WO2015015300A2 - Procédé de gestion de la sécurité dans un système double connectivité - Google Patents

Procédé de gestion de la sécurité dans un système double connectivité Download PDF

Info

Publication number
WO2015015300A2
WO2015015300A2 PCT/IB2014/001839 IB2014001839W WO2015015300A2 WO 2015015300 A2 WO2015015300 A2 WO 2015015300A2 IB 2014001839 W IB2014001839 W IB 2014001839W WO 2015015300 A2 WO2015015300 A2 WO 2015015300A2
Authority
WO
WIPO (PCT)
Prior art keywords
senb
user equipment
menb
rrc connection
security
Prior art date
Application number
PCT/IB2014/001839
Other languages
English (en)
Other versions
WO2015015300A3 (fr
Inventor
Yun DENG
Pingping Wen
Chandrika Worrall
Original Assignee
Alcatel Lucent
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alcatel Lucent filed Critical Alcatel Lucent
Publication of WO2015015300A2 publication Critical patent/WO2015015300A2/fr
Publication of WO2015015300A3 publication Critical patent/WO2015015300A3/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/15Setup of multiple wireless link connections
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access

Definitions

  • the present invention relates to the wireless communication technology, and particularly to a method of supporting security handling for dual connectivity in a macro eNB, a secondary eNB and a user equipment of a wireless communication network.
  • Fig. l illustrates a schematic diagram 100 of a network architecture in the prior art, and as can be apparent, in such a network environment, a macro cell 110 provides underlying network coverage (as illustrated by a dotted background in the figure), and in the meantime, for example, small cells 121 , 122, 123 and 124 at small power (that is, with small network coverage (areas illustrated by oblique lines in the figure)) provide a possible network access at a higher speed.
  • the UE within the communal coverage may establish communication connections with the macro cell and the secondary cell simultaneously.
  • 3 GPP has identified potential protocol architectures to support dual connectivity for UE with MeNB (Master eNB) and SeNB (Secondary eNB).
  • MeNB Master eNB
  • SeNB Secondary eNB
  • Option CI Only the MeNB generates the final RRC messages to be sent towards the UE after the coordination of Radio Resource Management (RRM) functions between MeNB and SeNB.
  • RRM Radio Resource Management
  • Both MeNB and SeNB can generate final RRC messages to be sent towards the UE after the coordination of RRM functions between MeNB and SeNB and may send those messages directly to the UE (depending on L2 architecture) and the UE replies accordingly.
  • S l-U terminates in SeNB + independent PDCPs (no bearer split);
  • S l-U terminates in MeNB + no bearer split in MeNB + independent PDCP at SeNB;
  • S l-U terminates in MeNB + bearer split in MeNB + independent PDCPs for split bearers;
  • SeNB can generate RRC messages to be sent towards UE directly (i.e. Option C2), SeNB must have PDCP entity, which can ensure the RRC message security.
  • PDCP entity For the alternative user plane architectures, 1 A, 2A, 2B, 3A and 3B require PDCP entity in SeNB. 2C, 2D, 3C and 3D make PDCP entity in MeNB.
  • the architecture combination is C1+ 2C, 2D, 3C or 3D
  • one security key is sufficient.
  • two security keys are necessary.
  • the architecture combination C1+ 1A, 2A, 2B, 3A or 3B only data needs different security key; for the architecture combination C2+ 2C, 2D, 3C or 3D, only SRB in SeNB needs different security key.
  • the current specification only deals with the scenario that the network provides one security key for UE. As mentioned above, it is necessary to deal with two security keys for dual connectivity.
  • a first aspect of the invention proposes a method of supporting security handling for dual connectivity in a MeNB of a wireless communication system, wherein the wireless communication system includes the MeNB, a SeNB and a user equipment, the method comprising:
  • the MeNB determining to establish a second RRC connection for the user equipment and the SeNB, so as to form dual connectivity
  • the MeNB or the SeNB selecting a security algorithm used for the SeNB and the MeNB sending RRC connection configuration including the security algorithm to the user equipment to indicate the SeNB to establish the second RRC connection with the user equipment according to the RRC connection configuration, such that the user equipment possesses dual connectivity.
  • the method according to the present invention may establish respective RRC connection between the MeNB and the user equipment and between the SeNB and the user equipment by using different security algorithms.
  • RRC connection in the context is named as a first RRC connection and a second RRC connection.
  • the method, before the step (B), further comprises:
  • the MeNB may receive information about the security key used in access network node from the core network node, for example, MME (Mobility Management Entity).
  • MME Mobility Management Entity
  • the step (D) further comprises generating a second security key used for the second RRC connection based on the first security key.
  • a second security key is derived from the first security key used for the first RRC connection.
  • the second security key may be used for the second RRC connection to improve the security of the second RRC connection.
  • the second security key is generated for the second RRC connection based on the downlink frequency and physical cell identifier of the cell managed by the SeNB and the managed cell is the serving cell of the user equipment used for establishing the second RRC connection.
  • the second security key may be generated based on the first security key in any other known ways.
  • step (D) if the security algorithm used for the SeNB is selected by the MeNB, then the MeNB firstly obtains a configuration list of ciphering algorithm and integrity algorithm used in the SeNB and the MeNB sends the selected security algorithm used for the SeNB to the SeNB; or
  • the MeNB sends the security capability of the user equipment to the SeNB and the SeNB sends the selected security algorithm used for the SeNB to the MeNB.
  • the security algorithm used for the second RRC connection is selected by the MeNB or the SeNB. Due to different selection entities, the information needed to be acquired is also different.
  • the method comprises the following step after the step (D):
  • the MeNB receiving UE context modification request used for updating the first security key and the second security key from the core network node and updating the first security key and the second security key according to the UE context modification request.
  • the MeNB sends a first RRC connection reconfiguration instruction to the user equipment after receiving the UE context modification request, so as to indicate the user equipment to perform intra-cell handover to update the first security key and receive a first RRC connection reconfiguration complete instruction after the updating is done and to indicate the MeNB to send UE context modification response to the core network node; and the MeNB informs the SeNB to update the second security key after receiving the UE context modification request, such that the SeNB indicates the user equipment to perform intra-cell handover to reconfigure the second RRC connection in the meantime.
  • the UE context modification request contains the security capability of the user equipment and the security capability comprises the supported ciphering algorithm and integrity algorithm, and the MeNB or the SeNB selects security algorithm used for the SeNB and sends it to the user equipment via the SeNB.
  • the MeNB sends a first RRC connection reconfiguration instruction to the user equipment after receiving the UE context modification request, so as to indicate the user equipment to perform intra-cell handover to update the first security key and the user equipment deems that the cell of the SeNB served for the user equipment is deactivated and stops to transmit data to the SeNB and the MeNB receives a first RRC connection reconfiguration complete instruction from the user equipment after the updating is done and the MeNB sends UE context modification response to the core network node; and the MeNB informs the SeNB to update the second security key after receiving the UE context modification request and the MeNB sends medium access layer control signaling MAC CE to the user equipment to activate the cell of the SeNB served for the user equipment after receiving the first RRC connection reconfiguration complete instruction, and the user equipment performs random access to access the SeNB.
  • the SeNB sends security mode instruction to the user equipment and indicates the user equipment to perform the second RRC connection reconfiguration after receiving a corresponding security mode complete instruction from the user equipment, when the security algorithm of the SeNB changes.
  • the MeNB in the step (E), sends a first RRC connection reconfiguration instruction to the user equipment, after receiving the UE context modification request, to indicate the user equipment to perform intra-cell handover to update the first security key, and the user equipment deems that the cell of the SeNB served for the user equipment is deactivated and stops to transmit data to the SeNB and the MeNB receives a first RRC connection reconfiguration complete instruction from the user equipment after the updating is done and the MeNB sends UE context modification response to the core network node; and the MeNB informs the SeNB to update the second security key after receiving the UE context modification request and the MeNB receives a first information from the SeNB and the MeNB indicates the user equipment to perform the second RRC connection reconfiguration and sends medium access layer control signaling MAC CE to the user equipment to activate the cell of the SeNB served for the user equipment after receiving the first RRC connection reconfiguration complete instruction, and the user equipment performs random access to access the SeNB.
  • the first information contains resource allocation information in the SeNB and a security algorithm needed to be updated.
  • a second aspect of the invention provides a method of supporting security handling for dual connectivity in a SeNB of a wireless communication system, wherein the wireless communication system includes a MeNB, the SeNB and a user equipment, the method comprising:
  • the security algorithm used for the SeNB being selected by the MeNB or the SeNB and the MeNB sending RRC connection configuration including security algorithm to the user equipment;
  • the SeNB establishing a second RRC connection with the user equipment according to the RRC connection configuration, such that the user equipment possesses dual connectivity.
  • the MeNB generates a second security key used for the second RRC connection based on the first security key received by the MeNB from a core network node.
  • a third aspect of the invention provides a method of supporting security handling for dual connectivity in a user equipment of a wireless communication system, wherein the wireless communication system includes a MeNB, a SeNB and the user equipment, the method comprising:
  • the user equipment establishing a second RRC connection with the SeNB according to RRC connection configuration of security algorithm used for the SeNB, such that the user equipment possesses dual connectivity, wherein the security algorithm is selected by the MeNB or the SeNB.
  • Fig. l illustrates a schematic diagram of the network architecture in which the method of security handling may be applied
  • Fig.2 illustrates a flow diagram 200 of one embodiment of the method according to the present invention
  • Fig.3 illustrates a flow diagram 300 of another embodiment of the method according to the present invention.
  • Fig.4 illustrates a flow diagram 400 of still another embodiment of the method according to the present invention.
  • Fig.5 illustrates a flow diagram 500 of still another embodiment of the method according to the present invention.
  • Fig. l illustrates a schematic diagram of the network architecture in which the method of security handling may be applied. A repeated description of Fig. l is omitted because it is already described in the part "Background of the Invention".
  • Fig.2 illustrates a flow diagram 200 of one embodiment of the method according to the present invention.
  • a method of supporting security handling for dual connectivity in a MeNB of a wireless communication system according to the present invention comprises:
  • step 220 the MeNB establishes a first RRC connection with the user equipment
  • the MeNB determines to establish a second RRC connection for the user equipment and the SeNB, so as to form dual connectivity
  • the MeNB or the SeNB selects a security algorithm used for the SeNB and in step 250 the MeNB sends RRC connection configuration including the security algorithm to the user equipment to indicate the SeNB to establish the second RRC connection with the user equipment according to the RRC connection configuration in step 260, such that the user equipment possesses dual connectivity.
  • the method according to the present invention may establish respective RRC connection between the MeNB and the user equipment and between the SeNB and the user equipment by using different security algorithms.
  • RRC connection in the context is named as a first RRC connection and a second RRC connection.
  • the method before the step 220, further comprises:
  • the MeNB receives a first security key used for the first RRC connection from a core network node.
  • the MeNB may receive information about the security key used in access network node from the core network node, for example, MME (Mobility Management Entity).
  • MME Mobility Management Entity
  • the step 240 further comprises generating a second security key KeNB* used for the second RRC connection based on the first security key KeNB.
  • a second security key is derived from the first security key used for the first RRC connection.
  • the second security key may be used for the second RRC connection to improve the security of the second RRC connection.
  • the second security key is generated for the second RRC connection based on the downlink frequency and physical cell identifier of the cell managed by the SeNB and the managed cell is the serving cell of the user equipment used for establishing the second RRC connection.
  • the second security key may be generated based on the first security key in any other known ways.
  • the MeNB in the step 240, if the security algorithm used for the SeNB is selected by the MeNB, then the MeNB firstly obtains a configuration list of ciphering algorithm and integrity algorithm used in the SeNB and the MeNB sends the selected security algorithm used for the SeNB to the SeNB; or
  • the MeNB sends the security capability of the user equipment to the SeNB and the SeNB sends the selected security algorithm used for the SeNB to the MeNB.
  • the security algorithm used for the second RRC connection is selected by the MeNB or the SeNB. Due to different selection entities, the information needed to be acquired is also different.
  • the principle is that the MeNB or the SeNB determines the security algorithm according to the security capability of the user equipment and the security configuration list supported by the SeNB.
  • the method comprises the following step after the step 260:
  • the MeNB receiving UE context modification request used for updating the first security key and the second security key from the core network node and updating the first security key and the second security key according to the UE context modification request.
  • the MeNB sends a first RRC connection reconfiguration instruction to the user equipment (in step 330) after receiving the UE context modification request (in step 320), so as to indicate the user equipment to perform intra-cell handover to update the first security key and receive a first RRC connection reconfiguration complete instruction (in step 354) after the updating is done and to indicate the MeNB to send UE context modification response to the core network node (in step 350); and the MeNB informs the SeNB to update the second security key (in step 360) after receiving the UE context modification request, such that the SeNB indicates the user equipment to perform intra-cell handover to reconfigure the second RRC connection (in steps 370 and 380) in the meantime.
  • the SeNB could report successful updating of the second security key to the MeNB after the updating of the second security key is done.
  • the UE context modification request contains the security capability of the user equipment and the security capability comprises the supported ciphering algorithm and integrity algorithm, and the MeNB or the SeNB selects security algorithm used for the SeNB and sends it to the user equipment via the SeNB.
  • Fig.4 illustrates a flow diagram 400 of still another embodiment of the method according to the present invention.
  • the MeNB sends a first RRC connection reconfiguration instruction to the user equipment (in step 430) after receiving the UE context modification request (in step 420), so as to indicate the user equipment to perform intra-cell handover to update the first security key and the user equipment deems that the cell of the SeNB served for the user equipment is deactivated and stops to transmit data to the SeNB (in step 440) and the MeNB receives a first RRC connection reconfiguration complete instruction from the user equipment (in step 450) after the updating is done and the MeNB sends UE context modification response to the core network node (in step 460); and the MeNB informs the SeNB to update the second security key (in step 470) after receiving the UE context modification request and the MeNB sends medium access layer control signaling MAC CE to the user equipment to activate the cell of the SeNB served for the user equipment (in step 410).
  • the SeNB sends security mode instruction to the user equipment (in step 492) and indicates the user equipment to perform the second RRC connection reconfiguration (in steps 496 and 498) after receiving a corresponding security mode complete instruction from the user equipment (in step 494), when the security algorithm of the SeNB changes.
  • the MeNB after dual connectivity is established(in step 510), the MeNB sends a first RRC connection reconfiguration instruction to the user equipment (in step 530), after receiving the UE context modification request (in step 520), to indicate the user equipment to perform intra-cell handover to update the first security key, and the user equipment deems that the cell of the SeNB served for the user equipment is deactivated and stops to transmit data to the SeNB (in step 540) and the MeNB receives a first RRC connection reconfiguration complete instruction from the user equipment (in step 550) after the updating is done and the MeNB sends UE context modification response to the core network node (in step 560); and the MeNB informs the SeNB to update the second security key (in step 570) after receiving the UE context modification request and the MeNB receives a first information from the SeNB (in step 580) and the MeNB indicates the user equipment to perform the second RRC connection reconfiguration (in step 582) and sends medium access layer control signaling MAC CE to the user equipment
  • the user equipment needs to perform random access when the user equipment accesses the SeNB, because the ahead of uplink schedules of the user equipment in the cell managed by the MeNB and the cell managed by the SeNB are different. Therefore, the user equipment needs not to perform random access when the user equipment accesses the SeNB, because the ahead of uplink schedules of the user equipment in the cell managed by the MeNB and the cell managed by the SeNB are the same.
  • the first information contains resource allocation information in the SeNB and a security algorithm needed to be updated.
  • a second aspect of the invention provides a method of supporting security handling for dual connectivity in a SeNB of a wireless communication system, wherein the wireless communication system includes a MeNB, the SeNB and a user equipment, the method comprising:
  • the security algorithm used for the SeNB being selected by the MeNB or the SeNB and the MeNB sending RRC connection configuration including security algorithm to the user equipment;
  • the SeNB establishing a second RRC connection with the user equipment according to the RRC connection configuration, such that the user equipment possesses dual connectivity.
  • the MeNB generates a second security key used for the second RRC connection based on the first security key received by the MeNB from a core network node.
  • a third aspect of the invention provides a method of supporting security handling for dual connectivity in a user equipment of a wireless communication system, wherein the wireless communication system includes a MeNB, a SeNB and the user equipment, the method comprising:
  • the user equipment establishing a second RRC connection with the SeNB according to RRC connection configuration of security algorithm used for the SeNB, such that the user equipment possesses dual connectivity, wherein the security algorithm is selected by the MeNB or the SeNB.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un procédé de gestion de la sécurité dans le MeNB d'un système de communication sans fil double connectivité. Le système de communication sans fil comprend le MeNB, un SeNB et un équipement d'utilisateur. Le procédé comprend les étapes suivantes : le MeNB établit une première connexion RRC avec l'équipement d'utilisateur ; le MeNB détermine l'établissement d'une seconde connexion RRC pour l'équipement d'utilisateur et le SeNB, de sorte à former une double connectivité ; et le MeNB ou le SeNB sélectionnent un algorithme de sécurité pour le SeNB et le MeNB en envoyant des informations de configuration de connexion RRC comprenant l'algorithme de sécurité, à l'équipement d'utilisateur, pour indiquer au SeNB d'établir la seconde connexion RRC avec l'équipement d'utilisateur d'après les informations de configuration de connexion RRC, si bien que l'équipement d'utilisateur ait une double connectivité. Le procédé selon l'invention peut établir une connexion RRC respective entre le MeNB et l'équipement d'utilisateur, et entre le SeNB et l'équipement d'utilisateur, au moyen de différents algorithmes de sécurité.
PCT/IB2014/001839 2013-08-02 2014-08-01 Procédé de gestion de la sécurité dans un système double connectivité WO2015015300A2 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310337478.9 2013-08-02
CN201310337478.9A CN104349312B (zh) 2013-08-02 2013-08-02 用于支持双连接的安全处理的方法

Publications (2)

Publication Number Publication Date
WO2015015300A2 true WO2015015300A2 (fr) 2015-02-05
WO2015015300A3 WO2015015300A3 (fr) 2015-07-02

Family

ID=52146540

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2014/001839 WO2015015300A2 (fr) 2013-08-02 2014-08-01 Procédé de gestion de la sécurité dans un système double connectivité

Country Status (2)

Country Link
CN (1) CN104349312B (fr)
WO (1) WO2015015300A2 (fr)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170026347A1 (en) 2015-07-24 2017-01-26 Futurewei Technologies, Inc. Ultra Dense Network Security Architecture and Method
WO2018059866A1 (fr) * 2016-09-28 2018-04-05 Sony Corporation Appareil et procédés de télécommunications pour gestion de supports radio divisés
CN110463240A (zh) * 2017-03-30 2019-11-15 索尼公司 电信设备和方法
WO2019219668A1 (fr) * 2018-05-14 2019-11-21 Telefonaktiebolaget Lm Ericsson (Publ) Augmentation de la sécurité de connectivité double
JP2019220969A (ja) * 2016-01-08 2019-12-26 日本電気株式会社 無線通信システム、無線局、無線端末、及び制御方法
US20200092726A1 (en) * 2017-04-28 2020-03-19 Vivo Mobile Communication Co., Ltd. Method of integrity check, terminal, and network-side equipment
JP2020511846A (ja) * 2017-03-23 2020-04-16 ホアウェイ・テクノロジーズ・カンパニー・リミテッド 設定方法および装置、並びにシステム
WO2021118322A1 (fr) * 2019-12-13 2021-06-17 Samsung Electronics Co., Ltd. Conception et architecture pour système de réseau multi-connectivité multi-radio

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106375992B (zh) * 2015-07-20 2019-08-06 中兴通讯股份有限公司 实现接入层安全的方法及用户设备和节点
CN107113821B (zh) * 2015-09-24 2020-12-18 山东黄海数据科技有限公司 上行数据传输的方法和装置
CN107306455B (zh) * 2016-04-20 2022-07-01 中兴通讯股份有限公司 一种双连接操作的方法、基站、ue及mme
US10932131B2 (en) * 2016-08-03 2021-02-23 Nokia Solutions And Networks Oy Service provisioning by local operator
CN109246692A (zh) * 2017-06-16 2019-01-18 华为技术有限公司 连接管理方法、终端及无线接入网设备
CN109429283B (zh) * 2017-08-31 2021-07-20 华为技术有限公司 通信方法、装置和系统
WO2019090727A1 (fr) * 2017-11-10 2019-05-16 Oppo广东移动通信有限公司 Procédé de commande et de transmission de signalisation, et produit associé
KR20200096806A (ko) 2017-12-15 2020-08-13 광동 오포 모바일 텔레커뮤니케이션즈 코포레이션 리미티드 사용자 장치를 페이징하는 방법, 제1 네트워크 장치 및 사용자 장치
CN109168161B (zh) * 2018-08-27 2021-11-02 创新维度科技(北京)有限公司 安全模式激活方法、装置、系统和计算机存储介质
JP2020535667A (ja) 2018-08-28 2020-12-03 アップル インコーポレイテッドApple Inc. セルラ通信のための移動性向上
CN112218344B (zh) * 2019-07-12 2022-12-30 华为技术有限公司 一种通信方法及装置

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7899495B2 (en) * 2006-07-14 2011-03-01 Qualcomm Incorporated Methods and apparatus for supporting multiple connections
US9185552B2 (en) * 2009-05-06 2015-11-10 Qualcomm Incorporated Method and apparatus to establish trust and secure connection via a mutually trusted intermediary
CN103188663B (zh) * 2011-12-27 2016-08-03 华为技术有限公司 基站间载波聚合的安全通讯方法及设备
CN102740289B (zh) * 2012-06-15 2015-12-02 电信科学技术研究院 一种密钥更新方法、装置及系统

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
None

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10412056B2 (en) 2015-07-24 2019-09-10 Futurewei Technologies, Inc. Ultra dense network security architecture method
US20170026347A1 (en) 2015-07-24 2017-01-26 Futurewei Technologies, Inc. Ultra Dense Network Security Architecture and Method
US11711724B2 (en) 2016-01-08 2023-07-25 Nec Corporation Methods and apparatuses for transmitting control-plane messages in cells using different radio access technologies
US10952099B2 (en) 2016-01-08 2021-03-16 Nec Corporation Methods and apparatuses for transmitting control-plane messages in cells using different radio access technologies
JP7272395B2 (ja) 2016-01-08 2023-05-12 日本電気株式会社 無線局システム、無線端末、及びこれらの方法
JP2019220969A (ja) * 2016-01-08 2019-12-26 日本電気株式会社 無線通信システム、無線局、無線端末、及び制御方法
JP2022002409A (ja) * 2016-01-08 2022-01-06 日本電気株式会社 無線局システム、無線端末、及びこれらの方法
WO2018059866A1 (fr) * 2016-09-28 2018-04-05 Sony Corporation Appareil et procédés de télécommunications pour gestion de supports radio divisés
US10834771B2 (en) 2016-09-28 2020-11-10 Sony Corporation Telecommunications apparatus and methods for handling split radio bearers
EP3796741A3 (fr) * 2016-09-28 2022-06-08 Sony Group Corporation Appareil et procédés de télécommunications pour gestion de supports radio divisés
US12010745B2 (en) 2016-09-28 2024-06-11 Sony Corporation Telecommunications apparatus and methods for handling split radio bearers
JP2020511846A (ja) * 2017-03-23 2020-04-16 ホアウェイ・テクノロジーズ・カンパニー・リミテッド 設定方法および装置、並びにシステム
US11425779B2 (en) 2017-03-23 2022-08-23 Huawei Technologies Co., Ltd. Configuration method and apparatus, and system
US11950314B2 (en) 2017-03-23 2024-04-02 Huawei Technologies Co., Ltd. Configuration method and apparatus, and system
CN110463240A (zh) * 2017-03-30 2019-11-15 索尼公司 电信设备和方法
CN110463240B (zh) * 2017-03-30 2023-08-04 康维达无线有限责任公司 电信设备和方法
US20200092726A1 (en) * 2017-04-28 2020-03-19 Vivo Mobile Communication Co., Ltd. Method of integrity check, terminal, and network-side equipment
US11910195B2 (en) * 2017-04-28 2024-02-20 Vivo Mobile Communication Co., Ltd. Method of integrity check, terminal, and network-side equipment
WO2019219668A1 (fr) * 2018-05-14 2019-11-21 Telefonaktiebolaget Lm Ericsson (Publ) Augmentation de la sécurité de connectivité double
WO2021118322A1 (fr) * 2019-12-13 2021-06-17 Samsung Electronics Co., Ltd. Conception et architecture pour système de réseau multi-connectivité multi-radio

Also Published As

Publication number Publication date
CN104349312B (zh) 2019-01-29
CN104349312A (zh) 2015-02-11
WO2015015300A3 (fr) 2015-07-02

Similar Documents

Publication Publication Date Title
WO2015015300A2 (fr) Procédé de gestion de la sécurité dans un système double connectivité
US10873889B2 (en) Handover apparatus and method
US10187370B2 (en) Fast-accessing method and apparatus
JP6962350B2 (ja) 無線通信システム、無線局、無線端末、及び制御方法
JP2020061792A (ja) 無線端末、第2のコアネットワークノード、及びこれらの方法
CN102487507B (zh) 一种实现完整性保护的方法及系统
WO2015176462A1 (fr) Procédés et dispositifs de traitement pour migration et de migration de supports radio à double connexion
JP7389225B2 (ja) セキュリティ保護モードを決定するための方法および装置
WO2021134597A1 (fr) Procédé et appareil pour rapporter des informations de mesure, et procédé et appareil pour collecter des informations de mesure
CN113709909B (zh) 多连接通信方法和设备
JP2011512750A (ja) 無線通信システムにおいて、ハンドオーバ、またはハンドオーバを実行している間に鍵管理を実行するためのシステムおよび方法
WO2016000322A1 (fr) Procédé et dispositif conversion de drb
US10172052B2 (en) Method and device for dynamically constructing virtual cell
JP2017509257A (ja) ユーザ・プレーン・アーキテクチャ1aベースのデュアル接続性状況においてキーをリフレッシュする方法
CN111867057B (zh) 通信方法、装置和系统
TW201906470A (zh) 處理雙連結中交遞的裝置及方法
CN110431880A (zh) 通信系统
JP6055627B2 (ja) 移動通信方法及び移動局
CN110291816B (zh) 多连接性建立方法、通信系统、用户设备和接入点
WO2015018094A1 (fr) Procédé et dispositif de transmission de message
CN105009663B (zh) 一种消息传输方法及设备
WO2015169076A1 (fr) Procédé et appareil de configuration d'informations d'autorisation, dispositif d'élément de réseau et support de stockage informatique
EP3448115A1 (fr) Serveur ran, système de communication sans fil, procédé de connexion à un terminal
CN104335650A (zh) 用于信令传输的方法和设备
CN115884153A (zh) 通信的方法和装置

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14819060

Country of ref document: EP

Kind code of ref document: A2

122 Ep: pct application non-entry in european phase

Ref document number: 14819060

Country of ref document: EP

Kind code of ref document: A2