Unlock instant, AI-driven research and patent intelligence for your innovation.

Determination method of safety algorithm and apparatus thereof

A technology of security algorithm and determination method, applied in the field of determination method and device of security algorithm, can solve the problems of complex implementation process of encryption security protection, and achieve the effect of reducing complexity

Active Publication Date: 2015-09-23
ZTE CORP
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The present invention provides a method and device for determining a security algorithm to at least solve the problem in the related art that the encryption security protection between the UE and the SeNB is not determined by the SeNB itself and the implementation process is relatively complicated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Determination method of safety algorithm and apparatus thereof
  • Determination method of safety algorithm and apparatus thereof
  • Determination method of safety algorithm and apparatus thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Hereinafter, the present invention will be described in detail with reference to the drawings and examples. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0038] figure 2 is a flowchart of a method for determining a security algorithm according to an embodiment of the present invention. Such as figure 2 As shown, the method may include the following processing steps:

[0039] Step S202: the slave base station receives a request message from the master base station;

[0040] Step S204: The secondary base station determines the security algorithm to be used by itself according to the security capability information of the UE carried in the request message, whether the request message carries a security algorithm recommended by the primary base station to the secondary base station, and the security algorithms supported by the secondary base station ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed in the present invention are a method and apparatus for determining a security algorithm; within said method, a secondary eNodeB (SeNB) receives a request message from a macro eNodeB; on the basis of UE security capability information carried in the request message, whether the request message carries a security algorithm recommended by the macro eNodeB for the secondary eNodeB, and the security algorithms supported by the secondary eNodeB, the secondary eNodeB determines the security algorithm to be used by same. The technical solution provided by the present invention enables an SeNB to determine its own selection of security algorithm, and can effectively reduce the degree of complexity of encryption security protection between an SeNB and UE.

Description

technical field [0001] The present invention relates to the communication field, in particular to a method and device for determining a security algorithm. Background technique [0002] The Long Term Evolution (LTE for short) network consists of the Evolved Universal Terrestrial Radio Access Network (Evolved Universal Terrestrial Radio Access Network, E-UTRAN for short) and the Evolved Packet Core (EPC for short), Its network is flat. The EUTRAN is connected to the EPC through the S1 interface. The EUTRAN is composed of multiple interconnected evolved base stations (Evolved NodeB, eNB for short), and the eNBs are connected through the X2 interface. The EPC is composed of a Mobility Management Entity (MME for short) and a Serving Gateway entity (S-GW for short). In addition, there is also a Home Environment (HE for short) in the system architecture, that is, a Home Subscriber Server (HSS for short) or a Home Location Register (HLR for short) as a user database. It can cont...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02
CPCH04W12/02H04W12/037
Inventor 李阳林兆骥游世林
Owner ZTE CORP