Key processing method and device in double-connection mode

A processing method and dual-connection technology, applied in the field of communication, can solve the problem that the UE cannot be directly applied to work in a dual-connection mode at the same time

Active Publication Date: 2014-07-30
HUAWEI TECH CO LTD
View PDF2 Cites 75 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0028] When the UE works on MeNB and SeNB at the same time, the UE may need to perform data transmission with the two base stations based on different security keys, but it may also perform data transmission with the two base stations based on the same security key
However, in the current long-term evolution (Long Term Evolution, LTE) system, the generation of the key used for data transmission is aimed at the scenario where the UE works in a base station, and cannot be directly applied to the scenario where the UE works in MeNB and SeNB at the same time. In the scenario of dual connection mode, when UE communicates with MeNB and SeNB at the same time, how to generate a key for data transmission is an urgent problem to be solved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key processing method and device in double-connection mode
  • Key processing method and device in double-connection mode
  • Key processing method and device in double-connection mode

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0458] Embodiment 1. In this embodiment, MeNB and SeNB working as UE use the same security key K before key refresh eNB Generate keys used to communicate with the UE. see Figure 6 As shown, the generation process of the initial security key on the SeNB side is as follows:

[0459] S61. The MeNB sends a SeNB addition request message to the SeNB;

[0460] Specifically, the trigger condition for the MeNB to send a SeNB increase request message to the SeNB may be that the MeNB may offload some services or data to the SeNB for transmission based on the need to unload its own load, so it needs to send a SeNB increase request message to the SeNB.

[0461] Further, the SeNB addition request message may contain specific information about services or data that need to be offloaded by the SeNB. In addition, in order for the SeNB to determine the security key used by itself, the SeNB increase request message needs to carry the K of the security key currently used by the MeNB. eNB . ...

Embodiment 2

[0497] Embodiment 2. In this embodiment, the MeNB and the SeNB working with the UE use different security keys to generate keys used for communication with the UE before the key is refreshed. see Figure 7 As shown, the generation process of the initial security key on the SeNB side is as follows:

[0498] S71. The MeNB sends a SeNB addition request message to the SeNB.

[0499] Specifically, the trigger condition for the MeNB to send a SeNB increase request message to the SeNB may be that the MeNB may offload some services or data to the SeNB for transmission based on the need to unload its own load, so it needs to send a SeNB increase request message to the SeNB.

[0500] Further, the SeNB increase request message includes the K currently used by the MeNB eNB , and instruct SeNB to use a different K eNB The new KeNB'.

[0501] S72. The SeNB sends a SeNB addition confirmation message to the MeNB to confirm that offloading is allowed for the MeNB.

[0502] Specifically, aft...

Embodiment 3

[0527] Embodiment 3. The difference between this embodiment and Embodiment 2 is that in this embodiment, the SeNB is triggered to perform a local key refresh process. see Figure 8 As shown, the generation process of the initial security key on the SeNB side is as follows:

[0528] S81-S84 are the same as S71-S74 in the second embodiment, and will not be repeated here.

[0529] S85. The SeNB is triggered to perform a local key refresh of the SeNB.

[0530] Preferably, the SeNB suspends data transmission with the UE after being triggered to perform local key refresh.

[0531] S86. The SeNB sends a key refresh instruction message to the MeNB to instruct the MeNB to suspend forwarding the UE's data to the SeNB.

[0532] S87. When the MeNB receives the key refresh instruction message sent by the SeNB, it suspends forwarding the data of the UE to the SeNB.

[0533] S88. The SeNB or MeNB sends a key refresh indication message to the UE.

[0534] Wherein, the RRC reconfiguration...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the present invention disclose a key processing method and device in a double-connection module, which guarantee communication security of UE in a double-connection mode. The method of the embodiments of the invention comprises a step in which according to a first base station and a second station where communication connection with a terminal exists, the second station receives a first request message which is used for requesting the second base station to generate a key used in communicating with the terminal and sent by the first base station; and a step in which the second base station, based on a security key carried in the first request message, generates a key used in communicating with the terminal.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a key processing method and device in dual connection mode. Background technique [0002] At present, in order to improve the transmission rate of the wireless network and enhance the user experience, the 3rd Generation Partnership Project (The 3rd Generation Partnership, 3GPP) organization is discussing a new research project, that is, small cell network enhancement. like figure 1 As shown in the figure, F1 in the figure is a low-band carrier, which is characterized by a large coverage area, but relatively scarce resources; and F2 is a high-band carrier, which is characterized by a small coverage area but relatively abundant resources. In a traditional 2G / 3G network, a carrier of a lower frequency band is generally used, for example, a carrier of a lower frequency band with a frequency of F1 is used to provide services to users. [0003] With the popularity of s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/04H04W88/08
CPCH04L63/062H04W88/08H04L2463/061H04L9/0819H04L2209/80H04W36/0069H04W76/14H04W12/0433H04W12/0431H04W12/041H04W12/04H04L69/14
Inventor 常俊仁蔺波
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products