WO2011147153A1 - Procédé et système permettant une synchronisation des algorithmes de sécurité de couche d'accès (as) - Google Patents

Procédé et système permettant une synchronisation des algorithmes de sécurité de couche d'accès (as) Download PDF

Info

Publication number
WO2011147153A1
WO2011147153A1 PCT/CN2010/077955 CN2010077955W WO2011147153A1 WO 2011147153 A1 WO2011147153 A1 WO 2011147153A1 CN 2010077955 W CN2010077955 W CN 2010077955W WO 2011147153 A1 WO2011147153 A1 WO 2011147153A1
Authority
WO
WIPO (PCT)
Prior art keywords
security algorithm
enb
security
rrc connection
algorithm
Prior art date
Application number
PCT/CN2010/077955
Other languages
English (en)
Chinese (zh)
Inventor
王波
李静岚
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2011147153A1 publication Critical patent/WO2011147153A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/037Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/106Packet or message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/19Connection re-establishment

Definitions

  • the present invention relates to a Long Term Evolution (LTE) technology, and more particularly to a method and system for synchronizing an access layer security algorithm when RRC connection reestablishment occurs after switching.
  • LTE Long Term Evolution
  • LTE Long Term Evolution
  • eNB evolved Node B
  • E-UTRAN Node B the operator cannot perform centralized security control on the eNB.
  • Each eNB is in a non-secure zone.
  • the eNB needs to select its own access layer (AS, Access Stratum) security algorithm according to its specific situation and the security capabilities of the user equipment (UE, User Equipment).
  • AS Access Stratum
  • UE User Equipment
  • the basic principle of the AS security algorithm selection is: the security capability information of the UE is sent to the eNB through the signaling process (for example, the core network carries the security capability of the UE to the eNB in the initial context setup request message), and the eNB supports the UE and the UE.
  • the AS security algorithm intersection select a highest priority AS security algorithm.
  • the eNB needs to update the AS security algorithm according to the above principles, and inform the UE of the new AS security algorithm through the air interface message.
  • FIG. 1 is a schematic diagram of the process of causing the AS security algorithm to be out of synchronization during the RRC connection reestablishment process in the prior art. As shown in Figure 1, specifically:
  • the security algorithm supported by eNB1 is not supported by eNB2, then, when the UE is switched If the eNB connection fails to be reestablished to the eNB2 when the eNB2 fails (such as the RRC reconfiguration at the time of handover), if the UE does not perform the AS security algorithm selection according to the AS security algorithm supported by the eNB2, the original AS security algorithm is still used. (ie, the security algorithm supported by eNB1), if the RRC re-establishment complete message is integrity-protected and encrypted, eNB2 must generate a failure to decrypt and integrity check the message because it does not support the original security algorithm, and finally cause the UE to switch. The subsequent access fails, which seriously affects the user's perception.
  • the security algorithm configuration cell may be added to the RRC connection re-establishment message sent by the eNB to the UE.
  • the method to solve a new problem has been introduced:
  • the new security algorithm configuration can only be sent to the UE through the RRC connection re-establishment message, and the RRC connection re-establishment message itself is not integrity-protected, therefore, if the malicious attacker will
  • the data encryption algorithm carried in the RRC connection re-establishment message is falsified, and the eNB and the UE cannot be discovered in time.
  • there are a large number of invalid data packets that the eNB cannot decrypt in the air interface for a period of time thus not only wasting air interface resources. And further seriously affect the user experience. Summary of the invention
  • the main purpose of the present invention is to provide a method and system for implementing synchronization of an access layer security algorithm, which can protect a user plane encryption algorithm in an RRC connection re-establishment from being tampered with, and avoid an AS security algorithm exception, to the greatest extent. It avoids the waste of bandwidth caused by invalid data packets, improves the timeliness of abnormal recovery, and improves the user experience before and after switching.
  • a method for implementing protection of an access layer security algorithm includes:
  • the evolved Node B notifies the user equipment (UE) whether to update the access stratum (AS) security algorithm;
  • the UE encrypts the completion of the RRC connection reestablishment by using the corresponding AS security algorithm according to the notification. And integrity protection;
  • the eNB uses the locally configured AS security algorithm to decrypt and complete the integrity of the RRC connection reestablishment, and determines whether to initiate the security acknowledgment based on the currently used AS security calculation.
  • the eNB notifies the UE whether to update the AS security algorithm, specifically:
  • the eNB After receiving the RRC connection re-establishment request from the UE, the eNB selects an AS security algorithm, and carries an AS security algorithm configuration information element in the RRC connection re-establishment message sent to the UE;
  • the AS security algorithm configures whether a cell presence flag is used to notify the UE whether the eNB's own AS security algorithm is updated.
  • the method further includes:
  • the eNB carries an algorithm configuration cell for carrying the updated AS security algorithm parameter in the RRC connection re-establishment message.
  • the eNB selecting an AS security algorithm includes:
  • the eNB determines, according to the configuration of the original AS security algorithm carried in the handover request message obtained before the RRC connection re-establishment process, whether the AS security algorithm configured by the eNB supports the original AS security algorithm, and if not, the eNB is configured according to the eNB.
  • the AS security algorithm configured by the AS and the security capability of the UE carried in the handover request message select a AS security algorithm with the highest priority and supported by the UE as the selected new AS security algorithm, and select the AS security algorithm. Save to local, configure locally with the new AS security algorithm configuration;
  • the original AS security algorithm is the selected AS security algorithm
  • the local AS security algorithm configuration is used for local configuration.
  • the UE enters the completion of the RRC connection reestablishment by using the corresponding AS security algorithm according to the notification Line encryption and integrity protection, including:
  • the UE After receiving the RRC connection re-establishment message from the eNB, the UE determines whether the AS security algorithm needs to be updated according to whether the AS security algorithm is configured in the AS security algorithm, and if the AS security algorithm configuration cell exists, the flag is displayed as If yes, the algorithm in the RRC connection re-establishment message is enabled to configure the updated AS security algorithm carried by the cell for local configuration; after that, the UE uses the updated AS security algorithm to encrypt and complete the RRC connection re-establishment message. After being protected, it is sent to the eNB;
  • the original AS security algorithm configuration cell indicates that the presence flag does not exist, the original AS security algorithm is still used for local configuration. After that, the UE uses the original AS security algorithm to encrypt and integrity protect the RRC connection re-establishment message. eNB.
  • the eNB determines whether to initiate the security confirmation according to the currently used AS security calculation, which specifically includes:
  • the eNB If the eNB's locally configured AS security algorithm is an updated AS security algorithm, the eNB initiates a security acknowledgment, and sends a security mode command SMC message to the UE for performing integrity protection using the updated AS security algorithm; After receiving the SMC message, the UE performs the SMC corresponding processing, and sends a security mode complete message to the eNB;
  • the eNB's locally configured AS security algorithm is not updated, then the eNB does not need to initiate a security acknowledgment.
  • a system for implementing protection of an access layer security algorithm comprising an eNB and a UE, where the eNB is configured to notify the UE whether to update the AS security algorithm during the RRC connection re-establishment process; and use the locally configured AS security algorithm to the RRC The completion of the connection re-establishment is performed for decryption and integrity verification, and whether the security confirmation is initiated according to the currently used AS security calculation;
  • the UE is configured to perform encryption and integrity protection on the completion of the RRC connection reestablishment by using the corresponding AS security algorithm according to the notification.
  • the present invention is on the target side of the handover failure.
  • the RRC connection reestablishment message carries the updated AS security algorithm, and immediately initiates the SMC process for security confirmation after the re-establishment is completed.
  • the invention protects the user plane encryption algorithm in the RRC link re-establishment from being tampered with, avoids the AS security algorithm exception, minimizes waste of bandwidth of the invalid data packet, improves the timeliness of abnormal recovery, and further Improved user experience before and after switching.
  • FIG. 1 is a schematic flowchart of a process in which an AS security algorithm is out of synchronization during an RRC connection re-establishment process in the prior art
  • FIG. 2 is a schematic diagram of a process for implementing synchronization of an AS algorithm when RRC connection reestablishment occurs after handover in the present invention
  • FIG. 3 is a schematic structural diagram of a system for implementing synchronization of an AS security algorithm according to the present invention
  • FIG. 4 is a schematic flowchart of a first embodiment of synchronizing AS algorithms according to the present invention. Schematic diagram of the process. detailed description
  • FIG. 2 is a schematic diagram of a process for implementing synchronization of an AS algorithm when an RRC connection reestablishment occurs after handover, and as shown in FIG. 2, the following steps are included:
  • Step 200 In the RRC connection re-establishment process, the eNB notifies the UE whether to update the AS security algorithm.
  • the eNB selects an AS security algorithm, and carries an AS security algorithm configuration cell presence flag in the RRC connection re-establishment message sent to the UE, to notify the UE, Whether the eNB's own AS security algorithm is updated. If the AS security algorithm configuration cell presence flag is displayed as being present, the eNB also carries an algorithm configuration cell in the RRC connection re-establishment message, which is used to carry the updated AS security algorithm parameter (package) Integrity protection algorithm and encryption algorithm).
  • the eNB selects an AS security algorithm including:
  • the eNB determines, according to the configuration of the original AS security algorithm carried in the handover request message, whether the AS security algorithm configured by the eNB supports the original AS security algorithm (including the integrity protection algorithm and the encryption algorithm), if not supported (integrity protection algorithm and encryption algorithm) If there is an unsupported one, it is considered that the original AS security algorithm is not supported.
  • the eNB selects the AS security algorithm with the highest priority and the UE support according to the AS security algorithm configured by the AS and the UE security capability carried in the handover request message. (including the integrity protection algorithm and the encryption algorithm) as the selected new AS security algorithm (that is, satisfying the algorithm replacement condition), and save the selected AS security algorithm to the local, and use the new AS security algorithm configuration for local configuration;
  • the original AS security algorithm is the selected AS security algorithm
  • the local configuration is configured using the original AS security algorithm configuration.
  • the eNB performs local configuration using the original AS security algorithm configuration.
  • Step 201 The UE performs encryption and integrity protection on the completion of the RRC connection reestablishment by using the corresponding AS security algorithm according to the notification.
  • the UE determines whether the AS security algorithm needs to be updated according to whether the AS security algorithm is configured in the AS security algorithm, if the AS security algorithm configures the cell to exist. If it is displayed as being present, the algorithm in the RRC connection re-establishment message is enabled to configure the updated AS security algorithm carried by the cell for local configuration; after that, the UE uses the updated AS security algorithm to encrypt the RRC connection re-establishment completion message. The integrity is protected and sent to the eNB.
  • the original AS security algorithm configuration cell indicates that the presence flag does not exist, the original AS security algorithm is still used for local configuration. After that, the UE uses the original AS security algorithm to re-establish the RRC connection. The message is sent to the eNB after encryption and integrity protection.
  • Step 202 The eNB uses the locally configured AS security algorithm to perform decryption and integrity verification on the completion of the RRC connection reestablishment, and determines whether to initiate the security confirmation according to the currently used AS security calculation.
  • the eNB's locally configured AS security algorithm is an updated AS security algorithm
  • the eNB initiates a security acknowledgment, and sends a security mode command (SMC, Security Mode Command) message to the UE using the updated AS security algorithm for integrity protection; After receiving the SMC message, the UE performs the SMC corresponding processing, and sends a Security Mode Complete message to the eNB. If the eNB locally configured AS security algorithm is not updated, the eNB does not need to initiate the security confirmation.
  • SMC Security Mode Command
  • the RRC connection reestablishment message carries the updated AN security algorithm, and is initiated immediately after the re-establishment is completed.
  • the SMC process performs a security check.
  • the invention protects the user plane encryption algorithm in the RRC link re-establishment from being tampered with, avoids the AS security algorithm exception, minimizes waste of bandwidth of the invalid data packet, improves the timeliness of abnormal recovery, and further Improved user experience before and after switching.
  • FIG. 3 is a schematic structural diagram of a system for implementing synchronization of an AS security algorithm according to the present invention. As shown in FIG. 3, an eNB and a UE are included, where
  • the eNB is configured to notify the UE whether to update the AS security algorithm during the RRC connection re-establishment process, and perform decryption and integrity verification on the completion of the RRC connection reestablishment by using the locally configured AS security algorithm, and according to the currently used AS security Calculate whether to initiate a security confirmation;
  • the UE is configured to perform encryption and integrity protection on the completion of the RRC connection reestablishment by using the corresponding AS security algorithm according to the notification.
  • 4 is a schematic flowchart of the first embodiment of the AS algorithm synchronization. In the first embodiment, after the eNB receives the RRC connection re-establishment request, it determines that the AS security algorithm does not need to be updated, as shown in FIG. The following steps:
  • Step 400 The UE sends an RRC connection re-establishment request message to the eNB.
  • Step 401 to step 402 After receiving the RRC connection re-establishment request message, the eNB determines that the AS security algorithm is not required to be updated, and configures the local AS security algorithm parameter locally.
  • the eNB determines that the AS security algorithm configured by the eNB supports the original AS security algorithm (including the integrity protection algorithm and the encryption algorithm) according to the configuration of the original AS security algorithm carried in the handover request message, and the eNB does not need to update the AS security algorithm.
  • the eNB uses the original AS security algorithm parameters to configure the local.
  • the eNB user plane configuration does not include the AS security algorithm parameters, that is, the original AS security algorithm is still used for configuration.
  • Step 403 Set the AS security algorithm configuration cell presence flag to be absent, and carry it in the RRC connection re-establishment message, and send the RRC connection re-establishment message to the UE.
  • Step 404 After receiving the RRC connection re-establishment message, the UE configures whether the cell existence flag is absent according to the AS security algorithm, that is, the AS security algorithm is not updated, and determines that the AS security algorithm does not need to be updated.
  • Step 405 to step 406 After the UE uses the original AS security algorithm to perform encryption and integrity protection on the RRC connection re-establishment complete message, the UE sends the message to the eNB.
  • the eNB uses the original AS security algorithm to perform the received RRC connection re-establishment completion message. Decryption and integrity check.
  • Step 407 The eNB determines that the SMC process does not need to be initiated.
  • FIG. 5 is a schematic flowchart of the second embodiment of the AS algorithm synchronization.
  • the eNB determines that the AS security algorithm needs to be updated, as shown in FIG. The following steps:
  • Step 500 The UE sends an RRC connection re-establishment request message to the eNB.
  • Step 501 to step 503 After receiving the RRC connection re-establishment request message, the eNB determines that the request is needed. To update the AS security algorithm, reselect the AS security algorithm and configure the local with the new AS security algorithm.
  • the eNB determines, according to the original AS security algorithm configuration carried in the handover request message, that the AS security algorithm configured by the eNB does not support the original AS security algorithm (including the integrity protection algorithm and the encryption algorithm), and the eNB configures according to the configuration.
  • the AS security algorithm carried in the AS security algorithm and the handover request message selects a AS security algorithm (including an integrity protection algorithm and an encryption algorithm) with the highest priority and supported by the UE as the selected new AS security algorithm (that is, the algorithm replacement is satisfied).
  • the selected AS security algorithm is saved locally, and is configured locally by using the new AS security algorithm configuration, where the newly selected AS security algorithm parameters are carried when configured for the eNB user plane.
  • Step 504 Set the AS security algorithm configuration cell presence flag to exist, and carry it in the RRC connection re-establishment message together with the algorithm configuration cell carrying the selected new AS security algorithm, and re-establish the RRC connection. The message is sent to the UE.
  • Step 505 After receiving the RRC connection re-establishment message, the UE configures the presence or absence of the cell according to the AS security algorithm carried in the UE, and configures the local security algorithm information of the algorithm configuration cell in the RRC connection re-establishment message to configure the local , and enable the new AS security algorithm carried in the message.
  • Step 506 to step 507 After the UE uses the original AS security algorithm to perform encryption and integrity protection on the RRC connection re-establishment complete message, the UE sends the message to the eNB.
  • the eNB uses the original AS security algorithm to perform the received RRC connection re-establishment completion message. Decryption and integrity check.
  • Step 508 Since the eNB updates the AS security algorithm, it is determined that the SMC process needs to be initiated.
  • Step 509 The eNB carries the current AS security algorithm information in the SMC message, and sends the SMC message to the UE.
  • Step 510 After receiving the SMC message, the UE performs corresponding processing on the SMC, and the specific step is performed.
  • the implementation belongs to the prior art and will not be described here.
  • Step 511 The UE sends a security mode complete message to the eNB, and the AS security algorithm is synchronized.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente invention se rapporte à un procédé et à un système permettant une synchronisation et une protection des algorithmes de sécurité de couche d'accès (AS). Ledit procédé comprend les étapes suivantes : pendant la procédure de rétablissement de la connexion de commande de ressources radio (RRC), le nœud B de réseau E-UTRAN (eNB) informe l'équipement utilisateur (UE) s'il faut, ou non, rafraîchir les algorithmes de sécurité de couche AS et, si les algorithmes de sécurité de couche AS doivent être rafraîchis, la cellule de configuration des algorithmes est transmise dans le message de rétablissement de la connexion de commande RRC pour transmettre les algorithmes de sécurité de couche AS; selon les informations, l'UE met en œuvre la protection d'intégrité et le cryptage dans le message de fin du rétablissement de la commande RRC en adoptant les algorithmes de sécurité de couche AS correspondants; selon les algorithmes de sécurité de couche AS configurés localement, le nœud eNB décrypte le message de fin du rétablissement de la commande RRC et vérifie son intégrité, et détermine s'il faut commencer la reconnaissance de sécurité selon les algorithmes de sécurité de couche AS à présent adoptés. Le procédé et le système divulgués dans la présente invention peuvent empêcher la falsification des algorithmes de sécurité de couche AS pendant la procédure de rétablissement de la connexion de commande RRC et éviter un gaspillage de la largeur de bande provoqué par les paquets de données d'interface radio invalides, et améliorer davantage l'expérience de l'utilisateur pendant la procédure de transfert intercellulaire.
PCT/CN2010/077955 2010-05-27 2010-10-21 Procédé et système permettant une synchronisation des algorithmes de sécurité de couche d'accès (as) WO2011147153A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2010101873647A CN102264064A (zh) 2010-05-27 2010-05-27 一种实现接入层安全算法同步的方法及系统
CN201010187364.7 2010-05-27

Publications (1)

Publication Number Publication Date
WO2011147153A1 true WO2011147153A1 (fr) 2011-12-01

Family

ID=45003242

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/077955 WO2011147153A1 (fr) 2010-05-27 2010-10-21 Procédé et système permettant une synchronisation des algorithmes de sécurité de couche d'accès (as)

Country Status (2)

Country Link
CN (1) CN102264064A (fr)
WO (1) WO2011147153A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102572816A (zh) * 2011-12-27 2012-07-11 电信科学技术研究院 一种移动切换的方法及装置

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015192264A1 (fr) * 2014-06-16 2015-12-23 Orange Procédé de contrôle de l'intégrité de données transmises via c-ran
WO2018227480A1 (fr) 2017-06-15 2018-12-20 Qualcomm Incorporated Rafraîchissement de clés de sécurité dans des systèmes sans fil 5g
CN117979378A (zh) 2017-09-30 2024-05-03 华为技术有限公司 一种安全保护的方法、装置和系统
CN114071459A (zh) 2017-10-31 2022-02-18 华为技术有限公司 一种rrc连接恢复方法及装置
CN110149630A (zh) * 2018-02-11 2019-08-20 华为技术有限公司 一种安全算法的协商、发送方法及装置
CN110831007B (zh) * 2018-08-10 2021-09-17 华为技术有限公司 用户面完整性保护方法、装置及设备

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009020789A2 (fr) * 2007-08-03 2009-02-12 Interdigital Patent Holdings, Inc. Procédure de sécurité et appareil pour transfert dans un système à évolution à long terme 3gpp
CN101552983A (zh) * 2008-04-01 2009-10-07 华为技术有限公司 密钥生成方法、密钥生成装置、移动管理实体与用户设备
CN101645877A (zh) * 2008-08-07 2010-02-10 华为技术有限公司 密钥衍生函数的协商方法、系统及网络节点

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009020789A2 (fr) * 2007-08-03 2009-02-12 Interdigital Patent Holdings, Inc. Procédure de sécurité et appareil pour transfert dans un système à évolution à long terme 3gpp
CN101552983A (zh) * 2008-04-01 2009-10-07 华为技术有限公司 密钥生成方法、密钥生成装置、移动管理实体与用户设备
CN101645877A (zh) * 2008-08-07 2010-02-10 华为技术有限公司 密钥衍生函数的协商方法、系统及网络节点

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"3GPP, 3GPP System Architecture Evolution (SAE); Security architecture (Release 9).", 3GPP TS 33.401 V9.3.1, 30 April 2010 (2010-04-30) *
ZTE CORPORATION ET AL.: "RRC Connection Re-establishment Algorithms.", 3GPP TSG-SA3 (SECURITY), S3-100019, SA3#58, 5 February 2010 (2010-02-05) *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102572816A (zh) * 2011-12-27 2012-07-11 电信科学技术研究院 一种移动切换的方法及装置
CN102572816B (zh) * 2011-12-27 2014-08-06 电信科学技术研究院 一种移动切换的方法及装置

Also Published As

Publication number Publication date
CN102264064A (zh) 2011-11-30

Similar Documents

Publication Publication Date Title
CN102137400B (zh) 一种rrc连接重建立时的安全处理方法和系统
US10375609B2 (en) Operation of a serving node in a network
EP3322252B1 (fr) Procédés de communication, dispositif côté réseau, et équipement utilisateur
WO2011147153A1 (fr) Procédé et système permettant une synchronisation des algorithmes de sécurité de couche d'accès (as)
US20170359719A1 (en) Key generation method, device, and system
EP2897398B1 (fr) Procédé et dispositif d'isolation de clé
JP6694824B2 (ja) ベアラの解放
WO2015113207A1 (fr) Procédé de changement de mot de passe de sécurité, station de base et équipement utilisateur
WO2011137805A1 (fr) Procédé, appareil et système permettant un traitement sécuritaire dans un processus de commutation
WO2011003299A1 (fr) Procédé de traitement de clé de sécurité, dispositif et système pour le rétablissement de la connexion de contrôle de ressources radio (rrc)
EP3965446B1 (fr) Procédé de communication et dispositif associé
WO2009127114A1 (fr) Procédé, dispositif et système de génération d’une clé cryptographique
WO2018133607A1 (fr) Procédé, dispositif et système de transmission de données
WO2014044070A1 (fr) Procédé et dispositif de rétablissement de connexion
WO2012171281A1 (fr) Procédé de modification de paramètre de sécurité, et station de base
US20220345296A1 (en) Managing Security Keys in a Communication System
WO2011147152A1 (fr) Procédé et système permettant de mettre en œuvre la synchronisation d'un algorithme de sécurité des couches d'accès
WO2014094663A1 (fr) Procédé et dispositif d'optimisation de cellules
CN101478752A (zh) 一种密钥更替方法、系统及设备
JP2011515904A (ja) ワイヤレス通信システムにおいてハンドオーバ、またはハンドオーバ実行中の鍵管理を実行するシステムおよび方法
WO2013075417A1 (fr) Procédé et système pour générer une clé durant un transfert intercellulaire
WO2011131063A1 (fr) Procédé et système d'établissement de clé d'interface radio améliorée
CN114557033A (zh) 用于处理无线资源控制非激活状态的系统和方法
WO2011147154A1 (fr) Procédé et système permettant de mettre en œuvre la synchronisation d'un algorithme de sécurité de couche d'accès
US20230413372A1 (en) Early data communication with preconfigured resources

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10852022

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 10852022

Country of ref document: EP

Kind code of ref document: A1