Method, system and device for selection algorithm of user plane

A user plane, algorithm technology, applied in the field of communication, can solve the problems that are not involved

Active Publication Date: 2008-08-13
HUAWEI TECH CO LTD
View PDF0 Cites 67 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] However, in the existing security algorithm negotiation methods applied to LTE / SAE networks, selection according to the service security level has not yet been involved.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and device for selection algorithm of user plane
  • Method, system and device for selection algorithm of user plane
  • Method, system and device for selection algorithm of user plane

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0039] The first embodiment and the second embodiment of the present invention describe a method and a process for selecting a security algorithm by a network side device and a user terminal in the process of creating a PDP (Packet Data Protocol, packet data protocol) context. Once the PDP context is created, all services carried out using the PDP context-related bearer are protected by the algorithm negotiated in this process.

[0040] The specific description of the first embodiment is as follows:

[0041]When the user creates the PDP context, he completes the selection of the user plane security algorithm. This embodiment assumes that the creation of the PDP context is triggered by the network. Before this process, it is assumed that the MME / UPE has already obtained the security capability of the UE. The way to obtain it can be, for example, during ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a selection method for user plane security algorithm, including steps of: entity at the other end of the network receives request sent by user terminal; entity at the other end of network acquires and selects user plane algorithm according to security information of user terminal. The invention also provides a system and device for selecting user plane security algorithm. By the invention, network could select algorithm of different security level according to service or user's demand, namely that algorithm is negotiated based on different services or different users, so that encryption operation in network is more flexible, and protection on different levels is provided to users and services with different security demand.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a method, system and equipment for selecting a user plane algorithm. Background technique [0002] In a UMTS (Universal Mobile Telecommunications System, universal mobile telecommunications system) system, a secure termination point is located on an RNC (Radio Network Controller, radio network controller). UE (User Equipment, user equipment) and RNC perform security operations of encryption / decryption and integrity protection, provide confidentiality protection for user data, and provide confidentiality protection and integrity protection for signaling interacted between UE and RNC. Since different user equipments support different encryption and integrity algorithms, a set of security algorithms needs to be negotiated between UE and RNC before encryption and integrity protection are performed at the access layer. The process of user plane negotiation security alg...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/38H04L9/32H04W12/02
CPCH04L63/205H04W12/033H04W12/67
Inventor 杨艳梅陈璟
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products