WO2014111049A1 - Cell optimization method and device - Google Patents

Cell optimization method and device Download PDF

Info

Publication number
WO2014111049A1
WO2014111049A1 PCT/CN2014/070864 CN2014070864W WO2014111049A1 WO 2014111049 A1 WO2014111049 A1 WO 2014111049A1 CN 2014070864 W CN2014070864 W CN 2014070864W WO 2014111049 A1 WO2014111049 A1 WO 2014111049A1
Authority
WO
WIPO (PCT)
Prior art keywords
communication node
parameters
communication
security
security algorithms
Prior art date
Application number
PCT/CN2014/070864
Other languages
French (fr)
Chinese (zh)
Inventor
张亮亮
乌力吉
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2014111049A1 publication Critical patent/WO2014111049A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor

Definitions

  • the present application claims priority to Chinese Application No. 201310019263.2, entitled “Cell Optimization Method and Apparatus”, filed on Jan. 18, 2013, the entire disclosure of which is incorporated herein by reference.
  • TECHNICAL FIELD The present invention relates to communications technologies, and in particular, to a cell optimization method and apparatus.
  • UE User Equipment
  • LTE Long Term Evolution
  • the UE communicates with the communication node using parameters and/or security algorithms, and the parameter and/or security algorithm may be a Next Hop Chaining Counter (NCC) and a Next Hop (Next Hop,
  • NCC Next Hop Chaining Counter
  • Next Hop Next Hop
  • the target communication node initiates an internal handover (intra-HO) after the UE handover is completed, and updates the NCC and NH for the UE, thereby performing security isolation, so that the UE uses New NCC and NH.
  • Embodiments of the present invention provide a cell optimization method and apparatus, which are used to solve a problem that a communication party cannot know when there are parameters and/or security algorithms updated when communication between communication nodes.
  • a first aspect of the embodiments of the present invention provides a method for optimizing a region, including:
  • the third communication node receives the first set of parameters and/or security algorithms sent by the first communication node and at least And a second set of parameters and/or security algorithms sent by the at least one second communication node;
  • the third communication node communicates with the first communication node using the first set of parameters and/or security algorithms, and communicates with the second communication node using the second set of parameters and/or security algorithms;
  • the first communication node is a station that performs control plane signaling communication with the third communication node
  • the second communication node is a site that performs user plane data communication with the third communication node
  • the cell in which the first communication node is located is the primary cell of the third communication node, and the cell in which the second communication node is located is the secondary cell of the third communication node.
  • the security algorithm includes at least one of an encryption algorithm, a header compression algorithm, and an integrity protection algorithm
  • the parameters include at least one of a next hop connection counter NCC, a next hop NH, a cell radio network temporary identification C-RNTI, and a length of a packet data convergence layer protocol PDCP sequence number.
  • the third communications node uses the first set of parameters and/or security algorithms and the first communications node Communicating, communicating with the second communication node using the second set of parameters and/or security algorithms, including at least one of the following:
  • the third communication node performs encryption and decryption processing on the information that is communicated with the first communication node and/or the second communication node according to the encryption algorithm;
  • the third communication node performs header compression or decompression compression processing on the information that is communicated with the first communication node and/or the second communication node according to the header compression algorithm;
  • the third communication node performs integrity protection or de-integrity protection processing on the information communicated with the first communication node and/or the second communication node according to the integrity protection algorithm.
  • the third communications node communicates with the first communications node using the first set of parameters and/or security algorithms, using the second The set of parameters and/or security algorithms communicate with the second communication node, including:
  • the third communication node upon receiving the first set of parameters and/or security algorithms, begins to communicate with the first communication node using the first set of parameters and/or security algorithms, the third communication node Receiving, by the second set of parameters and/or security algorithms, starting to communicate with the second communication node using the second set of parameters and/or security algorithms; or
  • the third communication node starts using the first set when transmitting information to the second communication node a parameter and/or security algorithm in communication with the first communication node, using the second set of parameters and/or security algorithms to communicate with the second communication node; or
  • the third communication node When receiving the message sent by the first communication node or the second communication node, the third communication node starts to communicate with the first communication node by using the first set of parameters and/or security algorithm, and uses the second set of parameters. And/or a security algorithm to communicate with the second communication node; or
  • the third communication node when accessing the second communication node, starts communicating with the first communication node using the first set of parameters and/or security algorithms, using the second set of parameters and/or security algorithms and The second communication node performs communication; or
  • the third communication node when initially communicating with the second communication node, begins communicating with the first communication node using the first set of parameters and/or security algorithms, using the second set of parameters and/or security algorithms and The second communication node performs communication; or
  • the third communication node When receiving the first data packet sent by the second communication node, the third communication node starts to communicate with the first communication node by using the first set of parameters and/or security algorithm, and uses the second a set of parameters and/or security algorithms to communicate with the second communication node; or
  • the third communication node starts to communicate with the first communication node by using the first set of parameters and/or security algorithms within a preset time after receiving the first set of parameters and/or security algorithms,
  • the third communication node begins to communicate with the second communication node using the second set of parameters and/or security algorithms within a preset time after or after receiving the second set of parameters and/or security algorithms.
  • a second aspect of the embodiments of the present invention provides a method for optimizing a region, including:
  • the mobility management entity MME receives the request message sent by the first communication node
  • And/or a security algorithm transmitting a corresponding second set of parameters and/or security algorithms to the at least one second communication node;
  • the first set of parameters and/or security algorithms are used by the first communication node to communicate with the third communication node, and the second set of parameters and/or security algorithms are used by the second communication node and the third communication node.
  • the first communication node is a station that performs control plane signaling communication with the third communication node
  • the second communication node is a station that performs user plane data communication with the third communication node; or the cell where the first communication node is located is a primary cell with the third communication node, and the second communication The cell where the node is located is the secondary cell of the third communication node.
  • the security algorithm includes at least one of an encryption algorithm, a header compression algorithm, and an integrity protection algorithm
  • the parameters include at least one of a next hop connection counter NCC, a next hop NH, a cell radio network temporary identification C-RNTI, and a packet data convergence layer protocol PDCP sequence number.
  • a third aspect of the embodiments of the present invention provides a cell optimization method, including:
  • a security algorithm or transmitting the first set of parameters and/or security algorithms to the first communication node, and transmitting the second set of parameters and/or security algorithms to at least one second communication node;
  • the first communications node is a station that performs control plane signaling communication with the third communications node, and the second communications The node is a station that performs user plane data communication with the third communication node; or, the cell where the first communication node is located is a primary cell with the third communication node, and the cell where the second communication node is located is a secondary cell of the third communication node.
  • the first communications node receives a first set of parameters and a security algorithm sent by the MME, and at least one set of second set of parameters and/or security After the algorithm, it also includes:
  • the method further includes:
  • the first communication node transmits the first set of parameters and/or security algorithms to a third communication node.
  • the first communication Receiving, by the node, a first set of parameters and/or security algorithms sent by the MME, and at least one set of second set of parameters and/or security algorithms, or the first communication node receives the first set of parameters sent by the MME and / or after the security algorithm it also includes:
  • the first communication node sends a message to the second communication node or the third communication node to cause the second communication node to start using the second set of parameters and/or security algorithms when receiving the message Communicating with the third communication node, causing the third communication node to start processing the information communicated with the first communication node using the first set of parameters and/or security algorithms when receiving the message, using the second set
  • the parameters and/or security algorithms communicate with the second communication node.
  • the first communications node receives a first set of parameters and/or a security algorithm sent by the MME, and at least one set of the second set of parameters and/or Or the security algorithm, or after the first communication node receives the first set of parameters and/or security algorithms sent by the MME, the method further includes:
  • the first communication node communicates with the third communication node in accordance with the first set of parameters and/or security algorithms.
  • the security algorithm includes an encryption algorithm, a header compression algorithm, and integrity protection At least one algorithm in the algorithm;
  • the parameters include at least one of a next hop connection counter NCC, a next hop NH, a cell radio network temporary identification C-RNTI, and a packet data convergence layer protocol PDCP sequence number.
  • the first communications node and the third communications node according to the first set of parameters and/or security algorithm Communicate, including at least one of the following:
  • the first communication node performs encryption and decryption processing on the information that is communicated with the third communication node according to the encryption algorithm
  • the first communication node performs header compression or decompression processing on the information communicated with the third communication node according to the header compression algorithm
  • the first communication node performs integrity protection or de-integrity protection processing on the information communicated with the third communication node according to the integrity protection algorithm.
  • a fourth aspect of the present invention provides a communication node, where the communication node is a third communication node, including: a receiving module, configured to receive a first set of parameters and/or a security algorithm sent by the first communication node, and at least one second set of parameters and/or security algorithms; or
  • a communication module configured to, by the third communication node, communicate with the first communication node using the first set of parameters and/or security algorithms, and communicate with the second communication node using the second set of parameters and/or security algorithms ;
  • the first communication node is a station that performs control plane signaling communication with the third communication node
  • the second communication node is a site that performs user plane data communication with the third communication node
  • the cell in which the first communication node is located is the primary cell of the third communication node, and the cell in which the second communication node is located is the secondary cell of the third communication node.
  • the security algorithm includes at least one of an encryption algorithm, a header compression algorithm, and an integrity protection algorithm
  • the parameters include at least one of a next hop connection counter NCC, a next hop NH, a cell radio network temporary identification C-RNTI, and a length of a packet data convergence layer protocol PDCP sequence number.
  • the communication module is specifically used in at least one of the following:
  • An integrity protection or de-integrity protection process is performed on the information communicated with the first communication node and/or the second communication node in accordance with the integrity protection algorithm.
  • the communication module is specifically configured to start using the first set when receiving the first set of parameters and/or security algorithms a parameter and/or security algorithm in communication with the first communication node, the third communication node, when receiving the second set of parameters and/or security algorithms, begins using the second set of parameters and/or security algorithms and The second communication node performs communication; or
  • the communication module is specifically configured to start using the information when sending information to the second communication node.
  • the first set of parameters and/or security algorithms are in communication with the first communication node, and communicate with the second communication node using the second set of parameters and/or security algorithms; or
  • the communication module is specifically configured to: when receiving a message sent by the first communication node or the second communication node, start to use the first set of parameters and/or a security algorithm to communicate with the first communication node, and use the second a set of parameters and/or security algorithms to communicate with the second communication node; or
  • the communication module is specifically configured to, when accessing the second communication node, start to communicate with the first communication node by using the first set of parameters and/or security algorithms, and use the second set of parameters and/or security
  • the algorithm communicates with the second communication node
  • the communication module is specifically configured to start to communicate with the first communication node by using the first set of parameters and/or security algorithms when starting communication with the second communication node, using the second set of parameters and/or security
  • the algorithm communicates with the second communication node
  • the communication module is specifically configured to: when receiving the first data packet sent by the second communication node, start to use the first set of parameters and/or a security algorithm to communicate with the first communication node, using the a second set of parameters and/or security algorithms to communicate with the second communication node; or
  • the communication module is specifically configured to start using the first set of parameters and/or security algorithms with the first communication node within a preset time after or after receiving the first set of parameters and/or security algorithms.
  • Communicating, the third communication node starts using the second set of parameters and/or security algorithm with the second communication node within a preset time after or after receiving the second set of parameters and/or security algorithms Communication.
  • a fifth aspect of the embodiments of the present invention provides a mobility management entity, including:
  • a receiving module configured to receive a request message sent by the first communications node
  • a sending module configured to send, according to the request message, a first set of parameters and/or a security algorithm and at least one second set of parameters and/or security algorithms to the first communication node;
  • the first set of parameters and/or security algorithms are used by the first communication node to communicate with the third communication node, and the second set of parameters and/or security algorithms are used by the second communication node and the third communication node.
  • the first communication node is a station that performs control plane signaling communication with the third communication node
  • the second communication node is a site that performs user plane data communication with the third communication node; or
  • the cell in which the first communication node is located is the primary cell of the third communication node, and the cell in which the second communication node is located is the secondary cell of the third communication node.
  • the security algorithm includes at least one of an encryption algorithm, a header compression algorithm, and an integrity protection algorithm
  • the parameters include at least one of a next hop connection counter NCC, a next hop NH, a cell radio network temporary identification C-RNTI, and a packet data convergence layer protocol PDCP sequence number.
  • a sixth aspect of the embodiments of the present invention provides a communication node, where the communication node is a first communication node, including:
  • a sending module configured to send a request message to the mobility management entity MME, to enable the MME to send a first set of parameters and/or a security algorithm and at least one set of second parameters to the first communication node according to the request message And/or a security algorithm, or transmitting the first set of parameters and/or security algorithms to the first communication node, and transmitting the second set of parameters and/or security algorithms to at least one second communication node;
  • a receiving module configured to receive a first set of parameters and/or a security algorithm and a second set of parameters and/or security algorithms sent by the MME;
  • the first communication node is a station that performs control plane signaling communication with the third communication node
  • the second communication node is a site that performs user plane data communication with the third communication node; or, the The cell in which the communication node is located is the primary cell of the third communication node, and the cell in which the second communication node is located is the secondary cell of the third communication node.
  • the sending module is further configured to receive, by the receiving module, a first set of parameters and a security algorithm sent by the MME, and at least one set of second After the set of parameters and/or the security algorithm, transmitting the corresponding second set of parameters and/or security algorithms to at least one of the second communication nodes, and transmitting the first set of parameters and/or security to the third communication node An algorithm and the at least one set of second set of parameters and/or security algorithms.
  • the sending module is further configured to: after the receiving module receives the first set of parameters and/or security algorithms sent by the MME, The third communication node transmits the first set of parameters and/or security algorithms.
  • the sending module is further configured to send a message to the second communications node or the third communications node, so that the second communications section Pointing, upon receiving the message, initiating communication with the third communication node using the second set of parameters and/or security algorithms, causing the third communication node to begin using the first set of parameters and upon receiving the message
  • the security algorithm communicates with the first communication node and communicates with the second communication node using the second set of parameters and/or security algorithms.
  • the communications node further includes a communications module, configured to communicate with the third communications node according to the first set of parameters and/or security algorithms.
  • the security algorithm includes an encryption algorithm, a header compression algorithm, and integrity protection At least one algorithm in the algorithm;
  • the parameters include at least one of a next hop connection counter NCC, a next hop NH, a cell radio network temporary identification C-RNTI, and a packet data convergence layer protocol PDCP sequence number.
  • the communication module is specifically used in at least one of the following:
  • the third communications node may receive the first set of parameters and/or the security algorithm and the second set of parameters and/or security algorithms sent by the first communications node, or receive the first sent by the first communications node. a set of parameters and/or security algorithms and a second set of parameters and/or security algorithms sent by the second communication node, wherein the third communication node uses the first set of parameters and/or security algorithms to communicate with the first communication node, using The second set of parameters and/or security algorithms communicate with the second communication node to enable communication with the third communication node when the MME wants to update parameters and/or security algorithms used by the third communication node Both the communication node and the third communication node acquire the updated parameters in time, and the communication node that communicates with the third communication node and the third communication node are prevented from processing the information in the communication process.
  • Embodiment 1 is a schematic flowchart of Embodiment 1 of a cell optimization method according to the present invention
  • Embodiment 2 is a schematic flowchart of Embodiment 2 of a cell optimization method according to the present invention
  • Embodiment 3 is a schematic flowchart of Embodiment 3 of a cell optimization method according to the present invention.
  • Embodiment 4 is a schematic flowchart of Embodiment 4 of a cell optimization method according to the present invention.
  • FIG. 5 is a schematic flowchart of Embodiment 5 of a cell optimization method according to the present invention.
  • Embodiment 6 is a schematic flowchart of Embodiment 6 of a cell optimization method according to the present invention.
  • FIG. 7 is a schematic structural diagram of Embodiment 1 of a communication node according to the present invention.
  • FIG. 8 is a schematic structural diagram of Embodiment 1 of a mobility management entity according to the present invention.
  • FIG. 9 is a schematic structural diagram of Embodiment 2 of a communication node according to the present invention.
  • FIG. 10 is a schematic structural diagram of Embodiment 3 of a communication node according to the present invention.
  • FIG. 11 is a schematic structural diagram of Embodiment 4 of a communication node according to the present invention.
  • FIG. 1 is a schematic flowchart of Embodiment 1 of a cell optimization method according to the present invention. As shown in FIG. 1, the method includes:
  • the third communication node receives the first set of parameters and/or security algorithms sent by the first communication node and at least one set of second sets of parameters and/or security algorithms. When there are multiple second communication nodes, each second communication node will have a corresponding second set of parameters and/or security algorithms.
  • the third communication node receives the first set of parameters and/or security algorithms sent by the first communication node and the second set of parameters and/or security algorithms sent by the at least one second communication node. It should be noted, When there are multiple second communication nodes, the third communication node may receive corresponding parameters and/or security algorithms sent by each second communication node, and the second set of parameters and/or security algorithms sent by different second communication nodes may They are all different.
  • S10a and S10b are alternatively executed according to different situations.
  • the parameter and/or security algorithm sent by the first communication node is sent by the MME to the first communication node
  • the parameter and/or security algorithm sent by the second communication node may be directly sent by the MME to the first
  • the communication node may also be sent by the MME to the first communication node and then forwarded by the first communication node to the second communication node.
  • the third communication node communicates with the first communication node by using the first set of parameters and/or security algorithms, and communicates with the second communication node by using the second set of parameters and/or security algorithms; these parameters and/or security
  • the algorithm can be used for encryption and decryption processing, header compression or decompression processing, integrity protection or de-integrity protection processing.
  • the UE communicates with each of the second communication nodes using a second set of parameters and/or security algorithms corresponding to the respective second communication nodes.
  • the embodiment of the present invention is mainly directed to the separation of the user plane and the control plane of the third communication node, where the first communication node is a station that performs control plane signaling communication with the third communication node, and the second communication node is The third communication node performs the user plane data communication; or, it can be understood that the cell where the first communication node is located is the primary cell of the third communication node, and the cell where the second communication node is located is the third communication node. Secondary cell.
  • the third communications node may receive the first set of parameters and/or security algorithms and the second set of parameters and/or security algorithms sent by the first communications node, or receive the first sent by the first communications node. a set of parameters and/or security algorithms and a second set of parameters and/or security algorithms sent by the second communication node, the third communication node then communicating with the first communication node using the first set of parameters and/or security algorithms, using the The second set of parameters and/or security algorithms communicate with the second communication node to enable communication with the third communication node when the MME wants to update parameters and/or security algorithms used by the third communication node Both the node and the third communication node acquire updated parameters in time, avoiding that the communication node communicating with the third communication node and the third communication node cannot process the information in the communication process.
  • the foregoing security algorithm includes at least one of a Ciphering Algorithm, a header compression algorithm, and an integrity protection algorithm; specifically, the encryption algorithm may be eeaO, Eeal, eea2, eea3-v11xy, etc.; integrity protection algorithm, which can be eia0-v920, eial, eia2, eia3-v1 1xy, etc.; header compression algorithm is based on Robust Header Compression (ROHC) architecture (framework) Header compression or decompression compression can be performed using the algorithm and corresponding parameters.
  • ROHC Robust Header Compression
  • the type of the algorithm is defined by the Profile Identifier. For example, 0x0002 represents an algorithm identifier.
  • the specific header compression parameters can be Profile Identifier, MAX_CID, LARGE_CIDS, FEEDBACK_FOR. Etc., but not limited to this.
  • the above parameters include the length of the NCC, NH, Cell Radio Network Temporary Identifier (C-RNTI), Packet Data Convergence Protocol (PDCP) serial number (PDCP Sequence Number length). At least one of the parameters of the inbits, which are called PDCP-SN-Size, but not limited thereto; wherein, the C-RNTI is a flag in the cell when the UE is in the connected state, and is used for the base station to pass the C- The RNTI schedules the UE, and the UE identifies and receives its own data through the C-RNTI.
  • the third communication node communicates with the first communication node using the first set of parameters and/or security algorithms, and communicates with the second communication node using the second set of parameters and/or security algorithms, including the following At least one:
  • the third communication node performs encryption and decryption processing on the information communicated with the first communication node and/or the second communication node according to the above encryption algorithm; that is, the third communication node is configured according to the first set of parameters and/or security algorithms.
  • the encryption algorithm performs encryption and decryption processing on the information communicated with the first communication node, and performs encryption and decryption processing on the information communicated with the second communication node according to the encryption algorithm in the second set of parameters and/or the security algorithm.
  • the above-mentioned station may use a parameter (e.g., NCC, NH, or PDCP-SN-Size, etc.) and/or a security algorithm to derive a key for encryption or decryption of data.
  • a parameter e.g., NCC, NH, or PDCP-SN-Size, etc.
  • the third communication node performs header compression or decompression processing on the information communicated with the first communication node and/or the second communication node according to the header compression algorithm; that is, the third communication node performs the first set of parameters according to the above Or a header compression algorithm in the security algorithm performs header compression or decompression compression processing on the information communicated with the first communication node, and the third communication node pairs the second set of parameters and/or the header compression algorithm in the security algorithm.
  • the information communicated by the second communication node is subjected to header compression or decompression compression processing.
  • the third communication node is associated with the first communication node and/or the second communication according to the integrity protection algorithm described above
  • the information communicated by the node performs integrity protection or de-integrity protection processing; that is, the third communication node performs information communication with the first communication node according to the integrity protection algorithm in the first set of parameters and/or the security algorithm. Integrity protection or de-integrity protection processing, the third communication node performs integrity protection or de-integrity protection on the information communicated with the second communication node according to the integrity protection algorithm in the second set of parameters and/or the security algorithm deal with.
  • the stations shown in the embodiments of the present invention may be replaced by base stations or cells.
  • the embodiment of the present invention may be: when the control plane of the third communication node switches to the first communication node or after the handover, the user plane of the third communication node Still at the second communication node, or when the user plane of the third communication node switches to the second communication node or after the handover, the control plane of the third communication node is still at the first communication node, ie, the second communication node is the same as the above a third communication node performs base station data communication, the first communication node is a base station that performs control plane signaling communication with the third communication node; or the cell where the first communication node is located is a primary cell of the third communication node
  • the second communication node is a secondary cell of the foregoing third communication node; more specifically, the embodiment is applicable to multiple specific scenarios, for example: scenario 1, the control plane of the third communication
  • the control plane of the third communication node is switched from the third base station to the first communication node, and the user plane of the third communication node is maintained at the second communication node; the third station may be in addition to the second communication node, Any one of the first communication nodes; specifically, the third communication node may switch from the fourth communication node (taking the macro base station Macro eNBI as an example) to the target first communication node (taking the macro base station Macro eNB 2 as an example)
  • the data plane of the third communication node is maintained at the second communication node (taking the micro base station Picol as an example).
  • the control plane of the third communication node is maintained at the first communication node, and the user plane of the third communication node is switched from the fourth communication node to the second communication node; likewise, the fourth communication node may be in addition to the foregoing a second communication node, any one of the first communication nodes; specifically, the control plane of the third communication node may be maintained at the first communication node (taking the macro base station eNB as an example), and the user plane of the third communication node is transmitted from The fourth communication node (taking the micro base station Pico2 as an example) is replaced with the second communication node (taking Picol as an example).
  • the user plane of the third communication node switches from the first communication node to the second communication node, and the control plane of the third communication node remains at the first communication node.
  • the user plane and the control plane of the third communication node may be in the first communication node (taking the macro base station eNB as an example), and the user plane of the third communication node is switched to the second communication node (taking Picol as an example).
  • control plane and the user plane of the third communication node may be switched between different sites.
  • the implementation scenario of the embodiment of the present invention may be in the handover process, or In the non-handover process, as long as the MME wants to update the parameters and/or security algorithms used by the third communication node, the updated parameters and/or security algorithms are sent to the corresponding site, and then sent by the site to the third communication node.
  • the first communication node, the second communication node, and the third communication node can synchronously use the updated parameters and/or security algorithms, and also facilitate the first communication node to use the first set of parameters and/or security algorithms and the third
  • the communication node communicates and the second communication node communicates with the third communication node using the second set of parameters and/or security algorithms described above.
  • the information that the station communicates with the third communication node may be data or may also be signaling, such as system messages, physical layer signaling, information on the control channel, and the like.
  • the first communication node or the second communication node mentioned in the embodiment of the present invention may be a wireless communication node, and the communication node may be various types of base stations, a macro base station (Macro eNB), and a pico base station. (Micro eNB), a micro base station (Pico eNB), a home base station HeNB, a small cell eNB, a relay station, etc., are not limited herein.
  • the first communication node or the second communication node may also be a UE. Specifically, the UE can support a Device to Device (D2D) function to support end-to-end communication between user equipments.
  • D2D Device to Device
  • the third communication node may be a wireless communication node, and the communication node may be various types of base stations, a macro base station (Macro eNB), a pico base station (Micro eNB), a micro base station (Pico eNB), and a home base station.
  • the HeNB, the small cell eNB, the relay station, and the like are not limited herein.
  • the third communication node can be a UE.
  • the third communication node can support the Device-to-Devicc function to support end-to-end communication between user equipments.
  • the third communication node takes the user equipment as an example to illustrate the content of the invention.
  • the scenario in which the control plane of the third communication node is separated from the user plane may be a scenario in which the third communication node supports carrier aggregation, and specifically refers to the frequency of the cell 1 in which the first communication node is located, and second.
  • the cell 2 where the communication node is located uses the frequency f2 and simultaneously provides the third communication node.
  • Service For example, the cell 1 serving the third communication node of the first communication node may be referred to as a primary cell, and the cell 2 serving the terminal by the second communication node may be referred to as a secondary cell.
  • the first communication node may be a macro base station eN B and the second communication node may be a micro base station Pico.
  • a station that provides a control plane service for the third communication node that is, the first communication node may serve as a primary station of the third communication node, and the primary station usually adopts a low frequency band to transmit control plane signaling, and optionally may carry the third communication node.
  • the radio resource control (Radio Resource Control, RRC) connection of the third communication node is established at the primary site; the following is the site/cell serving the control plane of the third communication node,
  • the site/cell of the user plane service of the third communication node is defined in detail:
  • the station that provides the control plane service for the third communication node includes: a site corresponding to the cell to which the control plane transmits, a downlink transmission site that can send control signaling for the third communication node; or a site corresponding to the macro base station or the macro cell; or a site corresponding to the primary cell; or a site corresponding to the serving cell of the third communication node; a site providing a Signaling Radio Bearer (SRB) for the third communication node; and a third communication node The site where the RRC connection is established.
  • SRB Signaling Radio Bearer
  • the cell that provides the control plane service or the control plane transmission for the third communication node includes: a primary cell; or a cell that sends control signaling for the third communication node; or sends control signaling for the third communication node. a cell corresponding to the downlink transmission point; or a cell corresponding to the macro base station; or a cell providing non-access stratum (NAS) mobility information for the third communication node during RRC connection setup or re-establishment or handover, or
  • NAS non-access stratum
  • the third communication node is provided with a secure input cell; the third communication node is provided with the SRB transported cell.
  • the cell that provides security input to the third communication node during the RRC connection setup or handover process is also the primary cell.
  • the secondary cell is a cell different from the primary cell.
  • the control signaling may include at least one of the following: information on the hybrid automatic repeat indication channel, information on the control information format indication channel, information on the control channel, system message, physical layer signaling, medium access control (Medium) Access Control, the so-called MAC) layer message, RRC layer message, S RBs corresponding information.
  • the station that provides the control plane service by the third communication node may also be responsible for the transmission of the DRBs or part of the SRBs on the basis of the above definition.
  • the site providing the user plane service for the third communication node includes: a secondary cell
  • SRB Signaling Radio Bearer
  • PDSCH Physical Downlink Shared Channel
  • the cell that provides the user plane service or the user plane transmission for the third communication node includes: a secondary cell; or a cell that provides data transmission for the third communication node of the user; and a cell that provides DRB transmission for the third communication node of the user;
  • the third communication node is provided with a cell that transmits information on the PDSCH.
  • the station providing the control plane transmission for the third communication node is responsible for the transmission of the SRBs; the station providing the user plane transmission for the third communication node is responsible for the transmission of the DRBs.
  • the station providing the control plane transmission for the third communication node is responsible for the transmission of SRB0 and SRB1; the station providing the user plane transmission for the third communication node is responsible for the transmission of SRB2 and DRBs, wherein the above SRBs are divided into SRB0 , SRB1, SRB2.
  • the SRBO is used to transmit an RRC message, and is transmitted on a Common Control Channel (CCT); the SRB1 is used to transmit an RRC message (and may also include a piggybacked N AS message), before the establishment of the SRB2 bearer, Has a higher priority than SRB2.
  • SRB2 is transmitted on the Dedicated Control Channel (DCCH) to transmit NAS messages, which has lower priority than SRB1, and SRB2 is always configured to be transmitted on the DCCH after the security mode is activated.
  • DCCH Dedicated Control Channel
  • the station providing the control plane transmission for the third communication node is responsible for the transmission of SRB0 and SRB1, and is also responsible for the transmission of part of the DRBs; the station providing the user plane transmission for the third communication node is responsible for SRB2 and part of the DRBs. transmission.
  • the station providing the control plane transmission for the third communication node is responsible for the transmission of the SRBs, and is also responsible for the transmission of the partial DRBs; the station providing the user plane transmission for the third communication node is responsible for the transmission of the partial DRBs.
  • the third communication node uses the first set of parameters and/or security algorithm and the first pass
  • the signaling node communicates and communicates with the second communication node using a second set of parameters and/or security algorithms.
  • the third communication node starts to communicate with the first communication node using the first set of parameters and/or security algorithms when receiving the first set of parameters and/or security algorithms, and the third communication node receives the first
  • the second set of parameters and/or security algorithms are used to communicate with the second communication node; that is, the third communication node is put into use as soon as it receives the parameters and/or security algorithms.
  • the third communication node when transmitting information to the second communication node, starts communicating with the first communication node using the first set of parameters and/or security algorithms, using the second set of parameters and/or security algorithms and the second The communication node performs communication; the information sent by the third communication node to the second communication node may be any information.
  • the third communication node when receiving the message sent by the first communication node or the second communication node, the third communication node starts to communicate with the first communication node by using the first set of parameters and/or security algorithms, using the second set of parameters and/or Or the security algorithm communicates with the second communication node;
  • the message sent by the first communication node or the second communication node received by the third communication node may be an indication message specifically for instructing to start using the new parameter and/or the security algorithm, Or any message, for example, the third communication node may pre-arrange to start to communicate with the first communication node by using the first set of parameters and/or security algorithms when receiving a certain message, using the second set of parameters.
  • a security algorithm communicates with the second communication node.
  • the third communication node accesses the second communication node, starts to communicate with the first communication node using the first set of parameters and/or security algorithms, using the second set of parameters and/or security algorithm and the second
  • the communication node performs communication; specifically, after receiving the parameter and/or the security algorithm, the third communication node is temporarily not used, and the third communication node starts to use the received parameter when accessing the second communication node. And / or security algorithms.
  • the third communication node begins to communicate with the first communication node using the first set of parameters and/or security algorithms when communicating with the second communication node, using the second set of parameters and/or security algorithms and the second The communication node performs communication; specifically, after receiving the parameter and/or the security algorithm, the third communication node is temporarily not used, and when the third communication node starts to communicate with the second communication node, starts to use the received Parameters and / or security algorithms.
  • the third communication node when the third communication node receives the first data packet sent by the second communication node, Communicating with the first communication node using the first set of parameters and/or security algorithms described above, and communicating with the second communication node using the second set of parameters and/or security algorithms; specifically, there are two cases, one After receiving the above parameters and/or security algorithms, the third communication node starts to use the above parameters and/or security algorithm when receiving the first data packet sent by the second communication node; The communication node receives the first data packet sent by the second communication node, and does not process it. After receiving the above parameters and/or the security algorithm, the communication node immediately starts using the parameter and/or the security algorithm for the first data packet. Process it.
  • the third communication node starts to use the first set of parameters after a preset time or after receiving the first set of parameters and/or security algorithms. And/or a security algorithm in communication with the first communication node, the third communication node using the second set of parameters and/or security within a preset time after or after receiving the second set of parameters and/or security algorithms
  • the algorithm communicates with the second communication node; in the specific implementation process, the timer can be used to implement.
  • the specific implementation process may not be limited to the above cases.
  • the third communications node may receive the first set of parameters and/or security algorithms and the second set of parameters and/or security algorithms sent by the first communications node, or receive the first sent by the first communications node. a set of parameters and/or security algorithms and a second set of parameters and/or security algorithms sent by the second communication node, the third communication node then communicating with the first communication node using the first set of parameters and/or security algorithms, using the The second set of parameters and/or security algorithms communicate with the second communication node, thereby enabling the MME to update the third communication node regardless of whether during the handover of the control plane and the user plane of the third communication node or during the handover process
  • the base station and the third communication node that communicate with the third communication node can acquire updated parameters and/or security algorithms in time to avoid the site communicating with the third communication node. And the third communication node cannot process the information in the communication process.
  • FIG. 2 is a schematic flowchart of a second embodiment of a cell optimization method according to the present invention.
  • the method is implemented as an MME. As shown in FIG. 2, the method includes:
  • the MME receives the request message sent by the first communications node.
  • the first communications node is the first communications node shown in the embodiment of FIG. 1.
  • the request message may include at least one of the following messages: the third communication node S1 interface identity code (ID) of the second communication node is used to identify the third corresponding to the S1 interface of the second communication node.
  • ID the third communication node S1 interface identity code
  • a communication node a third communication node S1 interface ID of the MME, used to identify a third communication node corresponding to the S1 interface of the MME;
  • the identifier of the node the protocol (Internet Protocol, IP address) of the communication between the networks of the second communication node; the identifier of the cell where the second communication node is located, for example, E-UTRAN-CGI; indication information, To indicate that the MME needs to allocate two sets of parameters and/or security algorithms, namely the first set of parameters and/or security algorithms and the second set of parameters and/or security algorithms described above.
  • S201 may perform selection according to a specific scenario. For example, in the non-handover process, when the MME actively requests the third communication node to update the used parameters and/or security algorithms, the step is not required to be performed.
  • the MME sends a first set of parameters and/or security algorithms and at least one set of second sets of parameters and/or security algorithms to the first communication node according to the request message.
  • the MME sends a first set of parameters and/or security algorithms and at least one set of second sets of parameters and/or security algorithms to the first communication node according to the request message.
  • the MME sends a first set of parameters and/or security algorithms to the first communication node according to the request message, and sends a corresponding second set of parameters and/or security algorithms to the at least one second communication node.
  • the MME sends a corresponding second set of parameters and/or security algorithms to each of the second communication nodes.
  • one of the above S202a and S202b is performed.
  • the first set of parameters and/or security algorithms are used by the first communication node to communicate with the third communication node
  • the second set of parameters and/or security algorithms are used for the second communication node and the third communication node.
  • the first communication node is a station that performs control plane signaling communication with the third communication node
  • the second communication node is a station that performs user plane data communication with the third communication node; or, the cell where the first communication node is located is And the primary cell of the third communication node, the cell where the second communication node is located is the secondary cell of the third communication node.
  • the MME may actively update parameters and/or security algorithms used by the third communication node, and may also send parameters and/or security algorithms to the first communication node and the second communication node according to the request message of the first communication node. And further forwarding to the third communication node, so that the first communication node, the second communication node and the third communication node can be informed of the corresponding parameters and/or security after updating the parameters and/or the security algorithm in any case.
  • the algorithm prevents the first communication node, the second communication node, and the third communication node from processing information for communication between them.
  • FIG. 3 is a schematic flowchart of Embodiment 3 of a cell optimization method according to the present invention. As shown in FIG. 3, the method includes:
  • the first communications node sends a request message to the MME, so that the MME is configured according to the request. Transmitting, by the first communication node, a first set of parameters and/or security algorithms and at least one set of second sets of parameters and/or security algorithms, or sending a first set of parameters and/or security algorithms to the first communication node, And transmitting a second set of parameters and/or security algorithms to the at least one second communication node.
  • the request message may include at least one of the following messages: the third communication node S1 interface identity code (ID) of the second communication node is used to identify the third corresponding to the S1 interface of the second communication node. a communication node; a third communication node S1 interface ID of the MME, used to identify a third communication node corresponding to the S1 interface of the MME; an identifier of the second communication node; and an interconnection between the networks of the second communication node Protocol (Internet Protocol) address information; an identifier of a cell in which the second communication node is located, for example, E-UTRAN-CGI; indication information, indicating that the MME needs to allocate two sets of parameters and/or security algorithms, that is, the foregoing The first set of parameters and/or security algorithms and the second set of parameters and/or security algorithms.
  • ID third communication node S1 interface identity code
  • the first communications node receives the first set of parameters and/or security algorithms sent by the MME, and at least one set of second set of parameters and/or security algorithms; when there are multiple second communications nodes, the MME needs to The second communication node assigns a corresponding second set of parameters and/or security algorithms.
  • the first communications node receives the first set of parameters and/or security algorithms sent by the MME, and performs the next execution in S302a or S302b according to a specific scenario.
  • the first communication node is a station that performs control plane signaling communication with the third communication node
  • the second communication node is a site that performs user plane data communication with the third communication node; or, it may be understood that the first communication node
  • the cell in which the communication node is located is the primary cell of the third communication node
  • the cell in which the second communication node is located is the secondary cell of the third communication node.
  • the first communication node may request the MME to send a parameter and/or a security algorithm, so that the MME sends the parameter and/or the security algorithm to the first communication node and the second communication node in time during the handover process. And causing the first communication node and the second communication node to forward the updated parameter and/or the security algorithm to the third communication node, preventing the first communication node, the second communication node, and the third communication node from being unable to process the communication when communicating Information between communications.
  • the first communication node receives the first set of parameters and the security algorithm sent by the MME and at least one set of the second set of parameters and/or security algorithms
  • the first communication node is at least A second communication node sends the corresponding second set of parameters and/or security algorithms, and sends a first set of parameters and/or security algorithms and the at least one set of second sets of parameters and/or security algorithms to the third communication node, So that each of the second communication node and the third communication node can use the updated Parameters and/or security algorithms communicate.
  • the first communication node After the first communication node receives the first set of parameters and/or security algorithms sent by the MME, the first communication node sends the first set of parameters and/or security algorithms to the third communication node.
  • the first communication node receives the first set of parameters and/or security algorithms and the second set of parameters and/or security algorithms sent by the MME, or the first communication node receives the first set of parameters sent by the MME. And/or after the security algorithm, the first communication node sends a message to the second communication node or the third communication node, so that the second communication node starts to use the second set of parameters and/or when receiving the message.
  • the security algorithm communicates with the third communication node to cause the third communication node to begin communicating with the first communication node using the first set of parameters and/or security algorithms upon receiving the message, using the second set of parameters And/or a security algorithm communicates with the second communication node.
  • the first communication node communicates with the third communication node according to the first set of parameters and/or security algorithms.
  • the foregoing security algorithm includes at least one of an encryption algorithm, a header compression algorithm, and an integrity protection algorithm; and the foregoing parameters include at least one of lengths of NCC, NH, C-RNTK PDCP sequence numbers.
  • the first communication node communicates with the third communication node according to the first set of parameters and/or security algorithms, and may specifically be at least one of the following processes:
  • the first communication node performs encryption and decryption processing on the information communicated with the third communication node according to the encryption algorithm, that is, the first communication node performs the third communication with the encryption algorithm according to the first set of parameters and/or the security algorithm.
  • the information that the node communicates is encrypted and decrypted.
  • the first communication node performs header compression or decompression compression processing on the information communicated with the third communication node according to the header compression algorithm, that is, the first communication node performs header compression according to the first set of parameters and/or security algorithms.
  • the algorithm performs header compression or decompression processing on the information communicated with the third communication node.
  • the first communication node performs integrity protection or de-integrity protection processing on the information communicated with the third communication node according to the integrity protection algorithm, that is, the first communication node is configured according to the first set of parameters and/or security algorithms.
  • the integrity protection algorithm performs integrity protection or de-integrity protection processing on the information communicated with the third communication node.
  • an execution body of the method is the foregoing second communication node, and the method includes: 5401.
  • the second communication node receives a parameter and/or a security algorithm sent by the first communication node or the MME, where the parameter and/or the security algorithm is the second set of parameters and/or the security algorithm.
  • the parameters and/or security algorithms are used to perform communication security related operations, such as but not limited to encryption and integrity protection, on the communicated data or information.
  • the security algorithm may be an encryption algorithm, such as eeaO, eeal, eea2, eea3-v1 1xy, etc., or may be an integrity protection algorithm, such as eia0-v920, eial, eia2, eia3-v1 1xy, etc., or may be a header.
  • the compression algorithm, the header compression algorithm is based on the ROHC architecture, and the header compression or decompression can be performed by using the algorithm and corresponding parameters. There are many specific header compression algorithms.
  • the type of the algorithm is defined by the identifier of the bucket. For example, 0x0002 indicates an algorithm identifier.
  • the specific header compression parameters may include Profile Identifier, MAX_CID, LARGE_CIDS, FEEDBACK-FOR, etc. However, it is not limited to this; the parameters may be, NCC, NH, PDCP layer serial number length, C-RNTI, etc., but not limited thereto.
  • the C-RNTI is an indication in the cell when the third communication node is in the connected state, and is used by the base station to conveniently schedule the third communication node by using the C-RNTI.
  • the second communication node communicates with the third communication node according to the parameter and/or the security algorithm. Specifically, it may be at least one of the following processes:
  • the second communication node performs encryption and decryption processing on the information that the third communication node performs communication according to the encryption algorithm
  • the second communication node performs header compression or decompression processing on the information communicated with the third communication node according to the header compression algorithm
  • the second communication node performs integrity protection or solution integrity protection on the information communicated with the third communication node according to the integrity protection algorithm.
  • the second communication node communicates with the third communication node according to the parameter and/or the security algorithm.
  • the parameter and/or the security algorithm there are various situations, as follows:
  • the second communication node starts to communicate with the third communication node using the above parameters and/or security algorithm when receiving the above parameters and/or security algorithms; it may be that the second communication node receives new parameters and/or The security algorithm starts using the above parameters and/or security algorithms directly.
  • the second communication node after receiving the parameter and/or the security algorithm, the second communication node does not use, and after receiving the message sent by the first communication node or the third communication node, starts using the parameter and/or the security algorithm.
  • Communicating with the third communication node the message may be specific for indicating the second
  • the communication node uses the above-mentioned parameter and/or the indication message of the security algorithm, and may also be any message sent by the first communication node or the third communication node to the second communication node; for example, the second communication node may be pre-agreed A certain message is used as an indication message or an activation message.
  • the first communication node may send a third communication node context release message to the second communication node, and the message is used to indicate the first
  • the second communication node releases the context of the third communication node, where the message is agreed as an indication message, that is, when the message is received, it is equivalent to receiving the indication message, and the second communication node starts to use the above parameters and/or security algorithm, but does not To this end, it may be other messages; after receiving the message, it means that the second communication node uses this as a starting point to start using parameters and/or security algorithms to process the information communicated with the third communication node.
  • a message sent by the first communication node or the third communication node to the second communication node may carry an indication information, for example, one of the bits is used to indicate whether to start using the above parameters and/or security algorithm;
  • the third communication node may send the message after accessing the first communication node, and the first communication node may send the parameter and/or the security algorithm to the second communication node or send the parameter and/or Or sending the above information to the second communication node after the security algorithm;
  • the second communication node may start to communicate with the third communication node at the same time as or after receiving the message, and start to communicate with the third communication node, which may be sent to the third communication node.
  • the message or the message sent by the third communication node is received.
  • the second communication node may start communicating with the third communication node using the parameters and/or security algorithms described above when initially communicating with the third communication node.
  • the second communication node starts communicating with the third communication node using the parameters and/or security algorithms.
  • the uplink synchronization means that, in the same cell, uplink signals sent by users at different locations in the same time slot arrive at the base station receiving antenna at the same time, that is, signals of different users in the same time slot arrive at the base station receiving antenna to maintain synchronization.
  • the third communication node Before the uplink synchronization is established, the third communication node must listen to the synchronization signal of the cell to obtain downlink synchronization, and the subsequent third communication node adjusts the timing offset to achieve uplink synchronization.
  • the second communication node may receive the first data sent by the first communication node.
  • communication with the third communication node is started using the parameters and/or security algorithms.
  • the second communication node starts to use the parameter and when receiving the first data packet sent by the first communication node.
  • a security algorithm in another case, the second communication node receives the first data packet sent by the first communication node, does not process it, and immediately starts using the parameter after receiving the above parameters and/or security algorithm.
  • a security algorithm processes the first packet described above.
  • the second communication node may also start to communicate with the third communication node by using the parameter and/or the security algorithm within a preset time after receiving the parameter and/or the security algorithm; , can be implemented by timer timing.
  • the second communication node may send an indication message for instructing to start using the above parameter and/or security algorithm to the third communication node, and start using the above parameter and/or security algorithm and the third when sending the indication message.
  • the communication node performs communication.
  • the parameter and/or the security algorithm may also be used after receiving the confirmation message that the third communication node replies to the indication message.
  • the foregoing indication message may also have multiple understanding manners, which is similar to the foregoing second case, and details are not described herein again.
  • the second communication node needs to decrypt or unpack the information sent by the third communication node.
  • the compression or de-integrity protection processing is performed, the original parameters and/or security algorithms are first used. If the decryption or de-head compression or the de-integrity protection fails, the above parameters and/or security algorithms are used to communicate with the third communication node. .
  • the specific implementation process may not be limited to the above cases.
  • FIG. 5 is a schematic flowchart of Embodiment 5 of a cell optimization method according to the present invention.
  • the MME sends a first set of parameters and/or security algorithms and at least one set to the first communication node.
  • the second set of parameters and/or security algorithm in this case, the specific interaction process of the MME, the first communication node, the second communication node, and the third communication node, as shown in FIG. 5, wherein the second communication node represents the at least one Any one of the second communication nodes, the method comprising:
  • the first communication node sends a request message to the MME.
  • This step is optional. During the handover process, this step can be performed. If the MME actively updates parameters and/or security algorithms, it is not necessary to perform this step.
  • the MME sends the first set of parameters and/or security to the first communications node according to the request message. Algorithm and second set of parameters and/or security algorithms.
  • the first communication node sends the second set of parameters and/or security algorithms to the second communication node.
  • the first communications node sends the first set of parameters and/or security algorithms and the second set of parameters and/or security algorithms to the third communications node.
  • S503 and S504 can be executed simultaneously.
  • the third communication node starts to use the first set of parameters and/or security algorithm and the second set of parameters and/or security algorithms, that is, the third communication node starts to use the first set of parameters and/or security algorithm pairs and the first
  • the communication node communicates with the second communication node using the second set of parameters and/or security algorithms described above.
  • the first communications node begins to use the first set of parameters and/or security algorithms described above, that is, the first communications node begins to communicate with the third communications node using the first set of parameters and/or security algorithms.
  • the second communication node begins to use the second set of parameters and/or security algorithms described above, that is, the second communication node begins to communicate with the third communication node using the second set of parameters and/or security algorithms.
  • S505, S506, and S507 can be executed simultaneously.
  • FIG. 6 is a schematic flowchart of Embodiment 6 of a cell optimization method according to the present invention.
  • the MME sends a first set of parameters and/or security algorithms to the first communication node, to at least one a specific interaction process between the MME, the first communication node, the second communication node, and the third communication node, where the second communication node sends a corresponding second set of parameters and/or security algorithms, as shown in FIG.
  • the two communication nodes represent any one of the at least one second communication node, the method comprising:
  • the first communication node sends a request message to the MME.
  • This step is optional. During the handover process, this step can be performed. If the MME actively updates parameters and/or security algorithms, it is not necessary to perform this step.
  • the MME sends a first set of parameters and/or security algorithms to the first communications node according to the request message.
  • the MME sends a second set of parameters and/or security algorithms to the second communications node according to the request message.
  • S602 and S603 can be performed simultaneously.
  • the first communications node sends a first set of parameters and/or security algorithms to the third communications node.
  • the second communication node sends a second set of parameters and/or security algorithms to the third communication node.
  • the third communication node starts to use the first set of parameters and/or security algorithm and the second set of parameters and/or security algorithms, that is, the third communication node starts to use the first set of parameters and/or the security algorithm pair and the first
  • the communication node communicates with the second communication node using the second set of parameters and/or security algorithms described above.
  • the first communication node starts to use the first set of parameters and/or security algorithms, that is, the first communication node starts to communicate with the third communication node by using the first set of parameters and/or security algorithms.
  • the second communications node begins to use the second set of parameters and/or security algorithms described above, that is, the second communications node begins to communicate with the third communications node using the second set of parameters and/or security algorithms.
  • S606, S607, S608 can be executed simultaneously.
  • the third communications node may receive the first set of parameters and/or security algorithms and the second set of parameters and/or security algorithms sent by the first communications node, or receive the first sent by the first communications node. a set of parameters and/or security algorithms and a second set of parameters and/or security algorithms sent by the second communication node, the third communication node then communicating with the first communication node using the first set of parameters and/or security algorithms, using the The second set of parameters and/or security algorithms communicate with the second communication node, thereby enabling the MME to update the third communication node regardless of whether during the handover of the control plane and the user plane of the third communication node or during the handover process
  • the base station and the third communication node that communicate with the third communication node can acquire updated parameters and/or security algorithms in time to avoid the site communicating with the third communication node. And the third communication node cannot process the information in the communication process.
  • FIG. 7 is a schematic structural diagram of Embodiment 1 of a communication node according to the present invention.
  • the communication node is the foregoing third communication node.
  • the communication node includes: a receiving module 701 and a communication module 702, where:
  • the receiving module 701 is configured to receive a first set of parameters and/or a security algorithm sent by the first communications node, and at least one set of second set of parameters and/or security algorithms; or receive the first set sent by the first communications node a parameter and/or security algorithm and a second set of parameters and/or transmitted by at least one second communication node Security algorithm
  • a communication module 702 configured to, by the third communications node, communicate with the first communications node using the first set of parameters and/or security algorithms, and perform the second set of parameters and/or security algorithms with the second communications node Communication
  • the first communication node is a station that performs control plane signaling communication with the third communication node
  • the second communication node is a site that performs user plane data communication with the third communication node; or,
  • the cell in which the first communication node is located is the primary cell of the third communication node, and the cell in which the second communication node is located is the secondary cell of the third communication node.
  • the third communications node may receive the first set of parameters and/or security algorithms and the second set of parameters and/or security algorithms sent by the first communications node, or receive the first sent by the first communications node. a set of parameters and/or security algorithms and a second set of parameters and/or security algorithms sent by the second communication node, the third communication node then communicating with the first communication node using the first set of parameters and/or security algorithms, using the The second set of parameters and/or security algorithms communicate with the second communication node to enable communication with the third communication node when the MME wants to update parameters and/or security algorithms used by the third communication node Both the node and the third communication node acquire updated parameters in time, avoiding that the communication node communicating with the third communication node and the third communication node cannot process the information in the communication process.
  • the foregoing security algorithm includes at least one of an encryption algorithm, a header compression algorithm, and an integrity protection algorithm; the foregoing parameters include a next hop connection counter NCC, a next hop NH, a cell radio network temporary identifier C-RNTI, a packet At least one of the lengths of the data aggregation layer protocol PDCP sequence number.
  • the communication module 702 can perform at least one of the following processes:
  • the communication module 702 is specifically configured to start to communicate with the first communication node by using the first set of parameters and/or security algorithms when receiving the first set of parameters and/or security algorithms, And the third communication node starts to communicate with the second communication node by using the second set of parameters and/or security algorithm when receiving the second set of parameters and/or security algorithms; or
  • the communication module 702 is specifically configured to: when the information is sent to the second communication node, start to communicate with the first communication node by using the first set of parameters and/or security algorithms, and use the second set of parameters and/or security algorithms Communicating with the second communication node; or
  • the communication module 702 is specifically configured to: when receiving the message sent by the first communication node or the second communication node, start to communicate with the first communication node by using the first set of parameters and/or security algorithms, and use the second set The parameter and/or security algorithm communicates with the second communication node; or
  • the communication module 702 is specifically configured to, when accessing the second communication node, start to communicate with the first communication node by using the first set of parameters and/or security algorithms, and use the second set of parameters and/or security algorithms. Communicating with the second communication node; or
  • the communication module 702 is specifically configured to start to communicate with the first communication node by using the first set of parameters and/or security algorithms when starting communication with the second communication node, using the second set of parameters and/or security algorithms Communicating with the second communication node; or
  • the communication module 702 is specifically configured to: when receiving the first data packet sent by the second communications node, start to use the first set of parameters and/or security algorithm to communicate with the first communications node, using the first Two sets of parameters and/or security algorithms communicate with the second communication node; or
  • the communication module 702 is specifically configured to start to communicate with the first communication node by using the first set of parameters and/or security algorithms within a preset time after or after receiving the first set of parameters and/or security algorithms.
  • the third communication node starts to communicate with the second communication node by using the second set of parameters and/or security algorithm within a preset time after or after receiving the second set of parameters and/or security algorithms. .
  • the foregoing modules may perform the method embodiment shown in FIG. 1, and details are not described herein again.
  • the third communications node may receive the first set of parameters and/or security algorithms and the second set of parameters and/or security algorithms sent by the first communications node, or receive the first sent by the first communications node. a set of parameters and/or security algorithms and a second set of parameters and/or security algorithms sent by the second communication node, the third communication node then communicating with the first communication node using the first set of parameters and/or security algorithms, using the The second set of parameters and/or security algorithms communicate with the second communication node, thereby enabling the MME to update the third communication node regardless of whether during the handover of the control plane and the user plane of the third communication node or during the handover process
  • you can make the third The base station that communicates with the communication node and the third communication node both acquire updated parameters and/or security algorithms in time, avoiding that the station communicating with the third communication node and the third communication node cannot process the information in the communication process.
  • FIG. 8 is a schematic structural diagram of Embodiment 1 of a mobility management entity according to the present invention. As shown in FIG. 8, the mobility management entity includes: a receiving module 801 and a sending module 802, where:
  • the receiving module 801 is configured to receive a request message sent by the first communications node.
  • the sending module 802 is configured to send, according to the request message, a first set of parameters and/or a security algorithm and at least one set of second set of parameters and/or security algorithms to the first communications node; or, according to the request message Transmitting, by the first communications node, the first set of parameters and/or security algorithms, and transmitting, to the at least one second communications node, a corresponding second set of parameters and/or security algorithms;
  • the first set of parameters and/or security algorithms are used by the first communication node to communicate with the third communication node, and the second set of parameters and/or security algorithms are used by the second communication node and the third communication node.
  • the first communication node is a station that performs control plane signaling communication with the third communication node
  • the second communication node is a site that performs user plane data communication with the third communication node; or, the The cell in which the communication node is located is the primary cell of the third communication node, and the cell in which the second communication node is located is the secondary cell of the third communication node.
  • the security algorithm includes at least one of an encryption algorithm, a header compression algorithm, and an integrity protection algorithm; the parameters include a next hop connection counter NCC, a next hop NH, and a cell wireless network temporary identifier C. - RNTL at least one of the lengths of the packet data convergence layer protocol PDCP sequence number.
  • Each of the above modules may perform the method embodiment shown in FIG. 2, and details are not described herein again.
  • the MME may actively update parameters and/or security algorithms used by the third communication node, and may also send parameters and/or security algorithms to the first communication node and the second communication node according to the request message of the first communication node. And further forwarding to the third communication node, so that the first communication node, the second communication node and the third communication node can be informed of the corresponding parameters and/or security after updating the parameters and/or the security algorithm in any case.
  • the algorithm prevents the first communication node, the second communication node, and the third communication node from processing information for communication between them.
  • FIG. 9 is a schematic structural diagram of a second embodiment of a communication node according to the present invention.
  • the communication node is the first communication node.
  • the communication node includes: a sending module 901 and a receiving module 902. among them:
  • the sending module 901 sends a request message to the mobility management entity MME, so that the MME sends a first set of parameters and/or security algorithms and at least one set of second parameters and/or to the first communication node according to the request message. Or a security algorithm, or transmitting the first set of parameters and/or security algorithms to the first communication node, and transmitting the second set of parameters and/or security algorithms to at least one second communication node;
  • the receiving module 902 is configured to receive a first set of parameters and/or a security algorithm and a second set of parameters and/or security algorithms sent by the MME; or receive a first set of parameters and/or security algorithms sent by the MME.
  • the first communication node is a station that performs control plane signaling communication with the third communication node
  • the second communication node is a site that performs user plane data communication with the third communication node; or
  • the cell in which the first communication node is located is the primary cell of the third communication node, and the cell in which the second communication node is located is the secondary cell of the third communication node.
  • FIG. 10 is a schematic structural diagram of Embodiment 3 of a communication node according to the present invention. As shown in FIG. 10, on the basis of FIG. 9, the communication node further includes: a communication module 903, where:
  • the sending module 901 performs different tasks in different scenarios:
  • the sending module 901 is further configured to: after receiving, by the receiving module, the first set of parameters and the security algorithm sent by the MME, and the at least one second set of parameters and/or security algorithms, to the at least one second communications node Transmitting the corresponding second set of parameters and/or security algorithms, and transmitting the first set of parameters and/or security algorithms and the at least one set of second sets of parameters and/or security algorithms to the third communication node.
  • the sending module 901 is further configured to: after the receiving module receives the first set of parameters and/or security algorithms sent by the MME, send the first set of parameters and/or security algorithms to the third communications node.
  • the sending module 901 is configured to send a message to the second communications node or the third communications node, so that the second communications node starts using the second set of parameters and/or when receiving the message.
  • the security algorithm communicates with the third communication node to cause the third communication node to begin processing the information communicated with the first communication node using the first set of parameters and/or security algorithms upon receiving the message, using the A second set of parameters and/or security algorithms communicate with the second communication node.
  • the communication module 903 is configured to communicate with the third communication node according to the first set of parameters and/or security algorithms.
  • the security algorithm includes at least one of an encryption algorithm, a header compression algorithm, and an integrity protection algorithm; the parameters include a next hop connection counter NCC, a next hop NH, and a small
  • the area wireless network temporarily identifies at least one of the lengths of the C-RNTL packet data convergence layer protocol PDCP sequence number.
  • the communication module 903 is specifically configured to perform at least one of the following processes:
  • FIG. 11 is a schematic structural diagram of Embodiment 4 of a communication node according to the present invention.
  • the communication node is the second communication node.
  • the communication node includes: a receiving module 110 and a communication module 120, where:
  • the receiving module 110 is configured to receive a parameter and/or a security algorithm sent by the first communications node or the MME, where the parameter and/or the security algorithm is the second set of parameters and/or the security algorithm.
  • the communication module 120 is configured to communicate with the third communication node according to the foregoing parameters and/or security algorithms; specifically, it may be at least one of the following processes:
  • the communication module 120 is specifically configured to: when the second communication node receives the parameter and/or the security algorithm, start to communicate with the third communication node by using the parameter and/or the security algorithm; or the second communication node is receiving After the above parameters and/or security algorithms are not used, after receiving the message sent by the first communication node or the third communication node, the parameter and/or the security algorithm are used to communicate with the third communication node; or ,
  • the second communication node begins to communicate with the third communication node using the above parameters and/or security algorithm when initially communicating with the third communication node; or
  • the second communication node When the third communication node accesses the second communication node, the second communication node starts to communicate with the third communication node using the above parameters and/or security algorithms; or When the third communication node is uplink-synchronized with the second communication node, starting to communicate with the third communication node by using the foregoing parameter and/or security algorithm; or
  • the second communication node may also start to communicate with the third communication node by using the parameter and/or the security algorithm within a preset time after receiving the parameter and/or the security algorithm; or Transmitting, by the third communication node, an indication message for instructing to start using the foregoing parameter and/or the security algorithm, and starting to communicate with the third communication node by using the foregoing parameter and/or security algorithm when transmitting the indication message; or
  • the second communication node does not preset and does not receive any indication message after receiving the above parameters and/or security algorithm, the second communication node needs to decrypt or decompress the information sent by the third communication node or When the integrity protection process is processed, the original parameters and/or security algorithms are used first. If the decryption or decompression or de-integrity protection fails, the above parameters and/or security algorithms are used to communicate with the third communication node.
  • the third communications node may receive the first set of parameters and/or security algorithms and the second set of parameters and/or security algorithms sent by the first communications node, or receive the first sent by the first communications node. a set of parameters and/or security algorithms and a second set of parameters and/or security algorithms sent by the second communication node, the third communication node then communicating with the first communication node using the first set of parameters and/or security algorithms, using the The second set of parameters and/or security algorithms communicate with the second communication node, thereby enabling the MME to update the third communication node regardless of whether during the handover of the control plane and the user plane of the third communication node or during the handover process
  • the base station and the third communication node that communicate with the third communication node can acquire updated parameters and/or security algorithms in time to avoid the site communicating with the third communication node. And the third communication node cannot process the information in the communication process.
  • Another embodiment of the present invention further provides a communication node, where the communication node is the foregoing third communication node, including: a receiver and a processor, where:
  • a receiver configured to receive a first set of parameters and/or a security algorithm sent by the first communication node, and at least a second set of parameters and/or security algorithms; or receive a first set of parameters sent by the first communication node And/or a security algorithm and a second set of parameters and/or security algorithms sent by the at least one second communication node;
  • a processor configured to communicate with the first communication node using the first set of parameters and/or security algorithms, and to communicate with the second communication node using the second set of parameters and/or security algorithms.
  • the first communication node is a station that performs control plane signaling communication with the third communication node
  • the second communication node is a site that performs user plane data communication with the third communication node
  • the cell in which the first communication node is located is the primary cell of the third communication node, and the cell in which the second communication node is located is the secondary cell of the third communication node.
  • the security algorithm includes at least one of an encryption algorithm, a header compression algorithm, and an integrity protection algorithm; the parameters include a next hop connection counter NCC, a next hop NH, a cell radio network temporary identifier C-RNTL packet data aggregation. At least one of the lengths of the layer protocol PDCP sequence number.
  • the processor is specifically configured to perform at least one of the following processes:
  • An integrity protection or de-integrity protection process is performed on the information communicated with the first communication node and/or the second communication node in accordance with the integrity protection algorithm.
  • the processor is further configured to, when receiving the first set of parameters and/or security algorithms, start to communicate with the first communication node by using the first set of parameters and/or security algorithms, where the third Upon receiving the second set of parameters and/or security algorithms, the communication node begins to communicate with the second communication node using the second set of parameters and/or security algorithms; or
  • the second communication node Upon receiving a message sent by the first communication node or the second communication node, starting to communicate with the first communication node using the first set of parameters and/or security algorithms, using the second set of parameters and/or security algorithms and The second communication node performs communication; or
  • the third communication node Equivalently communicating with the first communication node using the first set of parameters and/or security algorithms after a preset time or after receiving the first set of parameters and/or security algorithms, the third communication node
  • the second set of parameters and/or security algorithms are used to communicate with the second communication node within a preset time after or after receiving the second set of parameters and/or security algorithms.
  • Another embodiment of the present invention further provides a mobility management entity, including: a receiver and a transmitter, where:
  • a receiver configured to receive a request message sent by the first communications node
  • a transmitter configured to send, according to the request message, a first set of parameters and/or a security algorithm and at least one set of second set of parameters and/or security algorithms to the first communication node; or, according to the request message Transmitting, by the first communication node, the first set of parameters and/or security algorithms, and sending a corresponding second set of parameters and/or security algorithms to the at least one second communication node;
  • the first set of parameters and/or security algorithms are used by the first communication node to communicate with the third communication node, and the second set of parameters and/or security algorithms are used by the second communication node and the third communication node.
  • the first communication node is a station that performs control plane signaling communication with the third communication node
  • the second communication node is a site that performs user plane data communication with the third communication node; or, the The cell in which the communication node is located is the primary cell of the third communication node, and the cell in which the second communication node is located is the secondary cell of the third communication node.
  • the security algorithm includes at least one of an encryption algorithm, a header compression algorithm, and an integrity protection algorithm; the parameters include a next hop connection counter NCC, a next hop NH, a cell radio network temporary identifier C-RNTI, and packet data. At least one of the lengths of the convergence layer protocol PDCP sequence number.
  • Another embodiment of the present invention further provides a communication node, where the communication node is the first communication node, and the communication node includes: a transmitter, a receiver, and a processor, where: a transmitter, configured to send a request message to the mobility management entity MME, to enable the MME to send a first set of parameters and/or a security algorithm and at least one set of second parameters to the first communication node according to the request message And/or a security algorithm, or transmitting the first set of parameters and/or security algorithms to the first communication node, and transmitting the second set of parameters and/or security algorithms to at least one second communication node;
  • a transmitter configured to send a request message to the mobility management entity MME, to enable the MME to send a first set of parameters and/or a security algorithm and at least one set of second parameters to the first communication node according to the request message And/or a security algorithm, or transmitting the first set of parameters and/or security algorithms to the first communication node, and transmitting the second set of parameters and/or
  • the first communication node is a station that performs control plane signaling communication with the third communication node, and the second communication node is a site that performs user plane data communication with the third communication node; or
  • the cell in which the first communication node is located is the primary cell of the third communication node, and the cell in which the second communication node is located is the secondary cell of the third communication node.
  • the transmitter sends the at least one of the second communications
  • the node transmits the corresponding second set of parameters and/or security algorithms and transmits the first set of parameters and/or security algorithms and the at least one set of second sets of parameters and/or security algorithms to the third communication node.
  • the transmitter sends the first set of parameters and/or security algorithms to the third communication node.
  • the receiver receives the first set of parameters and/or security algorithms sent by the MME and at least one second set of parameters and/or security algorithms, or the first communication node receives the first sent by the MME.
  • the transmitter is further configured to: send a message to the second communication node or the third communication node, to enable the second communication node to start using the message when receiving the message.
  • a second set of parameters and/or security algorithms are in communication with the third communication node to cause the third communication node to begin communicating with the first communication node using the first set of parameters and/or security algorithms upon receiving the message
  • the information is processed and communicated with the second communication node using the second set of parameters and/or security algorithms.
  • the receiver Receiving, by the receiver, a first set of parameters and/or a security algorithm sent by the MME, and at least one set of second set of parameters and/or security algorithms, or the first communication node receives the first set of parameters sent by the MME and After the security algorithm, the processor is configured to use the first set of parameters and/or security algorithms and The three communication nodes communicate.
  • the security algorithm includes at least one of an encryption algorithm, a header compression algorithm, and an integrity protection algorithm; the parameters include a next hop connection counter NCC, a next hop NH, and a cell wireless network temporary identifier C. - RNTL at least one of the lengths of the packet data convergence layer protocol PDCP sequence number.
  • the processor is further configured to perform at least one of the following processes: 1) performing encryption and decryption processing on information communicated with the third communication node according to the encryption algorithm; 2) performing a header compression algorithm according to the header compression algorithm The information communicated by the three communication nodes is subjected to header compression or decompression compression processing; 3) performing integrity protection or de-integrity protection processing on the information communicated with the third communication node according to the integrity protection algorithm.
  • the aforementioned program can be stored in a computer readable storage medium.
  • the program when executed, performs the steps including the foregoing method embodiments; and the foregoing storage medium includes: a medium that can store program codes, such as a ROM, a RAM, a magnetic disk, or an optical disk.

