摘要:
A method of key distribution includes generating, by a first system device (101), key material and forwarding the key material from the first system device (101) to a second system device (107). It is determined whether a mobile station (401), for which the key material is directed, is active on the system. When the mobile station is active, the key material is forwarded to a base station (115) where the mobile station (401) is active, and the base station (115) forwards the key material to the mobile station (401).
摘要:
A method of operation in a mobile communication system includes a mobile station, a first network capable of serving the mobile station as a home network and a second network capable of serving the mobile station as a visited network, including carrying out in the home network the steps of: generating a random seed (RS), modifying the random seed by combination with an authentication key (K) held by the home network and the mobile station to form session keys (KS and KS′), sending the session keys (K′S and K′S′) to the visited network to permit authentication of the mobile station, and characterized in that the following steps are carried out in the home network: providing a further modification key (SMK), and carrying out a further key modification (of KS and KS′) in the production of the session key (K′S and K′S′) using the further modification key (SMK).
摘要:
A method of operation in a mobile communication system includes a mobile station, a first network capable of serving the mobile station as a home network and a second network capable of serving the mobile station as a visited network, including carrying out in the home network the steps of: generating a random seed (RS), modifying the random seed by combination with an authentication key (K) held by the home network and the mobile station to form session keys (KS and KS′), sending the session keys (K′S and K′S′) to the visited network to permit authentication of the mobile station, and characterised in that the following steps are carried out in the home network: providing a further modification key (SMK), and carrying out a further key modification (of KS and KS′) in the production of the session key (K′S and K′S′) using the further modification key (SMK).