PWS key updating methods, network side equipment and terminal in wireless communication system
Technical field
Set the present invention relates to PWS key updating methods, network side in the communications field, more particularly to a kind of wireless communication system
Standby and terminal.
Background technology
In order to enable users to timely and accurately receive alarm, warning and the crucial letter on disaster and other emergencies
Breath, 3GPP (3rd Generation Partnership Project, third generation partner program) defines PWS
(Public Warning System, public warning system) business.Meet with such as earthquake, tsunami, hurricane and outdoor fire disaster
During disaster, the business can the public to take suitable action to avoid oneself and its household severely injured or dead, or by
The heavy losses of property.
The different communication network that 3GPP is defined, such as GSM (Global System of Mobilecommunication, entirely
Ball GSM), UMTS (Universal MobileTelecommunications System, universal mobile communications system
System) and LTE (Long TermEvolution, Long Term Evolution) support PWS business, and provide that PWS business uses CBS
(CellBroadcast Service, cell broadcaste service) carries transmission.Its framework as shown in figure 1, the function of each network element such as
Lower explanation:
Cell Broadcast Entity (Cell Broadcast Entity, abbreviation CBE):It is not belonging to the communication network that 3GPP is defined.
CBE is responsible for being formatted CBS (Cell Broadcast Service, cell broadcaste service), including CBS message is divided
To the different pages;
CBC (Cell Broadcast Center, abbreviation CBC):Belong to a part for core network, can be with
It is connected with multiple CBE.CBC is responsible for the management of CBS message, including:Determine that CBS message starts the time of broadcast;Determine CBS message
The time gone off the air, and indicate each BSC (Base Station Controller, base station controller)/RNC (Radio
Network Controller, radio network controller) CBS message of going off the air;Determine the time that CBS message is repeatedly broadcast
Interval;It is determined that CBCH of broadcast CBS message etc..For GSM network, CBC is with being located at Radio Access Network
BSC is connected, and interface is IuBC;For UMTS system, CBC passes through IuBC interfaces and the RNC phases positioned at Radio Access Network
Even;For LTE system, (Mobility Management Entity, mobile management is real by the MME of CBC and core net
Body) it is connected, interface is S1BC.After CBC is configured and encapsulated to the CBE received the alert messages sent, it is sent to by shadow
BSC (gsm system), the RNC (UMTS system) and MME (LTE system), BSC/RNC/MME for ringing region forward it to each system again
(gsm system is that BTS (BaseTransceiver Station, base transceiver station), UMTS system are NodeB (sections for the base station of system
Point B), LTE system is eNB (enode b)), by base station broadcast to user.
The CBS business defined at present is sent over the broadcast.And broadcast channel is without any safeguard protection at present
Measure.Attacker can distort alert message, or receive after alert message, be weighed in another impregnable area
Put, so as to cause unnecessary panic and confusion in the public.
In order to prevent the appearance of such case, 3GPP determines to carry out safeguard protection to PWS, i.e., by using digital signature word
The method of section and timestamp, introduces signature algorithm and key managing project.Terminal is received after broadcasting alarm notifications, can be first to this
Alert message is authenticated, only after certification is successfully passed, and it is an effective alert message just to firmly believe it.
For any certificate scheme based on signature, authentication is required to obtain the key of signer, i.e., for UE,
Need the key of acquisition signer.Because the key is usually a public key, therefore network is in order to ensure the freshness and peace of key
Full property for each key, it is necessary to set an effective life cycle.In the life cycle, the key can normally be made
With;Before the key expires, network needs to be updated the key, and successfully enables new key, to ensure that the key is
Effectively.But in current 3GPP specifications, still do not defined to how PWS keys are updated.
The content of the invention
It is an object of the invention to provide PWS key updating methods, network side equipment and terminal in a kind of wireless communication system,
To solve the defect not yet defined for PWS key updating flows in existing standard.
To solve the above problems, the invention provides a kind of renewal side of public alarm system key in wireless communication system
Method, including:
Network side equipment in initial access process to terminal issue two public warning system (PWS) keys and the two
The identification information of PWS keys, one of them is currently used PWS keys, and another is next PWS keys used;
The network side equipment issues key configured information, and wherein at least includes:What network side equipment was being currently used
The identification information of PWS keys;
After the message for the carrying key updating configured information that the terminal sends is received, the network side equipment is to described
Terminal issues the PWS keys of the terminal request.
Further,
If the network side equipment knows that next PWS keys used update, in the institute sent next time
State also includes in key configured information:The identification information of next PWS keys used after renewal.
Further,
The network side equipment is mobility management entity (MME), base station controller (BSC) and radio network controller
(RNC) any one in;
Described two PWS keys and the mark letter of the two PWS keys that the network side equipment is issued to the terminal
Cease is that CBC (CBC) in the network or Cell Broadcast Entity (CBE) are synchronized on the network side equipment.
Further,
The network side equipment issues described two PWS keys to terminal in initial access process and the two PWS are close
The identification information of key, is specifically included:
The network side equipment is received after the Attach Request message that the terminal is sent, and is adhered to the terminal replies and is received
Message, wherein carrying described two PWS keys and the identification information of the two PWS keys;Or,
In the attaching process of the terminal, it is close that the network side equipment sends the described two PWS of carrying to the terminal
The message of layer three of the identification information of key and the two PWS keys.
Further,
The network side equipment issues key configured information, specifically includes:
The network side equipment is receiving the backward terminal of tracing section updating (TAU) request message that the terminal is sent
TAU response messages are issued, or the network side equipment issues broadcast message to the terminal;Wherein, set in the network side
The key configured information is carried in the standby message issued;
The network side equipment is after the message for the carrying key updating configured information that the terminal sends is received, to described
Terminal issues the PWS keys of the terminal request, specifically includes:
Disappear in the TAU requests for receiving the instruction for carrying the PWS keys for asking to issue needs renewal that the terminal is sent
After breath, the network side equipment sends TAU response messages to the terminal, wherein carrying the PWS keys that the terminal is asked
And the identification information of the key.
Present invention also offers a kind of update method of public alarm system key in wireless communication system, including:
Terminal received in initial access process two public warning system (PWS) keys that network side equipment issues and this
The identification information of two PWS keys and preservation;One of them is currently used PWS keys, and another is next used
PWS keys;
If the key configured information that the terminal is issued according to the network side equipment, judging need to be to the institute that locally preserves
At least one stated in two PWS keys is updated, then is sent to the network side equipment and carry key updating configured information
Message, and correspondingly the PWS keys that locally preserve are carried out more after the PWS keys that the network side equipment is issued are received
Newly.
Further, methods described also includes:
The key configured information includes the identification information for the PWS keys that the network side equipment is being currently used;
The key configured information that the terminal is issued according to the network side equipment, judging need to be to described in locally preserving
At least one in two PWS keys is updated, and is specifically included:
The terminal judges the identification information for the PWS keys that the network side equipment is being currently used and local preservation
Currently used PWS keys identification information it is different and mark of next PWS keys used with locally preserving is believed
The next PWS key updatings used locally preserved are currently used PWS keys simultaneously by manner of breathing, and judge to need
The next PWS keys used locally preserved are updated;
It is described that the message for carrying key updating configured information is sent to the network side equipment, specifically include:
The message that next PWS keys used are issued for request is sent to the network side equipment.
Further,
The key configured information includes:The identification information for the PWS keys that the network side equipment is being currently used
With the identification information of next PWS keys used;
The key configured information that the terminal is issued according to the network side equipment, judging need to be to described in locally preserving
At least one in two PWS keys is updated, and is specifically included:
The terminal is judged in the identification information and the key configured information of the described two PWS keys locally preserved
Two identification informations carried are differed, and judge that the described two PWS keys locally preserved need to be updated;
It is described that the message for carrying key updating configured information is sent to the network side equipment, specifically include:
Sent to the network side equipment and issue the currently used PWS keys of the network side equipment and next for request
The message of the PWS keys used.
Further,
The key configured information includes:The identification information for the PWS keys that the network side equipment is being currently used
With the identification information of next PWS keys used;
The key configured information that the terminal is issued according to the network side equipment, judging need to be to described in locally preserving
At least one in two PWS keys is updated, and is specifically included:
The terminal judges the identification information for the PWS keys that the network side equipment is being currently used and local preservation
Currently used PWS keys identification information it is identical, and the network side equipment next PWS keys used with this
When the identification information for next PWS keys used that terminal is preserved is different, judging need to be to next quilt for locally preserving
The PWS keys used are updated;
It is described that the message for carrying key updating configured information is sent to the network side equipment, specifically include:
The message that next PWS keys used are issued for request is sent to the network side equipment.
Further,
The message for carrying key updating configured information is sent to the network side equipment, is specifically included:
Tracing section updating (TAU) request message is sent to the network side equipment, is indicated wherein carrying the key updating
Information.
Correspondingly, present invention also offers a kind of network side equipment, including:
Key sending module, for issuing two public warning system (PWS) keys to terminal in initial access process
And the identification information of the two PWS keys, one of them is currently used PWS keys, and another is next used
PWS keys;
Key indicates sending module, and for issuing key configured information, wherein at least includes:Network side equipment is current
The identification information of the PWS keys used;
Update module, for after the message for the carrying key updating configured information that the terminal sends is received, to described
Terminal issues the PWS keys of the terminal request.
Further,
Key indicates that sending module is additionally operable to when knowing that next PWS keys used update, next time
Also include in the key configured information sent:The identification information of next PWS keys used after renewal.
Further,
The key sending module be used in initial access process to terminal issue described two PWS keys and the two
The identification information of PWS keys, is specifically included:
The key sending module is used to receive after the Attach Request message that the terminal is sent, attached to the terminal replies
Received message, wherein carrying described two PWS keys and the identification information of the two PWS keys;Or,
For in the attaching process of the terminal, sent to the terminal carry described two PWS keys and the two
The message of layer three of the identification information of PWS keys.
Further,
The key indicates that sending module is used to issue key configured information, specifically includes:
The key indicates that sending module is used for after tracing section updating (TAU) request message that the terminal is sent is received
TAU response messages are issued to the terminal, or for issuing broadcast message to the terminal;Wherein, in the message issued
Carry the key configured information;
The update module is used for after the message for the carrying key updating configured information that the terminal is sent is received, to institute
The PWS keys that terminal issues the terminal request are stated, are specifically included:
The update module is used to issue the PWS keys that need to update in the request that carries for receiving that the terminal sends
After the TAU request messages of instruction, TAU response messages are sent to the terminal, wherein carrying the PWS keys that the terminal is asked
And the identification information of the key.
Present invention also offers a kind of terminal, including:
Receiving module, for receiving two public warning systems that network side equipment is issued in initial access process
(PWS) identification information of key and the two PWS keys and preservation;One of them is currently used PWS keys, and another is
Next PWS keys used;
The update module is used in the key configured information issued according to the network side equipment, and judging need to be to described
When at least one in the described two PWS keys preserved in receiving module is updated, sends and take to the network side equipment
Message with key updating configured information, and correspondingly connect after the PWS keys that the network side equipment is issued are received to described
The PWS keys preserved in module are received to be updated.
Further,
The key configured information includes the identification information for the PWS keys that the network side equipment is being currently used;
The update module is used for the key configured information issued according to the network side equipment, judges to connect to described
At least one received in the described two PWS keys preserved in module is updated, and is specifically included:
The update module be used to judging the identification informations of the PWS keys that the network side equipment is being currently used with
The identification informations of the currently used PWS keys preserved in the receiving module is different and with being preserved in the receiving module
When the identification information of next PWS keys used is identical, by the next PWS used preserved in the receiving module
Key updating is currently used PWS keys, and judge need to be to next PWS used for being preserved in the receiving module
Key is updated;
The update module is used to send the message for carrying key updating configured information to the network side equipment, specific bag
Include:
The update module is used to send for asking to issue next PWS keys used to the network side equipment
Message.
Further,
The key configured information includes:The identification information for the PWS keys that the network side equipment is being currently used
With the identification information of next PWS keys used;
The update module is used for the key configured information issued according to the network side equipment, judges to connect to described
At least one received in the described two PWS keys preserved in module is updated, and is specifically included:
The update module be used to judging the identification information of described two PWS keys that is preserved in the receiving module with
Two identification informations carried in the key configured information are differed, and judging need to be to the institute that is preserved in the receiving module
Two PWS keys are stated to be updated;
The update module is used to send the message for carrying key updating configured information to the network side equipment, specific bag
Include:
The update module is used to send to the network side equipment to issue the network side equipment for request and currently make
With the message of PWS keys and next PWS keys used.
