Security negotiation method and device

A security and negotiation information technology, applied in security devices, electrical components, transmission systems, etc., can solve problems such as scenarios where the separation of control plane functional entities and user plane functional entities is not applicable

Active Publication Date: 2021-09-21
HUAWEI TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This security negotiation mechanism in the prior art is not suitable for the scenario where the functional entity of the control plane is separated from the functional entity of the user plane

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security negotiation method and device
  • Security negotiation method and device
  • Security negotiation method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0198] figure 1 It is a schematic diagram of a communication system. Such as figure 1 As shown, the system includes: DU, a control plane (CU-Control Plane, CU-CP) of the centralized unit, and a user plane (CU-User Plane, CU-UP) of the centralized unit.

[0199] Such as figure 1 As shown, the system may be a network device system, which is composed of one CU-CP, multiple DUs, and multiple CU-UPs. Among them, CU-CP and DU can be connected through F1-C interface, between CU-UP and DU can be connected through F1-U interface, between CU-UP and CU-CP can be connected through E1 interface.

[0200] Among them, the DU covers the physical layer of baseband processing and some functions of the media access control (Media Access Control, MAC) layer / radio link control (Radio Link Control, RLC) layer. Considering the transmission resources of the Radio Remote Unit (RRU) and the DU, some physical layer functions of the DU can be moved up to the RRU. With the miniaturization of RRUs, ev...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application provides a security negotiation method and device. The method includes: the terminal receives the security negotiation information sent by CU‑CP / CU‑UP, the security negotiation information includes: the integrity protection indicator of CU‑UP; The integrity protection indicator of the CU‑UP described above determines whether to enable the user plane integrity protection of the terminal. In the scenario where CU‑CP and CU‑UP are separated, the user plane security negotiation with the terminal can be completed.

Description

technical field [0001] The present application relates to the field of wireless communication, in particular to a security negotiation method and device. Background technique [0002] The basic processing unit of the future network on the access network side is split into a centralized unit (Centralized Unit, CU) and a distributed unit (Distributed Unit, DU), where the centralized unit can be split into a control plane functional entity and a user plane Functional entities correspond to control plane functional network element devices and user plane functional network element devices. Specifically, this functional decoupling is mainly for further functional splitting of the centralized unit of the access network device. In order to ensure communication security in this scenario, an effective access security negotiation mechanism needs to be provided. [0003] However, the current security negotiation mechanism is mainly an authentication server (Authentication Server, AS) ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/041H04W12/10H04L29/06
CPCH04W12/00H04L63/205H04W12/10H04L67/141H04W12/033H04W12/041H04W88/085
Inventor 吴荣张博谭帅帅
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products