CN103888936B - Cell optimization method and device - Google Patents
Cell optimization method and device Download PDFInfo
- Publication number
- CN103888936B CN103888936B CN201210562667.1A CN201210562667A CN103888936B CN 103888936 B CN103888936 B CN 103888936B CN 201210562667 A CN201210562667 A CN 201210562667A CN 103888936 B CN103888936 B CN 103888936B
- Authority
- CN
- China
- Prior art keywords
- base station
- parameter
- security algorithm
- information
- communicated
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/037—Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A kind of cell optimization method of offer of the embodiment of the present invention and device, this method include:First base station receives the parameter and/or security algorithm of the second base station or mobile management entity MME transmission;The first base station is handled according to the information that the parameter and/or security algorithm pair are communicated with user equipment (UE);Wherein, the first base station is that the base station of user face data communication is carried out with the UE, and second base station is the base station that control plane signalling communication is carried out with the UE.In the embodiment of the present invention, when the user plane of UE and control plane correspond respectively to first base station and the second base station, newer parameter and/or security algorithm can be sent to first base station by the second base station, it realizes first base station, the second base station and UE and can synchronize and also avoid first base station using same parameters and/or security algorithm and can not decrypt the information communicated with UE.
Description
Technical field
The present embodiments relate to the communication technology more particularly to a kind of cell optimization method and devices.
Background technology
In the prior art, in user equipment(User Equipment, abbreviation UE)When interacting with base station, need to use
The signaling or data of its interaction of key pair are encrypted.
With long evolving system(Long Term Evolution, abbreviation LTE)Development, some technologies start to consider
Cooperation between base stations, to improve the data rate of UE, for example, making user plane and the control plane separation of UE.The sources in handoff procedure UE
Base station(eNB)UE security capabilities are carried in switching request message, such as HandOver Request message, source base station side uses
Encryption Algorithm and integral algorithm and parameter, the parameters such as such as KeNB*, NCC.Target eNB directly makees the KeNB* received
For local KeNB, and the KeNB is associated with the NCC received.The NCC can also be carried in handoff response(HandOver
Command)UE is sent in message.In short, target BS is the keys that provide of UE be derived from the parameter that source base station provides and/
Or security algorithm generates, although therefore UE switched target, source base station can be easy to calculate arrives or obtains target
Base station is the key that UE is provided.From a safety viewpoint, for security isolation, target BS can select to carry out in a cell
Switching(Intra-cell switches), target BS generation new key is generated using new parameter, such source base station just can not
Know key used in target BS;Specifically, after UE is switched to target BS, target BS is from mobile management entity
(MobileManagement Entity, abbreviation MME)A set of new parameter is obtained, base station passes through the switching in cell(intra-
Cell switches)Notify UE new parameters and/or security algorithm.
But under the scene that user plane and control plane detach, it is understood that there may be a variety of switch instances, for example, the control of UE
Face is switched to target BS from source base station, and user plane then remains at source base station or the control plane of UE switches from source base station
To target BS, and user plane still retains third base station or user plane and is switched to target BS from source base station, and control plane
Source base station etc. is then remained at, the transmission mode using the prior art if parameter remains unchanged occurs carrying out user with UE often
The base station of face data communication can not be with UE interaction datas.
Invention content
A kind of cell optimization method of offer of the embodiment of the present invention and device, to solve the field of user plane and control plane separation
Under scape, the problem of user face data communication base station cannot know new parameter and/or security algorithm is carried out with UE.
The first aspect of the embodiment of the present invention is to provide a kind of cell optimization method, including:
First base station receives the parameter and/or security algorithm of the second base station or mobile management entity MME transmission;
The first base station is carried out according to the information that the parameter and/or security algorithm pair are communicated with UE at encryption and decryption
Reason;
Wherein, the first base station be with the UE carry out user face data communication base station, second base station be with
The UE carries out the base station of control plane signalling communication;Alternatively,
Cell where the first base station is the main plot with the UE, and the cell where second base station is described
The secondary cell of UE.
According in a first aspect, in the first realization method, the security algorithm include Encryption Algorithm, header compression algorithm and
At least one of protection algorithm integrallty algorithm;
The parameter include next-hop linkage counter NCC, next-hop NH, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C-RNTI,
At least one of the length of Paket Data Convergence Protocol PDCP sequence numbers parameter.
According to the first realization method of first aspect, in second of realization method, the first base station is according to
The information that security algorithm pair is communicated with UE is handled, including at least one of following processing processing:
The first base station carries out encryption and decryption processing according to the information that the Encryption Algorithm pair is communicated with UE;
Head is compressed into wardrobe or solved to the information that the first base station is communicated according to the header compression algorithm pair with UE
Compression processing;
The first base station carries out integrity protection according to the information that the protection algorithm integrallty pair is communicated with UE
Or solution integrity protection processing.
According in a first aspect, in the third realization method, the first base station is according to the parameter and/or security algorithm
Pair information communicated with user equipment (UE) is handled, including:
The first base station begins to use the parameter and/or safety when receiving the parameter and/or security algorithm
The information that algorithm pair is communicated with UE is handled.
According in a first aspect, in the 4th kind of realization method, the first base station is according to the parameter and/or security algorithm
Pair information communicated with user equipment (UE) is handled, including:
What the first base station received that the second base station or UE send after receiving the parameter and/or security algorithm disappears
When breath, the information that the parameter and/or security algorithm pair are communicated with UE is begun to use to handle.
According to the 4th of first aspect the kind of realization method, in the 5th kind of realization method, the first base station is receiving
When the message or later, further include:
Start to be communicated with UE.
According in a first aspect, in the 6th kind of realization method, the first base station is according to the parameter and/or security algorithm
Pair information communicated with user equipment (UE) is handled, including:
The first base station begins to use the parameter and/or security algorithm pair to be carried out with UE when starting and UE communication
The information of communication is handled.
According in a first aspect, in the 7th kind of realization method, the first base station is according to the parameter and/or security algorithm
Pair information communicated with user equipment (UE) is handled, including:
The first base station begins to use the parameter and/or security algorithm pair and UE when UE access is to first base station
The information communicated is handled.
According in a first aspect, in the 8th kind of realization method, the first base station is according to the parameter and/or security algorithm
Pair information communicated with user equipment (UE) is handled, including:
The first base station begins to use the parameter and/or security algorithm pair in UE and first base station uplink synchronous
The information communicated with UE is handled.
According in a first aspect, in the 9th kind of realization method, the first base station is according to the parameter and/or security algorithm
Pair information communicated with user equipment (UE) is handled, including:
The first base station begins to use the parameter when receiving first data packet that second base station is sent
And/or the information that security algorithm pair is communicated with UE is handled.
According in a first aspect, in the tenth kind of realization method, the first base station is according to the parameter and/or security algorithm
Pair information communicated with user equipment (UE) is handled, including:
The first base station starts in the preset time after receiving the parameter and/or security algorithm or later
The information communicated with UE using the parameter and/or security algorithm pair is handled.
According in a first aspect, in a kind of the tenth realization method, the first base station is calculated according to the parameter and/or safety
The information that method pair is communicated with user equipment (UE) is handled, including:
The first base station is used to indicate to UE transmissions begins to use the instruction of the parameter and/or security algorithm to disappear
Breath begins to use the information that the parameter and/or security algorithm pair are communicated with UE to carry out when sending the instruction message
Processing.
According in a first aspect, in the 12nd kind of realization method, the first base station is calculated according to the parameter and/or safety
The information that method pair is communicated with user equipment (UE) is handled, including:
The first base station is when needing the information sent to UE to handle, according to original parameter and/or security algorithm
Processing failure then begins to use the parameter and/or security algorithm pair to carry out the communication information with UE and handles.
The second aspect of the embodiment of the present invention is to provide a kind of cell optimization method, including:
Second base station undated parameter and/or security algorithm;
Second base station sends the parameter and/or security algorithm to first base station or UE;
Wherein, the first base station be with UE carry out user face data communication base station, second base station be with it is described
UE carries out the base station of control plane signalling communication;Alternatively,
Cell where the first base station is the main plot with the UE, and the cell where second base station is described
The secondary cell of UE.
According to second aspect, in the first realization method, the security algorithm include Encryption Algorithm, header compression algorithm and
At least one of protection algorithm integrallty algorithm;
The parameter include next-hop linkage counter NCC, next-hop NH, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C-RNTI,
At least one of the length of Paket Data Convergence Protocol PDCP sequence numbers parameter.
According to second aspect, in second of realization method, second base station sends the ginseng to the first base station
After number and/or security algorithm, further include:
Second base station sends message to the first base station or UE, so that the first base station is described in receiving
Begin to use the information that the parameter and/or security algorithm pair are communicated with UE to handle when message, or UE is made to receive
The parameter and/or security algorithm pair is begun to use to be communicated with first base station and/or the second base station when to the message
Information is handled.
The third aspect of the embodiment of the present invention provides a kind of cell optimization method, including:
User equipment (UE) receives first base station or the parameter and/or security algorithm of the transmission of the second base station;
The letter that the UE is communicated according to the parameter and/or security algorithm pair with first base station and/or the second base station
Breath is handled;
Wherein, the first base station be with the UE carry out user face data communication base station, second base station be with
The UE carries out the base station of control plane signalling communication;Alternatively,
Cell where the first base station is the main plot with the UE, and the cell where second base station is described
The secondary cell of UE.
According to the third aspect, in the first realization method, the security algorithm include Encryption Algorithm, header compression algorithm and
At least one of protection algorithm integrallty algorithm:
The parameter include next-hop linkage counter NCC, next-hop NH, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C-RNTI,
At least one of the length of Paket Data Convergence Protocol PDCP sequence numbers parameter.
According to the third aspect, in second of realization method, the UE is according to the parameter and/or security algorithm pair and the
The information that one base station and/or the second base station are communicated is handled, including at least one of following processing processing:
The UE is carried out plus is solved according to the information that the Encryption Algorithm pair is communicated with first base station and/or the second base station
Close processing;
The information that the UE is communicated with first base station and/or the second base station according to the header compression algorithm pair is into wardrobe
Compression or solution head compression processing;
The information that the UE is communicated with first base station and/or the second base station according to the protection algorithm integrallty pair into
Row integrity protection or solution integrity protection processing.
According to the third aspect, in the third realization method, the UE is according to the parameter and/or security algorithm pair and the
The information that one base station and/or the second base station are communicated is handled, including:
UE begins to use above-mentioned parameter and/or security algorithm pair and the when receiving the parameter and/or security algorithm
The information that one base station is communicated is handled.
According to the third aspect, in the 4th kind of realization method, the UE is according to the parameter and/or security algorithm pair and the
The information that one base station and/or the second base station are communicated is handled, including:
The UE begins to use the parameter and/or security algorithm pair and the first base when sending information to first base station
It stands and/or information that the second base station is communicated is into processing.
According to the third aspect, in the 5th kind of realization method, the UE is according to the parameter and/or security algorithm pair and the
The information that one base station and/or the second base station are communicated is handled, including:
When the message that the UE reception first base stations or the second base station are sent, the parameter and/or safety is begun to use to calculate
The information that method pair is communicated with first base station and/or the second base station is handled.
According to the 5th of the third aspect the kind of realization method, in the 6th kind of realization method, the first base station or the second base
Stand send message, to indicate that the UE begins to use the parameter and/or security algorithm.
According to the third aspect, in the 7th kind of realization method, the UE is according to the parameter and/or security algorithm pair and the
The information that one base station and/or the second base station are communicated is handled, including:
The UE when being linked into first base station, begin to use the parameter and/or security algorithm pair and first base station and/
Or second the information that is communicated of base station handled.
According to the third aspect, in the 8th kind of realization method, the UE is according to the parameter and/or security algorithm pair and the
The information that one base station and/or the second base station are communicated is handled, including:
The UE begins to use the parameter and/or security algorithm pair and the first base when starting and first base station communication
It stands and/or information that the second base station is communicated is handled.
According to the third aspect, in the 9th kind of realization method, the UE is according to the parameter and/or security algorithm pair and the
The information that one base station and/or the second base station are communicated is handled, including:
The UE when receiving first data packet that the first base station is sent, begin to use the parameter and/or
The information that security algorithm pair is communicated with first base station and/or the second base station is handled.
According to the third aspect, in the tenth kind of realization method, the UE is according to the parameter and/or security algorithm pair and the
The information that one base station and/or the second base station are communicated is handled, including:
The UE begins to use institute in the preset time after receiving the parameter and/or security algorithm or later
The information that parameter and/or security algorithm pair are communicated with first base station and/or the second base station is stated to handle.
Fourth aspect of the embodiment of the present invention provides a kind of base station, which is characterized in that including:
Receiving module, parameter and/or security algorithm for receiving the second base station or mobile management entity MME transmission;
Processing module, information for being communicated with user equipment (UE) according to the parameter and/or security algorithm pair into
Row processing;
Wherein, the base station be with the UE carry out user face data communication base station, second base station be with it is described
UE carries out the base station of control plane signalling communication;Alternatively,
Cell where the base station is the main plot with the UE, and the cell where second base station is the UE's
Secondary cell.
According to fourth aspect, in the first realization method, the security algorithm include Encryption Algorithm, header compression algorithm and
At least one of protection algorithm integrallty algorithm;
The parameter include next-hop linkage counter NCC, next-hop NH, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C-RNTI,
At least one of the length of Paket Data Convergence Protocol PDCP sequence numbers parameter.
According to fourth aspect, in second of realization method, the processing module is specifically used for according to the Encryption Algorithm
Pair information communicated with UE carries out encryption and decryption processing;It is carried out according to the information that the header compression algorithm pair is communicated with UE
Head compression or solution head compression processing;Integrality guarantor is carried out according to the information that the protection algorithm integrallty pair is communicated with UE
Shield or solution integrity protection processing.
According to fourth aspect, in the third realization method, the processing module, specifically for receiving the parameter
And/or when security algorithm, the information that the parameter and/or security algorithm pair are communicated with UE is begun to use to handle.
According to fourth aspect, in the 4th kind of realization method, the processing module, specifically for receiving the parameter
And/or begin to use the parameter and/or security algorithm pair when the message of the second base station of reception or UE transmissions after security algorithm
The information communicated with UE is handled.
According to the 4th of fourth aspect the kind of realization method, in the 5th kind of realization method, the base station further includes:
Communication module is communicated for after receiving the message, starting with UE.
According to fourth aspect, in the 6th kind of realization method, the processing module is specifically used in beginning and UE communication
When, begin to use the information that the parameter and/or security algorithm pair are communicated with UE to handle.
According to fourth aspect, in the 7th kind of realization method, the processing module is specifically used in UE access to the first base
When standing, the information that the parameter and/or security algorithm pair are communicated with UE is begun to use to handle.
According to fourth aspect, in the 8th kind of realization method, the processing module is specifically used on UE and first base station
When row is synchronous, the information that the parameter and/or security algorithm pair are communicated with UE is begun to use to handle.
According to fourth aspect, in the 9th kind of realization method, the processing module, specifically for receiving described second
Base station send first data packet when, begin to use the information that the parameter and/or security algorithm pair are communicated with UE into
Row processing.
According to fourth aspect, in the tenth kind of realization method, the processing module, specifically for receiving the parameter
And/or in the preset time after security algorithm or later, the parameter and/or security algorithm pair is begun to use to lead to UE
The information of letter is handled.
According to fourth aspect, in a kind of the tenth realization method, the base station further includes:
Sending module is used to indicate the instruction for beginning to use the parameter and/or security algorithm for being sent to the UE
Message;
The processing module, specifically for beginning to use the parameter and/or safety when sending the instruction message
The information that algorithm pair is communicated with UE is handled.
According to fourth aspect, in the 12nd kind of realization method, the processing module is specifically used for according to original parameter
And/or security algorithm processing failure, then begin to use the parameter and/or security algorithm pair to be carried out at the communication information with UE
Reason.
The 5th aspect of the embodiment of the present invention provides a kind of base station, including:
Update module is used for undated parameter and/or security algorithm;
First sending module, for sending the parameter and/or security algorithm to first base station or UE;
Wherein, the first base station be with UE carry out user face data communication base station, second base station be with it is described
UE carries out the base station of control plane signalling communication;Alternatively,
Cell where the first base station is the main plot with the UE, and the cell where the base station is the UE's
Secondary cell.
According to the 5th aspect, in the first realization method, the security algorithm include Encryption Algorithm, header compression algorithm and
At least one of protection algorithm integrallty algorithm:
The parameter include next-hop linkage counter NCC, next-hop NH, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C-RNTI,
At least one of the length of Paket Data Convergence Protocol PDCP sequence numbers parameter.
According to the 5th aspect, in second of realization method, the base station further includes:
Second sending module, for sending message to the first base station or UE, so that the first base station is receiving
Begin to use the information that the parameter and/or security algorithm pair are communicated with UE to handle when to the message, or makes UE
The parameter and/or security algorithm pair is begun to use to carry out with first base station and/or the second base station when receiving the message
The information of communication is handled.
The 6th aspect of the embodiment of the present invention provides a kind of user equipment, including:
Receiving module, parameter and/or security algorithm for receiving first base station or the transmission of the second base station;
Processing module, for being led to first base station and/or the second base station according to the parameter and/or security algorithm pair
The information of letter is handled;
Wherein, the first base station be with the UE carry out user face data communication base station, second base station be with
The UE carries out the base station of control plane signalling communication;Alternatively,
Cell where the first base station is the main plot with the UE, and the cell where second base station is described
The secondary cell of UE.
According to the 6th aspect, in the first realization method, the security algorithm include Encryption Algorithm, header compression algorithm and
At least one of protection algorithm integrallty algorithm:
The parameter include next-hop linkage counter NCC, next-hop NH, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C-RNTI,
At least one of the length of Paket Data Convergence Protocol PDCP sequence numbers parameter.
According to the 6th aspect, in second of realization method, the processing module is specifically used for according to the Encryption Algorithm
Pair information communicated with first base station and/or the second base station carries out encryption and decryption processing;According to the header compression algorithm pair with
Head compression processing is compressed into wardrobe or solved to the information that first base station and/or the second base station are communicated;According to the integrality
The information that protection algorism pair is communicated with first base station and/or the second base station carries out integrity protection or solution integrity protection
Processing.
According to the 6th aspect, in the third realization method, the processing module, specifically for receiving the parameter
And/or when security algorithm, begin to use at the information that above-mentioned parameter and/or security algorithm pair communicated with first base station
Reason.
According to the 6th aspect, in the 4th kind of realization method, the processing module, specifically for being sent to first base station
When information, begin to use the information that the parameter and/or security algorithm pair are communicated with first base station and/or the second base station into
Row processing.
According to the 6th aspect, in the 5th kind of realization method, the processing module is specifically used for receiving first base station or the
When the message that two base stations are sent, the parameter and/or security algorithm pair is begun to use to be carried out with first base station and/or the second base station
The information of communication is handled.
According to the 6th aspect, in the 6th kind of realization method, the message of the first base station or the transmission of the second base station, to
Indicate that the UE begins to use the parameter and/or security algorithm.
According to the 6th aspect, in the 7th kind of realization method, the processing module, specifically for being linked into first base station
When, begin to use at the information that the parameter and/or security algorithm pair communicated with first base station and/or the second base station
Reason.
According to the 6th aspect, in the 8th kind of realization method, the processing module is specifically used in beginning and first base station
When communication, begin to use the information that the parameter and/or security algorithm pair are communicated with first base station and/or the second base station into
Row processing.
According to the 6th aspect, in the 9th kind of realization method, the processing module, specifically for receiving described first
When first data packet that base station is sent, begin to use the parameter and/or security algorithm pair and first base station and/or the second base
The information that station is communicated is handled.
According to the 6th aspect, in the tenth kind of realization method, the processing module, specifically for receiving the parameter
And/or in the preset time after security algorithm or later, begin to use the parameter and/or security algorithm pair and first base station
And/or second the information that is communicated of base station handled.
In the embodiment of the present invention, when the user plane of UE and control plane correspond respectively to first base station and the second base station,
Newer parameter and/or security algorithm are sent to first base station by diyl standing-meeting, realize first base station, the second base station and UE
It can synchronize and also avoid first base station using same parameters and/or security algorithm and can not decrypt the information communicated with UE
Problem.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this hair
Some bright embodiments for those of ordinary skill in the art without creative efforts, can be with root
Other attached drawings are obtained according to these attached drawings.
Fig. 1 is the flow diagram of cell optimization method embodiment one provided by the invention;
Fig. 2 is the flow diagram of cell optimization method embodiment two provided by the invention;
Fig. 3 is the flow diagram of cell optimization method embodiment three provided by the invention;
Fig. 4 is the flow diagram of cell optimization method example IV provided by the invention;
Fig. 5 is the flow diagram of cell optimization method embodiment five provided by the invention;
Fig. 6 is the flow diagram of cell optimization method embodiment six provided by the invention;
Fig. 7 is the flow diagram of cell optimization method embodiment seven provided by the invention;
Fig. 8 is the structural schematic diagram of base station embodiment one provided by the invention;
Fig. 9 is the structural schematic diagram of base station embodiment two provided by the invention;
Figure 10 is the structural schematic diagram of base station embodiment three provided by the invention;
Figure 11 is the structural schematic diagram of base station embodiment four provided by the invention;
Figure 12 is the structural schematic diagram of user equipment embodiment provided by the invention.
Specific implementation mode
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is
A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
The every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
Fig. 1 is the flow diagram of cell optimization method embodiment one provided by the invention, as shown in Figure 1, this method packet
It includes:
S101, first base station receive the second base station or mobile management entity(Mobile Management Entity, letter
Claim MME)The parameter and/or security algorithm of transmission.The parameter and/or security algorithm be with the relevant parameter of communication security and/
Or security algorithm.The parameter and/or security algorithm be used for the data or information of communication carry out including but not limited to encryption and
Integrity protection etc. and the realization relevant operation of communication security.
Specifically, security algorithm can be Encryption Algorithm(Ciphering Algorithm), such as eea0, eea1,
Eea2, eea3-v11xy etc. can also be protection algorithm integrallty, such as eia0-v920, eia1, eia2, eia3-v11xy
Deng can also be that header compression algorithm, header compression algorithm are to be based on(Robust Header Compression, abbreviation ROHC)Frame
Structure(framework), can be compressed into wardrobe using the algorithm and corresponding parameter or solve head and compressed.Specific head compression is calculated
There are many kinds of methods, and the type of algorithm passes through profile identifier(Profile Identifier)It defines, such as 0x0002 tables
Show a kind of algorithm mark;Particularly relevant compressed parameter can have Profile Identifier, MAX CID, LARGE
CIDS, FEEDBACK FOR etc., but be not limited thereto;Parameter can be next-hop linkage counter(Next Hop
Chaining Counter, abbreviation NCC), next-hop(Next Hop, abbreviation NH), Paket Data Convergence Protocol(Packet
Data Convergence Protocol, abbreviation PDCP)Layer sequence number, for example size(PDCP Sequence Number length
In bits, abbreviation pdcp-SN-Size), Cell Radio Network Temporary Identifier/Identity, Cell-RNTI(Cell Radio Network
TemporaryIdentifier, abbreviation C-RNTI)Deng, but be not limited thereto.Specifically, parameter can also be UE in cell
Mark C-RNTI.C-RNTI is the marks of UE in the cell in connected state, is convenient for dispatching by C-RNTI for base station
UE。
The information communicated with UE according to above-mentioned parameter and/or security algorithm pair carries out encryption and decryption processing specifically can
To be that above-mentioned base station utilizes above-mentioned parameter(Such as NCC, NH or PDCP-SN-Size etc.)And/or algorithm deduce out it is close
Key is used for the encryption or decryption of data.Parameter can also be UE cell Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C-RNTI
(Cell RadioNetwork Temporary Identifier).UE is dispatched in base station by C-RNTI, and UE passes through C-RNTI
To identify and receive the data of oneself.
The information that S102, above-mentioned first base station are communicated according to above-mentioned parameter and/or security algorithm pair with UE(Including with
Family face data or control plane signaling)It is handled;Specifically, processing here can be at least one of following processing place
Reason:
1)Above-mentioned first base station carries out encryption and decryption processing according to above-mentioned Encryption Algorithm for the information that UE is communicated;
2)Head compression is compressed into wardrobe or solved to the information that above-mentioned first base station is communicated according to header compression algorithm pair with UE
Processing;
3)Above-mentioned first base station carries out integrality guarantor according to the information that above-mentioned protection algorithm integrallty pair is communicated with UE
Shield or solution integrity protection.
Wherein, due to the scene that the embodiment of the present invention is detached for control plane and user plane, thus specifically, working as the control of UE
When face processed is switched to the second base station or after switching, the user plane of UE is still in first base station, or when the user plane of UE is switched to
When first base station or after switching, for the control plane of UE still in the second base station, i.e. first base station is to carry out user plane with above-mentioned UE
The base station of data communication, second base station are the base station that control plane signalling communication is carried out with above-mentioned UE;Alternatively, where first base station
Cell be main plot with above-mentioned UE, the secondary cell that the cell where the second base station is above-mentioned UE;More specifically, the present embodiment
Suitable for a variety of concrete scenes, illustrate:
Scene 1, UE control plane be switched to the second base station from first base station, and the user plane of the UE is maintained at the first base
It stands;Specifically, can be user plane and control plane with UE in first base station(By taking Pico as an example)In, the control plane of UE will switch
To the second base station(With macro network eNB, i.e. for macro base station MacroeNB).
Scene 2, UE control plane be switched to the second base station from third base station, and the user plane of the UE is maintained at the first base
It stands;The third base station can be any base station in addition to above-mentioned first base station, the second base station;Specifically, can be UE from third
Base station(By taking macro base station Macro eNB1 as an example), it is switched to the second base station of target(By taking macro base station Macro eNB2 as an example), UE's
Data surface is maintained at first base station(By taking micro-base station Pico1 as an example).
Scene 3, UE control plane be maintained at the second base station, and the user plane of the UE is switched to the first base from third base station
It stands;Equally, which can be any base station in addition to above-mentioned first base station, the second base station;Specifically, it can be UE
Control plane is maintained at the second base station(By taking macro base station eNB as an example), the user plane transmission of UE is from third base station(With micro-base station Pico2
For)Replace first base station(By taking Pico1 as an example).
Scene 4, the user plane of UE are switched to first base station from the second base station, and the control plane of the UE is maintained at the second base
It stands.Specifically, can be UE user plane and control plane in the second base station(By taking macro base station eNB as an example)In, the user plane of UE turns
Change to first base station(By taking Pico1 as an example).
Base station or website mentioned in holding within the present invention can also be various types of base stations, macro base station(Macro
eNB), femto base station(Micro eNB), micro-base station(Pico eNB), Home eNodeB HeNB, small-cell base station(Small Cell
eNB), relay station(relay station)Deng this is not restricted.
In addition in the present embodiment, in addition to terminal supports the scene that control plane is detached with user plane, it is also possible to which terminal is supported
Carrier wave polymerize, specifically the 1 frequency of use f1 of cell of first base station, and 2 frequency of use 2 of cell of the second base station carries for terminal simultaneously
For service.For example, the cell 1 that first base station is terminal service may be referred to as main plot, the second base station takes for terminal
The cell 2 of business may be referred to as secondary cell.First base station may be macro base station eNB, and the second base station may be micro-base station Pico.Eventually
End can have above-mentioned one or two kinds of ability.
The first base station referred in content of the embodiment of the present invention, the second base station or third base station can be first base stations
Cell, the cell of the second base station or the cell of third base station.First base station in content of the embodiment of the present invention, the second base station
Either third base station can also be replaced with first community second community or third cell.
It is first stop that the first base station referred in content of the embodiment of the present invention, the second base station or third base station, which are also referred to,
Point, the second website or third website, in addition, base station can be the website or radio node for having scheduling feature.
No matter for specific any scene, either in handoff procedure or after switching completion, as long as second
Base station is updated above-mentioned parameter and/or security algorithm, then needs to be sent to first base station, so as to first base station, the second base
Stand, UE tripartite can synchronize also allowed for using same parameters and/or security algorithm first base station use new parameter and/or peace
The information that full algorithm pair is communicated with UE is handled.It should be noted that the information communicated with UE can be data
Or can also be signaling, such as the information etc. in system message, physical layer signaling, control channel.
The base station that control plane service is provided for user equipment can be as the master base station of UE, master base station generally use low-frequency range
Control plane signaling is transmitted, the service bearer of the part low data bulk of UE can be optionally carried;The RRC connections of UE are established in main base
On standing;Below to the base station/cell for UE control plane services, the base station of user plane service carries out detailed definition:
The base station that control plane service is provided for user equipment includes:The corresponding base station of cell of control plane transmission, Ke Yiwei
The downlink transfer website that user equipment sends control signaling;Alternatively, macro base station or the corresponding website of macrocell;Alternatively, master is small
Area(primary cell)Corresponding website;Alternatively, the corresponding website of user equipment serving cell;Signaling is provided for user equipment
Radio bearer(Signaling Radio Bearer, abbreviation SRB)The website of transmission;The website at place is established in the RRC connections of UE.
For user equipment provide control plane service or control plane transmission cell include:Main plot(primary
cell);Alternatively, the cell to send control signaling for user equipment;Alternatively, the downlink transfer to send control signaling for user equipment
The corresponding cell of point;Alternatively, the corresponding cell of macro base station;Alternatively, in wireless heterogeneous networks(Radio Resource
Control, abbreviation RRC)Connection establish re-establish or handoff procedure in, for user equipment provide Non-Access Stratum (NAS) move
Property information cell, alternatively, RRC connections establish or handoff procedure in, the cell inputted safely is provided for user equipment;For
User equipment provides the SRB cells of transmission.Radio resource control RRC connect establish re-establish or handoff procedure in be user
Equipment provides the cell of NAS mobility informations, alternatively, providing peace in RRC connections foundation or handoff procedure for user equipment
The cell inputted entirely is also main plot.Different from the cell of main plot when secondary cell.
Control signaling can include at least following one:Information, control information on hybrid automatic retransmission indication channel
The information in information, control channel, system message, physical layer signaling, Media access contorl MAC layer on format indication channel disappear
Breath, radio resource control RRC layer message, the corresponding information of SRBs.
Optionally, the base station of user equipment offer control plane service can be also responsible for DRBs on the basis of defined above
Or the transmission of part SRBs.
The base station that user plane service is provided for UE includes:It can be secondary cell(Secondary cell)The website at place,
The either corresponding website of secondary cell, or the website of data transmission is provided for UE, or provide data for UE and wirelessly hold
It carries(Data Radio Bearer, abbreviation DRB)And/or Signaling Radio Bearer(Signaling Radio Bearer, referred to as
SRB)The website of transmission, or provide Physical Downlink Shared Channel for UE(Physical Downlink Shared
Channel, abbreviation PDSCH)The website of the information of upper transmission, it should be noted that SRB provided herein is carried with above-mentioned for UE
The SRB provided for the base station of control plane service is different;
For user equipment provide control plane service or control plane transmission cell include:Secondary cell(Secondary
cell);Alternatively, providing the cell of data transmission for user UE;The DRB cells of transmission are provided for user UE;Alternatively, being set for user
The standby cell that information on transmission PDSCH is provided.
It illustrates:
Specifically, the transmission of SRBs has been responsible in Ke Yishi, the base station that control plane transmission is provided for user equipment;It is set for user
It is responsible for the transmission of DRBs in the standby base station that user plane transmission is provided.
Alternatively, can provide the transmission that SRB0 and SRB1 have been responsible in the base station that control plane transmits for user equipment;For with
The transmission of SRB2 and DRBs are responsible in the base station that family equipment provides user plane transmission, wherein be by above-mentioned SRBs be divided into SRB0,
SRB1、SRB2.Specifically, SRB0 is used for transmitting RRC information, is transmitted on logic channel CCCH;SRB1 is used for transmitting RRC information
(May can also include piggybacked NAS messages), before the foundation of SRB2 carryings, have than SRB2 higher preferential
Grade..SRB2 is transmitted on logic channel DCCH to be used for transmitting NAS message, there is lower priority than SRB1, and always exist
SRB2 is just configured after secure mode active, is transmitted on logic channel DCCH.
Alternatively, can be, the transmission of SRB0 and SRB1 be responsible in the base station that control plane transmission is provided for user equipment, and
It has been also responsible for the transmission of part DRBs;It is responsible for the biography of SRB2 and part DRBs in the base station that user plane transmission is provided for user equipment
It is defeated.
Alternatively, can be, the transmission of SRBs be responsible in the base station that control plane transmission is provided for user equipment, and is also responsible for
The transmission of part DRBs;It is responsible for the transmission of part DRBs in the base station that user plane transmission is provided for user equipment.
In the present embodiment, when the user plane information and control plane information of UE are transmitted by first base station and the second base station respectively
When, newer above-mentioned design parameter and/or security algorithm can be sent to first base station by the second base station, realize first base station,
Second base station and UE can be synchronized using same parameters and/or security algorithm, and the second base can not be obtained by also avoiding first base station
Stand newer above-mentioned parameter and/or security algorithm, so can not pair information communicated with UE be decrypted or solve head compression
Or solution integrity protection.
In addition, being carried out according to the information that above-mentioned parameter and/or security algorithm pair are communicated with UE in above-mentioned first base station
Processing, in specific implementation process, there are a variety of situations, as follows:
1, the first base station begins to use above-mentioned parameter and/or safety when receiving above-mentioned parameter and/or security algorithm
The information that algorithm pair is communicated with UE is handled;Can be that first base station receives new parameter and/or security algorithm just
Directly begin to use above-mentioned parameter and/or security algorithm.
2, the first base station wouldn't use after receiving above-mentioned parameter and/or security algorithm, wait and receive the second base
Stand or message that UE is sent after, then the information for beginning to use the parameter and/or security algorithm pair to be communicated with UE handles;
The message can be that the instruction message of above-mentioned parameter and/or security algorithm is specifically used dedicated for instruction first base station,
Can be any message that the second base station or UE are sent out to first base station;For example, the first base station reception that can make an appointment
Certain message arrived is just used as instruction message or activate message, for example in scene 1, the second base station may after the completion of switching
A UE context release message is sent to first base station, which is originally used to indicate the context of first base station release UE,
This arranges the message as instruction message, that is, is equal to when receiving the message and receives instruction message, and first base station begins to use
Above-mentioned parameter and/or security algorithm, but be not limited thereto, can be other message;After receiving the message, the first base is meaned
It stands and begins to use parameter and/or security algorithm with this as the starting point to handle the information with UE communication.It is equivalent to the message activation
First base station and UE begin to use the parameter and/or security algorithm to handle the information of first base station and UE communication.Or
Can be that an instruction information is carried in certain a piece of news that the second base station or UE are sent to first base station, for example, wherein one
A bit is used to indicate whether to begin to use above-mentioned parameter and/or security algorithm;It should be noted that the UE can accessed
Above-mentioned message is sent behind above-mentioned second base station, above-mentioned second base station can send parameter and/or security algorithm to first base station
While or send the rear of parameter and/or security algorithm and send above- mentioned information to the first base station;
During specific implementation, the first base station can also while receiving above-mentioned message or later, start with it is upper
It states UE to be communicated, it can disappear to what UE transmission message or reception UE were sent to start to be communicated with above-mentioned UE specifically
Breath.
3, it can also be the first base station when beginning and UE are communicated, above-mentioned parameter and/or safety begun to use to calculate
Method handles the information that UE is communicated.
4, can also be when UE access is to the first base station, first base station begins to use above-mentioned parameter and/or safety to calculate
Method handles the information that UE is communicated.
5, can also be to begin to use above-mentioned parameter and/or security algorithm pair in UE and the first base station uplink synchronous
It is handled in the information that UE is communicated.
Wherein, uplink synchronous refers to using the uplink of user's transmission of the different location of same time slot in same cell
Signal reaches base station reception antenna simultaneously, i.e., the signal of same time slot different user keeps synchronizing when reaching base station reception antenna.
In order to which before reaching uplink synchronous foundation, the synchronizing signal that UE must listen to cell obtains down-going synchronous, follow-up UE
By adjusting timing offset to reach uplink synchronous.
6, when can also be that the first base station receives first data packet that above-mentioned second base station is sent, begin to use institute
The information that parameter and/or security algorithm pair are communicated with UE is stated to handle.Specifically, here there may be two kinds of situations,
After receiving above-mentioned parameter and/or security algorithm one is first base station, first number that above-mentioned second base station is sent is received
When according to packet, begin to use the parameter and/or security algorithm;Another situation is that first base station receives the transmission of the second base station
First data packet, wouldn't process, wait after receiving above-mentioned parameter and/or security algorithm, immediately begin to use the ginseng
Number and/or security algorithm handle above-mentioned first data packet.
7, the first base station can also in the preset time after receiving above-mentioned parameter and/or security algorithm or it
Afterwards, the information that the parameter and/or security algorithm pair are communicated with UE is begun to use to handle;During specific implementation,
The mode of timer timing may be used to realize.
8, the first base station can send to above-mentioned UE and be used to indicate the finger for beginning to use above-mentioned parameter and/or security algorithm
The information shown message, and above-mentioned parameter and/or security algorithm pair is begun to use when sending the instruction message to be communicated with UE
It is handled;During specific implementation, can also again it begin to use after the confirmation message for receiving UE and replying the instruction message
Above-mentioned parameter and/or security algorithm.During specific implementation, above-mentioned instruction message can also be and aforementioned there are many understanding mode
Similar in 2nd kind of situation, details are not described herein.
After 9, if first base station receives above-mentioned parameter and/or security algorithm, it is not previously set, does not also receive and appoint
What instruction message, then the first base station needs the information sent to UE to be decrypted or solve head compression or Xie Wanzhengxingbaohuchu
When reason, original parameter and/or security algorithm can be first used, if decryption or the compression of solution head or solution integrity protection failure, start to make
The information communicated with UE with above-mentioned parameter and/or security algorithm pair is handled.
Above-mentioned each situation can be not limited to during specific implementation.
Fig. 2 is the flow diagram of cell optimization method embodiment two provided by the invention, i.e., in above-mentioned scene 1, the
The specific interactive process of one base station, the second base station and UE, as shown in Fig. 2, the flow includes:
S201, first base station send switching request message to the second base station(HandOver Request);
S202, the second base station send switch acknowledgment message to first base station(HandOver ACK);
S203, first base station parse above-mentioned switch acknowledgment message, obtain parameter wherein included and/or security algorithm etc..
S204, first base station send switching command message to UE, and instruction UE is switched over;Wherein, first base station can incite somebody to action
Above-mentioned parameter and/or security algorithm carrying are sent to UE within the message;
S205, UE initiate random access to the second base station, and the control plane of UE is switched to the second base station, while to the second base station
Handoff completion message is sent, which, which can also be called RRC connection reconfigurations, sets and complete message;
It should be noted that after the second base station is in the message for receiving UE, after the second base station can continue to use prior art execution
Continuous switch step, then this does not illustrate one by one.The second base station of final stage of switching and core net initiate path integration(path
switch procedure)Flow.The second last base station receives the path integration confirmation message of MME transmissions(path switch
ACK message).
S206, the second base station send UE context release messages to first base station;One of specifically, optionally,
It receives this message and can be used for meaning that first base station begins to use above-mentioned parameter and/or security algorithm.
S207, first base station begin to use above-mentioned parameter and/or security algorithm pair to be handled with the UE progress communication information;
Before certain step, first base station specifically may be used it needs to be determined that when begin to use above-mentioned parameter and/or security algorithm
It is handled according to the information of above-mentioned parameter and/or security algorithm pair and UE into communication with the first base station with reference to aforementioned offer
A variety of situations, details are not described herein.
Accordingly UE begins to use above-mentioned parameter and/or security algorithm.How certain UE determines when to begin to use
Above-mentioned parameter and/or security algorithm, specific method
1, the first base station begins to use above-mentioned parameter and/or safety when receiving above-mentioned parameter and/or security algorithm
The information that algorithm pair is communicated with UE is handled;Can be that first base station receives new parameter and/or security algorithm just
Directly begin to use.
UE after receiving parameter and/or security algorithm, start communicated with first base station when, using above-mentioned parameter with/
Or the information that security algorithm pair is communicated with first base station and/or the second base station is handled.
2, the first base station wouldn't use after receiving above-mentioned parameter and/or security algorithm, wait and receive the second base
Stand or message that UE is sent after, then the information for beginning to use the parameter and/or security algorithm pair to be communicated with UE handles;
The message can be that the instruction message of above-mentioned parameter and/safety or algorithm is specifically used dedicated for instruction first base station,
Can be any message that the second base station or UE are sent out to first base station;For example, the first base station reception that can make an appointment
Certain message arrived is just used as instruction message or activate message, for example in scene 1, the second base station may after the completion of switching
A UE context release message is sent to first base station, which is originally used to indicate the context of first base station release UE,
This arranges the message as instruction message, that is, is equal to when receiving the message and receives instruction message, and first base station begins to use
Above-mentioned parameter and/or security algorithm, but be not limited thereto, can be other message;Can also be in the second base station or UE
It is sent in certain a piece of news of first base station and carries an instruction information, for example, one of bit is used to indicate whether out
Begin to use above-mentioned parameter and/or security algorithm;It should be noted that the UE can be sent after accessing above-mentioned second base station
State message, above-mentioned second base station can while sending parameter and/or security algorithm to first base station or send parameter and/or
The rear of security algorithm sends above-mentioned message to the first base station;During specific implementation, which can also receive
While above-mentioned message or later, start to be communicated with above-mentioned UE, i.e., disappears to what UE transmission message or reception UE were sent
Breath.
UE sends messages to first base station, and expression can begin to use parameter and/or security algorithm.The message can be special
It is fixed dedicated for instruction first base station using the instruction message of above-mentioned parameter and/safety or algorithm, can also be UE to first
Any message of base station hair, after receiving the message, first base station begins to use parameter and/or security algorithm to handle and UE communication
Information;It is equivalent to message activation first base station and UE begins to use the parameter and/or security algorithm to handle first
The information of base station and UE communication;Can also be that UE is sent to one instruction information of carrying, example in certain a piece of news of first base station
Such as, one of bit is used to indicate whether to begin to use above-mentioned parameter and/or security algorithm;It should be noted that the UE can
Above-mentioned message is sent after accessing above-mentioned first base station to be, or
UE is after receiving above-mentioned parameter and/or security algorithm, then receives disappearing for first base station or the second base station
When breath, can begin to use parameter and/or security algorithm and pair information communicated with first base station and/or the second base station into
Row processing;The message can be the specifically instruction dedicated for instruction first base station using above-mentioned parameter and/safety or algorithm
Message, which can also be any message that UE is sent out to first base station, and after receiving the message, UE can begin to use parameter
And/or security algorithm handles pair information communicated with first base station and/or the second base station;It is equivalent to the message activation
First base station and UE begin to use the parameter and/or security algorithm to handle the information of first base station and UE communication;Or
It can be received with UE and carry an instruction information in certain a piece of news of the second base station or first base station, for example, one of bit
It is used to indicate whether to begin to use above-mentioned parameter and/or security algorithm.
In short, when UE sends information to first base station, or receive what first base station/second base station/third base station was sent
Message begins to use the information that the parameter and/or security algorithm pair are communicated with first base station and/or the second base station to carry out
Processing or activation/instruction begin to use the parameter and/or security algorithm pair to be carried out with first base station and/or the second base station
The information of communication is handled.
3, it can also be the first base station when beginning and UE are communicated, above-mentioned parameter and/or safety begun to use to calculate
Method handles the information that UE is communicated.
After UE receives parameter and/or security algorithm, start when being communicated with first base station, begin to use above-mentioned parameter with/
Or the information that security algorithm pair is communicated with first base station and/or the second base station is handled.
4, can also be when UE access is to the first base station, first base station begins to use above-mentioned parameter and/or safety to calculate
Method handles the information that UE is communicated.
After UE receives parameter and/or security algorithm, when UE access to first base station communicates, UE begins to use above-mentioned parameter
And/or the information that security algorithm pair is communicated with first base station and/or the second base station is handled.
6, when can also be that the first base station receives first data packet that above-mentioned second base station is sent, begin to use institute
The information that parameter and/or security algorithm pair are communicated with UE is stated to handle.Specifically, here there may be two kinds of situations,
After receiving above-mentioned parameter and/or security algorithm one is first base station, first number that above-mentioned second base station is sent is received
When according to packet, begin to use the parameter and/or security algorithm;Another situation is that first base station receives the transmission of the second base station
First data packet, wouldn't process, wait after receiving above-mentioned parameter and/or security algorithm, immediately begin to use the ginseng
Number and/or security algorithm handle above-mentioned first data packet.
After UE receives above-mentioned parameter and/or security algorithm, when receiving first data packet of first base station transmission, start to make
The information communicated with first base station and/or the second base station with the parameter and/or security algorithm pair is handled;
It is identical as first base station, there are two kinds of situations here, one is UE receive above-mentioned parameter and/or security algorithm it
Afterwards, when receiving first data packet that above-mentioned first base station is sent, begin to use the parameter and/or security algorithm;Other one
Kind situation is first data packet that first base station receives first base station transmission, wouldn't process, wait and receive above-mentioned parameter
And/or after security algorithm, immediately begin to handle above-mentioned first data packet using the parameter and/or security algorithm.
(This is only suitable for the first scene and the second scene)
7, the first base station can also in the preset time after receiving above-mentioned parameter and/or security algorithm or it
Afterwards, the information that the parameter and/or security algorithm pair are communicated with UE is begun to use to handle;During specific implementation,
The mode of timer timing may be used to realize.
UE begins to use the parameter in the preset time after receiving above-mentioned parameter and/or security algorithm or later
And/or security algorithm handles pair information communicated with first base station and/or the second base station;Specific implementation process
In, the mode of timer timing may be used to realize
8, the first base station can send to above-mentioned UE and be used to indicate the finger for beginning to use above-mentioned parameter and/or security algorithm
The information shown message, and above-mentioned parameter and/or security algorithm pair is begun to use when sending the instruction message to be communicated with UE
It is handled;During specific implementation, can also again it begin to use after the confirmation message for receiving UE and replying the instruction message
Above-mentioned parameter and/or security algorithm.During specific implementation, above-mentioned instruction message can also be and aforementioned there are many understanding mode
Similar in 2nd kind of situation, details are not described herein.
UE receives the message of first base station, and instruction can begin to use parameter and/or security algorithm to be communicated with first base station
.The message can be that the instruction message of above-mentioned parameter and/safety or algorithm is specifically used dedicated for instruction first base station,
The message can also be any message that UE is sent out to first base station, and after receiving the message, meaning first base station is opened with this as the starting point
Begin to handle the information with UE communication using parameter and/or security algorithm.It is equivalent to message activation first base station and UE is opened
Beginning handles the information of first base station and UE communication using the parameter and/or security algorithm.Or can also UE receive second
An instruction information is carried in certain of base station or first base station a piece of news, for example, one of bit is used to indicate whether out
Begin to use above-mentioned parameter and/or security algorithm.During specific implementation, above-mentioned instruction message can also there are many understanding mode,
Similar with aforementioned 2nd kind of situation, details are not described herein.During specific implementation, after message being received, begin to use above-mentioned
Parameter and/or security algorithm can also begin to use above-mentioned ginseng again after the confirmation message for receiving UE and replying the instruction message
Number and/or security algorithm.
9, after first base station receives above-mentioned parameter and/or security algorithm, which needs to receiving UE transmissions
When information is decrypted or solves head compression or solution integrity protection processing, original parameter and/or security algorithm can be first used, if decryption
Or the compression of solution head or solution integrity protection fail, then above-mentioned new parameter and/or security algorithm pair is begun to use to be communicated with UE
Information handled.It is handled at this time including first base station and the uplink and downlink data of UE communication.
After UE receives above-mentioned parameter and/or security algorithm, pair information transmitted with first base station is needed to be decrypted
Solution head compression or solution integrity protection processing when, can first use original parameter and/or security algorithm, if decryption or solution head compression or
Integrity protection failure is solved, then above-mentioned new acquisition parameter and/or security algorithm pair is begun to use to be communicated with first base station
Information is handled.It is handled at this time including first base station and the uplink and downlink data of UE communication.
In addition UE obtains parameter and/or security algorithm, from first base station or the second base station or can obtain in fact.
UE can handle information from first base station and the second base station using different parameter and/or security algorithm respectively.
UE can also and first base station, when the second base station communication, information is handled using identical parameter and/or security algorithm.This hair
It is not restricted in bright.
The content of step S207, can be adapted for how terminal in other embodiments begins to use parameter and/or safety to calculate
Method is communicated with first base station, is not listed one by one and is repeated in the present invention.
