WO2019161548A1 - 控制上报安全校验失败的方法及装置、计算机存储介质 - Google Patents
控制上报安全校验失败的方法及装置、计算机存储介质 Download PDFInfo
- Publication number
- WO2019161548A1 WO2019161548A1 PCT/CN2018/077063 CN2018077063W WO2019161548A1 WO 2019161548 A1 WO2019161548 A1 WO 2019161548A1 CN 2018077063 W CN2018077063 W CN 2018077063W WO 2019161548 A1 WO2019161548 A1 WO 2019161548A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- timer
- indication information
- network device
- terminal
- data bearer
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/61—Time-dependent
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
- H04W12/106—Packet or message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/0252—Traffic management, e.g. flow control or congestion control per individual bearer or channel
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/18—Management of setup rejection or failure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/30—Connection release
- H04W76/38—Connection release triggered by timers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/19—Connection re-establishment
Definitions
- the present invention relates to the field of wireless communication technologies, and in particular, to a method and apparatus for controlling failure of reporting security verification, and a computer storage medium.
- enhanced mobile broadband eMBB
- URLLC Ultra Reliable Low Latency Communication
- mMTC massive machine type communication
- 5G mobile communication technology is also called Next Generation Wireless Communication Technology (NR, New Radio).
- NR Next Generation Wireless Communication Technology
- LTE Long Term Evolution
- NR Combination of NR coverage
- LTE Long Term Evolution
- a tight interworking mode between LTE and NR is proposed.
- each packet data convergence protocol (PDCP, Packet Data)
- the Convergence Protocol (SDU) Service Data Unit (SDU) additionally carries an integrity protection check code (MAC-I) for integrity protection check.
- MAC-I integrity protection check code
- the data receiving end needs to perform integrity protection check on each data packet. If the integrity protection check fails, it is very likely that the data is received and attacked and maliciously altered. Data that has been maliciously altered should be discarded. For this to happen, the network side should take appropriate measures to avoid the existence of security risks and ensure communication security. Further, when it is detected that the integrity protection check of the downlink data fails, the user equipment (UE, User Equipment) should notify the network side that the integrity protection check failure of the data detected by a certain bearer fails, but considers the completeness of the reported data. The signaling load of the sexual protection check failure is too large, and measures need to be taken to control the reporting.
- UE User Equipment
- an embodiment of the present invention provides a method and apparatus for controlling a failure of reporting a security check, and a computer storage medium.
- the first indication information is sent to the network device, where the first indication information is used to indicate that the integrity protection check failure is detected, and the first timer is started;
- the terminal receives the second indication information sent by the network device before the first timer expires, stopping the first timer; if the first timer expires, the terminal does not receive And sending the first indication information to the network device, and restarting the first timer, to the second indication information sent by the network device.
- the method further includes:
- the terminal Receiving, by the terminal, the first configuration information that is sent by the network device, where the first configuration information is used to configure a corresponding timer for the at least one data bearer, where the at least one data bearer includes the first data bearer,
- the first data bearer corresponds to the first timer.
- the at least one data bearer further includes a second data bearer, where the second data bearer corresponds to a second timer, where
- the second timer is different from the first timer
- the terminal detects that the integrity protection check of the second data bearer fails during the running of the first timer, sending, by the network device, third indication information, where the third indication information is used to indicate An integrity protection check failure is detected and the second timer is started.
- the method further includes:
- the terminal receives the second configuration information that is sent by the network device, where the second configuration information is used to configure a corresponding first timer for the terminal, where all data bearers under the terminal correspond to the first A timer, all data bearers under the terminal include the first data bearer.
- the method further includes:
- the terminal After the terminal sends the first indication information to the network device, if the terminal switches from the first cell to the second cell within the first time period, the terminal resends the First indication information.
- the second indication information includes at least reconfiguration information or key update information.
- a detecting unit configured to detect that the integrity protection check of the first data bearer fails
- the reporting control unit is configured to send the first indication information to the network device, where the first indication information is used to indicate that the integrity protection check failure is detected, and the first timer is started; if the first timer expires, Receiving the second indication information sent by the network device, stopping the first timer; if the second indication information sent by the network device is not received before the first timer expires, Sending the first indication information to the network device, and restarting the first timer.
- the device further includes:
- a first receiving unit configured to receive first configuration information that is sent by the network device, where the first configuration information is used to configure a corresponding timer for at least one data bearer, where the at least one data bearer includes the first data
- the first data bearer corresponds to the first timer.
- the at least one data bearer further includes a second data bearer, where the second data bearer corresponds to a second timer, where
- the second timer is different from the first timer
- the reporting control unit is further configured to: if the detecting unit detects that the integrity protection check of the second data bearer fails during the running of the first timer, send the third indication information to the network device The third indication information is used to indicate that the integrity protection check failure is detected, and the second timer is started.
- the device further includes:
- a second receiving unit configured to receive second configuration information that is sent by the network device, where the second configuration information is used to configure a corresponding first timer for the terminal, where all data bearers under the terminal are Corresponding to the first timer, all data bearers under the terminal include the first data bearer.
- the reporting control unit is further configured to: after the first indication information is sent to the network device, if the terminal switches from the first cell to the second cell within the first time duration, The second cell resends the first indication information.
- the second indication information includes at least reconfiguration information or key update information.
- the computer storage medium provided by the embodiment of the present invention has stored thereon computer executable instructions, and when the computer executable instructions are executed by the processor, the method for controlling the reported security check failure is implemented.
- the terminal when the terminal detects that the integrity protection check of the first data bearer fails, the terminal sends the first indication information to the network device, where the first indication information is used to indicate that the integrity protection check fails to be detected. And starting a first timer; if the terminal receives the second indication information sent by the network device before the first timer expires, stopping the first timer; if the first timer Before the timeout, the terminal does not receive the second indication information sent by the network device, and then resends the first indication information to the network device, and restarts the first timer.
- the indication of reporting the integrity check failure is detected by the timer, and the signaling load is effectively controlled.
- FIG. 1 is a schematic flowchart of a method for controlling failure of reporting security check according to an embodiment of the present invention
- FIG. 2 is a schematic structural diagram of an apparatus for controlling a failure of reporting a security check according to an embodiment of the present invention
- FIG. 3 is a schematic structural diagram of a computer device according to an embodiment of the present invention.
- the technical solution of the embodiment of the present invention is mainly applied to a 5G mobile communication system.
- the technical solution of the embodiment of the present invention is not limited to the 5G mobile communication system, and can also be applied to other types of mobile communication systems.
- eMBB aims at users to obtain multimedia content, services and data, and its business needs are growing rapidly. Because eMBB may be deployed in different scenarios, such as indoors, urban areas, and rural areas, the difference in service capabilities and requirements is relatively large. Therefore, services must be analyzed in combination with specific deployment scenarios.
- URLLC scenario Typical applications for URLLC include: industrial automation, power automation, telemedicine operations, traffic security, and more.
- Typical characteristics of URLLC include: high connection density, small data volume, delay-insensitive service, low cost and long service life of the module.
- FIG. 1 is a schematic flowchart of a method for controlling a failure of reporting a security check according to an embodiment of the present invention. As shown in FIG. 1 , the method for controlling a failure to report a security check includes the following steps:
- Step 101 When the terminal detects that the integrity protection check of the first data bearer fails, the terminal sends the first indication information to the network device, where the first indication information is used to indicate that the integrity protection check failure is detected, and the first timing is started. Device.
- the terminal is any device capable of communicating with a network device, such as a mobile phone, a tablet computer, a notebook computer, or a desktop computer.
- the network device may be a base station, for example, a gNB in 5G.
- the process of performing integrity check verification on the data bearer for each data bearer may be configured through the network side.
- the network side may configure an independent timer for each data bearer to implement independent control of each data bearer, or configure a timer for the terminal to implement control of all data bearers together. Understand that the control here refers to the failure of the control report security check.
- Step 102 If the terminal receives the second indication information sent by the network device before the first timer expires, stopping the first timer; if the first timer expires, the After the terminal does not receive the second indication information sent by the network device, the terminal sends the first indication information to the network device again, and restarts the first timer.
- the second indication information includes at least reconfiguration information or key update information.
- the terminal receives the first configuration information that is sent by the network device, where the first configuration information is used to configure a corresponding timer for the at least one data bearer, where the at least one data bearer includes the first A data bearer, the first data bearer corresponding to the first timer.
- the at least one data bearer further includes a second data bearer, where the second data bearer corresponds to a second timer; wherein the second timer is different from the first timer;
- the terminal detects that the integrity protection check of the second data bearer fails, and sends a third indication information to the network device, where the third indication information is used to indicate that the integrity is detected.
- the sexual protection check fails and the second timer is started.
- the first configuration information may also be a timer corresponding to any number of data bearers configured by the third data bearer, the fourth data bearer, and the like, for example, DRB1 corresponds to timer T1, DRB2 corresponds to timer T2, DRB3 corresponds to timer T3, and so on.
- the indication information (ie, the first indication information) for reporting the failure of the security check is independently controlled by its own timer. Specifically, when a data bearer detects that the integrity protection check fails, the terminal An indication information is reported to the network side to indicate that the integrity protection check failure is detected. At the same time, the timer of the data bearer is started. If the network side reconfiguration or key update is received before the timer expires, the timer is stopped. If no reconfiguration or key update information is received on the network side before the timer expires, the network side reports the indication that the integrity check failure is detected, and restarts the timer.
- the terminal receives the second configuration information that is sent by the network device, where the second configuration information is used to configure a corresponding first timer for the terminal, where all data under the terminal is Each bearer corresponds to the first timer, and all data bearers under the terminal include the first data bearer.
- a timer (that is, a timer of the terminal) is used to control the indication information (ie, the first indication information) that reports the failure of the security check, specifically, when a certain data bearer detects integrity. If the protection check fails, the terminal reports an indication to the network side to indicate that the integrity protection check failure is detected. At the same time, the timer of the data bearer is started. If the network side reconfiguration or key update is received before the timer expires, the timer is stopped. If no reconfiguration or key update information is received on the network side before the timer expires, the network side reports the indication that the integrity check failure is detected, and restarts the timer.
- the indication information ie, the first indication information
- the terminal after the terminal sends the first indication information to the network device, if the terminal switches from the first cell to the second cell within the first time period, the terminal resends in the second cell.
- the first indication information may be configured on the network side, or specified by a protocol, or obtained according to the implementation of the terminal itself.
- the terminal sends the first indication information to the corresponding network device 1 in the cell 1.
- the terminal needs to re-send the corresponding network device 2 in the cell 2. Sending the first indication information.
- FIG. 2 is a schematic structural diagram of an apparatus for controlling a failure of reporting a security check according to an embodiment of the present invention. As shown in FIG. 2, the apparatus includes:
- the detecting unit 201 is configured to detect that the integrity protection check of the first data bearer fails
- the report control unit 202 is configured to send first indication information to the network device, where the first indication information is used to indicate that the integrity protection check failure is detected, and start the first timer; if the first timer expires before And receiving the second indication information sent by the network device, stopping the first timer; if the second indication information sent by the network device is not received before the first timer expires, Resending the first indication information to the network device, and restarting the first timer.
- the device further includes:
- the first receiving unit 203 is configured to receive first configuration information that is sent by the network device, where the first configuration information is used to configure a corresponding timer for the at least one data bearer, where the at least one data bearer includes the first Data bearer, the first data bearer corresponding to the first timer.
- the at least one data bearer further includes a second data bearer, where the second data bearer corresponds to a second timer;
- the second timer is different from the first timer
- the reporting control unit 202 is further configured to: if the detecting unit detects that the integrity protection check of the second data bearer fails during the running of the first timer, send a third indication to the network device The third indication information is used to indicate that the integrity protection check failure is detected, and the second timer is started.
- the device further includes:
- the second receiving unit 204 is configured to receive second configuration information that is sent by the network device, where the second configuration information is used to configure a corresponding first timer for the terminal, where all data bearers under the terminal Each of the data bearers in the terminal includes the first data bearer.
- the reporting control unit 202 is further configured to: after sending the first indication information to the network device, if the terminal switches from the first cell to the second cell within the first time period, And transmitting, by the second cell, the first indication information.
- the second indication information includes at least reconfiguration information or key update information.
- each unit in the apparatus for controlling the failure of the security check failure shown in Fig. 2 can be understood by referring to the foregoing description of the method of controlling the failure of the security check.
- the function of each unit in the apparatus for controlling the failure of the security check failure shown in FIG. 2 can be realized by a program running on the processor, or can be realized by a specific logic circuit.
- the device for controlling the failure to report the security check may be stored in a computer readable storage medium if it is implemented in the form of a software function module and sold or used as a separate product.
- the technical solution of the embodiments of the present invention may be embodied in the form of a software product in essence or in the form of a software product stored in a storage medium, including a plurality of instructions.
- a computer device (which may be a personal computer, server, or network device, etc.) is caused to perform all or part of the methods described in various embodiments of the present invention.
- the foregoing storage medium includes various media that can store program codes, such as a USB flash drive, a mobile hard disk, a read only memory (ROM), a magnetic disk, or an optical disk.
- program codes such as a USB flash drive, a mobile hard disk, a read only memory (ROM), a magnetic disk, or an optical disk.
- the embodiment of the present invention further provides a computer storage medium, wherein the computer executable instructions are stored, and when the computer executable instructions are executed by the processor, the method for controlling the reported security check failure of the embodiment of the present invention is implemented.
- FIG. 3 is a schematic structural diagram of a computer device according to an embodiment of the present invention, and the computer device may be any type of terminal.
- computer device 100 may include one or more (only one shown) processor 1002 (processor 1002 may include, but is not limited to, a Micro Controller Unit (MCU) or a programmable logic device.
- a processing device such as an FPGA (Field Programmable Gate Array), a memory 1004 for storing data, and a transmission device 1006 for a communication function.
- FPGA Field Programmable Gate Array
- FIG. 3 is merely illustrative and does not limit the structure of the above electronic device.
- computer device 100 may also include more or fewer components than those shown in FIG. 3, or have a different configuration than that shown in FIG.
- the memory 1004 can be used to store software programs and modules of application software, such as program instructions/modules corresponding to the method in the embodiment of the present invention, and the processor 1002 executes various functional applications by running software programs and modules stored in the memory 1004. And data processing, that is, to achieve the above method.
- Memory 1004 can include high speed random access memory, and can also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid state memory.
- memory 1004 can further include memory remotely located relative to processor 1002, which can be connected to computer device 100 over a network. Examples of such networks include, but are not limited to, the Internet, intranets, local area networks, mobile communication networks, and combinations thereof.
- Transmission device 1006 is for receiving or transmitting data via a network.
- the network specific examples described above may include a wireless network provided by a communication provider of computer device 100.
- the transmission device 1006 includes a Network Interface Controller (NIC) that can be connected to other network devices through a base station to communicate with the Internet.
- the transmission device 1006 can be a radio frequency (RF) module for communicating with the Internet wirelessly.
- NIC Network Interface Controller
- RF radio frequency
- the disclosed method and smart device may be implemented in other manners.
- the device embodiments described above are merely illustrative.
- the division of the unit is only a logical function division.
- there may be another division manner such as: multiple units or components may be combined, or Can be integrated into another system, or some features can be ignored or not executed.
- the coupling, or direct coupling, or communication connection of the components shown or discussed may be indirect coupling or communication connection through some interfaces, devices or units, and may be electrical, mechanical or other forms. of.
- the units described above as separate components may or may not be physically separated, and the components displayed as the unit may or may not be physical units, that is, may be located in one place or distributed to multiple network units; Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
- each functional unit in each embodiment of the present invention may be integrated into one second processing unit, or each unit may be separately used as one unit, or two or more units may be integrated into one unit;
- the above integrated unit can be implemented in the form of hardware or in the form of hardware plus software functional units.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (13)
- 一种控制上报安全校验失败的方法,所述方法包括:终端检测到第一数据承载的完整性保护检验失败时,向网络设备发送第一指示信息,所述第一指示信息用于指示检测到完整性保护校验失败,并启动第一定时器;如果所述第一定时器超时前,所述终端接收到所述网络设备发送的第二指示信息,则停止所述第一定时器;如果所述第一定时器超时前,所述终端未接收到所述网络设备发送的所述第二指示信息,则重新向所述网络设备发送所述第一指示信息,并重新启动所述第一定时器。
- 根据权利要求1所述的方法,其中,所述方法还包括:所述终端接收所述网络设备发送的第一配置信息,所述第一配置信息用于为至少一个数据承载配置对应的定时器,所述至少一个数据承载包括所述第一数据承载,所述第一数据承载对应所述第一定时器。
- 根据权利要求2所述的方法,其中,所述至少一个数据承载还包括第二数据承载,所述第二数据承载对应第二定时器;其中,所述第二定时器与所述第一定时器不同;如果在所述第一定时器运行期间,所述终端检测到所述第二数据承载的完整性保护检验失败,则向所述网络设备发送第三指示信息,所述第三指示信息用于指示检测到完整性保护校验失败,并启动所述第二定时器。
- 根据权利要求1所述的方法,其中,所述方法还包括:所述终端接收所述网络设备发送的第二配置信息,所述第二配置信息用于为所述终端配置对应的第一定时器,其中,所述终端下的全部数据承载均对应所述第一定时器,所述终端下的全部数据承载包括所述第一数据承载。
- 根据权利要求1至4任一项所述的方法,其中,所述方法还包括:所述终端向所述网络设备发送所述第一指示信息后,如果在第一时长内所述终端从第一小区切换到第二小区,则所述终端在所述第二小区重新发送所述第一指示信息。
- 根据权利要求1至5任一项所述的方法,其中,所述第二指示信息至少包括重配置信息、或密钥更新信息。
- 一种控制上报安全校验失败的装置,所述装置包括:检测单元,用于检测到第一数据承载的完整性保护检验失败;上报控制单元,用于向网络设备发送第一指示信息,所述第一指示信息用于指示检测到完整性保护校验失败,并启动第一定时器;如果所述第一定时器超时前,接收到所述网络设备发送的第二指示信息,则停止所述第一定时器;如果所述第一定时器超时前,未接收到所述网络设备发送的所述第二指示信息,则重新向所述网络设备发送所述第一指示信息,并重新启动所述第一定时器。
- 根据权利要求7所述的装置,其中,所述装置还包括:第一接收单元,用于接收所述网络设备发送的第一配置信息,所述第一配置信息用于为至少一个数据承载配置对应的定时器,所述至少一个数据承载包括所述第一数据承载,所述第一数据承载对应所述第一定时器。
- 根据权利要求8所述的装置,其中,所述至少一个数据承载还包括第二数据承载,所述第二数据承载对应第二定时器;其中,所述第二定时器与所述第一定时器不同;所述上报控制单元,还用于如果在所述第一定时器运行期间,所述检测单元检测到所述第二数据承载的完整性保护检验失败,则向所述网络设备发送第三指示信息,所述第三指示信息用于指示检测到完整性保 护校验失败,并启动所述第二定时器。
- 根据权利要求7所述的装置,其中,所述装置还包括:第二接收单元,用于接收所述网络设备发送的第二配置信息,所述第二配置信息用于为所述终端配置对应的第一定时器,其中,所述终端下的全部数据承载均对应所述第一定时器,所述终端下的全部数据承载包括所述第一数据承载。
- 根据权利要求7至10任一项所述的装置,其中,所述上报控制单元,还用于向所述网络设备发送所述第一指示信息后,如果在第一时长内所述终端从第一小区切换到第二小区,则在所述第二小区重新发送所述第一指示信息。
- 根据权利要求7至11任一项所述的装置,其中,所述第二指示信息至少包括重配置信息、或密钥更新信息。
- 一种计算机存储介质,其上存储有计算机可执行指令,该计算机可执行指令被处理器执行时实现权利要求1至6任一项所述的方法步骤。
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020207027362A KR102382344B1 (ko) | 2018-02-23 | 2018-02-23 | 시큐리티 체크 실패 보고의 제어 방법, 장치 및 컴퓨터 기억 매체 |
AU2018409918A AU2018409918A1 (en) | 2018-02-23 | 2018-02-23 | Method and device for controlling reporting of security check failure and computer storage medium |
CN201880088999.6A CN111699708A (zh) | 2018-02-23 | 2018-02-23 | 控制上报安全校验失败的方法及装置、计算机存储介质 |
EP18907430.5A EP3751879A4 (en) | 2018-02-23 | 2018-02-23 | SECURITY CHECK FAILURE REPORT CONTROL PROCESS AND DEVICE AND COMPUTER INFORMATION SUPPORT |
JP2020544444A JP2021518069A (ja) | 2018-02-23 | 2018-02-23 | セキュリティチェック失敗報告の制御方法、装置及びコンピュータ記憶媒体 |
PCT/CN2018/077063 WO2019161548A1 (zh) | 2018-02-23 | 2018-02-23 | 控制上报安全校验失败的方法及装置、计算机存储介质 |
US16/994,307 US20200382960A1 (en) | 2018-02-23 | 2020-08-14 | Method and device for controlling reporting of security check failure and computer storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2018/077063 WO2019161548A1 (zh) | 2018-02-23 | 2018-02-23 | 控制上报安全校验失败的方法及装置、计算机存储介质 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/994,307 Continuation US20200382960A1 (en) | 2018-02-23 | 2020-08-14 | Method and device for controlling reporting of security check failure and computer storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019161548A1 true WO2019161548A1 (zh) | 2019-08-29 |
Family
ID=67686659
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2018/077063 WO2019161548A1 (zh) | 2018-02-23 | 2018-02-23 | 控制上报安全校验失败的方法及装置、计算机存储介质 |
Country Status (7)
Country | Link |
---|---|
US (1) | US20200382960A1 (zh) |
EP (1) | EP3751879A4 (zh) |
JP (1) | JP2021518069A (zh) |
KR (1) | KR102382344B1 (zh) |
CN (1) | CN111699708A (zh) |
AU (1) | AU2018409918A1 (zh) |
WO (1) | WO2019161548A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2022082640A1 (en) * | 2020-10-22 | 2022-04-28 | Nokia Shanghai Bell Co., Ltd. | Failure cancellation recording |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102204217A (zh) * | 2011-05-30 | 2011-09-28 | 华为技术有限公司 | 通知网络能力的方法、装置和系统 |
WO2012060565A2 (en) * | 2010-11-04 | 2012-05-10 | Lg Electronics Inc. | Method and apparatus for reconfiguring connection to base station at relay node in a wireless communication system |
CN104936170A (zh) * | 2014-03-21 | 2015-09-23 | 华为技术有限公司 | 检测中间人攻击的方法与装置 |
-
2018
- 2018-02-23 AU AU2018409918A patent/AU2018409918A1/en not_active Abandoned
- 2018-02-23 CN CN201880088999.6A patent/CN111699708A/zh active Pending
- 2018-02-23 EP EP18907430.5A patent/EP3751879A4/en not_active Withdrawn
- 2018-02-23 WO PCT/CN2018/077063 patent/WO2019161548A1/zh unknown
- 2018-02-23 JP JP2020544444A patent/JP2021518069A/ja not_active Withdrawn
- 2018-02-23 KR KR1020207027362A patent/KR102382344B1/ko active IP Right Grant
-
2020
- 2020-08-14 US US16/994,307 patent/US20200382960A1/en not_active Abandoned
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2012060565A2 (en) * | 2010-11-04 | 2012-05-10 | Lg Electronics Inc. | Method and apparatus for reconfiguring connection to base station at relay node in a wireless communication system |
CN102204217A (zh) * | 2011-05-30 | 2011-09-28 | 华为技术有限公司 | 通知网络能力的方法、装置和系统 |
CN104936170A (zh) * | 2014-03-21 | 2015-09-23 | 华为技术有限公司 | 检测中间人攻击的方法与装置 |
Non-Patent Citations (1)
Title |
---|
See also references of EP3751879A4 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2022082640A1 (en) * | 2020-10-22 | 2022-04-28 | Nokia Shanghai Bell Co., Ltd. | Failure cancellation recording |
Also Published As
Publication number | Publication date |
---|---|
KR102382344B1 (ko) | 2022-04-04 |
CN111699708A (zh) | 2020-09-22 |
US20200382960A1 (en) | 2020-12-03 |
AU2018409918A1 (en) | 2020-10-01 |
EP3751879A4 (en) | 2021-02-17 |
KR20200125963A (ko) | 2020-11-05 |
EP3751879A1 (en) | 2020-12-16 |
JP2021518069A (ja) | 2021-07-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110999523A (zh) | 重新连接与无线接入网节点的无线资源控制连接的方法和用户设备 | |
EP3840522B1 (en) | Methods and devices for controlling rrc state | |
EP3742815B1 (en) | Recovering an rrc connection | |
JP2021514126A (ja) | フル構成で接続を再開するための方法、ネットワークノード、無線デバイス、およびコンピュータプログラム製品 | |
TWI771513B (zh) | 一種rrc連接重建立方法及裝置、儲存媒體 | |
WO2019161548A1 (zh) | 控制上报安全校验失败的方法及装置、计算机存储介质 | |
WO2019223774A1 (zh) | 一种提高寻呼可靠性的方法及装置、计算机存储介质 | |
US11882450B2 (en) | Method and device for determining security algorithm, and computer storage medium | |
EP4319250A1 (en) | Communication method and apparatus | |
CN109644338B (zh) | 一种获取密钥的方法及装置、计算机存储介质 | |
WO2019140619A1 (zh) | 一种信息指示方法及装置、计算机存储介质 | |
CN113748715B (zh) | 分解式基站架构中的小区组配置 | |
AU2021269615B2 (en) | Integrity Protection Failure Handling Method and Apparatus, and User Equipment | |
US20220279415A1 (en) | Controlling mobility between base stations of different types | |
CN111641981B (zh) | 一种终端上下文的获取方法及装置、计算机存储介质 | |
WO2019153174A1 (zh) | 一种参数配置方法及装置、计算机存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18907430 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2020544444 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2018907430 Country of ref document: EP Effective date: 20200910 |
|
ENP | Entry into the national phase |
Ref document number: 20207027362 Country of ref document: KR Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2018409918 Country of ref document: AU Date of ref document: 20180223 Kind code of ref document: A |