Abstract
Embodiments of the present invention provide a method for implementing local routing of traffic, a base station and a system are provided, which relate to the field of communications technologies. The method for implementing local routing of traffic includes: judging whether local routing processing is performed on an uplink traffic flow of a first terminal that serves as a sending end; if it is judged as yes, updating a key of the uplink traffic flow of the first terminal and/or a key of a downlink traffic flow of a second terminal that serves as a receiving end to a public key; forwarding an encrypted data packet of the uplink traffic flow of the first terminal to the second terminal through the downlink traffic flow of the second terminal, where an encryption and decryption operation is not performed on the encrypted data packet before the forwarding or during the forwarding.
Technology | Declaration Information | Specification Information | Explicitly Disclosed | Patent Type | |||||
---|---|---|---|---|---|---|---|---|---|
Declaration Date | Declaration Reference | Declaring Company | Specification Number | ||||||
5G | 17/09/2023 | ISLD-202309-045 | HONOR DEVICE CO LTD |
S1
S2
|
Yes | Basis Patent |
Specification Information
Specification Information
Technologies
Family Information
All Granted Patents In Patent Family : | ---- |
All Pending Patents In Patent Family : | ---- |
Publication No | Technology | Declaration Information | Specification Information | Explicitly Disclosed | Patent Type | |||||
---|---|---|---|---|---|---|---|---|---|---|
Declaration Date | Declaration Reference | Declaring Company | Specification Number | |||||||
CN102036230A | 5G | 17/09/2023 | ISLD-202309-045 | HONOR DEVICE CO LTD |
S1
S2
|
No | Family Member | |||
CN102036230B | 5G | 17/09/2023 | ISLD-202309-045 | HONOR DEVICE CO LTD |
S1
S2
|
No | Family Member | |||
US2012163597A1 | 5G | 17/09/2023 | ISLD-202309-045 | HONOR DEVICE CO LTD |
S1
S2
|
Yes | Basis Patent | |||
WO2012083828A1 | 5G | 17/09/2023 | ISLD-202309-045 | HONOR DEVICE CO LTD |
S1
S2
|
No | Family Member |
Publication No | Technology | Declaration Information | Specification Information | Explicitly Disclosed | Patent Type | Status | National Phase Entries | |||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Declaration Date | Declaration Reference | Declaring Company | Specification Information | |||||||||
----- | ----- | ----- | ----- | ----- |
S1
|
----- | ----- | ----- | ----- |
Technologies
Product
Use Cases
Services
Claim
1. A method for implementing local routing of traffic, comprising:
receiving, by a base station, at least one encrypted data packet in an uplink traffic flow of a first terminal that serves as a sending end;
afterwards, judging by the base station, whether local traffic routing processing is performed on the at least one encrypted data packet in the uplink traffic flow of the first terminal, wherein the local traffic routing comprising routing of the at least one encrypted data packet from the first terminal to a second terminal within a network through the same base station;
if it is judged as yes, updating by the same base station, a key of the uplink traffic flow of the first terminal and a key of a downlink traffic flow of the second terminal that serves as a receiving end to a public key; and
forwarding, by the same base station, the at least one encrypted data packet of the uplink traffic flow of the first terminal to the second terminal through the downlink traffic flow of the second terminal, wherein an encryption and decryption operation is not performed on the at least one encrypted data packet before the forwarding or during the forwarding.', 'receiving, by a base station, at least one encrypted data packet in an uplink traffic flow of a first terminal that serves as a sending end;', 'afterwards, judging by the base station, whether local traffic routing processing is performed on the at least one encrypted data packet in the uplink traffic flow of the first terminal, wherein the local traffic routing comprising routing of the at least one encrypted data packet from the first terminal to a second terminal within a network through the same base station;', 'if it is judged as yes, updating by the same base station, a key of the uplink traffic flow of the first terminal and a key of a downlink traffic flow of the second terminal that serves as a receiving end to a public key; and', 'forwarding, by the same base station, the at least one encrypted data packet of the uplink traffic flow of the first terminal to the second terminal through the downlink traffic flow of the second terminal, wherein an encryption and decryption operation is not performed on the at least one encrypted data packet before the forwarding or during the forwarding.
2. The method for implementing local routing of traffic according to claim 1, wherein the judging whether the local routing processing is performed on the uplink traffic flow of the first terminal that serves as the sending end comprises:
judging whether the local routing processing is performed on the uplink traffic flow when a first encrypted data packet of the uplink traffic flow of the first terminal that serves as the sending end is received; or
judging whether the local routing processing is performed on the uplink traffic flow when the uplink traffic flow of the first terminal that serves as the sending end is created.', 'judging whether the local routing processing is performed on the uplink traffic flow when a first encrypted data packet of the uplink traffic flow of the first terminal that serves as the sending end is received; or', 'judging whether the local routing processing is performed on the uplink traffic flow when the uplink traffic flow of the first terminal that serves as the sending end is created.
3. The method for implementing local routing of traffic according to claim 1, wherein the updating the key of the uplink traffic flow of the first terminal and/or the key of the downlink traffic flow of the second terminal that serves as the receiving end to the public key comprises:
judging whether an encryption and decryption algorithm adopted by the uplink traffic flow of the first terminal and the downlink traffic flow of the second terminal each is the same; and
if it is judged as yes, updating the key of the uplink traffic flow of the first terminal and the key of the downlink traffic flow of the second terminal to the public key.', 'judging whether an encryption and decryption algorithm adopted by the uplink traffic flow of the first terminal and the downlink traffic flow of the second terminal each is the same; and', 'if it is judged as yes, updating the key of the uplink traffic flow of the first terminal and the key of the downlink traffic flow of the second terminal to the public key.
4. The method for implementing local routing of traffic according to claim 1, wherein the updating the key of the uplink traffic flow of the first terminal and/or the key of the downlink traffic flow of the second terminal that serves as the receiving end to the public key comprises:
judging whether an encryption and decryption algorithm adopted by the uplink traffic flow of the first terminal and the downlink traffic flow of the second terminal each is the same; and
if it is judged as no, updating an encryption and decryption algorithm of the uplink traffic flow of the first terminal and an encryption and decryption algorithm of the downlink traffic flow of the second terminal, so that the encryption and decryption algorithms adopted by the uplink traffic flow of the first terminal and the downlink traffic flow of the second terminal are the same, and updating the key of the uplink traffic flow of the first terminal and the key of the downlink traffic flow of the second terminal to the public key.', 'judging whether an encryption and decryption algorithm adopted by the uplink traffic flow of the first terminal and the downlink traffic flow of the second terminal each is the same; and', 'if it is judged as no, updating an encryption and decryption algorithm of the uplink traffic flow of the first terminal and an encryption and decryption algorithm of the downlink traffic flow of the second terminal, so that the encryption and decryption algorithms adopted by the uplink traffic flow of the first terminal and the downlink traffic flow of the second terminal are the same, and updating the key of the uplink traffic flow of the first terminal and the key of the downlink traffic flow of the second terminal to the public key.
5. The method for implementing local routing of traffic according to claim 1, wherein the forwarding of the at least one encrypted data packet of the uplink traffic flow of the first terminal to the second terminal through the downlink traffic flow of the second terminal, wherein the encryption and decryption operation is not performed on the at least one encrypted data packet before the forwarding or during the forwarding, comprises:
judging, according to a key identifier carried in the at least one encrypted data packet of the uplink traffic flow of the first terminal, whether a key adopted by the at least one encrypted data packet is the public key; and
if it is judged as yes, forwarding the at least one encrypted data packet to the second terminal through the downlink traffic flow of the second terminal, wherein the encryption and decryption operation is not performed before the forwarding or during the forwarding.', 'judging, according to a key identifier carried in the at least one encrypted data packet of the uplink traffic flow of the first terminal, whether a key adopted by the at least one encrypted data packet is the public key; and', 'if it is judged as yes, forwarding the at least one encrypted data packet to the second terminal through the downlink traffic flow of the second terminal, wherein the encryption and decryption operation is not performed before the forwarding or during the forwarding.
6. A base station, comprising:
a judging module, after receiving at least one encrypted data packet in an uplink traffic flow of a first terminal that serves as a sending end, the judging module is configured to judge whether local routing processing is performed on the at least one encrypted data packet in the uplink traffic flow of the first terminal, wherein the local routing comprises routing of the at least one encrypted data packet from the first terminal to a second terminal within a network through the same base station;
an updating module, configured to update a key of the uplink traffic flow of the first terminal and/or a key of a downlink traffic flow of the second terminal that serves as a receiving end to a public key when an output result of the judging module is yes; and
a forwarding module, configured to forward the at least one encrypted data packet of the uplink traffic flow of the first terminal to the second terminal through the downlink traffic flow of the second terminal after the updating module finishes updating the key, wherein an encryption and decryption operation is not performed on the at least one encrypted data packet before the forwarding or during the forwarding.', 'a judging module, after receiving at least one encrypted data packet in an uplink traffic flow of a first terminal that serves as a sending end, the judging module is configured to judge whether local routing processing is performed on the at least one encrypted data packet in the uplink traffic flow of the first terminal, wherein the local routing comprises routing of the at least one encrypted data packet from the first terminal to a second terminal within a network through the same base station;', 'an updating module, configured to update a key of the uplink traffic flow of the first terminal and/or a key of a downlink traffic flow of the second terminal that serves as a receiving end to a public key when an output result of the judging module is yes; and', 'a forwarding module, configured to forward the at least one encrypted data packet of the uplink traffic flow of the first terminal to the second terminal through the downlink traffic flow of the second terminal after the updating module finishes updating the key, wherein an encryption and decryption operation is not performed on the at least one encrypted data packet before the forwarding or during the forwarding.', '7. The base station according to claim 6, wherein the judging module at least comprises one of the following modules:
a first judging module, configured to judge whether local routing processing is performed on the uplink traffic flow when a first encrypted data packet of the uplink traffic flow of the first terminal is received; and
a second judging module, configured to judge whether local routing processing is performed on the uplink traffic flow when the uplink traffic flow of the first terminal is created.', 'a first judging module, configured to judge whether local routing processing is performed on the uplink traffic flow when a first encrypted data packet of the uplink traffic flow of the first terminal is received; and', 'a second judging module, configured to judge whether local routing processing is performed on the uplink traffic flow when the uplink traffic flow of the first terminal is created.', '8. The base station according to claim 6, wherein the updating module comprises:
an algorithm judging module, configured to judge whether an encryption and decryption algorithm adopted by the uplink traffic flow of the first terminal and the downlink traffic flow of the second terminal each is the same;
a first updating module, configured to update the key of the uplink traffic flow of the first terminal and the key of the downlink traffic flow of the second terminal to the public key when an output result of the algorithm judging module is yes; and
a second updating module, configured to update an encryption and decryption algorithm of the uplink traffic flow of the first terminal and an encryption and decryption algorithm of the downlink traffic flow of the second terminal when the output result of the algorithm judging module is no, so that the encryption and decryption algorithms adopted by the uplink traffic flow of the first terminal and the downlink traffic flow of the second terminal are the same, and update the key of the uplink traffic flow of the first terminal and the key of the downlink traffic flow of the second terminal to the public key.', 'an algorithm judging module, configured to judge whether an encryption and decryption algorithm adopted by the uplink traffic flow of the first terminal and the downlink traffic flow of the second terminal each is the same;', 'a first updating module, configured to update the key of the uplink traffic flow of the first terminal and the key of the downlink traffic flow of the second terminal to the public key when an output result of the algorithm judging module is yes; and', 'a second updating module, configured to update an encryption and decryption algorithm of the uplink traffic flow of the first terminal and an encryption and decryption algorithm of the downlink traffic flow of the second terminal when the output result of the algorithm judging module is no, so that the encryption and decryption algorithms adopted by the uplink traffic flow of the first terminal and the downlink traffic flow of the second terminal are the same, and update the key of the uplink traffic flow of the first terminal and the key of the downlink traffic flow of the second terminal to the public key.', '9. The base station according to claim 8, wherein the forwarding module comprises:
a key judging module, configured to judge, according to a key identifier carried in the at least one encrypted data packet of the uplink traffic flow of the first terminal, whether a key adopted by the at least one encrypted data packet is the public key; and
a processing module, configured to forward the at least one encrypted data packet to the second terminal through the downlink traffic flow of the second terminal when an output result of the key judging module is yes, wherein the encryption and decryption operation is not performed on the at least one encrypted data packet before the forwarding or during the forwarding.', 'a key judging module, configured to judge, according to a key identifier carried in the at least one encrypted data packet of the uplink traffic flow of the first terminal, whether a key adopted by the at least one encrypted data packet is the public key; and', 'a processing module, configured to forward the at least one encrypted data packet to the second terminal through the downlink traffic flow of the second terminal when an output result of the key judging module is yes, wherein the encryption and decryption operation is not performed on the at least one encrypted data packet before the forwarding or during the forwarding.', '10. A communication system for performing local routing of traffic, comprising: a first terminal that serves as a sending end, a second terminal that serves as a receiving end, and a base station, wherein the performing of the local routing traffic comprises routing of at least one encrypted data packet from the first terminal to the second terminal within a network through the same base station, wherein:
the same base station after receiving the at least one encrypted data packet in an uplink traffic flow of the first terminal that serves as a sending end, the same base station is configured to judge whether local routing traffic processing is performed on the at least one encrypted data packet in the uplink traffic flow of the first terminal, and update a key of the uplink traffic flow of the first terminal and a key of a downlink traffic flow of the second terminal to a public key if a judgment result is yes; forward the at least one encrypted data packet of the uplink traffic flow of the first terminal to the second terminal through the downlink traffic flow of the second terminal, wherein an encryption and decryption operation is not performed on the at least one encrypted data packet before the forwarding or during the forwarding.', 'the same base station after receiving the at least one encrypted data packet in an uplink traffic flow of the first terminal that serves as a sending end, the same base station is configured to judge whether local routing traffic processing is performed on the at least one encrypted data packet in the uplink traffic flow of the first terminal, and update a key of the uplink traffic flow of the first terminal and a key of a downlink traffic flow of the second terminal to a public key if a judgment result is yes; forward the at least one encrypted data packet of the uplink traffic flow of the first terminal to the second terminal through the downlink traffic flow of the second terminal, wherein an encryption and decryption operation is not performed on the at least one encrypted data packet before the forwarding or during the forwarding.']
Associated Portfolios

![]() |
![]() |
![]() |
![]() |
---|---|---|---|
Claim charts will soon be available!
|
SUMMARY
ClaimChart-US9215221B2-STO
Patent number:US9215221B2
Claim Chart Type : SEP Claim Chart
Price: 200 €
To view claim charts you must become a Gold or Platinum Member.
Upgrade your subscriptionYou have reached the maximum number of patents which can be associated to your account per your subscription. If you wish to associate more patents
Please upgrade your subscription.Note:
The information in blue was extracted from the third parties (Standard Setting Organisation, Espacenet)
The information in grey was provided by the patent holder
The information in purple was extracted from the FrandAvenue
Explicitly disclosed patent:openly and comprehensibly describes all details of the invention in the patent document.
Implicitly disclosed patent:does not explicitly state certain aspects of the invention, but still allows for these to be inferred from the information provided.
Basis patent:The core patent in a family, outlining the fundamental invention from which related patents or applications originate.
Family member:related patents or applications that share a common priority or original filing.