FIELD: computer equipment.
SUBSTANCE: invention relates to computer engineering. Method comprises steps of: receiving, from a source base station in a wireless communication network access network, a first handover request indicating that handover of user equipment is required; outputting the new layer key without access in response to the decision that the operator-dependent policy is executed; sending, in response to the handover message, a new layer key without access to the target access control and mobility function in the wireless communication core network; and, in the second handover message, sending a flag indicating change of the key to the user equipment, wherein the indication flag is set by a value indicating change of the layer key without access.
EFFECT: technical result is providing effective security in wireless communication networks.
36 cl, 25 dwg
Title | Year | Author | Number |
---|---|---|---|
SAFETY BINDING FUNCTION IN 5G-SYSTEMS | 2017 |
|
RU2734873C1 |
SECURITY CONTEXT IN WIRELESS COMMUNICATION SYSTEM | 2018 |
|
RU2741509C1 |
SECONDARY AUTHENTICATION OF USER DEVICE | 2017 |
|
RU2755258C2 |
PROACTIVE PREPARATION FOR HANDOVER AND PROCESSING OF TRACKING/SEARCH CALL AREA AND SMART ROUTE SELECTION IN CELLULAR NETWORK | 2018 |
|
RU2781810C2 |
SYSTEMS AND A METHOD FOR PROTECTING THE SECURITY OF NAS MESSAGES | 2019 |
|
RU2772709C1 |
RESTORING RADIO LINK FOR USER DEVICE | 2018 |
|
RU2742715C1 |
METHOD FOR PROTECTING TRUNCATED PARAMETER, DEVICE, COMPUTER READABLE DATA MEDIUM AND MICROCHIP | 2019 |
|
RU2805219C1 |
MOBILE COMMUNICATIONS TERMINAL AND METHOD | 2012 |
|
RU2597209C2 |
BASIC NETWORK INDICATOR AND SECURITY HANDLING FOR HANDOVER | 2019 |
|
RU2763449C1 |
METHODS FOR DATA INTEGRITY PROTECTION ON THE USER PLANE | 2018 |
|
RU2744323C2 |
Authors
Dates
2020-04-23—Published
2018-01-29—Filed