Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security key context distribution method, mobility management entity and base station

A mobility management entity, security key technology, applied in the field of mobility management entity and base station, security key context distribution, can solve the problem of carrier aggregation not supporting, network security desynchronization and so on

Active Publication Date: 2014-04-23
HUAWEI TECH CO LTD
View PDF3 Cites 41 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The Release-10 version of the 3rd Generation Partnership Project (3GPP, 3rd Generation Partnership Project) supports carrier aggregation within the base station, but carrier aggregation between base stations does not yet support
[0004] However, carrier aggregation between base stations is different from X2 handover, because the secondary eNB may be a micro base station, and in carrier aggregation between base stations, each bearer handover requires a path switching process, so the probability of path switching is much greater than that of X2 handover , frequent path switching is likely to cause network security out of synchronization, causing UE to drop calls

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security key context distribution method, mobility management entity and base station
  • Security key context distribution method, mobility management entity and base station
  • Security key context distribution method, mobility management entity and base station

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0104] Embodiments of the present invention provide a security key context distribution method, a mobility management entity and a base station.

[0105] In order to make the purpose, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described The embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, various other embodiments obtained by persons of ordinary skill in the art without making creative efforts all belong to the protection scope of the present invention.

[0106] First, the carrier aggregation process between base stations in the embodiment of the present invention is described, as Figure 1-a As shown, for the LTE system, it is a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security key contextual distribution method, mobility management entity and base station, wherein, the security key contextual distribution method comprises: firstly, the mobility management entity receives a first instruction from a main base station, wherein the first instruction is used for the mobile management entity to request a path switching and indicate the path switching triggered by a inter-base station carrier aggregation; the path switching is processed according to the first instruction; the security keys context distribution method for the path switching is remained unchanged according to the first instruction, secondly, a second instruction is sent to the main base station, the security keys context distribution method is remained unchanged by indicating the main base station; or, the third instruction is sent to the main base station, a turning times of a counter of a next-hop chain of the security keys context distribution method is obtained by indicating the main base station. To be sure, the technical solution provided by the present invention can effectively improve the reliability of the path switching when the inter-base station carrier is aggregating.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a security key context distribution method, a mobility management entity and a base station. Background technique [0002] Carrier aggregation in a Long Term Evolution (LTE, Long Term Evolution) system can be roughly divided into carrier aggregation inside a base station, carrier aggregation between base stations, and the like. The cell aggregation inside the base station is relatively simple because it is only controlled by one base station. The Release-10 version of the 3rd Generation Partnership Project (3GPP, 3rd Generation Partnership Project) supports carrier aggregation inside a base station, but carrier aggregation between base stations does not yet support it. Carrier aggregation between base stations can be divided into carrier aggregation between macro base stations and carrier aggregation between macro base stations and micro base stations. Carrier aggregation...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W36/08H04W12/0433
CPCH04W12/04H04W36/0027H04W36/0038H04W36/08H04W36/12H04W36/0064H04W36/00692H04W76/15H04W12/0431H04W84/042
Inventor 戴明增张健曾清海郭轶张宏平
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products