WO2013152685A1 - 无线链路的重建方法及装置 - Google Patents

无线链路的重建方法及装置 Download PDF

Info

Publication number
WO2013152685A1
WO2013152685A1 PCT/CN2013/073583 CN2013073583W WO2013152685A1 WO 2013152685 A1 WO2013152685 A1 WO 2013152685A1 CN 2013073583 W CN2013073583 W CN 2013073583W WO 2013152685 A1 WO2013152685 A1 WO 2013152685A1
Authority
WO
WIPO (PCT)
Prior art keywords
identifier
base station
security algorithm
cell
target base
Prior art date
Application number
PCT/CN2013/073583
Other languages
English (en)
French (fr)
Inventor
王达菲
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Priority to EP13775536.9A priority Critical patent/EP2838308A4/en
Priority to US14/394,285 priority patent/US9247465B2/en
Publication of WO2013152685A1 publication Critical patent/WO2013152685A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • H04W36/0033Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information
    • H04W36/0038Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information of security context information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/106Packet or message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0055Transmission or use of information for re-establishing the radio link
    • H04W36/0079Transmission or use of information for re-establishing the radio link in case of hand-off failure or rejection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/19Connection re-establishment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Definitions

  • the present invention relates to the field of communications, and in particular to a method and an apparatus for reconstructing a wireless link.
  • a user equipment User Equipment, UE for short
  • the UE needs to adopt a new security algorithm configuration, however,
  • the UE initiates a re-establishment request, and the security algorithm is rolled back to the old security algorithm (that is, the security algorithm used by the source eNB). Therefore, in the prior art, the UE is switched.
  • the source eNB needs to pass its security algorithm to the destination side e B for use in the scenario of reestablishing the wireless link.
  • the UE considers that the handover is successful.
  • the radio link control Radio Link Control, referred to as RLC
  • the UE also initiates a re-establishment request to the destination eNB.
  • the destination eNB does not receive the reconfiguration complete message, and the destination eNB considers that the handover is unsuccessful.
  • the security algorithm of the UE is updated to the old security algorithm.
  • the security algorithm adopted by the UE is already a new security algorithm, only because the reconfiguration is sent to the destination eNB. If the completion message fails, the UE sends a re-establishment request to the destination eNB, which is not a true UE handover failure. Therefore, the security algorithm rollback process performed by the destination eNB necessarily fails.
  • the security algorithm fallback process is erroneously performed during the radio link re-establishment process, thereby causing the failure of the radio link reestablishment, and the success rate of the radio link reestablishment is relatively low.
  • the present invention provides a method and an apparatus for reestablishing a wireless link, so as to at least solve the failure of the security algorithm to fall back during the wireless link re-establishment process in the related art, thereby causing the failure of the wireless link reestablishment, the wireless chain.
  • the success rate of road reconstruction is relatively low.
  • a method for reestablishing a radio link including: receiving, by a destination base station, a re-establishment request message sent by a UE, where the re-establishment request message carries a cell identifier and an identifier of the UE, a cell identifier, and The identifier of the UE carries the attribute information used to indicate the handover success of the UE or the handover failure.
  • the destination base station determines the security algorithm used by the target base station to re-establish the wireless link with the UE according to the attribute information, and establishes a wireless link by using a security algorithm.
  • the destination base station determines, according to the attribute information, a security algorithm used by the target base station to re-establish a radio link with the UE, and establishes a radio link by using the security algorithm, where: the cell identifier is an identifier of a cell corresponding to the source base station, and the identifier of the UE is a source base station.
  • the identifier is allocated to the UE, the UE fails to perform the handover, and the destination base station determines that the security algorithm is the security algorithm of the source base station corresponding to the UE, and establishes a radio link by using the security algorithm of the destination base station.
  • the destination base station determines, according to the attribute information, a security algorithm used by the target base station to re-establish a radio link with the UE, and establishes a radio link by using the security algorithm, where: the cell identifier is an identifier of the cell corresponding to the target base station, and the identifier of the UE is the destination base station.
  • the identifier is allocated to the UE, the handover of the UE is successful, and the target base station determines that the security algorithm is the security algorithm of the target base station, and establishes a wireless link by using the security algorithm of the source base station.
  • the re-establishment method further includes: when the handover of the UE is successful, the target base station receives a request for the cell corresponding to the target base station to allocate the cell identifier and allocates an identifier for the UE; the target base station allocates the cell identifier to the cell corresponding to the target base station, and is the UE. Assign an identifier, and send the cell identifier and the identity of the UE to
  • the cell identifier includes: a physical cell identifier (Cellular Cell Identifier, abbreviated as PCI), and the identifier of the UE includes: a Cell Radio Network Temporary Identifier (C-RNTI).
  • a method for reestablishing a radio link including: determining, by a UE, a handover result of a UE; and transmitting, by the UE, a re-establishment of a cell identifier carrying the handover result and an identifier of the UE to the target base station
  • the request where the cell identifier and the identifier of the UE are carried to indicate that the UE successfully switches or fails to switch
  • the attribute information, the cell identifier, and the identifier of the UE are used to indicate that the target base station determines, according to the attribute information, a security algorithm used by the target base station to re-establish a wireless link with the UE.
  • the UE sends a re-establishment request carrying the cell identifier and the identifier of the UE, which is used to indicate the handover result, and the identifier of the UE carries the attribute information, the cell identifier, and the UE, which are used to indicate that the handover succeeds or the handover fails.
  • the identifier is used to indicate that the target base station determines, according to the attribute information, the security algorithm used by the target base station to re-establish the radio link with the UE.
  • the UE sends a re-establishment request carrying the cell identifier and the identifier of the UE to the target base station when the handover is successful.
  • the cell identifier is an identifier of the cell corresponding to the target base station
  • the identifier of the UE is an identifier allocated by the target base station to the UE
  • the identifier of the cell identifier and the identifier of the UE are used to indicate that the target base station determines the security algorithm as the security algorithm of the target base station, and adopts The security algorithm of the destination base station establishes a radio link; when the UE fails to handover, the UE sends a re-establishment request carrying the cell identifier and the identifier of the UE to the target base station, where the cell identifier is the identifier of the cell corresponding to the source base station, and the UE
  • the identifier is an identifier allocated by the source base station to the UE, and the identifier of the cell and the identifier of the UE are used to indicate the destination.
  • the base station determines that security algorithm UE security algorithms corresponding to the source base station, using a secure algorithm and the source base station to establish a radio link.
  • the cell identifier includes: a physical cell identifier PCI, and the identifier of the UE includes: a cell radio network temporary identifier C-RNTIo.
  • a radio link reconstruction apparatus configured to receive a re-establishment request message sent by the user equipment UE, where the re-establishment request message carries the cell identifier and the identifier of the UE, where the identifier of the cell identifier and the identifier of the UE carry an attribute indicating that the handover succeeds or the handover fails.
  • a determining module configured to determine, according to the attribute information, a security algorithm used by the target base station to re-establish a wireless link with the UE, and establish a wireless link by using a security algorithm.
  • the determining module includes: a first determining unit, configured to: when the cell identifier is an identifier of the cell corresponding to the source base station, and the identifier of the UE is an identifier allocated by the source base station to the UE, the UE fails to switch, and determining that the security algorithm is the source corresponding to the UE
  • the security algorithm of the base station, and the security algorithm of the target base station is used to establish a wireless link.
  • the determining module includes: a second determining unit, configured to: when the cell identifier is the identifier of the cell corresponding to the target base station, and the identifier of the UE is the identifier allocated by the target base station for the UE, the UE successfully switches, and determines that the security algorithm is the security algorithm of the target base station. And using the security algorithm of the source base station to establish a wireless link.
  • a radio link reestablishing apparatus the apparatus being applicable to a UE, comprising: a determining module, configured to determine a handover result of the UE; and a sending module, configured to send the bearer to the target base station
  • a re-establishment request for indicating a cell identifier of the handover result and an identifier of the UE, where the cell identifier and the identifier of the UE carry attribute information indicating that the handover succeeds or the handover fails, the cell identifier and the identifier of the UE
  • the identification is used to indicate that the target base station determines, according to the attribute information, a security algorithm used by the target base station to re-establish a wireless link with the UE.
  • the sending module includes: a first sending unit, configured to: when the UE is successfully handed over, send a re-establishment request carrying the cell identifier and the identifier of the UE to the target base station, where the cell identifier is an identifier of the cell corresponding to the target base station, and the UE is The identifier is an identifier that is allocated to the UE by the target base station, and the identifier of the UE and the identifier of the UE are used to indicate that the target base station determines the security algorithm as the security algorithm of the target base station, and establish a wireless link by using the security algorithm of the target base station;
  • the method is configured to send, to the target base station, a re-establishment request carrying the identifier of the cell and the identifier of the UE, where the cell identifier is an identifier of the cell corresponding to the source base station, and the identifier of the UE is an identifier allocated by the source base station to the UE.
  • the cell identifier and the identifier of the UE are used to indicate that the target base station determines that the security algorithm is a security algorithm of the source base station corresponding to the UE, and establish a radio link by using the security algorithm of the source base station.
  • the target base station receives the re-establishment request message sent by the UE, where the re-establishment request message carries the cell identifier and the identifier of the UE, and the cell identifier and the identifier of the UE are carried.
  • the attribute information is used to indicate that the UE is successfully handed over or the handover fails.
  • the target base station may determine whether the UE successfully performs handover according to the attribute information of the cell identifier, and further determine a security algorithm used by the target base station and the UE to re-establish the wireless link, and use the security algorithm.
  • the security algorithm establishes a wireless link, which avoids the failure of the security algorithm fallback process in the related art, and cannot determine the failure of the wireless link reconstruction caused by the security algorithm used to re-establish the wireless link, so that the target base station can be accurate.
  • the security algorithm used to re-establish the wireless link is determined to improve the success rate of wireless link reconstruction.
  • FIG. 1 is a flowchart of a method for reconstructing a wireless link according to an embodiment of the present invention
  • FIG. 2 is a flowchart of another method for reconstructing a wireless link according to an embodiment of the present invention
  • FIG. 4 is a flowchart of a second example of a method for reconstructing a wireless link according to an embodiment of the present invention
  • FIG. 5 is an application according to an embodiment of the present invention
  • FIG. 6 is a structural block diagram of a determining module of a wireless link of a base station
  • FIG. 6 is a structural block diagram of a determining module according to an embodiment of the present invention
  • 7 is a structural block diagram of another apparatus for reconstructing a radio link suitable for a base station according to an embodiment of the present invention
  • FIG. 8 is a structural block diagram of a reconstruction apparatus for a radio link applied to a UE according to an embodiment of the present invention
  • FIG. 9 is a structural block diagram of a transmitting module according to an embodiment of the present invention.
  • FIG. 1 is a flowchart of a method for reconstructing a wireless link according to an embodiment of the present invention. As shown in FIG. 1, the method for reconstructing a wireless link includes Step S102 to step S104.
  • Step S102 The target base station receives the re-establishment request message sent by the UE, where the re-establishment request message carries the cell identifier and the identifier of the UE, and the identifier of the cell identifier and the identifier of the UE carries the attribute information used to indicate that the handover succeeds or the handover fails.
  • Step S104 The target base station determines, according to the attribute information, a security algorithm used by the target base station to re-establish a wireless link with the UE, and establishes a wireless link by using a security algorithm.
  • the target base station receives the re-establishment request message sent by the UE, where the re-establishment request message carries the cell identifier and the identifier of the UE, and the cell identifier and the identifier of the UE carry
  • the destination base station may determine, according to the attribute information of the cell identifier, whether the UE successfully performs handover, and may determine a security algorithm used by the target base station to re-establish a wireless link with the UE, and use the attribute information.
  • the security algorithm establishes a wireless link, avoids the failure of the security algorithm fallback process in the related art, and cannot determine the failure of the wireless link reconstruction caused by the security algorithm used to re-establish the wireless link, so that the target base station can accurately
  • the security algorithm used to re-establish the wireless link is determined, and the success rate of the wireless link reconstruction is improved.
  • a preferred method is determined according to the attribute information.
  • the cell identifier carried in the received re-establishment request message is the identifier of the cell corresponding to the source base station, and the method is used to establish a radio link by using the security algorithm.
  • the identifier of the UE is an identifier allocated by the source base station to the UE, that is, the UE fails to switch,
  • the base station determines that the security algorithm is a security algorithm of the source base station corresponding to the UE, and establishes a wireless link by using the security algorithm of the target base station.
  • the target base station is required.
  • the UE may be determined to be inconsistent in the handover of the UE according to the attributes of the cell identifier, and the UE may be inconsistent with the UE that the UE considers to be successful in the handover scenario.
  • the problem that the security algorithm rollback process fails and the destination base station can determine the security algorithm used to re-establish the wireless link as the security algorithm of the source base station, and use the security algorithm of the source base station to establish a wireless link, thereby improving the
  • the target base station determines whether the UE successfully performs the handover success, and further improves the accuracy of the security algorithm used by the target base station and the UE to re-establish the wireless link according to the cell identifier and the identifier of the UE.
  • another preferred security algorithm for determining the re-establishment of the radio link between the target base station and the UE according to the attribute information is provided, and A method for establishing a radio link by using a security algorithm, for example, when the cell identifier carried in the received re-establishment request message is an identifier of a cell corresponding to the target base station, and the identifier of the UE is an identifier allocated by the target base station to the UE, that is, the UE After the handover is successful, the target base station determines that the security algorithm is a security algorithm of the target base station, and uses the security algorithm of the source base station to establish a wireless link.
  • the cell identifier carried in the received re-establishment request message and the attribute information of the identifier of the UE indicate that the handover of the UE is successful, that is, when the security algorithm is not required to be rolled back, even if the reconfiguration complete message is sent.
  • the destination base station can still determine that the UE handover succeeds according to the cell identifier and the attribute information of the identifier of the UE, and does not need to perform the security algorithm rollback, thereby avoiding the UE in a true sense.
  • the UE and the destination eNB In the case of a handover failure (the UE is successfully switched, the radio link is set up due to other reasons, and the radio link needs to be re-established), and the UE and the destination eNB consider that the UE has a successful handover result, causing the security algorithm to roll back.
  • the problem of the process failure, and the destination base station can still determine the security algorithm used to re-establish the wireless link as the security algorithm of the target base station, and use the security algorithm of the target base station to establish a wireless link, avoiding the related technology in the UE and If the target eNB considers that the UE has a successful handover result, the result is inconsistent.
  • the method for reestablishing the radio link further includes: receiving, by the target base station, a re-establishment request sent by the user equipment UE Before the message is successfully obtained, when the UE is successfully handed over, the target base station receives the request for the cell corresponding to the target base station to allocate the cell identity and allocates the identifier for the UE; the target base station allocates the cell identity to the cell corresponding to the target base station, and allocates the identifier to the UE. And sending the cell identifier and the identifier of the UE to the UE.
  • the target base station when the handover of the UE is successful, allocates a cell identifier to the cell corresponding to the target base station, and allocates an identifier to the UE, and sends the allocated cell identifier and the identifier of the UE to the UE, so that the UE can
  • the allocated cell identifier and the identifier of the UE are carried in the re-establishment request message, and the destination base station can still determine the UE handover according to the cell identifier and the identifier of the UE, even if the re-establishment request message is sent in the scenario that the re-configuration complete message fails to be sent.
  • the security algorithm used to re-establish the wireless link is determined as the security algorithm of the target base station, and the security algorithm of the destination base station is used to establish the wireless link.
  • the cell identifier in each of the foregoing preferred embodiments may be, but is not limited to, including: a physical cell identifier
  • the identifier of the UE may include, but is not limited to, a C-RNTI.
  • the target base station allocates a physical cell identifier to the cell corresponding to the target base station, and the target base station allocates a temporary radio network identifier to the UE.
  • the source base station allocates a physical cell identifier to the cell corresponding to the source base station, and the source base station allocates a temporary identifier of the cell radio network to the UE, and determines whether the UE successfully switches according to the cell identifier and the attribute information of the identifier of the UE, and further determines Whether a security algorithm needs to be rolled back.
  • FIG. 2 is a flowchart of another method for reconstructing a wireless link according to an embodiment of the present invention.
  • the method for reconstructing the wireless link is shown in FIG. Steps S202 to S204 are included.
  • Step S202 The UE determines a handover result of the UE.
  • Step S204 The UE sends, to the target base station, a re-establishment request carrying a cell identifier for indicating a handover result and an identifier of the UE, where the identifier of the cell and the identifier of the UE carry attribute information indicating that the handover succeeds or the handover fails, and the cell identifier is used.
  • the identifier of the UE is used to indicate that the target base station determines, according to the attribute information, a security algorithm used by the target base station to re-establish a wireless link with the UE.
  • the UE first determines whether the UE is successfully handed over, and uses the cell identifier and the attribute information of the identifier of the UE to indicate the determined handover result.
  • the cell identifier and the identifier of the UE are carried in the The re-establishment request is used to indicate that the target base station determines whether the UE successfully performs the handover according to the cell identifier and the identifier of the UE, and avoids whether the UE and the destination-side eNB consider that the UE successfully switches in the scenario that the UE does not switch in the true sense.
  • the result of the inconsistency leads to the failure of the security algorithm rollback process, and the security algorithm used by the target base station and the UE to re-establish the wireless link is determined, which avoids the failure of the security algorithm rollback process in the related art, and cannot determine to re-establish the wireless.
  • the security algorithm used by the link The problem that the wireless link reestablishment fails, so that the target base station can accurately determine the security algorithm used to re-establish the wireless link, and improve the success rate of the wireless link reconstruction.
  • a preferred The UE sends a re-establishment request carrying the cell identifier and the identifier of the UE, which is used to indicate the handover result, and the identifier of the UE carries the attribute information, the cell identifier, and the UE, which are used to indicate that the handover succeeds or the handover fails.
  • the identifier is used to indicate that the target base station determines, according to the attribute information, the security algorithm used by the target base station to re-establish the wireless link with the UE. For example, when the UE handover succeeds, the UE sends the identifier of the cell identifier and the UE to the target base station. Re-establishing a request, where the cell identifier is an identifier of a cell corresponding to the target base station, and the identifier of the UE is an identifier allocated by the target base station to the UE, and the identifier of the cell identifier and the identifier of the UE are used to indicate that the target base station determines that the security algorithm is the security of the target base station.
  • the UE Upon failure, the UE sends a re-establishment request carrying the cell identifier and the identifier of the UE to the target base station, where the cell identifier is the identifier of the cell corresponding to the source base station, and the identifier of the UE is the identifier allocated by the source base station for the UE, the cell identifier and The identifier of the UE is used to indicate that the target base station determines that the security algorithm is a security algorithm of the source base station corresponding to the UE, and establish a radio link by using the security algorithm of the source base station.
  • the cell identifier including the information indicating that the UE is successfully handed over and the identifier of the UE are carried in the re-establishment request and sent to the target base station. Even if the re-establishment request message is sent, the destination base station can still determine that the UE handover is successful according to the cell identifier and the identifier of the UE, and does not need to perform the security algorithm rollback, thereby determining to re-establish the wireless chain.
  • the security algorithm used by the path is the security algorithm of the target base station, and the security algorithm of the destination base station is used to establish a radio link.
  • the target base station can be based on the cell identifier and The identity of the UE determines that the UE handover is not successful, and needs to perform a security algorithm rollback, and then determines that the security algorithm used to re-establish the wireless link is the security algorithm of the source base station, and uses the security algorithm of the source base station to establish a wireless link.
  • the cell identifier in each of the foregoing preferred embodiments may include, but is not limited to, a physical cell identifier PCI, where the identifier of the UE may include, but is not limited to, a cell radio network temporary identifier C-RNTI, for example, when the UE handover succeeds, the UE
  • the target base station is configured to allocate a physical cell identifier to the cell corresponding to the target base station, and the target base station allocates a temporary identifier of the cell radio network to the UE; when the UE fails to switch, the UE obtains the source base station to allocate a physical cell identifier to the cell corresponding to the source base station, and The source base station allocates a temporary identifier of the cell radio network to the UE, and will be small
  • the area identifier and the identifier of the UE are sent to the destination base station in the re-establishment request message, so that the destination base station can determine whether the UE successfully switches according to the cell identifier and the
  • the method for reconstructing a wireless link includes steps S302 to S318.
  • Step S302 The source e B sends a handover request message to the destination e B, where the handover request message carries the security algorithm of the active eNB.
  • Step S304 After receiving the handover request message, the target eNB saves the security algorithm of the source eNB, and sends a handover request response message to the source eNB.
  • Step S306 The source eNB sends a handover command to the UE, and notifies the UE to switch to the target eNB.
  • Step S308 The UE initiates a random access procedure to the target eNB.
  • Step S310 After receiving the Msg2 (process message 2), the UE considers that the UE is successfully handed over, and sends a reconfiguration complete message to the target eNB.
  • Step S312 The reconfiguration complete message cannot receive the acknowledgement of the RLC layer of the target eNB side due to the quality problem of the radio link, and finally causes the radio link establishment failure, and the UE sends a re-establishment request message to the target eNB, and the re-establishment
  • the C-RNTI carried in the request message is allocated by the target base station to the UE, and the PCI is the identifier of the cell corresponding to the target base station.
  • Step S314 After receiving the re-establishment request message, the target eNB determines the re-establishment request message.
  • the C-RNTI is allocated to the UE by the target base station, and the PCI is the identifier of the cell corresponding to the target base station, and the security algorithm of the target eNB is continuously used.
  • Step S316 Since the UE considers that the handover is successful, the re-establishment request message sent by the UE is processed by a new security algorithm, and subsequent messages are also processed by a new security algorithm.
  • Step S318 The security algorithm adopted by the target eNB is a new security algorithm. Therefore, the target base station uses the security algorithm to process the received re-establishment request message and subsequent messages.
  • the target base station may still determine the UE according to the cell identifier. If the handover succeeds, the security algorithm is not required to be rolled back, and the security algorithm used to re-establish the wireless link is determined as the security algorithm of the target base station, and the security algorithm of the target base station is used to establish a wireless link, which avoids the related art.
  • Example 2 In this example, a scenario in which the radio link is reestablished when the UE fails to switch is taken as an example. As shown in FIG. 4, the method for reestablishing the radio link includes steps S402 to S416. Step S402: The source eNB sends a handover request message to the destination eNB, where the handover request message carries a security algorithm of the active eNB. Step S404: After receiving the handover request message, the target eNB saves the security algorithm of the source eNB, and sends a handover request response message to the source eNB.
  • Step S406 The source eNB sends a handover command to the UE, and notifies the UE to switch to the target eNB.
  • Step S408 The UE initiates a random access procedure to the destination NB.
  • Step S410 After the timer expires, the UE does not receive the Msg2, and the UE considers that the handover fails, and sends a re-establishment request message to the target eNB.
  • the C-RNTI carried in the re-establishment request message is allocated by the source base station to the UE.
  • the PCI is an identifier of a cell corresponding to the source base station.
  • Step S412 After receiving the re-establishment request message, the target eNB determines that the C-RNTI carried in the re-establishment request message is allocated by the source base station to the UE, and the PCI is the identifier of the cell corresponding to the source base station, and the security algorithm is rolled back. A security algorithm for the source eNB.
  • Step S414 Since the UE considers that the handover has failed, the re-establishment request message sent by the UE is processed by the old security algorithm, and subsequent messages are also processed by the old security algorithm.
  • Step S416 The security algorithm adopted by the target eNB is the old security algorithm after the rollback.
  • the target eNB processes the received re-establishment request message and subsequent messages by using the security algorithm.
  • the target base station may determine that the UE handover is not successful according to the cell identifier, and the security algorithm needs to be rolled back, thereby determining to rebuild.
  • the security algorithm used by the radio link is a security algorithm of the source base station, and the radio link is established by using the security algorithm of the source base station.
  • Embodiment 2 This embodiment provides a radio link reconstruction apparatus
  • FIG. 5 is A structural block diagram of a reestablishing apparatus for a radio link applied to a base station according to an embodiment of the present invention.
  • the apparatus is applicable to a destination base station.
  • the reestablishing apparatus of the radio link includes: a receiving module 502 and The determination module 504, the above structure will be described in detail below.
  • the receiving module 502 is configured to receive a re-establishment request message sent by the user equipment UE, where the re-establishment request message carries a cell identifier and an identifier of the UE, where the identifier of the cell identifier and the identifier of the UE carry an attribute indicating that the handover succeeds or the handover fails.
  • the determining module 504 is connected to the receiving module 502, and is configured to determine, according to the attribute information, a security algorithm used by the target base station to re-establish a wireless link with the UE, and establish a wireless link by using a security algorithm.
  • the receiving module 502 receives the re-establishment request message sent by the UE, where the re-establishment request message carries the cell identifier and the identifier of the UE, and the cell identifier and the UE
  • the identifier carries the attribute information for indicating the handover success or the handover failure of the UE
  • the determining module 504 may determine, according to the cell identifier and the attribute information of the identifier of the UE, whether the handover is successful, and further determine that the target base station and the UE re-establish the wireless link.
  • the security algorithm is adopted, and the security algorithm is used to establish a wireless link, which avoids the failure of the security algorithm fallback process in the related art, and cannot determine the wireless link reestablishment failure caused by the security algorithm used to re-establish the wireless link.
  • the problem is that the destination base station can accurately determine the security algorithm used to re-establish the wireless link, and improve the success rate of the wireless link reconstruction.
  • the security algorithm used by the target base station and the UE to re-establish the wireless link according to the cell identifier and the identifier of the UE, and to meet the applicable requirements of different scenarios, in the preferred embodiment, as shown in FIG.
  • the module 504 includes: a first determining unit 5042, a second determining unit 5044, and the above structure is described in detail below.
  • the first determining unit 5042 is configured to: when the cell identifier is the identifier of the cell corresponding to the source base station, and the identifier of the UE is the identifier allocated by the source base station to the UE, the UE fails to switch, and the security algorithm is determined to be the source base station corresponding to the UE. An algorithm is used to establish a wireless link using the security algorithm of the destination base station.
  • the second determining unit 5044 is configured to: when the cell identifier is the identifier of the cell corresponding to the target base station, and the identifier of the UE is the identifier allocated by the target base station for the UE, the UE successfully performs handover, determines that the security algorithm is the security algorithm of the target base station, and adopts a security algorithm.
  • the security algorithm of the source base station establishes a wireless link.
  • the first determining unit 5042 can still use the cell according to the scenario when the re-establishment request message is sent in the scenario that the reconfiguration complete message fails to be sent.
  • the identifier and the identifier of the UE determine that the handover of the UE is successful, and the security algorithm is not required to be rolled back. In the scenario that the handover of the UE is not true, the UE and the destination eNB consider that the handover success of the UE is inconsistent.
  • the security algorithm fails to establish a wireless link, and the security algorithm used to re-establish the wireless link is a security algorithm of the target base station, and the security algorithm of the target base station is used to establish a wireless link.
  • the second determining unit 5044 may determine that the UE handover is not successful according to the cell identifier and the identifier of the UE, and the security algorithm needs to be rolled back, thereby determining that the security algorithm used to re-establish the wireless link is the a security algorithm of the source base station, and using the security algorithm of the source base station to establish a wireless link Therefore, the accuracy of the target base station to determine whether the handover is successful is improved, and the accuracy of the security algorithm used by the target base station to re-establish the wireless link between the target base station and the UE is determined according to the identifier of the cell and the identifier of the UE.
  • the apparatus for reestablishing the wireless link applied to the base station further includes: a first receiving module 506, The allocation module 508, the above structure will be described in detail below.
  • the first receiving module 506 is configured to: before the target base station receives the re-establishment request message sent by the user equipment UE, when the UE handover succeeds, receive a request that the UE sends a cell identifier corresponding to the cell corresponding to the target base station and allocates an identifier for the UE;
  • the allocating module 508 is connected to the first receiving module 506, and is configured to allocate a cell identifier to the cell corresponding to the target base station, and allocate an identifier to the UE, and send the cell identifier and the identifier of the UE to the UE.
  • the allocating module 508 allocates a cell identifier to the cell corresponding to the target base station, and allocates an identifier to the UE, and sends the allocated cell identifier and the identifier of the UE to the UE, so that the UE can
  • the target cell identifier and the identifier of the UE are carried in the re-establishment request message, and the destination base station can still determine that the UE handover succeeds according to the cell identity, even if the re-establishment request message is sent in the scenario that the re-configuration complete message fails to be sent,
  • the security algorithm needs to be rolled back, and then the security algorithm used to re-establish the wireless link is determined as the security algorithm of the target base station, and the security algorithm of the destination base station is used to establish a wireless link.
  • the cell identifier in each of the foregoing preferred embodiments may include, but is not limited to, a physical cell identifier PCI, where the identifier of the UE may include, but is not limited to: a cell radio network temporary identifier C-RNTI, for example, when the UE handover succeeds, the target base station Assigning a physical cell identifier to the cell corresponding to the target base station, and the target base station allocates a temporary identifier of the cell radio network to the UE; when the UE fails to switch, the source base station allocates a physical cell identifier to the cell corresponding to the source base station, and the source base station allocates the UE to the UE.
  • a physical cell identifier PCI a physical cell identifier PCI
  • the identifier of the UE may include, but is not limited to: a cell radio network temporary identifier C-RNTI, for example, when the UE handover succeeds, the target base station Assigning a physical cell identifier to the
  • the cell radio network temporary identifier is used to determine whether the UE successfully switches according to the cell identifier and the attribute information of the identifier of the UE, and further determines whether the security algorithm needs to be rolled back.
  • the embodiment provides a reconstruction apparatus of another wireless link
  • FIG. 8 is a structural block diagram of a reconstruction apparatus of a wireless link applied to the UE according to an embodiment of the present invention.
  • the apparatus is applied to the UE, as shown in the figure.
  • the reconstruction apparatus of the wireless link includes: a determining module 802 and a transmitting module 804.
  • the above structure is described in detail below.
  • the determining module 802 is configured to determine a handover result of the UE.
  • the sending module 804 is connected to the determining module 802, and is configured to send, to the target base station, a re-establishment request carrying a cell identifier for indicating a handover result and an identifier of the UE, where the cell identifier
  • the identifier of the UE and the identifier of the UE are used to indicate that the handover success of the UE or the handover fails.
  • the identifier of the UE and the identifier of the UE are used to indicate that the target base station determines, according to the attribute information, a security algorithm used by the target base station to re-establish a wireless link with the UE.
  • the determining module 802 first determines whether the UE successfully switches, and uses the cell identifier and
  • the attribute information of the identifier of the UE is used to indicate the determined handover result.
  • the sending module 804 sends the re-establishment request to the target base station
  • the cell identifier and the identifier of the UE are carried in the re-establishment request to indicate that the target base station according to the cell identifier and
  • the identifier of the UE determines whether the UE successfully performs the handover, and avoids the problem that the UE fails to perform the handover success of the UE that is considered to be in the true sense of the handover failure of the UE.
  • the foregoing sending module 804 includes: a first transmitting unit 8042 and a second transmitting unit 8044.
  • the foregoing structure is described in detail below.
  • the first sending unit 8042 is configured to: when the UE is successfully handed over, send a re-establishment request carrying the cell identifier and the identifier of the UE to the target base station, where the cell identifier is the identifier of the cell corresponding to the target base station, and the identifier of the UE is the destination.
  • the identifier assigned by the base station to the UE, the identifier of the cell and the identifier of the UE are used to indicate that the target base station determines the security algorithm as the security algorithm of the target base station, and establish a radio link by using the security algorithm of the destination base station; the second sending unit 8044 is set to When the UE fails to switch, the UE sends a re-establishment request carrying the cell identifier and the identifier of the UE to the target base station, where the cell identifier is an identifier of the cell corresponding to the source base station, and the identifier of the UE is an identifier allocated by the source base station to the UE, and the cell
  • the identifier and the identifier of the UE are used to indicate that the target base station determines that the security algorithm is a security algorithm of the source base station corresponding to the UE, and establish a radio link by using the security algorithm of the source base station.
  • the first sending unit 8042 when the handover of the UE is successful, that is, when the security algorithm is not required to be rolled back, the first sending unit 8042 carries the cell identifier including the information indicating that the handover of the UE is successful, and the identifier of the UE in the re-establishment request. Sending to the destination base station, even if the re-establishment request message is sent, the destination base station can still determine that the UE handover is successful according to the cell identifier and the identifier of the UE, and does not need to perform the security algorithm rollback.
  • the security algorithm used to re-establish the wireless link is a security algorithm of the target base station, and the security algorithm of the destination base station is used to establish a wireless link; when the UE handover is not successful, that is, when the security algorithm needs to be rolled back, the second The sending unit 8044 carries the cell identifier including the information indicating that the UE is not successfully switched, and the identifier of the UE, in the re-establishment request, to the target base station, so that the target base station can determine that the UE handover is unsuccessful according to the cell identifier and the identifier of the UE.
  • the whole algorithm is a security algorithm of the source base station, and uses the security algorithm of the source base station to establish a radio link, thereby improving the accuracy of determining whether the UE successfully performs handover by the target base station, and further improving the target base station according to the cell identifier and the identifier of the UE.
  • the cell identifier in each of the foregoing preferred embodiments may be, but is not limited to, including: a physical cell identifier
  • the identifier of the UE may include, but is not limited to: a cell radio network temporary identifier C-RNTI.
  • C-RNTI cell radio network temporary identifier
  • the wireless network temporary identifier when the UE fails to switch, the UE obtains the source base station to allocate a physical cell identifier to the cell corresponding to the source base station, and the source base station allocates a temporary identifier of the cell radio network to the UE, and carries the cell identifier and the identifier of the UE in the weight
  • the establishment request message is sent to the destination base station, so that the destination base station can determine whether the UE successfully switches according to the cell identifier and the attribute information of the identifier of the UE, and further determines whether the security algorithm needs to be rolled back.
  • modules or steps of the present invention can be implemented by a general-purpose computing device, which can be concentrated on a single computing device or distributed over a network composed of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device, such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein.
  • the steps shown or described are performed, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps are fabricated as a single integrated circuit module.
  • the invention is not limited to any specific combination of hardware and software.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明提供了无线链路的重建方法及装置,其中,该方法包括:目的基站接收用户设备(UE)发送的重建立请求消息,其中,重建立请求消息携带有小区标识和UE的标识,小区标识和UE的标识携带有用于指示UE切换成功或切换失败的属性信息(S102);目的基站根据属性信息确定该目的基站与UE重新建立无线链路所采用的安全算法,并使用该安全算法建立无线链路(S104)。本发明解决了相关技术中的由于安全算法回退流程的失败而导致的无线链路重建失败的问题,从而提高了无线链路重建的成功率。

Description

无线链路的重建方法及装置 技术领域 本发明涉及通信领域, 具体而言, 涉及无线链路的重建方法及装置。 背景技术 在切换用户设备 (User Equipment, 简称为 UE) 的时候, 在 UE切换到目的侧演 进基站(E-UTRAN Node B, 简称为 e B)后, UE需要采用新的安全算法配置, 但是, 对于 UE切换失败的场景, UE会发起重建立请求, 且将安全算法回退为旧的安全算法 (即源测 eNB用的安全算法), 因此,在现有技术中提到,在 UE切换的时候源测 eNB 需要将其安全算法传递给目的侧 e B, 以供重建立无线链路的场景下使用。 但是, 在现有技术中只提到将源测 eNB的安全算法传递给目的侧 e B, 并将其用 于潜在的重建立无线链路的场景中, 并没有区分重建立无线链路的具体场景, 然而, 有多种重建立无线链路的场景, 有些重建立无线链路的场景并不是因为 UE切换失败 而导致的, 如果在此场景下, 将 UE的安全算法回退为旧的安全算法, 就会出现回退 流程失败的问题。 例如, 在非竞争切换的场景下, UE 收到 Msg2 (随机接入的第二条消息), 此时
UE就认为切换成功了, 但是, 由于无线链路的质量问题, 在将重配完成消息向目的侧 eNB发送的时候, 在 UE用户面的无线链路控制 (Radio Link Control, 简称为 RLC) 层超出了最大重传次数, 此时, UE也会向目的侧 eNB发起重建立请求, 按现有技术, 由于目的侧 eNB未收到重配完成消息, 目的侧 eNB认为切换没有成功, 此时若收到 了重建立请求就会将 UE的安全算法更新为旧的安全算法, 但是, 由于此时 UE认为 切换成功, UE采用的安全算法已经是新的安全算法, 只是由于向目的侧 eNB发送重 配完成消息失败, UE向目的侧 eNB发送重建立请求, 并不是真正意义上的 UE切换 失败, 因此, 目的侧 eNB进行的安全算法回退流程必然会失败。 在相关技术中, 由于在无线链路重建过程中错误进行安全算法回退流程, 从而导 致了无线链路重建的失败, 无线链路重建的成功率比较低的问题。 发明内容 本发明提供了无线链路的重建方法及装置, 以至少解决相关技术中的由于在无线 链路重建过程中错误进行安全算法回退流程, 从而导致了无线链路重建的失败, 无线 链路重建的成功率比较低的问题。 根据本发明的一个方面, 提供了一种无线链路的重建方法, 其包括: 目的基站接 收 UE发送的重建立请求消息, 其中, 重建立请求消息携带有小区标识和 UE的标识, 小区标识和 UE的标识携带有用于指示 UE切换成功或切换失败的属性信息; 目的基 站根据属性信息确定该目的基站与 UE重新建立无线链路所采用的安全算法, 并使用 安全算法建立无线链路。 目的基站根据属性信息确定该目的基站与 UE重新建立无线链路所采用的安全算 法, 并使用安全算法建立无线链路包括: 小区标识为源基站对应的小区的标识, 且 UE 的标识是源基站为 UE分配的标识时, UE切换失败, 目的基站确定安全算法为该 UE 对应的源基站的安全算法, 并采用该目的基站的安全算法建立无线链路。 目的基站根据属性信息确定该目的基站与 UE重新建立无线链路所采用的安全算 法, 并使用安全算法建立无线链路包括: 小区标识为目的基站对应的小区的标识, 且 UE的标识是目的基站为 UE分配的标识时, UE切换成功, 目的基站确定安全算法为 目的基站的安全算法, 并采用该源基站的安全算法建立无线链路。 在目的基站接收用户设备 UE发送的重建立请求消息, 其中, 重建立请求消息携 带有小区标识和 UE的标识,小区标识和 UE的标识用于指示 UE切换成功或切换失败 之前, 上述无线链路的重建方法还包括: 在 UE切换成功时, 目的基站接收 UE发送 的为目的基站对应的小区分配小区标识和为 UE分配标识的请求; 目的基站为目的基 站对应的小区分配小区标识, 且为 UE分配标识, 并将小区标识和 UE的标识发送给
小区标识包括: 物理小区标识 (Physical Cell Identifier , 简称为 PCI), UE的标 识包括: 小区无线网络临时标识 (Cell Radio Network Temporary Identifier, 简称为 C-RNTI)。 根据本发明的另一方面, 提供了一种无线链路的重建方法, 其包括: UE确定 UE 的切换结果; UE向目的基站发送携带有用于指示切换结果的小区标识和 UE的标识的 重建立请求, 其中, 小区标识和 UE的标识携带有用于指示 UE切换成功或切换失败 的属性信息, 小区标识和 UE的标识用于指示目的基站根据属性信息确定该目的基站 与 UE重新建立无线链路所采用的安全算法。
UE向目的基站发送携带有用于指示切换结果的小区标识和 UE的标识的重建立请 求, 其中, 小区标识和 UE的标识携带有用于指示 UE切换成功或切换失败的属性信 息, 小区标识和 UE的标识用于指示目的基站根据属性信息确定该目的基站与 UE重 新建立无线链路所采用的安全算法包括: UE切换成功时, UE向目的基站发送携带有 小区标识和 UE的标识的重建立请求, 其中, 小区标识为目的基站对应的小区的标识, 且 UE的标识是目的基站为 UE分配的标识,小区标识和 UE的标识用于指示目的基站 确定安全算法为该目的基站的安全算法,并采用该目的基站的安全算法建立无线链路; UE切换失败时, UE向目的基站发送携带有小区标识和 UE的标识的重建立请求, 其 中, 小区标识为源基站对应的小区的标识, 且 UE的标识是源基站为 UE分配的标识, 小区标识和 UE的标识用于指示目的基站确定安全算法为该 UE对应的源基站的安全 算法, 并采用该源基站的安全算法建立无线链路。 小区标识包括: 物理小区标识 PCI, UE 的标识包括: 小区无线网络临时标识 C-RNTIo 根据本发明的又一方面,提供了一种无线链路的重建装置, 该装置适用于基站上, 其包括: 接收模块, 设置为接收用户设备 UE发送的重建立请求消息, 其中, 重建立 请求消息携带有小区标识和 UE的标识,小区标识和 UE的标识携带有用于指示 UE切 换成功或切换失败的属性信息;确定模块,设置为根据属性信息确定该目的基站与 UE 重新建立无线链路所采用的安全算法, 并使用安全算法建立无线链路。 确定模块包括: 第一确定单元, 设置为在小区标识为源基站对应的小区的标识, 且 UE的标识是源基站为 UE分配的标识时, UE切换失败, 确定安全算法为该 UE对 应的源基站的安全算法, 并采用该目的基站的安全算法建立无线链路。 确定模块包括: 第二确定单元, 设置为在小区标识为目的基站对应的小区的标识, 且 UE的标识是目的基站为 UE分配的标识时, UE切换成功, 确定安全算法为目的基 站的安全算法, 并采用该源基站的安全算法建立无线链路。 根据本发明的又一方面, 提供了一种无线链路的重建装置, 该装置适用于 UE上, 其包括: 确定模块, 设置为确定 UE的切换结果; 发送模块, 设置为向目的基站发送 携带有用于指示切换结果的小区标识和 UE的标识的重建立请求, 其中, 小区标识和 UE的标识携带有用于指示 UE切换成功或切换失败的属性信息, 小区标识和 UE的标 识用于指示目的基站根据属性信息确定该目的基站与 UE重新建立无线链路所采用的 安全算法。 发送模块包括: 第一发送单元, 设置为在 UE切换成功时, 向目的基站发送携带 有小区标识和 UE的标识的重建立请求, 其中, 小区标识为目的基站对应的小区的标 识, 且 UE的标识是目的基站为 UE分配的标识, 小区标识和 UE的标识用于指示目的 基站确定安全算法为该目的基站的安全算法, 并采用该目的基站的安全算法建立无线 链路; 第二发送单元, 设置为在 UE切换失败时, 向目的基站发送携带有小区标识和 UE的标识的重建立请求, 其中, 小区标识为源基站对应的小区的标识, 且 UE的标识 是源基站为 UE分配的标识, 小区标识和 UE的标识用于指示目的基站确定安全算法 为该 UE对应的源基站的安全算法, 并采用该源基站的安全算法建立无线链路。 在本发明中, 在无线链路的重建过程中, 目的基站接收 UE发送的重建立请求消 息, 其中, 该重建立请求消息中携带有小区标识和 UE的标识, 该小区标识和 UE的 标识携带有用于指示 UE切换成功或切换失败的属性信息, 目的基站可以根据小区标 识的属性信息来确定 UE是否切换成功, 进而可以确定该目的基站与 UE重新建立无 线链路所采用的安全算法, 并使用该安全算法建立无线链路, 避免了相关技术中由于 安全算法回退流程的失败, 无法确定重新建立无线链路所采用的安全算法而导致的无 线链路重建失败的问题, 从而目的基站可以准确地确定重新建立无线链路所采用的安 全算法, 提高了无线链路重建的成功率。 附图说明 此处所说明的附图用来提供对本发明的进一步理解, 构成本申请的一部分, 本发 明的示意性实施例及其说明用于解释本发明, 并不构成对本发明的不当限定。 在附图 中: 图 1是根据本发明实施例的无线链路的重建方法的流程图; 图 2是根据本发明实施例的另一种无线链路的重建方法的流程图; 图 3是根据本发明实施例的无线链路的重建方法的实例一的流程图; 图 4是根据本发明实施例的无线链路的重建方法的实例二的流程图; 图 5是根据本发明实施例的应用于基站的无线链路的重建装置的结构框图; 图 6是根据本发明实施例的确定模块的结构框图; 图 7 是根据本发明实施例的另一种适用于基站的无线链路的重建装置的结构框 图; 图 8是根据本发明实施例的应用于 UE的无线链路的重建装置的结构框图; 以及 图 9是根据本发明实施例的发送模块的结构框图。 具体实施方式 下文中将参考附图并结合实施例来详细说明本发明。 需要说明的是, 在不冲突的 情况下, 本申请中的实施例及实施例中的特征可以相互组合。 实施例 1 本实施例提供了一种无线链路的重建方法, 图 1是根据本发明实施例的无线链路 的重建方法的流程图,如图 1所示,该无线链路的重建方法包括步骤 S102至步骤 S104。 步骤 S102: 目的基站接收 UE发送的重建立请求消息, 其中, 重建立请求消息携 带有小区标识和 UE的标识,小区标识和 UE的标识携带有用于指示 UE切换成功或切 换失败的属性信息。 步骤 S104: 目的基站根据属性信息确定该目的基站与 UE重新建立无线链路所采 用的安全算法, 并使用安全算法建立无线链路。 通过上述步骤, 在无线链路的重建过程中, 目的基站接收 UE发送的重建立请求 消息, 其中, 该重建立请求消息中携带有小区标识和 UE 的标识, 该小区标识和 UE 的标识携带有用于指示 UE切换成功或切换失败的属性信息, 目的基站可以根据小区 标识的属性信息来确定 UE是否切换成功, 进而可以确定该目的基站与 UE重新建立 无线链路所采用的安全算法, 并使用该安全算法建立无线链路, 避免了相关技术中由 于安全算法回退流程的失败, 无法确定重新建立无线链路所采用的安全算法而导致的 无线链路重建失败的问题, 从而目的基站可以准确地确定重新建立无线链路所采用的 安全算法, 提高了无线链路重建的成功率。 为了准确地根据属性信息确定该目的基站与 UE重新建立无线链路所采用的安全 算法, 并使用安全算法建立无线链路, 在本优选实施例中, 提供了一种优选的根据属 性信息确定该目的基站与 UE重新建立无线链路所采用的安全算法, 并使用安全算法 建立无线链路的方法, 例如, 在接收到的重建立请求消息中携带的小区标识为源基站 对应的小区的标识, 且 UE的标识是源基站为 UE分配的标识时, 即 UE切换失败, 目 的基站确定安全算法为该 UE对应的源基站的安全算法, 并采用该目的基站的安全算 法建立无线链路。 在上述优选实施例中, 在小区标识为源基站对应的小区的标识, 且 UE的标识是 源基站为 UE分配的标识时, 即 UE切换失败时, 即需要进行安全算法回退时, 目的 基站可以根据小区标识的属性确定出 UE切换没有成功, 需要进行安全算法回退, 避 免了在并不是真正意义上的 UE切换失败的场景下, UE与目的侧 eNB认为的 UE是否 切换成功的结果不一致而导致安全算法回退流程失败的问题, 进而目的基站可以确定 重新建立无线链路所采用的安全算法为该源基站的安全算法, 并采用该源基站的安全 算法建立无线链路, 从而提高了目的基站确定 UE是否切换成功的准确性, 进而提高 了根据小区标识和 UE的标识确定目的基站与 UE重新建立无线链路所采用的安全算 法的准确性。 同时, 为了提高适用灵活性, 满足不同场景的适用需求, 在本优选实施例中, 提 供了另一种优选的根据属性信息确定该目的基站与 UE重新建立无线链路所采用的安 全算法, 并使用安全算法建立无线链路的方法, 例如, 在接收到的重建立请求消息中 携带的小区标识为目的基站对应的小区的标识, 且 UE的标识是目的基站为 UE分配 的标识时, 即 UE切换成功, 目的基站确定安全算法为目的基站的安全算法, 并采用 该源基站的安全算法建立无线链路。 在上述优选实施例中, 在接收到的重建立请求消息中携带的小区标识和 UE的标 识的属性信息指示 UE切换成功时, 即不需要进行安全算法回退时, 即使在重配完成 消息发送失败等场景下, 发送重建立请求消息时, 目的基站依然可以根据小区标识和 UE的标识的属性信息确定出 UE切换成功, 不需要进行安全算法回退, 避免了在并不 是真正意义上的 UE切换失败的场景下(UE切换成功, 由于其他的原因导致无线链路 建立的失败, 需要重新建立无线链路), UE与目的侧 eNB认为的 UE是否切换成功的 结果不一致而导致安全算法回退流程失败的问题, 进而目的基站依然可以确定重新建 立无线链路所采用的安全算法为该目的基站的安全算法, 并采用该目的基站的安全算 法建立无线链路, 避免了相关技术中由于 UE与目的侧 eNB认为的 UE是否切换成功 的结果不一致, 而导致目的侧 eNB (基站) 发起的安全算法回退流程失败的问题, 从 而提高了目的基站确定 UE是否切换成功的准确性, 进而提高了根据小区标识和 UE 的标识确定目的基站与 UE重新建立无线链路所采用的安全算法的准确性; 同时, 可 以满足不同场景的适用需求, 增强了本优选实施例的适用灵活性。 为了准确地用小区标识和 UE的标识指示出 UE切换成功的场景, 在本优选实施 中, 上述无线链路的重建方法还包括: 在目的基站接收用户设备 UE发送的重建立请 求消息之前, 在 UE切换成功时, 目的基站接收 UE发送的为目的基站对应的小区分 配小区标识和为 UE分配标识的请求; 目的基站为目的基站对应的小区分配小区标识, 且为 UE分配标识, 并将小区标识和 UE的标识发送给 UE。 在上述优选实施例中, 在 UE切换成功时, 目的基站为该目的基站对应的小区分 配小区标识, 且为 UE分配标识, 并将分配的小区标识和 UE的标识发送给 UE, 使得 UE可以将分配的小区标识和 UE的标识携带在重建立请求消息中,即使在重配完成消 息发送失败等场景下,发送重建立请求消息时, 目的基站依然可以根据小区标识和 UE 的标识确定出 UE切换成功, 不需要进行安全算法回退, 进而确定重新建立无线链路 所采用的安全算法为该目的基站的安全算法, 并采用该目的基站的安全算法建立无线 链路。 优选地, 上述各个优选实施例中的小区标识可以但不限于包括: 物理小区标识
PCI, UE的标识可以但不限于包括: C-RNTI例如, 在 UE切换成功时, 目的基站为该 目的基站对应的小区分配物理小区标识,且目的基站为 UE分配小区无线网络临时标; 在 UE切换失败时, 源基站为该源基站对应的小区分配物理小区标识, 且源基站为 UE 分配小区无线网络临时标识, 并根据小区标识和 UE的标识的属性信息来判断 UE是 否切换成功, 进而确定是否需要安全算法回退。 本实施例提供了另一种无线链路的重建方法, 图 2是根据本发明实施例的另一种 无线链路的重建方法的流程图, 如图 2 所示, 该无线链路的重建方法包括步骤 S202 至步 S204。 步骤 S202: UE确定 UE的切换结果。 步骤 S204: UE向目的基站发送携带有用于指示切换结果的小区标识和 UE的标 识的重建立请求, 其中, 小区标识和 UE的标识携带有用于指示 UE切换成功或切换 失败的属性信息, 小区标识和 UE的标识用于指示目的基站根据属性信息确定该目的 基站与 UE重新建立无线链路所采用的安全算法。 通过上述步骤, UE首先确定该 UE是否切换成功, 并用小区标识和 UE的标识的 属性信息来指示确定出的切换结果, 在向目的基站发送重建立请求时, 将小区标识和 UE 的标识携带在重建立请求中, 以指示目的基站根据该小区标识和 UE 的标识确定 UE是否切换成功, 避免了在并不是真正意义上的 UE切换失败的场景下, UE与目的 侧 eNB认为的 UE是否切换成功的结果不一致而导致安全算法回退流程失败的问题, 进而确定目的基站与 UE重新建立无线链路所采用的安全算法, 避免了相关技术中由 于安全算法回退流程的失败, 无法确定重新建立无线链路所采用的安全算法而导致的 无线链路重建失败的问题, 从而目的基站可以准确地确定重新建立无线链路所采用的 安全算法, 提高了无线链路重建的成功率。 为了准确地向目的基站发送携带有用于指示切换结果的小区标识和 UE的标识的 重建立请求, 同时, 提高本优选实施例的适用灵活性, 在本优选实施例中, 提供了一 种优选的 UE向目的基站发送携带有用于指示切换结果的小区标识和 UE的标识的重 建立请求, 其中, 小区标识和 UE的标识携带有用于指示 UE切换成功或切换失败的 属性信息, 小区标识和 UE的标识用于指示目的基站根据属性信息确定该目的基站与 UE重新建立无线链路所采用的安全算法的方, 例如, 在 UE切换成功时, UE向目的 基站发送携带有小区标识和 UE的标识的重建立请求, 其中, 小区标识为目的基站对 应的小区的标识, 且 UE的标识是目的基站为 UE分配的标识, 小区标识和 UE的标识 用于指示目的基站确定安全算法为该目的基站的安全算法, 并采用该目的基站的安全 算法建立无线链路; 在 UE切换失败时, UE向目的基站发送携带有小区标识和 UE的 标识的重建立请求, 其中, 小区标识为源基站对应的小区的标识, 且 UE的标识是源 基站为 UE分配的标识, 小区标识和 UE的标识用于指示目的基站确定安全算法为该 UE对应的源基站的安全算法, 并采用该源基站的安全算法建立无线链路。 在上述优选实施例中, 在 UE切换成功时, 即不需要进行安全算法回退时, 将包 括有指示 UE切换成功的信息的小区标识和 UE的标识携带在重建立请求中发送给目 的基站, 即使在重配完成消息发送失败等场景下, 发送重建立请求消息时, 目的基站 依然可以根据小区标识和 UE的标识确定出 UE切换成功, 不需要进行安全算法回退, 进而确定重新建立无线链路所采用的安全算法为该目的基站的安全算法, 并采用该目 的基站的安全算法建立无线链路; 在 UE切换没有成功时, 即需要进行安全算法回退 时, 目的基站可以根据小区标识和 UE的标识确定出 UE切换没有成功, 需要进行安 全算法回退, 进而确定重新建立无线链路所采用的安全算法为该源基站的安全算法, 并采用该源基站的安全算法建立无线链路, 从而提高了目的基站确定 UE是否切换成 功的准确性, 进而提高了根据小区标识和 UE的标识确定目的基站与 UE重新建立无 线链路所采用的安全算法的准确性; 同时, 可以满足不同场景的适用需求, 增强了本 优选实施例的适用灵活性。 优选地, 上述各个优选实施例中的小区标识可以但不限于包括: 物理小区标识 PCI, UE 的标识可以但不限于包括: 小区无线网络临时标识 C-RNTI, 例如, 在 UE 切换成功时, UE请求目的基站为该目的基站对应的小区分配物理小区标识,且目的基 站为 UE分配小区无线网络临时标识; 在 UE切换失败时, UE获得源基站为该源基站 对应的小区分配物理小区标识, 且源基站为 UE分配小区无线网络临时标识, 并将小 区标识和 UE的标识携带在重建立请求消息中发送给目的基站, 使得目的基站可以根 据小区标识和 UE的标识的属性信息来判断 UE是否切换成功, 进而确定是否需要安 全算法回退。 以下结合附图和实例对上述各个优选实施例进行详细的描述。 实例一 在本实例中以 UE切换成功时进行无线链路的重建的场景为例, 如图 3所示, 该 无线链路的重建方法包括步骤 S302至步骤 S318。 步骤 S302: 源 e B向目的 e B发送了切换请求消息, 该切换请求消息中携带有 源 eNB的安全算法。 步骤 S304:目的 eNB收到该切换请求消息后将源 eNB的安全算法保存,向源 eNB 发送了切换请求响应消息。 步骤 S306: 源 eNB向 UE下发了切换命令, 通知 UE向目的 eNB切换。 步骤 S308: UE向目的 eNB发起随机接入流程。 步骤 S310: UE收到 Msg2 (过程消息 2)以后, 认为该 UE切换成功, 向目的 eNB 发送重配完成消息。 步骤 S312:由于无线链路的质量问题,该重配完成消息无法收到目的 eNB侧 RLC 层的确认, 最终导致了无线链路建立的失败, UE向目的 eNB发送重建立请求消息, 该重建立请求消息中携带的 C-RNTI是目的基站为该 UE分配的, 且 PCI为目的基站 对应的小区的标识。 步骤 S314: 目的 eNB 收到重建立请求消息以后, 判断该重建立请求消息中的
C-RNTI是目的基站目为该 UE分配的, 且 PCI为目的基站对应的小区的标识, 则继续 采用目的 eNB的安全算法。 步骤 S316: 由于 UE认为是切换成功了, 所以其发送的重建立请求消息是用新的 安全算法处理的, 其后续的消息也采用新的安全算法处理。 步骤 S318: 目的 eNB所采用的安全算法即新的安全算法, 因此, 目的基站对收 到的重建立请求消息以及后续的消息, 都采用该安全算法来处理。 在本实施例中, UE切换成功时, 即不需要进行安全算法回退时, 即使在重配完成 消息发送失败等场景下, 发送重建立请求消息时, 目的基站依然可以根据小区标识确 定出 UE切换成功, 不需要进行安全算法回退, 进而确定重新建立无线链路所采用的 安全算法为该目的基站的安全算法, 并采用该目的基站的安全算法建立无线链路, 避 免了相关技术中由于 UE与目的侧 eNB认为的 UE是否切换成功的结果不一致, 而导 致目的侧 eNB (基站) 发起的安全算法回退流程失败的问题。 实例二: 在本实例中以 UE切换失败时进行无线链路的重建的场景为例, 如图 4所示, 该 无线链路的重建方法包括步骤 S402至步骤 S416。 步骤 S402: 源 eNB向目的侧 eNB发送了切换请求消息, 该切换请求消息中携带 有源 eNB的安全算法。 步骤 S404:目的 eNB收到该切换请求消息后将源 eNB的安全算法保存,向源 eNB 发送了切换请求响应消息。 步骤 S406: 源 eNB向 UE下发了切换命令, 通知 UE向目的 eNB切换。 步骤 S408: UE向目的 NB发起随机接入流程。 步骤 S410: UE在定时器超时以后, 未收到 Msg2, UE认为是切换失败, 向目的 eNB发送重建立请求消息, 该重建立请求消息中携带的 C-RNTI是源基站为该 UE分 配的, 且 PCI是源基站对应的小区的标识。 步骤 S412: 目的 eNB收到重建立请求消息以后, 判断该重建立请求消息中携带 的 C-RNTI是源基站为该 UE分配的, 且 PCI是源基站对应的小区的标识, 将安全算 法回退为源 eNB的安全算法。 步骤 S414: 由于 UE认为是切换失败了, 所以其发送的重建立请求消息是用旧的 安全算法处理的, 其后续的消息也采用旧的安全算法处理。 步骤 S416: 目的 eNB所采用的安全算法为回退后的旧的安全算法, 因此, 目的 eNB对收到的重建立请求消息以及后续的消息, 都采用该安全算法来处理。 在本实例中, 在 UE切换没有成功时, 即需要进行安全算法回退时, 目的基站可 以根据小区标识确定出 UE切换没有成功, 需要进行安全算法回退, 进而确定重新建 立无线链路所采用的安全算法为该源基站的安全算法, 并采用该源基站的安全算法建 立无线链路, 实施例 2 本实施例提供了一种无线链路的重建装置, 图 5是根据本发明实施例的应用于基 站的无线链路的重建装置的结构框图, 优选地, 该装置可以应用于目的基站, 如图 5 所示, 该无线链路的重建装置包括: 接收模块 502和确定模块 504, 下面对上述结构 进行详细说明。 接收模块 502, 设置为接收用户设备 UE发送的重建立请求消息, 其中, 重建立请 求消息携带有小区标识和 UE的标识,小区标识和 UE的标识携带有用于指示 UE切换 成功或切换失败的属性信息; 确定模块 504, 连接至接收模块 502, 设置为根据属性信 息确定该目的基站与 UE重新建立无线链路所采用的安全算法, 并使用安全算法建立 无线链路。 在上述实施例中, 在无线链路的重建过程中, 接收模块 502接收 UE发送的重建 立请求消息, 其中, 该重建立请求消息中携带有小区标识和 UE的标识, 该小区标识 和 UE的标识携带有用于指示 UE切换成功或切换失败的属性信息, 确定模块 504可 以根据小区标识和 UE的标识的属性信息来确定 UE是否切换成功, 进而可以确定该 目的基站与 UE重新建立无线链路所采用的安全算法, 并使用该安全算法建立无线链 路, 避免了相关技术中由于安全算法回退流程的失败, 无法确定重新建立无线链路所 采用的安全算法而导致的无线链路重建失败的问题, 从而目的基站可以准确地确定重 新建立无线链路所采用的安全算法, 提高了无线链路重建的成功率。 为了准确地根据小区标识和 UE的标识确定目的基站与 UE重新建立无线链路所 采用的安全算法, 同时, 满足不同场景的适用需求, 在本优选实施例中, 如图 6所示, 上述确定模块 504包括: 第一确定单元 5042, 第二确定单元 5044, 下面对上述结构进 行详细描述。 第一确定单元 5042, 设置为在小区标识为源基站对应的小区的标识, 且 UE的标 识是源基站为 UE分配的标识时, UE切换失败, 确定安全算法为该 UE对应的源基站 的安全算法, 并采用该目的基站的安全算法建立无线链路。 第二确定单元 5044, 设置 为在小区标识为目的基站对应的小区的标识, 且 UE的标识是目的基站为 UE分配的 标识时, UE切换成功, 确定安全算法为目的基站的安全算法, 并采用该源基站的安全 算法建立无线链路。 在上述实施例中, 在 UE切换成功时, 即不需要进行安全算法回退时, 即使在重 配完成消息发送失败等场景下, 发送重建立请求消息时,第一确定单元 5042依然可以 根据小区标识和 UE的标识确定出 UE切换成功, 不需要进行安全算法回退, 避免了 在并不是真正意义上的 UE切换失败的场景下, UE与目的侧 eNB认为的 UE是否切换 成功的结果不一致而导致安全算法回退流程失败的问题, 进而确定重新建立无线链路 所采用的安全算法为该目的基站的安全算法, 并采用该目的基站的安全算法建立无线 链路, 在 UE切换没有成功时, 即需要进行安全算法回退时, 第二确定单元 5044可以 根据小区标识和 UE的标识确定出 UE切换没有成功, 需要进行安全算法回退, 进而 确定重新建立无线链路所采用的安全算法为该源基站的安全算法, 并采用该源基站的 安全算法建立无线链路, 从而提高了目的基站确定 UE是否切换成功的准确性, 进而 提高了根据小区标识和 UE的标识确定目的基站与 UE重新建立无线链路所采用的安 全算法的准确性; 同时, 可以满足不同场景的适用需求, 增强了本优选实施例的适用 灵活性。 为了准确地用小区标识和 UE的标识指示出 UE切换成功的场景, 在本优选实施 中, 如图 7所示, 上述应用于基站的无线链路的重建装置还包括: 第一接收模块 506, 分配模块 508, 下面对上述结构进行详细描述。 第一接收模块 506,设置为在目的基站接收用户设备 UE发送的重建立请求消息之 前, 在 UE切换成功时, 接收 UE发送的为目的基站对应的小区分配小区标识和为 UE 分配标识的请求; 分配模块 508, 连接至第一接收模块 506, 设置为为目的基站对应的 小区分配小区标识, 且为 UE分配标识, 并将小区标识和 UE的标识发送给 UE。 在上述优选实施例中, 在 UE切换成功时, 分配模块 508为该目的基站对应的小 区分配小区标识, 且为 UE分配标识, 并将分配的小区标识和 UE的标识发送给 UE, 使得 UE可以将分配的小区标识和 UE的标识携带在重建立请求消息中, 即使在重配 完成消息发送失败等场景下, 发送重建立请求消息时, 目的基站依然可以根据小区标 识确定出 UE切换成功, 不需要进行安全算法回退, 进而确定重新建立无线链路所采 用的安全算法为该目的基站的安全算法,并采用该目的基站的安全算法建立无线链路。 优选地, 上述各个优选实施例中的小区标识可以但不限于包括: 物理小区标识 PCI, UE的标识可以但不限于包括: 小区无线网络临时标识 C-RNTI例如, 在 UE切 换成功时, 目的基站为该目的基站对应的小区分配物理小区标识, 且目的基站为 UE 分配小区无线网络临时标识; 在 UE切换失败时, 源基站为该源基站对应的小区分配 物理小区标识, 且源基站为 UE分配小区无线网络临时标识, 并根据小区标识和 UE 的标识的属性信息来判断 UE是否切换成功, 进而确定是否需要安全算法回退。 本实施例提供了另一种无线链路的重建装置, 图 8是根据本发明实施例的应用于 UE的无线链路的重建装置的结构框图, 优选地, 该装置应用于 UE上, 如图 8所示, 该无线链路的重建装置包括: 确定模块 802和发送模块 804, 下面对上述结构进行详 细描述。 确定模块 802, 设置为确定 UE的切换结果; 发送模块 804, 连接至确定模块 802, 设置为向目的基站发送携带有用于指示切换结果的小区标识和 UE的标识的重建立请 求, 其中, 小区标识和 UE的标识携带有用于指示 UE切换成功或切换失败的属性信 息, 小区标识和 UE的标识用于指示目的基站根据属性信息确定该目的基站与 UE重 新建立无线链路所采用的安全算法。 在上述实施例中, 确定模块 802首先确定该 UE是否切换成功, 并用小区标识和
UE的标识的属性信息来指示确定出的切换结果,在发送模块 804向目的基站发送重建 立请求时, 将小区标识和 UE的标识携带在重建立请求中, 以指示目的基站根据该小 区标识和 UE的标识确定 UE是否切换成功,避免了在并不是真正意义上的 UE切换失 败的场景下, UE与目的侧 e B认为的 UE是否切换成功的结果不一致而导致安全算 法回退流程失败的问题, 进而确定目的基站与 UE重新建立无线链路所采用的安全算 法, 避免了相关技术中由于安全算法回退流程的失败, 无法确定重新建立无线链路所 采用的安全算法而导致的无线链路重建失败的问题, 从而目的基站可以准确地确定重 新建立无线链路所采用的安全算法, 提高了无线链路重建的成功率。 为了准确地向目的基站发送携带有用于指示切换结果的小区标识和 UE的标识的 重建立请求, 同时, 提高本优选实施例的适用灵活性, 在本优选实施例中, 如图 9所 示, 上述发送模块 804包括: 第一发送单元 8042和第二发送单元 8044, 下面对上述 结构进行详细描述。 第一发送单元 8042, 设置为在 UE切换成功时, 向目的基站发送携带有小区标识 和 UE 的标识的重建立请求, 其中, 小区标识为目的基站对应的小区的标识, 且 UE 的标识是目的基站为 UE分配的标识, 小区标识和 UE的标识用于指示目的基站确定 安全算法为该目的基站的安全算法, 并采用该目的基站的安全算法建立无线链路; 第 二发送单元 8044, 设置为在 UE切换失败时, 向目的基站发送携带有小区标识和 UE 的标识的重建立请求, 其中, 小区标识为源基站对应的小区的标识, 且 UE的标识是 源基站为 UE分配的标识, 小区标识和 UE的标识用于指示目的基站确定安全算法为 该 UE对应的源基站的安全算法, 并采用该源基站的安全算法建立无线链路。 在上述优选实施例中, 在 UE切换成功时, 即不需要进行安全算法回退时, 第一 发送单元 8042将包括有指示 UE切换成功的信息的小区标识和 UE的标识携带在重建 立请求中发送给目的基站, 即使在重配完成消息发送失败等场景下, 发送重建立请求 消息时, 目的基站依然可以根据小区标识和 UE的标识确定出 UE切换成功, 不需要 进行安全算法回退, 进而确定重新建立无线链路所采用的安全算法为该目的基站的安 全算法, 并采用该目的基站的安全算法建立无线链路; 在 UE切换没有成功时, 即需 要进行安全算法回退时,第二发送单元 8044将包括有指示 UE切换没有成功的信息的 小区标识和 UE的标识携带在重建立请求中发送给目的基站, 使得目的基站可以根据 小区标识和 UE的标识确定出 UE切换没有成功, 需要进行安全算法回退, 进而确定 重新建立无线链路所采用的安全算法为该源基站的安全算法, 并采用该源基站的安全 算法建立无线链路, 从而提高了目的基站确定 UE是否切换成功的准确性, 进而提高 了根据小区标识和 UE的标识确定目的基站与 UE重新建立无线链路所采用的安全算 法的准确性; 同时, 可以满足不同场景的适用需求, 增强了本优选实施例的适用灵活 性。 优选地, 上述各个优选实施例中的小区标识可以但不限于包括: 物理小区标识
PCI, UE的标识可以但不限于包括: 小区无线网络临时标识 C-RNTI例如, 在 UE切 换成功时, UE请求目的基站为该目的基站对应的小区分配物理小区标识,且目的基站 为 UE分配小区无线网络临时标识; 在 UE切换失败时, UE获得源基站为该源基站对 应的小区分配物理小区标识, 且源基站为 UE分配小区无线网络临时标识, 并将小区 标识和 UE的标识携带在重建立请求消息中发送给目的基站, 使得目的基站可以根据 小区标识和 UE的标识的属性信息来判断 UE是否切换成功, 进而确定是否需要安全 算法回退。 显然, 本领域的技术人员应该明白, 上述的本发明的各模块或各步骤可以用通用 的计算装置来实现, 它们可以集中在单个的计算装置上, 或者分布在多个计算装置所 组成的网络上, 可选地, 它们可以用计算装置可执行的程序代码来实现, 从而, 可以 将它们存储在存储装置中由计算装置来执行, 并且在某些情况下, 可以以不同于此处 的顺序执行所示出或描述的步骤, 或者将它们分别制作成各个集成电路模块, 或者将 它们中的多个模块或步骤制作成单个集成电路模块来实现。 这样, 本发明不限制于任 何特定的硬件和软件结合。 以上所述仅为本发明的优选实施例而已, 并不用于限制本发明, 对于本领域的技 术人员来说, 本发明可以有各种更改和变化。 凡在本发明的精神和原则之内, 所作的 任何修改、 等同替换、 改进等, 均应包含在本发明的保护范围之内。

Claims

权 利 要 求 书
1. 一种无线链路的重建方法, 包括:
目的基站接收用户设备 UE发送的重建立请求消息, 其中, 所述重建立请 求消息携带有小区标识和所述 UE的标识, 所述小区标识和所述 UE的标识携 带有用于指示所述 UE切换成功或切换失败的属性信息; 所述目的基站根据所述属性信息确定该目的基站与所述 UE重新建立无线 链路所采用的安全算法, 并使用所述安全算法建立所述无线链路。
2. 根据权利要求 1所述的方法, 其中, 所述目的基站根据所述属性信息确定该目 的基站与所述 UE重新建立无线链路所采用的安全算法, 并使用所述安全算法 建立所述无线链路包括:
所述小区标识为源基站对应的小区的标识, 且所述 UE的标识是源基站为 所述 UE分配的标识时, 所述 UE切换失败, 所述目的基站确定所述安全算法 为该 UE对应的源基站的安全算法, 并采用该目的基站的安全算法建立所述无 线链路。
3. 根据权利要求 1所述的方法, 其中, 所述目的基站根据所述属性信息确定该目 的基站与所述 UE重新建立无线链路所采用的安全算法, 并使用所述安全算法 建立所述无线链路包括:
所述小区标识为目的基站对应的小区的标识, 且所述 UE的标识是目的基 站为所述 UE分配的标识时, 所述 UE切换成功, 所述目的基站确定所述安全 算法为目的基站的安全算法, 并采用该源基站的安全算法建立所述无线链路。
4. 根据权利要求 1所述的方法, 其中, 在目的基站接收用户设备 UE发送的重建 立请求消息, 其中, 所述重建立请求消息携带有小区标识和所述 UE的标识, 所述小区标识和所述 UE的标识用于指示所述 UE切换成功或切换失败之前, 还包括:
在所述 UE切换成功时, 所述目的基站接收所述 UE发送的为所述目的基 站对应的小区分配小区标识和为所述 UE分配标识的请求;
所述目的基站为所述目的基站对应的小区分配所述小区标识,且为所述 UE 分配标识, 并将所述小区标识和所述 UE的标识发送给所述 UE。
5. 根据权利要求 1至 4中任一项所述的方法, 其中, 所述小区标识包括: 物理小 区标识 PCI, 所述 UE的标识包括: 小区无线网络临时标识 C-RNTI。
6. 一种无线链路的重建方法, 包括:
用户设备 UE确定所述 UE的切换结果;
所述 UE向目的基站发送携带有用于指示所述切换结果的小区标识和所述 UE的标识的重建立请求,其中,所述小区标识和所述 UE的标识携带有用于指 示所述 UE切换成功或切换失败的属性信息, 所述小区标识和所述 UE的标识 用于指示所述目的基站根据所述属性信息确定该目的基站与所述 UE重新建立 无线链路所采用的安全算法。
7. 根据权利要求 6所述的方法, 其中, 所述 UE向目的基站发送携带有用于指示 所述切换结果的小区标识和所述 UE的标识的重建立请求, 其中, 所述小区标 识和所述 UE的标识携带有用于指示所述 UE切换成功或切换失败的属性信息, 所述小区标识和所述 UE的标识用于指示所述目的基站根据所述属性信息确定 该目的基站与所述 UE重新建立无线链路所采用的安全算法包括:
所述 UE切换成功时, 所述 UE向目的基站发送携带有所述小区标识和所 述 UE的标识的重建立请求, 其中, 所述小区标识为目的基站对应的小区的标 识, 且所述 UE的标识是目的基站为所述 UE分配的标识, 所述小区标识和所 述 UE的标识用于指示所述目的基站确定所述安全算法为该目的基站的安全算 法, 并采用该目的基站的安全算法建立所述无线链路;
所述 UE切换失败时, 所述 UE向目的基站发送携带有所述小区标识和所 述 UE的标识的重建立请求, 其中, 所述小区标识为源基站对应的小区的标识, 且所述 UE的标识是源基站为所述 UE分配的标识, 所述小区标识和所述 UE 的标识用于指示所述目的基站确定所述安全算法为该 UE对应的源基站的安全 算法, 并采用该源基站的安全算法建立所述无线链路。
8. 根据权利要求 6或 7所述的方法,其中,所述小区标识包括:物理小区标识 PCI, 所述 UE的标识包括: 小区无线网络临时标识 C-RNTI。
9. 一种无线链路的重建装置, 该装置应用于基站, 包括:
接收模块, 设置为接收用户设备 UE发送的重建立请求消息, 其中, 所述 重建立请求消息携带有小区标识和所述 UE 的标识, 所述小区标识和所述 UE 的标识携带有用于指示所述 UE切换成功或切换失败的属性信息; 确定模块, 设置为根据所述属性信息确定该目的基站与所述 UE重新建立 无线链路所采用的安全算法, 并使用所述安全算法建立所述无线链路。
10. 根据权利要求 9所述的装置, 其中, 所述确定模块包括: 第一确定单元, 设置为在所述小区标识为源基站对应的小区的标识, 且所 述 UE的标识是源基站为所述 UE分配的标识时,所述 UE切换失败,确定所述 安全算法为该 UE对应的源基站的安全算法, 并采用该目的基站的安全算法建 立所述无线链路。
11. 根据权利要求 9所述的装置, 其中, 所述确定模块包括:
第二确定单元, 设置为在所述小区标识为目的基站对应的小区的标识, 且 所述 UE的标识是目的基站为所述 UE分配的标识时,所述 UE切换成功,确定 所述安全算法为目的基站的安全算法, 并采用该源基站的安全算法建立所述无 线链路。
12. 一种无线链路的重建装置, 该装置应用于用户设备 UE, 包括:
确定模块, 设置为确定 UE的切换结果;
发送模块, 设置为向目的基站发送携带有用于指示所述切换结果的小区标 识和所述 UE的标识的重建立请求, 其中, 所述小区标识和所述 UE的标识携 带有用于指示所述 UE切换成功或切换失败的属性信息, 所述小区标识和所述 UE的标识用于指示所述目的基站根据所述属性信息确定该目的基站与所述 UE 重新建立无线链路所采用的安全算法。
13. 根据权利要求 12的装置, 其中, 所述发送模块包括:
第一发送单元, 设置为在所述 UE切换成功时, 向目的基站发送携带有所 述小区标识和所述 UE的标识的重建立请求, 其中, 所述小区标识为目的基站 对应的小区的标识, 且所述 UE的标识是目的基站为所述 UE分配的标识, 所 述小区标识和所述 UE的标识用于指示所述目的基站确定所述安全算法为该目 的基站的安全算法, 并采用该目的基站的安全算法建立所述无线链路;
第二发送单元, 设置为在所述 UE切换失败时, 向目的基站发送携带有所 述小区标识和所述 UE的标识的重建立请求, 其中, 所述小区标识为源基站对 应的小区的标识, 且所述 UE的标识是源基站为所述 UE分配的标识, 所述小 区标识和所述 UE的标识用于指示所述目的基站确定所述安全算法为该 UE对 应的源基站的安全算法, 并采用该源基站的安全算法建立所述无线链路。
PCT/CN2013/073583 2012-04-13 2013-04-01 无线链路的重建方法及装置 WO2013152685A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP13775536.9A EP2838308A4 (en) 2012-04-13 2013-04-01 METHOD AND DEVICE FOR RECONSTRUCTING A RADIO CONNECTION
US14/394,285 US9247465B2 (en) 2012-04-13 2013-04-01 Method and apparatus for re-establishing radio link

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201210107984.4 2012-04-13
CN2012101079844A CN102821384A (zh) 2012-04-13 2012-04-13 无线链路的重建方法及装置

Publications (1)

Publication Number Publication Date
WO2013152685A1 true WO2013152685A1 (zh) 2013-10-17

Family

ID=47305184

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/073583 WO2013152685A1 (zh) 2012-04-13 2013-04-01 无线链路的重建方法及装置

Country Status (4)

Country Link
US (1) US9247465B2 (zh)
EP (1) EP2838308A4 (zh)
CN (1) CN102821384A (zh)
WO (1) WO2013152685A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111918391A (zh) * 2020-09-08 2020-11-10 中国联合网络通信集团有限公司 寻呼处理方法、演进型基站及移动终端

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102625471A (zh) * 2012-04-12 2012-08-01 中兴通讯股份有限公司南京分公司 无线链路的重建方法及装置
CN102821384A (zh) * 2012-04-13 2012-12-12 中兴通讯股份有限公司 无线链路的重建方法及装置
WO2014101054A1 (zh) 2012-12-27 2014-07-03 华为技术有限公司 确定扰码冲突的方法和确定扰码冲突的装置
WO2015077933A1 (en) * 2013-11-27 2015-06-04 Telefonaktiebolaget L M Ericsson (Publ) Method and apparatus for optimizing ue identification
JP2015142363A (ja) * 2014-01-30 2015-08-03 株式会社Nttドコモ 移動局、再接続要求方法、基地局及び再接続要求処理方法
CN109041137B (zh) * 2016-01-16 2020-01-17 华为技术有限公司 一种切换的方法、基站及终端设备
CN108616939B (zh) * 2016-12-21 2021-01-22 大唐移动通信设备有限公司 一种无线资源控制rrc重建立处理方法和装置
WO2022147651A1 (en) * 2021-01-05 2022-07-14 Lenovo (Beijing) Limited Methods and apparatuses for reporting handover related information

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101959263A (zh) * 2009-07-15 2011-01-26 中兴通讯股份有限公司 无线链路失败信息的发送方法与装置
CN102223632A (zh) * 2010-04-15 2011-10-19 中兴通讯股份有限公司 一种接入层安全算法同步方法和系统
CN102300278A (zh) * 2010-06-28 2011-12-28 中兴通讯股份有限公司 一种切换场景的判决方法及系统
CN102625471A (zh) * 2012-04-12 2012-08-01 中兴通讯股份有限公司南京分公司 无线链路的重建方法及装置
CN102821384A (zh) * 2012-04-13 2012-12-12 中兴通讯股份有限公司 无线链路的重建方法及装置

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101022647B (zh) * 2006-02-15 2010-09-08 华为技术有限公司 切换处理过程中确定安全协商参数的实现方法及装置
WO2009020789A2 (en) * 2007-08-03 2009-02-12 Interdigital Patent Holdings, Inc. Security procedure and apparatus for handover in a 3gpp long term evolution system
JP5069704B2 (ja) * 2009-02-02 2012-11-07 株式会社エヌ・ティ・ティ・ドコモ 移動通信方法及び無線基地局
KR101655325B1 (ko) * 2009-03-06 2016-09-09 삼성전자주식회사 이동 중계국을 지원하는 광대역 무선통신 시스템의 그룹 핸드오버 방법 및 장치
CN101959262B (zh) 2009-07-15 2015-07-22 中兴通讯股份有限公司 切换失败指示信息的通知方法与装置
CN102316501A (zh) * 2010-07-09 2012-01-11 中兴通讯股份有限公司 无线链路失败原因的确定、切换参数阈值调整方法及装置
CN102123462A (zh) * 2011-03-21 2011-07-13 中兴通讯股份有限公司 一种用户终端跨基站的切换方法和lte系统

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101959263A (zh) * 2009-07-15 2011-01-26 中兴通讯股份有限公司 无线链路失败信息的发送方法与装置
CN102223632A (zh) * 2010-04-15 2011-10-19 中兴通讯股份有限公司 一种接入层安全算法同步方法和系统
CN102300278A (zh) * 2010-06-28 2011-12-28 中兴通讯股份有限公司 一种切换场景的判决方法及系统
CN102625471A (zh) * 2012-04-12 2012-08-01 中兴通讯股份有限公司南京分公司 无线链路的重建方法及装置
CN102821384A (zh) * 2012-04-13 2012-12-12 中兴通讯股份有限公司 无线链路的重建方法及装置

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111918391A (zh) * 2020-09-08 2020-11-10 中国联合网络通信集团有限公司 寻呼处理方法、演进型基站及移动终端

Also Published As

Publication number Publication date
EP2838308A4 (en) 2015-12-16
CN102821384A (zh) 2012-12-12
EP2838308A1 (en) 2015-02-18
US20150119041A1 (en) 2015-04-30
US9247465B2 (en) 2016-01-26

Similar Documents

Publication Publication Date Title
WO2013152685A1 (zh) 无线链路的重建方法及装置
KR102388500B1 (ko) 듀얼 rrc 시스템에서 이동성을 처리하는 방법 및 장치
JP4926216B2 (ja) アップリンクグラントを処理する方法及び通信装置
WO2018059299A1 (zh) 小区切换的方法、装置及系统和计算机存储介质
CN110999523A (zh) 重新连接与无线接入网节点的无线资源控制连接的方法和用户设备
US20240121680A1 (en) Method and wireless device for handling handover
JP7157827B2 (ja) 通信方法及び通信装置
WO2019242756A1 (zh) 通信方法及装置
WO2020108220A1 (zh) 通信方法及装置
JP2011082984A (ja) 無線通信システムにおける無線リンク障害をハンドリングする方法及び装置
CN110351894B (zh) 一种认证ue的方法和设备
CN113678568A (zh) 管理mcg快速恢复
WO2012031507A1 (zh) 数据传输通道迁移方法及系统
US20230337311A1 (en) RRC Re-Establishment
WO2013152709A1 (zh) 无线链路的重建方法及装置
WO2022066070A1 (en) Control plane function associating with and performing control plane functions for one or more user equipments
WO2012092814A1 (zh) 无线链路重建方法及系统
CN103997762A (zh) 一种小区切换方法及系统
WO2022236484A1 (zh) Sdt失败上报的方法、终端设备和网络设备
WO2014206179A1 (zh) 一种实现自动邻区关系建立的方法、终端、基站及系统、存储介质
JP6335330B2 (ja) アップリンクデータの処理方法及び装置
JP2009130938A (ja) Rrcプロセスの再開効率を向上させる方法及び通信装置
WO2017143828A1 (zh) 一种提高切换成功率的方法和用户设备
WO2019214606A1 (zh) 用户设备中的控制方法以及用户设备
WO2020198961A1 (zh) 链路失败的恢复方法和设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13775536

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 14394285

Country of ref document: US

WWE Wipo information: entry into national phase

Ref document number: 2013775536

Country of ref document: EP