CN103888936B - Cell optimization method and device - Google Patents

Cell optimization method and device Download PDF

Info

Publication number
CN103888936B
CN103888936B CN201210562667.1A CN201210562667A CN103888936B CN 103888936 B CN103888936 B CN 103888936B CN 201210562667 A CN201210562667 A CN 201210562667A CN 103888936 B CN103888936 B CN 103888936B
Authority
CN
China
Prior art keywords
base station
parameter
security algorithm
information
communicated
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210562667.1A
Other languages
Chinese (zh)
Other versions
CN103888936A (en
Inventor
张亮亮
蔺波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201210562667.1A priority Critical patent/CN103888936B/en
Priority to PCT/CN2013/090234 priority patent/WO2014094663A1/en
Publication of CN103888936A publication Critical patent/CN103888936A/en
Application granted granted Critical
Publication of CN103888936B publication Critical patent/CN103888936B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/037Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A kind of cell optimization method of offer of the embodiment of the present invention and device, this method include:First base station receives the parameter and/or security algorithm of the second base station or mobile management entity MME transmission;The first base station is handled according to the information that the parameter and/or security algorithm pair are communicated with user equipment (UE);Wherein, the first base station is that the base station of user face data communication is carried out with the UE, and second base station is the base station that control plane signalling communication is carried out with the UE.In the embodiment of the present invention, when the user plane of UE and control plane correspond respectively to first base station and the second base station, newer parameter and/or security algorithm can be sent to first base station by the second base station, it realizes first base station, the second base station and UE and can synchronize and also avoid first base station using same parameters and/or security algorithm and can not decrypt the information communicated with UE.

Description

Cell optimization method and device
Technical field
The present embodiments relate to the communication technology more particularly to a kind of cell optimization method and devices.
Background technology
In the prior art, in user equipment(User Equipment, abbreviation UE)When interacting with base station, need to use The signaling or data of its interaction of key pair are encrypted.
With long evolving system(Long Term Evolution, abbreviation LTE)Development, some technologies start to consider Cooperation between base stations, to improve the data rate of UE, for example, making user plane and the control plane separation of UE.The sources in handoff procedure UE Base station(eNB)UE security capabilities are carried in switching request message, such as HandOver Request message, source base station side uses Encryption Algorithm and integral algorithm and parameter, the parameters such as such as KeNB*, NCC.Target eNB directly makees the KeNB* received For local KeNB, and the KeNB is associated with the NCC received.The NCC can also be carried in handoff response(HandOver Command)UE is sent in message.In short, target BS is the keys that provide of UE be derived from the parameter that source base station provides and/ Or security algorithm generates, although therefore UE switched target, source base station can be easy to calculate arrives or obtains target Base station is the key that UE is provided.From a safety viewpoint, for security isolation, target BS can select to carry out in a cell Switching(Intra-cell switches), target BS generation new key is generated using new parameter, such source base station just can not Know key used in target BS;Specifically, after UE is switched to target BS, target BS is from mobile management entity (MobileManagement Entity, abbreviation MME)A set of new parameter is obtained, base station passes through the switching in cell(intra- Cell switches)Notify UE new parameters and/or security algorithm.
But under the scene that user plane and control plane detach, it is understood that there may be a variety of switch instances, for example, the control of UE Face is switched to target BS from source base station, and user plane then remains at source base station or the control plane of UE switches from source base station To target BS, and user plane still retains third base station or user plane and is switched to target BS from source base station, and control plane Source base station etc. is then remained at, the transmission mode using the prior art if parameter remains unchanged occurs carrying out user with UE often The base station of face data communication can not be with UE interaction datas.
Invention content
A kind of cell optimization method of offer of the embodiment of the present invention and device, to solve the field of user plane and control plane separation Under scape, the problem of user face data communication base station cannot know new parameter and/or security algorithm is carried out with UE.
The first aspect of the embodiment of the present invention is to provide a kind of cell optimization method, including:
First base station receives the parameter and/or security algorithm of the second base station or mobile management entity MME transmission;
The first base station is carried out according to the information that the parameter and/or security algorithm pair are communicated with UE at encryption and decryption Reason;
Wherein, the first base station be with the UE carry out user face data communication base station, second base station be with The UE carries out the base station of control plane signalling communication;Alternatively,
Cell where the first base station is the main plot with the UE, and the cell where second base station is described The secondary cell of UE.
According in a first aspect, in the first realization method, the security algorithm include Encryption Algorithm, header compression algorithm and At least one of protection algorithm integrallty algorithm;
The parameter include next-hop linkage counter NCC, next-hop NH, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C-RNTI, At least one of the length of Paket Data Convergence Protocol PDCP sequence numbers parameter.
According to the first realization method of first aspect, in second of realization method, the first base station is according to The information that security algorithm pair is communicated with UE is handled, including at least one of following processing processing:
The first base station carries out encryption and decryption processing according to the information that the Encryption Algorithm pair is communicated with UE;
Head is compressed into wardrobe or solved to the information that the first base station is communicated according to the header compression algorithm pair with UE Compression processing;
The first base station carries out integrity protection according to the information that the protection algorithm integrallty pair is communicated with UE Or solution integrity protection processing.
According in a first aspect, in the third realization method, the first base station is according to the parameter and/or security algorithm Pair information communicated with user equipment (UE) is handled, including:
The first base station begins to use the parameter and/or safety when receiving the parameter and/or security algorithm The information that algorithm pair is communicated with UE is handled.
According in a first aspect, in the 4th kind of realization method, the first base station is according to the parameter and/or security algorithm Pair information communicated with user equipment (UE) is handled, including:
What the first base station received that the second base station or UE send after receiving the parameter and/or security algorithm disappears When breath, the information that the parameter and/or security algorithm pair are communicated with UE is begun to use to handle.
According to the 4th of first aspect the kind of realization method, in the 5th kind of realization method, the first base station is receiving When the message or later, further include:
Start to be communicated with UE.
According in a first aspect, in the 6th kind of realization method, the first base station is according to the parameter and/or security algorithm Pair information communicated with user equipment (UE) is handled, including:
The first base station begins to use the parameter and/or security algorithm pair to be carried out with UE when starting and UE communication The information of communication is handled.
According in a first aspect, in the 7th kind of realization method, the first base station is according to the parameter and/or security algorithm Pair information communicated with user equipment (UE) is handled, including:
The first base station begins to use the parameter and/or security algorithm pair and UE when UE access is to first base station The information communicated is handled.
According in a first aspect, in the 8th kind of realization method, the first base station is according to the parameter and/or security algorithm Pair information communicated with user equipment (UE) is handled, including:
The first base station begins to use the parameter and/or security algorithm pair in UE and first base station uplink synchronous The information communicated with UE is handled.
According in a first aspect, in the 9th kind of realization method, the first base station is according to the parameter and/or security algorithm Pair information communicated with user equipment (UE) is handled, including:
The first base station begins to use the parameter when receiving first data packet that second base station is sent And/or the information that security algorithm pair is communicated with UE is handled.
According in a first aspect, in the tenth kind of realization method, the first base station is according to the parameter and/or security algorithm Pair information communicated with user equipment (UE) is handled, including:
The first base station starts in the preset time after receiving the parameter and/or security algorithm or later The information communicated with UE using the parameter and/or security algorithm pair is handled.
According in a first aspect, in a kind of the tenth realization method, the first base station is calculated according to the parameter and/or safety The information that method pair is communicated with user equipment (UE) is handled, including:
The first base station is used to indicate to UE transmissions begins to use the instruction of the parameter and/or security algorithm to disappear Breath begins to use the information that the parameter and/or security algorithm pair are communicated with UE to carry out when sending the instruction message Processing.
According in a first aspect, in the 12nd kind of realization method, the first base station is calculated according to the parameter and/or safety The information that method pair is communicated with user equipment (UE) is handled, including:
The first base station is when needing the information sent to UE to handle, according to original parameter and/or security algorithm Processing failure then begins to use the parameter and/or security algorithm pair to carry out the communication information with UE and handles.
The second aspect of the embodiment of the present invention is to provide a kind of cell optimization method, including:
Second base station undated parameter and/or security algorithm;
Second base station sends the parameter and/or security algorithm to first base station or UE;
Wherein, the first base station be with UE carry out user face data communication base station, second base station be with it is described UE carries out the base station of control plane signalling communication;Alternatively,
Cell where the first base station is the main plot with the UE, and the cell where second base station is described The secondary cell of UE.
According to second aspect, in the first realization method, the security algorithm include Encryption Algorithm, header compression algorithm and At least one of protection algorithm integrallty algorithm;
The parameter include next-hop linkage counter NCC, next-hop NH, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C-RNTI, At least one of the length of Paket Data Convergence Protocol PDCP sequence numbers parameter.
According to second aspect, in second of realization method, second base station sends the ginseng to the first base station After number and/or security algorithm, further include:
Second base station sends message to the first base station or UE, so that the first base station is described in receiving Begin to use the information that the parameter and/or security algorithm pair are communicated with UE to handle when message, or UE is made to receive The parameter and/or security algorithm pair is begun to use to be communicated with first base station and/or the second base station when to the message Information is handled.
The third aspect of the embodiment of the present invention provides a kind of cell optimization method, including:
User equipment (UE) receives first base station or the parameter and/or security algorithm of the transmission of the second base station;
The letter that the UE is communicated according to the parameter and/or security algorithm pair with first base station and/or the second base station Breath is handled;
Wherein, the first base station be with the UE carry out user face data communication base station, second base station be with The UE carries out the base station of control plane signalling communication;Alternatively,
Cell where the first base station is the main plot with the UE, and the cell where second base station is described The secondary cell of UE.
According to the third aspect, in the first realization method, the security algorithm include Encryption Algorithm, header compression algorithm and At least one of protection algorithm integrallty algorithm:
The parameter include next-hop linkage counter NCC, next-hop NH, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C-RNTI, At least one of the length of Paket Data Convergence Protocol PDCP sequence numbers parameter.
According to the third aspect, in second of realization method, the UE is according to the parameter and/or security algorithm pair and the The information that one base station and/or the second base station are communicated is handled, including at least one of following processing processing:
The UE is carried out plus is solved according to the information that the Encryption Algorithm pair is communicated with first base station and/or the second base station Close processing;
The information that the UE is communicated with first base station and/or the second base station according to the header compression algorithm pair is into wardrobe Compression or solution head compression processing;
The information that the UE is communicated with first base station and/or the second base station according to the protection algorithm integrallty pair into Row integrity protection or solution integrity protection processing.
According to the third aspect, in the third realization method, the UE is according to the parameter and/or security algorithm pair and the The information that one base station and/or the second base station are communicated is handled, including:
UE begins to use above-mentioned parameter and/or security algorithm pair and the when receiving the parameter and/or security algorithm The information that one base station is communicated is handled.
According to the third aspect, in the 4th kind of realization method, the UE is according to the parameter and/or security algorithm pair and the The information that one base station and/or the second base station are communicated is handled, including:
The UE begins to use the parameter and/or security algorithm pair and the first base when sending information to first base station It stands and/or information that the second base station is communicated is into processing.
According to the third aspect, in the 5th kind of realization method, the UE is according to the parameter and/or security algorithm pair and the The information that one base station and/or the second base station are communicated is handled, including:
When the message that the UE reception first base stations or the second base station are sent, the parameter and/or safety is begun to use to calculate The information that method pair is communicated with first base station and/or the second base station is handled.
According to the 5th of the third aspect the kind of realization method, in the 6th kind of realization method, the first base station or the second base Stand send message, to indicate that the UE begins to use the parameter and/or security algorithm.
According to the third aspect, in the 7th kind of realization method, the UE is according to the parameter and/or security algorithm pair and the The information that one base station and/or the second base station are communicated is handled, including:
The UE when being linked into first base station, begin to use the parameter and/or security algorithm pair and first base station and/ Or second the information that is communicated of base station handled.
According to the third aspect, in the 8th kind of realization method, the UE is according to the parameter and/or security algorithm pair and the The information that one base station and/or the second base station are communicated is handled, including:
The UE begins to use the parameter and/or security algorithm pair and the first base when starting and first base station communication It stands and/or information that the second base station is communicated is handled.
According to the third aspect, in the 9th kind of realization method, the UE is according to the parameter and/or security algorithm pair and the The information that one base station and/or the second base station are communicated is handled, including:
The UE when receiving first data packet that the first base station is sent, begin to use the parameter and/or The information that security algorithm pair is communicated with first base station and/or the second base station is handled.
According to the third aspect, in the tenth kind of realization method, the UE is according to the parameter and/or security algorithm pair and the The information that one base station and/or the second base station are communicated is handled, including:
The UE begins to use institute in the preset time after receiving the parameter and/or security algorithm or later The information that parameter and/or security algorithm pair are communicated with first base station and/or the second base station is stated to handle.
Fourth aspect of the embodiment of the present invention provides a kind of base station, which is characterized in that including:
Receiving module, parameter and/or security algorithm for receiving the second base station or mobile management entity MME transmission;
Processing module, information for being communicated with user equipment (UE) according to the parameter and/or security algorithm pair into Row processing;
Wherein, the base station be with the UE carry out user face data communication base station, second base station be with it is described UE carries out the base station of control plane signalling communication;Alternatively,
Cell where the base station is the main plot with the UE, and the cell where second base station is the UE's Secondary cell.
According to fourth aspect, in the first realization method, the security algorithm include Encryption Algorithm, header compression algorithm and At least one of protection algorithm integrallty algorithm;
The parameter include next-hop linkage counter NCC, next-hop NH, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C-RNTI, At least one of the length of Paket Data Convergence Protocol PDCP sequence numbers parameter.
According to fourth aspect, in second of realization method, the processing module is specifically used for according to the Encryption Algorithm Pair information communicated with UE carries out encryption and decryption processing;It is carried out according to the information that the header compression algorithm pair is communicated with UE Head compression or solution head compression processing;Integrality guarantor is carried out according to the information that the protection algorithm integrallty pair is communicated with UE Shield or solution integrity protection processing.
According to fourth aspect, in the third realization method, the processing module, specifically for receiving the parameter And/or when security algorithm, the information that the parameter and/or security algorithm pair are communicated with UE is begun to use to handle.
According to fourth aspect, in the 4th kind of realization method, the processing module, specifically for receiving the parameter And/or begin to use the parameter and/or security algorithm pair when the message of the second base station of reception or UE transmissions after security algorithm The information communicated with UE is handled.
According to the 4th of fourth aspect the kind of realization method, in the 5th kind of realization method, the base station further includes:
Communication module is communicated for after receiving the message, starting with UE.
According to fourth aspect, in the 6th kind of realization method, the processing module is specifically used in beginning and UE communication When, begin to use the information that the parameter and/or security algorithm pair are communicated with UE to handle.
According to fourth aspect, in the 7th kind of realization method, the processing module is specifically used in UE access to the first base When standing, the information that the parameter and/or security algorithm pair are communicated with UE is begun to use to handle.
According to fourth aspect, in the 8th kind of realization method, the processing module is specifically used on UE and first base station When row is synchronous, the information that the parameter and/or security algorithm pair are communicated with UE is begun to use to handle.
According to fourth aspect, in the 9th kind of realization method, the processing module, specifically for receiving described second Base station send first data packet when, begin to use the information that the parameter and/or security algorithm pair are communicated with UE into Row processing.
According to fourth aspect, in the tenth kind of realization method, the processing module, specifically for receiving the parameter And/or in the preset time after security algorithm or later, the parameter and/or security algorithm pair is begun to use to lead to UE The information of letter is handled.
According to fourth aspect, in a kind of the tenth realization method, the base station further includes:
Sending module is used to indicate the instruction for beginning to use the parameter and/or security algorithm for being sent to the UE Message;
The processing module, specifically for beginning to use the parameter and/or safety when sending the instruction message The information that algorithm pair is communicated with UE is handled.
According to fourth aspect, in the 12nd kind of realization method, the processing module is specifically used for according to original parameter And/or security algorithm processing failure, then begin to use the parameter and/or security algorithm pair to be carried out at the communication information with UE Reason.
The 5th aspect of the embodiment of the present invention provides a kind of base station, including:
Update module is used for undated parameter and/or security algorithm;
First sending module, for sending the parameter and/or security algorithm to first base station or UE;
Wherein, the first base station be with UE carry out user face data communication base station, second base station be with it is described UE carries out the base station of control plane signalling communication;Alternatively,
Cell where the first base station is the main plot with the UE, and the cell where the base station is the UE's Secondary cell.
According to the 5th aspect, in the first realization method, the security algorithm include Encryption Algorithm, header compression algorithm and At least one of protection algorithm integrallty algorithm:
The parameter include next-hop linkage counter NCC, next-hop NH, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C-RNTI, At least one of the length of Paket Data Convergence Protocol PDCP sequence numbers parameter.
According to the 5th aspect, in second of realization method, the base station further includes:
Second sending module, for sending message to the first base station or UE, so that the first base station is receiving Begin to use the information that the parameter and/or security algorithm pair are communicated with UE to handle when to the message, or makes UE The parameter and/or security algorithm pair is begun to use to carry out with first base station and/or the second base station when receiving the message The information of communication is handled.
The 6th aspect of the embodiment of the present invention provides a kind of user equipment, including:
Receiving module, parameter and/or security algorithm for receiving first base station or the transmission of the second base station;
Processing module, for being led to first base station and/or the second base station according to the parameter and/or security algorithm pair The information of letter is handled;
Wherein, the first base station be with the UE carry out user face data communication base station, second base station be with The UE carries out the base station of control plane signalling communication;Alternatively,
Cell where the first base station is the main plot with the UE, and the cell where second base station is described The secondary cell of UE.
According to the 6th aspect, in the first realization method, the security algorithm include Encryption Algorithm, header compression algorithm and At least one of protection algorithm integrallty algorithm:
The parameter include next-hop linkage counter NCC, next-hop NH, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C-RNTI, At least one of the length of Paket Data Convergence Protocol PDCP sequence numbers parameter.
According to the 6th aspect, in second of realization method, the processing module is specifically used for according to the Encryption Algorithm Pair information communicated with first base station and/or the second base station carries out encryption and decryption processing;According to the header compression algorithm pair with Head compression processing is compressed into wardrobe or solved to the information that first base station and/or the second base station are communicated;According to the integrality The information that protection algorism pair is communicated with first base station and/or the second base station carries out integrity protection or solution integrity protection Processing.
According to the 6th aspect, in the third realization method, the processing module, specifically for receiving the parameter And/or when security algorithm, begin to use at the information that above-mentioned parameter and/or security algorithm pair communicated with first base station Reason.
According to the 6th aspect, in the 4th kind of realization method, the processing module, specifically for being sent to first base station When information, begin to use the information that the parameter and/or security algorithm pair are communicated with first base station and/or the second base station into Row processing.
According to the 6th aspect, in the 5th kind of realization method, the processing module is specifically used for receiving first base station or the When the message that two base stations are sent, the parameter and/or security algorithm pair is begun to use to be carried out with first base station and/or the second base station The information of communication is handled.
According to the 6th aspect, in the 6th kind of realization method, the message of the first base station or the transmission of the second base station, to Indicate that the UE begins to use the parameter and/or security algorithm.
According to the 6th aspect, in the 7th kind of realization method, the processing module, specifically for being linked into first base station When, begin to use at the information that the parameter and/or security algorithm pair communicated with first base station and/or the second base station Reason.
According to the 6th aspect, in the 8th kind of realization method, the processing module is specifically used in beginning and first base station When communication, begin to use the information that the parameter and/or security algorithm pair are communicated with first base station and/or the second base station into Row processing.
According to the 6th aspect, in the 9th kind of realization method, the processing module, specifically for receiving described first When first data packet that base station is sent, begin to use the parameter and/or security algorithm pair and first base station and/or the second base The information that station is communicated is handled.
According to the 6th aspect, in the tenth kind of realization method, the processing module, specifically for receiving the parameter And/or in the preset time after security algorithm or later, begin to use the parameter and/or security algorithm pair and first base station And/or second the information that is communicated of base station handled.
In the embodiment of the present invention, when the user plane of UE and control plane correspond respectively to first base station and the second base station, Newer parameter and/or security algorithm are sent to first base station by diyl standing-meeting, realize first base station, the second base station and UE It can synchronize and also avoid first base station using same parameters and/or security algorithm and can not decrypt the information communicated with UE Problem.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this hair Some bright embodiments for those of ordinary skill in the art without creative efforts, can be with root Other attached drawings are obtained according to these attached drawings.
Fig. 1 is the flow diagram of cell optimization method embodiment one provided by the invention;
Fig. 2 is the flow diagram of cell optimization method embodiment two provided by the invention;
Fig. 3 is the flow diagram of cell optimization method embodiment three provided by the invention;
Fig. 4 is the flow diagram of cell optimization method example IV provided by the invention;
Fig. 5 is the flow diagram of cell optimization method embodiment five provided by the invention;
Fig. 6 is the flow diagram of cell optimization method embodiment six provided by the invention;
Fig. 7 is the flow diagram of cell optimization method embodiment seven provided by the invention;
Fig. 8 is the structural schematic diagram of base station embodiment one provided by the invention;
Fig. 9 is the structural schematic diagram of base station embodiment two provided by the invention;
Figure 10 is the structural schematic diagram of base station embodiment three provided by the invention;
Figure 11 is the structural schematic diagram of base station embodiment four provided by the invention;
Figure 12 is the structural schematic diagram of user equipment embodiment provided by the invention.
Specific implementation mode
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art The every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
Fig. 1 is the flow diagram of cell optimization method embodiment one provided by the invention, as shown in Figure 1, this method packet It includes:
S101, first base station receive the second base station or mobile management entity(Mobile Management Entity, letter Claim MME)The parameter and/or security algorithm of transmission.The parameter and/or security algorithm be with the relevant parameter of communication security and/ Or security algorithm.The parameter and/or security algorithm be used for the data or information of communication carry out including but not limited to encryption and Integrity protection etc. and the realization relevant operation of communication security.
Specifically, security algorithm can be Encryption Algorithm(Ciphering Algorithm), such as eea0, eea1, Eea2, eea3-v11xy etc. can also be protection algorithm integrallty, such as eia0-v920, eia1, eia2, eia3-v11xy Deng can also be that header compression algorithm, header compression algorithm are to be based on(Robust Header Compression, abbreviation ROHC)Frame Structure(framework), can be compressed into wardrobe using the algorithm and corresponding parameter or solve head and compressed.Specific head compression is calculated There are many kinds of methods, and the type of algorithm passes through profile identifier(Profile Identifier)It defines, such as 0x0002 tables Show a kind of algorithm mark;Particularly relevant compressed parameter can have Profile Identifier, MAX CID, LARGE CIDS, FEEDBACK FOR etc., but be not limited thereto;Parameter can be next-hop linkage counter(Next Hop Chaining Counter, abbreviation NCC), next-hop(Next Hop, abbreviation NH), Paket Data Convergence Protocol(Packet Data Convergence Protocol, abbreviation PDCP)Layer sequence number, for example size(PDCP Sequence Number length In bits, abbreviation pdcp-SN-Size), Cell Radio Network Temporary Identifier/Identity, Cell-RNTI(Cell Radio Network TemporaryIdentifier, abbreviation C-RNTI)Deng, but be not limited thereto.Specifically, parameter can also be UE in cell Mark C-RNTI.C-RNTI is the marks of UE in the cell in connected state, is convenient for dispatching by C-RNTI for base station UE。
The information communicated with UE according to above-mentioned parameter and/or security algorithm pair carries out encryption and decryption processing specifically can To be that above-mentioned base station utilizes above-mentioned parameter(Such as NCC, NH or PDCP-SN-Size etc.)And/or algorithm deduce out it is close Key is used for the encryption or decryption of data.Parameter can also be UE cell Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C-RNTI (Cell RadioNetwork Temporary Identifier).UE is dispatched in base station by C-RNTI, and UE passes through C-RNTI To identify and receive the data of oneself.
The information that S102, above-mentioned first base station are communicated according to above-mentioned parameter and/or security algorithm pair with UE(Including with Family face data or control plane signaling)It is handled;Specifically, processing here can be at least one of following processing place Reason:
1)Above-mentioned first base station carries out encryption and decryption processing according to above-mentioned Encryption Algorithm for the information that UE is communicated;
2)Head compression is compressed into wardrobe or solved to the information that above-mentioned first base station is communicated according to header compression algorithm pair with UE Processing;
3)Above-mentioned first base station carries out integrality guarantor according to the information that above-mentioned protection algorithm integrallty pair is communicated with UE Shield or solution integrity protection.
Wherein, due to the scene that the embodiment of the present invention is detached for control plane and user plane, thus specifically, working as the control of UE When face processed is switched to the second base station or after switching, the user plane of UE is still in first base station, or when the user plane of UE is switched to When first base station or after switching, for the control plane of UE still in the second base station, i.e. first base station is to carry out user plane with above-mentioned UE The base station of data communication, second base station are the base station that control plane signalling communication is carried out with above-mentioned UE;Alternatively, where first base station Cell be main plot with above-mentioned UE, the secondary cell that the cell where the second base station is above-mentioned UE;More specifically, the present embodiment Suitable for a variety of concrete scenes, illustrate:
Scene 1, UE control plane be switched to the second base station from first base station, and the user plane of the UE is maintained at the first base It stands;Specifically, can be user plane and control plane with UE in first base station(By taking Pico as an example)In, the control plane of UE will switch To the second base station(With macro network eNB, i.e. for macro base station MacroeNB).
Scene 2, UE control plane be switched to the second base station from third base station, and the user plane of the UE is maintained at the first base It stands;The third base station can be any base station in addition to above-mentioned first base station, the second base station;Specifically, can be UE from third Base station(By taking macro base station Macro eNB1 as an example), it is switched to the second base station of target(By taking macro base station Macro eNB2 as an example), UE's Data surface is maintained at first base station(By taking micro-base station Pico1 as an example).
Scene 3, UE control plane be maintained at the second base station, and the user plane of the UE is switched to the first base from third base station It stands;Equally, which can be any base station in addition to above-mentioned first base station, the second base station;Specifically, it can be UE Control plane is maintained at the second base station(By taking macro base station eNB as an example), the user plane transmission of UE is from third base station(With micro-base station Pico2 For)Replace first base station(By taking Pico1 as an example).
Scene 4, the user plane of UE are switched to first base station from the second base station, and the control plane of the UE is maintained at the second base It stands.Specifically, can be UE user plane and control plane in the second base station(By taking macro base station eNB as an example)In, the user plane of UE turns Change to first base station(By taking Pico1 as an example).
Base station or website mentioned in holding within the present invention can also be various types of base stations, macro base station(Macro eNB), femto base station(Micro eNB), micro-base station(Pico eNB), Home eNodeB HeNB, small-cell base station(Small Cell eNB), relay station(relay station)Deng this is not restricted.
In addition in the present embodiment, in addition to terminal supports the scene that control plane is detached with user plane, it is also possible to which terminal is supported Carrier wave polymerize, specifically the 1 frequency of use f1 of cell of first base station, and 2 frequency of use 2 of cell of the second base station carries for terminal simultaneously For service.For example, the cell 1 that first base station is terminal service may be referred to as main plot, the second base station takes for terminal The cell 2 of business may be referred to as secondary cell.First base station may be macro base station eNB, and the second base station may be micro-base station Pico.Eventually End can have above-mentioned one or two kinds of ability.
The first base station referred in content of the embodiment of the present invention, the second base station or third base station can be first base stations Cell, the cell of the second base station or the cell of third base station.First base station in content of the embodiment of the present invention, the second base station Either third base station can also be replaced with first community second community or third cell.
It is first stop that the first base station referred in content of the embodiment of the present invention, the second base station or third base station, which are also referred to, Point, the second website or third website, in addition, base station can be the website or radio node for having scheduling feature.
No matter for specific any scene, either in handoff procedure or after switching completion, as long as second Base station is updated above-mentioned parameter and/or security algorithm, then needs to be sent to first base station, so as to first base station, the second base Stand, UE tripartite can synchronize also allowed for using same parameters and/or security algorithm first base station use new parameter and/or peace The information that full algorithm pair is communicated with UE is handled.It should be noted that the information communicated with UE can be data Or can also be signaling, such as the information etc. in system message, physical layer signaling, control channel.
The base station that control plane service is provided for user equipment can be as the master base station of UE, master base station generally use low-frequency range Control plane signaling is transmitted, the service bearer of the part low data bulk of UE can be optionally carried;The RRC connections of UE are established in main base On standing;Below to the base station/cell for UE control plane services, the base station of user plane service carries out detailed definition:
The base station that control plane service is provided for user equipment includes:The corresponding base station of cell of control plane transmission, Ke Yiwei The downlink transfer website that user equipment sends control signaling;Alternatively, macro base station or the corresponding website of macrocell;Alternatively, master is small Area(primary cell)Corresponding website;Alternatively, the corresponding website of user equipment serving cell;Signaling is provided for user equipment Radio bearer(Signaling Radio Bearer, abbreviation SRB)The website of transmission;The website at place is established in the RRC connections of UE.
For user equipment provide control plane service or control plane transmission cell include:Main plot(primary cell);Alternatively, the cell to send control signaling for user equipment;Alternatively, the downlink transfer to send control signaling for user equipment The corresponding cell of point;Alternatively, the corresponding cell of macro base station;Alternatively, in wireless heterogeneous networks(Radio Resource Control, abbreviation RRC)Connection establish re-establish or handoff procedure in, for user equipment provide Non-Access Stratum (NAS) move Property information cell, alternatively, RRC connections establish or handoff procedure in, the cell inputted safely is provided for user equipment;For User equipment provides the SRB cells of transmission.Radio resource control RRC connect establish re-establish or handoff procedure in be user Equipment provides the cell of NAS mobility informations, alternatively, providing peace in RRC connections foundation or handoff procedure for user equipment The cell inputted entirely is also main plot.Different from the cell of main plot when secondary cell.
Control signaling can include at least following one:Information, control information on hybrid automatic retransmission indication channel The information in information, control channel, system message, physical layer signaling, Media access contorl MAC layer on format indication channel disappear Breath, radio resource control RRC layer message, the corresponding information of SRBs.
Optionally, the base station of user equipment offer control plane service can be also responsible for DRBs on the basis of defined above Or the transmission of part SRBs.
The base station that user plane service is provided for UE includes:It can be secondary cell(Secondary cell)The website at place, The either corresponding website of secondary cell, or the website of data transmission is provided for UE, or provide data for UE and wirelessly hold It carries(Data Radio Bearer, abbreviation DRB)And/or Signaling Radio Bearer(Signaling Radio Bearer, referred to as SRB)The website of transmission, or provide Physical Downlink Shared Channel for UE(Physical Downlink Shared Channel, abbreviation PDSCH)The website of the information of upper transmission, it should be noted that SRB provided herein is carried with above-mentioned for UE The SRB provided for the base station of control plane service is different;
For user equipment provide control plane service or control plane transmission cell include:Secondary cell(Secondary cell);Alternatively, providing the cell of data transmission for user UE;The DRB cells of transmission are provided for user UE;Alternatively, being set for user The standby cell that information on transmission PDSCH is provided.
It illustrates:
Specifically, the transmission of SRBs has been responsible in Ke Yishi, the base station that control plane transmission is provided for user equipment;It is set for user It is responsible for the transmission of DRBs in the standby base station that user plane transmission is provided.
Alternatively, can provide the transmission that SRB0 and SRB1 have been responsible in the base station that control plane transmits for user equipment;For with The transmission of SRB2 and DRBs are responsible in the base station that family equipment provides user plane transmission, wherein be by above-mentioned SRBs be divided into SRB0, SRB1、SRB2.Specifically, SRB0 is used for transmitting RRC information, is transmitted on logic channel CCCH;SRB1 is used for transmitting RRC information (May can also include piggybacked NAS messages), before the foundation of SRB2 carryings, have than SRB2 higher preferential Grade..SRB2 is transmitted on logic channel DCCH to be used for transmitting NAS message, there is lower priority than SRB1, and always exist SRB2 is just configured after secure mode active, is transmitted on logic channel DCCH.
Alternatively, can be, the transmission of SRB0 and SRB1 be responsible in the base station that control plane transmission is provided for user equipment, and It has been also responsible for the transmission of part DRBs;It is responsible for the biography of SRB2 and part DRBs in the base station that user plane transmission is provided for user equipment It is defeated.
Alternatively, can be, the transmission of SRBs be responsible in the base station that control plane transmission is provided for user equipment, and is also responsible for The transmission of part DRBs;It is responsible for the transmission of part DRBs in the base station that user plane transmission is provided for user equipment.
In the present embodiment, when the user plane information and control plane information of UE are transmitted by first base station and the second base station respectively When, newer above-mentioned design parameter and/or security algorithm can be sent to first base station by the second base station, realize first base station, Second base station and UE can be synchronized using same parameters and/or security algorithm, and the second base can not be obtained by also avoiding first base station Stand newer above-mentioned parameter and/or security algorithm, so can not pair information communicated with UE be decrypted or solve head compression Or solution integrity protection.
In addition, being carried out according to the information that above-mentioned parameter and/or security algorithm pair are communicated with UE in above-mentioned first base station Processing, in specific implementation process, there are a variety of situations, as follows:
1, the first base station begins to use above-mentioned parameter and/or safety when receiving above-mentioned parameter and/or security algorithm The information that algorithm pair is communicated with UE is handled;Can be that first base station receives new parameter and/or security algorithm just Directly begin to use above-mentioned parameter and/or security algorithm.
2, the first base station wouldn't use after receiving above-mentioned parameter and/or security algorithm, wait and receive the second base Stand or message that UE is sent after, then the information for beginning to use the parameter and/or security algorithm pair to be communicated with UE handles; The message can be that the instruction message of above-mentioned parameter and/or security algorithm is specifically used dedicated for instruction first base station, Can be any message that the second base station or UE are sent out to first base station;For example, the first base station reception that can make an appointment Certain message arrived is just used as instruction message or activate message, for example in scene 1, the second base station may after the completion of switching A UE context release message is sent to first base station, which is originally used to indicate the context of first base station release UE, This arranges the message as instruction message, that is, is equal to when receiving the message and receives instruction message, and first base station begins to use Above-mentioned parameter and/or security algorithm, but be not limited thereto, can be other message;After receiving the message, the first base is meaned It stands and begins to use parameter and/or security algorithm with this as the starting point to handle the information with UE communication.It is equivalent to the message activation First base station and UE begin to use the parameter and/or security algorithm to handle the information of first base station and UE communication.Or Can be that an instruction information is carried in certain a piece of news that the second base station or UE are sent to first base station, for example, wherein one A bit is used to indicate whether to begin to use above-mentioned parameter and/or security algorithm;It should be noted that the UE can accessed Above-mentioned message is sent behind above-mentioned second base station, above-mentioned second base station can send parameter and/or security algorithm to first base station While or send the rear of parameter and/or security algorithm and send above- mentioned information to the first base station;
During specific implementation, the first base station can also while receiving above-mentioned message or later, start with it is upper It states UE to be communicated, it can disappear to what UE transmission message or reception UE were sent to start to be communicated with above-mentioned UE specifically Breath.
3, it can also be the first base station when beginning and UE are communicated, above-mentioned parameter and/or safety begun to use to calculate Method handles the information that UE is communicated.
4, can also be when UE access is to the first base station, first base station begins to use above-mentioned parameter and/or safety to calculate Method handles the information that UE is communicated.
5, can also be to begin to use above-mentioned parameter and/or security algorithm pair in UE and the first base station uplink synchronous It is handled in the information that UE is communicated.
Wherein, uplink synchronous refers to using the uplink of user's transmission of the different location of same time slot in same cell Signal reaches base station reception antenna simultaneously, i.e., the signal of same time slot different user keeps synchronizing when reaching base station reception antenna.
In order to which before reaching uplink synchronous foundation, the synchronizing signal that UE must listen to cell obtains down-going synchronous, follow-up UE By adjusting timing offset to reach uplink synchronous.
6, when can also be that the first base station receives first data packet that above-mentioned second base station is sent, begin to use institute The information that parameter and/or security algorithm pair are communicated with UE is stated to handle.Specifically, here there may be two kinds of situations, After receiving above-mentioned parameter and/or security algorithm one is first base station, first number that above-mentioned second base station is sent is received When according to packet, begin to use the parameter and/or security algorithm;Another situation is that first base station receives the transmission of the second base station First data packet, wouldn't process, wait after receiving above-mentioned parameter and/or security algorithm, immediately begin to use the ginseng Number and/or security algorithm handle above-mentioned first data packet.
7, the first base station can also in the preset time after receiving above-mentioned parameter and/or security algorithm or it Afterwards, the information that the parameter and/or security algorithm pair are communicated with UE is begun to use to handle;During specific implementation, The mode of timer timing may be used to realize.
8, the first base station can send to above-mentioned UE and be used to indicate the finger for beginning to use above-mentioned parameter and/or security algorithm The information shown message, and above-mentioned parameter and/or security algorithm pair is begun to use when sending the instruction message to be communicated with UE It is handled;During specific implementation, can also again it begin to use after the confirmation message for receiving UE and replying the instruction message Above-mentioned parameter and/or security algorithm.During specific implementation, above-mentioned instruction message can also be and aforementioned there are many understanding mode Similar in 2nd kind of situation, details are not described herein.
After 9, if first base station receives above-mentioned parameter and/or security algorithm, it is not previously set, does not also receive and appoint What instruction message, then the first base station needs the information sent to UE to be decrypted or solve head compression or Xie Wanzhengxingbaohuchu When reason, original parameter and/or security algorithm can be first used, if decryption or the compression of solution head or solution integrity protection failure, start to make The information communicated with UE with above-mentioned parameter and/or security algorithm pair is handled.
Above-mentioned each situation can be not limited to during specific implementation.
Fig. 2 is the flow diagram of cell optimization method embodiment two provided by the invention, i.e., in above-mentioned scene 1, the The specific interactive process of one base station, the second base station and UE, as shown in Fig. 2, the flow includes:
S201, first base station send switching request message to the second base station(HandOver Request);
S202, the second base station send switch acknowledgment message to first base station(HandOver ACK);
S203, first base station parse above-mentioned switch acknowledgment message, obtain parameter wherein included and/or security algorithm etc..
S204, first base station send switching command message to UE, and instruction UE is switched over;Wherein, first base station can incite somebody to action Above-mentioned parameter and/or security algorithm carrying are sent to UE within the message;
S205, UE initiate random access to the second base station, and the control plane of UE is switched to the second base station, while to the second base station Handoff completion message is sent, which, which can also be called RRC connection reconfigurations, sets and complete message;
It should be noted that after the second base station is in the message for receiving UE, after the second base station can continue to use prior art execution Continuous switch step, then this does not illustrate one by one.The second base station of final stage of switching and core net initiate path integration(path switch procedure)Flow.The second last base station receives the path integration confirmation message of MME transmissions(path switch ACK message).
S206, the second base station send UE context release messages to first base station;One of specifically, optionally, It receives this message and can be used for meaning that first base station begins to use above-mentioned parameter and/or security algorithm.
S207, first base station begin to use above-mentioned parameter and/or security algorithm pair to be handled with the UE progress communication information; Before certain step, first base station specifically may be used it needs to be determined that when begin to use above-mentioned parameter and/or security algorithm It is handled according to the information of above-mentioned parameter and/or security algorithm pair and UE into communication with the first base station with reference to aforementioned offer A variety of situations, details are not described herein.
Accordingly UE begins to use above-mentioned parameter and/or security algorithm.How certain UE determines when to begin to use Above-mentioned parameter and/or security algorithm, specific method
1, the first base station begins to use above-mentioned parameter and/or safety when receiving above-mentioned parameter and/or security algorithm The information that algorithm pair is communicated with UE is handled;Can be that first base station receives new parameter and/or security algorithm just Directly begin to use.
UE after receiving parameter and/or security algorithm, start communicated with first base station when, using above-mentioned parameter with/ Or the information that security algorithm pair is communicated with first base station and/or the second base station is handled.
2, the first base station wouldn't use after receiving above-mentioned parameter and/or security algorithm, wait and receive the second base Stand or message that UE is sent after, then the information for beginning to use the parameter and/or security algorithm pair to be communicated with UE handles; The message can be that the instruction message of above-mentioned parameter and/safety or algorithm is specifically used dedicated for instruction first base station, Can be any message that the second base station or UE are sent out to first base station;For example, the first base station reception that can make an appointment Certain message arrived is just used as instruction message or activate message, for example in scene 1, the second base station may after the completion of switching A UE context release message is sent to first base station, which is originally used to indicate the context of first base station release UE, This arranges the message as instruction message, that is, is equal to when receiving the message and receives instruction message, and first base station begins to use Above-mentioned parameter and/or security algorithm, but be not limited thereto, can be other message;Can also be in the second base station or UE It is sent in certain a piece of news of first base station and carries an instruction information, for example, one of bit is used to indicate whether out Begin to use above-mentioned parameter and/or security algorithm;It should be noted that the UE can be sent after accessing above-mentioned second base station State message, above-mentioned second base station can while sending parameter and/or security algorithm to first base station or send parameter and/or The rear of security algorithm sends above-mentioned message to the first base station;During specific implementation, which can also receive While above-mentioned message or later, start to be communicated with above-mentioned UE, i.e., disappears to what UE transmission message or reception UE were sent Breath.
UE sends messages to first base station, and expression can begin to use parameter and/or security algorithm.The message can be special It is fixed dedicated for instruction first base station using the instruction message of above-mentioned parameter and/safety or algorithm, can also be UE to first Any message of base station hair, after receiving the message, first base station begins to use parameter and/or security algorithm to handle and UE communication Information;It is equivalent to message activation first base station and UE begins to use the parameter and/or security algorithm to handle first The information of base station and UE communication;Can also be that UE is sent to one instruction information of carrying, example in certain a piece of news of first base station Such as, one of bit is used to indicate whether to begin to use above-mentioned parameter and/or security algorithm;It should be noted that the UE can Above-mentioned message is sent after accessing above-mentioned first base station to be, or
UE is after receiving above-mentioned parameter and/or security algorithm, then receives disappearing for first base station or the second base station When breath, can begin to use parameter and/or security algorithm and pair information communicated with first base station and/or the second base station into Row processing;The message can be the specifically instruction dedicated for instruction first base station using above-mentioned parameter and/safety or algorithm Message, which can also be any message that UE is sent out to first base station, and after receiving the message, UE can begin to use parameter And/or security algorithm handles pair information communicated with first base station and/or the second base station;It is equivalent to the message activation First base station and UE begin to use the parameter and/or security algorithm to handle the information of first base station and UE communication;Or It can be received with UE and carry an instruction information in certain a piece of news of the second base station or first base station, for example, one of bit It is used to indicate whether to begin to use above-mentioned parameter and/or security algorithm.
In short, when UE sends information to first base station, or receive what first base station/second base station/third base station was sent Message begins to use the information that the parameter and/or security algorithm pair are communicated with first base station and/or the second base station to carry out Processing or activation/instruction begin to use the parameter and/or security algorithm pair to be carried out with first base station and/or the second base station The information of communication is handled.
3, it can also be the first base station when beginning and UE are communicated, above-mentioned parameter and/or safety begun to use to calculate Method handles the information that UE is communicated.
After UE receives parameter and/or security algorithm, start when being communicated with first base station, begin to use above-mentioned parameter with/ Or the information that security algorithm pair is communicated with first base station and/or the second base station is handled.
4, can also be when UE access is to the first base station, first base station begins to use above-mentioned parameter and/or safety to calculate Method handles the information that UE is communicated.
After UE receives parameter and/or security algorithm, when UE access to first base station communicates, UE begins to use above-mentioned parameter And/or the information that security algorithm pair is communicated with first base station and/or the second base station is handled.
6, when can also be that the first base station receives first data packet that above-mentioned second base station is sent, begin to use institute The information that parameter and/or security algorithm pair are communicated with UE is stated to handle.Specifically, here there may be two kinds of situations, After receiving above-mentioned parameter and/or security algorithm one is first base station, first number that above-mentioned second base station is sent is received When according to packet, begin to use the parameter and/or security algorithm;Another situation is that first base station receives the transmission of the second base station First data packet, wouldn't process, wait after receiving above-mentioned parameter and/or security algorithm, immediately begin to use the ginseng Number and/or security algorithm handle above-mentioned first data packet.
After UE receives above-mentioned parameter and/or security algorithm, when receiving first data packet of first base station transmission, start to make The information communicated with first base station and/or the second base station with the parameter and/or security algorithm pair is handled;
It is identical as first base station, there are two kinds of situations here, one is UE receive above-mentioned parameter and/or security algorithm it Afterwards, when receiving first data packet that above-mentioned first base station is sent, begin to use the parameter and/or security algorithm;Other one Kind situation is first data packet that first base station receives first base station transmission, wouldn't process, wait and receive above-mentioned parameter And/or after security algorithm, immediately begin to handle above-mentioned first data packet using the parameter and/or security algorithm. (This is only suitable for the first scene and the second scene)
7, the first base station can also in the preset time after receiving above-mentioned parameter and/or security algorithm or it Afterwards, the information that the parameter and/or security algorithm pair are communicated with UE is begun to use to handle;During specific implementation, The mode of timer timing may be used to realize.
UE begins to use the parameter in the preset time after receiving above-mentioned parameter and/or security algorithm or later And/or security algorithm handles pair information communicated with first base station and/or the second base station;Specific implementation process In, the mode of timer timing may be used to realize
8, the first base station can send to above-mentioned UE and be used to indicate the finger for beginning to use above-mentioned parameter and/or security algorithm The information shown message, and above-mentioned parameter and/or security algorithm pair is begun to use when sending the instruction message to be communicated with UE It is handled;During specific implementation, can also again it begin to use after the confirmation message for receiving UE and replying the instruction message Above-mentioned parameter and/or security algorithm.During specific implementation, above-mentioned instruction message can also be and aforementioned there are many understanding mode Similar in 2nd kind of situation, details are not described herein.
UE receives the message of first base station, and instruction can begin to use parameter and/or security algorithm to be communicated with first base station .The message can be that the instruction message of above-mentioned parameter and/safety or algorithm is specifically used dedicated for instruction first base station, The message can also be any message that UE is sent out to first base station, and after receiving the message, meaning first base station is opened with this as the starting point Begin to handle the information with UE communication using parameter and/or security algorithm.It is equivalent to message activation first base station and UE is opened Beginning handles the information of first base station and UE communication using the parameter and/or security algorithm.Or can also UE receive second An instruction information is carried in certain of base station or first base station a piece of news, for example, one of bit is used to indicate whether out Begin to use above-mentioned parameter and/or security algorithm.During specific implementation, above-mentioned instruction message can also there are many understanding mode, Similar with aforementioned 2nd kind of situation, details are not described herein.During specific implementation, after message being received, begin to use above-mentioned Parameter and/or security algorithm can also begin to use above-mentioned ginseng again after the confirmation message for receiving UE and replying the instruction message Number and/or security algorithm.
9, after first base station receives above-mentioned parameter and/or security algorithm, which needs to receiving UE transmissions When information is decrypted or solves head compression or solution integrity protection processing, original parameter and/or security algorithm can be first used, if decryption Or the compression of solution head or solution integrity protection fail, then above-mentioned new parameter and/or security algorithm pair is begun to use to be communicated with UE Information handled.It is handled at this time including first base station and the uplink and downlink data of UE communication.
After UE receives above-mentioned parameter and/or security algorithm, pair information transmitted with first base station is needed to be decrypted Solution head compression or solution integrity protection processing when, can first use original parameter and/or security algorithm, if decryption or solution head compression or Integrity protection failure is solved, then above-mentioned new acquisition parameter and/or security algorithm pair is begun to use to be communicated with first base station Information is handled.It is handled at this time including first base station and the uplink and downlink data of UE communication.
In addition UE obtains parameter and/or security algorithm, from first base station or the second base station or can obtain in fact.
UE can handle information from first base station and the second base station using different parameter and/or security algorithm respectively. UE can also and first base station, when the second base station communication, information is handled using identical parameter and/or security algorithm.This hair It is not restricted in bright.
The content of step S207, can be adapted for how terminal in other embodiments begins to use parameter and/or safety to calculate Method is communicated with first base station, is not listed one by one and is repeated in the present invention.
Fig. 3 is the flow diagram of cell optimization method embodiment three provided by the invention, i.e., in above-mentioned scene 2, the The specific interactive process of one base station, the second base station, UE and third base station, as shown in figure 3, this method includes:
S301, third base station send switching request message to the second base station;
S302, the second base station send switch acknowledgment message to third base station(HandOver ACK);
S303, third base station parse above-mentioned switch acknowledgment message, obtain parameter wherein included and/or security algorithm etc.;
S304, third base station send above-mentioned parameter/security algorithm to first base station;
S305, the second base station send above-mentioned parameter/security algorithm to first base station;
It should be noted that S304 and S305 is optional step, can optionally one be executed when realizing, if selection executes S305, the step can execute after having executed S302.
S306, third base station send switching command message to UE, and instruction UE is switched over;Wherein, first base station can incite somebody to action Above-mentioned parameter and/or security algorithm carrying are sent to UE within the message;
S307, UE send handoff completion message to the second base station, and initiate random access to the second base station;
It should be noted that when the second base station is after receiving the above-mentioned handoff completion message of UE transmissions, the second base station can edge Subsequent switch step is executed with the prior art, then this is not illustrated one by one.The second base station of final stage of switching and core net hair Play path integration(path switch procedure)Flow, until the second base station receives mobile management entity(Mobile Management Entity, MME)The path integration confirmation message of transmission(Path switch ACK messages).
S308, the second base station send UE context release messages to third base station;
S309, first base station begin to use above-mentioned parameter and/or security algorithm pair to carry out plus solve with the UE progress communication information Close processing;Before certain step, first base station it needs to be determined that when begin to use above-mentioned parameter and/or security algorithm, A variety of situations of aforementioned offer are specifically referred to, details are not described herein.
Accordingly, UE begins to use new parameter and/or security algorithm.How certain UE determines when to begin to use Parameter and/or security algorithm are stated, specific method such as step S207 contents are identical, are not repeated description herein.
In addition UE obtains parameter and/or security algorithm, can be from first base station either the second base station or third in fact It is obtained in base station.UE can be handled from first base station and the second base station using different parameter and/or security algorithm respectively Information.UE can also and first base station, when the second base station communication, information is handled using identical parameter and/or security algorithm. It is not restricted in the present invention.
Fig. 4 is the flow diagram of cell optimization method example IV provided by the invention, i.e., in above-mentioned scene 3, the The specific interactive process of one base station, the second base station, UE and third base station, as shown in figure 4, this method includes:
S401, the second base station send parameter and/or security algorithm to first base station.
S402, third base station send parameter and/or security algorithm to first base station.
It should be noted that S401 and S402 can optionally one be executed.
S403, the second base station send message to UE, specifically can also provide UE above-mentioned first by the message for UE The parameter and/or security algorithm that base station uses.
S404, UE reply confirmation message;S404 alternatives execute.
S405, first base station begin to use new parameter and/or security algorithm;Before certain step, first base station needs It determines when to begin to use above-mentioned parameter and/or security algorithm, a variety of situations of aforementioned offer is specifically provided, This is repeated no more.
Accordingly, UE begins to use new parameter and/or security algorithm.How certain UE determines when to begin to use Parameter and/or security algorithm are stated, specific method such as step S207 contents are identical, specifically, include the content of situation 1-8, herein It is not repeated description.
In addition UE obtains parameter and/or security algorithm, can be from first base station either the second base station or third in fact It is obtained in base station.
UE can handle information from first base station and the second base station using different parameter and/or security algorithm respectively. UE can also and first base station, when the second base station communication, information is handled using identical parameter and/or security algorithm.This hair It is not restricted in bright.
Fig. 5 is the flow diagram of cell optimization method embodiment five provided by the invention, i.e., in above-mentioned scene 4, the The specific interactive process of one base station, the second base station and UE, as shown in figure 5, this method includes:
S501, the second base station send parameter and/or security algorithm to first base station.
S502, the second base station send message to UE, specifically can provide UE in the first base of target by the message for UE The parameter and/or security algorithm that the place of station uses.
S503, UE reply confirmation message.
It should be noted that the S403 and S404 is optional step, you can not executed with selection.
S504, first base station begin to use new parameter and/or security algorithm, and before certain step, first base station needs It determines when to begin to use above-mentioned parameter and/or security algorithm, a variety of situations of aforementioned offer is specifically provided, This is repeated no more.
Accordingly, UE begins to use new parameter and/or security algorithm.How certain UE determines when to begin to use Parameter and/or security algorithm are stated, specific method such as step S207 contents are identical, specifically, include the content of situation 1-8, herein It is not repeated description.
In addition UE obtains parameter and/or security algorithm, can be from first base station either the second base station or third in fact It is obtained in base station.
UE can handle information from first base station and the second base station using different parameter and/or security algorithm respectively. UE can also and first base station, when the second base station communication, information, this hair are handled using identical parameter and/or security algorithm It is not restricted in bright.
In the present embodiment, realize in the control plane or user plane handoff procedure of UE, the base station communicated with control plane can New parameter and/or security algorithm are sent to the base station communicated with user plane, to ensure that above-mentioned first base station, second Base station, UE are synchronous in communication process to carry out encryption and decryption processing using same parameters and/or security algorithm.
It should be noted that in above-mentioned website change or the handoff procedure that control plane service is provided for UE, in the second base station After sending UE context release messages, entire change or handoff procedure are completed.Or when UE starts and is newly that UE provides use When the site communication of family face service, entire change/handoff procedure completes.After above-mentioned website changes or switches completion, the Two base stations, i.e., the current website that control plane service is provided for UE can be to certain parameters, particularly, such as parameter and/or safety Algorithm is updated, and can be the second base station by obtaining new parameter from the sides MME and/or the second base station itself is matched specifically Security algorithm is set newly, then the second base station can be by initiating a switching within cell to UE(intra-HO), to be UE New parameter and/or security algorithm are provided.After switching within cell completion, while UE obtains new parameter and/or security algorithm The second base station and the second base station is accessed again to be communicated.In addition, the second base station is also required to calculate newer parameter and/or safety Method is sent to the website that user plane transmission is provided for UE(E.g. first base station), first base station determines after receiving and uses At the specific moment, detailed process or specific method are similar with foregoing teachings, thus details are not described herein.
Fig. 6 is the flow diagram of cell optimization method embodiment six provided by the invention, as shown in fig. 6, this method packet It includes:
S601, the second base station undated parameter and/or security algorithm;Here the second base station currently provides control plane service for UE Website will be sent to first base station and/or UE when the second base station has parameter and/or security algorithm to update, wherein on It includes at least one of Encryption Algorithm, header compression algorithm and protection algorithm integrallty algorithm to state security algorithm.
Above-mentioned parameter include next-hop linkage counter NCC, next-hop NH, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C-RNTI, At least one of the length of Paket Data Convergence Protocol PDCP sequence numbers parameter.
S602, second base station send the parameter and/or security algorithm to first base station;
Wherein, above-mentioned first base station is that the base station of user face data communication is carried out with UE, and above-mentioned second base station is and the UE Carry out the base station of control plane signalling communication;Alternatively, the cell where first base station is the main plot with above-mentioned UE, the second base station institute Cell be above-mentioned UE secondary cell.
Further alternative, after which sends the parameter and/or security algorithm to first base station, this second Base station can send message to first base station, so that above-mentioned first base station begins to use above-mentioned parameter when receiving the message And/or the information that security algorithm pair is communicated with UE is handled, or UE is made to begin to use institute when receiving the message The information that parameter and/or security algorithm pair are communicated with first base station and/or the second base station is stated to handle.The tool of the message Body realization method can correspond to hereinbefore first base station and to determine that above-mentioned parameter and/or security algorithm pair is begun to use to carry out with UE The 2nd kind of situation at the time of the information of communication is handled, details are not described herein.
Specifically, above-mentioned first base station is handled using the information that the security algorithm pair is communicated with UE, including At least one of following processing processing:
The first base station carries out encryption and decryption processing according to the information that the Encryption Algorithm pair is communicated with UE;
Head is compressed into wardrobe or solved to the information that the first base station is communicated according to the header compression algorithm pair with UE Compression processing;
The first base station carries out integrity protection according to the information that the protection algorithm integrallty pair is communicated with UE Or solution integrity protection processing.
In the present embodiment, realize in the control plane or user plane handoff procedure of UE, the base station communicated with control plane can New parameter and/or security algorithm are sent to the base station communicated with user plane, to ensure that above-mentioned first base station, second Base station, UE are synchronous in communication process to be handled using same parameters and/or security algorithm.
Fig. 7 is the flow diagram of cell optimization method embodiment seven provided by the invention, as shown in fig. 7, this method packet It includes:
S701, UE receive first base station or the parameter and/or security algorithm of the transmission of the second base station;In the control plane or use of UE In the handoff procedure of family face, if there is the update of parameter and/or security algorithm in the second base station, it can be transmitted directly to UE, or first send out First base station is given, which is then forwarded to by first base station.
S702, above-mentioned UE are communicated according to the parameter and/or security algorithm pair with first base station and/or the second base station Information handled;
Wherein, above-mentioned first base station is that the base station of user face data communication is carried out with the UE, and above-mentioned second base station is and this UE carries out the base station of control plane signalling communication;Alternatively, the cell where first base station is the main plot with above-mentioned UE, the second base station The cell at place is the secondary cell of above-mentioned UE.Corresponding to previous embodiment, which includes Encryption Algorithm, head compression At least one of algorithm and protection algorithm integrallty algorithm:Above-mentioned parameter includes next-hop linkage counter NCC, next-hop At least one of the length of NH, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C-RNTI, Paket Data Convergence Protocol PDCP sequence numbers Parameter.
In the present embodiment, realize in the control plane or user plane handoff procedure of UE, the base station that is communicated with control plane or New parameter and/or security algorithm can be sent to UE by the base station communicated with user plane, to ensure that above-mentioned first base station, Second base station, UE are synchronous in communication process to be handled using same parameters and/or security algorithm.
Further, above-mentioned UE is carried out according to above-mentioned parameter and/or security algorithm pair with first base station and/or the second base station The information of communication is handled, similar with embodiment of the method shown in Fig. 1 during specific implementation, as follows there are a variety of situations It is described:
1, UE begins to use above-mentioned parameter and/or security algorithm pair and first when receiving parameter and/or security algorithm The information that base station and/or the second base station are communicated is handled.
2, UE begins to use above-mentioned parameter and/or security algorithm pair and first base station when sending information to first base station And/or second the information that is communicated of base station handled.
3, UE begins to use the parameter and/or safety to calculate when receiving the message of first base station or the transmission of the second base station The information that method pair is communicated with first base station and/or the second base station is handled;The message can be specifically dedicated for It indicates instruction messages of the UE using above-mentioned parameter and/or security algorithm, can also be that first base station or the second base station are sent to UE Any message;
Further, the message that above-mentioned first base station or the second base station are sent, can be indicating that the UE begins to use The parameter and/or security algorithm.
4, UE is when being linked into first base station, begin to use above-mentioned parameter and/or security algorithm pair and first base station and/or The information that second base station is communicated is handled.
5, UE begins to use above-mentioned parameter and/or security algorithm pair and first base station when beginning and first base station communicate And/or second the information that is communicated of base station handled.
6, UE begins to use above-mentioned parameter and/or peace when receiving first data packet that above-mentioned first base station is sent The information that full algorithm pair is communicated with first base station and/or the second base station is handled;Specifically, it is understood that there may be two kinds of feelings Condition after receiving above-mentioned parameter and/or security algorithm one is UE, receives first data packet that above-mentioned first base station is sent When, begin to use above-mentioned parameter and/or security algorithm;Another situation is, first base station receives the of first base station transmission One data packet, wouldn't process, and wait after receiving above-mentioned parameter and/or security algorithm, immediately begin to using the parameter and/ Or security algorithm handles above-mentioned first data packet.
7, UE in the preset time after receiving above-mentioned parameter and/or security algorithm or later, begins to use above-mentioned The information that parameter and/or security algorithm pair are communicated with first base station and/or the second base station is handled.Specific implementation process In, the mode of timer may be used to realize.
In the present embodiment, realize in the control plane or user plane handoff procedure of UE, above-mentioned second base station or the first base New parameter and/or security algorithm are sent to UE by standing-meeting, to ensure that above-mentioned first base station, the second base station, UE are being communicated It is synchronous in the process that the information interacted is handled using same parameters and/or security algorithm.
Fig. 8 is the structural schematic diagram of base station embodiment one provided by the invention, which is above-mentioned first base station, such as Fig. 8 Shown, which includes:Receiving module 801 and processing module 802, wherein:
Receiving module 801, parameter and/or security algorithm for receiving the second base station or mobile management entity MME transmission;
Processing module 802, at the information for being communicated with UE according to above-mentioned parameter and/or security algorithm pair Reason;
It should be noted that the base station, i.e. first base station are the base station that user face data communication is carried out with the UE, it is described Second base station is the base station that control plane signalling communication is carried out with the UE;Alternatively, cell where the first base station for institute The main plot of UE is stated, the cell where the base station is the secondary cell of the UE.
The specific works of above-mentioned each module referring to Fig.1 shown in embodiment of the method, details are not described herein.
