CR2..., K
CRnIn, K
CR1The m1 that can generate session key K
SS1, K
SS2..., K
SSm1, K
CRiCan generate mi session key is K
SS1, K
SS2..., K
SSmi, K
CRnCan generate mn session key K
SS1, K
SS2..., K
SSmn
With reference to figure 2, the corresponding relation between generation key shown in the key diagram 1 and session key and the inefficacy parameter.As shown in Figure 2, the user can provide n to generate key inefficacy parameter K SI for the generation key of n session key
CR1, KSI
CR2..., KSI
CRn, and can be for by same generation key K
CRiAll session keys that generate provide a key inefficacy parameter K SI
SSi
With reference to figure 3, the key updating triggering method according to the embodiment of the invention is described.As shown in Figure 3, this key updating triggering method may further comprise the steps: S302, subscriber equipment and network share n generation key K that is used to generate session key
CR1, K
CR2..., K
CRn, wherein, each generates key and is respectively applied for mi session key K of generation
SS1, K
SS2..., K
SSmi, subscriber equipment is respectively each and generates the first key inefficacy parameter K that key provides correspondence
CRiS304 generates key n any one that generates in the key and reaches under the situation of life cycle, and it is invalid that the first key inefficacy parameter that subscriber equipment generates the key correspondence is set to; And S306, under the situation of needs, the network element key in the notification of user equipment network lost efficacy to trigger key updating.
With reference to figure 4, key updating triggering method according to another embodiment of the present invention is described.As shown in Figure 4, this key updating triggering method may further comprise the steps: S402, subscriber equipment and network share n generation key K that is used to generate session key
CR1, K
CR2..., K
CRn, wherein, each generates key and is respectively applied for mi session key of generation, and subscriber equipment is respectively each and generates one the second key inefficacy parameter K SI that key provides all session keys that generate corresponding to same generation key
SSiS404, any one session key in all session keys reaches under the situation of life cycle, and it is invalid that the second key inefficacy parameter of all session key correspondences of subscriber equipment is set to; And S406, under the situation of needs, the network element key in the notification of user equipment network lost efficacy to trigger key updating.
Provide another embodiment of the present invention below in conjunction with among the 3GPP LTE/SAE key parameter of base station and Mobility Management Entity being provided with to lose efficacy.
In 3GPP LTE/SAE, HSS is meant the user attaching network, Auc is meant the authentication center of user attaching network, ASME (Access Security Management Entity) is meant the access security management entity, MME is meant Mobility Management Entity, eNB is meant the base station, and ME is meant the travelling carriage such as mobile phone.
In 3GPP LTE/SAE security architecture, a kind of optional key generates relation as shown in Figure 5, wherein K is the pre-root key of sharing between authentication center and the ME, CK, IK are encryption key and the Integrity Key that AKA (Authentication and key agreement) consults, and are to generate key K
ASMEIn the middle of generate key, K
ASMEBe the generation key that generates session key, K
NAS enc, K
NAS int, K
ENB enc, K
ENB intAll be by K
ASMEThe session key that generates, wherein, K
NAS enc, K
NAS intBe shared session key between ME and the MME, K
ENB enc, K
ENB intBe shared session key between ME and the eNB.Fig. 6 shows K
ASME, K
ENB enc, K
ENB intAnd the corresponding relation between its inefficacy parameter.
Below with reference to Fig. 7, describe key updating triggering method in detail according to further embodiment of this invention.As shown in Figure 7, this key updating triggering method may further comprise the steps:
S702, ME and ASME share the generation key K of session key
ASME, by K
ASME4 session keys that generate are K
NAS enc, K
NAS int, K
ENB enc, and K
ENB int, the user is the generation key K of session key
ASMEProvide 1 to generate key inefficacy parameter K SI
ASME, be K
ASMEAll session keys that generate provide a key inefficacy parameter K SI
SS
S704 works as K
ASMEReach life cycle or by K
ASMEThe session key K that generates
NAS enc, K
NAS int, K
ENB enc, K
ENB intIn any one when reaching life cycle, subscriber equipment will generate key K
ASMECorresponding KSI
ASMEIt is invalid to be set to, or with K
NAS enc, K
NAS int, K
ENB enc, and K
ENB intCorresponding KSI
SSIt is invalid to be set to.
S706, in needs, subscriber equipment is with KSI
ASMELost efficacy and/or KSI
SSFailure notification is given network element AS ME, to trigger key updating.
Further, in step S706, when with KSI
ASMEWhen being set to invalid value, can be only with KSI
ASMENotice ASME also can be with KSI
ASMEAnd KSI
SSNotify respective network elements to trigger key updating, as long as can trigger K at last together
ASME, K
NAS enc, K
NAS int, K
ENB enc, K
ENB intKey updating get final product.
With reference to figure 8, the key updating trigger equipment according to the user equipment side of the embodiment of the invention is described.As shown in Figure 8, this key updating trigger equipment comprises: key parameter is provided with module 802, be used to preserve that subscriber equipment and network share that at least one is used to generate the generation key of session key, wherein, each generates key and is respectively applied at least one session key of generation, and be respectively each and generate the first key inefficacy parameter that key provides a correspondence, be respectively each and generate one the second key inefficacy parameter that key provides all session keys that generate corresponding to same generation key; Key state is provided with module 804, any one generation key at least one generation key reaches life cycle or any one session key in all session keys reaches under the situation of life cycle, it is invalid that the first key inefficacy parameter that subscriber equipment generates the key correspondence is set to, and it is invalid that the second key inefficacy parameter that maybe generates all session key correspondences that key generates is set to; And key updating trigger module 806, the send a notice network element key of network of the situation at needs of being used for lost efficacy to trigger key updating.
Wherein, generate in keys one at all and generate keys and reach under the situation of life cycle, it is invalid that the first key inefficacy parameter that the key state module generates the key correspondence is set to, and the second key inefficacy parameter of all session key correspondences be set to invalid.
Wherein, the key updating trigger module transfers to network element with the first key inefficacy parameter and/or the second key inefficacy parameter.
Adopt the present invention, can conveniently finish the inefficacy setting of the generation key of the generation session key of sharing between ME and the ASME, also can conveniently finish between ME and the MME and the inefficacy setting of the session key between ME and the eNB, and then provide foundation for key updating, compare existing two kinds of key inefficacy parameter setting methods, the present invention had both had certain flexibility, can make the key updating flow process simpler relatively again.
The above is the preferred embodiments of the present invention only, is not limited to the present invention, and for a person skilled in the art, the present invention can have various changes and variation.Within the spirit and principles in the present invention all, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (10)
1. a key updating triggering method is characterized in that, may further comprise the steps:
S302, subscriber equipment and network are shared at least one and are used to generate the generation key of session key, wherein, each generates key and is respectively applied at least one session key of generation, and described subscriber equipment is respectively each described generation key the first corresponding key inefficacy parameter is provided;
S304, any one at least one described generation key generates key and reaches under the situation of life cycle, and it is invalid that the first key inefficacy parameter of the described generation key of described subscriber equipment correspondence is set to; And
S306, under the situation of needs, the network element key in the described network of described notification of user equipment lost efficacy to trigger key updating.
2. a key updating triggering method is characterized in that, may further comprise the steps:
S402, subscriber equipment and network are shared at least one and are used to generate the generation key of session key, wherein, each generates key and is respectively applied at least one session key of generation, and described subscriber equipment is respectively one the second key inefficacy parameter that each described generation key provides all session keys that generate corresponding to same described generation key;
S404, any one session key in described all session keys reaches under the situation of life cycle, and it is invalid that the second key inefficacy parameter of described all the session key correspondences of described subscriber equipment is set to; And
S406, under the situation of needs, the network element key in the described network of described notification of user equipment lost efficacy to trigger key updating.
3. a key updating triggering method is characterized in that, may further comprise the steps:
S702, subscriber equipment and network are shared at least one and are used to generate the generation key of session key, wherein, each generates key and is respectively applied at least one session key of generation, described subscriber equipment is respectively one the second key inefficacy parameter that each described generation key provides all session keys that generate corresponding to same described generation key for each described generation key provides the first key inefficacy parameter of a correspondence;
S704, any one generation key at least one described generation key reaches life cycle or any one session key in described all session keys reaches under the situation of life cycle, it is invalid that the first key inefficacy parameter of the described generation key of described subscriber equipment correspondence is set to, or the second key inefficacy parameter of all session key correspondences of generating of described generation key be set to invalid; And
S706, under the situation of needs, the network element key in the described network of described notification of user equipment lost efficacy to trigger key updating.
4. key updating triggering method according to claim 3, it is characterized in that, in described step S704, one in all described generation keys generates key and reaches under the situation of life cycle, it is invalid that the first key inefficacy parameter of the described generation key of described subscriber equipment correspondence is set to, and the second key inefficacy parameter of described all session key correspondences is set to invalidly, and loses efficacy to trigger key updating by the network element key in the described network.
5. key updating triggering method according to claim 4 is characterized in that, described subscriber equipment transfers to described network element with described first key inefficacy parameter or the described second key inefficacy parameter.
6. key updating triggering method according to claim 4 is characterized in that, described subscriber equipment transfers to described network element with described first key inefficacy parameter and the described second key inefficacy parameter.
7. a key updating trigger equipment is positioned at user equipment side, it is characterized in that comprising:
Key parameter is provided with module, be used to preserve that subscriber equipment and network share that at least one is used to generate the generation key of session key, wherein, each generates key and is respectively applied at least one session key of generation, and be respectively the first key inefficacy parameter that each described generation key provides a correspondence, be respectively one the second key inefficacy parameter that each described generation key provides all session keys that generate corresponding to same described generation key;
Key state is provided with module, any one generation key at least one described generation key reaches life cycle or any one session key in described all session keys reaches under the situation of life cycle, it is invalid that the first key inefficacy parameter of the described generation key of described subscriber equipment correspondence is set to, or the second key inefficacy parameter of all session key correspondences of generating of described generation key be set to invalid; And
The send a notice network element key of described network of key updating trigger module, the situation at needs of being used for lost efficacy to trigger key updating.
8. key updating trigger equipment according to claim 7, it is characterized in that, one in all described generation keys generates key and reaches under the situation of life cycle, it is invalid that the first key inefficacy parameter that described key state is provided with the described generation key of module correspondence is set to, and the second key inefficacy parameter of described all session key correspondences be set to invalid.
9. key updating trigger equipment according to claim 8 is characterized in that, described key updating trigger module transfers to described network element with described first key inefficacy parameter or the described second key inefficacy parameter.
10. key updating trigger equipment according to claim 8 is characterized in that, described key updating trigger module transfers to described network element with described first key inefficacy parameter and the described second key inefficacy parameter.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2007100974899A CN100461974C (en) | 2007-05-09 | 2007-05-09 | Method and apparatus for triggering key updating |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2007100974899A CN100461974C (en) | 2007-05-09 | 2007-05-09 | Method and apparatus for triggering key updating |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101039524A CN101039524A (en) | 2007-09-19 |
CN100461974C true CN100461974C (en) | 2009-02-11 |
Family
ID=38890088
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2007100974899A Expired - Fee Related CN100461974C (en) | 2007-05-09 | 2007-05-09 | Method and apparatus for triggering key updating |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100461974C (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102170355A (en) * | 2011-04-27 | 2011-08-31 | 北京深思洛克软件技术股份有限公司 | Management method of remote upgrade secret key in information safety equipment |
CN111030936B (en) * | 2019-11-18 | 2023-04-07 | 腾讯云计算(北京)有限责任公司 | Current-limiting control method and device for network access and computer-readable storage medium |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1256599A (en) * | 1998-11-09 | 2000-06-14 | 朗迅科技公司 | Effective discrimination using key update |
JP2003318881A (en) * | 2002-04-26 | 2003-11-07 | Toshiba Corp | Cryptographic key updating system, its method and access point |
US20030221098A1 (en) * | 2002-05-22 | 2003-11-27 | Kun-Huei Chen | Method for automatically updating a network ciphering key |
CN1553600A (en) * | 2003-05-29 | 2004-12-08 | 华为技术有限公司 | Method for updating shared key |
CN1655497A (en) * | 2004-02-09 | 2005-08-17 | 华为技术有限公司 | Method for realizing multimedia broadcasting / multicasting service key dispensing |
CN1661955A (en) * | 2004-02-27 | 2005-08-31 | 华为技术有限公司 | Method for guaranteeing safety of system of general authentication frame |
WO2005086412A1 (en) * | 2004-03-05 | 2005-09-15 | Electronics And Telecommunications Research Institute | Method for managing traffic encryption key in wireless portable internet system and protocol configuration method thereof, and operation method of traffic encryption key state machine in subscriber station |
WO2006034310A1 (en) * | 2004-09-21 | 2006-03-30 | Qualcomm Incorporated | Determining a session encryption key during a broadcast/multicast service session using secure real-time transport protocol |
