WO2012088914A1 - 连接处理方法及系统 - Google Patents

连接处理方法及系统 Download PDF

Info

Publication number
WO2012088914A1
WO2012088914A1 PCT/CN2011/079113 CN2011079113W WO2012088914A1 WO 2012088914 A1 WO2012088914 A1 WO 2012088914A1 CN 2011079113 W CN2011079113 W CN 2011079113W WO 2012088914 A1 WO2012088914 A1 WO 2012088914A1
Authority
WO
WIPO (PCT)
Prior art keywords
secure connection
mme
connection
segw
secure
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2011/079113
Other languages
English (en)
French (fr)
Inventor
朱李
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to US13/977,391 priority Critical patent/US20130326586A1/en
Priority to EP11854315.6A priority patent/EP2661143A4/en
Publication of WO2012088914A1 publication Critical patent/WO2012088914A1/zh
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/037Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/164Implementing security features at a particular protocol layer at the network layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/166Implementing security features at a particular protocol layer at the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/12Setup of transport tunnels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • H04W84/042Public Land Mobile systems, e.g. cellular systems
    • H04W84/045Public Land Mobile systems, e.g. cellular systems using private Base Stations, e.g. femto Base Stations, home Node B
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W92/00Interfaces specially adapted for wireless communication networks
    • H04W92/04Interfaces between hierarchically different network devices

Definitions

  • the present invention relates to the field of communications, and in particular to a connection processing method and system.
  • a home base station (Home NodeB, abbreviated as ⁇ ) is used for the third generation (3rd) in the home.
  • the mobile phone provides 3G wireless coverage. It is connected to existing residential broadband services. It includes the functionality of a standard Node B (an element of a 3G macro radio access network) and a standard radio network controller (Radio Network Controller, RNC for short) for radio resource management.
  • RNC Radio Network Controller
  • 1 is a schematic diagram of a structure of an HNB system according to the related art. As shown in FIG. 1, an interface between a 3rd Generation Partnership Project (3GPP) user equipment and an HNB is wirelessly connected in a global mobile communication system. In the Universal Mobile Telecommunication System Radio Access Network (UTRAN), it is a backhaul and compatible air interface. The HNB accesses the carrier's core network through a Security Gateway (SecG).
  • 3GPP 3rd Generation Partnership Project
  • UTRAN Universal Mobile Telecommunication System Radio Access Network
  • UTRAN Universal Mobile Telecommunication System Radio Access Network
  • the HNB accesses the carrier's core network through a Security Gateway (SecG).
  • SecG Security Gateway
  • HNB Gateway abbreviated as HNB GW
  • SeGW performs mutual authentication on behalf of the carrier's core network and HNB.
  • the home base station gateway (HNB Gateway, abbreviated as HNB GW) and the SeGW are logically separated entities in the core network of the operator, and are used for the user equipment of the Closed Subscriber Group (CSG). , referred to as UE) access control.
  • H(e)MS requires secure communication.
  • Fig. 2 is a schematic diagram showing the structure of a H(e) B system according to the related art.
  • H(e) B Home (Evolved) Node
  • H(e) B Home (Evolved) Node B
  • the difference between HNB and HNB is that it is connected to 3GPP user equipment and evolved Evolved UTRAN (E-UTRAN). Air interface.
  • the H(e)NB gateway (Home eNodeB Gateway, abbreviated as H(e)NB GW) is an optional deployment. If the H(e)NB GW is deployed, the SeGW and the H(e)B GW can be combined; if they are not combined, the interface between the SeGW and the H(e)NB GW can be performed with NDS/IP protection.
  • H(e) B includes HNB and H(e) B, which is a general term for HNB and H(e) B.
  • 3GPP TR 33.820 defines 27 threats. These 27 threats are grouped into 7 categories. They are: Hazard to H(e)B qualification, physical attack on H(e)B, attack on H(e)B construction, attack on H(e)B protocol, on core network Attacks (including H(e)B-based attacks), attacks on users' data and identity privacy, and attacks on wireless resources and management.
  • 3 is a schematic diagram of an EUTRAN architecture including an H(e)B GW according to the related art, as shown in FIG.
  • the connection processing method according to the present invention comprises: establishing a secure connection between the MME and/or the S-GW and the H(e) B; the connection between the MME and/or the S-GW and the H(e)NB is protected by a secure connection .
  • the MME and/or S-GW establishes a secure connection with H(e)B, including: MME and/or S-GW and security gateway
  • the SeGW establishes a secure connection; the SeGW establishes a secure connection with the H(e)NB.
  • the MME and/or the S-GW establishes a secure connection with the SeGW, including: the MME and/or the S-GW establishes a secure connection with the home (evolved) base station gateway H(e)B GW; and the H(e)B GW establishes a secure connection with the SeGW.
  • the secure connection established by the MME and/or the S-GW with the H(e)NB GW includes at least one of the following: an IPsec tunnel, a TLS tunnel, and a DS/IP.
  • the secure connection established between the B GW and the SeGW includes one of the following: DS/IP, H(e) B GW and SeGW.
  • the method further includes: establishing a secure connection between the MME and the P/or S-GW and the H(e)NB GW; e) The NB GW establishes a secure connection with the SeGW.
  • the secure connection established by the MME and/or the S-GW and the SeGW without the H(e)B GW includes at least one of the following: an IPsec tunnel, a TLS tunnel, and a DS/IP.
  • the SeGW establishes a secure connection with the H(e)B
  • the foregoing method further includes: the SeGW and the H(e)NB perform authentication.
  • a secure connection includes at least one of the following: data source authentication, confidentiality protection, integrity protection, and anti-replay protection.
  • the connection processing system comprises an MME and/or an S-GW and an H(e) B, wherein the MME and/or the S-GW comprise: a first setup module, configured to establish a secure connection with H(e)B a first connection processing module, configured to protect a connection between the MME and/or the S-GW and the H(e)B through a secure connection; H(e)B includes a second setup module, configured to be associated with the MME and/or Or the S-GW establishes a secure connection, and the second connection processing module is configured to protect the connection between the MME and/or the S-GW and the H(e)B through a secure connection.
  • the present invention establishes a secure connection with the MME and/or the S-GW through H(e)B, and uses the secure connection for data transmission, and solves the related art between H(e)B and the MME and/or the S-GW.
  • the S1 port is not protected, which increases the reliability and security of the H(e)B system data transmission mechanism, solves the security flaws of the H(e)B system, and improves the H(e)B system. Security performance.
  • FIG. 1 is a schematic diagram of a structure of an HNB system according to the related art
  • FIG. 2 is a schematic diagram of a structure of an H(e)B system according to the related art
  • FIG. 3 is a diagram including a H(e)B GW according to the related art. Schematic diagram of an EUTRAN architecture
  • FIG. 4 is a flowchart of a connection processing method according to an embodiment of the present invention
  • 5 is a flow chart of a connection processing method according to a preferred embodiment of the present invention
  • FIG. 6 is an interaction flow chart of a connection processing method according to a preferred embodiment of the present invention
  • FIG. 7 is a connection processing method according to a preferred embodiment 2 of the present invention
  • Figure 8 is an interaction flow chart of a connection processing method according to a preferred embodiment 3 of the present invention
  • Figure 9 is an interaction flow chart of a connection processing method according to a preferred embodiment 4 of the present invention
  • Figure 10 is a preferred embodiment of the present invention.
  • FIG. 5 is an interaction flow chart of a connection processing method according to a preferred embodiment 6 of the present invention
  • Figure 12 is a block diagram showing the structure of a connection processing system according to an embodiment of the present invention.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS It should be noted that the embodiments in the present application and the features in the embodiments may be combined with each other without conflict. The invention will be described in detail below with reference to the drawings in conjunction with the embodiments.
  • the embodiment of the invention provides a connection processing method.
  • FIG. 4 is a flowchart of a connection processing method according to an embodiment of the present invention. As shown in FIG. 4, the following steps are included to step S404.
  • Step S402 the MME and/or the S-GW establish a secure connection with the H(e)NB.
  • step S404 the connection between the MME and/or the S-GW and the H(e)NB is protected by a secure connection.
  • the S1 port between H(e)B and MME and P/ or S-GW is not protected, so the reliability and security of the H(e)B data transmission mechanism cannot be guaranteed.
  • a secure connection is established between the MME and/or the S-GW through the H(e)B, and the connection is processed by using the secure connection, thereby increasing the reliability and security of the data transmission mechanism of the H(e)B system.
  • the MME and/or the S-GW establish a secure connection with the H(e)B, including: the MME and/or the S-GW establish a secure connection with the SeGW; and the SeGW establishes a secure connection with the H(e)NB.
  • establishing a secure connection between the MME and/or the S-GW and the SeGW comprises: establishing, by the MME and/or the S-GW, a secure connection with the home (evolved) base station gateway H(e)NB GW; establishing the H(e)B GW and the SeGW Secure connection.
  • the secure connection established by the MME and/or the S-GW with the H(e)B GW includes at least one of the following IPsec tunnel, TLS tunnel, DS/IP.
  • the secure connection established by the H(e)NB GW and the SeGW includes one of the following: DS/IP, H(e) B GW and SeGW.
  • the method further includes: establishing a secure connection between the MME and the P/or S-GW and the H(e)NB GW ; H(e)NB GW establishes a secure connection with SeGW.
  • the secure connection established by the MME and/or the S-GW with the SeGW without the H(e)B GW includes at least one of the following: an IPsec tunnel, a TLS tunnel, an NDS/IP.
  • the method further includes: the SeGW and the H(e)B perform authentication.
  • the secure connection comprises at least one of the following: data source authentication, confidentiality protection, integrity protection, anti-replay protection.
  • the connection processing between H(e)B and the MME and/or S-GW is secured by the above two and/or one secure connection.
  • Step S502 an IPsec tunnel and/or a TLS tunnel is established between the MME and/or the S-GW and the He B GW.
  • Step S504 a secure connection is established between the HeNB GW and the SeGW, and the secure connection may be DS/IP or
  • Step S506 a secure connection is established between the MME and/or the S-GW and the SeGW, and the secure connection may be a secure connection between the MME and/or the S-GW and the H(e)B GW and the H(e)B GW and the SeGW Consisting of a secure connection between, or for another IPsec tunnel and / or TLS tunnel.
  • Step S508 the HeNB and the SeGW perform mutual authentication and establish a secure connection.
  • step S510 it is determined whether the data transmission between the HeNB and the MME and/or the S-GW is secured by two secure connections. If yes, proceed to step S512, otherwise proceed to step S514.
  • step S512 the data transmission between the HeNB and the MME and/or the S-GW is separately protected, that is, security protection is performed through two secure connections.
  • step S514 the data transmission between the HeNB and the MME and/or the S-GW is protected by the same secure connection, that is, security protection is performed through a secure connection.
  • the security protection in step S512 and step S514 may be data source authentication and/or confidentiality protection and/or integrity protection and/or anti-replay protection, and may be used to protect H(e)B and
  • the secure connection for data transmission between the MME and/or the S-GW can be either an IPsec tunnel and/or a TLS tunnel.
  • Step S602 an IPsec tunnel and/or a TLS tunnel is established between the MME and/or the S-GW and the H(e)NB GW.
  • Step S604 a secure connection is established between the H(e)B GW and the SeGW, and the secure connection may be a DS/IP or a GW combined with the SeGW.
  • Step S606 a secure connection is established between the MME and/or the S-GW and the SeGW.
  • the secure connection is another IPsec tunnel and/or a TLS tunnel, and the secure connection does not pass through the H(e)B GW.
  • Step S608, H(e)B and the SeGW perform mutual authentication and establish a secure connection.
  • Step S610 control plane data transmission between H(e)B and MME and P/ or S-GW passes through H(e)NB
  • Step S612 the user plane data transmission between the H(e)B and the MME and/or the S-GW is passed through
  • H(e) B GW secure connection for protection.
  • the security protection in step S610 and step S612 may be data source authentication and/or confidentiality protection and/or integrity protection and/or anti-replay protection.
  • the secure connection used to protect data transmission between H(e)B and the MME and/or S-GW may be an IPsec tunnel and/or a TLS tunnel.
  • FIG. 7 is an interaction flowchart of a connection processing method according to a preferred embodiment 2 of the present invention. As shown in FIG. 7, the following steps S702 to S712 are included. Step S702, an IPsec tunnel and/or a TLS tunnel is established between the MME and/or the S-GW and the H(e)NB GW.
  • Step S704 a secure connection is established between the H(e)B GW and the SeGW, and the secure connection may be a DS/IP or a GW combined with the SeGW.
  • Step S706 a secure connection is established between the MME and/or the S-GW and the SeGW.
  • the secure connection is another IPsec tunnel and/or a TLS tunnel, and the secure connection does not pass through the H(e)B GW.
  • Step S708 H(e)B and the SeGW perform mutual authentication and establish a secure connection.
  • Step S710 control plane data transmission between H(e)B and MME and P/ or S-GW passes through H(e)NB
  • step S712 the control plane data and the user plane data transmission between the H(e)B and the MME and/or the S-GW are protected by a secure connection without passing through the H(e)BGW.
  • the security protection in step S710 and step S712 may be data source authentication and/or confidentiality protection and/or integrity protection and/or anti-replay protection.
  • the secure connection used to protect data transmission between H(e)B and the MME and/or S-GW may be an IPsec tunnel and/or a TLS tunnel.
  • FIG. 8 is an interaction flowchart of a connection processing method according to a preferred embodiment 3 of the present invention. As shown in FIG. 8, the following steps S802 to S812 are included.
  • Step S802 an IPsec tunnel and/or a TLS tunnel is established between the MME and/or the S-GW and the H(e)NB GW.
  • Step S804 a secure connection is established between the H(e)B GW and the SeGW, and the secure connection may be a DS/IP or a GW combined with the SeGW.
  • Step S806 a secure connection is established between the MME and/or the S-GW and the SeGW.
  • the secure connection is another IPsec tunnel and/or a TLS tunnel, and the secure connection does not pass through the H(e)B GW.
  • Step S808, H(e)B and the SeGW perform mutual authentication and establish a secure connection.
  • step S810 the control plane data and the user plane data transmission between the H(e)B and the MME and/or the S-GW are protected by a secure connection via the H(e)B GW.
  • step S812 the user plane data transmission between the H(e)B and the MME and/or the S-GW is protected by a secure connection without passing through the H(e)B GW.
  • the security protection in step S810 and step S812 may be data source authentication and/or confidentiality protection and/or integrity protection and/or anti-replay protection.
  • the secure connection used to protect data transmission between H(e)B and the MME and/or S-GW may be an IPsec tunnel and/or a TLS tunnel.
  • Step S902 an IPsec tunnel and/or a TLS tunnel is established between the MME and/or the S-GW and the H(e)NB GW.
  • Step S904 a secure connection is established between the H(e)B GW and the SeGW, and the secure connection may be a DS/IP or a GW combined with the SeGW.
  • Step S906 a secure connection is established between the MME and/or the S-GW and the SeGW.
  • the secure connection is another IPsec tunnel and/or a TLS tunnel, and the secure connection does not pass through the H(e)B GW.
  • Step S908 H(e)B and the SeGW perform mutual authentication and establish a secure connection.
  • step S910 the control plane and user plane data transmission between the H(e)B and the MME and/or the S-GW is protected by a secure connection via the H(e)B GW.
  • step S912 the control plane and user plane data transmission between the H(e)B and the MME and/or the S-GW is protected by a secure connection without passing through the H(e)B GW.
  • the security protection in step S910 and step S912 may be data source authentication and/or confidentiality protection and/or integrity protection and/or anti-replay protection.
  • the secure connection used to protect data transmission between H(e)B and the MME and/or S-GW may be an IPsec tunnel and/or a TLS tunnel.
  • FIG. 10 is an interaction flowchart of a connection processing method according to a preferred embodiment 5 of the present invention. As shown in FIG. 10, the following steps S1002 to S1010 are included. In step S1002, an IPsec tunnel and/or a TLS tunnel is established between the MME and the S/GW and the H(e)NB GW. Step S1004: A secure connection is established between the H(e)B GW and the SeGW, and the secure connection may be a DS/IP or a GW combined with the SeGW.
  • Step 81006 and the S-GW establishes a secure connection with the SeGW, which may be a secure connection between the MME and/or the S-GW and the H(e)B GW and the H(e)B GW. Consisting of a secure connection with SeGW.
  • H(e)B and the SeGW perform mutual authentication and establish a secure connection.
  • the user plane and/or control plane data transmission between the H(e)B and the MME and/or the S-GW is secured by a hop-by-hop secure connection.
  • the security protection in step S1010 may be data source authentication and/or confidentiality protection and/or integrity protection and/or anti-replay protection.
  • the secure connection used to protect the data transmission between H(e)B and the MME and/or S-GW may be an IPsec tunnel and/or a TLS tunnel.
  • 11 is an interaction flowchart of a connection processing method according to a preferred embodiment 6 of the present invention. As shown in FIG. 11, the following steps S1102 to S1112 are included. Step S1102: An IPsec tunnel and/or a TLS tunnel is established between the MME and the S/GW and the H(e)NB GW. Step S1104: A secure connection is established between the H(e)B GW and the SeGW, and the secure connection may be a DS/IP or a GW combined with the SeGW.
  • Step 81106 and the S-GW establishes a secure connection with the SeGW, which may be a secure connection between the MME and/or the S-GW and the H(e)B GW and the H(e)B GW. Consisting of a secure connection with SeGW.
  • Step S1108, H(e)B and the SeGW perform mutual authentication and establish a secure connection.
  • step S1110 the control plane data transmission between the H(e)B and the MME and/or the S-GW is secured by a hop-by-hop secure connection.
  • the security protection may be data source authentication and/or confidentiality protection and/or integrity protection and/or anti-replay protection.
  • the user plane data transmission between H(e)B and the MME and/or S-GW is secured by a hop-by-hop secure connection.
  • This security protection can be data source authentication and/or confidentiality protection and/or anti-replay protection.
  • the secure connection used to protect the data transmission between H(e)B and the MME and/or S-GW may be an IPsec tunnel and/or a TLS tunnel.
  • FIG. 12 is a structural block diagram of a connection processing system according to an embodiment of the present invention.
  • an MME and/or an S-GW 122 and an H(e)B 124 are included, where the MME and/or the S-GW 122 includes a An establishing module 1222 and a first connection processing module 1224, the H(e)B 124 includes a second establishing module 1242 and a second connection processing module 1244. This will be described in detail below.
  • the first establishing module 1222 is configured to establish a secure connection with the H(e)B 124
  • the first connection processing module 1224 is connected to the first establishing module 1222, and is configured to establish a secure connection to the MME through the first establishing module 1222. / or the connection between S-GW 122 and H(e) B 124 is protected.
  • the second establishing module 1242 is configured to establish a secure connection with the MME and/or the S-GW 122
  • the second connection processing module 1244 is connected to the second establishing module 1242 and configured to establish a secure connection to the MME through the second establishing module 1242.
  • the connection between the P/or S-GW 122 and the H(e)NB 124 is protected.
  • the second establishing module 1242 is configured to establish a secure connection with the first establishing module 1222 of the MME and/or the S-GW 122
  • the second connection processing module 1244 is connected to the second establishing module 1242, and is configured to pass the first
  • the secure connection established by the second setup module 1242 protects the connection between the first connection processing module 1224 and the second connection processing module 1244 in the MME and/or S-GW 122.
  • the invention may be implemented by program code executable by the computing device, such that they may be stored in the storage device by the computing device, or they may be separately fabricated into individual integrated circuit modules, or they may be Multiple modules or steps are made into a single integrated circuit module.
  • the invention is not limited to any specific combination of hardware and software.
  • the technical solution of the present invention has industrial applicability, establishes a secure connection with the MME and/or the S-GW through the H(e)NB, and uses the secure connection to perform connection processing, and solves the related art H(e)B and The S1 port between the MME and/or the S-GW is not protected, thereby increasing the reliability and security of the H(e)B system data transmission mechanism and solving the security aspect of the H(e)B system. Defects improve the safety of the H(e)B system.
  • the above is only the preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes can be made to the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and scope of the present invention are intended to be included within the scope of the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本发明公开了一种连接处理方法及系统,该方法包括:MME和/或S-GW与H(e)NB之间建立安全连接;MME和/或S-GW与H(e)NB之间的连接通过安全连接进行保护。本发明增加了H(e)NB系统数据传输机制的可靠性和安全性,解决了H(e)NB系统在安全方面的缺陷,提升了H(e)NB系统的安全性能。

Description

连接处理方法及系统 技术领域 本发明涉及通信领域, 具体而言, 涉及一种连接处理方法及系统。 背景技术 家庭基站 (Home NodeB , 简称为 ΗΝΒ ) 用来为处在家庭内的第三代 (3rd
Generation, 简称为 3G) 手机提供 3G的无线覆盖。 它被连接到已经存在的住宅宽带 服务。 它包含了一个标准的 Node B (3G宏无线接入网络的一个元素) 的功能和一个 标准的无线网络控制器 (Radio Network Controller, 简称为 RNC) 的无线资源管理功 能。 图 1是根据相关技术的 HNB系统结构的示意图, 如图 1所示, 第三代合作伙伴 计划 (3rd Generation Partnership Project, 简称为 3GPP) 用户设备和 HNB之间的界面 在全球移动通信系统无线接入网 (Universal Mobile Telecommunication System Radio Access Network, 简称为 UTRAN) 中是回程且相容的空中接口。 HNB通过一个安全 网关 (Security GateWay, 简称为 SeGW) 接入运营商的核心网, 其中 HNB和 SeGW 之间的宽带互联网协议 (Internet Protocol, 简称为 IP) 回程可能是不安全的。 在此回 程中传播的信息要被 HNB和 SeGW之间建立的安全通道保护。 SeGW代表运营商的 核心网和 HNB进行相互认证。 家庭基站网关 (HNB Gateway, 简称为 HNB GW) 和 SeGW是在运营商的核心网内逻辑上分离的实体, 用于非非公开授权用户组 (Closed Subscriber Group, 简称 CSG)的用户设备(User Equipment, 简称为 UE)的接入控制。 H(e)MS需要安全的通信。 图 2 是根据相关技术的 H(e) B 系统结构的示意图。 家庭 (演进) 基站 (Home (Evolved) NodeB, 简称为 H(e) B)和 HNB的区别就是它是连接 3GPP用户设备和 演进的陆地无线接入网 (Evolved UTRAN, 简称为 E-UTRAN) 的空中接口。 H(e)NB 网关(Home eNodeB Gateway, 简称为 H(e)NB GW)为选择性部署。 如果 H(e)NB GW 被部署,则 SeGW与 H(e) B GW可以结合在一起;如果它们未被结合在一起,则 SeGW 与 H(e)NB GW之间的接口可用 NDS/IP进行保护。
H(e) B包括 HNB和 H(e) B, 是 HNB和 H(e) B的统称。 针对 H(e) B的安全, 3GPP TR 33.820定义了 27种威胁。这 27种威胁被归纳为 7 大类。 他们分别是: 对 H(e) B资格证书的危害, 对 H(e) B的物理攻击, 对 H(e) B 的构造的攻击, 对 H(e) B的协议的攻击, 对核心网的攻击(包括基于 H(e) B位置的 攻击), 对用户的数据和身份隐私的攻击以及对无线资源和管理的攻击。 图 3是根据相关技术的包含 H(e) B GW的 EUTRAN架构的示意图,如图 3所示, 在此架构中, MME禾 P/或 S-GW与 H(e)NBGW之间有 S1口来进行控制面和用户面数 据的传输, MME和 /或 S-GW与 H(e) B之间有 S1口来进行控制面和用户面数据的传 输, H(e) B GW与 H(e) B之间也有 S1来进行控制面和用户面数据的传输。 图 3中,现有安全规范对 MME和 /或 S-GW与 e B之间的 S1口进行了安全保护。 与 eNB不同, H(e) B处在一个更加容易受到攻击的环境, 也更容易被攻击, 但是相 关技术中,其与 MME和 /或 S-GW之间的 S1口并没有得到保护,从而不能保证 H(e) B 数据传输机制的可靠性与安全性。 发明内容 针对相关技术中 H(e) B与 MME和 /或 S-GW之间的 S1口并没有得到保护的问题 而提出本发明, 为此, 本发明的主要目的在于提供一种连接处理方法及系统, 以解决 上述问题。 为了实现上述目的, 根据本发明的一个方面, 提供了一种连接处理方法。 根据本发明的连接处理方法包括: MME和 /或 S-GW与 H(e) B之间建立安全连 接; MME和 /或 S-GW与 H(e)NB之间的连接通过安全连接进行保护。 MME和 /或 S-GW与 H(e) B建立安全连接包括: MME和 /或 S-GW与安全网关
SeGW建立安全连接; SeGW与 H(e)NB建立安全连接。
MME和 /或 S-GW与 SeGW建立安全连接包括: MME和 /或 S-GW与家庭(演进) 基站网关 H(e) B GW建立安全连接; H(e) B GW与 SeGW建立安全连接。
MME禾 P/或 S-GW与 H(e)NB GW建立的安全连接包括以下至少之一: IPsec隧道、 TLS隧道、 DS/IP。
H(e) B GW与 SeGW建立的安全连接包括以下之一: DS/IP、 H(e) B GW与 SeGW的结合。 当 MME和 /或 S-GW与 SeGW建立的安全连接不经过 H(e) B GW时, 上述方法 还包括: MME禾 P/或 S-GW与 H(e)NB GW建立安全连接; H(e)NB GW与 SeGW建立 安全连接。
MME和 /或 S-GW与 SeGW建立的不经过 H(e) B GW的安全连接包括以下至少 之一: IPsec隧道、 TLS隧道、 DS/IP。 在 SeGW与 H(e) B建立安全连接之后,上述方法还包括: SeGW与 H(e)NB进行 认证。 安全连接包括以下至少之一: 数据源认证、 机密性保护、 完整性保护、 防重放保 护。 为了实现上述目的, 根据本发明的另一个方面, 提供了一种连接处理系统。 根据本发明的连接处理系统包括 MME禾口 /或 S-GW与 H(e) B, 其中 MME禾口 /或 S-GW包括: 第一建立模块, 设置为与 H(e) B建立安全连接, 第一连接处理模块, 设 置为通过安全连接对 MME和 /或 S-GW与 H(e) B之间的连接进行保护; H(e) B包括 第二建立模块, 设置为与 MME和 /或 S-GW建立安全连接, 第二连接处理模块, 设置 为通过安全连接对 MME和 /或 S-GW与 H(e) B之间的连接进行保护。 本发明通过 H(e) B与 MME和 /或 S-GW建立安全连接, 并使用该安全连接进行 数据传输,解决了相关技术中 H(e) B与 MME和 /或 S-GW之间的 S1口并没有得到保 护的问题, 从而增加了 H(e) B系统数据传输机制的可靠性和安全性, 解决了 H(e) B 系统在安全方面的缺陷, 提升了 H(e) B系统的安全性能。 附图说明 此处所说明的附图用来提供对本发明的进一步理解, 构成本申请的一部分, 本发 明的示意性实施例及其说明用于解释本发明, 并不构成对本发明的不当限定。 在附图 中: 图 1是根据相关技术的 HNB系统结构的示意图; 图 2是根据相关技术的 H(e) B系统结构的示意图; 图 3是根据相关技术的包含 H(e) B GW的 EUTRAN架构的示意图; 图 4是根据本发明实施例的连接处理方法的流程图; 图 5是根据本发明优选实施例的连接处理方法的流程图; 图 6是根据本发明优选实施例一的连接处理方法的交互流程图; 图 7是根据本发明优选实施例二的连接处理方法的交互流程图; 图 8是根据本发明优选实施例三的连接处理方法的交互流程图; 图 9是根据本发明优选实施例四的连接处理方法的交互流程图; 图 10是根据本发明优选实施例五的连接处理方法的交互流程图; 图 11是根据本发明优选实施例六的连接处理方法的交互流程图; 图 12是根据本发明实施例的连接处理系统的结构框图。 具体实施方式 需要说明的是, 在不冲突的情况下, 本申请中的实施例及实施例中的特征可以相 互组合。 下面将参考附图并结合实施例来详细说明本发明。 本发明实施例提供了一种连接处理方法。 图 4是根据本发明实施例的连接处理方 法的流程图, 如图 4所示, 包括如下的至步骤 S404。 步骤 S402, MME禾口 /或 S-GW与 H(e)NB建立安全连接。 步骤 S404, MME和 /或 S-GW与 H(e)NB之间的连接通过安全连接进行保护。 相关技术中, H(e) B与 MME禾 P/或 S-GW之间的 S1口并没有得到保护, 从而不 能保证 H(e) B数据传输机制的可靠性与安全性。 本发明实施例中, 通过 H(e) B与 MME和 /或 S-GW建立安全连接, 并使用该安全连接进行连接处理, 增加了 H(e) B 系统数据传输机制的可靠性和安全性, 解决了 H(e) B系统在安全方面的缺陷, 提升 了 H(e) B系统的安全性能。 优选地, MME禾口 /或 S-GW与 H(e) B建立安全连接包括: MME禾口 /或 S-GW与 SeGW建立安全连接; SeGW与 H(e)NB建立安全连接。 优选地, MME和 /或 S-GW与 SeGW建立安全连接包括: MME和 /或 S-GW与家 庭(演进)基站网关 H(e)NB GW建立安全连接; H(e) B GW与 SeGW建立安全连接。 优选地, MME和 /或 S-GW与 H(e) B GW建立的安全连接包括以下至少之一 IPsec隧道、 TLS隧道、 DS/IP。 优选地, H(e)NB GW与 SeGW建立的安全连接包括以下之一: DS/IP、H(e) B GW 与 SeGW的结合。 优选地, 当 MME和 /或 S-GW与 SeGW建立的安全连接不经过 H(e) B GW时, 上述方法还包括: MME禾 P/或 S-GW与 H(e)NB GW建立安全连接; H(e)NB GW与 SeGW 建立安全连接。 优选地, MME和 /或 S-GW与 SeGW建立的不经过 H(e) B GW的安全连接包括 以下至少之一: IPsec隧道、 TLS隧道、 NDS/IP。 优选地,在 SeGW与 H(e) B建立安全连接之后,上述方法还包括: SeGW与 H(e) B 进行认证。 优选地, 安全连接包括以下至少之一: 数据源认证、 机密性保护、 完整性保护、 防重放保护。 优选地, H(e) B与 MME和 /或 S-GW之间的连接处理通过上述两个和 /或一个安 全连接来进行安全保护。 下面将结合实例对本发明实施例的实现过程进行详细描述。 图 5是根据本发明优选实施例的连接处理方法的流程图, 如图 5所示, 包括如下 的步骤 S502至步骤 S514。 步骤 S502, MME和 /或 S-GW与 He B GW之间建立 IPsec隧道和 /或 TLS隧道。 步骤 S504, HeNB GW与 SeGW之间建立安全连接, 此安全连接可为 DS/IP或
H(e) B GW与 SeGW结合。 步骤 S506,MME和 /或 S-GW与 SeGW之间建立安全连接,此安全连接可由 MME 和 /或 S-GW与 H(e) B GW之间的安全连接和 H(e) B GW与 SeGW之间的安全连接 组成, 或为另外一条 IPsec隧道和 /或 TLS隧道。 步骤 S508, HeNB与 SeGW之间进行相互认证并建立安全连接。 步骤 S510,判断 HeNB与 MME和 /或 S-GW之间的数据传输是否通过两个安全连 接来进行安全保护, 如果是, 则进行步骤 S512, 否则进行步骤 S514。 步骤 S512, HeNB与 MME和 /或 S-GW之间的数据传输分开保护, 即, 通过两个 安全连接来进行安全保护。 步骤 S514, HeNB与 MME和 /或 S-GW之间的数据传输经同一安全连接保护,即, 通过一个安全连接来进行安全保护。 需要说明的是,步骤 S512和步骤 S514中的安全保护可以为数据源认证和 /或机密 性保护和 /或完整性保护和 /或防重放保护, 并可以用于保护 H(e) B 与 MME 和 /或 S-GW之间的数据传输的安全连接均可为 IPsec隧道和 /或 TLS隧道。 图 6是根据本发明优选实施例一的连接处理方法的交互流程图, 如图 6所示, 包 括如下的步骤 S602至步骤 S612。 步骤 S602,MME和 /或 S-GW与 H(e)NB GW之间建立 IPsec隧道和 /或 TLS隧道。 步骤 S604, H(e) B GW与 SeGW之间建立安全连接, 此安全连接可为 DS/IP 或 ΗΟ)ΝΒ GW与 SeGW结合。 步骤 S606, MME和 /或 S-GW与 SeGW之间建立安全连接, 此安全连接为另外一 条 IPsec隧道和 /或 TLS隧道, 此安全连接不经过 H(e) B GW。 步骤 S608, H(e) B与 SeGW之间进行相互认证并建立安全连接。 步骤 S610, H(e) B与 MME禾 P/或 S-GW之间的控制面数据传输通过经由 H(e)NB
GW的安全连接进行保护。 步骤 S612, H(e) B 与 MME 和 /或 S-GW 之间的用户面数据传输通过不经过
H(e) B GW的安全连接进行保护。 需要说明的是,步骤 S610和步骤 S612中的安全保护可为数据源认证和 /或机密性 保护和 /或完整性保护和 /或防重放保护。用于保护 H(e) B与 MME和 /或 S-GW之间的 数据传输的安全连接可为 IPsec隧道和 /或 TLS隧道。 图 7是根据本发明优选实施例二的连接处理方法的交互流程图, 如图 7所示, 包 括如下的步骤 S702至步骤 S712。 步骤 S702,MME和 /或 S-GW与 H(e)NB GW之间建立 IPsec隧道和 /或 TLS隧道。 步骤 S704, H(e) B GW与 SeGW之间建立安全连接, 此安全连接可为 DS/IP 或 ΗΟ)ΝΒ GW与 SeGW结合。 步骤 S706, MME和 /或 S-GW与 SeGW之间建立安全连接, 此安全连接为另外一 条 IPsec隧道和 /或 TLS隧道, 此安全连接不经过 H(e) B GW。 步骤 S708, H(e) B与 SeGW之间进行相互认证并建立安全连接。 步骤 S710, H(e) B与 MME禾 P/或 S-GW之间的控制面数据传输通过经由 H(e)NB
GW的安全连接进行保护。 步骤 S712, H(e) B与 MME和 /或 S-GW之间的控制面数据和用户面数据传输通 过不经过 H(e) B GW的安全连接进行保护。 需要说明的是,步骤 S710和步骤 S712中的安全保护可为数据源认证和 /或机密性 保护和 /或完整性保护和 /或防重放保护。用于保护 H(e) B与 MME和 /或 S-GW之间的 数据传输的安全连接可为 IPsec隧道和 /或 TLS隧道。 图 8是根据本发明优选实施例三的连接处理方法的交互流程图, 如图 8所示, 包 括如下的步骤 S802至步骤 S812。 步骤 S802,MME和 /或 S-GW与 H(e)NB GW之间建立 IPsec隧道和 /或 TLS隧道。 步骤 S804, H(e) B GW与 SeGW之间建立安全连接, 此安全连接可为 DS/IP 或 ΗΟ)ΝΒ GW与 SeGW结合。 步骤 S806, MME和 /或 S-GW与 SeGW之间建立安全连接, 此安全连接为另外一 条 IPsec隧道和 /或 TLS隧道, 此安全连接不经过 H(e) B GW。 步骤 S808, H(e) B与 SeGW之间进行相互认证并建立安全连接。 步骤 S810, H(e) B与 MME和 /或 S-GW之间的控制面数据和用户面数据传输通 过经由 H(e) B GW的安全连接进行保护。 步骤 S812, H(e) B 与 MME 和 /或 S-GW 之间的用户面数据传输通过不经过 H(e) B GW的安全连接进行保护。 需要说明的是,步骤 S810和步骤 S812中的安全保护可为数据源认证和 /或机密性 保护和 /或完整性保护和 /或防重放保护。用于保护 H(e) B与 MME和 /或 S-GW之间的 数据传输的安全连接可为 IPsec隧道和 /或 TLS隧道。 图 9是根据本发明优选实施例四的连接处理方法的交互流程图, 如图 9所示, 包 括如下的步骤 S902至步骤 S912。 步骤 S902,MME和 /或 S-GW与 H(e)NB GW之间建立 IPsec隧道和 /或 TLS隧道。 步骤 S904, H(e) B GW与 SeGW之间建立安全连接, 此安全连接可为 DS/IP 或 ΗΟ)ΝΒ GW与 SeGW结合。 步骤 S906, MME和 /或 S-GW与 SeGW之间建立安全连接, 此安全连接为另外一 条 IPsec隧道和 /或 TLS隧道, 此安全连接不经过 H(e) B GW。 步骤 S908, H(e) B与 SeGW之间进行相互认证并建立安全连接。 步骤 S910, H(e) B与 MME和 /或 S-GW之间的控制面和用户面数据传输通过经 由 H(e) B GW的安全连接进行保护。 步骤 S912, H(e) B与 MME和 /或 S-GW之间的控制面和用户面数据传输通过不 经过 H(e) B GW的安全连接进行保护。 需要说明的是,步骤 S910和步骤 S912中的安全保护可为数据源认证和 /或机密性 保护和 /或完整性保护和 /或防重放保护。用于保护 H(e) B与 MME和 /或 S-GW之间的 数据传输的安全连接可为 IPsec隧道和 /或 TLS隧道。 图 10是根据本发明优选实施例五的连接处理方法的交互流程图, 如图 10所示, 包括如下的步骤 S1002至步骤 S1010。 步骤 S1002, MME禾 P/或 S-GW与 H(e)NB GW之间建立 IPsec隧道和 /或 TLS隧 道。 步骤 S1004, H(e) B GW与 SeGW之间建立安全连接, 此安全连接可为 DS/IP 或 ΗΟ)ΝΒ GW与 SeGW结合。 步骤 81006,^1£和/或 S-GW与 SeGW之间建立安全连接,此安全连接可由 MME 和 /或 S-GW与 H(e) B GW之间的安全连接和 H(e) B GW与 SeGW之间的安全连接 组成。 步骤 S1008, H(e) B与 SeGW之间进行相互认证并建立安全连接。 步骤 S 1010, H(e) B与 MME和 /或 S-GW之间的用户面和 /或控制面数据传输通 过逐跳的安全连接来进行安全保护。 需要说明的是, 步骤 S1010 中的安全保护可为数据源认证和 /或机密性保护和 /或 完整性保护和 /或防重放保护。用于保护 H(e) B与 MME和 /或 S-GW之间的数据传输 的安全连接均可为 IPsec隧道和 /或 TLS隧道。 图 11是根据本发明优选实施例六的连接处理方法的交互流程图, 如图 11所示, 包括如下的步骤 S1102至步骤 S1112。 步骤 S1102, MME禾 P/或 S-GW与 H(e)NB GW之间建立 IPsec隧道和 /或 TLS隧 道。 步骤 S1104, H(e) B GW与 SeGW之间建立安全连接, 此安全连接可为 DS/IP 或 ΗΟ)ΝΒ GW与 SeGW结合。 步骤 81106,^1£和/或 S-GW与 SeGW之间建立安全连接,此安全连接可由 MME 和 /或 S-GW与 H(e) B GW之间的安全连接和 H(e) B GW与 SeGW之间的安全连接 组成。 步骤 S1108, H(e) B与 SeGW之间进行相互认证并建立安全连接。 步骤 S1110, H(e) B与 MME和 /或 S-GW之间的控制面数据传输通过逐跳的安全 连接来进行安全保护。 步骤 S1112,此安全保护可为数据源认证和 /或机密性保护和 /或完整性保护和 /或防 重放保护。
H(e) B与 MME和 /或 S-GW之间的用户面数据传输通过逐跳的安全连接来进行 安全保护。 此安全保护可为数据源认证和 /或机密性保护和 /或防重放保护。 用于保护 H(e) B与 MME和 /或 S-GW之间的数据传输的安全连接均可为 IPsec隧道和 /或 TLS 隧道。 需要说明的是, 在附图的流程图示出的步骤可以在诸如一组计算机可执行指令的 计算机系统中执行, 并且, 虽然在流程图中示出了逻辑顺序, 但是在某些情况下, 可 以以不同于此处的顺序执行所示出或描述的步骤。 本发明实施例提供了一种连接处理系统, 该连接处理系统可以用于实现上述连接 处理方法。 图 12是根据本发明实施例的连接处理系统的结构框图, 如图 12所示, 包 括 MME和 /或 S-GW 122与 H(e) B 124, 其中 MME和 /或 S-GW 122包括第一建立模 块 1222和第一连接处理模块 1224, H(e) B 124包括第二建立模块 1242和第二连接处 理模块 1244。 下面对其进行详细描述。 第一建立模块 1222,设置为与 H(e) B 124建立安全连接,第一连接处理模块 1224, 连接至第一建立模块 1222, 设置为通过第一建立模块 1222建立的安全连接对 MME 禾口 /或 S-GW 122与 H(e) B 124之间的连接进行保护。 第二建立模块 1242, 设置为与 MME和 /或 S-GW 122建立安全连接, 第二连接处 理模块 1244, 连接至第二建立模块 1242, 设置为通过第二建立模块 1242建立的安全 连接对 MME禾 P/或 S-GW 122与 H(e)NB 124之间的连接进行保护。 具体地, 第二建立模块 1242, 设置为与 MME和 /或 S-GW 122中的第一建立模块 1222建立安全连接, 第二连接处理模块 1244, 连接至第二建立模块 1242, 设置为通 过第二建立模块 1242建立的安全连接对 MME和 /或 S-GW 122中的第一连接处理模块 1224与第二连接处理模块 1244之间的连接进行保护。 需要说明的是, 装置实施例中描述的连接处理系统对应于上述的方法实施例, 其 具体的实现过程在方法实施例中已经进行过详细说明, 在此不再赘述。 综上所述, 根据本发明的上述实施例, 提供了一种连接处理方法及系统。 通过 H(e) B与 MME和 /或 S-GW建立安全连接, 并使用该安全连接进行连接处理, 解决 了相关技术中 H(e)NB与 MME禾 P/或 S-GW之间的 S1口并没有得到保护的问题,从而 增加了 H(e) B系统数据传输机制的可靠性和安全性,解决了 H(e) B系统在安全方面 的缺陷, 提升了 H(e) B系统的安全性能。 显然, 本领域的技术人员应该明白, 上述的本发明的各模块或各步骤可以用通用 的计算装置来实现, 它们可以集中在单个的计算装置上, 或者分布在多个计算装置所 组成的网络上, 可选地, 它们可以用计算装置可执行的程序代码来实现, 从而, 可以 将它们存储在存储装置中由计算装置来执行, 或者将它们分别制作成各个集成电路模 块, 或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。 这样, 本发明 不限制于任何特定的硬件和软件结合。 工业实用性 本发明技术方案具备工业实用性, 通过 H(e)NB与 MME和 /或 S-GW建立安全连 接,并使用该安全连接进行连接处理,解决了相关技术中 H(e) B与 MME和 /或 S-GW 之间的 S1口并没有得到保护的问题, 从而增加了 H(e) B系统数据传输机制的可靠性 和安全性, 解决了 H(e) B系统在安全方面的缺陷, 提升了 H(e) B系统的安全性能。 以上所述仅为本发明的优选实施例而已, 并不用于限制本发明, 对于本领域的技 术人员来说, 本发明可以有各种更改和变化。 凡在本发明的精神和原则之内, 所作的 任何修改、 等同替换、 改进等, 均应包含在本发明的保护范围之内。

Claims

权 利 要 求 书
1. 一种连接处理方法, 包括:
移动性管理实体 MME和 /或服务网关 S-GW与家庭 (演进) 基站 H(e) B 之间建立安全连接;
所述 MME和 /或 S-GW与所述 H(e) B之间的连接通过所述安全连接进行 保护。
2. 根据权利要求 1所述的方法, 其中, 所述 MME和 /或 S-GW与所述 H(e) B建 立安全连接包括:
所述 MME和 /或 S-GW与安全网关 SeGW建立所述安全连接; 所述 SeGW与所述 H(e) B建立所述安全连接。
3. 根据权利要求 2所述的方法, 其中, 所述 MME和 /或 S-GW与所述 SeGW建立 所述安全连接包括:
所述 MME和 /或 S-GW与家庭 (演进) 基站网关 H(e)NB GW建立所述安 全连接;
所述 H(e) B GW与所述 SeGW建立所述安全连接。
4. 根据权利要求 3所述的方法,其中,所述 MME和 /或 S-GW与所述 H(e) B GW 建立的所述安全连接包括以下至少之一:
IPsec隧道、 TLS隧道、 DS/IP。
5. 根据权利要求 3所述的方法, 其中, 所述 H(e) B GW与所述 SeGW建立的所 述安全连接包括以下之一:
NDS/IP、 所述 HCe)NB GW与所述 SeGW的结合。
6. 根据权利要求 2所述的方法, 其中, 当所述 MME和 /或 S-GW与所述 SeGW建 立的所述安全连接不经过所述 H(e) B GW时, 所述方法还包括:
所述 MME和 /或 S-GW与所述 H(e) B GW建立所述安全连接; 所述 H(e) B GW与所述 SeGW建立所述安全连接。 根据权利要求 6所述的方法, 其中, 所述 MME和 /或 S-GW与所述 SeGW建立 的不经过所述 H(e) B GW的所述安全连接包括以下至少之一:
IPsec隧道、 TLS隧道、 DS/IP。 根据权利要求 2所述的方法, 其中, 在所述 SeGW与所述 H(e) B建立所述安 全连接之后, 所述方法还包括:
所述 SeGW与所述 Η(» Β进行认证。 根据权利要求 1至 8中任一项所述的方法, 其中, 所述安全连接包括以下至少 之一:
数据源认证、 机密性保护、 完整性保护、 防重放保护。 一种连接处理系统,包括移动性管理实体 MME和 /或服务网关 S-GW与家庭 (演 进) 基站 H(e) B, 其中
所述 MME和 /或 S-GW包括:
第一建立模块, 设置为与所述 H(e) B建立安全连接,
第一连接处理模块, 设置为通过所述安全连接对所述 MME 和 /或 S-GW与所述 H(e) B之间的连接进行保护;
所述 HCe) B包括:
第二建立模块, 设置为与所述 MME和 /或 S-GW建立安全连接, 第二连接处理模块, 设置为通过所述安全连接对所述 MME 和 /或 S-GW与所述 H(e) B之间的连接进行保护。
PCT/CN2011/079113 2010-12-29 2011-08-30 连接处理方法及系统 Ceased WO2012088914A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US13/977,391 US20130326586A1 (en) 2010-12-29 2011-08-30 Connection Processing Method and System
EP11854315.6A EP2661143A4 (en) 2010-12-29 2011-08-30 Processing method and system for connection

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2010106119302A CN102026405A (zh) 2010-12-29 2010-12-29 连接处理方法及系统
CN201010611930.2 2010-12-29

Publications (1)

Publication Number Publication Date
WO2012088914A1 true WO2012088914A1 (zh) 2012-07-05

Family

ID=43867074

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/079113 Ceased WO2012088914A1 (zh) 2010-12-29 2011-08-30 连接处理方法及系统

Country Status (4)

Country Link
US (1) US20130326586A1 (zh)
EP (1) EP2661143A4 (zh)
CN (1) CN102026405A (zh)
WO (1) WO2012088914A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102026405A (zh) * 2010-12-29 2011-04-20 中兴通讯股份有限公司 连接处理方法及系统
CN104185209B (zh) * 2013-05-24 2019-11-19 中兴通讯股份有限公司 一种小蜂窝基站接入系统及其实现网络接入的方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101310549A (zh) * 2005-11-15 2008-11-19 阿尔卡特朗讯公司 用于蜂窝无线通信系统的接入网络、网关和管理服务器
CN101674578A (zh) * 2008-09-12 2010-03-17 中兴通讯股份有限公司 一种家庭基站安全接入网络的方法及系统
CN101686578A (zh) * 2008-09-28 2010-03-31 中兴通讯股份有限公司 家庭演进基站系统及无线设备的接入方法
CN102026405A (zh) * 2010-12-29 2011-04-20 中兴通讯股份有限公司 连接处理方法及系统

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ES2349049T3 (es) * 2005-11-15 2010-12-22 Alcatel Lucent Acceso a red, pasarela y servidor de gestión para un sistema celular de comunicación inalambrica.
CN102652457A (zh) * 2009-12-18 2012-08-29 诺基亚西门子通信公司 管理方法和设备
US9019881B2 (en) * 2010-09-01 2015-04-28 Zte Corporation Method and system for waking up node B cell

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101310549A (zh) * 2005-11-15 2008-11-19 阿尔卡特朗讯公司 用于蜂窝无线通信系统的接入网络、网关和管理服务器
CN101674578A (zh) * 2008-09-12 2010-03-17 中兴通讯股份有限公司 一种家庭基站安全接入网络的方法及系统
CN101686578A (zh) * 2008-09-28 2010-03-31 中兴通讯股份有限公司 家庭演进基站系统及无线设备的接入方法
CN102026405A (zh) * 2010-12-29 2011-04-20 中兴通讯股份有限公司 连接处理方法及系统

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2661143A4 *

Also Published As

Publication number Publication date
EP2661143A4 (en) 2018-01-24
EP2661143A1 (en) 2013-11-06
US20130326586A1 (en) 2013-12-05
CN102026405A (zh) 2011-04-20

Similar Documents

Publication Publication Date Title
TWI724132B (zh) 無線通訊的方法、用於無線通訊的裝置以及用於執行該方法的電腦程式軟體
TWI552564B (zh) 憑證驗證及頻道耦合
CN102972054B (zh) 无线通信装置处的本地安全密钥更新
CN108781366B (zh) 用于5g技术的认证机制
CN112738804B (zh) 一种安全保护的方法及装置
JP5440696B2 (ja) ゲートウェイ装置、基地局、移動管理サーバ、通信方法
US9027111B2 (en) Relay node authentication method, apparatus, and system
CN109417740B (zh) 保持相同无线终端的切换期间的安全密钥使用
TW201129210A (en) Split-cell relay application protocol
JP7461515B2 (ja) データ伝送方法及びシステム、電子機器、並びにコンピュータ可読記憶媒体
KR20120135310A (ko) 통신 시스템의 보안 릴레이 노드
CN106465106A (zh) 用于从无线电接入网络提供安全性的方法和系统
WO2020248624A1 (zh) 一种通信方法、网络设备、用户设备和接入网设备
CN112087754A (zh) 动态提供在中继设备中用于认证的密钥的方法
CN113872755A (zh) 一种密钥交换方法及装置
CN101483516A (zh) 安全控制的方法及其系统
US20130139242A1 (en) Network Accessing Device and Method for Mutual Authentication Therebetween
WO2012083873A1 (zh) 一种密钥生成方法、装置及系统
WO2020147602A1 (zh) 一种认证方法、装置和系统
WO2021244569A1 (zh) 数据传输方法、系统、电子设备、存储介质
CN101771704B (zh) 一种安全的数据传输的方法和系统
US9060028B1 (en) Method and apparatus for rejecting untrusted network
WO2012088914A1 (zh) 连接处理方法及系统
WO2014201766A1 (zh) 一种应急通信方法、移动终端、认证服务器和无线接入点
KR20100092353A (ko) 트래픽 암호화 키 관리방법 및 장치

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11854315

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2011854315

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 13977391

Country of ref document: US