WO2014111049A1 - Dispositif et procédé d'optimisation de cellule - Google Patents

Dispositif et procédé d'optimisation de cellule Download PDF

Info

Publication number
WO2014111049A1
WO2014111049A1 PCT/CN2014/070864 CN2014070864W WO2014111049A1 WO 2014111049 A1 WO2014111049 A1 WO 2014111049A1 CN 2014070864 W CN2014070864 W CN 2014070864W WO 2014111049 A1 WO2014111049 A1 WO 2014111049A1
Authority
WO
WIPO (PCT)
Prior art keywords
communication node
parameters
communication
security
security algorithms
Prior art date
Application number
PCT/CN2014/070864
Other languages
English (en)
Chinese (zh)
Inventor
张亮亮
乌力吉
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2014111049A1 publication Critical patent/WO2014111049A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor

Definitions

  • the present application claims priority to Chinese Application No. 201310019263.2, entitled “Cell Optimization Method and Apparatus”, filed on Jan. 18, 2013, the entire disclosure of which is incorporated herein by reference.
  • TECHNICAL FIELD The present invention relates to communications technologies, and in particular, to a cell optimization method and apparatus.
  • UE User Equipment
  • LTE Long Term Evolution
  • the UE communicates with the communication node using parameters and/or security algorithms, and the parameter and/or security algorithm may be a Next Hop Chaining Counter (NCC) and a Next Hop (Next Hop,
  • NCC Next Hop Chaining Counter
  • Next Hop Next Hop
  • the target communication node initiates an internal handover (intra-HO) after the UE handover is completed, and updates the NCC and NH for the UE, thereby performing security isolation, so that the UE uses New NCC and NH.
  • Embodiments of the present invention provide a cell optimization method and apparatus, which are used to solve a problem that a communication party cannot know when there are parameters and/or security algorithms updated when communication between communication nodes.
  • a first aspect of the embodiments of the present invention provides a method for optimizing a region, including:
  • the third communication node receives the first set of parameters and/or security algorithms sent by the first communication node and at least And a second set of parameters and/or security algorithms sent by the at least one second communication node;
  • the third communication node communicates with the first communication node using the first set of parameters and/or security algorithms, and communicates with the second communication node using the second set of parameters and/or security algorithms;
  • the first communication node is a station that performs control plane signaling communication with the third communication node
  • the second communication node is a site that performs user plane data communication with the third communication node
  • the cell in which the first communication node is located is the primary cell of the third communication node, and the cell in which the second communication node is located is the secondary cell of the third communication node.
  • the security algorithm includes at least one of an encryption algorithm, a header compression algorithm, and an integrity protection algorithm
  • the parameters include at least one of a next hop connection counter NCC, a next hop NH, a cell radio network temporary identification C-RNTI, and a length of a packet data convergence layer protocol PDCP sequence number.
  • the third communications node uses the first set of parameters and/or security algorithms and the first communications node Communicating, communicating with the second communication node using the second set of parameters and/or security algorithms, including at least one of the following:
  • the third communication node performs encryption and decryption processing on the information that is communicated with the first communication node and/or the second communication node according to the encryption algorithm;
  • the third communication node performs header compression or decompression compression processing on the information that is communicated with the first communication node and/or the second communication node according to the header compression algorithm;
  • the third communication node performs integrity protection or de-integrity protection processing on the information communicated with the first communication node and/or the second communication node according to the integrity protection algorithm.
  • the third communications node communicates with the first communications node using the first set of parameters and/or security algorithms, using the second The set of parameters and/or security algorithms communicate with the second communication node, including:
  • the third communication node upon receiving the first set of parameters and/or security algorithms, begins to communicate with the first communication node using the first set of parameters and/or security algorithms, the third communication node Receiving, by the second set of parameters and/or security algorithms, starting to communicate with the second communication node using the second set of parameters and/or security algorithms; or
  • the third communication node starts using the first set when transmitting information to the second communication node a parameter and/or security algorithm in communication with the first communication node, using the second set of parameters and/or security algorithms to communicate with the second communication node; or
  • the third communication node When receiving the message sent by the first communication node or the second communication node, the third communication node starts to communicate with the first communication node by using the first set of parameters and/or security algorithm, and uses the second set of parameters. And/or a security algorithm to communicate with the second communication node; or
  • the third communication node when accessing the second communication node, starts communicating with the first communication node using the first set of parameters and/or security algorithms, using the second set of parameters and/or security algorithms and The second communication node performs communication; or
  • the third communication node when initially communicating with the second communication node, begins communicating with the first communication node using the first set of parameters and/or security algorithms, using the second set of parameters and/or security algorithms and The second communication node performs communication; or
  • the third communication node When receiving the first data packet sent by the second communication node, the third communication node starts to communicate with the first communication node by using the first set of parameters and/or security algorithm, and uses the second a set of parameters and/or security algorithms to communicate with the second communication node; or
  • the third communication node starts to communicate with the first communication node by using the first set of parameters and/or security algorithms within a preset time after receiving the first set of parameters and/or security algorithms,
  • the third communication node begins to communicate with the second communication node using the second set of parameters and/or security algorithms within a preset time after or after receiving the second set of parameters and/or security algorithms.
  • a second aspect of the embodiments of the present invention provides a method for optimizing a region, including:
  • the mobility management entity MME receives the request message sent by the first communication node
  • And/or a security algorithm transmitting a corresponding second set of parameters and/or security algorithms to the at least one second communication node;
  • the first set of parameters and/or security algorithms are used by the first communication node to communicate with the third communication node, and the second set of parameters and/or security algorithms are used by the second communication node and the third communication node.
  • the first communication node is a station that performs control plane signaling communication with the third communication node
  • the second communication node is a station that performs user plane data communication with the third communication node; or the cell where the first communication node is located is a primary cell with the third communication node, and the second communication The cell where the node is located is the secondary cell of the third communication node.
  • the security algorithm includes at least one of an encryption algorithm, a header compression algorithm, and an integrity protection algorithm
  • the parameters include at least one of a next hop connection counter NCC, a next hop NH, a cell radio network temporary identification C-RNTI, and a packet data convergence layer protocol PDCP sequence number.
  • a third aspect of the embodiments of the present invention provides a cell optimization method, including:
  • a security algorithm or transmitting the first set of parameters and/or security algorithms to the first communication node, and transmitting the second set of parameters and/or security algorithms to at least one second communication node;
  • the first communications node is a station that performs control plane signaling communication with the third communications node, and the second communications The node is a station that performs user plane data communication with the third communication node; or, the cell where the first communication node is located is a primary cell with the third communication node, and the cell where the second communication node is located is a secondary cell of the third communication node.
  • the first communications node receives a first set of parameters and a security algorithm sent by the MME, and at least one set of second set of parameters and/or security After the algorithm, it also includes:
  • the method further includes:
  • the first communication node transmits the first set of parameters and/or security algorithms to a third communication node.
  • the first communication Receiving, by the node, a first set of parameters and/or security algorithms sent by the MME, and at least one set of second set of parameters and/or security algorithms, or the first communication node receives the first set of parameters sent by the MME and / or after the security algorithm it also includes:
  • the first communication node sends a message to the second communication node or the third communication node to cause the second communication node to start using the second set of parameters and/or security algorithms when receiving the message Communicating with the third communication node, causing the third communication node to start processing the information communicated with the first communication node using the first set of parameters and/or security algorithms when receiving the message, using the second set
  • the parameters and/or security algorithms communicate with the second communication node.
  • the first communications node receives a first set of parameters and/or a security algorithm sent by the MME, and at least one set of the second set of parameters and/or Or the security algorithm, or after the first communication node receives the first set of parameters and/or security algorithms sent by the MME, the method further includes:
  • the first communication node communicates with the third communication node in accordance with the first set of parameters and/or security algorithms.
  • the security algorithm includes an encryption algorithm, a header compression algorithm, and integrity protection At least one algorithm in the algorithm;
  • the parameters include at least one of a next hop connection counter NCC, a next hop NH, a cell radio network temporary identification C-RNTI, and a packet data convergence layer protocol PDCP sequence number.
  • the first communications node and the third communications node according to the first set of parameters and/or security algorithm Communicate, including at least one of the following:
  • the first communication node performs encryption and decryption processing on the information that is communicated with the third communication node according to the encryption algorithm
  • the first communication node performs header compression or decompression processing on the information communicated with the third communication node according to the header compression algorithm
  • the first communication node performs integrity protection or de-integrity protection processing on the information communicated with the third communication node according to the integrity protection algorithm.
  • a fourth aspect of the present invention provides a communication node, where the communication node is a third communication node, including: a receiving module, configured to receive a first set of parameters and/or a security algorithm sent by the first communication node, and at least one second set of parameters and/or security algorithms; or
  • a communication module configured to, by the third communication node, communicate with the first communication node using the first set of parameters and/or security algorithms, and communicate with the second communication node using the second set of parameters and/or security algorithms ;
  • the first communication node is a station that performs control plane signaling communication with the third communication node
  • the second communication node is a site that performs user plane data communication with the third communication node
  • the cell in which the first communication node is located is the primary cell of the third communication node, and the cell in which the second communication node is located is the secondary cell of the third communication node.
  • the security algorithm includes at least one of an encryption algorithm, a header compression algorithm, and an integrity protection algorithm
  • the parameters include at least one of a next hop connection counter NCC, a next hop NH, a cell radio network temporary identification C-RNTI, and a length of a packet data convergence layer protocol PDCP sequence number.
  • the communication module is specifically used in at least one of the following:
  • An integrity protection or de-integrity protection process is performed on the information communicated with the first communication node and/or the second communication node in accordance with the integrity protection algorithm.
  • the communication module is specifically configured to start using the first set when receiving the first set of parameters and/or security algorithms a parameter and/or security algorithm in communication with the first communication node, the third communication node, when receiving the second set of parameters and/or security algorithms, begins using the second set of parameters and/or security algorithms and The second communication node performs communication; or
  • the communication module is specifically configured to start using the information when sending information to the second communication node.
  • the first set of parameters and/or security algorithms are in communication with the first communication node, and communicate with the second communication node using the second set of parameters and/or security algorithms; or
  • the communication module is specifically configured to: when receiving a message sent by the first communication node or the second communication node, start to use the first set of parameters and/or a security algorithm to communicate with the first communication node, and use the second a set of parameters and/or security algorithms to communicate with the second communication node; or
  • the communication module is specifically configured to, when accessing the second communication node, start to communicate with the first communication node by using the first set of parameters and/or security algorithms, and use the second set of parameters and/or security
  • the algorithm communicates with the second communication node
  • the communication module is specifically configured to start to communicate with the first communication node by using the first set of parameters and/or security algorithms when starting communication with the second communication node, using the second set of parameters and/or security
  • the algorithm communicates with the second communication node
  • the communication module is specifically configured to: when receiving the first data packet sent by the second communication node, start to use the first set of parameters and/or a security algorithm to communicate with the first communication node, using the a second set of parameters and/or security algorithms to communicate with the second communication node; or
  • the communication module is specifically configured to start using the first set of parameters and/or security algorithms with the first communication node within a preset time after or after receiving the first set of parameters and/or security algorithms.
  • Communicating, the third communication node starts using the second set of parameters and/or security algorithm with the second communication node within a preset time after or after receiving the second set of parameters and/or security algorithms Communication.
  • a fifth aspect of the embodiments of the present invention provides a mobility management entity, including:
  • a receiving module configured to receive a request message sent by the first communications node
  • a sending module configured to send, according to the request message, a first set of parameters and/or a security algorithm and at least one second set of parameters and/or security algorithms to the first communication node;
  • the first set of parameters and/or security algorithms are used by the first communication node to communicate with the third communication node, and the second set of parameters and/or security algorithms are used by the second communication node and the third communication node.
  • the first communication node is a station that performs control plane signaling communication with the third communication node
  • the second communication node is a site that performs user plane data communication with the third communication node; or
  • the cell in which the first communication node is located is the primary cell of the third communication node, and the cell in which the second communication node is located is the secondary cell of the third communication node.
  • the security algorithm includes at least one of an encryption algorithm, a header compression algorithm, and an integrity protection algorithm
  • the parameters include at least one of a next hop connection counter NCC, a next hop NH, a cell radio network temporary identification C-RNTI, and a packet data convergence layer protocol PDCP sequence number.
  • a sixth aspect of the embodiments of the present invention provides a communication node, where the communication node is a first communication node, including:
  • a sending module configured to send a request message to the mobility management entity MME, to enable the MME to send a first set of parameters and/or a security algorithm and at least one set of second parameters to the first communication node according to the request message And/or a security algorithm, or transmitting the first set of parameters and/or security algorithms to the first communication node, and transmitting the second set of parameters and/or security algorithms to at least one second communication node;
  • a receiving module configured to receive a first set of parameters and/or a security algorithm and a second set of parameters and/or security algorithms sent by the MME;
  • the first communication node is a station that performs control plane signaling communication with the third communication node
  • the second communication node is a site that performs user plane data communication with the third communication node; or, the The cell in which the communication node is located is the primary cell of the third communication node, and the cell in which the second communication node is located is the secondary cell of the third communication node.
  • the sending module is further configured to receive, by the receiving module, a first set of parameters and a security algorithm sent by the MME, and at least one set of second After the set of parameters and/or the security algorithm, transmitting the corresponding second set of parameters and/or security algorithms to at least one of the second communication nodes, and transmitting the first set of parameters and/or security to the third communication node An algorithm and the at least one set of second set of parameters and/or security algorithms.
  • the sending module is further configured to: after the receiving module receives the first set of parameters and/or security algorithms sent by the MME, The third communication node transmits the first set of parameters and/or security algorithms.
  • the sending module is further configured to send a message to the second communications node or the third communications node, so that the second communications section Pointing, upon receiving the message, initiating communication with the third communication node using the second set of parameters and/or security algorithms, causing the third communication node to begin using the first set of parameters and upon receiving the message
  • the security algorithm communicates with the first communication node and communicates with the second communication node using the second set of parameters and/or security algorithms.
  • the communications node further includes a communications module, configured to communicate with the third communications node according to the first set of parameters and/or security algorithms.
  • the security algorithm includes an encryption algorithm, a header compression algorithm, and integrity protection At least one algorithm in the algorithm;
  • the parameters include at least one of a next hop connection counter NCC, a next hop NH, a cell radio network temporary identification C-RNTI, and a packet data convergence layer protocol PDCP sequence number.
  • the communication module is specifically used in at least one of the following:
  • the third communications node may receive the first set of parameters and/or the security algorithm and the second set of parameters and/or security algorithms sent by the first communications node, or receive the first sent by the first communications node. a set of parameters and/or security algorithms and a second set of parameters and/or security algorithms sent by the second communication node, wherein the third communication node uses the first set of parameters and/or security algorithms to communicate with the first communication node, using The second set of parameters and/or security algorithms communicate with the second communication node to enable communication with the third communication node when the MME wants to update parameters and/or security algorithms used by the third communication node Both the communication node and the third communication node acquire the updated parameters in time, and the communication node that communicates with the third communication node and the third communication node are prevented from processing the information in the communication process.
  • Embodiment 1 is a schematic flowchart of Embodiment 1 of a cell optimization method according to the present invention
  • Embodiment 2 is a schematic flowchart of Embodiment 2 of a cell optimization method according to the present invention
  • Embodiment 3 is a schematic flowchart of Embodiment 3 of a cell optimization method according to the present invention.
  • Embodiment 4 is a schematic flowchart of Embodiment 4 of a cell optimization method according to the present invention.
  • FIG. 5 is a schematic flowchart of Embodiment 5 of a cell optimization method according to the present invention.
  • Embodiment 6 is a schematic flowchart of Embodiment 6 of a cell optimization method according to the present invention.
  • FIG. 7 is a schematic structural diagram of Embodiment 1 of a communication node according to the present invention.
  • FIG. 8 is a schematic structural diagram of Embodiment 1 of a mobility management entity according to the present invention.
  • FIG. 9 is a schematic structural diagram of Embodiment 2 of a communication node according to the present invention.
  • FIG. 10 is a schematic structural diagram of Embodiment 3 of a communication node according to the present invention.
  • FIG. 11 is a schematic structural diagram of Embodiment 4 of a communication node according to the present invention.
  • FIG. 1 is a schematic flowchart of Embodiment 1 of a cell optimization method according to the present invention. As shown in FIG. 1, the method includes:
  • the third communication node receives the first set of parameters and/or security algorithms sent by the first communication node and at least one set of second sets of parameters and/or security algorithms. When there are multiple second communication nodes, each second communication node will have a corresponding second set of parameters and/or security algorithms.
  • the third communication node receives the first set of parameters and/or security algorithms sent by the first communication node and the second set of parameters and/or security algorithms sent by the at least one second communication node. It should be noted, When there are multiple second communication nodes, the third communication node may receive corresponding parameters and/or security algorithms sent by each second communication node, and the second set of parameters and/or security algorithms sent by different second communication nodes may They are all different.
  • S10a and S10b are alternatively executed according to different situations.
  • the parameter and/or security algorithm sent by the first communication node is sent by the MME to the first communication node
  • the parameter and/or security algorithm sent by the second communication node may be directly sent by the MME to the first
  • the communication node may also be sent by the MME to the first communication node and then forwarded by the first communication node to the second communication node.
  • the third communication node communicates with the first communication node by using the first set of parameters and/or security algorithms, and communicates with the second communication node by using the second set of parameters and/or security algorithms; these parameters and/or security
  • the algorithm can be used for encryption and decryption processing, header compression or decompression processing, integrity protection or de-integrity protection processing.
  • the UE communicates with each of the second communication nodes using a second set of parameters and/or security algorithms corresponding to the respective second communication nodes.
  • the embodiment of the present invention is mainly directed to the separation of the user plane and the control plane of the third communication node, where the first communication node is a station that performs control plane signaling communication with the third communication node, and the second communication node is The third communication node performs the user plane data communication; or, it can be understood that the cell where the first communication node is located is the primary cell of the third communication node, and the cell where the second communication node is located is the third communication node. Secondary cell.
  • the third communications node may receive the first set of parameters and/or security algorithms and the second set of parameters and/or security algorithms sent by the first communications node, or receive the first sent by the first communications node. a set of parameters and/or security algorithms and a second set of parameters and/or security algorithms sent by the second communication node, the third communication node then communicating with the first communication node using the first set of parameters and/or security algorithms, using the The second set of parameters and/or security algorithms communicate with the second communication node to enable communication with the third communication node when the MME wants to update parameters and/or security algorithms used by the third communication node Both the node and the third communication node acquire updated parameters in time, avoiding that the communication node communicating with the third communication node and the third communication node cannot process the information in the communication process.
  • the foregoing security algorithm includes at least one of a Ciphering Algorithm, a header compression algorithm, and an integrity protection algorithm; specifically, the encryption algorithm may be eeaO, Eeal, eea2, eea3-v11xy, etc.; integrity protection algorithm, which can be eia0-v920, eial, eia2, eia3-v1 1xy, etc.; header compression algorithm is based on Robust Header Compression (ROHC) architecture (framework) Header compression or decompression compression can be performed using the algorithm and corresponding parameters.
  • ROHC Robust Header Compression
  • the type of the algorithm is defined by the Profile Identifier. For example, 0x0002 represents an algorithm identifier.
  • the specific header compression parameters can be Profile Identifier, MAX_CID, LARGE_CIDS, FEEDBACK_FOR. Etc., but not limited to this.
  • the above parameters include the length of the NCC, NH, Cell Radio Network Temporary Identifier (C-RNTI), Packet Data Convergence Protocol (PDCP) serial number (PDCP Sequence Number length). At least one of the parameters of the inbits, which are called PDCP-SN-Size, but not limited thereto; wherein, the C-RNTI is a flag in the cell when the UE is in the connected state, and is used for the base station to pass the C- The RNTI schedules the UE, and the UE identifies and receives its own data through the C-RNTI.
  • the third communication node communicates with the first communication node using the first set of parameters and/or security algorithms, and communicates with the second communication node using the second set of parameters and/or security algorithms, including the following At least one:
  • the third communication node performs encryption and decryption processing on the information communicated with the first communication node and/or the second communication node according to the above encryption algorithm; that is, the third communication node is configured according to the first set of parameters and/or security algorithms.
  • the encryption algorithm performs encryption and decryption processing on the information communicated with the first communication node, and performs encryption and decryption processing on the information communicated with the second communication node according to the encryption algorithm in the second set of parameters and/or the security algorithm.
  • the above-mentioned station may use a parameter (e.g., NCC, NH, or PDCP-SN-Size, etc.) and/or a security algorithm to derive a key for encryption or decryption of data.
  • a parameter e.g., NCC, NH, or PDCP-SN-Size, etc.
  • the third communication node performs header compression or decompression processing on the information communicated with the first communication node and/or the second communication node according to the header compression algorithm; that is, the third communication node performs the first set of parameters according to the above Or a header compression algorithm in the security algorithm performs header compression or decompression compression processing on the information communicated with the first communication node, and the third communication node pairs the second set of parameters and/or the header compression algorithm in the security algorithm.
  • the information communicated by the second communication node is subjected to header compression or decompression compression processing.
  • the third communication node is associated with the first communication node and/or the second communication according to the integrity protection algorithm described above
  • the information communicated by the node performs integrity protection or de-integrity protection processing; that is, the third communication node performs information communication with the first communication node according to the integrity protection algorithm in the first set of parameters and/or the security algorithm. Integrity protection or de-integrity protection processing, the third communication node performs integrity protection or de-integrity protection on the information communicated with the second communication node according to the integrity protection algorithm in the second set of parameters and/or the security algorithm deal with.
  • the stations shown in the embodiments of the present invention may be replaced by base stations or cells.
  • the embodiment of the present invention may be: when the control plane of the third communication node switches to the first communication node or after the handover, the user plane of the third communication node Still at the second communication node, or when the user plane of the third communication node switches to the second communication node or after the handover, the control plane of the third communication node is still at the first communication node, ie, the second communication node is the same as the above a third communication node performs base station data communication, the first communication node is a base station that performs control plane signaling communication with the third communication node; or the cell where the first communication node is located is a primary cell of the third communication node
  • the second communication node is a secondary cell of the foregoing third communication node; more specifically, the embodiment is applicable to multiple specific scenarios, for example: scenario 1, the control plane of the third communication
  • the control plane of the third communication node is switched from the third base station to the first communication node, and the user plane of the third communication node is maintained at the second communication node; the third station may be in addition to the second communication node, Any one of the first communication nodes; specifically, the third communication node may switch from the fourth communication node (taking the macro base station Macro eNBI as an example) to the target first communication node (taking the macro base station Macro eNB 2 as an example)
  • the data plane of the third communication node is maintained at the second communication node (taking the micro base station Picol as an example).
  • the control plane of the third communication node is maintained at the first communication node, and the user plane of the third communication node is switched from the fourth communication node to the second communication node; likewise, the fourth communication node may be in addition to the foregoing a second communication node, any one of the first communication nodes; specifically, the control plane of the third communication node may be maintained at the first communication node (taking the macro base station eNB as an example), and the user plane of the third communication node is transmitted from The fourth communication node (taking the micro base station Pico2 as an example) is replaced with the second communication node (taking Picol as an example).
  • the user plane of the third communication node switches from the first communication node to the second communication node, and the control plane of the third communication node remains at the first communication node.
  • the user plane and the control plane of the third communication node may be in the first communication node (taking the macro base station eNB as an example), and the user plane of the third communication node is switched to the second communication node (taking Picol as an example).
  • control plane and the user plane of the third communication node may be switched between different sites.
  • the implementation scenario of the embodiment of the present invention may be in the handover process, or In the non-handover process, as long as the MME wants to update the parameters and/or security algorithms used by the third communication node, the updated parameters and/or security algorithms are sent to the corresponding site, and then sent by the site to the third communication node.
  • the first communication node, the second communication node, and the third communication node can synchronously use the updated parameters and/or security algorithms, and also facilitate the first communication node to use the first set of parameters and/or security algorithms and the third
  • the communication node communicates and the second communication node communicates with the third communication node using the second set of parameters and/or security algorithms described above.
  • the information that the station communicates with the third communication node may be data or may also be signaling, such as system messages, physical layer signaling, information on the control channel, and the like.
  • the first communication node or the second communication node mentioned in the embodiment of the present invention may be a wireless communication node, and the communication node may be various types of base stations, a macro base station (Macro eNB), and a pico base station. (Micro eNB), a micro base station (Pico eNB), a home base station HeNB, a small cell eNB, a relay station, etc., are not limited herein.
  • the first communication node or the second communication node may also be a UE. Specifically, the UE can support a Device to Device (D2D) function to support end-to-end communication between user equipments.
  • D2D Device to Device
  • the third communication node may be a wireless communication node, and the communication node may be various types of base stations, a macro base station (Macro eNB), a pico base station (Micro eNB), a micro base station (Pico eNB), and a home base station.
  • the HeNB, the small cell eNB, the relay station, and the like are not limited herein.
  • the third communication node can be a UE.
  • the third communication node can support the Device-to-Devicc function to support end-to-end communication between user equipments.
  • the third communication node takes the user equipment as an example to illustrate the content of the invention.
  • the scenario in which the control plane of the third communication node is separated from the user plane may be a scenario in which the third communication node supports carrier aggregation, and specifically refers to the frequency of the cell 1 in which the first communication node is located, and second.
  • the cell 2 where the communication node is located uses the frequency f2 and simultaneously provides the third communication node.
  • Service For example, the cell 1 serving the third communication node of the first communication node may be referred to as a primary cell, and the cell 2 serving the terminal by the second communication node may be referred to as a secondary cell.
  • the first communication node may be a macro base station eN B and the second communication node may be a micro base station Pico.
  • a station that provides a control plane service for the third communication node that is, the first communication node may serve as a primary station of the third communication node, and the primary station usually adopts a low frequency band to transmit control plane signaling, and optionally may carry the third communication node.
  • the radio resource control (Radio Resource Control, RRC) connection of the third communication node is established at the primary site; the following is the site/cell serving the control plane of the third communication node,
  • the site/cell of the user plane service of the third communication node is defined in detail:
  • the station that provides the control plane service for the third communication node includes: a site corresponding to the cell to which the control plane transmits, a downlink transmission site that can send control signaling for the third communication node; or a site corresponding to the macro base station or the macro cell; or a site corresponding to the primary cell; or a site corresponding to the serving cell of the third communication node; a site providing a Signaling Radio Bearer (SRB) for the third communication node; and a third communication node The site where the RRC connection is established.
  • SRB Signaling Radio Bearer
  • the cell that provides the control plane service or the control plane transmission for the third communication node includes: a primary cell; or a cell that sends control signaling for the third communication node; or sends control signaling for the third communication node. a cell corresponding to the downlink transmission point; or a cell corresponding to the macro base station; or a cell providing non-access stratum (NAS) mobility information for the third communication node during RRC connection setup or re-establishment or handover, or
  • NAS non-access stratum
  • the third communication node is provided with a secure input cell; the third communication node is provided with the SRB transported cell.
  • the cell that provides security input to the third communication node during the RRC connection setup or handover process is also the primary cell.
  • the secondary cell is a cell different from the primary cell.
  • the control signaling may include at least one of the following: information on the hybrid automatic repeat indication channel, information on the control information format indication channel, information on the control channel, system message, physical layer signaling, medium access control (Medium) Access Control, the so-called MAC) layer message, RRC layer message, S RBs corresponding information.
  • the station that provides the control plane service by the third communication node may also be responsible for the transmission of the DRBs or part of the SRBs on the basis of the above definition.
  • the site providing the user plane service for the third communication node includes: a secondary cell
  • SRB Signaling Radio Bearer
  • PDSCH Physical Downlink Shared Channel
  • the cell that provides the user plane service or the user plane transmission for the third communication node includes: a secondary cell; or a cell that provides data transmission for the third communication node of the user; and a cell that provides DRB transmission for the third communication node of the user;
  • the third communication node is provided with a cell that transmits information on the PDSCH.
  • the station providing the control plane transmission for the third communication node is responsible for the transmission of the SRBs; the station providing the user plane transmission for the third communication node is responsible for the transmission of the DRBs.
  • the station providing the control plane transmission for the third communication node is responsible for the transmission of SRB0 and SRB1; the station providing the user plane transmission for the third communication node is responsible for the transmission of SRB2 and DRBs, wherein the above SRBs are divided into SRB0 , SRB1, SRB2.
  • the SRBO is used to transmit an RRC message, and is transmitted on a Common Control Channel (CCT); the SRB1 is used to transmit an RRC message (and may also include a piggybacked N AS message), before the establishment of the SRB2 bearer, Has a higher priority than SRB2.
  • SRB2 is transmitted on the Dedicated Control Channel (DCCH) to transmit NAS messages, which has lower priority than SRB1, and SRB2 is always configured to be transmitted on the DCCH after the security mode is activated.
  • DCCH Dedicated Control Channel
  • the station providing the control plane transmission for the third communication node is responsible for the transmission of SRB0 and SRB1, and is also responsible for the transmission of part of the DRBs; the station providing the user plane transmission for the third communication node is responsible for SRB2 and part of the DRBs. transmission.
  • the station providing the control plane transmission for the third communication node is responsible for the transmission of the SRBs, and is also responsible for the transmission of the partial DRBs; the station providing the user plane transmission for the third communication node is responsible for the transmission of the partial DRBs.
  • the third communication node uses the first set of parameters and/or security algorithm and the first pass
  • the signaling node communicates and communicates with the second communication node using a second set of parameters and/or security algorithms.
  • the third communication node starts to communicate with the first communication node using the first set of parameters and/or security algorithms when receiving the first set of parameters and/or security algorithms, and the third communication node receives the first
  • the second set of parameters and/or security algorithms are used to communicate with the second communication node; that is, the third communication node is put into use as soon as it receives the parameters and/or security algorithms.
  • the third communication node when transmitting information to the second communication node, starts communicating with the first communication node using the first set of parameters and/or security algorithms, using the second set of parameters and/or security algorithms and the second The communication node performs communication; the information sent by the third communication node to the second communication node may be any information.
  • the third communication node when receiving the message sent by the first communication node or the second communication node, the third communication node starts to communicate with the first communication node by using the first set of parameters and/or security algorithms, using the second set of parameters and/or Or the security algorithm communicates with the second communication node;
  • the message sent by the first communication node or the second communication node received by the third communication node may be an indication message specifically for instructing to start using the new parameter and/or the security algorithm, Or any message, for example, the third communication node may pre-arrange to start to communicate with the first communication node by using the first set of parameters and/or security algorithms when receiving a certain message, using the second set of parameters.
  • a security algorithm communicates with the second communication node.
  • the third communication node accesses the second communication node, starts to communicate with the first communication node using the first set of parameters and/or security algorithms, using the second set of parameters and/or security algorithm and the second
  • the communication node performs communication; specifically, after receiving the parameter and/or the security algorithm, the third communication node is temporarily not used, and the third communication node starts to use the received parameter when accessing the second communication node. And / or security algorithms.
  • the third communication node begins to communicate with the first communication node using the first set of parameters and/or security algorithms when communicating with the second communication node, using the second set of parameters and/or security algorithms and the second The communication node performs communication; specifically, after receiving the parameter and/or the security algorithm, the third communication node is temporarily not used, and when the third communication node starts to communicate with the second communication node, starts to use the received Parameters and / or security algorithms.
  • the third communication node when the third communication node receives the first data packet sent by the second communication node, Communicating with the first communication node using the first set of parameters and/or security algorithms described above, and communicating with the second communication node using the second set of parameters and/or security algorithms; specifically, there are two cases, one After receiving the above parameters and/or security algorithms, the third communication node starts to use the above parameters and/or security algorithm when receiving the first data packet sent by the second communication node; The communication node receives the first data packet sent by the second communication node, and does not process it. After receiving the above parameters and/or the security algorithm, the communication node immediately starts using the parameter and/or the security algorithm for the first data packet. Process it.
  • the third communication node starts to use the first set of parameters after a preset time or after receiving the first set of parameters and/or security algorithms. And/or a security algorithm in communication with the first communication node, the third communication node using the second set of parameters and/or security within a preset time after or after receiving the second set of parameters and/or security algorithms
  • the algorithm communicates with the second communication node; in the specific implementation process, the timer can be used to implement.
  • the specific implementation process may not be limited to the above cases.
  • the third communications node may receive the first set of parameters and/or security algorithms and the second set of parameters and/or security algorithms sent by the first communications node, or receive the first sent by the first communications node. a set of parameters and/or security algorithms and a second set of parameters and/or security algorithms sent by the second communication node, the third communication node then communicating with the first communication node using the first set of parameters and/or security algorithms, using the The second set of parameters and/or security algorithms communicate with the second communication node, thereby enabling the MME to update the third communication node regardless of whether during the handover of the control plane and the user plane of the third communication node or during the handover process
  • the base station and the third communication node that communicate with the third communication node can acquire updated parameters and/or security algorithms in time to avoid the site communicating with the third communication node. And the third communication node cannot process the information in the communication process.
  • FIG. 2 is a schematic flowchart of a second embodiment of a cell optimization method according to the present invention.
  • the method is implemented as an MME. As shown in FIG. 2, the method includes:
  • the MME receives the request message sent by the first communications node.
  • the first communications node is the first communications node shown in the embodiment of FIG. 1.
  • the request message may include at least one of the following messages: the third communication node S1 interface identity code (ID) of the second communication node is used to identify the third corresponding to the S1 interface of the second communication node.
  • ID the third communication node S1 interface identity code
  • a communication node a third communication node S1 interface ID of the MME, used to identify a third communication node corresponding to the S1 interface of the MME;
  • the identifier of the node the protocol (Internet Protocol, IP address) of the communication between the networks of the second communication node; the identifier of the cell where the second communication node is located, for example, E-UTRAN-CGI; indication information, To indicate that the MME needs to allocate two sets of parameters and/or security algorithms, namely the first set of parameters and/or security algorithms and the second set of parameters and/or security algorithms described above.
  • S201 may perform selection according to a specific scenario. For example, in the non-handover process, when the MME actively requests the third communication node to update the used parameters and/or security algorithms, the step is not required to be performed.
  • the MME sends a first set of parameters and/or security algorithms and at least one set of second sets of parameters and/or security algorithms to the first communication node according to the request message.
  • the MME sends a first set of parameters and/or security algorithms and at least one set of second sets of parameters and/or security algorithms to the first communication node according to the request message.
  • the MME sends a first set of parameters and/or security algorithms to the first communication node according to the request message, and sends a corresponding second set of parameters and/or security algorithms to the at least one second communication node.
  • the MME sends a corresponding second set of parameters and/or security algorithms to each of the second communication nodes.
  • one of the above S202a and S202b is performed.
  • the first set of parameters and/or security algorithms are used by the first communication node to communicate with the third communication node
  • the second set of parameters and/or security algorithms are used for the second communication node and the third communication node.
  • the first communication node is a station that performs control plane signaling communication with the third communication node
  • the second communication node is a station that performs user plane data communication with the third communication node; or, the cell where the first communication node is located is And the primary cell of the third communication node, the cell where the second communication node is located is the secondary cell of the third communication node.
  • the MME may actively update parameters and/or security algorithms used by the third communication node, and may also send parameters and/or security algorithms to the first communication node and the second communication node according to the request message of the first communication node. And further forwarding to the third communication node, so that the first communication node, the second communication node and the third communication node can be informed of the corresponding parameters and/or security after updating the parameters and/or the security algorithm in any case.
  • the algorithm prevents the first communication node, the second communication node, and the third communication node from processing information for communication between them.
  • FIG. 3 is a schematic flowchart of Embodiment 3 of a cell optimization method according to the present invention. As shown in FIG. 3, the method includes:
  • the first communications node sends a request message to the MME, so that the MME is configured according to the request. Transmitting, by the first communication node, a first set of parameters and/or security algorithms and at least one set of second sets of parameters and/or security algorithms, or sending a first set of parameters and/or security algorithms to the first communication node, And transmitting a second set of parameters and/or security algorithms to the at least one second communication node.
  • the request message may include at least one of the following messages: the third communication node S1 interface identity code (ID) of the second communication node is used to identify the third corresponding to the S1 interface of the second communication node. a communication node; a third communication node S1 interface ID of the MME, used to identify a third communication node corresponding to the S1 interface of the MME; an identifier of the second communication node; and an interconnection between the networks of the second communication node Protocol (Internet Protocol) address information; an identifier of a cell in which the second communication node is located, for example, E-UTRAN-CGI; indication information, indicating that the MME needs to allocate two sets of parameters and/or security algorithms, that is, the foregoing The first set of parameters and/or security algorithms and the second set of parameters and/or security algorithms.
  • ID third communication node S1 interface identity code
  • the first communications node receives the first set of parameters and/or security algorithms sent by the MME, and at least one set of second set of parameters and/or security algorithms; when there are multiple second communications nodes, the MME needs to The second communication node assigns a corresponding second set of parameters and/or security algorithms.
  • the first communications node receives the first set of parameters and/or security algorithms sent by the MME, and performs the next execution in S302a or S302b according to a specific scenario.
  • the first communication node is a station that performs control plane signaling communication with the third communication node
  • the second communication node is a site that performs user plane data communication with the third communication node; or, it may be understood that the first communication node
  • the cell in which the communication node is located is the primary cell of the third communication node
  • the cell in which the second communication node is located is the secondary cell of the third communication node.
  • the first communication node may request the MME to send a parameter and/or a security algorithm, so that the MME sends the parameter and/or the security algorithm to the first communication node and the second communication node in time during the handover process. And causing the first communication node and the second communication node to forward the updated parameter and/or the security algorithm to the third communication node, preventing the first communication node, the second communication node, and the third communication node from being unable to process the communication when communicating Information between communications.
  • the first communication node receives the first set of parameters and the security algorithm sent by the MME and at least one set of the second set of parameters and/or security algorithms
  • the first communication node is at least A second communication node sends the corresponding second set of parameters and/or security algorithms, and sends a first set of parameters and/or security algorithms and the at least one set of second sets of parameters and/or security algorithms to the third communication node, So that each of the second communication node and the third communication node can use the updated Parameters and/or security algorithms communicate.
  • the first communication node After the first communication node receives the first set of parameters and/or security algorithms sent by the MME, the first communication node sends the first set of parameters and/or security algorithms to the third communication node.
  • the first communication node receives the first set of parameters and/or security algorithms and the second set of parameters and/or security algorithms sent by the MME, or the first communication node receives the first set of parameters sent by the MME. And/or after the security algorithm, the first communication node sends a message to the second communication node or the third communication node, so that the second communication node starts to use the second set of parameters and/or when receiving the message.
  • the security algorithm communicates with the third communication node to cause the third communication node to begin communicating with the first communication node using the first set of parameters and/or security algorithms upon receiving the message, using the second set of parameters And/or a security algorithm communicates with the second communication node.
  • the first communication node communicates with the third communication node according to the first set of parameters and/or security algorithms.
  • the foregoing security algorithm includes at least one of an encryption algorithm, a header compression algorithm, and an integrity protection algorithm; and the foregoing parameters include at least one of lengths of NCC, NH, C-RNTK PDCP sequence numbers.
  • the first communication node communicates with the third communication node according to the first set of parameters and/or security algorithms, and may specifically be at least one of the following processes:
  • the first communication node performs encryption and decryption processing on the information communicated with the third communication node according to the encryption algorithm, that is, the first communication node performs the third communication with the encryption algorithm according to the first set of parameters and/or the security algorithm.
  • the information that the node communicates is encrypted and decrypted.
  • the first communication node performs header compression or decompression compression processing on the information communicated with the third communication node according to the header compression algorithm, that is, the first communication node performs header compression according to the first set of parameters and/or security algorithms.
  • the algorithm performs header compression or decompression processing on the information communicated with the third communication node.
  • the first communication node performs integrity protection or de-integrity protection processing on the information communicated with the third communication node according to the integrity protection algorithm, that is, the first communication node is configured according to the first set of parameters and/or security algorithms.
  • the integrity protection algorithm performs integrity protection or de-integrity protection processing on the information communicated with the third communication node.
  • an execution body of the method is the foregoing second communication node, and the method includes: 5401.
  • the second communication node receives a parameter and/or a security algorithm sent by the first communication node or the MME, where the parameter and/or the security algorithm is the second set of parameters and/or the security algorithm.
  • the parameters and/or security algorithms are used to perform communication security related operations, such as but not limited to encryption and integrity protection, on the communicated data or information.
  • the security algorithm may be an encryption algorithm, such as eeaO, eeal, eea2, eea3-v1 1xy, etc., or may be an integrity protection algorithm, such as eia0-v920, eial, eia2, eia3-v1 1xy, etc., or may be a header.
  • the compression algorithm, the header compression algorithm is based on the ROHC architecture, and the header compression or decompression can be performed by using the algorithm and corresponding parameters. There are many specific header compression algorithms.
  • the type of the algorithm is defined by the identifier of the bucket. For example, 0x0002 indicates an algorithm identifier.
  • the specific header compression parameters may include Profile Identifier, MAX_CID, LARGE_CIDS, FEEDBACK-FOR, etc. However, it is not limited to this; the parameters may be, NCC, NH, PDCP layer serial number length, C-RNTI, etc., but not limited thereto.
  • the C-RNTI is an indication in the cell when the third communication node is in the connected state, and is used by the base station to conveniently schedule the third communication node by using the C-RNTI.
  • the second communication node communicates with the third communication node according to the parameter and/or the security algorithm. Specifically, it may be at least one of the following processes:
  • the second communication node performs encryption and decryption processing on the information that the third communication node performs communication according to the encryption algorithm
  • the second communication node performs header compression or decompression processing on the information communicated with the third communication node according to the header compression algorithm
  • the second communication node performs integrity protection or solution integrity protection on the information communicated with the third communication node according to the integrity protection algorithm.
  • the second communication node communicates with the third communication node according to the parameter and/or the security algorithm.
  • the parameter and/or the security algorithm there are various situations, as follows:
  • the second communication node starts to communicate with the third communication node using the above parameters and/or security algorithm when receiving the above parameters and/or security algorithms; it may be that the second communication node receives new parameters and/or The security algorithm starts using the above parameters and/or security algorithms directly.
  • the second communication node after receiving the parameter and/or the security algorithm, the second communication node does not use, and after receiving the message sent by the first communication node or the third communication node, starts using the parameter and/or the security algorithm.
  • Communicating with the third communication node the message may be specific for indicating the second
  • the communication node uses the above-mentioned parameter and/or the indication message of the security algorithm, and may also be any message sent by the first communication node or the third communication node to the second communication node; for example, the second communication node may be pre-agreed A certain message is used as an indication message or an activation message.
  • the first communication node may send a third communication node context release message to the second communication node, and the message is used to indicate the first
  • the second communication node releases the context of the third communication node, where the message is agreed as an indication message, that is, when the message is received, it is equivalent to receiving the indication message, and the second communication node starts to use the above parameters and/or security algorithm, but does not To this end, it may be other messages; after receiving the message, it means that the second communication node uses this as a starting point to start using parameters and/or security algorithms to process the information communicated with the third communication node.
  • a message sent by the first communication node or the third communication node to the second communication node may carry an indication information, for example, one of the bits is used to indicate whether to start using the above parameters and/or security algorithm;
  • the third communication node may send the message after accessing the first communication node, and the first communication node may send the parameter and/or the security algorithm to the second communication node or send the parameter and/or Or sending the above information to the second communication node after the security algorithm;
  • the second communication node may start to communicate with the third communication node at the same time as or after receiving the message, and start to communicate with the third communication node, which may be sent to the third communication node.
  • the message or the message sent by the third communication node is received.
  • the second communication node may start communicating with the third communication node using the parameters and/or security algorithms described above when initially communicating with the third communication node.
  • the second communication node starts communicating with the third communication node using the parameters and/or security algorithms.
  • the uplink synchronization means that, in the same cell, uplink signals sent by users at different locations in the same time slot arrive at the base station receiving antenna at the same time, that is, signals of different users in the same time slot arrive at the base station receiving antenna to maintain synchronization.
  • the third communication node Before the uplink synchronization is established, the third communication node must listen to the synchronization signal of the cell to obtain downlink synchronization, and the subsequent third communication node adjusts the timing offset to achieve uplink synchronization.
  • the second communication node may receive the first data sent by the first communication node.
  • communication with the third communication node is started using the parameters and/or security algorithms.
  • the second communication node starts to use the parameter and when receiving the first data packet sent by the first communication node.
  • a security algorithm in another case, the second communication node receives the first data packet sent by the first communication node, does not process it, and immediately starts using the parameter after receiving the above parameters and/or security algorithm.
  • a security algorithm processes the first packet described above.
  • the second communication node may also start to communicate with the third communication node by using the parameter and/or the security algorithm within a preset time after receiving the parameter and/or the security algorithm; , can be implemented by timer timing.
  • the second communication node may send an indication message for instructing to start using the above parameter and/or security algorithm to the third communication node, and start using the above parameter and/or security algorithm and the third when sending the indication message.
  • the communication node performs communication.
  • the parameter and/or the security algorithm may also be used after receiving the confirmation message that the third communication node replies to the indication message.
  • the foregoing indication message may also have multiple understanding manners, which is similar to the foregoing second case, and details are not described herein again.
  • the second communication node needs to decrypt or unpack the information sent by the third communication node.
  • the compression or de-integrity protection processing is performed, the original parameters and/or security algorithms are first used. If the decryption or de-head compression or the de-integrity protection fails, the above parameters and/or security algorithms are used to communicate with the third communication node. .
  • the specific implementation process may not be limited to the above cases.
  • FIG. 5 is a schematic flowchart of Embodiment 5 of a cell optimization method according to the present invention.
  • the MME sends a first set of parameters and/or security algorithms and at least one set to the first communication node.
  • the second set of parameters and/or security algorithm in this case, the specific interaction process of the MME, the first communication node, the second communication node, and the third communication node, as shown in FIG. 5, wherein the second communication node represents the at least one Any one of the second communication nodes, the method comprising:
  • the first communication node sends a request message to the MME.
  • This step is optional. During the handover process, this step can be performed. If the MME actively updates parameters and/or security algorithms, it is not necessary to perform this step.
  • the MME sends the first set of parameters and/or security to the first communications node according to the request message. Algorithm and second set of parameters and/or security algorithms.
  • the first communication node sends the second set of parameters and/or security algorithms to the second communication node.
  • the first communications node sends the first set of parameters and/or security algorithms and the second set of parameters and/or security algorithms to the third communications node.
  • S503 and S504 can be executed simultaneously.
  • the third communication node starts to use the first set of parameters and/or security algorithm and the second set of parameters and/or security algorithms, that is, the third communication node starts to use the first set of parameters and/or security algorithm pairs and the first
  • the communication node communicates with the second communication node using the second set of parameters and/or security algorithms described above.
  • the first communications node begins to use the first set of parameters and/or security algorithms described above, that is, the first communications node begins to communicate with the third communications node using the first set of parameters and/or security algorithms.
  • the second communication node begins to use the second set of parameters and/or security algorithms described above, that is, the second communication node begins to communicate with the third communication node using the second set of parameters and/or security algorithms.
  • S505, S506, and S507 can be executed simultaneously.
  • FIG. 6 is a schematic flowchart of Embodiment 6 of a cell optimization method according to the present invention.
  • the MME sends a first set of parameters and/or security algorithms to the first communication node, to at least one a specific interaction process between the MME, the first communication node, the second communication node, and the third communication node, where the second communication node sends a corresponding second set of parameters and/or security algorithms, as shown in FIG.
  • the two communication nodes represent any one of the at least one second communication node, the method comprising:
  • the first communication node sends a request message to the MME.
  • This step is optional. During the handover process, this step can be performed. If the MME actively updates parameters and/or security algorithms, it is not necessary to perform this step.
  • the MME sends a first set of parameters and/or security algorithms to the first communications node according to the request message.
  • the MME sends a second set of parameters and/or security algorithms to the second communications node according to the request message.
  • S602 and S603 can be performed simultaneously.
  • the first communications node sends a first set of parameters and/or security algorithms to the third communications node.
  • the second communication node sends a second set of parameters and/or security algorithms to the third communication node.
  • the third communication node starts to use the first set of parameters and/or security algorithm and the second set of parameters and/or security algorithms, that is, the third communication node starts to use the first set of parameters and/or the security algorithm pair and the first
  • the communication node communicates with the second communication node using the second set of parameters and/or security algorithms described above.
  • the first communication node starts to use the first set of parameters and/or security algorithms, that is, the first communication node starts to communicate with the third communication node by using the first set of parameters and/or security algorithms.
  • the second communications node begins to use the second set of parameters and/or security algorithms described above, that is, the second communications node begins to communicate with the third communications node using the second set of parameters and/or security algorithms.
  • S606, S607, S608 can be executed simultaneously.
  • the third communications node may receive the first set of parameters and/or security algorithms and the second set of parameters and/or security algorithms sent by the first communications node, or receive the first sent by the first communications node. a set of parameters and/or security algorithms and a second set of parameters and/or security algorithms sent by the second communication node, the third communication node then communicating with the first communication node using the first set of parameters and/or security algorithms, using the The second set of parameters and/or security algorithms communicate with the second communication node, thereby enabling the MME to update the third communication node regardless of whether during the handover of the control plane and the user plane of the third communication node or during the handover process
  • the base station and the third communication node that communicate with the third communication node can acquire updated parameters and/or security algorithms in time to avoid the site communicating with the third communication node. And the third communication node cannot process the information in the communication process.
  • FIG. 7 is a schematic structural diagram of Embodiment 1 of a communication node according to the present invention.
  • the communication node is the foregoing third communication node.
  • the communication node includes: a receiving module 701 and a communication module 702, where:
  • the receiving module 701 is configured to receive a first set of parameters and/or a security algorithm sent by the first communications node, and at least one set of second set of parameters and/or security algorithms; or receive the first set sent by the first communications node a parameter and/or security algorithm and a second set of parameters and/or transmitted by at least one second communication node Security algorithm
  • a communication module 702 configured to, by the third communications node, communicate with the first communications node using the first set of parameters and/or security algorithms, and perform the second set of parameters and/or security algorithms with the second communications node Communication
  • the first communication node is a station that performs control plane signaling communication with the third communication node
  • the second communication node is a site that performs user plane data communication with the third communication node; or,
  • the cell in which the first communication node is located is the primary cell of the third communication node, and the cell in which the second communication node is located is the secondary cell of the third communication node.
  • the third communications node may receive the first set of parameters and/or security algorithms and the second set of parameters and/or security algorithms sent by the first communications node, or receive the first sent by the first communications node. a set of parameters and/or security algorithms and a second set of parameters and/or security algorithms sent by the second communication node, the third communication node then communicating with the first communication node using the first set of parameters and/or security algorithms, using the The second set of parameters and/or security algorithms communicate with the second communication node to enable communication with the third communication node when the MME wants to update parameters and/or security algorithms used by the third communication node Both the node and the third communication node acquire updated parameters in time, avoiding that the communication node communicating with the third communication node and the third communication node cannot process the information in the communication process.
  • the foregoing security algorithm includes at least one of an encryption algorithm, a header compression algorithm, and an integrity protection algorithm; the foregoing parameters include a next hop connection counter NCC, a next hop NH, a cell radio network temporary identifier C-RNTI, a packet At least one of the lengths of the data aggregation layer protocol PDCP sequence number.
  • the communication module 702 can perform at least one of the following processes:
  • the communication module 702 is specifically configured to start to communicate with the first communication node by using the first set of parameters and/or security algorithms when receiving the first set of parameters and/or security algorithms, And the third communication node starts to communicate with the second communication node by using the second set of parameters and/or security algorithm when receiving the second set of parameters and/or security algorithms; or
  • the communication module 702 is specifically configured to: when the information is sent to the second communication node, start to communicate with the first communication node by using the first set of parameters and/or security algorithms, and use the second set of parameters and/or security algorithms Communicating with the second communication node; or
  • the communication module 702 is specifically configured to: when receiving the message sent by the first communication node or the second communication node, start to communicate with the first communication node by using the first set of parameters and/or security algorithms, and use the second set The parameter and/or security algorithm communicates with the second communication node; or
  • the communication module 702 is specifically configured to, when accessing the second communication node, start to communicate with the first communication node by using the first set of parameters and/or security algorithms, and use the second set of parameters and/or security algorithms. Communicating with the second communication node; or
  • the communication module 702 is specifically configured to start to communicate with the first communication node by using the first set of parameters and/or security algorithms when starting communication with the second communication node, using the second set of parameters and/or security algorithms Communicating with the second communication node; or
  • the communication module 702 is specifically configured to: when receiving the first data packet sent by the second communications node, start to use the first set of parameters and/or security algorithm to communicate with the first communications node, using the first Two sets of parameters and/or security algorithms communicate with the second communication node; or
  • the communication module 702 is specifically configured to start to communicate with the first communication node by using the first set of parameters and/or security algorithms within a preset time after or after receiving the first set of parameters and/or security algorithms.
  • the third communication node starts to communicate with the second communication node by using the second set of parameters and/or security algorithm within a preset time after or after receiving the second set of parameters and/or security algorithms. .
  • the foregoing modules may perform the method embodiment shown in FIG. 1, and details are not described herein again.
  • the third communications node may receive the first set of parameters and/or security algorithms and the second set of parameters and/or security algorithms sent by the first communications node, or receive the first sent by the first communications node. a set of parameters and/or security algorithms and a second set of parameters and/or security algorithms sent by the second communication node, the third communication node then communicating with the first communication node using the first set of parameters and/or security algorithms, using the The second set of parameters and/or security algorithms communicate with the second communication node, thereby enabling the MME to update the third communication node regardless of whether during the handover of the control plane and the user plane of the third communication node or during the handover process
  • you can make the third The base station that communicates with the communication node and the third communication node both acquire updated parameters and/or security algorithms in time, avoiding that the station communicating with the third communication node and the third communication node cannot process the information in the communication process.
  • FIG. 8 is a schematic structural diagram of Embodiment 1 of a mobility management entity according to the present invention. As shown in FIG. 8, the mobility management entity includes: a receiving module 801 and a sending module 802, where:
  • the receiving module 801 is configured to receive a request message sent by the first communications node.
  • the sending module 802 is configured to send, according to the request message, a first set of parameters and/or a security algorithm and at least one set of second set of parameters and/or security algorithms to the first communications node; or, according to the request message Transmitting, by the first communications node, the first set of parameters and/or security algorithms, and transmitting, to the at least one second communications node, a corresponding second set of parameters and/or security algorithms;
  • the first set of parameters and/or security algorithms are used by the first communication node to communicate with the third communication node, and the second set of parameters and/or security algorithms are used by the second communication node and the third communication node.
  • the first communication node is a station that performs control plane signaling communication with the third communication node
  • the second communication node is a site that performs user plane data communication with the third communication node; or, the The cell in which the communication node is located is the primary cell of the third communication node, and the cell in which the second communication node is located is the secondary cell of the third communication node.
  • the security algorithm includes at least one of an encryption algorithm, a header compression algorithm, and an integrity protection algorithm; the parameters include a next hop connection counter NCC, a next hop NH, and a cell wireless network temporary identifier C. - RNTL at least one of the lengths of the packet data convergence layer protocol PDCP sequence number.
  • Each of the above modules may perform the method embodiment shown in FIG. 2, and details are not described herein again.
  • the MME may actively update parameters and/or security algorithms used by the third communication node, and may also send parameters and/or security algorithms to the first communication node and the second communication node according to the request message of the first communication node. And further forwarding to the third communication node, so that the first communication node, the second communication node and the third communication node can be informed of the corresponding parameters and/or security after updating the parameters and/or the security algorithm in any case.
  • the algorithm prevents the first communication node, the second communication node, and the third communication node from processing information for communication between them.
  • FIG. 9 is a schematic structural diagram of a second embodiment of a communication node according to the present invention.
  • the communication node is the first communication node.
  • the communication node includes: a sending module 901 and a receiving module 902. among them:
  • the sending module 901 sends a request message to the mobility management entity MME, so that the MME sends a first set of parameters and/or security algorithms and at least one set of second parameters and/or to the first communication node according to the request message. Or a security algorithm, or transmitting the first set of parameters and/or security algorithms to the first communication node, and transmitting the second set of parameters and/or security algorithms to at least one second communication node;
  • the receiving module 902 is configured to receive a first set of parameters and/or a security algorithm and a second set of parameters and/or security algorithms sent by the MME; or receive a first set of parameters and/or security algorithms sent by the MME.
  • the first communication node is a station that performs control plane signaling communication with the third communication node
  • the second communication node is a site that performs user plane data communication with the third communication node; or
  • the cell in which the first communication node is located is the primary cell of the third communication node, and the cell in which the second communication node is located is the secondary cell of the third communication node.
  • FIG. 10 is a schematic structural diagram of Embodiment 3 of a communication node according to the present invention. As shown in FIG. 10, on the basis of FIG. 9, the communication node further includes: a communication module 903, where:
  • the sending module 901 performs different tasks in different scenarios:
  • the sending module 901 is further configured to: after receiving, by the receiving module, the first set of parameters and the security algorithm sent by the MME, and the at least one second set of parameters and/or security algorithms, to the at least one second communications node Transmitting the corresponding second set of parameters and/or security algorithms, and transmitting the first set of parameters and/or security algorithms and the at least one set of second sets of parameters and/or security algorithms to the third communication node.
  • the sending module 901 is further configured to: after the receiving module receives the first set of parameters and/or security algorithms sent by the MME, send the first set of parameters and/or security algorithms to the third communications node.
  • the sending module 901 is configured to send a message to the second communications node or the third communications node, so that the second communications node starts using the second set of parameters and/or when receiving the message.
  • the security algorithm communicates with the third communication node to cause the third communication node to begin processing the information communicated with the first communication node using the first set of parameters and/or security algorithms upon receiving the message, using the A second set of parameters and/or security algorithms communicate with the second communication node.
  • the communication module 903 is configured to communicate with the third communication node according to the first set of parameters and/or security algorithms.
  • the security algorithm includes at least one of an encryption algorithm, a header compression algorithm, and an integrity protection algorithm; the parameters include a next hop connection counter NCC, a next hop NH, and a small
  • the area wireless network temporarily identifies at least one of the lengths of the C-RNTL packet data convergence layer protocol PDCP sequence number.
  • the communication module 903 is specifically configured to perform at least one of the following processes:
  • FIG. 11 is a schematic structural diagram of Embodiment 4 of a communication node according to the present invention.
  • the communication node is the second communication node.
  • the communication node includes: a receiving module 110 and a communication module 120, where:
  • the receiving module 110 is configured to receive a parameter and/or a security algorithm sent by the first communications node or the MME, where the parameter and/or the security algorithm is the second set of parameters and/or the security algorithm.
  • the communication module 120 is configured to communicate with the third communication node according to the foregoing parameters and/or security algorithms; specifically, it may be at least one of the following processes:
  • the communication module 120 is specifically configured to: when the second communication node receives the parameter and/or the security algorithm, start to communicate with the third communication node by using the parameter and/or the security algorithm; or the second communication node is receiving After the above parameters and/or security algorithms are not used, after receiving the message sent by the first communication node or the third communication node, the parameter and/or the security algorithm are used to communicate with the third communication node; or ,
  • the second communication node begins to communicate with the third communication node using the above parameters and/or security algorithm when initially communicating with the third communication node; or
  • the second communication node When the third communication node accesses the second communication node, the second communication node starts to communicate with the third communication node using the above parameters and/or security algorithms; or When the third communication node is uplink-synchronized with the second communication node, starting to communicate with the third communication node by using the foregoing parameter and/or security algorithm; or
  • the second communication node may also start to communicate with the third communication node by using the parameter and/or the security algorithm within a preset time after receiving the parameter and/or the security algorithm; or Transmitting, by the third communication node, an indication message for instructing to start using the foregoing parameter and/or the security algorithm, and starting to communicate with the third communication node by using the foregoing parameter and/or security algorithm when transmitting the indication message; or
  • the second communication node does not preset and does not receive any indication message after receiving the above parameters and/or security algorithm, the second communication node needs to decrypt or decompress the information sent by the third communication node or When the integrity protection process is processed, the original parameters and/or security algorithms are used first. If the decryption or decompression or de-integrity protection fails, the above parameters and/or security algorithms are used to communicate with the third communication node.
  • the third communications node may receive the first set of parameters and/or security algorithms and the second set of parameters and/or security algorithms sent by the first communications node, or receive the first sent by the first communications node. a set of parameters and/or security algorithms and a second set of parameters and/or security algorithms sent by the second communication node, the third communication node then communicating with the first communication node using the first set of parameters and/or security algorithms, using the The second set of parameters and/or security algorithms communicate with the second communication node, thereby enabling the MME to update the third communication node regardless of whether during the handover of the control plane and the user plane of the third communication node or during the handover process
  • the base station and the third communication node that communicate with the third communication node can acquire updated parameters and/or security algorithms in time to avoid the site communicating with the third communication node. And the third communication node cannot process the information in the communication process.
  • Another embodiment of the present invention further provides a communication node, where the communication node is the foregoing third communication node, including: a receiver and a processor, where:
  • a receiver configured to receive a first set of parameters and/or a security algorithm sent by the first communication node, and at least a second set of parameters and/or security algorithms; or receive a first set of parameters sent by the first communication node And/or a security algorithm and a second set of parameters and/or security algorithms sent by the at least one second communication node;
  • a processor configured to communicate with the first communication node using the first set of parameters and/or security algorithms, and to communicate with the second communication node using the second set of parameters and/or security algorithms.
  • the first communication node is a station that performs control plane signaling communication with the third communication node
  • the second communication node is a site that performs user plane data communication with the third communication node
  • the cell in which the first communication node is located is the primary cell of the third communication node, and the cell in which the second communication node is located is the secondary cell of the third communication node.
  • the security algorithm includes at least one of an encryption algorithm, a header compression algorithm, and an integrity protection algorithm; the parameters include a next hop connection counter NCC, a next hop NH, a cell radio network temporary identifier C-RNTL packet data aggregation. At least one of the lengths of the layer protocol PDCP sequence number.
  • the processor is specifically configured to perform at least one of the following processes:
  • An integrity protection or de-integrity protection process is performed on the information communicated with the first communication node and/or the second communication node in accordance with the integrity protection algorithm.
  • the processor is further configured to, when receiving the first set of parameters and/or security algorithms, start to communicate with the first communication node by using the first set of parameters and/or security algorithms, where the third Upon receiving the second set of parameters and/or security algorithms, the communication node begins to communicate with the second communication node using the second set of parameters and/or security algorithms; or
  • the second communication node Upon receiving a message sent by the first communication node or the second communication node, starting to communicate with the first communication node using the first set of parameters and/or security algorithms, using the second set of parameters and/or security algorithms and The second communication node performs communication; or
  • the third communication node Equivalently communicating with the first communication node using the first set of parameters and/or security algorithms after a preset time or after receiving the first set of parameters and/or security algorithms, the third communication node
  • the second set of parameters and/or security algorithms are used to communicate with the second communication node within a preset time after or after receiving the second set of parameters and/or security algorithms.
  • Another embodiment of the present invention further provides a mobility management entity, including: a receiver and a transmitter, where:
  • a receiver configured to receive a request message sent by the first communications node
  • a transmitter configured to send, according to the request message, a first set of parameters and/or a security algorithm and at least one set of second set of parameters and/or security algorithms to the first communication node; or, according to the request message Transmitting, by the first communication node, the first set of parameters and/or security algorithms, and sending a corresponding second set of parameters and/or security algorithms to the at least one second communication node;
  • the first set of parameters and/or security algorithms are used by the first communication node to communicate with the third communication node, and the second set of parameters and/or security algorithms are used by the second communication node and the third communication node.
  • the first communication node is a station that performs control plane signaling communication with the third communication node
  • the second communication node is a site that performs user plane data communication with the third communication node; or, the The cell in which the communication node is located is the primary cell of the third communication node, and the cell in which the second communication node is located is the secondary cell of the third communication node.
  • the security algorithm includes at least one of an encryption algorithm, a header compression algorithm, and an integrity protection algorithm; the parameters include a next hop connection counter NCC, a next hop NH, a cell radio network temporary identifier C-RNTI, and packet data. At least one of the lengths of the convergence layer protocol PDCP sequence number.
  • Another embodiment of the present invention further provides a communication node, where the communication node is the first communication node, and the communication node includes: a transmitter, a receiver, and a processor, where: a transmitter, configured to send a request message to the mobility management entity MME, to enable the MME to send a first set of parameters and/or a security algorithm and at least one set of second parameters to the first communication node according to the request message And/or a security algorithm, or transmitting the first set of parameters and/or security algorithms to the first communication node, and transmitting the second set of parameters and/or security algorithms to at least one second communication node;
  • a transmitter configured to send a request message to the mobility management entity MME, to enable the MME to send a first set of parameters and/or a security algorithm and at least one set of second parameters to the first communication node according to the request message And/or a security algorithm, or transmitting the first set of parameters and/or security algorithms to the first communication node, and transmitting the second set of parameters and/or
  • the first communication node is a station that performs control plane signaling communication with the third communication node, and the second communication node is a site that performs user plane data communication with the third communication node; or
  • the cell in which the first communication node is located is the primary cell of the third communication node, and the cell in which the second communication node is located is the secondary cell of the third communication node.
  • the transmitter sends the at least one of the second communications
  • the node transmits the corresponding second set of parameters and/or security algorithms and transmits the first set of parameters and/or security algorithms and the at least one set of second sets of parameters and/or security algorithms to the third communication node.
  • the transmitter sends the first set of parameters and/or security algorithms to the third communication node.
  • the receiver receives the first set of parameters and/or security algorithms sent by the MME and at least one second set of parameters and/or security algorithms, or the first communication node receives the first sent by the MME.
  • the transmitter is further configured to: send a message to the second communication node or the third communication node, to enable the second communication node to start using the message when receiving the message.
  • a second set of parameters and/or security algorithms are in communication with the third communication node to cause the third communication node to begin communicating with the first communication node using the first set of parameters and/or security algorithms upon receiving the message
  • the information is processed and communicated with the second communication node using the second set of parameters and/or security algorithms.
  • the receiver Receiving, by the receiver, a first set of parameters and/or a security algorithm sent by the MME, and at least one set of second set of parameters and/or security algorithms, or the first communication node receives the first set of parameters sent by the MME and After the security algorithm, the processor is configured to use the first set of parameters and/or security algorithms and The three communication nodes communicate.
  • the security algorithm includes at least one of an encryption algorithm, a header compression algorithm, and an integrity protection algorithm; the parameters include a next hop connection counter NCC, a next hop NH, and a cell wireless network temporary identifier C. - RNTL at least one of the lengths of the packet data convergence layer protocol PDCP sequence number.
  • the processor is further configured to perform at least one of the following processes: 1) performing encryption and decryption processing on information communicated with the third communication node according to the encryption algorithm; 2) performing a header compression algorithm according to the header compression algorithm The information communicated by the three communication nodes is subjected to header compression or decompression compression processing; 3) performing integrity protection or de-integrity protection processing on the information communicated with the third communication node according to the integrity protection algorithm.
  • the aforementioned program can be stored in a computer readable storage medium.
  • the program when executed, performs the steps including the foregoing method embodiments; and the foregoing storage medium includes: a medium that can store program codes, such as a ROM, a RAM, a magnetic disk, or an optical disk.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Un mode de réalisation de la présente invention concerne un dispositif et un procédé d'optimisation de cellule, le procédé comprenant les étapes suivantes : un troisième noeud de communication reçoit un premier ensemble de paramètres et/ou un algorithme de sécurité et un deuxième ensemble de paramètres et/ou un algorithme de sécurité transmis par un premier noeud de communication ; en variante, le troisième noeud de communication reçoit le premier ensemble de paramètres et/ou un algorithme de sécurité transmis par le premier noeud de communication, et le deuxième ensemble de paramètres et/ou un algorithme de sécurité transmis par au moins un deuxième noeud de communication ; et le troisième noeud de communication utilise le premier ensemble de paramètres et/ou l'algorithme de sécurité pour communiquer avec le premier noeud de communication et utilise le deuxième ensemble de paramètres et/ou l'algorithme de sécurité pour communiquer avec le deuxième noeud de communication. Lorsqu'un paramètre et/ou un algorithme de sécurité utilisé par un troisième noeud de communication est mis à jour, le mode de réalisation de la présente invention permet de garantir que les noeuds de communication en communication avec le troisième noeud de communication peuvent tous acquérir en temps opportun les paramètres mis à jour, ce qui permet d'éviter le problème posé par le fait que le troisième noeud de communication et les noeuds de communication en communication avec ce troisième noeud de communication ne peuvent pas traiter des informations au cours d'une communication.
PCT/CN2014/070864 2013-01-18 2014-01-20 Dispositif et procédé d'optimisation de cellule WO2014111049A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310019263.2 2013-01-18
CN201310019263.2A CN103945420B (zh) 2013-01-18 2013-01-18 小区优化方法及装置

Publications (1)

Publication Number Publication Date
WO2014111049A1 true WO2014111049A1 (fr) 2014-07-24

Family

ID=51192851

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/070864 WO2014111049A1 (fr) 2013-01-18 2014-01-20 Dispositif et procédé d'optimisation de cellule

Country Status (2)

Country Link
CN (1) CN103945420B (fr)
WO (1) WO2014111049A1 (fr)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110475243B (zh) * 2018-05-11 2020-10-30 电信科学技术研究院有限公司 Ue能力信息的上报、获取和处理方法及对应装置
WO2019214625A1 (fr) * 2018-05-11 2019-11-14 电信科学技术研究院有限公司 Procédés de compte rendu, d'obtention et de traitement d'informations de capacités d'ue et appareils correspondants

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102348244A (zh) * 2010-08-03 2012-02-08 华为技术有限公司 蜂窝通信系统、终端在小区间切换的方法及宏基站
CN102883441A (zh) * 2011-07-15 2013-01-16 华为技术有限公司 一种无线宽带通信方法,装置和系统

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101475349B1 (ko) * 2008-11-03 2014-12-23 삼성전자주식회사 이동 통신 시스템에서 단말 보안 능력 관련 보안 관리 방안및 장치
CN102883440B (zh) * 2011-07-15 2015-11-25 华为技术有限公司 一种无线宽带通信方法,装置和系统
CN102740289B (zh) * 2012-06-15 2015-12-02 电信科学技术研究院 一种密钥更新方法、装置及系统

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102348244A (zh) * 2010-08-03 2012-02-08 华为技术有限公司 蜂窝通信系统、终端在小区间切换的方法及宏基站
CN102883441A (zh) * 2011-07-15 2013-01-16 华为技术有限公司 一种无线宽带通信方法,装置和系统

Also Published As

Publication number Publication date
CN103945420B (zh) 2017-11-17
CN103945420A (zh) 2014-07-23

Similar Documents

Publication Publication Date Title
US11337271B2 (en) Apparatus and method for providing communication based on device-to-device relay service in mobile communication system
KR102463290B1 (ko) 차세대 이동통신 시스템에서 네트워크 소모 전력을 효과적으로 절감시키는 방법 및 장치
US10660008B2 (en) Data transmission system, method, and apparatus
CN109088714B (zh) 用于传递安全密钥信息的系统和方法
WO2019062996A1 (fr) Procédé, appareil, et système de protection de sécurité
US20180368194A1 (en) Terminal device, network device, and data transmission method
KR102460648B1 (ko) 이용되는 보안 키들에 영향을 주는 연결 재구성의 일부로서 베어러 특정 변경들을 구현하기 위한 방법 및 장치
EP3220673B1 (fr) Procédé de commande de communication, terminal d'utilisateur, station de base cellulaire et point d'accès
TW201735715A (zh) 用於中繼傳輸的方法和裝置以及中繼終端設備
TWI657679B (zh) 處理系統間行動中的封包資料流的裝置及方法
US11889301B2 (en) Security verification when resuming an RRC connection
WO2014094564A1 (fr) Procédé et dispositif de commutation
WO2014094663A1 (fr) Procédé et dispositif d'optimisation de cellules
EP3396981B1 (fr) Procédé de transmission de paramètres de sécurité et dispositif associé
JP2021027585A (ja) ワイヤレス通信システムにおけるサイドリンク無線ベアラを解放するための方法及び装置
WO2018202131A1 (fr) Procédé, dispositif et système de communication
WO2017117804A1 (fr) Dispositif de terminal, dispositif de réseau d'accès, procédé de configuration d'interface radio et système de communication sans fil
US20220345883A1 (en) Security key updates in dual connectivity
WO2014127699A1 (fr) Procédé, équipement et système pour établir un chemin de communication directe
WO2023154401A1 (fr) Gestion des configurations radio pour la transmission de petites données
US20240172176A1 (en) Managing downlink early data transmission
WO2023154445A1 (fr) Gestion de configurations radio pour un équipement utilisateur
WO2014111049A1 (fr) Dispositif et procédé d'optimisation de cellule
US20230086337A1 (en) Methods, infrastructure equipment and wireless communications networks
US20160249215A1 (en) Communication control method, authentication server, and user terminal

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14740831

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14740831

Country of ref document: EP

Kind code of ref document: A1