A data transmission method, first device and second device
A data transmission method and data transmission technology, applied in the field of data transmission method, first device and second device, can solve problems such as inability to use security mechanism for secure data transmission, unable to guarantee three-way handshake, etc., to overcome the problem of secure data transmission Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0079] Such as image 3 As shown, the embodiment of the present invention provides a data transmission method, in which the interaction between the first device and the second device is as follows:
[0080] S301. The first device determines a transmission message including transmission data and a security context identifier of a terminal device, and the terminal device is in an inactive state.
[0081] A terminal device in an inactive state maintains a connection with the core network, but does not perform routine operations in the air interface connection state, such as handover, uplink timing update, wireless link monitoring, etc., and does not allocate a terminal identifier directly used for air interface transmission (such as C-RNTI), so the air interface scheduling transmission cannot be directly performed. Terminal devices in an inactive state support fast data transmission. Fast data transmission refers to the completion of data transmission between the terminal device...
Embodiment 2
[0114] Based on the above embodiments, the embodiment of the present invention also provides a first device, the first device can adopt image 3 For the first device-side method provided in the corresponding embodiment, refer to Figure 8 As shown, the first device 800 includes: a processing unit 801 and a sending unit 802 .
[0115] The processing unit 801 is configured to determine the transmission message including the transmission data and the security context identifier of the terminal device, and the terminal device is in an inactive state;
[0116] The sending unit 802 is configured to send the transmission message determined by the processing unit 801 to the second device, where the security context identifier of the terminal device is used by the second device to match the security context identifier of the terminal device with the security context identifier of at least one local terminal device, and Determine whether to activate the security of the terminal device ...
Embodiment 3
[0140] Based on the above embodiments, the embodiment of the present invention also provides a second device, the second device can adopt image 3 For the second device-side method provided in the corresponding embodiment, refer to Figure 10 As shown, the second device 1000 includes: a receiving unit 1001 and a processing unit 1002 .
[0141] The receiving unit 1001 is configured to receive a transmission message sent by the first device, the transmission message includes transmission data and a security context identifier of the terminal device, and the terminal device is in an inactive state;
[0142] The processing unit 1002 is configured to match the security context identifier of the terminal device included in the transmission message received by the receiving unit 1001 with the security context identifier of at least one local terminal device, and determine whether to activate the security of the terminal device according to the matching result.
[0143] Optionally, w...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