Further,
The key configured information includes:The identification information for the PWS keys that the network side equipment is being currently used
With the identification information of next PWS keys used;
The update module is used for the key configured information issued according to the network side equipment, judges to connect to described
At least one received in the described two PWS keys preserved in module is updated, and is specifically included:
The update module be used to judging the identification informations of the PWS keys that the network side equipment is being currently used with
The identification information of the currently used PWS keys preserved in the receiving module is identical, and the network side equipment is next
When the identification information of the next PWS key that is used of the PWS keys used from being preserved in the receiving module is different, sentence
Break and and the next PWS keys used preserved in the receiving module need to be updated;
The update module is used to send the message for carrying key updating configured information to the network side equipment, specific bag
Include:
The update module is used to send for asking to issue next PWS keys used to the network side equipment
Message.
Further,
The update module is used to send the message for carrying key updating configured information to the network side equipment, specific bag
Include:
The update module is used to send tracing section updating (TAU) request message to the network side equipment, wherein carrying
The key updating configured information.
The present invention need not increase new signaling process, it is not required that individually trigger signaling process, only show on stream
The renewal of PWS keys can be completed.
Brief description of the drawings
Fig. 1 is the network architectures of the PWS in 3GPP networks in the prior art;
Fig. 2 is the schematic flow sheet for issuing PWS keys for the first time to terminal using network in example 1;
Fig. 3 is a kind of schematic diagram for issuing PWS keys id to terminal periodic using network in example 2;
Fig. 4 is to apply terminal in example 3 to need to update a kind of schematic diagram of the next secondary keys of PWS;
Fig. 5 is to apply terminal in example 4 to need to update a kind of schematic diagram of two keys of PWS;
Fig. 6 is to apply terminal in example 5 to need to update a kind of schematic diagram of PWS current keys;
Embodiment
For the object, technical solutions and advantages of the present invention are more clearly understood, below in conjunction with accompanying drawing to the present invention
Embodiment be described in detail.It should be noted that in the case where not conflicting, in the embodiment and embodiment in the application
Feature can mutually be combined.
In the present embodiment, in a kind of wireless communication system PWS keys update method, including:
Network side equipment is believed into initial access process to the UE marks for issuing two PWS keys and the two PWS keys
Breath, one of them is designated as currently used key, and another is designated as next key used;Wherein,
Key referred to herein includes:Public key or symmetric key;Above-mentioned two PWS keys are that MME receives (attach by adhering to
Accept) message or by the message of other layers three it is handed down to UE's after the completion of attachment.
Network side equipment issues key configured information, and wherein at least includes:The PWS that network side equipment is being currently used is close
The identification information of key.When network side equipment knows that next PWS keys used update, it can also refer in the key
Show that information includes next identification information by the PWS keys used after updating.
After the message for the carrying key updating configured information that above-mentioned UE is sent is received, the network side equipment is issued to the UE
The PWS keys of UE requests.
Correspondingly, in a kind of wireless communication system PWS keys update method, including:
Above-mentioned two PWS keys and the identification information of the two PWS keys that UE is issued to the network side equipment received
Preserved;
UE is in the key configured information issued according to the network side equipment that receives, and judging need to be to locally preserve two
At least one in PWS keys is updated, then the message for carrying key updating configured information is sent to network side equipment, to ask
Network side equipment issues the PWS keys of needs renewal.Wherein, the request can be in normal TAU (Track Area next time
Update, tracing section updating) during carry out.The mode of request can be:In the TAU request messages sent to network side equipment
It is middle to carry the instruction that request issues the PWS keys that updated.Hereafter, the phase after the PWS keys that network side equipment is issued are received
Ground is answered to be updated the PWS keys locally preserved.
In the present embodiment, a kind of network side equipment, including:
Key sending module, for issuing two public warning system (PWS) keys to terminal in initial access process
And the identification information of the two PWS keys, one of them is currently used PWS keys, and another is next used
PWS keys;
Key indicates sending module, and for issuing key configured information, wherein at least includes:Network side equipment is current
The identification information of the PWS keys used;
Update module, for after the message for the carrying key updating configured information that the terminal sends is received, to described
Terminal issues the PWS keys of the terminal request.
More preferably,
Key indicates that sending module is additionally operable to when knowing that next PWS keys used update, next time
Also include in the key configured information sent:The identification information of next PWS keys used after renewal.
More preferably,
The key sending module be used in initial access process to terminal issue described two PWS keys and the two
The identification information of PWS keys, is specifically included:
The key sending module is used to receive after the Attach Request message that the terminal is sent, attached to the terminal replies
Received message, wherein carrying described two PWS keys and the identification information of the two PWS keys;Or,
For in the attaching process of the terminal, sent to the terminal carry described two PWS keys and the two
The message of layer three of the identification information of PWS keys.
More preferably,
The key indicates that sending module is used to issue key configured information, specifically includes:
The key indicates that sending module is used for after tracing section updating (TAU) request message that the terminal is sent is received
TAU response messages are issued to the terminal, or for issuing broadcast message to the terminal;Wherein, in the message issued
Carry the key configured information;
The update module is used for after the message for the carrying key updating configured information that the terminal is sent is received, to institute
The PWS keys that terminal issues the terminal request are stated, are specifically included:
The update module is used to issue the PWS keys that need to update in the request that carries for receiving that the terminal sends
After the TAU request messages of instruction, TAU response messages are sent to the terminal, wherein carrying the PWS keys that the terminal is asked
And the identification information of the key.
In the present embodiment, a kind of terminal, including:
Receiving module, for receiving two public warning systems that network side equipment is issued in initial access process
(PWS) identification information of key and the two PWS keys and preservation;One of them is currently used PWS keys, and another is
Next PWS keys used;
The update module is used in the key configured information issued according to the network side equipment, and judging need to be to described
When at least one in the described two PWS keys preserved in receiving module is updated, sends and take to the network side equipment
Message with key updating configured information, and correspondingly connect after the PWS keys that the network side equipment is issued are received to described
The PWS keys preserved in module are received to be updated.
More preferably,
The key configured information includes the identification information for the PWS keys that the network side equipment is being currently used;
The update module is used for the key configured information issued according to the network side equipment, judges to connect to described
At least one received in the described two PWS keys preserved in module is updated, and is specifically included:
The update module be used to judging the identification informations of the PWS keys that the network side equipment is being currently used with
The identification informations of the currently used PWS keys preserved in the receiving module is different and with being preserved in the receiving module
When the identification information of next PWS keys used is identical, by the next PWS used preserved in the receiving module
Key updating is currently used PWS keys, and judge need to be to next PWS used for being preserved in the receiving module
Key is updated;
The update module is used to send the message for carrying key updating configured information to the network side equipment, specific bag
Include:
The update module is used to send for asking to issue next PWS keys used to the network side equipment
Message.
More preferably,
The key configured information includes:The identification information for the PWS keys that the network side equipment is being currently used
With the identification information of next PWS keys used;
The update module is used for the key configured information issued according to the network side equipment, judges to connect to described
At least one received in the described two PWS keys preserved in module is updated, and is specifically included:
The update module be used to judging the identification information of described two PWS keys that is preserved in the receiving module with
Two identification informations carried in the key configured information are differed, and judging need to be to the institute that is preserved in the receiving module
Two PWS keys are stated to be updated;
The update module is used to send the message for carrying key updating configured information to the network side equipment, specific bag
Include:
The update module is used to send to the network side equipment to issue the network side equipment for request and currently make
With the message of PWS keys and next PWS keys used.
More preferably,
The key configured information includes:The identification information for the PWS keys that the network side equipment is being currently used
With the identification information of next PWS keys used;
The update module is used for the key configured information issued according to the network side equipment, judges to connect to described
At least one received in the described two PWS keys preserved in module is updated, and is specifically included:
The update module be used to judging the identification informations of the PWS keys that the network side equipment is being currently used with
The identification information of the currently used PWS keys preserved in the receiving module is identical, and the network side equipment is next
When the identification information of the next PWS key that is used of the PWS keys used from being preserved in the receiving module is different, sentence
Break and and the next PWS keys used preserved in the receiving module need to be updated;
The update module is used to send the message for carrying key updating configured information to the network side equipment, specific bag
Include:
The update module is used to send for asking to issue next PWS keys used to the network side equipment
Message.
