Method and apparatus for updating a key in an active state

Information

  • Patent Grant
  • 10999065
  • Patent Number
    10,999,065
  • Date Filed
    Monday, August 20, 2018
    5 years ago
  • Date Issued
    Tuesday, May 4, 2021
    3 years ago
Abstract
A method for updating a key in an active state is disclosed according to the embodiments of the present invention. The method includes steps of: initiating a key update by a user equipment in the active state or a network side when a pre-defined condition is met; updating the key by the network side and the user equipment, and negotiating an activation time of the new keys. An apparatus for updating a key in an active state is also disclosed according to the present invention. With the present invention, the user equipment in an active state and the network side may actively initiate the key update procedure in different cases, thereby solving the problem concerning the key update for a session in an active state.
Description
FIELD OF THE INVENTION

The present invention relates to communications field, and more specifically, to method and apparatus for updating a key in an active state.


BACKGROUND

To guarantee the competitive edge of the 3GPP (3rd Generation Partnership Project) in the future, the work on evolved access technology is in progress within the 3GPP organization. Especially to strengthen the capability of 3GPP system for processing rapidly increasing IP data service, packet technology employed in the 3GPP system requires further improvement. Some most important parts of such evolved technology include: decreased delay and reaction time, accelerated user data rate, enhanced system capacity and coverage, and reduced overall cost of the operators. Moreover, the evolved network structure is also an important indicator for the backward compatibility of the existing network. In terms of the security therein, the user security procedure in the evolved network is required to guarantee that a security mechanism is provided which at least has a same level as that of the current 2G and 3G system.


As shown in FIG. 1, the core network of the wireless evolved network mainly includes logic function entities such as a Mobility Management Entity (MME), a System Architecture Evolution Gateway (SAE Gateway), and so forth. The MME is responsible for mobility management of control plane including managing the user context and mobility state, allocating temporary user identification, security function, etc. The SAE Gateway is responsible for paging downlink data in an idle state, managing and storing IP bearer context and routing information in the network, etc., serving as an anchor point for user plane between different access systems. In the wireless evolved network, the security of the user plane is terminated at the access network, where a Base Station (BS) of the access network is referred to as an evolved NodeB (eNB). The security of the signaling plane is divided into two parts, namely Access Stratum signaling Radio Resource Control (RRC) and Non Access Stratum (NAS) signaling, terminated at the access network and the core network respectively. The key required to secure the signaling and the data is derived diversely from keys, i.e., CK, IK, generated during an Authentication and Key Agreement (AKA) procedure. The deriving relations are illustrated as FIG. 2.


Therein, KeNB-RRC-INI is a security key for the integrity of RRC signaling, KeNB-RRC-ENC is a security key for the encryption of RRC signaling, and KeNB-RRC-UP is a security key for the encryption of user plane data, whereas KNAS-ENC is a security key for the encryption of the NAS, and KNAS-INI is a security key for the integrity of NAS signaling.


SUMMARY

A method and an apparatus for updating a key in an active state are provided according to embodiments of the present invention, in order to update the key in the active state.


To this end, a method for updating a key in an active state is provided according to an embodiment of the present invention. The method includes following steps:


initiating a key update by a user equipment in the active state or a network side when a pre-defined condition is met; and


updating the key by the network side and the user equipment, and negotiating an activation time of the new keys.


A user equipment for updating a key in an active state is also provided according to an embodiment of the present invention. The user equipment includes:


a terminal key update detecting unit, configured to determine based on a pre-defined condition whether a key update needs to be initiated; and


a terminal key update initiating unit, configured to send a key update request message to a network side when the terminal key update detecting unit determines that the key needs to be updated.


A network side entity for updating a key in an active state is also provided according to an embodiment of the present invention. The network side entity includes:


a key update detecting unit, configured to determine based on a pre-defined condition whether a key update needs to be initiated;


a key update initiating unit, configured to send a request message for indicating the key update, when the key update detecting unit determines that the key needs to be updated; and


a key updating unit, configured to update the key when the user equipment or the network side entity initiates the key update.


Another method for updating a key in an active state is also provided according to an embodiment of the present invention.


initiating, by a network side, a key update when a pre-defined condition is met; and


updating the key by the network side, and informing a user equipment of the new key.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 illustrates a schematic of a wireless evolved network according to the conventional art;



FIG. 2 illustrates a schematic of deriving relations regarding keys according to the conventional art;



FIG. 3 illustrates a flowchart of a method for updating a key in an active state according to a first embodiment of the present invention;



FIG. 4 illustrates a flowchart of updating a key in an active state which is actively initiated by a UE according to a second embodiment of the present invention;



FIG. 5 illustrates a flowchart of updating a key in an active state which is actively initiated by an eNB at a network side according to a third embodiment of the present invention;



FIG. 6 illustrates a flowchart of updating a key in an active state which is actively initiated by an eNB at a network side according to a fifth embodiment of the present invention;



FIG. 7 illustrates a flowchart of updating a key in an active state which is actively initiated by an MME at a network side according to a sixth embodiment of the present invention;



FIG. 8 illustrates a flowchart in which an eNB informs a UE of new keys via an air-interface key update procedure according to a seventh embodiment of the present invention;



FIG. 9 illustrates a flowchart in which an eNB informs a UE of new keys via an air-interface key update procedure according to an eighth embodiment of the present invention; and



FIG. 10 illustrates a schematic of a system for updating a key in an active state according to a ninth embodiment of the present invention.





DETAILED DESCRIPTION

In implementing the present invention, it is discovered that the above conventional schema encounters at least the following problems.


In the System Architecture Evolution (SAE)/Long Term Evolution (LTE) system, related discussion involving methods of how the key can be instantly applied to an activating conversation after the key negotiation has already been proposed. All of the methods therein are proposed given that the key has already been updated to be a new key, but no procedure regarding how to acquire the new key is involved. Therefore, it is necessary to provide a method for addressing the issue of how to negotiate new keys in an active state. In addition, the key update in the active state requires that the network side may also have the capacity for initiating the key negotiation. In the conventional art, the network side will not actively initiate the key update procedure. Rather, only after the user switches from a non-active state into an active state and initiates an initial NAS message to the network side, e.g., an attach request, a paging response, a location update request, etc., the network side may determine whether a certain kind of key needs to be updated.


Detailed description will be made to the present invention in connection with the annexed drawings and embodiments.


In the first embodiment of the present invention, a method for updating a key in an active state is that a user equipment (UE) may determine whether the key needs to be updated in the active state. The method for updating the key in the active state is as shown in FIG. 3. The method includes below steps.


Step s301: A user equipment in an active state or a network side may determine that a key update is required based on a pre-configuration, and initiate the key update.


The pre-configuration may include: (1) the user equipment finds out that a COUNT to which the User Plane (UP) or the RRC related is arriving at an upper threshold; (2) the user equipment has performed a handover between two eNBs, a handover within one eNB, or an inter-system handover; (3) the user equipment or the network side finds out that KASME has not been updated for a long period.


Step s302: The network side performs the key update procedure.


The key update includes: updating all of the keys through the AKA authentication procedure; or, only updating derived keys of KASME rather than performing AKA to update KASME.


Step s303: The user equipment and the network side may acquire the updated keys.


Step s304: After the new keys are acquired, the user equipment and the network side may negotiate an activation time of the new keys.


Detailed description will be made to the present invention in connection with different application scenarios.


In the second embodiment of the present invention, a method for updating a key in an active state is as shown in FIG. 4, where the UE may actively initiate the key update procedure in the active state. The method includes below steps.


Step s401: When in active state, the UE finds out that the key needs to be updated due to some reason, the UE may actively trigger the key update procedure to the MME at the network side.


The possible reasons for updating the key may include: (1) the COUNTs to which the UP or the RRC related is arriving at the upper threshold; (2) the UE just has performed a handover to a new eNB; (3) KASME has not been updated for a long period. The UE may trigger the key update procedure by sending to the MME, a TAU/RAU request, or a special attach request, or a special service request, or a key update request message.


If the key update is trigged by means of sending a TAU/RAU message as the key update request, even if no update occurs for location/routing area of the UE, this TAU/RAU request may also be sent, in which that the old routing area identification is identical with the new routing area identification. To identify the key update request, Update type in the TAU/RAU request may be set as a special value, indicating that the key needs to be updated. The special value may utilize a unified special value for different reasons, or may distinctively utilize different values regarding different reasons (a RRC/UP counter value overflows, or a handover has been performed, or lifetime of KASME expires). Or, the UE may not indicate, but employ several existing values (e.g., the values indicating the routing/location area changing). In addition, since a periodic location registration requires no key update, the Update type shall be distinguished from it. To distinguish from the periodic location/routing registration, it is better for the Update type to employ a value other than the value indicating the “Periodic updating” such as 000.


Notes: several values for the Update type in the existing UMTS are as shown in Table 1.












TABLE 1







0
0
0
RA updating


0
0
1
combined RA/LA updating


0
1
0
combined RA/LA updating with IMSI attach


0
1
1
Periodic updating









Step s402: After the MME receives the request that triggers the key update procedure (may be one of the requests mentioned at step 401), the MME may perform the related key update procedure according to the request type.


The AKA authentication procedure may be initiated if KASME needs to be updated, e.g., an inter-system handover has been performed from GSM/UMTS to SAE/LTE, or lifetime of KASME expires.


New derived keys may be calculated based on KASME, if there is no need to update KASME, and only its derived keys need to be updated, e.g., the key update is required when a handover has been performed within the LTE system, or as a RRC/UP counter value arrives at an upper threshold, in which case only KeNB, or together with KNAS-int and KNAS-enc may be updated.


Step s403: The AKA procedure is performed to update the keys if it is determined to update KASME at step s402. This step is optional.


Step s404: Each key is updated according to the determination at step s402. The related key is calculated based on the existing KASME key, if only the derived keys of KASME needs to be updated.


Step s405: The MME sends the new keys to the eNB.


Step s406: The eNB and the UE negotiate the activation time of the new keys.


The eNB may notify the activation time of the new keys using one of the following methods, or a method other than the following ones.


(1) The eNB may inform the UE of the activation time of the new keys via a simplified security mode command, and the UE may acknowledge the reception of the security mode command. The UE and the network side may activate the new key according to the activation time of the new keys. If the NAS keys need to be updated, step s405 may further include initiating an NAS security mode command in order to negotiate the activation time of new NAS keys.


(2) The eNB may initiate an intra-cell handover command, requesting the UE to perform handover to a current serving cell of the eNB itself so that the UE may use the new keys.


(3) The eNB may add a KSI along with each data packet in order to indicate which key the UE could use for decryption.


In addition to the above methods, one may also refer to the below description described in step s801 in the seventh embodiment or step s901 in the eighth embodiment.


Step s407: The network side sends a response message to the user in order to complete all the procedures for key update.


It is to be noted that the activation time of the new NAS keys may also be carried in this response.


In the third embodiment of the present invention, a method for updating a key in an active state is as shown in FIG. 5, where the eNB at the network side may actively initiate the key update procedure in the active state.


The present embodiment refers to the key update procedure initiated by the eNB. When the COUNTs related to the UP or RRC encryption/integrity security is about to arrive at an upper threshold (about to wrap around), the related key may probably need to be updated in order to prevent repeated key stream. Or, even if the COUNTs does not arrive at the upper threshold, but the UE is in LTE_ACTIVE state for a long period, the user plane security key, i.e., Kup-enc or KeNB, may probably need to be updated. In the two scenarios above, there is no need to update KASME and KMME, only Kup and KRRC need to be updated. Of course, at this point, KASME may also be updated.


The key update procedure in the third embodiment is described as follows.


Step s501: When the eNB finds out the key needs to be updated according to the above security requirement, the eNB may send to the MME a key update request message, requesting the MME to generate a new KeNB. The MME may then derive a new KeNB from KASME.


The key update request message may probably be: (1) a request message specifically for requesting the MME to update the key by the eNB, where an MME response is required regarding this request message; (2) a notification type of message, notifying the MME that the key needs to be updated, where no MME response is required regarding this notification message.


Step s502: The MME may update the key, KeNB, accordingly. Therein, KeNB may be derived by the MME from the existing KASME, or, may be calculated by the MME after KASME is updated through the AKA procedure.


Step s503: The MME sends the new KeNB to the eNB. The MME may send the key to the eNB in the following manners:


(1) via a key update response message corresponding to the key update request sent by the eNB according to step s501;


(2) via a context modification message actively initiated by the MME, where the new key is sent to the eNB in the modification message;


(3) via a security context modification message actively initiated by the MME, where the new key is sent to the eNB in the modification message.


It is to be noted that in addition to the new KeNB, the MME may also need to send other parameters required for calculating KeNB to the eNB in the above manners. For example, when the MME is calculating the new key using the existing KASME, a variable parameter (e.g., a counter, a random number) may probably need to be introduced. Thus, this variable parameter may also need to be sent to the eNB and then sent to the UE via the eNB, so that the UE may calculate the new KeNB using the same parameter.


The eNB may derive new KUP and KRRC based on this new KeNB. C-RNTI or a random number may be employed as an input parameter during the deriving procedure. If C-RNTI is employed, the original C-RNTI may probably be utilized, or a C-RNTI parameter may probably be newly generated for the UE.


Step s504: An air-interface new key initiating procedure, i.e., a method concerning how to negotiate an activation time of the new keys is provided. In addition to the methods descried in the prior description such as the Packet Data Convergence Protocol (PDCP) SN or KSI, or the UE is forced to perform an active-idle-active state transition, or an intra-cell handover, one may also refer to the below description described in step s801 and step s802 in the seventh embodiment or step s901 and step s902 in the eighth embodiment.


If the MME sends KeNB in the manner (2) at step s503, the eNB may probably need to send a response message of (security) context modification after the new key is activated.


In the fourth embodiment of the present invention, a method for updating a key in an active state is as shown in FIG. 5, where the eNB at the network side may actively initiate the key update procedure in the active state.


The present embodiment refers to the key update procedure initiated by the eNB. When the COUNTs related the UP or RRC encryption/integrity security is about to arrive at an upper threshold (about to wrap around), the related key may probably need to be updated in order to prevent repeated key streams. Or, even if the COUNTs does not arrive at the upper threshold, but the UE is in LTE_ACTIVE state for a long period, the user plane security key, i.e., KUP-enc or KeNB, may probably need to be updated. In the two scenarios above, there is no need to update KASME and KMME, only Kup and KRRC need to be updated.


The difference between the third embodiment and the present embodiment is that KeNB is updated in the third embodiment whereas KeNB is not updated in the present embodiment. The key update procedure in the fourth embodiment is described as follows.


(1) When the eNB finds out that the key needs to be updated (the eNB finds out that the key needs to be updated according to the security requirement mentioned above), the eNB may generate a random number or a new C-RNTI, and then generate a new RRC/UP key using KeNB and other parameters.


(2) The eNB may inform the UE of the new key parameters via the air-interface key update procedure. The air-interface key update procedure utilized herein may refer to the description of following embodiments.


In the fifth embodiment of the present invention, a method for updating a key in an active state is as shown in FIG. 6, where the eNB at the network side may actively initiate the key update procedure in the active state. The method includes below steps.


Step s601: In a non-handover scenario, if the network side such as eNB desires to update the key, an intra-cell handover command is thus sent to the UE, i.e., requesting the UE to perform handover to the source cell (target cell is identical with source cell).


Step s602: The UE may access the eNB cell again upon the receipt of the handover command.


The description of step s603 to step s609 in the follow-up procedure may refer to step s401 to step s407 in the second embodiment, which is omitted herein for brevity.


In the sixth embodiment of the present invention, a method for updating a key in an active state is as shown in FIG. 7, where the MME at the network side may actively initiate the key update procedure. The method includes below steps.


Step s701: When the MIME at the network side finds out that KASME has been used for a long period or an inter-RAT handover has been performed to the UE and so forth, after which KASME needs to be updated, the MME may then determine to actively initiate the AKA procedure. The network side needs to set a valid time for each KASME so that a corresponding procedure can be triggered instantly when the valid time arrives at the upper threshold.


Step s702: The MME actively initiates a special paging message to the UE. This step is optional.


A Paging cause of the special paging request may be NULL or a special value indicative of the key update.


Step s703: The UE sends a paging response to the network upon the receipt of the paging message.


Steps s702 and s703 are optional.


Step s704: When the MME sends to the UE an authentication request message in order to initiate to perform the AKA, or upon the receipt of the paging response, similar to the receipt of the paging message according to the conventional art, the MME may thus determine to perform the AKA, and may initiate the AKA procedure to the UE.


Step s705: The MME generates each derived key.


Step s706: The MME sends KeNB to the eNB. KeNB may be sent specifically in the manner of carrying the KeNB in the NAS message and informing the UE of the activation time of the new NAS keys, which is optional.


The MME may send the new key to the eNB in one of the following manners:


(1) employing a context modification message that is actively sent to the eNB; the context modification message may employ a special S1 initial context establishment message, or a newly defined S1 interface signaling. The context modification message includes the new key.


(2) employing a security context modification message that is actively sent to the eNB. The security context modification message includes the new key.


Of course, other similar messages may also be employed for the sending.


Step s707: The eNB and the UE negotiate the activation time of the new keys. Optionally, the activation time of the NAS keys may also be negotiated during this procedure.


Step s708: The user communicates with the network side using the new keys.


In respect of the newly generated key, the eNB needs to inform the UE of the start of the new keys via the air-interface key update procedure. During the key update procedure, the main purpose of the air-interface key update procedure is to: (1) send parameters relating to the derived keys to the UE, e.g., a new C-RNTI or a random number; (2) inform the UE of the activation time of the keys.


In the seventh embodiment of the present invention, the description is made by way of Security Mode Command (SMC) procedure as an example, where the eNB informs the UE of the start of the new keys via the air-interface key update procedure. Referring to FIG. 8, following steps are included.


Step s801: The eNB determines based on triggering reasons that a special SMC message needs to be sent to the UE.


The SMC message may include one or more of the following parameters: (1) parameters required for deriving the key such as a new C-RNTI, a random number, and so forth; (2) a downlink activation time of the NAS keys; (3) a downlink activation time of the RRC keys; (4) an uplink and a downlink activation time of the user plane keys; (5) other possible parameters, e.g., an activation time of new keys for determining uplink data packets (including data packets of the user plane and the control plane).


In addition, when a downlink message is sent by the eNB, the eNB may: (1) stop sending the downlink data, so that the downlink activation time may begin from a next data packet; (2) continue to send data packets, but the PDCP SN for activating using of new keys may be set a little larger so as to avoid a key activation error due to the rapid sending of the packets.


Of course, in addition to the SMC message, a new command such as newly defined security context modification command/security re-configuration command may also be utilized to request the UE to switch the key in use according to parameters or a time carried in the command.


Step s802: The UE returns a corresponding message to the eNB upon the receipt of the related message.


Specifically, upon the receipt of the SMC message, the UE may derive new keys based on the related parameters. Optionally, an activation time of the uplink data packets (including data packets of the user plane and the control plane) may also be required. The UE may then return the related message to the eNB. A PDCP SN for initiating the new keys is carried in the related message. The UE may not stop sending the data packets, but calculate new keys and acquire activation time of the new keys, and then send the new activation time to the eNB. At this point, the activation time of the keys for the uplink data packets needs to be set a little backward if this method is adopted.


Step s803: The air-interfaces may communicate under the protection of the new keys.


In the eighth embodiment of the present invention, the description is made by way of an intra-cell handover procedure as an example, where the eNB informs the UE of a new key activation via the air-interface key update procedure. Referring to FIG. 9, following steps are included.


Step s901: The eNB determines based on triggering reasons that an HO Command message needs to be sent to the UE.


