Method for realizing access layer security, user equipment, and small radio access network node

An access layer security and wireless access technology, applied in security devices, access restrictions, wireless communication, etc., can solve problems such as no specific implementation technical solutions

Active Publication Date: 2017-02-01
ZTE CORP
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In the future, a large number of SRAN-nodes will be densely deployed in UDN, and only a small number of SRAN-nodes have wired backhaul, which makes it very likely that UE communication data will need to be transmitted through two or more air interfaces. How to ensure this mobile communication The security in the system, to ensure the security of the UE's communication data when it is transmitted over two or more air interfaces, is a technical problem that needs to be solved urgently, and there is currently no specific technical solution for its implementation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing access layer security, user equipment, and small radio access network node
  • Method for realizing access layer security, user equipment, and small radio access network node
  • Method for realizing access layer security, user equipment, and small radio access network node

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0130] In order to make the purpose, technical solution and advantages of the present invention more clear, the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0131] In order to meet the expectation of a thousand-fold increase in business volume in the next 10 years, UDN will be widely deployed to bear a large amount of business traffic. UDN can be deployed in indoor or outdoor hotspot areas or any areas with large traffic demands. image 3It is a schematic diagram of ultra-dense network deployment in a certain area in the future, taking into account the infrastructure constraints of the actual deployment network, such as the limited number of wired network ports in the area shown, and the realization of flexibility without increas...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for realizing access layer security, user equipment, and a small radio access network node. The method comprises: end-to-end user plane access layer security between user equipment (UE) and a gateway node is executed; and when a micro-communication path exists at the UE, end-to-end control plane access layer security between the UE and an initial access node is executed; and or when a micro-communication path and a macro-communication path exist at the UE, end-to-end control plane access layer security between the UE and a macro eNB in the macro-communication path is executed. The micro-communication path is a communication path in which the UE is connected to a small radio access network node by a radio access link and then is connected to a core network and the macro-communication path is a communication path in which the UE is connected to the macro eNB by a radio access link and then is connected to a core network. Because the user plane security is only executed in an end-to-end mode between the UE and the gateway, the user plane security is guaranteed well; and the control plane security is only executed in an end-to-end mode between the UE and the initial access node or the macro eNB, so that the time delay of the control plane security operation is reduced on the premise that the control plane security is guaranteed. Meanwhile, the mobility performance of the UE is improved; and continuity of user plane data transmission of the UE is guaranteed.

Description

technical field [0001] The invention relates to mobile communication technology, in particular to a method for realizing access layer security, user equipment and wireless access small nodes. Background technique [0002] The cellular wireless mobile communication system began in the 1980s, and developed from meeting human voice communication needs at the beginning to gradually meeting human basic data communication needs on the basis of voice services. Traditional cellular wireless communication systems are deployed and operated by wireless network operators, and network construction has been carefully planned by operators. figure 1 It is a network topology diagram of a traditional cellular wireless access network, such as figure 1 As shown, the site selection of each macro base station (MNB, macro(e)NB) is determined by the operator's plan, and each macro base station can achieve wireless coverage of hundreds of meters or even thousands of meters, so as to realize the wir...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/02H04W12/04H04W12/08H04W12/10H04W48/20H04W12/041
CPCH04W12/02H04W12/04H04W12/08H04W12/10H04W48/20H04W12/06H04W84/045H04W12/033
Inventor 施小娟
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products