Abstract

Provided in an embodiment of the present invention are a cell optimization method and device, the method comprising: a third communication node receives a first set of parameters and/or a security algorithm and a second set of parameters and/or a security algorithm transmitted by a first communication node; alternatively, the third communication node receives the first set of parameters and/or a security algorithm transmitted by the first communication node, and the second set of parameters and/or a security algorithm transmitted by at least one second communication node; and the third communication node uses the first set of parameters and/or the security algorithm to communicate with the first communication node, and uses the second set of parameters and/or the security algorithm to communicate with the second communication node. When a parameter and/or security algorithm used by a third communication node is updated, the embodiment of the present invention ensures that the communication nodes in communication with the third communication node can all timely acquire the updated parameters, thus avoiding the problem that the third communication node and the communication nodes in communication with the third communication node cannot process information during communication.

Description

小区优化方法及装置  Cell optimization method and device
本申请要求了于 2013年 1月 18日提交中国专利局,申请号为 201310019263.2、 发明名称为 "小区优化方法及装置" 的中国申请的优先权, 其全部内容通过 引用结合在本申请中。 技术领域 本发明涉及通信技术, 尤其涉及一种小区优化方法及装置。 背景技术 现有技术中, 在用户设备(User Equipment, 筒称 UE )与通信节点进行 交互时, 需要使用密钥对其交互的信令或数据进行加密。 The present application claims priority to Chinese Application No. 201310019263.2, entitled "Cell Optimization Method and Apparatus", filed on Jan. 18, 2013, the entire disclosure of which is incorporated herein by reference. TECHNICAL FIELD The present invention relates to communications technologies, and in particular, to a cell optimization method and apparatus. In the prior art, when a user equipment (User Equipment, UE) interacts with a communication node, it is required to use a key to encrypt signaling or data of its interaction.
随着长期演进系统( Long Term Evolution , 筒称 LTE )的发展, 一些技术 开始考虑通信节点间协作或者载波汇聚, 来提高 UE 的数据速率, 例如, 使 UE的用户面和控制面分离, 即使 UE的控制面在第一通信节点, 而数据面在 第二通信节点。 在现有技术中, UE使用参数和 /或安全算法与通信节点通信, 该参数和 /或安全算法可以为下一 接计数器 (Next Hop Chaining Counter, 筒 称 NCC )和下一跳 ( Next Hop , 筒称 ΝΗ ), 当 UE切换到另外一个通信节点 时, 目标通信节点会在 UE切换完成后, 发起内部切换 ( intra-HO ), 为 UE 更新 NCC和 NH, 由此进行安全隔离, 使得 UE使用新的 NCC和 NH。  With the development of Long Term Evolution (LTE), some technologies begin to consider communication between nodes or carrier aggregation to improve the data rate of the UE, for example, to separate the user plane and control plane of the UE, even if the UE The control plane is at the first communication node and the data plane is at the second communication node. In the prior art, the UE communicates with the communication node using parameters and/or security algorithms, and the parameter and/or security algorithm may be a Next Hop Chaining Counter (NCC) and a Next Hop (Next Hop, When the UE switches to another communication node, the target communication node initiates an internal handover (intra-HO) after the UE handover is completed, and updates the NCC and NH for the UE, thereby performing security isolation, so that the UE uses New NCC and NH.
在交互过程中, 上述参数和 /或安全算法更新后, 可能导致 UE无法与该第 一通信节点和 /或第二通信节点进行信令和 /或数据交互。 发明内容 本发明实施例提供一种小区优化方法及装置, 用于解决通信节点之间进 行通信时有参数和 /或安全算法更新时, 通信各方无法获知的问题。  During the interaction, after the above parameters and/or security algorithms are updated, the UE may not be able to perform signaling and/or data interaction with the first communication node and/or the second communication node. SUMMARY OF THE INVENTION Embodiments of the present invention provide a cell optimization method and apparatus, which are used to solve a problem that a communication party cannot know when there are parameters and/or security algorithms updated when communication between communication nodes.
本发明实施例第一方面提供一种 ' j、区优化方法, 包括:  A first aspect of the embodiments of the present invention provides a method for optimizing a region, including:
第三通信节点接收第一通信节点发送的第一套参数和 /或安全算法和至少 法和至少一个第二通信节点发送的第二套参数和 /或安全算法; The third communication node receives the first set of parameters and/or security algorithms sent by the first communication node and at least And a second set of parameters and/or security algorithms sent by the at least one second communication node;
所述第三通信节点使用所述第一套参数和 /或安全算法与第一通信节点进 行通信, 使用所述第二套参数和 /或安全算法与第二通信节点进行通信;  The third communication node communicates with the first communication node using the first set of parameters and/or security algorithms, and communicates with the second communication node using the second set of parameters and/or security algorithms;
其中, 所述第一通信节点为与所述第三通信节点进行控制面信令通信的 站点, 所述第二通信节点为与所述第三通信节点进行用户面数据通信的站点; 或者,  The first communication node is a station that performs control plane signaling communication with the third communication node, and the second communication node is a site that performs user plane data communication with the third communication node; or
所述第一通信节点所在的小区为与所述第三通信节点的主小区, 所述第 二通信节点所在的小区为所述第三通信节点的辅小区。  The cell in which the first communication node is located is the primary cell of the third communication node, and the cell in which the second communication node is located is the secondary cell of the third communication node.
结合第一方面, 在第一方面的第一种可能的实施方式中, 所述安全算法 包括加密算法、 头压缩算法和完整性保护算法中的至少一种算法;  With reference to the first aspect, in a first possible implementation manner of the first aspect, the security algorithm includes at least one of an encryption algorithm, a header compression algorithm, and an integrity protection algorithm;
所述参数包括下一跳连接计数器 NCC、 下一跳 NH、 小区无线网络临时标 识 C-RNTI、 分组数据汇聚层协议 PDCP 序列号的长度中的至少一种参数。  The parameters include at least one of a next hop connection counter NCC, a next hop NH, a cell radio network temporary identification C-RNTI, and a length of a packet data convergence layer protocol PDCP sequence number.
结合第一方面的第一种可能的实施方式, 在第一方面的第二种可能的实 施方式中, 所述第三通信节点使用所述第一套参数和 /或安全算法与第一通信 节点进行通信,使用所述第二套参数和 /或安全算法与第二通信节点进行通信, 包括下述至少一种:  In conjunction with the first possible implementation of the first aspect, in a second possible implementation of the first aspect, the third communications node uses the first set of parameters and/or security algorithms and the first communications node Communicating, communicating with the second communication node using the second set of parameters and/or security algorithms, including at least one of the following:
所述第三通信节点根据所述加密算法对与第一通信节点和 /或第二通信节 点进行通信的信息进行加解密处理;  And the third communication node performs encryption and decryption processing on the information that is communicated with the first communication node and/or the second communication node according to the encryption algorithm;
所述第三通信节点根据所述头压缩算法对与第一通信节点和 /或第二通信 节点进行通信的信息进行头压缩或者解头压缩处理;  And the third communication node performs header compression or decompression compression processing on the information that is communicated with the first communication node and/or the second communication node according to the header compression algorithm;
所述第三通信节点根据所述完整性保护算法对与第一通信节点和 /或第二 通信节点进行通信的信息进行完整性保护或者解完整性保护处理。  The third communication node performs integrity protection or de-integrity protection processing on the information communicated with the first communication node and/or the second communication node according to the integrity protection algorithm.
结合第一方面, 在第一方面的第三种可能的实施方式中, 所述第三通信 节点使用所述第一套参数和 /或安全算法与第一通信节点进行通信, 使用所述 第二套参数和 /或安全算法与第二通信节点进行通信, 包括:  In conjunction with the first aspect, in a third possible implementation of the first aspect, the third communications node communicates with the first communications node using the first set of parameters and/or security algorithms, using the second The set of parameters and/or security algorithms communicate with the second communication node, including:
所述第三通信节点在接收到所述第一套参数和 /或安全算法时, 开始使用 所述第一套参数和 /或安全算法与第一通信节点进行通信, 所述第三通信节点 在接收到所述第二套参数和 /或安全算法时, 开始使用所述第二套参数和 /或安 全算法与第二通信节点进行通信; 或者,  The third communication node, upon receiving the first set of parameters and/or security algorithms, begins to communicate with the first communication node using the first set of parameters and/or security algorithms, the third communication node Receiving, by the second set of parameters and/or security algorithms, starting to communicate with the second communication node using the second set of parameters and/or security algorithms; or
所述第三通信节点在向第二通信节点发送信息时, 开始使用所述第一套 参数和 /或安全算法与第一通信节点进行通信, 使用所述第二套参数和 /或安全 算法与第二通信节点进行通信; 或者, The third communication node starts using the first set when transmitting information to the second communication node a parameter and/or security algorithm in communication with the first communication node, using the second set of parameters and/or security algorithms to communicate with the second communication node; or
所述第三通信节点在接收第一通信节点或第二通信节点发送的消息时, 开始使用所述第一套参数和 /或安全算法与第一通信节点进行通信, 使用所述 第二套参数和 /或安全算法与第二通信节点进行通信; 或者,  When receiving the message sent by the first communication node or the second communication node, the third communication node starts to communicate with the first communication node by using the first set of parameters and/or security algorithm, and uses the second set of parameters. And/or a security algorithm to communicate with the second communication node; or
所述第三通信节点在接入到第二通信节点时, 开始使用所述第一套参数 和 /或安全算法与第一通信节点进行通信, 使用所述第二套参数和 /或安全算法 与第二通信节点进行通信; 或者,  The third communication node, when accessing the second communication node, starts communicating with the first communication node using the first set of parameters and/or security algorithms, using the second set of parameters and/or security algorithms and The second communication node performs communication; or
所述第三通信节点在开始和第二通信节点通信时, 开始使用所述第一套 参数和 /或安全算法与第一通信节点进行通信, 使用所述第二套参数和 /或安全 算法与第二通信节点进行通信; 或者,  The third communication node, when initially communicating with the second communication node, begins communicating with the first communication node using the first set of parameters and/or security algorithms, using the second set of parameters and/or security algorithms and The second communication node performs communication; or
所述第三通信节点在接收到所述第二通信节点发送的第一个数据包时, 开始使用所述第一套参数和 /或安全算法与第一通信节点进行通信, 使用所述 第二套参数和 /或安全算法与第二通信节点进行通信; 或者,  When receiving the first data packet sent by the second communication node, the third communication node starts to communicate with the first communication node by using the first set of parameters and/or security algorithm, and uses the second a set of parameters and/or security algorithms to communicate with the second communication node; or
所述第三通信节点在接收到所述第一套参数和 /或安全算法后的预设时间 内或者之后, 开始使用所述第一套参数和 /或安全算法与第一通信节点进行通 信, 所述第三通信节点在接收到所述第二套参数和 /或安全算法后的预设时间 内或者之后, 开始使用所述第二套参数和 /或安全算法与第二通信节点进行通 信。  The third communication node starts to communicate with the first communication node by using the first set of parameters and/or security algorithms within a preset time after receiving the first set of parameters and/or security algorithms, The third communication node begins to communicate with the second communication node using the second set of parameters and/or security algorithms within a preset time after or after receiving the second set of parameters and/or security algorithms.
本发明实施例第二方面提供一种 ' j、区优化方法, 包括:  A second aspect of the embodiments of the present invention provides a method for optimizing a region, including:
移动管理实体 MME接收第一通信节点发送的请求消息;  The mobility management entity MME receives the request message sent by the first communication node;
所述 MME根据所述请求消息向所述第一通信节点发送第一套参数和 /或 安全算法和至少一套第二套参数和 /或安全算法; 或者,  Sending, by the MME, the first set of parameters and/or security algorithm and at least one set of second set of parameters and/or security algorithms to the first communication node according to the request message; or
所述 MME根据所述请求消息向所述第一通信节点发送所述第一套参数和 Sending, by the MME, the first set of parameters and the first communication node according to the request message
/或安全算法, 向至少一个第二通信节点发送对应的第二套参数和 /或安全算 法; And/or a security algorithm, transmitting a corresponding second set of parameters and/or security algorithms to the at least one second communication node;
其中, 所述第一套参数和 /或安全算法用于第一通信节点与第三通信节点 进行通信, 所述第二套参数和 /或安全算法用于第二通信节点与第三通信节点 进行通信;  The first set of parameters and/or security algorithms are used by the first communication node to communicate with the third communication node, and the second set of parameters and/or security algorithms are used by the second communication node and the third communication node. Communication
所述第一通信节点为与所述第三通信节点进行控制面信令通信的站点, 所述第二通信节点为与所述第三通信节点进行用户面数据通信的站点; 或者, 所述第一通信节点所在的小区为与所述第三通信节点的主小区, 所述第 二通信节点所在的小区为所述第三通信节点的辅小区。 The first communication node is a station that performs control plane signaling communication with the third communication node, The second communication node is a station that performs user plane data communication with the third communication node; or the cell where the first communication node is located is a primary cell with the third communication node, and the second communication The cell where the node is located is the secondary cell of the third communication node.
结合第二方面, 在第二方面的第一种可能的实施方式中, 所述安全算法 包括加密算法、 头压缩算法和完整性保护算法中的至少一种算法;  With reference to the second aspect, in a first possible implementation manner of the second aspect, the security algorithm includes at least one of an encryption algorithm, a header compression algorithm, and an integrity protection algorithm;
所述参数包括下一跳连接计数器 NCC、 下一跳 NH、 小区无线网络临时标 识 C-RNTI、 分组数据汇聚层协议 PDCP序列号的长度中的至少一种参数。  The parameters include at least one of a next hop connection counter NCC, a next hop NH, a cell radio network temporary identification C-RNTI, and a packet data convergence layer protocol PDCP sequence number.
本发明实施例第三方面提供一种小区优化方法, 包括:  A third aspect of the embodiments of the present invention provides a cell optimization method, including:
第一通信节点向移动管理实体 MME发送请求消息,以使所述 MME根据所 述请求消息向所述第一通信节点发送第一套参数和 /或安全算法和至少一套第 二套参数和 /或安全算法, 或者, 向所述第一通信节点发送所述第一套参数和 / 或安全算法, 以及向至少一个第二通信节点发送所述第二套参数和 /或安全算 法;  Transmitting, by the first communications node, a request message to the mobility management entity MME, to enable the MME to send the first set of parameters and/or security algorithm and at least one set of second set of parameters and/or to the first communication node according to the request message. Or a security algorithm, or transmitting the first set of parameters and/or security algorithms to the first communication node, and transmitting the second set of parameters and/or security algorithms to at least one second communication node;
所述第一通信节点接收所述 MME发送的第一套参数和 /或安全算法和第 二套参数和 /或安全算法; 或者,  Receiving, by the first communications node, a first set of parameters and/or a security algorithm and a second set of parameters and/or security algorithms sent by the MME; or
所述第一通信节点接收所述 MME发送的第一套参数和 /或安全算法; 所述第一通信节点为与所述第三通信节点进行控制面信令通信的站点, 所述第二通信节点为与所述第三通信节点进行用户面数据通信的站点; 或者, 所述第一通信节点所在的小区为与所述第三通信节点的主小区, 所述第 二通信节点所在的小区为所述第三通信节点的辅小区。  Receiving, by the first communications node, a first set of parameters and/or a security algorithm sent by the MME; the first communications node is a station that performs control plane signaling communication with the third communications node, and the second communications The node is a station that performs user plane data communication with the third communication node; or, the cell where the first communication node is located is a primary cell with the third communication node, and the cell where the second communication node is located is a secondary cell of the third communication node.
结合第三方面, 在第三方面的第一种可能的实施方式中, 所述第一通信 节点接收所述 MME发送的第一套参数和安全算法和至少一套第二套参数和 / 或安全算法之后, 还包括:  With reference to the third aspect, in a first possible implementation manner of the third aspect, the first communications node receives a first set of parameters and a security algorithm sent by the MME, and at least one set of second set of parameters and/or security After the algorithm, it also includes:
所述第一通信节点向至少一个所述第二通信节点发送对应的所述第二套 参数和 /或安全算法, 并向第三通信节点发送所述第一套参数和 /或安全算法和 所述至少一套第二套参数和 /或安全算法。  Transmitting, by the first communications node, the corresponding second set of parameters and/or security algorithms to at least one of the second communications nodes, and transmitting the first set of parameters and/or security algorithms and protocols to the third communications node Describe at least one set of second set of parameters and/or security algorithms.
结合第三方面, 在第三方面的第二种可能的实施方式中, 所述第一通信 节点接收所述 MME发送的第一套参数和 /或安全算法之后, 还包括:  With reference to the third aspect, in a second possible implementation manner of the third aspect, after the first communications node receives the first set of parameters and/or security algorithms sent by the MME, the method further includes:
所述第一通信节点向第三通信节点发送所述第一套参数和 /或安全算法。 结合第三方面, 在第三方面的第三种可能的实施方式中, 所述第一通信 节点接收到所述 MME发送的第一套参数和 /或安全算法和至少一套第二套参 数和 /或安全算法,或者所述第一通信节点接收到所述 MME发送的第一套参数 和 /或安全算法之后, 还包括: The first communication node transmits the first set of parameters and/or security algorithms to a third communication node. With reference to the third aspect, in a third possible implementation manner of the third aspect, the first communication Receiving, by the node, a first set of parameters and/or security algorithms sent by the MME, and at least one set of second set of parameters and/or security algorithms, or the first communication node receives the first set of parameters sent by the MME and / or after the security algorithm, it also includes:
所述第一通信节点向所述第二通信节点或第三通信节点发送消息, 以使 所述第二通信节点在接收到所述消息时开始使用所述第二套参数和 /或安全算 法与第三通信节点进行通信, 使第三通信节点在接收到所述消息时开始使用 所述第一套参数和 /或安全算法与第一通信节点进行通信的信息进行处理, 使 用所述第二套参数和 /或安全算法与第二通信节点进行通信。  The first communication node sends a message to the second communication node or the third communication node to cause the second communication node to start using the second set of parameters and/or security algorithms when receiving the message Communicating with the third communication node, causing the third communication node to start processing the information communicated with the first communication node using the first set of parameters and/or security algorithms when receiving the message, using the second set The parameters and/or security algorithms communicate with the second communication node.
结合第三方面, 在第三方面的第四种可能的实施方式中, 所述第一通信 节点接收所述 MME发送的第一套参数和 /或安全算法和至少一套第二套参数 和 /或安全算法,或者所述第一通信节点接收到所述 MME发送的第一套参数和 /或安全算法之后, 还包括:  With reference to the third aspect, in a fourth possible implementation manner of the third aspect, the first communications node receives a first set of parameters and/or a security algorithm sent by the MME, and at least one set of the second set of parameters and/or Or the security algorithm, or after the first communication node receives the first set of parameters and/or security algorithms sent by the MME, the method further includes:
所述第一通信节点根据所述第一套参数和 /或安全算法与第三通信节点进 行通信。  The first communication node communicates with the third communication node in accordance with the first set of parameters and/or security algorithms.
结合第三方面至第三方面的第四种可能的实施方式中任一项, 在第三方 面的第五种可能的实施方式中, 所述安全算法包括加密算法、 头压缩算法和 完整性保护算法中的至少一种算法;  With reference to any one of the third aspect to the fourth possible implementation manner of the third aspect, in a fifth possible implementation manner of the third aspect, the security algorithm includes an encryption algorithm, a header compression algorithm, and integrity protection At least one algorithm in the algorithm;
所述参数包括下一跳连接计数器 NCC、 下一跳 NH、 小区无线网络临时标 识 C-RNTI、 分组数据汇聚层协议 PDCP序列号的长度中的至少一种参数。  The parameters include at least one of a next hop connection counter NCC, a next hop NH, a cell radio network temporary identification C-RNTI, and a packet data convergence layer protocol PDCP sequence number.
结合第三方面的第五种可能的实施方式, 在第三方面的第六种可能的实 施方式中, 所述第一通信节点根据所述第一套参数和 /或安全算法与第三通信 节点进行通信, 包括下述至少一种:  With reference to the fifth possible implementation manner of the third aspect, in a sixth possible implementation manner of the third aspect, the first communications node and the third communications node according to the first set of parameters and/or security algorithm Communicate, including at least one of the following:
所述第一通信节点根据所述加密算法对与第三通信节点进行通信的信息 进行加解密处理;  And the first communication node performs encryption and decryption processing on the information that is communicated with the third communication node according to the encryption algorithm;
所述第一通信节点根据所述头压缩算法对与第三通信节点进行通信的信 息进行头压缩或者解头压缩处理;  The first communication node performs header compression or decompression processing on the information communicated with the third communication node according to the header compression algorithm;
所述第一通信节点根据所述完整性保护算法对与第三通信节点进行通信 的信息进行完整性保护或者解完整性保护处理。  The first communication node performs integrity protection or de-integrity protection processing on the information communicated with the third communication node according to the integrity protection algorithm.
本发明第四方面提供一种通信节点, 所述通信节点为第三通信节点, 包 括: 接收模块, 用于接收第一通信节点发送的第一套参数和 /或安全算法和至 少一套第二套参数和 /或安全算法; 或者, A fourth aspect of the present invention provides a communication node, where the communication node is a third communication node, including: a receiving module, configured to receive a first set of parameters and/or a security algorithm sent by the first communication node, and at least one second set of parameters and/or security algorithms; or
接收所述第一通信节点发送的第一套参数和 /或安全算法和至少一个第二 通信节点发送的第二套参数和 /或安全算法;  Receiving, by the first communication node, a first set of parameters and/or a security algorithm and a second set of parameters and/or security algorithms sent by the at least one second communication node;
通信模块, 用于所述第三通信节点使用所述第一套参数和 /或安全算法与 第一通信节点进行通信, 使用所述第二套参数和 /或安全算法与第二通信节点 进行通信;  a communication module, configured to, by the third communication node, communicate with the first communication node using the first set of parameters and/or security algorithms, and communicate with the second communication node using the second set of parameters and/or security algorithms ;
其中, 所述第一通信节点为与所述第三通信节点进行控制面信令通信的 站点, 所述第二通信节点为与所述第三通信节点进行用户面数据通信的站点; 或者,  The first communication node is a station that performs control plane signaling communication with the third communication node, and the second communication node is a site that performs user plane data communication with the third communication node; or
所述第一通信节点所在的小区为与所述第三通信节点的主小区, 所述第 二通信节点所在的小区为所述第三通信节点的辅小区。  The cell in which the first communication node is located is the primary cell of the third communication node, and the cell in which the second communication node is located is the secondary cell of the third communication node.
结合第四方面, 在第四方面的第一种可能的实施方式中, 所述安全算法 包括加密算法、 头压缩算法和完整性保护算法中的至少一种算法;  With reference to the fourth aspect, in a first possible implementation manner of the fourth aspect, the security algorithm includes at least one of an encryption algorithm, a header compression algorithm, and an integrity protection algorithm;
所述参数包括下一跳连接计数器 NCC、 下一跳 NH、 小区无线网络临时标 识 C-RNTI、 分组数据汇聚层协议 PDCP 序列号的长度中的至少一种参数。  The parameters include at least one of a next hop connection counter NCC, a next hop NH, a cell radio network temporary identification C-RNTI, and a length of a packet data convergence layer protocol PDCP sequence number.
结合第四方面的第一种可能的实施方式, 在第四方面的第二种可能的实 施方式中, 所述通信模块, 具体用于下述至少一种:  With reference to the first possible implementation manner of the fourth aspect, in a second possible implementation manner of the fourth aspect, the communication module is specifically used in at least one of the following:
根据所述加密算法对与第一通信节点和 /或第二通信节点进行通信的信息 进行加解密处理;  And performing encryption and decryption processing on the information communicated with the first communication node and/or the second communication node according to the encryption algorithm;
根据所述头压缩算法对与第一通信节点和 /或第二通信节点进行通信的信 息进行头压缩或者解头压缩处理;  Performing header compression or decompression processing on the information communicated with the first communication node and/or the second communication node according to the header compression algorithm;
根据所述完整性保护算法对与第一通信节点和 /或第二通信节点进行通信 的信息进行完整性保护或者解完整性保护处理。  An integrity protection or de-integrity protection process is performed on the information communicated with the first communication node and/or the second communication node in accordance with the integrity protection algorithm.
结合第四方面, 在第四方面的第三种可能的实施方式中, 所述通信模块, 具体用于在接收到所述第一套参数和 /或安全算法时, 开始使用所述第一套参 数和 /或安全算法与第一通信节点进行通信, 所述第三通信节点在接收到所述 第二套参数和 /或安全算法时, 开始使用所述第二套参数和 /或安全算法与第二 通信节点进行通信; 或者,  With reference to the fourth aspect, in a third possible implementation manner of the fourth aspect, the communication module is specifically configured to start using the first set when receiving the first set of parameters and/or security algorithms a parameter and/or security algorithm in communication with the first communication node, the third communication node, when receiving the second set of parameters and/or security algorithms, begins using the second set of parameters and/or security algorithms and The second communication node performs communication; or
所述通信模块, 具体用于在向第二通信节点发送信息时, 开始使用所述 第一套参数和 /或安全算法与第一通信节点进行通信, 使用所述第二套参数和 / 或安全算法与第二通信节点进行通信; 或者, The communication module is specifically configured to start using the information when sending information to the second communication node. The first set of parameters and/or security algorithms are in communication with the first communication node, and communicate with the second communication node using the second set of parameters and/or security algorithms; or
所述通信模块, 具体用于在接收第一通信节点或第二通信节点发送的消 息时, 开始使用所述第一套参数和 /或安全算法与第一通信节点进行通信, 使 用所述第二套参数和 /或安全算法与第二通信节点进行通信; 或者,  The communication module is specifically configured to: when receiving a message sent by the first communication node or the second communication node, start to use the first set of parameters and/or a security algorithm to communicate with the first communication node, and use the second a set of parameters and/or security algorithms to communicate with the second communication node; or
所述通信模块, 具体用于在接入到第二通信节点时, 开始使用所述第一 套参数和 /或安全算法与第一通信节点进行通信, 使用所述第二套参数和 /或安 全算法与第二通信节点进行通信; 或者,  The communication module is specifically configured to, when accessing the second communication node, start to communicate with the first communication node by using the first set of parameters and/or security algorithms, and use the second set of parameters and/or security The algorithm communicates with the second communication node; or
所述通信模块, 具体用于在开始和第二通信节点通信时, 开始使用所述 第一套参数和 /或安全算法与第一通信节点进行通信, 使用所述第二套参数和 / 或安全算法与第二通信节点进行通信; 或者,  The communication module is specifically configured to start to communicate with the first communication node by using the first set of parameters and/or security algorithms when starting communication with the second communication node, using the second set of parameters and/or security The algorithm communicates with the second communication node; or
所述通信模块, 具体用于在接收到所述第二通信节点发送的第一个数据 包时, 开始使用所述第一套参数和 /或安全算法与第一通信节点进行通信, 使 用所述第二套参数和 /或安全算法与第二通信节点进行通信; 或者,  The communication module is specifically configured to: when receiving the first data packet sent by the second communication node, start to use the first set of parameters and/or a security algorithm to communicate with the first communication node, using the a second set of parameters and/or security algorithms to communicate with the second communication node; or
所述通信模块, 具体用于在接收到所述第一套参数和 /或安全算法后的预 设时间内或者之后, 开始使用所述第一套参数和 /或安全算法与第一通信节点 进行通信, 所述第三通信节点在接收到所述第二套参数和 /或安全算法后的预 设时间内或者之后, 开始使用所述第二套参数和 /或安全算法与第二通信节点 进行通信。  The communication module is specifically configured to start using the first set of parameters and/or security algorithms with the first communication node within a preset time after or after receiving the first set of parameters and/or security algorithms. Communicating, the third communication node starts using the second set of parameters and/or security algorithm with the second communication node within a preset time after or after receiving the second set of parameters and/or security algorithms Communication.
本发明实施例第五方面提供一种移动管理实体, 包括:  A fifth aspect of the embodiments of the present invention provides a mobility management entity, including:
接收模块, 用于接收第一通信节点发送的请求消息;  a receiving module, configured to receive a request message sent by the first communications node;
发送模块, 用于根据所述请求消息向所述第一通信节点发送第一套参数 和 /或安全算法和至少一套第二套参数和 /或安全算法; 或者,  a sending module, configured to send, according to the request message, a first set of parameters and/or a security algorithm and at least one second set of parameters and/or security algorithms to the first communication node; or
根据所述请求消息向所述第一通信节点发送所述第一套参数和 /或安全算 法, 向至少一个第二通信节点发送对应的第二套参数和 /或安全算法;  Transmitting, according to the request message, the first set of parameters and/or security algorithms to the first communication node, and sending a corresponding second set of parameters and/or security algorithms to the at least one second communication node;
其中, 所述第一套参数和 /或安全算法用于第一通信节点与第三通信节点 进行通信, 所述第二套参数和 /或安全算法用于第二通信节点与第三通信节点 进行通信;  The first set of parameters and/or security algorithms are used by the first communication node to communicate with the third communication node, and the second set of parameters and/or security algorithms are used by the second communication node and the third communication node. Communication
所述第一通信节点为与所述第三通信节点进行控制面信令通信的站点, 所述第二通信节点为与所述第三通信节点进行用户面数据通信的站点; 或者, 所述第一通信节点所在的小区为与所述第三通信节点的主小区, 所述第 二通信节点所在的小区为所述第三通信节点的辅小区。 The first communication node is a station that performs control plane signaling communication with the third communication node, and the second communication node is a site that performs user plane data communication with the third communication node; or The cell in which the first communication node is located is the primary cell of the third communication node, and the cell in which the second communication node is located is the secondary cell of the third communication node.
结合第五方面, 在第五方面的第一种可能的实施方式中, 所述安全算法 包括加密算法、 头压缩算法和完整性保护算法中的至少一种算法;  With reference to the fifth aspect, in a first possible implementation manner of the fifth aspect, the security algorithm includes at least one of an encryption algorithm, a header compression algorithm, and an integrity protection algorithm;
所述参数包括下一跳连接计数器 NCC、 下一跳 NH、 小区无线网络临时标 识 C-RNTI、 分组数据汇聚层协议 PDCP序列号的长度中的至少一种参数。  The parameters include at least one of a next hop connection counter NCC, a next hop NH, a cell radio network temporary identification C-RNTI, and a packet data convergence layer protocol PDCP sequence number.
本发明实施例第六方面提供一种通信节点, 所述通信节点为第一通信节 点, 包括:  A sixth aspect of the embodiments of the present invention provides a communication node, where the communication node is a first communication node, including:
发送模块, 用于向移动管理实体 MME发送请求消息, 以使所述 MME根据 所述请求消息向所述第一通信节点发送第一套参数和 /或安全算法和至少一套 第二套参数和 /或安全算法, 或者, 向所述第一通信节点发送所述第一套参数 和 /或安全算法, 以及向至少一个第二通信节点发送所述第二套参数和 /或安全 算法;  a sending module, configured to send a request message to the mobility management entity MME, to enable the MME to send a first set of parameters and/or a security algorithm and at least one set of second parameters to the first communication node according to the request message And/or a security algorithm, or transmitting the first set of parameters and/or security algorithms to the first communication node, and transmitting the second set of parameters and/or security algorithms to at least one second communication node;
接收模块,用于接收所述 MME发送的第一套参数和 /或安全算法和第二套 参数和 /或安全算法; 或者,  a receiving module, configured to receive a first set of parameters and/or a security algorithm and a second set of parameters and/or security algorithms sent by the MME; or
接收所述 MME发送的第一套参数和 /或安全算法;  Receiving a first set of parameters and/or security algorithms sent by the MME;
所述第一通信节点为与所述第三通信节点进行控制面信令通信的站点, 所述第二通信节点为与所述第三通信节点进行用户面数据通信的站点; 或者, 所述第一通信节点所在的小区为与所述第三通信节点的主小区, 所述第 二通信节点所在的小区为所述第三通信节点的辅小区。  The first communication node is a station that performs control plane signaling communication with the third communication node, and the second communication node is a site that performs user plane data communication with the third communication node; or, the The cell in which the communication node is located is the primary cell of the third communication node, and the cell in which the second communication node is located is the secondary cell of the third communication node.
结合第六方面, 在第六方面的第一种可能的实施方式中, 所述发送模块, 还用于所述接收模块接收所述 MME发送的第一套参数和安全算法和至少一套 第二套参数和 /或安全算法之后, 向至少一个所述第二通信节点发送对应的所 述第二套参数和 /或安全算法, 并向第三通信节点发送所述第一套参数和 /或安 全算法和所述至少一套第二套参数和 /或安全算法。  With reference to the sixth aspect, in a first possible implementation manner of the sixth aspect, the sending module is further configured to receive, by the receiving module, a first set of parameters and a security algorithm sent by the MME, and at least one set of second After the set of parameters and/or the security algorithm, transmitting the corresponding second set of parameters and/or security algorithms to at least one of the second communication nodes, and transmitting the first set of parameters and/or security to the third communication node An algorithm and the at least one set of second set of parameters and/or security algorithms.
结合第六方面, 在第六方面的第二种可能的实施方式中, 所述发送模块, 还用于所述接收模块接收所述 MME发送的第一套参数和 /或安全算法之后, 向 第三通信节点发送所述第一套参数和 /或安全算法。  With reference to the sixth aspect, in a second possible implementation manner of the sixth aspect, the sending module is further configured to: after the receiving module receives the first set of parameters and/or security algorithms sent by the MME, The third communication node transmits the first set of parameters and/or security algorithms.
结合第六方面, 在第六方面的第三种可能的实施方式中, 所述发送模块, 还用于向所述第二通信节点或第三通信节点发送消息, 以使所述第二通信节 点在接收到所述消息时开始使用所述第二套参数和 /或安全算法与第三通信节 点进行通信, 使第三通信节点在接收到所述消息时开始使用所述第一套参数 和 /或安全算法与第一通信节点进行通信, 使用所述第二套参数和 /或安全算法 与第二通信节点进行通信。 With reference to the sixth aspect, in a third possible implementation manner of the sixth aspect, the sending module is further configured to send a message to the second communications node or the third communications node, so that the second communications section Pointing, upon receiving the message, initiating communication with the third communication node using the second set of parameters and/or security algorithms, causing the third communication node to begin using the first set of parameters and upon receiving the message The security algorithm communicates with the first communication node and communicates with the second communication node using the second set of parameters and/or security algorithms.
结合第六方面, 在第六方面的第四种可能的实施方式中, 所述通信节点 还包括通信模块, 用于根据所述第一套参数和 /或安全算法与第三通信节点进 行通信。  In conjunction with the sixth aspect, in a fourth possible implementation manner of the sixth aspect, the communications node further includes a communications module, configured to communicate with the third communications node according to the first set of parameters and/or security algorithms.
结合第六方面至第六方面的第四种可能的实施方式中任一项, 在第六方 面的第五种可能的实施方式中, 所述安全算法包括加密算法、 头压缩算法和 完整性保护算法中的至少一种算法;  With reference to any one of the sixth aspect to the fourth possible implementation manner of the sixth aspect, in a fifth possible implementation manner of the sixth aspect, the security algorithm includes an encryption algorithm, a header compression algorithm, and integrity protection At least one algorithm in the algorithm;
所述参数包括下一跳连接计数器 NCC、 下一跳 NH、 小区无线网络临时标 识 C-RNTI、 分组数据汇聚层协议 PDCP序列号的长度中的至少一种参数。  The parameters include at least one of a next hop connection counter NCC, a next hop NH, a cell radio network temporary identification C-RNTI, and a packet data convergence layer protocol PDCP sequence number.
结合第六方面的第五种可能的实施方式, 在第六方面的第六种可能的实 施方式中, 所述通信模块, 具体用于下述至少一种:  With reference to the fifth possible implementation manner of the sixth aspect, in a sixth possible implementation manner of the sixth aspect, the communication module is specifically used in at least one of the following:
根据所述加密算法对与第三通信节点进行通信的信息进行加解密处理; 根据所述头压缩算法对与第三通信节点进行通信的信息进行头压缩或者 解头压缩处理;  Performing encryption and decryption processing on the information communicated with the third communication node according to the encryption algorithm; performing header compression or decompression processing on the information communicated with the third communication node according to the header compression algorithm;
根据所述完整性保护算法对与第三通信节点进行通信的信息进行完整性 保护或者解完整性保护处理。  And performing integrity protection or de-integrity protection processing on the information communicated with the third communication node according to the integrity protection algorithm.
本发明实施例中, 第三通信节点可以接收到第一通信节点发送的第一套 参数和 /或安全算法和第二套参数和 /或安全算法, 或者, 接收该第一通信节点 发送的第一套参数和 /或安全算法和第二通信节点发送的第二套参数和 /或安 全算法, 进而第三通信节点使用该第一套参数和 /或安全算法与第一通信节点 进行通信, 使用该第二套参数和 /或安全算法与第二通信节点进行通信, 从而 实现了 MME想要更新第三通信节点所使用的参数和 /或安全算法时,能够让与 第三通信节点进行通信的通信节点以及第三通信节点都及时获取更新的参 数, 避免与第三通信节点进行通信的通信节点以及第三通信节点无法对通信 过程中的信息进行处理。 附图说明 为了更清楚地说明本发明实施例或现有技术中的技术方案, 下面将对实 施例或现有技术描述中所需要使用的附图作一筒单地介绍, 显而易见地, 下 面描述中的附图是本发明的一些实施例, 对于本领域普通技术人员来讲, 在 不付出创造性劳动的前提下, 还可以根据这些附图获得其他的附图。 In the embodiment of the present invention, the third communications node may receive the first set of parameters and/or the security algorithm and the second set of parameters and/or security algorithms sent by the first communications node, or receive the first sent by the first communications node. a set of parameters and/or security algorithms and a second set of parameters and/or security algorithms sent by the second communication node, wherein the third communication node uses the first set of parameters and/or security algorithms to communicate with the first communication node, using The second set of parameters and/or security algorithms communicate with the second communication node to enable communication with the third communication node when the MME wants to update parameters and/or security algorithms used by the third communication node Both the communication node and the third communication node acquire the updated parameters in time, and the communication node that communicates with the third communication node and the third communication node are prevented from processing the information in the communication process. BRIEF DESCRIPTION OF THE DRAWINGS In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the prior art description will be briefly described below, and obviously, the following description will be described below. The drawings in the drawings are some embodiments of the present invention, and those skilled in the art can obtain other drawings based on these drawings without any creative work.
图 1为本发明提供的小区优化方法实施例一的流程示意图;  1 is a schematic flowchart of Embodiment 1 of a cell optimization method according to the present invention;
图 2为本发明提供的小区优化方法实施例二的流程示意图;  2 is a schematic flowchart of Embodiment 2 of a cell optimization method according to the present invention;
图 3为本发明提供的小区优化方法实施例三的流程示意图;  3 is a schematic flowchart of Embodiment 3 of a cell optimization method according to the present invention;
图 4为本发明提供的小区优化方法实施例四的流程示意图;  4 is a schematic flowchart of Embodiment 4 of a cell optimization method according to the present invention;
图 5为本发明提供的小区优化方法实施例五的流程示意图;  FIG. 5 is a schematic flowchart of Embodiment 5 of a cell optimization method according to the present invention;
图 6为本发明提供的小区优化方法实施例六的流程示意图;  6 is a schematic flowchart of Embodiment 6 of a cell optimization method according to the present invention;
图 7为本发明提供的通信节点实施例一的结构示意图;  FIG. 7 is a schematic structural diagram of Embodiment 1 of a communication node according to the present invention;
图 8为本发明提供的移动管理实体实施例一的结构示意图;  FIG. 8 is a schematic structural diagram of Embodiment 1 of a mobility management entity according to the present invention;
图 9为本发明提供的通信节点实施例二的结构示意图;  FIG. 9 is a schematic structural diagram of Embodiment 2 of a communication node according to the present invention;
图 10为本发明提供的通信节点实施例三的结构示意图;  FIG. 10 is a schematic structural diagram of Embodiment 3 of a communication node according to the present invention;
图 11为本发明提供的通信节点实施例四的结构示意图。  FIG. 11 is a schematic structural diagram of Embodiment 4 of a communication node according to the present invention.
具体实施方式 detailed description
为使本发明实施例的目的、 技术方案和优点更加清楚, 下面将结合本发 明实施例中的附图, 对本发明实施例中的技术方案进行清楚、 完整地描述, 显然, 所描述的实施例是本发明一部分实施例, 而不是全部的实施例。 基于 本发明中的实施例, 本领域普通技术人员在没有作出创造性劳动前提下所获 得的所有其他实施例, 都属于本发明保护的范围。  The technical solutions in the embodiments of the present invention are clearly and completely described in the following with reference to the accompanying drawings in the embodiments of the present invention. It is a partial embodiment of the invention, and not all of the embodiments. All other embodiments obtained by those skilled in the art based on the embodiments of the present invention without creative efforts are within the scope of the present invention.
图 1为本发明提供的小区优化方法实施例一的流程示意图, 如图 1所示, 该方法包括:  FIG. 1 is a schematic flowchart of Embodiment 1 of a cell optimization method according to the present invention. As shown in FIG. 1, the method includes:
S101 a、 第三通信节点接收第一通信节点发送的第一套参数和 /或安全算 法和至少一套第二套参数和 /或安全算法。 当存在多个第二通信节点时, 每个 第二通信节点都会有对应的第二套参数和 /或安全算法。  S101 a. The third communication node receives the first set of parameters and/or security algorithms sent by the first communication node and at least one set of second sets of parameters and/or security algorithms. When there are multiple second communication nodes, each second communication node will have a corresponding second set of parameters and/or security algorithms.
S101 b、 第三通信节点接收第一通信节点发送的第一套参数和 /或安全算 法和至少一个第二通信节点发送的第二套参数和 /或安全算法。需要说明的是, 当存在多个第二通信节点时, 第三通信节点可以接收每一个第二通信节点发 送的对应的参数和 /或安全算法, 不同第二通信节点发送的第二套参数和 /或安 全算法可能都是不同的。 S101b. The third communication node receives the first set of parameters and/or security algorithms sent by the first communication node and the second set of parameters and/or security algorithms sent by the at least one second communication node. It should be noted, When there are multiple second communication nodes, the third communication node may receive corresponding parameters and/or security algorithms sent by each second communication node, and the second set of parameters and/or security algorithms sent by different second communication nodes may They are all different.
需要说明的是, 根据不同的情况, S10a和 S10b择一执行。 另外, 上述第 一通信节点发送的参数和 /或安全算法是由 MME发送给该第一通信节点的,上 述第二通信节点发送的参数和 /或安全算法可以是由 MME直接发送给该第一 通信节点的, 也可以是 MME先发送给上述第一通信节点, 再由第一通信节点 转发给该第二通信节点的。  It should be noted that S10a and S10b are alternatively executed according to different situations. In addition, the parameter and/or security algorithm sent by the first communication node is sent by the MME to the first communication node, and the parameter and/or security algorithm sent by the second communication node may be directly sent by the MME to the first The communication node may also be sent by the MME to the first communication node and then forwarded by the first communication node to the second communication node.
S102、第三通信节点使用上述第一套参数和 /或安全算法与第一通信节点 进行通信, 使用上述第二套参数和 /或安全算法与第二通信节点进行通信; 这 些参数和 /或安全算法可以用于进行通信的信息进行加解密密处理、 头压缩或 者解头压缩处理、 完整性保护或者解完整性保护处理等。 当存在多个第二通 信节点时, UE使用各第二通信节点对应的第二套参数和 /或安全算法与各第二 通信节点进行通信。  S102. The third communication node communicates with the first communication node by using the first set of parameters and/or security algorithms, and communicates with the second communication node by using the second set of parameters and/or security algorithms; these parameters and/or security The algorithm can be used for encryption and decryption processing, header compression or decompression processing, integrity protection or de-integrity protection processing. When there are a plurality of second communication nodes, the UE communicates with each of the second communication nodes using a second set of parameters and/or security algorithms corresponding to the respective second communication nodes.
本发明实施例主要针对第三通信节点的用户面和控制面分离的情况, 其 中, 上述第一通信节点为与第三通信节点进行控制面信令通信的站点, 上述 第二通信节点为与第三通信节点进行用户面数据通信的站点; 或者, 也可以 理解为, 上述第一通信节点所在的小区为与上述第三通信节点的主小区, 第 二通信节点所在的小区为上述第三通信节点的辅小区。  The embodiment of the present invention is mainly directed to the separation of the user plane and the control plane of the third communication node, where the first communication node is a station that performs control plane signaling communication with the third communication node, and the second communication node is The third communication node performs the user plane data communication; or, it can be understood that the cell where the first communication node is located is the primary cell of the third communication node, and the cell where the second communication node is located is the third communication node. Secondary cell.
本实施例中, 第三通信节点可以接收到第一通信节点发送的第一套参数 和 /或安全算法和第二套参数和 /或安全算法, 或者, 接收该第一通信节点发送 的第一套参数和 /或安全算法和第二通信节点发送的第二套参数和 /或安全算 法, 进而第三通信节点使用该第一套参数和 /或安全算法与第一通信节点进行 通信, 使用该第二套参数和 /或安全算法与第二通信节点进行通信, 从而实现 了 MME想要更新第三通信节点所使用的参数和 /或安全算法时, 能够让与第三 通信节点进行通信的通信节点以及第三通信节点都及时获取更新的参数, 避 免与第三通信节点进行通信的通信节点以及第三通信节点无法对通信过程中 的信息进行处理。  In this embodiment, the third communications node may receive the first set of parameters and/or security algorithms and the second set of parameters and/or security algorithms sent by the first communications node, or receive the first sent by the first communications node. a set of parameters and/or security algorithms and a second set of parameters and/or security algorithms sent by the second communication node, the third communication node then communicating with the first communication node using the first set of parameters and/or security algorithms, using the The second set of parameters and/or security algorithms communicate with the second communication node to enable communication with the third communication node when the MME wants to update parameters and/or security algorithms used by the third communication node Both the node and the third communication node acquire updated parameters in time, avoiding that the communication node communicating with the third communication node and the third communication node cannot process the information in the communication process.
进一步地, 上述安全算法包括加密算法( Ciphering Algorithm )、 头压缩 算法和完整性保护算法中的至少一种算法; 具体地, 加密算法, 可以是 eeaO, eeal , eea2, eea3-v11xy等; 完整性保护算法, 可以是 eia0-v920, eial , eia2, eia3-v1 1xy等; 头压缩算法是基于头压缩 ( Robust Header Compression , 筒称 ROHC )架构(framework ) , 利用该算法和相应的参数可以进行头压缩 或者解头压缩。 具体的头压缩算法有很多种, 算法的类型通过筒要表识别符 ( Profile Identifier )来定义, 例如 0x0002表示一种算法标识; 具体相关的头 压缩参数, 可以有 Profile Identifier、 MAX_CID , LARGE_CIDS , FEEDBACK_FOR等, 但并不以此为限。 Further, the foregoing security algorithm includes at least one of a Ciphering Algorithm, a header compression algorithm, and an integrity protection algorithm; specifically, the encryption algorithm may be eeaO, Eeal, eea2, eea3-v11xy, etc.; integrity protection algorithm, which can be eia0-v920, eial, eia2, eia3-v1 1xy, etc.; header compression algorithm is based on Robust Header Compression (ROHC) architecture (framework) Header compression or decompression compression can be performed using the algorithm and corresponding parameters. There are many specific header compression algorithms. The type of the algorithm is defined by the Profile Identifier. For example, 0x0002 represents an algorithm identifier. The specific header compression parameters can be Profile Identifier, MAX_CID, LARGE_CIDS, FEEDBACK_FOR. Etc., but not limited to this.
上述参数包括 NCC、 NH、 小区无线网络临时标识 (Cell Radio Network Temporary Identifier, 筒称 C-RNTI ) 、 分组数据汇聚层协议(Packet Data Convergence Protocol , 筒称 PDCP ) 序列号的长度 ( PDCP Sequence Number length in bits, 筒称 PDCP-SN-Size ) 中的至少一种参数, 但并不以 此为限; 其中, C-RNTI是 UE在连接态时在小区中的标示, 用于基站便于通过 C-RNTI来调度 UE, UE通过 C-RNTI来识别和接收自己的数据。  The above parameters include the length of the NCC, NH, Cell Radio Network Temporary Identifier (C-RNTI), Packet Data Convergence Protocol (PDCP) serial number (PDCP Sequence Number length). At least one of the parameters of the inbits, which are called PDCP-SN-Size, but not limited thereto; wherein, the C-RNTI is a flag in the cell when the UE is in the connected state, and is used for the base station to pass the C- The RNTI schedules the UE, and the UE identifies and receives its own data through the C-RNTI.
更进一步地, 上述第三通信节点使用上述第一套参数和 /或安全算法与第 一通信节点进行通信, 使用上述第二套参数和 /或安全算法与第二通信节点进 行通信, 包括下述至少一种:  Further, the third communication node communicates with the first communication node using the first set of parameters and/or security algorithms, and communicates with the second communication node using the second set of parameters and/or security algorithms, including the following At least one:
1 )第三通信节点根据上述加密算法对与第一通信节点和 /或第二通信节点 进行通信的信息进行加解密处理; 即第三通信节点根据上述第一套参数和 /或 安全算法中的加密算法对与第一通信节点进行通信的信息进行加解密处理, 根据上述第二套参数和 /或安全算法中的加密算法对与第二通信节点进行通信 的信息进行加解密处理。 具体地, 可以是上述站点利用上述参数(例如 NCC, NH , 或者 PDCP-SN-Size等)和 /或安全算法推演出密钥, 该密钥用于数据的 加密或者解密。  1) the third communication node performs encryption and decryption processing on the information communicated with the first communication node and/or the second communication node according to the above encryption algorithm; that is, the third communication node is configured according to the first set of parameters and/or security algorithms. The encryption algorithm performs encryption and decryption processing on the information communicated with the first communication node, and performs encryption and decryption processing on the information communicated with the second communication node according to the encryption algorithm in the second set of parameters and/or the security algorithm. Specifically, the above-mentioned station may use a parameter (e.g., NCC, NH, or PDCP-SN-Size, etc.) and/or a security algorithm to derive a key for encryption or decryption of data.
2 )第三通信节点根据上述头压缩算法对与第一通信节点和 /或第二通信节 点进行通信的信息进行头压缩或者解头压缩处理; 即第三通信节点根据上述 第一套参数和 /或安全算法中的头压缩算法对与第一通信节点进行通信的信息 进行头压缩或者解头压缩处理, 第三通信节点根据上述第二套参数和 /或安全 算法中的头压缩算法对对与第二通信节点进行通信的信息进行头压缩或者解 头压缩处理。  2) the third communication node performs header compression or decompression processing on the information communicated with the first communication node and/or the second communication node according to the header compression algorithm; that is, the third communication node performs the first set of parameters according to the above Or a header compression algorithm in the security algorithm performs header compression or decompression compression processing on the information communicated with the first communication node, and the third communication node pairs the second set of parameters and/or the header compression algorithm in the security algorithm. The information communicated by the second communication node is subjected to header compression or decompression compression processing.
3 )第三通信节点根据上述完整性保护算法对与第一通信节点和 /或第二通 信节点进行通信的信息进行完整性保护或者解完整性保护处理; 即第三通信 节点根据上述第一套参数和 /或安全算法中的完整性保护算法对与第一通信节 点进行通信的信息进行完整性保护或者解完整性保护处理, 第三通信节点根 据上述第二套参数和 /或安全算法中的完整性保护算法对与第二通信节点进行 通信的信息进行完整性保护或者解完整性保护处理。 3) the third communication node is associated with the first communication node and/or the second communication according to the integrity protection algorithm described above The information communicated by the node performs integrity protection or de-integrity protection processing; that is, the third communication node performs information communication with the first communication node according to the integrity protection algorithm in the first set of parameters and/or the security algorithm. Integrity protection or de-integrity protection processing, the third communication node performs integrity protection or de-integrity protection on the information communicated with the second communication node according to the integrity protection algorithm in the second set of parameters and/or the security algorithm deal with.
需要说明的是, 本发明实施例中所示的站点都可以替换为基站或小区。 由于本发明实施例针对第三通信节点的控制面和用户面分离的情况, 具 体可以为, 当第三通信节点的控制面切换到第一通信节点时或切换之后, 第 三通信节点的用户面依然在第二通信节点, 或当第三通信节点的用户面切换 到第二通信节点时或切换之后, 第三通信节点的控制面依然在第一通信节点, 即第二通信节点为与上述第三通信节点进行用户面数据通信的基站, 该第一 通信节点为与上述第三通信节点进行控制面信令通信的基站; 或者, 第一通 信节点所在的小区为上述第三通信节点的主小区, 第二通信节点为上述第三 通信节点的辅小区; 更具体的, 本实施例适用于多种具体场景, 举例说明: 场景 1、 第三通信节点的控制面从第二通信节点切换到第一通信节点, 而 该第三通信节点的用户面保持在第二通信节点; 具体地, 可以是以第三通信 节点的用户面和控制面在第二通信节点 (以 Pico为例) 中, 第三通信节点的 控制面要切换到第一通信节点 (以宏网络 eNB, 即宏基站 Macro eNB为例) 。  It should be noted that the stations shown in the embodiments of the present invention may be replaced by base stations or cells. For the case where the control plane and the user plane of the third communication node are separated, the embodiment of the present invention may be: when the control plane of the third communication node switches to the first communication node or after the handover, the user plane of the third communication node Still at the second communication node, or when the user plane of the third communication node switches to the second communication node or after the handover, the control plane of the third communication node is still at the first communication node, ie, the second communication node is the same as the above a third communication node performs base station data communication, the first communication node is a base station that performs control plane signaling communication with the third communication node; or the cell where the first communication node is located is a primary cell of the third communication node The second communication node is a secondary cell of the foregoing third communication node; more specifically, the embodiment is applicable to multiple specific scenarios, for example: scenario 1, the control plane of the third communication node is switched from the second communication node to the first a communication node, and the user plane of the third communication node remains at the second communication node; specifically, may be User and control plane communications node in a second communication node (in Pico example), the control plane third communication node to be switched to the first communication node (macro network to the eNB, i.e. Macro eNB macro base station as an example).
场景 2、 第三通信节点的控制面从第三基站切换到第一通信节点, 而该第 三通信节点的用户面保持在第二通信节点; 该第三站点可以是除上述第二通 信节点、 第一通信节点外的任一站点; 具体地, 可以是第三通信节点从第四 通信节点(以宏基站 Macro eNBI为例) , 切换到目标第一通信节点(以宏基 站 Macro eNB2为例) , 第三通信节点的数据面保持在第二通信节点(以微基 站 Picol为例 ) 。  Scenario 2, the control plane of the third communication node is switched from the third base station to the first communication node, and the user plane of the third communication node is maintained at the second communication node; the third station may be in addition to the second communication node, Any one of the first communication nodes; specifically, the third communication node may switch from the fourth communication node (taking the macro base station Macro eNBI as an example) to the target first communication node (taking the macro base station Macro eNB 2 as an example) The data plane of the third communication node is maintained at the second communication node (taking the micro base station Picol as an example).
场景 3、 第三通信节点的控制面保持在第一通信节点, 而该第三通信节点 的用户面从第四通信节点切换到第二通信节点; 同样, 该第四通信节点可以 是除上述第二通信节点、 第一通信节点外的任一基站; 具体地, 可以是第三 通信节点的控制面保持在第一通信节点 (以宏基站 eNB为例) , 第三通信节 点的用户面传输从第四通信节点(以微基站 Pico2为例)更换到第二通信节点 (以 Picol为例 ) 。 场景 4、 第三通信节点的用户面从第一通信节点切换到第二通信节点, 而 该第三通信节点的控制面保持在第一通信节点。 具体地, 可以是第三通信节 点的用户面和控制面在第一通信节点 (以宏基站 eNB为例) 中, 第三通信节 点的用户面转换到第二通信节点 (以 Picol为例) 。 Scenario 3, the control plane of the third communication node is maintained at the first communication node, and the user plane of the third communication node is switched from the fourth communication node to the second communication node; likewise, the fourth communication node may be in addition to the foregoing a second communication node, any one of the first communication nodes; specifically, the control plane of the third communication node may be maintained at the first communication node (taking the macro base station eNB as an example), and the user plane of the third communication node is transmitted from The fourth communication node (taking the micro base station Pico2 as an example) is replaced with the second communication node (taking Picol as an example). Scenario 4, the user plane of the third communication node switches from the first communication node to the second communication node, and the control plane of the third communication node remains at the first communication node. Specifically, the user plane and the control plane of the third communication node may be in the first communication node (taking the macro base station eNB as an example), and the user plane of the third communication node is switched to the second communication node (taking Picol as an example).
在第三通信节点的控制面和用户面分离的情况下, 第三通信节点的控制 面和用户面可以在不同的站点间切换, 本发明实施例的实现场景可以在切换 过程中, 也可以在非切换过程中, 只要 MME要对第三通信节点使用的参数和 / 或安全算法进行更新, 就要将更新的参数和 /或安全算法发送给对应的站点, 再由站点发送给第三通信节点, 以便第一通信节点、 第二通信节点、 第三通 信节点三方能够同步使用更新后的参数和 /或安全算法, 也便于第一通信节点 使用上述第一套参数和 /或安全算法与第三通信节点进行通信, 第二通信节点 使用上述第二套参数和 /或安全算法与第三通信节点进行通信。需要说明的是, 站点与第三通信节点进行通信的信息可以是数据或还可以是信令, 例如系统 消息、 物理层信令、 控制信道上的信息等。  In the case that the control plane and the user plane of the third communication node are separated, the control plane and the user plane of the third communication node may be switched between different sites. The implementation scenario of the embodiment of the present invention may be in the handover process, or In the non-handover process, as long as the MME wants to update the parameters and/or security algorithms used by the third communication node, the updated parameters and/or security algorithms are sent to the corresponding site, and then sent by the site to the third communication node. So that the first communication node, the second communication node, and the third communication node can synchronously use the updated parameters and/or security algorithms, and also facilitate the first communication node to use the first set of parameters and/or security algorithms and the third The communication node communicates and the second communication node communicates with the third communication node using the second set of parameters and/or security algorithms described above. It should be noted that the information that the station communicates with the third communication node may be data or may also be signaling, such as system messages, physical layer signaling, information on the control channel, and the like.
另外, 在本发明实施例中所提及的第一通信节点, 或者第二通信节点, 可以是无线通信节点, 所述通信节点可以是各种类型的基站, 宏基站(Macro eNB ) , 微微基站 (Micro eNB ) , 微基站 ( Pico eNB ) , 家庭基站 HeNB, 小小区基站 ( Small Cell eNB ) , 中继基站 ( relay station )等, 在此不作限 制。 第一通信节点或者第二通信节点还可以是 UE。 具体地, 该 UE可以支持设 备到设备( Device to Device, 筒称 D2D )功能, 支持用户设备之间的端到端 通信。  In addition, the first communication node or the second communication node mentioned in the embodiment of the present invention may be a wireless communication node, and the communication node may be various types of base stations, a macro base station (Macro eNB), and a pico base station. (Micro eNB), a micro base station (Pico eNB), a home base station HeNB, a small cell eNB, a relay station, etc., are not limited herein. The first communication node or the second communication node may also be a UE. Specifically, the UE can support a Device to Device (D2D) function to support end-to-end communication between user equipments.
本发明实施例中, 第三通信节点可以是无线通信节点, 该通信节点可以 是各种类型的基站, 宏基站(Macro eNB ) , 微微基站( Micro eNB ) , 微基 站 ( Pico eNB ) , 家庭基站 HeNB, 小小区基站 ( Small Cell eNB ) , 中继基 站(relay station )等, 在此不作限制。 第三通信节点可以是 UE。 具体地, 该 第三通信节点可以支持 Device-to-Devicc功能, 支持用户设备之间的端到端通 信。 本发明实施例中第三通信节点以用户设备为例说明发明内容。  In the embodiment of the present invention, the third communication node may be a wireless communication node, and the communication node may be various types of base stations, a macro base station (Macro eNB), a pico base station (Micro eNB), a micro base station (Pico eNB), and a home base station. The HeNB, the small cell eNB, the relay station, and the like are not limited herein. The third communication node can be a UE. Specifically, the third communication node can support the Device-to-Devicc function to support end-to-end communication between user equipments. In the embodiment of the present invention, the third communication node takes the user equipment as an example to illustrate the content of the invention.
本发明实施例中, 除了第三通信节点的控制面与用户面分离的场景, 还 可以是第三通信节点支持载波聚合的场景, 具体指第一通信节点所在的小区 1 使用频率 f1 , 第二通信节点所在的小区 2使用频率 f2同时为第三通信节点提供 服务。 举例说明, 第一通信节点的为第三通信节点服务的小区 1可能被称为主 小区, 第二通信节点为终端服务的小区 2可能被称为辅小区。 第一通信节点可 能是宏基站 eN B , 第二通信节点可能是微基站 Pico。 In the embodiment of the present invention, the scenario in which the control plane of the third communication node is separated from the user plane may be a scenario in which the third communication node supports carrier aggregation, and specifically refers to the frequency of the cell 1 in which the first communication node is located, and second. The cell 2 where the communication node is located uses the frequency f2 and simultaneously provides the third communication node. Service. For example, the cell 1 serving the third communication node of the first communication node may be referred to as a primary cell, and the cell 2 serving the terminal by the second communication node may be referred to as a secondary cell. The first communication node may be a macro base station eN B and the second communication node may be a micro base station Pico.
为第三通信节点提供控制面服务的站点, 即上述第一通信节点可以作为 第三通信节点的主站点, 主站点通常采用低频段传递控制面信令, 可选的可 以承载第三通信节点的部分低数据量的业务承载; 第三通信节点的无线资源 控制( Radio Resource Control , 筒称 RRC )连接建立在主站点上; 下面对为 第三通信节点的控制面服务的站点 /小区, 为第三通信节点的用户面服务的站 点 /小区, 进行详细的定义:  a station that provides a control plane service for the third communication node, that is, the first communication node may serve as a primary station of the third communication node, and the primary station usually adopts a low frequency band to transmit control plane signaling, and optionally may carry the third communication node. Part of the low data volume service bearer; the radio resource control (Radio Resource Control, RRC) connection of the third communication node is established at the primary site; the following is the site/cell serving the control plane of the third communication node, The site/cell of the user plane service of the third communication node is defined in detail:
为第三通信节点提供控制面服务的站点包括: 控制面传输的小区对应的 站点, 可以为第三通信节点发送控制信令的下行传输站点; 或者, 宏基站或 者宏小区对应的站点; 或者, 主小区 ( primary cell )对应的站点; 或者, 第 三通信节点服务小区对应的站点; 为第三通信节点提供信令无线承载 ( Signaling Radio Bearer, 筒称 SRB )传输的站点; 第三通信节点的 RRC连 接建立所在的站点。  The station that provides the control plane service for the third communication node includes: a site corresponding to the cell to which the control plane transmits, a downlink transmission site that can send control signaling for the third communication node; or a site corresponding to the macro base station or the macro cell; or a site corresponding to the primary cell; or a site corresponding to the serving cell of the third communication node; a site providing a Signaling Radio Bearer (SRB) for the third communication node; and a third communication node The site where the RRC connection is established.
为第三通信节点提供控制面服务或者控制面传输的小区包括: 主小区 ( primary cell ) ; 或者, 为第三通信节点发送控制信令的小区; 或者, 为第 三通信节点发送控制信令的下行传输点对应的小区; 或者, 宏基站对应的小 区; 或者, 在 RRC连接建立或重建立或切换过程中, 为第三通信节点提供非 接入层 (NAS)移动性信息的小区, 或者, 在 RRC连接建立或者切换过程中, 为 第三通信节点提供安全输入的小区; 为第三通信节点提供 SRB传输的小区。 其中, 在 RRC连接建立或者切换过程中为第三通信节点提供安全输入的小区 也是主小区。 辅小区是不同于主小区的小区。  The cell that provides the control plane service or the control plane transmission for the third communication node includes: a primary cell; or a cell that sends control signaling for the third communication node; or sends control signaling for the third communication node. a cell corresponding to the downlink transmission point; or a cell corresponding to the macro base station; or a cell providing non-access stratum (NAS) mobility information for the third communication node during RRC connection setup or re-establishment or handover, or In the RRC connection setup or handover procedure, the third communication node is provided with a secure input cell; the third communication node is provided with the SRB transported cell. The cell that provides security input to the third communication node during the RRC connection setup or handover process is also the primary cell. The secondary cell is a cell different from the primary cell.
控制信令可以是至少包括下述一个: 混合自动重传指示信道上的信息、 控制信息格式指示信道上的信息、 控制信道上的信息、 系统消息、 物理层信 令、 媒质接入控制 (Medium Access Control , 筒称 MAC )层消息、 RRC层 消息, S RBs对应的信息。  The control signaling may include at least one of the following: information on the hybrid automatic repeat indication channel, information on the control information format indication channel, information on the control channel, system message, physical layer signaling, medium access control (Medium) Access Control, the so-called MAC) layer message, RRC layer message, S RBs corresponding information.
可选地, 第三通信节点提供控制面服务的站点可以在上述定义的基础上, 还负责 DRBs或者部分 SRBs的传输。  Optionally, the station that provides the control plane service by the third communication node may also be responsible for the transmission of the DRBs or part of the SRBs on the basis of the above definition.
为第三通信节点提供用户面服务的站点包括: 辅小区 ( Secondary cell ) 所在的站点, 或者是辅小区对应的站点, 或者是为第三通信节点提供数据传 输的站点, 或者是为第三通信节点提供数据无线承载(Data Radio Bearer, 筒称 DRB )和 /或信令无线 7 载( Signaling Radio Bearer, 筒称 SRB )传输的 站点, 或者是为第三通信节点提供物理下行共享信道( Physical Downlink Shared Channel , 筒称 PDSCH )上传输的信息的站点, 需要说明的是这里提 供的的 SRB与上述为第三通信节点提供控制面服务的基站所提供的 SRB不 同; The site providing the user plane service for the third communication node includes: a secondary cell The station where the station is located, or the station corresponding to the secondary cell, or the station that provides data transmission for the third communication node, or provides the data radio bearer (Data Radio Bearer, DRB) and/or signaling for the third communication node. A station that transmits a Signaling Radio Bearer (SRB), or a station that provides information for transmission on a Physical Downlink Shared Channel (PDSCH) for a third communication node. The provided SRB is different from the SRB provided by the base station that provides the control plane service for the third communication node;
为第三通信节点提供用户面服务或者用户面传输的小区包括: 辅小区 ( Secondary cell ); 或者, 为用户第三通信节点提供数据传输的小区; 为用 户第三通信节点提供 DRB传输的小区; 或者, 为第三通信节点提供传输 PDSCH上信息的小区。  The cell that provides the user plane service or the user plane transmission for the third communication node includes: a secondary cell; or a cell that provides data transmission for the third communication node of the user; and a cell that provides DRB transmission for the third communication node of the user; Alternatively, the third communication node is provided with a cell that transmits information on the PDSCH.
举例说明:  for example:
具体地, 可以是, 为第三通信节点提供控制面传输的站点负责了 SRBs的 传输; 为第三通信节点提供用户面传输的站点负责 DRBs的传输。  Specifically, it may be that the station providing the control plane transmission for the third communication node is responsible for the transmission of the SRBs; the station providing the user plane transmission for the third communication node is responsible for the transmission of the DRBs.
或者, 可以是, 为第三通信节点提供控制面传输的站点负责了 SRB0和 SRB1的传输;为第三通信节点提供用户面传输的站点负责 SRB2和 DRBs的传 输, 其中是将上述 SRBs划分为 SRB0、 SRB1、 SRB2。 具体地, SRBO用来 传输 RRC消息, 在公共控制信道(Common Control Channel , 筒称 CCCH ) 上传输; SRB1用来传输 RRC消息 (可能还会包含 piggybacked N AS消息) , 在 SRB2承载的建立之前, 比 SRB2具有更高的优先级。 在专用控制信道 ( Dedicated Control Channel,筒称 DCCH )上传输 SRB2用来传输 NAS消息, 比 SRB1具有更低的优先级, 并且总是在安全模式激活之后才配置 SRB2, 在 DCCH上传输。  Alternatively, it may be that the station providing the control plane transmission for the third communication node is responsible for the transmission of SRB0 and SRB1; the station providing the user plane transmission for the third communication node is responsible for the transmission of SRB2 and DRBs, wherein the above SRBs are divided into SRB0 , SRB1, SRB2. Specifically, the SRBO is used to transmit an RRC message, and is transmitted on a Common Control Channel (CCT); the SRB1 is used to transmit an RRC message (and may also include a piggybacked N AS message), before the establishment of the SRB2 bearer, Has a higher priority than SRB2. SRB2 is transmitted on the Dedicated Control Channel (DCCH) to transmit NAS messages, which has lower priority than SRB1, and SRB2 is always configured to be transmitted on the DCCH after the security mode is activated.
或者, 可以是, 为第三通信节点提供控制面传输的站点负责了 SRB0和 SRB1的传输, 而且还负责了部分 DRBs的传输; 为第三通信节点提供用户面 传输的站点负责 SRB2和部分 DRBs的传输。  Alternatively, it may be that the station providing the control plane transmission for the third communication node is responsible for the transmission of SRB0 and SRB1, and is also responsible for the transmission of part of the DRBs; the station providing the user plane transmission for the third communication node is responsible for SRB2 and part of the DRBs. transmission.
或者, 可以是, 为第三通信节点提供控制面传输的站点负责了 SRBs的传 输, 而且还负责了部分 DRBs的传输; 为第三通信节点提供用户面传输的站点 负责部分 DRBs的传输。  Alternatively, it may be that the station providing the control plane transmission for the third communication node is responsible for the transmission of the SRBs, and is also responsible for the transmission of the partial DRBs; the station providing the user plane transmission for the third communication node is responsible for the transmission of the partial DRBs.
更进一步地, 上述第三通信节点使用第一套参数和 /或安全算法与第一通 信节点进行通信, 使用第二套参数和 /或安全算法与第二通信节点进行通信, 在具体实施过程中, 存在多种情况, 如下所示: Further, the third communication node uses the first set of parameters and/or security algorithm and the first pass The signaling node communicates and communicates with the second communication node using a second set of parameters and/or security algorithms. In the implementation process, there are various situations, as follows:
1 )第三通信节点在接收到所述第一套参数和 /或安全算法时,开始使用该 第一套参数和 /或安全算法与第一通信节点进行通信, 第三通信节点在接收到 第二套参数和 /或安全算法时, 开始使用该第二套参数和 /或安全算法与第二通 信节点进行通信; 即第三通信节点一接收到参数和 /或安全算法, 就立刻投入 使用。  1) The third communication node starts to communicate with the first communication node using the first set of parameters and/or security algorithms when receiving the first set of parameters and/or security algorithms, and the third communication node receives the first When the two sets of parameters and/or security algorithms are used, the second set of parameters and/or security algorithms are used to communicate with the second communication node; that is, the third communication node is put into use as soon as it receives the parameters and/or security algorithms.
2 )第三通信节点在向第二通信节点发送信息时, 开始使用上述第一套参 数和 /或安全算法与第一通信节点进行通信, 使用上述第二套参数和 /或安全算 法与第二通信节点进行通信; 上述第三通信节点向第二通信节点发送的信息 可以是任一信息。  2) the third communication node, when transmitting information to the second communication node, starts communicating with the first communication node using the first set of parameters and/or security algorithms, using the second set of parameters and/or security algorithms and the second The communication node performs communication; the information sent by the third communication node to the second communication node may be any information.
3 )第三通信节点在接收第一通信节点或第二通信节点发送的消息时, 开 始使用上述第一套参数和 /或安全算法与第一通信节点进行通信, 使用上述第 二套参数和 /或安全算法与第二通信节点进行通信; 第三通信节点接收的第一 通信节点或第二通信节点发送的消息, 可以是专门用于指示开始使用新的参 数和 /或安全算法的指示消息, 也可以是任一消息, 例如, 可以预先约定第三 通信节点在接收到某一消息时, 开始使用上述第一套参数和 /或安全算法与第 一通信节点进行通信, 使用上述第二套参数和 /或安全算法与第二通信节点进 行通信。  3) when receiving the message sent by the first communication node or the second communication node, the third communication node starts to communicate with the first communication node by using the first set of parameters and/or security algorithms, using the second set of parameters and/or Or the security algorithm communicates with the second communication node; the message sent by the first communication node or the second communication node received by the third communication node may be an indication message specifically for instructing to start using the new parameter and/or the security algorithm, Or any message, for example, the third communication node may pre-arrange to start to communicate with the first communication node by using the first set of parameters and/or security algorithms when receiving a certain message, using the second set of parameters. And/or a security algorithm communicates with the second communication node.
4 )第三通信节点在接入到第二通信节点时, 开始使用上述第一套参数和 /或安全算法与第一通信节点进行通信, 使用上述第二套参数和 /或安全算法与 第二通信节点进行通信; 具体地, 第三通信节点在接收到上述参数和 /或安全 算法后, 暂不使用, 等第三通信节点在接入到第二通信节点时, 再开始使用 接收到的参数和 /或安全算法。  4) when the third communication node accesses the second communication node, starts to communicate with the first communication node using the first set of parameters and/or security algorithms, using the second set of parameters and/or security algorithm and the second The communication node performs communication; specifically, after receiving the parameter and/or the security algorithm, the third communication node is temporarily not used, and the third communication node starts to use the received parameter when accessing the second communication node. And / or security algorithms.
5 )第三通信节点在开始和第二通信节点通信时, 开始使用上述第一套参 数和 /或安全算法与第一通信节点进行通信, 使用上述第二套参数和 /或安全算 法与第二通信节点进行通信; 具体地, 第三通信节点在接收到上述参数和 /或 安全算法后, 暂不使用, 等该第三通信节点在开始和第二通信节点通信时, 再开始使用接收到的参数和 /或安全算法。  5) the third communication node begins to communicate with the first communication node using the first set of parameters and/or security algorithms when communicating with the second communication node, using the second set of parameters and/or security algorithms and the second The communication node performs communication; specifically, after receiving the parameter and/or the security algorithm, the third communication node is temporarily not used, and when the third communication node starts to communicate with the second communication node, starts to use the received Parameters and / or security algorithms.
6 )第三通信节点在接收到所述第二通信节点发送的第一个数据包时, 开 始使用上述第一套参数和 /或安全算法与第一通信节点进行通信, 使用上述第 二套参数和 /或安全算法与第二通信节点进行通信; 具体地, 这里存在两种情 况, 一种是第三通信节点接收到上述参数和 /或安全算法之后, 等收到上述第 二通信节点发送的第一个数据包时, 开始使用上述参数和 /或安全算法; 另外 一种情况是第三通信节点接收到第二通信节点发送的第一个数据包, 暂不做 处理, 等接收到上述参数和 /或安全算法之后, 立即开始使用该参数和 /或安全 算法对上述第一个数据包进行处理。 (此项只是适用于上述场景 1和场景 2。 ) 7 )第三通信节点在接收到所述第一套参数和 /或安全算法后的预设时间内 或者之后,开始使用上述第一套参数和 /或安全算法与第一通信节点进行通信, 该第三通信节点在接收到上述第二套参数和 /或安全算法后的预设时间内或者 之后, 使用上述第二套参数和 /或安全算法与第二通信节点进行通信; 具体实 现过程中, 可以采用定时器定时的方式来实现。 6) when the third communication node receives the first data packet sent by the second communication node, Communicating with the first communication node using the first set of parameters and/or security algorithms described above, and communicating with the second communication node using the second set of parameters and/or security algorithms; specifically, there are two cases, one After receiving the above parameters and/or security algorithms, the third communication node starts to use the above parameters and/or security algorithm when receiving the first data packet sent by the second communication node; The communication node receives the first data packet sent by the second communication node, and does not process it. After receiving the above parameters and/or the security algorithm, the communication node immediately starts using the parameter and/or the security algorithm for the first data packet. Process it. (This item is only applicable to scenario 1 and scenario 2 above.) 7) The third communication node starts to use the first set of parameters after a preset time or after receiving the first set of parameters and/or security algorithms. And/or a security algorithm in communication with the first communication node, the third communication node using the second set of parameters and/or security within a preset time after or after receiving the second set of parameters and/or security algorithms The algorithm communicates with the second communication node; in the specific implementation process, the timer can be used to implement.
具体实现过程中可以不局限于上述各情况。  The specific implementation process may not be limited to the above cases.
本实施例中, 第三通信节点可以接收到第一通信节点发送的第一套参数 和 /或安全算法和第二套参数和 /或安全算法, 或者, 接收该第一通信节点发送 的第一套参数和 /或安全算法和第二通信节点发送的第二套参数和 /或安全算 法, 进而第三通信节点使用该第一套参数和 /或安全算法与第一通信节点进行 通信, 使用该第二套参数和 /或安全算法与第二通信节点进行通信, 从而实现 了不论在第三通信节点的控制面和用户面的切换过程中或非切换过程中, 只 要 MME要更新第三通信节点所使用的参数和 /或安全算法时, 就能够让与第三 通信节点进行通信的基站以及第三通信节点都及时获取更新的参数和 /或安全 算法, 避免与第三通信节点进行通信的站点以及第三通信节点无法对通信过 程中的信息进行处理。  In this embodiment, the third communications node may receive the first set of parameters and/or security algorithms and the second set of parameters and/or security algorithms sent by the first communications node, or receive the first sent by the first communications node. a set of parameters and/or security algorithms and a second set of parameters and/or security algorithms sent by the second communication node, the third communication node then communicating with the first communication node using the first set of parameters and/or security algorithms, using the The second set of parameters and/or security algorithms communicate with the second communication node, thereby enabling the MME to update the third communication node regardless of whether during the handover of the control plane and the user plane of the third communication node or during the handover process When the parameters and/or security algorithms are used, the base station and the third communication node that communicate with the third communication node can acquire updated parameters and/or security algorithms in time to avoid the site communicating with the third communication node. And the third communication node cannot process the information in the communication process.
图 2为本发明提供的小区优化方法实施例二的流程示意图, 该方法的执行 主体为 MME, 如图 2所示, 该方法包括:  2 is a schematic flowchart of a second embodiment of a cell optimization method according to the present invention. The method is implemented as an MME. As shown in FIG. 2, the method includes:
S201、 MME接收第一通信节点发送的请求消息; 该第一通信节点为图 1 实施例中所示的第一通信节点。 该请求消息中可以包括下述消息中的至少一 项: 上述第二通信节点的第三通信节点 S1接口身份标识码( ID ) , 用来标识 该第二通信节点的 S1接口所对应的第三通信节点; 上述 MME的第三通信节点 S1接口 ID, 用来标识该 MME的 S1接口所对应的第三通信节点; 上述第二通信 节点的标识; 上述第二通信节点的网络之间互连的协议( Internet Protocol , 筒称 IP )地址信息;上述第二通信节点所在小区的标识,例如, E-UTRAN-CGI; 指示信息, 用以指示 MME需要分配两套参数和 /或安全算法, 即上述第一套参 数和 /或安全算法和第二套参数和 /或安全算法。 S201. The MME receives the request message sent by the first communications node. The first communications node is the first communications node shown in the embodiment of FIG. 1. The request message may include at least one of the following messages: the third communication node S1 interface identity code (ID) of the second communication node is used to identify the third corresponding to the S1 interface of the second communication node. a communication node; a third communication node S1 interface ID of the MME, used to identify a third communication node corresponding to the S1 interface of the MME; The identifier of the node; the protocol (Internet Protocol, IP address) of the communication between the networks of the second communication node; the identifier of the cell where the second communication node is located, for example, E-UTRAN-CGI; indication information, To indicate that the MME needs to allocate two sets of parameters and/or security algorithms, namely the first set of parameters and/or security algorithms and the second set of parameters and/or security algorithms described above.
需要说明的是, S201可以根据具体场景选择执行, 例如在非切换过程中, 当 MME主动要给第三通信节点更新使用的参数和 /或安全算法时, 则不需要执 行该步骤。  It should be noted that S201 may perform selection according to a specific scenario. For example, in the non-handover process, when the MME actively requests the third communication node to update the used parameters and/or security algorithms, the step is not required to be performed.
S202a、 该 MME根据上述请求消息向上述第一通信节点发送第一套参数 和 /或安全算法和至少一套第二套参数和 /或安全算法。 当存在多个第二通信节 点时, 就需要为每一个第二通信节点分配对应的第二套参数和 /或安全算法。  S202a. The MME sends a first set of parameters and/or security algorithms and at least one set of second sets of parameters and/or security algorithms to the first communication node according to the request message. When there are multiple second communication nodes, it is necessary to assign a corresponding second set of parameters and/or security algorithms to each of the second communication nodes.
S202b、 该 MME根据上述请求消息向上述第一通信节点发送第一套参数 和 /或安全算法, 向至少一个第二通信节点发送对应的第二套参数和 /或安全算 法。 当存在多个第二通信节点时, MME分别向各第二通信节点发送对应的第 二套参数和 /或安全算法。  S202b: The MME sends a first set of parameters and/or security algorithms to the first communication node according to the request message, and sends a corresponding second set of parameters and/or security algorithms to the at least one second communication node. When there are multiple second communication nodes, the MME sends a corresponding second set of parameters and/or security algorithms to each of the second communication nodes.
根据具体实现场景, 在上述 S202a和 S202b中择一执行。  According to a specific implementation scenario, one of the above S202a and S202b is performed.
需要说明的是, 上述第一套参数和 /或安全算法用于第一通信节点与第三 通信节点进行通信, 上述第二套参数和 /或安全算法用于第二通信节点与第三 通信节点进行通信。 上述第一通信节点为与第三通信节点进行控制面信令通 信的站点, 上述第二通信节点为与第三通信节点进行用户面数据通信的站点; 或者, 上述第一通信节点所在的小区为与上述第三通信节点的主小区, 第二 通信节点所在的小区为上述第三通信节点的辅小区。  It should be noted that the first set of parameters and/or security algorithms are used by the first communication node to communicate with the third communication node, and the second set of parameters and/or security algorithms are used for the second communication node and the third communication node. Communicate. The first communication node is a station that performs control plane signaling communication with the third communication node, and the second communication node is a station that performs user plane data communication with the third communication node; or, the cell where the first communication node is located is And the primary cell of the third communication node, the cell where the second communication node is located is the secondary cell of the third communication node.
本实施例中, MME可以主动更新第三通信节点使用的参数和 /或安全算 法, 也可以根据第一通信节点的请求消息向第一通信节点、 第二通信节点发 送参数和 /或安全算法, 并进一步转发给第三通信节点, 使得不论在任何情况 下更新了参数和 /或安全算法后, 都保证第一通信节点、 第二通信节点以及第 三通信节点可以获知对应的参数和 /或安全算法, 避免第一通信节点、 第二通 信节点以及第三通信节点无法处理它们之间进行通信的信息。  In this embodiment, the MME may actively update parameters and/or security algorithms used by the third communication node, and may also send parameters and/or security algorithms to the first communication node and the second communication node according to the request message of the first communication node. And further forwarding to the third communication node, so that the first communication node, the second communication node and the third communication node can be informed of the corresponding parameters and/or security after updating the parameters and/or the security algorithm in any case. The algorithm prevents the first communication node, the second communication node, and the third communication node from processing information for communication between them.
图 3为本发明提供的小区优化方法实施例三的流程示意图, 如图 3所示, 该方法包括:  FIG. 3 is a schematic flowchart of Embodiment 3 of a cell optimization method according to the present invention. As shown in FIG. 3, the method includes:
S301、 第一通信节点向 MME发送请求消息, 以使上述 MME根据该请求 消息向该第一通信节点发送第一套参数和 /或安全算法和至少一套第二套参数 和 /或安全算法, 或者, 向该第一通信节点发送第一套参数和 /或安全算法, 以 及向至少一个第二通信节点发送第二套参数和 /或安全算法。 S301. The first communications node sends a request message to the MME, so that the MME is configured according to the request. Transmitting, by the first communication node, a first set of parameters and/or security algorithms and at least one set of second sets of parameters and/or security algorithms, or sending a first set of parameters and/or security algorithms to the first communication node, And transmitting a second set of parameters and/or security algorithms to the at least one second communication node.
该请求消息中可以包括下述消息中的至少一项: 上述第二通信节点的第 三通信节点 S1接口身份标识码(ID ) , 用来标识该第二通信节点的 S1接口所 对应的第三通信节点;上述 MME的第三通信节点 S1接口 ID,用来标识该 MME 的 S1接口所对应的第三通信节点; 上述第二通信节点的标识; 上述第二通信 节点的网络之间互连的协议(Internet Protocol , 筒称 IP )地址信息; 上述第 二通信节点所在小区的标识,例如, E-UTRAN-CGI;指示信息,用以指示 MME 需要分配两套参数和 /或安全算法, 即上述第一套参数和 /或安全算法和第二套 参数和 /或安全算法。  The request message may include at least one of the following messages: the third communication node S1 interface identity code (ID) of the second communication node is used to identify the third corresponding to the S1 interface of the second communication node. a communication node; a third communication node S1 interface ID of the MME, used to identify a third communication node corresponding to the S1 interface of the MME; an identifier of the second communication node; and an interconnection between the networks of the second communication node Protocol (Internet Protocol) address information; an identifier of a cell in which the second communication node is located, for example, E-UTRAN-CGI; indication information, indicating that the MME needs to allocate two sets of parameters and/or security algorithms, that is, the foregoing The first set of parameters and/or security algorithms and the second set of parameters and/or security algorithms.
S302a、 第一通信节点接收上述 MME发送的第一套参数和 /或安全算法和 至少一套第二套参数和 /或安全算法; 当存在多个第二通信节点时, MME需要 向每个第二通信节点分配对应的第二套参数和 /或安全算法。  S302a, the first communications node receives the first set of parameters and/or security algorithms sent by the MME, and at least one set of second set of parameters and/or security algorithms; when there are multiple second communications nodes, the MME needs to The second communication node assigns a corresponding second set of parameters and/or security algorithms.
S302b、 第一通信节点接收上述 MME发送的第一套参数和 /或安全算法; 根据具体的场景, 在上述 S302a或 S302b中择一执行。  S302b: The first communications node receives the first set of parameters and/or security algorithms sent by the MME, and performs the next execution in S302a or S302b according to a specific scenario.
该第一通信节点为与第三通信节点进行控制面信令通信的站点, 上述第 二通信节点为与所述第三通信节点进行用户面数据通信的站点; 或者, 也可 以理解为, 该第一通信节点所在的小区为与上述第三通信节点的主小区, 该 第二通信节点所在的小区为上述第三通信节点的辅小区。  The first communication node is a station that performs control plane signaling communication with the third communication node, and the second communication node is a site that performs user plane data communication with the third communication node; or, it may be understood that the first communication node The cell in which the communication node is located is the primary cell of the third communication node, and the cell in which the second communication node is located is the secondary cell of the third communication node.
本实施例中, 第一通信节点可以向 MME请求发送参数和 /或安全算法, 以 使 MME在切换过程中, 及时的给第一通信节点、 第二通信节点发送参数和 / 或安全算法, 也使该第一通信节点、 第二通信节点把更新的参数和 /或安全算 法转发给第三通信节点, 避免了第一通信节点、 第二通信节点、 第三通信节 点在通信时无法处理它们之间通信的信息。  In this embodiment, the first communication node may request the MME to send a parameter and/or a security algorithm, so that the MME sends the parameter and/or the security algorithm to the first communication node and the second communication node in time during the handover process. And causing the first communication node and the second communication node to forward the updated parameter and/or the security algorithm to the third communication node, preventing the first communication node, the second communication node, and the third communication node from being unable to process the communication when communicating Information between communications.
进一步地,在选择执行上述 S302a的情况下,第一通信节点接收上述 MME 发送的第一套参数和安全算法和至少一套第二套参数和 /或安全算法之后, 该 第一通信节点向至少一个第二通信节点发送对应的上述第二套参数和 /或安全 算法, 并向第三通信节点发送第一套参数和 /或安全算法和上述至少一套第二 套参数和 /或安全算法, 以使各第二通信节点和第三通信节点可以使用更新的 参数和 /或安全算法进行通信。 Further, in the case that the foregoing S302a is selected to be executed, after the first communication node receives the first set of parameters and the security algorithm sent by the MME and at least one set of the second set of parameters and/or security algorithms, the first communication node is at least A second communication node sends the corresponding second set of parameters and/or security algorithms, and sends a first set of parameters and/or security algorithms and the at least one set of second sets of parameters and/or security algorithms to the third communication node, So that each of the second communication node and the third communication node can use the updated Parameters and/or security algorithms communicate.
在选择执行上述 S302b的情况下, 第一通信节点接收 MME发送的第一套 参数和 /或安全算法之后, 该第一通信节点向第三通信节点发送上述第一套参 数和 /或安全算法。  In the case that the S302b is selected to be executed, after the first communication node receives the first set of parameters and/or security algorithms sent by the MME, the first communication node sends the first set of parameters and/or security algorithms to the third communication node.
更进一步地, 该第一通信节点接收到 MME发送的第一套参数和 /或安全算 法和第二套参数和 /或安全算法, 或者, 该第一通信节点接收到 MME发送的第 一套参数和 /或安全算法之后, 该第一通信节点会向上述第二通信节点或第三 通信节点发送消息, 以使该第二通信节点在接收到该消息时开始使用上述第 二套参数和 /或安全算法与第三通信节点进行通信, 使第三通信节点在接收到 所述消息时开始使用所述第一套参数和 /或安全算法与第一通信节点进行通 信, 使用所述第二套参数和 /或安全算法与第二通信节点进行通信。  Further, the first communication node receives the first set of parameters and/or security algorithms and the second set of parameters and/or security algorithms sent by the MME, or the first communication node receives the first set of parameters sent by the MME. And/or after the security algorithm, the first communication node sends a message to the second communication node or the third communication node, so that the second communication node starts to use the second set of parameters and/or when receiving the message. The security algorithm communicates with the third communication node to cause the third communication node to begin communicating with the first communication node using the first set of parameters and/or security algorithms upon receiving the message, using the second set of parameters And/or a security algorithm communicates with the second communication node.
在执行上述 S302a或 S302b之后,该第一通信节点根据上述第一套参数和 /或安全算法与第三通信节点进行通信。 具体地, 上述安全算法包括加密算法、 头压缩算法和完整性保护算法中的至少一种算法; 上述参数包括 NCC、 NH、 C-RNTK PDCP序列号的长度中的至少一种。  After performing the above S302a or S302b, the first communication node communicates with the third communication node according to the first set of parameters and/or security algorithms. Specifically, the foregoing security algorithm includes at least one of an encryption algorithm, a header compression algorithm, and an integrity protection algorithm; and the foregoing parameters include at least one of lengths of NCC, NH, C-RNTK PDCP sequence numbers.
该第一通信节点根据上述第一套参数和 /或安全算法与第三通信节点进行 通信, 具体可以为下述处理中的至少一种:  The first communication node communicates with the third communication node according to the first set of parameters and/or security algorithms, and may specifically be at least one of the following processes:
1 )第一通信节点根据上述加密算法对与第三通信节点进行通信的信息进 行加解密处理, 即第一通信节点根据上述第一套参数和 /或安全算法中的加密 算法对与第三通信节点进行通信的信息进行加解密处理。  1) The first communication node performs encryption and decryption processing on the information communicated with the third communication node according to the encryption algorithm, that is, the first communication node performs the third communication with the encryption algorithm according to the first set of parameters and/or the security algorithm. The information that the node communicates is encrypted and decrypted.
2 )第一通信节点根据上述头压缩算法对与第三通信节点进行通信的信息 进行头压缩或者解头压缩处理, 即第一通信节点根据上述第一套参数和 /或安 全算法中的头压缩算法对与第三通信节点进行通信的信息进行头压缩或者解 头压缩处理。  2) The first communication node performs header compression or decompression compression processing on the information communicated with the third communication node according to the header compression algorithm, that is, the first communication node performs header compression according to the first set of parameters and/or security algorithms. The algorithm performs header compression or decompression processing on the information communicated with the third communication node.
3 )第一通信节点根据上述完整性保护算法对与第三通信节点进行通信的 信息进行完整性保护或者解完整性保护处理, 即第一通信节点根据上述第一 套参数和 /或安全算法中的完整性保护算法对与第三通信节点进行通信的信息 进行完整性保护或者解完整性保护处理。  3) The first communication node performs integrity protection or de-integrity protection processing on the information communicated with the third communication node according to the integrity protection algorithm, that is, the first communication node is configured according to the first set of parameters and/or security algorithms. The integrity protection algorithm performs integrity protection or de-integrity protection processing on the information communicated with the third communication node.
图 4为本发明提供的小区优化方法实施例四的流程示意图, 如图 4所示, 该方法的执行主体为上述第二通信节点, 该方法包括: 5401、 第二通信节点接收第一通信节点或者 MME发送的参数和 /或安全 算法,该参数和 /或安全算法为上述第二套参数和 /或安全算法。该参数和 /或安 全算法用于对通信的数据或信息进行包括但不限于加密和完整性保护等与实 现通信安全相关的操作。 4 is a schematic flowchart of Embodiment 4 of a cell optimization method according to the present invention. As shown in FIG. 4, an execution body of the method is the foregoing second communication node, and the method includes: 5401. The second communication node receives a parameter and/or a security algorithm sent by the first communication node or the MME, where the parameter and/or the security algorithm is the second set of parameters and/or the security algorithm. The parameters and/or security algorithms are used to perform communication security related operations, such as but not limited to encryption and integrity protection, on the communicated data or information.
具体地, 安全算法可以是加密算法, 例如 eeaO, eeal , eea2, eea3-v1 1xy 等, 也可以是完整性保护算法, 例如 eia0-v920, eial , eia2, eia3-v1 1xy等, 还可以是头压缩算法, 头压缩算法是基于 ROHC架构, 利用该算法和相应的 参数可以进行头压缩或者解头压缩。 具体的头压缩算法有很多种, 算法的类 型通过筒要表识别符来定义, 例如 0x0002表示一种算法标示; 具体相关的头 压缩参数, 可以有 Profile Identifier、 MAX_CID , LARGE_CIDS , FEEDBACK—FOR等, 但并不以此为限; 参数可以是, NCC, NH , PDCP 层序列号长度, C-RNTI等, 但并不以此为限。 具体地, C-RNTI是第三通信节 点在连接态时在小区中的标示, 用于基站便于通过 C-RNTI来调度第三通信节 点。  Specifically, the security algorithm may be an encryption algorithm, such as eeaO, eeal, eea2, eea3-v1 1xy, etc., or may be an integrity protection algorithm, such as eia0-v920, eial, eia2, eia3-v1 1xy, etc., or may be a header. The compression algorithm, the header compression algorithm is based on the ROHC architecture, and the header compression or decompression can be performed by using the algorithm and corresponding parameters. There are many specific header compression algorithms. The type of the algorithm is defined by the identifier of the bucket. For example, 0x0002 indicates an algorithm identifier. The specific header compression parameters may include Profile Identifier, MAX_CID, LARGE_CIDS, FEEDBACK-FOR, etc. However, it is not limited to this; the parameters may be, NCC, NH, PDCP layer serial number length, C-RNTI, etc., but not limited thereto. Specifically, the C-RNTI is an indication in the cell when the third communication node is in the connected state, and is used by the base station to conveniently schedule the third communication node by using the C-RNTI.
5402、上述第二通信节点根据上述参数和 /或安全算法与第三通信节点进 行通信; 具体地, 可以是下述处理中的至少一种:  The second communication node communicates with the third communication node according to the parameter and/or the security algorithm. Specifically, it may be at least one of the following processes:
1 )上述第二通信节点根据上述加密算法对于第三通信节点进行通信的信 息进行加解密处理;  1) the second communication node performs encryption and decryption processing on the information that the third communication node performs communication according to the encryption algorithm;
2 )上述第二通信节点根据头压缩算法对与第三通信节点进行通信的信息 进行头压缩或解头压缩处理;  2) the second communication node performs header compression or decompression processing on the information communicated with the third communication node according to the header compression algorithm;
3 )上述第二通信节点根据上述完整性保护算法对与第三通信节点进行通 信的信息进行完整性保护或者解完整性保护。  3) The second communication node performs integrity protection or solution integrity protection on the information communicated with the third communication node according to the integrity protection algorithm.
在上述第二通信节点根据上述参数和 /或安全算法对与第三通信节点进行 通信, 在具体实施过程中, 存在多种情况, 如下所示:  The second communication node communicates with the third communication node according to the parameter and/or the security algorithm. In the specific implementation process, there are various situations, as follows:
1 )该第二通信节点在接收到上述参数和 /或安全算法时,开始使用上述参 数和 /或安全算法与第三通信节点进行通信; 可以是第二通信节点接收到新的 参数和 /或安全算法就直接开始使用上述参数和 /或安全算法。  1) the second communication node starts to communicate with the third communication node using the above parameters and/or security algorithm when receiving the above parameters and/or security algorithms; it may be that the second communication node receives new parameters and/or The security algorithm starts using the above parameters and/or security algorithms directly.
2 )该第二通信节点在接收到上述参数和 /或安全算法之后, 暂不使用, 等 接收到第一通信节点或第三通信节点发送的消息后, 再开始使用该参数和 /或 安全算法与第三通信节点进行通信; 该消息可以是特定的专门用于指示第二 通信节点使用上述参数和 /或安全算法的指示消息, 也可以是第一通信节点或 第三通信节点向第二通信节点发的任一消息; 举例说明, 可以预先约定好第 二通信节点接收到的某条消息就作为指示消息或者激活消息, 比如在上述场 景 1中, 切换完成后第一通信节点可能会给第二通信节点发送一条第三通信节 点上下文释放消息, 该消息本用于指示第二通信节点释放第三通信节点的上 下文, 在此约定该消息作为指示消息, 即收到该消息时等同于接收到指示消 息, 第二通信节点开始使用上述参数和 /或安全算法, 但并不以此为限, 可以 是其它的消息; 收到该消息后, 意味第二通信节点以此为起点开始使用参数 和 /或安全算法来处理与第三通信节点通信的信息。 相当于该消息激活了第二 通信节点和第三通信节点开始使用所述参数和 /或安全算法来处理第二通信节 点与第三通信节点通信的信息。 或者也可以是在第一通信节点或第三通信节 点发送给第二通信节点的某一条消息中携带一个指示信息, 例如, 其中一个 比特用于指示是否开始使用上述参数和 /或安全算法; 需要说明的是, 该第三 通信节点可以是在接入上述第一通信节点后发送上述消息, 上述第一通信节 点可以在向第二通信节点发送参数和 /或安全算法的同时或发送参数和 /或安 全算法之后向该第二通信节点发送上述信息; 2) after receiving the parameter and/or the security algorithm, the second communication node does not use, and after receiving the message sent by the first communication node or the third communication node, starts using the parameter and/or the security algorithm. Communicating with the third communication node; the message may be specific for indicating the second The communication node uses the above-mentioned parameter and/or the indication message of the security algorithm, and may also be any message sent by the first communication node or the third communication node to the second communication node; for example, the second communication node may be pre-agreed A certain message is used as an indication message or an activation message. For example, in the above scenario 1, after the handover is completed, the first communication node may send a third communication node context release message to the second communication node, and the message is used to indicate the first The second communication node releases the context of the third communication node, where the message is agreed as an indication message, that is, when the message is received, it is equivalent to receiving the indication message, and the second communication node starts to use the above parameters and/or security algorithm, but does not To this end, it may be other messages; after receiving the message, it means that the second communication node uses this as a starting point to start using parameters and/or security algorithms to process the information communicated with the third communication node. Equivalent to the message activating the second communication node and the third communication node to begin using the parameters and/or security algorithms to process information communicated by the second communication node with the third communication node. Or a message sent by the first communication node or the third communication node to the second communication node may carry an indication information, for example, one of the bits is used to indicate whether to start using the above parameters and/or security algorithm; It is noted that the third communication node may send the message after accessing the first communication node, and the first communication node may send the parameter and/or the security algorithm to the second communication node or send the parameter and/or Or sending the above information to the second communication node after the security algorithm;
具体实现过程中, 该第二通信节点还可以在接收到上述消息的同时或之 后, 开始与上述第三通信节点进行通信, 开始与上述第三通信节点进行通信 具体可以是向第三通信节点发送消息或者接收第三通信节点发送来的消息。  In a specific implementation process, the second communication node may start to communicate with the third communication node at the same time as or after receiving the message, and start to communicate with the third communication node, which may be sent to the third communication node. The message or the message sent by the third communication node is received.
3 )也可以是该第二通信节点在开始和第三通信节点进行通信时, 开始使 用上述参数和 /或安全算法与第三通信节点进行通信。  3) Alternatively, the second communication node may start communicating with the third communication node using the parameters and/or security algorithms described above when initially communicating with the third communication node.
4 )也可以是在第三通信节点接入到该第二通信节点时, 第二通信节点开 始使用上述参数和 /或安全算法与第三通信节点进行通信。  4) Alternatively, when the third communication node accesses the second communication node, the second communication node starts communicating with the third communication node using the parameters and/or security algorithms.
5 )也可以是在第三通信节点与该第二通信节点上行同步时, 开始使用上 述参数和 /或安全算法与第三通信节点进行通信。  5) Alternatively, when the third communication node is uplink-synchronized with the second communication node, communication with the third communication node is started using the above parameters and/or security algorithms.
其中, 上行同步是指在同一小区中, 使用同一时隙的不同位置的用户发送的 上行信号同时到达基站接收天线, 即同一时隙不同用户的信号到达基站接收 天线时保持同步。 The uplink synchronization means that, in the same cell, uplink signals sent by users at different locations in the same time slot arrive at the base station receiving antenna at the same time, that is, signals of different users in the same time slot arrive at the base station receiving antenna to maintain synchronization.
为了达到上行同步建立之前, 第三通信节点必须侦听小区的同步信号获得下 行同步, 后续第三通信节点通过调整定时偏差从而达到上行同步。 Before the uplink synchronization is established, the third communication node must listen to the synchronization signal of the cell to obtain downlink synchronization, and the subsequent third communication node adjusts the timing offset to achieve uplink synchronization.
6 )也可以是该第二通信节点接收到上述第一通信节点发送的第一个数据 包时, 开始使用所述参数和 /或安全算法与第三通信节点进行通信。 具体地, 这里可能存在两种情况, 一种是第二通信节点接收到上述参数和 /或安全算法 之后, 收到上述第一通信节点发送的第一个数据包时, 开始使用所述参数和 / 或安全算法; 另外一种情况是第二通信节点接收到第一通信节点发送的第一 个数据包, 暂不做处理, 等接收到上述参数和 /或安全算法之后, 立即开始使 用该参数和 /或安全算法对上述第一个数据包进行处理。 6) The second communication node may receive the first data sent by the first communication node. At the time of the packet, communication with the third communication node is started using the parameters and/or security algorithms. Specifically, there may be two cases. One is that after receiving the foregoing parameter and/or security algorithm, the second communication node starts to use the parameter and when receiving the first data packet sent by the first communication node. Or a security algorithm; in another case, the second communication node receives the first data packet sent by the first communication node, does not process it, and immediately starts using the parameter after receiving the above parameters and/or security algorithm. And/or a security algorithm processes the first packet described above.
7 )该第二通信节点也可以在接收到上述参数和 /或安全算法后的预设时间 内或者之后, 开始使用所述参数和 /或安全算法与第三通信节点进行通信; 具 体实现过程中, 可以采用定时器定时的方式来实现。  7) The second communication node may also start to communicate with the third communication node by using the parameter and/or the security algorithm within a preset time after receiving the parameter and/or the security algorithm; , can be implemented by timer timing.
8 )该第二通信节点可以向上述第三通信节点发送用于指示开始使用上述 参数和 /或安全算法的指示消息, 并在发送该指示消息时开始使用上述参数和 / 或安全算法与第三通信节点进行通信; 具体实现过程中, 也可以在接收到第 三通信节点回复该指示消息的确认消息后再开始使用上述参数和 /或安全算 法。 具体实现过程中, 上述指示消息还可以有多种理解方式, 与前述第 2种情 况中类似, 在此不再赘述。  8) The second communication node may send an indication message for instructing to start using the above parameter and/or security algorithm to the third communication node, and start using the above parameter and/or security algorithm and the third when sending the indication message. The communication node performs communication. In the specific implementation process, the parameter and/or the security algorithm may also be used after receiving the confirmation message that the third communication node replies to the indication message. In the specific implementation process, the foregoing indication message may also have multiple understanding manners, which is similar to the foregoing second case, and details are not described herein again.
9 )如果第二通信节点接收到上述参数和 /或安全算法后, 没有预先设置, 也没有收到任何指示消息, 那么该第二通信节点需要对第三通信节点发送的 信息进行解密或解头压缩或解完整性保护处理时, 会先采用原参数和 /或安全 算法, 若解密或解头压缩或解完整性保护失败, 则开始使用上述参数和 /或安 全算法与第三通信节点进行通信。  9) if the second communication node does not preset and does not receive any indication message after receiving the above parameters and/or security algorithm, the second communication node needs to decrypt or unpack the information sent by the third communication node. When the compression or de-integrity protection processing is performed, the original parameters and/or security algorithms are first used. If the decryption or de-head compression or the de-integrity protection fails, the above parameters and/or security algorithms are used to communicate with the third communication node. .
具体实现过程中可以不局限于上述各情况。  The specific implementation process may not be limited to the above cases.
图 5为本发明提供的小区优化方法实施例五的流程示意图,在上述图 1~图 4方法实施例中, 在 MME向第一通信节点发送第一套参数和 /或安全算法和至 少一套第二套参数和 /或安全算法这种情况下, MME、 第一通信节点、 第二通 信节点和第三通信节点的具体交互过程, 如图 5所示, 其中第二通信节点表示 上述至少一个第二通信节点中的任意一个第二通信节点, 该方法包括:  FIG. 5 is a schematic flowchart of Embodiment 5 of a cell optimization method according to the present invention. In the foregoing method embodiment of FIG. 1 to FIG. 4, the MME sends a first set of parameters and/or security algorithms and at least one set to the first communication node. The second set of parameters and/or security algorithm in this case, the specific interaction process of the MME, the first communication node, the second communication node, and the third communication node, as shown in FIG. 5, wherein the second communication node represents the at least one Any one of the second communication nodes, the method comprising:
5501、 第一通信节点向 MME发送请求消息。 该步骤是可选的, 在切换过 程中, 可以执行该步骤, 如果是 MME主动更新参数和 /或安全算法, 则无需执 行该步骤。  5501. The first communication node sends a request message to the MME. This step is optional. During the handover process, this step can be performed. If the MME actively updates parameters and/or security algorithms, it is not necessary to perform this step.
5502、 MME根据该请求消息向第一通信节点发送第一套参数和 /或安全 算法和第二套参数和 /或安全算法。 S502. The MME sends the first set of parameters and/or security to the first communications node according to the request message. Algorithm and second set of parameters and/or security algorithms.
S503、 第一通信节点向第二通信节点发送上述第二套参数和 /或安全算 法。  S503. The first communication node sends the second set of parameters and/or security algorithms to the second communication node.
S504、第一通信节点向第三通信节点发送上述第一套参数和 /或安全算法 和第二套参数和 /或安全算法。  S504. The first communications node sends the first set of parameters and/or security algorithms and the second set of parameters and/or security algorithms to the third communications node.
S503和 S504可以同时执行。  S503 and S504 can be executed simultaneously.
5505、第三通信节点开始使用上述第一套参数和 /或安全算法和第二套参 数和 /或安全算法, 即第三通信节点开始使用上述第一套参数和 /或安全算法对 与第一通信节点进行通信, 使用上述第二套参数和 /或安全算法对与第二通信 节点进行通信。  5505. The third communication node starts to use the first set of parameters and/or security algorithm and the second set of parameters and/or security algorithms, that is, the third communication node starts to use the first set of parameters and/or security algorithm pairs and the first The communication node communicates with the second communication node using the second set of parameters and/or security algorithms described above.
5506、 第一通信节点开始使用上述第一套参数和 /或安全算法, 即该第一 通信节点开始使用上述第一套参数和 /或安全算法与第三通信节点进行通信。  5506. The first communications node begins to use the first set of parameters and/or security algorithms described above, that is, the first communications node begins to communicate with the third communications node using the first set of parameters and/or security algorithms.
5507、 第二通信节点开始使用上述第二套参数和 /或安全算法, 即该第二 通信节点开始使用上述第二套参数和 /或安全算法与第三通信节点进行通信。  5507. The second communication node begins to use the second set of parameters and/or security algorithms described above, that is, the second communication node begins to communicate with the third communication node using the second set of parameters and/or security algorithms.
S505、 S506、 S507可以同时执行。  S505, S506, and S507 can be executed simultaneously.
具体的上述第三通信节点和第二通信节点使用上述参数和 /或安全算法的 时刻可参照前述图 1和图 4方法实施例, 在此不再赘述。  For the specific time when the third communication node and the second communication node use the foregoing parameters and/or the security algorithm, reference may be made to the foregoing method embodiments in FIG. 1 and FIG. 4, and details are not described herein again.
图 6为本发明提供的小区优化方法实施例六的流程示意图,在上述图 1~图 4方法实施例中, 在 MME向第一通信节点发送第一套参数和 /或安全算法, 向 至少一个第二通信节点发送对应的第二套参数和 /或安全算法这种情况下, MME、 第一通信节点、 第二通信节点和第三通信节点的具体交互过程, 如图 6 所示, 其中第二通信节点表示上述至少一个第二通信节点中的任意一个第二 通信节点, 该方法包括:  FIG. 6 is a schematic flowchart of Embodiment 6 of a cell optimization method according to the present invention. In the foregoing method embodiment of FIG. 1 to FIG. 4, the MME sends a first set of parameters and/or security algorithms to the first communication node, to at least one a specific interaction process between the MME, the first communication node, the second communication node, and the third communication node, where the second communication node sends a corresponding second set of parameters and/or security algorithms, as shown in FIG. The two communication nodes represent any one of the at least one second communication node, the method comprising:
5601、 第一通信节点向 MME发送请求消息。 该步骤是可选的, 在切换过 程中, 可以执行该步骤, 如果是 MME主动更新参数和 /或安全算法, 则无需执 行该步骤。  5601. The first communication node sends a request message to the MME. This step is optional. During the handover process, this step can be performed. If the MME actively updates parameters and/or security algorithms, it is not necessary to perform this step.
5602、 MME根据上述请求消息向第一通信节点发送第一套参数和 /或安 全算法。  S602. The MME sends a first set of parameters and/or security algorithms to the first communications node according to the request message.
5603、 MME根据上述请求消息向第二通信节点发送第二套参数和 /或安 全算法。 S602和 S603可以同时执行。 S603. The MME sends a second set of parameters and/or security algorithms to the second communications node according to the request message. S602 and S603 can be performed simultaneously.
5604、 第一通信节点向第三通信节点发送第一套参数和 /或安全算法。 5604. The first communications node sends a first set of parameters and/or security algorithms to the third communications node.
5605、 第二通信节点向第三通信节点发送第二套参数和 /或安全算法。S605. The second communication node sends a second set of parameters and/or security algorithms to the third communication node.
5606、第三通信节点开始使用上述第一套参数和 /或安全算法和第二套参 数和 /或安全算法, 即第三通信节点开始使用上述第一套参数和 /或安全算法对 与第一通信节点进行通信, 使用上述第二套参数和 /或安全算法对与第二通信 节点进行通信。 5606. The third communication node starts to use the first set of parameters and/or security algorithm and the second set of parameters and/or security algorithms, that is, the third communication node starts to use the first set of parameters and/or the security algorithm pair and the first The communication node communicates with the second communication node using the second set of parameters and/or security algorithms described above.
5607、 第一通信节点开始使用上述第一套参数和 /或安全算法, 即该第一 通信节点开始使用上述第一套参数和 /或安全算法与第三通信节点进行通信。  5607. The first communication node starts to use the first set of parameters and/or security algorithms, that is, the first communication node starts to communicate with the third communication node by using the first set of parameters and/or security algorithms.
5608、 第二通信节点开始使用上述第二套参数和 /或安全算法, 即该第二 通信节点开始使用上述第二套参数和 /或安全算法与第三通信节点进行通信。  5608. The second communications node begins to use the second set of parameters and/or security algorithms described above, that is, the second communications node begins to communicate with the third communications node using the second set of parameters and/or security algorithms.
S606、 S607、 S608可以同时执行。  S606, S607, S608 can be executed simultaneously.
具体的上述第三通信节点和第二通信节点使用上述参数和 /或安全算法的 时刻可参照前述图 1和图 4方法实施例, 在此不再赘述。  For the specific time when the third communication node and the second communication node use the foregoing parameters and/or the security algorithm, reference may be made to the foregoing method embodiments in FIG. 1 and FIG. 4, and details are not described herein again.
本实施例中, 第三通信节点可以接收到第一通信节点发送的第一套参数 和 /或安全算法和第二套参数和 /或安全算法, 或者, 接收该第一通信节点发送 的第一套参数和 /或安全算法和第二通信节点发送的第二套参数和 /或安全算 法, 进而第三通信节点使用该第一套参数和 /或安全算法与第一通信节点进行 通信, 使用该第二套参数和 /或安全算法与第二通信节点进行通信, 从而实现 了不论在第三通信节点的控制面和用户面的切换过程中或非切换过程中, 只 要 MME要更新第三通信节点所使用的参数和 /或安全算法时, 就能够让与第三 通信节点进行通信的基站以及第三通信节点都及时获取更新的参数和 /或安全 算法, 避免与第三通信节点进行通信的站点以及第三通信节点无法对通信过 程中的信息进行处理。  In this embodiment, the third communications node may receive the first set of parameters and/or security algorithms and the second set of parameters and/or security algorithms sent by the first communications node, or receive the first sent by the first communications node. a set of parameters and/or security algorithms and a second set of parameters and/or security algorithms sent by the second communication node, the third communication node then communicating with the first communication node using the first set of parameters and/or security algorithms, using the The second set of parameters and/or security algorithms communicate with the second communication node, thereby enabling the MME to update the third communication node regardless of whether during the handover of the control plane and the user plane of the third communication node or during the handover process When the parameters and/or security algorithms are used, the base station and the third communication node that communicate with the third communication node can acquire updated parameters and/or security algorithms in time to avoid the site communicating with the third communication node. And the third communication node cannot process the information in the communication process.
图 7为本发明提供的通信节点实施例一的结构示意图, 该通信节点为上述 第三通信节点, 如图 7所示, 该通信节点包括: 接收模块 701和通信模块 702, 其中:  FIG. 7 is a schematic structural diagram of Embodiment 1 of a communication node according to the present invention. The communication node is the foregoing third communication node. As shown in FIG. 7, the communication node includes: a receiving module 701 and a communication module 702, where:
接收模块 701 , 用于接收第一通信节点发送的第一套参数和 /或安全算法 和至少一套第二套参数和 /或安全算法; 或者, 接收所述第一通信节点发送的 第一套参数和 /或安全算法和至少一个第二通信节点发送的第二套参数和 /或 安全算法; The receiving module 701 is configured to receive a first set of parameters and/or a security algorithm sent by the first communications node, and at least one set of second set of parameters and/or security algorithms; or receive the first set sent by the first communications node a parameter and/or security algorithm and a second set of parameters and/or transmitted by at least one second communication node Security algorithm
通信模块 702 , 用于所述第三通信节点使用所述第一套参数和 /或安全算 法与第一通信节点进行通信, 使用所述第二套参数和 /或安全算法与第二通信 节点进行通信;  a communication module 702, configured to, by the third communications node, communicate with the first communications node using the first set of parameters and/or security algorithms, and perform the second set of parameters and/or security algorithms with the second communications node Communication
其中, 所述第一通信节点为与所述第三通信节点进行控制面信令通信的 站点, 所述第二通信节点为与所述第三通信节点进行用户面数据通信的站点; 或者, 所述第一通信节点所在的小区为与所述第三通信节点的主小区, 所述 第二通信节点所在的小区为所述第三通信节点的辅小区。  The first communication node is a station that performs control plane signaling communication with the third communication node, and the second communication node is a site that performs user plane data communication with the third communication node; or, The cell in which the first communication node is located is the primary cell of the third communication node, and the cell in which the second communication node is located is the secondary cell of the third communication node.
本实施例中, 第三通信节点可以接收到第一通信节点发送的第一套参数 和 /或安全算法和第二套参数和 /或安全算法, 或者, 接收该第一通信节点发送 的第一套参数和 /或安全算法和第二通信节点发送的第二套参数和 /或安全算 法, 进而第三通信节点使用该第一套参数和 /或安全算法与第一通信节点进行 通信, 使用该第二套参数和 /或安全算法与第二通信节点进行通信, 从而实现 了 MME想要更新第三通信节点所使用的参数和 /或安全算法时, 能够让与第三 通信节点进行通信的通信节点以及第三通信节点都及时获取更新的参数, 避 免与第三通信节点进行通信的通信节点以及第三通信节点无法对通信过程中 的信息进行处理。  In this embodiment, the third communications node may receive the first set of parameters and/or security algorithms and the second set of parameters and/or security algorithms sent by the first communications node, or receive the first sent by the first communications node. a set of parameters and/or security algorithms and a second set of parameters and/or security algorithms sent by the second communication node, the third communication node then communicating with the first communication node using the first set of parameters and/or security algorithms, using the The second set of parameters and/or security algorithms communicate with the second communication node to enable communication with the third communication node when the MME wants to update parameters and/or security algorithms used by the third communication node Both the node and the third communication node acquire updated parameters in time, avoiding that the communication node communicating with the third communication node and the third communication node cannot process the information in the communication process.
进一步地, 上述安全算法包括加密算法、 头压缩算法和完整性保护算法 中的至少一种算法; 上述参数包括下一跳连接计数器 NCC、 下一跳 NH、 小区 无线网络临时标识 C-RNTI、分组数据汇聚层协议 PDCP序列号的长度中的至 少一种参数。  Further, the foregoing security algorithm includes at least one of an encryption algorithm, a header compression algorithm, and an integrity protection algorithm; the foregoing parameters include a next hop connection counter NCC, a next hop NH, a cell radio network temporary identifier C-RNTI, a packet At least one of the lengths of the data aggregation layer protocol PDCP sequence number.
通信模块 702, 可以执行下述至少一种处理:  The communication module 702 can perform at least one of the following processes:
1 )根据所述加密算法对与第一通信节点和 /或第二通信节点进行通信的信 息进行加解密处理。  1) Encryption and decryption processing of information communicated with the first communication node and/or the second communication node in accordance with the encryption algorithm.
2 )根据所述头压缩算法对与第一通信节点和 /或第二通信节点进行通信的 信息进行头压缩或者解头压缩处理。  2) Perform header compression or decompression compression processing on the information communicated with the first communication node and/or the second communication node in accordance with the header compression algorithm.
3 )根据所述完整性保护算法对与第一通信节点和 /或第二通信节点进行通 信的信息进行完整性保护或者解完整性保护处理。  3) Perform integrity protection or de-integrity protection processing on the information communicated with the first communication node and/or the second communication node in accordance with the integrity protection algorithm.
更进一步地, 通信模块 702 , 具体用于在接收到所述第一套参数和 /或安 全算法时,开始使用所述第一套参数和 /或安全算法与第一通信节点进行通信, 所述第三通信节点在接收到所述第二套参数和 /或安全算法时, 开始使用所述 第二套参数和 /或安全算法与第二通信节点进行通信; 或者, Further, the communication module 702 is specifically configured to start to communicate with the first communication node by using the first set of parameters and/or security algorithms when receiving the first set of parameters and/or security algorithms, And the third communication node starts to communicate with the second communication node by using the second set of parameters and/or security algorithm when receiving the second set of parameters and/or security algorithms; or
通信模块 702, 具体用于在向第二通信节点发送信息时, 开始使用所述第 一套参数和 /或安全算法与第一通信节点进行通信, 使用所述第二套参数和 / 或安全算法与第二通信节点进行通信; 或者,  The communication module 702 is specifically configured to: when the information is sent to the second communication node, start to communicate with the first communication node by using the first set of parameters and/or security algorithms, and use the second set of parameters and/or security algorithms Communicating with the second communication node; or
通信模块 702,具体用于在接收第一通信节点或第二通信节点发送的消息 时, 开始使用所述第一套参数和 /或安全算法与第一通信节点进行通信, 使用 所述第二套参数和 /或安全算法与第二通信节点进行通信; 或者,  The communication module 702 is specifically configured to: when receiving the message sent by the first communication node or the second communication node, start to communicate with the first communication node by using the first set of parameters and/or security algorithms, and use the second set The parameter and/or security algorithm communicates with the second communication node; or
通信模块 702, 具体用于在接入到第二通信节点时, 开始使用所述第一套 参数和 /或安全算法与第一通信节点进行通信, 使用所述第二套参数和 /或安全 算法与第二通信节点进行通信; 或者,  The communication module 702 is specifically configured to, when accessing the second communication node, start to communicate with the first communication node by using the first set of parameters and/or security algorithms, and use the second set of parameters and/or security algorithms. Communicating with the second communication node; or
通信模块 702, 具体用于在开始和第二通信节点通信时, 开始使用所述第 一套参数和 /或安全算法与第一通信节点进行通信, 使用所述第二套参数和 / 或安全算法与第二通信节点进行通信; 或者,  The communication module 702 is specifically configured to start to communicate with the first communication node by using the first set of parameters and/or security algorithms when starting communication with the second communication node, using the second set of parameters and/or security algorithms Communicating with the second communication node; or
通信模块 702,具体用于在接收到所述第二通信节点发送的第一个数据包 时, 开始使用所述第一套参数和 /或安全算法与第一通信节点进行通信, 使用 所述第二套参数和 /或安全算法与第二通信节点进行通信; 或者,  The communication module 702 is specifically configured to: when receiving the first data packet sent by the second communications node, start to use the first set of parameters and/or security algorithm to communicate with the first communications node, using the first Two sets of parameters and/or security algorithms communicate with the second communication node; or
通信模块 702, 具体用于在接收到所述第一套参数和 /或安全算法后的预 设时间内或者之后, 开始使用所述第一套参数和 /或安全算法与第一通信节点 进行通信, 所述第三通信节点在接收到所述第二套参数和 /或安全算法后的预 设时间内或者之后, 开始使用所述第二套参数和 /或安全算法与第二通信节点 进行通信。  The communication module 702 is specifically configured to start to communicate with the first communication node by using the first set of parameters and/or security algorithms within a preset time after or after receiving the first set of parameters and/or security algorithms. The third communication node starts to communicate with the second communication node by using the second set of parameters and/or security algorithm within a preset time after or after receiving the second set of parameters and/or security algorithms. .
上述各模块可执行图 1所示方法实施例, 在此不再赘述。  The foregoing modules may perform the method embodiment shown in FIG. 1, and details are not described herein again.
本实施例中, 第三通信节点可以接收到第一通信节点发送的第一套参数 和 /或安全算法和第二套参数和 /或安全算法, 或者, 接收该第一通信节点发送 的第一套参数和 /或安全算法和第二通信节点发送的第二套参数和 /或安全算 法, 进而第三通信节点使用该第一套参数和 /或安全算法与第一通信节点进行 通信, 使用该第二套参数和 /或安全算法与第二通信节点进行通信, 从而实现 了不论在第三通信节点的控制面和用户面的切换过程中或非切换过程中, 只 要 MME要更新第三通信节点所使用的参数和 /或安全算法时, 就能够让与第三 通信节点进行通信的基站以及第三通信节点都及时获取更新的参数和 /或安全 算法, 避免与第三通信节点进行通信的站点以及第三通信节点无法对通信过 程中的信息进行处理。 In this embodiment, the third communications node may receive the first set of parameters and/or security algorithms and the second set of parameters and/or security algorithms sent by the first communications node, or receive the first sent by the first communications node. a set of parameters and/or security algorithms and a second set of parameters and/or security algorithms sent by the second communication node, the third communication node then communicating with the first communication node using the first set of parameters and/or security algorithms, using the The second set of parameters and/or security algorithms communicate with the second communication node, thereby enabling the MME to update the third communication node regardless of whether during the handover of the control plane and the user plane of the third communication node or during the handover process When using the parameters and/or security algorithms, you can make the third The base station that communicates with the communication node and the third communication node both acquire updated parameters and/or security algorithms in time, avoiding that the station communicating with the third communication node and the third communication node cannot process the information in the communication process.
图 8为本发明提供的移动管理实体实施例一的结构示意图, 如图 8所示, 该移动管理实体包括: 接收模块 801和发送模块 802, 其中:  FIG. 8 is a schematic structural diagram of Embodiment 1 of a mobility management entity according to the present invention. As shown in FIG. 8, the mobility management entity includes: a receiving module 801 and a sending module 802, where:
接收模块 801 , 用于接收第一通信节点发送的请求消息;  The receiving module 801 is configured to receive a request message sent by the first communications node.
发送模块 802,用于根据所述请求消息向所述第一通信节点发送第一套参 数和 /或安全算法和至少一套第二套参数和 /或安全算法; 或者, 根据所述请求 消息向所述第一通信节点发送所述第一套参数和 /或安全算法, 向至少一个第 二通信节点发送对应的第二套参数和 /或安全算法;  The sending module 802 is configured to send, according to the request message, a first set of parameters and/or a security algorithm and at least one set of second set of parameters and/or security algorithms to the first communications node; or, according to the request message Transmitting, by the first communications node, the first set of parameters and/or security algorithms, and transmitting, to the at least one second communications node, a corresponding second set of parameters and/or security algorithms;
其中, 所述第一套参数和 /或安全算法用于第一通信节点与第三通信节点 进行通信, 所述第二套参数和 /或安全算法用于第二通信节点与第三通信节点 进行通信;  The first set of parameters and/or security algorithms are used by the first communication node to communicate with the third communication node, and the second set of parameters and/or security algorithms are used by the second communication node and the third communication node. Communication
所述第一通信节点为与所述第三通信节点进行控制面信令通信的站点, 所述第二通信节点为与所述第三通信节点进行用户面数据通信的站点; 或者, 所述第一通信节点所在的小区为与所述第三通信节点的主小区, 所述第 二通信节点所在的小区为所述第三通信节点的辅小区。  The first communication node is a station that performs control plane signaling communication with the third communication node, and the second communication node is a site that performs user plane data communication with the third communication node; or, the The cell in which the communication node is located is the primary cell of the third communication node, and the cell in which the second communication node is located is the secondary cell of the third communication node.
需要说明的是, 所述安全算法包括加密算法、 头压缩算法和完整性保护 算法中的至少一种算法; 所述参数包括下一跳连接计数器 NCC、 下一跳 NH、 小区无线网络临时标识 C-RNTL 分组数据汇聚层协议 PDCP序列号的长度中 的至少一种参数。  It should be noted that the security algorithm includes at least one of an encryption algorithm, a header compression algorithm, and an integrity protection algorithm; the parameters include a next hop connection counter NCC, a next hop NH, and a cell wireless network temporary identifier C. - RNTL at least one of the lengths of the packet data convergence layer protocol PDCP sequence number.
上述各模块可执行图 2所示方法实施例, 在此不再赘述。  Each of the above modules may perform the method embodiment shown in FIG. 2, and details are not described herein again.
本实施例中, MME可以主动更新第三通信节点使用的参数和 /或安全算 法, 也可以根据第一通信节点的请求消息向第一通信节点、 第二通信节点发 送参数和 /或安全算法, 并进一步转发给第三通信节点, 使得不论在任何情况 下更新了参数和 /或安全算法后, 都保证第一通信节点、 第二通信节点以及第 三通信节点可以获知对应的参数和 /或安全算法, 避免第一通信节点、 第二通 信节点以及第三通信节点无法处理它们之间进行通信的信息。  In this embodiment, the MME may actively update parameters and/or security algorithms used by the third communication node, and may also send parameters and/or security algorithms to the first communication node and the second communication node according to the request message of the first communication node. And further forwarding to the third communication node, so that the first communication node, the second communication node and the third communication node can be informed of the corresponding parameters and/or security after updating the parameters and/or the security algorithm in any case. The algorithm prevents the first communication node, the second communication node, and the third communication node from processing information for communication between them.
图 9为本发明提供的通信节点实施例二的结构示意图, 该通信节点为上述 第一通信节点, 如图 9所示, 该通信节点包括: 发送模块 901和接收模块 902, 其中: FIG. 9 is a schematic structural diagram of a second embodiment of a communication node according to the present invention. The communication node is the first communication node. As shown in FIG. 9, the communication node includes: a sending module 901 and a receiving module 902. among them:
发送模块 901 , 向移动管理实体 MME发送请求消息, 以使所述 MME根据 所述请求消息向所述第一通信节点发送第一套参数和 /或安全算法和至少一套 第二套参数和 /或安全算法, 或者, 向所述第一通信节点发送所述第一套参数 和 /或安全算法, 以及向至少一个第二通信节点发送所述第二套参数和 /或安全 算法;  The sending module 901 sends a request message to the mobility management entity MME, so that the MME sends a first set of parameters and/or security algorithms and at least one set of second parameters and/or to the first communication node according to the request message. Or a security algorithm, or transmitting the first set of parameters and/or security algorithms to the first communication node, and transmitting the second set of parameters and/or security algorithms to at least one second communication node;
接收模块 902, 用于接收所述 MME发送的第一套参数和 /或安全算法和第 二套参数和 /或安全算法;或者,接收所述 MME发送的第一套参数和 /或安全算 法。  The receiving module 902 is configured to receive a first set of parameters and/or a security algorithm and a second set of parameters and/or security algorithms sent by the MME; or receive a first set of parameters and/or security algorithms sent by the MME.
具体地, 所述第一通信节点为与所述第三通信节点进行控制面信令通信 的站点, 所述第二通信节点为与所述第三通信节点进行用户面数据通信的站 点; 或者, 所述第一通信节点所在的小区为与所述第三通信节点的主小区, 所述第二通信节点所在的小区为所述第三通信节点的辅小区。  Specifically, the first communication node is a station that performs control plane signaling communication with the third communication node, and the second communication node is a site that performs user plane data communication with the third communication node; or The cell in which the first communication node is located is the primary cell of the third communication node, and the cell in which the second communication node is located is the secondary cell of the third communication node.
图 10为本发明提供的通信节点实施例三的结构示意图, 如图 10所示, 在 图 9的基础上, 该通信节点还包括: 通信模块 903, 其中:  FIG. 10 is a schematic structural diagram of Embodiment 3 of a communication node according to the present invention. As shown in FIG. 10, on the basis of FIG. 9, the communication node further includes: a communication module 903, where:
发送模块 901在不同场景下所执行的工作不同:  The sending module 901 performs different tasks in different scenarios:
1 )发送模块 901 , 还用于所述接收模块接收所述 MME发送的第一套参数 和安全算法和至少一套第二套参数和 /或安全算法之后, 向至少一个所述第二 通信节点发送对应的所述第二套参数和 /或安全算法, 并向第三通信节点发送 所述第一套参数和 /或安全算法和所述至少一套第二套参数和 /或安全算法。  1) The sending module 901 is further configured to: after receiving, by the receiving module, the first set of parameters and the security algorithm sent by the MME, and the at least one second set of parameters and/or security algorithms, to the at least one second communications node Transmitting the corresponding second set of parameters and/or security algorithms, and transmitting the first set of parameters and/or security algorithms and the at least one set of second sets of parameters and/or security algorithms to the third communication node.
2 )发送模块 901 , 还用于所述接收模块接收所述 MME发送的第一套参数 和 /或安全算法之后, 向第三通信节点发送所述第一套参数和 /或安全算法。  2) The sending module 901 is further configured to: after the receiving module receives the first set of parameters and/or security algorithms sent by the MME, send the first set of parameters and/or security algorithms to the third communications node.
进一步地, 发送模块 901 , 用于向所述第二通信节点或第三通信节点发送 消息, 以使所述第二通信节点在接收到所述消息时开始使用所述第二套参数 和 /或安全算法与第三通信节点进行通信, 使第三通信节点在接收到所述消息 时开始使用所述第一套参数和 /或安全算法与第一通信节点进行通信的信息进 行处理, 使用所述第二套参数和 /或安全算法与第二通信节点进行通信。  Further, the sending module 901 is configured to send a message to the second communications node or the third communications node, so that the second communications node starts using the second set of parameters and/or when receiving the message. The security algorithm communicates with the third communication node to cause the third communication node to begin processing the information communicated with the first communication node using the first set of parameters and/or security algorithms upon receiving the message, using the A second set of parameters and/or security algorithms communicate with the second communication node.
另外, 通信模块 903, 用于根据所述第一套参数和 /或安全算法与第三通 信节点进行通信。 所述安全算法包括加密算法、 头压缩算法和完整性保护算 法中的至少一种算法; 所述参数包括下一跳连接计数器 NCC、 下一跳 NH、 小 区无线网络临时标识 C-RNTL 分组数据汇聚层协议 PDCP序列号的长度中的 至少一种参数。 In addition, the communication module 903 is configured to communicate with the third communication node according to the first set of parameters and/or security algorithms. The security algorithm includes at least one of an encryption algorithm, a header compression algorithm, and an integrity protection algorithm; the parameters include a next hop connection counter NCC, a next hop NH, and a small The area wireless network temporarily identifies at least one of the lengths of the C-RNTL packet data convergence layer protocol PDCP sequence number.
通信模块 903, 具体用于执行下述处理中的至少一种:  The communication module 903 is specifically configured to perform at least one of the following processes:
1 )根据所述加密算法对与第三通信节点进行通信的信息进行加解密处 理; 2 )根据所述头压缩算法对与第三通信节点进行通信的信息进行头压缩或 者解头压缩处理; 3 )根据所述完整性保护算法对与第三通信节点进行通信的 信息进行完整性保护或者解完整性保护处理。  1) performing encryption and decryption processing on the information communicated with the third communication node according to the encryption algorithm; 2) performing header compression or decompression compression processing on the information communicated with the third communication node according to the header compression algorithm; And performing integrity protection or de-integrity protection processing on the information communicated with the third communication node according to the integrity protection algorithm.
上述各模块可用于执行图 3所示方法实施例, 在此不再赘述。  The foregoing modules may be used to implement the method embodiment shown in FIG. 3, and details are not described herein again.
图 11为本发明提供的通信节点实施例四的结构示意图, 该通信节点为上 述第二通信节点, 如图 11所示, 该通信节点包括: 接收模块 110和通信模块 120, 其中:  FIG. 11 is a schematic structural diagram of Embodiment 4 of a communication node according to the present invention. The communication node is the second communication node. As shown in FIG. 11, the communication node includes: a receiving module 110 and a communication module 120, where:
接收模块 110, 用于接收第一通信节点或者 MME发送的参数和 /或安全算 法, 该参数和 /或安全算法为上述第二套参数和 /或安全算法。  The receiving module 110 is configured to receive a parameter and/or a security algorithm sent by the first communications node or the MME, where the parameter and/or the security algorithm is the second set of parameters and/or the security algorithm.
通信模块 120, 用于根据上述参数和 /或安全算法与第三通信节点进行通 信; 具体地, 可以是下述处理中的至少一种:  The communication module 120 is configured to communicate with the third communication node according to the foregoing parameters and/or security algorithms; specifically, it may be at least one of the following processes:
1 )根据上述加密算法对于第三通信节点进行通信的信息进行加解密处 理;  1) performing encryption and decryption processing on the information communicated by the third communication node according to the above encryption algorithm;
2 )根据头压缩算法对与第三通信节点进行通信的信息进行头压缩或解头 压缩处理;  2) performing header compression or decompression processing on the information communicated with the third communication node according to the header compression algorithm;
3 )根据上述完整性保护算法对与第三通信节点进行通信的信息进行完整 性保护或者解完整性保护。  3) Perform integrity protection or solution integrity protection on the information communicated with the third communication node according to the integrity protection algorithm described above.
通信模块 120, 具体用于该第二通信节点在接收到上述参数和 /或安全算 法时, 开始使用上述参数和 /或安全算法与第三通信节点进行通信; 或者, 该第二通信节点在接收到上述参数和 /或安全算法之后, 暂不使用, 等接 收到第一通信节点或第三通信节点发送的消息后, 再开始使用该参数和 /或安 全算法与第三通信节点进行通信; 或者,  The communication module 120 is specifically configured to: when the second communication node receives the parameter and/or the security algorithm, start to communicate with the third communication node by using the parameter and/or the security algorithm; or the second communication node is receiving After the above parameters and/or security algorithms are not used, after receiving the message sent by the first communication node or the third communication node, the parameter and/or the security algorithm are used to communicate with the third communication node; or ,
该第二通信节点在开始和第三通信节点进行通信时, 开始使用上述参数 和 /或安全算法与第三通信节点进行通信; 或者,  The second communication node begins to communicate with the third communication node using the above parameters and/or security algorithm when initially communicating with the third communication node; or
在第三通信节点接入到该第二通信节点时, 第二通信节点开始使用上述 参数和 /或安全算法与第三通信节点进行通信; 或者, 在第三通信节点与该第二通信节点上行同步时, 开始使用上述参数和 /或 安全算法与第三通信节点进行通信; 或者, When the third communication node accesses the second communication node, the second communication node starts to communicate with the third communication node using the above parameters and/or security algorithms; or When the third communication node is uplink-synchronized with the second communication node, starting to communicate with the third communication node by using the foregoing parameter and/or security algorithm; or
该第二通信节点接收到上述第一通信节点发送的第一个数据包时, 开始 使用所述参数和 /或安全算法与第三通信节点进行通信; 或者,  Receiving, by the second communication node, the first data packet sent by the first communication node, starting to communicate with the third communication node by using the parameter and/or the security algorithm; or
该第二通信节点也可以在接收到上述参数和 /或安全算法后的预设时间内 或者之后, 开始使用所述参数和 /或安全算法与第三通信节点进行通信; 或者, 可以向上述第三通信节点发送用于指示开始使用上述参数和 /或安全算法 的指示消息, 并在发送该指示消息时开始使用上述参数和 /或安全算法与第三 通信节点进行通信; 或者,  The second communication node may also start to communicate with the third communication node by using the parameter and/or the security algorithm within a preset time after receiving the parameter and/or the security algorithm; or Transmitting, by the third communication node, an indication message for instructing to start using the foregoing parameter and/or the security algorithm, and starting to communicate with the third communication node by using the foregoing parameter and/or security algorithm when transmitting the indication message; or
如果第二通信节点接收到上述参数和 /或安全算法后, 没有预先设置, 也 没有收到任何指示消息, 那么该第二通信节点需要对第三通信节点发送的信 息进行解密或解头压缩或解完整性保护处理时, 会先采用原参数和 /或安全算 法, 若解密或解头压缩或解完整性保护失败, 则开始使用上述参数和 /或安全 算法与第三通信节点进行通信。  If the second communication node does not preset and does not receive any indication message after receiving the above parameters and/or security algorithm, the second communication node needs to decrypt or decompress the information sent by the third communication node or When the integrity protection process is processed, the original parameters and/or security algorithms are used first. If the decryption or decompression or de-integrity protection fails, the above parameters and/or security algorithms are used to communicate with the third communication node.
本实施例中, 第三通信节点可以接收到第一通信节点发送的第一套参数 和 /或安全算法和第二套参数和 /或安全算法, 或者, 接收该第一通信节点发送 的第一套参数和 /或安全算法和第二通信节点发送的第二套参数和 /或安全算 法, 进而第三通信节点使用该第一套参数和 /或安全算法与第一通信节点进行 通信, 使用该第二套参数和 /或安全算法与第二通信节点进行通信, 从而实现 了不论在第三通信节点的控制面和用户面的切换过程中或非切换过程中, 只 要 MME要更新第三通信节点所使用的参数和 /或安全算法时, 就能够让与第三 通信节点进行通信的基站以及第三通信节点都及时获取更新的参数和 /或安全 算法, 避免与第三通信节点进行通信的站点以及第三通信节点无法对通信过 程中的信息进行处理。  In this embodiment, the third communications node may receive the first set of parameters and/or security algorithms and the second set of parameters and/or security algorithms sent by the first communications node, or receive the first sent by the first communications node. a set of parameters and/or security algorithms and a second set of parameters and/or security algorithms sent by the second communication node, the third communication node then communicating with the first communication node using the first set of parameters and/or security algorithms, using the The second set of parameters and/or security algorithms communicate with the second communication node, thereby enabling the MME to update the third communication node regardless of whether during the handover of the control plane and the user plane of the third communication node or during the handover process When the parameters and/or security algorithms are used, the base station and the third communication node that communicate with the third communication node can acquire updated parameters and/or security algorithms in time to avoid the site communicating with the third communication node. And the third communication node cannot process the information in the communication process.
本发明另一实施例还提供一种通信节点, 该通信节点为上述第三通信节 点, 包括: 接收器和处理器, 其中:  Another embodiment of the present invention further provides a communication node, where the communication node is the foregoing third communication node, including: a receiver and a processor, where:
接收器, 用于接收第一通信节点发送的第一套参数和 /或安全算法和至少 一套第二套参数和 /或安全算法; 或者, 接收所述第一通信节点发送的第一套 参数和 /或安全算法和至少一个第二通信节点发送的第二套参数和 /或安全算 法; 处理器, 用于使用所述第一套参数和 /或安全算法与第一通信节点进行通 信, 使用所述第二套参数和 /或安全算法与第二通信节点进行通信。 a receiver, configured to receive a first set of parameters and/or a security algorithm sent by the first communication node, and at least a second set of parameters and/or security algorithms; or receive a first set of parameters sent by the first communication node And/or a security algorithm and a second set of parameters and/or security algorithms sent by the at least one second communication node; And a processor, configured to communicate with the first communication node using the first set of parameters and/or security algorithms, and to communicate with the second communication node using the second set of parameters and/or security algorithms.
其中, 所述第一通信节点为与所述第三通信节点进行控制面信令通信的 站点, 所述第二通信节点为与所述第三通信节点进行用户面数据通信的站点; 或者,  The first communication node is a station that performs control plane signaling communication with the third communication node, and the second communication node is a site that performs user plane data communication with the third communication node; or
所述第一通信节点所在的小区为与所述第三通信节点的主小区, 所述第 二通信节点所在的小区为所述第三通信节点的辅小区。  The cell in which the first communication node is located is the primary cell of the third communication node, and the cell in which the second communication node is located is the secondary cell of the third communication node.
所述安全算法包括加密算法、 头压缩算法和完整性保护算法中的至少一 种算法; 所述参数包括下一跳连接计数器 NCC、 下一跳 NH、 小区无线网络临 时标识 C-RNTL 分组数据汇聚层协议 PDCP 序列号的长度中的至少一种参 数。  The security algorithm includes at least one of an encryption algorithm, a header compression algorithm, and an integrity protection algorithm; the parameters include a next hop connection counter NCC, a next hop NH, a cell radio network temporary identifier C-RNTL packet data aggregation. At least one of the lengths of the layer protocol PDCP sequence number.
所述处理器具体用于执行下述至少一种处理:  The processor is specifically configured to perform at least one of the following processes:
根据所述加密算法对与第一通信节点和 /或第二通信节点进行通信的信息 进行加解密处理;  And performing encryption and decryption processing on the information communicated with the first communication node and/or the second communication node according to the encryption algorithm;
根据所述头压缩算法对与第一通信节点和 /或第二通信节点进行通信的信 息进行头压缩或者解头压缩处理;  Performing header compression or decompression processing on the information communicated with the first communication node and/or the second communication node according to the header compression algorithm;
根据所述完整性保护算法对与第一通信节点和 /或第二通信节点进行通信 的信息进行完整性保护或者解完整性保护处理。  An integrity protection or de-integrity protection process is performed on the information communicated with the first communication node and/or the second communication node in accordance with the integrity protection algorithm.
所述处理器还具体用于, 在接收到所述第一套参数和 /或安全算法时, 开 始使用所述第一套参数和 /或安全算法与第一通信节点进行通信, 所述第三通 信节点在接收到所述第二套参数和 /或安全算法时, 开始使用所述第二套参数 和 /或安全算法与第二通信节点进行通信; 或者,  The processor is further configured to, when receiving the first set of parameters and/or security algorithms, start to communicate with the first communication node by using the first set of parameters and/or security algorithms, where the third Upon receiving the second set of parameters and/or security algorithms, the communication node begins to communicate with the second communication node using the second set of parameters and/or security algorithms; or
在向第二通信节点发送信息时, 开始使用所述第一套参数和 /或安全算法 与第一通信节点进行通信, 使用所述第二套参数和 /或安全算法与第二通信节 点进行通信; 或者,  When transmitting information to the second communication node, starting to communicate with the first communication node using the first set of parameters and/or security algorithms, and communicating with the second communication node using the second set of parameters and/or security algorithms Or,
在接收第一通信节点或第二通信节点发送的消息时, 开始使用所述第一 套参数和 /或安全算法与第一通信节点进行通信, 使用所述第二套参数和 /或安 全算法与第二通信节点进行通信; 或者,  Upon receiving a message sent by the first communication node or the second communication node, starting to communicate with the first communication node using the first set of parameters and/or security algorithms, using the second set of parameters and/or security algorithms and The second communication node performs communication; or
在接入到第二通信节点时, 开始使用所述第一套参数和 /或安全算法与第 一通信节点进行通信, 使用所述第二套参数和 /或安全算法与第二通信节点进 行通信; 或者, When accessing the second communication node, starting to communicate with the first communication node using the first set of parameters and/or security algorithms, using the second set of parameters and/or security algorithms and the second communication node Line communication; or,
在开始和第二通信节点通信时, 开始使用所述第一套参数和 /或安全算法 与第一通信节点进行通信, 使用所述第二套参数和 /或安全算法与第二通信节 点进行通信; 或者,  Initially communicating with the first communication node using the first set of parameters and/or security algorithms when communicating with the second communication node, communicating with the second communication node using the second set of parameters and/or security algorithms Or,
在接收到所述第二通信节点发送的第一个数据包时, 开始使用所述第一 套参数和 /或安全算法与第一通信节点进行通信, 使用所述第二套参数和 /或安 全算法与第二通信节点进行通信; 或者,  Upon receiving the first data packet sent by the second communication node, starting to communicate with the first communication node using the first set of parameters and/or security algorithms, using the second set of parameters and/or security The algorithm communicates with the second communication node; or
在接收到所述第一套参数和 /或安全算法后的预设时间内或者之后, 开始 使用所述第一套参数和 /或安全算法与第一通信节点进行通信, 所述第三通信 节点在接收到所述第二套参数和 /或安全算法后的预设时间内或者之后, 开始 使用所述第二套参数和 /或安全算法与第二通信节点进行通信。  Equivalently communicating with the first communication node using the first set of parameters and/or security algorithms after a preset time or after receiving the first set of parameters and/or security algorithms, the third communication node The second set of parameters and/or security algorithms are used to communicate with the second communication node within a preset time after or after receiving the second set of parameters and/or security algorithms.
本发明另一实施例还提供一种移动管理实体, 包括: 接收器、 发送器, 其中:  Another embodiment of the present invention further provides a mobility management entity, including: a receiver and a transmitter, where:
接收器, 用于接收第一通信节点发送的请求消息;  a receiver, configured to receive a request message sent by the first communications node;
发送器, 用于根据所述请求消息向所述第一通信节点发送第一套参数和 / 或安全算法和至少一套第二套参数和 /或安全算法; 或者, 根据所述请求消息 向所述第一通信节点发送所述第一套参数和 /或安全算法, 向至少一个第二通 信节点发送对应的第二套参数和 /或安全算法;  a transmitter, configured to send, according to the request message, a first set of parameters and/or a security algorithm and at least one set of second set of parameters and/or security algorithms to the first communication node; or, according to the request message Transmitting, by the first communication node, the first set of parameters and/or security algorithms, and sending a corresponding second set of parameters and/or security algorithms to the at least one second communication node;
其中, 所述第一套参数和 /或安全算法用于第一通信节点与第三通信节点 进行通信, 所述第二套参数和 /或安全算法用于第二通信节点与第三通信节点 进行通信;  The first set of parameters and/or security algorithms are used by the first communication node to communicate with the third communication node, and the second set of parameters and/or security algorithms are used by the second communication node and the third communication node. Communication
所述第一通信节点为与所述第三通信节点进行控制面信令通信的站点, 所述第二通信节点为与所述第三通信节点进行用户面数据通信的站点; 或者, 所述第一通信节点所在的小区为与所述第三通信节点的主小区, 所述第 二通信节点所在的小区为所述第三通信节点的辅小区。  The first communication node is a station that performs control plane signaling communication with the third communication node, and the second communication node is a site that performs user plane data communication with the third communication node; or, the The cell in which the communication node is located is the primary cell of the third communication node, and the cell in which the second communication node is located is the secondary cell of the third communication node.
所述安全算法包括加密算法、 头压缩算法和完整性保护算法中的至少一 种算法; 所述参数包括下一跳连接计数器 NCC、 下一跳 NH、 小区无线网络临 时标识 C-RNTI、分组数据汇聚层协议 PDCP序列号的长度中的至少一种参数。  The security algorithm includes at least one of an encryption algorithm, a header compression algorithm, and an integrity protection algorithm; the parameters include a next hop connection counter NCC, a next hop NH, a cell radio network temporary identifier C-RNTI, and packet data. At least one of the lengths of the convergence layer protocol PDCP sequence number.
本发明另一实施例还提供一种通信节点, 该通信节点为上述第一通信节 点, 该通信节点包括: 发送器、 接收器和处理器, 其中: 发送器, 用于向移动管理实体 MME发送请求消息, 以使所述 MME根据所 述请求消息向所述第一通信节点发送第一套参数和 /或安全算法和至少一套第 二套参数和 /或安全算法, 或者, 向所述第一通信节点发送所述第一套参数和 / 或安全算法, 以及向至少一个第二通信节点发送所述第二套参数和 /或安全算 法; Another embodiment of the present invention further provides a communication node, where the communication node is the first communication node, and the communication node includes: a transmitter, a receiver, and a processor, where: a transmitter, configured to send a request message to the mobility management entity MME, to enable the MME to send a first set of parameters and/or a security algorithm and at least one set of second parameters to the first communication node according to the request message And/or a security algorithm, or transmitting the first set of parameters and/or security algorithms to the first communication node, and transmitting the second set of parameters and/or security algorithms to at least one second communication node;
接收器,用于接收所述 MME发送的第一套参数和 /或安全算法和第二套参 数和 /或安全算法; 或者, 接收所述 MME发送的第一套参数和 /或安全算法; 其中, 所述第一通信节点为与所述第三通信节点进行控制面信令通信的 站点, 所述第二通信节点为与所述第三通信节点进行用户面数据通信的站点; 或者,  a receiver, configured to receive a first set of parameters and/or a security algorithm and a second set of parameters and/or security algorithms sent by the MME; or, receive a first set of parameters and/or security algorithms sent by the MME; The first communication node is a station that performs control plane signaling communication with the third communication node, and the second communication node is a site that performs user plane data communication with the third communication node; or
所述第一通信节点所在的小区为与所述第三通信节点的主小区, 所述第 二通信节点所在的小区为所述第三通信节点的辅小区。  The cell in which the first communication node is located is the primary cell of the third communication node, and the cell in which the second communication node is located is the secondary cell of the third communication node.
进一步地, 第一种情况下, 接收器接收所述 MME发送的第一套参数和安 全算法和至少一套第二套参数和 /或安全算法之后, 发送器, 向至少一个所述 第二通信节点发送对应的所述第二套参数和 /或安全算法, 并向第三通信节点 发送所述第一套参数和 /或安全算法和所述至少一套第二套参数和 /或安全算 法。  Further, in the first case, after the receiver receives the first set of parameters and the security algorithm sent by the MME and at least one set of the second set of parameters and/or security algorithms, the transmitter sends the at least one of the second communications The node transmits the corresponding second set of parameters and/or security algorithms and transmits the first set of parameters and/or security algorithms and the at least one set of second sets of parameters and/or security algorithms to the third communication node.
第二种情况下,接收器接收所述 MME发送的第一套参数和 /或安全算法之 后, 发送器, 向第三通信节点发送所述第一套参数和 /或安全算法。  In the second case, after the receiver receives the first set of parameters and/or security algorithms sent by the MME, the transmitter sends the first set of parameters and/or security algorithms to the third communication node.
另外,在接收器接收到所述 MME发送的第一套参数和 /或安全算法和至少 一套第二套参数和 /或安全算法,或者所述第一通信节点接收到所述 MME发送 的第一套参数和 /或安全算法之后, 发送器还用于, 向所述第二通信节点或第 三通信节点发送消息, 以使所述第二通信节点在接收到所述消息时开始使用 所述第二套参数和 /或安全算法与第三通信节点进行通信, 使第三通信节点在 接收到所述消息时开始使用所述第一套参数和 /或安全算法与第一通信节点进 行通信的信息进行处理, 使用所述第二套参数和 /或安全算法与第二通信节点 进行通信。  In addition, the receiver receives the first set of parameters and/or security algorithms sent by the MME and at least one second set of parameters and/or security algorithms, or the first communication node receives the first sent by the MME. After a set of parameters and/or security algorithms, the transmitter is further configured to: send a message to the second communication node or the third communication node, to enable the second communication node to start using the message when receiving the message A second set of parameters and/or security algorithms are in communication with the third communication node to cause the third communication node to begin communicating with the first communication node using the first set of parameters and/or security algorithms upon receiving the message The information is processed and communicated with the second communication node using the second set of parameters and/or security algorithms.
接收器接收所述 MME发送的第一套参数和 /或安全算法和至少一套第二 套参数和 /或安全算法,或者所述第一通信节点接收到所述 MME发送的第一套 参数和 /或安全算法之后, 处理器用于根据所述第一套参数和 /或安全算法与第 三通信节点进行通信。 Receiving, by the receiver, a first set of parameters and/or a security algorithm sent by the MME, and at least one set of second set of parameters and/or security algorithms, or the first communication node receives the first set of parameters sent by the MME and After the security algorithm, the processor is configured to use the first set of parameters and/or security algorithms and The three communication nodes communicate.
需要说明的是, 所述安全算法包括加密算法、 头压缩算法和完整性保护 算法中的至少一种算法; 所述参数包括下一跳连接计数器 NCC、 下一跳 NH、 小区无线网络临时标识 C-RNTL 分组数据汇聚层协议 PDCP序列号的长度中 的至少一种参数。  It should be noted that the security algorithm includes at least one of an encryption algorithm, a header compression algorithm, and an integrity protection algorithm; the parameters include a next hop connection counter NCC, a next hop NH, and a cell wireless network temporary identifier C. - RNTL at least one of the lengths of the packet data convergence layer protocol PDCP sequence number.
所述处理器, 还具体用于执行下述至少一种处理: 1 )根据所述加密算法 对与第三通信节点进行通信的信息进行加解密处理; 2 )根据所述头压缩算法 对与第三通信节点进行通信的信息进行头压缩或者解头压缩处理; 3 )根据所 述完整性保护算法对与第三通信节点进行通信的信息进行完整性保护或者解 完整性保护处理。  The processor is further configured to perform at least one of the following processes: 1) performing encryption and decryption processing on information communicated with the third communication node according to the encryption algorithm; 2) performing a header compression algorithm according to the header compression algorithm The information communicated by the three communication nodes is subjected to header compression or decompression compression processing; 3) performing integrity protection or de-integrity protection processing on the information communicated with the third communication node according to the integrity protection algorithm.
本领域普通技术人员可以理解: 实现上述各方法实施例的全部或部分步 骤可以通过程序指令相关的硬件来完成。 前述的程序可以存储于一计算机可 读取存储介质中。 该程序在执行时, 执行包括上述各方法实施例的步骤; 而 前述的存储介质包括: ROM、 RAM , 磁碟或者光盘等各种可以存储程序代码 的介质。  One of ordinary skill in the art will appreciate that all or a portion of the steps to implement the various method embodiments described above can be accomplished by hardware associated with the program instructions. The aforementioned program can be stored in a computer readable storage medium. The program, when executed, performs the steps including the foregoing method embodiments; and the foregoing storage medium includes: a medium that can store program codes, such as a ROM, a RAM, a magnetic disk, or an optical disk.
最后应说明的是: 以上各实施例仅用以说明本发明的技术方案, 而非对 其限制; 尽管参照前述各实施例对本发明进行了详细的说明, 本领域的普通 技术人员应当理解: 其依然可以对前述各实施例所记载的技术方案进行修改, 或者对其中部分或者全部技术特征进行等同替换; 而这些修改或者替换, 并 不使相应技术方案的本质脱离本发明各实施例技术方案的范围。  It should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, and are not intended to be limiting; although the present invention has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art The technical solutions described in the foregoing embodiments may be modified, or some or all of the technical features may be equivalently replaced; and the modifications or substitutions do not deviate from the technical solutions of the embodiments of the present invention. range.

