Safety parameter modification method and base station

A security parameter and base station technology, applied in the field of communication, can solve problems such as waste, multiple transmission resources and processing resources

Inactive Publication Date: 2012-12-19
ZTE CORP
View PDF3 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] Embodiments of the present invention provide a method for modifying security parameters and a base station to solve th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety parameter modification method and base station
  • Safety parameter modification method and base station
  • Safety parameter modification method and base station

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0042] Example one

[0043] During the process of data upload and video call, the eNB receives the UE context modification request message issued by the MME and requests to modify the security parameters. Before the eNB receives the UE context modification request, the next hop (NH, Next Hop) key is 5 , The next hop counter (NCC, Next hop Chaining Counter) is 1, the new security key K generated by MME eNB Is 10.

[0044] Such as image 3 As shown, it is a schematic diagram of the specific implementation process of the security parameter modification method in the first embodiment of the present invention, and the specific processing process is as follows:

[0045] Step 31: During the UE's data upload and video call process, the core network triggers the security parameter modification process, the MME sends a UE context modification request message to the eNB, and the UE context modification request message carries the new security key K eNB ;

[0046] Step 32: After receiving the U...

Example Embodiment

[0054] Example two

[0055] During the data upload process, the eNB receives the UE context modification request message issued by the MME and requires modification of security parameters. Before the eNB receives the UE context modification request, the next hop (NH, Next Hop) key is 5, and the next hop The counter (NCC, Next hop Chaining Counter) is 1, the new security key K generated by the MME eNB Is 10.

[0056] Such as Figure 4 As shown, it is a schematic diagram of the specific implementation process of the security parameter modification method in the second embodiment of the present invention, and the specific processing process is as follows:

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safety parameter modification method and a base station. The method comprises the following steps that: an eNB (evolved Node) receives a UE (User Equipment) context modification request message sent by a MME (Mobility Management Entity), wherein a novel safe key is carried in the UE context modification request message; the eNB generates a new safety parameter according to the safe key carried in the UE context modification request message; a RRC (Radio Resource Control) connection redistribution message with the new safety parameter to UE; if the switching is failed in a cell, the UE sends a RRC connection reestablishment request message to the eNB; and after the eNB receives the RRC connection reestablishment request message sent by the UE, the RRC connection redistribution message with the new safety parameter is sent to the UE. After the technical scheme disclosed by the invention is adopted, the problem of great waste on transmission resources and processing resources in the process of modifying the safety parameter in the prior art is solved.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method for modifying a security parameter and a base station. Background technique [0002] In the long-term evolution (LTE, Long Term Evolution) system, the mobility management entity (MME, Mobility Management Entity) will save the UE context of the successfully registered user equipment (UE, User Equipment), and at the same time, the MME will establish a message through the initial UE context, The UE context is notified to an evolved base station (eNB, evolved Node B), and when the eNB allocates radio resources for the UE or makes a handover decision, the UE context is used as a basis. [0003] UE context includes: maximum aggregate bit rate (AMBR, Aggregate Maximum Bit Rate), UE security capabilities, security keys, evolved radio access bearer (ERAB, Evolved Radio Access Bear) information, different system / frequency priority user identification, circuit Circuit Switc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/04H04W36/00H04W76/02
CPCH04W12/04H04W12/041
Inventor 梁洁杨玉成
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products