Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method for implementing encryption negotiation between user equipment and network side

A user equipment, network-side technology, applied in network traffic/resource management, key distribution, can solve problems such as lack of implementability and operability, and achieve the effect of easy operation and implementation

Inactive Publication Date: 2011-12-21
HUAWEI TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0025] The purpose of the present invention is to provide a method for implementing encryption negotiation between the user equipment and the network side, aiming to solve the problem of lack of implementability and operability in the prior art when the encryption of the signaling plane and the data plane are separately processed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for implementing encryption negotiation between user equipment and network side
  • A method for implementing encryption negotiation between user equipment and network side
  • A method for implementing encryption negotiation between user equipment and network side

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0040]In the present invention, the encryption negotiation on the signaling plane and the encryption negotiation on the data plane are processed separately. When the user registers to the network side, the UE and the first network element on the network side, such as the MME of the evolved network, perform the encryption negotiation on the signaling plane. When a bearer is established between the UE and the network side, data plane encryption negotiation is performed between the UE and a second network element on the network side, such as a UPE of an evolved network.

[0041] Figure 4 It shows th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method of negotiating the encrypting algorithm between the user equipment and the network, and its device and system are disclosed. When registering, the UE negotiates the encrypting algorithm of the singling plane with the network. And the encrypting algorithm of the data plane is negotiated between the UE and the network when the traffic is established. The negotiating of the data plane and the singling plane can be divided, so the encrypting between the UE and the core network can be processed accurately after the MME and the UPE divided.

Description

technical field [0001] The invention belongs to the field of mobile communication, and in particular relates to a method for implementing data encryption between user equipment and a network side. Background technique [0002] In order to enhance the competitiveness of future networks, the Third Generation Partnership Projects (3GPP) is studying a new evolved network architecture, including System Architecture Evolution (SAE) and long-term evolution of access networks (Long Term Evolution, LTE), and the evolved access network is called E-UTRAN (Evolved Universal Terrestril Radio Access Network). figure 1 A network architecture of an evolved packet core network is shown, including a mobility management entity (Mobility Management Entity, MME), a user plane entity (User Plane Entity, UPE) and a user plane anchor point ( Inter Access System Anchor, Inter AS Anchor) three logical functional entities. Among them, MME is responsible for the mobility management of the control pla...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04W28/18
CPCH04L9/08H04L9/3271
Inventor 吴问付
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products