Method for secure data transmission, access network, terminal and core network device

A technology of access network equipment and core network equipment, which is applied in the field of secure data transmission, and can solve problems such as threatening the security of network slices and cracking master secret keys, so as to improve flexibility and differentiation, realize security, and solve data loss Effect

Active Publication Date: 2018-08-03
HUAWEI TECH CO LTD
View PDF7 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At this time, if the existing security mechanism is still used and the eNB maintains a master key, then the network element on the RAN side is attacked, which may cause the master key maintained by the eNB to be cracked, which may threaten the security of other network slices sex

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for secure data transmission, access network, terminal and core network device
  • Method for secure data transmission, access network, terminal and core network device
  • Method for secure data transmission, access network, terminal and core network device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] figure 2 It exemplarily shows a system architecture applicable to the embodiment of the present invention. Based on the system architecture, the process of secure data transmission can be realized. The system architecture of secure data transmission provided by the embodiment of the present invention may include network equipment 110 and terminal equipment 120.

[0073] Wherein, the network device 110 may include an access network (Radio Access Network, RAN)) device and a core network (Core Network, CN) device communicating with the terminal device 120, and the RAN device may be an access point (ACCESS POINT, AP) in the WLAN. ), a base station (Base Transceiver Station, BTS) in GSM or CDMA, or a base station (NodeB, NB) in WCDMA, or an evolved base station (Evolutional Node B, eNB or eNodeB) in LTE, or a relay station Or access points, or vehicle-mounted devices, wearable devices, and network devices in future 5G networks or network devices in future evolved PLMN netw...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for secure data transmission, an access network, a terminal and a core network device. The method comprises the following steps that: a first access network device receives a request message sent by a terminal device, sends one or more pieces of network slice selection information to a first core network device, receives a response message sent by the first core network device, sends user-plane security information to the terminal device, receives the encrypted data transmitted by the terminal device, and transmits the encrypted data to the first core network device. The user-plane security information configured by the first core network device for the terminal device is sent to the terminal device via the first access network device, so that the terminaldevice performs encryption during data transmission according to the user-plane security information, thereby improving the security and reliability during the data transmission process under a network architecture of network slices. Since the first core network device configures the user-plane security information according to one or more pieces of network slice selection information, the flexibility and security of data encryption are improved.

Description

technical field [0001] The invention relates to the technical field of wireless communication, in particular to a method for secure data transmission, access network, terminal and core network equipment. Background technique [0002] The fifth generation mobile communication system (the fifth generation, 5G) proposed the network architecture of network slice (network slice, NS), software defined network (software defined network, SDN) and network function virtualization (network The function virtualization (NFV) technology is the core technology of the network slicing architecture. The NFV technology realizes the virtualization of the underlying physical resources and loads the virtual network function (network function, NF) to the general platform. Like virtual machines, SDN technology realizes the logical connection between virtual machines and builds a path for carrying signaling and data flow. Through the dynamic connection between the NFs of the access network (radio a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/08H04W48/08H04W48/16H04W12/03
CPCH04W12/02H04W12/08H04W48/08H04W48/16H04W12/037H04W12/033
Inventor 娄崇刘星黄曲芳曾清海
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products