Safety parameter modification method and base station
A security parameter and base station technology, applied in the field of communication, can solve problems such as waste, multiple transmission resources and processing resources
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0042] Example one
[0043] During the process of data upload and video call, the eNB receives the UE context modification request message issued by the MME and requests to modify the security parameters. Before the eNB receives the UE context modification request, the next hop (NH, Next Hop) key is 5 , The next hop counter (NCC, Next hop Chaining Counter) is 1, the new security key K generated by MME eNB Is 10.
[0044] Such as image 3 As shown, it is a schematic diagram of the specific implementation process of the security parameter modification method in the first embodiment of the present invention, and the specific processing process is as follows:
[0045] Step 31: During the UE's data upload and video call process, the core network triggers the security parameter modification process, the MME sends a UE context modification request message to the eNB, and the UE context modification request message carries the new security key K eNB ;
[0046] Step 32: After receiving the U...
Example Embodiment
[0054] Example two
[0055] During the data upload process, the eNB receives the UE context modification request message issued by the MME and requires modification of security parameters. Before the eNB receives the UE context modification request, the next hop (NH, Next Hop) key is 5, and the next hop The counter (NCC, Next hop Chaining Counter) is 1, the new security key K generated by the MME eNB Is 10.
[0056] Such as Figure 4 As shown, it is a schematic diagram of the specific implementation process of the security parameter modification method in the second embodiment of the present invention, and the specific processing process is as follows:
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap