Secret key sending method and device, parameter sending method and device, user surface entity, and control surface entity
A technology of a user plane entity and a transmission method, applied in the field of communication, can solve problems such as unspecified and unproposed solutions, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0037] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Taking running on a mobile terminal as an example, image 3 It is a block diagram of the hardware structure of a mobile terminal according to a method for transmitting a key in an embodiment of the present invention. Such as image 3 As shown, the mobile terminal 30 may include one or more (only one is shown in the figure) processor 302 (the processor 302 may include but not limited to a processing device such as a microprocessor MCU or a programmable logic device FPGA, etc.), for A memory 304 for storing data, and a transmission device 306 for communication functions. Those of ordinary skill in the art can understand that, image 3 The shown structure is only for illustration, and it does not limit the structure of the above-mentioned electronic device. For example, mobile terminal 30 may also include ...
Embodiment 2
[0062]In this embodiment, a parameter sending method running on the above-mentioned mobile terminal or network architecture is provided, Figure 5 is a flowchart of a parameter sending method according to an embodiment of the present invention, such as Figure 5 As shown, the process includes the following steps:
[0063] Step S502, generating necessary configuration parameters for secure transmission of user plane data; wherein, the configuration parameters include: public root key KgNB, mobile next-hop parameter NH, or configuration parameters include KgNB, NH and at least one of the following parameters: security algorithm identification , the auxiliary value of the subkey corresponding to each data radio bearer DRB configured for the terminal;
[0064] Step S504, sending configuration parameters to the user plane entity; where the configuration parameters are used by the user plane entity to generate independent subkeys for each DRB configured for the terminal.
[0065] ...
Embodiment 3
[0078] In this embodiment, a key sending device is also provided, which is used to implement the above embodiments and preferred implementation modes, and what has already been described will not be repeated. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.
[0079] Figure 6 is a structural block diagram of a key sending device according to an embodiment of the present invention, such as Figure 6 As shown, the device includes:
[0080] The obtaining module 62 is used to obtain necessary configuration parameters for secure transmission of user plane data; wherein, the configuration parameters include: public root key KgNB, mobile next hop parameter NH, security algorithm identifier, and each data ra...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com