Re-establish the method and system of connection
Technical field
The present invention relates to the communications field, in particular to a kind of method and system re-establishing connection.
Background technology
In mobile radio system, the user equipment (User Equipment, referred to as UE) in moving can trigger
Switching, switching type can be that in wireless access type (RadioAccess Type is referred to as RAT), switching can also be between RAT
Switching.Because a variety of causes can have handoff failure in handoff procedure, after handoff failure, UE can re-establish Radio Resource to UE
Control (Radio Resource Control, referred to as RRC) connect, UE can select source station re-establish RRC connect or
Carry out RRC connection in Target Station.
In the related, after UE side failure in handoff procedure, UE will roll back to the configuration of source station, if now UE determines
Plan is initiated RRC in Target Station and is re-established, and Target Station is receiving the RRC connection re-establishment completion message of UE, and this message is entered
Row safety detection (such as integrity detection and encryption detection), now UE uses the security parameter (complete preservation of source station
And AES), if the security parameter of source station and Target Station (integrity protection and encipherment protection algorithm parameter) is inconsistent, will
Can lead to Target Station that the safety detection of RRC connection re-establishment completion message is not passed through, therefore have rejected UE RRC re-establish please
Ask, lead to the failure re-establishing the connection.
For the problems referred to above in correlation technique, effective solution is not yet proposed at present.
Content of the invention
For in correlation technique, lead to because the security parameter of source station and Target Station is inconsistent is complete to connection re-establishment
The problems such as become message safety detection not pass through, the invention provides a kind of method and system re-establishing connection, at least to solve
Certainly the problems referred to above.
According to an aspect of the invention, it is provided a kind of method re-establishing connection, including:At user equipment (UE)
It is switched to after the second base station failure by first base station, the second base station receives the connection re-establishment completion message coming from described UE;
Second base station carries out safety detection first to the connection re-establishment completion message receiving;In the unsanctioned situation of safety detection first
Under, the second base station carries out safety detection using the security parameter of first base station again to connection re-establishment completion message;Pacify again
Full inspection is surveyed after passing through, and sets up the second base station and the connection of described UE.
After setting up described second base station and the connection of described UE, also include:Second base station sends to described UE joins letter again
Breath, wherein, described reconfiguration message is used for for the security parameter of described second base station being allocated to described UE;Second base station is according to described
The security parameter of the second base station carries out safety detection to the message coming from described UE.
Second base station carries out safety detection first to the described connection re-establishment completion message receiving, including:Second base station
Security parameter using described second base station carries out safety detection first to described connection re-establishment completion message.
Before UE is switched to the second base station by first base station, also include:Second base station receives and comes from described first base
The handover request message stood, wherein, described handover request message carries the security parameter of described first base station.
Above-mentioned security parameter includes:Integrity protection and AES parameter.
Said method is applied to one below handoff procedure:X2 handoff procedure, S1 handoff procedure, wireless access type RAT
Between handoff procedure.
According to a further aspect in the invention, there is provided a kind of system re-establishing connection, including:First base station and second
Base station, the second base station includes:Receiver module, for user equipment (UE) be switched to by first base station second base station failure after,
Receive the connection re-establishment completion message coming from UE;Detection module, for carrying out to the connection re-establishment completion message receiving
Safety detection first, and in the case of safety detection is unsanctioned first, the security parameter using first base station is heavy to connecting
Set up completion message and carry out safety detection again;Connection establishment module, for after safety detection is passed through again, setting up the second base
The connection stood with UE.
Above-mentioned second base station also includes:Sending module, for sending reconfiguration message to described UE, wherein, described heavy joins letter
Cease for the security parameter of described second base station is allocated to described UE;
Above-mentioned detection module, is additionally operable to the security parameter according to described second base station and the message coming from described UE is carried out
Safety detection.
Above-mentioned receiver module, is additionally operable to receive the handover request message coming from described first base station, wherein, described switching
Request message carries the security parameter of described first base station.
Above-mentioned security parameter includes:Integrity protection and AES parameter.
Said system is applied to one below handoff procedure:X2 handoff procedure, S1 handoff procedure, wireless access type RAT
Between handoff procedure.
By the present invention, using after UE is switched to the second base station failure by first base station, connection re-establishment is completed to disappear
In the case that safety detection is obstructed first, the security parameter using first base station is carried out again breath to connection re-establishment completion message
The technological means of detection, solve in correlation technique, lead to because the security parameter of source station and Target Station is inconsistent to even
Connect the problems such as re-establish completion message safety detection and do not pass through, thus improve the success rate that UE re-establishes the connection.
Brief description
Accompanying drawing described herein is used for providing a further understanding of the present invention, constitutes the part of the application, this
Bright schematic description and description is used for explaining the present invention, does not constitute inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart of the method re-establishing connection according to the embodiment of the present invention;
Fig. 2 is the structured flowchart of the system re-establishing connection according to the embodiment of the present invention;
Fig. 3 is the structural representation of the system re-establishing connection according to the preferred embodiment of the present invention.
Specific embodiment
To describe the present invention in detail below with reference to accompanying drawing and in conjunction with the embodiments.It should be noted that not conflicting
In the case of, the embodiment in the application and the feature in embodiment can be mutually combined.
Fig. 1 is the flow chart of the method re-establishing connection according to the embodiment of the present invention.As shown in figure 1, the method bag
Include:
Step S102, after UE is switched to the second base station failure by first base station, the second base station receives and comes from described UE
Connection re-establishment completion message;
Step S104, the second base station carries out safety detection first to the connection re-establishment completion message receiving;
Step S106, in the case of safety detection is unsanctioned first, described second base station uses described first base station
Security parameter carries out safety detection again to described connection re-establishment completion message;
Step S108, after safety detection is passed through again, sets up the connection of described second base station and described UE.
By above-mentioned processing procedure, due to after UE is switched to the second base station failure by first base station, to connection re-establishment
In the case that safety detection is obstructed first, the security parameter that make use of first base station is to connection re-establishment completion message for completion message
The technological means being detected again, therefore, it can solve to lead to because the security parameter of source station and Target Station is inconsistent
The problems such as connection re-establishment completion message safety detection is not passed through, thus improve the success rate that UE re-establishes the connection.
In order that UE and the second base station are upon establishment of a connection, improve the efficiency of subsequent message interaction, after step S108,
After setting up described second base station and the connection of described UE, following processing procedure can also be included:Second base station is to described UE
Send reconfiguration message, wherein, reconfiguration message is used for for the security parameter of the second base station being allocated to UE;Second base station is according to the second base
The security parameter stood carries out safety detection to the message coming from UE.
In step S104, the second base station carries out safety detection first to the connection re-establishment completion message receiving, including:
Second base station carries out safety detection first using the security parameter of the second base station to connection re-establishment completion message.
Above-mentioned second base station obtain first base station security parameter mode have multiple, for example can be in advance in the second base station
Middle configuration, in a preferred embodiment of the present invention, can also obtain in the following manner:Switched by first base station in UE
To before the second base station, the second base station receives the handover request message coming from first base station, and wherein, this handover request message is taken
Security parameter with first base station.
The type of above-mentioned security parameter can include but is not limited to:Integrity protection and AES parameter.
The above-mentioned method re-establishing connection can apply to one below handoff procedure:X2 handoff procedure, S1 switched
Handoff procedure between journey, wireless access type RAT.
Additionally provide a kind of system re-establishing connection in the present embodiment, be used for realizing above-described embodiment and preferably real
Apply mode, carried out illustrating repeats no more, and illustrates to being related to module in this device below.Use as following
, the software of predetermined function and/or the combination of hardware can be realized in term " module ".Although the device described by following examples
Preferably to be realized with software, but hardware, or the realization of the combination of software and hardware is also may and to be contemplated.Fig. 2
It is the structured flowchart of the system re-establishing connection according to the embodiment of the present invention.As shown in Fig. 2 this system includes:First base
Stand 20 and second base station 22, wherein, the second base station 22 includes:
Receiver module 220, connects to detection module 222, for being switched to the second base station failure in UE24 by first base station
Afterwards, receive the connection re-establishment completion message coming from described UE;
Detection module 222, connects to connection establishment module 224, for carrying out to the connection re-establishment completion message receiving
Safety detection first, and in the case of safety detection is unsanctioned first, using first base station 20 security parameter to connection
Re-establish completion message and carry out safety detection again;
Connection establishment module 224, for after safety detection is passed through again, setting up the connection of the second base station 22 and UE 24.
Preferably, as shown in figure 3, above-mentioned second base station 22 can also include:Sending module 226, for sending to UE24
Reconfiguration message, wherein, this reconfiguration message is used for for the security parameter of the second base station 22 being allocated to UE24;Above-mentioned detection module 222,
It is additionally operable to the security parameter according to the second base station and safety detection is carried out to the message coming from described UE.
Above-mentioned receiver module 220, is additionally operable to receive the handover request message coming from first base station 20, wherein, this switching
Request message carries the security parameter of first base station 20.
Above-mentioned security parameter includes:Integrity protection and AES parameter.
Said system can apply to one below handoff procedure:X2 handoff procedure, S1 handoff procedure, wireless access type
Handoff procedure between RAT.
It should be noted that " first " " second " in above-described embodiment only for sake of convenience, makes a distinction to base station, and
Do not constitute the restriction to base station.And, in above-described embodiment first base station can show as in the specific implementation source base station (or claim
For source station), the second base station can show as target BS (or referred to as Target Station) in the specific implementation.
In order to more fully understand above-described embodiment, describe in detail below in conjunction with specific embodiment.Following examples main
Thought is, after the RRC that Target Station receives UE re-establishes completion message, first by Target Station integrity protection and plus
Close algorithm has carried out protecting and encryption detection, if detecting successfully, this time RRC re-establishes successfully UEC;If detection is unsuccessful,
Target Station is joined completion message to RRC again and is detected using the complete guarantor of source station and AES, and the RRC of Target Station initiation afterwards joins again
Flow process, the security parameters such as complete guarantor's algorithm of Target Station and AES are allocated to UE, are completed to UE's using this heavy flow journey
After configuration, UE and Target Station begin to use complete guarantor and the AES of Target Station configuration.Switching is improve by such mode
During failure, UE carries out, in Target Station, the success rate that RRC re-establishes.
Embodiment one
The present embodiment by X2 handoff procedure occur re-establish in the flow process of Target Station side as a example illustrate.Specifically side
Case is as follows:
The first step:UE passes through measurement report (MEASUREMENT REPORT) information reporting measurement result.
Second step:The decision-making of source eNodeB base station needs to initiate switching, sends handover request (HANDOVER REQUEST) and disappears
Cease target eNodeB, in this message, carry complete guarantor's algorithm in source station for the UE and AES parameter.
3rd step:The distributing radio resource success of target eNodeB simultaneously sends switching request response (HANDOVER REQUEST
ACKNOWLEDGE) message is to source eNodeB.
4th step:Source station transmission RRC reconfigures (CONNECTION RECONFIGURATION) message and, to UE, takes in message
It is allocated to the Radio Resource of UE with target eNodeB.
5th step:UE receives after RRC reconfigures (CONNECTION RECONFIGURATION) message, is joined again
Make, because a variety of causes leads to join unsuccessfully again, UE rolls back to source eNodeB configuration data, UE decision-making simultaneously is initiated in Target Station
RRC re-establishes process.
6th step:UE sends RRC connection reconstruction request (CONNECTION REESTABLISHMENT REQUEST) message
To target eNodeB.
7th step:Target eNodeB station send RRC connection reconstruction (CONNECTION REESTABLISHMENT) message to
UE.
8th step:UE sends RRC connection re-establishment and completes (CONNECTION REESTABLISHMENT) COMPLETE) disappear
Cease target eNodeB, UE transmission RRC connection re-establishment completes (CONNECTION REESTABLISHMENT COMPLETE) and disappears
Breath uses complete guarantor and the AES of source station.
9th step:Target eNodeB needs to complete (CONNECTION REESTABLISHMENT to RRC connection re-establishment
COMPLETE) message is encrypted and complete guarantor's algorithm detection, and Target Station is examined first by the complete guarantor of target and AES
Surveying, if detected unsuccessfully, representing that UE uses complete guarantor and the AES of source eNodeB, then target eNodeB uses second step
Complete guarantor and AES process safety detection that the UE that middle source station band comes uses in source eNodeB, detection is passed through, and UE is in target
The RRC of eNodeB side re-establishes successfully.
Tenth step:Target eNodeB send RRC connect reconfigure (CONNECTION RECONFIGURATION) message to
UE, the complete guarantor of target eNodeB and AES are allocated to UE.
11st step:UE receive RRC connect reconfigure (CONNECTION RECONFIGURATION) message after, receive
New complete guarantor and AES configuration, and send RRC and connect to reconfigure and complete (CONNECTION RECONFIGURATION
COMPLETE) arrive target eNodeB to stand, so far UE and the follow-up message of Target Station use that Target Station is complete to protect algorithm and AES.
Embodiment two
The present embodiment taking re-establish target eNodeB flow process in S1 switching flow as a example illustrates, in the present embodiment
In, Mobility Management Entity (Mobile Management Entity, abbreviation MME) is constant.Specific as follows:
The first step:UE passes through measurement report (MEASUREMENT REPORT) information reporting measurement result.
Second step:The decision-making of source eNodeB base station needs to initiate switching, sends HANDOVER REQUIRED message to source MME,
Complete guarantor's algorithm in source station for the UE and AES parameter is carried in this message.
3rd step:Source MME sends handover request (HANDOVER REQUEST) message to target eNodeB.
4th step:The distributing radio resource success of target eNodeB simultaneously sends handover request (HANDOVER REQUEST)
ACKNOWLEDGE message is to source eNodeB.
5th step:Source MME sends HANDOVER COMMAND message to source eNodeB.
6th step:Source eNodeB sends RRC connection and reconfigures (CONNECTION RECONFIGURATION) message to UE,
The Radio Resource that target eNodeB is allocated to UE is carried in message.
7th step:UE receive RRC connect reconfigure (CONNECTION RECONFIGURATION) message after, carry out weight
Join action, because a variety of causes leads to join unsuccessfully again, UE rolls back to source eNodeB configuration data, and UE decision-making simultaneously is sent out in Target Station
Play RRC and re-establish process.
8th step:UE sends RRC connection reconstruction request (CONNECTION REESTABLISHMENT REQUEST) message
To target eNodeB.
9th step:Target eNodeB sends RRC connection reconstruction (CONNECTION REESTABLISHMENT) message to UE.
Tenth step:UE sends RRC connection re-establishment and completes (CONNECTIONREESTABLISHMENTCOMPLETE) message
To target eNodeB, UE sends RRC connection re-establishment and completes (CONNECTION REESTABLISHMENT COMPLETE) message
Use complete guarantor and the AES of source station.
11st step:Target eNodeB needs to RRC connection reconstruction (CONNECTION REESTABLISHMENT)
COMPLETE message is encrypted and complete guarantor's algorithm detection, and Target Station is examined first by the complete guarantor of target and AES
Surveying, if detected unsuccessfully, representing that UE uses complete guarantor and the AES of source eNodeB, then target eNodeB uses second step
Complete guarantor and AES process safety detection that the UE that middle source station band comes uses in source eNodeB, detection is passed through, and UE is in target
The RRC of eNodeB side re-establishes successfully.
12nd step:Target eNodeB sends RRC and reconfigures (CONNECTION RECONFIGURATION) message to UE,
The complete guarantor of target eNodeB and AES are allocated to UE.
13rd step:UE receives after RRC reconfigures (CONNECTION RECONFIGURATION) message, receives new
Complete protect and AES configuration, and send RRC and connect and reconfigure and complete (CONNECTION RECONFIGURATION
COMPLETE) arrive target eNodeB to stand, so far UE and the follow-up message of Target Station use that Target Station is complete to protect algorithm and AES.
Embodiment three
The present embodiment taking re-establish target eNodeB flow process in S1 switching (MME change) flow process as a example illustrates.Tool
Body is as follows:
The first step:UE passes through measurement report (MEASUREMENT REPORT) information reporting measurement result.
Second step:The decision-making of source eNodeB base station needs to initiate switching, sends handover request (HANDOVER REQUIRED) and disappears
Cease to source MME, in this message, carry complete guarantor's algorithm in source station for the UE and AES parameter.
3rd step:To reconfiguration request (FORWARD RELOCATION REQUEST) message to target before source MME transmission
MME.
4th step:Target MME sends handover request (HANDOVER REQUEST) message to target eNodeB.
5th step:The distributing radio resource success of target eNodeB simultaneously sends switching request response (HANDOVER
REQUESTACKNOWLEDGE) message is to target MME.
6th step:Target MME send before to reconfiguring response (FORWARD RELOCATION RESPONSE) message to source
MME.
7th step:Source MME sends switching command (HANDOVER COMMAND) message to source eNodeB.
8th step:Source eNodeB sends RRC connection and reconfigures (CONNECTION RECONFIGURATION) message to UE,
The Radio Resource that target eNodeB is allocated to UE is carried in message.
9th step:UE receive RRC connect reconfigure (CONNECTION RECONFIGURATION) message after, carry out weight
Join action, because a variety of causes leads to join unsuccessfully again, UE rolls back to source eNodeB configuration data, and UE decision-making simultaneously is sent out in Target Station
Play RRC and re-establish process.
Tenth step:UE sends RRC connection reconstruction request (CONNECTION REESTABLISHMENT REQUEST) message
To target eNodeB.
11st step:Target eNodeB send RRC connection reconstruction (CONNECTION REESTABLISHMENT) message to
UE.
12nd step:UE transmission RRC connection re-establishment completes (CONNECTIONREESTABLISHMENTCOMPLETE) and disappears
Cease target eNodeB, UE transmission RRC connection re-establishment completes (CONNECTION REESTABLISHMENT COMPLETE) and disappears
Breath uses complete guarantor and the AES of source station.
13rd step:Target eNodeB needs to complete (CONNECTION REESTABLISHMENT to RRC connection re-establishment
COMPLETE) message is encrypted and complete guarantor's algorithm detection, and Target Station is examined first by the complete guarantor of target and AES
Surveying, if detected unsuccessfully, representing that UE uses complete guarantor and the AES of source eNodeB, then target eNodeB uses second step
Complete guarantor and AES process safety detection that the UE that middle source station band comes uses in source eNodeB, detection is passed through, and UE is in target
The RRC of eNodeB side re-establishes successfully.
14th step:Target eNodeB sends RRC connection and reconfigures (CONNECTION RECONFIGURATION) message
To UE, the complete guarantor of target eNodeB and AES are allocated to UE.
15th step:UE receive RRC connect reconfigure (CONNECTION RECONFIGURATION) message after, receive
New complete guarantor and AES configuration, and send RRC and connect to reconfigure and complete (CONNECTION RECONFIGURATION
COMPLETE) arrive target eNodeB to stand, so far UE and the follow-up message of Target Station use that Target Station is complete to protect algorithm and AES.
Example IV
The present embodiment with RAT between be switched to UMTS from land radio access web (EvoIved UMTS is referred to as E-UTRAN)
Re-establish in land radio access web (UMTS Terrestrial Radio Access Network, referred to as UTRAN) flow process
Said to as a example Target RNC flow process.Specific as follows:
The first step:UE passes through measurement report (MEASUREMENT REPORT) information reporting measurement result.
Second step:The decision-making of source eNodeB base station needs to initiate switching, sends handover request (HANDOVER REQUIRED) and disappears
Cease to source MME, in this message, carry complete guarantor's algorithm in source station for the UE and AES parameter.
3rd step:To reconfiguration request (FORWARD RELOCATION REQUEST) message to target before source MME transmission
SGSN.
4th step:Destination service GPRS Support Node (Serving GPRS Supporting Node, referred to as SGSN)
Send reconfiguration request (RELOCATION REQUEST) message to Target RNC.
5th step:Target RNC distributing radio resource success simultaneously sends reconfiguration request response (RELOCATION REQUEST
ACKNOWLEDGE) message is to target SGSN.
6th step:Target SGSN send before to reconfigure response (FORWARD RELOCATION RESPONSE) message to
Source MME.
7th step:Source MME switching command (HANDOVER COMMAND) message is to source eNodeB.
8th step:Source eNodeB sends RRC and reconfigures (CONNECTION RECONFIGURATION) message to UE, message
In carry the Radio Resource that target eNodeB is allocated to UE.
9th step:UE receives after RRC reconfigures (CONNECTION RECONFIGURATION) message, is joined again
Make, because a variety of causes leads to join unsuccessfully again, UE rolls back to source eNodeB configuration data, UE decision-making simultaneously is initiated in Target Station
RRC re-establishes process.
Tenth step:UE sends RRC connection reconstruction request (CONNECTION REESTABLISHMENT REQUEST) message
To Target RNC.
11st step:Target RNC sends RRC connection reconstruction (CONNECTION REESTABLISHMENT) message to UE.
12nd step:UE transmission RRC connection re-establishment completes (CONNECTIONREESTABLISHMENTCOMPLETE) and disappears
Cease Target RNC, UE sends RRC connection re-establishment completes (CONNECTIONREESTABLISHMENTCOMPLETE) message makes
It is complete guarantor and the AES of source station.
13rd step:Target RNC needs to complete (CONNECTIONREESTABLISHMENT to RRC connection reconstruction
COMPLETE) message is encrypted and complete guarantor's algorithm detection, and Target Station is examined first by the complete guarantor of target and AES
Surveying, if detected unsuccessfully, representing that UE uses complete guarantor and the AES of source eNodeB, then Target RNC uses in second step
Complete guarantor and AES process safety detection that the UE that source station band comes uses in source eNodeB, detection is passed through, and UE is in target
The RRC of eNodeB side re-establishes successfully.
14th step:Target RNC sends RRC and reconfigures (CONNECTION RECONFIGURATION) message to UE, will
The complete guarantor of Target RNC and AES are allocated to UE.
15th step:UE receives after RRC reconfigures (CONNECTION RECONFIGURATION) message, receives new
Complete protect and AES configuration, and send RRC and connect and reconfigure and complete (CONNECTIONRECONFIGURATIONCOMPLETE)
To Target RNC station, so far UE and the follow-up message of Target RNC use that Target Station is complete to protect algorithm and AES.
Embodiment five
The present embodiment is to enter between RAT as a example UTRAN is switched to and re-establishes target eNodeB flow process EUTRAN flow process
Row explanation, specific as follows:
The first step:UE is by measurement report (MEASUREMENT REPORT) information reporting measurement result to source RNC.
Second step:Source RNC decision-making needs to initiate switching, sends and reconfigures (RELOCATION REQUIRED) message to source
SGSN, carries complete guarantor's algorithm in source station for the UE and AES parameter in this message.
3rd step:To reconfiguration request (FORWARD RELOCATION REQUEST) message to target before source SGSN transmission
MME.
4th step:Target MME sends handover request (HANDOVER REQUEST) message to target eNodeB.
5th step:The distributing radio resource success of target eNodeB simultaneously sends switching request response (HANDOVER
REQUESTACKNOWLEDGE) message is to target MME.
6th step:To response (FORWARD RESPONSE) message to source SGSN before the transmission of target MME.
7th step:Source SGSN sends and reconfigures order RELOCATION COMMAND message to source RNC.
8th step:Source RNC sends RRC and reconfigures (CONNECTION RECONFIGURATION) message to UE, in message
Carry the Radio Resource that target eNodeB is allocated to UE.
9th step:UE receives after RRC reconfigures (CONNECTION RECONFIGURATION) message, is joined again
Make, because a variety of causes leads to join unsuccessfully again, UE rolls back to source RNC configuration data, UE decision-making simultaneously initiates RRC weight in Target Station
Set up process.
Tenth step:UE sends RRC and rebuilds request (CONNECTION REESTABLISHMENT REQUEST) message to mesh
Mark eNodeB.
11st step:Target eNodeB send RRC connection reconstruction (CONNECTION REESTABLISHMENT) message to
UE.
12nd step:UE sends RRC connection re-establishment and completes (CONNECTION REESTABLISHMENTCOMPLETE)
To target eNodeB, UE sends RRC connection re-establishment to be completed (CONNECTIONREESTABLISHMENTCOMPLETE) and disappears message
Breath uses complete guarantor and the AES of source RNC.
13rd step:Target eNodeB needs to complete (CONNECTION REESTABLISHMENT to RRC connection re-establishment
COMPLETE) message is encrypted and complete guarantor's algorithm detection, and Target Station is examined first by the complete guarantor of target and AES
Surveying, if detected unsuccessfully, representing that UE uses complete guarantor and the AES of source RNC, then target eNodeB uses in second step
Complete guarantor and AES process safety detection that the UE that source station band comes uses in source eNodeB, detection is passed through, and UE is in target
The RRC of eNodeB side re-establishes successfully.
14th step:Target eNodeB sends RRC and reconfigures (CONNECTION RECONFIGURATION) message to UE,
The complete guarantor of target eNodeB and AES are allocated to UE.
15th step:UE receives after RRC reconfigures (CONNECTION RECONFIGURATION) message, receives new
Complete protect and AES configuration, and send RRC and connect and reconfigure (CONNECTION RECONFIGURATION COMPLETE) and arrive
Target eNodeB is stood, and so far UE and the follow-up message of target eNodeB use that Target Station is complete to protect algorithm and AES.
In another embodiment, additionally provide a kind of software, this software is used for executing above-described embodiment and preferably real
Apply the technical scheme described in mode.
In another embodiment, additionally provide a kind of storage medium, be stored with this storage medium above-mentioned software, should
Storage medium includes but is not limited to:CD, floppy disk, hard disk, scratch pad memory etc..
Obviously, those skilled in the art should be understood that each module of the above-mentioned present invention or each step can be with general
Computing device realizing, they can concentrate on single computing device, or be distributed in multiple computing devices and formed
Network on, alternatively, they can be realized with the executable program code of computing device, it is thus possible to they are stored
To be executed by computing device in the storage device, and in some cases, can be with different from shown in order execution herein
The step going out or describing, or they are fabricated to respectively each integrated circuit modules, or by the multiple modules in them or
Step is fabricated to single integrated circuit module to realize.So, the present invention is not restricted to any specific hardware and software combination.
These are only the preferred embodiments of the present invention, be not limited to the present invention, for those skilled in the art
For member, the present invention can have various modifications and variations.All any modifications within the spirit and principles in the present invention, made,
Equivalent, improvement etc., should be included within the scope of the present invention.