In normal cases, the HO Command message may be sent to the UE in order to tell the UE to perform handover to another Cell, so that the HO Command message may carry air recourses, C-RNTI, etc., assigned by the another Cell. However, in the embodiment, the HO Command message is merely to tell the UE to activate the updated keys rather than to instruct the UE to perform handover to other Cells. Therefore, some transformations on the parameters may be required: (1) “transparent container for Target eNB to UE” in the original HO Command message should be removed; (2) the C-RNTI in the original message assigned to the UE by “target eNB cell” shall be modified as a new C-RNTI assigned by “Source eNB cell” itself; (3) an activation time of the NAS keys probably required should be added; (4) a downlink activation time of the RRC keys shall be added; (5) a downlink activation time of the user plane keys shall be added; (6) values for the reason shall be added, telling the UE that the present HO Command message is to instruct the UE to update the key rather than to perform a real handover.


Moreover, according to general requirements of the HO Command, the eNB will not deliver any data packet after the HO Command message is sent.


Step s902: After the HO Command message is received by the UE, the UE may: (1) determine based on the values of the reason that the present handover is merely for the key update, and therefore synchronizing with the new cell is not required; (2) stop sending the uplink data packets; (3) derive new keys; (4) determine an activation time of the uplink data packets; (5) send a message to the eNB, informing the eNB of the activation time of the uplink data packets.


Step s903: The UE and the eNB may communicate with each other under the protection of the new keys.


With the methods provided according to the embodiments of the present invention, the user equipment in the active state and the network side may actively initiate the key update procedure in different cases, thereby solving the problem concerning the key update for a session in the active state. In addition, the implementation procedure is simple and easy to accomplish.


In the ninth embodiment of the present invention, a system for updating a key in an active state is also disclosed. Referring to FIG. 10, the system includes at least a user equipment 10 and a network side entity 20, where the user equipment in the active state and the network side entity may initiate the key update and update the key when a pre-defined condition is met.


Specifically, the user equipment 10 further includes:


a terminal key update detecting unit 11, configured to determine based on a pre-defined condition whether the key update needs to be initiated;


a terminal key update initiating unit 12, configured to send a key update request message to the network side entity 20 when the terminal key update detecting unit 11 determines that the key needs to be updated; and


a terminal key update setting unit 13, configured to pre-define the condition for initiating the key update and provide the condition to the terminal key update detecting unit 11.


Specifically, the network side entity 20 specifically includes:


a key update detecting unit 21, configured to determine based on a pre-defined condition whether the key update needs to be initiated;


a key update initiating unit 22, configured to send a request message to the user equipment 10 for instructing the key update, when the key update detecting unit 21 determines that the key needs to be updated;


a key updating unit 23, configured to update the key when the user equipment 10 or the network side entity 20 initiates the key update;


a key update setting unit 24, configured to pre-define the condition for initiating the key update and provide the condition to the key update detecting unit 21; and


a key start negotiating unit 25, configured to negotiate an activation time of the new keys with the user equipment.


Therein, the functions of the units mentioned above may be realized via the MME at the network side and the eNB.


With the systems and the apparatuses provided according to the embodiments of the present invention, the user equipment in the active state and the network side may actively initiate the key update procedure in different cases, thereby solving the problem concerning the key update for a session in the active state. In addition, the implementation procedure is simple and easy to accomplish.


Compared with the conventional art, the embodiments of the present invention enjoy the following advantages: The user equipment in the active state and the network side may actively initiate the key update procedure in different cases, thereby solving the problem concerning the key update for a session in the active state.


With the description of the foregoing embodiments, it is readily appreciated by those skilled in the art that the present invention may be implemented with hardware, and may also be implemented with software on a necessary hardware platform. Based on this understanding, solutions provided by the present invention may be embodied in a software product. The software product may be stored in a nonvolatile storage media (may be a CD-ROM, a USB flash disc, a mobile hard disc, etc.) The software product may include a set of instructions enabling a computer device (may be a personal computer, a server, or a network device, etc.) to perform methods according to various embodiments of the present invention. In addition, the foregoing embodiments take SAE/LTE system as an example. The eNB described in the foregoing embodiments refers to a Base Station (BS) of the SAE/LTE system. It is readily appreciated by those skilled in the art that the BS is not limited to the eNB. Any Base Station that realizes the similar function as the eNB stated above shall fall within the scope of protection of the present invention.


In summary, the foregoing is merely preferred embodiments of the present invention and is not intended to be limiting to the scope of the present invention. Any modifications, equivalents, improvements made within the spirit and principle of the present invention shall be construed as fall within the scope of the present invention.

Claims
  • 1. A method performed by an access network node of a communication network for updating air interface keys for use by the access network node for security communications with user equipment (UE) after an Authentication and Key Agreement (AKA) procedure is carried out after an inter-system handover of the UE to the access network node, comprising: receiving, by the access network node from a mobility management entity of the communication network, a context modification message containing a key for deriving the air-interface keys for use by the access network node, wherein the context modification message is for changing UE context information; andupdating, by the access network node using the received key, the air-interface keys for use by the access network node for security communications with the UE.
  • 2. The method according to claim 1, further comprising: sending, by the access network node, an intra-cell handover command to the user equipment, wherein the intra-cell handover command is configured to instruct the user equipment to update air-interface keys used by the user equipment for communicating with the access network node.
  • 3. The method according to claim 1, wherein the inter-system handover is a handover from a SAE/LTE network.
  • 4. The method according to claim 1, further comprising: negotiating, by the access network node with the user equipment, an activation time of the air-interface keys, via an intra-cell handover procedure.
  • 5. An access network node of a communication network, comprising: a receiver configured to receive from a mobility management entity of the communication network a context modification message containing a key for deriving air-interface keys for use by the access network node for security communications with user equipment (UE), wherein the context modification message is for changing UE context information after an Authentication and Key Agreement (AKA) procedure is carried out after an inter-system handover the UE to the access network node;a key updating unit, configured to update, using the received key, the air-interface keys for use by the access network node for security communications with the UE.
  • 6. The access network node according to claim 5, wherein the key updating unit is further configured to send an intra-cell handover command to the user equipment to instruct the user equipment to update air-interface keys used by the user equipment for communicating with the access network node.
  • 7. The access network node according to claim 5, wherein the inter-system handover is a handover from a SAE/LTE network.
  • 8. The access network node according to claim 5, wherein the key updating unit is further configured to negotiate with the user equipment an activation time of the air-interface keys via an intra-cell handover procedure.
  • 9. A non-transitory computer-readable storage medium comprising instructions which, when executed by a computer of an access network node, cause the computer to perform operations for updating air-interface keys, after an Authentication and Key Agreement (AKA) procedure is carried out after an inter-system handover of user equipment (UE) to the access network node, the operations comprising: receiving from a mobility management entity a context modification message containing a key for deriving the air-interface keys, wherein the context modification message is for changing UE context information;updating, using the received key, the air-interface keys for security communications with the UE.
  • 10. The non-transitory computer-readable storage medium according to claim 9, further comprising instructions which, when executed by the computer cause the computer to send an intra-cell handover command to the user equipment, wherein the intra-cell handover command is configured to instruct the user equipment to update air-interface keys used by the user equipment for communicating with the access network node.
  • 11. The non-transitory computer-readable storage medium according to claim 9, wherein the inter-system handover is a handover from a SAE/LTE network.
  • 12. The non-transitory computer-readable storage medium according to claim 9, further comprising instructions which, when executed by the computer cause the computer to negotiate with the user equipment an activation time of the air-interface keys via an intra-cell handover procedure.
  • 13. A method for updating air interface keys, comprising: initiating, by a mobility management entity, an Authentication and Key Agreement (AKA) procedure after user equipment (UE) has performed an inter-system handover;transmitting, by the mobility management entity to an access network node, a context modification message containing a key for deriving the air-interface keys for use by the access network node, wherein the key for deriving the air-interface keys for use by the access network node is derived at least in part from a key generated during the AKA procedure, and the context modification message is for changing UE context information; andupdating, by the access network node using the received key, the air-interface keys for use by the access network node for security communications with the UE.
  • 14. The method according to claim 13, further comprising: sending, by the access network node, an intra-cell handover command to the UE, wherein the intra-cell handover command is configured to instruct the UE to update air-interface keys used by the user equipment for communicating with the access network node.
  • 15. The method according to claim 13, wherein the inter-system handover is a handover from a SAE/LTE network.
  • 16. The method according to claim 13, further comprising: negotiating, by the access network node with the UE, an activation time of the air-interface keys, via an intra-cell handover procedure.
  • 17. A system for updating air interface keys, comprising: a mobility management entity; andan access network node; whereinthe mobility management entity is configured to initiate an Authentication and Key Agreement (AKA) procedure after user equipment (UE) has performed an inter-system handover, and configured to transmit to an access network node, a context modification message containing a key for deriving the air-interface keys for use by the access network node, wherein the key for deriving the air-interface keys for use by the access network node is derived at least in part from a key generated during the AKA procedure, and the context modification message is for changing UE context information; andthe access network node is configured to update, by using the received key, the air-interface keys for use by the access network node for security communications with the UE.
  • 18. The system according to claim 17, the access network node is further configured to send an intra-cell handover command to the UE, wherein the intra-cell handover command is configured to instruct the UE to update air-interface keys used by the user equipment for communicating with the access network node.
  • 19. The system according to claim 17, wherein the inter-system handover is a handover from a SAE/LTE network.
  • 20. The system according to claim 17, the access network node is further configured to negotiate with the UE, an activation time of the air-interface keys, via an intra-cell handover procedure.
Priority Claims (1)
Number Date Country Kind
200710151885.5 Sep 2007 CN national
CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No. 14/674,155, filed on Mar. 31, 2015, which is a continuation of U.S. patent application Ser. No. 13/587,340, filed on Aug. 16, 2012, now U.S. Pat. No. 9,031,240. which is a continuation of U.S. patent application Ser. No. 12/748,798, filed on Mar. 29, 2010, now U.S. Pat. No. 8,300,827. which is a continuation of International Patent Application No. PCT/CN2008/072534, filed on Sep. 25, 2008, which claims priority to Chinese Patent Application No. 200710151885.5, filed on Sep. 28, 2007, All of the afore-mentioned patent applications are hereby incorporated by reference in their entireties.

US Referenced Citations (118)
Number Name Date Kind
5241598 Raith Aug 1993 A
5265164 Matyas et al. Nov 1993 A
5404404 Novorita Apr 1995 A
5551073 Sammarco Aug 1996 A
5661803 Cordery et al. Aug 1997 A
5742682 Baker et al. Apr 1998 A
5752190 Kaewell, Jr. May 1998 A
5761306 Lewis Jun 1998 A
5805705 Gray et al. Sep 1998 A
5812666 Baker et al. Sep 1998 A
5862452 Cudak et al. Jan 1999 A
5887251 Fehnel Mar 1999 A
5966443 Gonzalez Oct 1999 A
5974325 Kotzin Oct 1999 A
5991405 Mills Nov 1999 A
6671507 Vinck Dec 2003 B1
6701435 Numao et al. Mar 2004 B1
6876747 Faccin Apr 2005 B1
7123719 Sowa et al. Oct 2006 B2
7225161 Lam et al. May 2007 B2
7245724 Chesson et al. Jul 2007 B1
7322041 Bilgic et al. Jan 2008 B2
7526092 Chesson et al. Apr 2009 B2
7907733 Cho et al. Mar 2011 B2
7936880 Huang et al. May 2011 B2
8019083 Huang et al. Sep 2011 B2
8023658 Yang et al. Sep 2011 B2
8073428 Khetawat et al. Dec 2011 B2
8081759 Faccin et al. Dec 2011 B2
8150397 Khetawat et al. Apr 2012 B2
8494163 Casati et al. Jul 2013 B2
8621582 Boman Dec 2013 B2
8660270 Blom Feb 2014 B2
8948393 Maheshwari et al. Feb 2015 B2
9615249 Blom Apr 2017 B2
20010041591 Carroll Nov 2001 A1
20020066011 Vialen May 2002 A1
20020154776 Sowa Oct 2002 A1
20020154781 Sowa Oct 2002 A1
20020164029 Jiang Nov 2002 A1
20030033522 Bilgic et al. Feb 2003 A1
20030092445 Timonen May 2003 A1
20030099362 Rollins May 2003 A1
20030108007 Holcman Jun 2003 A1
20030109256 Holcman Jun 2003 A1
20030133576 Grumiaux Jul 2003 A1
20030219129 Whelan Nov 2003 A1
20040071293 Yamamichi et al. Apr 2004 A1
20040072563 Holcman Apr 2004 A1
20040103202 Hildebrand et al. May 2004 A1
20050047598 Kruegel Mar 2005 A1
20050113070 Okabe May 2005 A1
20050176431 Herrero Veron Aug 2005 A1
20050177723 Huang et al. Aug 2005 A1
20050226420 Makela et al. Oct 2005 A1
20050226423 Li Oct 2005 A1
20060047601 Peterka et al. Mar 2006 A1
20060140410 Aihara Jun 2006 A1
20060178167 Tamura Aug 2006 A1
20070003062 Mizikovsky Jan 2007 A1
20070147620 Zheng et al. Jun 2007 A1
20070206799 Wingert et al. Sep 2007 A1
20070223706 Gantman et al. Sep 2007 A1
20070248232 Driscoll et al. Oct 2007 A1
20070249352 Song Oct 2007 A1
20070253554 Chesson et al. Nov 2007 A1
20070265875 Jiang et al. Nov 2007 A1
20070271458 Bosch et al. Nov 2007 A1
20070277035 Patel et al. Nov 2007 A1
20070297610 Chen et al. Dec 2007 A1
20070298804 Tamura et al. Dec 2007 A1
20080002829 Forsberg et al. Jan 2008 A1
20080013737 Sowa et al. Jan 2008 A1
20080016248 Tsirtsis et al. Jan 2008 A1
20080039086 Gallagher Feb 2008 A1
20080039096 Forsberg Feb 2008 A1
20080043669 Gallagher Feb 2008 A1
20080080713 Cho Apr 2008 A1
20080089293 Madour et al. Apr 2008 A1
20080095362 Blom et al. Apr 2008 A1
20080098467 Miller et al. Apr 2008 A1
20080101611 Lindholm et al. May 2008 A1
20080123851 Guccione et al. May 2008 A1
20080130902 Foo Kune et al. Jun 2008 A1
20080133921 Yao Jun 2008 A1
20080176572 Forsberg Jul 2008 A1
20080181411 Norrman et al. Jul 2008 A1
20080184032 Li Jul 2008 A1
20080188200 Forsberg Aug 2008 A1
20080207168 Forsberg Aug 2008 A1
20080233947 Herrero-Veron Sep 2008 A1
20080267407 Vanderveen et al. Oct 2008 A1
20080273704 Norrman et al. Nov 2008 A1
20080318546 Kitazoe et al. Dec 2008 A1
20090034736 French Feb 2009 A1
20090061877 Gallagher Mar 2009 A1
20090073936 Jentz et al. Mar 2009 A1
20090100268 Garcia et al. Apr 2009 A1
20090164788 Cho et al. Jun 2009 A1
20090209259 Brusilovsky et al. Aug 2009 A1
20090235075 Cho Sep 2009 A1
20090300358 Pang et al. Dec 2009 A1
20100002883 Sammour et al. Jan 2010 A1
20100056156 Xu Mar 2010 A1
20100095123 He Apr 2010 A1
20100111308 Forsberg May 2010 A1
20100113033 Qiu et al. May 2010 A1
20100166184 Wu Jul 2010 A1
20100172500 Wu Jul 2010 A1
20100173610 Kitazoe et al. Jul 2010 A1
20100177897 Mildh Jul 2010 A1
20100190500 Choi Jul 2010 A1
20100246533 Lundin Sep 2010 A1
20100278161 Ore et al. Nov 2010 A1
20100316223 Blom Dec 2010 A1
20170170954 Blom Jun 2017 A1
20170245182 Xu Aug 2017 A1
20170339558 Vanderveen Nov 2017 A1
Foreign Referenced Citations (10)
Number Date Country
1642073 Jul 2005 CN
1777094 May 2006 CN
1835633 Sep 2006 CN
1878058 Dec 2006 CN
1937489 Mar 2007 CN
1953369 Apr 2007 CN
1746797 Jan 2007 EP
2007104430 Apr 2007 JP
9938288 Jul 1999 WO
2007025484 Mar 2007 WO
Non-Patent Literature Citations (17)
Entry
3GPP, 3GPP TR 33.821 V0.3.0 (May 2007), 3GPP, May 2007.
3GPP, 3GPP TSG SA WG3 Security—SA3#47, May 2007.
3GPP, 3GPP TSG SA WG3 Security—SA3#46b, Mar. 2007.
3GPP TR 33.821 V0.1.0,3rd Generation Partnership Project;Technical Specification Group Services and System Aspects;Rationale and track of security decisions in Long Term Evolved (LTE)/3GPP System Architecture Evolution (SAE)(Release 8),Feb. 2007,total 82 pages.
3GPP TSG RAN WG3 Meeting #57bis R3-071942,“Key Update in LTE-ACTIVE state”,Huawei,Oct. 8-11, 2007,total 6 pages.
3GPP TSG RAN WG3 Security S3#50 S3-080056,“AS key change on the fly (after AKA)”,Ericsson, Feb. 25-29, 2008,total 4 pages.
3GPP TSG-RAN WG2 Meeting #58bis R2-072591,“Alternatives for Key Change on the Fly”,Nokia, Nokia Siemens Networks,Jun. 25-29, 2007,total 2 pages.
3GPP TSG-RAN WG2 Meeting #58bis Tdoc R2-073002,“Reply LS on Key change in LTE active mode”,Ericsson, Jun. 25-29, 2007,total 2 pages.
3GPP TSG RAN WG2#59 R2-073609,“Reply LS on Key change in LTE active mode”,SA3,(S3-070616, to RAN2). Reply LS (to R2-073002) on Key change in LTE active mode,Aug. 20-24, 2007,total 2 pages.
3GPP TSG SA WG3 Security—SA3#46b S3-070240,“Key change during LTE_ACTIVE”,Nokia, Siemens Networks, Mar. 28-29, 2007,total 5 pages.
3GPP TSG-WG3 Meeting #48 S3-070616,“Reply LS on Key change in LTE active mode”,SA3,Jul. 10-13,total 2 pages.
3GPP TSG SA WG3 Security—SA3#47 S3-070475,“LS on Key change in LTE active mode”, May 22-25, 2007,total 3 pages.
3GPP TS 36.413 V1.0.0,3rd Generation Partnership Project;Technical Specification Group Radio Access Network;Evolved Universal Terrestrial Access Network (E-UTRAN); S1 Application Protocol (S1AP)(Release 8),Sep. 2007,total 41 pages.
3GPP TS 36.410 V0.1.0 (May 2007);3rd Generation Partnership Project;Technical Specification Group Radio Access Network;Evolved Universal Terrestrial Access Network (E-UTRAN); S1 General Aspects and Principles (Release 8),total 15 pages.
Nokia Siemens Networks, Nokia,“Evaluation of key change on the fly solutions”,3GPP TSG SA WG3 Security—SA3#47 S3-070354,Tallinn, Estonia, May 22-25, 2007,total 3 pages.
3GPP TR 33.821 V0.4.0 (Jul. 2007)(S3-070625);3rd Generation Partnership Project;Technical Specification Group Services and System Aspects;Rationale and track of security decisions in Long Term Evolved (LTE) RAN / 3GPP System Architecture Evolution (SAE) (Release 8),total 88 pages.
Ericsson, [Draft] Reply LS on Key change in LTE active mode. 3GPP TSG-RAN WG2 Meeting #58bis, Orlando, U.S.A., Jun. 25-29, 2007, R2-072917, 2 pages.
Related Publications (1)
Number Date Country
20190007832 A1 Jan 2019 US
Continuations (4)
Number Date Country
Parent 14674155 Mar 2015 US
Child 15999503 US
Parent 13587340 Aug 2012 US
Child 14674155 US
Parent 12748798 Mar 2010 US
Child 13587340 US
Parent PCT/CN2008/072534 Sep 2008 US
Child 12748798 US