Unlock instant, AI-driven research and patent intelligence for your innovation.

A method for secure data transmission and access network, terminal, and core network equipment

A technology for access network equipment and core network equipment, applied in the field of data security transmission, can solve problems such as threats to network slicing security, master key cracking, etc., to improve flexibility and differentiation, achieve security, and ensure security Effect

Active Publication Date: 2021-02-12
HUAWEI TECH CO LTD
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At this time, if the existing security mechanism is still used and the eNB maintains a master key, then the network element on the RAN side is attacked, which may cause the master key maintained by the eNB to be cracked, which may threaten the security of other network slices sex

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for secure data transmission and access network, terminal, and core network equipment
  • A method for secure data transmission and access network, terminal, and core network equipment
  • A method for secure data transmission and access network, terminal, and core network equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] figure 2 It exemplarily shows a system architecture applicable to the embodiment of the present invention. Based on the system architecture, the process of secure data transmission can be realized. The system architecture of secure data transmission provided by the embodiment of the present invention may include network equipment 110 and terminal equipment 120.

[0073] Wherein, the network device 110 may include an access network (Radio Access Network, RAN)) device and a core network (Core Network, CN) device communicating with the terminal device 120, and the RAN device may be an access point (ACCESS POINT, AP) in the WLAN. ), a base station (Base Transceiver Station, BTS) in GSM or CDMA, or a base station (NodeB, NB) in WCDMA, or an evolved base station (Evolutional Node B, eNB or eNodeB) in LTE, or a relay station Or access points, or vehicle-mounted devices, wearable devices, and network devices in future 5G networks or network devices in future evolved PLMN netw...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for secure data transmission, an access network, a terminal, and a core network device, the method comprising: receiving a request message sent by a terminal device by a first access network device, and selecting one or more network slices from the first core network device Information, receiving the response message sent by the first core network device, sending the user plane security information to the terminal device, the first access network device receiving the encrypted data transmitted by the terminal device, and transmitting the encrypted data to the first core network device The data. The user plane security information configured by the first core network device for the terminal device is sent to the terminal device through the first access network device, so that the terminal device encrypts data during data transmission according to the user plane security information, thereby improving the network architecture of network slicing The security and reliability of the data transmission process under the following circumstances, because the first core network equipment is configured according to the user plane security information of one or more network slice selection information, the flexibility and security of data encryption are improved.

Description

technical field [0001] The invention relates to the technical field of wireless communication, in particular to a method for secure data transmission, access network, terminal and core network equipment. Background technique [0002] The fifth generation mobile communication system (the fifth generation, 5G) proposed the network architecture of network slice (network slice, NS), software defined network (software defined network, SDN) and network function virtualization (network The function virtualization (NFV) technology is the core technology of the network slicing architecture. The NFV technology realizes the virtualization of the underlying physical resources and loads the virtual network function (network function, NF) to the general platform. Like virtual machines, SDN technology realizes the logical connection between virtual machines and builds a path for carrying signaling and data flow. Through the dynamic connection between the NFs of the access network (radio a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04W12/08H04W48/08H04W48/16H04W12/03
CPCH04W12/02H04W12/08H04W48/08H04W48/16H04W12/037H04W12/033
Inventor 娄崇刘星黄曲芳曾清海
Owner HUAWEI TECH CO LTD