Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for authorization-free transmission, user equipment, access network equipment and core network equipment

A technology of core network equipment and access network equipment, which is applied in the field of communication and can solve problems such as not considering the security of data transmission

Active Publication Date: 2020-04-14
HUAWEI TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This technical solution is simple and effective, but does not consider the security of data transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for authorization-free transmission, user equipment, access network equipment and core network equipment
  • Method for authorization-free transmission, user equipment, access network equipment and core network equipment
  • Method for authorization-free transmission, user equipment, access network equipment and core network equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0069] The terms "component", "module", "system" and the like are used in this specification to refer to a computer-related entity, hardware, firmware, a combination of hardware and software, software, or software in execution. For example, a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and / or a computer. By way of illustration, both an application ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an authorization-free transmission method, user equipment, access network equipment and core network equipment. The method includes: the user equipment obtains the user equipment identification and key allocated by the core network equipment for authorization-free transmission; the user equipment uses the key and the user equipment identification to encrypt and encapsulate data; the user The device transmits the encrypted and encapsulated data to the access network device on the resource of the first contention transmission unit CTU in an authorization-free transmission mode. The technical scheme of the invention can realize simple, effective and safe communication in the scenario of authorization-free transmission.

Description

technical field [0001] Embodiments of the present invention relate to the field of communication technologies, and in particular, to a method for authorization-free transmission, user equipment, access network equipment, and core network equipment. Background technique [0002] In a long term evolution (Long Term Evolution, LTE) system, when uplink data needs to be transmitted, a user equipment (User Equipment, UE) adopts an uplink scheduling request (Scheduling Request, SR) mechanism. The UE notifies the base station that the UE needs uplink resources for data transmission by sending an uplink scheduling request to the base station. After receiving the UE's scheduling request, the base station allocates certain resources to the UE, and the UE performs data transmission on these allocated resources. [0003] With the development of the Internet of Things, more and more Machine Type Communication (MTC) services appear. Generally, the data packets of MTC type services are re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/04H04W12/0431
CPCH04W74/0891H04W4/70H04W8/24H04W74/002H04W12/08H04W12/033H04W12/04H04W72/02H04L63/0428H04W12/00H04W12/02H04W48/16
Inventor 曾广珠
Owner HUAWEI TECH CO LTD