CN112954674B - Remote data security encryption method and system - Google Patents
Remote data security encryption method and system Download PDFInfo
- Publication number
- CN112954674B CN112954674B CN202110393742.5A CN202110393742A CN112954674B CN 112954674 B CN112954674 B CN 112954674B CN 202110393742 A CN202110393742 A CN 202110393742A CN 112954674 B CN112954674 B CN 112954674B
- Authority
- CN
- China
- Prior art keywords
- bandwidth
- data security
- base station
- security encryption
- subcarrier spacing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/02—Arrangements for optimising operational condition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/04—Wireless resource allocation
- H04W72/044—Wireless resource allocation based on the type of the allocated resource
- H04W72/0453—Resources in frequency domain, e.g. a carrier in FDMA
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/50—Allocation or scheduling criteria for wireless resources
- H04W72/56—Allocation or scheduling criteria for wireless resources based on priority criteria
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a remote data security encryption method, which comprises the following steps: generating a first data security encryption instruction and a second data security encryption instruction by a data security center server; configuring, by the first base station, a first portion of the bandwidth for transmitting low priority data and a second portion of the bandwidth for transmitting high priority data based on the connection configuration; sending, by the first base station, the connection configuration to the second base station; in response to receiving the connection configuration, configuring, by the second base station, a first portion of the bandwidth for transmitting low priority data and a second portion of the bandwidth for transmitting high priority data based on the connection configuration; the data security center server sends the first data security encryption command to the first base station, and the data security center server sends the second data security encryption command to the second base station; a first data security encryption directive is sent by the first base station to the first mobile terminal over a first portion of the bandwidth.
Description
Technical Field
The present invention relates to the field of data security technologies, and in particular, to a method and a system for secure encryption of remote data.
Background
The data security can be the security of the data, and mainly refers to the active protection of the data by adopting a modern cryptographic algorithm, such as data confidentiality, data integrity and bidirectional identity authentication.
CN102930215A discloses a generation method of portable data security device and a data security control method. It includes: firstly, partitioning a storage device connected with an external interface; generating a corresponding policy file based on the distributed user information, and storing the policy file in a policy storage area in the partition; and generating a data security program for performing data security control by reading the policy file based on the storage address of the policy file, and storing the data security program in a data security program storage area in a partition to obtain the portable data security device.
The information disclosed in this background section is only for enhancement of understanding of the general background of the invention and should not be taken as an acknowledgement or any form of suggestion that this information forms the prior art already known to a person skilled in the art.
Disclosure of Invention
The invention aims to provide a remote data security encryption method and system, which can overcome the defects of the prior art.
In order to achieve the above object, the present invention provides a secure encryption method for remote data, comprising the following steps:
generating a first data security encryption instruction and a second data security encryption instruction by a data security center server;
configuring, by the first base station, a first portion of a bandwidth for transmitting low priority data and a second portion of the bandwidth for transmitting high priority data based on the connection configuration, wherein the first portion of the bandwidth has a first frequency range and the second portion of the bandwidth has a second frequency range, wherein subcarriers in the first portion of the bandwidth have a first subcarrier spacing and subcarriers in the second portion of the bandwidth have a second subcarrier spacing, wherein the first subcarrier spacing is less than the second subcarrier spacing;
sending, by a first base station, a connection configuration to a second base station, wherein the second base station is a base station that is neighbor to the first base station;
in response to receiving the connection configuration, configuring, by the second base station, a first portion of the bandwidth for transmitting low priority data and a second portion of the bandwidth for transmitting high priority data based on the connection configuration, wherein the first portion of the bandwidth has a first frequency range and the second portion of the bandwidth has a second frequency range, wherein subcarriers in the first portion of the bandwidth have a first subcarrier spacing and subcarriers in the second portion of the bandwidth have a second subcarrier spacing, wherein the first subcarrier spacing is less than the second subcarrier spacing;
the data security center server sends the first data security encryption command to the first base station, and the data security center server sends the second data security encryption command to the second base station;
sending, by the first base station, a first data security encryption directive to the first mobile terminal over a first portion of the bandwidth in response to receiving the first data security encryption directive;
in response to receiving the second data security encryption directive, sending, by the second base station, the second data security encryption directive to the second mobile terminal over the second portion of the bandwidth.
In a preferred embodiment, the remote data security encryption method comprises the following steps:
adjusting, by the first base station, a subcarrier spacing of subcarriers in a first portion of the bandwidth based on the second connection configuration, wherein the adjusted first portion of the bandwidth has a first frequency range and a second portion of the bandwidth has a second frequency range, wherein the subcarriers in the first portion of the bandwidth have a third subcarrier spacing and the subcarriers in the second portion of the bandwidth have a second subcarrier spacing, wherein the third subcarrier spacing is less than the second subcarrier spacing;
sending, by the first base station, the second connection configuration to the second base station;
adjusting, by the second base station based on the second connection configuration, a subcarrier spacing of subcarriers in the first portion of the bandwidth in response to receiving the second connection configuration, wherein the adjusted first portion of the bandwidth has a first frequency range and the second portion of the bandwidth has a second frequency range, wherein the subcarriers in the first portion of the bandwidth have a third subcarrier spacing and the subcarriers in the second portion of the bandwidth have a second subcarrier spacing, wherein the third subcarrier spacing is less than the second subcarrier spacing;
sending, by the first base station, a first data security encryption directive to the first mobile terminal over a first portion of the bandwidth in response to receiving the first data security encryption directive;
in response to receiving the second data security encryption directive, sending, by the second base station, the second data security encryption directive to the second mobile terminal over the second portion of the bandwidth.
In a preferred embodiment, the remote data security encryption method comprises the following steps:
generating a first data security encryption instruction and a second data security encryption instruction by a data security center server;
configuring, by the first base station, a first portion of a bandwidth for transmitting low priority data and a second portion of the bandwidth for transmitting high priority data based on the connection configuration, wherein the first portion of the bandwidth has a first frequency range and the second portion of the bandwidth has a second frequency range, wherein subcarriers in the first portion of the bandwidth have a first subcarrier spacing and subcarriers in the second portion of the bandwidth have a second subcarrier spacing, wherein the first subcarrier spacing is less than the second subcarrier spacing;
the data security center server sends the first data security encryption command and the second data security encryption command to the first base station;
sending, by the first base station, a first data security encryption directive to the first mobile terminal over a first portion of the bandwidth in response to receiving the first data security encryption directive;
and if the first base station judges that no time-frequency resource exists on the second part of the bandwidth for sending the second data security encryption instruction, sending a first downlink control message to the first mobile terminal by the first base station in the first part of the bandwidth and the first symbol set, wherein the subcarrier set used for the first downlink control message has a first subcarrier interval, the first downlink control message indicates the time-frequency resource used for sending the second data security encryption instruction to the first mobile terminal, and the time-frequency resource used for sending the second data security encryption instruction is positioned in the first part of the bandwidth.
In a preferred embodiment, the remote data security encryption method comprises the following steps:
receiving, by the first mobile terminal, a second data security encryption instruction transmitted by the first base station on a first set of subcarriers of a first portion of the bandwidth and a second set of symbols in response to receiving the first downlink control message, wherein subcarriers in the first set of subcarriers of the first portion of the bandwidth have a second subcarrier spacing;
the data security center server sends the first data security encryption command and the second data security encryption command to the first base station;
sending, by the first base station, a first data security encryption directive to the first mobile terminal over a first portion of the bandwidth in response to receiving the first data security encryption directive;
if the first base station determines that there is no time-frequency resource on the second part of the bandwidth for transmitting the second data security encryption instruction, transmitting, by the first base station, a second downlink control message to the first mobile terminal on a first set of subcarriers and a first set of symbols of the first part of the bandwidth, wherein the second downlink control message indicates to the first mobile terminal the time-frequency resource for transmitting the second data security encryption instruction, wherein the time-frequency resource for transmitting the second data security encryption instruction is located within the first part of the bandwidth, wherein subcarriers in the first set of subcarriers of the first part of the bandwidth have a second subcarrier spacing;
in response to receiving the second downlink control message, receiving, by the first mobile terminal, a second data security encryption instruction transmitted by the first base station on a first set of subcarriers of the first portion of the bandwidth and a second set of symbols, wherein subcarriers in the first set of subcarriers of the first portion of the bandwidth have a second subcarrier spacing.
In a preferred embodiment, the remote data security encryption method comprises the following steps:
generating a first data security encryption instruction and a second data security encryption instruction by a data security center server;
configuring, by the first base station, a first portion of a bandwidth for transmitting low priority data and a second portion of the bandwidth for transmitting high priority data based on the connection configuration, wherein the first portion of the bandwidth has a first frequency range and the second portion of the bandwidth has a second frequency range, wherein subcarriers in the first portion of the bandwidth have a first subcarrier spacing and subcarriers in the second portion of the bandwidth have a second subcarrier spacing, wherein the first subcarrier spacing is less than the second subcarrier spacing;
the data security center server sends a first data security encryption instruction to a first base station;
in response to receiving the first data security encryption instruction, listening, by the first base station, for a first scheduling request transmitted by the first mobile terminal using a first transmission beam in a first set of symbols, for a second scheduling request transmitted by the first mobile terminal using a second transmission beam in a second set of symbols, and for a third scheduling request transmitted by the first mobile terminal using a third transmission beam in a third set of symbols;
in response to monitoring the first scheduling request, the second scheduling request and the third scheduling request, the first base station judges the receiving strength of the first scheduling request, the second scheduling request and the third scheduling request;
if the receiving intensity of the first scheduling request is judged to be the maximum, the first base station sends MAC CE to the first mobile terminal on the first part of the bandwidth, wherein the MAC CE informs the first mobile terminal to receive a first data security encryption command sent by the first base station by using a first transmitting beam;
in response to transmitting the MAC CE to the first mobile terminal, a first data security encryption directive is transmitted by the first base station to the first mobile terminal over a first portion of the bandwidth.
The invention provides a remote data security encryption system, which comprises:
a unit for generating, by a data security center server, a first data security encryption instruction and a second data security encryption instruction;
means for configuring, by a first base station based on a connection configuration, a first portion of a bandwidth for transmitting low priority data and a second portion of the bandwidth for transmitting high priority data, wherein the first portion of the bandwidth has a first frequency range and the second portion of the bandwidth has a second frequency range, wherein subcarriers in the first portion of the bandwidth have a first subcarrier spacing and subcarriers in the second portion of the bandwidth have a second subcarrier spacing, wherein the first subcarrier spacing is less than the second subcarrier spacing;
means for transmitting, by a first base station, a connection configuration to a second base station, wherein the second base station is a neighbor base station to the first base station;
means for configuring, by the second base station based on the connection configuration, a first portion of the bandwidth for transmitting low priority data and a second portion of the bandwidth for transmitting high priority data in response to receiving the connection configuration, wherein the first portion of the bandwidth has a first frequency range and the second portion of the bandwidth has a second frequency range, wherein subcarriers in the first portion of the bandwidth have a first subcarrier spacing and subcarriers in the second portion of the bandwidth have a second subcarrier spacing, wherein the first subcarrier spacing is less than the second subcarrier spacing;
a unit for transmitting the first data security encryption command to the first base station by the data security center server, and transmitting the second data security encryption command to the second base station by the data security center server;
means for transmitting, by the first base station, a first data security encryption directive to the first mobile terminal over a first portion of the bandwidth in response to receiving the first data security encryption directive;
means for transmitting, by the second base station, a second data security encryption directive to the second mobile terminal over a second portion of the bandwidth in response to receiving the second data security encryption directive.
In a preferred embodiment, a remote data security encryption system comprises:
means for adjusting, by the first base station, a subcarrier spacing of subcarriers in a first portion of a bandwidth based on the second connection configuration, wherein the adjusted first portion of the bandwidth has a first frequency range and a second portion of the bandwidth has a second frequency range, wherein the subcarriers in the first portion of the bandwidth have a third subcarrier spacing and the subcarriers in the second portion of the bandwidth have a second subcarrier spacing, wherein the third subcarrier spacing is less than the second subcarrier spacing;
means for transmitting, by the first base station, the second connection configuration to the second base station;
means for adjusting, by the second base station based on the second connection configuration, a subcarrier spacing of subcarriers in the first portion of the bandwidth in response to receiving the second connection configuration, wherein the adjusted first portion of the bandwidth has a first frequency range and the second portion of the bandwidth has a second frequency range, wherein the subcarriers in the first portion of the bandwidth have a third subcarrier spacing and the subcarriers in the second portion of the bandwidth have a second subcarrier spacing, wherein the third subcarrier spacing is less than the second subcarrier spacing;
means for transmitting, by the first base station, a first data security encryption directive to the first mobile terminal over a first portion of the bandwidth in response to receiving the first data security encryption directive;
means for transmitting, by the second base station, a second data security encryption directive to the second mobile terminal over a second portion of the bandwidth in response to receiving the second data security encryption directive.
In a preferred embodiment, a remote data security encryption system comprises:
a unit for generating, by a data security center server, a first data security encryption instruction and a second data security encryption instruction;
means for configuring, by a first base station based on a connection configuration, a first portion of a bandwidth for transmitting low priority data and a second portion of the bandwidth for transmitting high priority data, wherein the first portion of the bandwidth has a first frequency range and the second portion of the bandwidth has a second frequency range, wherein subcarriers in the first portion of the bandwidth have a first subcarrier spacing and subcarriers in the second portion of the bandwidth have a second subcarrier spacing, wherein the first subcarrier spacing is less than the second subcarrier spacing;
a unit for transmitting, by the data security center server, the first data security encryption command and the second data security encryption command to the first base station;
means for transmitting, by the first base station, a first data security encryption directive to the first mobile terminal over a first portion of the bandwidth in response to receiving the first data security encryption directive;
means for transmitting, by the first base station, a first downlink control message to the first mobile terminal over the first portion of the bandwidth and the first set of symbols if the first base station determines that there are no time-frequency resources on the second portion of the bandwidth for transmitting the second data security encryption instruction, wherein the set of subcarriers for the first downlink control message has a first subcarrier spacing, wherein the first downlink control message indicates to the first mobile terminal the time-frequency resources for transmitting the second data security encryption instruction, wherein the time-frequency resources for transmitting the second data security encryption instruction are located within the first portion of the bandwidth.
In a preferred embodiment, a remote data security encryption system comprises:
means for receiving, by the first mobile terminal, a second data security encryption instruction transmitted by the first base station on a first set of subcarriers of a first portion of the bandwidth and a second set of symbols in response to receiving the first downlink control message, wherein subcarriers in the first set of subcarriers of the first portion of the bandwidth have a second subcarrier spacing;
a unit for transmitting, by the data security center server, the first data security encryption command and the second data security encryption command to the first base station;
means for transmitting, by the first base station, a first data security encryption directive to the first mobile terminal over a first portion of the bandwidth in response to receiving the first data security encryption directive;
means for transmitting, by the first base station, a second downlink control message to the first mobile terminal over a first set of subcarriers and a first set of symbols of the first portion of the bandwidth if the first base station determines that there are no time-frequency resources on the second portion of the bandwidth for transmitting the second data security encryption instruction, wherein the second downlink control message indicates to the first mobile terminal the time-frequency resources for transmitting the second data security encryption instruction, wherein the time-frequency resources for transmitting the second data security encryption instruction are located within the first portion of the bandwidth, wherein subcarriers in the first set of subcarriers of the first portion of the bandwidth have a second subcarrier spacing;
means for receiving, by the first mobile terminal, a second data security encryption instruction sent by the first base station on a first set of subcarriers of a first portion of the bandwidth and a second set of symbols in response to receiving the second downlink control message, wherein subcarriers in the first set of subcarriers of the first portion of the bandwidth have a second subcarrier spacing.
In a preferred embodiment, a remote data security encryption system comprises:
a unit for generating, by a data security center server, a first data security encryption instruction and a second data security encryption instruction;
means for configuring, by a first base station based on a connection configuration, a first portion of a bandwidth for transmitting low priority data and a second portion of the bandwidth for transmitting high priority data, wherein the first portion of the bandwidth has a first frequency range and the second portion of the bandwidth has a second frequency range, wherein subcarriers in the first portion of the bandwidth have a first subcarrier spacing and subcarriers in the second portion of the bandwidth have a second subcarrier spacing, wherein the first subcarrier spacing is less than the second subcarrier spacing;
means for sending, by the data security center server, a first data security encryption command to the first base station;
means for, in response to receiving the first data security encryption instruction, listening, by the first base station, for a first scheduling request transmitted by the first mobile terminal using a first transmission beam in a first set of symbols, for a second scheduling request transmitted by the first mobile terminal using a second transmission beam in a second set of symbols, and for a third scheduling request transmitted by the first mobile terminal using a third transmission beam in a third set of symbols;
the first base station is used for responding to the first scheduling request, the second scheduling request and the third scheduling request which are monitored, and judging the receiving strength of the first scheduling request, the second scheduling request and the third scheduling request;
means for transmitting, by the first base station, a MAC CE to the first mobile terminal over the first portion of the bandwidth if the reception strength of the first scheduling request is determined to be the maximum, wherein the MAC CE notifies the first mobile terminal to receive a first data security encryption command transmitted by the first base station using the first transmission beam;
means for transmitting, by the first base station, a first data security encryption directive to the first mobile terminal over a first portion of the bandwidth in response to transmitting the MAC CE to the first mobile terminal.
Compared with the prior art, the invention has the advantages that with the arrival of the mobile communication era, the wireless communication mode gradually replaces the wired communication mode, and a plurality of users are completely separated from the wired network connection. How to guarantee data security of wireless communication devices is a current technical hotspot. The basis for protecting the data security is to ensure the rapid and stable transmission of security-related information, and if the security information cannot be accurately transmitted, many security algorithms cannot be executed. Aiming at the requirements of the prior art, the application provides a remote data security encryption method and system.
Drawings
Fig. 1 is a schematic diagram of a system architecture according to an embodiment of the present invention.
FIG. 2 is a flow diagram of a method according to an embodiment of the invention.
Detailed Description
The following detailed description of the present invention is provided in conjunction with the accompanying drawings, but it should be understood that the scope of the present invention is not limited to the specific embodiments.
Throughout the specification and claims, unless explicitly stated otherwise, the word "comprise", or variations such as "comprises" or "comprising", will be understood to imply the inclusion of a stated element or component but not the exclusion of any other element or component.
Example 1
Fig. 1 is a schematic diagram of a system architecture according to an embodiment of the present invention.
FIG. 2 is a flow diagram of a method according to an embodiment of the invention. As shown in the figure, the remote data security encryption method of the present invention includes the following steps:
step 101: generating a first data security encryption instruction and a second data security encryption instruction by a data security center server; for example, the mobile terminal prestores a plurality of data encryption modes, and the data security center server switches the plurality of data encryption modes through instructions, so that the difficulty of information cracking can be improved;
step 102: configuring, by the first base station, a first portion of a bandwidth for transmitting low priority data and a second portion of the bandwidth for transmitting high priority data based on the connection configuration, wherein the first portion of the bandwidth has a first frequency range and the second portion of the bandwidth has a second frequency range, wherein subcarriers in the first portion of the bandwidth have a first subcarrier spacing and subcarriers in the second portion of the bandwidth have a second subcarrier spacing, wherein the first subcarrier spacing is less than the second subcarrier spacing; as will be understood by those skilled in the art, the "connection configuration" includes information about the allocation of bandwidth, the allocation of subcarrier spacing, and the like;
in a specific embodiment, taking the spectrum range of the chinese mobile as an example, a part of the chinese mobile device operates in the spectrum range of 1880-1900MHz, then the bandwidth width of this part is 20MHz, and the actual system of the present application may use only 10MHz therein, then in this embodiment, the first part of the bandwidth may refer to the bandwidth part of 1880-1885MHz, and the second part of the bandwidth may refer to the bandwidth part of 1885-1890 MHz. Of course, it should be understood by those skilled in the art that in the aforementioned 5MHz band portion, a guard band or other frequency band not used for transmitting data needs to be set, which is common knowledge and will not be described in detail herein. In this embodiment, the subcarriers may have a first subcarrier spacing in the bandwidth portion of 1880-1885 MHz.
In one embodiment, the frequency bandwidth of the first portion of the bandwidth is greater than the frequency bandwidth of the second portion of the bandwidth, in one embodiment, the first base station may receive expected data priority profile information sent by the data security center server, the expected data priority profile information indicating to the first base station a priority profile of the data security encryption commands for a future time period, in one embodiment, the priority profile may be a ratio between the high priority data security encryption commands and the low priority data security encryption commands, the first base station may reconfigure the frequency bandwidth of the first portion of the bandwidth and the frequency bandwidth of the second portion of the bandwidth based on the ratio between the high priority data security encryption commands and the low priority data security encryption commands, for example, if the ratio between the high priority data security encryption commands and the low priority data security encryption commands is greater than 1, the first base station reconfiguring the frequency bandwidth of the first portion of the bandwidth so that it is less than the frequency bandwidth of the second portion of the bandwidth, if the ratio between the high priority data security encryption commands and the low priority data security encryption commands is less than 1, the first base station reconfiguring the frequency bandwidth of the first portion of the bandwidth so that it is greater than the frequency bandwidth of the second portion of the bandwidth;
step 103: sending, by a first base station, a connection configuration to a second base station, wherein the second base station is a base station that is neighbor to the first base station; in a specific embodiment, the second base station may be a macro base station, the first base station may be a small cell base station, and when the first base station is located within the coverage of the second base station, the second base station may be considered as a base station adjacent to the first base station;
step 104: in response to receiving the connection configuration, configuring, by the second base station, a first portion of the bandwidth for transmitting low priority data and a second portion of the bandwidth for transmitting high priority data based on the connection configuration, wherein the first portion of the bandwidth has a first frequency range and the second portion of the bandwidth has a second frequency range, wherein subcarriers in the first portion of the bandwidth have a first subcarrier spacing and subcarriers in the second portion of the bandwidth have a second subcarrier spacing, wherein the first subcarrier spacing is less than the second subcarrier spacing;
step 105: the data security center server sends the first data security encryption command to the first base station, and the data security center server sends the second data security encryption command to the second base station;
step 106: sending, by the first base station, a first data security encryption directive to the first mobile terminal over a first portion of the bandwidth in response to receiving the first data security encryption directive;
step 107: in response to receiving the second data security encryption directive, sending, by the second base station, the second data security encryption directive to the second mobile terminal over the second portion of the bandwidth.
Further, the remote data security encryption method comprises the following steps: adjusting, by the first base station, a subcarrier spacing of subcarriers in a first portion of the bandwidth based on the second connection configuration, wherein the adjusted first portion of the bandwidth has a first frequency range and a second portion of the bandwidth has a second frequency range, wherein the subcarriers in the first portion of the bandwidth have a third subcarrier spacing and the subcarriers in the second portion of the bandwidth have a second subcarrier spacing, wherein the third subcarrier spacing is less than the second subcarrier spacing; sending, by the first base station, the second connection configuration to the second base station; adjusting, by the second base station based on the second connection configuration, a subcarrier spacing of subcarriers in the first portion of the bandwidth in response to receiving the second connection configuration, wherein the adjusted first portion of the bandwidth has a first frequency range and the second portion of the bandwidth has a second frequency range, wherein the subcarriers in the first portion of the bandwidth have a third subcarrier spacing and the subcarriers in the second portion of the bandwidth have a second subcarrier spacing, wherein the third subcarrier spacing is less than the second subcarrier spacing; sending, by the first base station, a first data security encryption directive to the first mobile terminal over a first portion of the bandwidth in response to receiving the first data security encryption directive; in response to receiving the second data security encryption directive, sending, by the second base station, the second data security encryption directive to the second mobile terminal over the second portion of the bandwidth.
Further, the remote data security encryption method comprises the following steps: generating a first data security encryption instruction and a second data security encryption instruction by a data security center server; configuring, by the first base station, a first portion of a bandwidth for transmitting low priority data and a second portion of the bandwidth for transmitting high priority data based on the connection configuration, wherein the first portion of the bandwidth has a first frequency range and the second portion of the bandwidth has a second frequency range, wherein subcarriers in the first portion of the bandwidth have a first subcarrier spacing and subcarriers in the second portion of the bandwidth have a second subcarrier spacing, wherein the first subcarrier spacing is less than the second subcarrier spacing; the data security center server sends the first data security encryption command and the second data security encryption command to the first base station; sending, by the first base station, a first data security encryption directive to the first mobile terminal over a first portion of the bandwidth in response to receiving the first data security encryption directive; and if the first base station judges that no time-frequency resource exists on the second part of the bandwidth for sending the second data security encryption instruction, sending a first downlink control message to the first mobile terminal by the first base station in the first part of the bandwidth and the first symbol set, wherein the subcarrier set used for the first downlink control message has a first subcarrier interval, the first downlink control message indicates the time-frequency resource used for sending the second data security encryption instruction to the first mobile terminal, and the time-frequency resource used for sending the second data security encryption instruction is positioned in the first part of the bandwidth.
Further, the remote data security encryption method comprises the following steps: receiving, by the first mobile terminal, a second data security encryption instruction transmitted by the first base station on a first set of subcarriers of a first portion of the bandwidth and a second set of symbols in response to receiving the first downlink control message, wherein subcarriers in the first set of subcarriers of the first portion of the bandwidth have a second subcarrier spacing; the data security center server sends the first data security encryption command and the second data security encryption command to the first base station; sending, by the first base station, a first data security encryption directive to the first mobile terminal over a first portion of the bandwidth in response to receiving the first data security encryption directive; if the first base station determines that there is no time-frequency resource on the second part of the bandwidth for transmitting the second data security encryption instruction, transmitting, by the first base station, a second downlink control message to the first mobile terminal on a first set of subcarriers and a first set of symbols of the first part of the bandwidth, wherein the second downlink control message indicates to the first mobile terminal the time-frequency resource for transmitting the second data security encryption instruction, wherein the time-frequency resource for transmitting the second data security encryption instruction is located within the first part of the bandwidth, wherein subcarriers in the first set of subcarriers of the first part of the bandwidth have a second subcarrier spacing; in response to receiving the second downlink control message, receiving, by the first mobile terminal, a second data security encryption instruction transmitted by the first base station on a first set of subcarriers of the first portion of the bandwidth and a second set of symbols, wherein subcarriers in the first set of subcarriers of the first portion of the bandwidth have a second subcarrier spacing.
Further, the remote data security encryption method comprises the following steps: generating a first data security encryption instruction and a second data security encryption instruction by a data security center server; configuring, by the first base station, a first portion of a bandwidth for transmitting low priority data and a second portion of the bandwidth for transmitting high priority data based on the connection configuration, wherein the first portion of the bandwidth has a first frequency range and the second portion of the bandwidth has a second frequency range, wherein subcarriers in the first portion of the bandwidth have a first subcarrier spacing and subcarriers in the second portion of the bandwidth have a second subcarrier spacing, wherein the first subcarrier spacing is less than the second subcarrier spacing; the data security center server sends a first data security encryption instruction to a first base station; in response to receiving the first data security encryption instruction, listening, by the first base station, for a first scheduling request transmitted by the first mobile terminal using a first transmission beam in a first set of symbols, for a second scheduling request transmitted by the first mobile terminal using a second transmission beam in a second set of symbols, and for a third scheduling request transmitted by the first mobile terminal using a third transmission beam in a third set of symbols; in response to monitoring the first scheduling request, the second scheduling request and the third scheduling request, the first base station judges the receiving strength of the first scheduling request, the second scheduling request and the third scheduling request; if the receiving intensity of the first scheduling request is judged to be the maximum, the first base station sends MAC CE to the first mobile terminal on the first part of the bandwidth, wherein the MAC CE informs the first mobile terminal to receive a first data security encryption command sent by the first base station by using a first transmitting beam; in response to transmitting the MAC CE to the first mobile terminal, a first data security encryption directive is transmitted by the first base station to the first mobile terminal over a first portion of the bandwidth.
The invention also provides a remote data security encryption system, which comprises: a unit for generating, by a data security center server, a first data security encryption instruction and a second data security encryption instruction; means for configuring, by a first base station based on a connection configuration, a first portion of a bandwidth for transmitting low priority data and a second portion of the bandwidth for transmitting high priority data, wherein the first portion of the bandwidth has a first frequency range and the second portion of the bandwidth has a second frequency range, wherein subcarriers in the first portion of the bandwidth have a first subcarrier spacing and subcarriers in the second portion of the bandwidth have a second subcarrier spacing, wherein the first subcarrier spacing is less than the second subcarrier spacing; means for transmitting, by a first base station, a connection configuration to a second base station, wherein the second base station is a neighbor base station to the first base station; means for configuring, by the second base station based on the connection configuration, a first portion of the bandwidth for transmitting low priority data and a second portion of the bandwidth for transmitting high priority data in response to receiving the connection configuration, wherein the first portion of the bandwidth has a first frequency range and the second portion of the bandwidth has a second frequency range, wherein subcarriers in the first portion of the bandwidth have a first subcarrier spacing and subcarriers in the second portion of the bandwidth have a second subcarrier spacing, wherein the first subcarrier spacing is less than the second subcarrier spacing; a unit for transmitting the first data security encryption command to the first base station by the data security center server, and transmitting the second data security encryption command to the second base station by the data security center server; means for transmitting, by the first base station, a first data security encryption directive to the first mobile terminal over a first portion of the bandwidth in response to receiving the first data security encryption directive; means for transmitting, by the second base station, a second data security encryption directive to the second mobile terminal over a second portion of the bandwidth in response to receiving the second data security encryption directive.
Further, the remote data security encryption system comprises: means for adjusting, by the first base station, a subcarrier spacing of subcarriers in a first portion of a bandwidth based on the second connection configuration, wherein the adjusted first portion of the bandwidth has a first frequency range and a second portion of the bandwidth has a second frequency range, wherein the subcarriers in the first portion of the bandwidth have a third subcarrier spacing and the subcarriers in the second portion of the bandwidth have a second subcarrier spacing, wherein the third subcarrier spacing is less than the second subcarrier spacing; means for transmitting, by the first base station, the second connection configuration to the second base station; means for adjusting, by the second base station based on the second connection configuration, a subcarrier spacing of subcarriers in the first portion of the bandwidth in response to receiving the second connection configuration, wherein the adjusted first portion of the bandwidth has a first frequency range and the second portion of the bandwidth has a second frequency range, wherein the subcarriers in the first portion of the bandwidth have a third subcarrier spacing and the subcarriers in the second portion of the bandwidth have a second subcarrier spacing, wherein the third subcarrier spacing is less than the second subcarrier spacing; means for transmitting, by the first base station, a first data security encryption directive to the first mobile terminal over a first portion of the bandwidth in response to receiving the first data security encryption directive; means for transmitting, by the second base station, a second data security encryption directive to the second mobile terminal over a second portion of the bandwidth in response to receiving the second data security encryption directive.
Further, the remote data security encryption system comprises: a unit for generating, by a data security center server, a first data security encryption instruction and a second data security encryption instruction; means for configuring, by a first base station based on a connection configuration, a first portion of a bandwidth for transmitting low priority data and a second portion of the bandwidth for transmitting high priority data, wherein the first portion of the bandwidth has a first frequency range and the second portion of the bandwidth has a second frequency range, wherein subcarriers in the first portion of the bandwidth have a first subcarrier spacing and subcarriers in the second portion of the bandwidth have a second subcarrier spacing, wherein the first subcarrier spacing is less than the second subcarrier spacing; a unit for transmitting, by the data security center server, the first data security encryption command and the second data security encryption command to the first base station; means for transmitting, by the first base station, a first data security encryption directive to the first mobile terminal over a first portion of the bandwidth in response to receiving the first data security encryption directive; means for transmitting, by the first base station, a first downlink control message to the first mobile terminal over the first portion of the bandwidth and the first set of symbols if the first base station determines that there are no time-frequency resources on the second portion of the bandwidth for transmitting the second data security encryption instruction, wherein the set of subcarriers for the first downlink control message has a first subcarrier spacing, wherein the first downlink control message indicates to the first mobile terminal the time-frequency resources for transmitting the second data security encryption instruction, wherein the time-frequency resources for transmitting the second data security encryption instruction are located within the first portion of the bandwidth.
Further, the remote data security encryption system comprises: means for receiving, by the first mobile terminal, a second data security encryption instruction transmitted by the first base station on a first set of subcarriers of a first portion of the bandwidth and a second set of symbols in response to receiving the first downlink control message, wherein subcarriers in the first set of subcarriers of the first portion of the bandwidth have a second subcarrier spacing; a unit for transmitting, by the data security center server, the first data security encryption command and the second data security encryption command to the first base station; means for transmitting, by the first base station, a first data security encryption directive to the first mobile terminal over a first portion of the bandwidth in response to receiving the first data security encryption directive; means for transmitting, by the first base station, a second downlink control message to the first mobile terminal over a first set of subcarriers and a first set of symbols of the first portion of the bandwidth if the first base station determines that there are no time-frequency resources on the second portion of the bandwidth for transmitting the second data security encryption instruction, wherein the second downlink control message indicates to the first mobile terminal the time-frequency resources for transmitting the second data security encryption instruction, wherein the time-frequency resources for transmitting the second data security encryption instruction are located within the first portion of the bandwidth, wherein subcarriers in the first set of subcarriers of the first portion of the bandwidth have a second subcarrier spacing; means for receiving, by the first mobile terminal, a second data security encryption instruction sent by the first base station on a first set of subcarriers of a first portion of the bandwidth and a second set of symbols in response to receiving the second downlink control message, wherein subcarriers in the first set of subcarriers of the first portion of the bandwidth have a second subcarrier spacing.
Further, the remote data security encryption system comprises: a unit for generating, by a data security center server, a first data security encryption instruction and a second data security encryption instruction;
means for configuring, by a first base station based on a connection configuration, a first portion of a bandwidth for transmitting low priority data and a second portion of the bandwidth for transmitting high priority data, wherein the first portion of the bandwidth has a first frequency range and the second portion of the bandwidth has a second frequency range, wherein subcarriers in the first portion of the bandwidth have a first subcarrier spacing and subcarriers in the second portion of the bandwidth have a second subcarrier spacing, wherein the first subcarrier spacing is less than the second subcarrier spacing; means for sending, by the data security center server, a first data security encryption command to the first base station; means for, in response to receiving the first data security encryption instruction, listening, by the first base station, for a first scheduling request transmitted by the first mobile terminal using a first transmission beam in a first set of symbols, for a second scheduling request transmitted by the first mobile terminal using a second transmission beam in a second set of symbols, and for a third scheduling request transmitted by the first mobile terminal using a third transmission beam in a third set of symbols; the first base station is used for responding to the first scheduling request, the second scheduling request and the third scheduling request which are monitored, and judging the receiving strength of the first scheduling request, the second scheduling request and the third scheduling request; means for transmitting, by the first base station, a MAC CE to the first mobile terminal over the first portion of the bandwidth if the reception strength of the first scheduling request is determined to be the maximum, wherein the MAC CE notifies the first mobile terminal to receive a first data security encryption command transmitted by the first base station using the first transmission beam; means for transmitting, by the first base station, a first data security encryption directive to the first mobile terminal over a first portion of the bandwidth in response to transmitting the MAC CE to the first mobile terminal.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The foregoing descriptions of specific exemplary embodiments of the present invention have been presented for purposes of illustration and description. It is not intended to limit the invention to the precise form disclosed, and obviously many modifications and variations are possible in light of the above teaching. The exemplary embodiments were chosen and described in order to explain certain principles of the invention and its practical application to enable one skilled in the art to make and use various exemplary embodiments of the invention and various alternatives and modifications as are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the claims and their equivalents.
Claims (8)
1. A remote data security encryption method is characterized in that,
the remote data security encryption method comprises the following steps:
generating a first data security encryption instruction and a second data security encryption instruction by a data security center server;
configuring, by a first base station, a first portion of a bandwidth for transmitting low priority data and a second portion of a bandwidth for transmitting high priority data based on a connection configuration, wherein the first portion of the bandwidth has a first frequency range and the second portion of the bandwidth has a second frequency range, wherein subcarriers in the first portion of the bandwidth have a first subcarrier spacing and subcarriers in the second portion of the bandwidth have a second subcarrier spacing, wherein the first subcarrier spacing is less than the second subcarrier spacing;
transmitting, by a first base station, the connection configuration to a second base station, wherein the second base station is a neighbor base station to the first base station;
in response to receiving the connection configuration, configuring, by a second base station, a first portion of a bandwidth for transmitting low priority data and a second portion of a bandwidth for transmitting high priority data based on the connection configuration, wherein the first portion of the bandwidth has a first frequency range and the second portion of the bandwidth has a second frequency range, wherein subcarriers in the first portion of the bandwidth have a first subcarrier spacing and subcarriers in the second portion of the bandwidth have a second subcarrier spacing, wherein the first subcarrier spacing is less than the second subcarrier spacing;
the data security center server sends the first data security encryption command to the first base station, and the data security center server sends the second data security encryption command to the second base station;
sending, by the first base station, the first data security encryption directive to the first mobile terminal over the first portion of the bandwidth in response to receiving the first data security encryption directive;
sending, by the second base station, the second data security encryption directive to the second mobile terminal over the second portion of the bandwidth in response to receiving the second data security encryption directive.
2. The remote data security encryption method of claim 1,
the remote data security encryption method comprises the following steps:
adjusting, by the first base station, a subcarrier spacing of subcarriers in a first portion of a bandwidth based on a second connection configuration, wherein the adjusted first portion of the bandwidth has a first frequency range and a second portion of the bandwidth has a second frequency range, wherein the subcarriers in the first portion of the bandwidth have a third subcarrier spacing and the subcarriers in the second portion of the bandwidth have a second subcarrier spacing, wherein the third subcarrier spacing is less than the second subcarrier spacing;
transmitting, by the first base station, the second connection configuration to the second base station;
adjusting, by a second base station based on the second connection configuration, a subcarrier spacing of subcarriers in a first portion of a bandwidth in response to receiving the second connection configuration, wherein the adjusted first portion of the bandwidth has a first frequency range and a second portion of the bandwidth has a second frequency range, wherein the subcarriers in the first portion of the bandwidth have a third subcarrier spacing and the subcarriers in the second portion of the bandwidth have a second subcarrier spacing, wherein the third subcarrier spacing is less than the second subcarrier spacing;
sending, by the first base station, the first data security encryption directive to the first mobile terminal over the first portion of the bandwidth in response to receiving the first data security encryption directive;
sending, by the second base station, the second data security encryption directive to the second mobile terminal over the second portion of the bandwidth in response to receiving the second data security encryption directive.
3. The remote data security encryption method of claim 2,
the remote data security encryption method comprises the following steps:
generating a first data security encryption instruction and a second data security encryption instruction by a data security center server;
configuring, by a first base station, a first portion of a bandwidth for transmitting low priority data and a second portion of a bandwidth for transmitting high priority data based on a connection configuration, wherein the first portion of the bandwidth has a first frequency range and the second portion of the bandwidth has a second frequency range, wherein subcarriers in the first portion of the bandwidth have a first subcarrier spacing and subcarriers in the second portion of the bandwidth have a second subcarrier spacing, wherein the first subcarrier spacing is less than the second subcarrier spacing;
sending, by a data security center server, the first data security encryption instruction and the second data security encryption instruction to the first base station;
sending, by the first base station, the first data security encryption directive to the first mobile terminal over the first portion of the bandwidth in response to receiving the first data security encryption directive;
and if the first base station judges that no time-frequency resource exists on the second part of the bandwidth for sending the second data security encryption instruction, sending a first downlink control message to the first mobile terminal by the first base station in the first part of the bandwidth and the first symbol set, wherein a subcarrier set used for the first downlink control message has a first subcarrier interval, the first downlink control message indicates the time-frequency resource used for sending the second data security encryption instruction to the first mobile terminal, and the time-frequency resource used for sending the second data security encryption instruction is positioned in the first part of the bandwidth.
4. The remote data security encryption method of claim 3,
the remote data security encryption method comprises the following steps:
receiving, by the first mobile terminal, a second data security encryption instruction transmitted by the first base station on a first set of subcarriers of the first portion of the bandwidth and a second set of symbols in response to receiving the first downlink control message, wherein subcarriers of the first set of subcarriers of the first portion of the bandwidth have a second subcarrier spacing;
sending, by a data security center server, the first data security encryption instruction and the second data security encryption instruction to the first base station;
sending, by the first base station, the first data security encryption directive to the first mobile terminal over the first portion of the bandwidth in response to receiving the first data security encryption directive;
if the first base station determines that there is no time-frequency resource on the second part of the bandwidth for transmitting the second data security encryption instruction, transmitting, by the first base station, a second downlink control message to the first mobile terminal on a first subcarrier set and a first symbol set of the first part of the bandwidth, wherein the second downlink control message indicates to the first mobile terminal a time-frequency resource for transmitting the second data security encryption instruction, wherein the time-frequency resource for transmitting the second data security encryption instruction is located within the first part of the bandwidth, and wherein subcarriers in the first subcarrier set of the first part of the bandwidth have a second subcarrier spacing;
receiving, by the first mobile terminal, a second data security encryption directive sent by the first base station over a first set of subcarriers of the first portion of the bandwidth and a second set of symbols in response to receiving the second downlink control message, wherein the subcarriers in the first set of subcarriers of the first portion of the bandwidth have a second subcarrier spacing.
5. A remote data security encryption system is characterized in that,
the remote data security encryption system comprises:
a unit for generating, by a data security center server, a first data security encryption instruction and a second data security encryption instruction;
means for configuring, by a first base station, a first portion of a bandwidth for transmission of low priority data and a second portion of a bandwidth for transmission of high priority data based on a connection configuration, wherein the first portion of the bandwidth has a first frequency range and the second portion of the bandwidth has a second frequency range, wherein subcarriers in the first portion of the bandwidth have a first subcarrier spacing and subcarriers in the second portion of the bandwidth have a second subcarrier spacing, wherein the first subcarrier spacing is less than the second subcarrier spacing;
means for transmitting, by a first base station, the connection configuration to a second base station, wherein the second base station is a neighbor base station to the first base station;
means for configuring, by a second base station based on the connection configuration, a first portion of a bandwidth for transmitting low priority data and a second portion of a bandwidth for transmitting high priority data in response to receiving the connection configuration, wherein the first portion of the bandwidth has a first frequency range and the second portion of the bandwidth has a second frequency range, wherein subcarriers in the first portion of the bandwidth have a first subcarrier spacing and subcarriers in the second portion of the bandwidth have a second subcarrier spacing, wherein the first subcarrier spacing is less than the second subcarrier spacing;
a unit for sending the first data security encryption command to the first base station by the data security center server, and sending the second data security encryption command to the second base station by the data security center server;
means for transmitting, by the first base station, the first data security encryption directive to the first mobile terminal over the first portion of the bandwidth in response to receiving the first data security encryption directive;
means for transmitting, by the second base station, the second data security encryption directive to the second mobile terminal over the second portion of the bandwidth in response to receiving the second data security encryption directive.
6. The remote data security encryption system of claim 5,
the remote data security encryption system comprises:
means for adjusting, by the first base station, a subcarrier spacing of subcarriers in a first portion of a bandwidth based on a second connection configuration, wherein the adjusted first portion of the bandwidth has a first frequency range and the second portion of the bandwidth has a second frequency range, wherein the subcarriers in the first portion of the bandwidth have a third subcarrier spacing and the subcarriers in the second portion of the bandwidth have a second subcarrier spacing, wherein the third subcarrier spacing is less than the second subcarrier spacing;
means for transmitting, by the first base station, the second connection configuration to the second base station;
means for adjusting, by a second base station, a subcarrier spacing of subcarriers in a first portion of a bandwidth based on the second connection configuration in response to receiving the second connection configuration, wherein the adjusted first portion of the bandwidth has a first frequency range and the second portion of the bandwidth has a second frequency range, wherein the subcarriers in the first portion of the bandwidth have a third subcarrier spacing and the subcarriers in the second portion of the bandwidth have a second subcarrier spacing, wherein the third subcarrier spacing is less than the second subcarrier spacing;
means for transmitting, by the first base station, the first data security encryption directive to the first mobile terminal over the first portion of the bandwidth in response to receiving the first data security encryption directive;
means for transmitting, by the second base station, the second data security encryption directive to the second mobile terminal over the second portion of the bandwidth in response to receiving the second data security encryption directive.
7. The remote data security encryption system of claim 6,
the remote data security encryption system comprises:
a unit for generating, by a data security center server, a first data security encryption instruction and a second data security encryption instruction;
means for configuring, by a first base station, a first portion of a bandwidth for transmission of low priority data and a second portion of a bandwidth for transmission of high priority data based on a connection configuration, wherein the first portion of the bandwidth has a first frequency range and the second portion of the bandwidth has a second frequency range, wherein subcarriers in the first portion of the bandwidth have a first subcarrier spacing and subcarriers in the second portion of the bandwidth have a second subcarrier spacing, wherein the first subcarrier spacing is less than the second subcarrier spacing;
means for sending, by a data security center server, the first data security encryption directive and the second data security encryption directive to the first base station;
means for transmitting, by the first base station, the first data security encryption directive to the first mobile terminal over the first portion of the bandwidth in response to receiving the first data security encryption directive;
means for transmitting, by the first base station, a first downlink control message to the first mobile terminal over the first portion of the bandwidth and a first set of symbols if the first base station determines that there are no time-frequency resources on the second portion of the bandwidth for transmitting the second data security encryption instruction, wherein a set of subcarriers for the first downlink control message has a first subcarrier spacing, wherein the first downlink control message indicates to the first mobile terminal time-frequency resources for transmitting the second data security encryption instruction, wherein the time-frequency resources for transmitting the second data security encryption instruction are located within the first portion of the bandwidth.
8. The remote data security encryption system of claim 7,
the remote data security encryption system comprises:
means for receiving, by the first mobile terminal, a second data security encryption instruction transmitted by the first base station on a first set of subcarriers of the first portion of the bandwidth and a second set of symbols in response to receiving the first downlink control message, wherein subcarriers in the first set of subcarriers of the first portion of the bandwidth have a second subcarrier spacing;
means for sending, by a data security center server, the first data security encryption directive and the second data security encryption directive to the first base station;
means for transmitting, by the first base station, the first data security encryption directive to the first mobile terminal over the first portion of the bandwidth in response to receiving the first data security encryption directive;
means for transmitting, by the first base station, a second downlink control message to the first mobile terminal over a first set of subcarriers and a first set of symbols of the first portion of the bandwidth if the first base station determines that there are no time-frequency resources on the second portion of the bandwidth for transmitting the second data security encryption instruction, wherein the second downlink control message indicates to the first mobile terminal the time-frequency resources for transmitting the second data security encryption instruction, wherein the time-frequency resources for transmitting the second data security encryption instruction are located within the first portion of the bandwidth, wherein subcarriers in the first set of subcarriers of the first portion of the bandwidth have a second subcarrier spacing;
means for receiving, by the first mobile terminal, a second data security encryption instruction transmitted by the first base station on a first set of subcarriers of the first portion of the bandwidth and a second set of symbols in response to receiving the second downlink control message, wherein subcarriers in the first set of subcarriers of the first portion of the bandwidth have a second subcarrier spacing.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110393742.5A CN112954674B (en) | 2021-04-13 | 2021-04-13 | Remote data security encryption method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110393742.5A CN112954674B (en) | 2021-04-13 | 2021-04-13 | Remote data security encryption method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112954674A CN112954674A (en) | 2021-06-11 |
CN112954674B true CN112954674B (en) | 2022-03-22 |
Family
ID=76232453
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110393742.5A Active CN112954674B (en) | 2021-04-13 | 2021-04-13 | Remote data security encryption method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112954674B (en) |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
PT3169016T (en) * | 2006-02-03 | 2018-12-03 | Guangdong Oppo Mobile Telecommunications Corp Ltd | Uplink resource allocation in a mobile communication system |
US8060058B2 (en) * | 2007-12-28 | 2011-11-15 | Airvana, Corp. | Secure mobile base station connections |
US10687313B2 (en) * | 2017-05-30 | 2020-06-16 | Huawei Technologies Co., Ltd. | Grant-based uplink transmission in unlicensed band |
WO2018227636A1 (en) * | 2017-06-16 | 2018-12-20 | 华为技术有限公司 | Service transmission method, device and system |
CN108696515A (en) * | 2018-04-28 | 2018-10-23 | 深圳大图科创技术开发有限公司 | Network security situation sensing system based on big data |
KR20200054068A (en) * | 2018-11-09 | 2020-05-19 | 삼성전자주식회사 | Method and apparatus for subband based channel access in wireless communication system |
-
2021
- 2021-04-13 CN CN202110393742.5A patent/CN112954674B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN112954674A (en) | 2021-06-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6743283B2 (en) | Network slice selection method, wireless access device, and terminal | |
US11290876B2 (en) | Key derivation method and apparatus | |
CN107094127B (en) | Processing method and device, and obtaining method and device of security information | |
US11246033B2 (en) | Authentication method, and related device and system | |
US11140545B2 (en) | Method, apparatus, and system for protecting data | |
EP4142327A1 (en) | Method and apparatus for protecting communication | |
WO2018125593A1 (en) | Open access points for emergency calls | |
US20080170699A1 (en) | Method and device for managing a wireless resource | |
JP2019509698A (en) | Wireless access control method, apparatus and system | |
CN114556990B (en) | System information protection at network functions in core networks | |
CN110535808B (en) | Equipment monitoring and de-registration method and device | |
EP4106427A1 (en) | Information transmission method and apparatus, related device, and storage medium | |
Pratas et al. | Massive machine-type communication (mMTC) access with integrated authentication | |
CN108293259A (en) | A kind of processing of NAS message, cell list update method and equipment | |
WO2019233444A1 (en) | Method and device for enhancing ue identifier security and computer storage medium | |
WO2018149384A1 (en) | Information transmission method, radio access apparatus and terminal | |
CN112087756A (en) | Communication method and device for preventing malicious user from accessing | |
CN110225517B (en) | Information sending method, device and system and computer readable storage medium | |
AU2020470364B2 (en) | Method and apparatus for establishing secure communication | |
CN112954674B (en) | Remote data security encryption method and system | |
RU2746890C1 (en) | Method, device and system of access rejection, data carrier and processor | |
CN115442801A (en) | Method and device for transmitting system messages | |
CN107396352B (en) | Base station control system and method | |
EP3935881B1 (en) | Wireless device and network node for verification of a device category as well as corresponding methods in a wireless communication system | |
JP7516669B2 (en) | Resource allocation method, device and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20220303 Address after: 511458 room 1508, 8 Jingang Avenue, Nansha street, Nansha District, Guangzhou City, Guangdong Province Applicant after: Guangzhou aorong Technology Co.,Ltd. Address before: 223000 room 320, building 6, south side of Qianjiang Road, Huaiyin District, Huai'an City, Jiangsu Province, east side of Zhenda Steel Pipe Co., Ltd Applicant before: Jiangsu Ruihua Hong Mdt InfoTech Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |