Unlock instant, AI-driven research and patent intelligence for your innovation.

Communication method and related device

A signaling plane and reconfiguration technology, applied in security devices, wireless communications, network data management, etc., can solve problems that cannot be split and cannot adapt to flexible and changeable application scenarios

Active Publication Date: 2019-04-16
HUAWEI TECH CO LTD
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In the prior art, a security algorithm that is applied to both the user plane and the signaling plane is determined through the AS SMC process, and the security algorithm includes an encryption algorithm and an integrity protection algorithm. The negotiation scheme of this security algorithm is relatively fixed. For example, the user plane The same set of security algorithms is applicable to the signaling plane and cannot be split. For example, the encryption algorithm and the integrity protection algorithm must be determined at the same time and cannot be split. It can be seen that this security negotiation algorithm is relatively fixed and cannot adapt to the current flexible and changeable Application Scenario

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication method and related device
  • Communication method and related device
  • Communication method and related device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0265] Method 1: Use the user plane security scheme corresponding to the resources allocated before the session of the terminal device. The allocated resources correspond to enabling user plane integrity protection.

[0266]Mode 2: redetermine the user plane security scheme corresponding to the reallocated resource corresponding to the session according to the state of the base station. For example, the status of the base station shows that the packet loss rate of a certain session is too high, because the user plane integrity protection increases the packet loss rate, so the user plane integrity protection is turned off during the process of reallocating resources for this session. For another example, if the base station re-allocates resources for the session due to overload, then in the process of re-allocating resources for the session, disable the user plane integrity protection originally enabled for the session.

[0267] Obviously, the above two optional implementation...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a communication method and a related device. A base station acquires a security policy, wherein the security policy comprises integrity protection indication information, andthe integrity protection indication information is used for indicating that whether the base station performs integrity protection on terminal equipment or not; and when the integrity protection indication information indicates that the base station performs the integrity protection on the terminal equipment, the base station sends a target user plane integrity protection algorithm to the terminalequipment.

Description

technical field [0001] The present application relates to the technical field of wireless communication, and in particular to a communication method and a related device. Background technique [0002] In a Long Term Evolution (LTE) system, security operations of encryption / decryption and integrity protection are performed between the terminal equipment and the base station, and encryption protection and integrity protection are provided for signaling. Due to the different security capabilities of different terminal devices, for example, the supported encryption algorithms or integrity protection algorithms are different, so before the access layer (AccessStratum, AS) performs encryption protection and integrity protection, it needs to be negotiated between the terminal device and the base station A set of security algorithms. The process of negotiating a security algorithm includes the following steps: [0003] 1. The terminal device sends an attach request to a mobility m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/04H04W12/10H04W12/033H04W12/37
CPCH04W12/02H04W12/04H04W12/10H04L63/205H04W92/10H04W12/08H04L63/10H04W8/04H04W12/037H04W12/033H04W12/106H04W12/03H04W8/08H04W80/10H04W76/27H04W12/041
Inventor 李赫陈璟胡力
Owner HUAWEI TECH CO LTD