X2 secure channel establishment method and system, and base station
A technology of secure channel and establishment method, applied in the field of base station, X2 secure channel establishment, and can solve data security and other issues
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0030] Please refer to figure 2 , which is a flow chart of the X2 secure channel establishment method provided in Embodiment 1 of the present invention. As shown in the figure, it includes the following steps:
[0031] S210: The base station sends a notification message to the peer base station, where the notification message includes a security parameter set;
[0032] S220: Receive a reply message sent by the peer base station, where the reply message includes the security parameter value selected by the peer base station from the security parameter set;
[0033] S230: Establish an X2 secure channel according to the reply message.
[0034] Correspondingly, when the peer base station in the above steps receives the notification message, it will reply to it. The specific reply process is as follows: image 3 shown, including the following steps:
[0035] S310: The base station receives a notification message sent by the peer base station, where the notification message inclu...
Embodiment 2
[0076] Please refer to Figure 4 , which is an implementation block diagram of the base station provided in Embodiment 2 of the present invention. As shown in the figure, the base station includes a storage module 410 , an interface module 420 and a channel establishment module 430 . The storage module 410 is used to store a security parameter set; the interface module 420 is used to send a notification message to the peer base station, and the notification message includes the security parameter set; and the interface module 420 is also used to receive a message sent by the peer base station A reply message, the reply message includes the security parameter value selected by the peer base station from the security parameter set; the channel establishment module 430 is configured to establish an X2 security channel according to the reply message.
[0077] Please refer to Figure 5 , which is another implementation block diagram of the base station provided in Embodiment 2 of...
Embodiment 3
[0090] Please refer to Image 6 , which is an implementation block diagram of the base station provided in Embodiment 3 of the present invention. As shown in the figure, the base station includes a storage module 610 , an interface module 620 and a selection module 630 . The storage module 610 is used to store the security parameter values supported by the base station; the interface module 620 is used to receive a notification message sent by the opposite base station, and the notification message includes a security parameter set; the selection module 630 is used to select from the security parameter set The security parameter value supported by the base station is selected in the parameter set; the interface module 620 is configured to send a reply message including the selected security parameter value to the peer base station.
[0091] Please refer to Figure 7 , which is another implementation block diagram of the base station provided in Embodiment 3 of the present ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



