Patent application number | Description | Published |
20110033053 | SECURITY KEY GENERATING METHOD, DEVICE AND SYSTEM - A security key generating method, device and system are provided, wherein, the method is used for generating a security key in the process of the handover to an EUTRAN network from other network, the method includes: an MME generates a security key based on a root key K | 02-10-2011 |
20110135095 | Method and system for generating key identity identifier when user equipment transfers - A method for generating a key identity identifier when a user equipment (UE) transfers is disclosed. The method includes the following steps: a mobility management entity (MME) of an evolved UMTS terrestrial radio access network (EUTRAN) sends an identity identifier of an access security management entity key (KSI | 06-09-2011 |
20110222690 | Method and system for deriving keys - A method for deriving keys is disclosed. When Handover or Routing Area Update of User Equipment (UE) from an Evolved Universal Terrestrial Radio Access Network (E-UTRAN) to a Universal Terrestrial Radio Access Network (UTRAN) or Global System for Mobile Communication/Enhanced Data Rate for GSM Evolution Radio Access Network (GERAN) occurs, the keys for the UTRAN or the GERAN are derived by a Mobility Management Entity (MME) and/or the UE by using predefined parameters. The predefined parameters include a root key of the E-UTEAN and a value of a Non Access Stratum (NAS) Count. A keys derivation system for deriving the keys is also disclosed. | 09-15-2011 |
20120039464 | Emergency call-based security algorithm negotiation method and apparatus - An emergency call-based security algorithm negotiation method and apparatus are disclosed. The method comprises the following steps: after receiving an attachment request from a User Equipment (UE) and determining that the attachment request is an emergency attachment request, a network side sets UE security capabilities to support a null algorithm only; or, the network side determines that the UE security capabilities included in the attachment request support the null algorithm only; performing Non-Access Stratum (NAS) and Access Stratum (AS) selection processing taking the null algorithm as a security algorithm for the user equipment. A mobility management entity (MME) and an evolved Node-B (eNB) can perform security negotiation directly on the basis that the user equipment only supports the null algorithm when the NAS and NA security negotiation is performed, so that the access efficiency and the call completing rate of emergency calls are improved. | 02-16-2012 |
20120294444 | Method and system for establishing enhanced air interface key - The disclosure provides a method and a system for establishing an enhanced air interface key. During a serving Radio Network Controller (RNC) relocation process, a target RNC with an enhanced security capability enables a received legacy key to perform security protection on communication in the serving RNC relocation process when the target RNC cannot learn from a relocation request sent by a source RNC whether or not a user equipment supports the enhanced security capability ( | 11-22-2012 |
20120308007 | METHOD AND SYSTEM FOR SECURITY PROCESSING DURING RRC CONNECTION RE-ESTABLISHMENT - This disclosure claims a method for security processing during RRC connection re-establishment, comprising: a UE sends an RRC connection re-establishment request message to the eNB; after receiving the request message, the eNB determines whether an original access layer security algorithm used by the UE is supported by the eNB itself according to the current status and configuration; if supported, the communication protection with UE is implemented via the original access layer security algorithm; if not supported, according to the security capability of UE, the access layer security algorithm which has the highest priority and is supported by the UE is selected from the access layer security algorithms configured by the eNB itself to be the new access layer security algorithm, and the communication protection between the eNB and the UE is implemented by the new access layer security algorithm. This disclosure also claims a system for security processing during the RRC connection re-establishment. | 12-06-2012 |
20130077785 | Method for Updating Air Interface Key, Core Network Node and Radio Access System - The disclosure discloses a method for updating an air interface key, a core network node and a radio access system, wherein the method for updating an air interface key comprises: a core network node receives a relocation complete indication message from a target RNC (S | 03-28-2013 |
20130137403 | Method for Updating Air Interface Key, Core Network Node and User Equipment - The disclosure provides a method for updating an air interface key, a core network node and user equipment. The update method comprises: a core network node receives a relocation indication message, wherein the relocation indication message is configured to indicate that the User Equipment (UE) is about to relocate to a target Radio Network Controller (RNC) from a source RNC (Step S | 05-30-2013 |