Unlock instant, AI-driven research and patent intelligence for your innovation.

A data transmission method, first device and second device

A data transmission method and data transmission technology, applied in the field of data transmission method, first device and second device, can solve problems such as inability to use security mechanism for secure data transmission, unable to guarantee three-way handshake, etc., to overcome the problem of secure data transmission Effect

Active Publication Date: 2019-09-17
DATANG MOBILE COMM EQUIP CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The terminal equipment in the inactive state needs to support fast data transmission, and the "three-way handshake" cannot be guaranteed during the data transmission process. Therefore, the terminal equipment in the inactive state cannot use the security mechanism in the current wireless traditional communication system to realize communication with the base station. secure data transfer between

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data transmission method, first device and second device
  • A data transmission method, first device and second device
  • A data transmission method, first device and second device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0079] Such as image 3 As shown, the embodiment of the present invention provides a data transmission method, in which the interaction between the first device and the second device is as follows:

[0080] S301. The first device determines a transmission message including transmission data and a security context identifier of a terminal device, and the terminal device is in an inactive state.

[0081] A terminal device in an inactive state maintains a connection with the core network, but does not perform routine operations in the air interface connection state, such as handover, uplink timing update, wireless link monitoring, etc., and does not allocate a terminal identifier directly used for air interface transmission (such as C-RNTI), so the air interface scheduling transmission cannot be directly performed. Terminal devices in an inactive state support fast data transmission. Fast data transmission refers to the completion of data transmission between the terminal device...

Embodiment 2

[0114] Based on the above embodiments, the embodiment of the present invention also provides a first device, the first device can adopt image 3 For the first device-side method provided in the corresponding embodiment, refer to Figure 8 As shown, the first device 800 includes: a processing unit 801 and a sending unit 802 .

[0115] The processing unit 801 is configured to determine the transmission message including the transmission data and the security context identifier of the terminal device, and the terminal device is in an inactive state;

[0116] The sending unit 802 is configured to send the transmission message determined by the processing unit 801 to the second device, where the security context identifier of the terminal device is used by the second device to match the security context identifier of the terminal device with the security context identifier of at least one local terminal device, and Determine whether to activate the security of the terminal device ...

Embodiment 3

[0140] Based on the above embodiments, the embodiment of the present invention also provides a second device, the second device can adopt image 3 For the second device-side method provided in the corresponding embodiment, refer to Figure 10 As shown, the second device 1000 includes: a receiving unit 1001 and a processing unit 1002 .

[0141] The receiving unit 1001 is configured to receive a transmission message sent by the first device, the transmission message includes transmission data and a security context identifier of the terminal device, and the terminal device is in an inactive state;

[0142] The processing unit 1002 is configured to match the security context identifier of the terminal device included in the transmission message received by the receiving unit 1001 with the security context identifier of at least one local terminal device, and determine whether to activate the security of the terminal device according to the matching result.

[0143] Optionally, w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A data transmission method, a first device and a second device are used to realize secure data transmission between a terminal device in an inactive state and a base station. The method includes: the first device determines the transmission message including the transmission data and the security context identifier of the terminal device, and the terminal device is in an inactive state; the first device sends the transmission message to the second device; the second device matches the security context identifier of the terminal device and the security context identifier of at least one local terminal device, and determine whether to activate the security of the terminal device according to the matching result.

Description

technical field [0001] The present invention relates to the field of wireless communication, in particular to a data transmission method, a first device and a second device. Background technique [0002] With the development of wireless communication systems, the types of terminal equipment and service types are diversified, and terminal equipment saves power, saves network resources, and meets the needs of various service types. In order to meet the requirements of power saving and fast data transmission of the terminal device at the same time, the terminal device may be in an inactive state. [0003] A terminal device in an inactive state maintains a connection with the core network, but does not perform routine operations in the air interface connection state, such as handover, uplink timing update, wireless link monitoring, etc., and does not allocate a terminal identifier directly used for air interface transmission (such as C -RNTI), so the air interface scheduling tr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04W12/06H04W76/11H04W76/27H04W12/106H04W12/60H04W12/69
CPCH04W12/02H04W12/06H04L63/162H04W8/24H04W12/71H04W12/03H04W12/106H04W12/10H04W12/69Y02D30/70H04W12/041H04W12/48H04W12/73
Inventor 梁靖
Owner DATANG MOBILE COMM EQUIP CO LTD