Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system that do not need to rebuild high-level security during relay node switching

A relay node, handover process technology, applied in electrical components, wireless communication, connection management, etc., can solve problems such as RN not working normally, security functions cannot be performed, etc., to improve user experience and reduce latency.

Active Publication Date: 2017-04-12
ZTE CORP
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The present invention provides a method that does not need to rebuild high-level security during the switching process of the relay node, and solves the problem that the normal security function cannot be performed after the switching of the relay node, which further leads to the problem that the switched RN cannot work normally

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system that do not need to rebuild high-level security during relay node switching
  • Method and system that do not need to rebuild high-level security during relay node switching
  • Method and system that do not need to rebuild high-level security during relay node switching

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment 1

[0049] Such as figure 2 As shown, this embodiment describes the specific method for processing the security context during the X2 handover process of the RN as the UE based on the IPSec security connection, including:

[0050] 201. After receiving the measurement report from the RN, the source DeNB decides to initiate an X2-based handover;

[0051] 202. The source DeNB sends a handover request message to the target DeNB, the message carries the normal AS security context and IPSec security context, and optionally carries the security binding parameter Ko.

[0052] After receiving the handover request message, the target DeNB saves the IPSec security context, if it carries the security binding parameter Ko.

[0053] Among them, the IPSec security context includes parameters such as encryption protection options, algorithms, and keys on each security association, as well as filter setting parameters on each security association.

[0054] 203. The target DeNB sends a handover ...

specific Embodiment 2

[0062] Such as image 3 As shown, this embodiment describes the specific method of processing the security context during the X2 handover process of the RN serving as the UE based on the TLS security connection.

[0063] 301. After receiving the measurement report from the RN, the source DeNB decides to initiate an X2-based handover.

[0064] 302. The source DeNB sends a handover request message to the target DeNB, and the message carries the normal AS security context and the TLS security context, and optionally carries the security binding parameter Ko.

[0065] After receiving the handover request message, the target DeNB saves the TLS security context, and if it carries the security binding parameter Ko, it also needs to be saved.

[0066] If the handover request message does not carry the security binding parameter Ko, the security binding parameter Ko can be re-derived from the TLS context content if needed later.

[0067] The TLS security context includes parameters s...

specific Embodiment 3

[0076] Such as Figure 4 As shown, this embodiment describes the specific method of processing the security context during the S1 handover process of the RN serving as the UE based on the IPSec security connection.

[0077] 401. After receiving the measurement report from the RN, the source DeNB decides to initiate a handover based on S1.

[0078] 402. The source DeNB sends a handover request message to the MME. The message carries the normal AS security context and IPSec security context, and optionally carries a security binding parameter Ko.

[0079] 403. After receiving the handover request message, the MME sends a handover request message to the target DeNB, and transparently transmits the IPSec security context and the security binding parameter Ko.

[0080] After receiving the handover request message, the target DeNB saves the IPSec security context, if it carries the security binding parameter Ko.

[0081] The IPSec security context includes parameters such as encry...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for achieving freeness of reestablishing high-level security in a relay node switching process. The method comprises the steps of: when a DeNB (Donor-evolved Node B) determines to initiate switching from a relay node to a target DeNB, transmitting security context of secure connection related to the relay node to the target DeNB; and saving the security context of the secure connection by the target DeNB. The invention further provides a system for achieving the freeness of reestablishing the high-level security in the relay node switching process. According to the invention, a RN (Relay Node) can serve as UE (User Equipment) to achieve the freeness of reestablishing the high-level secure connection (IPSec: Internet Protocol Security or TLS: Transport Layer Security) under the switching condition among different DeNBs, the secure connection between RN and DeNB is continuous and available, the time delay of the switching process is reduced and the user experience is promoted.

Description

technical field [0001] The present invention relates to the field of wireless communication security, in particular, to a method and system that do not need to re-establish high-level security in the switching process of relay nodes. Background technique [0002] The Long Term Evolution (LTE for short) network consists of the Evolved Universal Terrestrial Radio Access Network (E-UTRAN for short) and the Evolved Packet Core (EPC for short). The network presents Flat. EUTRAN is connected with EPC through S1 interface. Among them, EUTRAN is composed of a plurality of interconnected evolved base stations (Evolved NodeB, referred to as eNB), and each eNB is connected through an X2 interface; EPC is composed of a Mobility Management Entity (Mobility Management Entity, referred to as MME) and a Serving Gateway (Serving Gateway, S-GW for short). In addition, there is a home environment (Home Environment, HE) in the system architecture, that is, a home subscriber server (Home Subs...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W36/00H04W36/08H04W76/06
Inventor 李阳甘露
Owner ZTE CORP