Method and system that do not need to rebuild high-level security during relay node switching
A relay node, handover process technology, applied in electrical components, wireless communication, connection management, etc., can solve problems such as RN not working normally, security functions cannot be performed, etc., to improve user experience and reduce latency.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
specific Embodiment 1
[0049] Such as figure 2 As shown, this embodiment describes the specific method for processing the security context during the X2 handover process of the RN as the UE based on the IPSec security connection, including:
[0050] 201. After receiving the measurement report from the RN, the source DeNB decides to initiate an X2-based handover;
[0051] 202. The source DeNB sends a handover request message to the target DeNB, the message carries the normal AS security context and IPSec security context, and optionally carries the security binding parameter Ko.
[0052] After receiving the handover request message, the target DeNB saves the IPSec security context, if it carries the security binding parameter Ko.
[0053] Among them, the IPSec security context includes parameters such as encryption protection options, algorithms, and keys on each security association, as well as filter setting parameters on each security association.
[0054] 203. The target DeNB sends a handover ...
specific Embodiment 2
[0062] Such as image 3 As shown, this embodiment describes the specific method of processing the security context during the X2 handover process of the RN serving as the UE based on the TLS security connection.
[0063] 301. After receiving the measurement report from the RN, the source DeNB decides to initiate an X2-based handover.
[0064] 302. The source DeNB sends a handover request message to the target DeNB, and the message carries the normal AS security context and the TLS security context, and optionally carries the security binding parameter Ko.
[0065] After receiving the handover request message, the target DeNB saves the TLS security context, and if it carries the security binding parameter Ko, it also needs to be saved.
[0066] If the handover request message does not carry the security binding parameter Ko, the security binding parameter Ko can be re-derived from the TLS context content if needed later.
[0067] The TLS security context includes parameters s...
specific Embodiment 3
[0076] Such as Figure 4 As shown, this embodiment describes the specific method of processing the security context during the S1 handover process of the RN serving as the UE based on the IPSec security connection.
[0077] 401. After receiving the measurement report from the RN, the source DeNB decides to initiate a handover based on S1.
[0078] 402. The source DeNB sends a handover request message to the MME. The message carries the normal AS security context and IPSec security context, and optionally carries a security binding parameter Ko.
[0079] 403. After receiving the handover request message, the MME sends a handover request message to the target DeNB, and transparently transmits the IPSec security context and the security binding parameter Ko.
[0080] After receiving the handover request message, the target DeNB saves the IPSec security context, if it carries the security binding parameter Ko.
[0081] The IPSec security context includes parameters such as encry...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