Claims

权利要求 书 Claim
1、 一种小区优化方法, 其特^ ^于, 包括: A cell optimization method, the method comprising:
第三通信节点接收第一通信节点发送的第一套参数和 /或安全算法和至少一 套第二套参数和 /或安全算法; 或者,  The third communication node receives the first set of parameters and/or security algorithms sent by the first communication node and at least one second set of parameters and/or security algorithms; or
所述第三通信节点接收所述第一通信节点发送的第一套参数和 /或安全算法 和至少一个第二通信节点发送的第二套参数和 /或安全算法;  Receiving, by the third communication node, a first set of parameters and/or a security algorithm sent by the first communication node and a second set of parameters and/or security algorithms sent by the at least one second communication node;
所述第三通信节点使用所述第一套参数和 /或安全算法与第一通信节点进行 通信, 使用所述第二套参数和 /或安全算法与第二通信节点进行通信;  The third communication node communicates with the first communication node using the first set of parameters and/or security algorithms, and communicates with the second communication node using the second set of parameters and/or security algorithms;
其中, 所述第一通信节点为与所述第三通信节点进行控制面信令通信的站 点, 所述第二通信节点为与所述第三通信节点进行用户面数据通信的站点; 或 者,  The first communication node is a site that performs control plane signaling communication with the third communication node, and the second communication node is a site that performs user plane data communication with the third communication node; or
所述第一通信节点所在的小区为与所述第三通信节点的主小区, 所述第二 通信节点所在的小区为所述第三通信节点的辅小区。  The cell where the first communication node is located is the primary cell of the third communication node, and the cell where the second communication node is located is the secondary cell of the third communication node.
2、 根据权利要求 1所述的方法, 其特征在于, 所述安全算法包括加密算法、 头压缩算法和完整性保护算法中的至少一种算法;  2. The method according to claim 1, wherein the security algorithm comprises at least one of an encryption algorithm, a header compression algorithm, and an integrity protection algorithm;
所述参数包括下一跳连接计数器 NCC、 下一跳 NH、 小区无线网络临时标识 C-RNTK 分组数据汇聚层协议 PDCP 序列号的长度中的至少一种参数。  The parameters include at least one of a next hop connection counter NCC, a next hop NH, a cell radio network temporary identifier C-RNTK packet data convergence layer protocol PDCP sequence number.
3、 根据权利要求 2所述的方法, 其特征在于, 所述第三通信节点使用所述 第一套参数和 /或安全算法与第一通信节点进行通信, 使用所述第二套参数和 /或 安全算法与第二通信节点进行通信, 包括下述至少一种:  3. The method according to claim 2, wherein the third communication node communicates with the first communication node using the first set of parameters and/or security algorithms, using the second set of parameters and/or Or the security algorithm communicates with the second communication node, including at least one of the following:
所述第三通信节点根据所述加密算法对与第一通信节点和 /或第二通信节点 进行通信的信息进行加解密处理;  And the third communication node performs encryption and decryption processing on the information that is communicated with the first communication node and/or the second communication node according to the encryption algorithm;
所述第三通信节点根据所述头压缩算法对与第一通信节点和 /或第二通信节 点进行通信的信息进行头压缩或者解头压缩处理;  And the third communication node performs header compression or decompression compression processing on the information that is communicated with the first communication node and/or the second communication node according to the header compression algorithm;
所述第三通信节点根据所述完整性保护算法对与第一通信节点和 /或第二通 信节点进行通信的信息进行完整性保护或者解完整性保护处理。  The third communication node performs integrity protection or de-integrity protection processing on the information communicated with the first communication node and/or the second communication node according to the integrity protection algorithm.
4、 根据权利要求 1所述的方法, 其特征在于, 所述第三通信节点使用所述 第一套参数和 /或安全算法与第一通信节点进行通信, 使用所述第二套参数和 /或 安全算法与第二通信节点进行通信, 包括:  4. The method according to claim 1, wherein the third communication node communicates with the first communication node using the first set of parameters and/or security algorithms, using the second set of parameters and/or Or the security algorithm communicates with the second communication node, including:
所述第三通信节点在接收到所述第一套参数和 /或安全算法时, 开始使用所 述第一套参数和 /或安全算法与第一通信节点进行通信, 所述第三通信节点在接 收到所述第二套参数和 /或安全算法时, 开始使用所述第二套参数和 /或安全算法 与第二通信节点进行通信; 或者, The third communication node starts to use the first set of parameters and/or security algorithms when receiving the first set of parameters and/or security algorithms The first set of parameters and/or security algorithms communicate with the first communication node, and the third communication node begins to use the second set of parameters and/or upon receiving the second set of parameters and/or security algorithms Or the security algorithm communicates with the second communication node; or
所述第三通信节点在向第二通信节点发送信息时, 开始使用所述第一套参 数和 /或安全算法与第一通信节点进行通信, 使用所述第二套参数和 /或安全算法 与第二通信节点进行通信; 或者,  The third communication node, when transmitting information to the second communication node, starts communicating with the first communication node using the first set of parameters and/or security algorithms, using the second set of parameters and/or security algorithms and The second communication node performs communication; or
所述第三通信节点在接收第一通信节点或第二通信节点发送的消息时, 开 始使用所述第一套参数和 /或安全算法与第一通信节点进行通信, 使用所述第二 套参数和 /或安全算法与第二通信节点进行通信; 或者,  When receiving the message sent by the first communication node or the second communication node, the third communication node starts to communicate with the first communication node by using the first set of parameters and/or security algorithm, and uses the second set of parameters. And/or a security algorithm to communicate with the second communication node; or
所述第三通信节点在接入到第二通信节点时, 开始使用所述第一套参数和 / 或安全算法与第一通信节点进行通信, 使用所述第二套参数和 /或安全算法与第 二通信节点进行通信; 或者,  The third communication node, when accessing the second communication node, starts communicating with the first communication node using the first set of parameters and/or security algorithms, using the second set of parameters and/or security algorithms and The second communication node performs communication; or
所述第三通信节点在开始和第二通信节点通信时, 开始使用所述第一套参 数和 /或安全算法与第一通信节点进行通信, 使用所述第二套参数和 /或安全算法 与第二通信节点进行通信; 或者,  The third communication node, when initially communicating with the second communication node, begins communicating with the first communication node using the first set of parameters and/or security algorithms, using the second set of parameters and/or security algorithms and The second communication node performs communication; or
所述第三通信节点在接收到所述第二通信节点发送的第一个数据包时, 开 始使用所述第一套参数和 /或安全算法与第一通信节点进行通信, 使用所述第二 套参数和 /或安全算法与第二通信节点进行通信; 或者,  When receiving the first data packet sent by the second communication node, the third communication node starts to communicate with the first communication node by using the first set of parameters and/or security algorithm, and uses the second a set of parameters and/or security algorithms to communicate with the second communication node; or
所述第三通信节点在接收到所述第一套参数和 /或安全算法后的预设时间内 或者之后, 开始使用所述第一套参数和 /或安全算法与第一通信节点进行通信, 所述第三通信节点在接收到所述第二套参数和 /或安全算法后的预设时间内或者 之后, 开始使用所述第二套参数和 /或安全算法与第二通信节点进行通信。  The third communication node starts to communicate with the first communication node by using the first set of parameters and/or security algorithms within a preset time after receiving the first set of parameters and/or security algorithms, The third communication node begins to communicate with the second communication node using the second set of parameters and/or security algorithms within a preset time after or after receiving the second set of parameters and/or security algorithms.
5、 一种小区优化方法, 其特征在于, 包括:  5. A cell optimization method, characterized in that:
移动管理实体 MME接收第一通信节点发送的请求消息;  The mobility management entity MME receives the request message sent by the first communication node;
所述 MME根据所述请求消息向所述第一通信节点发送第一套参数和 /或安 全算法和至少一套第二套参数和 /或安全算法; 或者,  Sending, by the MME, a first set of parameters and/or security algorithms and at least one set of second sets of parameters and/or security algorithms to the first communication node according to the request message; or
所述 MME根据所述请求消息向所述第一通信节点发送所述第一套参数和 / 或安全算法, 向至少一个第二通信节点发送对应的第二套参数和 /或安全算法; 其中, 所述第一套参数和 /或安全算法用于第一通信节点与第三通信节点进 行通信, 所述第二套参数和 /或安全算法用于第二通信节点与第三通信节点进行 通信; The MME sends the first set of parameters and/or security algorithms to the first communication node according to the request message, and sends a corresponding second set of parameters and/or security algorithms to the at least one second communication node; The first set of parameters and/or security algorithms are used by the first communication node to communicate with the third communication node, and the second set of parameters and/or security algorithms are used by the second communication node and the third communication node Communication
所述第一通信节点为与所述第三通信节点进行控制面信令通信的站点, 所 述第二通信节点为与所述第三通信节点进行用户面数据通信的站点; 或者, 所述第一通信节点所在的小区为与所述第三通信节点的主小区, 所述第二 通信节点所在的小区为所述第三通信节点的辅小区。  The first communication node is a station that performs control plane signaling communication with the third communication node, and the second communication node is a site that performs user plane data communication with the third communication node; or, the The cell in which the communication node is located is the primary cell of the third communication node, and the cell in which the second communication node is located is the secondary cell of the third communication node.
6、 根据权利要求 5所述的方法, 其特征在于, 所述安全算法包括加密算法、 头压缩算法和完整性保护算法中的至少一种算法;  The method according to claim 5, wherein the security algorithm comprises at least one of an encryption algorithm, a header compression algorithm, and an integrity protection algorithm;
所述参数包括下一跳连接计数器 NCC、 下一跳 NH、 小区无线网络临时标识 C-RNTK 分组数据汇聚层协议 PDCP序列号的长度中的至少一种参数。  The parameters include at least one of a next hop connection counter NCC, a next hop NH, a cell radio network temporary identifier C-RNTK packet data convergence layer protocol PDCP sequence number.
7、 一种小区优化方法, 其特征在于, 包括:  7. A cell optimization method, comprising:
第一通信节点向移动管理实体 MME发送请求消息, 以使所述 MME根据所述 请求消息向所述第一通信节点发送第一套参数和 /或安全算法和至少一套第二套 参数和 /或安全算法, 或者, 向所述第一通信节点发送所述第一套参数和 /或安全 算法, 以及向至少一个第二通信节点发送所述第二套参数和 /或安全算法;  Transmitting, by the first communications node, a request message to the mobility management entity MME, to enable the MME to send the first set of parameters and/or security algorithm and at least one set of second set of parameters and/or to the first communication node according to the request message. Or a security algorithm, or transmitting the first set of parameters and/or security algorithms to the first communication node, and transmitting the second set of parameters and/or security algorithms to at least one second communication node;
所述第一通信节点接收所述 MME发送的第一套参数和 /或安全算法和第二 套参数和 /或安全算法; 或者,  Receiving, by the first communications node, a first set of parameters and/or a security algorithm and a second set of parameters and/or security algorithms sent by the MME; or
所述第一通信节点接收所述 MME发送的第一套参数和 /或安全算法; 所述第一通信节点为与所述第三通信节点进行控制面信令通信的站点, 所 述第二通信节点为与所述第三通信节点进行用户面数据通信的站点; 或者, 所述第一通信节点所在的小区为与所述第三通信节点的主小区, 所述第二 通信节点所在的小区为所述第三通信节点的辅小区。  Receiving, by the first communications node, a first set of parameters and/or a security algorithm sent by the MME; the first communications node is a station that performs control plane signaling communication with the third communications node, and the second communications The node is a station that performs user plane data communication with the third communication node; or, the cell where the first communication node is located is a primary cell with the third communication node, and the cell where the second communication node is located is a secondary cell of the third communication node.
8、 根据权利要求 7所述的方法, 其特征在于, 所述第一通信节点接收所述 MME发送的第一套参数和安全算法和至少一套第二套参数和 /或安全算法之后, 还包括:  The method according to claim 7, wherein the first communication node receives the first set of parameters and the security algorithm sent by the MME and at least one second set of parameters and/or security algorithms, Includes:
所述第一通信节点向至少一个所述第二通信节点发送对应的所述第二套参 数和 /或安全算法, 并向第三通信节点发送所述第一套参数和 /或安全算法和所述 至少一套第二套参数和 /或安全算法。  Transmitting, by the first communications node, the corresponding second set of parameters and/or security algorithms to at least one of the second communications nodes, and transmitting the first set of parameters and/or security algorithms and protocols to the third communications node Describe at least one set of second set of parameters and/or security algorithms.
9、 根据权利要求 7所述的方法, 其特征在于, 所述第一通信节点接收所述 MME发送的第一套参数和 /或安全算法之后, 还包括:  The method according to claim 7, wherein after the first communication node receives the first set of parameters and/or security algorithms sent by the MME, the method further includes:
所述第一通信节点向第三通信节点发送所述第一套参数和 /或安全算法。 The first communication node transmits the first set of parameters and/or security algorithms to a third communication node.
10、 根据权利要求 7所述的方法, 其特征在于, 所述第一通信节点接收到所 述 MME发送的第一套参数和 /或安全算法和至少一套第二套参数和 /或安全算法, 或者所述第一通信节点接收到所述 MME发送的第一套参数和 /或安全算法之后, 还包括: The method according to claim 7, wherein the first communication node receives the first set of parameters and/or security algorithms sent by the MME and at least one set of second sets of parameters and/or security algorithms. After the first communication node receives the first set of parameters and/or security algorithms sent by the MME, the method further includes:
所述第一通信节点向所述第二通信节点或第三通信节点发送消息, 以使所 述第二通信节点在接收到所述消息时开始使用所述第二套参数和 /或安全算法与 第三通信节点进行通信, 使第三通信节点在接收到所述消息时开始使用所述第 一套参数和 /或安全算法与第一通信节点进行通信的信息进行处理, 使用所述第 二套参数和 /或安全算法与第二通信节点进行通信。  The first communication node sends a message to the second communication node or the third communication node to cause the second communication node to start using the second set of parameters and/or security algorithms when receiving the message Communicating with the third communication node, causing the third communication node to start processing the information communicated with the first communication node using the first set of parameters and/or security algorithms when receiving the message, using the second set The parameters and/or security algorithms communicate with the second communication node.
11、 根据权利要求 7所述的方法, 其特征在于, 所述第一通信节点接收所述 MME发送的第一套参数和 /或安全算法和至少一套第二套参数和 /或安全算法,或 者所述第一通信节点接收到所述 MME发送的第一套参数和 /或安全算法之后,还 包括:  The method according to claim 7, wherein the first communication node receives a first set of parameters and/or security algorithms and at least one set of second parameters and/or security algorithms sent by the MME, Or after the first communication node receives the first set of parameters and/or security algorithms sent by the MME, the method further includes:
所述第一通信节点根据所述第一套参数和 /或安全算法与第三通信节点进行 通信。  The first communication node communicates with the third communication node in accordance with the first set of parameters and/or security algorithms.
12、 根据权利要求 7~11任一项中所述的方法, 其特征在于, 所述安全算法 包括加密算法、 头压缩算法和完整性保护算法中的至少一种算法;  The method according to any one of claims 7 to 11, wherein the security algorithm comprises at least one of an encryption algorithm, a header compression algorithm and an integrity protection algorithm;
所述参数包括下一跳连接计数器 NCC、 下一跳 NH、 小区无线网络临时标识 C-RNTK 分组数据汇聚层协议 PDCP序列号的长度中的至少一种参数。  The parameters include at least one of a next hop connection counter NCC, a next hop NH, a cell radio network temporary identifier C-RNTK packet data convergence layer protocol PDCP sequence number.
13、 根据权利要求 12所述的方法, 其特征在于, 所述第一通信节点根据所 述第一套参数和 /或安全算法与第三通信节点进行通信, 包括下述至少一种: 所述第一通信节点根据所述加密算法对与第三通信节点进行通信的信息进 行加解密处理;  The method according to claim 12, wherein the first communication node communicates with the third communication node according to the first set of parameters and/or security algorithms, and includes at least one of the following: The first communication node performs encryption and decryption processing on the information that is communicated with the third communication node according to the encryption algorithm;
所述第一通信节点根据所述头压缩算法对与第三通信节点进行通信的信息 进行头压缩或者解头压缩处理;  The first communication node performs header compression or decompression processing on the information communicated with the third communication node according to the header compression algorithm;
所述第一通信节点根据所述完整性保护算法对与第三通信节点进行通信的 信息进行完整性保护或者解完整性保护处理。  And the first communication node performs integrity protection or de-integrity protection processing on the information communicated with the third communication node according to the integrity protection algorithm.
14、 一种通信节点, 其特征在于, 所述通信节点为第三通信节点, 包括: 接收模块, 用于接收第一通信节点发送的第一套参数和 /或安全算法和至少 一套第二套参数和 /或安全算法; 或者, 接收所述第一通信节点发送的第一套参数和 /或安全算法和至少一个第二通 信节点发送的第二套参数和 /或安全算法; A communication node, wherein the communication node is a third communication node, comprising: a receiving module, configured to receive a first set of parameters and/or a security algorithm sent by the first communication node, and at least one set of second Set of parameters and / or security algorithms; or, Receiving a first set of parameters and/or a security algorithm sent by the first communication node and a second set of parameters and/or security algorithms sent by the at least one second communication node;
通信模块, 用于所述第三通信节点使用所述第一套参数和 /或安全算法与第 一通信节点进行通信, 使用所述第二套参数和 /或安全算法与第二通信节点进行 通信;  a communication module, configured to, by the third communication node, communicate with the first communication node using the first set of parameters and/or security algorithms, and communicate with the second communication node using the second set of parameters and/or security algorithms ;
其中, 所述第一通信节点为与所述第三通信节点进行控制面信令通信的站 点, 所述第二通信节点为与所述第三通信节点进行用户面数据通信的站点; 或 者,  The first communication node is a site that performs control plane signaling communication with the third communication node, and the second communication node is a site that performs user plane data communication with the third communication node; or
所述第一通信节点所在的小区为与所述第三通信节点的主小区, 所述第二 通信节点所在的小区为所述第三通信节点的辅小区。  The cell where the first communication node is located is the primary cell of the third communication node, and the cell where the second communication node is located is the secondary cell of the third communication node.
15、 根据权利要求 14所述的通信节点, 其特征在于, 所述安全算法包括加 密算法、 头压缩算法和完整性保护算法中的至少一种算法;  The communication node according to claim 14, wherein the security algorithm comprises at least one of an encryption algorithm, a header compression algorithm, and an integrity protection algorithm;
所述参数包括下一跳连接计数器 NCC、 下一跳 NH、 小区无线网络临时标识 C-RNTK 分组数据汇聚层协议 PDCP 序列号的长度中的至少一种参数。  The parameters include at least one of a next hop connection counter NCC, a next hop NH, a cell radio network temporary identifier C-RNTK packet data convergence layer protocol PDCP sequence number.
16、 根据权利要求 15所述的通信节点, 其特征在于, 所述通信模块, 具体 用于下述至少一种:  The communication node according to claim 15, wherein the communication module is specifically used for at least one of the following:
根据所述加密算法对与第一通信节点和 /或第二通信节点进行通信的信息进 行加解密处理;  Encrypting and decrypting the information communicated with the first communication node and/or the second communication node according to the encryption algorithm;
根据所述头压缩算法对与第一通信节点和 /或第二通信节点进行通信的信息 进行头压缩或者解头压缩处理;  Performing header compression or decompression processing on the information communicated with the first communication node and/or the second communication node according to the header compression algorithm;
根据所述完整性保护算法对与第一通信节点和 /或第二通信节点进行通信的 信息进行完整性保护或者解完整性保护处理。  An integrity protection or de-integrity protection process is performed on the information communicated with the first communication node and/or the second communication node in accordance with the integrity protection algorithm.
17、 根据权利要求 14所述的通信节点, 其特征在于, 所述通信模块, 具体 用于在接收到所述第一套参数和 /或安全算法时, 开始使用所述第一套参数和 /或 安全算法与第一通信节点进行通信, 所述第三通信节点在接收到所述第二套参 数和 /或安全算法时, 开始使用所述第二套参数和 /或安全算法与第二通信节点进 行通信; 或者,  The communication node according to claim 14, wherein the communication module is specifically configured to start using the first set of parameters and/or when receiving the first set of parameters and/or security algorithms. Or the security algorithm communicates with the first communication node, the third communication node begins to use the second set of parameters and/or security algorithm and the second communication when receiving the second set of parameters and/or security algorithms The node communicates; or,
所述通信模块, 具体用于在向第二通信节点发送信息时, 开始使用所述第 一套参数和 /或安全算法与第一通信节点进行通信, 使用所述第二套参数和 /或安 全算法与第二通信节点进行通信; 或者, 所述通信模块, 具体用于在接收第一通信节点或第二通信节点发送的消息 时, 开始使用所述第一套参数和 /或安全算法与第一通信节点进行通信, 使用所 述第二套参数和 /或安全算法与第二通信节点进行通信; 或者, The communication module is specifically configured to, when transmitting information to the second communication node, start to communicate with the first communication node by using the first set of parameters and/or security algorithms, and use the second set of parameters and/or security The algorithm communicates with the second communication node; or The communication module is specifically configured to: when receiving a message sent by the first communication node or the second communication node, start to use the first set of parameters and/or a security algorithm to communicate with the first communication node, and use the second a set of parameters and/or security algorithms to communicate with the second communication node; or
所述通信模块, 具体用于在接入到第二通信节点时, 开始使用所述第一套 参数和 /或安全算法与第一通信节点进行通信, 使用所述第二套参数和 /或安全算 法与第二通信节点进行通信; 或者,  The communication module is specifically configured to, when accessing the second communication node, start to communicate with the first communication node by using the first set of parameters and/or security algorithms, and use the second set of parameters and/or security The algorithm communicates with the second communication node; or
所述通信模块, 具体用于在开始和第二通信节点通信时, 开始使用所述第 一套参数和 /或安全算法与第一通信节点进行通信, 使用所述第二套参数和 /或安 全算法与第二通信节点进行通信; 或者,  The communication module is specifically configured to start to communicate with the first communication node by using the first set of parameters and/or security algorithms when starting communication with the second communication node, using the second set of parameters and/or security The algorithm communicates with the second communication node; or
所述通信模块, 具体用于在接收到所述第二通信节点发送的第一个数据包 时, 开始使用所述第一套参数和 /或安全算法与第一通信节点进行通信, 使用所 述第二套参数和 /或安全算法与第二通信节点进行通信; 或者,  The communication module is specifically configured to: when receiving the first data packet sent by the second communication node, start to use the first set of parameters and/or a security algorithm to communicate with the first communication node, using the a second set of parameters and/or security algorithms to communicate with the second communication node; or
所述通信模块, 具体用于在接收到所述第一套参数和 /或安全算法后的预设 时间内或者之后, 开始使用所述第一套参数和 /或安全算法与第一通信节点进行 通信, 所述第三通信节点在接收到所述第二套参数和 /或安全算法后的预设时间 内或者之后,开始使用所述第二套参数和 /或安全算法与第二通信节点进行通信。  The communication module is specifically configured to start using the first set of parameters and/or security algorithms with the first communication node within a preset time after or after receiving the first set of parameters and/or security algorithms. Communicating, the third communication node starts using the second set of parameters and/or security algorithm with the second communication node within a preset time after or after receiving the second set of parameters and/or security algorithms Communication.
18、 一种移动管理实体, 其特征在于, 包括:  18. A mobility management entity, comprising:
接收模块, 用于接收第一通信节点发送的请求消息;  a receiving module, configured to receive a request message sent by the first communications node;
发送模块, 用于根据所述请求消息向所述第一通信节点发送第一套参数和 / 或安全算法和至少一套第二套参数和 /或安全算法; 或者,  a sending module, configured to send, according to the request message, a first set of parameters and/or a security algorithm and at least one second set of parameters and/or security algorithms to the first communication node; or
根据所述请求消息向所述第一通信节点发送所述第一套参数和 /或安全算 法, 向至少一个第二通信节点发送对应的第二套参数和 /或安全算法;  Transmitting, according to the request message, the first set of parameters and/or security algorithms to the first communication node, and sending a corresponding second set of parameters and/or security algorithms to the at least one second communication node;
其中, 所述第一套参数和 /或安全算法用于第一通信节点与第三通信节点进 行通信, 所述第二套参数和 /或安全算法用于第二通信节点与第三通信节点进行 通信;  The first set of parameters and/or security algorithms are used by the first communication node to communicate with the third communication node, and the second set of parameters and/or security algorithms are used by the second communication node and the third communication node. Communication
所述第一通信节点为与所述第三通信节点进行控制面信令通信的站点, 所 述第二通信节点为与所述第三通信节点进行用户面数据通信的站点; 或者, 所述第一通信节点所在的小区为与所述第三通信节点的主小区, 所述第二 通信节点所在的小区为所述第三通信节点的辅小区。  The first communication node is a station that performs control plane signaling communication with the third communication node, and the second communication node is a site that performs user plane data communication with the third communication node; or, the The cell in which the communication node is located is the primary cell of the third communication node, and the cell in which the second communication node is located is the secondary cell of the third communication node.
19、 根据权利要求 18所述的移动管理实体, 其特征在于, 所述安全算法包 括加密算法、 头压缩算法和完整性保护算法中的至少一种算法; 19. The mobility management entity of claim 18, wherein the security algorithm package At least one of an encryption algorithm, a header compression algorithm, and an integrity protection algorithm;
所述参数包括下一跳连接计数器 NCC、 下一跳 NH、 小区无线网络临时标识 C-RNTK 分组数据汇聚层协议 PDCP序列号的长度中的至少一种参数。  The parameters include at least one of a next hop connection counter NCC, a next hop NH, a cell radio network temporary identifier C-RNTK packet data convergence layer protocol PDCP sequence number.
20、 一种通信节点, 其特征在于, 所述通信节点为第一通信节点, 包括: 发送模块, 用于向移动管理实体 MME发送请求消息, 以使所述 MME根据所 述请求消息向所述第一通信节点发送第一套参数和 /或安全算法和至少一套第二 套参数和 /或安全算法, 或者, 向所述第一通信节点发送所述第一套参数和 /或安 全算法, 以及向至少一个第二通信节点发送所述第二套参数和 /或安全算法; 接收模块, 用于接收所述 MME发送的第一套参数和 /或安全算法和第二套参 数和 /或安全算法; 或者,  A communication node, wherein the communication node is a first communication node, and includes: a sending module, configured to send a request message to the mobility management entity MME, so that the MME sends the request message according to the request message. Transmitting, by the first communication node, a first set of parameters and/or security algorithms and at least one set of second sets of parameters and/or security algorithms, or transmitting the first set of parameters and/or security algorithms to the first communication node, And sending the second set of parameters and/or security algorithms to the at least one second communication node; the receiving module, configured to receive the first set of parameters and/or security algorithms and the second set of parameters and/or security sent by the MME Algorithm; or,
接收所述 MME发送的第一套参数和 /或安全算法;  Receiving a first set of parameters and/or security algorithms sent by the MME;
所述第一通信节点为与所述第三通信节点进行控制面信令通信的站点, 所 述第二通信节点为与所述第三通信节点进行用户面数据通信的站点; 或者, 所述第一通信节点所在的小区为与所述第三通信节点的主小区, 所述第二 通信节点所在的小区为所述第三通信节点的辅小区。  The first communication node is a station that performs control plane signaling communication with the third communication node, and the second communication node is a site that performs user plane data communication with the third communication node; or, the The cell in which the communication node is located is the primary cell of the third communication node, and the cell in which the second communication node is located is the secondary cell of the third communication node.
21、 根据权利要求 20所述的通信节点, 其特征在于, 所述发送模块, 还用 于所述接收模块接收所述 MME发送的第一套参数和安全算法和至少一套第二套 参数和 /或安全算法之后, 向至少一个所述第二通信节点发送对应的所述第二套 参数和 /或安全算法, 并向第三通信节点发送所述第一套参数和 /或安全算法和所 述至少一套第二套参数和 /或安全算法。  The communication node according to claim 20, wherein the sending module is further configured to receive, by the receiving module, a first set of parameters and a security algorithm sent by the MME, and at least one set of second parameters and And/or a security algorithm, transmitting the corresponding second set of parameters and/or security algorithms to at least one of the second communication nodes, and transmitting the first set of parameters and/or security algorithms and protocols to the third communication node Describe at least one set of second set of parameters and/or security algorithms.
22、 根据权利要求 20所述的通信节点, 其特征在于, 所述发送模块, 还用 于所述接收模块接收所述 MME发送的第一套参数和 /或安全算法之后, 向第三通 信节点发送所述第一套参数和 /或安全算法。  The communication node according to claim 20, wherein the sending module is further configured to: after receiving, by the receiving module, the first set of parameters and/or security algorithms sent by the MME, to the third communication node Sending the first set of parameters and/or security algorithms.
23、 根据权利要求 20所述的通信节点, 其特征在于, 所述发送模块, 还用 于向所述第二通信节点或第三通信节点发送消息, 以使所述第二通信节点在接 收到所述消息时开始使用所述第二套参数和 /或安全算法与第三通信节点进行通 信, 使第三通信节点在接收到所述消息时开始使用所述第一套参数和 /或安全算 法与第一通信节点进行通信的信息进行处理, 使用所述第二套参数和 /或安全算 法与第二通信节点进行通信。  The communication node according to claim 20, wherein the sending module is further configured to send a message to the second communication node or the third communication node, so that the second communication node receives the message The message begins to communicate with the third communication node using the second set of parameters and/or security algorithms to cause the third communication node to begin using the first set of parameters and/or security algorithms upon receiving the message. Information communicated with the first communication node is processed, and the second set of parameters and/or security algorithms are used to communicate with the second communication node.
24、 根据权利要求 20所述的通信节点, 其特征在于, 还包括: 通信模块, 用于根据所述第一套参数和 /或安全算法与第三通信节点进行通 信。 The communication node according to claim 20, further comprising: And a communication module, configured to communicate with the third communication node according to the first set of parameters and/or security algorithms.
25、根据权利要求 20~24任一项中所述的通信节点, 其特征在于, 所述安全 算法包括加密算法、 头压缩算法和完整性保护算法中的至少一种算法;  The communication node according to any one of claims 20 to 24, wherein the security algorithm comprises at least one of an encryption algorithm, a header compression algorithm, and an integrity protection algorithm;
所述参数包括下一跳连接计数器 NCC、 下一跳 NH、 小区无线网络临时标识 C-RNTK 分组数据汇聚层协议 PDCP序列号的长度中的至少一种参数。  The parameters include at least one of a next hop connection counter NCC, a next hop NH, a cell radio network temporary identifier C-RNTK packet data convergence layer protocol PDCP sequence number.
26、 根据权利要求 25所述的通信节点, 其特征在于, 所述通信模块, 具体 用于下述至少一种:  The communication node according to claim 25, wherein the communication module is specifically used for at least one of the following:
根据所述加密算法对与第三通信节点进行通信的信息进行加解密处理; 根据所述头压缩算法对与第三通信节点进行通信的信息进行头压缩或者解 头压缩处理;  Performing encryption and decryption processing on the information communicated with the third communication node according to the encryption algorithm; performing header compression or header compression processing on the information communicated with the third communication node according to the header compression algorithm;
根据所述完整性保护算法对与第三通信节点进行通信的信息进行完整性 保护或者解完整性保护处理。  And performing integrity protection or de-integrity protection processing on the information communicated with the third communication node according to the integrity protection algorithm.
PCT/CN2014/070864 2013-01-18 2014-01-20 Cell optimization method and device WO2014111049A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310019263.2A CN103945420B (en) 2013-01-18 2013-01-18 Cell optimization method and device
CN201310019263.2 2013-01-18

Publications (1)

Publication Number Publication Date
WO2014111049A1 true WO2014111049A1 (en) 2014-07-24

Family

ID=51192851

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/070864 WO2014111049A1 (en) 2013-01-18 2014-01-20 Cell optimization method and device

Country Status (2)

Country Link
CN (1) CN103945420B (en)
WO (1) WO2014111049A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019214625A1 (en) * 2018-05-11 2019-11-14 电信科学技术研究院有限公司 Ue capability information reporting, obtaining, and processing methods and corresponding apparatuses
CN110475243B (en) * 2018-05-11 2020-10-30 电信科学技术研究院有限公司 Method for reporting, acquiring and processing UE capability information and corresponding device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102348244A (en) * 2010-08-03 2012-02-08 华为技术有限公司 Cellular communication system, method for inter-cell handover of terminal and macro base station
CN102883441A (en) * 2011-07-15 2013-01-16 华为技术有限公司 Wireless broadband communication method, device and system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101475349B1 (en) * 2008-11-03 2014-12-23 삼성전자주식회사 Security method and apparatus related mobile terminal security capability in mobile telecommunication system
CN105357773B (en) * 2011-07-15 2020-06-02 华为技术有限公司 Wireless broadband communication method, device and system
CN102740289B (en) * 2012-06-15 2015-12-02 电信科学技术研究院 A kind of key updating method, Apparatus and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102348244A (en) * 2010-08-03 2012-02-08 华为技术有限公司 Cellular communication system, method for inter-cell handover of terminal and macro base station
CN102883441A (en) * 2011-07-15 2013-01-16 华为技术有限公司 Wireless broadband communication method, device and system

Also Published As

Publication number Publication date
CN103945420B (en) 2017-11-17
CN103945420A (en) 2014-07-23

Similar Documents

Publication Publication Date Title
US11337271B2 (en) Apparatus and method for providing communication based on device-to-device relay service in mobile communication system
KR102463290B1 (en) The method of saving network power in mobile communication systems
US10660008B2 (en) Data transmission system, method, and apparatus
CN109088714B (en) System and method for communicating secure key information
WO2019062996A1 (en) Method, apparatus, and system for security protection
US20180368194A1 (en) Terminal device, network device, and data transmission method
KR102460648B1 (en) Method and apparatus for implementing bearer specific changes as part of connection reconfiguration affecting the security keys used
EP3220673B1 (en) Communication control method, user terminal, cellular base station, and access point
TW201735715A (en) Method and device for relay transmission and relay terminal equipment
TWI657679B (en) Device and method for handling a packet flow in inter-system mobility
US11889301B2 (en) Security verification when resuming an RRC connection
WO2014094564A1 (en) Switching method and device
WO2014094663A1 (en) Cell optimization method and device
EP3396981B1 (en) Security parameter transmission method and related device
JP2021027585A (en) Method and device for releasing side-link wireless bearer in wireless communication system
WO2018202131A1 (en) Communication method, device and system
WO2017117804A1 (en) Terminal device, access network device, air interface configuration method, and wireless communication system
US20220345883A1 (en) Security key updates in dual connectivity
WO2014127699A1 (en) Method, equipment and system for establishing direct communication path
WO2023154401A1 (en) Managing radio configurations for small data transmission
WO2023154445A1 (en) Managing radio configurations for a user equipment
WO2014111049A1 (en) Cell optimization method and device
US20230086337A1 (en) Methods, infrastructure equipment and wireless communications networks
US20160249215A1 (en) Communication control method, authentication server, and user terminal
US20240147568A1 (en) Managing early data communication

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14740831

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14740831

Country of ref document: EP

Kind code of ref document: A1