HK1263021B - System and method for communicating security key information - Google Patents
System and method for communicating security key information Download PDFInfo
- Publication number
- HK1263021B HK1263021B HK19122985.5A HK19122985A HK1263021B HK 1263021 B HK1263021 B HK 1263021B HK 19122985 A HK19122985 A HK 19122985A HK 1263021 B HK1263021 B HK 1263021B
- Authority
- HK
- Hong Kong
- Prior art keywords
- senb
- menb
- enb
- counter check
- security key
- Prior art date
Links
Description
本申请是分案申请。原申请的申请号为201380066189.8,发明名称为“用于传递安全密钥信息的系统和方法”。This application is a divisional application. The application number of the original application is 201380066189.8, and the invention name is “System and method for transmitting secure key information”.
背景技术Background Art
无线移动通信技术使用各种标准和协议在节点(例如,发射站)和无线设备(例如,移动设备)之间传输数据。某些无线设备在下行链路(DL)传输中使用正交频分多址(OFDMA)进行通信,而在上行链路(UL)传输中使用单载波频分多址(SC-FDMA)进行通信。使用正交频分复用(OFDM)进行信号传输的标准和协议包括:第三代合作伙伴计划(3GPP)长期演进(LTE)、电气和电子工程师协会(IEEE)802.16标准(例如,802.16e、802.16m)(在行业内通常被称为WiMAX(全球微波接入互操作性)以及IEEE 802.11标准(在行业内通常被称为WiFi)。Wireless mobile communication technologies use various standards and protocols to transmit data between nodes (e.g., transmitting stations) and wireless devices (e.g., mobile devices). Some wireless devices use orthogonal frequency division multiple access (OFDMA) for communication in downlink (DL) transmissions and single-carrier frequency division multiple access (SC-FDMA) for communication in uplink (UL) transmissions. Standards and protocols that use orthogonal frequency division multiplexing (OFDM) for signal transmission include: the Third Generation Partnership Project (3GPP) Long Term Evolution (LTE), the Institute of Electrical and Electronics Engineers (IEEE) 802.16 standards (e.g., 802.16e, 802.16m) (commonly referred to in the industry as WiMAX (Worldwide Interoperability for Microwave Access), and the IEEE 802.11 standards (commonly referred to in the industry as WiFi).
在3GPP无线接入网(RAN)LTE系统中,节点可以是演进通用陆地无线接入网(E-UTRAN)节点B(通常还被称为演进节点B、增强节点B、eNodeB或eNB)的组合,这些节点与被称为用户设备(UE)的无线设备进行通信。下行链路(DL)传输可以是从节点(例如,eNodeB)到无线设备(例如,UE)的通信,并且上行链路(UL)传输可以是从无线设备到节点的通信。In a 3GPP radio access network (RAN) LTE system, a node may be a combination of an Evolved Universal Terrestrial Radio Access Network (E-UTRAN) Node B (also commonly referred to as an evolved Node B, enhanced Node B, eNodeB, or eNB), which communicates with wireless devices called user equipment (UE). A downlink (DL) transmission may be communication from a node (e.g., an eNodeB) to a wireless device (e.g., a UE), and an uplink (UL) transmission may be communication from a wireless device to a node.
在同构网络中,节点(也被称为宏节点)可以向小区中的无线设备提供基本的无线覆盖。小区可以是无线设备可操作以与宏节点进行通信的区域。异构网络(HetNet)可以被用来处理由于无线设备的使用率和功能的增加而导致的宏节点上的增长的业务负荷。HetNet可以包括重叠有多层较低功率节点(小型eNB、微eNB、微微eNB、毫微微eNB和家庭eNB(HeNB))的一层规划的高功率宏节点(或宏eNB),这些较低功率节点可以以规划较弱或甚至完全不协调的方式部署在宏节点的覆盖区域(小区)内。较低功率节点(LPN)通常可以被称为“低功率节点”、小型节点或小型小区。In a homogeneous network, a node (also referred to as a macro node) can provide basic wireless coverage to wireless devices in a cell. A cell can be an area where wireless devices can operate to communicate with a macro node. Heterogeneous networks (HetNets) can be used to handle the increased traffic load on macro nodes due to the increased usage and functionality of wireless devices. A HetNet can include a layer of planned high-power macro nodes (or macro eNBs) overlaid with multiple layers of lower-power nodes (small eNBs, micro eNBs, pico eNBs, femto eNBs, and home eNBs (HeNBs)), which can be deployed within the coverage area (cell) of the macro node in a less planned or even completely uncoordinated manner. Lower-power nodes (LPNs) can generally be referred to as "low-power nodes," small nodes, or small cells.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
根据后面的具体实施方式并且结合附图,本公开的特征和优点将显而易见,附图通过示例的方式一起示出了本公开的特征,其中:Features and advantages of the present disclosure will become apparent from the following detailed description taken in conjunction with the accompanying drawings, which together illustrate features of the present disclosure by way of example, in which:
图1根据示例示出了用于演进节点B(eNB)间载波聚合的部署情形;FIG1 illustrates a deployment scenario for inter-evolved Node B (eNB) carrier aggregation, according to an example;
图2根据示例示出了用于演进节点B(eNB)间载波聚合的操作方案;FIG2 illustrates an operational scheme for inter-evolved Node B (eNB) carrier aggregation, according to an example;
图3根据示例示出了用于演进节点B(eNB)间载波聚合的基于S1的协议;FIG3 illustrates an S1-based protocol for inter-evolved Node B (eNB) carrier aggregation, according to an example;
图4根据示例示出了宏演进节点B(eNB)和小型eNB之间的安全密钥信息的传递;FIG4 illustrates the transfer of security key information between a macro evolved Node B (eNB) and a small eNB, according to an example;
图5根据示例描绘了可操作以将安全密钥信息传递到第二节点的第一节点的计算机电路的功能;5 depicts functionality of computer circuitry of a first node operable to communicate security key information to a second node, according to an example;
图6根据示例描绘了用于从宏eNB传递安全密钥信息的方法的流程图;FIG6 depicts a flow diagram of a method for delivering security key information from a macro eNB, according to an example;
图7根据示例描绘了可操作以传递完整性和加密信息的第一无线节点的计算机电路的功能;7 depicts functionality of computer circuitry of a first wireless node operable to communicate integrity and encryption information, according to an example;
图8根据示例示出了无线设备(例如,UE)的图示。FIG8 shows a diagram of a wireless device (eg, UE), according to an example.
现在将参考所示的示例性实施例,并且在此将使用具体的语言来描述这些示例性实施例。然而,应当理解,这样做并非意图限制本发明的范围。Reference will now be made to the exemplary embodiments illustrated, and specific language will be used herein to describe the same, but it will be understood, however, that no limitation of the scope of the invention is intended by this.
具体实施方式DETAILED DESCRIPTION
在公开和描述本发明之前,应当理解,本发明不被限制于在此所公开的特定的结构、处理步骤或材料,而是被扩展到其等同物,如本领域技术人员将理解地那样。还应当理解,在此使用的术语仅仅是为了描述特定的示例,而无意进行限制。在不同附图中的相同的参考数字表示相同的元件。在流程图和处理中所提供的数字是为了清楚地说明步骤和操作而提供,而不必指示特定的顺序或次序。Before disclosing and describing the present invention, it should be understood that the present invention is not limited to the specific structures, processing steps or materials disclosed herein, but is extended to equivalents thereof, as will be understood by those skilled in the art. It should also be understood that the terminology used herein is for the purpose of describing specific examples only and is not intended to be limiting. The same reference numerals in different figures represent the same elements. The numbers provided in the flow charts and processes are provided for clarity of illustration of the steps and operations and do not necessarily indicate a particular order or sequence.
示例实施例Example Embodiments
下面提供技术实施例的初始概述,并且之后更详细地描述具体技术实施例。该初始概述意在帮助读者更快地理解技术,并非意在识别该技术的关键特征或必要特征,也并非意在限制所要求保护的主题的范围。The following provides an initial overview of the technical embodiments, and then describes specific technical embodiments in more detail. This initial overview is intended to help readers understand the technology more quickly, but is not intended to identify the key features or essential features of the technology, nor is it intended to limit the scope of the claimed subject matter.
一种用于向无线设备提供额外带宽容量的技术是,通过使用多个较小带宽的载波聚合,在无线设备(例如,UE)处形成虚拟宽带信道。在载波聚合(CA)中,多个分量载波(CC)可以被聚合并且联合地(jointly)用于向/自单个终端进行传输。载波聚合向无线设备提供更宽的选择,从而使得能够获取更多的带宽。更大的带宽可以被用来进行带宽密集型操作,例如流式传送视频或传递大的数据文件。One technique for providing additional bandwidth capacity to wireless devices is to form a virtual wideband channel at the wireless device (e.g., UE) by aggregating multiple smaller bandwidth carriers. In carrier aggregation (CA), multiple component carriers (CCs) can be aggregated and jointly used for transmission to and from a single terminal. Carrier aggregation provides wireless devices with a wider range of options, enabling them to access more bandwidth. The greater bandwidth can be used for bandwidth-intensive operations, such as streaming video or delivering large data files.
载波可以是所允许的频域中的、信息被放置于其上的信号。可以被放置于载波上的信息量可以由频域中聚合的载波的带宽来确定。所允许的频域通常在带宽上是有限的。当大量用户正在同时使用所允许的频域中的带宽时,带宽限制会变得更加严重。另外,下行链路CC在载波聚合中可以包括主小区和/或多达四个辅小区。每个服务小区(即,该主小区和多达该四个辅小区)可以由无线资源控制(RCC)信令独立地进行配置。另外,术语“小型小区”可以指代“低功率节点”。A carrier may be a signal in an allowed frequency domain on which information is placed. The amount of information that can be placed on a carrier may be determined by the bandwidth of the carriers aggregated in the frequency domain. The allowed frequency domain is typically limited in bandwidth. When a large number of users are using the bandwidth in the allowed frequency domain at the same time, the bandwidth limitation becomes more severe. In addition, a downlink CC may include a primary cell and/or up to four secondary cells in a carrier aggregation. Each serving cell (i.e., the primary cell and up to the four secondary cells) may be independently configured by radio resource control (RCC) signaling. In addition, the term "small cell" may refer to a "low-power node."
一种用于向无线设备提供额外带宽容量的技术可以包括,使用演进通用陆地无线接入(EUTRA)演进节点B(eNB)间载波聚合(CA)。虽然在第三代合作伙伴计划(3GPP)长期演进(LTE)版本11中,所有服务小区由同一eNB提供服务,但是在EUTRA eNB间CA中,服务小区可以在不同eNB中操作。例如,主小区(或PCell)可以从宏小区获得服务,而辅小区(SCell)可以从微微小区获得服务。宏小区可以与宏eNB关联,而微微小区可以与微微eNB关联。One technique for providing additional bandwidth capacity to wireless devices may include using Evolved Universal Terrestrial Radio Access (EUTRA) evolved Node B (eNB) inter-carrier aggregation (CA). While in 3rd Generation Partnership Project (3GPP) Long Term Evolution (LTE) Release 11, all serving cells are served by the same eNB, in EUTRA inter-eNB CA, serving cells can operate in different eNBs. For example, a primary cell (or PCell) can be served by a macro cell, while a secondary cell (SCell) can be served by a pico cell. A macro cell can be associated with a macro eNB, while a pico cell can be associated with a pico eNB.
图1示出了用于演进节点B(eNB)间载波聚合(CA)的示例部署情形。通常,EUTRAeNB间CA可以减少异构网络中切换(handover)的数量。如图1所示,用户设备(UE)可能在宏小区中行进。例如,在T1处,UE可以在宏小区的覆盖范围内。在T2处,UE可以添加微微小区1,因为UE在微微小区1的覆盖范围内。在T3处,UE可以移除微微小区1,因为UE不在微微小区1的覆盖范围内。在T4处,UE可以添加微微小区2,因为UE在微微小区2的覆盖范围内。在T5处,UE可以移除微微小区2,因为UE不在微微小区2的覆盖范围内。因此,在T5处,UE可以仅在宏小区的覆盖范围内。Figure 1 shows an example deployment scenario for carrier aggregation (CA) between evolved Node Bs (eNBs). In general, EUTRA inter-eNB CA can reduce the number of handovers in heterogeneous networks. As shown in Figure 1, a user equipment (UE) may be traveling in a macro cell. For example, at T1, the UE may be within the coverage of the macro cell. At T2, the UE may add pico cell 1 because the UE is within the coverage of pico cell 1. At T3, the UE may remove pico cell 1 because the UE is not within the coverage of pico cell 1. At T4, the UE may add pico cell 2 because the UE is within the coverage of pico cell 2. At T5, the UE may remove pico cell 2 because the UE is not within the coverage of pico cell 2. Therefore, at T5, the UE may be within the coverage of the macro cell only.
由于宏小区的覆盖范围大于微微小区的覆盖范围,因此UE可以切换到宏小区,或者如果UE仅连接到微微小区,则可以切换到另一个微微小区。另一方面,如果UE连接到宏小区,则不需要切换,但是无法提供到微微小区的卸荷(offloading)。因此,为了实现卸荷并且避免频繁切换,可以使用载波聚合,即由宏小区和微微小区两者服务UE。在一个示例中,主小区可以与宏小区关联,并且辅小区可以与微微小区关联。Because the coverage of a macro cell is greater than that of a pico cell, the UE can be handed over to the macro cell, or if the UE is only connected to a pico cell, it can be handed over to another pico cell. On the other hand, if the UE is connected to the macro cell, no handover is required, but offloading to the pico cell is not possible. Therefore, to achieve offloading and avoid frequent handovers, carrier aggregation can be used, that is, the UE is served by both the macro cell and the pico cell. In one example, the primary cell can be associated with the macro cell, and the secondary cell can be associated with the pico cell.
由于主小区负责移动性管理,因此UE不需要切换,只要UE正在宏小区内移动。如图1中的示例所示,当UE进入微微小区1或进入微微小区2时,可以不执行切换。另外,与微微小区关联的辅小区可以用于数据传输,并且UE可以利用到微微小区的卸荷。因此,借助辅小区的添加/移除而不是切换,可以支持从微微小区1到微微小区2的改变(如图1所示)。虽然在EUTRA eNB间CA中,宏小区和微微小区由不同的eNB服务并且经由X2接口连接,但是在3GPPLTE版本10CA中,所有的服务小区都由同一eNB服务。Since the primary cell is responsible for mobility management, the UE does not need to be handed over as long as the UE is moving within the macro cell. As shown in the example in Figure 1, when the UE enters pico cell 1 or enters pico cell 2, handover may not be performed. In addition, the secondary cell associated with the pico cell can be used for data transmission, and the UE can take advantage of the offloading to the pico cell. Therefore, the change from pico cell 1 to pico cell 2 can be supported by adding/removing secondary cells instead of handover (as shown in Figure 1). Although in EUTRA inter-eNB CA, the macro cell and pico cell are served by different eNBs and connected via the X2 interface, in 3GPP LTE version 10 CA, all serving cells are served by the same eNB.
图2示出了用于演进节点(eNB)间载波聚合(CA)的示例操作方案。在EUTRA eNB间CA中,宏小区和小型小区(例如,微微小区)由不同的eNB服务。宏小区可以被配置为主小区并且负责UE移动性管理。因此,宏小区可以与移动性管理实体(MME)连接,如图2中实线所示,而小型小区可以间接连接到MME。Figure 2 shows an example operational scenario for carrier aggregation (CA) between evolved Node Bs (eNBs). In EUTRA inter-eNB CA, macro cells and small cells (e.g., pico cells) are served by different eNBs. The macro cell can be configured as a primary cell and is responsible for UE mobility management. Therefore, the macro cell can be connected to a mobility management entity (MME), as shown by the solid line in Figure 2, while the small cell can be indirectly connected to the MME.
无线承载(RB)可以被用于在UE和E-UTRAN之间传送数据。RB可以包括信令无线承载(SRB)和数据无线承载(DRB)。SRB可以是携带无线资源控制(RRC)信令消息的无线承载。DRB可以是发送用户数据而不是控制平面信令的无线承载。在宏小区和MME之间可以支持控制平面中的SRB。用户平面中的DRB可以由两种方式支持。第一种方式(如图2中的虚线所示)在小型小区和服务网关(S-GW)之间使用新的S1承载。第二种方式(如图2中的点线所示)使用X2接口来将数据转发到S-GW。在第二方式中,在小型小区和S-GW之间不需要新的S1承载。Radio bearers (RBs) can be used to transmit data between the UE and the E-UTRAN. RBs can include signaling radio bearers (SRBs) and data radio bearers (DRBs). SRBs can be radio bearers that carry radio resource control (RRC) signaling messages. DRBs can be radio bearers that send user data instead of control plane signaling. SRBs in the control plane can be supported between the macro cell and the MME. DRBs in the user plane can be supported in two ways. The first way (shown by the dotted line in Figure 2) uses a new S1 bearer between the small cell and the serving gateway (S-GW). The second way (shown by the dotted line in Figure 2) uses the X2 interface to forward data to the S-GW. In the second way, no new S1 bearer is required between the small cell and the S-GW.
图3示出了用于演进节点B(eNB)间载波聚合(CA)的示例基于S1的协议。基于S1的协议可以包括分组数据汇聚协议(PDCP)层、无线链路控制(RLC)层以及媒体接入控制(MAC)层。DRB可以被配置在宏小区中或者小型小区中。如图3所示,SRB和DRB 1被配置在宏小区中,而DRB 2和3被配置在小型小区中。由于S1承载从小型小区直接连接到S-GW,因此用于DRB 2和3的物理层(PHY)、MAC、RLC和PDCP位于小型小区中。Figure 3 shows an example S1-based protocol for carrier aggregation (CA) between evolved Node Bs (eNBs). The S1-based protocol may include a packet data convergence protocol (PDCP) layer, a radio link control (RLC) layer, and a media access control (MAC) layer. DRBs may be configured in a macro cell or in a small cell. As shown in Figure 3, SRBs and DRB 1 are configured in a macro cell, while DRBs 2 and 3 are configured in a small cell. Since the S1 bearer is directly connected from the small cell to the S-GW, the physical layer (PHY), MAC, RLC, and PDCP for DRBs 2 and 3 are located in the small cell.
基于S1的协议可以包括PDCP层,该层是LTE用户平面层2协议栈的顶部子层。PDCP层处理控制平面中的无线资源控制(RRC)消息和用户平面中的因特网协议(IP)分组。取决于无线承载,PDCP层的主要功能是报头压缩、安全性(完整性保护和加密)以及在切换期间支持重排序和重传。S1-based protocols may include the PDCP layer, which is the top sublayer of the LTE user plane Layer 2 protocol stack. The PDCP layer handles Radio Resource Control (RRC) messages in the control plane and Internet Protocol (IP) packets in the user plane. Depending on the radio bearer, the main functions of the PDCP layer are header compression, security (integrity protection and ciphering), and support for reordering and retransmission during handover.
基于S1的协议可以包括RLC层,该层在LTE用户平面协议栈中位于PDCP层和MAC层之间。RLC层的主要功能是对上层分组进行分割和重组,以便将上层分组调整到适合经由无线接口传输的大小/尺寸。另外,RLC层执行重排序以补偿由于MAC层中的混合自动重请求(HARQ)操作而导致的无序(out-of-order)接收。S1-based protocols may include the RLC layer, which is located between the PDCP layer and the MAC layer in the LTE user plane protocol stack. The primary function of the RLC layer is to segment and reassemble upper layer packets to adjust them to a size suitable for transmission over the radio interface. Additionally, the RLC layer performs reordering to compensate for out-of-order reception caused by hybrid automatic re-request (HARQ) operations in the MAC layer.
基于S1的协议可以包括MAC层,该层为LTE协议栈中在物理层(PHY)之上并且在RLC层之下的协议层。MAC层通过传输信道连接到PHY并且通过逻辑信道连接到RLC层。MAC层执行逻辑信道和传输信道之间的数据传输调度和复用/解复用。The S1-based protocol may include the MAC layer, which is a protocol layer above the physical layer (PHY) and below the RLC layer in the LTE protocol stack. The MAC layer is connected to the PHY layer via transport channels and to the RLC layer via logical channels. The MAC layer performs data transmission scheduling and multiplexing/demultiplexing between logical channels and transport channels.
在LTE中,使用加密和完整性来保护从第三方接收的数据,或者检测由第三方进行的改变。通常,完整性是指接收机验证接收到的消息与发射机/发送者传递的消息相同,而加密是指发射机/发送者用接收机已知的安全密钥对数据进行加密。在接入层面(AS)层中,将加密和完整性应用于RRC信令数据(即,控制平面数据),而仅将加密应用于用户数据(即,用户平面数据或DRB数据)。RRC层负责处理AS安全密钥和AS安全程序。另外,PDCP层执行RRC信令数据的完整性和加密、以及用户平面数据的加密。In LTE, encryption and integrity are used to protect data received from third parties or to detect changes made by third parties. Generally, integrity refers to the receiver verifying that the received message is the same as the message delivered by the transmitter/sender, while encryption refers to the transmitter/sender encrypting the data using a security key known to the receiver. In the access stratum (AS) layer, encryption and integrity are applied to RRC signaling data (i.e., control plane data), while encryption is only applied to user data (i.e., user plane data or DRB data). The RRC layer is responsible for handling AS security keys and AS security procedures. In addition, the PDCP layer performs integrity and encryption of RRC signaling data, as well as encryption of user plane data.
不同的安全密钥被用于控制平面和数据用户平面中的加密和完整性。安全密钥可以包括KUPenc、KRRCint和KRRCenc。KUPenc是被用于借助特定加密算法对用户平面业务进行保护的安全密钥。KRRCint是被用于借助特定完整性算法对RRC业务进行保护的安全密钥。KRRCenc是被用于借助特定加密算法对RRC业务进行保护的安全密钥。Different security keys are used for encryption and integrity in the control plane and data user plane. Security keys may include KUPenc , KRRCint , and KRRCenc . KUPenc is a security key used to protect user plane traffic using a specific encryption algorithm. KRRCint is a security key used to protect RRC traffic using a specific integrity algorithm. KRRCenc is a security key used to protect RRC traffic using a specific encryption algorithm.
通常,安全密钥为KUPenc、KRRCint和KRRCenc。KUPenc可以从安全密钥KeNB生成。例如,KUPenc和KRRCenc可以在移动设备(ME)和eNB处从KeNB以及用于加密算法的标识符导出。KRRCint可以在ME和eNB处从KeNB以及用于完整性算法的标识符导出。另外,AS可以从KASME导出KeNB,KASME是在UE和网络两者中可用的常见秘密安全密钥。Typically, the security keys are KUPenc , KRRCint , and KRRCenc . KUPenc can be generated from the security key KeNB . For example, KUPenc and KRRCenc can be derived at the mobile equipment (ME) and eNB from KeNB and the identifier of the encryption algorithm. KRRCint can be derived at the ME and eNB from KeNB and the identifier of the integrity algorithm. Alternatively, the AS can derive KeNB from KASME , a common secret security key available to both the UE and the network.
在版本10CA中,主小区负责提供安全密钥(KeNB)。由于在版本10CA中,所有的服务小区都位于同一eNB中,并且为每个无线承载(RB)定义PDCP层,而不管服务小区的数量,因此可以使用单个安全密钥进行载波聚合。然而,在EUTRA eNB间CA中,每个eNB使用安全密钥来在PDCP层中执行数据的加密。如下面进一步详细解释地,安全密钥管理可以使eNB能够共享同一安全密钥,或者替换地,当在PDCP层中执行数据的加密时,使eNB能够使用不同的安全密钥。In Release 10 CA, the primary cell is responsible for providing the security key (K eNB ). Since in Release 10 CA, all serving cells are located in the same eNB and the PDCP layer is defined for each radio bearer (RB), regardless of the number of serving cells, a single security key can be used for carrier aggregation. However, in EUTRA inter-eNB CA, each eNB uses a security key to perform data encryption in the PDCP layer. As explained in further detail below, security key management can enable eNBs to share the same security key or, alternatively, enable eNBs to use different security keys when performing data encryption in the PDCP layer.
如果无线承载(RB)的PDCP层位于不同的eNB中,则可以在EUTRA eNB间CA中执行安全密钥管理。例如,宏eNB可以与宏小区关联,并且小型eNB(例如,微微eNB)可以与小型小区(例如,微微小区)关联。由于数据无线承载被配置在小型小区中,因此可以用加密密钥KUPenc执行用户平面加密。替换地,如果信令无线承载(SRB)被配置在小型小区中,则可以用加密密钥KRRCint和KRRCenc执行控制平面加密和完整性。If the PDCP layer of a radio bearer (RB) is located in different eNBs, security key management can be performed in EUTRA inter-eNB CA. For example, a macro eNB can be associated with a macro cell, and a small eNB (e.g., a pico eNB) can be associated with a small cell (e.g., a pico cell). Since the data radio bearer is configured in the small cell, user plane encryption can be performed with the encryption key KUPenc . Alternatively, if the signaling radio bearer (SRB) is configured in the small cell, control plane encryption and integrity can be performed with the encryption keys KRRCint and KRRCenc .
在一种配置中,小型eNB可以生成与在宏eNB处使用的相同的安全密钥。因此,将KeNB提供给小型eNB,用于生成与在宏eNB处使用的相同的安全密钥。可以将与小型eNB关联的小型小区添加为辅小区,并且可以为该小型小区建立新的专用无线承载。作为示例,可以使用宏小区和辅小区进行载波聚合。可以将额外的小型小区添加为额外的辅小区。因此,可以使用该宏小区和两个辅小区进行载波聚合。可以在与该宏小区和两个辅小区关联的三个eNB之间共享同一安全密钥。换句话说,与这两个辅小区关联的两个小型eNB可以生成与宏eNB所使用的相同的安全密钥。另外,可以为该额外的辅小区建立新的专用无线承载。In one configuration, the small eNB can generate the same security keys used at the macro eNB. Thus, K eNB is provided to the small eNB for use in generating the same security keys used at the macro eNB. A small cell associated with the small eNB can be added as a secondary cell, and a new dedicated radio bearer can be established for the small cell. As an example, carrier aggregation can be performed using a macro cell and a secondary cell. An additional small cell can be added as an additional secondary cell. Thus, carrier aggregation can be performed using the macro cell and two secondary cells. The same security keys can be shared among the three eNBs associated with the macro cell and the two secondary cells. In other words, the two small eNBs associated with the two secondary cells can generate the same security keys used by the macro eNB. Additionally, a new dedicated radio bearer can be established for the additional secondary cell.
当添加小型小区作为辅小区并且为该小型小区建立新的专用无线承载时,可以实现至少两种方法。在第一种方法中,MME可以将S1应用协议(S1AP)消息传递到小型eNB。S1AP消息可以在小型eNB和S-GW之间配置S1承载。S1AP消息可以从MME直接传递到小型eNB。替换地,宏eNB可以从MME接收S1AP消息,并且将该S1AP消息转发到小型eNB。MME可以在S1承载建立过程期间经由S1AP消息提供安全信息(KASME)。小型eNB可以在接入层面(AS)层中根据KASME确定安全密钥KeNB。When adding a small cell as a secondary cell and establishing a new dedicated radio bearer for the small cell, at least two methods can be implemented. In the first method, the MME can deliver an S1 Application Protocol (S1AP) message to the small eNB. The S1AP message can configure the S1 bearer between the small eNB and the S-GW. The S1AP message can be delivered directly from the MME to the small eNB. Alternatively, the macro eNB can receive the S1AP message from the MME and forward it to the small eNB. The MME can provide security information ( KASME ) via the S1AP message during the S1 bearer establishment process. The small eNB can determine the security key K eNB based on KASME in the access stratum (AS) layer.
在第二种方法中,宏eNB将X2应用协议(X2AP)消息传递到小型eNB。X2AP消息包含添加小型eNB作为辅小区的指令。X2AP消息可以经由X2接口传递。因此,宏eNB可以经由X2AP消息将KeNB(或KUPenc)提供给小型eNB,用于配置辅小区。因此,在小型eNB处使用的安全密钥KeNB是与在宏eNB处使用的相同的安全密钥。In the second method, the macro eNB transmits an X2 Application Protocol (X2AP) message to the small eNB. The X2AP message contains an instruction to add the small eNB as a secondary cell. The X2AP message can be transmitted via the X2 interface. Therefore, the macro eNB can provide K eNB (or K UPenc ) to the small eNB via the X2AP message for configuring the secondary cell. Therefore, the security key K eNB used at the small eNB is the same as that used at the macro eNB.
图4示出了在宏eNB和小型eNB之间的安全密钥信息的示例性传递。特别地,图4示出了宏eNB经由X2接口向小型eNB提供安全密钥KeNB。MME可以将初始的上下文设置请求消息传递到宏eNB。宏eNB可以将AS安全模式命令消息传递到宏eNB。在UE处,响应于接收到AS安全模式命令消息,可以启用安全性。UE可以将测量报告传递到宏eNB。宏eNB确定是否执行载波聚合。宏eNB可以将辅小区添加请求消息传递到小型eNB。辅小区添加请求消息可以是经由X2接口传递的X2AP消息。另外,辅小区添加请求消息可以向小型eNB提供安全密钥KeNB(或KUPenc)。因此,可以用安全密钥KeNB配置小型小区。小型eNB可以将辅小区添加请求确认(ACK)消息传递到宏eNB。宏eNB可以将无线资源控制(RRC)连接重配置消息传递到用户设备(UE)。RRC连接重配置消息指导UE添加该辅小区,使得UE能够从辅小区(或小型小区)和宏小区接收数据。Figure 4 illustrates an exemplary transfer of security key information between a macro eNB and a small eNB. Specifically, Figure 4 illustrates the macro eNB providing the security key K eNB to the small eNB via the X2 interface. The MME may transfer an initial context setup request message to the macro eNB. The macro eNB may transfer an AS security mode command message to the macro eNB. At the UE, security may be enabled in response to receiving the AS security mode command message. The UE may transfer a measurement report to the macro eNB. The macro eNB determines whether to perform carrier aggregation. The macro eNB may transfer a secondary cell add request message to the small eNB. The secondary cell add request message may be an X2AP message transferred via the X2 interface. Additionally, the secondary cell add request message may provide the security key K eNB (or K UPenc ) to the small eNB. Thus, the small cell may be configured with the security key K eNB . The small eNB may transfer a secondary cell add request acknowledgement (ACK) message to the macro eNB. The macro eNB may transfer a radio resource control (RRC) connection reconfiguration message to the user equipment (UE). The RRC connection reconfiguration message instructs the UE to add the secondary cell, so that the UE can receive data from the secondary cell (or small cell) and the macro cell.
在替换配置中,可以添加小型小区作为辅小区,并且可以将现有的专用无线承载重新配置为切换到小型小区。可以响应于小型eNB生成与在宏eNB处使用的相同的安全密钥而重新配置现有的专用无线承载。换句话说,发生从一个小型小区到另一个小型小区(即,新的小型小区)的路径切换。作为示例,可以使用宏小区和第一小型小区进行载波聚合。可以添加第二小型小区(例如,与第一小型小区不同的小型小区),使得结合第一小型小区和宏小区使用第二小型小区进行载波聚合。第二小型小区还可以被称为新的小型小区。因此,与第二小型小区关联的eNB可以生成与在与第一小型小区关联的eNB处使用的相同的安全密钥。In an alternative configuration, a small cell may be added as a secondary cell and an existing dedicated radio bearer may be reconfigured to be handed over to the small cell. The existing dedicated radio bearer may be reconfigured in response to the small eNB generating the same security keys as used at the macro eNB. In other words, a path handover occurs from one small cell to another small cell (i.e., a new small cell). As an example, a macro cell and a first small cell may be used for carrier aggregation. A second small cell (e.g., a small cell different from the first small cell) may be added such that the second small cell is used in conjunction with the first small cell and the macro cell for carrier aggregation. The second small cell may also be referred to as a new small cell. Thus, the eNB associated with the second small cell may generate the same security keys as used at the eNB associated with the first small cell.
当添加小型小区作为辅小区并且重新配置现有的专用无线承载以切换到小型小区时,可以描述至少两种方法。在第一种方法中,宏eNB可以将X2AP消息传递到新的小型eNB。该X2AP消息可以包含安全密钥KeNB(或KUPenc)。换句话说,新的小型eNB可以生成与在宏eNB处使用的相同的安全密钥。When adding a small cell as a secondary cell and reconfiguring an existing dedicated radio bearer to facilitate handover to the small cell, at least two methods can be described. In the first method, the macro eNB can pass an X2AP message to the new small eNB. This X2AP message can include the security key K eNB (or K UPenc ). In other words, the new small eNB can generate the same security key used by the macro eNB.
在第二种方法中,源小型eNB(例如,旧的小型eNB)可以将X2AP消息传递到新的小型eNB。X2AP消息可以包含安全密钥KeNB(或KUPenc)。换句话说,源小型eNB和新的小型eNB之间的接口可以被用于传递X2AP消息。因此,新的小型eNB可以生成与在源小型eNB处使用的相同的安全密钥。In the second method, the source small eNB (e.g., the old small eNB) can pass an X2AP message to the new small eNB. The X2AP message can include the security key K eNB (or K UPenc ). In other words, the interface between the source small eNB and the new small eNB can be used to pass the X2AP message. Therefore, the new small eNB can generate the same security keys used at the source small eNB.
如果使用同一安全密钥,则即使添加新的辅小区并且建立新的DRB,也可以对正在执行加密的UE产生最小影响,。另外,宏eNB(或小型eNB)可以不向MME上报安全信息的更新。If the same security key is used, even if a new secondary cell is added and a new DRB is established, minimal impact can be generated on the UE that is performing encryption. In addition, the macro eNB (or small eNB) may not report security information updates to the MME.
在一种配置中,宏eNB和小型eNB可以使用不同的安全密钥。例如,小型eNB可以生成与在宏eNB处使用的安全密钥不同的安全密钥。在另一个示例中,结合宏eNB用于载波聚合的多个小型eNB可以各自生成与其他小型eNB和宏eNB使用的安全密钥不同的安全密钥。In one configuration, a macro eNB and a small eNB can use different security keys. For example, a small eNB can generate security keys that are different from the security keys used at the macro eNB. In another example, multiple small eNBs used in conjunction with a macro eNB for carrier aggregation can each generate security keys that are different from the security keys used by other small eNBs and the macro eNB.
在一种配置中,宏eNB可以向小型eNB提供安全密钥KeNB*。安全密钥KeNB*可以成为小型小区的安全密钥KeNB。宏eNB可以使用安全密钥KeNB、物理小区标识和小型小区的EUTRA绝对无线频率信道号下行链路(EARFCN-DL)生成安全密钥KeNB*。通常,绝对无线频率信道号(ARFCN)可以定义一对射频(RF)信道频率,以便上行链路和下行链路使用。替换地,宏eNB可以使用下一跳(NH)参数生成安全密钥KeNB*,如在切换期间用于安全密钥处理那样。宏eNB可以向小型eNB提供安全密钥KeNB*,使得宏eNB和小型eNB使用不同的安全密钥。In one configuration, the macro eNB can provide the security key K eNB * to the small eNB. The security key K eNB * can become the security key K eNB of the small cell. The macro eNB can generate the security key K eNB * using the security key K eNB , the physical cell identity, and the EUTRA Absolute Radio Frequency Channel Number Downlink (EARFCN-DL) of the small cell. Typically, the Absolute Radio Frequency Channel Number (ARFCN) can define a pair of radio frequency (RF) channel frequencies for uplink and downlink use. Alternatively, the macro eNB can generate the security key K eNB * using the Next Hop (NH) parameter, as used for security key handling during handover. The macro eNB can provide the security key K eNB * to the small eNB so that the macro eNB and the small eNB use different security keys.
图4示出了在宏eNB和小型eNB之间的安全密钥信息(例如,KeNB*)的示例传递。宏eNB可以经由X2接口向小型eNB提供安全密钥KeNB*。宏eNB可以确定执行载波聚合。随后,宏eNB可以将辅小区添加请求消息传递到小型eNB。辅小区添加请求消息可以是经由X2接口传递的X2AP消息。另外,辅小区添加请求消息可以向小型eNB提供安全信息,例如安全密钥KeNB*。因此,小型eNB可以使用与宏eNB相比不同的安全密钥(例如,小型eNB可以使用安全密钥KeNB*,而宏eNB可以使用安全密钥KeNB)。FIG4 illustrates an example of transferring security key information (e.g., K eNB *) between a macro eNB and a small eNB. The macro eNB may provide the security key K eNB * to the small eNB via the X2 interface. The macro eNB may determine to perform carrier aggregation. Subsequently, the macro eNB may transfer a secondary cell add request message to the small eNB. The secondary cell add request message may be an X2AP message transferred via the X2 interface. In addition, the secondary cell add request message may provide security information, such as the security key K eNB *, to the small eNB. Thus, the small eNB may use different security keys than the macro eNB (e.g., the small eNB may use the security key K eNB *, while the macro eNB may use the security key K eNB ).
由于MME可以存储在eNB和UE中使用的安全密钥信息,因此宏eNB和/或小型eNB可以通知MME更新后的安全信息。例如,在从宏eNB接收到不同的安全密钥(例如,KeNB*)之后,小型eNB可以通知MME。替换地,在将不同的安全密钥(例如,KeNB*)发送到小型eNB之后,宏eNB可以通知MME。Since the MME can store security key information used by eNBs and UEs, the macro eNB and/or small eNB can notify the MME of updated security information. For example, after receiving a different security key (e.g., K eNB *) from the macro eNB, the small eNB can notify the MME. Alternatively, after sending a different security key (e.g., K eNB *) to the small eNB, the macro eNB can notify the MME.
如图4中所示,宏eNB可以将辅小区添加请求消息传递到小型eNB。作为响应,小型eNB可以将辅小区添加请求确认(ACK)消息传递到宏eNB。该辅小区添加ACK消息可以包括用于选定的安全算法的一个或多个安全算法标识符。安全算法标识符可以被用来利用安全密钥KeNB生成KUPenc、KRRCint等。换句话说,辅小区(例如,小型eNB)可以将安全算法标识符发送到主小区(例如,宏eNB)。宏eNB可以经由RRC连接重配置消息将安全信息(例如,安全算法标识符)传递到UE。另外,RRC连接重配置消息可以包含添加小型小区作为辅小区的指令。因此,UE可以通过载波聚合从宏eNB连同小型eNB接收用户数据。As shown in Figure 4, the macro eNB can transmit a secondary cell add request message to the small eNB. In response, the small eNB can transmit a secondary cell add request acknowledgement (ACK) message to the macro eNB. The secondary cell add ACK message may include one or more security algorithm identifiers for the selected security algorithm. The security algorithm identifier can be used to generate KUPenc , KRRCint , etc. using security keys KeNB . In other words, the secondary cell (e.g., the small eNB) can send the security algorithm identifier to the primary cell (e.g., the macro eNB). The macro eNB can transmit security information (e.g., the security algorithm identifier) to the UE via an RRC connection reconfiguration message. In addition, the RRC connection reconfiguration message may include an instruction to add the small cell as a secondary cell. As a result, the UE can receive user data from the macro eNB together with the small eNB through carrier aggregation.
在一种配置中,当在EUTRA eNB间CA中使用多个安全密钥时,UE可以存储和应用多个安全密钥。取决于无线承载的类型,UE可以应用不同的安全密钥。例如,KeNB,1是用于宏eNB的安全密钥,而KeNB,2是用于小型eNB的安全密钥。KeNB,2是与从宏eNB提供给小型eNB的KeNB*相同的安全密钥。因此,KeNB,1用于被配置在宏eNB中的信令无线承载(SRB)和数据无线承载(DRB)1。另外,KeNB,2用于被配置在小型小区中的DRB2和DRB3。In one configuration, when multiple security keys are used in EUTRA inter-eNB CA, the UE can store and apply multiple security keys. Depending on the type of radio bearer, the UE can apply different security keys. For example, K eNB,1 is the security key for the macro eNB, while K eNB,2 is the security key for the small eNB. K eNB,2 is the same security key as K eNB * provided from the macro eNB to the small eNB. Therefore, K eNB,1 is used for signaling radio bearer (SRB) and data radio bearer (DRB) 1 configured in the macro eNB. In addition, K eNB,2 is used for DRB2 and DRB3 configured in the small cell.
在一种配置中,可以在PDCP层中,在完整性和加密中使用COUNT值。COUNT值可以包括超帧号(HFN)和PDCP序列号(SN)。HFN是与PDCP序列号相关地递增的数字。HFN被包括在PDCP协议数据单元(PDU)计数器中,用于进行加密。In one configuration, a COUNT value may be used in integrity and ciphering at the PDCP layer. The COUNT value may include a hyperframe number (HFN) and a PDCP sequence number (SN). The HFN is a number that increments in relation to the PDCP sequence number. The HFN is included in a PDCP protocol data unit (PDU) counter for ciphering.
在一个示例中,当由于数据丢失而导致UE和eNB之间COUNT值不同步时,可能发生加密失败。因此,E-UTRAN可以使用计数器检查过程来最小化数据丢失,由此减小加密失败的可能性。E-UTRAN可以请求UE验证在每个DRB上发送/接收的数据的量。具体地,可以请求UE针对每个DRB检查COUNT的最高有效位是否与E-UTRAN指示的值对应(或匹配)。如果COUNT值的最高有效位对应于E-UTRAN指示的值,则COUNT值没有由于数据丢失而造成在UE和eNB之间不同步(即,同步)。In one example, a cipher failure may occur when the COUNT value is out of sync between the UE and the eNB due to data loss. Therefore, the E-UTRAN may use a counter check procedure to minimize data loss, thereby reducing the possibility of cipher failure. The E-UTRAN may request the UE to verify the amount of data sent/received on each DRB. Specifically, the UE may be requested to check whether the most significant bit of the COUNT corresponds to (or matches) the value indicated by the E-UTRAN for each DRB. If the most significant bit of the COUNT value corresponds to the value indicated by the E-UTRAN, the COUNT value is not out of sync (i.e., in sync) between the UE and the eNB due to data loss.
在计数器检查过程中,eNB(例如,小型eNB或宏eNB)可以将计数器检查消息传递到UE。在一个示例中,计数器检查消息可以被包括在传递到UE的无线资源连接(RRC)消息中。计数器检查消息可以包括配置的COUNT最高有效位(MSB)值。在接收到计数器检查消息之后,UE可以将配置的COUNT MSB值与实际的COUNT MSB值进行比较。如果UE确定配置的COUNTMSB值与实际的COUNT MSB值相同,则UE可以将计数器检查响应消息传递到eNB(例如,小型eNB或宏eNB)。计数器检查响应消息可以包括用于计数器检查过程中的请求的DRB的COUNT值。换句话说,UE可以验证在每个DRB上的数据量对应于为每个DRB配置的数据量。During the counter check procedure, the eNB (e.g., a small eNB or a macro eNB) may deliver a counter check message to the UE. In one example, the counter check message may be included in a radio resource connection (RRC) message delivered to the UE. The counter check message may include a configured COUNT most significant bit (MSB) value. After receiving the counter check message, the UE may compare the configured COUNT MSB value with the actual COUNT MSB value. If the UE determines that the configured COUNT MSB value is the same as the actual COUNT MSB value, the UE may deliver a counter check response message to the eNB (e.g., a small eNB or a macro eNB). The counter check response message may include the COUNT value for the requested DRB in the counter check procedure. In other words, the UE may verify that the amount of data on each DRB corresponds to the amount of data configured for each DRB.
取决于哪一个eNB触发计数器检查过程,可以有两种方法在EUTRAN eNB间CA中进行计数器检查过程。在第一种方法中,宏eNB触发计数器检查过程。宏eNB可以经由RRC消息将计数器检查消息传递到UE。宏eNB可以从UE接收计数器检查响应消息。计数器检查响应消息可以包括在小型小区中配置的DRB的COUNT值。宏eNB可以经由X2AP消息将COUNT值传递到小型eNB。替换地,针对在小型eNB中配置的DRB,宏eNB可以不请求计数器检查。There are two methods for performing the counter check procedure in EUTRAN inter-eNB CA, depending on which eNB triggers the counter check procedure. In the first method, the macro eNB triggers the counter check procedure. The macro eNB may deliver a counter check message to the UE via an RRC message. The macro eNB may receive a counter check response message from the UE. The counter check response message may include the COUNT value for the DRB configured in the small cell. The macro eNB may deliver the COUNT value to the small eNB via an X2AP message. Alternatively, the macro eNB may not request a counter check for DRBs configured in the small eNB.
在第二种方法中,小型eNB触发计数器检查过程。小型eNB可能期望针对在小型小区中配置的DRB检查COUNT值。因此,小型eNB可以经由X2AP消息将对COUNT值的请求传递到宏eNB。X2AP消息可以包括要被上报的DRB索引和实际的COUNT MSB值。宏eNB可以从小型eNB接收X2AP消息中的对COUNT值的请求。宏eNB可以经由RRC消息将计数器检查消息传递到UE。宏eNB可以从UE接收计数器检查响应消息。计数器检查响应消息可以包括在小型小区中配置的DRB的COUNT值。宏eNB可以经由X2AP消息将COUNT值传递到小eNB。In the second method, the small eNB triggers a counter check procedure. The small eNB may wish to check the COUNT value for the DRBs configured in the small cell. Therefore, the small eNB may communicate a request for the COUNT value to the macro eNB via an X2AP message. The X2AP message may include the DRB index to be reported and the actual COUNT MSB value. The macro eNB may receive the COUNT value request in the X2AP message from the small eNB. The macro eNB may communicate the counter check message to the UE via an RRC message. The macro eNB may receive a counter check response message from the UE. The counter check response message may include the COUNT value for the DRBs configured in the small cell. The macro eNB may communicate the COUNT value to the small eNB via an X2AP message.
如图5中的流程图所示,另一个示例提供了可操作以将安全密钥信息传递到第二节点的第一节点的计算机电路的功能500。该功能可以被实现为一种方法,或者该功能可以作为指令在机器上被执行,其中这些指令被包括在至少一个计算机可读介质或一个非暂时性机器可读存储介质上。计算机电路可以被配置为确定与第一节点关联的第一安全密钥,该第一安全密钥用于对在第一节点处传递的信息进行加密,如方框510中所示。计算机电路还可以被配置为在第一节点处识别第二节点,以接收第二安全密钥,该第二安全密钥将被用于对在第二节点处传递的信息进行加密,如方框520中所示。计算机电路还可以进一步被配置为将第二安全密钥提供给第二节点,用于演进通用陆地无线接入(EUTRA)演进节点(eNB)间载波聚合,该第二安全密钥不同于第一安全密钥,如方框530中所示。As shown in the flowchart of FIG5 , another example provides functionality 500 of computer circuitry of a first node operable to communicate security key information to a second node. The functionality can be implemented as a method, or the functionality can be executed on a machine as instructions, wherein the instructions are included on at least one computer-readable medium or a non-transitory machine-readable storage medium. The computer circuitry can be configured to determine a first security key associated with the first node, the first security key used to encrypt information communicated at the first node, as shown in block 510. The computer circuitry can also be configured to identify the second node at the first node to receive a second security key, the second security key to be used to encrypt information communicated at the second node, as shown in block 520. The computer circuitry can further be configured to provide the second node with a second security key for use in Evolved Universal Terrestrial Radio Access (EUTRA) inter-eNB carrier aggregation, the second security key being different from the first security key, as shown in block 530.
在一种配置中,计算机电路可以进一步被配置为在辅小区添加消息中将第二安全密钥提供给第二节点。在一个示例中,第一节点可以被配置为服务主小区,并且第二小区可以被配置为服务辅小区。另外,可以在第一节点处使用第一安全密钥、物理小区标识和辅小区的EUTRA绝对无线频率信道号(EARFCN)生成第二安全密钥。替换地,可以使用下一跳(NH)参数生成第二安全密钥。In one configuration, the computer circuitry may be further configured to provide the second security key to the second node in a secondary cell add message. In one example, the first node may be configured to serve a primary cell, and the second cell may be configured to serve a secondary cell. Additionally, the second security key may be generated at the first node using the first security key, a physical cell identifier, and the EUTRA Absolute Radio Frequency Channel Number (EARFCN) of the secondary cell. Alternatively, the second security key may be generated using a Next Hop (NH) parameter.
在一种配置中,计算机电路可以进一步被配置为在第一节点处从第二节点接收安全密钥更新信息,其中安全密钥更新信息包括安全算法标识符。另外,计算机电路可以进一步被配置为将第二安全密钥提供给用户设备(UE),其中UE分别使用第一安全密钥和第二安全密钥经由EUTRA eNB间载波聚合与第一节点和第二节点通信。In one configuration, the computer circuitry may be further configured to receive, at the first node, security key update information from the second node, wherein the security key update information includes a security algorithm identifier. Additionally, the computer circuitry may be further configured to provide the second security key to a user equipment (UE), wherein the UE communicates with the first node and the second node via EUTRA inter-eNB carrier aggregation using the first security key and the second security key, respectively.
在一个示例中,UE包括天线、触摸敏感显示屏、扬声器、麦克风、图形处理器、应用处理器、内部存储器或非易失性存储器端口。另外,从由宏节点、基站(BS)、节点B(NB)、演进节点B(eNB)、家庭eNB、微eNB、基带单元(BBU)、远程无线电头(RRH)、毫微微节点、低功率节点、远程无线设备(RRE)或远程无线单元(RRU)组成的群组中选择第一节点和第二节点。In one example, the UE includes an antenna, a touch-sensitive display, a speaker, a microphone, a graphics processor, an application processor, and an internal memory or a non-volatile memory port. Additionally, the first node and the second node are selected from the group consisting of a macro node, a base station (BS), a node B (NB), an evolved node B (eNB), a home eNB, a micro eNB, a baseband unit (BBU), a remote radio head (RRH), a femto node, a low power node, a remote radio equipment (RRE), or a remote radio unit (RRU).
如图6中的流程图所示,另一个示例提供一种从宏eNB传递安全密钥信息的方法600。该方法可以作为指令在机器上执行,其中这些指令被包括在至少一个计算机可读介质或一个非暂时性机器可读存储介质。该方法包括以下操作:确定与宏演进节点B(eNB)关联的安全密钥信息,安全密钥信息用于对在第一eNB处传递的信息进行加密,如方框610中所示。该方法可以包括,在宏eNB处识别小型eNB,以生成与宏eNB关联的安全密钥信息,用于对在第二eNB处传递的信息进行加密,如在方框620中所示。该方法的下一个操作可以包括,从宏eNB将安全密钥信息传递到小型eNB,用于演进通用陆地无线接入(EUTRA)演进节点B(eNB)间载波聚合,如方框630中所示。As shown in the flowchart of FIG6 , another example provides a method 600 for transferring security key information from a macro eNB. The method may be executed as instructions on a machine, wherein the instructions are included in at least one computer-readable medium or a non-transitory machine-readable storage medium. The method includes the following operations: determining security key information associated with a macro evolved Node B (eNB), the security key information used to encrypt information transferred at a first eNB, as shown in block 610. The method may include identifying a small eNB at the macro eNB to generate security key information associated with the macro eNB, used to encrypt information transferred at a second eNB, as shown in block 620. The next operation of the method may include transferring the security key information from the macro eNB to the small eNB for use in Evolved Universal Terrestrial Radio Access (EUTRA) inter-eNB carrier aggregation, as shown in block 630.
在一个示例中,宏eNB可以被配置为服务主小区,而小型eNB可以被配置为服务辅小区。另外,该方法可以包括,经由X2接口从宏eNB将安全密钥信息传递到小型eNB。In one example, the macro eNB may be configured to serve a primary cell, and the small eNB may be configured to serve a secondary cell. Additionally, the method may include transferring security key information from the macro eNB to the small eNB via an X2 interface.
在一种配置中,该方法可以包括,经由X2接口在辅小区添加请求X2应用协议(X2AP)消息中将安全密钥信息传递到小型eNB。另外,该方法可以包括,从小型eNB将安全密钥信息传递到与UE关联的新的小型eNB,用于EUTRA eNB间载波聚合。在一个示例中,该方法可以包括:在宏eNB处从移动性管理实体(MME)接收S1应用协议(S1AP)消息,该S1AP包括与宏eNB关联的安全密钥信息;以及经由S1AP消息从宏eNB向小型eNB传递安全密钥信息,该小型eNB使用该安全密钥信息对在小型eNB处传递的信息进行加密。In one configuration, the method may include delivering security key information to the small eNB in a secondary cell add request X2 application protocol (X2AP) message via an X2 interface. Additionally, the method may include delivering the security key information from the small eNB to a new small eNB associated with the UE for EUTRA inter-eNB carrier aggregation. In one example, the method may include: receiving an S1 application protocol (S1AP) message from a mobility management entity (MME) at a macro eNB, the S1AP including security key information associated with the macro eNB; and delivering the security key information from the macro eNB to the small eNB via the S1AP message, the small eNB using the security key information to encrypt information delivered at the small eNB.
在一种配置中,该方法包括,从宏eNB将安全密钥信息传递到用户设备(UE),该UE使用安全密钥信息以经由EUTRA eNB间载波聚合分别使用第一安全密钥和第二安全密钥与宏eNB和小型eNB进行通信。In one configuration, the method includes communicating security key information from a macro eNB to a user equipment (UE), the UE using the security key information to communicate with the macro eNB and a small eNB via EUTRA inter-eNB carrier aggregation using first and second security keys, respectively.
如图7中的流程图所示,另一个示例提供了可操作以传递完整性和加密信息的第一无线节点的计算机电路的功能700。该功能可以被实现为一种方法,或者该功能可以作为指令在机器上被执行,其中这些指令被包括在至少一个计算机可读介质或一个非暂时性机器可读存储介质上。该计算机电路可以被配置为向用户设备(UE)传递计数器检查过程请求,以验证在UE处每个数据无线承载(DRB)上传递的数据量,以便进行演进通用陆地无线接入(EUTRA)演进节点(eNB)间载波聚合,如方框710中所示。该计算机电路还被配置为从UE接收计数器检查消息,该计数器检查消息包括用于与第一无线节点关联的第一DRB以及与第二无线节点关联的第二DRB的计数值,该计数值指示每个DRB传递的数据量,如方框720中所示。该计算机电路可以进一步被配置为识别第二无线节点,以从第一无线节点接收计数值,如方框730中所示。另外,计算机电路可以被配置为使用X2应用协议(X2AP)消息向第二无线节点传递第二DRB的计数值,如方框740中所示。As shown in the flowchart of FIG7 , another example provides functionality 700 of a computer circuit of a first wireless node operable to communicate integrity and encryption information. The functionality may be implemented as a method, or the functionality may be executed on a machine as instructions, wherein the instructions are included on at least one computer-readable medium or a non-transitory machine-readable storage medium. The computer circuit may be configured to communicate a counter check procedure request to a user equipment (UE) to verify the amount of data communicated on each data radio bearer (DRB) at the UE for Evolved Universal Terrestrial Radio Access (EUTRA) inter-eNB carrier aggregation, as shown in block 710. The computer circuit may also be configured to receive a counter check message from the UE, the counter check message including a count value for a first DRB associated with the first wireless node and a second DRB associated with a second wireless node, the count value indicating the amount of data communicated per DRB, as shown in block 720. The computer circuit may further be configured to identify the second wireless node to receive the count value from the first wireless node, as shown in block 730. Additionally, the computer circuitry may be configured to communicate the count value of the second DRB to the second wireless node using an X2 Application Protocol (X2AP) message, as shown in block 740 .
在一个示例中,计数值包括超帧号(HFN)和分组数据汇聚协议(PDCP)序列号。在一种配置中,该计算机电路可以被配置为:从第二无线节点接收与第二DRB关联的计数值的请求;向UE传递无线资源连接(RRC)消息,该消息请求UE向第一无线节点传递计数值;从UE接收计数检查消息,该计数检查消息包括计数值;以及使用X2AP消息向第二无线节点传递计数值。另外,第一无线节点可以是宏节点,而第二无线节点可以是小型节点。In one example, the count value includes a hyperframe number (HFN) and a packet data convergence protocol (PDCP) sequence number. In one configuration, the computer circuitry may be configured to: receive a request for a count value associated with a second DRB from a second wireless node; transmit a radio resource connection (RRC) message to a UE requesting the UE to transmit the count value to the first wireless node; receive a count check message from the UE, the count check message including the count value; and transmit the count value to the second wireless node using an X2AP message. Additionally, the first wireless node may be a macro node, and the second wireless node may be a small node.
图8提供了无线设备的示例图示,无线设备是例如用户设备(UE)、移动站(MS)、移动无线设备、移动通信设备、写字板、手机或其他类型的无线设备。无线设备可以包括一个或多个天线,天线被配置为与节点、宏节点、低功率节点(LPN)或发射站通信,发射站为例如基站(BS)、演进节点B(eNB)、基带单元(BBU)、远程无线电头(RRH)、远程无线设备(RRE)、中继站(RS)、无线电设备或其他类型的无线广域网(WWAN)接入点。无线设备可以被配置为使用至少一种无线通信标准进行通信,包括3GPP LTE、WiMAX、高速分组接入(HSPA)、蓝牙和WiFi。无线设备可以针对每个通信标准使用单独的天线进行通信,或者针对多个无线通信标准使用共享的天线进行通信。无线设备可以在无线局域网(WLAN)、无线个域网(WPAN)和/或WWAN中通信。Figure 8 provides an example illustration of a wireless device, such as a user equipment (UE), a mobile station (MS), a mobile wireless device, a mobile communication device, a tablet, a mobile phone, or other type of wireless device. The wireless device may include one or more antennas configured to communicate with a node, a macro node, a low power node (LPN), or a transmitting station, such as a base station (BS), an evolved Node B (eNB), a baseband unit (BBU), a remote radio head (RRH), a remote radio equipment (RRE), a relay station (RS), a radio device, or other type of wireless wide area network (WWAN) access point. The wireless device may be configured to communicate using at least one wireless communication standard, including 3GPP LTE, WiMAX, High Speed Packet Access (HSPA), Bluetooth, and WiFi. The wireless device may communicate using a separate antenna for each communication standard or a shared antenna for multiple wireless communication standards. The wireless device may communicate in a wireless local area network (WLAN), a wireless personal area network (WPAN), and/or a WWAN.
图8还提供了可以用于自无线设备进行音频输入和输出的麦克风和一个或多个扬声器的图示。显示屏可以是液晶显示(LCD)屏或其他类型的显示屏,例如有机发光二极管(OLED)显示器。显示屏可以被配置为触摸屏。触摸屏可以使用电容式、电阻式或另一种类型的触摸屏技术。应用处理器和图形处理器可以耦合到内部存储器,以提供处理和显示能力。非易失性存储器端口还可以被用来向用户提供数据输入/输出选项。非易失性存储器端口还可以用来扩展无线设备的存储能力。可以将键盘与无线设备集成或者无线连接到无线设备,以提供额外的用户输入。还可以使用触摸屏提供虚拟键盘。FIG8 also provides an illustration of a microphone and one or more speakers that can be used for audio input and output from the wireless device. The display screen can be a liquid crystal display (LCD) screen or other type of display screen, such as an organic light emitting diode (OLED) display. The display screen can be configured as a touch screen. The touch screen can use capacitive, resistive, or another type of touch screen technology. The application processor and graphics processor can be coupled to the internal memory to provide processing and display capabilities. The non-volatile memory port can also be used to provide data input/output options to the user. The non-volatile memory port can also be used to expand the storage capacity of the wireless device. A keyboard can be integrated with the wireless device or wirelessly connected to the wireless device to provide additional user input. A virtual keyboard can also be provided using the touch screen.
各种技术或者它们的某些方面或部分可以采用体现在有形介质中的程序代码(即,指令)的形式,有形介质是例如软盘、CD-ROM、硬盘、非暂时性计算机可读存储介质或任何其他计算机可读存储介质,其中当程序代码被加载到机器(例如,计算机)中并且由机器执行时,该机器成为实施各种技术的装置。电路可以包括硬件、固件、程序代码、可执行代码、计算机指令和/或软件。非暂时性计算机可读存储介质可以是不包括信号的计算机可读存储介质。在可编程计算机上执行程序代码的情况下,计算设备可以包括处理器、由该处理器可读的存储介质(包括易失性存储器和非易失性存储器和/或存储元件)、至少一个输入设备和至少一个输出设备。易失性存储器和非易失性存储器和/或存储元件可以是RAM、EPROM、闪存驱动器、光驱、磁硬盘驱动器、固态驱动器或其他用于存储电子数据的介质。节点和无线设备还可以包括收发机模块、计数器模块、处理模块、和/或时钟模块或计时器模块。可以实现或利用在此描述的各种技术的一个或多个程序可以使用应用编程接口(API)、可重用控件等。这类程序可以以高层次过程编程语言或面向对象编程语言实现,以与计算机系统通信。然而,如果希望,可以以汇编语言或机器语言实现(这些)程序。在任何情况下,语言可以是编译语言或解释语言,并且与硬件实施方式组合。The various techniques or certain aspects or portions thereof may take the form of program code (i.e., instructions) embodied in a tangible medium, such as a floppy disk, CD-ROM, hard disk, non-transitory computer-readable storage medium, or any other computer-readable storage medium, wherein when the program code is loaded into a machine (e.g., a computer) and executed by the machine, the machine becomes an apparatus for implementing the various techniques. Circuitry may include hardware, firmware, program code, executable code, computer instructions, and/or software. Non-transitory computer-readable storage media may be computer-readable storage media that does not include signals. In the case of program code execution on a programmable computer, the computing device may include a processor, a storage medium readable by the processor (including volatile memory and non-volatile memory and/or storage elements), at least one input device, and at least one output device. The volatile memory and non-volatile memory and/or storage elements may be RAM, EPROM, a flash drive, an optical drive, a magnetic hard drive, a solid-state drive, or other medium for storing electronic data. Nodes and wireless devices may also include a transceiver module, a counter module, a processing module, and/or a clock module or a timer module. One or more programs that can implement or utilize the various techniques described herein can use application programming interfaces (APIs), reusable controls, and the like. Such programs can be implemented in high-level procedural programming languages or object-oriented programming languages to communicate with a computer system. However, if desired, the programs can be implemented in assembly language or machine language. In any case, the language can be a compiled language or an interpreted language and combined with a hardware implementation.
应当理解,在本说明书中描述的许多功能单元已经被标记为模块,以便更特别地强调它们实施方式的独立性。例如,模块可以被实现为硬件电路(包括定制VLSI电路或门阵列)、现成的半导体(例如,逻辑芯片、晶体光)或其他分立部件。模块还可以被实现在可编程硬件器件中,例如现场可编程门阵列、可编程阵列逻辑、可编程逻辑器件等。It should be understood that many of the functional units described in this specification have been labeled as modules in order to more particularly emphasize the independence of their implementation. For example, modules can be implemented as hardware circuits (including custom VLSI circuits or gate arrays), off-the-shelf semiconductors (e.g., logic chips, crystal optics), or other discrete components. Modules can also be implemented in programmable hardware devices, such as field programmable gate arrays, programmable array logic, programmable logic devices, etc.
模块还可以以软件方式实现,以便由各种类型的处理器执行。例如,可执行代码的所识别的模块可以包括计算机指令的一个或多个物理块或逻辑块,这些物理块或逻辑块例如可以被组织为对象、过程或函数。然而,所识别的模块的可执行文件不需要在物理上位于一起,而是可以包括存储在不同位置的相异的指令,当这些指令在逻辑上结合在一起时,构成该模块并且实现针对该模块所述的目的。Modules can also be implemented in software so that they can be executed by various types of processors. For example, an identified module of executable code can include one or more physical or logical blocks of computer instructions, which can be organized into objects, procedures, or functions, for example. However, the executable files of the identified modules need not be physically located together, but can include distinct instructions stored in different locations that, when logically combined together, constitute the module and achieve the purpose described for the module.
实际上,可执行代码的模块可以是单个指令或许多指令,并且甚至可以分布在若干不同的代码段上、分布在不同的程序之间、以及分布在若干存储设备上。类似地,操作数据在此可以被识别和示为在模块内,并且可以以任何合适的形式体现且被组织在任何合适的类型的数据结构内。操作数据可以被收集为单个数据集合,或者可以分布在不同的位置上(包括在不同的存储设备上),并且可以至少部分地仅作为电子信号存在于系统或网络上。模块可以是无源的或有源的,包括可操作以执行期望功能的代理。In fact, the module of executable code can be a single instruction or many instructions, and can even be distributed on several different code segments, distributed between different programs, and distributed on several storage devices. Similarly, operational data can be identified and shown as within the module here, and can be embodied in any suitable form and organized in any suitable type of data structure. Operational data can be collected as a single data set, or can be distributed on different locations (including on different storage devices), and can be at least partially present only as electronic signals on a system or network. Modules can be passive or active, including agents that can be operated to perform desired functions.
在整个说明书中提到“(一个)示例”是指,与该示例相关描述的特定的特征、结构或特性被包括在本发明的至少一个实施例中。因此,在整个说明书中的不同地方出现短语“在(一个)示例中”未必都是指代同一实施例。References throughout this specification to "(one) example" mean that a particular feature, structure, or characteristic described in connection with that example is included in at least one embodiment of the present invention. Thus, the appearances of the phrase "in (one) example" in various places throughout this specification are not necessarily all referring to the same embodiment.
如在此使用的,为了方便,多个项目、结构元件、成分元件和/或材料可以以公共列表呈现。然而,这些列表应当被解释为该列表中的每个成员单独地被识别为分开且唯一的成员。因此,在没有相反的指示下,这种列表的各成员不应当仅基于它们常见的表示而被解释为同一列表中的任何其他成员的事实上等同体。另外,本发明的各种实施例和示例在此可以连同它们的各种部件的替换物一起被引用。应当理解,这些实施例、示例和替换物不应当被解释为彼此的事实上等同体,而是应当被解释为本发明的分开且自主的表现。As used herein, for convenience, multiple projects, structural elements, component elements and/or materials can be presented in a public list. However, these lists should be interpreted as each member in the list is individually identified as a separate and unique member. Therefore, in the absence of contrary instructions, each member of such a list should not be interpreted as the de facto equivalent of any other member in the same list based only on their common representation. In addition, various embodiments of the present invention and examples can be cited together with the alternatives of their various parts at this. It should be understood that these embodiments, examples and alternatives should not be interpreted as de facto equivalents to each other, but should be interpreted as separate and autonomous performance of the present invention.
此外,所描述的特征、结构或特性可以以任何合适的方式在一个或多个实施例中被组合。在以下描述中,提供了许多具体的细节,例如布局示例、距离示例、网络示例等,以便提供对本发明的实施例的全面理解。然而,本领域技术人员将意识到,可以在没有一个或多个这些具体细节的情况下实施本发明,或者可以用其他方法、部件、布局等实施本发明。在其他情况下,没有详细示出和描述公知的结构、材料或操作,以避免掩盖本发明的各方面。In addition, described features, structures or characteristics may be combined in one or more embodiments in any suitable manner. In the following description, many specific details are provided, such as layout examples, distance examples, network examples, etc., to provide a comprehensive understanding of embodiments of the present invention. However, those skilled in the art will appreciate that the present invention may be implemented without one or more of these specific details, or may be implemented with other methods, parts, layouts, etc. In other cases, known structures, materials, or operations are not shown and described in detail to avoid covering up aspects of the present invention.
虽然前述示例示出了本发明在一个或更多特定应用中的原理,但是对本领域技术人员显而易见的是,可以在实施方式的形式、使用和细节上进行许多修改,而无需付出创造性劳动,并且不偏离本发明的原理和概念。因此,除了由下面陈述的权利要求限制之外,无意限制本发明。Although the foregoing examples illustrate the principles of the present invention in one or more specific applications, it will be apparent to those skilled in the art that many modifications may be made in the form, use, and details of the embodiments without inventive effort and without departing from the principles and concepts of the present invention. Therefore, it is not intended to limit the present invention except as set forth in the claims below.
Claims (16)
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US61/753,914 | 2013-01-17 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| HK1263021A1 HK1263021A1 (en) | 2020-01-24 |
| HK1263021B true HK1263021B (en) | 2021-09-17 |
Family
ID=
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10492214B2 (en) | Communication of security key information | |
| US10567957B1 (en) | Dual connectivity mode of operation of a user equipment in a wireless communication network | |
| CN104285471B (en) | Perform Handoffs in Heterogeneous Wireless Networks | |
| CN110062429B (en) | Operating with multiple schedulers in a wireless system | |
| KR102078866B1 (en) | SCHEME FOR Security key management for PDCP distribution in dual connectivity | |
| CN114946219B (en) | Radio network node, user equipment (UE) and method performed therein | |
| TWI540872B (en) | Multiple Radio Link Control (RLC) group | |
| CN107079361B (en) | Handover to integrated ENode B/AP with context transfer | |
| CN110546992A (en) | System and method for handover in dual connectivity communication system | |
| US10863569B2 (en) | RRC connection re-establishment method for data transmission | |
| CN108307695A (en) | Network node, wireless device and method therein for manipulating the radio access network in cordless communication network (RAN) contextual information | |
| CN107079516B (en) | bearer release | |
| CN108886726A (en) | The methods, devices and systems of mobile management | |
| US20220377541A1 (en) | Key Management Method and Communication Apparatus | |
| JP2018174597A (en) | Bearer management device, method and communication system | |
| HK1263021B (en) | System and method for communicating security key information | |
| HK1263021A1 (en) | System and method for communicating security key information | |
| HK1217073B (en) | Method and system for communicating security key information | |
| WO2014111049A1 (en) | Cell optimization method and device | |
| HK1248441B (en) | Handover using group evolved packet system (eps) bearers | |
| HK1242889A1 (en) | Handover to an integrated enode b/ap with context transfer | |
| HK1222970B (en) | Mitigation of traffic congestion in dual connectivity systems |