WO2014184938A1 - 端末装置、通信システム及び通信制御プログラム - Google Patents
端末装置、通信システム及び通信制御プログラム Download PDFInfo
- Publication number
- WO2014184938A1 WO2014184938A1 PCT/JP2013/063724 JP2013063724W WO2014184938A1 WO 2014184938 A1 WO2014184938 A1 WO 2014184938A1 JP 2013063724 W JP2013063724 W JP 2013063724W WO 2014184938 A1 WO2014184938 A1 WO 2014184938A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- encryption
- unit
- level
- processing unit
- terminal
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/18—Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/24—Negotiation of communication capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/67—Risk-dependent, e.g. selecting a security level depending on risk profiles
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Definitions
- the present invention relates to a terminal device, a communication system, and a communication control program.
- encryption / decryption processing using a predetermined encryption key / encryption method is performed in order to protect information from threats such as eavesdropping and modification by a third party. That is, on the transmission side, before inputting information on a wired or wireless transmission path, the information is encrypted using a predetermined encryption key / encryption method. On the receiving side, encrypted information output from a wired or wireless transmission path is received, and the information is decrypted using a predetermined encryption key (decryption key) / encryption method.
- Patent Literature 1 in wireless communication between a mobile body equipped with wireless communication means and a wireless base station, an encryption key used for encryption / decryption processing of communication data is used to maintain communication security strength. Technologies that update in conjunction with driving have been proposed.
- Patent Literature 2 when content such as video and audio is transmitted / received via a network, every time content to be transmitted is switched in order to avoid damage expansion when an encryption key is decrypted by a third party during transmission, Alternatively, a technique has been proposed in which an encryption method used for content encryption / decryption processing is changed every time content of a predetermined time or a predetermined size is transmitted.
- Patent Document 3 the computing resource is exhausted due to the load of encryption / decryption processing, and the communication state that changes every time is acquired every time data is transmitted for the purpose of preventing deterioration of communication quality due to data delay and loss.
- Patent Document 4 proposes a technique for selecting an encryption algorithm that can be used based on the remaining battery capacity and the scheduled communication time when a user transmits data to a counterpart device using a communication application.
- LTE 3rd Generation Partnership Project Radio Access Network Long Term Evolution
- PDCP corresponding to the sublayer of layer 2 of the protocol stack
- Encryption / decryption processing is performed in the (Packet Data Convergence Protocol) layer.
- a terminal device is a base station device that uses a Capability list that indicates the capability of the own terminal for the encryption method that can be processed by the own terminal among these three encryption methods. (It may be abbreviated as “base station” in the following) to notify the MME (Mobility Management Entity).
- the MME selects any one of the encryption methods included in the Capability list notified from the terminal and instructs the terminal.
- the terminal that has received the instruction encrypts data in the PDCP layer by the encryption method determined by the MME and transmits the encrypted data to the base station.
- the MME compares the encryption method that can be processed by the base station with the encryption methods included in the Capability list from the terminal, and selects, for example, the encryption method with the highest confidentiality from among the encryption methods that can be processed by both. To do. That is, when the terminal is compatible with the three encryption schemes SNOW-3G, AES, and KASUMI, the MME selects SNOW-3G with the highest confidentiality. Conventionally, the encryption method selected in this way is not switched to another encryption method during the connection between the terminal and the base station. In other words, conventionally, the encryption method that can be processed by the terminal is selected by the MME with the largest amount of computation and power consumption, and after the selected encryption method is connected (attached) between the terminal and the base station. It is used permanently until it is disconnected (detached).
- encryption may be further performed in a layer higher than the PDCP layer.
- VoIP Voice over Internet Protocol
- IPsec Security Architecture for Internet Protocol
- encryption / decryption processing may be performed in a plurality of layers (for example, a lower layer such as a PDCP layer and an upper layer such as an IP layer).
- a lower layer such as a PDCP layer
- an upper layer such as an IP layer.
- the interface specification between nodes or layers is defined in the standard specification, so that the specification change of the interface between nodes or layers is rigid. I can say that. Even if the change of the standard specification is realized, there is a concern that the number of devices to be corrected for conforming to the standard specification after the change increases, resulting in an increase in development cost. In addition, the change in the implementation of the upper layer such as the application layer tends to increase the number of programs to be installed, which may cause an increase in development cost.
- the disclosed technique has been made in view of the above, and an object of the present invention is to provide a terminal, a communication system, and a communication control program that can save power in encryption processing.
- the terminal device that performs the first encryption in the upper layer of the protocol stack including the upper layer and the lower layer while performing the second encryption in the lower layer depends on the state of the terminal device. 2. Decide the encryption level of encryption, and send a notification of the determined encryption level to the base station.
- FIG. 1 is a diagram illustrating an example of a configuration of a communication system according to the first embodiment.
- FIG. 2 is a functional block diagram illustrating the main configuration of the terminal according to the first embodiment.
- FIG. 3 is a functional block diagram illustrating the main configuration of the base station according to the first embodiment.
- FIG. 4 is a functional block diagram illustrating the main configuration of the MME according to the first embodiment.
- FIG. 5 is a diagram for explaining the encryption level according to the first embodiment.
- FIG. 6 is a diagram illustrating an example of the threshold value table according to the first embodiment.
- FIG. 7 is a flowchart for explaining the processing operation of the terminal according to the first embodiment.
- FIG. 8 is a diagram illustrating an example of the configuration of the terminal according to the second embodiment.
- FIG. 9A is a sequence diagram illustrating an example of a processing operation of the communication system according to the third embodiment.
- FIG. 9B is a sequence diagram illustrating an example of a processing operation of the communication system according to the third embodiment.
- FIG. 10A is a sequence diagram illustrating an example of a processing operation of the communication system according to the fourth embodiment.
- FIG. 10B is a sequence diagram illustrating an example of a processing operation of the communication system according to the fourth embodiment.
- FIG. 11 is a sequence diagram illustrating an example of a processing operation of the communication system according to the fifth embodiment.
- FIG. 12A is a sequence diagram illustrating an example of a processing operation of the communication system according to the sixth embodiment.
- FIG. 12B is a sequence diagram illustrating an example of a processing operation of the communication system according to the sixth embodiment.
- FIG. 13A is a sequence diagram illustrating an example of a processing operation of the communication system according to the seventh embodiment.
- FIG. 13B is a sequence diagram illustrating an example of a processing operation of the communication system according to the seventh embodiment.
- FIG. 14A is a sequence diagram illustrating an example of a processing operation of the communication system according to the eighth embodiment.
- FIG. 14B is a sequence diagram illustrating an example of a processing operation of the communication system according to the eighth embodiment.
- FIG. 14C is a sequence diagram illustrating an example of a processing operation of the communication system according to the eighth embodiment.
- FIG. 15 is a functional block diagram illustrating the main configuration of the terminal according to the ninth embodiment.
- an LTE communication system will be described as an example.
- a communication system to which the disclosed technology is applicable is not limited to an LTE communication system.
- the disclosed technology can also be applied to other communication systems such as UMTS (Universal Mobile Telecommunications System).
- FIG. 1 is a diagram illustrating an example of a configuration of a communication system according to the first embodiment.
- the communication system 1 includes a terminal 2, a base station 3, and an MME 4.
- FIG. 2 is a functional block diagram illustrating the main configuration of the terminal according to the first embodiment.
- the terminal 2 includes a first layer processing unit 2a, a second layer processing unit 2c, an encryption level determination unit 2e, a notification signal generation unit 2f, a transmission unit 2g, an antenna 2h, and a reception unit. 2i.
- the first layer processing unit 2a includes a primary encryption processing unit 2b and a secondary decryption processing unit 2k
- the second layer processing unit 2c includes a secondary encryption processing unit 2d and a primary decryption processing unit 2j.
- the first layer processing unit 2a performs processing based on the protocol of the first layer of the protocol stack.
- the primary encryption processing unit 2b can perform encryption in the first layer, that is, primary encryption, on the data input to the first layer processing unit 2a on the transmission side.
- the secondary decoding processing unit 2k can perform decoding in the first layer, that is, secondary decoding, on the data input to the first layer processing unit 2a on the receiving side.
- the second layer processing unit 2c performs processing based on the protocol of the second layer of the protocol stack.
- the secondary encryption processing unit 2d can perform encryption in the second layer, that is, secondary encryption, on the data input to the second layer processing unit 2c on the transmission side.
- the primary decoding processing unit 2j can perform decoding in the second layer, that is, primary decoding, on the data input to the second layer processing unit 2c on the receiving side.
- data may be encrypted redundantly in both the first layer and the second layer.
- the first layer may be any layer above the second layer, and the second layer may be any layer below the first layer. That is, the first layer corresponds to the upper layer, and the second layer corresponds to the lower layer.
- a network layer is mentioned as the first layer
- a PDCP layer is mentioned as the second layer.
- the transport layer or higher may be set as the upper layer, and less than the transport layer, that is, the IP layer or lower may be set as the lower layer.
- the encryption level determination unit 2e acquires the “terminal state” and the threshold value, and in accordance with the terminal state, the encryption level of the secondary encryption processing unit 2d and the primary decryption processing unit 2j Determine the decoding level.
- the decryption level of the primary decryption processing unit 2j is the same level as the encryption level of the secondary encryption processing unit 2d.
- the encryption level determination unit 2e outputs the determined encryption level to the notification signal generation unit 2f.
- terminal state refers to various states that the terminal 2 can detect.
- the wireless quality between the terminal 2 and the base station 3 the number of Redirections, the operating rate of the processor provided in the terminal 2, the packet discard rate, the number of handovers caused by the handover command, and the like can be mentioned.
- the notification signal generation unit 2f generates a notification signal for notifying the encryption level determined by the encryption level determination unit 2e (hereinafter sometimes referred to as “encryption level notification signal”), and the transmission unit 2g Output to. That is, the notification signal generation unit 2f generates and transmits an encryption level notification signal so that the possibility that the encryption level determined by the encryption level determination unit 2e is finally determined by the MME 4 is higher than usual. To part 2g. For example, an encryption level notification signal indicating that the terminal 2 is a terminal that supports only the encryption method related to the determined encryption level is output to the transmission unit 2g. Since the encryption level is a kind of terminal capability of the terminal 2, the notification signal generation unit 2f may notify the encryption level as terminal capability information.
- the transmission unit 2g receives the data input via the first layer processing unit 2a and the second layer processing unit 2c and the encryption level notification signal input from the notification signal generation unit 2f via the antenna 2h. 3 to send.
- the base station 3 transfers the received encryption level notification signal to the MME 4.
- the MME 4 finally determines the encryption levels of the terminal 2 and the base station 3 based on the encryption level notified by the encryption level notification signal, and information on the determined encryption level (hereinafter referred to as “encryption level”).
- Information (sometimes referred to as “information”) to the terminal 2 via the base station 2.
- the encryption level of terminal 2 is the same level as the decryption level of base station 3, and the decryption level of terminal 2 is the same level as the encryption level of base station 3.
- the receiving unit 2i receives the encryption level information determined by the MME 4 via the antenna 2h, and outputs the received encryption level information to the encryption level determining unit 2e.
- the receiving unit 2i outputs data received from the base station 3 via the antenna 2h to the second layer processing unit 2c.
- the encryption level determination unit 2e sets the encryption level finally determined by the MME 4 in the secondary encryption processing unit 2d based on the input encryption level information. Also, the encryption level determination unit 2e sets a decryption level of the same level as the encryption level set in the secondary encryption processing unit 2d in the primary decryption processing unit 2j. The encryption level determination unit 2e activates the encryption / decryption module corresponding to the set level, while reducing the power consumption of the encryption / decryption module not corresponding to the set level by stopping the supply of the operation clock.
- the encryption level determination unit 2e may set the encryption level and the decryption level determined according to the state of the terminal in the secondary encryption processing unit 2d and the primary decryption processing unit 2j. In this case, since the encryption level information is not required to set the encryption level and the decryption level for the secondary encryption processing unit 2d and the primary decryption processing unit 2j, the encryption level determination unit 2e Level information may be discarded.
- FIG. 3 is a functional block diagram illustrating the main configuration of the base station according to the first embodiment.
- the base station 3 includes an antenna 3a, a receiving unit 3b, a second layer processing unit 3c, a first layer processing unit 3e, a core network interface unit 3g, an encryption level setting unit 3h, a control It has a signal generator 3k and a transmitter 3l.
- the first layer processing unit 3e includes a primary encryption processing unit 3i and a secondary decryption processing unit 3f
- the second layer processing unit 3c includes a secondary encryption processing unit 3j and a primary decryption processing unit 3d.
- the receiving unit 3b outputs the data received from the terminal 2 via the antenna 3a to the second layer processing unit 3c.
- the receiving unit 3b outputs the encryption level notification signal received from the terminal 2 via the antenna 3a to the core network interface unit 3g.
- the second layer processing unit 3c performs processing based on the protocol of the second layer of the protocol stack.
- the primary decoding processing unit 3d can perform decoding in the second layer, that is, primary decoding, on the data input to the second layer processing unit 3c on the receiving side.
- the secondary encryption processing unit 3j can perform encryption in the second layer, that is, secondary encryption, on the data input to the second layer processing unit 3c on the transmission side.
- the first layer processing unit 3e performs processing based on the protocol of the first layer of the protocol stack.
- the secondary decoding processing unit 3f can perform decoding in the first layer, that is, secondary decoding, on the data input to the first layer processing unit 3e on the receiving side.
- the primary encryption processing unit 3i can perform encryption in the first layer, that is, primary encryption, on the data input to the first layer processing unit 3e on the transmission side.
- data may be redundantly encrypted in both the first layer and the second layer, as with the terminal 2.
- the core network interface unit 3g transmits the data input from the first layer processing unit 3e and the encryption level notification signal input from the receiving unit 3b to the MME 4. Further, the core network interface unit 3g outputs the encryption level information received from the MME 4 to the encryption level setting unit 3h and the transmission unit 3l, and outputs the data received from the MME 4 to the first layer processing unit 3e.
- the encryption level setting unit 3h sets the encryption level finally determined by the MME 4 in the secondary encryption processing unit 3j based on the input encryption level information. Also, the encryption level setting unit 3h sets a decryption level of the same level as the encryption level set in the secondary encryption processing unit 3j in the primary decryption processing unit 3d. The encryption level setting unit 3h activates the encryption / decryption module corresponding to the set level, while reducing the power consumption of the encryption / decryption module not corresponding to the set level by stopping the supply of the operation clock.
- the control signal generator 3k generates various control signals for the terminal 2 and outputs them to the transmitter 3l.
- the transmission unit 31 transmits the control signal input from the control signal generation unit 3k, the encryption level information input from the core network interface unit 3g, and the data input from the second layer processing unit 3c via the antenna 3a. To the terminal 2.
- FIG. 4 is a functional block diagram illustrating the main configuration of the MME according to the first embodiment.
- the MME 4 includes a core network interface unit 4a, a data processing unit 4b, and an encryption level determining unit 4c.
- the core network interface unit 4a is connected to the core network interface unit 4a of the base station 3, and outputs the data received from the base station 3 to the data processing unit 4b, and the data input from the data processing unit 4b to the base station 3 to send.
- the core network interface unit 4a outputs the encryption level notification signal received from the base station 3 to the encryption level determination unit 4c, and transmits the encryption level information input from the encryption level determination unit 4c to the base station 3. Send.
- the data processing unit 4b performs various processes on the core network side for the input data.
- the encryption level determination unit 4c finally determines the encryption levels of the terminal 2 and the base station 3 based on the encryption level notified by the encryption level notification signal, and transmits the encryption level information to the core network interface unit. Output to 4a.
- FIG. 5 is a diagram for explaining the encryption level according to the first embodiment.
- the terminal 2 can use three encryption schemes of SNOW-3G, AES, and KASUMI in the capability of the terminal 2.
- the SNOW-3G is 10K
- AES is 5.4K
- KASUMI is 3.7K.
- SNOW-3G is 10,000 znfy
- AES is 5400 znfy
- KASUMI is 3700 znfy.
- “z” is the number of basic calls per gate
- “n” is power consumption per basic call
- “f” is the maximum frequency [MHz]
- “y” is the operation rate [W]. Therefore, the power consumption of SNOW-3G is 2.7 times that of AES, and the power consumption of AES is 1.5 times that of KASUMI.
- the confidentiality of each encryption method is higher in the order of SNOW-3G, AES, and KASUMI. That is, since the encryption method with higher secrecy has a larger amount of calculation, power consumption is larger.
- an encryption level is assigned to each encryption method according to the level of confidentiality, that is, the power consumption. That is, level 1 is assigned to KASUMI, level 2 is assigned to AES, and level 3 is assigned to SNOW-3G in order of increasing confidentiality. Furthermore, encryption is not performed in the secondary encryption processing unit 2d, that is, level 0 is given to “no encryption”. In other words, in this embodiment, the higher the encryption level, the higher the secrecy and the greater the power consumption.
- the following threshold values are set for each encryption level.
- FIG. 6 is a diagram illustrating an example of the threshold value table according to the first embodiment.
- packet discard rate “processor operating rate”, “redirection count”, and “wireless quality” are parameters indicating “terminal state”.
- the encryption level determination unit 2e receives these parameters and obtains the threshold value of each parameter from the threshold table.
- each parameter will be described.
- ⁇ Wireless quality> An example of wireless quality is RSRP (Reference Signal Received Power) at the terminal 2.
- the radio quality between the terminal 2 and the base station 3 is usually better as RSRP is larger and worse as RSRP is smaller. Therefore, in this embodiment, the encryption level is further lowered as the RSRP becomes smaller.
- the terminal 2 may be referred to as “handover” (hereinafter abbreviated as “HO”) for switching the connection destination to another base station other than the base station 3. ) Is likely to occur, the demand for electric power required for the HO processing increases.
- handover hereinafter abbreviated as “HO”
- the fact that the RSRP at the terminal 2 is small means that the radio quality of the uplink is not good as well as the downlink, so the transmission power of the terminal 2 when the RSRP is small May be performed to increase transmission power. Therefore, in this embodiment, the smaller the RSRP, that is, the worse the radio quality, the lower the encryption level.
- the encryption level determination unit 2e sets the encryption level to level 3 (SNOW-3G) when RSRP is ⁇ 75 dBm or more, and to level when RSRP is ⁇ 90 dBm or more and less than ⁇ 75 dBm. 2 (AES).
- the encryption level determination unit 2e determines the encryption level to be level 1 (KASUMI) when RSRP is ⁇ 105 dBm or more and less than ⁇ 90 dBm, and to level 0 (no encryption) when it is less than ⁇ 105 dBm. .
- KASUMI level 1
- 0 no encryption
- Redirection is transmitted from the base station 3 to the terminal 2 when the base station 3 leads the terminal 2 from the base station 3 to another base station forcibly, regardless of a request from the terminal 2.
- the base station 3 transmits Redirection
- the terminal 2 receives Redirection from the base station 3, the terminal 2 is forced to HO to other base stations other than the base station 3.
- the encryption level is further lowered as the number of redirections is increased.
- the encryption level determination unit 2e sets the encryption level to level 3 (SNOW-3G), level 2 (AES), or level. 1 (KASUMI) is determined. At this time, any one of the levels 1 to 3 is determined based on parameters other than the number of redirection times.
- the encryption level determination unit 2e determines the encryption level to be level 0 (no encryption) when the number of redirection times is 5 or more per minute. As a result, as the number of redirections increases, the power consumption of encryption in the secondary encryption processing unit 2d can be further reduced, and the reduced power can be allocated to the HO process.
- the encryption level determination unit 2e sets the encryption level to level 3 (SNOW-3G) when the processor operation rate is less than 25%, and when it is 25% or more and less than 50%. Is determined to be level 2 (AES).
- the encryption level determination unit 2e sets the encryption level to level 1 (KASUMI) when the processor operation rate is 50% or more and less than 80%, and to level 0 (no encryption) when it is 80% or more. decide. Thereby, the higher the processor operating rate, the lower the power consumption of encryption in the secondary encryption processing unit 2d.
- ⁇ Packet discard rate> As a case where the downlink packet received by the terminal 2 is discarded, there is a case where a CRC (Cyclic Redundancy Check) result of the downlink packet becomes NG due to deterioration of radio quality. Further, as a case where the uplink packet transmitted from the terminal 2 is discarded, there is a case where the CRC result of the uplink packet becomes NG inside the terminal 2 due to the loss of synchronization in the terminal 2. When the packet is discarded in this way, the terminal 2 performs the packet retransmission process, and the demand for power necessary for the retransmission process increases.
- CRC Cyclic Redundancy Check
- a process of transmitting a NACK (Negative ACKnowledgement) to the base station 3 is performed, and when an uplink packet is discarded, a process of resending the uplink packet to the base station 3 Is done.
- NACK Negative ACKnowledgement
- the fact that the CRC result of the downlink packet is NG is assumed that the radio quality of the uplink is also bad as well as the downlink, and therefore when the CRC result is NG, the transmission power of the terminal 2 May be performed to increase transmission power. Therefore, in this embodiment, the higher the packet discard rate, the lower the encryption level. For example, as shown in FIG.
- the encryption level determination unit 2e sets the encryption level to level 3 (SNOW-3G) when the packet discard rate is less than 25%, and when it is 25% or more and less than 50%. Is determined to be level 2 (AES). Also, the encryption level determination unit 2e sets the encryption level to level 1 (KASUMI) when the packet discard rate is 50% or more and less than 75%, and to level 0 (no encryption) when 75% or more. decide. Thereby, as the packet discard rate is higher, the power consumption of encryption in the secondary encryption processing unit 2d can be further reduced, and the reduced power can be allocated to the retransmission process or the increase of transmission power.
- FIG. 7 is a flowchart for explaining the processing operation of the terminal according to the first embodiment.
- the encryption level determination unit 2e stands by until each of the above parameters, that is, the terminal state is acquired (step S71: No).
- the encryption level determination unit 2e acquires the terminal state (step S71: Yes)
- the encryption level determination unit 2e acquires the threshold value of each parameter representing the terminal state from the threshold value table (FIG. 6) (step S72).
- the encryption level determination unit 2e determines the encryption level by determining the threshold value of each parameter, and outputs the determined encryption level to the notification signal generation unit 2f (steps S73 and S74). ).
- the notification signal generation unit 2f generates an encryption level notification signal (step S75), and the transmission unit 2g transmits the encryption level notification signal (step S76).
- the receiving unit 2i receives the encryption level information indicating the encryption level finally determined by the MME 4 from the base station 3 (step S77).
- the encryption level determination unit 2e sets the encryption level of the secondary encryption processing unit 2d and the decryption level of the primary decryption processing unit 2j based on the encryption level information received in step S77 (step S78). ).
- the primary encryption processing unit 2b performs encryption in the first layer of the protocol stack
- the secondary encryption processing unit 2d Perform layer encryption.
- the encryption level determination unit 2e determines the encryption level of encryption in the second layer according to the state of the terminal 2. If encryption is performed in the first layer, confidentiality can be maintained even if the encryption level in the second layer is lower than the highest encryption level that the terminal 2 can process. Therefore, when the first layer and the second layer can be encrypted twice, the encryption level of the encryption in the second layer can be made lower than the highest encryption level that the terminal 2 can process. Therefore, it is possible to save power in the encryption process.
- FIG. 8 is a diagram illustrating an example of the configuration of the terminal according to the second embodiment.
- the terminal 2 includes an application CPU 10, a control CPU 20, a memory 40, an L1 (Layer 1) processing unit 31, an RF circuit 50, and an antenna 60.
- the application CPU 10 includes a user application processing unit 11, a transport layer processing unit 13, an interface layer processing unit 14, and a network interface layer processing unit 16.
- the user application processing unit 11 includes an encryption / decryption processing unit 12, and the interface layer processing unit 14 includes an encryption / decryption processing unit 15.
- the control CPU 20 includes a network interface processing unit 21, a state detection unit 22, an encryption level determination unit 23, an RRC (Radio Resource Control) unit 24, a PDCP layer processing unit 25, and a data integration layer processing unit 30.
- the PDCP layer processing unit 25 includes a C-Plane (control plane) processing unit 26 and a U-Plane (user plane) processing unit 28.
- the C-Plane processing unit 26 transmits the encryption / decryption processing unit 27 to the U-Plane processing unit 27.
- the -plane processing unit 28 includes an encryption / decryption processing unit 29.
- each encryption / decryption processing unit can perform decryption processing on the encrypted received data at the decryption level set by the encryption level determination unit 23.
- the user application processing unit 11 processes user data such as VoIP data and streaming data generated by each user application started in the terminal 2, that is, U-Plane data.
- the encryption / decryption processing unit 12 can encrypt U-Plane data generated by each user application.
- the transport layer processing unit 13 processes U-Plane data according to each protocol of TCP (Transmission Control Protocol) and UDP (User Datagram Protocol).
- TCP Transmission Control Protocol
- UDP User Datagram Protocol
- the interface layer processing unit 14 processes the U-Plane data in accordance with IP (Internet Protocol).
- IP Internet Protocol
- the encryption / decryption processing unit 15 can perform encryption at the interface layer.
- the transport layer processing unit 13 or the like may be used. It may be mounted on the processing unit.
- the network interface processing units 16 and 21 perform interface processing between the application CPU 10 and the control CPU 20 in accordance with PPP (Point-to-Point Protocol).
- PPP Point-to-Point Protocol
- the state detection unit 22 detects various states of the terminal 2, that is, the terminal state, and outputs the detected state to the encryption level determination unit 23.
- the encryption level determination unit 23 corresponds to the encryption level determination unit 2e in FIG. 2, and determines the encryption levels of the encryption / decryption processing units 27 and 29 according to the terminal state.
- the RRC unit 24 corresponds to the notification signal generation unit 2f in FIG. 2, and generates and analyzes data for controlling the radio channel, that is, C-Plane data.
- One of the C-Plane data is an encryption level notification signal.
- the RRC unit 24 generates an encryption level notification signal for notifying the encryption level determined by the encryption level determination unit 23, and outputs it to the C-Plane processing unit 26. That is, the RRC unit 24 generates an encryption level notification signal so that the possibility that the encryption level determined by the encryption level determination unit 23 is finally determined by the MME 4 is higher than usual, and the C-Plane is generated.
- the data is output to the processing unit 26.
- an encryption level notification signal indicating that the terminal 2 is a terminal that supports only the encryption method related to the determined encryption level is output to the C-Plane processing unit 26. Since the encryption level is a kind of terminal capability of the terminal 2, the RRC unit 24 may notify the encryption level as terminal capability information.
- the RRC unit 24 executes processing specified in 3GPP TS36.331. For example, the RRC unit 24 executes broadcast, paging, RRC connection management, RB (Resource Block) control, movement management, measurement result report, and the like.
- the PDCP layer processing unit 25 executes processes specified in 3GPP TS36.323 such as header compression and encryption / decryption processing. *
- the C-Plane processing unit 26 converts the C-Plane data into a wireless communication format.
- the encryption / decryption processing unit 27 can encrypt the C-Plane data.
- the U-Plane processing unit 28 converts U-Plane data into a wireless communication format.
- the encryption / decryption processing unit 29 can encrypt the U-Plane data.
- the data integration layer processing unit 30 integrates the C-Plane data and the U-Plane data into the assigned radio frame.
- the data integration layer processing unit 30 performs MAC (Medium Access Control) processing and RLC (Radio Link Control) processing. That is, the data integration layer processing unit 30 executes layer 2 processing defined in 3GPP TS36.321 such as error detection and mapping of various channels as MAC processing.
- the data integration layer processing unit 30 executes layer 2 processing defined in 3GPP TS36.322, such as line establishment between the terminal 2 and the base station 3 and ARQ (Automatic repeat-request) processing as RLC processing. To do.
- the L1 processing unit 31 performs processing specified in 3GPP TS36.302, TS36.101, TS36.211, TS36.212, TS36.213, and TS36.214.
- the L1 processing unit 31 encodes and modulates C-Plane data and U-Plane data, which are physical channel data, and outputs a baseband signal to the RF circuit 50.
- the L1 processing unit 31 is realized by, for example, a DSP (Digital Signal Processor).
- the RF circuit 50 corresponds to the transmission unit 2 g in FIG. 2, converts the baseband signal into a radio signal, and transmits the radio signal via the antenna 60.
- the antenna 60 corresponds to the antenna 2h in FIG.
- the memory 40 is, for example, RAM such as SDRAM, ROM, flash memory, or the like.
- the U-Plane data is sent from the user application processing unit 11 to the data integration layer processing unit 30 via the transport layer processing unit 13, interface layer processing unit 14, network interface layer processing units 16 and 21, and U-Plane processing unit 28. Is input.
- the C-Plane data is input from the RRC unit 24 to the data integration layer processing unit 30 via the C-Plane processing unit 26.
- the user application processing unit 11 or an interface layer processing unit 14 as a processing unit capable of encryption in the first layer. That is, the user application processing unit 11 or the interface layer processing unit 14 corresponds to the first layer processing unit 2a in FIG. Therefore, the encryption / decryption processing unit 12 or the encryption / decryption processing unit 15 corresponds to the primary encryption processing unit 2b and the secondary decryption processing unit 2k in FIG. That is, the primary encryption processing unit 2b in FIG. 2 can encrypt only the U-Plane data out of the U-Plane data and the C-Plane data, and the secondary decryption processing unit in FIG. 2k can decode only U-Plane data out of U-Plane data and C-Plane data.
- the PDCP layer processing unit 25 as a processing unit capable of encryption in the second layer. That is, the PDCP layer processing unit 25 corresponds to the second layer processing unit 2c in FIG. Therefore, the encryption / decryption processing units 27 and 29 correspond to the secondary encryption processing unit 2d and the primary decryption processing unit 2j in FIG. 2 as one encryption / decryption processing unit. That is, the secondary encryption processing unit 2d in FIG. 2 can encrypt both C-Plane data and U-Plane data, and the primary decryption processing unit 2j in FIG. It is possible to perform decoding on both the Plane data and the U-Plane data.
- U-Plane data may be encrypted twice in the first and second layers, while C-Plane data is only encrypted in the second layer. Therefore, according to the present embodiment, the degree of secrecy can be made different between U-Plane data and C-Plane data.
- the U-Plane data can be double-encrypted in the first layer and the second layer, so that the confidentiality of the U-Plane data can be made higher than the confidentiality of the C-Plane data.
- the encryption level determination unit 23 also encrypts the encryption level in the encryption / decryption processing unit 27, that is, the encryption level of the C-Plane data, and the encryption level in the encryption / decryption processing unit 29, that is, the U-Plane data.
- the encryption levels may be determined independently of each other. Thereby, in the PDCP layer, two encryption levels, that is, the encryption level of C-Plane data and the encryption level of U-Plane data can be made different.
- the encryption level determination unit 23 determines the encryption level of the encryption / decryption processing unit 29 based on the above parameters according to the state of the terminal 2, while the encryption level of the encryption / decryption processing unit 27 is determined by the terminal. You may decide according to 2 capability.
- the encryption level determination unit 23 determines the encryption level of the encryption / decryption processing unit 27, that is, the encryption level of the C-Plane data to the highest level allowed by the capability of the terminal 2. That is, when there are four encryption levels shown in FIG. 6, the encryption level of C-Plane data is determined to be level 3 (SNOW-3G).
- the encryption level of the second layer of U-Plane data is lowered below the maximum level while the encryption level of the C-Plane data that can only be encrypted at the second layer is kept constant at the highest level. Can do.
- the C-Plane processing unit 26 and the data integration layer processing unit 30 exist between the RRC unit 24 and the L1 processing unit 31.
- the description of the C-Plane processing unit 26 and the data integration layer processing unit 30 is omitted for the sake of brevity.
- the C-Plane data from the RRC unit 24 is input to the L1 processing unit 31 via the C-Plane processing unit 26 and the data integration layer processing unit 30.
- the RF circuit 50 and the antenna 60 exist after the L1 processing unit 31.
- the description of the RF circuit 50 and the antenna 60 is omitted for the sake of brevity. Also in the third to eighth embodiments, data from the LI processing unit 31 is transmitted to the base station 3 via the RF circuit 50 and the antenna 60.
- 9A and 9B are sequence diagrams illustrating an example of processing operations of the communication system according to the third embodiment. 9A and 9B show a sequence at the start of communication.
- connection request is input to the RRC unit 24 via the transport layer processing unit 13, the interface layer processing unit 14, and the network interface layer processing units 16 and 21.
- connection request When the connection request is input to the RRC unit 24 (step S101), the RRC unit 24 outputs the connection request to the L1 processing unit 31 via the PDCP layer processing unit 25 and the data integration layer processing unit 30 (step S102).
- the L1 processing unit 31 transmits a connection request as an rrcConnectionRequest to the base station 3 via the RF circuit 50 and the antenna 60 (step S103).
- the base station 3 transmits rrcConnectionSetup to the terminal 2 (step S104).
- the L1 processing unit 31 measures RSRP (step S105), and outputs ⁇ 80 dBm of the measurement result to the RRC unit 24 via the data integration layer processing unit 30 and the PDCP layer processing unit 25, and the RRC unit 24 outputs the measurement result to the state detection unit 22 (step S106).
- the encryption level determination unit 23 acquires RSRP threshold information from the threshold table (FIG. 6) stored in the memory 40 (step S108). In addition, the encryption level determination unit 23 acquires the Redirection count stored in the variable area of the memory 40 (Step S109), and acquires threshold information on the Redirection count from the threshold table (Step S110). At the start of communication, the Redirection count is 0.
- the encryption level determination unit 23 determines the encryption level to be level 2 (AES) (step S111). The encryption level determination unit 23 notifies the determined encryption level to the RRC unit 24 (step S112).
- the RRC unit 24 receives the notification of the encryption level, the RRC unit 24 generates rrcConnectionSetupComplete indicating that the encryption method that can be processed with the capability of the terminal 2 (UE) is only level 2 AES for both C-Plane and U-Plane,
- the data is output to the L1 processing unit 31 via the PDCP layer processing unit 25 and the data integration layer processing unit 30 (step S114).
- the L1 processing unit 31 transmits rrcConnectionSetupComplete to the base station 3 via the RF circuit 50 and the antenna 60 (step S115).
- the conventional terminal notifies the MME via the base station of an encryption method that can be processed by the terminal among the three encryption methods of SNOW-3G, AES, and KASUMI. For this reason, the conventional terminal sometimes designates a plurality of encryption methods in the UE network Capability list included in rrcConnectionSetupComplete. In contrast, the UE network Capability list included in the rrcConnectionSetupComplete generated by the RRC unit 24 of the terminal 2 specifies only one of the above three encryption methods determined by the encryption level determination unit 23. Not. For example, in the example shown in FIG. 9, only the AES flag among the three flags SNOW-3G, AES, and KASUMI is set to “ON” for both C-Plane and U-Plane. This UEnetwork Capability list corresponds to the above-mentioned “encryption level notification signal”.
- the base station 3 that has received the rrcConnectionSetupComplete transfers the UE network Capability list to the MME 4 as terminal information and notifies it (step S116).
- Level 2 is determined (step S117).
- the MME 4 transmits a Security Mode Command indicating that the finally determined encryption level is level 2 (AES) to the base station 3 (step S118).
- This Security Mode Command corresponds to the above “Encryption Level Information”.
- the base station 3 transfers the Security Mode Command received from the MME 4 to the terminal 2 (step S119).
- the L1 processing unit 31 outputs the Security Mode Command received via the antenna 60 and the RF circuit 50 to the RRC unit 24 via the data integration layer processing unit 30 and the PDCP layer processing unit 25 (step S120). ).
- the RRC unit 24 notifies the encryption level determination unit 23 that the content of the Security Mode Command, that is, the encryption level finally determined by the MME 4 is level 2 (AES) (step S121).
- the encryption level determination unit 23 sets the encryption level of the encryption / decryption processing units 27 and 29 to level 2 (AES) according to the notification in step S121, and activates the AES accelerator of the encryption processing units 27 and 29 ( Step S122).
- AES level 2
- the RRC unit 24 having received the Security Mode Command in step S120 outputs the Security Mode Complete to the L1 processing unit 31 via the PDCP layer processing unit 25 and the data integration layer processing unit 30 (step S123), and L1 The processing unit 31 transmits Security Mode Complete to the base station 3 via the RF circuit 50 and the antenna 60 (step S124).
- the base station 3 that has received the Security Mode Complete transfers the Security Mode Complete to the MME 4 (Step S125).
- the MME 4 transmits an AES setting instruction to the base station 3 (step S126).
- This setting instruction corresponds to the “encryption level information” described above.
- the base station 3 sets the encryption level of the base station 3 to level 2 (AES) according to the setting instruction from the MME 4 (step S127).
- 10A and 10B are sequence diagrams illustrating an example of processing operations of the communication system according to the fourth embodiment. 10A and 10B are sequences that follow the sequence of FIGS. 9A and 9B.
- the base station 3 transmits a Release including Redirection to the terminal 2 (step S201).
- the L1 processing unit 31 outputs Release command data obtained by analyzing Release, that is, Redirection to the RRC unit 24 (step S202).
- the RRC unit 24 to which the Redirection is input adds “1” to the number of Redirections per minute, writes the number of Redirections after the addition in the variable area of the memory 40 (Step S203), and the occurrence of Redirection is detected by the state detection unit 22 (Step S204).
- the state detection unit 22 detects the occurrence of Redirection as the state of the terminal 2, and notifies the encryption level determination unit 23 of the occurrence of Redirection (step S205).
- the encryption level determination unit 23 notified of the occurrence of Redirection acquires threshold information on the number of times of redirection from the threshold table (FIG. 6) stored in the memory 40 (step S206). Further, the encryption level determination unit 23 acquires the number of redirections per minute stored in the variable area of the memory 40 (step S207). Here, the number of times of redirection is less than 5 times per minute. Therefore, the encryption level determination unit 23 sets the determination of the number of redirections to “OK” and maintains level 2 (AES) determined in FIGS. 9A and 9B according to parameters other than the number of redirections, here RSRP (step S208). .
- AES level 2
- the processing in steps S209 to S215 is the same as the processing in steps S201 to S207. However, it is assumed that the number of redirections is 5 or more per minute by counting the number of redirections in step S211. Therefore, the encryption level determination unit 23 sets the determination of the number of redirections to “NG”, and determines the encryption level to be level 0 (no encryption) (step S216). The encryption level determination unit 23 notifies the RRC unit 24 of an encryption change request for “encryption stop” (step S217).
- the RRC unit 24 receives the encryption change request, the RRC unit 24 outputs the release request information whose factor is “Other cause” to the L1 processing unit 31 via the PDCP layer processing unit 25 and the data integration layer processing unit 30 (step S219).
- the L1 processing unit 31 transmits rrcConnectionRelease (Other cause) to the base station 3 via the RF circuit 50 and the antenna 60 (step S220).
- the RRC unit 24 and the L1 processing unit 31 enter the idle mode.
- the L1 processing unit 31 that has returned from the idle mode transmits an rrcConnectionRequest to the base station 3 via the RF circuit 50 and the antenna 60 (step S221).
- the base station 3 transmits rrcConnectionSetup to the terminal 2 (step S222).
- the encryption level determination unit 23 notifies the RRC unit 24 of level 0 (no encryption) that is the encryption level determined in step S216 (step S223).
- the RRC unit 24 Upon receiving the notification of the encryption level, the RRC unit 24 generates rrcConnectionSetupComplete indicating that the encryption level is level 0 (no encryption) for both C-Plane and U-Plane, and the PDCP layer processing unit 25 and the data integration The data is output to the L1 processing unit 31 via the layer processing unit 30 (step S224).
- the L1 processing unit 31 transmits rrcConnectionSetupComplete to the base station 3 via the RF circuit 50 and the antenna 60 (Step S225).
- the base station 3 that has received the rrcConnectionSetupComplete transfers the UE network Capability list to the MME 4 as terminal information and notifies it (step S116).
- Level 0 (no encryption) is determined (step S226).
- steps S118 to S120 in FIGS. 10A and 10B is the same as that in FIG.
- the RRC unit 24 notifies the encryption level determination unit 23 that the content of the Security Mode Command, that is, the encryption level finally determined by the MME 4 is level 0 (no encryption) (step S227). .
- the encryption level determination unit 23 stops the encryption in the encryption / decryption processing units 27 and 29 in accordance with the notification in step S227 (step S228).
- steps S123 to S125 in FIGS. 10A and 10B is the same as that in FIG.
- the MME 4 having transferred Security Mode Complete from the base station 3 transmits an encryption stop instruction to the base station 3 (step S229).
- This stop instruction corresponds to the “encryption level information” described above.
- the base station 3 stops encryption at the base station 3 in accordance with the stop instruction from the MME 4 (step S230).
- FIG. 11 is a sequence diagram illustrating an example of a processing operation of the communication system according to the fifth embodiment.
- FIG. 11 is a sequence that follows the sequence of FIGS. 9A and 9B.
- the base station 3 transmits the HO command to the terminal 2 and receives the HO command via the antenna 60 and the RF circuit 50.
- the unit 31 outputs this HO command to the RRC unit 24 via the data integration layer processing unit 30 and the PDCP layer processing unit 25.
- the RRC unit 24 When the HO command is input, the RRC unit 24 adds “1” to the number of HOs per fixed time, and writes the number of HOs after the addition in the variable area of the memory 40 (step S302).
- the L1 processing unit 31 measures RSRP (step S303), and uses the measurement result of ⁇ 100 dBm as the data integration layer processing unit 30 and the PDCP layer processing. It outputs to the RRC part 24 via the part 25, and the RRC part 24 outputs this measurement result to the state detection part 22 (step S304).
- the encryption level determination unit 23 acquires the threshold information of the HO count from the threshold table stored in the memory 40 (step S306). Also, the encryption level determination unit 23 acquires the number of HOs per fixed time stored in the variable area of the memory 40 (step S307).
- the encryption level determination unit 23 compares the number of HOs per fixed time with a threshold value. If the number of HOs is equal to or greater than the threshold value, the encryption level is not changed even if RSRP changes. The change request is not output (step S308).
- the terminal 2 that has received the HO command switches the connection destination to another base station with better radio quality other than the base station 3.
- HO resulting from the HO command is performed based on the radio quality.
- the terminal 2 is expected to be located in the vicinity of the cell boundary between the plurality of base stations. For this reason, the encryption level may frequently change. If the encryption level is frequently changed, the processing after step S219 in FIG. 10A is frequently repeated, leading to an increase in power consumption of the terminal 2. For this reason, when the number of HOs is equal to or greater than the threshold value, the encryption level is not changed, thereby preventing frequent changes in the encryption level and reducing power consumption.
- Example 6 12A and 12B are sequence diagrams illustrating an example of processing operations of the communication system according to the sixth embodiment. 12A and 12B are sequences that follow the sequence of FIGS. 9A and 9B.
- the L1 processing unit 31 receives U-Plane data from the base station 3 via the antenna 60 and the RF circuit 50 (step S401).
- the L1 processing unit 31 performs CRC processing on the U-Plane data, and outputs the CRC result to the RRC unit 24 via the data integration layer processing unit 30 and the PDCP layer processing unit 25 (step S402).
- the RRC unit 24 having received the CRC result obtains a packet discard rate from the CRC result and outputs it to the state detection unit 22 (step S403).
- the state detection unit 22 detects the packet discard rate as the state of the terminal 2, and outputs the detection result to the encryption level determination unit 23 (step S404).
- the encryption level determination unit 23 determines a threshold value for the packet discard rate (step S406). Here, it is assumed that the packet discard rate is 75% or more. Therefore, the encryption level determination unit 23 determines the encryption level to be level 0 (no encryption).
- the subsequent processing is the same as the processing after step S217 in FIGS. 10A and 10B.
- Example 7 are sequence diagrams illustrating an example of processing operations of the communication system according to the seventh embodiment. 13A and 13B are sequences that follow the sequence of FIGS. 9A and 9B.
- the state detection unit 22 detects the operation rate of each processor as the state of the terminal 2, and determines the maximum value of the plurality of operation rates or the average value of the plurality of operation rates to the encryption level determination unit 23 as a detection result. Output (step S507).
- the encryption level determination unit 23 that has received the processor operation rate acquires the threshold value information of the processor operation rate from the threshold value table (FIG. 6) stored in the memory 40 (step S508).
- the encryption level determination unit 23 determines the threshold value of the processor operation rate (step S509). If the maximum value among the three operating rates 70%, 80%, and 80% is the detection result of the state detecting unit 22, the encryption level determining unit 23 has a processor operating rate of 80% or more. The encryption level is determined to be level 0 (no encryption).
- the subsequent processing is the same as the processing after step S217 in FIGS. 10A and 10B.
- Example 8 14A to 14C are sequence diagrams illustrating an example of processing operations of the communication system according to the eighth embodiment.
- the sequences shown in FIGS. 14A to 14C are roughly divided into a sequence related to C-Plane and a sequence related to U-Plane. 14A to 14C, the sequence between the base station 3 and the MME 4 is omitted for the sake of brevity.
- the sequence in the eighth embodiment between the base station 3 and the MME 4 is the same as in the third to seventh embodiments.
- step S600 the base station 3 returns a connection setup instruction in response to the connection request from the RRC unit 24, and a connection setup response is transmitted from the RRC unit 24.
- This connection setup response includes a Capability list.
- encryption and authentication are performed in C-Plane (encryption / authentication ON), and an encryption level is selected in U-Plane (encryption level ON).
- the Capability list includes a terminal 2 state confirmation process performed by the state detection unit 22 and the encryption level determination unit 23, and a security type determination process performed by the encryption level determination unit 23 and the RRC unit 24. Is generated according to
- step S601 in response to the C-Plane authentication request from the base station 3, the RRC unit 24 and the encryption level determination unit 23 determine the C-Plane authentication type, and the determination result is a C-Plane authentication request response. It is transmitted to the base station 3.
- the process between the terminal 2 and the base station 3 in step S601 corresponds to a C-Plane Integrity Session.
- step S602 in response to the C-Plane security mode request from the base station 3, the encryption level determination unit 23 and the RRC unit 24 perform encryption level determination processing, and a security mode response including the determination result is transmitted to the base station. 3 is transmitted.
- the period of step S602 is a C-Plane authentication protection period, and the process between the terminal 2 and the base station 3 in step S602 corresponds to a C-Plane Ciphering Session.
- step S603 The period after step S603 is the C-Plane encryption protection period, and therefore all the C-Plane data is encrypted during the period after step S603.
- step S603 in response to the U-Plane security mode request from the base station 3, the encryption level determination unit 23 and the RRC unit 24 perform encryption level determination processing, and a security mode response including the determination result is transmitted to the base station. 3 is transmitted.
- the process between the terminal 2 and the base station 3 in step S603 corresponds to a U-Plane Ciphering Session.
- step S604 the base station 3 issues a C-Plane attach completion notification and a U-Plane bearer generation instruction, and the terminal 2 transmits a U-Plane bearer generation completion notification to the base station 3.
- the RRC unit 24 performs RRC connection and outputs a U-Plane bearer generation completion notification to the application CPU 10.
- step S605 streaming data is input to the encryption / decryption processing unit 29 from the application CPU 10 that has received the U-Plane bearer generation completion notification, and the encryption / decryption processing unit 29 encrypts the streaming data.
- the encrypted data is transmitted to the base station 3 as U-Plane radio data packets # 1 to #n.
- the encryption level determination unit 23 to which the operation rate of the application CPU 10 is input determines the threshold value of the CPU operation rate.
- the encryption level in U-Plane is determined to be level 0 (no encryption) as a result of the threshold determination. Therefore, the encryption level determination unit 23 stops the encryption of the U-Plane data in the encryption / decryption processing unit 29.
- the RRC unit 24 that has received a C-Plane release request from the base station 3 idles the RRC.
- step S606 the RRC unit 24 that has received the notification of U-Plane data generation from the application CPU 10 outputs a connection request to the base station 3.
- the base station 3 transmits a connection setup instruction to the terminal 2.
- a connection setup response is transmitted from the RRC unit 24.
- This connection setup response includes a Capability list.
- the Capability list here, encryption and authentication are performed in C-Plane (encryption / authentication ON), and encryption is not performed in U-Plane (encryption OFF). Therefore, the U-Plane encryption protection period ends when the base station 3 receives this connection setup response. Therefore, U-Plane data is not encrypted in the period after step S607.
- the Capability list is used to check the state of the terminal 2 performed by the state detection unit 22 and the encryption level determination unit 23, and to determine the security type performed by the encryption level determination unit 23 and the RRC unit 24. Generated according to the process.
- a U-Plane security mode request is transmitted from the base station 3 to the terminal 2.
- the base station 3 receives from the terminal 2 a connection setup response instructing not to perform U-Plane encryption. Therefore, in order to return the content of the instruction in the connection up response to the terminal 2 as it is, the base station 3 does not perform notification of the same content as the connection setup response received from the terminal 2, that is, does not encrypt the U-Plane. Is transmitted to the terminal 2.
- a security mode response is transmitted from the terminal 2 to the base station 3.
- the RRC unit 24 performs RRC connection and outputs a U-Plane bearer generation completion notification to the application CPU 10.
- the process between the terminal 2 and the base station 3 in step S607 corresponds to a U-Plane Ciphering Session.
- step S608 the streaming data is input to the U-Plane processing unit 28 (FIG. 8) from the application CPU 10 that has received the U-Plane bearer generation completion notification.
- the encryption / decryption processing unit 29 does not encrypt the streaming data. Therefore, unencrypted data is transmitted to the base station 3 as U-Plane radio data packets # 1 to #n.
- the RRC unit 24 that has received the C-Plane release request from the base station 3 idles the RRC.
- the encryption period of C-Plane data and the encryption period of U-Plane data can be made different. Therefore, it is possible to encrypt both C-Plane data and U-Plane data in a specific period, and to encrypt only C-Plane data in a period other than the specific period.
- FIG. 15 is a diagram illustrating an example of the configuration of the terminal according to the ninth embodiment.
- the terminal 4 has an encryption level determination unit 4a.
- the encryption processing state of the primary encryption processing unit 2b is input from the first layer processing unit 2a to the encryption level determination unit 4a.
- the encryption processing state is a state of whether or not the encryption at the first layer is performed in the primary encryption processing unit 2b, that is, the presence or absence of the encryption at the first layer.
- the encryption level determination unit 4a determines the encryption level according to the presence or absence of encryption in the first layer. When the encryption at the first layer is not performed, the encryption level determination unit 4a always performs the encryption and decryption at the second layer. For example, when the encryption at the first layer is not performed, the encryption level determination unit 4a determines the encryption level of the secondary encryption processing unit 2d and the decryption level of the primary decryption processing unit 2j, The maximum level allowed by the capability of the terminal 4 is determined. That is, when encryption in the first layer is not performed, the encryption level of the secondary encryption processing unit 2d and the decryption level of the primary decryption processing unit 2j are four encryption levels shown in FIG. Of these, level 3 (SNOW-3G) is determined. On the other hand, when encryption in the first layer is performed, the encryption level determination unit 4a determines the encryption level according to the state of the terminal 4 as in the first embodiment.
- the encryption level in the second layer is determined according to the presence / absence of encryption in the first layer, so that encryption is always performed in either the first layer or the second layer. be able to. Further, when encryption is performed in the first layer, the encryption level of the second layer can be lowered from the highest level according to the state of the terminal 4. Therefore, it is possible to save power in the encryption process while maintaining the confidentiality of the data.
- Each process in the above description can also be realized by causing the application CPU 10 or the control CPU 20 to execute a program prepared in advance.
- a program corresponding to each process in the above description may be stored in the memory 40 in advance, and each program may be read from the memory 40 by the application CPU 10 or the control CPU 20 and executed.
- the encryption level may be determined according to the user's selection of the power saving mode. For example, when the mode for reducing the power saving amount is selected by the user, the PDCP layer encrypts both C-Plane data and U-Plane data. On the other hand, when the mode for increasing the power saving amount is selected by the user, the PDCP layer encrypts only the C-Plane data.
- a terminal may be called a “mobile station”, “UE (User Equipment)”, “MS (Mobile Station)”, or the like.
- the base station may be called “eNB (evolved Node B)”, “BS (Base Station)”, “BTS (Base Transceiver Station)”, or the like.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
<通信システムの構成例>
図1は、実施例1の通信システムの構成の一例を示す図である。図1において、通信システム1は、端末2と、基地局3、MME4とを有する。
図2は、実施例1の端末の主要構成を示す機能ブロック図である。図2において、端末2は、第1層処理部2aと、第2層処理部2cと、暗号化レベル決定部2eと、通知信号生成部2fと、送信部2gと、アンテナ2hと、受信部2iとを有する。また、第1層処理部2aは1次暗号処理部2b及び2次復号処理部2kを有し、第2層処理部2cは2次暗号処理部2d及び1次復号処理部2jを有する。
図3は、実施例1の基地局の主要構成を示す機能ブロック図である。図3において、基地局3は、アンテナ3aと、受信部3bと、第2層処理部3cと、第1層処理部3eと、コアネットワークインタフェース部3gと、暗号化レベル設定部3hと、制御信号生成部3kと、送信部3lとを有する。また、第1層処理部3eは1次暗号処理部3i及び2次復号処理部3fを有し、第2層処理部3cは2次暗号処理部3j及び1次復号処理部3dを有する。
図4は、実施例1のMMEの主要構成を示す機能ブロック図である。図4において、MME4は、コアネットワークインタフェース部4aと、データ処理部4bと、暗号化レベル決定部4cとを有する。
図5は、実施例1の暗号化レベルの説明に供する図である。図5では、一例として、端末2が、端末2の能力(capability)において、SNOW-3G,AES,KASUMIの3つの暗号方式が使用可能であるとする。
図6は、実施例1のしきい値テーブルの一例を示す図である。図6において、「パケット破棄率」、「プロセッサ稼働率」、「Redirection回数」、「無線品質」は、「端末の状態」を示すパラメータである。暗号化レベル決定部2eは、これらのパラメータを入力されるとともに、しきい値テーブルから各パラメータのしきい値を取得する。以下、各パラメータについて説明する。
無線品質の一例として端末2でのRSRP(Reference Signal Received Power)が挙げられる。端末2と基地局3との間の無線品質は、通常、RSRPが大きいほど良く、RSRPが小さいほど悪い。そこで、本実施例では、RSRPが小さくなるほど暗号化レベルをより低下させる。端末2と基地局3との間の無線品質が悪くなるほど、端末2が基地局3以外の他の基地局に接続先を切り替える「ハンドオーバ」(以下では「HO」と省略して呼ぶことがある)の発生確率が高くなるため、HO処理に必要な電力の需要が高くなる。また、例えばTDD(Time Division Duplex)方式では、端末2でのRSRPが小さいということは、下り回線同様に上り回線の無線品質も悪いと想定されるため、RSRPが小さい場合に端末2の送信電力を増加させる送信電力制御がなされることがある。そこで、本実施例では、RSRPが小さいほど、つまり、無線品質が悪いほど、暗号化レベルをより低下させる。例えば、図6に示すように、暗号化レベル決定部2eは、暗号化レベルを、RSRPが-75dBm以上のときはレベル3(SNOW-3G)に、-90dBm以上かつ-75dBm未満のときはレベル2(AES)に決定する。また、暗号化レベル決定部2eは、暗号化レベルを、RSRPが-105dBm以上かつ-90dBm未満のときはレベル1(KASUMI)に、-105dBm未満のときはレベル0(暗号化無し)に決定する。これにより、無線品質が悪いほど、2次暗号処理部2dでの暗号化の消費電力をより低下させることができ、その低下分の電力をHO処理または送信電力の増加に割り当てることができる。
Redirectionとは、端末2からの要求に依らずに基地局3が主導して強制的に端末2を基地局3から他の基地局へHOさせるときに、基地局3が端末2に対し送信するメッセージである。基地局3がRedirectionを送信する場合として、自局の収容端末数が上限を超えた場合、自局の通信エリアに通信規制をかける場合等がある。つまり、Redirectionは端末2と基地局3との間の無線品質に依らずに送信されることが多い。この点において、Redirectionは、無線品質に基づいて送信されるHOコマンドと相違する。端末2は、基地局3からRedirectionを受信すると、基地局3以外の他の基地局に強制的にHOさせられる。よって、Redirection回数が多いほどHOの回数も多くなるため、HO処理に必要な電力の需要が高くなる。そこで、本実施例では、Redirection回数が多いほど、暗号化レベルをより低下させる。例えば、図6に示すように、暗号化レベル決定部2eは、Redirection回数が1分間あたり5回未満のときは、暗号化レベルを、レベル3(SNOW-3G)、レベル2(AES)またはレベル1(KASUMI)に決定する。このときレベル1~3のいずれかの決定は、Redirection回数以外の他のパラメータに基づいて行われる。また、暗号化レベル決定部2eは、Redirection回数が1分間あたり5回以上のときは、暗号化レベルをレベル0(暗号化無し)に決定する。これにより、Redirection回数が多いほど、2次暗号処理部2dでの暗号化の消費電力をより低下させることができ、その低下分の電力をHO処理に割り当てることができる。
端末2が備える各プロセッサでは、タスク管理として、各プロセッサの稼働率が測定されている。プロセッサ稼働率が高いほど、端末2の消費電力がより大きいと予想される。そこで、本実施例では、プロセッサ稼働率が高いほど、暗号化レベルをより低下させる。例えば、図6に示すように、暗号化レベル決定部2eは、暗号化レベルを、プロセッサ稼働率が25%未満のときはレベル3(SNOW-3G)に、25%以上かつ50%未満のときはレベル2(AES)に決定する。また、暗号化レベル決定部2eは、暗号化レベルを、プロセッサ稼働率が50%以上かつ80%未満のときはレベル1(KASUMI)に、80%以上のときはレベル0(暗号化無し)に決定する。これにより、プロセッサ稼働率が高いほど、2次暗号処理部2dでの暗号化の消費電力をより低下させることができる。
端末2が受信した下りパケットが破棄される場合として、無線品質の劣化により下りパケットのCRC(Cyclic Redundancy Check)結果がNGとなる場合等がある。また、端末2が送信する上りパケットが破棄される場合として、端末2での同期崩れにより、端末2の内部で上りパケットのCRC結果がNGになる場合等がある。このようにパケットが破棄されると、端末2ではパケットの再送処理が行われるため、再送処理に必要な電力の需要が高くなる。例えば、下りパケットが破棄された場合には、基地局3にNACK(Negative ACKnowledgement)を送信する処理が行われ、上りパケットが破棄された場合には、基地局3にその上りパケットを再送する処理が行われる。また、例えばTDD方式において、下りパケットのCRC結果がNGになるということは、下り回線同様に上り回線の無線品質も悪いと想定されるため、CRC結果がNGになる場合に端末2の送信電力を増加させる送信電力制御がなされることがある。そこで、本実施例では、パケット破棄率が高いほど、暗号化レベルをより低下させる。例えば、図6に示すように、暗号化レベル決定部2eは、暗号化レベルを、パケット破棄率が25%未満のときはレベル3(SNOW-3G)に、25%以上かつ50%未満のときはレベル2(AES)に決定する。また、暗号化レベル決定部2eは、暗号化レベルを、パケット破棄率が50%以上かつ75%未満のときはレベル1(KASUMI)に、75%以上のときはレベル0(暗号化無し)に決定する。これにより、パケット破棄率が高いほど、2次暗号処理部2dでの暗号化の消費電力をより低下させることができ、その低下分の電力を再送処理または送信電力の増加に割り当てることができる。
図7は、実施例1の端末の処理動作の説明に供するフローチャートである。
図8は、実施例2の端末の構成の一例を示す図である。図8において、端末2は、アプリケーションCPU10と、コントロールCPU20と、メモリ40と、L1(Layer 1)処理部31と、RF回路50と、アンテナ60とを有する。
図9A,Bは、実施例3の通信システムの処理動作の一例を示すシーケンス図である。図9A,Bには、通信開始時のシーケンスを示す。
図10A,Bは、実施例4の通信システムの処理動作の一例を示すシーケンス図である。図10A,Bは、図9A,Bのシーケンスに後続するシーケンスである。
図11は、実施例5の通信システムの処理動作の一例を示すシーケンス図である。図11は、図9A,Bのシーケンスに後続するシーケンスである。
図12A,Bは、実施例6の通信システムの処理動作の一例を示すシーケンス図である。図12A,Bは、図9A,Bのシーケンスに後続するシーケンスである。
図13A,Bは、実施例7の通信システムの処理動作の一例を示すシーケンス図である。図13A,Bは、図9A,Bのシーケンスに後続するシーケンスである。
図14A~Cは、実施例8の通信システムの処理動作の一例を示すシーケンス図である。図14A~Cのシーケンスは大別して、C-Planeに関するシーケンスと、U-Planeに関するシーケンスとに分けられる。なお、図14A~Cでは、説明を簡潔にするために、基地局3とMME4との間のシーケンスを省略している。基地局3とMME4との間の実施例8でのシーケンスは、実施例3~7と同様である。
図15は、実施例9の端末の構成の一例を示す図である。図15において、端末4は、暗号化レベル決定部4aを有する。
[1]上記説明における各処理は、予め用意されたプログラムをアプリケーションCPU10またはコントロールCPU20に実行させることによっても実現できる。例えば、上記説明における各処理に対応するプログラムが予めメモリ40に記憶され、各プログラムがアプリケーションCPU10またはコントロールCPU20によってメモリ40から読み出されて実行されてもよい。
2 端末
3 基地局
4 MME
2a 第1層処理部
2b 1次暗号処理部
2c 第2層処理部
2d 2次暗号処理部
2e,4a,23 暗号化レベル決定部
2f 通知信号生成部
2g 送信部
2h,60 アンテナ
10 アプリケーションCPU
11 ユーザアプリケーション処理部
12,15,27,29 暗復号処理部
13 トランスポート層処理部
14 インタフェース層処理部
16,21 ネットワークインタフェース層処理部
22 状態検出部
24 RRC部
25 PDCP層処理部
26 C-Plane処理部
28 U-Plane処理部
30 データ統合層処理部
31 L1処理部
40 メモリ
50 RF回路
Claims (12)
- 上位層と下位層とを含むプロトコルスタックを用いる端末装置であって、
前記上位層のデータに対する第1暗号化処理及び/または第1復号処理を行う第1暗号部と、
前記下位層のデータに対する第2暗号化処理及び/または第2復号処理を行う第2暗号部と、
端末装置の状態に応じて前記第2暗号化処理及び/または第2復号処理の暗号レベルを決定する決定部と、
決定された前記暗号レベルに応じた端末能力情報を生成する生成部と、
生成された前記端末能力情報を基地局に送信する送信部と、
前記端末能力情報の送信に応じて前記基地局から前記暗号レベルに応じた設定情報を受信する受信部と、
を具備する端末装置。 - 前記第1暗号部は、ユーザプレーンのデータに対し前記第1暗号化処理及び/または前記第1復号処理を行い、
前記第2暗号部は、ユーザプレーンのデータ及び制御プレーンのデータに対し前記第2暗号化処理及び/または前記第2復号処理を行う、
請求項1に記載の端末装置。 - 前記決定部は、前記ユーザプレーンのデータに対する前記暗号レベルを前記状態に応じて決定する一方で、前記制御プレーンのデータに対する前記暗号レベルを前記端末装置の能力に応じて決定する、
請求項2に記載の端末装置。 - 前記決定部は、前記制御プレーンのデータに対する前記暗号レベルを前記能力が許容する最高レベルに決定する、
請求項3に記載の端末装置。 - 前記決定部は、前記端末装置と前記基地局との間の無線品質を前記状態として取得し、前記無線品質が悪いほど前記暗号レベルをより低下させる、
請求項1に記載の端末装置。 - 前記決定部は、Redirection回数を前記状態として取得し、前記Redirection回数が多いほど前記暗号レベルをより低下させる、
請求項1に記載の端末装置。 - 前記決定部は、前記端末装置が有するプロセッサの稼働率を前記状態として取得し、前記稼働率が高いほど前記暗号レベルをより低下させる、
請求項1に記載の端末装置。 - 前記決定部は、パケット破棄率を前記状態として取得し、前記パケット破棄率が高いほど前記暗号レベルをより低下させる、
請求項1に記載の端末装置。 - 前記決定部は、ハンドオーバコマンドに起因するハンドオーバの回数がしきい値以上の場合は、前記暗号レベルを変化させない、
請求項1に記載の端末装置。 - 前記決定部は、前記第1暗号部での前記第1暗号化処理及び/または前記第1復号処理の有無にさらに応じて前記暗号レベルを決定する、
請求項1に記載の端末装置。 - 上位層と下位層とを含むプロトコルスタックを用いる端末装置と、基地局とを有する通信システムであって、
前記端末装置は、
前記上位層のデータに対する第1暗号化処理及び/または第1復号処理を行う第1暗号部と、
前記下位層のデータに対する第2暗号化処理及び/または第2復号処理を行う第2暗号部と、
端末装置の状態に応じて前記第2暗号化処理及び/または第2復号処理の暗号レベルを決定する決定部と、
決定された前記暗号レベルに応じた端末能力情報を生成する生成部と、
生成された前記端末能力情報を基地局に送信する送信部と、
前記端末能力情報の送信に応じて前記基地局から前記暗号レベルに応じた設定情報を受信する受信部と、を具備し、
前記基地局は、
前記端末装置から前記端末能力情報を受信する受信部と、
前記端末能力情報に基づいて生成された前記設定情報を前記端末装置に送信する送信部と、を具備する、
通信システム。 - プロトコルスタックの複数の階層において暗復号処理が可能な端末装置において実行される通信制御プログラムであって、
前記端末装置が検知する状態に基づいて前記暗復号処理の暗号レベルを決定し、
前記暗号レベルに応じた端末能力情報を生成し、
生成した前記端末能力情報を基地局に送信し、
前記端末能力情報の送信に応じて前記基地局から前記暗号レベルに応じた設定情報を受信する、
ように前記端末装置を動作させる通信制御プログラム。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2013/063724 WO2014184938A1 (ja) | 2013-05-16 | 2013-05-16 | 端末装置、通信システム及び通信制御プログラム |
JP2015516846A JP5994936B2 (ja) | 2013-05-16 | 2013-05-16 | 端末装置、通信システム及び通信制御プログラム |
EP13884641.5A EP2999157B1 (en) | 2013-05-16 | 2013-05-16 | Terminal device, communication system, and communication control program |
US14/876,222 US20160029211A1 (en) | 2013-05-16 | 2015-10-06 | Terminal device, communication system, and terminal device readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2013/063724 WO2014184938A1 (ja) | 2013-05-16 | 2013-05-16 | 端末装置、通信システム及び通信制御プログラム |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/876,222 Continuation US20160029211A1 (en) | 2013-05-16 | 2015-10-06 | Terminal device, communication system, and terminal device readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2014184938A1 true WO2014184938A1 (ja) | 2014-11-20 |
Family
ID=51897943
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2013/063724 WO2014184938A1 (ja) | 2013-05-16 | 2013-05-16 | 端末装置、通信システム及び通信制御プログラム |
Country Status (4)
Country | Link |
---|---|
US (1) | US20160029211A1 (ja) |
EP (1) | EP2999157B1 (ja) |
JP (1) | JP5994936B2 (ja) |
WO (1) | WO2014184938A1 (ja) |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2016029787A (ja) * | 2014-07-16 | 2016-03-03 | キヤノン株式会社 | 情報処理装置、暗号化通信方法、およびプログラム |
JP6422254B2 (ja) * | 2014-07-23 | 2018-11-14 | キヤノン株式会社 | 通信装置、通信装置の制御方法、および、プログラム |
EP2988467A1 (en) * | 2014-08-20 | 2016-02-24 | Agco Corporation | Wireless out-of-band authentication for a controller area network |
US9998970B2 (en) * | 2016-04-28 | 2018-06-12 | Samsung Electronics Co., Ltd. | Fast VoWiFi handoff using IKE v2 optimization |
US10469268B2 (en) * | 2016-05-06 | 2019-11-05 | Pacific Star Communications, Inc. | Unified encryption configuration management and setup system |
US11064350B2 (en) * | 2016-07-28 | 2021-07-13 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Communication method, network equipment, and terminal equipment |
US11275852B2 (en) * | 2016-08-22 | 2022-03-15 | Nokia Technologies Oy | Security procedure |
WO2019132974A1 (en) * | 2017-12-29 | 2019-07-04 | Nokia Technologies Oy | Enhanced traffic capacity in a cell |
US11425559B1 (en) * | 2018-05-15 | 2022-08-23 | Know 2Solutions, LLC | Data transmission network device |
CN112866994B (zh) * | 2019-11-11 | 2023-03-31 | 成都鼎桥通信技术有限公司 | 一种lte承载窄带语音编码的加密通信方法和系统 |
KR20230025854A (ko) * | 2020-06-18 | 2023-02-23 | 엘지전자 주식회사 | 무선 통신 시스템에서 데이터를 송수신하는 방법 및 이를 위한 장치 |
CN114258008A (zh) * | 2020-09-25 | 2022-03-29 | 华为云计算技术有限公司 | 一种安全通信方法及装置 |
CN116321133B (zh) * | 2023-05-11 | 2023-07-25 | 西安星恒通智能装备有限公司 | 基于多天线协作处理方法及系统 |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004064652A (ja) | 2002-07-31 | 2004-02-26 | Sharp Corp | 通信機器 |
JP2004254286A (ja) * | 2002-10-31 | 2004-09-09 | Matsushita Electric Ind Co Ltd | 通信装置、通信システムおよびアルゴリズム選択方法 |
JP2005117232A (ja) | 2003-10-06 | 2005-04-28 | Matsushita Electric Ind Co Ltd | データ通信装置、データ通信方法、データ変換装置および変換選択方法 |
JP2006129432A (ja) | 2004-09-30 | 2006-05-18 | Hitachi Ltd | 分散環境における暗号鍵更新方法、暗号鍵更新システム、暗号鍵更新システムを構成する認証サーバ、移動体、および無線基地局 |
JP2008113172A (ja) | 2006-10-30 | 2008-05-15 | Hitachi Ltd | コンテンツ送信装置、コンテンツ受信装置及びコンテンツ暗号化方法 |
WO2011064858A1 (ja) * | 2009-11-26 | 2011-06-03 | 株式会社 東芝 | 無線認証端末 |
JP2013015605A (ja) * | 2011-07-01 | 2013-01-24 | Nippon Telegr & Teleph Corp <Ntt> | 信号処理装置 |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1416665A2 (en) * | 2002-10-31 | 2004-05-06 | Matsushita Electric Industrial Co., Ltd. | Communication device, communication system, and cryptographic algorithm selection method |
KR100517290B1 (ko) * | 2003-03-22 | 2005-09-28 | 이유영 | N-차원 정보를 이용한 정보 전송 시스템 및 전송 방법. |
US20090214044A1 (en) * | 2008-02-21 | 2009-08-27 | Hitachi, Ltd. | Data archiving technique for encrypted data |
US8788804B2 (en) * | 2008-05-15 | 2014-07-22 | Qualcomm Incorporated | Context aware security |
US8509434B2 (en) * | 2008-06-20 | 2013-08-13 | Korean Broadcasting System | Method and apparatus for protecting scalable video coding contents |
CN101854625B (zh) * | 2009-04-03 | 2014-12-03 | 华为技术有限公司 | 安全算法选择处理方法与装置、网络实体及通信系统 |
CN101883346B (zh) * | 2009-05-04 | 2015-05-20 | 中兴通讯股份有限公司 | 基于紧急呼叫的安全协商方法与装置 |
EP2466523B1 (en) * | 2010-12-16 | 2015-04-29 | BlackBerry Limited | Method and apparatus for securing a computing device |
-
2013
- 2013-05-16 EP EP13884641.5A patent/EP2999157B1/en not_active Not-in-force
- 2013-05-16 WO PCT/JP2013/063724 patent/WO2014184938A1/ja active Application Filing
- 2013-05-16 JP JP2015516846A patent/JP5994936B2/ja not_active Expired - Fee Related
-
2015
- 2015-10-06 US US14/876,222 patent/US20160029211A1/en not_active Abandoned
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004064652A (ja) | 2002-07-31 | 2004-02-26 | Sharp Corp | 通信機器 |
JP2004254286A (ja) * | 2002-10-31 | 2004-09-09 | Matsushita Electric Ind Co Ltd | 通信装置、通信システムおよびアルゴリズム選択方法 |
JP2005117232A (ja) | 2003-10-06 | 2005-04-28 | Matsushita Electric Ind Co Ltd | データ通信装置、データ通信方法、データ変換装置および変換選択方法 |
JP2006129432A (ja) | 2004-09-30 | 2006-05-18 | Hitachi Ltd | 分散環境における暗号鍵更新方法、暗号鍵更新システム、暗号鍵更新システムを構成する認証サーバ、移動体、および無線基地局 |
JP2008113172A (ja) | 2006-10-30 | 2008-05-15 | Hitachi Ltd | コンテンツ送信装置、コンテンツ受信装置及びコンテンツ暗号化方法 |
WO2011064858A1 (ja) * | 2009-11-26 | 2011-06-03 | 株式会社 東芝 | 無線認証端末 |
JP2013015605A (ja) * | 2011-07-01 | 2013-01-24 | Nippon Telegr & Teleph Corp <Ntt> | 信号処理装置 |
Non-Patent Citations (1)
Title |
---|
See also references of EP2999157A4 |
Also Published As
Publication number | Publication date |
---|---|
JP5994936B2 (ja) | 2016-09-21 |
EP2999157A4 (en) | 2016-03-23 |
EP2999157A1 (en) | 2016-03-23 |
US20160029211A1 (en) | 2016-01-28 |
JPWO2014184938A1 (ja) | 2017-02-23 |
EP2999157B1 (en) | 2017-02-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5994936B2 (ja) | 端末装置、通信システム及び通信制御プログラム | |
CN107113291B (zh) | 演进的数据压缩方案信令 | |
CA2715986C (en) | Method for transmitting pdcp status report | |
US9363721B2 (en) | In-device coexistence interference report control method and apparatus of network in mobile communication system | |
US8379855B2 (en) | Ciphering in a packet-switched telecommunications system | |
US10149219B2 (en) | User terminal, cellular base station, and processor | |
KR20130093774A (ko) | Pdcp 패킷 전송 방법 | |
US9674882B2 (en) | Mobile communication system, user terminal, base station, processor, and communication control method | |
US10080161B2 (en) | Processing data units | |
US10021039B2 (en) | Mobile communication system and user terminal | |
US20090052401A1 (en) | Mobile communication system, base station controller, mobile device, handover control method, and program | |
US20150304969A1 (en) | Communication control method, base station, user terminal, processor, and storage medium | |
CN110402596B (zh) | 无线通信装置及无线通信方法 | |
US20160021591A1 (en) | Data transmission method, communications device, and communications system | |
CN104429109B (zh) | 一种通信方法及装置 | |
JP6538026B2 (ja) | ネットワーク選択制御方法、基地局、及びユーザ端末 | |
EP1906691B1 (en) | Method and apparatus for performing radio bearer mapping in a wireless communications system | |
WO2017076454A1 (en) | Initiating measuring, reporting and/or use of secondary path delay to allocate packets or bearers among primary path and secondary path in wireless network | |
EP4109962A1 (en) | Method for transmitting pdcp status report |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 13884641 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2015516846 Country of ref document: JP Kind code of ref document: A |
|
REEP | Request for entry into the european phase |
Ref document number: 2013884641 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2013884641 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |