WO2015015300A2 - Procédé de gestion de la sécurité dans un système double connectivité - Google Patents
Procédé de gestion de la sécurité dans un système double connectivité Download PDFInfo
- Publication number
- WO2015015300A2 WO2015015300A2 PCT/IB2014/001839 IB2014001839W WO2015015300A2 WO 2015015300 A2 WO2015015300 A2 WO 2015015300A2 IB 2014001839 W IB2014001839 W IB 2014001839W WO 2015015300 A2 WO2015015300 A2 WO 2015015300A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- senb
- user equipment
- menb
- rrc connection
- security
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 55
- 230000009977 dual effect Effects 0.000 title claims abstract description 33
- 238000004891 communication Methods 0.000 claims abstract description 25
- 230000004048 modification Effects 0.000 claims description 37
- 238000012986 modification Methods 0.000 claims description 37
- 230000004044 response Effects 0.000 claims description 9
- 230000011664 signaling Effects 0.000 claims description 6
- 238000013468 resource allocation Methods 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 9
- 238000007726 management method Methods 0.000 description 3
- 230000006872 improvement Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 1
- GVVPGTZRZFNKDS-JXMROGBWSA-N geranyl diphosphate Chemical compound CC(C)=CCC\C(C)=C\CO[P@](O)(=O)OP(O)(O)=O GVVPGTZRZFNKDS-JXMROGBWSA-N 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
- H04L63/205—Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/15—Setup of multiple wireless link connections
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
- H04W74/0833—Random access procedures, e.g. with 4-step access
Definitions
- the present invention relates to the wireless communication technology, and particularly to a method of supporting security handling for dual connectivity in a macro eNB, a secondary eNB and a user equipment of a wireless communication network.
- Fig. l illustrates a schematic diagram 100 of a network architecture in the prior art, and as can be apparent, in such a network environment, a macro cell 110 provides underlying network coverage (as illustrated by a dotted background in the figure), and in the meantime, for example, small cells 121 , 122, 123 and 124 at small power (that is, with small network coverage (areas illustrated by oblique lines in the figure)) provide a possible network access at a higher speed.
- the UE within the communal coverage may establish communication connections with the macro cell and the secondary cell simultaneously.
- 3 GPP has identified potential protocol architectures to support dual connectivity for UE with MeNB (Master eNB) and SeNB (Secondary eNB).
- MeNB Master eNB
- SeNB Secondary eNB
- Option CI Only the MeNB generates the final RRC messages to be sent towards the UE after the coordination of Radio Resource Management (RRM) functions between MeNB and SeNB.
- RRM Radio Resource Management
- Both MeNB and SeNB can generate final RRC messages to be sent towards the UE after the coordination of RRM functions between MeNB and SeNB and may send those messages directly to the UE (depending on L2 architecture) and the UE replies accordingly.
- S l-U terminates in SeNB + independent PDCPs (no bearer split);
- S l-U terminates in MeNB + no bearer split in MeNB + independent PDCP at SeNB;
- S l-U terminates in MeNB + bearer split in MeNB + independent PDCPs for split bearers;
- SeNB can generate RRC messages to be sent towards UE directly (i.e. Option C2), SeNB must have PDCP entity, which can ensure the RRC message security.
- PDCP entity For the alternative user plane architectures, 1 A, 2A, 2B, 3A and 3B require PDCP entity in SeNB. 2C, 2D, 3C and 3D make PDCP entity in MeNB.
- the architecture combination is C1+ 2C, 2D, 3C or 3D
- one security key is sufficient.
- two security keys are necessary.
- the architecture combination C1+ 1A, 2A, 2B, 3A or 3B only data needs different security key; for the architecture combination C2+ 2C, 2D, 3C or 3D, only SRB in SeNB needs different security key.
- the current specification only deals with the scenario that the network provides one security key for UE. As mentioned above, it is necessary to deal with two security keys for dual connectivity.
- a first aspect of the invention proposes a method of supporting security handling for dual connectivity in a MeNB of a wireless communication system, wherein the wireless communication system includes the MeNB, a SeNB and a user equipment, the method comprising:
- the MeNB determining to establish a second RRC connection for the user equipment and the SeNB, so as to form dual connectivity
- the MeNB or the SeNB selecting a security algorithm used for the SeNB and the MeNB sending RRC connection configuration including the security algorithm to the user equipment to indicate the SeNB to establish the second RRC connection with the user equipment according to the RRC connection configuration, such that the user equipment possesses dual connectivity.
- the method according to the present invention may establish respective RRC connection between the MeNB and the user equipment and between the SeNB and the user equipment by using different security algorithms.
- RRC connection in the context is named as a first RRC connection and a second RRC connection.
- the method, before the step (B), further comprises:
- the MeNB may receive information about the security key used in access network node from the core network node, for example, MME (Mobility Management Entity).
- MME Mobility Management Entity
- the step (D) further comprises generating a second security key used for the second RRC connection based on the first security key.
- a second security key is derived from the first security key used for the first RRC connection.
- the second security key may be used for the second RRC connection to improve the security of the second RRC connection.
- the second security key is generated for the second RRC connection based on the downlink frequency and physical cell identifier of the cell managed by the SeNB and the managed cell is the serving cell of the user equipment used for establishing the second RRC connection.
- the second security key may be generated based on the first security key in any other known ways.
- step (D) if the security algorithm used for the SeNB is selected by the MeNB, then the MeNB firstly obtains a configuration list of ciphering algorithm and integrity algorithm used in the SeNB and the MeNB sends the selected security algorithm used for the SeNB to the SeNB; or
- the MeNB sends the security capability of the user equipment to the SeNB and the SeNB sends the selected security algorithm used for the SeNB to the MeNB.
- the security algorithm used for the second RRC connection is selected by the MeNB or the SeNB. Due to different selection entities, the information needed to be acquired is also different.
- the method comprises the following step after the step (D):
- the MeNB receiving UE context modification request used for updating the first security key and the second security key from the core network node and updating the first security key and the second security key according to the UE context modification request.
- the MeNB sends a first RRC connection reconfiguration instruction to the user equipment after receiving the UE context modification request, so as to indicate the user equipment to perform intra-cell handover to update the first security key and receive a first RRC connection reconfiguration complete instruction after the updating is done and to indicate the MeNB to send UE context modification response to the core network node; and the MeNB informs the SeNB to update the second security key after receiving the UE context modification request, such that the SeNB indicates the user equipment to perform intra-cell handover to reconfigure the second RRC connection in the meantime.
- the UE context modification request contains the security capability of the user equipment and the security capability comprises the supported ciphering algorithm and integrity algorithm, and the MeNB or the SeNB selects security algorithm used for the SeNB and sends it to the user equipment via the SeNB.
- the MeNB sends a first RRC connection reconfiguration instruction to the user equipment after receiving the UE context modification request, so as to indicate the user equipment to perform intra-cell handover to update the first security key and the user equipment deems that the cell of the SeNB served for the user equipment is deactivated and stops to transmit data to the SeNB and the MeNB receives a first RRC connection reconfiguration complete instruction from the user equipment after the updating is done and the MeNB sends UE context modification response to the core network node; and the MeNB informs the SeNB to update the second security key after receiving the UE context modification request and the MeNB sends medium access layer control signaling MAC CE to the user equipment to activate the cell of the SeNB served for the user equipment after receiving the first RRC connection reconfiguration complete instruction, and the user equipment performs random access to access the SeNB.
- the SeNB sends security mode instruction to the user equipment and indicates the user equipment to perform the second RRC connection reconfiguration after receiving a corresponding security mode complete instruction from the user equipment, when the security algorithm of the SeNB changes.
- the MeNB in the step (E), sends a first RRC connection reconfiguration instruction to the user equipment, after receiving the UE context modification request, to indicate the user equipment to perform intra-cell handover to update the first security key, and the user equipment deems that the cell of the SeNB served for the user equipment is deactivated and stops to transmit data to the SeNB and the MeNB receives a first RRC connection reconfiguration complete instruction from the user equipment after the updating is done and the MeNB sends UE context modification response to the core network node; and the MeNB informs the SeNB to update the second security key after receiving the UE context modification request and the MeNB receives a first information from the SeNB and the MeNB indicates the user equipment to perform the second RRC connection reconfiguration and sends medium access layer control signaling MAC CE to the user equipment to activate the cell of the SeNB served for the user equipment after receiving the first RRC connection reconfiguration complete instruction, and the user equipment performs random access to access the SeNB.
- the first information contains resource allocation information in the SeNB and a security algorithm needed to be updated.
- a second aspect of the invention provides a method of supporting security handling for dual connectivity in a SeNB of a wireless communication system, wherein the wireless communication system includes a MeNB, the SeNB and a user equipment, the method comprising:
- the security algorithm used for the SeNB being selected by the MeNB or the SeNB and the MeNB sending RRC connection configuration including security algorithm to the user equipment;
- the SeNB establishing a second RRC connection with the user equipment according to the RRC connection configuration, such that the user equipment possesses dual connectivity.
- the MeNB generates a second security key used for the second RRC connection based on the first security key received by the MeNB from a core network node.
- a third aspect of the invention provides a method of supporting security handling for dual connectivity in a user equipment of a wireless communication system, wherein the wireless communication system includes a MeNB, a SeNB and the user equipment, the method comprising:
- the user equipment establishing a second RRC connection with the SeNB according to RRC connection configuration of security algorithm used for the SeNB, such that the user equipment possesses dual connectivity, wherein the security algorithm is selected by the MeNB or the SeNB.
- Fig. l illustrates a schematic diagram of the network architecture in which the method of security handling may be applied
- Fig.2 illustrates a flow diagram 200 of one embodiment of the method according to the present invention
- Fig.3 illustrates a flow diagram 300 of another embodiment of the method according to the present invention.
- Fig.4 illustrates a flow diagram 400 of still another embodiment of the method according to the present invention.
- Fig.5 illustrates a flow diagram 500 of still another embodiment of the method according to the present invention.
- Fig. l illustrates a schematic diagram of the network architecture in which the method of security handling may be applied. A repeated description of Fig. l is omitted because it is already described in the part "Background of the Invention".
- Fig.2 illustrates a flow diagram 200 of one embodiment of the method according to the present invention.
- a method of supporting security handling for dual connectivity in a MeNB of a wireless communication system according to the present invention comprises:
- step 220 the MeNB establishes a first RRC connection with the user equipment
- the MeNB determines to establish a second RRC connection for the user equipment and the SeNB, so as to form dual connectivity
- the MeNB or the SeNB selects a security algorithm used for the SeNB and in step 250 the MeNB sends RRC connection configuration including the security algorithm to the user equipment to indicate the SeNB to establish the second RRC connection with the user equipment according to the RRC connection configuration in step 260, such that the user equipment possesses dual connectivity.
- the method according to the present invention may establish respective RRC connection between the MeNB and the user equipment and between the SeNB and the user equipment by using different security algorithms.
- RRC connection in the context is named as a first RRC connection and a second RRC connection.
- the method before the step 220, further comprises:
- the MeNB receives a first security key used for the first RRC connection from a core network node.
- the MeNB may receive information about the security key used in access network node from the core network node, for example, MME (Mobility Management Entity).
- MME Mobility Management Entity
- the step 240 further comprises generating a second security key KeNB* used for the second RRC connection based on the first security key KeNB.
- a second security key is derived from the first security key used for the first RRC connection.
- the second security key may be used for the second RRC connection to improve the security of the second RRC connection.
- the second security key is generated for the second RRC connection based on the downlink frequency and physical cell identifier of the cell managed by the SeNB and the managed cell is the serving cell of the user equipment used for establishing the second RRC connection.
- the second security key may be generated based on the first security key in any other known ways.
- the MeNB in the step 240, if the security algorithm used for the SeNB is selected by the MeNB, then the MeNB firstly obtains a configuration list of ciphering algorithm and integrity algorithm used in the SeNB and the MeNB sends the selected security algorithm used for the SeNB to the SeNB; or
- the MeNB sends the security capability of the user equipment to the SeNB and the SeNB sends the selected security algorithm used for the SeNB to the MeNB.
- the security algorithm used for the second RRC connection is selected by the MeNB or the SeNB. Due to different selection entities, the information needed to be acquired is also different.
- the principle is that the MeNB or the SeNB determines the security algorithm according to the security capability of the user equipment and the security configuration list supported by the SeNB.
- the method comprises the following step after the step 260:
- the MeNB receiving UE context modification request used for updating the first security key and the second security key from the core network node and updating the first security key and the second security key according to the UE context modification request.
- the MeNB sends a first RRC connection reconfiguration instruction to the user equipment (in step 330) after receiving the UE context modification request (in step 320), so as to indicate the user equipment to perform intra-cell handover to update the first security key and receive a first RRC connection reconfiguration complete instruction (in step 354) after the updating is done and to indicate the MeNB to send UE context modification response to the core network node (in step 350); and the MeNB informs the SeNB to update the second security key (in step 360) after receiving the UE context modification request, such that the SeNB indicates the user equipment to perform intra-cell handover to reconfigure the second RRC connection (in steps 370 and 380) in the meantime.
- the SeNB could report successful updating of the second security key to the MeNB after the updating of the second security key is done.
- the UE context modification request contains the security capability of the user equipment and the security capability comprises the supported ciphering algorithm and integrity algorithm, and the MeNB or the SeNB selects security algorithm used for the SeNB and sends it to the user equipment via the SeNB.
- Fig.4 illustrates a flow diagram 400 of still another embodiment of the method according to the present invention.
- the MeNB sends a first RRC connection reconfiguration instruction to the user equipment (in step 430) after receiving the UE context modification request (in step 420), so as to indicate the user equipment to perform intra-cell handover to update the first security key and the user equipment deems that the cell of the SeNB served for the user equipment is deactivated and stops to transmit data to the SeNB (in step 440) and the MeNB receives a first RRC connection reconfiguration complete instruction from the user equipment (in step 450) after the updating is done and the MeNB sends UE context modification response to the core network node (in step 460); and the MeNB informs the SeNB to update the second security key (in step 470) after receiving the UE context modification request and the MeNB sends medium access layer control signaling MAC CE to the user equipment to activate the cell of the SeNB served for the user equipment (in step 410).
- the SeNB sends security mode instruction to the user equipment (in step 492) and indicates the user equipment to perform the second RRC connection reconfiguration (in steps 496 and 498) after receiving a corresponding security mode complete instruction from the user equipment (in step 494), when the security algorithm of the SeNB changes.
- the MeNB after dual connectivity is established(in step 510), the MeNB sends a first RRC connection reconfiguration instruction to the user equipment (in step 530), after receiving the UE context modification request (in step 520), to indicate the user equipment to perform intra-cell handover to update the first security key, and the user equipment deems that the cell of the SeNB served for the user equipment is deactivated and stops to transmit data to the SeNB (in step 540) and the MeNB receives a first RRC connection reconfiguration complete instruction from the user equipment (in step 550) after the updating is done and the MeNB sends UE context modification response to the core network node (in step 560); and the MeNB informs the SeNB to update the second security key (in step 570) after receiving the UE context modification request and the MeNB receives a first information from the SeNB (in step 580) and the MeNB indicates the user equipment to perform the second RRC connection reconfiguration (in step 582) and sends medium access layer control signaling MAC CE to the user equipment
- the user equipment needs to perform random access when the user equipment accesses the SeNB, because the ahead of uplink schedules of the user equipment in the cell managed by the MeNB and the cell managed by the SeNB are different. Therefore, the user equipment needs not to perform random access when the user equipment accesses the SeNB, because the ahead of uplink schedules of the user equipment in the cell managed by the MeNB and the cell managed by the SeNB are the same.
- the first information contains resource allocation information in the SeNB and a security algorithm needed to be updated.
- a second aspect of the invention provides a method of supporting security handling for dual connectivity in a SeNB of a wireless communication system, wherein the wireless communication system includes a MeNB, the SeNB and a user equipment, the method comprising:
- the security algorithm used for the SeNB being selected by the MeNB or the SeNB and the MeNB sending RRC connection configuration including security algorithm to the user equipment;
- the SeNB establishing a second RRC connection with the user equipment according to the RRC connection configuration, such that the user equipment possesses dual connectivity.
- the MeNB generates a second security key used for the second RRC connection based on the first security key received by the MeNB from a core network node.
- a third aspect of the invention provides a method of supporting security handling for dual connectivity in a user equipment of a wireless communication system, wherein the wireless communication system includes a MeNB, a SeNB and the user equipment, the method comprising:
- the user equipment establishing a second RRC connection with the SeNB according to RRC connection configuration of security algorithm used for the SeNB, such that the user equipment possesses dual connectivity, wherein the security algorithm is selected by the MeNB or the SeNB.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
L'invention concerne un procédé de gestion de la sécurité dans le MeNB d'un système de communication sans fil double connectivité. Le système de communication sans fil comprend le MeNB, un SeNB et un équipement d'utilisateur. Le procédé comprend les étapes suivantes : le MeNB établit une première connexion RRC avec l'équipement d'utilisateur ; le MeNB détermine l'établissement d'une seconde connexion RRC pour l'équipement d'utilisateur et le SeNB, de sorte à former une double connectivité ; et le MeNB ou le SeNB sélectionnent un algorithme de sécurité pour le SeNB et le MeNB en envoyant des informations de configuration de connexion RRC comprenant l'algorithme de sécurité, à l'équipement d'utilisateur, pour indiquer au SeNB d'établir la seconde connexion RRC avec l'équipement d'utilisateur d'après les informations de configuration de connexion RRC, si bien que l'équipement d'utilisateur ait une double connectivité. Le procédé selon l'invention peut établir une connexion RRC respective entre le MeNB et l'équipement d'utilisateur, et entre le SeNB et l'équipement d'utilisateur, au moyen de différents algorithmes de sécurité.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310337478.9 | 2013-08-02 | ||
CN201310337478.9A CN104349312B (zh) | 2013-08-02 | 2013-08-02 | 用于支持双连接的安全处理的方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2015015300A2 true WO2015015300A2 (fr) | 2015-02-05 |
WO2015015300A3 WO2015015300A3 (fr) | 2015-07-02 |
Family
ID=52146540
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2014/001839 WO2015015300A2 (fr) | 2013-08-02 | 2014-08-01 | Procédé de gestion de la sécurité dans un système double connectivité |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN104349312B (fr) |
WO (1) | WO2015015300A2 (fr) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170026347A1 (en) | 2015-07-24 | 2017-01-26 | Futurewei Technologies, Inc. | Ultra Dense Network Security Architecture and Method |
WO2018059866A1 (fr) * | 2016-09-28 | 2018-04-05 | Sony Corporation | Appareil et procédés de télécommunications pour gestion de supports radio divisés |
CN110463240A (zh) * | 2017-03-30 | 2019-11-15 | 索尼公司 | 电信设备和方法 |
WO2019219668A1 (fr) * | 2018-05-14 | 2019-11-21 | Telefonaktiebolaget Lm Ericsson (Publ) | Augmentation de la sécurité de connectivité double |
JP2019220969A (ja) * | 2016-01-08 | 2019-12-26 | 日本電気株式会社 | 無線通信システム、無線局、無線端末、及び制御方法 |
US20200092726A1 (en) * | 2017-04-28 | 2020-03-19 | Vivo Mobile Communication Co., Ltd. | Method of integrity check, terminal, and network-side equipment |
JP2020511846A (ja) * | 2017-03-23 | 2020-04-16 | ホアウェイ・テクノロジーズ・カンパニー・リミテッド | 設定方法および装置、並びにシステム |
WO2021118322A1 (fr) * | 2019-12-13 | 2021-06-17 | Samsung Electronics Co., Ltd. | Conception et architecture pour système de réseau multi-connectivité multi-radio |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106375992B (zh) * | 2015-07-20 | 2019-08-06 | 中兴通讯股份有限公司 | 实现接入层安全的方法及用户设备和节点 |
CN107113821B (zh) * | 2015-09-24 | 2020-12-18 | 山东黄海数据科技有限公司 | 上行数据传输的方法和装置 |
CN107306455B (zh) * | 2016-04-20 | 2022-07-01 | 中兴通讯股份有限公司 | 一种双连接操作的方法、基站、ue及mme |
US10932131B2 (en) * | 2016-08-03 | 2021-02-23 | Nokia Solutions And Networks Oy | Service provisioning by local operator |
CN109246692A (zh) * | 2017-06-16 | 2019-01-18 | 华为技术有限公司 | 连接管理方法、终端及无线接入网设备 |
CN109429283B (zh) * | 2017-08-31 | 2021-07-20 | 华为技术有限公司 | 通信方法、装置和系统 |
WO2019090727A1 (fr) * | 2017-11-10 | 2019-05-16 | Oppo广东移动通信有限公司 | Procédé de commande et de transmission de signalisation, et produit associé |
KR20200096806A (ko) | 2017-12-15 | 2020-08-13 | 광동 오포 모바일 텔레커뮤니케이션즈 코포레이션 리미티드 | 사용자 장치를 페이징하는 방법, 제1 네트워크 장치 및 사용자 장치 |
CN109168161B (zh) * | 2018-08-27 | 2021-11-02 | 创新维度科技(北京)有限公司 | 安全模式激活方法、装置、系统和计算机存储介质 |
JP2020535667A (ja) | 2018-08-28 | 2020-12-03 | アップル インコーポレイテッドApple Inc. | セルラ通信のための移動性向上 |
CN112218344B (zh) * | 2019-07-12 | 2022-12-30 | 华为技术有限公司 | 一种通信方法及装置 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7899495B2 (en) * | 2006-07-14 | 2011-03-01 | Qualcomm Incorporated | Methods and apparatus for supporting multiple connections |
US9185552B2 (en) * | 2009-05-06 | 2015-11-10 | Qualcomm Incorporated | Method and apparatus to establish trust and secure connection via a mutually trusted intermediary |
CN103188663B (zh) * | 2011-12-27 | 2016-08-03 | 华为技术有限公司 | 基站间载波聚合的安全通讯方法及设备 |
CN102740289B (zh) * | 2012-06-15 | 2015-12-02 | 电信科学技术研究院 | 一种密钥更新方法、装置及系统 |
-
2013
- 2013-08-02 CN CN201310337478.9A patent/CN104349312B/zh active Active
-
2014
- 2014-08-01 WO PCT/IB2014/001839 patent/WO2015015300A2/fr active Application Filing
Non-Patent Citations (1)
Title |
---|
None |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10412056B2 (en) | 2015-07-24 | 2019-09-10 | Futurewei Technologies, Inc. | Ultra dense network security architecture method |
US20170026347A1 (en) | 2015-07-24 | 2017-01-26 | Futurewei Technologies, Inc. | Ultra Dense Network Security Architecture and Method |
US11711724B2 (en) | 2016-01-08 | 2023-07-25 | Nec Corporation | Methods and apparatuses for transmitting control-plane messages in cells using different radio access technologies |
US10952099B2 (en) | 2016-01-08 | 2021-03-16 | Nec Corporation | Methods and apparatuses for transmitting control-plane messages in cells using different radio access technologies |
JP7272395B2 (ja) | 2016-01-08 | 2023-05-12 | 日本電気株式会社 | 無線局システム、無線端末、及びこれらの方法 |
JP2019220969A (ja) * | 2016-01-08 | 2019-12-26 | 日本電気株式会社 | 無線通信システム、無線局、無線端末、及び制御方法 |
JP2022002409A (ja) * | 2016-01-08 | 2022-01-06 | 日本電気株式会社 | 無線局システム、無線端末、及びこれらの方法 |
WO2018059866A1 (fr) * | 2016-09-28 | 2018-04-05 | Sony Corporation | Appareil et procédés de télécommunications pour gestion de supports radio divisés |
US10834771B2 (en) | 2016-09-28 | 2020-11-10 | Sony Corporation | Telecommunications apparatus and methods for handling split radio bearers |
EP3796741A3 (fr) * | 2016-09-28 | 2022-06-08 | Sony Group Corporation | Appareil et procédés de télécommunications pour gestion de supports radio divisés |
US12010745B2 (en) | 2016-09-28 | 2024-06-11 | Sony Corporation | Telecommunications apparatus and methods for handling split radio bearers |
JP2020511846A (ja) * | 2017-03-23 | 2020-04-16 | ホアウェイ・テクノロジーズ・カンパニー・リミテッド | 設定方法および装置、並びにシステム |
US11425779B2 (en) | 2017-03-23 | 2022-08-23 | Huawei Technologies Co., Ltd. | Configuration method and apparatus, and system |
US11950314B2 (en) | 2017-03-23 | 2024-04-02 | Huawei Technologies Co., Ltd. | Configuration method and apparatus, and system |
CN110463240A (zh) * | 2017-03-30 | 2019-11-15 | 索尼公司 | 电信设备和方法 |
CN110463240B (zh) * | 2017-03-30 | 2023-08-04 | 康维达无线有限责任公司 | 电信设备和方法 |
US20200092726A1 (en) * | 2017-04-28 | 2020-03-19 | Vivo Mobile Communication Co., Ltd. | Method of integrity check, terminal, and network-side equipment |
US11910195B2 (en) * | 2017-04-28 | 2024-02-20 | Vivo Mobile Communication Co., Ltd. | Method of integrity check, terminal, and network-side equipment |
WO2019219668A1 (fr) * | 2018-05-14 | 2019-11-21 | Telefonaktiebolaget Lm Ericsson (Publ) | Augmentation de la sécurité de connectivité double |
WO2021118322A1 (fr) * | 2019-12-13 | 2021-06-17 | Samsung Electronics Co., Ltd. | Conception et architecture pour système de réseau multi-connectivité multi-radio |
Also Published As
Publication number | Publication date |
---|---|
CN104349312B (zh) | 2019-01-29 |
CN104349312A (zh) | 2015-02-11 |
WO2015015300A3 (fr) | 2015-07-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2015015300A2 (fr) | Procédé de gestion de la sécurité dans un système double connectivité | |
US10873889B2 (en) | Handover apparatus and method | |
US10187370B2 (en) | Fast-accessing method and apparatus | |
JP6962350B2 (ja) | 無線通信システム、無線局、無線端末、及び制御方法 | |
JP2020061792A (ja) | 無線端末、第2のコアネットワークノード、及びこれらの方法 | |
CN102487507B (zh) | 一种实现完整性保护的方法及系统 | |
WO2015176462A1 (fr) | Procédés et dispositifs de traitement pour migration et de migration de supports radio à double connexion | |
JP7389225B2 (ja) | セキュリティ保護モードを決定するための方法および装置 | |
WO2021134597A1 (fr) | Procédé et appareil pour rapporter des informations de mesure, et procédé et appareil pour collecter des informations de mesure | |
CN113709909B (zh) | 多连接通信方法和设备 | |
JP2011512750A (ja) | 無線通信システムにおいて、ハンドオーバ、またはハンドオーバを実行している間に鍵管理を実行するためのシステムおよび方法 | |
WO2016000322A1 (fr) | Procédé et dispositif conversion de drb | |
US10172052B2 (en) | Method and device for dynamically constructing virtual cell | |
JP2017509257A (ja) | ユーザ・プレーン・アーキテクチャ1aベースのデュアル接続性状況においてキーをリフレッシュする方法 | |
CN111867057B (zh) | 通信方法、装置和系统 | |
TW201906470A (zh) | 處理雙連結中交遞的裝置及方法 | |
CN110431880A (zh) | 通信系统 | |
JP6055627B2 (ja) | 移動通信方法及び移動局 | |
CN110291816B (zh) | 多连接性建立方法、通信系统、用户设备和接入点 | |
WO2015018094A1 (fr) | Procédé et dispositif de transmission de message | |
CN105009663B (zh) | 一种消息传输方法及设备 | |
WO2015169076A1 (fr) | Procédé et appareil de configuration d'informations d'autorisation, dispositif d'élément de réseau et support de stockage informatique | |
EP3448115A1 (fr) | Serveur ran, système de communication sans fil, procédé de connexion à un terminal | |
CN104335650A (zh) | 用于信令传输的方法和设备 | |
CN115884153A (zh) | 通信的方法和装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14819060 Country of ref document: EP Kind code of ref document: A2 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 14819060 Country of ref document: EP Kind code of ref document: A2 |