Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety algorithm configuration method, control plane center node and terminal

A technology of security algorithm and configuration method, which is applied in the field of control plane central nodes and terminals, security algorithm configuration method, can solve problems such as security risks and security risks, and achieve the effect of improving security and avoiding security risks

Active Publication Date: 2021-02-23
DATANG MOBILE COMM EQUIP CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this scenario, if user data with different Quality of Service (QoS) is carried on the CU-UP inside the gNB (for example, some CU-UPs carry online entertainment videos that are not related to user privacy, some CU-UPs carry UP carries a small amount of data but contains data related to user privacy, such as location and user's family device information, etc.), and all CU-UPs use the same security algorithm, which will lead to security risks, such as when the user registers to The null algorithm is selected in the public land mobile network (Public Land Mobile Network, PLMN), but the data of some users is not allowed to use the null algorithm to protect
In addition, since different CU-UPs have different positions, some CU-UPs are deployed at positions relative to the core internally, and security algorithms with relatively high security levels need to be configured. At this time, if the security algorithms of all CU-UPs are unified, the cause some safety hazards

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety algorithm configuration method, control plane center node and terminal
  • Safety algorithm configuration method, control plane center node and terminal
  • Safety algorithm configuration method, control plane center node and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038]In order to make the objectives, technical solutions, and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be described clearly and completely in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of the embodiments of the present invention, not all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0039]In NR and similar systems, a logical RAN node can be further divided into a CU-CP, one or more CU-UPs, and one or more distributed node DUs. This structure is called a CU-CP / UP separation structure . In this structure, CU-CP and DU are connected by F1-C or similar interface, and CU-CP and CU-UP are connected by E1 or similar interface;...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Provided are a safety algorithm configuration method, a control plane center node and a terminal. The method comprises the steps of sending safety algorithm information corresponding to a user plane center node CUUP to the terminal, implementing a negotiation process of the safety algorithm information corresponding to the CUUP, implementing that the CUUP can correspond to its own safety algorithminformation, and implementing the negotiation process of the safety algorithm information corresponding to the CUUP. The safety of the CUUP service is improved.

Description

Technical field[0001]The present invention relates to the field of communication technology, in particular to a security algorithm configuration method, a control plane central node and a terminal.Background technique[0002]In the New Radio (NR) system, a logical radio access network (Radio Access Network, RAN) node can be further divided into a Central Unit-ControlPlane (CU-CP), one or more A user plane central node (Central Unit-User Plane, CU-UP) and one or more distributed nodes (Distributed Unit, DU), this structure is called CU-CP / UP separation structure, these nodes can be located in different physical Within the entity. In addition, one CU-CP can be connected to multiple CU-UPs.[0003]In addition, in the prior art, the security algorithm used by all user bearers between a user and a 5g base station (gNB) is the same (including encryption algorithms and integrity protection algorithms). In this scenario, if user data of different Quality of Service (QoS) is carried on the CU-UP...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/37H04W12/03H04W12/02H04W12/106H04L29/06
CPCH04W12/02H04W12/10H04L63/205H04W12/106H04W12/03H04W12/37H04W12/00H04L9/40
Inventor 毕晓宇刘爱娟
Owner DATANG MOBILE COMM EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products