US 12,490,096 B2
Configuration method, device and system of security mode and computer-readable storage medium
Xiaoyin Zhao, Beijing (CN); and Weiliang Xie, Beijing (CN)
Assigned to CHINA TELECOM CORPORATION LIMITED, Beijing (CN)
Appl. No. 18/021,686
Filed by CHINA TELECOM CORPORATION LIMITED, Beijing (CN)
PCT Filed Apr. 29, 2021, PCT No. PCT/CN2021/090800
§ 371(c)(1), (2) Date Feb. 16, 2023,
PCT Pub. No. WO2022/037123, PCT Pub. Date Feb. 24, 2022.
Claims priority of application No. 202010825350.7 (CN), filed on Aug. 17, 2020.
Prior Publication US 2023/0336998 A1, Oct. 19, 2023
Int. Cl. H04M 1/66 (2006.01); H04W 12/041 (2021.01); H04W 12/108 (2021.01)
CPC H04W 12/108 (2021.01) [H04W 12/041 (2021.01)] 20 Claims
OG exemplary drawing
 
1. A configuration method of security mode performed by a base station, comprising:
acquiring, from a first core network, an integrity protection algorithm and an encryption algorithm of the first core network, an original key generated by the first core network, and an operator identification of the first core network, wherein the original key generated by the first core network is sent to a first user of the first operator to start a security mode;
acquiring, from a second core network, an integrity protection algorithm and an encryption algorithm of the second core network, an original key generated by the second core network, and an operator identification of the second core network, wherein the original key generated by the second core network is sent to a second user of the second operator to start the security mode, and the first operator and the second operator use a same shared carrier in the base station which is a co-construction and sharing base station;
for any user of the first user and the second user, determining a key generation algorithm preset by an operator to which the user belongs according to the operator identification of the first core network or the second core network;
generating an integrity protection key and an encryption key of the user according to the key generation algorithm and the original key; and
sending a security mode command to a terminal of the user, wherein the security mode command comprises verification information encrypted by the integrity protection key of the user, the integrity protection algorithm and the encryption algorithm, and the terminal has the key generation algorithm preset by the operator to which the user belongs.