Method and system for realizing integrality protection

An integrity protection and algorithm technology, applied in the transmission system, connection management, network topology, etc., can solve the problem of increasing air interface signaling overhead, avoid modifying the time point of integrity protection configuration, and reduce the air interface load.

Active Publication Date: 2012-06-06
ZTE CORP
View PDF3 Cites 53 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The existing protocol does not involve the specific implementation method of applying the integrity protection algorithm on the DRB of the backhaul link; moreover, after the integrity protection algorithm is applied on the DRB of the backhaul link, there is a synchronization problem in the implementation process, that is, the established When a DRB without integrity protection is reconfigured to a DRB with integrity protection applied, which data packet starts to implement integrity protection, which also needs to be further resolved. Regarding this problem, a typical approach is to introduce the conversion time point method, but this method needs to introduce a new time point cell into the air interface signaling, which increases the signaling overhead of the air interface

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for realizing integrality protection
  • Method and system for realizing integrality protection
  • Method and system for realizing integrality protection

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0042] In the first embodiment, it is assumed that the RN accesses the cell under the jurisdiction of the Donor-eNB and is in a normal working state. On the backhaul link, the Donor-eNB manages the RN like a normal user equipment, and adds, modifies, or deletes the configuration of the DRB for it. , add, modify, or delete measurement configurations for it, establish or release semi-persistent scheduling (SPS, Semi-Persistent Scheduling) for it, and configure MAC layer configuration (MAC-MainConfig) and physical layer dedicated configuration (physicalConfigDedicated) for it Wait. Usually, the Donor-eNB realizes this part of functions through RRC connection reconfiguration. The above configuration content may be sent in one configuration signaling or may be sent in multiple configuration signalings.

[0043] At this point, it is assumed that the donor base station configures three DRBs for the relay node, namely DRB1, DRB2 and DRB3. Among the three DRBs, DRB1 is used to transm...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for realizing integrality protection. The method comprises the following steps that: wireless connection reestablishment is completed between a base station and a terminal; and the base station enables integrality protection configuration information to be carried in first RRC connection reconfiguration signaling after the wireless connection reestablishment as well as the terminal is notified. According to the method provided in the invention, a terminal can clearly obtain a time point for application of integrality protection and a data packet for application of integrality protection; and moreover, the first RRC connection reconfiguration signaling after the wireless connection reestablishment is utilized to modify data radio bearer (DRB) integrality protection configuration; therefore, it can be avoided that a time point for modification on integrality protection configuration is directly introduced into RRC signaling, so that an interface-free load is reduced.

Description

technical field [0001] The invention relates to a mobile communication system, in particular to a method and system for realizing integrity protection. Background technique [0002] In order to meet the growing demand for large bandwidth and high-speed mobile access, the Third Generation Partnership Project (3GPP, Third Generation Partnership Projects) launched the Long Term Evolution-Advanced (LTE-A, Long Term Evolution-Advanced) standard. LTE-A retains the core of LTE for the evolution of the Long Term Evolution (LTE, Long Term Evolution) system, and uses a series of technologies to expand the frequency domain and air domain on this basis to achieve the purpose of improving spectrum utilization and increasing system capacity. . [0003] Wireless relay (Relay) technology is one of the technologies adopted in LTE-A, which aims to expand the coverage of the cell, reduce the dead area in communication, balance the load, transfer the business in the hot spot area, and save the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/10H04W12/106
CPCH04W84/047H04W76/028H04W12/10H04W76/04H04L63/12H04W76/19H04W12/106
Inventor 邓云
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products