CN103379663A - Method and system for rebuilding connection - Google Patents

Method and system for rebuilding connection Download PDF

Info

Publication number
CN103379663A
CN103379663A CN2012101226311A CN201210122631A CN103379663A CN 103379663 A CN103379663 A CN 103379663A CN 2012101226311 A CN2012101226311 A CN 2012101226311A CN 201210122631 A CN201210122631 A CN 201210122631A CN 103379663 A CN103379663 A CN 103379663A
Authority
CN
China
Prior art keywords
base station
message
connection
safety detection
establishment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012101226311A
Other languages
Chinese (zh)
Other versions
CN103379663B (en
Inventor
张�荣
孙伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kunshan Lucky Jinfu Photoelectronic Scien Tech Co ltd
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201210122631.1A priority Critical patent/CN103379663B/en
Priority to PCT/CN2013/074215 priority patent/WO2013159660A1/en
Publication of CN103379663A publication Critical patent/CN103379663A/en
Application granted granted Critical
Publication of CN103379663B publication Critical patent/CN103379663B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0055Transmission or use of information for re-establishing the radio link
    • H04W36/0079Transmission or use of information for re-establishing the radio link in case of hand-off failure or rejection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/08Reselecting an access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/19Connection re-establishment

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method and system for rebuilding connection. The method comprises the steps that a second base station receives connection rebuilding completing information from UE after a first base station of the UE fails to be switched to the second base station; the second base station conducts primary safety detection on the received connection rebuilding completing information; under the situation that the connection rebuilding completing information does not pass the primary safety detection, the second base station conducts secondary safety detection on the connection rebuilding completing information by the using of safety parameters of the first base station; after the connection rebuilding completing information passes the secondary safety detection, the connection between the second base station and the UE is built. By means of the technical scheme, the problem that in the correlative technology, due to the fact that the safety parameters of a source station and a target station are not the same, the safety detection on the connection rebuilding completing information does not pass is solved, and thus the success rate of the connection rebuilding of the UE is improved.

Description

Rebulid the method and system of connection
Technical field
The present invention relates to the communications field, in particular to a kind of method and system that rebulid connection.
Background technology
In mobile radio system, subscriber equipment in the movement (User Equipment, referred to as UE) can trigger and switch, switching type can be that the interior switching of wireless access type (RadioAccess Type is referred to as RAT) also can be to switch between RAT.Can there be handoff failure in UE owing to a variety of causes in handoff procedure, UE can rebulid Radio Resource control (Radio Resource Control behind the handoff failure, referred to as RRC) connect, UE can be chosen in the source station and rebulid the RRC connection or carry out the RRC connection at Target Station.
In correlation technique; the rear UE of UE side failure will roll back to the configuration of source station in the handoff procedure; if UE decision-making this moment is initiated RRC at Target Station and is re-established; Target Station is finished message in the RRC connection re-establishment that receives UE; and this message carried out safety detection (for example integrity detection and encryption detect); what this moment, UE used is the security parameter (complete preservation and cryptographic algorithm) of source station; if the security parameter of source station and Target Station (integrity protection and encipherment protection algorithm parameter) is inconsistent; will cause the Target Station safety detection that message is finished in connection re-establishment to RRC not passed through; therefore the RRC that has refused UE re-establishes request, causes the failure that re-establishes the connection.
For the problems referred to above in the correlation technique, effective solution is proposed not yet at present.
Summary of the invention
In correlation technique, what cause owing to the security parameter of source station and Target Station is inconsistent finishes message safety to connection re-establishment and detects and the problem such as not pass through, and the invention provides a kind of method and system that rebulid connection, to address the above problem at least.
According to an aspect of the present invention, provide a kind of method that rebulids connection, having comprised: subscriber equipment (UE) was switched to the failure of the second base station by the first base station after, the second base station received the connection re-establishment that comes from described UE and finishes message; The second base station is finished message to the connection re-establishment that receives and is carried out first safety detection; In the unsanctioned situation of safety detection first, the second base station uses the security parameter of the first base station that message is finished in connection re-establishment again to carry out safety detection; After safety detection is passed through again, set up the second base station and be connected the connection of UE.
Set up described the second base station and be connected after the connection of UE, also comprise: the second base station sends reconfiguration message to described UE, and wherein, described reconfiguration message is used for the security parameter of described the second base station is disposed to described UE; The second base station is carried out safety detection according to the security parameter of described the second base station to the message that comes from described UE.
The second base station is finished message to the described connection re-establishment that receives and carried out first safety detection, comprising: the second base station utilizes the security parameter of described the second base station that message is finished in described connection re-establishment to carry out first safety detection.
Before UE switches to the second base station by the first base station, also comprise: the second base station receives the handover request message that comes from described the first base station, and wherein, described handover request message carries the security parameter of described the first base station.
Above-mentioned security parameter comprises: integrity protection and cryptographic algorithm parameter.
Said method is applied to one of following handoff procedure: handoff procedure between X2 handoff procedure, S1 handoff procedure, wireless access type RAT.
According to a further aspect in the invention, a kind of system that rebulids connection is provided, comprise: the first base station and the second base station, the second base station comprises: receiver module, be used for subscriber equipment (UE) is switched to the failure of the second base station by the first base station after, receiving the connection re-establishment that comes from UE and finishing message; Detection module is used for that message is finished in the connection re-establishment that receives and carries out first safety detection, and in the unsanctioned situation of safety detection first, uses the security parameter of the first base station that message is finished in connection re-establishment and again carries out safety detection; Connect and to set up module, be used for after safety detection is passed through again, set up the second base station and be connected connection with UE.
Above-mentioned the second base station also comprises: sending module, be used for sending reconfiguration message to described UE, and wherein, described reconfiguration message is used for the security parameter of described the second base station is disposed to described UE;
Above-mentioned detection module also is used for according to the security parameter of described the second base station the message that comes from described UE being carried out safety detection.
Above-mentioned receiver module also is used for receiving the handover request message that comes from described the first base station, and wherein, described handover request message carries the security parameter of described the first base station.
Above-mentioned security parameter comprises: integrity protection and cryptographic algorithm parameter.
Said system is applied to one of following handoff procedure: handoff procedure between X2 handoff procedure, S1 handoff procedure, wireless access type RAT.
By the present invention, employing is UE is switched to the failure of the second base station by the first base station after, connection re-establishment is finished message first in the obstructed situation of safety detection, utilize the security parameter of the first base station that the technological means that message detects is again finished in connection re-establishment, solved in the correlation technique, what cause owing to the security parameter of source station and Target Station is inconsistent finishes message safety to connection re-establishment and detects and the problem such as not pass through, thereby has improved the success rate that UE re-establishes the connection.
Description of drawings
Accompanying drawing described herein is used to provide a further understanding of the present invention, consists of the application's a part, and illustrative examples of the present invention and explanation thereof are used for explaining the present invention, do not consist of improper restriction of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart according to the method that rebulids connection of the embodiment of the invention;
Fig. 2 is the structured flowchart according to the system that rebulids connection of the embodiment of the invention;
Fig. 3 is for rebuliding according to the preferred embodiment of the invention the structural representation of the system of connection.
Embodiment
Hereinafter also describe in conjunction with the embodiments the present invention in detail with reference to accompanying drawing.Need to prove that in the situation of not conflicting, embodiment and the feature among the embodiment among the application can make up mutually.
Fig. 1 is the flow chart according to the method that rebulids connection of the embodiment of the invention.As shown in Figure 1, the method comprises:
Step S102, UE was switched to the failure of the second base station by the first base station after, the second base station received the connection re-establishment that comes from described UE and finishes message;
Step S104, the second base station is finished message to the connection re-establishment that receives and is carried out first safety detection;