In the present embodiment, parameter and/or security algorithm are sent to first base station by the second base station, ensure that above-mentioned first Base station, the second base station, UE can be synchronized in communication process carries out encryption and decryption processing using same parameters and/or security algorithm.
It should be noted that above-mentioned security algorithm includes in Encryption Algorithm, header compression algorithm and protection algorithm integrallty At least one algorithm;Above-mentioned parameter includes next-hop linkage counter NCC, next-hop NH, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C- At least one of the length of RNTI, Paket Data Convergence Protocol PDCP sequence numbers parameter.
Above-mentioned processing module 702 is carried out specifically for the information communicated with UE according to Encryption Algorithm pair at encryption and decryption Reason;Head compression processing is compressed into wardrobe or solved to the information communicated with UE according to header compression algorithm pair;It is protected according to integrality The information that shield algorithm pair is communicated with UE carries out integrity protection or solution integrity protection processing.
Fig. 9 is the structural schematic diagram of base station embodiment two provided by the invention, which is above-mentioned first base station, such as Fig. 9 Shown, on the basis of Fig. 8, which further includes communication module 803, sending module 804, wherein:
During specific implementation, the above-mentioned information communicated with UE according to parameter and/or security algorithm pair is handled Can there are many situation, can optional one implemented, illustrate:
1, processing module 802, specifically for when receiving the parameter and/or security algorithm, beginning to use the ginseng The information that number and/or security algorithm pair are communicated with UE is handled.
2, processing module 802, specifically for received after receiving the parameter and/or security algorithm the second base station or When the message that UE is sent, the information that the parameter and/or security algorithm pair are communicated with UE is begun to use to handle.
Further, communication module 803 are communicated for after receiving the message, starting with UE.
3, processing module 802 are specifically used for, when starting and UE communication, beginning to use the parameter and/or security algorithm Pair information communicated with UE is handled.
4, processing module 802 are specifically used for when UE access is to first base station, begin to use the parameter and/or safety The information that algorithm pair is communicated with UE is handled.
5, processing module 802, are specifically used in UE and when first base station uplink synchronous, begin to use the parameter and/or The information that security algorithm pair is communicated with UE is handled.
6, processing module 802, specifically for when receiving first data packet that second base station is sent, starting to make The information communicated with UE with the parameter and/or security algorithm pair is handled.
7, processing module 802, specifically in the preset time after receiving the parameter and/or security algorithm or Later, the information that the parameter and/or security algorithm pair are communicated with UE is begun to use to handle.
8, sending module 804 begin to use the parameter and/or security algorithm for sending to be used to indicate to the UE Instruction message;
Further above-mentioned processing module 802, specifically for beginning to use the ginseng when sending the instruction message The information that number and/or security algorithm pair are communicated with UE is handled.
9, processing module 802 are specifically used for according to original parameter and/or security algorithm processing failure, then beginning to use institute Parameter and/or security algorithm pair is stated to handle with the UE progress communication information.The specific works of above-mentioned each module are with reference to aforementioned side Method embodiment, details are not described herein.
In the present embodiment, realize in the control plane or user plane handoff procedure of UE, the base station communicated with control plane can New parameter and/or security algorithm are sent to the base station communicated with user plane, to ensure that above-mentioned first base station, second Base station, UE are synchronous in communication process to carry out encryption and decryption processing using same parameters and/or security algorithm.
Figure 10 is the structural schematic diagram of base station embodiment three provided by the invention, which is above-mentioned second base station, is such as schemed Shown in 10, which includes:Update module 110, the first sending module 111, wherein:
Update module 110 is used for undated parameter and/or security algorithm;
First sending module 111, for sending the parameter and/or security algorithm to first base station or UE;
Wherein, the first base station is that the base station of user face data communication, the base station, i.e. the second base are carried out with the UE It stands to carry out the base station of control plane signalling communication with the UE;Alternatively, the cell where the first base station is with the UE's Main plot, the secondary cell that the cell where the base station is the UE.
The work of above-mentioned each module can refer to preceding method embodiment, and details are not described herein.
In the present embodiment, parameter and/or security algorithm are sent to first base station by the second base station, ensure that above-mentioned first Base station, the second base station, UE can be synchronized in communication process carries out encryption and decryption processing using same parameters and/or security algorithm.
Explanation is needed further exist for, above-mentioned security algorithm includes that Encryption Algorithm, header compression algorithm and integrity protection are calculated At least one of method algorithm:Above-mentioned parameter includes that next-hop linkage counter NCC, next-hop NH, cell-radio network are interim Identify at least one of the length of C-RNTI, Paket Data Convergence Protocol PDCP sequence numbers parameter.
Figure 11 is the structural schematic diagram of base station embodiment four provided by the invention, which is above-mentioned second base station, is being schemed May include the second sending module 112 optionally on the basis of 11, for sending instruction message to the first base station or UE, So that the first base station begins to use the parameter and/or security algorithm pair to be communicated with UE when receiving the message Information carry out encryption and decryption processing, or UE is made to begin to use the parameter and/or security algorithm pair when receiving the message The information communicated with first base station and/or the second base station is handled.
The specific works of the module can refer to preceding method embodiment, and details are not described herein.
Figure 12 is the structural schematic diagram of user equipment embodiment provided by the invention, as shown in figure 12, the user equipment packet It includes:Receiving module 120 and processing module 121, wherein:
Receiving module 120, parameter and/or security algorithm for receiving first base station or the transmission of the second base station;
Processing module 121, for according to the parameter and/or security algorithm pair and first base station and/or the second base station into The information of row communication is handled;
It should be noted that wherein, the first base station is to carry out the base station of user face data communication with the UE, described Second base station is the base station that control plane signalling communication is carried out with the UE;Alternatively, cell where the first base station for institute The main plot of UE is stated, the cell where the base station is the secondary cell of the UE.
In the present embodiment, realize in the control plane or user plane handoff procedure of UE, the base station that is communicated with control plane or New parameter and/or security algorithm can be sent to UE by the base station communicated with user plane, to ensure that above-mentioned first base station, Second base station, UE are synchronous in communication process to carry out encryption and decryption processing using same parameters and/or security algorithm.
Further, above-mentioned security parameter include in Encryption Algorithm, header compression algorithm and protection algorithm integrallty at least A kind of algorithm:
Above-mentioned parameter include next-hop linkage counter NCC, next-hop NH, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C-RNTI, At least one of the length of Paket Data Convergence Protocol PDCP sequence numbers parameter.
Processing module 121, specifically for being communicated with first base station and/or the second base station according to the Encryption Algorithm pair Information carry out encryption and decryption processing;The letter communicated with first base station and/or the second base station according to the header compression algorithm pair It ceases and head compression processing is compressed or solved into wardrobe;According to the protection algorithm integrallty pair and first base station and/or the second base station The information communicated carries out integrity protection or solution integrity protection processing.
Further, above-mentioned according to above-mentioned parameter and/or security algorithm pair and first base station during specific implementation And/or second the information that is communicated of base station carry out processing there are a variety of situations:
1, processing module 121, specifically for when receiving the parameter and/or security algorithm, beginning to use above-mentioned ginseng The information that number and/or security algorithm pair are communicated with first base station is handled.
2, processing module 121 are specifically used for, when sending information to first base station, beginning to use the parameter and/or peace The information that full algorithm pair is communicated with first base station and/or the second base station is handled.
3, processing module 121 begin to use described when specifically for reception first base station or the message of the second base station transmission The information that parameter and/or security algorithm pair are communicated with first base station and/or the second base station is handled.
It should be noted that the message that the first base station or the second base station are sent, to indicate that the UE begins to use The parameter and/or security algorithm.
4, processing module 121, specifically for when being linked into first base station, beginning to use the parameter and/or safety to calculate The information that method pair is communicated with first base station and/or the second base station is handled.
5, processing module 121, the processing module are specifically used for, when starting and first base station communication, beginning to use institute The information that parameter and/or security algorithm pair are communicated with first base station and/or the second base station is stated to handle.
6, processing module 121, specifically for when receiving first data packet that the first base station is sent, starting to make The information communicated with first base station and/or the second base station with the parameter and/or security algorithm pair is handled.
7, processing module 121, specifically in the preset time after receiving the parameter and/or security algorithm or Later, the information that the parameter and/or security algorithm pair are communicated with first base station and/or the second base station is begun to use to carry out Processing.
The concrete function that unit or module execute in the corresponding equipment of Fig. 8 to Figure 11 is implemented with method before can be found in Example.
The embodiment of the present invention also provides a kind of base station, corresponds to above-mentioned first base station, including:Receiver and processor, In, receiver is used to receive the parameter and/or security algorithm of the second base station or mobile management entity MME transmission;Processor is used for The information communicated with user equipment (UE) according to the parameter and/or security algorithm pair is handled;Wherein, the base station is The base station of user face data communication is carried out with the UE, second base station is the base that control plane signalling communication is carried out with the UE It stands;Alternatively, the cell where the first base station is the main plot with the UE, the cell where the base station is the UE's Secondary cell.Specifically, the security algorithm includes at least one of Encryption Algorithm, header compression algorithm and protection algorithm integrallty Algorithm;The parameter includes next-hop linkage counter NCC, next-hop NH, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C-RNTI, grouping Data converge at least one of the length of layer protocol PDCP sequence numbers parameter.
Processor carries out encryption and decryption processing specifically for the information communicated with UE according to the Encryption Algorithm pair;Root Head compression processing is compressed into wardrobe or solved to the information communicated with UE according to the header compression algorithm pair;According to the integrality The information that protection algorism pair is communicated with UE carries out integrity protection or solution integrity protection processing.
Further, processor, specifically for receiving the second base station after receiving the parameter and/or security algorithm Or UE send message when, begin to use the information that the parameter and/or security algorithm pair are communicated with UE to handle;And After receiving the message, start to be communicated with UE;Alternatively,
The processor is specifically used for starting and when UE communication, begin to use the parameter and/or security algorithm pair with The information that UE is communicated is handled;Alternatively,
The processor is specifically used for when UE access is to first base station, begins to use the parameter and/or security algorithm Pair information communicated with UE is handled;Alternatively,
The processor is specifically used for, in UE and first base station uplink synchronous, beginning to use the parameter and/or safety The information that algorithm pair is communicated with UE is handled;Alternatively,
The processor, specifically for when receiving first data packet that second base station is sent, beginning to use The information that the parameter and/or security algorithm pair are communicated with UE is handled;Alternatively,
The processor, specifically in the preset time after receiving the parameter and/or security algorithm or it Afterwards, the information that the parameter and/or security algorithm pair are communicated with UE is begun to use to handle;Alternatively,
The base station further includes transmitter, begins to use the parameter and/or safety for being used to indicate to UE transmissions The instruction message of algorithm;The processor, specifically for begin to use when sending the instruction message parameter and/or The information that security algorithm pair is communicated with UE is handled;Alternatively,
The processor is specifically used for according to original parameter and/or security algorithm processing failure, then beginning to use the ginseng Number and/or security algorithm pair carry out the communication information with UE and handle.
The embodiment of the present invention also provides a kind of base station, corresponds to above-mentioned second base station, including processor and transmitter, In, processor is used for undated parameter and/or security algorithm;Transmitter, for sending the parameter to first base station or UE And/or security algorithm;Wherein, the first base station be with UE carry out user face data communication base station, the base station for institute State the base station that UE carries out control plane signalling communication;Alternatively, the cell where the first base station is the main plot with the UE, institute The secondary cell that cell where stating base station is the UE.
Wherein, the security algorithm includes at least one of Encryption Algorithm, header compression algorithm and protection algorithm integrallty Algorithm:The parameter includes next-hop linkage counter NCC, next-hop NH, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C-RNTI, grouping Data converge at least one of the length of layer protocol PDCP sequence numbers parameter.
The transmitter is additionally operable to send message to the first base station or UE, so that the first base station is receiving Begin to use the information that the parameter and/or security algorithm pair are communicated with UE to handle when the message, or UE is made to exist The parameter and/or security algorithm pair is begun to use to lead to first base station and/or the second base station when receiving the message The information of letter is handled.
The embodiment of the present invention also provides a kind of user equipment, including receiver and processor, wherein receiver is for receiving The parameter and/or security algorithm that first base station or the second base station are sent;Processor, for being calculated according to the parameter and/or safety The information that method pair is communicated with first base station and/or the second base station is handled;Wherein, the first base station is and the UE The base station of user face data communication is carried out, second base station is the base station that control plane signalling communication is carried out with the UE;Alternatively, Cell where the first base station is the main plot with the UE, the secondary cell that the cell where the base station is the UE. In addition, the security algorithm includes at least one of Encryption Algorithm, header compression algorithm and protection algorithm integrallty algorithm:It is described Parameter includes next-hop linkage counter NCC, next-hop NH, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C-RNTI, packet data convergence At least one of the length of layer protocol PDCP sequence numbers parameter.
Further, the processor, specifically for when receiving the parameter and/or security algorithm, beginning to use The information that above-mentioned parameter and/or security algorithm pair are communicated with first base station is handled;Alternatively,
The processor is specifically used for, when sending information to first base station, the parameter and/or safety being begun to use to calculate The information that method pair is communicated with first base station and/or the second base station is handled;Alternatively,
The processor begins to use the ginseng when specifically for reception first base station or the message of the second base station transmission The information that number and/or security algorithm pair are communicated with first base station and/or the second base station is handled, wherein described first The message that base station or the second base station are sent, to indicate that the UE begins to use the parameter and/or security algorithm;Alternatively,
The processor, specifically for when being linked into first base station, beginning to use the parameter and/or security algorithm pair The information communicated with first base station and/or the second base station is handled;Alternatively,
The processor is specifically used for, when starting and first base station communication, the parameter and/or safety being begun to use to calculate The information that method pair is communicated with first base station and/or the second base station is handled;Alternatively,
The processor, specifically for when receiving first data packet that the first base station is sent, beginning to use The information that the parameter and/or security algorithm pair are communicated with first base station and/or the second base station is handled;Alternatively,
The processor, specifically in the preset time after receiving the parameter and/or security algorithm or it Afterwards, begin to use at the information that the parameter and/or security algorithm pair communicated with first base station and/or the second base station Reason.
One of ordinary skill in the art will appreciate that:Realize that all or part of step of above-mentioned each method embodiment can lead to The relevant hardware of program instruction is crossed to complete.Program above-mentioned can be stored in a computer read/write memory medium.The journey When being executed, execution includes the steps that above-mentioned each method embodiment to sequence;And storage medium above-mentioned includes:ROM, RAM, magnetic disc or The various media that can store program code such as person's CD.
Finally it should be noted that:The above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent Present invention has been described in detail with reference to the aforementioned embodiments for pipe, it will be understood by those of ordinary skill in the art that:Its according to So can with technical scheme described in the above embodiments is modified, either to which part or all technical features into Row equivalent replacement;And these modifications or replacements, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution The range of scheme.

Claims (54)

1. a kind of cell optimization method, which is characterized in that including:
First base station receives the parameter and/or security algorithm that the second base station is sent;
At the information that the first base station is communicated with user equipment (UE) according to the parameter and/or security algorithm pair Reason;
Wherein, the first base station be with the UE carry out user face data communication base station, second base station be with it is described UE carries out the base station of control plane signalling communication;Alternatively,
Cell where the first base station is the main plot with the UE, and the cell where second base station is the UE's Secondary cell.
2. according to the method described in claim 1, it is characterized in that, the security algorithm includes Encryption Algorithm, header compression algorithm With at least one of protection algorithm integrallty algorithm;
The parameter includes next-hop linkage counter NCC, next-hop NH, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C-RNTI, grouping Data converge at least one of the length of layer protocol PDCP sequence numbers parameter.
3. according to the method described in claim 2, it is characterized in that, the first base station according to the security algorithm pair and UE into The information of row communication is handled, including at least one of following processing processing:
The first base station carries out encryption and decryption processing according to the information that the Encryption Algorithm pair is communicated with UE;
Head compression is compressed into wardrobe or solved to the information that the first base station is communicated according to the header compression algorithm pair with UE Processing;
The information that the first base station is communicated with UE according to the protection algorithm integrallty pair carry out integrity protection or Solve integrity protection processing.
4. according to the method described in claim 1, it is characterized in that, the first base station is calculated according to the parameter and/or safety The information that method pair is communicated with user equipment (UE) is handled, including:
The first base station begins to use the parameter and/or security algorithm when receiving the parameter and/or security algorithm Pair information communicated with UE is handled.
5. according to the method described in claim 1, it is characterized in that, the first base station is calculated according to the parameter and/or safety The information that method pair is communicated with user equipment (UE) is handled, including:
The message that the first base station receives the second base station after receiving the parameter and/or security algorithm or UE is sent When, begin to use the information that the parameter and/or security algorithm pair are communicated with UE to handle.
6. according to the method described in claim 5, it is characterized in that, the first base station when receiving the message or it Afterwards, further include:
Start to be communicated with UE.
7. according to the method described in claim 1, it is characterized in that, the first base station is calculated according to the parameter and/or safety The information that method pair is communicated with user equipment (UE) is handled, including:
The first base station begins to use the parameter and/or security algorithm pair to be communicated with UE when starting and UE communication Information handled.
8. according to the method described in claim 1, it is characterized in that, the first base station is calculated according to the parameter and/or safety The information that method pair is communicated with user equipment (UE) is handled, including:
The first base station begins to use the parameter and/or security algorithm pair to be carried out with UE when UE access is to first base station The information of communication is handled.
9. according to the method described in claim 1, it is characterized in that, the first base station is calculated according to the parameter and/or safety The information that method pair is communicated with user equipment (UE) is handled, including:
The first base station begins to use the parameter and/or security algorithm pair and UE in UE and first base station uplink synchronous The information communicated is handled.
10. according to the method described in claim 1, it is characterized in that, the first base station is calculated according to the parameter and/or safety The information that method pair is communicated with user equipment (UE) is handled, including:
The first base station when receiving first data packet that second base station is sent, begin to use the parameter and/ Or the information that security algorithm pair is communicated with UE is handled.
11. according to the method described in claim 1, it is characterized in that, the first base station is calculated according to the parameter and/or safety The information that method pair is communicated with user equipment (UE) is handled, including:
The first base station begins to use in the preset time after receiving the parameter and/or security algorithm or later The information that the parameter and/or security algorithm pair are communicated with UE is handled.
12. according to the method described in claim 1, it is characterized in that, the first base station is calculated according to the parameter and/or safety The information that method pair is communicated with user equipment (UE) is handled, including:
The first base station sends to the UE and is used to indicate the instruction message for beginning to use the parameter and/or security algorithm, Begin to use when sending the instruction message at the information that the parameter and/or security algorithm pair communicated with UE Reason.
13. according to the method described in claim 1, it is characterized in that, the first base station is calculated according to the parameter and/or safety The information that method pair is communicated with user equipment (UE) is handled, including:
The first base station is handled when needing the information sent to UE to handle according to original parameter and/or security algorithm Failure then begins to use the parameter and/or security algorithm pair to carry out the communication information with UE and handles.
14. a kind of cell optimization method, which is characterized in that including:
Second base station undated parameter and/or security algorithm;
Second base station sends the parameter and/or security algorithm to first base station or user equipment (UE);
Wherein, the first base station be with UE carry out user face data communication base station, second base station be with the UE into The base station of row control plane signalling communication;Alternatively,
Cell where the first base station is the main plot with the UE, and the cell where second base station is the UE's Secondary cell.
15. according to the method for claim 14, which is characterized in that the security algorithm includes Encryption Algorithm, head compression calculation At least one of method and protection algorithm integrallty algorithm;
The parameter includes next-hop linkage counter NCC, next-hop NH, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C-RNTI, grouping Data converge at least one of the length of layer protocol PDCP sequence numbers parameter.
16. according to the method for claim 14, which is characterized in that second base station is to described in first base station transmission After parameter and/or security algorithm, further include:
Second base station sends message to the first base station or UE, so that the first base station is when receiving the message Begin to use the information that the parameter and/or security algorithm pair are communicated with UE to handle, or makes UE described in receiving Begin to use when message the information that the parameter and/or security algorithm pair are communicated with first base station and/or the second base station into Row processing.
17. a kind of cell optimization method, which is characterized in that including:
User equipment (UE) receives first base station or the parameter and/or security algorithm of the transmission of the second base station;
The information that the UE is communicated with first base station and/or the second base station according to the parameter and/or security algorithm pair into Row processing;
Wherein, the first base station be with the UE carry out user face data communication base station, second base station be with it is described UE carries out the base station of control plane signalling communication;Alternatively,
The place cell of the first base station is the main plot with the UE, and the cell where second base station is the UE's Secondary cell.
18. according to the method for claim 17, which is characterized in that the security algorithm includes Encryption Algorithm, head compression calculation At least one of method and protection algorithm integrallty algorithm:
The parameter includes next-hop linkage counter NCC, next-hop NH, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C-RNTI, grouping Data converge at least one of the length of layer protocol PDCP sequence numbers parameter.
19. according to the method for claim 18, which is characterized in that the UE is according to the parameter and/or security algorithm pair The information communicated with first base station and/or the second base station is handled, including at least one of following processing processing:
The UE is carried out according to the information that the Encryption Algorithm pair is communicated with first base station and/or the second base station at encryption and decryption Reason;
The UE is compressed according to the information that the header compression algorithm pair is communicated with first base station and/or the second base station into wardrobe Or solution head compression processing;
The UE has been carried out according to the information that the protection algorithm integrallty pair is communicated with first base station and/or the second base station Whole property protection or solution integrity protection processing.
20. according to the method for claim 17, which is characterized in that the UE is according to the parameter and/or security algorithm pair The information communicated with first base station and/or the second base station is handled, including:
UE begins to use above-mentioned parameter and/or security algorithm pair and the first base when receiving the parameter and/or security algorithm It stands and/or information that the second base station is communicated is handled.
21. according to the method for claim 17, which is characterized in that the UE is according to the parameter and/or security algorithm pair The information communicated with first base station and/or the second base station is handled, including:
The UE when sending information to first base station, begin to use the parameter and/or security algorithm pair and first base station and/ Or second the information that is communicated of base station handled.
22. according to the method for claim 17, which is characterized in that the UE is according to the parameter and/or security algorithm pair The information communicated with first base station and/or the second base station is handled, including:
The UE begins to use the parameter and/or security algorithm when receiving the message of first base station or the transmission of the second base station Pair information communicated with first base station and/or the second base station is handled.
23. according to the method for claim 22, which is characterized in that the first base station or the message of the second base station transmission, To indicate that the UE begins to use the parameter and/or security algorithm.
24. according to the method for claim 17, which is characterized in that the UE is according to the parameter and/or security algorithm pair The information communicated with first base station and/or the second base station is handled, including:
The UE begins to use the parameter and/or security algorithm pair and first base station and/or the when being linked into first base station The information that two base stations are communicated is handled.
25. according to the method for claim 17, which is characterized in that the UE is according to the parameter and/or security algorithm pair The information communicated with first base station and/or the second base station is handled, including:
The UE when starting and first base station communication, begin to use the parameter and/or security algorithm pair and first base station and/ Or second the information that is communicated of base station handled.
26. according to the method for claim 17, which is characterized in that the UE is according to the parameter and/or security algorithm pair The information communicated with first base station and/or the second base station is handled, including:
The UE begins to use the parameter and/or safety when receiving first data packet that the first base station is sent The information that algorithm pair is communicated with first base station and/or the second base station is handled.
27. according to the method for claim 17, which is characterized in that the UE is according to the parameter and/or security algorithm pair The information communicated with first base station and/or the second base station is handled, including:
The UE begins to use the ginseng in the preset time after receiving the parameter and/or security algorithm or later The information that number and/or security algorithm pair are communicated with first base station and/or the second base station is handled.
28. a kind of base station, which is characterized in that including:
Receiving module, parameter and/or security algorithm for receiving the transmission of the second base station;
Processing module, at the information for being communicated with user equipment (UE) according to the parameter and/or security algorithm pair Reason;
Wherein, the base station be with the UE carry out user face data communication base station, second base station be with the UE into The base station of row control plane signalling communication;Alternatively,
Cell where the base station is the main plot with the UE, and the cell where second base station is the auxiliary small of the UE Area.
29. base station according to claim 28, which is characterized in that the security algorithm includes Encryption Algorithm, head compression calculation At least one of method and protection algorithm integrallty algorithm;
The parameter includes next-hop linkage counter NCC, next-hop NH, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C-RNTI, grouping Data converge at least one of the length of layer protocol PDCP sequence numbers parameter.
30. base station according to claim 29, which is characterized in that the processing module is specifically used for according to the encryption The information that algorithm pair is communicated with UE carries out encryption and decryption processing;The information communicated with UE according to the header compression algorithm pair Head compression processing is compressed or solved into wardrobe;It is carried out according to the information that the protection algorithm integrallty pair is communicated with UE complete Property protection or solution integrity protection processing.
31. base station according to claim 28, which is characterized in that the processing module, specifically for described in receiving When parameter and/or security algorithm, begin to use at the information that the parameter and/or security algorithm pair communicated with UE Reason.
32. base station according to claim 28, which is characterized in that the processing module, specifically for described in receiving When the message that the second base station of reception or UE are sent after parameter and/or security algorithm, the parameter and/or safety is begun to use to calculate The information that method pair is communicated with UE is handled.
33. base station according to claim 32, which is characterized in that further include:
Communication module is communicated for after receiving the message, starting with UE.
34. base station according to claim 28, which is characterized in that the processing module is specifically used for starting to lead to UE When letter, the information that the parameter and/or security algorithm pair are communicated with UE is begun to use to handle.
35. base station according to claim 28, which is characterized in that the processing module is specifically used in UE access to the When one base station, the information that the parameter and/or security algorithm pair are communicated with UE is begun to use to handle.
36. base station according to claim 28, which is characterized in that the processing module is specifically used in UE and the first base When uplink synchronous of standing, the information that the parameter and/or security algorithm pair are communicated with UE is begun to use to handle.
37. base station according to claim 28, which is characterized in that the processing module, specifically for described in receiving When first data packet that the second base station is sent, the letter that begins to use the parameter and/or security algorithm pair to be communicated with UE Breath is handled.
38. base station according to claim 28, which is characterized in that the processing module, specifically for described in receiving In preset time after parameter and/or security algorithm or later, begin to use the parameter and/or security algorithm pair and UE into The information of row communication is handled.
39. base station according to claim 28, which is characterized in that further include:
Sending module is used to indicate the instruction message for beginning to use the parameter and/or security algorithm for being sent to the UE;
The processing module, specifically for beginning to use the parameter and/or security algorithm pair when sending the instruction message The information communicated with UE is handled.
40. base station according to claim 28, which is characterized in that the processing module is specifically used for according to original parameter And/or security algorithm processing failure, then begin to use the parameter and/or security algorithm pair to be carried out at the communication information with UE Reason.
41. a kind of base station, which is characterized in that including:
Update module is used for undated parameter and/or security algorithm;
First sending module, for sending the parameter and/or security algorithm to first base station or user equipment (UE);
Wherein, the first base station is that the base station of user face data communication is carried out with UE, and the base station is to be controlled with the UE The base station of plane signaling communication processed;Alternatively,
Cell where the first base station is the main plot with the UE, and the cell where the base station is the auxiliary small of the UE Area.
42. base station according to claim 41, which is characterized in that the security algorithm includes Encryption Algorithm, head compression calculation At least one of method and protection algorithm integrallty algorithm:
The parameter includes next-hop linkage counter NCC, next-hop NH, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C-RNTI, grouping Data converge at least one of the length of layer protocol PDCP sequence numbers parameter.
43. base station according to claim 41, which is characterized in that further include:
Second sending module, for sending message to the first base station or UE, so that the first base station is described in receiving Begin to use the information that the parameter and/or security algorithm pair are communicated with UE to handle when message, or UE is made to receive The parameter and/or security algorithm pair is begun to use to be communicated with first base station and/or the second base station when to the message Information is handled.
44. a kind of user equipment, which is characterized in that including:
Receiving module, parameter and/or security algorithm for receiving first base station or the transmission of the second base station;
Processing module, for what is communicated with first base station and/or the second base station according to the parameter and/or security algorithm pair Information is handled;
Wherein, the first base station is that the base station of user face data communication, second base station are carried out with the user equipment (UE) To carry out the base station of control plane signalling communication with the UE;Alternatively,
Cell where the first base station is the main plot with the UE, and the cell where second base station is the UE's Secondary cell.
45. user equipment according to claim 44, which is characterized in that the security algorithm includes Encryption Algorithm, head pressure At least one of compression algorithm and protection algorithm integrallty algorithm:
The parameter includes next-hop linkage counter NCC, next-hop NH, Cell Radio Network Temporary Identifier/Identity, Cell-RNTI C-RNTI, grouping Data converge at least one of the length of layer protocol PDCP sequence numbers parameter.
46. user equipment according to claim 45, which is characterized in that the processing module is specifically used for according to The information that Encryption Algorithm pair is communicated with first base station and/or the second base station carries out encryption and decryption processing;It is compressed according to the head Head compression processing is compressed into wardrobe or solved to the information that algorithm pair is communicated with first base station and/or the second base station;According to institute The information that protection algorithm integrallty pair is communicated with first base station and/or the second base station is stated to carry out integrity protection or solved Whole property protection processing.
47. user equipment according to claim 44, which is characterized in that the processing module, specifically for receiving When the parameter and/or security algorithm, the letter that begins to use above-mentioned parameter and/or security algorithm pair to be communicated with first base station Breath is handled.
48. user equipment according to claim 44, which is characterized in that the processing module is specifically used for first When base station sends information, the parameter and/or security algorithm pair is begun to use to be communicated with first base station and/or the second base station Information handled.
49. user equipment according to claim 44, which is characterized in that the processing module is specifically used for receiving first When the message that base station or the second base station are sent, begin to use the parameter and/or security algorithm pair and first base station and/or second The information that base station is communicated is handled.
50. user equipment according to claim 49, which is characterized in that the first base station or the second base station were sent disappears Breath, to indicate that the UE begins to use the parameter and/or security algorithm.
51. user equipment according to claim 44, which is characterized in that the processing module, specifically for being linked into When first base station, the letter that begins to use the parameter and/or security algorithm pair to be communicated with first base station and/or the second base station Breath is handled.
52. user equipment according to claim 44, which is characterized in that the processing module, be specifically used for start and When first base station communicates, the parameter and/or security algorithm pair is begun to use to be communicated with first base station and/or the second base station Information handled.
53. user equipment according to claim 44, which is characterized in that the processing module, specifically for receiving When first data packet that the first base station is sent, begin to use the parameter and/or security algorithm pair and first base station and/ Or second the information that is communicated of base station handled.
54. user equipment according to claim 44, which is characterized in that the processing module, specifically for receiving In preset time after the parameter and/or security algorithm or later, begin to use the parameter and/or security algorithm pair with The information that first base station and/or the second base station are communicated is handled.
CN201210562667.1A 2012-12-21 2012-12-21 Cell optimization method and device Active CN103888936B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201210562667.1A CN103888936B (en) 2012-12-21 2012-12-21 Cell optimization method and device
PCT/CN2013/090234 WO2014094663A1 (en) 2012-12-21 2013-12-23 Cell optimization method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210562667.1A CN103888936B (en) 2012-12-21 2012-12-21 Cell optimization method and device

Publications (2)

Publication Number Publication Date
CN103888936A CN103888936A (en) 2014-06-25
CN103888936B true CN103888936B (en) 2018-09-21

Family

ID=50957620

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210562667.1A Active CN103888936B (en) 2012-12-21 2012-12-21 Cell optimization method and device

Country Status (2)

Country Link
CN (1) CN103888936B (en)
WO (1) WO2014094663A1 (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017132946A1 (en) * 2016-02-04 2017-08-10 华为技术有限公司 Data transmission method and apparatus
CN109314899B (en) * 2016-06-24 2021-06-15 华为技术有限公司 Data transmission method and device
CN109155945B (en) * 2016-07-01 2021-03-09 Oppo广东移动通信有限公司 Method and device for transmitting data
WO2018058444A1 (en) * 2016-09-29 2018-04-05 华为技术有限公司 Method and apparatus for data encryption
CN111510924B (en) 2018-02-23 2021-10-01 Oppo广东移动通信有限公司 Method and device for determining security algorithm and computer storage medium
CN110475243B (en) * 2018-05-11 2020-10-30 电信科学技术研究院有限公司 Method for reporting, acquiring and processing UE capability information and corresponding device
WO2019214625A1 (en) * 2018-05-11 2019-11-14 电信科学技术研究院有限公司 Ue capability information reporting, obtaining, and processing methods and corresponding apparatuses
CN111641582B (en) * 2019-03-01 2021-11-09 华为技术有限公司 Safety protection method and device

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101242629A (en) * 2007-02-05 2008-08-13 华为技术有限公司 Method, system and device for selection algorithm of user plane

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100542347C (en) * 2005-11-01 2009-09-16 华为技术有限公司 Mobile communications network and data transmission method thereof
CN102281535A (en) * 2010-06-10 2011-12-14 华为技术有限公司 Key updating method and apparatus thereof
CN102378287B (en) * 2010-08-11 2014-12-10 电信科学技术研究院 Cell configuration method and device for changing primary cell
CN102257852B (en) * 2011-06-10 2014-05-07 华为技术有限公司 Rebuilding method of wireless resource control, user equipment, base station and communication system
CN102833802B (en) * 2012-08-15 2015-09-23 电信科学技术研究院 A kind of data forwarding method and equipment

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101242629A (en) * 2007-02-05 2008-08-13 华为技术有限公司 Method, system and device for selection algorithm of user plane

Also Published As

Publication number Publication date
CN103888936A (en) 2014-06-25
WO2014094663A1 (en) 2014-06-26

Similar Documents

Publication Publication Date Title
CN103888936B (en) Cell optimization method and device
CN106105368B (en) Dual link network
KR101723913B1 (en) Key updating method, device and system
EP3099029B1 (en) Security key changing method, and user equipment
CN104349312B (en) Method for supporting the safe handling of dual link
EP3203805B1 (en) Radio resource control (rrc) message processing method, apparatus, and system
CN106105143A (en) Security key derivation in dual connectivity
WO2016125887A1 (en) Base station
EP2928261B1 (en) Bearer release
CN103517356A (en) Method, system and equipment for conducting switching
JP2017103770A (en) Device and method of handling data transmission/reception for dual connectivity
EP3609163B1 (en) Communication method, device and system
EP3171635B1 (en) Path switching method, mobile anchor point and base station
WO2014000684A1 (en) Method, system and device for switching
WO2014000687A1 (en) Method, system, and device for transmitting data during access point switching process
EP3691399A1 (en) Communications system, base station, user equipment, and signaling transmission method
EP3361763B1 (en) Senb key update method and device
CN102572816B (en) Method and device for mobile switching
US11265967B2 (en) User device for setting packet data convergence protocol entity in dual connectivity
CN104429109B (en) A kind of communication means and device
WO2014008787A1 (en) Method and user equipment for distinguishing signaling sources
CN103945420B (en) Cell optimization method and device
EP3952373A1 (en) Data transmission method and device
CN102065420B (en) Method, system and device for determining secret key

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant