CN102857920A - Processing method and device for downlink signal messages by terminal side of LTE (long term evolution) system - Google Patents

Processing method and device for downlink signal messages by terminal side of LTE (long term evolution) system Download PDF

Info

Publication number
CN102857920A
CN102857920A CN2011101822122A CN201110182212A CN102857920A CN 102857920 A CN102857920 A CN 102857920A CN 2011101822122 A CN2011101822122 A CN 2011101822122A CN 201110182212 A CN201110182212 A CN 201110182212A CN 102857920 A CN102857920 A CN 102857920A
Authority
CN
China
Prior art keywords
message
mode command
sublayer
security mode
completeness check
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011101822122A
Other languages
Chinese (zh)
Inventor
陈吕洋
邓江
高攀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Keen (Chongqing) Microelectronics Technology Co., Ltd.
Original Assignee
Chongqing Cyit Communication Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Cyit Communication Technologies Co Ltd filed Critical Chongqing Cyit Communication Technologies Co Ltd
Priority to CN2011101822122A priority Critical patent/CN102857920A/en
Publication of CN102857920A publication Critical patent/CN102857920A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses processing method and device for downlink signal messages by a terminal side of an LTE (long term evolution) system. The processing method includes receiving a downlink signal message of an RLC (radio link control) sub-layer by a PDCP (packet data convergence protocol) sub-layer on an LTE terminal side, and judging the type of the message; decoding the message when the type of the message is an order message in a safety mode to acquire safety parameter configuration, performing integrity verification to the order message in the safety mode according to the safety parameter configuration, and activating safety of an access layer after succeed in integrity verification; and decoding and performing integrity verification to subsequent downlink signal messages all coming from the RLC sub-layer according to the PDCP sub-layer according to the safety parameter configuration. The processing device comprises a message type judging module, a decoding module, an integrity verification module, and a subsequent decrypting and verifying module. Safety of the access layer can be activated timely, rate of analyzing the subsequent signal message is increased, and safety, stability and reliability of the whole system are further increased.

Description

The long evolving system end side is to processing method and the device of downlink signaling message
Technical field
The present invention relates to mobile communication technology, relate in particular in a kind of Long Term Evolution (LTE, Long Term Evolution) system end side to processing method and the device of downlink signaling message.
Background technology
In mobile communication system, portable terminal (UE) and internetwork most of signaling message are highstrung, need to obtain safe, complete protection, i.e. so-called integrity protection.
Wireless access (UTRAN on the global land, Universal Terrestrial Radio Access) network is a kind of brand-new Access Network, universal mobile telecommunications system (UMTS, Universal Mobile Telecommunications System) most important a kind of access way, the scope of application is very wide.E-UTRAN is the evolution Access Network for the UTRAN network, the access technology name that it adopts is called Long Term Evolution (LTE, Long Term Evolution) technology, its protocol infrastructure can be divided into Access Layer (AS) and Non-Access Stratum (NAS) on the whole.Described AS mainly is responsible for the mutual of air interface signaling, improves the transmission of messages service for NAS simultaneously; NAS mainly is responsible for the mutual of core network signalling.In the LTE system, adopt respectively NAS Security Mode Command message and AS Security Mode Command message to activate the integrity protection of signaling message between UE and network, in order to provide complete, complete protection to signaling message mutual between follow-up UE and network.After RRC connection foundation was finished, network can start by sending security mode messages the integrity protection of all Signaling Radio Bearers (SRB), carries out simultaneously the configuration of relevant parameter.
In the LTE system, interface between UE and the E-UTRAN, referred to as air interface (Uu interface), protocol stack is divided into physical layer by its function and task (Layer 1 on the air interface, referred to as L1), data link layer (Layer2, referred to as L2) and 3 layers of network layers (Layer3 is referred to as L3).Usually, the message of network layer on the air interface being transmitted is referred to as L3 message.Data link layer comprises medium access control (MAC, Medium Access Control) sublayer, Radio Link control (RLC, Radio Link Control) sublayer and PDCP (PDCP, Packet Data Convergence Protocol) sublayer, radio resource control (RRC, Radio Resource Control) sublayer belongs to network layer.
In the LTE system, when UE and network carry out Signalling exchange, reception for downlink signaling message, its general process is: be in the UE of connection mode by the Cell Radio Network Temporary Identifier/Identity, Cell-RNTI (C-RNTI of network allocation, Cell Radio Network Temporary Identity) detects Physical Downlink Control Channel (PDCCH, Physical Downlink Control Channel), if receive the downlink transfer indication, then the Transmission Time Interval of UE appointment in PDCCH (TTI, Transmission Time Interval) is gone up downlink data receiving; After physical layer successfully receives the data of specifying on the TTI, its indication is further processed to media access control sublayer, the data block of this moment is called Medium Access Control (MAC) Protocol Data Unit (MAC PDU), and it was submitted to the RLC sublayer by corresponding logic channel with packet after media access control sublayer carried out demultiplexing and removes MAC head; The packet that RLC receives the sublayer is called rlc protocol data cell (RLC PDU), by the parsing to RLC head, if wherein comprise one or more complete PDCP protocol Data Units (PDCP PDU), respectively these PDCP PDU are sent to the PDCP sublayer, for the data that can't form complete PDCP PDU, buffer memory is carried out in the RLC sublayer, is sent to the PDCP sublayer after the data of follow-up reception form a complete PDCP PDU again; For the packet that affirmation mode transmits, RLC passes through the mode of status report to correctly reception and the also correct package number that receives of network-feedback; After PDCP PDU is sent to the PDCP sublayer, if Access Layer fail safe un-activation this moment, then the PDCP sublayer directly is submitted to data content the RRC sublayer, otherwise at first packet is decrypted, then carry out completeness check, after the completeness check success with Packet Generation to the RRC sublayer; ASN.1 decoding is carried out to the packet of receiving in the RRC sublayer, if mistake then abandon this message, otherwise would use the configuration in this signaling message.
The below initiates calling service take the idle pulley UE that is in login state signaling process is the Signalling exchange flow process between example explanation UE and network side.As shown in Figure 1, UE need to finish registration, authentication, identification and NAS fail safe activation before this flow process in network.Afterwards, UE at first sends the RRC connection to network and sets up request (RRC Connection Request) message; Connect the backward network transmission of foundation (RRC Connection Setup) message RRC connection foundation at the RRC that receives network and finish (RRC Connection Setup Complete) message, wherein carry service request (Service Request) message of NAS.Subsequently, network side is by Access Layer safe mode command (Security Mode Command) message activation Access Layer fail safe, and UE returns safe mode to network side and finishes (Security Mode Complete) message after successfully activating; Network side connects reprovision (RRC Connection Reconfiguration) the newly-built Signaling Radio Bearer 2 of message (SRB2) and one or more Data Radio Bearer (DRB) by RRC simultaneously; After UE successfully sets up signaling/Data Radio Bearer, the RRC sublayer of UE is returned RRC connection reprovision to network and is finished (RRC Connection Reconfiguration Complete) message, the NAS sublayer sends bearing resource to network side and distributes request (Bear Resource Allocation Request) message, network returns and activates proprietary EPS bearer context request (Activate Dedicated Bearer Context Request) message, and UE sends and agrees to activate proprietary EPS bearer context (Activate Dedicated Bearer Context Accept) message to network.So far, the signaling process of UE initiation calling service is complete, can carry out the transmission of user data afterwards.
Fig. 2 is the overall interaction figure of Access Layer fail safe activation between UE and network.Referring to Fig. 2; wherein network side is evolved base station (eNB; evolved Node B); at network side; safe mode command (the Security Mode Command) message that is used for the fail safe of activation Access Layer is the downlink signaling message that article one is carried out integrity protection; also be the downlink signaling message that the last item is not encrypted simultaneously; comprising cryptographic algorithm ID; protection algorithm integrallty ID and completeness check code MAC-I; after network side sends this Security Mode Command message, will carry out integrity protection and encryption to all downstream messages of signaling plane and user plane.Hold at UE; need the security parameter configuration in the decoding Security Mode Command message; then this Security Mode Command message is carried out completeness check; verification succeeds then activates the Access Layer fail safe; wherein the decoding of this Security Mode Command message is carried out in the RRC sublayer; completeness check carries out in the PDCP sublayer, and the UE side can be decrypted all downlink datas after successfully activating the Access Layer fail safe, and can carry out integrity protection to all up-downgoing data.After this process is successfully completed; UE side direction network side returns safe mode and finishes (Security Mode Complete) message; this message is only carried out integrity protection, is not encrypted, and all upstream messages after so far are encrypted and integrity protection simultaneously.Network side is finished message to the safe mode of receiving and is carried out completeness check, and all message afterwards are decrypted and completeness check simultaneously.
But, Security Mode Command message is connected reallocation message and probably is handed down to the UE side by network side in same TTI with RRC, when this thing happens, can cause because the Access Layer fail safe activates the problem that the untimely follow-up signaling message that causes can't be resolved, the below is the specific descriptions of this problem.
The UE side Access Layer fail safe activation of Fig. 3 for describing in the existing 3GPP agreement, safe mode command in this process (Security Mode Command) message is connected reprovision (RRC Connection Reconfiguration) message and is issued to UE in same TTI with RRC.The PDCP sublayer is submitted to the RRC sub-layer processes with this message after the Security Mode Command message of receiving from the RLC sublayer, by decode the security parameter configuration in this message of RRC sublayer, then decoded security parameter configuration information is sent to the PDCP sublayer, the PDCP sublayer disposes according to security parameter carries out completeness check to this Security Mode Command message, verification succeeds then activates the fail safe of Access Layer, notify afterwards the Security Mode Command message integrity check success of RRC sublayer, Security Mode Complete message is returned in the RRC sublayer to the PDCP sublayer, and sends to network side according to the hierarchical relationship of air interface.
When Security Mode Command message and RRC Connection Reconfiguration message are sent to UE by same TTI, although Security Mode Command message comes before the RRCConnection Reconfiguration message, but the interval of these two message is very short, carries out alternately to activate the used time much shorter of Access Layer fail safe than above-mentioned PDCP sublayer and RRC sublayer.The PDCP sublayer is after passing to the RRC sublayer with Security Mode Command message; can begin immediately to process RRC Connection Reconfiguration message; this moment is toward the fail safe of contact un-activation Access Layer; PDCP will not be decrypted and completeness check RRC Connection Reconfiguration message; directly send to the RRC sub-layer processes; but owing to this message encipherment protection; RRC can't correctly decode to it; can not carry out the foundation of SRB2 and DRB; need to wait for that network resends the resource bid flow process of RRC Connection Reconfiguration message ability triggering following; so both wasted interface-free resources; prolonged again the stand-by period that can carry out user data transmission; if network side does not carry out the re-transmission of RRC Connection Reconfiguration message; to directly cause the failure of Client-initiated calling service, reduce user's experience.
In a word, because deciphering and completeness check to descending RRC signaling message in the existing processing method are to finish in the PDCP sublayer, and the decoding of RRC signaling message and configuration are by finishing the RRC sublayer, can cause in time to activate the Access Layer fail safe the not high problem of follow-up downlink signaling message parse success rate.Especially, when Security Mode Command message and RRC Connection Reconfiguration message are sent to UE by same TTI, then can cause the PDCP sublayer before Access Layer fail safe un-activation, just to process RRC Connection Reconfiguration message, can't be correctly decoded when causing RRC Connection Reconfiguration message that follow-up RRC sub-layer processes do not decipher, can not correctly set up SRB2, DRB and triggering resource bid process, and the time that causes can carrying out between UE and network the professional transmission of normal data is delayed or this service request is lost, and has finally affected the fail safe of whole system, stability and reliability.
Summary of the invention
Main purpose of the present invention provides a kind of LTE system terminal side to processing method and the device of downlink signaling message, thereby realizes in time activating the Access Layer fail safe, improves the probability that follow-up signaling message is successfully resolved.
Technical scheme of the present invention is achieved in that
A kind of Long Term Evolution LTE system terminal side comprises the processing method of downlink signaling message:
After the downlink signaling message of Radio Link control RLC sublayer is received in the PDCP PDCP sublayer of LTE end side, judge the type of this message; When the type of this message is Security Mode Command message, this message is decoded to obtain the security parameter configuration, according to this security parameter configuration this Security Mode Command message is carried out completeness check, activate the fail safe of Access Layer after the completeness check success; Described PDCP sublayer is decrypted and completeness check follow-up all downlink signaling message from the RLC sublayer according to described security parameter configuration afterwards.
Preferably, the method further comprises: described PDCP sublayer sends to radio resource control RRC sub-layer processes with described Security Mode Command message after activating the fail safe of Access Layer; After described RRC receives this Security Mode Command message in the sublayer; the direct-assembling safe mode is finished message feedback to the PDCP sublayer; the PDCP sublayer to this safe mode finish message be encrypted with integrity protection after, send to network side according to the residue hierarchical relationship of air interface.
Preferably, the method further comprises: when described PDCP sublayer is judged the downlink signaling message that receives and is not Security Mode Command message, then this message directly is transmitted to the RRC sub-layer processes.
Preferably, when the PDCP sublayer is failed to the completeness check of described Security Mode Command message, then abandon the security parameter configuration that from this Security Mode Command message, decodes, and abandon this Security Mode Command message, return the safe mode failed message to network side.
Preferably, if the PDCP sublayer to the failure of the completeness check of described Security Mode Command message, then the Access Layer of described end side further abandons all and encrypts downlink signaling message with complete preservation from network side.
Preferably, the Access Layer of end side resends the described downlink signaling message that has abandoned by described safe mode failed message informing network side.
Preferably, after the fail safe that activates Access Layer, described PDCP sublayer is no longer judged its type the downlink signaling message that receives.
Preferably, comprise that with the downlink signaling message that described Security Mode Command message issues RRC is connected reallocation message in same Transmission Time Interval, described PDCP sublayer is after receiving that this RRC connects reallocation message, according to described security parameter configuration this message is decrypted and completeness check, sends to afterwards the RRC sub-layer processes.
A kind of LTE system terminal side is to the processing unit of downlink signaling message, comprise the type of message judge module, decoder module, integrity verification module and the deciphering of follow-up signaling and the correction verification module that are arranged on the PDCP sublayer, wherein: described type of message judge module is used for after the downlink signaling message of RLC sublayer is received in the PDCP sublayer, judge the type of this message, when the type of this message is Security Mode Command message, pass to decoder module and process; Described decoder module is used for described Security Mode Command message is decoded to obtain the security parameter configuration; Described integrity verification module is used for according to the described security parameter configuration that decodes described Security Mode Command message being carried out completeness check, activates the fail safe of Access Layer after the completeness check success; Described follow-up signaling deciphering and correction verification module are used for after activating the Access Layer fail safe, according to described security parameter configuration follow-up all downlink signaling message from the RLC sublayer are decrypted and completeness check.