CN1889769A (en) * | 2005-06-29 | 2007-01-03 | 华为技术有限公司 | A periodical updating method for transmission encrypted symmetric keys |
CN1947373A (en) * | 2004-03-05 | 2007-04-11 | 韩国电子通信研究院 | Method for managing traffic encryption key in wireless portable internet system and protocol configuration method thereof, and operation method of traffic encryption key state machine in subscriber st |
-
2007
- 2007-05-09 CN CNB2007100974899A patent/CN100461974C/en not_active Expired - Fee Related
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1256599A (en) * | 1998-11-09 | 2000-06-14 | 朗迅科技公司 | Effective discrimination using key update |
JP2003318881A (en) * | 2002-04-26 | 2003-11-07 | Toshiba Corp | Cryptographic key updating system, its method and access point |
US20030221098A1 (en) * | 2002-05-22 | 2003-11-27 | Kun-Huei Chen | Method for automatically updating a network ciphering key |
CN1553600A (en) * | 2003-05-29 | 2004-12-08 | 华为技术有限公司 | Method for updating shared key |
CN1655497A (en) * | 2004-02-09 | 2005-08-17 | 华为技术有限公司 | Method for realizing multimedia broadcasting / multicasting service key dispensing |
CN1661955A (en) * | 2004-02-27 | 2005-08-31 | 华为技术有限公司 | Method for guaranteeing safety of system of general authentication frame |
WO2005086412A1 (en) * | 2004-03-05 | 2005-09-15 | Electronics And Telecommunications Research Institute | Method for managing traffic encryption key in wireless portable internet system and protocol configuration method thereof, and operation method of traffic encryption key state machine in subscriber station |
CN1947373A (en) * | 2004-03-05 | 2007-04-11 | 韩国电子通信研究院 | Method for managing traffic encryption key in wireless portable internet system and protocol configuration method thereof, and operation method of traffic encryption key state machine in subscriber st |
WO2006034310A1 (en) * | 2004-09-21 | 2006-03-30 | Qualcomm Incorporated | Determining a session encryption key during a broadcast/multicast service session using secure real-time transport protocol |
CN1889769A (en) * | 2005-06-29 | 2007-01-03 | 华为技术有限公司 | A periodical updating method for transmission encrypted symmetric keys |
Also Published As
Publication number | Publication date |
---|---|
CN101039524A (en) | 2007-09-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110881184B (en) | Communication method and device | |
US6857075B2 (en) | Key conversion system and method | |
CN107409305B (en) | Communication security setup between communication device and network device | |
US10003965B2 (en) | Subscriber profile transfer method, subscriber profile transfer system, and user equipment | |
CN108141355B (en) | Method and system for generating session keys using Diffie-Hellman procedure | |
JP5334974B2 (en) | Method and system for communication using extended sequence numbers | |
US20080095361A1 (en) | Security-Enhanced Key Exchange | |
CN101083839B (en) | Cipher key processing method for switching among different mobile access systems | |
EP2523486A1 (en) | Key authentication method for binary cdma | |
CN102783080A (en) | Secure multi -UIM authentication and key exchange | |
CN1249587A (en) | Method for mutual authentication and cryptographic key agreement | |
KR20000062153A (en) | Efficient authentication with key update | |
NZ589294A (en) | Cryptographic key generation using parameters based on a set of generated keys, an incrementing sequence number and an anonymity key | |
EP1121822B1 (en) | Authentication in a mobile communications system | |
CN101232731A (en) | Method and system for UE to generate cryptographic key switching from UTRAN to EUTRAN | |
CN101163003A (en) | System and method for authenticating network for terminal when SIM card use UMTS terminal and UMTS system | |
CN101102600A (en) | Secret key processing method for switching between different mobile access systems | |
CN109906624A (en) | The method and relevant network node and wireless terminal of certification in support cordless communication network | |
CN101160780B (en) | Controlled cipher key updating method and apparatus | |
CN100461938C (en) | Updating method of controlled secret key | |
CN100461974C (en) | Method and apparatus for triggering key updating | |
KR20220098364A (en) | Wireless communication method for registration process | |
CN101160784B (en) | Cipher key updating negotiation method and apparatus | |
CN102111268B (en) | Two-way authentication method of global system for mobile communications (GSM) network | |
CN100396156C (en) | Synchronous SQN processing method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20180703 Address after: California, USA Patentee after: Global innovation polymerization LLC Address before: 518057 Zhongxing building, science and technology south road, Nanshan District hi tech Industrial Park, Guangdong, Shenzhen Patentee before: ZTE Corp. |
|
TR01 | Transfer of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20090211 |
|
CF01 | Termination of patent right due to non-payment of annual fee |