Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for performing security configuration for radio bearer

A security configuration and wireless bearer technology, applied in security devices, wireless communication, digital transmission systems, etc., can solve the problems of poor security configuration applicability and inappropriate security configuration for current terminal equipment wireless bearer.

Inactive Publication Date: 2020-07-07
HUAWEI TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the same security configuration is made for all radio bearers corresponding to the user plane or all radio bearers of the same terminal, the current security configuration may not be applicable to the current terminal device or radio bearer.
It can be seen that the applicability of security configuration in current security configuration technology is relatively poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for performing security configuration for radio bearer
  • A method and device for performing security configuration for radio bearer
  • A method and device for performing security configuration for radio bearer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0075] see figure 1 , figure 1 It is a system architecture diagram to which the security configuration method provided by the embodiment of the present invention is applicable, such as figure 1 As shown, it includes: a terminal device (Terminal Device) 11, a base station 12, and a management entity 13, wherein the terminal device 11 can access the network through the base station 12, and the management entity 13 can configure the security configuration message car...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention discloses a method and device for performing security configuration for radio bearers. The method may include: the base station acquires a first security configuration message, wherein the first security configuration message is used to instruct the base station to establish a security configuration with a terminal device. Whether each of the N radio bearers needs to be configured with security, and indicate the security configuration parameters for the M radio bearers that need to be configured with security, where N is a positive integer, M is an integer, and M≤N; The base station sends the first security configuration message to the terminal device. The embodiment of the present invention can improve the applicability of security configuration.

Description

technical field [0001] The present invention relates to the field of mobile communication, in particular to a method and equipment for performing security configuration for radio bearers. Background technique [0002] With the development of mobile communication network technology, the current network has higher and higher requirements for security configuration. The current common security configuration strategy is to perform the same security configuration on all radio bearers corresponding to the user plane, or on all radio bearers of the same terminal. The above-mentioned user plane can be used to transmit service data of terminal equipment, and the control plane can be used to manage the user plane, generate control signaling, etc., and the radio bearer of the above-mentioned user plane can be understood as the radio bearer for transmitting service data, and the radio bearer of the control plane A bearer can be understood as a radio bearer for transmitting control sign...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24
CPCH04L41/0806H04L41/0853H04L63/205H04W12/10H04W12/03H04L63/20H04L2209/80
Inventor 苗金华张戬权威唐珣李秉肇
Owner HUAWEI TECH CO LTD