Secret key sending method and device, parameter sending method and device, user surface entity, and control surface entity

A technology of a user plane entity and a transmission method, applied in the field of communication, can solve problems such as unspecified and unproposed solutions, etc.

Active Publication Date: 2019-02-26
ZTE CORP
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This technology allows users' services (such as email) to safely transmit their data over an internet connection while still being able to access them from different devices connected by wires or wireless networks. By obtaining these configurations needed for transmitting this type of data between two parties, they cannot easily intercept any sensitive parts of the communication content without compromising its security level.

Problems solved by technology

This patented describes a problem where separating two parts called CP's and Unified Physic Block Group (UMB)-RS_Unit) requires complex hardware configurations due to their unique characteristics. Exchanging these components takes up valuable space within an operator's cabroom area. To address this issue, some solutions involve virtualizing certain elements like CPU cores and networking devices, allowing access ports to share all available computing power without overloading any part(Physics Hardware Node Base Hub, PMUB)). However, existing systems lack sufficient efficiency when handling user requests requiring faster response times than what was previously expected based upon the assumed maximum transfer speed supported by each component.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret key sending method and device, parameter sending method and device, user surface entity, and control surface entity
  • Secret key sending method and device, parameter sending method and device, user surface entity, and control surface entity
  • Secret key sending method and device, parameter sending method and device, user surface entity, and control surface entity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Taking running on a mobile terminal as an example, image 3 It is a block diagram of the hardware structure of a mobile terminal according to a method for transmitting a key in an embodiment of the present invention. Such as image 3 As shown, the mobile terminal 30 may include one or more (only one is shown in the figure) processor 302 (the processor 302 may include but not limited to a processing device such as a microprocessor MCU or a programmable logic device FPGA, etc.), for A memory 304 for storing data, and a transmission device 306 for communication functions. Those of ordinary skill in the art can understand that, image 3 The shown structure is only for illustration, and it does not limit the structure of the above-mentioned electronic device. For example, mobile terminal 30 may also include ...

Embodiment 2

[0062]In this embodiment, a parameter sending method running on the above-mentioned mobile terminal or network architecture is provided, Figure 5 is a flowchart of a parameter sending method according to an embodiment of the present invention, such as Figure 5 As shown, the process includes the following steps:

[0063] Step S502, generating necessary configuration parameters for secure transmission of user plane data; wherein, the configuration parameters include: public root key KgNB, mobile next-hop parameter NH, or configuration parameters include KgNB, NH and at least one of the following parameters: security algorithm identification , the auxiliary value of the subkey corresponding to each data radio bearer DRB configured for the terminal;

[0064] Step S504, sending configuration parameters to the user plane entity; where the configuration parameters are used by the user plane entity to generate independent subkeys for each DRB configured for the terminal.

[0065] ...

Embodiment 3

[0078] In this embodiment, a key sending device is also provided, which is used to implement the above embodiments and preferred implementation modes, and what has already been described will not be repeated. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.

[0079] Figure 6 is a structural block diagram of a key sending device according to an embodiment of the present invention, such as Figure 6 As shown, the device includes:

[0080] The obtaining module 62 is used to obtain necessary configuration parameters for secure transmission of user plane data; wherein, the configuration parameters include: public root key KgNB, mobile next hop parameter NH, security algorithm identifier, and each data ra...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a secret key sending method and device, a parameter sending method and device, a user plane (UP), and a control plane (CP). The secret key sending method comprises the steps of: obtaining necessary configuration parameters of data safety transmission of a user surface, wherein the configuration parameters comprise a common root secret key KgNB, a movement next hop parameter NH, a safety algorithm identifier and an assistant value of a sub secret key corresponding to each data wireless bearing DRB configured to the terminal; generating independent sub secret keysfor each DRB according to the configuration parameters; and sending the independent sub secret key generated by each DRB to the terminal. According to the invention, the problem is solved that how toachieve the safety transmission of a user business data flow in a condition of CP and UP physical separation so as to achieve the effect of safety transmission.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products