Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and system for realizing synchronization of access layer security algorithms

An access layer security and security algorithm technology, applied in the field of realizing access layer security algorithm synchronization, can solve problems such as affecting user experience, eNB unable to decrypt data packets, wasting air interface resources, etc., so as to improve the timeliness of abnormal recovery and avoid abnormal , avoid wasteful effects

Inactive Publication Date: 2015-08-12
ZTE CORP
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, at the same time, a new problem is introduced: the new AS security algorithm configuration can only be sent to the UE through the RRC connection re-establishment message, and the RRC connection re-establishment message itself is not integrity-protected, so if a malicious attacker If the data encryption algorithm carried in the RRC connection re-establishment message is tampered with, the eNB and UE cannot detect it in time. In this way, there will be a large number of invalid data packets that cannot be decrypted by the eNB within a period of time on the air interface. This will not only waste the air interface resources, and further seriously affects the user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for realizing synchronization of access layer security algorithms
  • A method and system for realizing synchronization of access layer security algorithms
  • A method and system for realizing synchronization of access layer security algorithms

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] figure 2 When the RRC connection rebuilding occurs after switching for the present invention, realize the flow diagram of AS algorithm synchronization, as figure 2 shown, including the following steps:

[0034] Step 200: During the RRC connection re-establishment process, the eNB selects an AS security algorithm.

[0035] In this step, after receiving the RRC connection re-establishment request from the UE, the eNB selects the AS security algorithm, and reconfigures the local AS security algorithm, including the integrity protection algorithm and the encryption algorithm, when the algorithm replacement condition is satisfied; Send an RRC connection re-establishment message; after receiving the RRC connection re-establishment message from the eNB, the UE does not start the AS security algorithm, and the RRC connection re-establishment completion message sent to the eNB is not protected by the encryption algorithm and the integrity protection algorithm .

[0036] Amo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a method for implementing synchronization of Access Stratum (AS) security algorithm. During a process of Radio Resource Control (RRC) connection re-establishment, an evolved Node B (eNB) selects an AS security algorithm; after the RRC connection re-establishment is completed, the eNB initiates a Security Mode Command (SMC) process, and a User Equipment (UE) and the eNB use the selected AS security algorithm to perform integrity protection; after the SMC process passes the integrity verification, the UE and eNB activate the encryption algorithm in the selected AS security algorithm. The present invention also discloses a system for implementing synchronization of AS security algorithm at the same time. By employing the present invention, the user plane encryption algorithm during RRC connection re-establishment is protected from being falsified, the abnormality of the AS security algorithm is avoided, the bandwidth waste due to the air interface invalid packets is avoided to the largest extent, the timeliness of abnormality recovery is improved, and the user experience before and after handoff is further improved.

Description

technical field [0001] The present invention relates to Long Term Evolution (LTE, Long Term Evolution) technology, in particular to a method and system for realizing synchronization of access layer security algorithms when RRC connection reestablishment occurs after handover. Background technique [0002] At present, in the Long Term Evolution (LTE, Long Term Evolution) system, due to the highly decentralized geographic location and logical structure of the evolved Node B (eNB, E-UTRAN Node B), operators cannot implement centralized security control over the eNB. Each eNB is in a non-secure zone. [0003] The eNB needs to select an access stratum (AS, Access Stratum) security algorithm suitable for itself according to its own specific conditions and the security capabilities of the user equipment (UE, User Equipment). The basic principle of AS security algorithm selection is: the UE’s security capability information is sent to the eNB through the signaling process (for exam...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04W12/02H04W12/08H04W12/10H04W76/02H04W12/033H04W12/106
CPCH04W4/00H04W76/028H04W76/19
Inventor 王波李静岚
Owner ZTE CORP