Preferably, this processing unit further comprises the safe mode command feedback module that is arranged on the RRC sublayer and the encryption and the integrity protection module that are arranged on the PDCP sublayer;
Described integrity verification module is further used for the notice of described Security Mode Command message and completeness check success thereof being sent to the safe mode command feedback module of radio resource control RRC sublayer after the fail safe that activates Access Layer; If the failure of the completeness check of described Security Mode Command message then further sends the notice of Security Mode Command message completeness check failure to described safe mode feedback module;
Described safe mode command feedback module is used for after the notice of receiving Security Mode Command message and completeness check success, and the direct-assembling safe mode is finished message feedback to encryption and the integrity protection module of PDCP sublayer; After the notice of receiving the failure of Security Mode Command message completeness check, assembling safe mode failed message returns to the PDCP sublayer, and notice PDCP sublayer is not encrypted with integrity protection this safe mode failed message and directly sends to the RLC sublayer;
Described encryption and integrity protection module be used for to described safe mode finish message be encrypted with integrity protection after, send to the RLC sublayer.
Compared with prior art, because the inventive method is by the type to all downlink signaling message checks in the PDCP sublayer, when receiving Security Mode Command message, this message is carried out completeness check, activate the Access Layer fail safe after the verification succeeds, and this Security Mode Command message is sent to RRC, then the PDCP sublayer is decrypted and completeness check follow-up all signaling messages.So just guaranteed that the Access Layer fail safe can in time activate, subsequent message has been carried out safeguard protection, effectively avoided to resolve problem because the Access Layer fail safe activates the untimely follow-up signaling message that causes.Especially when Security Mode Command message and RRC Connection Reconfiguration message when same TTI is handed down to UE, can guarantee that the UE end activates first the Access Layer fail safe, process again RRC Connection Reconfiguration message, avoid RRC Connection Reconfiguration message can't be correctly decoded the foundation that affects UE and internetwork data service carrying owing to not deciphering, guarantee that the fail safe of UE side Access Layer can in time be activated, correctly subsequent message is decrypted and completeness check, has greatly improved the fail safe of whole system, stability and reliability.
Description of drawings
Fig. 1 is UE and internetwork Signalling exchange schematic flow sheet in the calling service process;
Fig. 2 is the overall interaction figure of Access Layer fail safe activation between UE and network;
Fig. 3 is for having the schematic diagram of the UE side Access Layer fail safe activation of describing in the 3GPP agreement now;
Fig. 4 is that LTE system terminal side of the present invention is to the process chart of downlink signaling message;
Fig. 5 is a kind of schematic diagram of UE side Access Layer fail safe activation after the use method of the present invention;
Fig. 6 is that LTE system terminal side of the present invention is to the schematic diagram of the processing unit of downlink signaling message.
Embodiment
The present invention is further described in more detail below in conjunction with drawings and the specific embodiments.
Fig. 4 is that LTE system terminal side of the present invention is to the process chart of downlink signaling message.Referring to Fig. 4, core technology scheme of the present invention comprises:
After the downlink signaling message of RLC sublayer is received in the PDCP sublayer of step 401, LTE end side, judge the type of this message; Execution in step 402 when the type of this message is Security Mode Command message, otherwise execution in step 405.
The security parameter configuration is decoded to obtain to this Security Mode Command message in step 402, PDCP sublayer.
Step 403, PDCP sublayer are carried out completeness check according to described security parameter configuration to this Security Mode Command message, activate the fail safe of Access Layer after the completeness check success.
Step 404, described PDCP sublayer is decrypted and completeness check follow-up all downlink signaling message from the RLC sublayer according to described security parameter configuration afterwards.
Step 405, PDCP sublayer send to the RRC sublayer with this downlink signaling message and process with existing method.
As a kind of execution mode; in the above-mentioned steps 403; if the PDCP sublayer is to the completeness check failure of described Security Mode Command message; in time activated terminals side Access Layer fail safe; and then can't carry out completeness check and deciphering to downlink signaling message, cause the Access Layer of described end side to encrypt downlink signaling message with integrity protection because the source codec mistake abandons all from network side.In such cases, end side can abandon the security parameter configuration that decodes from this Security Mode Command message, and abandons this Security Mode Command message, returns this safe mode failed message to network side.As execution mode further, if the failure of the completeness check of described Security Mode Command message, then the Access Layer of described end side further abandons all and encrypts downlink signaling message with complete preservation from network side.Further, the Access Layer of end side resends the described downlink signaling message that has abandoned by safe mode failed message informing network side.
Described PDCP sublayer sends to the RRC sub-layer processes with described Security Mode Command message after activating the fail safe of Access Layer; After described RRC receives this Security Mode Command message in the sublayer; the direct-assembling safe mode is finished message feedback to the PDCP sublayer; the PDCP sublayer to this safe mode finish message be encrypted with integrity protection after, send to network side according to the residue hierarchical relationship of air interface.
Fig. 5 is the schematic diagram of UE side Access Layer fail safe activation after the use method of the present invention, and this process has guaranteed that the Access Layer fail safe can in time activate before processing RRC Connection Reconfiguration message.Referring to Fig. 5, processing method of the present invention comprises following flow process:
Step 501, RRC connect be successfully established after, network side sends Security Mode Command message and RRC Connection Reconfiguration message to the UE side in same TTI; The physical layer of UE side is resolved to the data of this TTI and reports media access control sublayer.
Step 502, media access control sublayer report RLC sublayer corresponding to SRB1 with the data RLC PDU that is resolved to.
Step 503, the RLC sublayer that SRB1 is corresponding send to PDCP sublayer corresponding to SRB1 with data group bag PDCP PDU.
Step 504~step 505; front 5 bits (BIT) of each the bar downlink signaling message that receives are resolved in the PDCP sublayer that SRB1 is corresponding; judge the type of this message according to this bit information; if be Security Mode Command message; then Security Mode Command message is carried out the ASN decoding; obtain the Access Layer security parameter configuration of disposing in the message; comprise cryptographic algorithm; protection algorithm integrallty and integrity protection check code; calculate the Access Layer security key according to the algorithm that parses afterwards; according to this security key and integrity protection check code Security Mode Command message is separated completeness check again; if completeness check success; then preserve the encryption that parses; protection algorithm integrallty and key are used for the deciphering of subsequent message and conciliate integrity protection; this moment, the PDCP sublayer judged that the cryptographic integrity function of access layer information starts; namely activated the Access Layer fail safe; described Security Mode Command message is sent to the RRC sub-layer processes, and notice RRC sublayer Access Layer fail safe activates.If the PDCP sublayer is to the completeness check failure of Security Mode Command message, then abandon the security parameter configuration that from this Security Mode Command message, decodes, and abandon this Security Mode Command message, the completeness check failure of notice RRC sublayer, RRC sublayer assembling safe mode failure (Security Mode Failure) message informing network side resends this Security Mode Command message.Further, if the completeness check failure to Security Mode Command message, then the Access Layer of described end side can abandon all from network side encrypt downlink signaling message with completeness check, and further resend corresponding downlink signaling message by Security Mode Failure message informing network side.
In step 504, if described PDCP sublayer judges that according to front 5 bit informations of described downlink signaling message this message is not Security Mode Command message, then directly this signaling message is transmitted to RRC, processed according to the prior art scheme by RRC.
Step 506~step 507, PDCP sublayer use algorithm and the key preserved that the RRC connection Reconfigration message that receives is decrypted and completeness check, if correctly then this message is sent to the RRC sublayer.
After Security Mode Command message from the PDCP sublayer is received in described RRC sublayer, carry out subsequent step 508 to 512; After RRC Connection Reconfiguration message from the PDCP sublayer is received in described RRC sublayer, carry out subsequent step 513 to 520.
Step 508~step 512; after RRC receives the sublayer Security Mode Command message from the PDCP sublayer; and learn that the Access Layer fail safe activates; then the response command of direct-assembling Security Mode Command message is that safe mode is finished (Security Mode Complete) message feedback to the PDCP sublayer; the PDCP sublayer to this safe mode finish message be encrypted with integrity protection after; residue hierarchical relationship according to air interface sends to network side; namely first this message is packaged into PDCPPDU to the RLC sublayer; the RLC sublayer is packaged into RLC PDU again to media access control sublayer, reports network side by media access control sublayer by physical layer afterwards.
Step 513~step 520; after RRC receives the sublayer RRC Connection Reconfiguration message from the PDCP sublayer; this message is resolved; set up the PDCP/RLC example according to the configuration of message; simultaneously MAC and physical layer are configured; set up signaling/Data Radio Bearer; assemble at last RRC connection reprovision and finish (RRC Connection Reconfiguration Complete) message feedback to the PDCP sublayer; the PDCP sublayer to this RRC connect reprovision finish message be encrypted with integrity protection after; residue hierarchical relationship according to air interface sends to network side; namely first this message is packaged into PDCPPDU to the RLC sublayer; the RLC sublayer is packaged into RLC PDU again to media access control sublayer, reports network side by media access control sublayer by physical layer afterwards.
Among this embodiment, although described Security Mode Command message and RRC connection Reconfigration message are handed down to the UE side in same TTI, but Security Mode Command message always comes before the RRC connection Reconfigration message, and the speed of PDCP sub-layer processes step 504 is very fast, thereby guaranteed the in time fail safe of activation Access Layer before processing RRCconnection Reconfigration message of PDCP sublayer, and then in time RRC connection Reconfigration message is correctly decoded, guarantee the follow-up SRB2 that successfully sets up, DRB and triggering resource bid process, the fail safe that has improved whole system, stability and reliability.
Corresponding with Fig. 4 and the described method of Fig. 5, the invention also discloses a kind of LTE system terminal side to the processing unit of downlink signaling message, referring to Fig. 6, this device comprises type of message judge module 601, decoder module 602, integrity verification module 603 and the deciphering of follow-up signaling and the correction verification module 604 that is arranged on the PDCP sublayer.Wherein:
Type of message judge module 601 is used for judging the type of this message after the downlink signaling message of RLC sublayer is received in the PDCP sublayer, passes to decoder module and process when the type of this message is Security Mode Command message.
Decoder module 602 is used for described Security Mode Command message is decoded to obtain the security parameter configuration.
Integrity verification module 603 is used for according to the described security parameter configuration that decodes described Security Mode Command message being carried out completeness check, activates the fail safe of Access Layer after the completeness check success.
Follow-up signaling deciphering and correction verification module 604 are used for after activating the Access Layer fail safe, according to described security parameter configuration follow-up all downlink signaling message from the RLC sublayer are decrypted and completeness check.
In further execution mode, this processing unit further comprises the safe mode command feedback module 605 that is arranged on the RRC sublayer and encryption and the integrity protection module 606 that is arranged on the PDCP sublayer;
Described integrity verification module 603 is further used for the notice of described Security Mode Command message and completeness check success thereof being sent to the safe mode command feedback module 605 of radio resource control RRC sublayer after the fail safe that activates Access Layer; If the failure of the completeness check of 603 pairs of described Security Mode Command message of integrity verification module then further sends the notice of Security Mode Command message completeness check failure to described safe mode feedback module 605.
Described safe mode command feedback module 605 is used for after the notice of receiving Security Mode Command message and completeness check success thereof, and the direct-assembling safe mode is finished message feedback to encryption and the integrity protection module 606 of PDCP sublayer; After the notice of receiving the failure of Security Mode Command message completeness check; assembling safe mode failed message returns to the PDCP sublayer; and notice PDCP sublayer is not encrypted with integrity protection this safe mode failed message and directly sends to the RLC sublayer, and returns to network side through remaining hierarchical relationship.
Described encryption and integrity protection module 606 be used for to described safe mode finish message be encrypted with integrity protection after, send to the RLC sublayer, and return to network side through remaining hierarchical relationship.
The above only is preferred embodiment of the present invention, and is in order to limit the present invention, within the spirit and principles in the present invention not all, any modification of making, is equal to replacement, improvement etc., all should be included within the scope of protection of the invention.

Claims (10)

1. a Long Term Evolution LTE system terminal side is characterized in that the processing method of downlink signaling message, comprising:
After the downlink signaling message of Radio Link control RLC sublayer is received in the PDCP PDCP sublayer of LTE end side, judge the type of this message; When the type of this message is Security Mode Command message, this message is decoded to obtain the security parameter configuration, according to this security parameter configuration this Security Mode Command message is carried out completeness check, activate the fail safe of Access Layer after the completeness check success; Described PDCP sublayer is decrypted and completeness check follow-up all downlink signaling message from the RLC sublayer according to described security parameter configuration afterwards.
2. method according to claim 1 is characterized in that, the method further comprises: described PDCP sublayer sends to radio resource control RRC sub-layer processes with described Security Mode Command message after activating the fail safe of Access Layer; After described RRC receives this Security Mode Command message in the sublayer; the direct-assembling safe mode is finished message feedback to the PDCP sublayer; the PDCP sublayer to this safe mode finish message be encrypted with integrity protection after, send to network side according to the residue hierarchical relationship of air interface.
3. method according to claim 1 is characterized in that, the method further comprises: when described PDCP sublayer is judged the downlink signaling message that receives and is not Security Mode Command message, then this message directly is transmitted to the RRC sub-layer processes.
4. method according to claim 1, it is characterized in that, when the PDCP sublayer is failed to the completeness check of described Security Mode Command message, then abandon the security parameter configuration that from this Security Mode Command message, decodes, and abandon this Security Mode Command message, return the safe mode failed message to network side.
5. method according to claim 4; it is characterized in that; if the PDCP sublayer is to the failure of the completeness check of described Security Mode Command message, then the Access Layer of described end side further abandons all and encrypts downlink signaling message with complete preservation from network side.
6. method according to claim 5 is characterized in that, the Access Layer of end side resends the described downlink signaling message that has abandoned by described safe mode failed message informing network side.
7. according to claim 1 to 6 each described methods, it is characterized in that after the fail safe that activates Access Layer, described PDCP sublayer is no longer judged its type the downlink signaling message that receives.
8. method according to claim 1, it is characterized in that, comprise that with the downlink signaling message that described Security Mode Command message issues RRC is connected reallocation message in same Transmission Time Interval, described PDCP sublayer is after receiving that this RRC connects reallocation message, according to described security parameter configuration this message is decrypted and completeness check, sends to afterwards the RRC sub-layer processes.
9. a LTE system terminal side is characterized in that the processing unit of downlink signaling message, comprises the type of message judge module, decoder module, integrity verification module and the deciphering of follow-up signaling and the correction verification module that are arranged on the PDCP sublayer, wherein:
Described type of message judge module is used for judging the type of this message after the downlink signaling message of RLC sublayer is received in the PDCP sublayer, passes to decoder module and process when the type of this message is Security Mode Command message;
Described decoder module is used for described Security Mode Command message is decoded to obtain the security parameter configuration;
Described integrity verification module is used for according to the described security parameter configuration that decodes described Security Mode Command message being carried out completeness check, activates the fail safe of Access Layer after the completeness check success;
Described follow-up signaling deciphering and correction verification module are used for after activating the Access Layer fail safe, according to described security parameter configuration follow-up all downlink signaling message from the RLC sublayer are decrypted and completeness check.
10. processing unit according to claim 9 is characterized in that, this processing unit further comprises the safe mode command feedback module that is arranged on the RRC sublayer and is arranged on encryption and the integrity protection module of PDCP sublayer;
Described integrity verification module is further used for the notice of described Security Mode Command message and completeness check success thereof being sent to the safe mode command feedback module of radio resource control RRC sublayer after the fail safe that activates Access Layer; If the failure of the completeness check of described Security Mode Command message then further sends the notice of Security Mode Command message completeness check failure to described safe mode feedback module;
Described safe mode command feedback module is used for after the notice of receiving Security Mode Command message and completeness check success, and the direct-assembling safe mode is finished message feedback to encryption and the integrity protection module of PDCP sublayer; After the notice of receiving the failure of Security Mode Command message completeness check, assembling safe mode failed message returns to the PDCP sublayer, and notice PDCP sublayer is not encrypted with integrity protection this safe mode failed message and directly sends to the RLC sublayer;
Described encryption and integrity protection module be used for to described safe mode finish message be encrypted with integrity protection after, send to the RLC sublayer.
CN2011101822122A 2011-06-30 2011-06-30 Processing method and device for downlink signal messages by terminal side of LTE (long term evolution) system Pending CN102857920A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011101822122A CN102857920A (en) 2011-06-30 2011-06-30 Processing method and device for downlink signal messages by terminal side of LTE (long term evolution) system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011101822122A CN102857920A (en) 2011-06-30 2011-06-30 Processing method and device for downlink signal messages by terminal side of LTE (long term evolution) system

Publications (1)

Publication Number Publication Date
CN102857920A true CN102857920A (en) 2013-01-02

Family

ID=47404040

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011101822122A Pending CN102857920A (en) 2011-06-30 2011-06-30 Processing method and device for downlink signal messages by terminal side of LTE (long term evolution) system

Country Status (1)

Country Link
CN (1) CN102857920A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105873038A (en) * 2016-06-07 2016-08-17 武汉邮电科学研究院 Method for safely processing LTE (Long Term Evolution) base station user plane data
CN107592620A (en) * 2017-08-31 2018-01-16 努比亚技术有限公司 A kind of method, terminal and the computer-readable recording medium of network signal interaction
CN108738084A (en) * 2017-04-18 2018-11-02 华为技术有限公司 Communication means and equipment
CN109150415A (en) * 2017-06-15 2019-01-04 夏普株式会社 Base station, user equipment and correlation technique
CN109691168A (en) * 2016-09-30 2019-04-26 华为技术有限公司 A kind of method, equipment and system handling control signaling
CN110677853A (en) * 2019-09-06 2020-01-10 京信通信系统(中国)有限公司 Signaling processing method, device, base station equipment and storage medium
WO2021239075A1 (en) * 2020-05-29 2021-12-02 维沃移动通信有限公司 Method and apparatus for processing downlink data, and terminal
CN115866588A (en) * 2023-03-02 2023-03-28 四川创智联恒科技有限公司 Method for concurrently transmitting safety activation message
WO2023174044A1 (en) * 2022-03-17 2023-09-21 华为技术有限公司 Communication method and apparatus

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070265875A1 (en) * 2006-05-10 2007-11-15 Innovative Sonic Limited Method and apparatus for setting ciphering activation time in a wireless communications system
CN101473668A (en) * 2006-06-19 2009-07-01 交互数字技术公司 Method and apparatus for security protection of an original user identity in an initial signaling message
CN101483516A (en) * 2008-01-07 2009-07-15 华为技术有限公司 Security control method and system thereof

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070265875A1 (en) * 2006-05-10 2007-11-15 Innovative Sonic Limited Method and apparatus for setting ciphering activation time in a wireless communications system
CN101473668A (en) * 2006-06-19 2009-07-01 交互数字技术公司 Method and apparatus for security protection of an original user identity in an initial signaling message
CN101483516A (en) * 2008-01-07 2009-07-15 华为技术有限公司 Security control method and system thereof

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ALCATEL-LUCENT: "《TSG-RAN WG2 Meeting #59 R2-073467》", 24 August 2007 *
宋健霖等: "LTE 系统中接入层加密和完整性保护研究", 《广西通信技术》 *

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105873038A (en) * 2016-06-07 2016-08-17 武汉邮电科学研究院 Method for safely processing LTE (Long Term Evolution) base station user plane data
CN109691168A (en) * 2016-09-30 2019-04-26 华为技术有限公司 A kind of method, equipment and system handling control signaling
CN109691168B (en) * 2016-09-30 2020-10-23 华为技术有限公司 Method, equipment and system for processing control signaling
US11206538B2 (en) 2016-09-30 2021-12-21 Huawei Technologies Co., Ltd. Control signaling processing method, device, and system
CN108738084A (en) * 2017-04-18 2018-11-02 华为技术有限公司 Communication means and equipment
CN108738084B (en) * 2017-04-18 2020-09-18 华为技术有限公司 Communication method and device
US11388626B2 (en) 2017-06-15 2022-07-12 Sharp Kabushiki Kaisha Base station, user equipment, and related method
CN109150415A (en) * 2017-06-15 2019-01-04 夏普株式会社 Base station, user equipment and correlation technique
CN107592620A (en) * 2017-08-31 2018-01-16 努比亚技术有限公司 A kind of method, terminal and the computer-readable recording medium of network signal interaction
CN110677853A (en) * 2019-09-06 2020-01-10 京信通信系统(中国)有限公司 Signaling processing method, device, base station equipment and storage medium
CN110677853B (en) * 2019-09-06 2023-04-11 京信网络系统股份有限公司 Signaling processing method, device, base station equipment and storage medium
WO2021239075A1 (en) * 2020-05-29 2021-12-02 维沃移动通信有限公司 Method and apparatus for processing downlink data, and terminal
CN113747427A (en) * 2020-05-29 2021-12-03 维沃移动通信有限公司 Downlink data processing method and device and terminal
CN113747427B (en) * 2020-05-29 2023-12-12 维沃移动通信有限公司 Method, device, terminal and storage medium for processing downlink data
WO2023174044A1 (en) * 2022-03-17 2023-09-21 华为技术有限公司 Communication method and apparatus
CN115866588A (en) * 2023-03-02 2023-03-28 四川创智联恒科技有限公司 Method for concurrently transmitting safety activation message
CN115866588B (en) * 2023-03-02 2023-05-19 四川创智联恒科技有限公司 Safe activation message concurrency method

Similar Documents

Publication Publication Date Title
CN102857920A (en) Processing method and device for downlink signal messages by terminal side of LTE (long term evolution) system
CN110999523A (en) Method and user equipment for reconnecting a radio resource control connection with a radio access network node
TWI332345B (en) Security considerations for the lte of umts
KR101583231B1 (en) Methods and apparatuses for enabling non-access stratum(nas) security in lte mobile units
CN103875196A (en) Method and apparatus for supporting multiple frequency bands efficiently in mobile communication system
US8995664B2 (en) Security in wireless communication system and device
US20080120728A1 (en) Method and apparatus for performing integrity protection in a wireless communications system
CN101483516A (en) Security control method and system thereof
CN102264065A (en) Method and system for synchronizing access stratum security algorithms
CN101867931B (en) Device and method for realizing non access stratum in wireless communication system
RU2573745C2 (en) Method, system and related device for gsm security
TWI452887B (en) Method and apparatus for performing ciphering in a wireless communications system
US20220345883A1 (en) Security key updates in dual connectivity
CN101790168A (en) Method for commanding initial security modes of network attached storage (NAS) and automatic scanning (AS)
US11546887B2 (en) Information transmission method and apparatus, and computer storage medium
CN116783986A (en) Method and device for data transmission processing
CN104468020B (en) Processing method, sending ending equipment and the receiving device of voice mistake
CN108243144B (en) Method for optimizing AS security mode process in L TE system
CN113692778A (en) Restoring radio connections in a communication network
US11057947B2 (en) Radio network temporary identifier generation
CN113302959A (en) Data transmission method and device
WO2019140983A1 (en) Information indication method and apparatus, and computer storage medium
US20240022358A1 (en) Managing harq transmissions in multicast communication
WO2023211976A1 (en) Managing harq transmissions in multicast communication
CN115866588A (en) Method for concurrently transmitting safety activation message

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20170426

Address after: Nanping Street 400060 Chongqing Nan'an District Nancheng Road No. 199 left attached to the floor 403

Applicant after: Keen (Chongqing) Microelectronics Technology Co., Ltd.

Address before: 400065 Chongqing Nan'an District huangjuezhen pass Fort Park No. 1

Applicant before: Chongqing City Communication & Technology Co., Ltd.

TA01 Transfer of patent application right
RJ01 Rejection of invention patent application after publication

Application publication date: 20130102

RJ01 Rejection of invention patent application after publication