Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A process optimization method of AS safe mode in LTE system

A security mode and process optimization technology, applied in the field of communication, can solve problems such as low efficiency, discarding, and increased system overhead

Active Publication Date: 2020-07-28
DATANG MOBILE COMM EQUIP CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0020] 1. The efficiency is low. The process of starting the safe mode requires the RRC layer and the PDCP layer to exchange messages multiple times.
When a large-capacity base station or a call is busy, the system overhead increases and the stability of the device decreases
[0021] 2. Due to the ASN.1 decoding at the RRC layer, after sending the Security Mode Command message in the downlink, the uplink cannot determine when the Security Mode Complete message is received, resulting in the NAS message not carrying the MAC-I and being discarded by the PDCP layer, causing call loss
[0022] 3. Due to the ASN.1 decoding at the RRC layer, when multiple messages including the Security Mode Command message are received in the downlink, the RRC layer will fail to decode the message after the Security Mode Command because the PDCP layer is not decrypted, causing a call. damage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A process optimization method of AS safe mode in LTE system
  • A process optimization method of AS safe mode in LTE system
  • A process optimization method of AS safe mode in LTE system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0096] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are the Some, but not all, embodiments are invented.

[0097] It should be noted that, in this article, "first" and "second" are only used to distinguish the same names, rather than implying the relationship or order between these names.

[0098] For the description of the activation of the AS security mode process in the LTE system, the key point of the process is that the PDCP layer learns the two messages of Security Mode Command and Security Mode Complete as well as security configuration parameters in a timely manner.

[0099] According to the 3GPP TS 36.331 protocol, the Security Mode Command message is the first integrity-p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an AS security mode process optimization method in an LTE system. The method comprises: after the PDCP layer of the base station receives the target SDU corresponding to the security mode command message sent by the RRC layer of the base station, the MAC-I domain of the target SDU Add preset information in , get the first target SDU and send it to the target UE, so that the target UE can feed back the second target SDU corresponding to the security mode completion message; after the PDCP layer of the base station receives the SDU sent by the target UE, based on the SDU MAC‑I field information, determine whether the SDU is the second target SDU, and realize AS security mode process optimization. The PDCP layer of the base station of the present invention determines whether the SDU sent by the UE is the SDU corresponding to the security mode completion message based on the MAC-I domain information of the SDU, so as to avoid problems such as message discarding caused by misidentification and failure to decrypt the message in time, etc. call loss.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to an AS security mode process optimization method in an LTE system. Background technique [0002] In view of the security features of the LTE (Long Term Evolution, long-term evolution) system, the AS (Access Stratum, access layer) needs to perform security mode command activation and security protection. During the AS security mode command process, the base station (eNodeB) and the user equipment (User Equipment, UE) negotiate the AS algorithm and calculate the AS integrity protection key and encryption key, and start the integrity protection and encryption. Integrity protection can ensure that the content of the message received by the receiver has not been tampered with by a third party, and encryption protection can change the content of the message sent by the sender so that no third party other than the target receiver can know the true content of the message. [0003]...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W12/02H04W12/10H04W12/106
CPCH04L69/06H04W12/02H04W12/10H04W80/02H04W88/08
Inventor 程岳
Owner DATANG MOBILE COMM EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products