Key exchange method and apparatus
First Claim
Patent Images
1. An apparatus, comprising:
- a non-transitory memory storage comprising instructions; and
one or more processors in communication with the memory storage, wherein the one or more processors are configured to execute the instructions to;
acquire a second key, wherein the second key is shared by a network device and a first user equipment, and a device to device (D2D) link is established between the first user equipment and a second user equipment; and
generate, according to the second key and a first parameter, a first key using a key derivation function; and
a transmitter, configured to send a first message comprising the first key to the second user equipment and the first parameter to the first user equipment; and
wherein communication information transmitted on the D2D link is protected based on the first key.
0 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the present invention disclose a key exchange method and apparatus. A network device acquires a first key, and sends a message including the first key to a second user equipment, so that the second user equipment uses, when communicating with a first user equipment by using a D2D link, the first key to protect transmitted information.
6 Citations
17 Claims
-
1. An apparatus, comprising:
-
a non-transitory memory storage comprising instructions; and one or more processors in communication with the memory storage, wherein the one or more processors are configured to execute the instructions to; acquire a second key, wherein the second key is shared by a network device and a first user equipment, and a device to device (D2D) link is established between the first user equipment and a second user equipment; and generate, according to the second key and a first parameter, a first key using a key derivation function; and a transmitter, configured to send a first message comprising the first key to the second user equipment and the first parameter to the first user equipment; and wherein communication information transmitted on the D2D link is protected based on the first key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An apparatus, comprising:
-
a non-transitory memory storage comprising instructions; and one or more processors in communication with the memory storage, wherein the one or more processors are configured to execute the instructions to; acquire a second key, wherein the second key is shared by a network device and the apparatus, and wherein a device to device (D2D) link is established between the apparatus and a user equipment; generate, according to the second key and a first parameter, a first key using a key derivation function, wherein the first parameter comprises a random number randomly selected by the network device; and protect communication information transmitted on the D2D link based on the first key. - View Dependent Claims (10, 11, 12)
-
-
13. A method, comprising:
-
acquiring, by a first user equipment, a second key, wherein the second key is shared by a network device and the first user equipment, and wherein a device to device (D2D) link is established between the first user equipment and a second user equipment; receiving, by the first user equipment, a first parameter, wherein the first parameter comprises a random number randomly selected by the network device; generating, by the first user equipment according to the second key and the first parameter, a first key using a key derivation function; and protecting, by the first user equipment, communication information transmitted on the D2D link based on the first key. - View Dependent Claims (14, 15, 16)
-
-
17. A communication system, comprising:
-
a network device; and a first user equipment; wherein a device to device (D2D) link is established between the first user equipment comprised in the communication system and a second user equipment comprised in the communication system; wherein the network device comprises; a first processor, configured to; acquire a second key, wherein the second key is shared by a network device and the first user equipment; and generate, according to the second key and a first parameter, a first key using a key derivation function, wherein the first parameter comprises a random number randomly selected by the network device; and a first transmitter, configured to send a first message comprising the first key to the second user equipment and the first parameter to the first user equipment; and wherein the first user equipment comprises; a second processor, configured to; acquire the second key; generate, according to the second key and the first parameter, the first key using the key derivation function; and protect communication information transmitted on the D2D link based on the first key.
-
Specification