WO2010142185A1 - 一种切换的过程中密钥的生成方法及系统 - Google Patents
一种切换的过程中密钥的生成方法及系统 Download PDFInfo
- Publication number
- WO2010142185A1 WO2010142185A1 PCT/CN2010/072727 CN2010072727W WO2010142185A1 WO 2010142185 A1 WO2010142185 A1 WO 2010142185A1 CN 2010072727 W CN2010072727 W CN 2010072727W WO 2010142185 A1 WO2010142185 A1 WO 2010142185A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- ciphertext
- switch
- switching
- phase
- message
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/0005—Control or signalling for completing the hand-off
- H04W36/0011—Control or signalling for completing the hand-off for data sessions of end-to-end connection
- H04W36/0033—Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information
- H04W36/0038—Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information of security context information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/0005—Control or signalling for completing the hand-off
- H04W36/0055—Transmission or use of information for re-establishing the radio link
- H04W36/0061—Transmission or use of information for re-establishing the radio link of neighbour cell information
Definitions
- This relates to the field of communications, and more particularly to methods for generating handovers.
- the PC includes management sheep, mob ym ageme e), management of the management of sheep responsibility, non-command, and management of user security mode.
- the TRA is managed by ey Access Sec y ageme E y (A4), and the A4 and the uplink A SQ (non-sequence) are used to generate the used ( eye , eq ) , in the TRA , each (voved ode-, ), is responsible for the management of communication, communication management, and sexual context.
- e PC is the same security, that is, PC e's public message, e has its own solution.
- the e is small, and the user's ( se Eq pme , J ) is switched in the same way. Therefore, the switching may be in the same e, or in different e.
- the update will be updated with the CC received CC, the saved CC, the CC difference, the new one.
- the wood to be solved is to propose the generation method and system in the switching, and overcome the e b that can be ejected earlier in the existing wood, resulting in security.
- the ciphertext of the e-mail is directly e.
- the above method can have the following features
- the ciphertext of the e in the handover completion message, eq in the obtained step, the method includes
- the step of obtaining the ciphertext of e includes the measurement information of all ciphertexts and eq e in the above measurement, and the e, e, and ciphertext, E ciphertext eq in the steps obtained, the method includes
- the method Before the steps of obtaining the ciphertext respectively, the method includes N
- the method includes the use of the public.
- the system that provides switching in the near including, e, e, and
- the former e that is, e, all the phases e, e, and e are respectively generated, and the e of the phase respectively obtains the ciphertext, and all the ciphertexts, and the meshes e are in the switched E's ciphertext, body, get.
- the e will be e ciphertext e in the switched.
- the near-phase e respectively obtains ciphertext Before,
- the switchover is used to complete the switchover.
- the generation of the switch and then the ciphertext.
- the switch get the ciphertext, get.
- the e gets the ciphertext, and all the ciphertext, eb, eb 3, in the switched, e get the ciphertext of e, get the e Wherein, the way of e ciphertext can be
- the method of generating the switch is provided, and the following first step configuration is required.
- the group of mercury e-e may switch e, e in the context of e. That is, establish a connection in the e (ie e), switch, that
- phase e must be included in phase e.
- the phase e e can be either intersecting or containing, as long as they are possible to switch directly, then they are phase.
- connection is established successfully or the handover is successful, and the connection and non-access security are
- the first switch is completed, and the update switch is taught.
- the switch is completed, according to the second, update the switch.
- e b can be enhanced in terms of security.
- the generation system in this switch includes , , , "".
- the e which is the root before the root, ie e, all the phases e, e and phase e are generated separately,
- the e of the phase gets the ciphertext separately, and all the ciphertexts, and e, are obtained from the ciphertext obtained in the switched.
- the q step is generated separately from e and phase e, and the common difference of e is used first.
- FIG. 3 shows the flow of the generation method in the switch.
- the configuration in the coverage of e, generates the phase of e, in the configuration.
- This step is to complete the configuration of all e-phases in the coverage of all e.
- the phase eq is satisfied, connected under e, If you switch, its e is the phase of e. On, must be grouped with e phase.
- 315 is always connected, not connected to the message, and is updated to update. Since the message is not received, the message is different, so the message, e is not.
- Each phase e is easy to generate e b. Because of the switching, it is in Xiaotong, Xiaohe, and e, which is included in the e, so the switch may be in the same e (ie e may be the same), do not have to consider whether the switch is more e, also need to be e escaping e
- the eq 0 in the message is small, and in the number saved in step 340, get eb and .
- the switch completion message e. This message only does the integrity, not.
- e b can be obtained first, and then the public of e is used to obtain the ciphertext.
- step 385 e is received, first the ciphertext line is solved, then
- steps 310 to 340 update the switch under Teach.
- the e b under the e-channel improves the security, and the generation requires less, the sheep does not need to be synchronized, and must be switched to improve the performance of the meta-domain.
- the present invention is long-term (o g-TemEvo o , T )
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP10785698.1A EP2418884B1 (en) | 2009-06-12 | 2010-05-13 | Method and system for generating cipher key during switching |
US13/258,981 US8666078B2 (en) | 2009-06-12 | 2010-05-13 | Method and system for generating cipher key during switching |
JP2012511132A JP5859956B2 (ja) | 2009-06-12 | 2010-05-13 | 切替過程におけるキーの生成方法及システム |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910203765.4 | 2009-06-12 | ||
CN200910203765.4A CN101925059B (zh) | 2009-06-12 | 2009-06-12 | 一种切换的过程中密钥的生成方法及系统 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2010142185A1 true WO2010142185A1 (zh) | 2010-12-16 |
Family
ID=43308409
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2010/072727 WO2010142185A1 (zh) | 2009-06-12 | 2010-05-13 | 一种切换的过程中密钥的生成方法及系统 |
Country Status (5)
Country | Link |
---|---|
US (1) | US8666078B2 (zh) |
EP (1) | EP2418884B1 (zh) |
JP (1) | JP5859956B2 (zh) |
CN (1) | CN101925059B (zh) |
WO (1) | WO2010142185A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102833743A (zh) * | 2011-06-17 | 2012-12-19 | 中兴通讯股份有限公司 | 公共警报系统密钥更新信息的发送、更新方法和相应设备 |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8681740B2 (en) * | 2010-12-21 | 2014-03-25 | Tektronix, Inc. | LTE network call correlation during User Equipment mobility |
CN103167492B (zh) | 2011-12-15 | 2016-03-30 | 华为技术有限公司 | 在通信系统中生成接入层密钥的方法及其设备 |
CN103188663B (zh) * | 2011-12-27 | 2016-08-03 | 华为技术有限公司 | 基站间载波聚合的安全通讯方法及设备 |
CN102711100B (zh) * | 2012-04-24 | 2015-04-15 | 中国联合网络通信集团有限公司 | 语音加解密处理方法、基站及网络系统 |
US9578514B2 (en) * | 2012-05-10 | 2017-02-21 | Nokia Technologies Oy | Method, apparatus, and computer program product for enablement |
CN104010276B (zh) * | 2013-02-27 | 2019-02-15 | 中兴通讯股份有限公司 | 一种宽带集群系统的组密钥分层管理方法、系统和终端 |
EP3028487B9 (en) | 2013-08-01 | 2021-03-31 | Nokia Technologies Oy | Methods, apparatuses and computer program products for fast handover |
CN108293183B (zh) * | 2015-11-18 | 2021-06-01 | 上海诺基亚贝尔股份有限公司 | E-utran与wlan之间的切换 |
WO2018176273A1 (zh) * | 2017-03-29 | 2018-10-04 | 华为技术有限公司 | 一种通信方法、装置和系统 |
CN109462875B (zh) * | 2019-01-16 | 2020-10-27 | 展讯通信(上海)有限公司 | 无线漫游方法、接入点装置以及移动台 |
KR20220084601A (ko) * | 2020-12-14 | 2022-06-21 | 삼성전자주식회사 | 차세대 이동 통신 시스템에서 ho를 고려한 pki기반 as 인증 방법 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1921379A (zh) * | 2005-08-25 | 2007-02-28 | 华为技术有限公司 | 一种目标鉴权者/密钥提供者获取密钥的方法 |
CN101232731A (zh) * | 2008-02-04 | 2008-07-30 | 中兴通讯股份有限公司 | 用于ue从utran切换到eutran的密钥生成方法和系统 |
CN101309503A (zh) * | 2007-05-17 | 2008-11-19 | 华为技术有限公司 | 无线切换方法、基站及终端 |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0591555A (ja) * | 1991-09-25 | 1993-04-09 | Nippon Telegr & Teleph Corp <Ntt> | 移動通信のチヤネル切替制御方式 |
JP3730480B2 (ja) * | 2000-05-23 | 2006-01-05 | 株式会社東芝 | ゲートウェイ装置 |
US7752441B2 (en) | 2006-02-13 | 2010-07-06 | Alcatel-Lucent Usa Inc. | Method of cryptographic synchronization |
WO2007110748A2 (en) * | 2006-03-27 | 2007-10-04 | Nokia Corporation | Apparatus, method and computer program product providing unified reactive and proactive handovers |
JP2008146632A (ja) * | 2006-10-21 | 2008-06-26 | Toshiba Corp | キーキャッシング、QoSおよびメディア独立事前認証のマルチキャスト拡張 |
US8332923B2 (en) | 2007-01-19 | 2012-12-11 | Toshiba America Research, Inc. | Kerberized handover keying |
PL2629451T3 (pl) * | 2007-09-17 | 2019-12-31 | Telefonaktiebolaget Lm Ericsson (Publ) | Sposób i układ w systemie telekomunikacyjnym |
JP2009094612A (ja) * | 2007-10-04 | 2009-04-30 | Hitachi Communication Technologies Ltd | 無線通信システムにおけるハンドオフ制御方法 |
US8179860B2 (en) * | 2008-02-15 | 2012-05-15 | Alcatel Lucent | Systems and method for performing handovers, or key management while performing handovers in a wireless communication system |
CN101257723A (zh) * | 2008-04-08 | 2008-09-03 | 中兴通讯股份有限公司 | 密钥生成方法、装置及系统 |
CN101267668B (zh) * | 2008-04-16 | 2015-11-25 | 中兴通讯股份有限公司 | 密钥生成方法、装置及系统 |
US8666077B2 (en) * | 2008-05-07 | 2014-03-04 | Alcatel Lucent | Traffic encryption key generation in a wireless communication network |
CN101594606B (zh) * | 2008-05-27 | 2012-07-25 | 电信科学技术研究院 | 用户位置信息上报方法、系统及装置 |
-
2009
- 2009-06-12 CN CN200910203765.4A patent/CN101925059B/zh not_active Expired - Fee Related
-
2010
- 2010-05-13 WO PCT/CN2010/072727 patent/WO2010142185A1/zh active Application Filing
- 2010-05-13 US US13/258,981 patent/US8666078B2/en not_active Expired - Fee Related
- 2010-05-13 EP EP10785698.1A patent/EP2418884B1/en not_active Not-in-force
- 2010-05-13 JP JP2012511132A patent/JP5859956B2/ja not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1921379A (zh) * | 2005-08-25 | 2007-02-28 | 华为技术有限公司 | 一种目标鉴权者/密钥提供者获取密钥的方法 |
CN101309503A (zh) * | 2007-05-17 | 2008-11-19 | 华为技术有限公司 | 无线切换方法、基站及终端 |
CN101232731A (zh) * | 2008-02-04 | 2008-07-30 | 中兴通讯股份有限公司 | 用于ue从utran切换到eutran的密钥生成方法和系统 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102833743A (zh) * | 2011-06-17 | 2012-12-19 | 中兴通讯股份有限公司 | 公共警报系统密钥更新信息的发送、更新方法和相应设备 |
Also Published As
Publication number | Publication date |
---|---|
CN101925059B (zh) | 2014-06-11 |
US8666078B2 (en) | 2014-03-04 |
CN101925059A (zh) | 2010-12-22 |
EP2418884A1 (en) | 2012-02-15 |
JP2012527203A (ja) | 2012-11-01 |
EP2418884A4 (en) | 2016-07-20 |
US20120082315A1 (en) | 2012-04-05 |
EP2418884B1 (en) | 2019-01-02 |
JP5859956B2 (ja) | 2016-02-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2010142185A1 (zh) | 一种切换的过程中密钥的生成方法及系统 | |
EP2663107B1 (en) | Key generating method and apparatus | |
CN105103517B (zh) | 一种安全密钥更改方法和基站及用户设备 | |
US11483705B2 (en) | Method and device for generating access stratum key in communications system | |
US11658817B2 (en) | Security key usage across handover that keeps the same wireless termination | |
AU2011251106B2 (en) | Method and system for positioning mobile station in handover procedure | |
CN102215485B (zh) | 多载波通信系统中保证多载波切换或重建安全性的方法 | |
CN106134231B (zh) | 密钥生成方法、设备及系统 | |
CN104349309B (zh) | 一种移动通信系统中利用nh、ncc对解决安全问题的方法 | |
WO2011137805A1 (zh) | 切换过程中的安全处理方法、装置和系统 | |
EP3038410B1 (en) | Backhaul link establishment method and base station | |
CN110493890A (zh) | 一种连接恢复方法、接入和移动性管理功能实体及用户设备 | |
WO2011063754A1 (zh) | 一种用户设备的切换方法及家庭式演进基站 | |
WO2015027524A1 (zh) | 一种通信方法、网络侧设备、用户设备 | |
WO2013060164A1 (zh) | 一种信息指示及网关选择方法、系统和设备 | |
WO2012155752A1 (zh) | 家庭基站及其信息上报方法、接入控制方法及系统 | |
WO2014190828A1 (zh) | 一种安全密钥管理方法、装置和系统 | |
WO2014169431A1 (zh) | 小区切换方法及设备 | |
WO2012000435A1 (zh) | 一种传递完整性保护参数的方法及装置 | |
CN101835221B (zh) | 一种小区切换方法和基站 | |
WO2010105442A1 (zh) | 密钥推演参数的生成方法、装置和系统 | |
WO2014022974A1 (zh) | 数据发送的方法、设备及系统 | |
WO2011000333A1 (zh) | 异质网络互通实体选择目标接入网的方法、装置和系统 | |
Lee et al. | A combined handover scheme for LTE-advanced system | |
WO2013127136A1 (zh) | 语音业务的切换方法及装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10785698 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 13258981 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 8147/CHENP/2011 Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2010785698 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2012511132 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |