CN101483864B - Mobile station identification distributing method, system and base station - Google Patents

Mobile station identification distributing method, system and base station Download PDF

Info

Publication number
CN101483864B
CN101483864B CN2009100786189A CN200910078618A CN101483864B CN 101483864 B CN101483864 B CN 101483864B CN 2009100786189 A CN2009100786189 A CN 2009100786189A CN 200910078618 A CN200910078618 A CN 200910078618A CN 101483864 B CN101483864 B CN 101483864B
Authority
CN
China
Prior art keywords
terminal
mobile station
base station
station identification
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN2009100786189A
Other languages
Chinese (zh)
Other versions
CN101483864A (en
Inventor
冯成燕
刘向宇
滕志猛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN2009100786189A priority Critical patent/CN101483864B/en
Publication of CN101483864A publication Critical patent/CN101483864A/en
Application granted granted Critical
Publication of CN101483864B publication Critical patent/CN101483864B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a distribution method for mobile station identifiers, which comprises: in the initial networking or re-networking process of a terminal, after the terminal finishes certificate authority operation successfully, a base station distributes a mobile station identifier to a terminal; and the distributed mobile station identifier is sent to the terminal in the interaction of the base station and the terminal. The invention further discloses a distribution system and a base station for the mobile station identifier. The method, the system and the base station standardize the distribution operation of the mobile station identifiers, realize the distribution proposal of the mobile station identifier and only distribute and send the mobile station identifiers to the authorized terminals, thus saving network resources and facilitating practical operation.

Description

The distribution method of mobile station identification, system and base station
Technical field
The present invention relates to the mobile logo distribution technology in the radio communication, relate in particular to a kind of distribution method, system and base station of mobile station identification.
Background technology
Electronic motor engineering association (IEEE, Institute of Electrical and Electronic Engineers) is the mechanism that formulates the electronic equipment standard, in order to formulate the standard of various different communication technology.Wherein, IEEE802 mainly formulates the standard of electronic engineering and computer realm, is called local area network (LAN)/metropolitan area network standard committee (LMSC, LAN/MAN Standards Committee) again.And 802.16 standards systems mainly are at metropolitan area network, its main target is the wireless access system air interface physical layer (PHY of development in 2~66GHz frequency band, Physical Layer) and medium access control layer (MAC, Media Access Control) standard also has uniformity test relevant with air interface protocol and the coexistence standard between the different radio connecting system simultaneously.
According to whether supporting mobility, IEEE 802.16 standards can be divided into fixed broadband wireless and insert air-interface standard and mobile broadband wireless access air-interface standard, wherein 802.16,802.16a, 802.16c, 802.16d belong to the fixed wireless access air-interface standard, and 802.16e belongs to mobile broadband wireless and inserts air-interface standard.Worldwide interoperability for microwave inserts the standard that (WiMAX, Worldwide Interoperability forMicrowave Access) promptly is based on IEEE 802.16 air interfaces, has become the very big wireless access wide band technology of influence power in the world at present.
IEEE is working out the 802.16m standard at present, purpose is in order to study next step evolution path of WiMAX, become one of senior international mobile communication (IMT-Advanced) standard of next generation mobile communication technology and International Telecommunications Union (ITU, InternationalTelecommunication Unit).This standard is with the existing 802.16e standard of compatibility.
In the system description document (SDD, System DescriptionDocument) of present 802.16m standard, defined mobile station identification (STID, Station ID).STID enters network or reenters in the process of network at terminal initial, by base station each identifiers of terminals of unique identification in this base station scope that is used for for each terminal distribution.Each all has the STID of an appointment in the terminal of network registry.
802.16m stipulate among the SDD of standard that STID specifies and distributes in the verification process of terminal; But because STID is a terminal distribution by the base station, and based on Extensible Authentication Protocol (EAP, ExtensibleAuthentication Protocol) verification process is a transparent transmission to the base station then, the base station only provides relay services for the transmission of EAP message between terminal and the network side, and the content and the EAP authentication result of the unclear EAP message of transmitting.Therefore, there is certain irrationality in such regulation, and in verification process, the base station can't send the STID for terminal distribution to terminal on the one hand; On the other hand, if final authentication result failure, terminal does not obtain the mandate of access network, and authentication result can not be known in the base station in this initial authentication or re-authentication process, and the STID that has been terminal distribution has then wasted Internet resources.Owing to have above problem, adopt the allocative decision of the STID that describes among the SDD to realize.
Summary of the invention
In view of this, main purpose of the present invention is to provide a kind of distribution method, system and base station of mobile station identification, is the operation of terminal distribution STID with the standard base station.
For achieving the above object, technical scheme of the present invention is achieved in that
The invention provides a kind of distribution method of mobile station identification, this method comprises:
In terminal initial networking or re-networking process, after described terminal completed successfully the Certificate Authority operation, the base station was described terminal distribution mobile station identification;
Described base station sends to described terminal with the mobile station identification that distributes with terminal interaction the time.
Comprising alternately of described base station and terminal: to the three-way handshake process that Certificate Authority gained authorization key AK verifies, the registration message reciprocal process of perhaps described endpoint registration during to described base station.
This method further comprises:
When described terminal was carried out handover operation, in switching set-up procedure, target BS was carried at the mobile station identification that upgrades and sends to described terminal in the switching response message; Perhaps in switching implementation process, target BS is carried at the mobile station identification that upgrades and sends to described terminal in the ranging response message.
This method further comprises:
Described terminal upgrades in the position or idle pulley withdraws from the process, and the base station is carried at the mobile station identification that upgrades and sends to described terminal in the ranging response message.
This method further comprises: if carry the message of described mobile station identification Confidentiality protection is arranged, then described mobile station identification directly is carried at and sends to described terminal in the described message; Do not have Confidentiality protection if carry the message of described mobile station identification, then send to described terminal in the described message being carried at after the described mobile station identification employing secret key encryption.
Described mobile station identification is carried out encrypted secret key is: key-encrypting key KEK or traffic encryption key TEK.
The cryptographic algorithm that described mobile station identification is encrypted is by described base station with terminal is pre-configured or in the three-way handshake process generation of holding consultation.
The present invention also provides a kind of dissemination system of mobile station identification, and this system comprises: base station and terminal, wherein,
Described base station is used for networking or re-networking process at described terminal initial, after terminal completes successfully the Certificate Authority operation, is described terminal distribution mobile station identification, and with described terminal interaction the time mobile station identification that distributes is sent to described terminal;
Described terminal is used to receive the mobile station identification of described base station assigns.
The present invention also provides a kind of distributing base station of mobile station identification, comprising:
The mobile station identification distribution module is used for networking or re-networking process at terminal initial, after described terminal completes successfully the Certificate Authority operation, is described terminal distribution mobile station identification;
The distributing mobile station identifications module is used for described terminal interaction the time mobile station identification that distributes being sent to described terminal.
The reciprocal process of described base station and terminal comprises: to the three-way handshake process that Certificate Authority gained authorization key AK verifies, and the registration message reciprocal process of perhaps described endpoint registration during to described base station.
The distribution method of mobile station identification provided by the present invention, system and base station, in terminal initial networking or re-networking process, after terminal completes successfully the Certificate Authority operation, by the base station is the terminal distribution mobile station identification, and is carrying out in the mutual process of three-way handshake or registration message the mobile station identification that distributes being sent to terminal with terminal.Standard of the present invention the distribution operation of STID, make the distribution approach of STID to realize, and owing to only just distribute and send STID, thereby saved Internet resources for the terminal of obtaining the authorization, brought facility to practical operation.
Description of drawings
Fig. 1 is the flow chart of the distribution method of a kind of mobile station identification of the present invention;
Fig. 2 is the embodiment of the invention is distributed STID in three-way handshake process a flow chart;
Fig. 3 is the embodiment of the invention is distributed STID in registration message reciprocal process a flow chart;
Fig. 4 is that the embodiment of the invention is switched the flow chart of distributing STID in the implementation process in terminal;
Fig. 5 is that the embodiment of the invention is switched the flow chart of distributing STID in the set-up procedure in terminal;
Fig. 6 distributes the flow chart of STID in the updating of terminal position or the process that exits from idle mode for the embodiment of the invention;
Fig. 7 is the composition structural representation of the dissemination system of a kind of mobile station identification of the present invention.
Embodiment
The technical solution of the present invention is further elaborated below in conjunction with the drawings and specific embodiments.
The distribution method of a kind of mobile station identification provided by the invention as shown in Figure 1, mainly may further comprise the steps:
Step 101, in terminal initial networking or re-networking process, after terminal completed successfully the Certificate Authority operation, the base station was terminal distribution STID.
When terminal initial networked or networks again, network side need carry out authentication based on EAP to the terminal that networks; Behind the EAP authentication success, be this terminal distribution STID by the base station that terminal connected.The STID that distributes is used for this terminal of unique identification in this base station scope.
Step 102, the base station with the reciprocal process of terminal in the STID that distributes is sent to terminal.
In the present invention, the reciprocal process of base station and terminal comprises: to the three-way handshake process that the authorization key (AK, Authorization Key) that is derived from behind the EAP Certificate Authority is verified, registration message reciprocal process when perhaps endpoint registration is to the base station or the like.In addition, terminal withdraws from the process in handoff procedure, position updating process and free time (Idle) pattern, and the base station also needs to distribute the STID of renewal to send to terminal.Certainly, the reciprocal process of indication base station and terminal among the present invention is not limited only to above-mentioned the act, can also expand according to actual needs.
The base station can with the three-way handshake process of terminal in to terminal distribution STID, the embodiment to distribution STID in three-way handshake process is elaborated below, as shown in Figure 2, mainly may further comprise the steps:
Step 201, when terminal initial networks or networks again, the EAP process that the base station assists terminal and network side to finish initial authentication or authenticate again.
Step 202, based on the initial authentication of EAP or again behind the authentication success, in order to verify the legitimacy of the AK that EAP authentication back is derived from, terminal and base station begin to carry out the proof procedure based on the three-way handshake of IKMP version 2 (PKMv2, Privacy Key Management); And at first sending checking challenge (PKMv2-RSP/SA-TEK-Challenge) message to terminal by the base station, this message has been determined the AK that uses.
After step 203, terminal are received PKMv2-RSP/SA-TEK-Challenge message, the legitimacy of AK is verified, and after being proved to be successful, sent checking request (PKMv2-REQ/SA-TEK-Request) message to the base station according to verification algorithm.
Step 204, after the base station receives PKMv2-REQ/SA-TEK-Request message, according to verification algorithm the legitimacy of AK is verified, if be proved to be successful, then be STID of terminal Random assignment, and the STID that distributes is carried in auth response (PKMv2-RSP/SA-TEK-Response) message sends to terminal.
It is pointed out that the mapping relations that need safeguard STID and terminal MAC Address at network side, these mapping relations need be protected, and therefore when the base station need be sent as the STID of terminal distribution, this STID need protect transmission; And only finish at the EAP authentication success, the AK of generation could protect transmission to STID after succeeding and verifying.
If the base station sends to the PKMv2-RSP/SA-TEK-Response message of terminal Confidentiality protection is arranged, then STID directly can be carried in the PKMv2-RSP/SA-TEK-Response message and send to terminal; If the base station sends to the PKMv2-RSP/SA-TEK-Response message of terminal and does not do Confidentiality protection; then can adopt key-encrypting key (KEK; Key Encrypting Key) or traffic encryption key (TEK, Traffic Encrypting Key) etc. be carried in the PKMv2-RSP/SA-TEK-Response message after STID is encrypted and send to terminal.Security parameters such as cryptographic algorithm to STID encrypts can be undertaken pre-configured or the generation of holding consultation in three-way handshake process by base station and terminal.
The base station can also be to terminal distribution STID in the registration process of terminal, and the embodiment to distribution STID in registration message reciprocal process is elaborated below, as shown in Figure 3, mainly may further comprise the steps:
Step 301, when terminal initial networks or networks again, the EAP process that the base station assists terminal and network side to finish initial authentication or authenticate again.
Step 302, based on the initial authentication of EAP or again behind the authentication success, the proof procedure based on the three-way handshake of PKMv2 is carried out in terminal and base station, the legitimacy of the AK that is produced with checking EAP authentication.
Step 303, after the legitimate verification success of AK, terminal sends register requirement (REG-REQ, Register Request) message to the base station, and request is to base station login.
Step 304, base station will be carried at the registration response for the STID of terminal distribution, and (REG-RSP RegisterResponse) sends to terminal in the message.
It is pointed out that if the base station sends to the REG-RSP message of terminal has Confidentiality protection, then STID directly can be carried in the REG-RSP message and send to terminal; If the base station sends to the REG-RSP message of terminal and do not do Confidentiality protection, be carried in the REG-RSP message after then can adopting KEK or TEK etc. that STID is encrypted and send to terminal.Security parameters such as cryptographic algorithm to STID encrypts can be undertaken pre-configured or the generation of holding consultation in three-way handshake process by base station and terminal.
When terminal need be carried out the service switching of base station, the target BS that terminal will switch to need be the STID that terminal distribution is upgraded, and target BS can send to terminal with the STID that upgrades in range finding (Ranging) process.Concrete operations mainly may further comprise the steps as shown in Figure 4:
Step 401, terminal send terminal to current serving BS and switch indication (MOB HO-IND) message, need switch to target BS with this terminal of notification service base station.
Step 402, serving BS and target BS carry out switch acknowledgment message reciprocal process, promptly will switch to target BS affirmation terminal.
Step 403, terminal is carried out re-networking process at target BS, and sends distance measurement request (RNG-REQ, Ranging Request) message to target BS.
Step 404, target BS are the STID that terminal distribution is upgraded, and the STID that distributes is carried in ranging response (RNG-RSP, the Ranging Response) message sends to terminal.After this target BS and terminal promptly can use the STID of this renewal to come the marking terminal identity.
The STID that upgrades can be identical at the STID that serving BS is assigned with terminal, also can be different, but need guarantee that the STID that distributes can this terminal of unique identification in target BS.
It is pointed out that if target BS sends to the RNG-RSP message of terminal has Confidentiality protection, then STID directly can be carried in the RNG-RSP message and send to terminal; If target BS sends to the RNG-RSP message of terminal and do not do Confidentiality protection, be carried in the RNG-RSP message after then can adopting KEK or TEK etc. that STID is encrypted and send to terminal.The AK that encryption keys such as KEK that target BS adopts or TEK are used by serving BS recomputates in target BS and obtains; And the AK that serving BS uses can carry out sending to target BS in the mutual process of switch acknowledgment message with target BS.
In addition, the security parameters such as cryptographic algorithm to STID encrypts can be undertaken pre-configured by system; Perhaps in switching set-up procedure, when switching interacting message, serving BS and target BS send to target BS by serving BS, or serving BS GC group connector and target BS hold consultation, and the security parameters such as STID cryptographic algorithm that serving BS is determined negotiation result are carried on and send to terminal in the switching response message (MOB BSHO-RSP); Perhaps in switching implementation process, serving BS and target BS carry out switch acknowledgment message when mutual, send to target BS by serving BS.
When terminal need be carried out the service switching of base station, target BS also can send to terminal with the STID that upgrades in switching set-up procedure.Concrete operations mainly may further comprise the steps as shown in Figure 5:
Step 501, terminal sends handoff request (MOB MSHO-REQ) message to serving BS, and request is switched.
Step 502, serving BS sends handoff request message to target BS.
Can the STID of carried terminal in serving BS in the handoff request message that sends, and/or security parameter such as STID cryptographic algorithm.
Step 503, target BS are the STID that terminal distribution is upgraded, and the STID that upgrades is carried at sends to terminal in the switching response message.
This message is carried parameter and can also be comprised: the SITD of renewal and the mapping relations of former STID, and/or security parameter such as STID cryptographic algorithm.
The STID that upgrades can be identical at the STID that serving BS is assigned with terminal, also can be different, but need guarantee that the STID that distributes can this terminal of unique identification in target BS.For example: the STID of terminal in serving BS that carries in the handoff request message of target BS according to the serving BS transmission, check whether this STID distributes in target BS, if do not distribute, then target BS still can be the identical STID of this terminal distribution; If distribute, then the target BS STID that generates other at random sends to terminal.
Step 504, serving BS sends switching response message (MOB BSHO-RSP) to terminal, carries the STID sign of renewal, and/or security parameter such as STID cryptographic algorithm.
It is pointed out that if target BS sends to the switching response message of terminal has Confidentiality protection, then STID directly can be carried at and send to terminal in the switching response message; If target BS sends to the switching response message of terminal and do not do Confidentiality protection, be carried at after then can adopting KEK or TEK etc. that STID is encrypted and send to terminal in the switching response message.
By operation shown in Figure 5, terminal is after this in the Ranging process that target BS switches, and target BS and terminal promptly can use the STID of this renewal to come the marking terminal identity; In the broadcast that target BS sends, can use the STID of renewal to determine the Resource Block of terminal initiation Ranging process; Terminal can directly send RNG-REQ message on the Resource Block of this appointment, to reduce the break period of handoff procedure, accelerate switch speed.
When terminal was carried out the position renewal or withdrawed from the Idle pattern at needs, the base station also needed the STID for the terminal distribution renewal, and the operation of the STID that the base station distribution is upgraded in this process as shown in Figure 6, mainly may further comprise the steps:
Step 601 is upgraded in the position or when withdrawing from Idle pattern trigger condition and satisfying, terminal sends RNG-REQ message to the base station.
Step 602, base station are the STID that terminal distribution is upgraded, and the STID that distributes is carried in the RNG-RSP message sends to terminal.
Same, if the base station sends to the RNG-RSP message of terminal Confidentiality protection is arranged, then STID directly can be carried in the RNG-RSP message and send to terminal; If the base station sends to the RNG-RSP message of terminal and do not do Confidentiality protection, be carried in the RNG-RSP message after then can adopting KEK or TEK etc. that STID is encrypted and send to terminal.
In addition, for position updating process, after having distributed the STID that upgrades, during the base station calling terminal, can in beep-page message, add the STID that upgrades and come this terminal of paging; For withdrawing from the Idle mode process, after having distributed the STID that upgrades, the STID that can use this renewal that communicates by letter of terminal and base station comes the marking terminal identity.
The distribution method of mobile station identification provided by the present invention is not limited to IEEE 802.16 systems, and its associative mode of realizing the sign distribution also is applicable in other wireless communication systems.
Be the distribution method of the mobile station identification of realizing the invention described above, the present invention also provides a kind of dissemination system of mobile station identification, and as shown in Figure 7, this system comprises: base station 10 and terminal 20.Base station 10 is used in terminal 20 initial network entry or re-networking process, after terminal 20 completes successfully Certificate Authority operation, is that terminal 20 is distributed mobile station identifications, and the mobile station identification that distributes is being sent to terminal 20 with terminal 20 when mutual.Be positioned at the terminal 20 of base station 10 service ranges, be used to receive the mobile station identification that base station 10 is distributed.
Wherein, base station 10 further comprises: interconnective mobile station identification distribution module 11 and distributing mobile station identifications module 12.Mobile station identification distribution module 11 is used in terminal 20 initial network entry or re-networking process, after terminal 20 completes successfully the Certificate Authority operation, for terminal 20 is distributed mobile station identification.Distributing mobile station identifications module 12 is used in the base station 10 and the mobile station identification that distributes is sent to terminal 20 during with terminal 20 mutual.
The above is preferred embodiment of the present invention only, is not to be used to limit protection scope of the present invention.

Claims (10)

1. the distribution method of a mobile station identification is characterized in that, this method comprises:
In terminal initial networking or re-networking process, after described terminal completed successfully the Certificate Authority operation, the base station was described terminal distribution mobile station identification;
Described base station sends to described terminal with the mobile station identification that distributes with terminal interaction the time.
2. according to the distribution method of the described mobile station identification of claim 1, it is characterized in that, comprising alternately of described base station and terminal: to the three-way handshake process that Certificate Authority gained authorization key AK verifies, the registration message reciprocal process of perhaps described endpoint registration during to described base station.
3. according to the distribution method of the described mobile station identification of claim 1, it is characterized in that this method further comprises:
When described terminal was carried out handover operation, in switching set-up procedure, target BS was carried at the mobile station identification that upgrades and sends to described terminal in the switching response message; Perhaps in switching implementation process, target BS is carried at the mobile station identification that upgrades and sends to described terminal in the ranging response message.
4. according to the distribution method of the described mobile station identification of claim 1, it is characterized in that this method further comprises:
Described terminal upgrades in the position or idle pulley withdraws from the process, and the base station is carried at the mobile station identification that upgrades and sends to described terminal in the ranging response message.
5. according to the distribution method of claim 1 or 2 or 3 or 4 described mobile station identifications, it is characterized in that, this method further comprises: if carry the message of described mobile station identification Confidentiality protection is arranged, then described mobile station identification directly is carried at and sends to described terminal in the described message; Do not have Confidentiality protection if carry the message of described mobile station identification, then send to described terminal in the described message being carried at after the described mobile station identification employing secret key encryption.
6. according to the distribution method of the described mobile station identification of claim 5, it is characterized in that, described mobile station identification is carried out encrypted secret key be: key-encrypting key KEK or traffic encryption key TEK.
7. according to the distribution method of the described mobile station identification of claim 5, it is characterized in that the cryptographic algorithm that described mobile station identification is encrypted is by described base station with terminal is pre-configured or in the three-way handshake process generation of holding consultation.
8. the dissemination system of a mobile station identification is characterized in that, this system comprises: base station and terminal, wherein,
Described base station is used for networking or re-networking process at described terminal initial, after terminal completes successfully the Certificate Authority operation, is described terminal distribution mobile station identification, and with described terminal interaction the time mobile station identification that distributes is sent to described terminal;
Described terminal is used to receive the mobile station identification of described base station assigns.
9. the distributing base station of a mobile station identification is characterized in that, comprising:
The mobile station identification distribution module is used for networking or re-networking process at terminal initial, after described terminal completes successfully the Certificate Authority operation, is described terminal distribution mobile station identification;
The distributing mobile station identifications module is used for described terminal interaction the time mobile station identification that distributes being sent to described terminal.
10. according to the distributing base station of the described mobile station identification of claim 9, it is characterized in that, the reciprocal process of described base station and terminal comprises: to the three-way handshake process that Certificate Authority gained authorization key AK verifies, and the registration message reciprocal process of perhaps described endpoint registration during to described base station.
CN2009100786189A 2009-02-27 2009-02-27 Mobile station identification distributing method, system and base station Active CN101483864B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009100786189A CN101483864B (en) 2009-02-27 2009-02-27 Mobile station identification distributing method, system and base station

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009100786189A CN101483864B (en) 2009-02-27 2009-02-27 Mobile station identification distributing method, system and base station

Publications (2)

Publication Number Publication Date
CN101483864A CN101483864A (en) 2009-07-15
CN101483864B true CN101483864B (en) 2010-09-29

Family

ID=40880751

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009100786189A Active CN101483864B (en) 2009-02-27 2009-02-27 Mobile station identification distributing method, system and base station

Country Status (1)

Country Link
CN (1) CN101483864B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101671257B1 (en) * 2010-09-12 2016-11-01 삼성전자주식회사 Method and apparatus for map transmission in wireless communication system

Also Published As

Publication number Publication date
CN101483864A (en) 2009-07-15

Similar Documents

Publication Publication Date Title
US8107629B2 (en) Method of providing security for relay station
US7158777B2 (en) Authentication method for fast handover in a wireless local area network
EP2418883B1 (en) Wireless local area network terminal pre-authentication method and wireless local area network system
US8397071B2 (en) Generation method and update method of authorization key for mobile communication
US8380980B2 (en) System and method for providing security in mobile WiMAX network system
CN102106111A (en) Method of deriving and updating traffic encryption key
US20060094401A1 (en) Method and apparatus for authentication of mobile devices
EP3700162B1 (en) Systems and methods for authentication
KR20090005971A (en) A method of establishing fast security association for handover between heterogeneous radio access networks
JP2005110112A (en) Method for authenticating radio communication device in communication system, radio communication device, base station and authentication device
CN101631306A (en) Updating method of air key, terminal and base station
CN101635923A (en) EAP authentication method and system supporting fast switching
CN111901795B (en) Access method, core network equipment and micro base station management server
CN111601280B (en) Access verification method and device
KR20100109998A (en) Apparatus and method for processing authorization of handover ranging message in wireless communication system
CN101483864B (en) Mobile station identification distributing method, system and base station
CN102111761B (en) Secrete key management method and equipment
CN101742492B (en) Key processing method and system
CN101610511A (en) The guard method of terminal privacy and device
CN101588576A (en) Method and a system for protecting terminal privacy in wireless communication system
CN101668289B (en) Method and system for updating air interface secret key in wireless communication system
CN101540998A (en) Method and system for distributing mobile station mark in wireless communication system
KR20100054191A (en) Improved 3gpp-aka method for the efficient management of authentication procedure in 3g network
KR20130085170A (en) Method and apparatus for shortening authentication process during a handover of a user terminal in radio network
CN101505477A (en) Mobile station identification distributing method, base station and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant