Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, equipment and system for realizing security context information synchronization

A context and security technology, applied in the field of communication, which can solve the problems of asynchronous security context and inability to complete the UMTS operation process.

Active Publication Date: 2011-05-18
HUAWEI TECH CO LTD
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present invention provide a method, device, and system for synchronizing security context information to solve the problem in the prior art that the security context between RNC and NodeB is not synchronized, resulting in the inability to complete some operation procedures in UMTS

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, equipment and system for realizing security context information synchronization
  • Method, equipment and system for realizing security context information synchronization
  • Method, equipment and system for realizing security context information synchronization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0034] figure 1 A flowchart of a method for implementing security context information synchronization provided by an embodiment of the present invention, as shown in figure 1 As shown, this method is suitable for local switching scenarios, and the method includes:

[0035] S101. The base station acquires user plane security context information o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a method, equipment and a system for realizing security context information synchronization. The method comprises the following steps that: a base station acquires user plane security context information of user equipment transmitted by a radio network controller (RNC), wherein the user plane security context information comprises an uplink / downlink serial number and an encryption key which are wirelessly carried; the base station encrypts data transmitted to the user equipment according to the user plane security context information or decrypts the data received from the user equipment, wherein the user plane security context information varies along with the encryption / decryption; and if set trigger conditions are met, the base station transmits the changed user plane security context information serving as the current user plane security context information to the RNC. Therefore, the synchronization of the security context information between a Node B and the RNC is guaranteed to smoothly perform certain operation processes in a universal mobile telecommunications system (UMTS).

Description

technical field [0001] The embodiments of the present invention relate to the field of communication technologies, and in particular, to a method, device and system for realizing synchronization of security context information. Background technique [0002] Local Switch (hereinafter referred to as: LS) ​​is a local loopback technology for user data. This technology enables user data to be directly looped back locally at a data aggregation point that is closer to the user, saving transmission resources within the network. . For the Universal Mobile Telecommunications System (Universal Mobile Telecommunications System; UMTS for short), there are two types of LSs, namely a base station (NodeB) LS and a radio network controller (Radio Network Controller; RNC for short) LS. Since the transmission resource of the Iub interface between NodeB and RNC is more scarce, the demand of NodeB LS is more urgent. NodeB LS can effectively save data transmission resources on the Iub interfac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W88/08H04W88/12H04W12/033
Inventor 陈璟徐小英庞伶俐
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products