Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safe data transmission method and LTE access network system

A transmission method and data security technology, applied in the field of mobile communications, can solve problems such as limited macro network coordination and interaction, inability to meet the business needs of large data volume and high mobility, and achieve security performance, reliable joint transmission services, and ease The effect of the message payload

Active Publication Date: 2014-07-16
ZTE CORP
View PDF8 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Deploying LPN in the coverage area of ​​the macro network is very different from the traditional macro network in terms of transmission, mobility, security and interference. There are many problems in the process of each base station independently providing services for the terminal, and it cannot meet the requirements Large data volume and high mobility business requirements; due to practical constraints and historical factors, the selection of LPN backhaul links is also diverse, and the characteristics of each interface are different. limited coordination interaction

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe data transmission method and LTE access network system
  • Safe data transmission method and LTE access network system
  • Safe data transmission method and LTE access network system

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0065] Example 1: MeNB and LPN are deployed in the network, these two nodes constitute the access network of the system architecture of the present invention, and the LPN undertakes the transmission of offloaded data. During the preparation process for the network side to decide to provide the cross-base station multi-stream joint transmission service for the UE, the MeNB transmits the AS Key to the LPN so that it can perform security protection functions. Image 6 is a signaling flow chart of Example 1 of the embodiment of the present invention, such as Image 6 As shown, it specifically includes the following processing:

[0066] Step 1: The UE accesses the macro cell established by the MeNB according to the existing LTE process, and establishes a CP connection (RRC Connection) that can transmit control plane information and an UP connection that can transmit user data. MeNB obtains KeNB from the core network, derives AS Key (including UP Key and RRC Key) based on this, and...

example 2

[0073] Example 2: The deployment scenario is the same as that of Example 1. When the MeNB and the LPN provide joint transmission services for the UE, if the MeNB side updates the key, it needs to notify the LPN of the updated key so that it can effectively perform the security protection function. Figure 7 It is the signaling flowchart of Example 2 of the embodiment of the present invention, such as Figure 7 As shown, it specifically includes the following processing:

[0074] Step 1. In the system architecture of the embodiment of the present invention, wireless connections are respectively established between the UE, the MeNB and the LPN, so as to obtain a cross-base station multi-stream joint transmission service. There are CP and UP connections between UE and MeNB in ​​the same existing technology; this example takes only UP connection between UE and LPN as an example, the data transmitted between LPN pair and UE is based on the UP Key (KUPenc) obtained from MeNB and A...

example 3

[0081] Example 3: The deployment scenario is the same as that of Example 1. In the architecture where the MeNB and the LPN provide the cross-base station multi-stream joint transmission service for the UE, this embodiment takes the establishment of CP and UP connections between the LPN and the UE as an example. During the preparation process of the multi-stream service or when there is a key update requirement on the network side, the MeNB needs to transmit the ASKey to the LPN so that it can perform security protection functions. Figure 8It is the signaling flowchart of Example 3 of the embodiment of the present invention, such as Figure 8 As shown, it specifically includes the following processing:

[0082] Step 1. When the MeNB decides to provide cross-base station multi-stream transmission services for UEs accessing its cell, it transmits the necessary UE context and other information to the LPN through the Backhaul interface, such as carried in the "bearer establishmen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safe data transmission method and an LTE access network system. The method comprises the steps that a MeNB obtains a base station secret key from a core network to generate a first access layer secret key according to the base station secret key, the first access layer secret key is utilized to encrypt corresponding control plane information and user data and carry out integrated protection on the corresponding control plane information to send the corresponding control plane information to LTE user equipment, the MeNB confirms a distribution strategy of the LTE user equipment for the user data and sends request information for providing multi-thread transmission service for the LTE user equipment to a corresponding LPN, the MeNB receives request response sent by the LPN, uses the first access layer secret key to encrypt one part of the user data received by the core network, sends the encrypted part of user data to the LTE user equipment and sends the other part of the user data to the LPN, and the LPN uses a second access layer secret key to encrypt the corresponding user data and sends the encrypted user data to the LTE user equipment.

Description

technical field [0001] The present invention relates to the field of mobile communication, in particular to a method for secure data transmission and a Long Term Evolution (LTE for short) access network system. Background technique [0002] In the prior art, with the continuous evolution of wireless communication technologies and protocol standards, the mobile packet service has undergone tremendous development, and the data throughput capability of a single terminal has been continuously improved. Taking the LTE system as an example, it can support data transmission at a maximum downlink rate of 100Mbps within a 20M bandwidth; in the subsequent enhanced LTE (LTE Advanced, referred to as LTE-A) system, the data transmission rate will be further improved, and even reach 1Gbps . [0003] The expansive growth of terminal data traffic has brought enormous pressure and challenges to mobile network service capabilities and deployment strategies. On the one hand, operators need t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W28/08
CPCH04W12/0431
Inventor 王昕和峰
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products