Step S106, in the unsanctioned situation of safety detection first, described the second base station uses the security parameter of described the first base station that message is finished in described connection re-establishment again to carry out safety detection;
Step S108 after safety detection is passed through again, sets up described the second base station and is connected the connection of UE.
By above-mentioned processing procedure, because UE is switched to the failure of the second base station by the first base station after, connection re-establishment is finished message first in the obstructed situation of safety detection, utilized the security parameter of the first base station that the technological means that message detects is again finished in connection re-establishment, therefore, can solve message safety is finished in connection re-establishment being detected and the problem such as not pass through of causing owing to the security parameter of source station and Target Station is inconsistent, thereby improve the success rate that UE re-establishes the connection.
In order to make UE and the second base station after connecting, improve the mutual efficient of subsequent message, after step S108, namely set up described the second base station and be connected after the connection of UE, can also comprise following processing procedure: the second base station sends reconfiguration message to described UE, wherein, reconfiguration message is used for the security parameter of the second base station is disposed to UE; The second base station is carried out safety detection according to the security parameter of the second base station to the message that comes from UE.
In step S104, the second base station is finished message to the connection re-establishment that receives and carried out first safety detection, comprising: the second base station utilizes the security parameter of the second base station that message is finished in connection re-establishment to carry out first safety detection.
The mode that above-mentioned the second base station obtains the security parameter of the first base station has multiple, for example can in the second base station, dispose in advance, in a preferred embodiment of the present invention, can also obtain in the following manner: before UE switches to the second base station by the first base station, the second base station receives the handover request message that comes from the first base station, wherein, this handover request message carries the security parameter of the first base station.
The type of above-mentioned security parameter can include but not limited to: integrity protection and cryptographic algorithm parameter.
The above-mentioned method that rebulids connection can be applied to one of following handoff procedure: handoff procedure between X2 handoff procedure, S1 handoff procedure, wireless access type RAT.
A kind of system that rebulids connection also is provided in the present embodiment, has been used for realizing above-described embodiment and preferred implementation, carried out repeating no more of explanation, the below describes relating to module in this device.As used below, the combination of software and/or the hardware of predetermined function can be realized in term " module ".Although the described device of following examples is preferably realized with software, hardware, perhaps the realization of the combination of software and hardware also may and be conceived.Fig. 2 is the structured flowchart according to the system that rebulids connection of the embodiment of the invention.As shown in Figure 2, this system comprises: the first base station 20 and the second base station 22, and wherein, the second base station 22 comprises:
Receiver module 220 is connected to detection module 222, is used for receiving the connection re-establishment that comes from described UE and finishing message UE24 is switched to the failure of the second base station by the first base station after;
Detection module 222, be connected to connect and set up module 224, be used for that message is finished in the connection re-establishment that receives and carry out first safety detection, and in the unsanctioned situation of safety detection first, use the security parameter of the first base station 20 that message is finished in connection re-establishment and again carry out safety detection;
Connect and set up module 224, be used for after safety detection is passed through again, setting up the connection of being connected with UE in the second base station 22.
Preferably, as shown in Figure 3, above-mentioned the second base station 22 can also comprise: sending module 226, be used for sending reconfiguration message to UE24, and wherein, this reconfiguration message is used for the security parameter of the second base station 22 is disposed to UE24; Above-mentioned detection module 222 also is used for according to the security parameter of the second base station the message that comes from described UE being carried out safety detection.
Above-mentioned receiver module 220 also is used for receiving the handover request message that comes from the first base station 20, and wherein, this handover request message carries the security parameter of the first base station 20.
Above-mentioned security parameter comprises: integrity protection and cryptographic algorithm parameter.
Said system can be applied to one of following handoff procedure: handoff procedure between X2 handoff procedure, S1 handoff procedure, wireless access type RAT.
Need to prove that " first " " second " in above-described embodiment distinguish the base station only for sake of convenience, do not consist of the restriction to the base station.And the first base station can show as source base station (or being called the source station) in the specific implementation in above-described embodiment, and the second base station can show as target BS (or being called Target Station) in the specific implementation.
In order to understand better above-described embodiment, describe in detail below in conjunction with specific embodiment.The main thought of following examples is, when RRC that Target Station receives UE re-establish finish message after, at first use the integrity protection of Target Station and cryptographic algorithm to carry out guarantor and encryption detection, if detect successfully, then UEC this time RRC re-establish successfully; If detect unsuccessful, the complete guarantor of Target Station use source station and cryptographic algorithm are finished message to the RRC reprovision and are detected, Target Station is initiated RRC reprovision flow process afterwards, the security parameters such as complete guarantor's algorithm of Target Station and cryptographic algorithm are disposed to UE, after utilizing this reprovision flow process to finish configuration to UE, UE and Target Station are brought into use complete guarantor and the cryptographic algorithm of Target Station configuration.UE carries out the success rate that RRC re-establishes at Target Station when having improved handoff failure by such mode.
Embodiment one
Present embodiment occurs in the X2 handoff procedure re-establishes in the flow process of Target Station side and describes as example.Concrete scheme is as follows:
The first step: UE is by measurement report (MEASUREMENT REPORT) information reporting measurement result.
Second step: source eNodeB base station to determine need to initiate to switch, and sends handover request (HANDOVER REQUEST) message to target eNode B, has carried complete guarantor algorithm and the cryptographic algorithm parameter of UE in the source station in this message.
The 3rd step: the success of target eNode B distributing radio resource also sends switching request response (HANDOVER REQUEST ACKNOWLEDGE) message to source eNodeB.
The 4th step: the source station sends RRC and reshuffles (CONNECTION RECONFIGURATION) message to UE, has carried target eNode B in the message and has disposed Radio Resource to UE.
After the 5th step: UE receives RRC and reshuffles (CONNECTION RECONFIGURATION) message, carry out the reprovision action, because a variety of causes causes the reprovision failure, UE rolls back to source eNodeB configuration data, and simultaneously UE decision-making is initiated RRC at Target Station and re-established process.
The 6th step: UE sends RRC connection reconstruction request (CONNECTION REESTABLISHMENT REQUEST) message to target eNode B.
The 7th step: the target eNode B station sends RRC connection reconstruction (CONNECTION REESTABLISHMENT) message to UE.
The 8th step: UE sends the RRC connection re-establishment and finishes (CONNECTION REESTABLISHMENT) COMPLETE) message is to target eNode B, and what the use of (CONNECTION REESTABLISHMENT COMPLETE) message was finished in UE transmission RRC connection re-establishment is complete guarantor and the cryptographic algorithm of source station.
The 9th step: target eNode B need to be finished to the RRC connection re-establishment (CONNECTION REESTABLISHMENT COMPLETE) message and be encrypted and complete guarantor's algorithm detection, Target Station at first uses complete guarantor and the cryptographic algorithm of target to detect, if detect unsuccessfully, what expression UE used is complete guarantor and the cryptographic algorithm of source eNodeB, complete guarantor and cryptographic algorithm process safety detection that the UE that then the source station band is come in the target eNode B use second step uses at source eNodeB, detection is passed through, and UE re-establishes successfully at the RRC of target eNode B side.
The tenth step: target eNode B sends RRC and connects and reshuffle (CONNECTION RECONFIGURATION) message to UE, and complete guarantor and the cryptographic algorithm of target eNode B disposed to UE.
The 11 step: UE receive RRC connect reshuffle (CONNECTION RECONFIGURATION) message after, receive the configuration of new complete guarantor and cryptographic algorithm, and send RRC and connect to reshuffle and finish (CONNECTION RECONFIGURATION COMPLETE) to the target eNode B station, so far the follow-up message of UE and Target Station is used the complete guarantor's algorithm of Target Station and cryptographic algorithm.
Embodiment two
Present embodiment re-establishes the target eNode B flow process in the S1 switching flow and describes as example, and in the present embodiment, Mobility Management Entity (Mobile Management Entity is called for short MME) is constant.Specific as follows:
The first step: UE is by measurement report (MEASUREMENT REPORT) information reporting measurement result.
Second step: source eNodeB base station to determine need to initiate to switch, and sends HANDOVER REQUIRED message to source MME, has carried complete guarantor algorithm and the cryptographic algorithm parameter of UE in the source station in this message.
The 3rd step: source MME sends handover request (HANDOVER REQUEST) message to target eNode B.
The 4th step: the success of target eNode B distributing radio resource also sends handover request (HANDOVER REQUEST) ACKNOWLEDGE message to source eNodeB.
The 5th step: source MME sends HANDOVER COMMAND message to source eNodeB.
The 6th step: source eNodeB sends RRC and connects and reshuffle (CONNECTION RECONFIGURATION) message to UE, has carried target eNode B in the message and has disposed Radio Resource to UE.
The 7th step: UE receive RRC connect reshuffle (CONNECTION RECONFIGURATION) message after, carry out the reprovision action, because a variety of causes causes the reprovision failure, UE rolls back to source eNodeB configuration data, and simultaneously UE decision-making is initiated RRC at Target Station and re-established process.
The 8th step: UE sends RRC connection reconstruction request (CONNECTION REESTABLISHMENT REQUEST) message to target eNode B.
The 9th step: target eNode B sends RRC connection reconstruction (CONNECTION REESTABLISHMENT) message to UE.
The tenth step: UE sends the RRC connection re-establishment and finishes (CONNECTIONREESTABLISHMENTCOMPLETE) message to target eNode B, and what the use of (CONNECTION REESTABLISHMENT COMPLETE) message was finished in UE transmission RRC connection re-establishment is complete guarantor and the cryptographic algorithm of source station.
The 11 step: target eNode B need to be encrypted with complete guarantor's algorithm RRC connection reconstruction (CONNECTION REESTABLISHMENT) COMPLETE message and detect, Target Station at first uses complete guarantor and the cryptographic algorithm of target to detect, if detect unsuccessfully, what expression UE used is complete guarantor and the cryptographic algorithm of source eNodeB, complete guarantor and cryptographic algorithm process safety detection that the UE that then the source station band is come in the target eNode B use second step uses at source eNodeB, detection is passed through, and UE re-establishes successfully at the RRC of target eNode B side.
The 12 step: target eNode B sends RRC and reshuffles (CONNECTION RECONFIGURATION) message to UE, and complete guarantor and the cryptographic algorithm of target eNode B disposed to UE.
After the 13 step: UE receives RRC and reshuffles (CONNECTION RECONFIGURATION) message, receive the configuration of new complete guarantor and cryptographic algorithm, and send RRC and connect to reshuffle and finish (CONNECTION RECONFIGURATION COMPLETE) to the target eNode B station, so far the follow-up message of UE and Target Station is used the complete guarantor's algorithm of Target Station and cryptographic algorithm.
Embodiment three
Present embodiment describes as example to re-establish the target eNode B flow process during S1 switches (MME change) flow process.Specific as follows:
The first step: UE is by measurement report (MEASUREMENT REPORT) information reporting measurement result.
Second step: source eNodeB base station to determine need to initiate to switch, and sends handover request (HANDOVER REQUIRED) message to source MME, has carried complete guarantor algorithm and the cryptographic algorithm parameter of UE in the source station in this message.
The 3rd step: source MME sends forward direction reconfiguration request (FORWARD RELOCATION REQUEST) message to target MME.
The 4th step: target MME sends handover request (HANDOVER REQUEST) message to target eNode B.
The 5th step: the success of target eNode B distributing radio resource also sends switching request response (HANDOVER REQUESTACKNOWLEDGE) message to target MME.
The 6th step: target MME sends forward direction and reshuffles response (FORWARD RELOCATION RESPONSE) message to source MME.
The 7th step: source MME sends switching command (HANDOVER COMMAND) message to source eNodeB.
The 8th step: source eNodeB sends RRC and connects and reshuffle (CONNECTION RECONFIGURATION) message to UE, has carried target eNode B in the message and has disposed Radio Resource to UE.
The 9th step: UE receive RRC connect reshuffle (CONNECTION RECONFIGURATION) message after, carry out the reprovision action, because a variety of causes causes the reprovision failure, UE rolls back to source eNodeB configuration data, and simultaneously UE decision-making is initiated RRC at Target Station and re-established process.
The tenth step: UE sends RRC connection reconstruction request (CONNECTION REESTABLISHMENT REQUEST) message to target eNode B.
The 11 step: target eNode B sends RRC connection reconstruction (CONNECTION REESTABLISHMENT) message to UE.
The 12 step: UE sends the RRC connection re-establishment and finishes (CONNECTIONREESTABLISHMENTCOMPLETE) message to target eNode B, and what the use of (CONNECTION REESTABLISHMENT COMPLETE) message was finished in UE transmission RRC connection re-establishment is complete guarantor and the cryptographic algorithm of source station.
The 13 step: target eNode B need to be finished to the RRC connection re-establishment (CONNECTION REESTABLISHMENT COMPLETE) message and be encrypted and complete guarantor's algorithm detection, Target Station at first uses complete guarantor and the cryptographic algorithm of target to detect, if detect unsuccessfully, what expression UE used is complete guarantor and the cryptographic algorithm of source eNodeB, complete guarantor and cryptographic algorithm process safety detection that the UE that then the source station band is come in the target eNode B use second step uses at source eNodeB, detection is passed through, and UE re-establishes successfully at the RRC of target eNode B side.
The 14 step: target eNode B sends RRC and connects and reshuffle (CONNECTION RECONFIGURATION) message to UE, and complete guarantor and the cryptographic algorithm of target eNode B disposed to UE.
The 15 step: UE receive RRC connect reshuffle (CONNECTION RECONFIGURATION) message after, receive the configuration of new complete guarantor and cryptographic algorithm, and send RRC and connect to reshuffle and finish (CONNECTION RECONFIGURATION COMPLETE) to the target eNode B station, so far the follow-up message of UE and Target Station is used the complete guarantor's algorithm of Target Station and cryptographic algorithm.
Embodiment four
To re-establish the Target RNC flow process in UMTS Terrestrial radio access network (UMTS Terrestrial Radio Access Network is referred to as the UTRAN) flow process be that example is said to present embodiment to switch to from land radio access web (EvoIved UMTS is referred to as E-UTRAN) between RAT.Specific as follows:
The first step: UE is by measurement report (MEASUREMENT REPORT) information reporting measurement result.
Second step: source eNodeB base station to determine need to initiate to switch, and sends handover request (HANDOVER REQUIRED) message to source MME, has carried complete guarantor algorithm and the cryptographic algorithm parameter of UE in the source station in this message.
The 3rd step: source MME sends forward direction reconfiguration request (FORWARD RELOCATION REQUEST) message to target SGSN.
The 4th step: destination service GPRS Support Node (Serving GPRS Supporting Node is referred to as SGSN) sends reconfiguration request (RELOCATION REQUEST) message to Target RNC.
The 5th step: the success of Target RNC distributing radio resource also sends reconfiguration request response (RELOCATION REQUEST ACKNOWLEDGE) message to target SGSN.
The 6th step: target SGSN sends forward direction and reshuffles response (FORWARD RELOCATION RESPONSE) message to source MME.
The 7th step: source MME switching command (HANDOVER COMMAND) message is to source eNodeB.
The 8th step: source eNodeB sends RRC and reshuffles (CONNECTION RECONFIGURATION) message to UE, has carried target eNode B in the message and has disposed Radio Resource to UE.
After the 9th step: UE receives RRC and reshuffles (CONNECTION RECONFIGURATION) message, carry out the reprovision action, because a variety of causes causes the reprovision failure, UE rolls back to source eNodeB configuration data, and simultaneously UE decision-making is initiated RRC at Target Station and re-established process.
The tenth step: UE sends RRC connection reconstruction request (CONNECTION REESTABLISHMENT REQUEST) message to Target RNC.
The 11 step: Target RNC sends RRC connection reconstruction (CONNECTION REESTABLISHMENT) message to UE.
The 12 step: UE sends the RRC connection re-establishment and finishes (CONNECTIONREESTABLISHMENTCOMPLETE) message to Target RNC, and what the use of (CONNECTIONREESTABLISHMENTCOMPLETE) message was finished in UE transmission RRC connection re-establishment is complete guarantor and the cryptographic algorithm of source station.
The 13 step: Target RNC need to be finished to the RRC connection reconstruction (CONNECTIONREESTABLISHMENT COMPLETE) message and is encrypted and complete guarantor's algorithm detection, Target Station at first uses complete guarantor and the cryptographic algorithm of target to detect, if detect unsuccessfully, what expression UE used is complete guarantor and the cryptographic algorithm of source eNodeB, complete guarantor and cryptographic algorithm process safety detection that the UE that then the source station band is come in the Target RNC use second step uses at source eNodeB, detection is passed through, and UE re-establishes successfully at the RRC of target eNode B side.
The 14 step: Target RNC sends RRC and reshuffles (CONNECTION RECONFIGURATION) message to UE, and complete guarantor and the cryptographic algorithm of Target RNC disposed to UE.
After the 15 step: UE receives RRC and reshuffles (CONNECTION RECONFIGURATION) message, receive the configuration of new complete guarantor and cryptographic algorithm, and send RRC and connect to reshuffle and finish (CONNECTIONRECONFIGURATIONCOMPLETE) to the Target RNC station, so far the follow-up message of UE and Target RNC is used the complete guarantor's algorithm of Target Station and cryptographic algorithm.
Embodiment five
Present embodiment re-establishes the target eNode B flow process and describes as example to switch to from UTRAN between RAT the EUTRAN flow process, specific as follows:
The first step: UE arrives source RNC by measurement report (MEASUREMENT REPORT) information reporting measurement result.
Second step: RNC decision-making in source needs to initiate to switch, and sends and reshuffles (RELOCATION REQUIRED) message to source SGSN, has carried complete guarantor algorithm and the cryptographic algorithm parameter of UE in the source station in this message.
The 3rd step: source SGSN sends forward direction reconfiguration request (FORWARD RELOCATION REQUEST) message to target MME.
The 4th step: target MME sends handover request (HANDOVER REQUEST) message to target eNode B.
The 5th step: the success of target eNode B distributing radio resource also sends switching request response (HANDOVER REQUESTACKNOWLEDGE) message to target MME.
The 6th step: target MME sends forward direction response (FORWARD RESPONSE) message to source SGSN.
The 7th step: source SGSN sends reconfigure command RELOCATION COMMAND message to source RNC.
The 8th step: source RNC sends RRC and reshuffles (CONNECTION RECONFIGURATION) message to UE, has carried target eNode B in the message and has disposed Radio Resource to UE.
After the 9th step: UE receives RRC and reshuffles (CONNECTION RECONFIGURATION) message, carry out the reprovision action, because a variety of causes causes the reprovision failure, UE rolls back to source RNC configuration data, and simultaneously UE decision-making is initiated RRC at Target Station and re-established process.
The tenth step: UE sends RRC and rebuilds request (CONNECTION REESTABLISHMENT REQUEST) message to target eNode B.
The 11 step: target eNode B sends RRC connection reconstruction (CONNECTION REESTABLISHMENT) message to UE.
The 12 step: UE sends the RRC connection re-establishment and finishes (CONNECTION REESTABLISHMENTCOMPLETE) message to target eNode B, and what the use of (CONNECTIONREESTABLISHMENTCOMPLETE) message was finished in UE transmission RRC connection re-establishment is complete guarantor and the cryptographic algorithm of source RNC.
The 13 step: target eNode B need to be finished to the RRC connection re-establishment (CONNECTION REESTABLISHMENT COMPLETE) message and be encrypted and complete guarantor's algorithm detection, Target Station at first uses complete guarantor and the cryptographic algorithm of target to detect, if detect unsuccessfully, what expression UE used is complete guarantor and the cryptographic algorithm of source RNC, complete guarantor and cryptographic algorithm process safety detection that the UE that then the source station band is come in the target eNode B use second step uses at source eNodeB, detection is passed through, and UE re-establishes successfully at the RRC of target eNode B side.
The 14 step: target eNode B sends RRC and reshuffles (CONNECTION RECONFIGURATION) message to UE, and complete guarantor and the cryptographic algorithm of target eNode B disposed to UE.
After the 15 step: UE receives RRC and reshuffles (CONNECTION RECONFIGURATION) message, receive the configuration of new complete guarantor and cryptographic algorithm, and send RRC and connect and reshuffle (CONNECTION RECONFIGURATION COMPLETE) to the target eNode B station, so far the follow-up message of UE and target eNode B is used the complete guarantor's algorithm of Target Station and cryptographic algorithm.
In another embodiment, also provide a kind of software, this software be used for to be carried out the technical scheme that above-described embodiment and preferred implementation are described.
In another embodiment, also provide a kind of storage medium, stored above-mentioned software in this storage medium, this storage medium includes but not limited to: CD, floppy disk, hard disk, scratch pad memory etc.
Obviously, those skilled in the art should be understood that, above-mentioned each module of the present invention or each step can realize with general calculation element, they can concentrate on the single calculation element, perhaps be distributed on the network that a plurality of calculation elements form, alternatively, they can be realized with the executable program code of calculation element, thereby, they can be stored in the storage device and be carried out by calculation element, and in some cases, can carry out step shown or that describe with the order that is different from herein, perhaps they are made into respectively each integrated circuit modules, perhaps a plurality of modules in them or step are made into the single integrated circuit module and realize.Like this, the present invention is not restricted to any specific hardware and software combination.
Be the preferred embodiments of the present invention only below, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any modification of doing, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (11)

1. a method that rebulids connection is characterized in that, comprising:
User equipment (UE) was switched to the failure of the second base station by the first base station after, the second base station received the connection re-establishment that comes from described UE and finishes message;
Described the second base station is finished message to the described connection re-establishment that receives and is carried out first safety detection;
In the unsanctioned situation of safety detection first, described the second base station uses the security parameter of described the first base station that message is finished in described connection re-establishment again to carry out safety detection;
After safety detection is passed through again, set up described the second base station and be connected the connection of UE.
2. method according to claim 1 is characterized in that, sets up described the second base station and is connected after the connection of UE, also comprises:
Described the second base station sends reconfiguration message to described UE, and wherein, described reconfiguration message is used for the security parameter of described the second base station is disposed to described UE;
Described the second base station is carried out safety detection according to the security parameter of described the second base station to the message that comes from described UE.
3. method according to claim 1 is characterized in that, described the second base station is finished message to the described connection re-establishment that receives and carried out first safety detection, comprising:
Described the second base station utilizes the security parameter of described the second base station that message is finished in described connection re-establishment to carry out first safety detection.
4. method according to claim 1 is characterized in that, before UE switches to the second base station by the first base station, also comprises:
Described the second base station receives the handover request message that comes from described the first base station, and wherein, described handover request message carries the security parameter of described the first base station.
5. method according to claim 1 is characterized in that, described security parameter comprises: integrity protection and cryptographic algorithm parameter.
6. according to claim 1 to 5 each described methods, it is characterized in that described method is applied to one of following handoff procedure:
Handoff procedure between X2 handoff procedure, S1 handoff procedure, wireless access type RAT.
7. system that rebulids connection, comprising: the first base station and the second base station is characterized in that described the second base station comprises:
Receiver module is used for receiving the connection re-establishment that comes from described UE and finishing message user equipment (UE) is switched to the failure of the second base station by the first base station after;
Detection module, be used for that message is finished in the described connection re-establishment that receives and carry out first safety detection, and in the unsanctioned situation of safety detection first, use the security parameter of described the first base station that message is finished in described connection re-establishment and again carry out safety detection;
Connect and to set up module, be used for after safety detection is passed through again, set up described the second base station and be connected the connection of UE.
8. system according to claim 7 is characterized in that,
Described the second base station also comprises: sending module, be used for sending reconfiguration message to described UE, and wherein, described reconfiguration message is used for the security parameter of described the second base station is disposed to described UE;
Described detection module also is used for according to the security parameter of described the second base station the message that comes from described UE being carried out safety detection.
9. system according to claim 7 is characterized in that, described receiver module also is used for receiving the handover request message that comes from described the first base station, and wherein, described handover request message carries the security parameter of described the first base station.
10. system according to claim 7 is characterized in that, described security parameter comprises: integrity protection and cryptographic algorithm parameter.
11. each described system is characterized in that according to claim 7-10, described system applies is in one of following handoff procedure: handoff procedure between X2 handoff procedure, S1 handoff procedure, wireless access type RAT.
CN201210122631.1A 2012-04-24 2012-04-24 Method and system for rebuilding connection Expired - Fee Related CN103379663B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201210122631.1A CN103379663B (en) 2012-04-24 2012-04-24 Method and system for rebuilding connection
PCT/CN2013/074215 WO2013159660A1 (en) 2012-04-24 2013-04-15 Method and system for reestablishing connection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210122631.1A CN103379663B (en) 2012-04-24 2012-04-24 Method and system for rebuilding connection

Publications (2)

Publication Number Publication Date
CN103379663A true CN103379663A (en) 2013-10-30
CN103379663B CN103379663B (en) 2017-02-08

Family

ID=49464083

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210122631.1A Expired - Fee Related CN103379663B (en) 2012-04-24 2012-04-24 Method and system for rebuilding connection

Country Status (2)

Country Link
CN (1) CN103379663B (en)
WO (1) WO2013159660A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106105383A (en) * 2014-04-28 2016-11-09 英特尔Ip公司 The devices, systems and methods of connection are set up between cellular node and core net
CN110290541A (en) * 2018-03-19 2019-09-27 维沃移动通信有限公司 Configuration method and equipment
WO2019192514A1 (en) * 2018-04-04 2019-10-10 维沃移动通信有限公司 Connection reestablishment method and relevant device
CN110830988A (en) * 2018-08-08 2020-02-21 维沃移动通信有限公司 Security updating method, network device and terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070249291A1 (en) * 2006-04-20 2007-10-25 Sanjiv Nanda Wireless handoffs between multiple networks
CN101742577A (en) * 2008-11-20 2010-06-16 大唐移动通信设备有限公司 Method and base station of verifying user equipment identifier
CN102083063A (en) * 2009-11-30 2011-06-01 大唐移动通信设备有限公司 Method, system and equipment for confirming AS key
CN102223632A (en) * 2010-04-15 2011-10-19 中兴通讯股份有限公司 Synchronization method and system for access layer security algorithm
CN102238542A (en) * 2010-04-20 2011-11-09 中兴通讯股份有限公司 Method and system for reestablishing radio resource control (RRC) of user equipment (UE) under relay node (RN)

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070249291A1 (en) * 2006-04-20 2007-10-25 Sanjiv Nanda Wireless handoffs between multiple networks
CN101742577A (en) * 2008-11-20 2010-06-16 大唐移动通信设备有限公司 Method and base station of verifying user equipment identifier
CN102083063A (en) * 2009-11-30 2011-06-01 大唐移动通信设备有限公司 Method, system and equipment for confirming AS key
CN102223632A (en) * 2010-04-15 2011-10-19 中兴通讯股份有限公司 Synchronization method and system for access layer security algorithm
CN102238542A (en) * 2010-04-20 2011-11-09 中兴通讯股份有限公司 Method and system for reestablishing radio resource control (RRC) of user equipment (UE) under relay node (RN)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106105383A (en) * 2014-04-28 2016-11-09 英特尔Ip公司 The devices, systems and methods of connection are set up between cellular node and core net
CN113099556A (en) * 2014-04-28 2021-07-09 苹果公司 Apparatus, system and method for establishing a connection between a cellular node and a core network
CN110290541A (en) * 2018-03-19 2019-09-27 维沃移动通信有限公司 Configuration method and equipment
WO2019192514A1 (en) * 2018-04-04 2019-10-10 维沃移动通信有限公司 Connection reestablishment method and relevant device
US11690122B2 (en) 2018-04-04 2023-06-27 Vivo Mobile Communication Co., Ltd. Connection re-establishment method and related device
CN110830988A (en) * 2018-08-08 2020-02-21 维沃移动通信有限公司 Security updating method, network device and terminal
CN110830988B (en) * 2018-08-08 2023-08-15 维沃移动通信有限公司 Security updating method, network equipment and terminal

Also Published As

Publication number Publication date
CN103379663B (en) 2017-02-08
WO2013159660A1 (en) 2013-10-31

Similar Documents

Publication Publication Date Title
US11843941B2 (en) Method and apparatus for performing handover in wireless communication system
CA2383221C (en) A security procedure in universal mobile telephone service
CN101945384B (en) Method, device and system for processing safe key in reconnection of RRC (Radio Resource Control)
KR101078615B1 (en) Encryption in a wireless telecommunications
US9106409B2 (en) Method and apparatus for handling keys used for encryption and integrity
CN104219722A (en) Double-connection radio bearer migration treatment method, double-connection radio bearer migration method and double-connection radio bearer migration device
CN103906152A (en) Method for supporting quick UE restoration
CN101610506A (en) Prevent the method and apparatus of network security step-out
CN110351894B (en) Method and equipment for authenticating UE
CN102905265A (en) Mobile equipment (ME) attaching method and device
CN102223632B (en) A kind of Access Layer security algorithm synchronous method and system
KR20150055535A (en) Communication method and apparatus in network environment where terminal can be dually connected to multiple base station
CN103546989B (en) A kind of method and apparatus setting up wireless heterogeneous networks connection
CN102821384A (en) Method and device for reestablishing wireless links
CN113411847A (en) Communication method and device
CN102769849A (en) Message sending method and device
CN103379663A (en) Method and system for rebuilding connection
CN101156498B (en) Method for implementing inter-system switch-over
CN101686513B (en) Cell switching method, system and device
EP3547755A1 (en) Switching method, terminal device and network device
EP1999930B1 (en) A method and apparatus for handling keys used for encryption and integrity
CN102083063B (en) Method, system and equipment for confirming AS key
CN102625471A (en) Reconstruction method and device of wireless link
US20220015030A1 (en) Data Transmission Method and Apparatus
CN102448137B (en) Repositioning method and repositioning device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210104

Address after: Room 705, 7 / F, room 9, 1699, Zuchongzhi South Road, Kunshan City, Suzhou City, Jiangsu Province

Patentee after: Kunshan chuangzhihui Intellectual Property Operation Co.,Ltd.

Address before: 518057 No. 55 South Science and technology road, Shenzhen, Guangdong, Nanshan District

Patentee before: ZTE Corp.

CP02 Change in the address of a patent holder

Address after: 215300 rooms 107 and 108, area C, 55 Xiaxi street, Kunshan Development Zone, Suzhou City, Jiangsu Province

Patentee after: Kunshan chuangzhihui Intellectual Property Operation Co.,Ltd.

Address before: Room 705, 7 / F, room 9, 1699, Zuchongzhi South Road, Kunshan City, Suzhou City, Jiangsu Province

Patentee before: Kunshan chuangzhihui Intellectual Property Operation Co.,Ltd.

CP02 Change in the address of a patent holder
TR01 Transfer of patent right

Effective date of registration: 20230322

Address after: 215300 No. 1266, Fuchunjiang Road, Kunshan Economic and Technological Development Zone, Suzhou City, Jiangsu Province

Patentee after: KUNSHAN LUCKY-JINFU PHOTOELECTRONIC SCIEN-TECH CO.,LTD.

Address before: 215300 rooms 107 and 108, area C, 55 Xiaxi street, Kunshan Development Zone, Suzhou City, Jiangsu Province

Patentee before: Kunshan chuangzhihui Intellectual Property Operation Co.,Ltd.

TR01 Transfer of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170208

CF01 Termination of patent right due to non-payment of annual fee