Method and device for realizing customized confidentiality and integrity protection algorithm of UE (User Equipment)
An integrity protection and protection algorithm technology, applied in the field of realizing UE customized confidentiality and integrity protection algorithms, can solve the problems of no defined priority, no support, no priority selection algorithm, etc., to improve flexibility and availability. The effect of scalability and applicability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example
[0113] Example: According to Table 9 or Table 10, the SMC signaling includes the following algorithms:
[0114] SecurityModeCommand
[0115] {……
[0116] IntegrityProtAlgorithm: NIA4
[0117] Ciphering Algorithm: NEA4
[0118]}.
[0119] Step 2: Algorithm selection during handover: When mobility is cross-site or cross-system, according to the definition in 3GPP TS38.311, HandoverRequest (or other related handover signaling) carries UE Security Capabilities (as shown in Table 9), and UE security capabilities It is transmitted to the target base station, and if the target base station judges that it also supports the algorithm, it negotiates with the UE on the selected security algorithm through the RRCreconfig message. If the target station judges that it does not support the UE highest priority algorithm, the highest priority in the intersection of the base station priority and the UE security capability will be used as the algorithm of both parties and sent to the UE thro...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


