Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for realizing access layer security, user equipment, and node

An access layer security and node technology, which is applied in security devices, data exchange details, electrical components, etc., and can solve problems such as lack of specific technical solutions.

Active Publication Date: 2017-02-01
ZTE CORP
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In the future, a large number of SRAN-nodes will be densely deployed in UDN, and only a small number of SRAN-nodes have wired backhaul, which makes it very likely that UE communication data will need to be transmitted through two or more air interfaces. How to ensure this mobile communication The security in the system, to ensure the security of the UE's communication data when it is transmitted over two or more air interfaces, is a technical problem that needs to be solved urgently, and there is currently no specific technical solution for its implementation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing access layer security, user equipment, and node
  • Method for realizing access layer security, user equipment, and node
  • Method for realizing access layer security, user equipment, and node

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0122] In order to make the object, technical solution and advantages of the present invention more clear, the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0123] In order to meet the expectation of a thousand-fold increase in business volume in the next 10 years, UDN will be widely deployed to bear a large amount of business traffic. UDN can be deployed in indoor or outdoor hotspot areas or any areas with large traffic demands. image 3 It is a schematic diagram of ultra-dense network deployment in a certain area in the future, considering the infrastructure constraints of the actual deployment network, such as the limited number of wired network ports in the area shown, and the realization of flexibility and speed without incre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for realizing access layer security, user equipment, and a node. The method comprises: end-to-tend wireless link access layer security between user equipment (UE) and an initial access node is executed; and end-to-tend wireless backhaul link access layer security between the initial access node and a gateway node is executed. Signals from the UE pass through a communication path for communication between at least two wireless air interfaces and a core network; and the UE, the initial access node, and the gateway node are arranged at the communication path at least. When the communication path includes two wireless air interfaces, the UE and the initial access node carry out communication by a wireless access link; and the initial access node and the gateway node carry out communication by a wireless backhaul link. On the one hand, wireless backhaul link security is only executed in an end-to-end mode between the gateway node and the initial access node, thereby guaranteeing security of user plane data transmission in the wireless backhaul link well; and on the other hand, wireless access link security is executed in an end-to-end mode between the UE and the initial access node, so that the wireless access link transmission security can be ensured and the UE using the LTE technology does not need any modification and thus backward compatibility is guaranteed.

Description

technical field [0001] The invention relates to mobile communication technology, in particular to a method for realizing access layer security, user equipment and nodes. Background technique [0002] The cellular wireless mobile communication system began in the 1980s, and developed from meeting human voice communication needs at the beginning to gradually meeting human basic data communication needs on the basis of voice services. Traditional cellular wireless communication systems are deployed and operated by wireless network operators, and network construction has been carefully planned by operators. figure 1 It is a network topology diagram of a traditional cellular wireless access network, such as figure 1 As shown, the site selection of each macro base station (MNB, macro(e)NB) is determined by the operator's plan, and each macro base station can achieve wireless coverage of hundreds of meters or even thousands of meters, so as to realize the wireless coverage within ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/08
CPCH04W12/06H04L12/02
Inventor 施小娟
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products