WO2011142175A1 - ゲートウェイ装置、基地局、移動管理サーバ、通信方法 - Google Patents
ゲートウェイ装置、基地局、移動管理サーバ、通信方法 Download PDFInfo
- Publication number
- WO2011142175A1 WO2011142175A1 PCT/JP2011/056396 JP2011056396W WO2011142175A1 WO 2011142175 A1 WO2011142175 A1 WO 2011142175A1 JP 2011056396 W JP2011056396 W JP 2011056396W WO 2011142175 A1 WO2011142175 A1 WO 2011142175A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- base station
- key
- core network
- nas message
- location registration
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/16—Gateway arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W60/00—Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
- H04W60/04—Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration using triggered events
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/80—Arrangements enabling lawful interception [LI]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/04—Large scale networks; Deep hierarchical networks
- H04W84/042—Public Land Mobile systems, e.g. cellular systems
- H04W84/045—Public Land Mobile systems, e.g. cellular systems using private Base Stations, e.g. femto Base Stations, home Node B
Definitions
- the present invention relates to a gateway device, a base station, a mobility management server, and a communication method.
- HeNB Home evolved Node B
- eNB evolved Node B
- a femto base station is a device that a general user purchases and installs in a home or office. Further, after installation, the femto base station is connected to a gateway device called HeNB-GW (HeNB-Gateway) that collects the femto base stations, and is connected to the core network of the communication carrier via the HeNB-GW.
- HeNB-GW HeNB-Gateway
- Patent Document 1 proposes to apply the following algorithm to an LTE wireless communication system.
- an FNG Femto Network Gateway, which corresponds to HeNB-GW transmits an MNC (Mobile Network Code) included in a macro location registration area ID (an identifier of a location registration area of a macro base station) to an MNC of a femtocell network
- the converted macro location registration area ID is set as a femto location registration area ID (an identifier of the location registration area of the femto base station).
- the UE performs location registration if the MNC included in the location registration area ID broadcast from the surrounding base station is compatible with the MNC included in the location registration area ID when the previous location registration was performed. do not do. This reduces the frequency of UE location registration requests.
- the FNG sets the femto location registration area ID of the femto base station included in the location registration request received from the UE in the vicinity of the femto base station. It converts into the macro location registration area ID of the macro base station, and sends the converted location registration request to a mobility management entity (MME) in the core network.
- MME mobility management entity
- the macro base station in the vicinity is a macro base station that exists in a position where the femto base station can receive the macro location registration area ID broadcast from the macro base station (hereinafter the same).
- the setting of concealment is that the transmission side encrypts data using a ciphering key.
- the receiving side decrypts the data using the same encryption key as that of the transmitting side.
- the integrity protection setting means that the transmission side calculates the data authentication code using the integrity key, and adds the calculated authentication code to the data.
- the receiving side calculates the data authentication code using the same complete key as the transmitting side, and compares the calculated authentication code with the authentication code added to the data, thereby completing the data integrity. Perform verification.
- TS33.401 v9.2.0 and TS36.300 v9.2.0 which are currently recommended by 3GPP, it is possible to select whether to set encryption for NAS (Non Access Stratum) signaling.
- integrity protection is mandatory.
- the concealment and integrity protection of NAS signaling are to be terminated at the MME. That is, in the case of NAS signaling, decryption using the above encryption key and integrity verification using the above complete key are performed by the MME.
- the HeNB-GW When concealment and integrity protection are set in the NAS signaling, the HeNB-GW performs macro location registration of the femto location registration area ID included in the location registration request received as the NAS signaling from the UE as in Patent Document 1 In order to convert to the area ID, it is necessary to release the concealment of the location registration request via the NAS. Furthermore, in the HeNB-GW, it is necessary to reset integrity protection after the above conversion so that the MME does not interpret that the integrity of the location registration request is impaired by the above conversion.
- Non-Patent Document 1 S2-096108
- SA Security Association
- LIPA Local IP Access
- SIPTO A data offload technique called Selected IP Traffic Offload has been proposed.
- LIPA offloads data from a UE to a local area network (LAN) via a femto base station, and enables data exchange between the UE and devices in the LAN.
- SIPTO enables offloading data directly from the femto base station to the Internet without going through the core network of the communication carrier.
- Patent Document 2 in the system shown in FIG. 1 of Patent Document 2, a mobile phone (corresponding to a UE) does not go through a core network of a communication carrier, but goes through an IP gateway installed in a home or office.
- An access point (corresponding to a femto base station) that enables communication with a network server on the Internet has been proposed.
- Patent Document 3 as shown in FIG. 1B of Patent Document 3, whether or not to offload a packet session by monitoring IP traffic transmitted and received between the UE and the core network via the Iu interface.
- a femto access point corresponding to a femto base station having means for determining the above.
- Non-Patent Document 1 and Patent Documents 2 and 3 For example, the APN (Access Point Name) of a message sent from the MME in the core network to the UE, or the APN of the message sent from the UE to the core network to establish a PDN (Packet Data Network) connection, It is also possible for the HeNB-GW, not the station, to read and offload traffic depending on the APN. This also makes it possible to reduce the load on the core network.
- APN Access Point Name
- PDN Packet Data Network
- Non-Patent Document 1 (S2-096108) is concerned about problems such as whether or not it is possible to conduct legitimate interception when implementing LIPA / SIPTO and security issues.
- the HeNB-GW installed in the network can cope with these problems.
- concealment it is determined that concealment is terminated at the MME. For this reason, it is not allowed to offload traffic or perform lawful intercept based on the APN read from messages sent and received between the MME and the UE in the LTE HeNB-GW .
- eNB which is a macro base station cannot offload traffic based on APN.
- IPsec IP Security Protocol
- IKEv2 Internet Key Exchange version 2
- a tunnel is established to ensure security.
- the security between the terminal and the base station is ensured by another mechanism such as encryption of the wireless link, the overhead increases due to unnecessary IPsec tunnel, and the wireless band is tight. Problems such as a decrease in processing capacity of the terminal occur. Therefore, in Patent Document 4, when security is ensured between the terminal and the base station, an IPsec tunnel is provided only between the base station and the AGW, and the IPsec is provided between the terminal and the base station. Proposes a method that does not provide a tunnel. However, even this method does not lead to the solution of the problems (1) and (2).
- the macro base station cannot cancel or set the concealment or integrity protection, there is a concern that it may hinder the operation and service provision of the telecommunications carrier.
- an object of the present invention is to provide a gateway device, a base station, a mobility management server, and a communication method that can solve the above-described problems.
- the gateway device of the present invention A gateway device for connecting a base station to a core network, A communication unit configured to receive from the mobility management server in the core network a key for releasing the encryption set in the NAS message received from the terminal under the base station;
- the base station of the present invention A base station connected to a core network, A communication unit configured to receive from the mobility management server in the core network a key for releasing the encryption set in the NAS message received from the terminal under the base station;
- the mobility management server of the present invention A mobility management server provided in the core network, For the gateway device that connects the base station or the base station to the core network, a key for releasing the concealment set in the NAS message received from the terminal under the base station by the base station or the gateway device. It has a communication part to transmit.
- the first communication method of the present invention includes: A communication method using a gateway device that connects a base station to a core network, Receiving from the mobility management server in the core network a key for releasing the concealment set in the NAS message received from the terminal under the base station.
- the second communication method of the present invention includes: A communication method by a base station connected to a core network, Receiving from the mobility management server in the core network a key for releasing the concealment set in the NAS message received from the terminal under the base station.
- the third communication method of the present invention is: A communication method by a mobility management server provided in a core network, For the gateway device that connects the base station or the base station to the core network, a key for releasing the concealment set in the NAS message received from the terminal under the base station by the base station or the gateway device. Transmitting.
- the key for releasing the concealment of the NAS message is transmitted from the mobility management server to the gateway device or the base station.
- the gateway device or the base station can cancel and set the concealment using the key received from the mobility management server.
- FIG. 1 shows a schematic configuration of a radio communication system according to the first embodiment of the present invention.
- the wireless communication system of this embodiment includes a PDN 1, a P-GW (PDN Gateway) 2, an S-GW (Serving Gateway) 3, an MME 4, a HeNB-GW 5, and a femto base station. 6 and UE7.
- the HeNB-GW 5 and the femto base station 6 are provided inside a radio access network (RAN).
- RAN radio access network
- P-GW2, S-GW3, and MME4 are provided in the core network of the communication carrier, and PDN1 that is the Internet, a corporate network, or the like exists at the end of this core network.
- UE7 transmits information (including messages, data, etc., hereinafter the same) to MME4 in the core network via femto base station 6 and HeNB-GW5 in the radio access network.
- the HeNB-GW 5 stores a communication unit 51 that transmits / receives information to / from the outside, a processing unit 52 that processes information transmitted / received by the communication unit 51, information processed by the processing unit 52, and setting information preset by a communication carrier And a control unit 54 that controls the communication unit 51 and the processing unit 52.
- the storage unit 53 includes a femto location registration area ID of the femto base station (first base station) 6 and a macro base station (second base station) in the vicinity of the femto base station 6.
- the MME 4 stores a communication unit 41 that transmits / receives information to / from the outside, a processing unit 42 that processes information transmitted / received by the communication unit 41, and a memory that stores information processed by the processing unit 42 and setting information set in advance by a communication carrier. And a control unit 44 that controls the communication unit 41 and the processing unit 42.
- the radio communication system of the present embodiment generally operates as follows.
- the UE 7 When the UE 7 enters the service area of the femto base station 6, the UE 7 receives the femto location registration area ID broadcast from the femto base station 6, and sends a location registration request including the femto location registration area ID via the NAS. And send it to MME4.
- the HeNB-GW 5 When the HeNB-GW 5 receives the location registration request transmitted from the UE 7 to the MME 4, the HeNB-GW 5 has converted the femto location registration area ID included in the location registration request based on the conversion table 301 stored in the storage unit 53. It converts into location registration area ID, and transmits the location registration request after conversion to MME4.
- the UE 7 under the femto base station 6 sends a location registration request message (NAS message) including the femto location registration area ID received from the femto base station 6 to the MME 4 via the NAS. (Step 101).
- NAS message location registration request message
- the processing unit 52 when receiving the location registration request message transmitted from the UE 7 to the MME 4, the processing unit 52 stores setting information “cancel concealment and integrity protection” in the storage unit 53. Judgment is made. If this setting information is stored, the processing unit 52 sends a SECURITY INFO REQUEST message (S1AP) requesting transmission of a key (encryption key and complete key) for releasing the concealment and integrity protection of the location registration request message. (S1 Application Protocol) message) is generated, and the communication unit 51 transmits the SECURITY INFO REQUEST message to the MME 4 (step 102).
- S1AP SECURITY INFO REQUEST message
- processing unit 42 when the SECURITY INFO REQUEST message is received from HeNB-GW5, processing unit 42 generates a SECURITY INFO RESPONSE message (S1AP message) including the key (encryption key and complete key), and communication unit 41 receives the SECURITY An INFO RESPONSE message is returned to the HeNB-GW 5 (step 103).
- the processing unit 52 When receiving the SECURITY INFO RESPONSE message from the MME 4 in the HeNB-GW 5, the processing unit 52 uses the key included in the SECURITY INFO RESPONSE message to release the concealment and integrity protection of the location registration request message, and the storage unit Based on the conversion table 301 stored in 53, the femto location registration area ID included in the location registration request message is converted into a converted location registration area ID (step 104). Subsequently, the processing unit 52 resets the concealment and integrity protection in the location registration request message, and the communication unit 51 transmits the location registration request message to the MME 4 (step 105).
- the MME 4 transmits an authentication request message to the UE 7 (step 106).
- the authentication process is normally performed, and the UE 7 returns an authentication response message to the MME 4 (step 107).
- the MME 4 transmits a location registration response message to the UE 7 (step 108), and the location registration process is completed.
- FIG. 4 shows an algorithm for defining the operation of the above HeNB-GW5. This algorithm is stored in the storage unit 53 as setting information.
- the processing unit 52 stores the setting information “cancel the concealment and integrity protection” in the storage unit 53. It is determined whether or not it has been performed (step 202).
- step 202 If the setting information “cancel concealment and integrity protection” is stored in step 202 (Yes in step 202), the processing unit 52 cancels concealment and integrity protection of the NAS message.
- the SECURITY INFO REQUEST message requesting the transmission of the encryption key and the complete key is generated, and the communication unit 51 transmits the SECURITY INFO REQUEST message to the MME 4 and, as a response, the SECURITY INFO including the encryption key and the complete key.
- a RESPONSE message is received.
- the processing unit 52 releases the concealment of the NAS message using the encryption key included in the SECURITY INFO RESPONSE message (step 203).
- a process of decrypting the NAS message using the encryption key is performed.
- Step 204 the processing unit 52 determines whether or not the NAS message received in Step 201 is a location registration request message.
- Step 204 if the NAS message is a location registration request message (Yes in Step 204), the processing unit 52 first releases the integrity protection of the location registration request message.
- the processing unit 52 converts the femto location registration area ID included in the location registration request message into the converted location registration associated with the femto location registration area ID in the conversion table 301 stored in the storage unit 53. The area ID is converted (step 205).
- the processing unit 52 resets concealment and integrity protection in the location registration request message.
- a process of encrypting the location registration request message using the encryption key is performed.
- an authentication code of the converted location registration request message is calculated using the complete key, and a process of adding the calculated authentication code to the converted location registration request message is performed. Thereafter, the communication unit 51 transmits the location registration request message to the MME 4.
- step 202 the processing unit 52 converts the NAS message received in step 201 into concealment and Without releasing the integrity protection, the data is transferred from the communication unit 51 to the MME 4 as it is (step 206).
- step 204 if the NAS message is not a location registration request message (No in step 204), the processing unit 52 resets the concealment in the NAS message, and the communication unit 51 transmits the NAS message to the MME 4. To do.
- the MME 4 when the MME 4 receives the SECURITY INFO REQUEST message from the HeNB-GW 5, the MME 4 transmits a key to the HeNB-GW 5 using the SECURITY INFO RESPONSE message as a response to this message.
- a key for example, an underlined portion in FIGS. 7 and 8 is added to TS36.413, and setting information such as “transmit key to HeNB-GW” is stored in the storage unit 43 of MME4.
- the MME 4 voluntarily transmits a key with the UE CONTENT MODIFICATION REQUEST message (S1AP message) illustrated in FIG. 7 or 8 regardless of whether or not the SECURITY INFO REQUEST message is received from the HeNB-GW 5.
- “Direction” in FIGS. 6 to 8 simply indicates a transmission direction, and does not indicate a terminal node.
- MME ⁇ eNB indicates that the transmission from MME4 to HeNB-GW5 is applicable
- eNB ⁇ MME is also applicable to the transmission from HeNB-GW5 to MME4. It is shown that.
- the MME uses a key for releasing the concealment and integrity protection of the NAS message as a response to the transmission request from the HeNB-GW, or spontaneously. Therefore, it transmits to HeNB-GW.
- the HeNB-GW can cancel and set the concealment and integrity protection using the key received from the MME.
- the method proposed in Patent Document 1 for converting the femto location registration area ID into the macro location registration area ID can be realized according to the 3GPP standard specifications.
- a NAS message is transmitted from the UE under the control of the femto base station in step 201 in FIG.
- this assumption does not require that a certain limited UE transmits NAS messages under a certain limited femto base station, and the precondition is set independently for each UE or for each femto base station. Is possible.
- IMSI International Mobile Subscriber Identifier
- the UE has a UMTS (Universal Mobile Terrestrial Radio Access) femto base station, a RANGW concentrating the femto base station, and a service providing server connected to the RANGW, and the UE is in the service area of the femto base station.
- UMTS Universal Mobile Terrestrial Radio Access
- RANGW concentrating the femto base station
- service providing server connected to the RANGW
- the UE is in the service area of the femto base station.
- the approach proposed in the present embodiment can be applied to a wireless communication system that provides a service from a service providing server to a user with the entry.
- the LTE-type HeNB-GW can provide a similar service in accordance with the 3GPP standard specifications.
- the present embodiment it is proposed to change the existing recommendation so that the setting can be canceled when the concealment and integrity protection are set between the UE and the MME.
- the background of the provision of this concealment and integrity protection is that the NAS message is transmitted from the UE via the eNB (macro base station) and the MME due to the network architecture.
- the eNB macro base station
- the MME mobile phone
- One of the reasons is that it is not installed in a secure environment such as a telecommunications carrier's office.
- the HeNB-GW is installed in the telecommunications carrier's office, as in the MME, there is no security problem in releasing the concealment and integrity protection in the HeNB-GW. Therefore, the change of the 3GPP standard specification proposed in this embodiment brings about an effect that the number of location registration requests of the UE operator can be reduced.
- the HeNB-GW when the HeNB-GW releases the concealment and integrity protection of the NAS message received from the UE, the HeNB-GW subsequently resets the concealment and integrity protection. And the processing after releasing the integrity protection may be determined by the communication carrier. For example, when the concealment and integrity protection of the NAS message are released, neither the concealment nor the integrity protection is reconfigured between the HeNB-GW and the MME, or a different operation is performed between the UE and the MME. By applying a security mechanism, neither concealment nor integrity protection can be reconfigured.
- FIG. 9 shows a schematic configuration of a wireless communication system according to a second embodiment of the present invention.
- the wireless communication system of the present embodiment is the same as that of the first embodiment shown in FIG. 1, except that the UE 8 is added and there is a route directly connected from the HeNB-GW 5 to the PDN 1. It has the same configuration as that of the wireless communication system.
- the HeNB-GW 5 communicates with the carrier according to the APN included in the PDN connection request (PDN CONNECTIVITY REQUEST) transmitted from the UE 7 or 8. Determines the route of the PDN connection according to the policy set in advance.
- PDN CONNECTIVITY REQUEST PDN CONNECTIVITY REQUEST
- the storage unit 53 of the HeNB-GW 5 determines whether or not the offload according to the APN included in the PDN connection request transmitted from the UE is required for each UE, as illustrated in FIG.
- a correspondence table 302 shown is stored as setting information.
- the UE 7 or 8 sets up an EPS (Evolved Packet System) bearer to set up an IP session called a PDN connection with the PDN 1 for packet communication, it sends a PDN connection request including the APN to the MME 4. Send.
- EPS Evolved Packet System
- the HeNB-GW 5 When the HeNB-GW 5 receives the PDN connection request transmitted from the UEs 7 and 8 to the MME 4, the HeNB-GW 5 reads the APN included in the PDN connection request. Then, the HeNB-GW 5 sets a PDN connection from the HeNB-GW 5 to the PDN 1 via the S-GW 3 and the P-GW 2 based on the correspondence table 302 stored in the storage unit 53, or the S-GW 3 And whether to establish a PDN connection from HeNB-GW 5 directly to PDN 1 without going through P-GW 3.
- the UE 7 under the femto base station 6 transmits a PDN connection request message (NAS message) to the MME 4 via the NAS (step 111).
- NAS message PDN connection request message
- the processing unit 52 determines whether the setting information “cancel the concealment” is stored in the storage unit 53. If this setting information is stored, the processing unit 52 generates a SECURITY INFO REQUEST message requesting transmission of a key (encryption key) for releasing the concealment of the PDN connection request message, and the communication unit 51 The SECURITY INFO REQUEST message is transmitted to the MME 4 (step 112).
- processing unit 42 when the SECURITY INFO REQUEST message is received from HeNB-GW5, processing unit 42 generates a SECURITY INFO RESPONSE message including the key (encryption key), and communication unit 41 transmits the SECURITY INFO RESPONSE message to HeNB-GW5. (Step 113).
- the processing unit 52 uses the key included in the SECURITY INFO RESPONSE message to release the PDN connection request message from confidentiality and include it in the PDN connection request message.
- APN is read, and the route of the PDN connection is determined based on the correspondence table 301 stored in the storage unit 53 (step 114). Subsequently, the processing unit 52 resets concealment in the PDN connection request message, and the communication unit 51 transmits the PDN connection request message to the MME 4 (step 115).
- the MME 4 transmits a PDN connection acceptance message to the UE 7 (step 116). This enables data communication between the UE 7 and the PDN 1 (step 117).
- FIG. 12 shows an algorithm defining the operation of the above HeNB-GW5. This algorithm is stored in the storage unit 53 as setting information.
- the processing unit 52 determines whether or not the setting information “cancel the concealment” is stored in the storage unit 53. Is determined (step 212).
- step 212 If the setting information “cancel the concealment” is stored in step 212 (Yes in step 212), the processing unit 52 requests the transmission of an encryption key for canceling the concealment of the NAS message.
- the INFO REQUEST message is generated, and the communication unit 51 transmits the SECURITY INFO REQUEST message to the MME 4 and receives a SECURITY INFO RESPONSE message including the encryption key from the MME 4 as a response.
- the processing unit 52 releases the concealment of the NAS message using the encryption key included in the SECURITY INFO RESPONSE message (step 213).
- a process of releasing the concealment a process of decrypting the NAS message using the encryption key is performed.
- Step 214 the processing unit 52 determines whether or not the NAS message received in Step 211 is a PDN connection request message.
- Step 214 if the NAS message is a PDN connection request message (Yes in Step 214), the processing unit 52 first reads the APN included in the PDN connection request message. Next, the processing unit 52 determines the path of the PDN connection based on the read APN and the necessity of offloading according to the read APN shown in the correspondence table 302 stored in the storage unit 53. Determine (step 215). For example, when the read APN is APN1, the route of the PDN connection is determined so as to be offloaded and communicate with PDN1 via APN1. Next, the processing unit 52 resets the concealment in the PDN connection request message. Here, as a process of resetting the concealment, a process of encrypting the PDN connection request message using the encryption key is performed. Thereafter, the communication unit 51 transmits the PDN connection request message to the MME 4.
- step 212 the processing unit 52 does not cancel the concealment of the NAS message received in step 211. Then, the data is transferred from the communication unit 51 to the MME 4 as it is (step 216).
- Step 214 If the NAS message is not a PDN connection request message in Step 214 (No in Step 214), the processing unit 52 resets the concealment in the NAS message, and the communication unit 51 transmits the NAS message to the MME 4. To do.
- the MME 4 when the MME 4 receives the SECURITY INFO REQUEST message from the HeNB-GW 5, the MME 4 transmits a key to the HeNB-GW 5 using the SECURITY INFO RESPONSE message as a response to this message.
- a key for example, an underlined portion in FIGS. 7 and 8 is added to TS36.413, and setting information such as “transmit key to HeNB-GW” is stored in the storage unit 43 of MME4.
- the MME 4 voluntarily transmits the key using the UE CONTEXT MODIFICATION REQUEST message shown in FIG. 7 or 8 regardless of whether or not the SECURITY INFO REQUEST message is received from the HeNB-GW 5.
- the MME uses a HeNB-GW as a response to a transmission request from the HeNB-GW or a voluntary HeNB-GW as a response to a transmission request from the HeNB-GW. -Send to GW.
- the HeNB-GW can cancel and set the anonymization using the key received from the MME.
- the method of offloading traffic according to the APN of the application used for each user in a secure environment such as a telecommunications carrier's station can be realized according to the 3GPP standard specifications. It becomes.
- the HeNB-GW it is possible to simultaneously realize lawful interception, reduction of security risk, reduction of load on equipment, improvement of user experience (user experience), and the like.
- the HeNB-GW has shown the procedure for reading the APN included in the PDN connection request message. However, the HeNB-GW reads the APN included in another NAS message transmitted from the UE toward the core network.
- a PDN connection path may be established so as to obtain the above utility. Examples of other NAS messages include ACTIVATE DEFAULT EPS BEARER CONTEXT REQUEST message and ESM INFORMATION REQUEST message described in TS 24.301 v9.1.0.
- the HeNB-GW when the HeNB-GW releases the concealment of the NAS message received from the UE, the HeNB-GW resets the concealment after that, but the processing after releasing the concealment of the NAS message is as follows:
- the telecommunications carrier should decide. For example, when the ciphering of the NAS message is released, the ciphering is not reset between the HeNB-GW and the MME, or another security mechanism is applied between the UE and the MME. It is also possible not to reset the concealment.
- the first embodiment and the second embodiment are shown independently, the procedures of the first embodiment and the second embodiment may be performed simultaneously if possible. I do not care.
- the HeNB-GW is installed in the telecommunications carrier's station, but some HeNB-GWs are located on the premises of other corporations. May be configured to connect to another HeNB-GW installed in the communication company's station, or directly connect to the MME. Further, when the HeNB-GW is installed in the corporate premises, the data offload destination shown in the second embodiment may be equipment in the corporate premises instead of the PDN.
- FIGS. 6 to 8 show examples in which the IE (Information Element) of the S1AP message is changed / added. It is assumed that the first embodiment and the second embodiment may be implemented by addition. Examples of other S1AP messages include an Uplink NAS Transport message.
- the femto base station is concentrated on the HeNB-GW.
- the femto base station conceals the connection. Further, it is possible to implement such as releasing integrity protection.
- the configuration of the femto base station may be the same as that of the HeNB-GW of the first embodiment and the second embodiment.
- the macro base station (eNB) directly connected to the MME can also be released from concealment and integrity protection. In this case, the configuration of the macro base station may be the same as that of the HeNB-GW of the first embodiment and the second embodiment.
- the schemes proposed in the first embodiment and the second embodiment are based on the premise that the 3GPP standard specifications shown in FIGS. 5 to 8 are changed. However, the data offload from the macro base station is caused by this change. Therefore, data offload from the macro base station may be performed.
- the configuration of the macro base station may be the same as that of the HeNB-GW of the first embodiment and the second embodiment.
- the S1 SETUP REQUEST is notified to that effect.
- the MME may be notified by a message (S1AP message) or the like, and the concealment and integrity protection may not be set in the NAS message between the MME and the UE.
- S1AP message a message
- IPsec IPsec
- SSL Secure Sockets Layer
- TSL Transport Layer Security
- the method performed by the HeNB-GW, the macro base station, and the MME of the present invention may be applied to a program for causing a computer to execute.
- the program can be stored in a storage medium and can be provided to the outside via a network.
- a gateway device for connecting a base station to a core network A gateway device having a communication unit that receives from a mobility management server in the core network a key for canceling concealment set in a NAS message received from a terminal under the base station.
- Appendix 2 The gateway device according to attachment 1, wherein the communication unit receives a key for canceling integrity protection set in the NAS message received from the terminal from the mobility management server.
- a processing unit that generates an S1AP message for requesting transmission of a key for releasing the anonymity upon reception of a NAS message from the terminal;
- the communication unit is When receiving a NAS message from the terminal, an S1AP message requesting transmission of a key for releasing the concealment is transmitted to the mobility management server, and as a response, the key for canceling the concealment is transmitted from the mobility management server.
- the gateway device receives an S1AP message including: (Appendix 4)
- a PDN is connected to the core network
- Each of the terminals further includes a storage unit that stores a correspondence table indicating necessity of offloading to the PDN corresponding to the APN included in the PDN connection request message transmitted as a NAS message from the terminal
- the processor is When receiving a NAS message from the terminal, Using the key to release the anonymization, release the anonymity set in the NAS message received from the terminal, When the NAS message received from the terminal is a PDN connection request message, the PDN is determined based on the APN included in the PDN connection request message and the necessity of offloading corresponding to the APN indicated in the correspondence table. 4.
- the gateway device according to appendix 1 or 3, which determines a connection path.
- Appendix 5 A processing unit that generates an S1AP message requesting transmission of a key for canceling the concealment and the integrity protection when receiving a NAS message from the terminal;
- the communication unit is Upon reception of a NAS message from the terminal, an S1AP message requesting transmission of a key for canceling the concealment and the integrity protection is transmitted to the mobility management server, and as a response, the secrecy is transmitted from the mobility management server.
- the gateway apparatus according to attachment 2, wherein the gateway apparatus receives an S1AP message including a key for deactivating and protecting the integrity.
- the base station is a first base station;
- a storage unit for storing a conversion table in which the identifier of the location registration area of the first base station is associated with the identifier of the location registration area of the second base station in the vicinity of the first base station;
- the processor is When receiving a NAS message from the terminal, Using the key to release the anonymization, release the anonymity set in the NAS message received from the terminal, If the NAS message received from the terminal is a location registration request message, the integrity protection set in the location registration request message is canceled using the key for releasing the integrity protection, and the location registration request message
- the gateway device according to appendix 2 or 5, wherein the identifier of the location registration area of the first base station included is converted into the identifier of the location registration area of the second base station associated in the conversion table.
- Appendix 7 A base station connected to a core network, A base station having a communication unit that receives from the mobility management server in the core network a key for canceling concealment set in a NAS message received from a terminal under the base station.
- Appendix 8 The base station according to appendix 7, wherein the communication unit receives a key for canceling integrity protection set in a NAS message received from the terminal from the mobility management server.
- a processing unit that generates an S1AP message for requesting transmission of a key for releasing the anonymity upon reception of a NAS message from the terminal;
- the communication unit is When receiving a NAS message from the terminal, an S1AP message requesting transmission of a key for releasing the concealment is transmitted to the mobility management server, and as a response, the key for canceling the concealment is transmitted from the mobility management server.
- the base station which receives an S1AP message including: (Appendix 10) A PDN is connected to the core network, Each of the terminals further includes a storage unit that stores a correspondence table indicating necessity of offloading to the PDN corresponding to the APN included in the PDN connection request message transmitted as a NAS message from the terminal,
- the processor is When receiving a NAS message from the terminal, Using the key to release the anonymization, release the anonymity set in the NAS message received from the terminal, When the NAS message received from the terminal is a PDN connection request message, the PDN is determined based on the APN included in the PDN connection request message and the necessity of offloading corresponding to the APN indicated in the correspondence table.
- the base station according to appendix 7 or 9, which determines a connection path.
- Appendix 11 A processing unit that generates an S1AP message requesting transmission of a key for canceling the concealment and the integrity protection when receiving a NAS message from the terminal;
- the communication unit is Upon reception of a NAS message from the terminal, an S1AP message requesting transmission of a key for canceling the concealment and the integrity protection is transmitted to the mobility management server, and as a response, the secrecy is transmitted from the mobility management server.
- the base station according to appendix 8, wherein the base station receives an S1AP message including a key for enabling and canceling the integrity protection.
- the base station is a first base station;
- a storage unit for storing a conversion table in which the identifier of the location registration area of the first base station is associated with the identifier of the location registration area of the second base station in the vicinity of the first base station;
- the processor is When receiving a NAS message from the terminal, Using the key to release the anonymization, release the anonymity set in the NAS message received from the terminal, If the NAS message received from the terminal is a location registration request message, the integrity protection set in the location registration request message is canceled using the key for releasing the integrity protection, and the location registration request message
- the base station according to appendix 8 or 11, wherein the identifier of the location registration area of the first base station included is converted into the identifier of the location registration area of the second base station associated in the conversion table.
- a mobility management server provided in the core network, For the gateway device that connects the base station or the base station to the core network, a key for releasing the concealment set in the NAS message received from the terminal under the base station by the base station or the gateway device.
- a mobility management server having a communication unit for transmission.
- the communication unit transmits a key for releasing integrity protection set in a NAS message received from the terminal by the base station or the gateway device to the base station or the gateway device, according to appendix 13.
- Mobility management server is
- the communication unit is (Supplementary note 13) When an S1AP message requesting transmission of the key for releasing the concealment is received from the base station or the gateway device, an S1AP message including the key for releasing the concealment is transmitted as a response.
- the mobility management server described. When receiving an S1AP message requesting transmission of a key for releasing the concealment and the integrity protection from the base station or the gateway device, an S1AP message including a key for releasing the concealment and the integrity protection is received.
- the communication unit is Upon reception of an S1AP message requesting transmission of a key for canceling the concealment and the integrity protection from the base station or the gateway device, a key for canceling the concealment and the integrity protection is received as a response.
- the mobility management server according to appendix 14, which transmits an S1AP message including the message.
- Appendix 17 A communication method using a gateway device that connects a base station to a core network, A communication method comprising a step of receiving, from a mobility management server in the core network, a key for canceling concealment set in a NAS message received from a terminal under the base station.
- a communication method by a base station connected to a core network A communication method comprising a step of receiving, from a mobility management server in the core network, a key for canceling concealment set in a NAS message received from a terminal under the base station.
- a communication method by a mobility management server provided in a core network For the gateway device that connects the base station or the base station to the core network, a key for releasing the concealment set in the NAS message received from the terminal under the base station by the base station or the gateway device.
- a communication method comprising the step of transmitting.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Technology Law (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
(2)UEの通信量が増大した場合、HeNB-GWの先にあるコアネットワークへの負荷が増大する
上記の(1)の問題に対しては、特許文献1では、次のようなアルゴリズムをLTE方式の無線通信システムに適用することを提案している。このアルゴリズムでは、FNG(Femto Network Gateway。HeNB-GWに相当)は、マクロ位置登録エリアID(マクロ基地局の位置登録エリアの識別子)に含まれるMNC(Mobile Network Code)をフェムトセル網のMNCに変換し、変換後のマクロ位置登録エリアIDをフェムト位置登録エリアID(フェムト基地局の位置登録エリアの識別子)として設定する。UEは、周囲の基地局から報知されている位置登録エリアIDに含まれるMNCが、前回位置登録をした時の位置登録エリアIDに含まれるMNCと互換性がある場合には、位置登録を実施しない。これにより、UEの位置登録要求の頻度が低減される。特許文献1の図7には、UEが位置登録を実施する時のシーケンスが示されている。このシーケンスの手順356では、特許文献1の図9に示されるように、FNGは、UEから受信した位置登録要求に含まれるフェムト基地局のフェムト位置登録エリアIDを、そのフェムト基地局の近傍のマクロ基地局のマクロ位置登録エリアIDに変換し、変換後の位置登録要求をコアネットワーク内のMME(Mobility Management Entity:移動管理サーバ)に送信する。なお、近傍のマクロ基地局とは、フェムト基地局がマクロ基地局から報知されているマクロ位置登録エリアIDを受信することが可能な位置に存在するマクロ基地局である(以下、同様)。
基地局をコアネットワークに接続するゲートウェイ装置であって、
前記基地局の配下の端末から受信したNASメッセージに設定された秘匿化を解除する鍵を、前記コアネットワーク内の移動管理サーバから受信する通信部を有する。
コアネットワークに接続される基地局であって、
前記基地局の配下の端末から受信したNASメッセージに設定された秘匿化を解除する鍵を、前記コアネットワーク内の移動管理サーバから受信する通信部を有する。
コアネットワーク内に設けられた移動管理サーバであって、
基地局または前記基地局を前記コアネットワークに接続するゲートウェイ装置に対し、前記基地局または前記ゲートウェイ装置にて前記基地局の配下の端末から受信したNASメッセージに設定された秘匿化を解除する鍵を送信する通信部を有する。
基地局をコアネットワークに接続するゲートウェイ装置による通信方法であって、
前記基地局の配下の端末から受信したNASメッセージに設定された秘匿化を解除する鍵を、前記コアネットワーク内の移動管理サーバから受信するステップを有する。
コアネットワークに接続される基地局による通信方法であって、
前記基地局の配下の端末から受信したNASメッセージに設定された秘匿化を解除する鍵を、前記コアネットワーク内の移動管理サーバから受信するステップを有する。
コアネットワーク内に設けられた移動管理サーバによる通信方法であって、
基地局または前記基地局を前記コアネットワークに接続するゲートウェイ装置に対し、前記基地局または前記ゲートウェイ装置にて前記基地局の配下の端末から受信したNASメッセージに設定された秘匿化を解除する鍵を送信するステップを有する。
(1)第1の実施形態
(1-1)第1の実施形態の構成
図1は、本発明の第1の実施形態の無線通信システムの概略構成を示している。
(1-2)第1の実施形態の動作
本実施形態の無線通信システムは、概略、次のように動作する。
(1-3)第1の実施形態の効果
本実施形態においては、MMEは、NASメッセージの秘匿化および完全性保護を解除する鍵を、HeNB-GWからの送信要求に対する応答として、または、自発的に、HeNB-GWに送信する。
(2)第2の実施形態
(2-1)第2の実施形態の構成
図9は、本発明の第2の実施形態の無線通信システムの概略構成を示している。
(2-2)第2の実施形態の動作
本実施形態の無線通信システムは、概略、次のように動作する。
(2-3)第2の実施形態の効果
本実施形態においては、MMEは、NASメッセージの秘匿化を解除する鍵を、HeNB-GWからの送信要求に対する応答として、または、自発的に、HeNB-GWに送信する。
(3)他の実施形態
第1の実施形態および第2の実施形態を独立に示したが、第1の実施形態および第2の実施形態の手順は、可能であれば、同時に実施しても構わない。
(付記1)
基地局をコアネットワークに接続するゲートウェイ装置であって、
前記基地局の配下の端末から受信したNASメッセージに設定された秘匿化を解除する鍵を、前記コアネットワーク内の移動管理サーバから受信する通信部を有するゲートウェイ装置。
(付記2)
前記通信部は、前記端末から受信したNASメッセージに設定された完全性保護を解除する鍵を、前記移動管理サーバから受信する、付記1に記載のゲートウェイ装置。
(付記3)
前記端末からのNASメッセージの受信時に、前記秘匿化を解除する鍵の送信を要求するS1APメッセージを生成する処理部をさらに有し、
前記通信部は、
前記端末からのNASメッセージの受信時に、前記秘匿化を解除する鍵の送信を要求するS1APメッセージを前記移動管理サーバに送信し、その応答として、前記移動管理サーバから、前記秘匿化を解除する鍵を含むS1APメッセージを受信する、付記1に記載のゲートウェイ装置。
(付記4)
前記コアネットワークにはPDNが接続されており、
前記端末毎に、当該端末からNASメッセージとして送信されたPDN接続要求メッセージに含まれるAPNに応じたPDNへのオフロードの要否を示す対応表を記憶する記憶部をさらに有し、
前記処理部は、
前記端末からのNASメッセージの受信時に、
前記秘匿化を解除する鍵を用いて、前記端末から受信したNASメッセージに設定された秘匿化を解除し、
前記端末から受信したNASメッセージがPDN接続要求メッセージである場合、当該PDN接続要求メッセージに含まれるAPNと、前記対応表において示される当該APNに応じたオフロードの要否と、に基づいて、PDNコネクションの経路を決定する、付記1または3に記載のゲートウェイ装置。
(付記5)
前記端末からのNASメッセージの受信時に、前記秘匿化および前記完全性保護を解除する鍵の送信を要求するS1APメッセージを生成する処理部をさらに有し、
前記通信部は、
前記端末からのNASメッセージの受信時に、前記秘匿化および前記完全性保護を解除する鍵の送信を要求するS1APメッセージを前記移動管理サーバに送信し、その応答として、前記移動管理サーバから、前記秘匿化および前記完全性保護を解除する鍵を含むS1APメッセージを受信する、付記2に記載のゲートウェイ装置。
(付記6)
前記基地局は、第1の基地局であり、
第1の基地局の位置登録エリアの識別子と、当該第1の基地局の近傍の第2の基地局の位置登録エリアの識別子と、を対応付けた変換表を記憶する記憶部をさらに有し、
前記処理部は、
前記端末からのNASメッセージの受信時に、
前記秘匿化を解除する鍵を用いて、前記端末から受信したNASメッセージに設定された秘匿化を解除し、
前記端末から受信したNASメッセージが位置登録要求メッセージである場合、前記完全性保護を解除する鍵を用いて、当該位置登録要求メッセージに設定された完全性保護を解除し、当該位置登録要求メッセージに含まれる第1の基地局の位置登録エリアの識別子を、前記変換表において対応付けられた第2の基地局の位置登録エリアの識別子に変換する、付記2または5に記載のゲートウェイ装置。
(付記7)
コアネットワークに接続される基地局であって、
前記基地局の配下の端末から受信したNASメッセージに設定された秘匿化を解除する鍵を、前記コアネットワーク内の移動管理サーバから受信する通信部を有する基地局。
(付記8)
前記通信部は、前記端末から受信したNASメッセージに設定された完全性保護を解除する鍵を、前記移動管理サーバから受信する、付記7に記載の基地局。
(付記9)
前記端末からのNASメッセージの受信時に、前記秘匿化を解除する鍵の送信を要求するS1APメッセージを生成する処理部をさらに有し、
前記通信部は、
前記端末からのNASメッセージの受信時に、前記秘匿化を解除する鍵の送信を要求するS1APメッセージを前記移動管理サーバに送信し、その応答として、前記移動管理サーバから、前記秘匿化を解除する鍵を含むS1APメッセージを受信する、付記7に記載の基地局。
(付記10)
前記コアネットワークにはPDNが接続されており、
前記端末毎に、当該端末からNASメッセージとして送信されたPDN接続要求メッセージに含まれるAPNに応じたPDNへのオフロードの要否を示す対応表を記憶する記憶部をさらに有し、
前記処理部は、
前記端末からのNASメッセージの受信時に、
前記秘匿化を解除する鍵を用いて、前記端末から受信したNASメッセージに設定された秘匿化を解除し、
前記端末から受信したNASメッセージがPDN接続要求メッセージである場合、当該PDN接続要求メッセージに含まれるAPNと、前記対応表において示される当該APNに応じたオフロードの要否と、に基づいて、PDNコネクションの経路を決定する、付記7または9に記載の基地局。
(付記11)
前記端末からのNASメッセージの受信時に、前記秘匿化および前記完全性保護を解除する鍵の送信を要求するS1APメッセージを生成する処理部をさらに有し、
前記通信部は、
前記端末からのNASメッセージの受信時に、前記秘匿化および前記完全性保護を解除する鍵の送信を要求するS1APメッセージを前記移動管理サーバに送信し、その応答として、前記移動管理サーバから、前記秘匿化および前記完全性保護を解除する鍵を含むS1APメッセージを受信する、付記8に記載の基地局。
(付記12)
前記基地局は、第1の基地局であり、
第1の基地局の位置登録エリアの識別子と、当該第1の基地局の近傍の第2の基地局の位置登録エリアの識別子と、を対応付けた変換表を記憶する記憶部をさらに有し、
前記処理部は、
前記端末からのNASメッセージの受信時に、
前記秘匿化を解除する鍵を用いて、前記端末から受信したNASメッセージに設定された秘匿化を解除し、
前記端末から受信したNASメッセージが位置登録要求メッセージである場合、前記完全性保護を解除する鍵を用いて、当該位置登録要求メッセージに設定された完全性保護を解除し、当該位置登録要求メッセージに含まれる第1の基地局の位置登録エリアの識別子を、前記変換表において対応付けられた第2の基地局の位置登録エリアの識別子に変換する、付記8または11に記載の基地局。
(付記13)
コアネットワーク内に設けられた移動管理サーバであって、
基地局または前記基地局を前記コアネットワークに接続するゲートウェイ装置に対し、前記基地局または前記ゲートウェイ装置にて前記基地局の配下の端末から受信したNASメッセージに設定された秘匿化を解除する鍵を送信する通信部を有する移動管理サーバ。
(付記14)
前記通信部は、前記基地局または前記ゲートウェイ装置に対し、前記基地局または前記ゲートウェイ装置にて前記端末から受信したNASメッセージに設定された完全性保護を解除する鍵を送信する、付記13に記載の移動管理サーバ。
(付記15)
前記基地局または前記ゲートウェイ装置からの、前記秘匿化を解除する鍵の送信を要求するS1APメッセージの受信時に、前記秘匿化を解除する鍵を含むS1APメッセージを生成する処理部をさらに有し、
前記通信部は、
前記基地局または前記ゲートウェイ装置からの、前記秘匿化を解除する鍵の送信を要求するS1APメッセージの受信時に、その応答として、前記秘匿化を解除する鍵を含むS1APメッセージを送信する、付記13に記載の移動管理サーバ。
(付記16)
前記基地局または前記ゲートウェイ装置からの、前記秘匿化および前記完全性保護を解除する鍵の送信を要求するS1APメッセージの受信時に、前記秘匿化および前記完全性保護を解除する鍵を含むS1APメッセージを生成する処理部をさらに有し、
前記通信部は、
前記基地局または前記ゲートウェイ装置からの、前記秘匿化および前記完全性保護を解除する鍵の送信を要求するS1APメッセージの受信時に、その応答として、前記秘匿化および前記完全性保護を解除する鍵を含むS1APメッセージを送信する、付記14に記載の移動管理サーバ。
(付記17)
基地局をコアネットワークに接続するゲートウェイ装置による通信方法であって、
前記基地局の配下の端末から受信したNASメッセージに設定された秘匿化を解除する鍵を、前記コアネットワーク内の移動管理サーバから受信するステップを有する通信方法。
(付記18)
コアネットワークに接続される基地局による通信方法であって、
前記基地局の配下の端末から受信したNASメッセージに設定された秘匿化を解除する鍵を、前記コアネットワーク内の移動管理サーバから受信するステップを有する通信方法。
(付記19)
コアネットワーク内に設けられた移動管理サーバによる通信方法であって、
基地局または前記基地局を前記コアネットワークに接続するゲートウェイ装置に対し、前記基地局または前記ゲートウェイ装置にて前記基地局の配下の端末から受信したNASメッセージに設定された秘匿化を解除する鍵を送信するステップを有する通信方法。
Claims (9)
- 基地局をコアネットワークに接続するゲートウェイ装置であって、
前記基地局の配下の端末から受信したNASメッセージに設定された秘匿化を解除する鍵を、前記コアネットワーク内の移動管理サーバから受信する通信部を有するゲートウェイ装置。 - 前記通信部は、前記端末から受信したNASメッセージに設定された完全性保護を解除する鍵を、前記移動管理サーバから受信する、請求項1に記載のゲートウェイ装置。
- 前記コアネットワークにはPDNが接続されており、
前記端末毎に、当該端末からNASメッセージとして送信されたPDN接続要求メッセージに含まれるAPNに応じたPDNへのオフロードの要否を示す対応表を記憶する記憶部をさらに有し、
前記処理部は、
前記端末からのNASメッセージの受信時に、
前記秘匿化を解除する鍵を用いて、前記端末から受信したNASメッセージに設定された秘匿化を解除し、
前記端末から受信したNASメッセージがPDN接続要求メッセージである場合、当該PDN接続要求メッセージに含まれるAPNと、前記対応表において示される当該APNに応じたオフロードの要否と、に基づいて、PDNコネクションの経路を決定する、請求項1に記載のゲートウェイ装置。 - 前記基地局は、第1の基地局であり、
第1の基地局の位置登録エリアの識別子と、当該第1の基地局の近傍の第2の基地局の位置登録エリアの識別子と、を対応付けた変換表を記憶する記憶部をさらに有し、
前記処理部は、
前記端末からのNASメッセージの受信時に、
前記秘匿化を解除する鍵を用いて、前記端末から受信したNASメッセージに設定された秘匿化を解除し、
前記端末から受信したNASメッセージが位置登録要求メッセージである場合、前記完全性保護を解除する鍵を用いて、当該位置登録要求メッセージに設定された完全性保護を解除し、当該位置登録要求メッセージに含まれる第1の基地局の位置登録エリアの識別子を、前記変換表において対応付けられた第2の基地局の位置登録エリアの識別子に変換する、請求項2に記載のゲートウェイ装置。 - コアネットワークに接続される基地局であって、
前記基地局の配下の端末から受信したNASメッセージに設定された秘匿化を解除する鍵を、前記コアネットワーク内の移動管理サーバから受信する通信部を有する基地局。 - コアネットワーク内に設けられた移動管理サーバであって、
基地局または前記基地局を前記コアネットワークに接続するゲートウェイ装置に対し、前記基地局または前記ゲートウェイ装置にて前記基地局の配下の端末から受信したNASメッセージに設定された秘匿化を解除する鍵を送信する通信部を有する移動管理サーバ。 - 基地局をコアネットワークに接続するゲートウェイ装置による通信方法であって、
前記基地局の配下の端末から受信したNASメッセージに設定された秘匿化を解除する鍵を、前記コアネットワーク内の移動管理サーバから受信するステップを有する通信方法。 - コアネットワークに接続される基地局による通信方法であって、
前記基地局の配下の端末から受信したNASメッセージに設定された秘匿化を解除する鍵を、前記コアネットワーク内の移動管理サーバから受信するステップを有する通信方法。 - コアネットワーク内に設けられた移動管理サーバによる通信方法であって、
基地局または前記基地局を前記コアネットワークに接続するゲートウェイ装置に対し、前記基地局または前記ゲートウェイ装置にて前記基地局の配下の端末から受信したNASメッセージに設定された秘匿化を解除する鍵を送信するステップを有する通信方法。
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP11780432.8A EP2571329B1 (en) | 2010-05-13 | 2011-03-17 | Controlling the load on a core-network |
KR1020127032194A KR101506071B1 (ko) | 2010-05-13 | 2011-03-17 | 게이트웨이 장치, 기지국, 모바일 관리 서버, 및 통신 방법 |
CN201180023897.4A CN102893695B (zh) | 2010-05-13 | 2011-03-17 | 网关设备、基站、移动管理服务器和通信方法 |
US13/637,931 US9049684B2 (en) | 2010-05-13 | 2011-03-17 | Gateway device, base station, mobile management server, and communication method |
JP2012514734A JP5440696B2 (ja) | 2010-05-13 | 2011-03-17 | ゲートウェイ装置、基地局、移動管理サーバ、通信方法 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2010-111182 | 2010-05-13 | ||
JP2010111182 | 2010-05-13 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2011142175A1 true WO2011142175A1 (ja) | 2011-11-17 |
Family
ID=44914232
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2011/056396 WO2011142175A1 (ja) | 2010-05-13 | 2011-03-17 | ゲートウェイ装置、基地局、移動管理サーバ、通信方法 |
Country Status (6)
Country | Link |
---|---|
US (1) | US9049684B2 (ja) |
EP (1) | EP2571329B1 (ja) |
JP (1) | JP5440696B2 (ja) |
KR (1) | KR101506071B1 (ja) |
CN (1) | CN102893695B (ja) |
WO (1) | WO2011142175A1 (ja) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2013153317A (ja) * | 2012-01-25 | 2013-08-08 | Fujitsu Ltd | ネットワークシステム,オフロード装置及びオフロード装置の利用者識別情報取得方法 |
JP2014220010A (ja) * | 2014-08-12 | 2014-11-20 | ヤフー株式会社 | 広告配信装置 |
JP2015511102A (ja) * | 2012-03-22 | 2015-04-13 | インターデイジタル パテント ホールディングス インコーポレイテッド | バックホールトラフィックをオフロードするための方法および装置 |
JPWO2014077352A1 (ja) * | 2012-11-16 | 2017-01-05 | 日本電気株式会社 | ネットワークシステムと方法と装置並びにプログラム |
Families Citing this family (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2076874A4 (en) * | 2006-05-13 | 2011-03-09 | Sap Ag | DERIVED CONSISTENT SET OF INTERFACES DERIVED FROM A BUSINESS OBJECT MODEL |
US8417593B2 (en) | 2008-02-28 | 2013-04-09 | Sap Ag | System and computer-readable medium for managing consistent interfaces for business objects across heterogeneous systems |
US8589263B2 (en) * | 2008-03-31 | 2013-11-19 | Sap Ag | Managing consistent interfaces for retail business objects across heterogeneous systems |
US20090248429A1 (en) * | 2008-03-31 | 2009-10-01 | Sap Ag | Managing Consistent Interfaces for Sales Price Business Objects Across Heterogeneous Systems |
US20090248463A1 (en) * | 2008-03-31 | 2009-10-01 | Emmanuel Piochon | Managing Consistent Interfaces For Trading Business Objects Across Heterogeneous Systems |
US20090249358A1 (en) * | 2008-03-31 | 2009-10-01 | Sap Ag | Managing Consistent Interfaces for Kanban Business Objects Across Heterogeneous Systems |
US20100153297A1 (en) | 2008-12-12 | 2010-06-17 | Sap Ag | Managing Consistent Interfaces for Credit Portfolio Business Objects Across Heterogeneous Systems |
US9135585B2 (en) | 2010-06-15 | 2015-09-15 | Sap Se | Managing consistent interfaces for property library, property list template, quantity conversion virtual object, and supplier property specification business objects across heterogeneous systems |
US8775280B2 (en) | 2011-07-28 | 2014-07-08 | Sap Ag | Managing consistent interfaces for financial business objects across heterogeneous systems |
US8725654B2 (en) | 2011-07-28 | 2014-05-13 | Sap Ag | Managing consistent interfaces for employee data replication business objects across heterogeneous systems |
US8756274B2 (en) | 2012-02-16 | 2014-06-17 | Sap Ag | Consistent interface for sales territory message type set 1 |
US9237425B2 (en) | 2012-02-16 | 2016-01-12 | Sap Se | Consistent interface for feed event, feed event document and feed event type |
US8984050B2 (en) | 2012-02-16 | 2015-03-17 | Sap Se | Consistent interface for sales territory message type set 2 |
US8762454B2 (en) | 2012-02-16 | 2014-06-24 | Sap Ag | Consistent interface for flag and tag |
US9232368B2 (en) | 2012-02-16 | 2016-01-05 | Sap Se | Consistent interface for user feed administrator, user feed event link and user feed settings |
US8762453B2 (en) | 2012-02-16 | 2014-06-24 | Sap Ag | Consistent interface for feed collaboration group and feed event subscription |
US8756135B2 (en) | 2012-06-28 | 2014-06-17 | Sap Ag | Consistent interface for product valuation data and product valuation level |
US9367826B2 (en) | 2012-06-28 | 2016-06-14 | Sap Se | Consistent interface for entitlement product |
US9246869B2 (en) | 2012-06-28 | 2016-01-26 | Sap Se | Consistent interface for opportunity |
US9400998B2 (en) | 2012-06-28 | 2016-07-26 | Sap Se | Consistent interface for message-based communication arrangement, organisational centre replication request, and payment schedule |
WO2014000200A1 (en) | 2012-06-28 | 2014-01-03 | Sap Ag | Consistent interface for document output request |
US8949855B2 (en) | 2012-06-28 | 2015-02-03 | Sap Se | Consistent interface for address snapshot and approval process definition |
US9076112B2 (en) | 2012-08-22 | 2015-07-07 | Sap Se | Consistent interface for financial instrument impairment expected cash flow analytical result |
US9547833B2 (en) | 2012-08-22 | 2017-01-17 | Sap Se | Consistent interface for financial instrument impairment calculation |
US9043236B2 (en) | 2012-08-22 | 2015-05-26 | Sap Se | Consistent interface for financial instrument impairment attribute values analytical result |
US9191343B2 (en) | 2013-03-15 | 2015-11-17 | Sap Se | Consistent interface for appointment activity business object |
US9191357B2 (en) | 2013-03-15 | 2015-11-17 | Sap Se | Consistent interface for email activity business object |
KR101597630B1 (ko) * | 2014-04-10 | 2016-02-25 | 김재원 | 상부구동형 착즙기 |
US10841857B2 (en) * | 2017-02-07 | 2020-11-17 | Motorola Mobility Llc | Data packet routing in a remote unit |
WO2019075608A1 (zh) | 2017-10-16 | 2019-04-25 | Oppo广东移动通信有限公司 | 一种加密数据流的识别方法、设备、存储介质及系统 |
CN114501585A (zh) * | 2017-11-28 | 2022-05-13 | 华为技术有限公司 | 一种接入本地网络的方法和设备 |
US11064354B2 (en) * | 2018-02-23 | 2021-07-13 | Arris Enterprises Llc | Virtual tenant for multiple dwelling unit |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009504048A (ja) | 2005-08-01 | 2009-01-29 | ユビキシス リミテッド | ローカルエリアセルラ基地局 |
JP2009094651A (ja) | 2007-10-04 | 2009-04-30 | Kddi Corp | 移動体通信システムにおけるハンドオフ方法、無線基地局装置及びゲートウェイ装置 |
WO2009097602A1 (en) * | 2008-02-02 | 2009-08-06 | Qualcomm Incorporated | Radio access network (ran) level keep alive signaling |
JP2009253431A (ja) | 2008-04-02 | 2009-10-29 | Alcatel-Lucent Usa Inc | Iuインターフェースを有するUMTSフェムトセル解法においてPSトラフィックをオフロードする方法。 |
JP2009267706A (ja) | 2008-04-24 | 2009-11-12 | Hitachi Communication Technologies Ltd | 無線通信システム及び基地局収容サーバ |
WO2010050222A1 (ja) * | 2008-10-30 | 2010-05-06 | パナソニック株式会社 | 基地局装置、ゲートウェイ装置、呼接続方法及び無線通信システム |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100554799B1 (ko) * | 2002-11-19 | 2006-02-22 | 엘지전자 주식회사 | Gsm이동통신 시스템의 전송 데이타 암호화 및 암호화 해제 방법 |
WO2007015071A2 (en) | 2005-08-01 | 2007-02-08 | Ubiquisys Limited | Automatic base station configuration |
JP4897613B2 (ja) | 2007-08-13 | 2012-03-14 | 株式会社エヌ・ティ・ティ・ドコモ | 移動通信システム、基地局装置、および、基地局状態制御方法 |
US8103267B2 (en) | 2007-09-26 | 2012-01-24 | Via Telecom, Inc. | Femtocell base station with mobile station capability |
JP5065854B2 (ja) | 2007-10-29 | 2012-11-07 | 株式会社エヌ・ティ・ティ・ドコモ | 基地局装置、移動局装置、及びシステム情報送信方法 |
US8413226B2 (en) * | 2008-05-13 | 2013-04-02 | Telefonaktiebolaget Lm Ericsson (Publ) | User-type handling in a wireless access network |
JP5077133B2 (ja) | 2008-08-07 | 2012-11-21 | 富士通株式会社 | 基地局およびデータ転送方法 |
JP2010074801A (ja) | 2008-09-22 | 2010-04-02 | Ntt Docomo Inc | 移動通信方法 |
US20100172500A1 (en) * | 2009-01-05 | 2010-07-08 | Chih-Hsiang Wu | Method of handling inter-system handover security in wireless communications system and related communication device |
AR075123A1 (es) * | 2009-01-06 | 2011-03-09 | Interdigital Patent Holdings | Metodo y aparato para cancelar una caida de un circuito conectado |
US20100272263A1 (en) * | 2009-04-27 | 2010-10-28 | Motorola, Inc. | Decrypting a nas message traced to an e-utran |
US8868029B2 (en) * | 2010-01-29 | 2014-10-21 | Alcatel Lucent | Method and apparatus for managing mobile resource usage |
-
2011
- 2011-03-17 EP EP11780432.8A patent/EP2571329B1/en not_active Not-in-force
- 2011-03-17 US US13/637,931 patent/US9049684B2/en not_active Expired - Fee Related
- 2011-03-17 KR KR1020127032194A patent/KR101506071B1/ko active IP Right Grant
- 2011-03-17 WO PCT/JP2011/056396 patent/WO2011142175A1/ja active Application Filing
- 2011-03-17 JP JP2012514734A patent/JP5440696B2/ja not_active Expired - Fee Related
- 2011-03-17 CN CN201180023897.4A patent/CN102893695B/zh not_active Expired - Fee Related
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009504048A (ja) | 2005-08-01 | 2009-01-29 | ユビキシス リミテッド | ローカルエリアセルラ基地局 |
JP2009094651A (ja) | 2007-10-04 | 2009-04-30 | Kddi Corp | 移動体通信システムにおけるハンドオフ方法、無線基地局装置及びゲートウェイ装置 |
WO2009097602A1 (en) * | 2008-02-02 | 2009-08-06 | Qualcomm Incorporated | Radio access network (ran) level keep alive signaling |
JP2009253431A (ja) | 2008-04-02 | 2009-10-29 | Alcatel-Lucent Usa Inc | Iuインターフェースを有するUMTSフェムトセル解法においてPSトラフィックをオフロードする方法。 |
JP2009267706A (ja) | 2008-04-24 | 2009-11-12 | Hitachi Communication Technologies Ltd | 無線通信システム及び基地局収容サーバ |
WO2010050222A1 (ja) * | 2008-10-30 | 2010-05-06 | パナソニック株式会社 | 基地局装置、ゲートウェイ装置、呼接続方法及び無線通信システム |
Non-Patent Citations (1)
Title |
---|
3GPP: "3GPP S2-096108", 3GPP |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2013153317A (ja) * | 2012-01-25 | 2013-08-08 | Fujitsu Ltd | ネットワークシステム,オフロード装置及びオフロード装置の利用者識別情報取得方法 |
JP2015511102A (ja) * | 2012-03-22 | 2015-04-13 | インターデイジタル パテント ホールディングス インコーポレイテッド | バックホールトラフィックをオフロードするための方法および装置 |
JP2016213906A (ja) * | 2012-03-22 | 2016-12-15 | インターデイジタル パテント ホールディングス インコーポレイテッド | バックホールトラフィックをオフロードするための方法および装置 |
US9526056B2 (en) | 2012-03-22 | 2016-12-20 | Interdigital Patent Holdings, Inc. | Method and apparatus for offloading backhaul traffic |
JPWO2014077352A1 (ja) * | 2012-11-16 | 2017-01-05 | 日本電気株式会社 | ネットワークシステムと方法と装置並びにプログラム |
JP2014220010A (ja) * | 2014-08-12 | 2014-11-20 | ヤフー株式会社 | 広告配信装置 |
Also Published As
Publication number | Publication date |
---|---|
US9049684B2 (en) | 2015-06-02 |
JP5440696B2 (ja) | 2014-03-12 |
KR101506071B1 (ko) | 2015-03-25 |
JPWO2011142175A1 (ja) | 2013-07-22 |
EP2571329A4 (en) | 2016-12-21 |
CN102893695A (zh) | 2013-01-23 |
EP2571329B1 (en) | 2019-03-06 |
KR20130009870A (ko) | 2013-01-23 |
EP2571329A1 (en) | 2013-03-20 |
CN102893695B (zh) | 2016-02-24 |
US20130021978A1 (en) | 2013-01-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5440696B2 (ja) | ゲートウェイ装置、基地局、移動管理サーバ、通信方法 | |
EP3557840B1 (en) | Security implementation method, device and system | |
CN107079023B (zh) | 用于下一代蜂窝网络的用户面安全 | |
US12063510B2 (en) | Signalling storm mitigation in a secured radio access network | |
KR102610951B1 (ko) | 다수의 접속성 및 서비스 컨텍스트들을 지원하기 위하여 보안성 모델을 이용하는 무선 통신을 위한 방법들 및 장치 | |
JP5625703B2 (ja) | 移動通信システム、通信制御方法及び無線基地局 | |
US9027111B2 (en) | Relay node authentication method, apparatus, and system | |
CN105376737B (zh) | 机器到机器的蜂窝通信安全性 | |
CN104285422A (zh) | 用于利用邻近服务的计算设备的安全通信 | |
KR102207135B1 (ko) | 단말의 데이터 전송 방법, 단말 장치 및 데이터 전송 제어 방법 | |
CN108966217B (zh) | 一种保密通信方法、移动终端及保密网关 | |
CN106211100A (zh) | 机器到机器的蜂窝通信安全性 | |
US20100106971A1 (en) | Method and communication system for protecting an authentication connection | |
CN106797560B (zh) | 用于配置安全参数的方法、服务器、基站和通信系统 | |
US20230179996A1 (en) | Selective user plane protection in 5g virtual ran | |
EP3138256B1 (en) | Residential local break out in a communication system | |
WO2015064475A1 (ja) | 通信制御方法、認証サーバ及びユーザ端末 | |
EP2613582A1 (en) | Methods of transmission to or reception by a telecommunications node of sensitive data, and apparatus therefor | |
CN101909297B (zh) | 一种接入网络设备之间的相互认证方法和接入网络设备 | |
JP6470631B2 (ja) | 通信制御装置および移動体通信システム | |
CN101909297A (zh) | 一种接入网络设备之间的相互认证方法和接入网络设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 201180023897.4 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11780432 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 13637931 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2012514734 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2011780432 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 20127032194 Country of ref document: KR Kind code of ref document: A |