CN102711105B - The method, the Apparatus and system that communicate is carried out by mobile communications network - Google Patents
The method, the Apparatus and system that communicate is carried out by mobile communications network Download PDFInfo
- Publication number
- CN102711105B CN102711105B CN201210154986.9A CN201210154986A CN102711105B CN 102711105 B CN102711105 B CN 102711105B CN 201210154986 A CN201210154986 A CN 201210154986A CN 102711105 B CN102711105 B CN 102711105B
- Authority
- CN
- China
- Prior art keywords
- communication
- mme
- devices
- parties
- enb
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000010295 mobile communication Methods 0.000 title claims abstract description 101
- 238000000034 method Methods 0.000 title claims abstract description 62
- 238000004891 communication Methods 0.000 claims abstract description 588
- 238000005516 engineering process Methods 0.000 claims abstract description 41
- 238000001514 detection method Methods 0.000 claims description 19
- 230000000977 initiatory effect Effects 0.000 claims description 6
- 238000010586 diagram Methods 0.000 description 6
- 238000012795 verification Methods 0.000 description 6
- 230000008569 process Effects 0.000 description 4
- 238000012360 testing method Methods 0.000 description 4
- 230000008901 benefit Effects 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/14—Direct-mode setup
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention is applicable to the communications field, provides a kind of method of being undertaken communicating by mobile communications network, said method comprising the steps of: MME sends communication data to communicating pair equipment; ENB indicates communicating pair equipment to set up communication data carrying, generates RNTI and described RNTI is distributed to communicating pair equipment; Communicating pair equipment, according to the communication data received, uses existing mobile communications network to communicate.The embodiment of the present invention, MME obtains the information that can UE carry out D2D communication, judge that can communicating pair carry out identical security algorithm, the security algorithm that mobile communication uses is found that there is under communicating pair, communicating pair is made to use the security algorithm of the ripe safety of existing mobile communication technology to communicate, not only make mobile communication technology obtain application in D2D communication aspects, and not only proof procedure is simple because the existing mobile communication technology of use carries out communicating, and fail safe is high.
Description
Technical Field
The present invention relates to the field of communications, and in particular, to a method, an apparatus, and a system for performing communications via a mobile communication network.
Background
eNB: an enhanced node b, evolved NodeB, is equivalent to a base station in the existing mobile communication technology.
MME: mobility management entity, a key control node in an existing mobile communication system.
UE: user equipment, customer premises equipment.
RNTI: and the radio network temporary identifier is used as the identity of the UE in the signal.
RRC: radio resource control, radio resource control protocol.
The internet of things means that various devices with certain sensing, calculating, executing and communication capabilities are deployed to acquire information of a physical world, and information transmission, cooperation and processing are realized through a network, so that a network for interconnecting people and objects and for interconnecting objects and things is realized. Device-to-device communication (devicetedeviced d 2D) communication, which is one of applications of the internet of things, mainly realizes direct communication between two devices. Possible technologies may include short-range wireless communication technologies such as Wireless Personal Area Network (WPAN), Ultra Wide Band (UWB), Bluetooth (Bluetooth), Wifi, and the like.
The vigorous development of the internet of things shows the huge market potential and value of short-distance wireless application. Mobile operators have little involvement in this area, or lack the necessary control. At present, related companies have developed research for supporting D2D applications in the authorized frequency band of the operator, and actively promote 3GPP establishment in the well-known standards organization. The purpose is to use the authorized frequency band of the operator to support and implement the D2D application, so that the operator can take a greater initiative in the short-distance wireless application market.
One of the benefits of implementing D2D in the mobile communication network of the operator is that the security operation is convenient, and human involvement is not required, and key agreement and data encryption can be implemented based on the existing security mechanism of the mobile communication network. However, according to the existing mobile communication network, the security procedures of the calling side and the called side, including authentication, key agreement, and encryption (integrity check) algorithm agreement, are independent of each other. The support capability of the encryption (integrity check) algorithm may be different for devices with different capabilities, and the encryption (integrity check) algorithm selected by the devices may be different. Therefore, if the determination as to whether the D2D communication is possible is made only on the communication device side, it is possible that two devices different in cryptographic (integrity check) algorithm support capability are determined to be able to perform the D2D communication, and as a result, the two devices select different cryptographic (integrity check) algorithms and are unable to perform the actual D2D communication. This does not make good use of the existing security mechanisms of mobile communication networks to serve D2D communication.
Disclosure of Invention
An embodiment of the present invention is to provide a method and a system for performing D2D communication through a mobile communication network, and aims to solve the problem that the prior art cannot successfully perform D2D communication using the prior art mobile communication technology due to the security verification problem.
The embodiment of the invention is realized by a method for carrying out D2D communication through a mobile communication network, which comprises the following steps:
the MME sends communication data to the equipment of the two communication parties, wherein the communication data comprises: information whether the devices of the two parties of communication can carry out D2D communication, a security algorithm of the existing mobile communication technology supported by the devices of the two parties of communication, and D2D communication key material;
the eNB indicates equipment of two communication parties to establish communication data bearer, generates RNTI and distributes the RNTI to the equipment of the two communication parties, wherein the RNTI is used for D2D communication;
and the equipment of the two communication parties communicates by using the selected security algorithm and the key obtained according to the key material according to the received communication material.
Another object of an embodiment of the present invention is to provide a method for communicating via a mobile communication network, the method including the following steps:
acquiring information whether the devices of the two communication parties can carry out D2D communication;
judging whether the communication two-party equipment has the same security algorithm;
sending communication materials to equipment of both communication parties, wherein the communication materials comprise: information on whether the devices of the two parties of communication can perform D2D communication, a security algorithm of the existing mobile communication technology supported by the devices of the two parties of communication, and key material of the D2D communication.
Another object of an embodiment of the present invention is to provide a method for communicating via a mobile communication network, the method including the following steps:
receiving and storing communication data sent by an MME, wherein the communication data comprises: information whether the devices of the two parties of communication can carry out D2D communication, a security algorithm of the existing mobile communication technology supported by the devices of the two parties of communication, and key material of D2D communication;
sending the communication data to the equipment of both communication parties;
indicating the equipment of the two communication parties to establish communication data bearing;
and generating the RNTI and distributing the RNTI to the equipment of the two communication parties.
Another object of an embodiment of the present invention is to provide a method for performing communication through a mobile communication network, where the method includes:
sending a communication request to an MME, wherein the communication request comprises information whether D2D communication is supported;
receiving a communication profile, the communication profile comprising: information whether the devices of the two parties of communication can carry out D2D communication, a security algorithm of the existing mobile communication technology supported by the devices of the two parties of communication, and key material of D2D communication;
establishing communication data bearer according to the instruction of the eNB;
receiving an RNTI (radio network temporary identifier) distributed by the eNB;
and initiating communication to the called party UE by using the selected security algorithm and the key obtained according to the key material.
Another object of an embodiment of the present invention is to provide a method for communicating via a mobile communication network, the method including the following steps:
receiving a communication call of an MME, wherein the communication call comprises information for inquiring whether D2D communication is supported;
sending information to the MME whether D2D communication is supported;
receiving a communication profile, the communication profile comprising: information whether the devices of the two parties of communication can carry out D2D communication, a security algorithm of the existing mobile communication technology supported by the devices of the two parties of communication, and key material of D2D communication;
establishing communication data bearer according to the instruction of the eNB;
receiving an RNTI (radio network temporary identifier) distributed by the eNB;
the communication initiated by the calling party UE is responded to using the selected security algorithm and the key obtained from the keying material.
Another object of an embodiment of the present invention is to provide an apparatus for communicating via a mobile communication network, the apparatus including:
a D2D communication information obtaining unit, for obtaining the information whether the communication both-side equipment can carry out D2D communication;
the same security algorithm judging unit is used for judging whether the two communication parts have the same security algorithm;
and the communication data sending unit is used for sending the communication data to the equipment of the two parties of communication.
Another object of an embodiment of the present invention is to provide an apparatus for communicating via a mobile communication network, the apparatus including:
a communication data receiving unit, configured to receive communication data sent by the MME;
a communication data forwarding unit, configured to forward the communication data received by the communication data receiving unit to both communication party devices;
the communication data bearing indicating unit is used for indicating the equipment of the two communication parties to establish communication data bearing;
and an RNTI distribution unit for generating RNTI and distributing the RNTI to the equipment of both communication parties.
Another object of an embodiment of the present invention is to provide an apparatus for communicating via a mobile communication network, the apparatus including:
the D2D communication self-checking unit is used for carrying out self-checking whether the D2D communication is supported or not;
a communication request sending unit, configured to initiate a communication request to an MME, where the communication request carries information about whether the D2D communication self-check unit self-check supports D2D communication;
a communication data receiving unit, configured to receive communication data sent by an MME or an eNB;
a communication data bearer establishing unit, configured to establish a communication data bearer according to the instruction of the eNB;
an RNTI receiving unit configured to receive an RNTI distributed by an eNB;
and the communication unit is used for initiating communication to the called party UE according to the communication material received by the communication material receiving unit by using the selected security algorithm and the key acquired according to the key material.
Another object of an embodiment of the present invention is to provide an apparatus for communicating via a mobile communication network, the apparatus including:
a D2D detection information receiving unit, configured to receive information sent by the MME to perform D2D communication function detection;
a D2D detecting unit, for detecting whether the self-checking supports the D2D communication function according to the information received by the D2D detecting information receiving unit;
a D2D communication information transmitting unit, for transmitting information whether the D2D pass function is supported to MME according to the detection result of the D2D detecting unit;
a communication data receiving unit, configured to receive communication data sent by an MME or an eNB;
a communication data bearer establishing unit, configured to establish a communication data bearer according to the instruction of the eNB;
an RNTI receiving unit configured to receive an RNTI distributed by an eNB;
and the communication unit is used for responding to the communication initiated by the calling party UE by using the selected security algorithm and the key acquired according to the key material according to the communication material received by the communication material receiving unit.
Another object of an embodiment of the present invention is to provide a system for performing communication through a mobile communication network, the system including:
the MME is used for acquiring information whether the equipment of the two communication parties can carry out D2D communication, judging whether the equipment of the two communication parties supports the same security algorithm or not, and sending communication data to the equipment of the two communication parties, wherein the communication data comprises: information on whether the devices of the two parties can perform D2D communication, a security algorithm of the existing mobile communication technology supported by the devices of the two parties, and key material;
the eNB is used for receiving and storing the communication data sent by the MME, sending the communication data to the equipment of both communication parties, indicating the equipment of both communication parties to establish communication data bearer, generating RNTI and distributing the RNTI to the equipment of both communication parties;
the calling party UE is used for sending a communication request to the MME, wherein the communication request contains information about whether D2D communication is supported or not, receiving communication data, establishing communication data bearer according to the instruction of the eNB, receiving the RNTI distributed by the eNB, and initiating communication to the called party UE by using a selected security algorithm and a key obtained according to a key material;
the called party UE is used for receiving the communication call of the MME, sending information whether to support D2D communication to the MME, receiving communication data, establishing communication data bearer according to the instruction of the eNB, receiving the RNTI distributed by the eNB, and responding to the communication initiated by the calling party UE by using the selected security algorithm and the key obtained according to the key material.
In the embodiment of the invention, the MME acquires the information whether the UE supports D2D communication, judges whether two communication parties have the same security algorithm, and sends the security algorithm used by the existing mobile communication to the two communication parties, so that the two communication parties use the mature and safe security algorithm of the existing mobile communication technology to communicate, the mobile communication technology is applied to D2D communication, and the communication using the existing mobile communication technology has simple verification process and high safety.
Drawings
Fig. 1 is a flowchart of a method for communicating via a mobile communication network according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a specific implementation of step S101 shown in fig. 1 according to an embodiment of the present invention;
fig. 3 is a flowchart of a method for communicating via a mobile communication network according to another embodiment of the present invention;
fig. 4 is a flowchart of a method for communicating via a mobile communication network according to another embodiment of the present invention;
fig. 5 is a flowchart of a method for communicating via a mobile communication network according to another embodiment of the present invention;
fig. 6 is a flowchart of a method for communicating via a mobile communication network according to another embodiment of the present invention;
fig. 7 is a block diagram of a communication system through a mobile communication network according to an embodiment of the present invention;
fig. 8 is a specific structural diagram of the MME shown in fig. 7 according to an embodiment of the present invention;
fig. 9 is a specific structural diagram of the eNB in fig. 7 according to an embodiment of the present invention;
fig. 10 is a detailed structural diagram of the calling party UE in fig. 7 according to an embodiment of the present invention;
fig. 11 is a specific structural diagram of the called UE in fig. 7 according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In the embodiment of the invention, the MME acquires the information whether the UE supports D2D communication, judges whether two communication parties have the same security algorithm, and sends the security algorithm used by the existing mobile communication to the two communication parties, so that the two communication parties use the mature and safe security algorithm of the existing mobile communication technology to communicate, the mobile communication technology is applied to D2D communication, and the communication using the existing mobile communication technology has simple verification process and high safety.
Example one
Fig. 1 is a flowchart of a method for performing communication via a mobile communication network according to an embodiment of the present invention, which is detailed as follows:
in step S101, the MME acquires information as to whether the devices of both communication parties support D2D communication.
In the embodiment of the present invention, before the two communication devices communicate with each other, the MME needs to acquire information whether the two communication devices support D2D communication, and if so, the MME proceeds to step S102, and if not, selects an existing mobile communication system for communication. Specific procedures for the MME to obtain whether the two communication devices support D2D communication are detailed in fig. 2 and the description of fig. 2.
In step S102, the MME determines whether both communication devices have the same security algorithm.
In the embodiment of the present invention, the security algorithms owned by each device may be different, and if the devices own the same security algorithm, step S103 is performed, otherwise, the eNB or the UE is notified to end the communication, or the existing mobile communication system is selected for communication. Regarding the problem that the MME determines whether the two communication devices have the same security algorithm, the present application uses the prior art to perform detection, which is not described herein again.
In step S103, the MME sends communication data to the two communicating devices, where the communication data includes: information on whether the devices of both parties can perform D2D communication, a security algorithm of an existing mobile communication technology supported by both parties, and D2D communication key material.
In an embodiment of the present invention, an MME sends, to a communication UE, communication data used for verification when both communication parties send and receive data, where the communication data includes: the method comprises the following steps of information about whether D2D communication can be carried out by two communication devices, a security algorithm of the existing mobile communication technology supported by the two communication devices and key materials, wherein the security algorithm comprises the following steps: an encryption and decryption algorithm and an integrity check algorithm. The method for sending the communication data to the UE by the MME comprises the following two steps:
A. the MME sends the communication data to the eNB and forwards the communication data to equipment of both communication parties by the eNB, and the step that the MME sends the communication data to the eNB specifically comprises the following steps:
sending the communication material to the eNB by defining the following messages:
InitialContextSetupRequest
–MessageType
–MMEUES1APID
–eNBUES1APID
–UEAggregateMaximumBitRate
–E-RABtoBeSetupList
·E-RABtoBeSetupItemIEs
–UESecurityCapabilities
·EncryptionAlgorithms:BITSTRING(16,...)
·IntegrityProtectionAlgorithms:BITSTRING(16,...)
–SecurityKey
–D2Dcapability
–D2DUESecurityCapabilities
·D2DEncryptionAlgorithms:BITSTRING(16,...)
·D2DIntegrityProtectionAlgorithms:BITSTRING(16,...)
D2DSecuritystuff
and
UECONTEXTMODIFICATIONREQUEST
–MessageType
–MMEUES1APID
–eNBUES1APID
–UESecurityCapabilities
–SecurityKey
–SubscriberProfileIDforRAT/Frequencypriority
–UEAggregateMaximumBitRate
–CSFallbackIndicator
–UESecurityCapabilities
–CSGMembershipStaus
–D2Dcapability
–D2DUESecurityCapabilities
·D2DEncryptionAlgorithms:BITSTRING(16,...)
·D2DIntegrityProtectionAlgorithms:BITSTRING(16,...)
D2DSecuritystuff
B. the MME directly sends the communication data to the equipment of both communication parties, and the steps are as follows: communicating the communication material through NAS information communicated between the MME and the UE. In this method, the device or MME needs to transmit information to the eNB whether the device or MME is capable of D2D communication.
In step S104, the eNB instructs the device of both parties to establish a communication data bearer, generates an RNTI for D2D communication, and distributes the RNTI to the device of both parties.
In the embodiment of the invention, the eNB instructs the equipment of the two communication parties to establish communication data bearer, generates the RNTI and distributes the RNTI to the equipment of the two communication parties. The eNB indicates the two communication party devices to establish a communication data bearer by modifying the RRC, and the method specifically comprises the following steps:
the ConnectionReconfiguration message contains the elements radioResourceConfigDedicated- > DRB-ToAddModList- > DRB-ToAddMod:
–DRB-ToAddMod::=SEQUENCE{
–eps-BearerIdentityINTEGER(0..15)OPTIONAL,--
CondDRB-Setup
–drb-IdentityDRB-Identity,
–pdcp-ConfigPDCP-ConfigOPTIONAL,--CondPDCP
–rlc-ConfigRLC-ConfigOPTIONAL,--CondSetup
–logicalChannelIdentityINTEGER(3..10)OPTIONAL,--
CondDRB-Setup
–logicalChannelConfigLogicalChannelConfigOPTIONAL,
--CondSetup
–D2DsecurityAlgorithmConfig
–D2DSecuritystuff
–D2D-RNTI
–}
in step S105, the devices of the two parties communicate with each other by using the selected security algorithm and the key obtained from the key material according to the received communication material.
In the embodiment of the invention, the equipment of the two communication parties receives the communication materials, and determines the opposite party according to the communication materials: D2D communication may be possible and the same security algorithm is supported. And carrying out communication according to the security algorithm of the existing mobile communication technology in the communication material and the key obtained by the key material in the communication material.
It should be noted that the communication between the calling party device and the called party device and the MME and the eNB is divided into the following four cases:
the calling party equipment and the called party equipment communicate with the same MME and communicate with the same eNB; or,
the calling party equipment and the called party equipment communicate with the same MME but communicate with different eNBs; or,
the calling party equipment and the called party equipment communicate with different MMEs and communicate with different eNBs; or,
the calling party device and the called party device communicate with different MMEs but with the same eNB.
In the embodiment of the invention, the MME acquires the information whether the UE supports D2D communication, judges whether two communication parties have the same security algorithm, and sends the security algorithm used by the existing mobile communication to the two communication parties, so that the two communication parties use the mature and safe security algorithm of the existing mobile communication technology to communicate, the mobile communication technology is applied to D2D communication, and the communication using the existing mobile communication technology has simple verification process and high safety.
Example two
Fig. 2 is a flowchart illustrating a specific implementation of step S101 shown in fig. 1 according to an embodiment of the present invention, which is detailed as follows:
in step S201, the calling UE self-checks whether D2D communication is supported, and in case of D2D communication is supported, the calling UE initiates a D2D communication request to the MME.
In step S202, the MME receives the communication request sent by the calling party UE and the information of supporting D2D communication, and carries an instruction to detect whether D2D communication is supported when calling the called party UE.
In step S203, the called UE receives the communication call from the MME, performs self-test according to the detection instruction to determine whether D2D communication is supported, and sends the detection result to the MME.
The embodiment of the invention detects the UE of the calling party and the called party through the MME in the mobile communication technology, the MME carries an instruction for detecting whether D2D communication is supported or not when the MME calls the UE of the called party, and the UE of the called party sends the result back to the MME after self-checking, thereby providing a reasonable method for detecting whether D2D equipment can pass.
EXAMPLE III
Fig. 3 is a flowchart of a method for communicating via a mobile communication network according to another embodiment of the present invention, where the method includes the following steps:
in step S301, information is obtained whether the calling party UE and the called party UE support D2D communication.
In the embodiment of the present invention, before the two communication devices communicate with each other, the MME needs to acquire information whether the two communication devices support D2D communication, and if so, the MME proceeds to step S302, and if not, selects an existing mobile communication system for communication. The method comprises the following steps:
s1, the calling party UE self-checks whether the D2D communication is supported, and under the condition that the D2D communication is supported, the calling party UE initiates a D2D communication request to the MME;
s2, receiving the communication request sent by the calling party UE and the information supporting D2D communication, and carrying an instruction for detecting whether the D2D communication is supported when the called party UE is called;
s3, the called UE receives the communication call of the MME, performs self-checking whether the D2D communication is supported or not according to the detection instruction, and sends the detection result to the MME.
In step S302, it is determined whether the calling UE and the called UE have the same security algorithm.
In the embodiment of the present invention, the security algorithms owned by each device may be different, and if the devices own the same security algorithm, step S303 is performed, otherwise, the eNB or the UE is notified to end the communication, or the existing mobile communication system is selected for communication. Regarding the problem that the MME determines whether the calling party UE and the called party UE have the same security algorithm, the present application uses the prior art for detection, which is not described herein again.
In step S303, a communication material is transmitted to the communication dual-transmission device, where the communication material includes: information on whether the calling party UE and the called party UE can perform D2D communication, security algorithms of existing mobile communication technologies supported by both the calling party UE and the called party UE, and key material for D2D communication.
In the embodiment of the present invention, a communication material is sent to a UE, where the communication material is used for verification when both communication parties send and receive data, and the communication material includes: information on whether the calling party UE and the called party UE can perform D2D communication, a security algorithm of an existing mobile communication technology supported by both the calling party UE and the called party UE, and key material, wherein the security algorithm includes: an encryption and decryption algorithm and an integrity check algorithm. The method for sending the communication material to the communication dual-sending equipment comprises the following steps:
A. the MME sends the communication data to the eNB, and the eNB forwards the communication data to the calling party UE and the called party UE, and the step that the MME sends the communication data to the eNB specifically comprises the following steps:
sending the communication material to the eNB by defining the following messages:
InitialContextSetupRequest
-MessageType
–MMEUES1APID
–eNBUES1APID
–UEAggregateMaximumBitRate
–E-RABtoBeSetupList
·E-RABtoBeSetupItemIEs
–UESecurityCapabilities
·EncryptionAlgorithms:BITSTRING(16,...)
·IntegrityProtectionAlgorithms:BITSTRING(16,...)
–SecurityKey
–D2Dcapability
–D2DUESecurityCapabilities
·D2DEncryptionAlgorithms:BITSTRING(16,…)
·D2DIntegrityProtectionAlgorithms:BITSTRING(16,...)
D2DSecuritystuff
and
UECONTEXTMODIFICATIONREQUEST
–MessageType
–MMEUES1APID
–eNBUES1APID
–UESecurityCapabilities
–SecurityKey
–SubscriberProfileIDforRAT/Frequencypriority
–UEAggregateMaximumBitRate
–CSFallbackIndicator
–UESecurityCapabilities
-CSGMembershipStatus
–D2Dcapability
–D2DUESecurityCapabilities
·D2DEncryptionAlgorithms:BITSTRING(16,...)
·D2DIntegrityProtectionAlgorithms:BITSTRING(16,...)
D2DSecuritystuff
B. the MME directly sends the communication data to the calling party UE and the called party UE, and the steps are as follows: communicating the communication material through NAS information communicated between the MME and the UE. In this method, the calling UE and the called UE or MME need to send information to the eNB about whether the calling UE and the called UE can perform D2D communication.
Example four
Fig. 4 is a flowchart of a method for communicating via a mobile communication network according to another embodiment of the present invention, where the method includes the following steps:
in step S401, receiving and storing the communication data sent by the MME;
in the embodiment of the present invention, an eNB receives and stores communication data sent by an MME, where the communication data includes: information on whether the devices of the two parties of communication can perform D2D communication, a security algorithm of the existing mobile communication technology supported by the devices of the two parties of communication, and key material of the D2D communication.
In step S402, the communication material is sent to the devices of both parties.
In step S403, the devices of the two parties of communication are instructed to establish a communication data bearer.
In the embodiment of the invention, the eNB instructs the equipment of the two communication parties to establish the communication data bearer.
In step S404, an RNTI is generated and the RNTI is distributed to both communication party apparatuses.
In the embodiment of the invention, the eNB further generates an RNTI and distributes the RNTI to the devices of the two communication parties, wherein the RNTI is used for D2D communication.
EXAMPLE five
Fig. 5 is a flowchart of a method for communicating via a mobile communication network according to another embodiment of the present invention, where the method includes the following steps:
in step S501, a self-test is performed as to whether D2D communication is supported.
In step S502, a communication request including information on whether or not D2D communication is supported is transmitted to the MME.
In the embodiment of the invention, the calling party UE sends a communication request to the MME, and information whether D2D communication is supported is carried in the communication request.
In step S503, a communication material is received, where the communication material includes: information on whether the devices of the two parties of communication can perform D2D communication, a security algorithm of the existing mobile communication technology supported by the devices of the two parties of communication, and key material of the D2D communication.
In the embodiment of the invention, the communication data directly sent by the MME or the communication data forwarded by the eNB is received.
In step S504, a communication data bearer is established according to the instruction of the eNB.
In step S505, the RNTI distributed by the eNB is received.
In the embodiment of the invention, the calling party UE receives the RNTI distributed by the eNB and used for D2D communication.
In step S506, communication is initiated to the called party UE using the selected security algorithm and the key obtained from the keying material.
In the embodiment of the invention, the calling party UE initiates communication to the called party UE by using the selected security algorithm and the key obtained according to the key material.
EXAMPLE six
Fig. 6 is a flowchart of a method for communicating via a mobile communication network according to another embodiment of the present invention, where the method includes the following steps:
in step S601, a communication call of the MME is received, where the communication call includes information asking whether D2D communication is supported
In the embodiment of the invention, the called party UE receives a communication call sent by an MME, wherein the communication call comprises information for inquiring whether the called party UE supports D2D communication.
In step S602, it is self-checked whether D2D communication is supported, and information whether D2D communication is supported is transmitted to the MME.
In step S603, a communication material is received, where the communication material includes: information on whether the devices of the two parties of communication can perform D2D communication, a security algorithm of the existing mobile communication technology supported by the devices of the two parties of communication, and key material of the D2D communication.
In the embodiment of the invention, the communication data directly sent by the MME or the communication data forwarded by the eNB is received.
In step S604, a communication data bearer is established according to the instruction of the eNB.
In step S605, the RNTI distributed by the eNB is received.
In the embodiment of the invention, the called party UE receives the RNTI distributed by the eNB and used for D2D communication.
In step S606, the communication initiated by the calling party UE is responded to using the selected security algorithm and the key obtained from the keying material.
EXAMPLE seven
Fig. 7 is a block diagram of a communication system via a mobile communication network according to an embodiment of the present invention, which only shows a part related to the embodiment of the present invention for convenience of description, and includes:
the MME71 is configured to obtain information about whether the two communication devices support D2D communication, determine whether the two communication devices support the same security algorithm, and send communication data to the two communication devices, where the communication data includes: information on whether the communication of D2D is possible or not, a security algorithm of an existing mobile communication technology supported by both the communication devices, and key material.
And the eNB72 is configured to receive and store the communication data sent by the MME71, send the communication data to the device of the two parties of communication, instruct the device of the two parties of communication to establish a communication data bearer, generate an RNTI, and distribute the RNTI to the device of the two parties of communication.
The calling party UE73 is configured to send a communication request to the MME, where the communication request includes information on whether D2D communication is supported, receive communication data, establish a communication data bearer according to an indication of the eNB72, receive the RNTI distributed by the eNB72, and initiate communication to the called party UE using the selected security algorithm and the key obtained according to the key material.
The called party UE74 is used for receiving the communication call of the MME, sending information whether D2D communication is supported to the MME, receiving communication materials, establishing communication data bearer according to the instruction of the eNB72, receiving the RNTI distributed by the eNB72, and responding to the communication initiated by the calling party UE by using the selected security algorithm and the key obtained according to the key material.
As shown in fig. 8, the MME71 specifically includes:
a D2D communication information obtaining unit 711, configured to obtain information whether the devices of the two parties of communication support D2D communication.
And a same security algorithm determining unit 712, configured to determine whether the two communication devices possess the same security algorithm.
A communication material sending unit 713, configured to send communication material to the device of both communication parties, includes: and sending the communication data to the eNB, and forwarding the communication data to the equipment of the two communication parties by the eNB or directly sending the communication data to the equipment of the two communication parties.
As shown in fig. 8, the eNB72 specifically includes:
a communication data receiving unit 721 is configured to receive the communication data sent by the MME 71.
A communication data forwarding unit 722, configured to forward the communication data received by the communication data receiving unit 721 to the two communication party devices.
A communication data bearer indicating unit 723, configured to indicate the two communication party devices to establish a communication data bearer.
An RNTI distributing unit 724 configured to generate an RNTI and distribute the RNTI to the device of both communication parties.
As shown in fig. 6, the calling party UE33 specifically includes:
the D2D communication self-check unit 731 for performing self-check if D2D communication is supported.
A communication request sending unit 732, configured to initiate a communication request to an MME, where the communication request carries information of whether the D2D communication self-test unit 731 self-tests supports D2D communication.
A communication data receiving unit 733, configured to receive communication data transmitted by the MME or eNB.
A communication data bearer establishing unit 734, configured to establish a communication data bearer according to the instruction of the eNB.
An RNTI receiving unit 735 configured to receive an RNTI distributed by the eNB.
A communication unit 736 for communicating to the called party UE using the selected security algorithm and the key obtained from the key material according to the communication material received by the communication material receiving unit 733.
As shown in fig. 9, the called UE74 specifically includes:
a D2D detection information receiving unit 741, configured to receive information that is transmitted by the MME and performs D2D communication function detection.
A D2D detecting unit 742 for detecting whether the information received by the information receiving unit 741 supports the D2D communication function according to the information received by the D2D detecting unit.
A D2D communication information transmitting unit 743 for transmitting information whether D2D traffic is supported to MME according to the detection result of the D2D detecting unit 742.
A communication data receiving unit 744, configured to receive the communication data sent by the MME or eNB.
A communication data bearer establishing unit 745, configured to establish a communication data bearer according to the indication of the eNB.
An RNTI receiving unit 746, configured to receive an RNTI distributed by the eNB.
A communication unit 747, configured to respond to the communication initiated by the calling party UE with the selected security algorithm according to the communication material received by the communication material receiving unit 333 and the key obtained according to the key material.
It should be noted that the communication between the calling party device and the called party device and the MME and the eNB is divided into the following four cases:
the calling party equipment and the called party equipment communicate with the same MME and communicate with the same eNB; or,
the calling party equipment and the called party equipment communicate with the same MME but communicate with different eNBs; or,
the calling party equipment and the called party equipment communicate with different MMEs and communicate with different eNBs; or,
the calling party device and the called party device communicate with different MMEs but with the same eNB.
In the embodiment of the invention, the MME acquires the information whether the UE supports D2D communication, judges whether the two communication parties can carry out the same security algorithm, and sends the security algorithm used by the existing mobile communication to the two communication parties, so that the two communication parties use the mature and safe security algorithm of the existing mobile communication technology to carry out communication, the mobile communication technology is applied to the D2D communication, and the authentication process is simple and the safety is high because the existing mobile communication technology is used for carrying out communication.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents and improvements made within the spirit and principle of the present invention are intended to be included within the scope of the present invention.
Claims (18)
1. A method of communicating over a mobile communications network, the method comprising the steps of:
the MME judges whether the two communication side devices have the same security algorithm, if so, the MME sends communication materials to the two communication side devices, and the communication materials comprise: information whether the devices of the two parties of communication can carry out D2D communication, a security algorithm of the existing mobile communication technology supported by the devices of the two parties of communication, and D2D communication key material;
the eNB indicates equipment of two communication parties to establish communication data bearer, generates RNTI and distributes the RNTI to the equipment of the two communication parties, wherein the RNTI is used for D2D communication;
the equipment of the two communication parties communicates by using the selected security algorithm and the key obtained according to the key material according to the received communication data;
and if the owned security algorithms are different, the MME informs the eNB to finish the communication or selects the existing mobile communication system to communicate.
2. The method of claim 1, wherein prior to the step of the MME sending the communication material to both devices, the method further comprises the steps of:
the MME acquires information whether the devices of the two communication parties support D2D communication.
3. The method according to claim 2, wherein the step of the MME acquiring the information whether the two communicating devices can perform D2D communication specifically comprises:
the calling party UE performs self-checking whether the D2D communication is supported, and initiates a communication request to the MME under the condition that the D2D communication is supported;
the MME receives the communication request sent by the calling party UE and the information supporting D2D communication, and carries an instruction for detecting whether the D2D communication is supported when the called party UE is called;
and the called party UE receives the communication call of the MME, performs self-checking whether the D2D communication is supported or not according to the detection instruction, and sends the detection result to the MME.
4. The method of claim 1, wherein the step of the MME sending the communication data to the devices of both parties comprises:
the MME sends communication data to the eNB, and the eNB forwards the communication data to the equipment of the two communication parties; or,
the MME directly sends the communication data to the equipment of the two communication parties.
5. The method of claim 1, wherein the eNB instructs the devices of the two parties to communicate to establish the communication data bearer by modifying RRC.
6. The method of any of claims 1-5, wherein the calling party device and the called party device communicate with the MME and the eNB in four cases:
the calling party equipment and the called party equipment communicate with the same MME and communicate with the same eNB; or,
the calling party equipment and the called party equipment communicate with the same MME but communicate with different eNBs; or,
the calling party equipment and the called party equipment communicate with different MMEs and communicate with different eNBs; or,
the calling party device and the called party device communicate with different MMEs but with the same eNB.
7. A method of communicating over a mobile communications network, the method comprising the steps of:
acquiring information whether the communication of D2D is supported by the equipment of both communication parties;
judging whether the communication two-party equipment has the same security algorithm;
if the same security algorithm is possessed, communication materials are sent to the equipment of the two parties of communication, and the communication materials comprise: information whether the devices of the two parties of communication can carry out D2D communication, a security algorithm of the existing mobile communication technology supported by the devices of the two parties of communication, and key material of D2D communication;
and if the owned security algorithms are different, informing the eNB to finish the communication or selecting the existing mobile communication system to communicate.
8. The method according to claim 7, wherein the step of obtaining the information whether the devices of the two communicating parties support D2D communication specifically comprises:
the calling party UE performs self-checking whether the D2D communication is supported, and initiates a communication request to the MME under the condition that the D2D communication is supported;
receiving a communication request sent by the calling party UE and information of supporting D2D communication, and carrying an instruction for detecting whether D2D communication is supported when a called party UE is called;
and the called party UE receives the communication call of the MME, performs self-checking whether the D2D communication is supported or not according to the detection instruction, and sends the detection result to the MME.
9. The method of claim 8, wherein the step of sending the communication data to the devices of the two parties comprises:
the MME sends communication data to the eNB, and the eNB forwards the communication data to the equipment of the two communication parties; or,
the MME directly sends the communication data to the equipment of the two communication parties.
10. A method of communicating over a mobile communications network, the method comprising the steps of:
receiving and storing communication data sent by an MME when judging that two communication side devices have the same security algorithm, wherein the communication data comprises: information whether the devices of the two parties of communication can carry out D2D communication, a security algorithm of the existing mobile communication technology supported by the devices of the two parties of communication, and key material of D2D communication;
sending the communication data to the equipment of both communication parties;
indicating the equipment of the two communication parties to establish communication data bearing;
generating an RNTI and distributing the RNTI to equipment of both communication sides;
and receiving the end of the communication which is informed by the MME when judging that the security algorithms owned by the devices of the two communication parties are different, or selecting the existing mobile communication system for communication.
11. A method of communicating over a mobile communications network, the method comprising the steps of:
sending a communication request to an MME, wherein the communication request comprises information whether D2D communication is supported;
receiving communication data sent by the MME when judging that the two communication devices have the same security algorithm, wherein the communication data comprises: information whether the devices of the two parties of communication can carry out D2D communication, a security algorithm of the existing mobile communication technology supported by the devices of the two parties of communication, and key material of D2D communication;
establishing communication data bearer according to the instruction of the eNB;
receiving an RNTI (radio network temporary identifier) distributed by the eNB;
initiating communication to the called party UE by using the selected security algorithm and a key obtained according to the key material;
and receiving the end of the communication which is informed by the MME when judging that the security algorithms owned by the devices of the two communication parties are different, or selecting the existing mobile communication system for communication.
12. A method of communicating over a mobile communications network, the method comprising the steps of:
receiving a communication call of an MME, wherein the communication call comprises information for inquiring whether D2D communication is supported;
sending information to the MME whether D2D communication is supported;
receiving communication data sent by the MME when judging that the two communication devices have the same security algorithm, wherein the communication data comprises: information whether the devices of the two parties of communication can carry out D2D communication, a security algorithm of the existing mobile communication technology supported by the devices of the two parties of communication, and key material of D2D communication;
establishing communication data bearer according to the instruction of the eNB;
receiving an RNTI (radio network temporary identifier) distributed by the eNB;
responding to the communication initiated by the calling party UE by using the selected security algorithm and a key obtained according to the key material;
and receiving the end of the communication which is informed by the MME when judging that the security algorithms owned by the devices of the two communication parties are different, or selecting the existing mobile communication system for communication.
13. An apparatus for communicating over a mobile communications network, the apparatus comprising:
a D2D communication information obtaining unit, configured to obtain information whether the devices of the two communication parties support D2D communication;
the same security algorithm judging unit is used for judging whether the two communication parts have the same security algorithm;
and a communication material sending unit, configured to send the communication material to the devices of both parties if the devices of both parties have the same security algorithm, and notify the eNB to end the communication or select an existing mobile communication system to communicate if the devices of both parties have different security algorithms.
14. An apparatus for communicating over a mobile communications network, the apparatus comprising;
a communication data receiving unit, configured to receive communication data sent by the MME when it is determined that the two communication devices have the same security algorithm;
a communication data forwarding unit, configured to forward the communication data received by the communication data receiving unit to both communication party devices;
the communication data bearing indicating unit is used for indicating the equipment of the two communication parties to establish communication data bearing;
an RNTI distribution unit for generating RNTI and distributing the RNTI to both communication party equipment;
and the communication data receiving unit is also used for receiving the end of the communication notified by the MME when judging that the security algorithms owned by the two communication devices are different, or selecting the existing mobile communication system for communication.
15. An apparatus for communicating over a mobile communications network, the apparatus comprising:
the D2D communication self-checking unit is used for carrying out self-checking whether the D2D communication is supported or not;
a communication request sending unit, configured to initiate a communication request to an MME, where the communication request carries information about whether the D2D communication self-check unit self-check supports D2D communication;
a communication data receiving unit, configured to receive, when the MME determines that the two communication devices have the same security algorithm, communication data sent by the MME or the eNB, or receive, when the MME determines that the security algorithms that the two communication devices have are different, an end of the current communication notified by the MME when the MME determines that the security algorithms that the two communication devices have are different, or select an existing mobile communication system for communication;
a communication data bearer establishing unit, configured to establish a communication data bearer according to the instruction of the eNB;
an RNTI receiving unit configured to receive an RNTI distributed by an eNB;
and the communication unit is used for initiating communication to the called party UE according to the communication material received by the communication material receiving unit by using the selected security algorithm and the key acquired according to the key material.
16. An apparatus for communicating over a mobile communications network, the apparatus comprising:
a D2D detection information receiving unit, configured to receive information sent by the MME to perform D2D communication function detection;
a D2D detecting unit, for detecting whether the self-checking supports the D2D communication function according to the information received by the D2D detecting information receiving unit;
a D2D communication information transmitting unit for transmitting information whether D2D communication is supported to MME according to the detection result of the D2D detecting unit;
a communication data receiving unit, configured to receive communication data sent by an MME or an eNB when the MME determines that two communication devices have the same security algorithm;
a communication data bearer establishing unit, configured to establish a communication data bearer according to the instruction of the eNB;
an RNTI receiving unit configured to receive an RNTI distributed by an eNB;
a communication unit, configured to respond to communication initiated by the calling party UE with the selected security algorithm according to the communication material received by the communication material receiving unit and a key obtained according to the key material;
and the communication data receiving unit is also used for receiving the end of the communication notified by the MME when judging that the security algorithms owned by the two communication devices are different, or selecting the existing mobile communication system for communication.
17. A system for communicating over a mobile communications network, the system comprising:
the MME is configured to obtain information whether the two communication devices support D2D communication, determine whether the two communication devices support the same security algorithm, and send communication data to the two communication devices if the two communication devices possess the same security algorithm, where the communication data includes: information on whether the devices of the two parties can perform D2D communication, a security algorithm of the existing mobile communication technology supported by the devices of the two parties, and key material;
the eNB is used for receiving and storing communication data sent by the MME when the two communication party devices are judged to have the same security algorithm, sending the communication data to the two communication party devices, indicating the two communication party devices to establish communication data bearer, generating RNTI and distributing the RNTI to the two communication party devices, wherein the RNTI is used for D2D communication;
the calling party UE is used for sending a communication request to the MME, wherein the communication request contains information about whether D2D communication is supported or not, receiving communication data sent by the MME when the MME judges that the two communication party devices have the same security algorithm, establishing communication data bearer according to the instruction of the eNB, receiving the RNTI distributed by the eNB, and initiating communication to the called party UE by using the selected security algorithm and the key obtained according to the key material;
the called party UE is used for receiving the communication call of the MME, sending information whether the D2D communication is supported or not to the MME, receiving communication data sent by the MME when the MME judges that the two communication party devices have the same security algorithm, establishing communication data bearer according to the instruction of the eNB, receiving the RNTI distributed by the eNB, and responding to the communication initiated by the calling party UE by using the selected security algorithm and the key obtained according to the key material;
and the MME is also used for informing the eNB to finish the communication or selecting the existing mobile communication system to communicate if the owned security algorithms are different.
18. The system of claim 17, wherein the calling and called party devices communicate with an MME and an eNB in four cases:
the calling party equipment and the called party equipment communicate with the same MME and communicate with the same eNB; or,
the calling party equipment and the called party equipment communicate with the same MME but communicate with different eNBs; or,
the calling party equipment and the called party equipment communicate with different MMEs and communicate with different eNBs; or,
the calling party device and the called party device communicate with different MMEs but with the same eNB.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210154986.9A CN102711105B (en) | 2012-05-18 | 2012-05-18 | The method, the Apparatus and system that communicate is carried out by mobile communications network |
PCT/CN2013/073399 WO2013170668A1 (en) | 2012-05-18 | 2013-03-29 | Method, device and system for performing communication through mobile communication network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210154986.9A CN102711105B (en) | 2012-05-18 | 2012-05-18 | The method, the Apparatus and system that communicate is carried out by mobile communications network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102711105A CN102711105A (en) | 2012-10-03 |
CN102711105B true CN102711105B (en) | 2016-03-02 |
Family
ID=46903626
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210154986.9A Active CN102711105B (en) | 2012-05-18 | 2012-05-18 | The method, the Apparatus and system that communicate is carried out by mobile communications network |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN102711105B (en) |
WO (1) | WO2013170668A1 (en) |
Families Citing this family (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102711105B (en) * | 2012-05-18 | 2016-03-02 | 华为技术有限公司 | The method, the Apparatus and system that communicate is carried out by mobile communications network |
GB2506611B (en) * | 2012-10-02 | 2015-07-22 | Broadcom Corp | Direct communication among devices |
CN103731826A (en) * | 2012-10-11 | 2014-04-16 | 中兴通讯股份有限公司 | D2d user equipment authentication method and device |
EP2918134A4 (en) | 2012-11-06 | 2016-07-06 | Nokia Technologies Oy | Method and apparatus for device-to-device communication |
CN104010381B (en) * | 2013-02-25 | 2018-05-11 | 电信科学技术研究院 | A kind of method, equipment and system for establishing direct communication path |
US8989807B2 (en) | 2013-02-28 | 2015-03-24 | Intel Mobile Communications GmbH | Communication terminal device, communication device, communication network server and method for controlling |
WO2014134786A1 (en) * | 2013-03-05 | 2014-09-12 | 华为技术有限公司 | Key interaction method and device |
CN104038920B (en) * | 2013-03-08 | 2018-05-22 | 电信科学技术研究院 | A kind of method of data transmission, system and equipment |
CN104053192B (en) * | 2013-03-12 | 2018-07-03 | 电信科学技术研究院 | A kind of method and apparatus for establishing adjacent communication, system |
CN104053191B (en) * | 2013-03-12 | 2018-03-20 | 电信科学技术研究院 | A kind of method and apparatus for establishing adjacent communication, system |
CN104066194B (en) * | 2013-03-19 | 2018-10-30 | 电信科学技术研究院 | Data transmission scheduling and data transmission method and equipment |
CN104066200B (en) | 2013-03-21 | 2020-11-06 | 北京三星通信技术研究有限公司 | Method for realizing end-to-end communication between UE (user equipment) and user equipment |
KR102039908B1 (en) | 2013-04-01 | 2019-11-04 | 삼성전자주식회사 | Method and apparatus for state transition of device-to-device communications |
CN104113833A (en) * | 2013-04-17 | 2014-10-22 | 中国移动通信集团公司 | Device to device (D2D) configuration method, D2D configuration device and D2D configuration system |
CN103369585B (en) * | 2013-04-24 | 2016-06-08 | 华为技术有限公司 | The method and apparatus quickly setting up D2D communication |
CN104185208B (en) * | 2013-05-20 | 2017-06-20 | 华为终端有限公司 | Close to business authorization method and device, system |
CN104185166B (en) * | 2013-05-20 | 2018-03-09 | 华为终端有限公司 | The method, apparatus and network system of communication |
CN104244443B (en) * | 2013-06-08 | 2017-09-08 | 中国移动通信集团公司 | Terminal-to-terminal service connects method for building up and mobile management entity |
CN104349355B (en) * | 2013-08-02 | 2019-04-02 | 电信科学技术研究院 | A kind of method, system and equipment carrying out data communication |
CN104519550A (en) * | 2013-09-26 | 2015-04-15 | 中兴通讯股份有限公司 | Method, device and system for finding D2D (Device to Device) equipment |
US10212597B2 (en) | 2013-10-30 | 2019-02-19 | Nec Corporation | Apparatus, system and method for secure direct communication in proximity based services |
CN104618903A (en) * | 2013-11-04 | 2015-05-13 | 华为技术有限公司 | Key negotiation processing method and apparatus |
WO2015066864A1 (en) * | 2013-11-06 | 2015-05-14 | Nokia Technologies Oy | Method and apparatus for controlling d2d discovery process |
CN105025478A (en) * | 2014-04-30 | 2015-11-04 | 中兴通讯股份有限公司 | D2D communication safe configuration method, and ProSe key management function entity, terminal and system |
EP3143785B1 (en) | 2014-05-12 | 2018-10-24 | Nokia Technologies Oy | Securing device-to-device communication in a wireless network |
CN105592434A (en) * | 2014-10-23 | 2016-05-18 | 中兴通讯股份有限公司 | Method and device for managing D2D (Device to Device) communication group |
CN110011791B (en) * | 2019-02-18 | 2021-07-09 | 西安电子科技大学 | D2D-based electronic credential secure circulation method and system and electronic credential system |
CN112019489B (en) * | 2019-05-31 | 2022-03-04 | 华为技术有限公司 | Verification method and device |
CN114339818A (en) * | 2020-10-12 | 2022-04-12 | 中国联合网络通信集团有限公司 | Method, device and storage medium for determining base station upgrading |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1622678A (en) * | 2003-11-27 | 2005-06-01 | 皇家飞利浦电子股份有限公司 | Method and apparatus for establishing point-to-point communication between subscriber terminals in different cells |
CN101132617A (en) * | 2006-08-24 | 2008-02-27 | 华为技术有限公司 | Method and system for implementing point-to-point peer communication |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1219407C (en) * | 2002-07-26 | 2005-09-14 | 华为技术有限公司 | Method of wireless link encrypting aglorithm for autonomous selective secret communication |
CN1527621A (en) * | 2003-03-07 | 2004-09-08 | 皇家飞利浦电子股份有限公司 | Method and apparatus for establishing point-to-point coordinate communication in radio communication network |
US9072060B2 (en) * | 2008-06-03 | 2015-06-30 | Nokia Technologies Oy | Method, apparatus and computer program for power control to mitigate interference |
WO2011117677A1 (en) * | 2010-03-24 | 2011-09-29 | Nokia Corporation | Method and apparatus for device-to-device key management |
CN102711105B (en) * | 2012-05-18 | 2016-03-02 | 华为技术有限公司 | The method, the Apparatus and system that communicate is carried out by mobile communications network |
-
2012
- 2012-05-18 CN CN201210154986.9A patent/CN102711105B/en active Active
-
2013
- 2013-03-29 WO PCT/CN2013/073399 patent/WO2013170668A1/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1622678A (en) * | 2003-11-27 | 2005-06-01 | 皇家飞利浦电子股份有限公司 | Method and apparatus for establishing point-to-point communication between subscriber terminals in different cells |
CN101132617A (en) * | 2006-08-24 | 2008-02-27 | 华为技术有限公司 | Method and system for implementing point-to-point peer communication |
Also Published As
Publication number | Publication date |
---|---|
WO2013170668A1 (en) | 2013-11-21 |
CN102711105A (en) | 2012-10-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102711105B (en) | The method, the Apparatus and system that communicate is carried out by mobile communications network | |
CN108886685B (en) | Terminal matching method and device | |
KR101819409B1 (en) | Apparatus, system and method for dual connectivity | |
KR102100159B1 (en) | Security supporting method and system for service discovery and group communication in mobile telecommunication system environment | |
KR101629118B1 (en) | A method and a device of authentication in the converged wireless network | |
US20180255451A1 (en) | Profile Processing Method, Profile Processing Apparatus, User Terminal, and eUICC | |
KR20200018956A (en) | A method and apparatus for 4g and 5g network interworking to support network slicing | |
CN102056157B (en) | Method, system and device for determining keys and ciphertexts | |
KR102094216B1 (en) | Security supporting method and system for proximity based service device to device discovery and communication in mobile telecommunication system environment | |
US20160316362A1 (en) | Location Privacy Protection Method, Apparatus, and System | |
US10263960B2 (en) | Wireless communication system and wireless communication method | |
WO2012112085A1 (en) | Wireless device, registration server and method for provisioning of wireless devices | |
CN104737570A (en) | Method and device of generating a key for device-to-device communication between a first user equipment and a second user equipment | |
TW201637469A (en) | Wireless network fast authentication/association using re-association object | |
KR102416366B1 (en) | Method for configuring and transmitting key | |
US11283770B2 (en) | Deriving a security key for relayed communication | |
KR101739666B1 (en) | Intercepting device-to-device communication | |
CN111641947A (en) | Key configuration method, device and terminal | |
EP3096544A1 (en) | Security method and system for supporting prose group communication or public safety in mobile communication | |
JP2019511154A5 (en) | ||
US11172529B2 (en) | Multi-connectivity establishment method, communication system, user equipment and access point | |
KR20140096955A (en) | Method and apparatus for device to device communication | |
WO2015146825A1 (en) | User equipment and base station | |
JP2015185960A (en) | Mobile station, base station, and method for determining transmission/reception start | |
EP4391614A1 (en) | Communication method, apparatus and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |