Abstract:
Method, device and computer program product for wireless communication are provided. A method includes: transmitting, by a first wireless communication node, a control message to a second wireless communication node, to control the second wireless communication node to instruct a wireless communication terminal to enter a radio resource control, RRC, inactive mode and transmitting at least one small data transmission, SDT, configuration to the wireless communication terminal.
Abstract:
Provided are a redundant session establishment method and apparatus, a radio bearer establishment method and apparatus, a node, a terminal and a medium. The redundant session establishment method includes: generating redundant user plane resource information, and transmitting the redundant user plane resource information to a master node; and establishing a redundant session corresponding to a redundant session request in a redundant user plane resource according to the redundant session request from the master node, where the redundant session request is a request generated by the master node according to the redundant user plane resource information.
Abstract:
proviced is an authentication method based on a GBA, and the method includes: a BSF receives an initialization request message sent by a UE, wherein the initialization request message carries a first identifier of the UE, and the first identifier comprises at least one of the following: a SUCI, an identifier converted from the SUCI, and a TMPI associated with the subscriber identity; the BSF acquires an AV of the UE according to the first ID; the BSF completes GBA authentication with the UE according to the acquired AV. In this way, the privacy of the SUPI is protected for the UE, and the SUCI or the identifier converted from the SUCI is used to perform the bootstrapping process of the GBA, thereby improving the security of the GBA authentication process.
Abstract:
Provided is a network equipment and an authentication and key management method for the same. The network equipment generates a Network Key (NK); the network equipment performs authentication protocol interaction with opposite communication equipment, and calculates a Basic Session Key (BSK) according to parameters for the authentication protocol interaction and the NK; and the network equipment calculates link Encryption Keys (EKs) used respectively for Media Access Control (MAC) and Physical (PHY) layers using various access technologies according to the BSK, and provides the EKs for respective MAC and PHY layer function modules. With the disclosure, the legality of the equipment is verified by performing an authentication process on the heterogeneous network equipments in one pass, and keys in various MAC layer technologies are managed in a unified way.
Abstract:
Provided is a network equipment and an authentication and key management method for the same. The network equipment generates a Network Key (NK); the network equipment performs authentication protocol interaction with opposite communication equipment, and calculates a Basic Session Key (BSK) according to parameters for the authentication protocol interaction and the NK; and the network equipment calculates link Encryption Keys (EKs) used respectively for Media Access Control (MAC) and Physical (PHY) layers using various access technologies according to the BSK, and provides the EKs for respective MAC and PHY layer function modules. With the disclosure, the legality of the equipment is verified by performing an authentication process on the heterogeneous network equipments in one pass, and keys in various MAC layer technologies are managed in a unified way.