Data transmission method, device, and system
First Claim
1. A method for data transmission, comprising:
- receiving a data packet sent by user equipment, wherein the data packet carries indication information used to instruct a target base station to establish a specified data connection to the user equipment;
generating a first key of the user equipment based on the indication information and a public key of the target base station to establish the specified data connection to the user equipment;
sending a key information request to a source base station of the user equipment, wherein the key information request is at least used to request to obtain an encryption algorithm used by the source base station;
receiving a key information response sent by the source base station, wherein the key information response comprises identification information of the encryption algorithm;
generating a second key based on a source base station identifier of the source base station, the encryption algorithm, and the indication information; and
performing data transmission with the user equipment based on the second key.
1 Assignment
0 Petitions
Accused Products
Abstract
The present disclosure discloses a data transmission method, device, and system, and belongs to the field of communications technologies. The method includes: receiving a data packet sent by user equipment, where the data packet carries indication information used to instruct a base station to establish a specified data connection to the user equipment; generating a first key of the user equipment based on the indication information and a public key of the base station; and performing data transmission with the user equipment based on the first key of the user equipment. According to the data transmission method, the transmitted data can be encrypted and decrypted when there is no radio resource control connection between the base station and the user equipment, thereby improving data transmission security while ensuring data transmission efficiency.
-
Citations
9 Claims
-
1. A method for data transmission, comprising:
-
receiving a data packet sent by user equipment, wherein the data packet carries indication information used to instruct a target base station to establish a specified data connection to the user equipment; generating a first key of the user equipment based on the indication information and a public key of the target base station to establish the specified data connection to the user equipment; sending a key information request to a source base station of the user equipment, wherein the key information request is at least used to request to obtain an encryption algorithm used by the source base station; receiving a key information response sent by the source base station, wherein the key information response comprises identification information of the encryption algorithm; generating a second key based on a source base station identifier of the source base station, the encryption algorithm, and the indication information; and performing data transmission with the user equipment based on the second key. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A target base station comprising a receiver, a transmitter and a processor, wherein the processor is configured to:
-
receive, through the receiver, a data packet sent by user equipment, wherein the data packet carries indication information used to instruct the target base station to establish a specified data connection to the user equipment; generate a first key of the user equipment based on the indication information and a public key of the target base station to establish the specified data connection to the user equipment; send, through the transmitter, a key information request to a source base station of the user equipment, wherein the key information request is used to request to obtain an encryption algorithm used by the source base station; receive, through the receiver, a key information response sent by the source base station, wherein the key information response comprises identification information of the encryption algorithm; generate a second key based on a base station identifier of the source base station, the encryption algorithm, and the indication information; and perform, through the receiver and the transmitter, data transmission with the user equipment based on the second key. - View Dependent Claims (7, 8, 9)
-
Specification