Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and apparatus for supporting security for separation of CU-CP and CU-UP in wireless communication system

A wireless communication system, CU-UP technology, applied in the field of supporting security

Active Publication Date: 2019-06-04
LG ELECTRONICS INC
View PDF8 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, communicating between these small service areas can be problematic with all capacity, coverage and interference to consider

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for supporting security for separation of CU-CP and CU-UP in wireless communication system
  • Method and apparatus for supporting security for separation of CU-CP and CU-UP in wireless communication system
  • Method and apparatus for supporting security for separation of CU-CP and CU-UP in wireless communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0110] Embodiment 1 of the present invention proposes an initial procedure of CU-UP to support security of data packets when CU-CP and CU-UP are separated. Hereinafter, a specific example of Embodiment 1 of the present invention will be described.

Embodiment 1-1

[0112] Figure 10 A method for supporting security of CU-UP according to Embodiment 1-1 of the present invention is illustrated. In embodiment 1-1, CU-CP is responsible for generating security keys and selecting encryption algorithms, and CU-UP is responsible for generating K UPenc .

[0113] In step S1000, the CU-CP generates a security key. Security keys may only be used by CU-UP for UP traffic. Alternatively, the security key can be used jointly by CU-CP and CU-UP for CP signaling and UP services. In addition, the CU-CP selects an encryption algorithm for the UE based on the UE's security-related capabilities. The UE's security-related capabilities may indicate all encryption algorithms supported by the UE. Encryption algorithms can be used by CU-UP only for UP traffic. Alternatively, the encryption algorithm can be used jointly by CU-CP and CU-UP for CP signaling and UP services.

[0114] In step S1010, the CU-CP sends the generated security key and the selected enc...

Embodiment 1-2

[0118] Figure 11 A method for supporting security of CU-UP according to Embodiment 1-2 of the present invention is illustrated. In Embodiment 1-2, the CU-CP is fully responsible for generating the security key, selecting the encryption algorithm, and generating the K UPenc .

[0119] In step S1100, the CU-CP generates a security key. Security keys can be used by CU-UP only for UP traffic. Alternatively, the security key can be used jointly by CU-CP and CU-UP for CP signaling and UP services. In addition, the CU-CP selects an encryption algorithm for the UE based on the UE's security-related capabilities. The UE's security-related capabilities may indicate all encryption algorithms supported by the UE. Encryption algorithms can be used by CU-UP only for UP traffic. Alternatively, the encryption algorithm can be used jointly by CU-CP and CU-UP for CP signaling and UP services. Furthermore, the CU-CP generates an encryption key K for the user plane based on the generated ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Provided are a method and an apparatus for supporting security of user traffic when a central unit (CU)-control plane (CP) and a CU-user plane (UP) of a gNB are separated in a wireless communication system. According to an embodiment of the present invention, the CU-CP of the gNB selects an encryption algorithm, generates a user plane security key for the CU-UP on the basis of the encryption algorithm, and transmits the user plane security key for the CU-UP to the CU-CP. The CU-UP applies the received user plane security key. The CU-CP is a logical node constituting the gNB that hosts a radioresource control (RRC) and a packet data convergence protocol (PDCP)-C protocol, and the CU-UP is a logical node constituting the gNB that hosts a PDCP-U protocol.

Description

technical field [0001] The present invention relates to wireless communication, and more particularly, to methods and methods for supporting security when Central Unit (CU) Control Plane (CP) and CU User Plane (UP) are separated in New Radio Access Technology (NR) systems device. Background technique [0002] The 3rd Generation Partnership Project (3GPP) Long Term Evolution (LTE) is a technology for realizing high-speed packet communication. Many proposals have been proposed for LTE goals including aiming at reducing user and provider costs, improving service quality, and expanding and enhancing coverage and system capacity. 3GPP LTE requires reduction of cost per bit, increase of service availability, flexible use of frequency bands, simple structure, open interface, and appropriate power consumption of terminals as more advanced requirements. [0003] The International Telecommunication Union (ITU) and 3GPP have started work on developing requirements and specifications ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W88/08H04W76/27
CPCH04L9/0861H04L9/0891H04L63/062H04L2463/061H04W12/04H04W88/12H04W12/033H04W88/085H04W76/27H04L9/0822H04L9/16H04W80/08H04W12/041H04W12/0431
Inventor 徐健边大旭金鉐中
Owner LG ELECTRONICS INC