Data security protection method, network access equipment and terminal

A technology for network access equipment and data security, which is applied to data security protection methods, network access equipment and terminals, and data transmission fields, and can solve problems such as inability to perform AS layer security protection and insufficient guarantee of user data security.

Inactive Publication Date: 2018-07-20
ZTE CORP
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] However, in the 5G IoT network, there is no initial security activation process in the CP mode, that is, the AS layer security protection cannot be performed in the CP mode. Therefore, the security of user data transmission on the air interface in the 5G IoT network is not fully guaranteed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security protection method, network access equipment and terminal
  • Data security protection method, network access equipment and terminal
  • Data security protection method, network access equipment and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0067] This embodiment provides a data security protection method, which can be applied to a 5G IoT network. In the prior art, the 5GIoT network does not have an initial security activation process in the CP mode, that is, the AS layer security protection cannot be performed in the CP mode, resulting in that the security of user data transmission on the air interface in the 5GIoT network is not fully guaranteed. This embodiment proposes a technical solution to this problem.

[0068] The executor of this embodiment may be a network access device, which may be used to implement the data security protection method of this embodiment; in practice, the network access device may be, for example, an evolved base station (eNB), or a responsible A component, device, device or system performing a function similar to an eNB.

[0069] Based on the network access device, see image 3 , the data security protection method provided by the present embodiment includes the following steps:

...

Embodiment 2

[0089] This embodiment corresponds to Embodiment 1, and provides a data security protection method applied on the terminal side, including the following steps:

[0090] Step 1), the terminal sends an RRC connection request message to the network access device, and the RRC connection request message includes a security capability algorithm supported by the terminal;

[0091] Step 2), receiving the RRC connection establishment message sent by the network access device, the RRC connection establishment message includes the security capability algorithm supported by the network access device according to the network access device, and the terminal Supported security capability algorithms, determined target security capability algorithms;

[0092] Step 3), for the AS layer messages sent and received between the network access device and the terminal, use the security key of the terminal and the target security capability algorithm to perform data security protection.

[0093] In t...

Embodiment 3

[0097] This embodiment is based on any one of the above-mentioned embodiments. In order to solve the problems existing in the prior art, this embodiment proposes a method for ensuring user data security in a 5G IoT network, that is, a solution for solving AS layer security problems of user data in CP mode. see Figure 4 , the method includes the following steps:

[0098] Step 401: When the terminal is initially powered on, select a cell on a designated frequency point, read the system information broadcast by the cell, and determine that the network is a 5G IoT network. The terminal determines the coverage level according to the quality of the downlink RSRP signal, and initiates random access on the corresponding Physical Random Access Channel (PRACH, Physical Random Access Channel) resource, including sending the random access preamble to the eNB and receiving the random access preamble sent by the eNB. Access response.

[0099] Step 402: The terminal sends a Msg3RRC Conne...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data security protection method, network access equipment and a terminal. The method comprises the following steps that the network access equipment receives an RRC connection request message sent by the terminal, wherein the RRC connection request message comprises a security capability algorithm supported by the terminal; the network access equipment determines a targetsecurity capability algorithm according to a security capability algorithm supported by the network access equipment and the security capability algorithm supported by the terminal; the network access equipment sends an RRC connection establishment message to the terminal, wherein the RRC connection establishment message comprises the target security capability algorithm; the network access equipment a downlink non-access layer direct transfer message sent by core network equipment, wherein the downlink non-access layer direct transfer message comprises a security key of the terminal; and data security protection is carried out on an AS layer message which is mutually received and sent between the network access equipment and the terminal by using the security key and the target securitycapability algorithm. By the adoption of the method, the network access equipment and the terminal, the transmission security of user data in an air interface can be improved.

Description

technical field [0001] The invention relates to data transmission technology in the field of communication technology, in particular to a data security protection method, network access equipment and a terminal. Background technique [0002] For 2020, the Mobile and wireless communications Enablers for the Twenty-twenty Information Society (METIS, Mobile and wireless communications Enablers for the Twenty-twenty Information Society) believes that the services provided by 5G networks are divided into three categories: extreme mobile broadband (xMBB, extreme mobile broadband), a large number of machine type communication (mMTC, massive machine-type communications), ultra-reliable machine type communication (uMTC, ultra-reliable machine-type communications), see figure 1 ;In the 5G network, different technical solutions are adopted for different services and different scenarios; Among them, the mMTC service is an important service to realize the Internet of Everything: On the o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/08H04W12/10H04W76/27H04W12/03
CPCH04W12/04H04W12/08H04W12/10
Inventor 郭春芳杨以琴张耀
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products