Fig. 3 is the flow diagram of cell optimization method embodiment three provided by the invention, i.e., in above-mentioned scene 2, the
The specific interactive process of one base station, the second base station, UE and third base station, as shown in figure 3, this method includes:
S301, third base station send switching request message to the second base station;
S302, the second base station send switch acknowledgment message to third base station(HandOver ACK);
S303, third base station parse above-mentioned switch acknowledgment message, obtain parameter wherein included and/or security algorithm etc.;
S304, third base station send above-mentioned parameter/security algorithm to first base station;
S305, the second base station send above-mentioned parameter/security algorithm to first base station;
It should be noted that S304 and S305 is optional step, can optionally one be executed when realizing, if selection executes
S305, the step can execute after having executed S302.
S306, third base station send switching command message to UE, and instruction UE is switched over;Wherein, first base station can incite somebody to action
Above-mentioned parameter and/or security algorithm carrying are sent to UE within the message;
S307, UE send handoff completion message to the second base station, and initiate random access to the second base station;
It should be noted that when the second base station is after receiving the above-mentioned handoff completion message of UE transmissions, the second base station can edge
Subsequent switch step is executed with the prior art, then this is not illustrated one by one.The second base station of final stage of switching and core net hair
Play path integration(path switch procedure)Flow, until the second base station receives mobile management entity(Mobile
Management Entity, MME)The path integration confirmation message of transmission(Path switch ACK messages).
S308, the second base station send UE context release messages to third base station;
S309, first base station begin to use above-mentioned parameter and/or security algorithm pair to carry out plus solve with the UE progress communication information
Close processing;Before certain step, first base station it needs to be determined that when begin to use above-mentioned parameter and/or security algorithm,
A variety of situations of aforementioned offer are specifically referred to, details are not described herein.
Accordingly, UE begins to use new parameter and/or security algorithm.How certain UE determines when to begin to use
Parameter and/or security algorithm are stated, specific method such as step S207 contents are identical, are not repeated description herein.
In addition UE obtains parameter and/or security algorithm, can be from first base station either the second base station or third in fact
It is obtained in base station.UE can be handled from first base station and the second base station using different parameter and/or security algorithm respectively
Information.UE can also and first base station, when the second base station communication, information is handled using identical parameter and/or security algorithm.
It is not restricted in the present invention.
Fig. 4 is the flow diagram of cell optimization method example IV provided by the invention, i.e., in above-mentioned scene 3, the
The specific interactive process of one base station, the second base station, UE and third base station, as shown in figure 4, this method includes:
S401, the second base station send parameter and/or security algorithm to first base station.
S402, third base station send parameter and/or security algorithm to first base station.
It should be noted that S401 and S402 can optionally one be executed.
S403, the second base station send message to UE, specifically can also provide UE above-mentioned first by the message for UE
The parameter and/or security algorithm that base station uses.
S404, UE reply confirmation message;S404 alternatives execute.
S405, first base station begin to use new parameter and/or security algorithm;Before certain step, first base station needs
It determines when to begin to use above-mentioned parameter and/or security algorithm, a variety of situations of aforementioned offer is specifically provided,
This is repeated no more.
Accordingly, UE begins to use new parameter and/or security algorithm.How certain UE determines when to begin to use
Parameter and/or security algorithm are stated, specific method such as step S207 contents are identical, specifically, include the content of situation 1-8, herein
It is not repeated description.
In addition UE obtains parameter and/or security algorithm, can be from first base station either the second base station or third in fact
It is obtained in base station.
UE can handle information from first base station and the second base station using different parameter and/or security algorithm respectively.
UE can also and first base station, when the second base station communication, information is handled using identical parameter and/or security algorithm.This hair
It is not restricted in bright.
Fig. 5 is the flow diagram of cell optimization method embodiment five provided by the invention, i.e., in above-mentioned scene 4, the
The specific interactive process of one base station, the second base station and UE, as shown in figure 5, this method includes:
S501, the second base station send parameter and/or security algorithm to first base station.
S502, the second base station send message to UE, specifically can provide UE in the first base of target by the message for UE
The parameter and/or security algorithm that the place of station uses.
S503, UE reply confirmation message.
It should be noted that the S403 and S404 is optional step, you can not executed with selection.
S504, first base station begin to use new parameter and/or security algorithm, and before certain step, first base station needs
It determines when to begin to use above-mentioned parameter and/or security algorithm, a variety of situations of aforementioned offer is specifically provided,
This is repeated no more.
Accordingly, UE begins to use new parameter and/or security algorithm.How certain UE determines when to begin to use
Parameter and/or security algorithm are stated, specific method such as step S207 contents are identical, specifically, include the content of situation 1-8, herein
It is not repeated description.
In addition UE obtains parameter and/or security algorithm, can be from first base station either the second base station or third in fact
It is obtained in base station.
UE can handle information from first base station and the second base station using different parameter and/or security algorithm respectively.
UE can also and first base station, when the second base station communication, information, this hair are handled using identical parameter and/or security algorithm
It is not restricted in bright.
In the present embodiment, realize in the control plane or user plane handoff procedure of UE, the base station communicated with control plane can
New parameter and/or security algorithm are sent to the base station communicated with user plane, to ensure that above-mentioned first base station, second
Base station, UE are synchronous in communication process to carry out encryption and decryption processing using same parameters and/or security algorithm.
It should be noted that in above-mentioned website change or the handoff procedure that control plane service is provided for UE, in the second base station
After sending UE context release messages, entire change or handoff procedure are completed.Or when UE starts and is newly that UE provides use
When the site communication of family face service, entire change/handoff procedure completes.After above-mentioned website changes or switches completion, the
Two base stations, i.e., the current website that control plane service is provided for UE can be to certain parameters, particularly, such as parameter and/or safety
Algorithm is updated, and can be the second base station by obtaining new parameter from the sides MME and/or the second base station itself is matched specifically
Security algorithm is set newly, then the second base station can be by initiating a switching within cell to UE(intra-HO), to be UE
New parameter and/or security algorithm are provided.After switching within cell completion, while UE obtains new parameter and/or security algorithm
The second base station and the second base station is accessed again to be communicated.In addition, the second base station is also required to calculate newer parameter and/or safety
Method is sent to the website that user plane transmission is provided for UE(E.g. first base station), first base station determines after receiving and uses
At the specific moment, detailed process or specific method are similar with foregoing teachings, thus details are not described herein.
Fig. 6 is the flow diagram of cell optimization method embodiment six provided by the invention, as shown in fig. 6, this method packet
It includes:
S601, the second base station undated parameter and/or security algorithm;Here the second base station currently provides control plane service for UE
Website will be sent to first base station and/or UE when the second base station has parameter and/or security algorithm to update, wherein on
It includes at least one of Encryption Algorithm, header compression algorithm and protection algorithm integrallty algorithm to state security algorithm.
Above-mentioned parameter include next-hop linkage counter NCC, next-hop NH, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C-RNTI,
At least one of the length of Paket Data Convergence Protocol PDCP sequence numbers parameter.
S602, second base station send the parameter and/or security algorithm to first base station;
Wherein, above-mentioned first base station is that the base station of user face data communication is carried out with UE, and above-mentioned second base station is and the UE
Carry out the base station of control plane signalling communication;Alternatively, the cell where first base station is the main plot with above-mentioned UE, the second base station institute
Cell be above-mentioned UE secondary cell.
Further alternative, after which sends the parameter and/or security algorithm to first base station, this second
Base station can send message to first base station, so that above-mentioned first base station begins to use above-mentioned parameter when receiving the message
And/or the information that security algorithm pair is communicated with UE is handled, or UE is made to begin to use institute when receiving the message
The information that parameter and/or security algorithm pair are communicated with first base station and/or the second base station is stated to handle.The tool of the message
Body realization method can correspond to hereinbefore first base station and to determine that above-mentioned parameter and/or security algorithm pair is begun to use to carry out with UE
The 2nd kind of situation at the time of the information of communication is handled, details are not described herein.
Specifically, above-mentioned first base station is handled using the information that the security algorithm pair is communicated with UE, including
At least one of following processing processing:
The first base station carries out encryption and decryption processing according to the information that the Encryption Algorithm pair is communicated with UE;
Head is compressed into wardrobe or solved to the information that the first base station is communicated according to the header compression algorithm pair with UE
Compression processing;
The first base station carries out integrity protection according to the information that the protection algorithm integrallty pair is communicated with UE
Or solution integrity protection processing.
In the present embodiment, realize in the control plane or user plane handoff procedure of UE, the base station communicated with control plane can
New parameter and/or security algorithm are sent to the base station communicated with user plane, to ensure that above-mentioned first base station, second
Base station, UE are synchronous in communication process to be handled using same parameters and/or security algorithm.
Fig. 7 is the flow diagram of cell optimization method embodiment seven provided by the invention, as shown in fig. 7, this method packet
It includes:
S701, UE receive first base station or the parameter and/or security algorithm of the transmission of the second base station;In the control plane or use of UE
In the handoff procedure of family face, if there is the update of parameter and/or security algorithm in the second base station, it can be transmitted directly to UE, or first send out
First base station is given, which is then forwarded to by first base station.
S702, above-mentioned UE are communicated according to the parameter and/or security algorithm pair with first base station and/or the second base station
Information handled;
Wherein, above-mentioned first base station is that the base station of user face data communication is carried out with the UE, and above-mentioned second base station is and this
UE carries out the base station of control plane signalling communication;Alternatively, the cell where first base station is the main plot with above-mentioned UE, the second base station
The cell at place is the secondary cell of above-mentioned UE.Corresponding to previous embodiment, which includes Encryption Algorithm, head compression
At least one of algorithm and protection algorithm integrallty algorithm:Above-mentioned parameter includes next-hop linkage counter NCC, next-hop
At least one of the length of NH, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C-RNTI, Paket Data Convergence Protocol PDCP sequence numbers
Parameter.
In the present embodiment, realize in the control plane or user plane handoff procedure of UE, the base station that is communicated with control plane or
New parameter and/or security algorithm can be sent to UE by the base station communicated with user plane, to ensure that above-mentioned first base station,
Second base station, UE are synchronous in communication process to be handled using same parameters and/or security algorithm.
Further, above-mentioned UE is carried out according to above-mentioned parameter and/or security algorithm pair with first base station and/or the second base station
The information of communication is handled, similar with embodiment of the method shown in Fig. 1 during specific implementation, as follows there are a variety of situations
It is described:
1, UE begins to use above-mentioned parameter and/or security algorithm pair and first when receiving parameter and/or security algorithm
The information that base station and/or the second base station are communicated is handled.
2, UE begins to use above-mentioned parameter and/or security algorithm pair and first base station when sending information to first base station
And/or second the information that is communicated of base station handled.
3, UE begins to use the parameter and/or safety to calculate when receiving the message of first base station or the transmission of the second base station
The information that method pair is communicated with first base station and/or the second base station is handled;The message can be specifically dedicated for
It indicates instruction messages of the UE using above-mentioned parameter and/or security algorithm, can also be that first base station or the second base station are sent to UE
Any message;
Further, the message that above-mentioned first base station or the second base station are sent, can be indicating that the UE begins to use
The parameter and/or security algorithm.
4, UE is when being linked into first base station, begin to use above-mentioned parameter and/or security algorithm pair and first base station and/or
The information that second base station is communicated is handled.
5, UE begins to use above-mentioned parameter and/or security algorithm pair and first base station when beginning and first base station communicate
And/or second the information that is communicated of base station handled.
6, UE begins to use above-mentioned parameter and/or peace when receiving first data packet that above-mentioned first base station is sent
The information that full algorithm pair is communicated with first base station and/or the second base station is handled;Specifically, it is understood that there may be two kinds of feelings
Condition after receiving above-mentioned parameter and/or security algorithm one is UE, receives first data packet that above-mentioned first base station is sent
When, begin to use above-mentioned parameter and/or security algorithm;Another situation is, first base station receives the of first base station transmission
One data packet, wouldn't process, and wait after receiving above-mentioned parameter and/or security algorithm, immediately begin to using the parameter and/
Or security algorithm handles above-mentioned first data packet.
7, UE in the preset time after receiving above-mentioned parameter and/or security algorithm or later, begins to use above-mentioned
The information that parameter and/or security algorithm pair are communicated with first base station and/or the second base station is handled.Specific implementation process
In, the mode of timer may be used to realize.
In the present embodiment, realize in the control plane or user plane handoff procedure of UE, above-mentioned second base station or the first base
New parameter and/or security algorithm are sent to UE by standing-meeting, to ensure that above-mentioned first base station, the second base station, UE are being communicated
It is synchronous in the process that the information interacted is handled using same parameters and/or security algorithm.
Fig. 8 is the structural schematic diagram of base station embodiment one provided by the invention, which is above-mentioned first base station, such as Fig. 8
Shown, which includes:Receiving module 801 and processing module 802, wherein:
Receiving module 801, parameter and/or security algorithm for receiving the second base station or mobile management entity MME transmission;
Processing module 802, at the information for being communicated with UE according to above-mentioned parameter and/or security algorithm pair
Reason;
It should be noted that the base station, i.e. first base station are the base station that user face data communication is carried out with the UE, it is described
Second base station is the base station that control plane signalling communication is carried out with the UE;Alternatively, cell where the first base station for institute
The main plot of UE is stated, the cell where the base station is the secondary cell of the UE.
The specific works of above-mentioned each module referring to Fig.1 shown in embodiment of the method, details are not described herein.
In the present embodiment, parameter and/or security algorithm are sent to first base station by the second base station, ensure that above-mentioned first
Base station, the second base station, UE can be synchronized in communication process carries out encryption and decryption processing using same parameters and/or security algorithm.
It should be noted that above-mentioned security algorithm includes in Encryption Algorithm, header compression algorithm and protection algorithm integrallty
At least one algorithm;Above-mentioned parameter includes next-hop linkage counter NCC, next-hop NH, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C-
At least one of the length of RNTI, Paket Data Convergence Protocol PDCP sequence numbers parameter.
Above-mentioned processing module 702 is carried out specifically for the information communicated with UE according to Encryption Algorithm pair at encryption and decryption
Reason;Head compression processing is compressed into wardrobe or solved to the information communicated with UE according to header compression algorithm pair;It is protected according to integrality
The information that shield algorithm pair is communicated with UE carries out integrity protection or solution integrity protection processing.
Fig. 9 is the structural schematic diagram of base station embodiment two provided by the invention, which is above-mentioned first base station, such as Fig. 9
Shown, on the basis of Fig. 8, which further includes communication module 803, sending module 804, wherein:
During specific implementation, the above-mentioned information communicated with UE according to parameter and/or security algorithm pair is handled
Can there are many situation, can optional one implemented, illustrate:
1, processing module 802, specifically for when receiving the parameter and/or security algorithm, beginning to use the ginseng
The information that number and/or security algorithm pair are communicated with UE is handled.
2, processing module 802, specifically for received after receiving the parameter and/or security algorithm the second base station or
When the message that UE is sent, the information that the parameter and/or security algorithm pair are communicated with UE is begun to use to handle.
Further, communication module 803 are communicated for after receiving the message, starting with UE.
3, processing module 802 are specifically used for, when starting and UE communication, beginning to use the parameter and/or security algorithm
Pair information communicated with UE is handled.
4, processing module 802 are specifically used for when UE access is to first base station, begin to use the parameter and/or safety
The information that algorithm pair is communicated with UE is handled.
5, processing module 802, are specifically used in UE and when first base station uplink synchronous, begin to use the parameter and/or
The information that security algorithm pair is communicated with UE is handled.
6, processing module 802, specifically for when receiving first data packet that second base station is sent, starting to make
The information communicated with UE with the parameter and/or security algorithm pair is handled.
7, processing module 802, specifically in the preset time after receiving the parameter and/or security algorithm or
Later, the information that the parameter and/or security algorithm pair are communicated with UE is begun to use to handle.
8, sending module 804 begin to use the parameter and/or security algorithm for sending to be used to indicate to the UE
Instruction message;
Further above-mentioned processing module 802, specifically for beginning to use the ginseng when sending the instruction message
The information that number and/or security algorithm pair are communicated with UE is handled.
9, processing module 802 are specifically used for according to original parameter and/or security algorithm processing failure, then beginning to use institute
Parameter and/or security algorithm pair is stated to handle with the UE progress communication information.The specific works of above-mentioned each module are with reference to aforementioned side
Method embodiment, details are not described herein.
In the present embodiment, realize in the control plane or user plane handoff procedure of UE, the base station communicated with control plane can
New parameter and/or security algorithm are sent to the base station communicated with user plane, to ensure that above-mentioned first base station, second
Base station, UE are synchronous in communication process to carry out encryption and decryption processing using same parameters and/or security algorithm.
Figure 10 is the structural schematic diagram of base station embodiment three provided by the invention, which is above-mentioned second base station, is such as schemed
Shown in 10, which includes:Update module 110, the first sending module 111, wherein:
Update module 110 is used for undated parameter and/or security algorithm;
First sending module 111, for sending the parameter and/or security algorithm to first base station or UE;
Wherein, the first base station is that the base station of user face data communication, the base station, i.e. the second base are carried out with the UE
It stands to carry out the base station of control plane signalling communication with the UE;Alternatively, the cell where the first base station is with the UE's
Main plot, the secondary cell that the cell where the base station is the UE.
The work of above-mentioned each module can refer to preceding method embodiment, and details are not described herein.
In the present embodiment, parameter and/or security algorithm are sent to first base station by the second base station, ensure that above-mentioned first
Base station, the second base station, UE can be synchronized in communication process carries out encryption and decryption processing using same parameters and/or security algorithm.
Explanation is needed further exist for, above-mentioned security algorithm includes that Encryption Algorithm, header compression algorithm and integrity protection are calculated
At least one of method algorithm:Above-mentioned parameter includes that next-hop linkage counter NCC, next-hop NH, cell-radio network are interim
Identify at least one of the length of C-RNTI, Paket Data Convergence Protocol PDCP sequence numbers parameter.
Figure 11 is the structural schematic diagram of base station embodiment four provided by the invention, which is above-mentioned second base station, is being schemed
May include the second sending module 112 optionally on the basis of 11, for sending instruction message to the first base station or UE,
So that the first base station begins to use the parameter and/or security algorithm pair to be communicated with UE when receiving the message
Information carry out encryption and decryption processing, or UE is made to begin to use the parameter and/or security algorithm pair when receiving the message
The information communicated with first base station and/or the second base station is handled.
The specific works of the module can refer to preceding method embodiment, and details are not described herein.
Figure 12 is the structural schematic diagram of user equipment embodiment provided by the invention, as shown in figure 12, the user equipment packet
It includes:Receiving module 120 and processing module 121, wherein:
Receiving module 120, parameter and/or security algorithm for receiving first base station or the transmission of the second base station;
Processing module 121, for according to the parameter and/or security algorithm pair and first base station and/or the second base station into
The information of row communication is handled;
It should be noted that wherein, the first base station is to carry out the base station of user face data communication with the UE, described
Second base station is the base station that control plane signalling communication is carried out with the UE;Alternatively, cell where the first base station for institute
The main plot of UE is stated, the cell where the base station is the secondary cell of the UE.
In the present embodiment, realize in the control plane or user plane handoff procedure of UE, the base station that is communicated with control plane or
New parameter and/or security algorithm can be sent to UE by the base station communicated with user plane, to ensure that above-mentioned first base station,
Second base station, UE are synchronous in communication process to carry out encryption and decryption processing using same parameters and/or security algorithm.
Further, above-mentioned security parameter include in Encryption Algorithm, header compression algorithm and protection algorithm integrallty at least
A kind of algorithm:
Above-mentioned parameter include next-hop linkage counter NCC, next-hop NH, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C-RNTI,
At least one of the length of Paket Data Convergence Protocol PDCP sequence numbers parameter.
Processing module 121, specifically for being communicated with first base station and/or the second base station according to the Encryption Algorithm pair
Information carry out encryption and decryption processing;The letter communicated with first base station and/or the second base station according to the header compression algorithm pair
It ceases and head compression processing is compressed or solved into wardrobe;According to the protection algorithm integrallty pair and first base station and/or the second base station
The information communicated carries out integrity protection or solution integrity protection processing.
Further, above-mentioned according to above-mentioned parameter and/or security algorithm pair and first base station during specific implementation
And/or second the information that is communicated of base station carry out processing there are a variety of situations:
1, processing module 121, specifically for when receiving the parameter and/or security algorithm, beginning to use above-mentioned ginseng
The information that number and/or security algorithm pair are communicated with first base station is handled.
2, processing module 121 are specifically used for, when sending information to first base station, beginning to use the parameter and/or peace
The information that full algorithm pair is communicated with first base station and/or the second base station is handled.
3, processing module 121 begin to use described when specifically for reception first base station or the message of the second base station transmission
The information that parameter and/or security algorithm pair are communicated with first base station and/or the second base station is handled.
It should be noted that the message that the first base station or the second base station are sent, to indicate that the UE begins to use
The parameter and/or security algorithm.
4, processing module 121, specifically for when being linked into first base station, beginning to use the parameter and/or safety to calculate
The information that method pair is communicated with first base station and/or the second base station is handled.
5, processing module 121, the processing module are specifically used for, when starting and first base station communication, beginning to use institute
The information that parameter and/or security algorithm pair are communicated with first base station and/or the second base station is stated to handle.
6, processing module 121, specifically for when receiving first data packet that the first base station is sent, starting to make
The information communicated with first base station and/or the second base station with the parameter and/or security algorithm pair is handled.
7, processing module 121, specifically in the preset time after receiving the parameter and/or security algorithm or
Later, the information that the parameter and/or security algorithm pair are communicated with first base station and/or the second base station is begun to use to carry out
Processing.
The concrete function that unit or module execute in the corresponding equipment of Fig. 8 to Figure 11 is implemented with method before can be found in
Example.
The embodiment of the present invention also provides a kind of base station, corresponds to above-mentioned first base station, including:Receiver and processor,
In, receiver is used to receive the parameter and/or security algorithm of the second base station or mobile management entity MME transmission;Processor is used for
The information communicated with user equipment (UE) according to the parameter and/or security algorithm pair is handled;Wherein, the base station is
The base station of user face data communication is carried out with the UE, second base station is the base that control plane signalling communication is carried out with the UE
It stands;Alternatively, the cell where the first base station is the main plot with the UE, the cell where the base station is the UE's
Secondary cell.Specifically, the security algorithm includes at least one of Encryption Algorithm, header compression algorithm and protection algorithm integrallty
Algorithm;The parameter includes next-hop linkage counter NCC, next-hop NH, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C-RNTI, grouping
Data converge at least one of the length of layer protocol PDCP sequence numbers parameter.
Processor carries out encryption and decryption processing specifically for the information communicated with UE according to the Encryption Algorithm pair;Root
Head compression processing is compressed into wardrobe or solved to the information communicated with UE according to the header compression algorithm pair;According to the integrality
The information that protection algorism pair is communicated with UE carries out integrity protection or solution integrity protection processing.
Further, processor, specifically for receiving the second base station after receiving the parameter and/or security algorithm
Or UE send message when, begin to use the information that the parameter and/or security algorithm pair are communicated with UE to handle;And
After receiving the message, start to be communicated with UE;Alternatively,
The processor is specifically used for starting and when UE communication, begin to use the parameter and/or security algorithm pair with
The information that UE is communicated is handled;Alternatively,
The processor is specifically used for when UE access is to first base station, begins to use the parameter and/or security algorithm
Pair information communicated with UE is handled;Alternatively,
The processor is specifically used for, in UE and first base station uplink synchronous, beginning to use the parameter and/or safety
The information that algorithm pair is communicated with UE is handled;Alternatively,
The processor, specifically for when receiving first data packet that second base station is sent, beginning to use
The information that the parameter and/or security algorithm pair are communicated with UE is handled;Alternatively,
The processor, specifically in the preset time after receiving the parameter and/or security algorithm or it
Afterwards, the information that the parameter and/or security algorithm pair are communicated with UE is begun to use to handle;Alternatively,
The base station further includes transmitter, begins to use the parameter and/or safety for being used to indicate to UE transmissions
The instruction message of algorithm;The processor, specifically for begin to use when sending the instruction message parameter and/or
The information that security algorithm pair is communicated with UE is handled;Alternatively,
The processor is specifically used for according to original parameter and/or security algorithm processing failure, then beginning to use the ginseng
Number and/or security algorithm pair carry out the communication information with UE and handle.
The embodiment of the present invention also provides a kind of base station, corresponds to above-mentioned second base station, including processor and transmitter,
In, processor is used for undated parameter and/or security algorithm;Transmitter, for sending the parameter to first base station or UE
And/or security algorithm;Wherein, the first base station be with UE carry out user face data communication base station, the base station for institute
State the base station that UE carries out control plane signalling communication;Alternatively, the cell where the first base station is the main plot with the UE, institute
The secondary cell that cell where stating base station is the UE.
Wherein, the security algorithm includes at least one of Encryption Algorithm, header compression algorithm and protection algorithm integrallty
Algorithm:The parameter includes next-hop linkage counter NCC, next-hop NH, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C-RNTI, grouping
Data converge at least one of the length of layer protocol PDCP sequence numbers parameter.
The transmitter is additionally operable to send message to the first base station or UE, so that the first base station is receiving
Begin to use the information that the parameter and/or security algorithm pair are communicated with UE to handle when the message, or UE is made to exist
The parameter and/or security algorithm pair is begun to use to lead to first base station and/or the second base station when receiving the message
The information of letter is handled.
The embodiment of the present invention also provides a kind of user equipment, including receiver and processor, wherein receiver is for receiving
The parameter and/or security algorithm that first base station or the second base station are sent;Processor, for being calculated according to the parameter and/or safety
The information that method pair is communicated with first base station and/or the second base station is handled;Wherein, the first base station is and the UE
The base station of user face data communication is carried out, second base station is the base station that control plane signalling communication is carried out with the UE;Alternatively,
Cell where the first base station is the main plot with the UE, the secondary cell that the cell where the base station is the UE.
In addition, the security algorithm includes at least one of Encryption Algorithm, header compression algorithm and protection algorithm integrallty algorithm:It is described
Parameter includes next-hop linkage counter NCC, next-hop NH, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C-RNTI, packet data convergence
At least one of the length of layer protocol PDCP sequence numbers parameter.
Further, the processor, specifically for when receiving the parameter and/or security algorithm, beginning to use
The information that above-mentioned parameter and/or security algorithm pair are communicated with first base station is handled;Alternatively,
The processor is specifically used for, when sending information to first base station, the parameter and/or safety being begun to use to calculate
The information that method pair is communicated with first base station and/or the second base station is handled;Alternatively,
The processor begins to use the ginseng when specifically for reception first base station or the message of the second base station transmission
The information that number and/or security algorithm pair are communicated with first base station and/or the second base station is handled, wherein described first
The message that base station or the second base station are sent, to indicate that the UE begins to use the parameter and/or security algorithm;Alternatively,
The processor, specifically for when being linked into first base station, beginning to use the parameter and/or security algorithm pair
The information communicated with first base station and/or the second base station is handled;Alternatively,
The processor is specifically used for, when starting and first base station communication, the parameter and/or safety being begun to use to calculate
The information that method pair is communicated with first base station and/or the second base station is handled;Alternatively,
The processor, specifically for when receiving first data packet that the first base station is sent, beginning to use
The information that the parameter and/or security algorithm pair are communicated with first base station and/or the second base station is handled;Alternatively,
The processor, specifically in the preset time after receiving the parameter and/or security algorithm or it
Afterwards, begin to use at the information that the parameter and/or security algorithm pair communicated with first base station and/or the second base station
Reason.
One of ordinary skill in the art will appreciate that:Realize that all or part of step of above-mentioned each method embodiment can lead to
The relevant hardware of program instruction is crossed to complete.Program above-mentioned can be stored in a computer read/write memory medium.The journey
When being executed, execution includes the steps that above-mentioned each method embodiment to sequence;And storage medium above-mentioned includes:ROM, RAM, magnetic disc or
The various media that can store program code such as person's CD.
Finally it should be noted that:The above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent
Present invention has been described in detail with reference to the aforementioned embodiments for pipe, it will be understood by those of ordinary skill in the art that:Its according to
So can with technical scheme described in the above embodiments is modified, either to which part or all technical features into
Row equivalent replacement;And these modifications or replacements, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution
The range of scheme.
Claims (54)
1. a kind of cell optimization method, which is characterized in that including:
First base station receives the parameter and/or security algorithm that the second base station is sent;
At the information that the first base station is communicated with user equipment (UE) according to the parameter and/or security algorithm pair
Reason;
Wherein, the first base station be with the UE carry out user face data communication base station, second base station be with it is described
UE carries out the base station of control plane signalling communication;Alternatively,
Cell where the first base station is the main plot with the UE, and the cell where second base station is the UE's
Secondary cell.
2. according to the method described in claim 1, it is characterized in that, the security algorithm includes Encryption Algorithm, header compression algorithm
With at least one of protection algorithm integrallty algorithm;
The parameter includes next-hop linkage counter NCC, next-hop NH, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C-RNTI, grouping
Data converge at least one of the length of layer protocol PDCP sequence numbers parameter.
3. according to the method described in claim 2, it is characterized in that, the first base station according to the security algorithm pair and UE into
The information of row communication is handled, including at least one of following processing processing:
The first base station carries out encryption and decryption processing according to the information that the Encryption Algorithm pair is communicated with UE;
Head compression is compressed into wardrobe or solved to the information that the first base station is communicated according to the header compression algorithm pair with UE
Processing;
The information that the first base station is communicated with UE according to the protection algorithm integrallty pair carry out integrity protection or
Solve integrity protection processing.
4. according to the method described in claim 1, it is characterized in that, the first base station is calculated according to the parameter and/or safety
The information that method pair is communicated with user equipment (UE) is handled, including:
The first base station begins to use the parameter and/or security algorithm when receiving the parameter and/or security algorithm
Pair information communicated with UE is handled.
5. according to the method described in claim 1, it is characterized in that, the first base station is calculated according to the parameter and/or safety
The information that method pair is communicated with user equipment (UE) is handled, including:
The message that the first base station receives the second base station after receiving the parameter and/or security algorithm or UE is sent
When, begin to use the information that the parameter and/or security algorithm pair are communicated with UE to handle.
6. according to the method described in claim 5, it is characterized in that, the first base station when receiving the message or it
Afterwards, further include:
Start to be communicated with UE.
7. according to the method described in claim 1, it is characterized in that, the first base station is calculated according to the parameter and/or safety
The information that method pair is communicated with user equipment (UE) is handled, including:
The first base station begins to use the parameter and/or security algorithm pair to be communicated with UE when starting and UE communication
Information handled.
8. according to the method described in claim 1, it is characterized in that, the first base station is calculated according to the parameter and/or safety
The information that method pair is communicated with user equipment (UE) is handled, including:
The first base station begins to use the parameter and/or security algorithm pair to be carried out with UE when UE access is to first base station
The information of communication is handled.
9. according to the method described in claim 1, it is characterized in that, the first base station is calculated according to the parameter and/or safety
The information that method pair is communicated with user equipment (UE) is handled, including:
The first base station begins to use the parameter and/or security algorithm pair and UE in UE and first base station uplink synchronous
The information communicated is handled.
10. according to the method described in claim 1, it is characterized in that, the first base station is calculated according to the parameter and/or safety
The information that method pair is communicated with user equipment (UE) is handled, including:
The first base station when receiving first data packet that second base station is sent, begin to use the parameter and/
Or the information that security algorithm pair is communicated with UE is handled.
11. according to the method described in claim 1, it is characterized in that, the first base station is calculated according to the parameter and/or safety
The information that method pair is communicated with user equipment (UE) is handled, including:
The first base station begins to use in the preset time after receiving the parameter and/or security algorithm or later
The information that the parameter and/or security algorithm pair are communicated with UE is handled.
12. according to the method described in claim 1, it is characterized in that, the first base station is calculated according to the parameter and/or safety
The information that method pair is communicated with user equipment (UE) is handled, including:
The first base station sends to the UE and is used to indicate the instruction message for beginning to use the parameter and/or security algorithm,
Begin to use when sending the instruction message at the information that the parameter and/or security algorithm pair communicated with UE
Reason.
13. according to the method described in claim 1, it is characterized in that, the first base station is calculated according to the parameter and/or safety
The information that method pair is communicated with user equipment (UE) is handled, including:
The first base station is handled when needing the information sent to UE to handle according to original parameter and/or security algorithm
Failure then begins to use the parameter and/or security algorithm pair to carry out the communication information with UE and handles.
14. a kind of cell optimization method, which is characterized in that including:
Second base station undated parameter and/or security algorithm;
Second base station sends the parameter and/or security algorithm to first base station or user equipment (UE);
Wherein, the first base station be with UE carry out user face data communication base station, second base station be with the UE into
The base station of row control plane signalling communication;Alternatively,
Cell where the first base station is the main plot with the UE, and the cell where second base station is the UE's
Secondary cell.
15. according to the method for claim 14, which is characterized in that the security algorithm includes Encryption Algorithm, head compression calculation
At least one of method and protection algorithm integrallty algorithm;
The parameter includes next-hop linkage counter NCC, next-hop NH, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C-RNTI, grouping
Data converge at least one of the length of layer protocol PDCP sequence numbers parameter.
16. according to the method for claim 14, which is characterized in that second base station is to described in first base station transmission
After parameter and/or security algorithm, further include:
Second base station sends message to the first base station or UE, so that the first base station is when receiving the message
Begin to use the information that the parameter and/or security algorithm pair are communicated with UE to handle, or makes UE described in receiving
Begin to use when message the information that the parameter and/or security algorithm pair are communicated with first base station and/or the second base station into
Row processing.
17. a kind of cell optimization method, which is characterized in that including:
User equipment (UE) receives first base station or the parameter and/or security algorithm of the transmission of the second base station;
The information that the UE is communicated with first base station and/or the second base station according to the parameter and/or security algorithm pair into
Row processing;
Wherein, the first base station be with the UE carry out user face data communication base station, second base station be with it is described
UE carries out the base station of control plane signalling communication;Alternatively,
The place cell of the first base station is the main plot with the UE, and the cell where second base station is the UE's
Secondary cell.
18. according to the method for claim 17, which is characterized in that the security algorithm includes Encryption Algorithm, head compression calculation
At least one of method and protection algorithm integrallty algorithm:
The parameter includes next-hop linkage counter NCC, next-hop NH, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C-RNTI, grouping
Data converge at least one of the length of layer protocol PDCP sequence numbers parameter.
19. according to the method for claim 18, which is characterized in that the UE is according to the parameter and/or security algorithm pair
The information communicated with first base station and/or the second base station is handled, including at least one of following processing processing:
The UE is carried out according to the information that the Encryption Algorithm pair is communicated with first base station and/or the second base station at encryption and decryption
Reason;
The UE is compressed according to the information that the header compression algorithm pair is communicated with first base station and/or the second base station into wardrobe
Or solution head compression processing;
The UE has been carried out according to the information that the protection algorithm integrallty pair is communicated with first base station and/or the second base station
Whole property protection or solution integrity protection processing.
20. according to the method for claim 17, which is characterized in that the UE is according to the parameter and/or security algorithm pair
The information communicated with first base station and/or the second base station is handled, including:
UE begins to use above-mentioned parameter and/or security algorithm pair and the first base when receiving the parameter and/or security algorithm
It stands and/or information that the second base station is communicated is handled.
21. according to the method for claim 17, which is characterized in that the UE is according to the parameter and/or security algorithm pair
The information communicated with first base station and/or the second base station is handled, including:
The UE when sending information to first base station, begin to use the parameter and/or security algorithm pair and first base station and/
Or second the information that is communicated of base station handled.
22. according to the method for claim 17, which is characterized in that the UE is according to the parameter and/or security algorithm pair
The information communicated with first base station and/or the second base station is handled, including:
The UE begins to use the parameter and/or security algorithm when receiving the message of first base station or the transmission of the second base station
Pair information communicated with first base station and/or the second base station is handled.
23. according to the method for claim 22, which is characterized in that the first base station or the message of the second base station transmission,
To indicate that the UE begins to use the parameter and/or security algorithm.
24. according to the method for claim 17, which is characterized in that the UE is according to the parameter and/or security algorithm pair
The information communicated with first base station and/or the second base station is handled, including:
The UE begins to use the parameter and/or security algorithm pair and first base station and/or the when being linked into first base station
The information that two base stations are communicated is handled.
25. according to the method for claim 17, which is characterized in that the UE is according to the parameter and/or security algorithm pair
The information communicated with first base station and/or the second base station is handled, including:
The UE when starting and first base station communication, begin to use the parameter and/or security algorithm pair and first base station and/
Or second the information that is communicated of base station handled.
26. according to the method for claim 17, which is characterized in that the UE is according to the parameter and/or security algorithm pair
The information communicated with first base station and/or the second base station is handled, including:
The UE begins to use the parameter and/or safety when receiving first data packet that the first base station is sent
The information that algorithm pair is communicated with first base station and/or the second base station is handled.
27. according to the method for claim 17, which is characterized in that the UE is according to the parameter and/or security algorithm pair
The information communicated with first base station and/or the second base station is handled, including:
The UE begins to use the ginseng in the preset time after receiving the parameter and/or security algorithm or later
The information that number and/or security algorithm pair are communicated with first base station and/or the second base station is handled.
28. a kind of base station, which is characterized in that including:
Receiving module, parameter and/or security algorithm for receiving the transmission of the second base station;
Processing module, at the information for being communicated with user equipment (UE) according to the parameter and/or security algorithm pair
Reason;
Wherein, the base station be with the UE carry out user face data communication base station, second base station be with the UE into
The base station of row control plane signalling communication;Alternatively,
Cell where the base station is the main plot with the UE, and the cell where second base station is the auxiliary small of the UE
Area.
29. base station according to claim 28, which is characterized in that the security algorithm includes Encryption Algorithm, head compression calculation
At least one of method and protection algorithm integrallty algorithm;
The parameter includes next-hop linkage counter NCC, next-hop NH, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C-RNTI, grouping
Data converge at least one of the length of layer protocol PDCP sequence numbers parameter.
30. base station according to claim 29, which is characterized in that the processing module is specifically used for according to the encryption
The information that algorithm pair is communicated with UE carries out encryption and decryption processing;The information communicated with UE according to the header compression algorithm pair
Head compression processing is compressed or solved into wardrobe;It is carried out according to the information that the protection algorithm integrallty pair is communicated with UE complete
Property protection or solution integrity protection processing.
31. base station according to claim 28, which is characterized in that the processing module, specifically for described in receiving
When parameter and/or security algorithm, begin to use at the information that the parameter and/or security algorithm pair communicated with UE
Reason.
32. base station according to claim 28, which is characterized in that the processing module, specifically for described in receiving
When the message that the second base station of reception or UE are sent after parameter and/or security algorithm, the parameter and/or safety is begun to use to calculate
The information that method pair is communicated with UE is handled.
33. base station according to claim 32, which is characterized in that further include:
Communication module is communicated for after receiving the message, starting with UE.
34. base station according to claim 28, which is characterized in that the processing module is specifically used for starting to lead to UE
When letter, the information that the parameter and/or security algorithm pair are communicated with UE is begun to use to handle.
35. base station according to claim 28, which is characterized in that the processing module is specifically used in UE access to the
When one base station, the information that the parameter and/or security algorithm pair are communicated with UE is begun to use to handle.
36. base station according to claim 28, which is characterized in that the processing module is specifically used in UE and the first base
When uplink synchronous of standing, the information that the parameter and/or security algorithm pair are communicated with UE is begun to use to handle.
37. base station according to claim 28, which is characterized in that the processing module, specifically for described in receiving
When first data packet that the second base station is sent, the letter that begins to use the parameter and/or security algorithm pair to be communicated with UE
Breath is handled.
38. base station according to claim 28, which is characterized in that the processing module, specifically for described in receiving
In preset time after parameter and/or security algorithm or later, begin to use the parameter and/or security algorithm pair and UE into
The information of row communication is handled.
39. base station according to claim 28, which is characterized in that further include:
Sending module is used to indicate the instruction message for beginning to use the parameter and/or security algorithm for being sent to the UE;
The processing module, specifically for beginning to use the parameter and/or security algorithm pair when sending the instruction message
The information communicated with UE is handled.
40. base station according to claim 28, which is characterized in that the processing module is specifically used for according to original parameter
And/or security algorithm processing failure, then begin to use the parameter and/or security algorithm pair to be carried out at the communication information with UE
Reason.
41. a kind of base station, which is characterized in that including:
Update module is used for undated parameter and/or security algorithm;
First sending module, for sending the parameter and/or security algorithm to first base station or user equipment (UE);
Wherein, the first base station is that the base station of user face data communication is carried out with UE, and the base station is to be controlled with the UE
The base station of plane signaling communication processed;Alternatively,
Cell where the first base station is the main plot with the UE, and the cell where the base station is the auxiliary small of the UE
Area.
42. base station according to claim 41, which is characterized in that the security algorithm includes Encryption Algorithm, head compression calculation
At least one of method and protection algorithm integrallty algorithm:
The parameter includes next-hop linkage counter NCC, next-hop NH, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C-RNTI, grouping
Data converge at least one of the length of layer protocol PDCP sequence numbers parameter.
43. base station according to claim 41, which is characterized in that further include:
Second sending module, for sending message to the first base station or UE, so that the first base station is described in receiving
Begin to use the information that the parameter and/or security algorithm pair are communicated with UE to handle when message, or UE is made to receive
The parameter and/or security algorithm pair is begun to use to be communicated with first base station and/or the second base station when to the message
Information is handled.
44. a kind of user equipment, which is characterized in that including:
Receiving module, parameter and/or security algorithm for receiving first base station or the transmission of the second base station;
Processing module, for what is communicated with first base station and/or the second base station according to the parameter and/or security algorithm pair
Information is handled;
Wherein, the first base station is that the base station of user face data communication, second base station are carried out with the user equipment (UE)
To carry out the base station of control plane signalling communication with the UE;Alternatively,
Cell where the first base station is the main plot with the UE, and the cell where second base station is the UE's
Secondary cell.
45. user equipment according to claim 44, which is characterized in that the security algorithm includes Encryption Algorithm, head pressure
At least one of compression algorithm and protection algorithm integrallty algorithm:
The parameter includes next-hop linkage counter NCC, next-hop NH, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C-RNTI, grouping
Data converge at least one of the length of layer protocol PDCP sequence numbers parameter.
46. user equipment according to claim 45, which is characterized in that the processing module is specifically used for according to
The information that Encryption Algorithm pair is communicated with first base station and/or the second base station carries out encryption and decryption processing;It is compressed according to the head
Head compression processing is compressed into wardrobe or solved to the information that algorithm pair is communicated with first base station and/or the second base station;According to institute
The information that protection algorithm integrallty pair is communicated with first base station and/or the second base station is stated to carry out integrity protection or solved
Whole property protection processing.
47. user equipment according to claim 44, which is characterized in that the processing module, specifically for receiving
When the parameter and/or security algorithm, the letter that begins to use above-mentioned parameter and/or security algorithm pair to be communicated with first base station
Breath is handled.
48. user equipment according to claim 44, which is characterized in that the processing module is specifically used for first
When base station sends information, the parameter and/or security algorithm pair is begun to use to be communicated with first base station and/or the second base station
Information handled.
49. user equipment according to claim 44, which is characterized in that the processing module is specifically used for receiving first
When the message that base station or the second base station are sent, begin to use the parameter and/or security algorithm pair and first base station and/or second
The information that base station is communicated is handled.
50. user equipment according to claim 49, which is characterized in that the first base station or the second base station were sent disappears
Breath, to indicate that the UE begins to use the parameter and/or security algorithm.
51. user equipment according to claim 44, which is characterized in that the processing module, specifically for being linked into
When first base station, the letter that begins to use the parameter and/or security algorithm pair to be communicated with first base station and/or the second base station
Breath is handled.
52. user equipment according to claim 44, which is characterized in that the processing module, be specifically used for start and
When first base station communicates, the parameter and/or security algorithm pair is begun to use to be communicated with first base station and/or the second base station
Information handled.
53. user equipment according to claim 44, which is characterized in that the processing module, specifically for receiving
When first data packet that the first base station is sent, begin to use the parameter and/or security algorithm pair and first base station and/
Or second the information that is communicated of base station handled.
54. user equipment according to claim 44, which is characterized in that the processing module, specifically for receiving
In preset time after the parameter and/or security algorithm or later, begin to use the parameter and/or security algorithm pair with
The information that first base station and/or the second base station are communicated is handled.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210562667.1A CN103888936B (en) | 2012-12-21 | 2012-12-21 | Cell optimization method and device |
PCT/CN2013/090234 WO2014094663A1 (en) | 2012-12-21 | 2013-12-23 | Cell optimization method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210562667.1A CN103888936B (en) | 2012-12-21 | 2012-12-21 | Cell optimization method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103888936A CN103888936A (en) | 2014-06-25 |
CN103888936B true CN103888936B (en) | 2018-09-21 |
Family
ID=50957620
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210562667.1A Active CN103888936B (en) | 2012-12-21 | 2012-12-21 | Cell optimization method and device |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN103888936B (en) |
WO (1) | WO2014094663A1 (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017132946A1 (en) * | 2016-02-04 | 2017-08-10 | 华为技术有限公司 | Data transmission method and apparatus |
CN109314899B (en) * | 2016-06-24 | 2021-06-15 | 华为技术有限公司 | Data transmission method and device |
CN109155945B (en) * | 2016-07-01 | 2021-03-09 | Oppo广东移动通信有限公司 | Method and device for transmitting data |
WO2018058444A1 (en) * | 2016-09-29 | 2018-04-05 | 华为技术有限公司 | Method and apparatus for data encryption |
CN111510924B (en) | 2018-02-23 | 2021-10-01 | Oppo广东移动通信有限公司 | Method and device for determining security algorithm and computer storage medium |
CN110475243B (en) * | 2018-05-11 | 2020-10-30 | 电信科学技术研究院有限公司 | Method for reporting, acquiring and processing UE capability information and corresponding device |
WO2019214625A1 (en) * | 2018-05-11 | 2019-11-14 | 电信科学技术研究院有限公司 | Ue capability information reporting, obtaining, and processing methods and corresponding apparatuses |
CN111641582B (en) * | 2019-03-01 | 2021-11-09 | 华为技术有限公司 | Safety protection method and device |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101242629A (en) * | 2007-02-05 | 2008-08-13 | 华为技术有限公司 | Method, system and device for selection algorithm of user plane |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100542347C (en) * | 2005-11-01 | 2009-09-16 | 华为技术有限公司 | Mobile communications network and data transmission method thereof |
CN102281535A (en) * | 2010-06-10 | 2011-12-14 | 华为技术有限公司 | Key updating method and apparatus thereof |
CN102378287B (en) * | 2010-08-11 | 2014-12-10 | 电信科学技术研究院 | Cell configuration method and device for changing primary cell |
CN102257852B (en) * | 2011-06-10 | 2014-05-07 | 华为技术有限公司 | Rebuilding method of wireless resource control, user equipment, base station and communication system |
CN102833802B (en) * | 2012-08-15 | 2015-09-23 | 电信科学技术研究院 | A kind of data forwarding method and equipment |
-
2012
- 2012-12-21 CN CN201210562667.1A patent/CN103888936B/en active Active
-
2013
- 2013-12-23 WO PCT/CN2013/090234 patent/WO2014094663A1/en active Application Filing
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101242629A (en) * | 2007-02-05 | 2008-08-13 | 华为技术有限公司 | Method, system and device for selection algorithm of user plane |
Also Published As
Publication number | Publication date |
---|---|
CN103888936A (en) | 2014-06-25 |
WO2014094663A1 (en) | 2014-06-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103888936B (en) | Cell optimization method and device | |
CN106105368B (en) | Dual link network | |
KR101723913B1 (en) | Key updating method, device and system | |
EP3099029B1 (en) | Security key changing method, and user equipment | |
CN104349312B (en) | Method for supporting the safe handling of dual link | |
EP3203805B1 (en) | Radio resource control (rrc) message processing method, apparatus, and system | |
CN106105143A (en) | Security key derivation in dual connectivity | |
WO2016125887A1 (en) | Base station | |
EP2928261B1 (en) | Bearer release | |
CN103517356A (en) | Method, system and equipment for conducting switching | |
JP2017103770A (en) | Device and method of handling data transmission/reception for dual connectivity | |
EP3609163B1 (en) | Communication method, device and system | |
EP3171635B1 (en) | Path switching method, mobile anchor point and base station | |
WO2014000684A1 (en) | Method, system and device for switching | |
WO2014000687A1 (en) | Method, system, and device for transmitting data during access point switching process | |
EP3691399A1 (en) | Communications system, base station, user equipment, and signaling transmission method | |
EP3361763B1 (en) | Senb key update method and device | |
CN102572816B (en) | Method and device for mobile switching | |
US11265967B2 (en) | User device for setting packet data convergence protocol entity in dual connectivity | |
CN104429109B (en) | A kind of communication means and device | |
WO2014008787A1 (en) | Method and user equipment for distinguishing signaling sources | |
CN103945420B (en) | Cell optimization method and device | |
EP3952373A1 (en) | Data transmission method and device | |
CN102065420B (en) | Method, system and device for determining secret key |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |