Security protection method and device and access network equipment

A technology for access network equipment and security protection, which is applied in the field of communication and can solve problems such as on-demand activation that cannot achieve user plane security protection

Active Publication Date: 2019-08-23
HUAWEI TECH CO LTD
View PDF8 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present application provides a security protection method, device and access network equipm...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security protection method and device and access network equipment
  • Security protection method and device and access network equipment
  • Security protection method and device and access network equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0084] The application will be described in further detail below in conjunction with the accompanying drawings. The specific operation methods in the method embodiments can also be applied to the device embodiments or system embodiments. Wherein, in the description of the present application, unless otherwise specified, "at least one" means one or more, and "multiple" means two or more. " / " means or, for example, A / B can mean A or B; "and / or" in this article is just a description of the relationship between associated objects, which means that there can be three relationships, for example, A and / Or B, can mean: A exists alone, A and B exist at the same time, and B exists alone, where A and B can be singular or plural. "At least one of the following" or similar expressions refer to any combination of these items, including any combination of single or plural items. For example, at least one of a, b, and c can represent: a, b, c, a and b, a and c, b and c, or a, b and c, wher...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a safety protection method and device and access network equipment, relates to the technical field of communication, and is used for solving the problem that the safety protection of a user plane cannot be started as required in the prior art. The method comprises the following steps: the first access network device receives a first message from a second access network device, wherein the first message carries a user plane security policy; the user plane security policy is used for indicating user plane security protection type to be started of the first access network device, and the first access network device determines a user plane security algorithm and a user plane key corresponding to the user plane security algorithm according to the user plane security strategy if the first access network device can identify the user plane security protection type to be started; or, if the first access network device cannot identify the user plane security protection type to be started, the first access network device selects a default user plane security algorithm and determines a user plane key corresponding to the default user plane security algorithm.

Description

technical field [0001] The present application relates to the technical field of communications, and in particular to a security protection method, device and access network equipment. Background technique [0002] In the dual connection architecture, the terminal can access the master station and the slave station at the same time. In a long term evolution (long termevolution, LTE) dual connectivity architecture, both the master station and the slave station are evolved NodeBs (evolved NodeB, eNB or eNodeB) in a fourth generation (4th generation, 4G) network. In this architecture, the master station can be represented as master eNodeB or MeNB, and the slave station can be represented as secondary eNodeB or SeNB. Similar to LTE, a fifth generation (5th generation, 5G) network may also support dual connectivity technology. In the dual connection architecture of the 5G network, both the master station and the slave station can be the next generation node basestation (gNB) of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/02H04W76/15H04L29/06
CPCH04W12/02H04W76/15H04L63/205H04W36/22H04W36/0069H04W76/27H04L63/0428
Inventor 李赫陈璟仇力炜娄崇
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products