WO2011120466A2 - Procédé et dispositif d'accès à un réseau - Google Patents

Procédé et dispositif d'accès à un réseau Download PDF

Info

Publication number
WO2011120466A2
WO2011120466A2 PCT/CN2011/073809 CN2011073809W WO2011120466A2 WO 2011120466 A2 WO2011120466 A2 WO 2011120466A2 CN 2011073809 W CN2011073809 W CN 2011073809W WO 2011120466 A2 WO2011120466 A2 WO 2011120466A2
Authority
WO
WIPO (PCT)
Prior art keywords
message
user equipment
radio resource
resource control
connection reconfiguration
Prior art date
Application number
PCT/CN2011/073809
Other languages
English (en)
Chinese (zh)
Other versions
WO2011120466A3 (fr
Inventor
何涛
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2011/073809 priority Critical patent/WO2011120466A2/fr
Priority to CN2011800006619A priority patent/CN102217345A/zh
Publication of WO2011120466A2 publication Critical patent/WO2011120466A2/fr
Publication of WO2011120466A3 publication Critical patent/WO2011120466A3/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery

Definitions

  • the present invention relates to the field of wireless communication technologies, and in particular, to a network access method and apparatus.
  • LTE Long Term Evolution
  • 3GPP 3rd Generation Partnership Project
  • the LTE belongs to a B3G or 4G communication system, and aims to provide broadband mobile communication services for mobile terminal users.
  • the base station When the user equipment accesses the Long Term Evolution (LTE) network, the base station needs to send the encrypted radio resource control connection reconfiguration message to the user equipment after receiving the security mode success message sent by the user equipment.
  • the service bearer channel is set up, but the access method is such that the access delay of the user equipment is long.
  • the present invention provides a network access method and apparatus for solving the problem of excessive delay when a user equipment accesses a network.
  • a network access method including:
  • the base station sends a security mode request message and a radio resource control connection reconfiguration message to the user equipment that requests the access, and the time interval between the sending security mode request message and the sending radio resource control connection reconfiguration message is smaller than the sending security.
  • the user equipment sends a radio resource control connection reconfiguration complete message to the base station, so that the base station accesses the user equipment to the network.
  • a network access device including:
  • a setting module configured to set a time interval between sending the security mode request message and sending the radio resource control connection reconfiguration message to be smaller than a minimum time interval between the sending the security mode request message and receiving the security mode response message;
  • a transceiver module configured to set a minimum value of the time interval according to the setting module, send a security mode request message and a radio resource link reconfiguration message to the device requesting access; and receive the return of the user equipment The radio resource control connection reconfiguration complete message;
  • the access module is configured to: when the transceiver module receives the radio resource control connection reconfiguration complete message returned by the user equipment, access the user equipment to the network.
  • another network access device including:
  • a transceiver module configured to receive a security mode request message and a radio resource control connection reconfiguration message sent by the base station, where a time interval between the receiving security mode request message and the receiving radio resource control connection reconfiguration message is smaller than the receiving security And a minimum time interval between the mode request message and the sending of the security mode response message; and a sending a radio resource control connection reconfiguration complete message to the base station, so that the base station accesses the user equipment to the network.
  • the base station sends a security mode request message and a radio resource control connection reconfiguration message to the user equipment requesting access, and the sending security mode request message is connected to the sending radio resource control.
  • the time interval between the reconfiguration messages is smaller than the minimum interval between the sending the security mode request message and the received security mode response message, so that the user equipment is not required to send the wireless device to return the security mode response message.
  • the resource control connection re-allocation message thus reducing the delay of the user equipment accessing the network.
  • FIG. 1 is a flowchart of an embodiment of a network access method in the prior art provided by the present invention
  • FIG. 2 is a flowchart of an embodiment of a network access method provided by the present invention
  • FIG. 3 is a flow chart of another embodiment of a method for providing a Wi-Fi method according to the present invention.
  • FIG. 5 is a flowchart of another embodiment of a method for providing a network according to the present invention.
  • FIG. 6 is a schematic structural diagram of another network access apparatus provided by the present invention.
  • FIG. 7 is a schematic structural diagram of a network access apparatus provided by the present invention.
  • FIG. 8 is a schematic structural diagram of another network device provided by the present invention.
  • FIG. 9 is a schematic structural diagram of another network device provided by the present invention.
  • FIG. 10 is a schematic structural diagram of another network access apparatus provided by the present invention.
  • FIG. 1 is a flowchart of an embodiment of a network access method in the prior art provided by the present invention, including:
  • the user equipment sends a Radio Resource Cont rol (RRC) connection request message (RRCCom ectionReques t) to the base station eNodeB.
  • RRC Radio Resource Cont rol
  • the eNodeB sends a radio resource control connection setup message (RRCConnect ionSetup) to the user equipment.
  • RRCConnect ionSetup radio resource control connection setup message
  • the user equipment sends an RRC establishment completion message (RRCConnect ionSetupComplete) to the eNodeB.
  • eNodeB sending an initial user equipment message (Ini t ia lUeMes sage) c to the MME 105.
  • the MME sends an initial context setup request (Initiating to the eNodeB).
  • the eNodeB generates an encryption and integrity protection key.
  • the eNodeB sends a security mode request request (Secur tyModeCommand) message to the user equipment, and the request message is used to establish an access layer (Aces s St tum, AS) security context.
  • a security mode request request (Secur tyModeCommand) message to the user equipment, and the request message is used to establish an access layer (Aces s St tum, AS) security context.
  • the user equipment establishes an access layer security context according to the request message, and generates an encryption and integrity protection key in the establishing process.
  • the user equipment feeds back the security mode to the eNodeB to complete the eNodeB (Securable ModeComplete), and the security mode establishment complete message indicates that the secure channel between the user equipment and the eNodeB has been established.
  • the eNodeB After the eNodeB receives the security mode success message, the eNodeB sends an RRC connection re-authentication message to the user equipment, and is used to establish a service channel.
  • the user equipment sends an RRC connection reconfiguration complete message to the eNodeB (RRCConnectionReconf Authentication).
  • the eNodeB sends an initial response to the MME (Initial) to establish an Initiation Response (Rei ia lContextSetupResponse).
  • the base station When the user equipment accesses the LTE network, the base station needs to send the encrypted radio resource control connection reconfiguration message to the user equipment after receiving the security mode success message sent by the user equipment, and establish a service bearer channel, so that the user equipment The delay in accessing the network is longer.
  • the present invention provides a network access method, and the embodiments provided by the present invention are described in detail below with reference to the accompanying drawings.
  • the application scenario of the following embodiments may be: a process for the user equipment to access the signaling of the LTE network, where the authentication and service negotiation between the user equipment and the core network are completed when the user equipment needs to access the LTE network,
  • the base station receives the context establishment request message sent by the MN in the core network.
  • This application scenario is only an example of the present invention.
  • the base station sends a security mode request message and a radio resource control connection reconfiguration message to the user equipment that requests the access, and the time interval between the sending security mode request message and the sending radio resource control connection reconfiguration message is smaller than the The minimum time interval between the transmission of the security mode request message and the receipt of the security mode response message.
  • the base station receives a radio resource control connection reconfiguration complete message sent by the user equipment, and accesses the user equipment to the network.
  • the base station sends a security mode request message and a radio resource control connection reconfiguration message to the user equipment requesting access, and the sending security mode request message is connected to the sending radio resource control.
  • the time interval between the reconfiguration messages is smaller than the minimum interval between the sending the security mode request message and the received security mode response message, so that the user equipment is not required to send the wireless device to return the security mode response message.
  • the resource control connection re-allocation message thus reducing the delay of the user equipment accessing the network.
  • the base station before the base station sends the security mode request message and the radio resource control connection reconfiguration message to the user equipment that requests the access, the base station further includes:
  • the base station receives the initial context setup request message sent by the MME. If the base station receives the RRC connection reconfiguration complete message sent by the UE, the eNB returns a success message corresponding to the message to the MME.
  • the user equipment After receiving the security mode request message sent by the base station, the user equipment needs to establish an access layer security context. If the security context is successfully established, the user equipment feeds back the security mode establishment completion message to the eNodeB. If the security context fails to be established, the user equipment feeds back the security mode establishment failure message to the eNodeB.
  • the establishing the security context by the user may include: generating an RRC according to the algorithm ID indicated in the security mode request message, and the initial key preset in the user equipment (US IM, Univer sa l Subs cr iber Ident module) card. Integrity protection key K RReint , RRC encryption and decryption key K RReen . And the user side encryption and decryption keys ⁇ ⁇ , and these keys are configured to the lower layer (PDCP protocol layer) for encryption and integrity protection.
  • PDCP protocol layer PDCP protocol layer
  • the eNodeB sends a radio resource control connection reconfiguration message to the user equipment, and is used to establish a service bearer channel.
  • the user terminal parses the received radio resource control connection reconfiguration message, and returns a radio resource control connection reconfiguration complete message according to the parsing result.
  • the RRC connection reconfiguration complete message may include: an RRC and integrity protected RRC connection reconfiguration complete message.
  • the time interval between the sending of the security mode request message and the sending of the radio resource control connection reconfiguration message is smaller than the minimum time interval between the sending of the security mode request message and the receipt of the security mode response message.
  • the security mode request message sent by the eNodeB to the user equipment is integrity-protected, but is not encrypted, and the radio resource control connection re-allocation message sent by the eNodeB to the user equipment passes. Integrity protection and encryption.
  • FIG. 3 is a flowchart of another embodiment of a network access method provided by the present invention, where the embodiment includes:
  • the base station simultaneously sends a security mode request message and a radio resource control connection reconfiguration message to the user equipment requesting access.
  • the base station receives the user equipment returning radio resource control connection reconfiguration complete message, and accesses the user equipment to the network.
  • the base station sends a security mode request message and a radio resource control connection reconfiguration message to the user equipment that requests the access, so that the user equipment does not need to wait for the user equipment to return the security mode response message.
  • the RRC connection reconfiguration message is sent to the user equipment, thereby reducing the delay of the user equipment accessing the network.
  • FIG. 4 is a flowchart of another embodiment of a network access method provided by the present invention, where the embodiment includes:
  • the base station sends a security mode request message and a radio resource control connection reconfiguration message to the user equipment that requests the access, where the sending security mode request message is connected to the sending radio resource control.
  • the time interval between the reconfiguration messages is less than the minimum time interval between the sending of the security mode request message and the receipt of the security mode response message.
  • the base station caches the unrecrypted and unprotected RRC connection reconfiguration message.
  • the base station receives a security mode failure message returned by the user equipment, and sends the cached unencrypted and unprotected radio resource control connection reconfiguration message to the user equipment.
  • step 404 if the base station receives the security mode failure message returned by the user equipment, it determines that the access layer security context establishment of the user equipment fails, and the user equipment does not obtain the encryption key and the encryption algorithm.
  • the base station sends a radio resource control connection reconfiguration message to the user equipment that is not encrypted and not integrity-protected, and the user equipment controls the connection reconfiguration message according to the received radio resource to establish a service bearer of the user equipment.
  • the user equipment may parse the unencrypted radio resource control connection reconfiguration message.
  • the base station receives, by the user equipment, a radio resource control connection reconfiguration complete message, and accesses the user equipment to the network.
  • the user equipment in the embodiment of the present invention caches the first received radio resource control connection reconfiguration message. After the access layer security context establishment of the user equipment fails, the user equipment receives unencrypted and integrity protection.
  • the radio resource control connection reconfiguration message can parse the unencrypted radio resource control connection reconfiguration message, thereby avoiding reestablishing the unrecognized and non-integrity protection radio resource control connection reconfiguration message, thereby reducing the user The delay of accessing the device to the network.
  • FIG. 5 is a flowchart of another embodiment of a network access method provided by the present invention, where the embodiment includes:
  • the base station sends a radio resource control connection reconfiguration message to the user equipment, where a time interval between the sending security mode request message and the sending radio resource control connection reconfiguration message is less than The minimum time interval between the sending of the security mode request message and the receipt of the security mode response message.
  • the steps 501 and 502 may also be combined into one step, that is, the security mode request message and the RRC connection reconfiguration message are simultaneously sent.
  • the user equipment receives a radio resource control connection reconfiguration message sent by the base station, and parses the radio resource control connection reconfiguration message.
  • the radio resource control connection reconfiguration message received by the user equipment may be encrypted and integrity protected.
  • the user equipment needs to obtain an encryption key, an encryption algorithm, and the like for parsing the radio resource control connection reconfiguration message.
  • step 505 is performed.
  • the user equipment caches the radio resource control connection reconfiguration message.
  • the user equipment may not delete the resourceless connection reconfiguration message and cache the radio resource control connection reconfiguration message if the resolving the radio resource control connection reconfiguration message fails.
  • the RRC resource connection reconfiguration message message needs to be cached; if the user equipment receives the encrypted mode after receiving the security mode request message
  • the RRC connection re-allocation message does not require caching. The previous embodiments should all be the second case.
  • the base station resends the security mode request message to the user equipment.
  • the user equipment receives the security mode request message sent by the base station, and establishes an access layer security context.
  • the user equipment sends a security mode response message to the base station.
  • the user equipment parses the cached radio resource control connection reconfiguration message to obtain an analysis result.
  • the user equipment may establish an access layer security context according to the received security mode request message. If the access layer security context is successfully established, the radio resource control connection reconfiguration message may be correctly parsed, otherwise the user device may not correctly parse the message.
  • the analysis results include two cases of correctly parsing the RRC connection reconfiguration message and failing to correctly resolve the RRC connection reconfiguration message.
  • the user equipment can obtain an encryption algorithm, an encryption key, an integrity protection algorithm, and an integrity protection key in the process of establishing an access layer security context according to the received security mode request message. If the access layer security context is successfully established, the security mode establishment success message is returned to the base station, and the above key and encryption algorithm are obtained. If the access layer security context fails to be established, the above key and encryption algorithm cannot be obtained, and the security mode establishment failure message is returned to the base station.
  • the user equipment establishes a success according to the analysis result and the radio bearer (Radio Bear, RB), and returns a radio resource control connection reconfiguration complete message to the base station.
  • Radio Bear Radio Bear
  • the RB includes SRB2, DRB, SRB2: Signalling Radio Bearer2, which is dedicated to transmitting NAS signaling; and DRB: (user) Data Radio Bearer transmits user data;
  • the user equipment returns a RRC connection reconfiguration complete message to the base station when the RRC data connection reconfiguration message is successfully parsed, that is, the service bearer establishment of the user equipment is completed, and the base station receives the RRC connection. After the reconfiguration complete message, the user equipment is connected to the network.
  • the radio resource control connection reconfiguration message sent by the base station arrives at the user equipment prior to the security mode request message due to the retransmission of the air interface data, etc., and the user equipment firstly controls the connection of the received radio resource.
  • the message is buffered, and then receives the security mode request message, parses the cached radio resource control connection reconfiguration message according to the security mode request message, and returns the encrypted radio resource control connection reconfiguration complete message to the base station after the parsing is completed, and is now
  • the user equipment receives the retransmitted security mode message, and returns a security mode establishment complete message.
  • FIG. 6 is a flowchart of an embodiment of a method for accessing another method provided by the present invention, where the embodiment includes:
  • the base station sends a security mode request message to the UE, but the message is lost, and the UE does not receive the security mode request message. 601.
  • the base station sends a radio resource control connection reconfiguration message to the user equipment, where a time interval between the sending security mode request message and the sending radio resource control connection reconfiguration message is smaller than the sending security mode request message and receiving security. The minimum time interval between mode response messages.
  • the steps 601a and 601 may also be combined into one step, that is, the security mode request message and the RRC connection reconfiguration message are simultaneously sent.
  • the user equipment receives the radio resource control connection reconfiguration message sent by the base station, and parses the radio resource control connection reconfiguration message. However, because the UE does not receive the security mode setup request message, the user equipment parsing fails, and the cached radio resource control connection is heavy. With a message.
  • the user equipment may establish an access layer security context according to the security mode request message, if the access layer security is established. If the context is successful, the RRC connection reconfiguration message is correctly parsed. Otherwise, the user equipment cannot establish an access layer security context, and the radio resource control connection reconfiguration message cannot be correctly parsed.
  • the base station retransmits a security mode establishment request message to the user equipment.
  • the user equipment After receiving the security mode request message sent by the base station, the user equipment establishes an access layer context.
  • the user equipment sends a security mode setup response message to the base station.
  • the user equipment parses the cached radio resource control connection reconfiguration message again, and obtains an analysis result.
  • the user equipment returns a radio resource control connection reconfiguration complete message of the encryption and integrity protection to the base station.
  • the radio resource control connection reconfiguration complete message of the user equipment returning the encryption and integrity protection to the base station includes: the user equipment completes the reconfiguration of the radio resource control connection according to the encryption key and the encryption algorithm obtained in the process of establishing the access layer security context The message is decrypted, and the user equipment performs integrity verification on the radio resource control connection reconfiguration complete message according to the integrity protection key and the integrity protection algorithm obtained in the process of establishing the access layer security context.
  • Step 604 If the user equipment fails to establish a security context, the user equipment returns a security mode establishment failure message to the base station.
  • the user equipment deletes the cached radio resource control connection reconfiguration, ⁇ . Specifically, if the user equipment fails to establish an access layer security context, the resolving the cached radio resource control connection reconfiguration message fails, the user equipment returns a security mode establishment failure message to the base station, and deletes the cached radio resource control connection reconfiguration message. In order to subsequently receive the unrecognized and non-integrity protected radio resource control connection reconfiguration message sent by the base station.
  • the user equipment is configured to establish a service bearer according to the subsequently received unrecognized and unprotected radio resource control connection reconfiguration message by deleting the radio resource control connection reconfiguration message in the cache. And after the establishment of the service bearer is completed, the unencrypted radio resource control connection reconfiguration complete message is returned to the base station, and then the LTE network is accessed.
  • FIG. 7 is a schematic structural diagram of an apparatus for accessing a network according to the present invention, including: a setting module 701, configured to set a time interval between sending a security mode request message and sending a radio resource control connection reconfiguration message to be less than Determining a minimum time interval between sending a security mode request message and receiving a security mode response message;
  • the transceiver module 702 is configured to set a minimum value of the time interval according to the setting module, send a security mode request message and a radio resource link reconfiguration message to the device requesting access, and receive the user equipment return Radio resource control connection reconfiguration complete message;
  • the access module 703 is configured to: when the transceiver module receives the radio resource control connection reconfiguration complete message returned by the user equipment, access the user equipment to the network.
  • the base station sends a security mode request message and a radio resource control connection reconfiguration message to the user equipment requesting access, and the sending security mode request message is connected to the sending radio resource control.
  • the time interval between the reconfiguration messages is smaller than the minimum interval between the sending the security mode request message and the received security mode response message, so that the user equipment is not required to send the wireless device to return the security mode response message.
  • the resource control connection re-allocation message thus reducing the delay of the user equipment accessing the network.
  • the transceiver module is configured to set the minimum time interval according to the setting module, and send a security mode request message and a radio resource control connection reconfiguration message to the user equipment requesting access.
  • the device further includes:
  • the cache module 704 is configured to cache the unencrypted and unprotected RRC connection re-distribution accessed by the transceiver module. Further, the transceiver module is further configured to: when receiving the security mode establishment failure message, send, to the user equipment, the unencrypted and unperfect-protected radio resource control connection reconfiguration message buffered by the cache module.
  • FIG. 9 is a schematic structural diagram of another network access apparatus according to the present invention, including:
  • the transceiver module 901 is configured to receive a security mode request message and a radio resource control connection reconfiguration message sent by the base station, where a time interval between the receiving security mode request message and the receiving radio resource control connection reconfiguration message is smaller than the receiving a minimum time interval between the security mode request message and the transmission security mode response message; and a RRC connection reconfiguration complete message for transmitting to the base station, so that the base station accesses the user equipment to the network.
  • the network access method by receiving a security mode request message sent by a base station and a radio resource control connection reconfiguration message, between the receiving security mode request message and the receiving radio resource control connection reconfiguration message
  • the time interval is less than a minimum time interval between the receiving security mode request message and the sending security mode response message; and transmitting a radio resource control connection reconfiguration complete message to the base station, such that the base station will The user equipment accesses the network, so that the base station does not need to wait for the user equipment to send the security mode response message, and then the base station sends the radio resource control connection reconfiguration message to the user equipment, thereby reducing the delay of the user equipment accessing the network.
  • the transceiver module is specifically configured to simultaneously receive a security mode request message and a radio resource control connection reconfiguration message sent by the base station.
  • the transceiver module is further configured to receive, by the base station, the unrecrypted and unprotected radio resource control connection reconfiguration message buffered by the base station;
  • the device also includes:
  • the parsing module 902 is configured to parse the unencrypted radio resource control connection reconfiguration message received by the transceiver module;
  • the confirmation module 903 is configured to confirm that the parsing module is parsed and the radio bearer is successfully established.
  • the parsing module is further configured to parse the radio resource control connection reconfiguration message; the device further includes:
  • the cache module 904 is configured to: when the parsing module fails to parse, cache the radio resource control connection reconfiguration message.
  • the parsing module is further configured to: establish an access layer context according to the security mode request message received by the transceiver module, and parse the radio resource control connection reconfiguration message buffered by the base station;
  • the obtaining module 905 is configured to obtain a result of the parsing module parsing.
  • the transceiver module is further configured to return a security mode establishment failure message to the base station when the establishment of the security context fails.
  • the device also includes:
  • the deleting module 906 is configured to delete the RRC connection reconfiguration message of the cache module cache. It should be noted that the information exchange, the execution process, and the like between the units in the foregoing base station and the user equipment are based on the same concept as the method embodiment of the present invention. For details, refer to the description in the method embodiment of the present invention. No longer.
  • the network access method by receiving a security mode request message sent by a base station and a radio resource control connection reconfiguration message, between the receiving security mode request message and the receiving radio resource control connection reconfiguration message
  • the time interval is less than a minimum time interval between the receiving security mode request message and the sending security mode response message; and transmitting a radio resource control connection reconfiguration complete message to the base station, such that the base station will The user equipment accesses the network, so that the base station does not need to wait for the user equipment to send the security mode response message, and then the base station sends the radio resource control connection reconfiguration message to the user equipment, thereby reducing the delay of the user equipment accessing the network.
  • the computer readable storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), or a random access memory (RAM).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un procédé et dispositif d'accès à un réseau. Selon le procédé, une station de base transmet un message de demande de mode de sécurité et un message de reconfiguration de connexion pour contrôle de ressources radio à un équipement utilisateur demandant l'accès, l'intervalle de temps entre la transmission du message de demande de mode de sécurité et la transmission du message de reconfiguration de connexion pour contrôle de ressources radio étant inférieur à la valeur minimale de l'intervalle de temps entre la transmission du message de demande de mode de sécurité et la réception du message de réponse de mode de sécurité (201); la station de base reçoit un message complet de reconfiguration de connexion pour contrôle de ressources radio renvoyé par l'équipement utilisateur et accède à l'équipement utilisateur dans le réseau (202). On résout ainsi le problème de délai prolongé d'accès d'un équipement utilisateur à un réseau. L'invention concerne aussi un dispositif d'accès à un réseau.
PCT/CN2011/073809 2011-05-09 2011-05-09 Procédé et dispositif d'accès à un réseau WO2011120466A2 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2011/073809 WO2011120466A2 (fr) 2011-05-09 2011-05-09 Procédé et dispositif d'accès à un réseau
CN2011800006619A CN102217345A (zh) 2011-05-09 2011-05-09 一种网络接入方法和装置

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2011/073809 WO2011120466A2 (fr) 2011-05-09 2011-05-09 Procédé et dispositif d'accès à un réseau

Publications (2)

Publication Number Publication Date
WO2011120466A2 true WO2011120466A2 (fr) 2011-10-06
WO2011120466A3 WO2011120466A3 (fr) 2012-04-05

Family

ID=44712677

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/073809 WO2011120466A2 (fr) 2011-05-09 2011-05-09 Procédé et dispositif d'accès à un réseau

Country Status (2)

Country Link
CN (1) CN102217345A (fr)
WO (1) WO2011120466A2 (fr)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104640229A (zh) * 2013-11-06 2015-05-20 株式会社Ntt都科摩 一种用户设备接入方法、用户设备及基站
US9788208B2 (en) * 2015-12-31 2017-10-10 Mediatek Inc. Apparatuses and methods for recovering from security mode command failures
CN106131836A (zh) * 2016-07-12 2016-11-16 北京汇通金财信息科技有限公司 一种lte系统安全通信方法及基于该方法的专用网络

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1764108A (zh) * 2004-10-22 2006-04-26 华为技术有限公司 控制是否启动加密过程的方法
WO2010038590A1 (fr) * 2008-10-02 2010-04-08 日本電気株式会社 Station de base radio, système de planification, procédé de commande d’attribution et support d’enregistrement
US20100316034A1 (en) * 2009-06-16 2010-12-16 Richard Charles Burbidge Method for accessing a service unavailable through a network cell
EP2265077A1 (fr) * 2009-06-18 2010-12-22 Panasonic Corporation Procédure d'accès aléatoire amélioré pour communications mobiles

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1764108A (zh) * 2004-10-22 2006-04-26 华为技术有限公司 控制是否启动加密过程的方法
WO2010038590A1 (fr) * 2008-10-02 2010-04-08 日本電気株式会社 Station de base radio, système de planification, procédé de commande d’attribution et support d’enregistrement
US20100316034A1 (en) * 2009-06-16 2010-12-16 Richard Charles Burbidge Method for accessing a service unavailable through a network cell
EP2265077A1 (fr) * 2009-06-18 2010-12-22 Panasonic Corporation Procédure d'accès aléatoire amélioré pour communications mobiles

Also Published As

Publication number Publication date
WO2011120466A3 (fr) 2012-04-05
CN102217345A (zh) 2011-10-12

Similar Documents

Publication Publication Date Title
US11706814B2 (en) Communications device, infrastructure equipment and methods
EP3569031B1 (fr) Gestion d'identificateurs d'équipement d'utilisateur dans un mode inactif par un dispositif de service
US10999065B2 (en) Method and apparatus for updating a key in an active state
CN109802809B (zh) 网络接入的方法、终端设备和网络设备
KR101052288B1 (ko) 핸드오버 절차를 처리하는 방법 및 장치
US20190373456A1 (en) Security framework for msg3 and msg4 in early data transmission
JP4767626B2 (ja) 移動局、無線アクセスネットワーク装置および移動交換局並びに通信サービスアクセス方法
JP2019525682A5 (fr)
KR20070073343A (ko) 이동통신 ims시스템에서 아이들모드 단말기의 세션 설정프로토콜 데이터를 전송하는 방법 및 장치
CN109076475B (zh) 一种用于保持无连接传输中同步的方法和系统
CN111886885B (zh) 恢复rrc连接时的安全验证
WO2018205949A1 (fr) Procédé et appareil de transmission d'informations
US8995664B2 (en) Security in wireless communication system and device
WO2009152656A1 (fr) Procédé et système de génération d’identifiant d’identité de clé lors du transfert du dispositif utilisateur
WO2011120466A2 (fr) Procédé et dispositif d'accès à un réseau
US20220345883A1 (en) Security key updates in dual connectivity
KR101313517B1 (ko) 패킷 데이터 네트워크 통신 디바이스 및 방법
WO2022068669A1 (fr) Procédé et appareil d'établissement de session, dispositif de réseau d'accès et support de stockage
WO2018205831A1 (fr) Procédé et appareil de vérification de réseau, dispositif et support de stockage
US20230156820A1 (en) Data Communication In An Inactive State
EP4327617A1 (fr) Gestion d'accès aléatoire dans une communication de données précoce
CN116634426A (zh) 一种通信的方法及装置
WO2015051554A1 (fr) Procédé, dispositif et système d'établissement de tunnel
WO2007022717A1 (fr) Procédé de vérification pour demande de télémesure et le réseau d’accès sans fil

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 201180000661.9

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11762040

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11762040

Country of ref document: EP

Kind code of ref document: A2