Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security activation optimization method suitable for LTE access layer

An optimization method and access layer technology, applied in the field of security activation optimization of the LTE access layer, can solve problems such as incomplete protocol methods, affecting COUNT values, and link establishment failures.

Active Publication Date: 2019-08-20
苏州简约纳电子有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0040] However, only at least one of the indicator field in the header of the NAS message, the type of the NAS message, the NAS security state variable, and the indication according to the RRC protocol can satisfy subsequent encryption and decryption or integrity check It is necessary, and the COUNT value corresponding to related messages such as NAS messages cannot be clearly determined, which will also bring hidden dangers to security verification
More importantly, verification failures cannot be avoided in the process of implementing SMC according to protocol standards, and there may be cases where verification should pass but fail due to incomplete protocol methods
[0041] In short, according to the existing data processing method, in some cases, the SMC message verification will pass the second time, that is, the timing of the downlink message affects the COUNT value
The more serious situation is that some protocol implementations do not consider the timing of downlink messages, and then do not perform secondary verification, which makes the SMC verification fail and the link establishment fails.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security activation optimization method suitable for LTE access layer
  • Security activation optimization method suitable for LTE access layer
  • Security activation optimization method suitable for LTE access layer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] The specific embodiments of the present invention will be described in further detail below in conjunction with the drawings and embodiments. The following examples are used to illustrate the present invention, but not to limit the scope of the present invention.

[0072] See figure 1 The security activation optimization method for LTE access layer is unique in that it includes the following steps:

[0073] First, before the security protection mechanism is activated, all received downlink messages and their corresponding counter values ​​are delivered to the radio resource control protocol module for processing through the packet data convergence protocol module. Specifically, the activation is before the radio resource control protocol module (Radio Resource Control, RRC) activates the security protection mechanism of the packet data convergence protocol module (PDCP). In addition, in this process, the corresponding Hyper Frame Number (Hyper Frame Number, HFN for short) ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a security activation optimization method applicable to the LTE access layer, which is characterized in that: before the radio resource control protocol module activates the security protection mechanism of the packet data convergence protocol module, all received The downlink message and its corresponding count value are delivered to the radio resource control protocol module for processing. The integrity protection key is obtained through corresponding decoding, and the security protection function of the packet data convergence protocol module is activated only after the verification is successful; otherwise, the radio resource control protocol module continues to use the original security configuration. It can effectively avoid the hidden danger of security verification uncertainty caused by the timing impact of downlink message reception during SMC message integrity verification. The process processing can be faster and easier, the delay of message processing can be reduced, and the response speed of UE accessing the LTE network can be effectively improved.

Description

Technical field [0001] The present invention relates to an LTE access layer data transmission security optimization method, in particular to a security activation optimization method suitable for the LTE access layer. Background technique [0002] In view of the existing communication application field, the transmission mechanism established by 3GPP (Third Generation Partnership Project) has become increasingly mature. The 3GPP was established in December 1998, and a number of telecommunication standards organization partners signed the "Third Generation Partnership Project Agreement." The initial scope of 3GPP's work is to formulate global applicable technical specifications and technical reports for the third-generation mobile communication system. The third-generation mobile communication system is based on the developed GSM core network and the wireless access technologies they support, mainly UMTS. Subsequently, the scope of work of 3GPP has been improved, and the research...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/10H04W12/06H04W24/02H04W12/041H04W12/106
CPCH04W12/06H04W12/10H04W24/02
Inventor 徐浩杨鹏张建立
Owner 苏州简约纳电子有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products