More preferably,
The update module is used to send the message for carrying key updating configured information to the network side equipment, specific bag
Include:
The update module is used to send tracing section updating (TAU) request message to the network side equipment, wherein carrying
The key updating configured information.
With several application examples of the present invention, the present invention will be described below.
Using example 1
As shown in Fig. 2 this shows that network issues the process of PWS keys to terminal for the first time using example.This flow is provided
Be flow chart in LTE network, be similar for GSM/UMTS networks, be all that two are directly issued in flow is initially accessed
Individual PWS keys, currently used a key currentkey and corresponding identification information (i.e. key id), a next quilt
The key next key and corresponding key id used.Specific steps are described as follows:
1) CBC issues two PWS keys, currently used a key current key and corresponding key to MME
Id, next the key next key used and corresponding key id;Certainly, the PWS keys can also be under CBE
Hair.
2) MME is received after two PWS keys that CBC is issued, and is preserved, and sends response message to CBC;
3) UE sends normal attach (attachment) request message to MME;
4) MME sends attach accept (attachment receives) message to UE, and above-mentioned two can be carried within the message
PWS keys, can also attaching process terminate after to the UE issue the two PWS keys by other message of layer three.
Using example 2
As shown in figure 3, this shows that network issues the mistake of the identification information of PWS keys to terminal periodic using example
Journey.What this flow was provided is that, in LTE network, network side equipment can issue PWS by TAU response messages or broadcast message cycle
The process of the identification information of key.For GSM/UMTS networks, it can be issued by RAU or broadcast message.Step illustrates such as
Under:
1) UE sends TAU request messages to MME;
2) MME sends the mark that the PWS keys that current network is being used are carried in TAU response messages, the message to UE
Know information (current key id), the identification information for next PWS keys that current network will be used can also be carried
(next key id);
Certainly, current key id and next key id can not also be carried in TAU response messages, but are taken
Band is in other broadcast messages that MME is issued;
3) UE is received after the current key id that MME is issued, if judging, the current key id are preserved with it
The identification information of currently used PWS keys is identical, then need not subsequently be updated again;If judging the current key
Id is different from the identification information for the currently used PWS keys that it is preserved, then initiates more new technological process, detailed process is referred to subsequently
Using example;
If 4) also carry next key id parameters in the message that UE is received, if UE judge nextkey id with
The identification information of its next PWS key used preserved is identical, then need not subsequently be updated again;If judging this
Next key id are different from the identification information for next PWS keys used that it is preserved, then initiate more new technological process, specifically
Process refers to subsequent applications example.
Using example 3
As shown in figure 4, this shows that terminal needs to update the process of currently used PWS keys using example.The application
Example is normal key updating process, i.e.,:Currently used PWS keys failure, is replaced using next PWS keys used
For currently used PWS keys, and by the next PWS delivering keys used regenerated to UE.Step is described as follows:
1) CBC sends to MME and next PWS keys that current network will be used is carried in key updating message, message;
2) MME is received after key updating message, using the next key used locally preserved as currently used
PWS keys are preserved, and are preserved the PWS keys carried in the message as next PWS keys used, and to
CBC sends out key updating response message;
3) UE sends TAU request messages to MME;
4) MME sends TAU response messages to UE, and the currently used PWS keys that locally preserve are carried in the message
Identification information, i.e. current key id are original next key id, because the PWS keys just received are as next key
MME is stored in suffer;
5) UE is received after TAU response messages, by by the identification information carried in the message and each mark for locally preserving
Information is contrasted, and judges that the identification information of the next PWS key that is used of the identification information received with locally preserving is identical,
Then the next PWS keys used locally preserved are preserved as currently used PWS keys;
6) UE carries next key requests and indicated, for indicating network in sound in normal TAU request messages next time
Should middle increase next key parameters;
7) MME sends TAU response messages to UE, wherein next key keys are carried, including nextkey and next key
id;
8) UE is received after the response, according to the next key wherein carried to next PWS used for locally preserving
Key is updated.
Using example 4
As shown in figure 5, this shows terminal while updating the process of two key materials of PWS using example.The application is shown
Example is network side triggering while renewal current key and next key process, belong to a kind of abnormal flow.Step illustrates such as
Under:
1) CBC sends key updating message to MME, PWS keys that current network using is carried in message and will
The next PWS keys used;
2) MME is according to the key updating message received, updates next PWS keys used for locally preserving and current
The PWS keys used, and send out key updating response message to CBC;
3) UE sends TAU request messages to MME;
4) MME sends TAU response messages to UE, and the currently used PWS keys that locally preserve are carried in the message
Identification information, i.e. current key id are original in the current key id newly received, the current key id and UE
The two key id preserved are different from;
5) UE is received after TAU response messages, by by the identification information carried in the message and each key for locally preserving
Identification information contrast, judge that two identification informations of the identification information received with locally preserving are differed, then UE decision
In TAU procedure requests next time new current key and nextkey;
6) UE carries next key requests and indicated and current key requests in normal TAU request messages next time
Indicate, indicate that network increases current key and next key parameters in the response;
7) MME is sent to UE carries current key and next key keys in TAU response messages, message, including
Current key and current key id and next key and next key id;
9) UE is received after the response, current to what is locally preserved according to current key and the next key wherein carried
The PWS keys and next PWS keys used used is updated.
Using example 5
As shown in fig. 6, this shows that terminal needs to update the process of currently used PWS keys using example.The application
Example is an abnormal flow, is that current key does not update, and the situation of key updating next time.This scene needs to give in network
When terminal periodic issues key id, while issuing current keyid and next key id.This scene can be in certain journey
Key updating efficiency is improved on degree.Step is described as follows:
1) CBC sends key updating message to MME, PWS keys that current network using is carried in message and will
The next PWS keys used;
8) MME is according to the key updating message received, updates next PWS keys used for locally preserving and current
The PWS keys used, and send key updating response message to CBC;
2) MME judges that the currently used PWS keys received are identical with what is locally preserved, without updating, newly receives
Next PWS keys are different from the next PWS keys used locally preserved, then using the next PWS keys received
Substitute the next PWS keys used locally preserved;
3) UE sends TAU request messages to MME;
4) MME sends to UE and current key id and next keyid is carried in TAU response messages, message;
5) UE is received after TAU response messages, by being contrasted with the key id locally preserved, judges next key id more
It is new, it is all different from what is locally preserved.Now UE abandons next key, retains currentkey.And please in TAU processes next time
The next key looked for novelty;
6) UE indicates that network increases nextkey parameters in the response in normal TAU request messages next time.The TAU
Next key requests are carried in request message and indicate parameter;
7) MME sends TAU response messages to UE, and message carries next key keys, including nextkey and next key
id;
8) UE is received after the response, according to the next key wherein carried to next PWS used for locally preserving
Key is updated.
It the foregoing is only the preferred application example of the present invention.The present invention program is not limited to LTE system, UMTS systems
Its associative mode, can be applied in other wireless communication systems by the PWS key updatings of system and GSM/GERAN systems.
One of ordinary skill in the art will appreciate that all or part of step in the above method can be instructed by program
Related hardware is completed, and described program can be stored in computer-readable recording medium, such as read-only storage, disk or CD
Deng.Alternatively, all or part of step of above-mentioned application example can also use one or more integrated circuits to realize.Accordingly
Each module/unit in ground, above-mentioned application example can be realized in the form of hardware, it would however also be possible to employ software function module
Form is realized.The present invention is not restricted to the combination of the hardware and software of any particular form.
The preferred application example of the present invention is the foregoing is only, is not intended to limit the scope of the present invention.Root
According to the content of the invention of the present invention, can also there are other a variety of application examples, in the case of without departing substantially from spirit of the invention and its essence,
Those skilled in the art when can make various corresponding changes and deformation according to the present invention, all spirit in the present invention and
Within principle, any modification, equivalent substitution and improvements made etc. should be included in the scope of the protection.