WO2020121455A1 - Dispositif terminal, dispositif, système et procédé de communication sans fil - Google Patents

Dispositif terminal, dispositif, système et procédé de communication sans fil Download PDF

Info

Publication number
WO2020121455A1
WO2020121455A1 PCT/JP2018/045771 JP2018045771W WO2020121455A1 WO 2020121455 A1 WO2020121455 A1 WO 2020121455A1 JP 2018045771 W JP2018045771 W JP 2018045771W WO 2020121455 A1 WO2020121455 A1 WO 2020121455A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
security
terminal device
wireless communication
base station
Prior art date
Application number
PCT/JP2018/045771
Other languages
English (en)
Japanese (ja)
Inventor
陽平 工口
大出 高義
義博 河▲崎▼
Original Assignee
富士通株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 富士通株式会社 filed Critical 富士通株式会社
Priority to JP2020559620A priority Critical patent/JP7160114B2/ja
Priority to PCT/JP2018/045771 priority patent/WO2020121455A1/fr
Publication of WO2020121455A1 publication Critical patent/WO2020121455A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/20Selecting an access point

Definitions

  • the present invention relates to a terminal device, a wireless communication device, a wireless communication system, and a wireless communication method.
  • LTE Long Term Evolution
  • signal integrity guarantee and encryption are performed between the terminal device (User Equipment: UE) and the base station (evolved Node-B: eNB).
  • UE User Equipment
  • eNB evolved Node-B
  • keys used for integrity assurance and encryption of the C (Control)-Plane signal and the U (User)-Plane signal are managed by the UE and the eNB, respectively. ..
  • a security algorithm for signal integrity guarantee and encryption an algorithm that can be used by both the UE and the eNB is used.
  • the security algorithm may be simply referred to as an algorithm.
  • Algorithms used in LTE include SNOW 3G, ASE (Advanced Encryption Standard), and ZUC.
  • the processing related to security between the UE and the eNB in LET is executed as follows.
  • the UE sends an algorithm that can be used by itself to the MME (Mobility Management Entity) as UE Security Capability.
  • the MME sends the acquired UE Security Capability to the eNB.
  • the security-related processing is executed as follows.
  • a case will be described where there are two eNBs, a first eNB and a second eNB.
  • the UE connected to the first eNB moves in the serving area and connects to the second eNB
  • the UE sends one or more available algorithms to the second eNB as UE Security Capability.
  • the second eNB that has received the UE Security Capability selects an algorithm and establishes a wireless connection with the UE.
  • the second eNB fails to establish a connection with the UE.
  • RRC_inactive As the state of RRC (Radio Resource Control). This is a state in which the wireless channel (Wireless Channel) between the base station and the terminal device is disconnected while maintaining the AS context including AS (Access Stratum) information such as security and the upper level circuit. Is a state equivalent to the conventional RRC_idle. However, unlike the case where the base station shifts from RRC_idel (standby state) to RRC_connection (connected state) when the base station holds the AS context, the terminal device in this case does not perform the upper line setting and does not perform RRC-inactive( It is possible to shift to RRC_connection from the wireless line disconnection and the upper line connection state).
  • RRC_inactive location registration is performed in a RAN (Radio Access Network) area that is narrower than the conventional tracking area (TA: Tracking Area).
  • TA Tracking Area
  • the tracking area and the RAN area may be referred to as a location registration area.
  • TAU Tracking Area Update
  • RAU Radio Access Area Update
  • the TAU is a process in which the terminal periodically (periodically) reports the existing area to the network so that the base station recognizes the existing area of the terminal device at the time of an incoming call (incoming call).
  • the RAU is a process in which the terminal device periodically performs location registration in a RAN area smaller than TA in the RRC_inactive state. As described above, the terminal device uses RA when transitioning from RRC-inactive to RRC_connection.
  • the source base station determines whether or not communication with the destination base station is possible based on the security capability information received from the terminal device, and communicates with the destination base station.
  • a terminal device receives a list of corresponding security algorithms from a network at the time of handover to another network and selects a security algorithm.
  • 3GPP TS 23.501 V15.3.0 (2018-09) 3GPP TS 36.211 V15.2.0 (2018-06) 3GPP TS 36.212 V15.2.1 (2018-07) 3GPP TS 36.213 V15.2.0 (2018-06) 3GPP TS 36.300 V15.2.0 (2018-06) 3GPP TS 36.321 V15.2.0 (2018-07) 3GPP TS 36.322 V15.1.0 (2018-07) 3GPP TS 36.323 V15.0.0 (2018-07) 3GPP TS 36.331 V15.2.2 (2018-06) 3GPP TS 36.413 V15.2.0 (2018-06) 3GPP TS 36.423 V15.2.0 (2018-06) 3GPP TS 36.425 V15.0.0 (2018-06) 3GPP TS 37.340 V15.2.0 (2018-06) 3GPP TS 38.201 V15.0.0 (2017-12) 3GPP TS 38.202 V15.2.0 (2018-06
  • the terminal (UE) connected to a certain base station (gNB) is in the RRC_inactive state and then the UE moves within the area (moves between areas), the gNB connected at the movement destination and before the movement
  • the algorithm that can be used differs from the gNB that was connected to.
  • the transition from the RRC_inactive state to RRC_connected may fail. If the transition to RRC_connected fails, the terminal device becomes RLF (Radio Link Failure).
  • the communication loss occurs for the time until the RLF is reached and the time from the RLF occurrence until the gNB reselection and connection to the selected gNB are added, and as a result, the transmission speed to the terminal device decreases. There is a risk that Therefore, the effect of shortening the reconnection time and improving the transmission rate by using RRC_inactive becomes small.
  • the source base station transmits information of the security key used for communication with the destination base station to the terminal device based on the information of the security capability received from the terminal device
  • information is transmitted to the terminal in the RRC_inactive state. Is difficult to convey. Therefore, it is difficult to improve the transmission speed even by using this conventional technique.
  • the conventional technique that selects a security algorithm based on the distributed list of corresponding security algorithms, secure information is notified, and it is difficult to transmit information to a terminal in the RRC_inactive state. Therefore, it is difficult to improve the transmission rate using this conventional technique.
  • the disclosed technique is made in view of the above, and an object thereof is to provide a terminal device, a wireless communication device, a wireless communication system, and a wireless communication method that improve the transmission speed.
  • the receiving unit receives, from the wireless communication device, first information about a plurality of base stations according to security information of the terminal device. To receive.
  • the selection unit selects a base station to be connected from the plurality of base stations based on the first information.
  • the transmitting unit transmits the second information for restarting the wireless connection to the selected base station.
  • the terminal device the wireless communication device, the wireless communication system, and the wireless communication method disclosed in the present application, it is possible to improve the transmission speed.
  • FIG. 1 is a system configuration diagram of a wireless communication system.
  • FIG. 2 is a block diagram of the UE.
  • FIG. 3 is a diagram illustrating an example of the terminal-specific cell list.
  • FIG. 4 is a block diagram of gNB.
  • FIG. 5 is a block diagram of AMF.
  • FIG. 6 is a diagram showing an example of the format of the terminal-specific cell list.
  • FIG. 7 is a sequence diagram of the reconnection process when the gNB that receives the paging corresponds to the security algorithm that can be used by the UE.
  • FIG. 8 is a sequence diagram of the reconnection process when the gNB that received paging from the UE does not support the available dark security algorithm.
  • FIG. 8 is a sequence diagram of the reconnection process when the gNB that received paging from the UE does not support the available dark security algorithm.
  • FIG. 9 is a sequence diagram of the reconnection process when the security algorithm that can be used by the UE corresponds to the gNB that is the transmission destination of the TAU.
  • FIG. 10 is a sequence diagram of the reconnection process when the UE-enabled dark security algorithm is not supported by the gNB of the TAU transmission destination.
  • FIG. 11 is a sequence diagram of processing from network construction to UE becoming RRC_inactive.
  • FIG. 12 is a hardware configuration diagram of the AMF.
  • FIG. 13 is a flowchart of cell list transmission stop processing in the wireless communication system according to the second embodiment.
  • FIG. 14 is a flowchart of an example of a customization process of information registered in the terminal individual cell list.
  • the terminal device, the wireless communication device, the wireless communication system, and the wireless communication method disclosed in the present application are not limited to the embodiments described below. Further, the problems and examples in the present specification are merely examples, and do not limit the scope of rights of the present application. In particular, even if the described expressions are different, as long as they are technically equivalent, the technology of the present application can be applied even if the expressions are different, and the scope of rights is not limited. Then, the respective embodiments can be appropriately combined within a range in which the processing content is not inconsistent.
  • the wireless communication system 100 includes a UE 1, an AMF (Access and Mobility Management Function) 2, a gNB 3, an SMF (Session Management Function) 4 and an UPF (User Plane Function) 5.
  • a UE an AMF (Access and Mobility Management Function) 2
  • a gNB an SMF (Session Management Function) 4
  • an UPF User Plane Function
  • the UE1 is a terminal device and performs data transmission by wireless communication with gNB3. For example, the UE1 acquires the tracking area information from the AMF2 via the gNB3. Next, the UE1 selects a cell to be connected from the cells included in the tracking area, and connects to the gNB3 forming the cell. After that, the UE1 communicates with another UE1 via the connected gNB3. The state in which the UE 1 can communicate is a state called RRC_connected. Also, the UE1 periodically executes TAU to update the tracking area.
  • the state of UE1 transits from RRC_connected to RRC_inactive when the Inactive Timer or the data communication frequency satisfies a predetermined condition.
  • RRC_inactive the radio layer connection between the UE1 and the gNB3 is disconnected, but the upper layer remains connected.
  • the gNB3 and the AMF2 that are finally connected hold the AS context of the UE1.
  • the AS context includes AS information such as security including a security algorithm.
  • UE1 transmits location registration information (may be described as location information) and receives a RAN area, which is a location registration area, from AMF2 via gNB3.
  • the UE1 periodically executes RAU to update the RAN area.
  • UE1 acquires the information of the RAN area and the tracking area transmitted from AMF2 via gNB3.
  • the UE1 when transitioning from RRC_inactive to RRC_connected, the UE1 establishes communication by reconnecting the radio layer by performing random access, establishment of radio synchronization, RRC configuration, etc. with the gNB3 included in the RAN area. .. This connection processing when transitioning from RRC_inactive to RRC_connected will be described in detail later.
  • AMF2 is a wireless communication device that executes mobility management in C(control)-Plane.
  • the AMF 2 executes registration and control of the location registration information of the UE 1.
  • the AMF2 updates the tracking area of the UE1 by using the position information transmitted from the UE1 by the TAU.
  • the AMF2 updates the RAN area of the UE1 using the location registration information transmitted from the UE1 by the RAU.
  • AMF2 also controls incoming and outgoing calls. Further, the AMF2 manages security information of the UE1 and the gNB3. Further, when the AMF 2 receives the TAU from the UE 1, the AMF 2 transmits the information on the tracking area corresponding to the position information of the UE 1 to the UE 1 via the gNB 3. In addition, when the AMF 2 receives the RAU from the UE 1, the AMF 2 transmits the RAN area information corresponding to the location registration information of the UE 1 to the UE 1 via the gNB 3.
  • GNB3 is a radio base station that provides 5G radio.
  • the gNB3 executes data transfer by wireless communication with the UE1.
  • the gNB3 transmits information on the RAN area and the tracking area transmitted from the AMF2 to the UE1.
  • the SMF 4 is a communication control device that executes session management in C-Plane.
  • the SMF 4 controls setting and releasing of a session in wireless communication.
  • UPF5 controls communication in U(User)-Plane.
  • the UPF 5 processes data packets between the wireless communication network and the data network.
  • FIG. 2 is a block diagram of the UE.
  • the UE 1 includes an RRC processing unit 11, a PDCP (Packet Data Convergence Protocol) processing unit 12, an RLC (Radio Link Control) processing unit 13, a MAC (Media Access Control) processing unit 14, and a PHY (Physical). It has a processing unit 15. Furthermore, the UE 1 has a communication control unit 16.
  • the terminal-specific cell list for grasping the security algorithm that can be used by each gNB 3 at the time of paging (at the time of calling or notification of an incoming call) and at the time of updating the tracking area is sent to the UE 1.
  • the terminal-specific cell list may be sent to the UE1 when updating the RAN area.
  • the RRC processing unit 11 executes processing in the RRC layer such as system notification information distribution, paging distribution, NAS (Non Access Stratum) message distribution, RRC connection management, wireless security setting and handover control. Further, the RRC processing unit 11 periodically transmits a location registration request to the AMF2.
  • the location registration request is, for example, TAU for updating the tracking area or RAU for updating the RAN area.
  • the RRC processing unit 11 has a cell selection control unit 111 and a security information management unit 112.
  • the cell selection control unit 111 acquires a tracking area code indicating a tracking area during paging or TAU. Then, the cell selection control unit 111 acquires the terminal-specific cell list from SIB (System Information Block) which is system information (or system control information) included in the tracking area code.
  • SIB System Information Block
  • FIG. 3 is a diagram showing an example of a terminal individual cell list.
  • the terminal-specific cell list 201 is a list in which gNB3 in which the algorithm A can be used as the security algorithm is registered.
  • the cell selection control unit 111 can specify the gNB3 that can be used by the algorithm A from the terminal-specific cell list 201.
  • the cell selection control unit 111 can confirm from the terminal-specific cell list 201 that the gNB3 having the cell ID #3 can use the algorithm A.
  • the terminal-specific cell list 202 is a list in which gNB3 in which the algorithm B can be used as a security algorithm is registered.
  • the cell selection control unit 111 can specify the gNB3 that can be used by the algorithm B from the terminal-specific cell list 202.
  • the cell selection control unit 111 can confirm from the terminal-specific cell list 202 that the gNB3 having the cell ID #1 or #2 can use the algorithm B.
  • the terminal-specific cell list 203 is a list in which gNB3 that can use algorithm A or B as a security algorithm is registered.
  • the cell selection control unit 111 can specify the gNB3 that can be used by the algorithm A or B from the terminal-specific cell list 203.
  • the cell selection control unit 111 can confirm from the terminal-specific cell list 203 that the gNB3 having the cell IDs #1 to #3 can use the algorithm A or B.
  • it is referred to as a terminal individual cell list 200.
  • the cell selection control unit 111 instructs the PHY processing unit 15 to measure the wireless line quality of the gNB3 registered in the terminal-specific cell list 200. After that, the cell selection control unit 111 acquires the measurement result of the wireless channel quality of each gNB3 registered in the terminal-specific cell list 200. Then, the cell selection control unit 111 selects the gNB3 to be connected using the wireless line quality of each gNB3, such as selecting the cell with the best wireless line quality. After that, the cell selection control unit 111 outputs the information of the selected gNB3 and the terminal-specific cell list 200 to the security information management unit 112.
  • the cell selection control unit 111 corresponds to an example of a “selection unit”.
  • the terminal individual cell list 200 corresponds to an example of “first information”.
  • the security information management unit 112 holds security information including information on security algorithms usable by the UE 1.
  • the security information management unit 112 registers the security algorithm information in the UE capability (terminal performance information) transmitted to the gNB3 connected to the RRC processing unit 11. Further, the security information management unit 112 creates an AS context including a security key for data communication and an algorithm. Then, the security information management unit 112 transmits the AS context to the AMF 2 via the PDCP processing unit 12, the RLC processing unit 13, the MAC processing unit 14, the PHY processing unit 15, and the communication control unit 16 when the connection is established. It should be noted that the terminal performance information does not change due to external factors such as wireless line quality, but is the capability of the terminal itself.
  • the security information management unit 112 receives from the cell selection control unit 111 the information of the gNB3 selected as the connection destination and the input of the terminal individual cell list 200. Then, the security information management unit 112 identifies a security algorithm that can be used by the gNB3 selected as the connection destination by using the terminal-specific cell list 200 for communication with the UE1. Next, the security information management unit 112 determines the security algorithm used for communication with the gNB3 selected as the connection destination. After that, the security information management unit 112 notifies the PDCP processing unit 12 of the security algorithm used for communication with the gNB3 selected as the connection destination.
  • the RRC processing unit 11 transmits an RRC Resume Request, which is a communication restart request, to the gNB 3 selected as the connection destination by the cell selection control unit 111. After that, the RRC processing unit 11 receives the RRC Resume from the connection destination gNB3, establishes the connection of the wireless layer, and establishes the communication connection with the gNB3.
  • the RRC processing unit 11 corresponds to an example of a “wireless connection management unit”.
  • Resume Request is an example of “second information”.
  • the PDCP processing unit 12 executes processing in the PDCP layer such as IP (Internet Protocol) packet header compression, decompression, and encryption.
  • the PDCP processing unit 12 has a security control unit 121.
  • the security control unit 121 performs signaling integrity assurance and encryption, and encryption cancellation.
  • the security control unit 121 acquires the information of the security algorithm used for communication notified from the security information management unit 112. Then, the security control unit 121 encrypts the data to be transmitted using the specified security algorithm and guarantees the integrity.
  • the security control unit 121 also decrypts the data input from the RLC processing unit 13 using a designated security algorithm.
  • the RLC processing unit 13 executes processing in the RLC layer such as retransmission control, duplicate detection, and order alignment.
  • the MAC processing unit 14 executes processing in the MAC layer such as radio resource allocation, data mapping and retransmission control. For example, the MAC processing unit 14 performs radio resource allocation, data mapping, and the like on the data input from the RLC processing unit 13, and outputs the data to the PHY processing unit 15.
  • the PHY processing unit 15 executes processing in the PHY layer such as modulation and demodulation, encoding and decoding, antenna multiplexing, and quality measurement. For example, the PHY processing unit 15 performs demodulation processing or decoding processing on the signal input from the communication control unit 16 and outputs the signal to the MAC processing unit 14. Further, the PHY processing unit 15 performs modulation processing or coding processing on the signal input from the MAC processing unit 14 and outputs the signal to the communication control unit 16.
  • the communication control unit 16 performs conversion between a PHY baseband signal and a wireless signal.
  • the communication control unit 16 transmits a wireless signal to the gNB3 of the connection destination. Further, the communication control unit 16 receives a wireless signal from the gNB3 that is the connection destination.
  • the communication control unit 16 corresponds to an example of the “reception unit”. Further, the communication control unit 16 may include a transmission unit (transmitter), a reception unit (receiver), or a communication unit (communication device).
  • FIG. 4 is a block diagram of gNB.
  • the gNB 3 has an RRC processing unit 31, a PDCP processing unit 32, an RLC processing unit 33, a MAC processing unit 34, a PHY processing unit 35, a communication control unit 36, and an SDAP (Service Discovery Adaptation Profile) processing unit 37.
  • RRC processing unit 31 a PDCP processing unit 32, an RLC processing unit 33, a MAC processing unit 34, a PHY processing unit 35, a communication control unit 36, and an SDAP (Service Discovery Adaptation Profile) processing unit 37.
  • the RRC processing unit 31 executes processes in the RRC layer such as RRC connection management, wireless security setting, and handover control.
  • the RRC processing unit 31 has a security information management unit 311.
  • the RRC processing unit 31 corresponds to an example of “connection control unit”.
  • the security information management unit 112 holds security information including information on security algorithms that can be used by gNB3. Further, when the UE1 connects to the gNB3, the security information management unit 112 receives the AS context of the connecting UE1 from the AMF2. Then, the security information management unit 112 holds the AS context of the UE1 when the connected UE1 is in the RRC_connected state or when it transits to RRC_inactive. That is, the security information management unit 112 holds security information including information on security algorithms that can be used by the UE1. Further, the security information management unit 311 notifies the security control unit 321 of the security information including the information of the security algorithm included in the AS context of the UE1.
  • the RRC processing unit 31 receives the RRC Resume Request from the UE1 when the UE 1 in the RRC_inactive state selects its own device gNB3 as the connection destination for resuming communication. Then, the RRC processing unit 31 transmits a Retrieve AS Context Request, which is an acquisition request of the AS context of the UE 1, to the gNB 3 holding the AS context of the UE 1, such as the anchor gNB. After that, the RRC processing unit 31 receives the Retrieve AS Context Response from the gNB 3 that has transmitted the acquisition request. Then, the RRC processing unit 31 sets the cell formed by the gNB3, which is the own device, as the anchor cell or the serving cell of the UE1. After that, the RRC processing unit 31 transmits the RRC Resume to the UE 1. After that, the RRC processing unit 31 establishes a wireless layer connection with the UE1 and a communication connection with the UE1.
  • the PDCP processing unit 32 executes processing in the PDCP layer such as IP packet header compression, decompression, and encryption.
  • the PDCP processing unit 32 has a security control unit 321. Further, the PDCP processing unit 32 receives from the SDAP processing unit 37 the input of the IP packet transmitted from the other gNB3 and AMF2. Further, the PDCP processing unit 32 outputs to the SDAP processing unit 37 the IP packet to be transmitted to the other gNB3, AMF2 and the like.
  • the security control unit 321 performs signaling integrity assurance and encryption, and decryption.
  • the security control unit 321 acquires the information of the security algorithm used for communication notified from the security information management unit 311. Then, the security control unit 321 encrypts the data to be transmitted to the UE1 using the designated security algorithm and guarantees the integrity.
  • the security control unit 221 also decrypts the transmission data from the UE 1 input from the RLC processing unit 33, using a designated security algorithm.
  • the RLC processing unit 33 executes processing in the RLC layer such as retransmission control, duplicate detection, and order alignment.
  • the MAC processing unit 34 executes processing in the MAC layer such as radio resource allocation, data mapping and retransmission control. For example, the MAC processing unit 34 performs radio resource allocation and data mapping for the data input from the RLC processing unit 33, and outputs the data to the PHY processing unit 35.
  • the PHY processing unit 35 executes processing in the PHY layer such as modulation and demodulation, encoding and decoding, and antenna multiplexing. For example, the PHY processing unit 35 performs demodulation processing or decoding processing on the signal input from the communication control unit 16 and outputs the signal to the MAC processing unit 34. Further, the PHY processing unit 35 performs modulation processing and coding processing on the signal input from the MAC processing unit 34 and outputs the signal to the communication control unit 36.
  • the communication control unit 36 performs conversion between PHY baseband signals and wireless signals.
  • the communication control unit 36 transmits a radio signal to the UE1 of the connection destination. Further, the communication control unit 16 receives a wireless signal from the UE 1 that is the connection destination.
  • the SDAP processing unit 37 Manages user data QoS (Quality Of Service). For example, the SDAP processing unit 37 receives the input of the IP packet received from the core network 6 from the PDCP processing unit 32. Then, the SDAP processing unit 37 maps the acquired IP packet on a radio bearer corresponding to QoS, and outputs it to the PDCP processing unit 32. Further, the SDAP processing unit 37 maps the IP packet acquired from the PDCP processing unit 32 to a radio bearer corresponding to QoS and sends it to the core network 6.
  • QoS Quality Of Service
  • FIG. 5 is a block diagram of AMF.
  • the AMF 2 has a communication control unit 21, a mobility control unit 22, a path control unit 23, a base station management unit 24, a cell list management unit 25, and a security management unit 26.
  • the communication control unit 21 transmits/receives data to/from the gNB3.
  • the communication control unit 21 mediates communication between the gNB 3 and the mobility control unit 22, the path control unit 23, and the base station management unit 24.
  • the communication control unit 21 adds the terminal individual cell list 200 of the paging destination UE1 acquired from the cell list management unit 25 to the paging transmitted from the path control unit 23, and sends the paging destination to the gNB3.
  • the communication control unit 21 corresponds to an example of “information receiving unit”.
  • the path control unit 23 controls incoming and outgoing calls. For example, the path control unit 23 receives the information on the tracking area and the RAN area of the UE 1 from the mobility control unit 22. The path control unit 23 also receives the paging request from the gNB3. Next, the path control unit 23 determines the communication route to the UE 1 that is the paging destination using the tracking area or the RAN area. Then, the path control unit 23 transmits the paging to the gNB3 of the determined communication route. Further, the path control unit 23 notifies the cell list management unit 25 of the execution of paging when performing paging. At this time, the path control unit 23 notifies the cell list management unit 25 of information on the tracking area in which the UE 1 is located.
  • the base station management unit 24 manages base station information including cell information in TA or RA units.
  • the base station management unit 24 transmits a Cell Information Request, which is a cell information notification request, to each gNB 3 when the network is constructed.
  • This Cell Information Request also includes a notification request of a security algorithm that can be used by each gNB3.
  • the base station management unit 24 receives the cell information from each gNB3. Then, the base station management unit 24 notifies the security management unit 26 of the security algorithm that can be used by each gNB 3.
  • the base station management unit 24 sets a tracking area and a RAN area from the acquired cell information. Then, the base station management unit 24 outputs the information on the tracking area and the RAN area together with the cell information to the mobility control unit 22. Further, the base station management unit 24 outputs information on the tracking area to the cell list management unit 25.
  • the mobility control unit 22 executes registration and control of the location information of the UE1. Specifically, the mobility control unit 22 receives the information on the tracking area and the RAN area together with the cell information from the base station management unit 24. The mobility control unit 22 also periodically receives a report of the area in which the UE 1 is located. Then, the mobility control unit 22 specifies the tracking area of the UE1. Further, when the UE1 is RRC_inactive, the mobility control unit 22 specifies the RAN area. The mobility controller 22 notifies the path controller 23 of the tracking area and RAN area of the UE 1. The mobility control unit 22 also notifies the cell list management unit 25 of the update of the tracking area. At this time, the mobility control unit 22 notifies the cell list management unit 25 of information on the tracking area in which the UE 1 is located.
  • the security management unit 26 receives the performance information transmitted from each UE 1.
  • the performance information also includes information on a security algorithm that can be used by each UE 1.
  • the security management unit 26 Based on this, the security management unit 26 generates AS context information of each UE1. Further, the security management unit 26 receives from the base station management unit 24 the information of the security algorithm that can be used by each gNB 3. Then, the security management unit 26 stores the information of the security algorithm that can be used for each UE1 and each gNB3.
  • the security management unit 26 generates each UEAS context information based on the performance information of the UE1 establishing the connection with the gNB3. Then, the security management unit 26 transmits the AS context information to the gNB 3 which establishes the connection with the UE 1 and sets the AS context.
  • the cell list management unit 25 receives input of tracking area information from the base station management unit 24. Further, the cell list management unit 25 acquires information on the security algorithm of each gNB 3 from the security management unit 26. Then, the cell list management unit 25 creates the terminal-specific cell list 200 for each security algorithm pattern for each tracking area. In the present embodiment, the terminal-specific cell list 200 generates a white cell list indicating gNB3 that can be used for each security algorithm or gNB3 that can be line-configured by using the security algorithm.
  • the cell list management unit 25 executes the following processing.
  • the cell list management unit 25 acquires, from the security management unit 26, information on the security algorithm that can be used by the UE 1 that is the target of paging, tracking area update, or location registration area update. Then, the cell list management unit 25 selects the terminal-specific cell list 200 in the tracking area (location registration area) in which the UE 1 is located and has a pattern corresponding to the security algorithm usable by the UE 1, and transmits the cell list 200 to the UE 1. .
  • the cell list management unit 25 corresponds to an example of “information management unit”.
  • the cell list management unit 25 uses the white cell list as the terminal-specific cell list 200.
  • the cell list management unit 25 may use, as the terminal individual cell list 200, a gNB3 that does not correspond to each security algorithm, or a black cell list in which gNB3 in which line setting is difficult because the security algorithm does not correspond is used. Good.
  • the UE1 detects the connectable gNB3 by performing radio channel quality measurement on the gNB3 excluding the gNB3 registered in the acquired terminal-specific cell list 200.
  • the black cell list can reduce the amount of information.
  • the cell list management unit 25 may determine whether the terminal individual cell list 200 to be transmitted is the white cell list or the black cell list according to the amount of information.
  • the UE1 determines whether the received terminal-specific cell list 200 is the white cell list or the black cell list. Therefore, the cell list management unit 25 preferably uses the terminal-specific cell list 200 in which the 1-bit identification flag 212 is added to the cell ID information 211 as shown in FIG.
  • FIG. 6 is a diagram showing an example of the format of the terminal-specific cell list. The UE 1 can determine whether the cell ID information 211 is the white cell list or the black cell list by checking the identification flag 212 of the received terminal-specific cell list 200.
  • the cell list management unit 25 also transmits the terminal-specific cell list 200 to the gNB3 that is used for transmitting the TAU signal when the UE1 moves or is transmitted together with paging.
  • the gNB3 used for paging and transmitting the TAU signal does not correspond to the security algorithm used by the UE1. Therefore, in this embodiment, an unencrypted or common security algorithm is used for paging and TAU signal transmission.
  • the common algorithm is a security algorithm which is predetermined to be used on the network.
  • the terminal individual cell list 200 is transmitted using encryption that is not encrypted or that is easy to decipher.
  • the terminal-specific cell list 200 only needs to describe cell identification information.
  • the cell selected by the UE1 has the highest line quality in the terminal-specific cell list 200 and cannot be easily specified by a third party. From these things, it can be said that the terminal-specific cell list 200 does not include secure information. Therefore, there is no problem in transmitting the terminal-specific cell list 200 by the cell list managing unit 25 without encrypting.
  • the security algorithms used for the C-plane signal and the U-plane signal may be the same. However, if the same security algorithm is used for the C-plane signal and the U-plane signal, if the C-plane signal such as the TAU signal is not encrypted or a common algorithm is used, the U-plane signal is May be leaked to the three parties. Therefore, in this embodiment, it is preferable to use different security algorithms for the C-plane signal and the U-plane signal.
  • FIG. 7 is a sequence diagram of the reconnection process when the gNB that receives the paging corresponds to the security algorithm that can be used by the UE.
  • FIG. 8 is a sequence diagram of the reconnection process when the gNB that receives the paging does not correspond to the security algorithm usable by the UE.
  • the description will be given assuming that the operation subjects are UE1, gNB3A to 3C, and AMF2.
  • the gNB3C is an anchor gNB that serves as a relay device in the C-plane connection.
  • the gNB3A and the gNB3B have the same tracking area (position registration area), but the gNB3C has a different tracking area (position registration area). Further, in this embodiment, AMF2 is used in all of gNB3A to 3C, but this may be different.
  • the gNBs 3A to 3C transmit their cell information to the AMF2. Then, the AMF 2 acquires the cell information of gNB 3A to 3C (step S101).
  • UE1 starts random access by turning on the power, etc., and is attached to the network in which gNB3A to 3C and AMF2 are arranged. After that, by satisfying the predetermined condition, the UE1 transits to the RRC_inactive state (step S102).
  • the UE1 executes the process of TAU or RAU to update the tracking area, the RAN area or the location registration area (step S103).
  • the AMF 2 receives the downlink signal whose destination is the UE 1 (step S104).
  • AMF2 confirms the UE context of UE1 (step S105).
  • the AMF 2 creates the terminal-specific cell list 200 based on the security algorithm supported by the UE 1 (step S106).
  • the AMF 2 transmits the paging and terminal-specific cell list 200 to the UE 1 via the gNB 3C and 3A (step S107).
  • the UE1 receives the paging (step S108). Furthermore, the UE1 receives the terminal-specific cell list 200 together with paging.
  • the UE1 receives a reference signal (Reference Signal: RS) from the gNB 3A and 3B (steps S109 and S110).
  • RS Reference Signal
  • the UE1 also receives a synchronization signal from gNB3A and 3B and specifies the cell ID of gNB3A and 3B.
  • the UE1 refers to the terminal-specific cell list 200 and uses the specified cell ID to confirm that the gNB 3A and 3B are base stations corresponding to the security algorithms that the UE1 can use.
  • the UE1 uses the reference signals of the gNB 3A and 3B to perform the radio channel quality measurement (step S111).
  • the UE1 selects the cell formed by the gNB3A and the connecting cell from the result of the wireless channel quality measurement (step S112).
  • the UE1 transmits an RRC Resume Request, which is an RRC reconnection request, to the gNB 3A (step S113).
  • the gNB3A receives the RRC Resume Request and transmits a Retrieve UE Context Request, which is a transmission request of the UE context information of the UE1, to the gNB3C (step S114).
  • the gNB3C receives the Retrieve UE Context Request, and transmits the Retrieve UE Context Response for transmitting the context information of the UE1 to the gNB3A (step S115).
  • the gNB3A receives the Retrieve UE Context Response and acquires the UE context of the UE1. Then, the gNB 3A sets a self-forming cell as the anchor cell or the serving cell of the UE 1 (step S116).
  • the gNB 3A transmits an RRC Resume to the UE 1, establishes a wireless connection, and establishes a communication connection with the UE 1 (step S117).
  • the UE1 and the gNB3A perform transmission of user data using the established communication connection (step S118).
  • the gNBs 3A to 3C transmit their cell information to the AMF2. Then, the AMF 2 acquires the cell information of gNB 3A to 3C (step S201).
  • UE1 starts random access by turning on the power, etc., and is attached to the network in which gNB3A to 3C and AMF2 are arranged. After that, by satisfying the predetermined condition, the UE1 transitions to the RRC_inactive state (step S202).
  • the UE1 executes the process of TAU or RAU to update the tracking area, the RAN area or the location registration area (step S203).
  • the AMF 2 receives the downlink signal whose destination is the UE 1 (step S204).
  • AMF2 confirms the UE context of UE1 (step S205).
  • the AMF 2 creates the terminal-specific cell list 200 based on the security algorithm supported by the UE 1 (step S206).
  • the AMF 2 transmits the paging and terminal-specific cell list 200 to the UE 1 via the gNB 3C and 3A (step S207).
  • the UE1 receives the paging (step S208). Furthermore, the UE1 receives the terminal-specific cell list 200 together with paging.
  • the UE1 receives the reference signal from the gNB 3A and 3B (steps S209 and S210).
  • the UE1 also receives a synchronization signal from gNB3A and 3B and specifies the cell ID of gNB3A and 3B.
  • the UE1 refers to the terminal-specific cell list 200, and confirms that the gNB3B is a base station corresponding to the security algorithm usable by the UE1 and the gNB3A is not compatible by using the specified cell ID.
  • the UE1 executes the wireless channel quality measurement using the reference signal of the gNB3B. In this case, UE1 does not measure the wireless channel quality of the reference signal of gNB3B (step S211).
  • the UE1 selects the cell formed by the gNB3B and the connecting cell from the result of the wireless channel quality measurement (step S212).
  • the UE1 transmits an RRC Resume Request, which is an RRC reconnection request, to the gNB 3B (step S213).
  • the gNB3B receives the RRC Resume Request and transmits a Retrieve UE Context Request, which is a transmission request of the UE context information of the UE1, to the gNB3C (step S214).
  • the gNB3C receives the Retrieve UE Context Request, and transmits the Retrieve UE Context Response for transmitting the context information of the UE1 to the gNB3B (step S215).
  • the gNB3B receives the Retrieve UE Context Response and acquires the UE context of the UE1. Then, the gNB 3B sets a self-forming cell as the anchor cell or the serving cell of the UE 1 (step S216).
  • the gNB 3B transmits an RRC Resume to the UE 1, establishes a wireless connection, and establishes a communication connection with the UE 1 (step S217).
  • the UE 1 and the gNB 3B transmit user data using the established communication connection (step S218).
  • FIG. 9 is a sequence diagram of a reconnection process in the case where the destination gNB of the TAU (location registration area update) corresponds to the security algorithm usable by the UE.
  • FIG. 10 is a sequence diagram of the reconnection process when the UE-enabled dark security algorithm is not supported by the gNB of the TAU transmission destination.
  • the gNBs 3A to 3C transmit their cell information to the AMF2. Then, the AMF 2 acquires each cell information of gNB 3A to 3C (step S301).
  • UE1 starts random access by turning on the power, etc., and is attached to the network in which gNB3A to 3C and AMF2 are arranged. After that, by satisfying the predetermined condition, the UE1 transits to the RRC_inactive state (step S302).
  • the UE1 executes the movement across the tracking area (step S303).
  • the UE1 selects the gNB3A that transmits/receives the C-plane signal without considering the security algorithm (step S304).
  • UE1 transmits TAU to AMF2 via the selected gNB3A (step S305).
  • AMF2 receives TAU from UE1. Then, the AMF2 updates the tracking area of the UE1. Further, the AMF 2 confirms the UE context (step S306).
  • the AMF 2 creates the terminal-specific cell list 200 based on the security algorithm supported by the UE 1 (step S307).
  • the AMF 2 transmits the Tracking Area Update Accept, which is the update completion notification of the tracking area (location registration area), and the terminal individual cell list 200 to the UE 1 via the gNB 3C and 3A (step S308).
  • UE1 receives Tracking Area Update Accept and terminal individual cell list 200 from AMF2. Next, UE1 receives a reference signal from gNB3A and 3B (steps S309 and S310).
  • the UE1 also receives a synchronization signal from gNB3A and 3B and specifies the cell ID of gNB3A and 3B. Next, the UE1 refers to the terminal-specific cell list 200 and uses the specified cell ID to confirm that the gNB 3A and 3B are base stations corresponding to the security algorithms that the UE1 can use. Then, the UE1 executes the wireless channel quality measurement using the reference signals of the gNB 3A and 3B (step S311).
  • the UE1 selects the cell formed by the gNB3A and the connecting cell from the result of the wireless channel quality measurement (step S312).
  • the UE1 sends an RRC Resume Request, which is an RRC reconnection request, to the gNB 3A (step S313).
  • the gNB3A receives the RRC Resume Request and transmits a Retrieve UE Context Request, which is a transmission request of the UE context information of the UE1, to the gNB3C (step S314).
  • the gNB3C receives the Retrieve UE Context Request, and transmits the Retrieve UE Context Response, which transmits the context information of the UE1, to the gNB3A (step S315).
  • the gNB3A receives the Retrieve UE Context Response and acquires the UE context of the UE1. Then, the gNB 3A sets a self-forming cell as the anchor cell or the serving cell of the UE 1 (step S316).
  • the gNB 3A transmits an RRC Resume to the UE 1, establishes a wireless connection, and establishes a communication connection with the UE 1 (step S317).
  • the UE1 and the gNB3A transmit user data using the established communication connection (step S318).
  • the gNBs 3A to 3C transmit their cell information to the AMF2. Then, the AMF 2 acquires each cell information of gNB 3A to 3C (step S401).
  • UE1 starts random access by turning on the power, etc., and is attached to the network in which gNB3A to 3C and AMF2 are arranged. After that, by satisfying the predetermined condition, the UE1 transits to the RRC_inactive state (step S402).
  • the UE1 executes movement across the tracking area (or movement to a different tracking area) (step S403).
  • the UE1 selects the gNB3A that transmits/receives the C-plane signal without considering the security algorithm (step S404).
  • UE1 transmits TAU to AMF2 via the selected gNB3A (step S405).
  • AMF2 receives TAU from UE1. Then, the AMF2 updates the tracking area of the UE1. Also, the AMF 2 confirms the UE context (step S406).
  • the AMF 2 creates the terminal-specific cell list 200 based on the security algorithm supported by the UE 1 (step S407).
  • the AMF 2 transmits the Tracking Area Update Accept, which is a notification of the completion of updating the tracking area, and the terminal-specific cell list 200 to the UE 1 via the gNB 3C and 3A (step S408).
  • the UE1 receives the reference signal from the gNB 3A and 3B (steps S409 and S410).
  • the UE1 also receives a synchronization signal from gNB3A and 3B and specifies the cell ID of gNB3A and 3B.
  • the UE1 refers to the terminal-specific cell list 200, and confirms that the gNB3B is a base station corresponding to the security algorithm usable by the UE1 and the gNB3A is not compatible by using the specified cell ID.
  • the UE1 executes the wireless channel quality measurement using the reference signal of the gNB3B. In this case, UE1 does not measure the radio channel quality of the reference signal of gNB3B (step S411).
  • the UE1 selects the cell formed by the gNB3B and the connecting cell from the result of the wireless channel quality measurement (step S412).
  • the UE1 transmits an RRC Resume Request, which is an RRC reconnection request, to the gNB 3B (step S413).
  • the gNB3B receives the RRC Resume Request and transmits a Retrieve UE Context Request, which is a transmission request of the UE context information of the UE1, to the gNB3C (step S414).
  • the gNB3C receives the Retrieve UE Context Request and transmits the Retrieve UE Context Response for transmitting the context information of the UE1 to the gNB3B (step S415).
  • the gNB3B receives the Retrieve UE Context Response and acquires the UE context of the UE1. Then, gNB3B sets the cell formed by itself as the anchor cell or the serving cell of UE1 (step S416).
  • the gNB 3B transmits an RRC Resume to the UE 1, establishes a wireless connection, and establishes a communication connection with the UE 1 (step S417).
  • the UE1 and the gNB3B transmit user data using the established communication connection (step S418).
  • FIG. 11 is a sequence diagram of processing from network construction to UE becoming RRC_inactive.
  • the AMF 2 transmits a Call Information Request, which is a cell information notification request, to the gNBs 3A to 3C (step S501).
  • the Call Information Request also includes a notification request of a security algorithm that can be used by each of the gNBs 3A to 3C.
  • the gNBs 3A to 3C transmit the cell information including the information of the security algorithm that can be used by each to the AMF 2 (step S502).
  • the AMF 2 creates a terminal-specific cell list 200 for each pattern (step S503).
  • UE1 executes random access to gNB3A to 3C. Then, the UE1 transmits the UE context and sets the UE context of the UE1 in the gNBs 3A to 3C (step S504).
  • UE1 transmits the UE performance information including the security algorithm of UE1 to AMF2 (step S505).
  • the UE1 transmits TAU or location information to the AMF (step S506).
  • the gNB3C sends a paging notification to the UE1 by paging occurrence (step S507).
  • the AMF 2 After that, the AMF 2 generates each UEAS context information based on the UE performance information of the UE 1. Then, the security management unit 26 transmits the AS context information to the connected base station among the gNBs 3A to 3B and sets the AS context (step S508).
  • UE1 moves to RRC_connected (step S509).
  • the UE 1 and the base station connected to one of the gNBs 3A to 3B release the wireless link and release the UE context when a specific condition is satisfied (step S510).
  • the UE1 transits to RRC_inactive (step S511).
  • FIG. 12 is a hardware configuration diagram of the AMF.
  • the AMF 2 has a CPU (Central Processing Unit) 291, a memory 292, a hard disk 293, and a communication interface 294.
  • the CPU 291 is connected to the memory 292, the hard disk 293, and the communication interface 294 by a bus.
  • the CPU 291 communicates with the memory 292, the hard disk 293, and the communication interface 294 via the bus.
  • CPU Central Processing Unit
  • the communication interface 294 is an interface for communication between the communication control unit 21 and gNB3.
  • the hard disk 293 includes various programs including programs that implement the functions of the communication control unit 21, the mobility control unit 22, the path control unit 23, the base station management unit 24, the cell list management unit 25, and the security management unit 26 illustrated in FIG. To store.
  • the CPU 291 reads various programs from the hard disk 293, loads the programs into the memory 292, and executes the programs to execute the communication control unit 21, the mobility control unit 22, the path control unit 23, the base station management unit 24, the cell list management unit 25, and the security.
  • the function of the management unit 26 is realized.
  • the acquisition timing of the terminal individual cell list 200 may be another timing.
  • the configuration may be such that the UE1 cell list 200 is acquired from the AMF2 when the UE1 performs RAU. Even when the terminal individual cell list 200 is acquired at the RAU timing, the UE1, gNB3, and AMF2 perform the same processing as each of the above-described processings, only at the different acquisition timings.
  • the UE acquires information for determining the security algorithm that can be used by the connectable gNB. Then, when the UE reconnects to the gNB in the RRC_inactive state, the UE establishes a connection with the gNB selected from the gNBs whose usable security algorithms match the own device. As a result, it is possible to avoid the connection failure due to the mismatch of the security algorithms at the time of reconnection from the RRC_inactive state and reduce the occurrence of RLF. Therefore, it is possible to reduce the time until the occurrence of RLF and the occurrence of communication interruption for the time from the occurrence of RLF to the reselection of gNB, and it is possible to improve the transmission speed. In addition, it is possible to take full advantage of using RRC_inactive.
  • UE1, gNB3 and AMF2 according to this embodiment are also represented in FIGS. 2, 4 and 5, respectively.
  • the UE 1 according to the present embodiment differs from the first embodiment in that the UE 1 according to the present embodiment stops the transmission of the terminal-specific cell list 200 from the AMF 2 in a predetermined case.
  • the description of the operation of each unit similar to that of the first embodiment is omitted.
  • the security control unit 121 of the UE 1 acquires the information of the security algorithm to be used from the security information management unit 112 when changing the security algorithm to be used due to the change of the service to be provided. Then, when changing the security algorithm to be used, the security control unit 121 transmits a cell list transmission stop request to the AMF2 via the gNB3.
  • the cell list management unit 25 of the AMF2 receives the cell list transmission stop request from the UE1. After that, the cell list management unit 25 stops the transmission of the terminal-specific cell list 200 at the time of TAU to the UE1.
  • FIG. 13 is a flowchart of cell list transmission stop processing in the wireless communication system according to the second embodiment.
  • UE1 changes the service to be used according to an instruction from the user (step S601).
  • the UE1 changes the security algorithm to be used (step S602).
  • UE1 transmits a cell list transmission stop request to AMF2 via gNB3 (step S603).
  • AMF2 receives the cell list transmission stop request. Then, the AMF2 transmits ACK, which is a reception response of the cell list transmission stop request, to the UE1 (step S604). After this, the AMF2 stops the transmission of the terminal-specific cell list 200 to the UE1.
  • the UE according to the present embodiment stops receiving the individual terminal cell list when the service to be used is changed. As a result, unnecessary communication can be reduced, and it is possible to omit the process of confirming the mismatched security algorithm and improve the transmission speed.
  • the identification information of the gNB3 corresponding to the security algorithm usable by the UE1 is registered in the terminal individual cell list 200, but other information is also registered in the terminal individual cell list 200. May be done.
  • the information registered in the terminal-specific cell list 200 may be customized by a request from the UE1 side.
  • the security control unit 121 of the UE1 receives the instruction from the user and notifies the AMF2 of the information to be additionally registered in the terminal-specific cell list 200.
  • the cell list management unit 25 of the AMF 2 acquires information to be additionally registered in the terminal-specific cell list 200 transmitted from the UE 1. Then, the cell list management unit 25 adds the information specified at the time of creating the terminal-specific cell list 200, in addition to the identification information of the gNB3 corresponding to the security algorithm usable by the UE1.
  • FIG. 14 is a flowchart of an example of a customization process of information registered in the terminal individual cell list.
  • the information of the corresponding security algorithm is additionally registered will be described as an example.
  • UE1 transmits a cell list customization request for adding security algorithm information to AMF2 via gNB3 (step S611).
  • AMF2 receives the cell list customization request. Then, the AMF 2 transmits ACK, which is a reception response of the cell list customization request, to the UE 1 (step S612).
  • ACK which is a reception response of the cell list customization request
  • AMF2 registers information of the security algorithm corresponding to each gNB3 in the terminal-specific cell list 200 and transmits it to UE1.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un dispositif terminal, un dispositif, un système et un procédé de communication sans fil qui améliorent la vitesse de transmission. Un UE 1 comprend une unité de commande de communication 16, une unité de commande de sélection de cellule 111 et une unité de commande de sécurité 121. L'unité de commande de communication 16 reçoit, En provenance d'une AMF, des premières informations concernant une pluralité de gNB correspondant à des informations de sécurité pour l'UE 1. Sur la base des premières informations, l'unité de commande de sélection de cellule 111 sélectionne un gNB pour se connecter parmi la pluralité de gNB. L'unité de commande de sécurité 121 transmet des secondes informations, pour reprendre une connexion sans fil, vers le gNB sélectionné.
PCT/JP2018/045771 2018-12-12 2018-12-12 Dispositif terminal, dispositif, système et procédé de communication sans fil WO2020121455A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
JP2020559620A JP7160114B2 (ja) 2018-12-12 2018-12-12 端末装置、無線通信装置、無線通信システム及び無線通信方法
PCT/JP2018/045771 WO2020121455A1 (fr) 2018-12-12 2018-12-12 Dispositif terminal, dispositif, système et procédé de communication sans fil

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2018/045771 WO2020121455A1 (fr) 2018-12-12 2018-12-12 Dispositif terminal, dispositif, système et procédé de communication sans fil

Publications (1)

Publication Number Publication Date
WO2020121455A1 true WO2020121455A1 (fr) 2020-06-18

Family

ID=71076041

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2018/045771 WO2020121455A1 (fr) 2018-12-12 2018-12-12 Dispositif terminal, dispositif, système et procédé de communication sans fil

Country Status (2)

Country Link
JP (1) JP7160114B2 (fr)
WO (1) WO2020121455A1 (fr)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090007246A1 (en) * 2007-06-28 2009-01-01 Motorola, Inc. Security based network access selection
JP2018504834A (ja) * 2014-12-31 2018-02-15 華為技術有限公司Huawei Technologies Co.,Ltd. ワイヤレス通信方法、装置、およびシステム
WO2018110274A1 (fr) * 2016-12-16 2018-06-21 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ Terminal et procédé de communication
WO2018128021A1 (fr) * 2017-01-05 2018-07-12 日本電気株式会社 Terminal sans fil, station de base, procédés associés et support non temporaire lisible par ordinateur

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112889317A (zh) 2018-10-23 2021-06-01 Oppo广东移动通信有限公司 一种安全算法的处理方法及装置、终端

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090007246A1 (en) * 2007-06-28 2009-01-01 Motorola, Inc. Security based network access selection
JP2018504834A (ja) * 2014-12-31 2018-02-15 華為技術有限公司Huawei Technologies Co.,Ltd. ワイヤレス通信方法、装置、およびシステム
WO2018110274A1 (fr) * 2016-12-16 2018-06-21 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ Terminal et procédé de communication
WO2018128021A1 (fr) * 2017-01-05 2018-07-12 日本電気株式会社 Terminal sans fil, station de base, procédés associés et support non temporaire lisible par ordinateur

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
3GPP TR 33.860, no. V13.1.0, June 2016 (2016-06-01), pages 14 - 16, XP051123604 *

Also Published As

Publication number Publication date
JP7160114B2 (ja) 2022-10-25
JPWO2020121455A1 (ja) 2021-09-27

Similar Documents

Publication Publication Date Title
JP5787971B2 (ja) 移動電気通信ネットワークにおけるue能力情報の更新方法
CN105557006B (zh) 通信系统中的用户设备及由其进行通信的方法
US8228871B2 (en) Wireless handover optimization
KR101078615B1 (ko) 무선 원격통신에서의 암호화
US20080285538A1 (en) Communication system, user device therof and synchronization method thereof
US9832699B2 (en) Communication control method, user terminal, cellular base station, and access point
US9370039B2 (en) Radio base station and method
JP2018093515A (ja) 基地局、方法、及びシステム
JPWO2017195862A1 (ja) 基地局及びユーザ端末
JP6283359B2 (ja) 移動通信システム及びユーザ端末
JP2019510432A (ja) 通信方法、ネットワーク側デバイス、およびユーザ端末
US11910232B2 (en) Schemes and methods of integrity protection in mobile communication
JPWO2015076345A1 (ja) 通信制御方法、ユーザ端末、及びプロセッサ
CN101540981A (zh) 一种在紧急呼叫中进行安全能力协商的方法及系统
US8068451B2 (en) Communication system, user device thereof and synchronization method thereof
JP7160114B2 (ja) 端末装置、無線通信装置、無線通信システム及び無線通信方法
WO2022151086A1 (fr) Procédé et appareil de communication d'accès et de raccordement intégrés
CN113557699B (zh) 通信装置、基础设施设备、核心网络设备和方法
US20160249215A1 (en) Communication control method, authentication server, and user terminal
CN112055984A (zh) 从非接入层透明容器失败恢复5g非接入层
WO2014111049A1 (fr) Dispositif et procédé d'optimisation de cellule
WO2015133565A1 (fr) Procédé de commande de communication, serveur de gestion, et terminal d'utilisateur
CN109792602B (zh) 一种支撑数据传输的方法、装置及系统
EP4211912A1 (fr) Noeuds de réseau source et cible et procédés associés pour empêcher des agents d'identifier illégitimement le noeud de réseau source lors du rétablissement d'un terminal sans fil dans un noeud de réseau cible dans un réseau de communication sans fil
WO2020012658A1 (fr) Dispositif de station de base, système de communication sans fil et procédé d'acquisition de données d'authentification

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18942998

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2020559620

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18942998

Country of ref document: EP

Kind code of ref document: A1