Safe consultation method and device based on emergency call

An emergency call and safety technology, which is applied in security devices, emergency connection processing, emergency/dangerous communication services, etc., can solve the problems affecting the success rate of emergency call connection, etc. Simple and practical effects

Active Publication Date: 2010-11-10
ZTE CORP
View PDF3 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the case of an emergency call, security authentication is performed between the UE and the communication network as in a normal call, which ma

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe consultation method and device based on emergency call
  • Safe consultation method and device based on emergency call
  • Safe consultation method and device based on emergency call

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] figure 1 It is a flow chart of Embodiment 1 of the emergency call-based security negotiation method of the present invention, as shown in figure 1 As shown in this example, the emergency call-based security negotiation method includes the following steps:

[0061] 101: When the UE determines that the call request initiated by the current user is an emergency call request, set the security capability of the UE to only support the null algorithm.

[0062] In step 101 of the present invention, once the UE determines that the call requested by the user is an emergency call, the security capability is set to only support the null algorithm, no matter whether the UE is in a restricted service state or not.

[0063] 102: UE sends an Attach Request (Attach Req) message to the network side, and the Evolved Packet System Attach Type (EPS Attach Type) item in the Attach Req message is set to Evolved Packet System Emergency Attach (EPS Emergency Attach), where the user terminal T...

Embodiment 2

[0080] figure 2 It is a flow chart of Embodiment 2 of the emergency call-based security negotiation method of the present invention, such as figure 2 As shown in this example, the emergency call-based security negotiation method includes the following steps:

[0081] 201: The UE sends an Attach Req message to the network side. The Eps Attach Type item in the Attach Req message is set to Eps Emergency Attach, and the UE Network Capability item is filled in with the real security capability of the UE, that is, the security capability of the UE under normal conditions and the security capability of the UE under normal conditions. Security capabilities in restricted service situations.

[0082] 202: The MME ignores the security capability reported by the UE, and directly sets the UE security capability to only support the null algorithm.

[0083] 203: The MME selects an empty algorithm according to the security capability of the UE, and initiates a NAS Security Mode Command to...

Embodiment 4

[0100] Figure 4 It is a flow chart of Embodiment 4 of the emergency call-based security negotiation method of the present invention, as shown in Figure 4 As shown in this example, the emergency call-based security negotiation method includes the following steps:

[0101] 401: The UE reports a measurement report, and the report carries a target cell ID that meets requirements.

[0102] 402: The source eNB initiates handover based on the S1 interface according to the target cell ID, and sends a HANDOVER REQUIRED to the MME.

[0103] 403: The MME stores UE Security Capabilities that only support the null algorithm, and sends a HANDOVER REQUEST request to the target eNB, carrying the UE Security Capabilities (only supports the null algorithm).

[0104] 404: The target eNB selects the null algorithm as the security algorithm of the AS according to the UE Security Capabilities sent from the MME.

[0105] 405: The target eNB generates an RRCConnectionReconfiguration message acco...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safe consultation method based on an emergency call, which comprises the following steps of: after the attached request of a user terminal is received by a network side, determining that the attached request is an emergency attached request, and setting the safety capability of the user terminal to only support a null algorithm; or, determining that the safety capability of the user terminal carried in the attached request only supports the null algorithm, and carrying out safe consultation processing of a non-access layer and an access layer through the null algorithm and the user terminal. The invention simultaneously discloses a safe consultation device based on the emergency call. When the safe consultation of the non-access layer and the access layer is carried out by an MME (Mobility Management Entity) and an eNB (evolved Node B), the safe consultation is directly carried out by the user terminal only supporting the null algorithm, thereby enhancing the access efficiency of the emergency call and simultaneously improving the calling probability of the emergency call.

Description

technical field [0001] The invention relates to an emergency call technology in a mobile network, in particular to a safety negotiation method and device based on an emergency call in a mobile network. Background technique [0002] The 3rd Generation Partnership Project (3GPP, 3rd Generation Partnership Project) evolved packet system (EPS, Evolved Packet System) consists of an evolved terrestrial radio access network (EUTRAN, Evolved UMTS Terrestrial Radio Access Network) and an EPS evolved packet core network (EPC, Evolved Packet Core). The EPC includes a mobility management entity (MME, Mobility Management Entity), and the MME is responsible for mobility management, non-access stratum signaling processing, and user security mode management and other work related to the control plane. In EUTRAN, the base station device is an evolved base station (eNB, evolved Node-B), which is mainly responsible for wireless communication, wireless communication management, and mobility co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W4/22H04W12/04H04W12/06H04W28/16H04W76/02H04W4/90H04W12/0431H04W12/08
CPCH04W76/007H04W12/04H04W92/14H04W36/0038H04L63/205H04W12/00H04W4/22H04W76/50H04W4/90H04W12/041
Inventor 徐建华甘露张旭武
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products