Secret key management method, authorization checking method and device

A technology of key management and authorization code, which is applied in the fields of key management methods, inspection authorization methods and devices, and can solve problems such as RRC connection re-establishment failure and call drop

Active Publication Date: 2012-05-09
HONOR DEVICE CO LTD
View PDF3 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the prior art, in the RN scenario, since the RN is often used to enhance hotspot coverage, the coverage areas of the RN and the DeNB overlap, and there may be only one cell under the RN, so when the UE under the RN has RLF, it is likely to choose the DeNB RRC connection re-establishment is performed on the cell of the same DeNB or other RN cells under the same DeNB, which will cause the RRC connection re-establishment to fail, resulting in call drop
In addition, in another scenario, when RLF occurs to the UE under the DeNB, the UE will select the cell of the RN under the DeNB to reestablish the RRC connection, which will also cause the failure of the RRC connection reestablishment, resulting in call drop

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret key management method, authorization checking method and device
  • Secret key management method, authorization checking method and device
  • Secret key management method, authorization checking method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the embodiments of the present invention will be further described in detail below in conjunction with the embodiments and the accompanying drawings. Here, the exemplary embodiments and descriptions of the present invention are used to explain the present invention, but not to limit the present invention.

[0049] Figure 1A It is a schematic diagram of selecting a cell under the DeNB for RRC connection reestablishment after the UE under the RN performs cell measurement when RLF occurs to the UE under the RN. Figure 1B It is a schematic diagram for the UE under RN1 to select a cell under RN2 under the same DeNB to perform RRC connection reestablishment after performing cell measurement when RLF occurs to the UE under RN1.

[0050] Please refer to Figure 1A and Figure 1B , during the RRC connection reestablishment process, the RRC Connection Rees...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a secret key management method, an authorization checking method and a device. The secret key management method comprises the steps of: receiving a RRC (Radio Resource Control) connection rebuilding request sent by UE (User Equipment) after a radio link failure occurs in a communication process of the UE and a first RN (Relay Node); judging whether the first RN is affiliated to a base station; if so, checking whether the RRC connection rebuilding request is authorized or not by the first RN; and if the RRC connection rebuilding request is authorized, calculating an access layer secret key according to KeNB* (Key Evolved Node B) of a target cell and a security algorithm of the target cell. By means of the method and the device provided by the embodiment of the invention, an RRC connection rebuilding failure and call drop caused by that the target cell dispenses with secret keys and other security parameters are avoided in a process in which the UE initiates the RRC connection rebuilding to cells affiliated to a DeNB (Donor eNB) or other RNs affiliated to the same DeNB when the UE undergoes the RLF under an RN scene.

Description

technical field [0001] The invention relates to the network field, and in particular designs a key management method, a check authorization method and a device. Background technique [0002] RN (Relay Node, relay node) is a site that relays data between base stations and terminals. RN can be deployed in urban areas to enhance hotspot coverage, so that wireless signals can reach their destinations through multiple transmissions (multi-hops). As shown in FIG. 1 , the RN and the DeNB (Donor eNB, eNB to which the RN belongs) have the same physical identity, and the RN can be regarded as a cell under the DeNB. [0003] Currently, when a radio link failure (RLF, Radio Link Failure) occurs in a UE (User Equipment, user equipment), the UE needs to perform cell measurement and reselect a cell to initiate an RRC (Radio Resource Control, radio resource control) connection reestablishment process. [0004] In the prior art, in the RN scenario, since the RN is often used to enhance hots...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W24/00H04W76/02H04W12/0433
CPCH04W12/04H04W76/04H04W12/06H04W76/20H04W12/041H04W12/069
Inventor 张丽佳张冬梅陈璟
Owner HONOR DEVICE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products