CN101702818A - Method, system and device of algorithm negotiation in radio link control connection re-establishment - Google Patents

Method, system and device of algorithm negotiation in radio link control connection re-establishment Download PDF

Info

Publication number
CN101702818A
CN101702818A CN200910221724A CN200910221724A CN101702818A CN 101702818 A CN101702818 A CN 101702818A CN 200910221724 A CN200910221724 A CN 200910221724A CN 200910221724 A CN200910221724 A CN 200910221724A CN 101702818 A CN101702818 A CN 101702818A
Authority
CN
China
Prior art keywords
algorithm
target
subscriber equipment
security capabilities
bearer messages
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN200910221724A
Other languages
Chinese (zh)
Other versions
CN101702818B (en
Inventor
肖志宇
丁峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Shanghai Huawei Technologies Co Ltd
Original Assignee
Shanghai Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Huawei Technologies Co Ltd filed Critical Shanghai Huawei Technologies Co Ltd
Priority to CN 200910221724 priority Critical patent/CN101702818B/en
Publication of CN101702818A publication Critical patent/CN101702818A/en
Application granted granted Critical
Publication of CN101702818B publication Critical patent/CN101702818B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The embodiment of the invention discloses a method, a system and a device of algorithm negotiation in radio link control connection re-establishment, which is applied into the communication technology field. The method of algorithm negotiation in radio link control connection re-establishment comprises: an algorithm loading message is received by a user device, the algorithm of the user device for performing encryption, decryption and integrality protection on data is acquired according to safety capability of a target base station carried by the algorithm loading message and/or intersection of the target base station and the safety capability of the user device, therefore, the user device can understand the safety capability of the target base station or the algorithm for performing encryption, decryption and integrality protection acquired by the target base station so as to lead the user device and the target base station to have a consistent algorithm for performing encryption, decryption and integrality protection and the data integrality verification to be successful, thus ensuring the successful RRC connection re-establishment.

Description

Negotiating algorithm method, system and equipment during radio link control connection re-establishment is upright
Technical field
The present invention relates to communication technical field, negotiating algorithm method, system and equipment during particularly radio link control connection re-establishment stands.
Background technology
In existing communication technical field, detect when the subscriber equipment that is in connected state (UE) under the situations such as unlimited link failure, handoff failure, Radio Link control (RRC) connection reconfiguration failure, can trigger the process that RRC rebuilds, be connected with data to recover the space interface signaling connection, activate signaling and connect the safe context that is connected with data.
With reference to shown in Figure 1, be the example explanation with the interface X2 handoff procedure between the base station:
Step 1 to 4, subscriber equipment switches to target BS from the source base station of original connection: subscriber equipment sends measurement report to the source base station of current connection; Switch if desired, source base station sends handoff request to target BS; Target BS returns switching request response; Source base station sends switching command to subscriber equipment;
Two ends in above-mentioned data interaction; need carry out the calculating of data encrypting and deciphering and integrity protection; then before carrying out data interaction, subscriber equipment and source base station need to carry out the negotiation of enciphering and deciphering algorithm (EEA) and protection algorithm integrallty (EIA); use identical key, subscriber equipment and source base station just can carry out data communication like this.And the negotiation of algorithm is to obtain by the security capabilities (ENB1_SEC_CAP) of the security capabilities (UE_SEC_CAP) of subscriber equipment and source base station is got to occur simultaneously, i.e. (EEA1, EIA1)=(UE_SEC_CAP) ∩ (ENB1_SEC_CAP).
If step 5. handoff failure, subscriber equipment sends RRC connection reconstruction request (RRC Connection Reestablishment Request) to target BS;
Step 6. target BS returns RRC connection reconstruction (RRC ConnectionReestablishment) to subscriber equipment, wherein comprise next hop count chain (NCC), carry out the negotiations process of algorithm: the security capabilities (ENB2_SEC_CAP) of the security capabilities (UE_SEC_CAP) of subscriber equipment and target BS is got to occur simultaneously obtain, i.e. (EEA2, EIA2)=(UE_SEC_CAP) ∩ (ENB2_SEC_CAP);
If step 7. is finished reconstruction, subscriber equipment sends the RRC connection reconstruction to target BS and finishes;
Step 8. subscriber equipment sends the RRC connection to target BS and reshuffles (RRC connectionreconfiguration);
Step 9. subscriber equipment connects to reshuffle to target BS transmission RRC to be finished.
In process to the practice of above-mentioned existing RRC process of reconstruction and research; the present inventor finds: carry out in the process of negotiating algorithm at source base station and subscriber equipment; subscriber equipment is by (EEA1; calculating EIA1); and target BS is by (EEA2; calculating EIA2); if the security capabilities of target BS and source base station is inequality like this; then target BS and subscriber equipment carry out the algorithm (EEA2 that obtains after the negotiating algorithm process; EIA2); carry out the algorithm (EEA1 that obtains after the negotiating algorithm process with subscriber equipment and source base station; EIA1) inconsistent, cause in the RRC process of reconstruction, the encryption and decryption that target BS and subscriber equipment use and the algorithm of integrity protection are inconsistent; the data integrity verifying failure, thus the RRC connection reconstruction failure of subscriber equipment and target BS made.
Summary of the invention
The embodiment of the invention provides negotiating algorithm method, system and the equipment of radio link control connection re-establishment in upright, has guaranteed the success of RRC connection reconstruction.
The embodiment of the invention provides the negotiating algorithm method of a kind of radio link control connection re-establishment in upright, comprising:
The algorithm bearer messages that the receiving target base station sends carries the security capabilities of this target BS and/or the common factor of the security capabilities of this target BS and subscriber equipment in the described algorithm bearer messages;
According to the security capabilities of this target BS that carries in the described algorithm bearer messages, and/or the common factor of the security capabilities of this target BS and described subscriber equipment, described subscriber equipment carries out encryption and decryption and integrity protection to data algorithm obtained.
The embodiment of the invention provides the negotiating algorithm method of a kind of radio link control connection re-establishment in upright, comprising:
With the security capabilities of target BS, and/or the common factor of the security capabilities of this target BS and subscriber equipment adds in the algorithm bearer messages;
Described algorithm bearer messages is sent to described subscriber equipment; so that described subscriber equipment is according to the security capabilities of this target BS that carries in the described algorithm bearer messages; and/or the common factor of the security capabilities of this target BS and described subscriber equipment, obtain the algorithm that data is carried out encryption and decryption and integrity protection.
The embodiment of the invention provides a kind of subscriber equipment, comprising:
The message sink unit is used for the algorithm bearer messages that the receiving target base station sends, and carries the security capabilities of this target BS in the described algorithm bearer messages, and/or the common factor of the security capabilities of this target BS and subscriber equipment;
The algorithm acquiring unit; the security capabilities that is used for this target BS of carrying according to described algorithm bearer messages; and/or the common factor of the security capabilities of this target BS and described subscriber equipment, obtain described subscriber equipment carries out encryption and decryption and integrity protection to data algorithm.
The embodiment of the invention provides a kind of base station, comprising:
Adding device is used for the security capabilities with target BS, and/or the common factor of the security capabilities of this target BS and subscriber equipment adds in the algorithm bearer messages;
Message sending unit; be used for the algorithm bearer messages after the described adding device interpolation is sent to described subscriber equipment; so that described subscriber equipment is according to the security capabilities of this target BS that carries in the described algorithm bearer messages; and/or the common factor of the security capabilities of this target BS and described subscriber equipment, obtain the algorithm that data is carried out encryption and decryption and integrity protection.
The embodiment of the invention provides the negotiating algorithm system of a kind of radio link control connection re-establishment in upright, comprising: subscriber equipment and base station;
Described base station is used for the security capabilities with target BS, and/or the common factor of the security capabilities of this target BS and subscriber equipment adds in the algorithm bearer messages; And described algorithm bearer messages sent to described subscriber equipment;
Described subscriber equipment; be used to receive described algorithm bearer messages; security capabilities according to this target BS that carries in the described algorithm bearer messages; and/or the common factor of the security capabilities of this target BS and described subscriber equipment, obtain described subscriber equipment carries out encryption and decryption and integrity protection to data algorithm.
As seen; negotiating algorithm method during the radio link control connection re-establishment of the embodiment of the invention is upright comprises: subscriber equipment receives the algorithm bearer messages; security capabilities according to the target BS that wherein carries; and/or the common factor of the security capabilities of this target BS and subscriber equipment; obtain subscriber equipment carries out encryption and decryption or integrity protection to data algorithm; subscriber equipment promptly can be learnt the security capabilities of target BS like this; or the encryption and decryption of target BS acquisition and the algorithm of integrity protection; make that the algorithm of encryption and decryption that subscriber equipment and target BS obtain and integrity protection is consistent; make data integrity verifying successful, thereby guaranteed the success of RRC connection reconstruction.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art, to do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art below, apparently, accompanying drawing in describing below only is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the flow chart that inter-base station interface X2 switches in the prior art;
Fig. 2 is the flow chart of the negotiating algorithm method of the radio link control connection re-establishment that provides of the inventive method embodiment one in upright;
Fig. 3 is the flow chart of the negotiating algorithm method of the radio link control connection re-establishment that provides of the inventive method embodiment two in upright;
Fig. 4 is the flow chart of the negotiating algorithm method of the radio link control connection re-establishment that provides of the inventive method embodiment three in upright;
Fig. 5 is the flow chart of the negotiating algorithm method of the radio link control connection re-establishment that provides of the inventive method embodiment four in upright;
Fig. 6 is the flow chart of the negotiating algorithm method of the radio link control connection re-establishment that provides of the inventive method embodiment five in upright;
Fig. 7 is the structural representation of the subscriber equipment that provides of present device embodiment one;
Fig. 8 is the structural representation of the base station that provides of present device embodiment two;
Fig. 9 is the structural representation of the negotiating algorithm system of the radio link control connection re-establishment that provides of system embodiment two of the present invention in upright.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the invention, the technical scheme in the embodiment of the invention is clearly and completely described, obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that is obtained under the creative work prerequisite.
Method embodiment one
Negotiating algorithm method during a kind of radio link control connection re-establishment is upright, this method is the method that subscriber equipment is carried out, flow chart comprises as shown in Figure 2:
The algorithm bearer messages that step 101, subscriber equipment receiving target base station send carries the security capabilities of this target BS and/or the common factor of the security capabilities of this target BS and subscriber equipment in the described algorithm bearer messages;
Be appreciated that described algorithm bearer messages comprises Radio Link control RRC connection reconstruction message, or safe mode command, or Radio Link control RRC connects reconfiguration message;
Step 102, subscriber equipment are according to the security capabilities of this target BS that carries in the described algorithm bearer messages; and/or the common factor of the security capabilities of this target BS and described subscriber equipment, obtain described subscriber equipment carries out encryption and decryption and integrity protection to data algorithm.
If include only the security capabilities of target BS in the algorithm bearer messages that subscriber equipment receives, then the subscriber equipment process that need carry out negotiating algorithm is obtained the algorithm that carries out encryption and decryption and integrity protection, the security capabilities of the target BS that carries in the security capabilities of described subscriber equipment and the described algorithm bearer messages is got common factor promptly: (EEA2, EIA2)=(UE_SEC_CAP) ∩ (ENB2_SEC_CAP);
If comprise the common factor of the security capabilities of this target BS and described subscriber equipment in the algorithm bearer messages that subscriber equipment receives, then subscriber equipment is directly resolved and is obtained the algorithm that carries out encryption and decryption and integrity protection;
If comprise the common factor of the security capabilities of this target BS and described subscriber equipment in the algorithm bearer messages that subscriber equipment receives, security capabilities with target BS, then subscriber equipment directly the analytical algorithm bearer messages obtain the common factor of the security capabilities of this target BS and described subscriber equipment, the i.e. algorithm of encryption and decryption and integrity protection; Also can obtain the security capabilities of target BS by the analytical algorithm bearer messages, and obtain the algorithm of encryption and decryption and integrity protection according to the security capabilities of target BS.
As seen; negotiating algorithm method during the radio link control connection re-establishment of the embodiment of the invention is upright comprises: subscriber equipment receives the algorithm bearer messages; security capabilities according to the target BS that wherein carries; and/or the common factor of the security capabilities of this target BS and subscriber equipment; obtain subscriber equipment carries out encryption and decryption and integrity protection to data algorithm; subscriber equipment promptly can be learnt the security capabilities of target BS like this; or the encryption and decryption of target BS acquisition and the algorithm of integrity protection; make that the algorithm of encryption and decryption that subscriber equipment and target BS obtain and integrity protection is consistent; make data integrity verifying successful, thereby guaranteed the success of RRC connection reconstruction.
Method embodiment two
Negotiating algorithm method during a kind of radio link control connection re-establishment is upright, this method embodiment is the method that target BS is carried out, flow chart comprises as shown in Figure 3:
Step 201, target BS are with the security capabilities of target BS, and/or the common factor of the security capabilities of this target BS and subscriber equipment adds in the algorithm bearer messages;
Described algorithm bearer messages is a Radio Link control RRC connection reconstruction message, or safe mode command, or Radio Link control RRC connects reconfiguration message;
Target BS is adding the security capabilities of target BS with target BS, and/or during the common factor of the security capabilities of this target BS and subscriber equipment, can add under the cell newly-increased in the algorithm bearer messages, as increasing cell newly: security algorithm configuration (security Algorithm Config) cell; Also can revise the cell in the algorithm bearer messages, and under amended cell, add, for example next jumps link count (next Hop Chaining Count) with original cell in the RRC connection reconstruction message, be revised as security configuration and rebuild upright (Security Config Reest) cell, and under Security Config Reest cell, add.
When if the algorithm bearer messages is RRC connection reconfiguration message, can be at security capabilities with target BS, and/or after this target BS and the common factor of the security capabilities of subscriber equipment added RRC to and be connected reconfiguration message, the security attribute that the RRC after adding is connected reconfiguration message was revised as the attribute that does not carry out encrypted transmission.
Step 202, target BS send to described subscriber equipment with described algorithm bearer messages; so that described subscriber equipment is according to the security capabilities of this target BS that carries in the described algorithm bearer messages; and/or the common factor of the security capabilities of this target BS and described subscriber equipment, obtain the algorithm that data is carried out encryption and decryption and integrity protection.
After being appreciated that subscriber equipment receives the algorithm bearer messages, can carry out, not repeat them here according to step as method embodiment one.
As seen; negotiating algorithm method during the radio link control connection re-establishment of the embodiment of the invention is upright comprises: target BS is with the security capabilities of this target BS; and/or the common factor of the security capabilities of this target BS and subscriber equipment; add in the algorithm bearer messages; send to subscriber equipment; so that subscriber equipment obtains the algorithm that data is carried out encryption and decryption and integrity protection; subscriber equipment promptly can be learnt the security capabilities of target BS like this; or the encryption and decryption of target BS acquisition and the algorithm of integrity protection; make that the algorithm of encryption and decryption that subscriber equipment and target BS obtain and integrity protection is consistent; make data integrity verifying successful, thereby guaranteed the success of RRC connection reconstruction.
Method embodiment three
Negotiating algorithm method during a kind of radio link control connection re-establishment is upright, the method of present embodiment is to initiate negotiating algorithm method in the process that Radio Link control is the RRC connection reconstruction at subscriber equipment, and the algorithm bearer messages is a RRC connection reconstruction request message in the present embodiment, flow chart comprises as shown in Figure 4:
Step 301, subscriber equipment send the request of RRC connection reconstruction to target BS;
Be appreciated that subscriber equipment is to use first Signaling Radio Bearer (SRB0) to send RRC connection reconstruction request.
Step 302, target BS be the security capabilities of target BS, and/or the common factor of the security capabilities of this target BS and subscriber equipment to add the algorithm bearer messages to be in the RRC connection reconstruction message;
Be appreciated that if adding the security capabilities of target BS is ENB2_SEC_CAP, can in RRC connection reconstruction message, increase new cell, dispose cell, and the security capabilities of target BS is added under the newly-increased cell as security algorithm; Also can revise original cell in the RRC connection reconstruction message, next jumps link count (next Hop Chaining Count) as cell, and adds the security capabilities of target BS under amended cell.
If add the common factor of the security capabilities of this target BS and subscriber equipment, then target BS needs the i.e. (EEA2 of advanced line algorithm negotiations process, EIA2)=(UE_SEC_CAP) ∩ (ENB2_SEC_CAP), then the result is added under the cell newly-increased in the RRC connection reconstruction message, as newly-increased security algorithm configuration cell; Or original cell next HopChaining Count in the RRC connection reconstruction message is revised as security configuration rebuilds upright (Security Config Reest), and the result is added among the amended cell Security Config Reest.
As shown in table 1 below, be the RRC connection reconstruction message after adding, wherein, under amended cell Security Config Reest, comprise the first sub-cell next Hop Chaining Count and the second sub-cell security algorithm configuration (security Algorithm Config), wherein under the second sub-cell securityAlgorithm Config, add the common factor of the security capabilities of this target BS and described subscriber equipment.Be appreciated that under cell Security Config Reest, also to comprise the 3rd sub-cell security key change indication (keyChange Indicator), be used to refer to the mode derivative key that subscriber equipment is revised according to the subscriber equipment safe context.
Table 1
Figure G2009102217248D0000071
Figure G2009102217248D0000081
Step 303, target BS send to subscriber equipment with the RRC connection reconstruction message after adding;
Target BS uses SRB0 that the RRC connection reconstruction message after adding is sent to subscriber equipment.
After step 304, subscriber equipment receive RRC connection reconstruction message; security capabilities according to this target BS that carries in the RRC connection reconstruction message; and/or the common factor of the security capabilities of this target BS and described subscriber equipment, obtain described subscriber equipment carries out encryption and decryption and integrity protection to data algorithm.
If include only the security capabilities of target BS in the RRC connection reconstruction message that subscriber equipment receives, then the subscriber equipment process that need carry out negotiating algorithm is obtained the algorithm that carries out encryption and decryption and integrity protection, the security capabilities of the target BS that carries in the security capabilities of described subscriber equipment and the described algorithm bearer messages is got common factor promptly: (EEA2, EIA2)=(UE_SEC_CAP) ∩ (ENB2_SEC_CAP);
If comprise the common factor of the security capabilities of this target BS and described subscriber equipment in the RRC connection reconstruction message that subscriber equipment receives, then subscriber equipment is directly resolved and is obtained the algorithm that carries out encryption and decryption and integrity protection;
If comprise the common factor of the security capabilities of this target BS and described subscriber equipment in the RRC connection reconstruction message that subscriber equipment receives, security capabilities with target BS, then subscriber equipment can directly be resolved the common factor that RRC connection reconstruction message obtains the security capabilities of this target BS and described subscriber equipment, the i.e. algorithm of encryption and decryption and integrity protection; Also can resolve RRC connection reconstruction message and obtain the security capabilities of target BS, and obtain the algorithm of encryption and decryption and integrity protection according to the security capabilities of target BS.
The step of back such as subscriber equipment use second Signaling Radio Bearer (SRB1) to send RRC connection reconstruction, RRC to connect reconfiguration message and finish to target BS etc., as method of the prior art, do not repeat them here.
As seen; negotiating algorithm method during the radio link control connection re-establishment of the embodiment of the invention is upright comprises: subscriber equipment receives the RRC connection reconstruction message that target BS sends; security capabilities according to the target BS that wherein carries; and/or the common factor of the security capabilities of this target BS and subscriber equipment; obtain subscriber equipment carries out encryption and decryption or integrity protection to data algorithm; subscriber equipment promptly can be learnt the security capabilities of target BS like this; or the encryption and decryption of target BS acquisition and the algorithm of integrity protection; make that the algorithm of encryption and decryption that subscriber equipment and target BS obtain and integrity protection is consistent; make data integrity verifying successful, thereby guaranteed the success of RRC connection reconstruction.
Method embodiment four
Negotiating algorithm method during a kind of radio link control connection re-establishment is upright, the method of present embodiment is to initiate negotiating algorithm method in the process that Radio Link control is the RRC connection reconstruction at subscriber equipment, and the algorithm bearer messages is safe mode command (Security Mode Command) in the present embodiment, flow chart comprises as shown in Figure 5:
Step 401, subscriber equipment use SRB0 to send the request of RRC connection reconstruction to target BS;
Step 402, target BS use SRB0 to send RRC connection reconstruction message to subscriber equipment;
Step 403, target BS are with the security capabilities of target BS, and/or the common factor of the security capabilities of this target BS and subscriber equipment adds in the safe mode command;
Can be with the security capabilities of target BS, and/or the common factor of the security capabilities of this target BS and subscriber equipment adds under the cell that increases newly in the safe mode command, as security algorithm configuration cell, also can revise original cell, under the cell of revising, add, concrete method does not repeat them here as described in the method embodiment three.
Step 404, target BS are revised as the transmission property of the safe mode command after adding uses SRB0 to transmit, and uses SRB0 to send safe mode command to target BS;
Usually, safe mode command is to use SRB1 to send, and in the present embodiment, need to revise the transmission property of safe mode command, and the transmission property of safe mode command is revised as the attribute that can use SRB0 to transmit.
Above-mentioned step 403 and 404 does not have absolute ordinal relation, and the step that can add earlier also can be revised the step of transmission property earlier.
After step 405, subscriber equipment receive safe mode command; security capabilities according to this target BS that carries in the safe mode command; and/or the common factor of the security capabilities of this target BS and described subscriber equipment, obtain described subscriber equipment carries out encryption and decryption and integrity protection to data algorithm.
Concrete acquisition methods does not repeat them here as described in the method embodiment one.
After step 405, subscriber equipment uses SRB0 to send safe mode and finishes message (SecurityMode Complete) to target BS, after the RRC connection reconstruction was finished, subscriber equipment used SRB1 to send the RRC connection reconstruction and finishes message to target BS etc., does not repeat them here.
In another specific embodiment, after step 402, target BS can be with the security capabilities of this target BS, and/or this target BS adds RRC to the common factor of the security capabilities of described subscriber equipment and is connected in the reconfiguration message; Usually, RRC connects reconfiguration message and is to use the SRB1 transmission, and need carry out encrypted transmission, in this enforcement, the transmission property that RRC need be connected reconfiguration message is revised as and uses the SRB0 transmission, and security attribute is revised as do not carry out encrypted transmission, and uses SRB0 to send to subscriber equipment; After subscriber equipment receives RRC connection reconfiguration message, obtain subscriber equipment carries out encryption and decryption and integrity protection to data algorithm, the concrete grammar that obtains does not repeat them here as described in the method embodiment three, and uses SRB0 to send RRC to connect to reshuffle and finish message to target BS; After the RRC connection reconstruction was finished, subscriber equipment used SRB1 to send the RRC connection reconstruction and finishes message to target BS.
Negotiating algorithm method during the radio link control connection re-establishment of the embodiment of the invention is upright comprises: subscriber equipment receives safe mode command or the RRC link reconfiguration message that target BS sends; security capabilities according to the target BS that wherein carries; and/or the common factor of the security capabilities of this target BS and subscriber equipment; obtain subscriber equipment carries out encryption and decryption and integrity protection to data algorithm; subscriber equipment promptly can be learnt the security capabilities of target BS like this; or the encryption and decryption of target BS acquisition and the algorithm of integrity protection; make that the algorithm of encryption and decryption that subscriber equipment and target BS obtain and integrity protection is consistent; make data integrity verifying successful, thereby guaranteed the success of RRC connection reconstruction.
Method embodiment five
Negotiating algorithm method during a kind of radio link control connection re-establishment is upright, the method of present embodiment is to initiate negotiating algorithm method in the process that Radio Link control is the RRC connection reconstruction at subscriber equipment, and the algorithm bearer messages is a safe mode command in the present embodiment, flow chart comprises as shown in Figure 6:
Step 501, subscriber equipment use SRB0 to send the request of RRC connection reconstruction to target BS;
Step 502, target BS use SRB0 to send RRC connection reconstruction message to subscriber equipment;
Step 503, after the RRC connection reconstruction is finished, subscriber equipment uses SRB1 to send the RRC connection reconstruction and finishes message to target BS;
Usually, the RRC connection reconstruction is finished message need carry out encrypted transmission, and in this enforcement, the security attribute that the RRC connection reconstruction need be finished message is revised as and does not carry out encrypted transmission, and uses SRB1 to send to target BS.
Step 504, target BS be the security capabilities of this target BS, and/or the common factor of the security capabilities of this target BS and subscriber equipment adds in the safe mode command, and use SRB1 to send safe mode command to target BS;
Can be with the security capabilities of target BS, and/or the common factor of the security capabilities of this target BS and subscriber equipment adds under the cell that increases newly in the safe mode command, as security algorithm configuration cell, also can revise original cell, under the cell of revising, add.The security attribute of determining safe mode command is not for encrypting transmission.
After step 505, subscriber equipment receive safe mode command; it according to the algorithm bearer messages security capabilities of this target BS of carrying in the safe mode command; and/or the common factor of the security capabilities of this target BS and described subscriber equipment, obtain described subscriber equipment carries out encryption and decryption and integrity protection to data algorithm.
Concrete acquisition methods does not repeat them here as described in the method embodiment one.
After the step 505, subscriber equipment uses SRB1 to send safe mode and finishes message to target BS.
In another specific embodiment, after step 504, target BS can be with the security capabilities of this target BS, and/or this target BS adds RRC to the common factor of the security capabilities of described subscriber equipment and is connected in the reconfiguration message; Usually, RRC connects reconfiguration message need carry out encrypted transmission, and in this enforcement, the security attribute that RRC need be connected reconfiguration message is revised as and does not carry out encrypted transmission, and uses SRB1 to send to subscriber equipment; After subscriber equipment receives RRC connection reconfiguration message, obtain subscriber equipment data are carried out the algorithm of encryption and decryption and integrity protection, and use SRB1 transmission RRC to connect to reshuffle and finish message to target BS.
Negotiating algorithm method during the radio link control connection re-establishment of the embodiment of the invention is upright comprises: subscriber equipment receives safe mode command or RRC link reconfiguration message; security capabilities according to the target BS that wherein carries; and/or the common factor of the security capabilities of this target BS and subscriber equipment; obtain subscriber equipment carries out encryption and decryption and integrity protection to data algorithm; subscriber equipment promptly can be learnt the security capabilities of target BS like this; or the encryption and decryption of target BS acquisition and the algorithm of integrity protection; make that the algorithm of encryption and decryption that subscriber equipment and target BS obtain and integrity protection is consistent; make data integrity verifying successful, thereby guaranteed the success of RRC connection reconstruction.
Apparatus embodiments one
A kind of subscriber equipment, structural representation comprise as shown in Figure 7:
Message sink unit 10 is used for the algorithm bearer messages that the receiving target base station sends, and carries the security capabilities of this target BS in the described algorithm bearer messages, and/or the common factor of the security capabilities of this target BS and subscriber equipment;
Described algorithm bearer messages comprises Radio Link control RRC connection reconstruction message, or safe mode command, or Radio Link control RRC connection reconstruction message;
Algorithm acquiring unit 11; the security capabilities that is used for this target BS of carrying according to the algorithm bearer messages that described message sink unit 10 receives; and/or the common factor of the security capabilities of this target BS and described subscriber equipment, obtain described subscriber equipment carries out encryption and decryption and integrity protection to data algorithm.
Algorithm acquiring unit 11 can obtain when obtaining the algorithm of encryption and decryption and complete new protection by the following method:
If the algorithm bearer messages that message sink unit 10 receives is the security capabilities that includes only target BS in the RRC connection reconstruction message, then algorithm acquiring unit 11 process that need carry out negotiating algorithm is obtained the algorithm that carries out encryption and decryption and integrity protection, the security capabilities of the target BS that carries in the security capabilities of described subscriber equipment and the described algorithm bearer messages is got common factor promptly: (EEA2, EIA2)=(UE_SEC_CAP) ∩ (ENB2_SEC_CAP);
If the algorithm bearer messages that message sink unit 10 receives is the common factor that comprises the security capabilities of this target BS and described subscriber equipment in the RRC connection reconstruction message, then algorithm acquiring unit 11 is directly resolved and is obtained the algorithm that carries out encryption and decryption and integrity protection;
If comprise the security capabilities of this target BS in the algorithm bearer messages, common factor with the security capabilities of this target BS and subscriber equipment, then directly the analytical algorithm bearer messages obtains the common factor of the security capabilities of this target BS and described subscriber equipment, the i.e. algorithm of encryption and decryption and integrity protection; Also can obtain the security capabilities of target BS by the analytical algorithm bearer messages, and obtain the algorithm of encryption and decryption and integrity protection according to the security capabilities of target BS.
Be appreciated that algorithm acquiring unit 11 can comprise resolution unit and computing unit in a specific embodiment, wherein:
Resolution unit 110 is used to resolve the algorithm bearer messages that described message sink unit 10 receives, and obtains the security capabilities of target BS, and/or the common factor of the security capabilities of this target BS and subscriber equipment;
Computing unit 111; being used for resolving what obtain when described resolution unit 110 is the security capabilities of target BS; then the security capabilities of the target BS that carries in the security capabilities of described subscriber equipment and the described algorithm bearer messages is got common factor, obtain described subscriber equipment carries out encryption and decryption and integrity protection to data algorithm.
In the subscriber equipment of the embodiment of the invention; message sink unit 10 receives the algorithm bearer messages; algorithm acquiring unit 11 is according to the security capabilities of the target BS that carries in the algorithm bearer messages; and/or the common factor of the security capabilities of this target BS and subscriber equipment; obtain subscriber equipment carries out encryption and decryption and integrity protection to data algorithm; subscriber equipment promptly can be learnt the security capabilities of target BS like this; or the encryption and decryption of target BS acquisition and the algorithm of integrity protection; make that the algorithm of encryption and decryption that subscriber equipment and target BS obtain and integrity protection is consistent; make data integrity verifying successful, thereby guaranteed the success of RRC connection reconstruction.
Apparatus embodiments two
A kind of base station, structural representation comprise as shown in Figure 8:
Adding device 20 is used for the security capabilities with target BS, and/or the common factor of the security capabilities of this target BS and subscriber equipment adds in the algorithm bearer messages;
Be appreciated that described algorithm bearer messages comprises Radio Link control RRC connection reconstruction message, or safe mode command, or Radio Link control RRC connects reconfiguration message; Adding device 20 is the security capabilities with target BS, and/or the common factor of the security capabilities of this target BS and subscriber equipment, add under cell newly-increased in the algorithm bearer messages such as the security algorithm configuration cell, or amended cell is inferior.
Message sending unit 21; be used for the algorithm bearer messages after described adding device 20 interpolations is sent to described subscriber equipment; so that described subscriber equipment is according to the security capabilities of this target BS that carries in the described algorithm bearer messages; and/or the common factor of the security capabilities of this target BS and described subscriber equipment, obtain the algorithm that data is carried out encryption and decryption and integrity protection.
Message sending unit 21 is according to the transmission property of algorithm bearer messages, and the attribute that promptly uses SRB0 or SRB1 to send sends to subscriber equipment with the algorithm bearer messages.
In a specific embodiment, the base station can also comprise: the first attribute modification unit 22, be used for when described algorithm bearer messages be safe mode command, then the transmission property of described safe mode command is revised as and uses the first Signaling Radio Bearer SRB0 to transmit.And the operation of the first attribute modification unit 22 and 20 pairs of algorithm bearer messages of adding device does not have ordinal relation, can be that after adding device 20 adds make amendment in the first attribute modification unit 22 again; Or first after attribute modification unit 22 makes amendment, and adding device 20 adds again.
The second attribute modification unit 23, being used for working as described algorithm bearer messages is that Radio Link control RRC connects reconfiguration message, the security attribute that described Radio Link control RRC is connected reconfiguration message is revised as the attribute that does not carry out encrypted transmission.And the operation of the second attribute modification unit 23 and 20 pairs of algorithm bearer messages of adding device does not have ordinal relation, can be that after adding device 20 adds make amendment in the second attribute modification unit 23 again; Or second after attribute modification unit 23 makes amendment, and adding device 20 adds again.
In the base station of the embodiment of the invention; adding device 20 is with the security capabilities of target BS; and/or the common factor of the security capabilities of this target BS and subscriber equipment adds the algorithm bearer messages to; and the algorithm bearer messages is sent to subscriber equipment by message sending unit 21; so that subscriber equipment obtains subscriber equipment carries out encryption and decryption and integrity protection to data algorithm; subscriber equipment promptly can be learnt the security capabilities of target BS like this; or the encryption and decryption of target BS acquisition and the algorithm of integrity protection; make that the algorithm of encryption and decryption that subscriber equipment and target BS obtain and integrity protection is consistent; make data integrity verifying successful, thereby guaranteed the success of RRC connection reconstruction.
System embodiment
Negotiating algorithm system during a kind of radio link control connection re-establishment is upright, structural representation comprises as shown in Figure 9: subscriber equipment 100 and base station 200;
Described base station 200 is used for the security capabilities with target BS, and/or the common factor of the security capabilities of this target BS and subscriber equipment adds in the algorithm bearer messages; Described algorithm bearer messages comprises Radio Link control RRC connection reconstruction message, or safe mode command, or Radio Link control RRC connects reconfiguration message; And described algorithm bearer messages sent to described subscriber equipment 100;
Described subscriber equipment 100; be used to receive described algorithm bearer messages; security capabilities according to this target BS that carries in the described algorithm bearer messages; and/or the common factor of the security capabilities of this target BS and described subscriber equipment, obtain described subscriber equipment carries out encryption and decryption and integrity protection to data algorithm.
As seen; negotiating algorithm method during the radio link control connection re-establishment of the embodiment of the invention is upright comprises: subscriber equipment receives the algorithm bearer messages; security capabilities according to the target BS that wherein carries; and/or the common factor of the security capabilities of this target BS and subscriber equipment; obtain subscriber equipment carries out encryption and decryption and integrity protection to data algorithm; subscriber equipment promptly can be learnt the security capabilities of target BS like this; or the encryption and decryption of target BS acquisition and the algorithm of integrity protection; make that the algorithm of encryption and decryption that subscriber equipment and target BS obtain and integrity protection is consistent; make data integrity verifying successful, thereby guaranteed the success of RRC connection reconstruction.
One of ordinary skill in the art will appreciate that all or part of step in the whole bag of tricks of the foregoing description is to instruct relevant hardware to finish by program, this program can be stored in the computer-readable recording medium, and storage medium can comprise: read-only memory (ROM), random-access memory (ram), disk or CD etc.
More than to radio link control connection re-establishment that the embodiment of the invention provided negotiating algorithm method, system and the equipment in upright, be described in detail, used specific case herein principle of the present invention and execution mode are set forth, the explanation of above embodiment just is used for helping to understand method of the present invention and core concept thereof; Simultaneously, for one of ordinary skill in the art, according to thought of the present invention, the part that all can change in specific embodiments and applications, in sum, this description should not be construed as limitation of the present invention.

Claims (14)

1. the negotiating algorithm method during a radio link control connection re-establishment stands is characterized in that, comprising:
The algorithm bearer messages that the receiving target base station sends carries the security capabilities of this target BS and/or the common factor of the security capabilities of this target BS and subscriber equipment in the described algorithm bearer messages;
According to the security capabilities of this target BS that carries in the described algorithm bearer messages, and/or the common factor of the security capabilities of this target BS and described subscriber equipment, described subscriber equipment carries out encryption and decryption and integrity protection to data algorithm obtained.
2. the method for claim 1 is characterized in that, described algorithm bearer messages comprises: Radio Link control RRC connection reconstruction message, or safe mode command, or Radio Link control RRC connects reconfiguration message.
3. method as claimed in claim 1 or 2; it is characterized in that; if comprise the security capabilities of target BS in the described algorithm bearer messages, described according to the algorithm bearer messages, obtain the algorithm that described subscriber equipment carries out encryption and decryption and integrity protection to data and specifically comprise:
Security capabilities to the target BS that carries in the security capabilities of described subscriber equipment and the described algorithm bearer messages is got common factor.
4. the negotiating algorithm method during a radio link control connection re-establishment stands is characterized in that, comprising:
With the security capabilities of target BS, and/or the common factor of the security capabilities of this target BS and subscriber equipment adds in the algorithm bearer messages;
Described algorithm bearer messages is sent to described subscriber equipment; so that described subscriber equipment is according to the security capabilities of this target BS that carries in the described algorithm bearer messages; and/or the common factor of the security capabilities of this target BS and described subscriber equipment, obtain the algorithm that data is carried out encryption and decryption and integrity protection.
5. method as claimed in claim 4 is characterized in that, described algorithm bearer messages comprises Radio Link control RRC connection reconstruction message, or safe mode command, or Radio Link control RRC connects reconfiguration message.
6. method as claimed in claim 5, it is characterized in that, if described algorithm bearer messages is a Radio Link control RRC connection reconstruction message, then with the security capabilities of target BS, and/or the common factor of the security capabilities of this target BS and subscriber equipment adds in the algorithm bearer messages and specifically comprises:
In described Radio Link control RRC connection reconstruction message, next cell of jumping link count next HopChaining Count is revised as the upright Security Config Reest cell of security configuration reconstruction, and under the upright Security Config Reest cell of described security configuration reconstruction, add the security capabilities of target BS, and/or the common factor of the security capabilities of this target BS and subscriber equipment.
7. method as claimed in claim 5, it is characterized in that, RRC connects reconfiguration message if described algorithm bearer messages is Radio Link control, then with the security capabilities of target BS, and/or this target BS and the common factor of the security capabilities of subscriber equipment add Radio Link control RRC to and be connected reconfiguration message, also comprises: the security attribute of described Radio Link control RRC connection reconfiguration message is revised as the attribute that does not carry out encrypted transmission.
8. method as claimed in claim 5, it is characterized in that, if described algorithm bearer messages is a safe mode command, then with the security capabilities of target BS, and/or the common factor of the security capabilities of this target BS and subscriber equipment adds safe mode command to, also comprises: the transmission property of described safe mode command is revised as the attribute that uses the first Signaling Radio Bearer SRB0 to transmit.
9. a subscriber equipment is characterized in that, comprising:
The message sink unit is used for the algorithm bearer messages that the receiving target base station sends, and carries the security capabilities of this target BS in the described algorithm bearer messages, and/or the common factor of the security capabilities of this target BS and subscriber equipment;
The algorithm acquiring unit; the security capabilities that is used for this target BS of carrying according to described algorithm bearer messages; and/or the common factor of the security capabilities of this target BS and described subscriber equipment, obtain described subscriber equipment carries out encryption and decryption and integrity protection to data algorithm.
10. subscriber equipment as claimed in claim 9 is characterized in that, described algorithm acquiring unit comprises:
Resolution unit is used to resolve described algorithm bearer messages, obtains the security capabilities of target BS, and/or the common factor of the security capabilities of this target BS and subscriber equipment;
Computing unit; being used for resolving what obtain when described resolution unit is the security capabilities of target BS; then the security capabilities of the target BS that carries in the security capabilities of described subscriber equipment and the described algorithm bearer messages is got common factor, obtain described subscriber equipment carries out encryption and decryption and integrity protection to data algorithm.
11. a base station is characterized in that, comprising:
Adding device is used for the security capabilities with target BS, and/or the common factor of the security capabilities of this target BS and subscriber equipment adds in the algorithm bearer messages;
Message sending unit; be used for the algorithm bearer messages after the described adding device interpolation is sent to described subscriber equipment; so that described subscriber equipment is according to the security capabilities of this target BS that carries in the described algorithm bearer messages; and/or the common factor of the security capabilities of this target BS and described subscriber equipment, obtain the algorithm that data is carried out encryption and decryption and integrity protection.
12. base station as claimed in claim 11, it is characterized in that, also comprise: the first attribute modification unit, be used for when described algorithm bearer messages be safe mode command, then the transmission property of described safe mode command is revised as and uses the first Signaling Radio Bearer SRB0 to transmit.
13. base station as claimed in claim 11, it is characterized in that, also comprise: the second attribute modification unit, being used for working as described algorithm bearer messages is that Radio Link control RRC connects reconfiguration message, and the security attribute that described Radio Link control RRC is connected reconfiguration message is revised as the attribute that does not carry out encrypted transmission.
14. the negotiating algorithm system during a radio link control connection re-establishment is upright is characterized in that, comprising: subscriber equipment and base station;
Described base station is used for the security capabilities with target BS, and/or the common factor of the security capabilities of this target BS and subscriber equipment adds in the algorithm bearer messages; And described algorithm bearer messages sent to described subscriber equipment;
Described subscriber equipment; be used to receive described algorithm bearer messages; security capabilities according to this target BS that carries in the described algorithm bearer messages; and/or the common factor of the security capabilities of this target BS and described subscriber equipment, obtain described subscriber equipment carries out encryption and decryption and integrity protection to data algorithm.
CN 200910221724 2009-11-02 2009-11-02 Method, system and device of algorithm negotiation in radio link control connection re-establishment Active CN101702818B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200910221724 CN101702818B (en) 2009-11-02 2009-11-02 Method, system and device of algorithm negotiation in radio link control connection re-establishment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200910221724 CN101702818B (en) 2009-11-02 2009-11-02 Method, system and device of algorithm negotiation in radio link control connection re-establishment

Publications (2)

Publication Number Publication Date
CN101702818A true CN101702818A (en) 2010-05-05
CN101702818B CN101702818B (en) 2012-12-12

Family

ID=42157701

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200910221724 Active CN101702818B (en) 2009-11-02 2009-11-02 Method, system and device of algorithm negotiation in radio link control connection re-establishment

Country Status (1)

Country Link
CN (1) CN101702818B (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011088677A1 (en) * 2010-01-23 2011-07-28 中兴通讯股份有限公司 Method and system for security processing during rrc connection re-establishment
CN102256234A (en) * 2010-05-19 2011-11-23 电信科学技术研究院 Method and equipment for processing user authentication process
CN102264066A (en) * 2010-05-27 2011-11-30 中兴通讯股份有限公司 Method and system for synchronizing access stratum security algorithm
WO2011147152A1 (en) * 2010-05-27 2011-12-01 中兴通讯股份有限公司 Method and system for implementing synchronization of access stratum security algorithm
CN102487507A (en) * 2010-12-01 2012-06-06 中兴通讯股份有限公司 Method and system for realizing integrality protection
CN102769849A (en) * 2012-07-25 2012-11-07 中兴通讯股份有限公司 Message sending method and device
CN105101312A (en) * 2014-05-15 2015-11-25 中兴通讯股份有限公司 Method and apparatus for upward data processing
CN109314899A (en) * 2016-06-24 2019-02-05 华为技术有限公司 The method and apparatus of data transmission
CN109716809A (en) * 2016-09-23 2019-05-03 高通股份有限公司 Access stratum safety for efficient packet transaction
CN110121168A (en) * 2018-02-06 2019-08-13 华为技术有限公司 Safe consultation method and device
CN110771205A (en) * 2017-06-15 2020-02-07 高通股份有限公司 Refreshing security keys in 5G wireless systems
CN110831255A (en) * 2018-08-09 2020-02-21 电信科学技术研究院有限公司 Method, base station, mobile terminal and storage medium for reestablishing RRC connection
CN110831007A (en) * 2018-08-10 2020-02-21 华为技术有限公司 User plane integrity protection method, device and equipment
CN110830988A (en) * 2018-08-08 2020-02-21 维沃移动通信有限公司 Security updating method, network device and terminal
WO2020082247A1 (en) * 2018-10-23 2020-04-30 Oppo广东移动通信有限公司 Processing method for security algorithm, device and terminal
US11564099B2 (en) 2017-10-31 2023-01-24 Huawei Technologies Co., Ltd. RRC connection resume method and apparatus

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7881475B2 (en) * 2005-05-17 2011-02-01 Intel Corporation Systems and methods for negotiating security parameters for protecting management frames in wireless networks
CN100469189C (en) * 2005-09-20 2009-03-11 展讯通信(上海)有限公司 Calling end and called end quick calling establishment method for mobile communication system
CN101309500B (en) * 2007-05-15 2011-07-20 华为技术有限公司 Security negotiation method and apparatus when switching between different wireless access technologies

Cited By (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8724818B2 (en) 2010-01-23 2014-05-13 Zte Corporation Method and system for security processing during RRC connection re-establishment
WO2011088677A1 (en) * 2010-01-23 2011-07-28 中兴通讯股份有限公司 Method and system for security processing during rrc connection re-establishment
CN102256234A (en) * 2010-05-19 2011-11-23 电信科学技术研究院 Method and equipment for processing user authentication process
US8982723B2 (en) 2010-05-27 2015-03-17 Zte Corporation Method and system for synchronizing access stratum security algorithm
WO2011147154A1 (en) * 2010-05-27 2011-12-01 中兴通讯股份有限公司 Method and system for implementing synchronization of access stratum security algorithm
WO2011147152A1 (en) * 2010-05-27 2011-12-01 中兴通讯股份有限公司 Method and system for implementing synchronization of access stratum security algorithm
CN102264066B (en) * 2010-05-27 2015-08-12 中兴通讯股份有限公司 A kind ofly realize the synchronous method and system of Access Layer security algorithm
CN102264066A (en) * 2010-05-27 2011-11-30 中兴通讯股份有限公司 Method and system for synchronizing access stratum security algorithm
CN102487507A (en) * 2010-12-01 2012-06-06 中兴通讯股份有限公司 Method and system for realizing integrality protection
WO2012071845A1 (en) * 2010-12-01 2012-06-07 中兴通讯股份有限公司 Method and system for realizing integrality protection
US9055442B2 (en) 2010-12-01 2015-06-09 Zte Corporation Method and system for realizing integrity protection
CN102487507B (en) * 2010-12-01 2016-01-20 中兴通讯股份有限公司 A kind of method and system realizing integrity protection
CN102769849A (en) * 2012-07-25 2012-11-07 中兴通讯股份有限公司 Message sending method and device
CN105101312B (en) * 2014-05-15 2019-11-19 南京中兴软件有限责任公司 A kind of method and device of upstream data processing
CN105101312A (en) * 2014-05-15 2015-11-25 中兴通讯股份有限公司 Method and apparatus for upward data processing
CN109314899A (en) * 2016-06-24 2019-02-05 华为技术有限公司 The method and apparatus of data transmission
US11026091B2 (en) 2016-06-24 2021-06-01 Huawei Technologies Co., Ltd. Data transmission method and apparatus
CN109716809A (en) * 2016-09-23 2019-05-03 高通股份有限公司 Access stratum safety for efficient packet transaction
CN109716809B (en) * 2016-09-23 2022-03-22 高通股份有限公司 Access stratum security for efficient packet processing
US11528603B2 (en) 2016-09-23 2022-12-13 Qualcomm Incorporated Access stratum security for efficient packet processing
CN110771205A (en) * 2017-06-15 2020-02-07 高通股份有限公司 Refreshing security keys in 5G wireless systems
CN110771205B (en) * 2017-06-15 2022-03-29 高通股份有限公司 Refreshing security keys in 5G wireless systems
US11503461B2 (en) 2017-06-15 2022-11-15 Qualcomm Incorporated Refreshing security keys in 5G wireless systems
US11564099B2 (en) 2017-10-31 2023-01-24 Huawei Technologies Co., Ltd. RRC connection resume method and apparatus
CN110121168A (en) * 2018-02-06 2019-08-13 华为技术有限公司 Safe consultation method and device
US11765578B2 (en) 2018-02-06 2023-09-19 Huawei Technologies Co., Ltd. Security negotiation method and apparatus
CN110830988A (en) * 2018-08-08 2020-02-21 维沃移动通信有限公司 Security updating method, network device and terminal
CN110830988B (en) * 2018-08-08 2023-08-15 维沃移动通信有限公司 Security updating method, network equipment and terminal
CN110831255A (en) * 2018-08-09 2020-02-21 电信科学技术研究院有限公司 Method, base station, mobile terminal and storage medium for reestablishing RRC connection
CN110831007A (en) * 2018-08-10 2020-02-21 华为技术有限公司 User plane integrity protection method, device and equipment
WO2020082247A1 (en) * 2018-10-23 2020-04-30 Oppo广东移动通信有限公司 Processing method for security algorithm, device and terminal

Also Published As

Publication number Publication date
CN101702818B (en) 2012-12-12

Similar Documents

Publication Publication Date Title
CN101702818B (en) Method, system and device of algorithm negotiation in radio link control connection re-establishment
US10958631B2 (en) Method and system for providing security from a radio access network
CN101232731B (en) Method and system for UE to generate cryptographic key switching from UTRAN to EUTRAN
CN108271125B (en) Data transmitting method, data receiving method and device
CN101267668B (en) Key generation method, Apparatus and system
CN101931951B (en) Method, device and system for secret key deduction
KR101147067B1 (en) Method, apparatus and system for key derivation
JP2020536424A (en) Security protection methods, devices and systems
US8346261B2 (en) Mobile communication method and switching center
CN101516089B (en) Switching method and system
CN103546989B (en) A kind of method and apparatus setting up wireless heterogeneous networks connection
CN102137400A (en) Safety treatment method and system when re-establishing RRC (radio resource control) connection
CN109890029B (en) Automatic network distribution method of intelligent wireless equipment
CN105850168A (en) Secure connection method for network device, and related device and system
CN104486759A (en) Method accessing wireless network without obstacle
CN101552983A (en) Key generating method, key generating device, mobile management entity and user equipment
CN102769849A (en) Message sending method and device
CN102572816B (en) Method and device for mobile switching
CN102790965B (en) Changing method, base station, subscriber equipment and mobile management entity
US20190313248A1 (en) Handover of a Device Which Uses Another Device as Relay
CN102083063B (en) Method, system and equipment for confirming AS key
CN104254062A (en) Direct connection link communication method and related equipment and system
CN103002417A (en) Short message treatment method and device
CN106301529A (en) A kind of short message transmission method, server, terminal and communication system
CN107708113B (en) Radio Resource Control (RRC) connection reestablishment method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant