A method and system for realizing synchronization of access layer security algorithms
An access layer security and security algorithm technology, applied in the field of realizing access layer security algorithm synchronization, can solve problems such as affecting user experience, eNB unable to decrypt data packets, wasting air interface resources, etc., so as to improve the timeliness of abnormal recovery and avoid abnormal , avoid wasteful effects
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0033] figure 2 When the RRC connection rebuilding occurs after switching for the present invention, realize the flow diagram of AS algorithm synchronization, as figure 2 shown, including the following steps:
[0034] Step 200: During the RRC connection re-establishment process, the eNB selects an AS security algorithm.
[0035] In this step, after receiving the RRC connection re-establishment request from the UE, the eNB selects the AS security algorithm, and reconfigures the local AS security algorithm, including the integrity protection algorithm and the encryption algorithm, when the algorithm replacement condition is satisfied; Send an RRC connection re-establishment message; after receiving the RRC connection re-establishment message from the eNB, the UE does not start the AS security algorithm, and the RRC connection re-establishment completion message sent to the eNB is not protected by the encryption algorithm and the integrity protection algorithm .
[0036] Amo...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 