CN112040479B - Method and system for transmitting encrypted information in real time for information security - Google Patents
Method and system for transmitting encrypted information in real time for information security Download PDFInfo
- Publication number
- CN112040479B CN112040479B CN202011021033.6A CN202011021033A CN112040479B CN 112040479 B CN112040479 B CN 112040479B CN 202011021033 A CN202011021033 A CN 202011021033A CN 112040479 B CN112040479 B CN 112040479B
- Authority
- CN
- China
- Prior art keywords
- transmitting
- message
- pusch message
- pusch
- base station
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 230000004044 response Effects 0.000 claims abstract description 102
- 238000004891 communication Methods 0.000 claims abstract description 14
- 230000005540 biological transmission Effects 0.000 claims description 37
- 238000010586 diagram Methods 0.000 description 8
- 238000004590 computer program Methods 0.000 description 7
- 230000006870 function Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 238000004364 calculation method Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000004422 calculation algorithm Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000003071 parasitic effect Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/04—Wireless resource allocation
- H04W72/044—Wireless resource allocation based on the type of the allocated resource
- H04W72/0453—Resources in frequency domain, e.g. a carrier in FDMA
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/12—Wireless traffic scheduling
- H04W72/1263—Mapping of traffic onto schedule, e.g. scheduled allocation or multiplexing of flows
- H04W72/1268—Mapping of traffic onto schedule, e.g. scheduled allocation or multiplexing of flows of uplink data flows
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/20—Control channels or signalling for resource management
- H04W72/23—Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a method for transmitting encrypted information in real time for information security, which comprises the following steps: collecting, by the mobile terminal, the encrypted information; establishing, by the mobile terminal, a communication connection with the base station in response to collecting the encrypted information; determining, by the mobile terminal, PUCCH resources for transmitting the scheduling request in response to establishing the communication connection with the base station; transmitting, by the mobile terminal, a scheduling request to the base station in response to determining PUCCH resources for transmitting the scheduling request; in response to receiving the scheduling request, determining, by the base station, an operation mode of the base station; if the operation mode of the base station is judged to be the first operation mode, the base station sends a first PDCCH message and a second PDCCH message to the mobile terminal; in response to receiving the first PDCCH message, transmitting, by the mobile terminal, the first PUSCH message to the base station on resources for transmitting the first PUSCH message; in response to receiving the second PDCCH message, the second PUSCH message is transmitted by the mobile terminal to the base station on resources used to transmit the second PUSCH message.
Description
Technical Field
The present invention relates to the field of information security technologies, and in particular, to a method and a system for transmitting encrypted information in real time for information security.
Background
Information security mainly includes the following five aspects, namely confidentiality, authenticity, integrity, unauthorized copying and security of parasitic systems of the information need to be ensured. Information security itself includes a wide range of information including how to protect against confidential leakage from commercial enterprises, to protect against browsing of bad information by teenagers, leakage of personal information, and the like. The information security system in the network environment is the key for ensuring the information security, and comprises a computer security operation system, various security protocols and security mechanisms (digital signature, message authentication, data encryption and the like), until the security system, the global security can be threatened as long as security holes exist. Information security means that an information system (including hardware, software, data, people, physical environments and infrastructure thereof) is protected from being damaged, altered and leaked by accidental or malicious reasons, the system continuously and reliably operates normally, information service is not interrupted, and service continuity is finally realized.
The prior art CN111371545B discloses an encryption method based on privacy protection. The method comprises the following steps: acquiring a ciphertext obtained by encrypting the data by a data owner through a semi-homomorphic encryption algorithm; the ciphertext is subjected to first calculation to obtain a standard type; the standard is a calculation made by the data owner; generating a random number; disturbing the standard type based on the random number to obtain a disturbance type; sending the disturbance formula to the data owner for calculation to obtain a disturbance formula result; obtaining an encryption disturbance result; and obtaining an encryption result based on the encryption disturbance type result, the standard type, the random number and the disturbance.
The information disclosed in this background section is only for enhancement of understanding of the general background of the invention and should not be taken as an acknowledgement or any form of suggestion that this information forms the prior art already known to a person of ordinary skill in the art.
Disclosure of Invention
The invention aims to provide a method and a system for transmitting encrypted information in real time for information security, which can overcome the defects of the prior art.
To achieve the above object, the present invention provides a method for transmitting encrypted information in real time for information security, comprising the steps of: collecting, by the mobile terminal, the encrypted information; establishing, by the mobile terminal, a communication connection with the base station in response to collecting the encrypted information; determining, by the mobile terminal, PUCCH resources for transmitting the scheduling request in response to establishing the communication connection with the base station; transmitting, by the mobile terminal, a scheduling request to the base station in response to determining PUCCH resources for transmitting the scheduling request; in response to receiving the scheduling request, determining, by the base station, an operation mode of the base station; if the operation mode of the base station is judged to be a first operation mode, the base station sends a first PDCCH message and a second PDCCH message to the mobile terminal, wherein the first PDCCH message comprises a first uplink grant, the first uplink grant indicates resources for sending the first PUSCH message, the second PDCCH message comprises a second uplink grant, and the second uplink grant indicates resources for sending the second PUSCH message; in response to receiving the first PDCCH message, transmitting, by the mobile terminal, the first PUSCH message to the base station on resources for transmitting the first PUSCH message, wherein the encryption information is included in the first PUSCH message, wherein the resources for transmitting the first PUSCH message are located on a first frequency band, the resources for transmitting the first PUSCH message occupy a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot; in response to receiving the second PDCCH message, transmitting, by the mobile terminal, a second PUSCH message to the base station on resources for transmitting the second PUSCH message, wherein the second PUSCH message includes a copy of the encryption information, wherein the resources for transmitting the second PUSCH message are located on a second frequency band, wherein the resources for transmitting the second PUSCH message occupy a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, wherein the first symbol for transmitting the second PUSCH message is located at a beginning of the second time slot; in response to receiving the encryption information, the encryption information is transmitted by the base station to the encryption server.
In a preferred embodiment, the method for secure real-time transmission of encrypted information comprises the steps of: if the operation mode of the base station is judged to be a second operation mode, the base station sends a first PDCCH message to the mobile terminal, wherein the first PDCCH message comprises a first uplink grant, the first uplink grant indicates resources for sending a first PUSCH message and a second PUSCH message, the first PDCCH message indicates that the mobile terminal needs to send the second PUSCH message, and the first PDCCH message indicates that the mobile terminal immediately sends the second PUSCH message after sending the first PUSCH message; in response to receiving the first PDCCH message, transmitting, by the mobile terminal, the first PUSCH message to the base station on resources for transmitting the first PUSCH message, wherein the encryption information is included in the first PUSCH message, wherein the resources for transmitting the first PUSCH message are located on a first frequency band, the resources for transmitting the first PUSCH message occupy a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot; in response to receiving the first PDCCH message, transmitting, by the mobile terminal, a second PUSCH message to the base station on resources for transmitting the second PUSCH message, wherein the second PUSCH message includes a copy of the encryption information, wherein the resources for transmitting the second PUSCH message are located on a second frequency band, wherein the resources for transmitting the second PUSCH message occupy a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, wherein the first symbol for transmitting the second PUSCH message is located at a beginning of the second time slot; in response to receiving the encryption information, the encryption information is transmitted by the base station to the encryption server.
In a preferred embodiment, the method for secure real-time transmission of encrypted information comprises the steps of: if the operation mode of the base station is judged to be a third operation mode, the base station sends a first PDCCH message and a second PDCCH message to the mobile terminal, wherein the first PDCCH message comprises a first uplink grant, the first uplink grant indicates resources for sending the first PUSCH message, the second PDCCH message comprises a second uplink grant, and the second uplink grant indicates resources for sending the second PUSCH message; in response to receiving the first PDCCH message, transmitting, by the mobile terminal, the first PUSCH message to the base station on resources for transmitting the first PUSCH message, wherein the encryption information is included in the first PUSCH message, wherein the resources for transmitting the first PUSCH message are located on a first frequency band, the resources for transmitting the first PUSCH message occupy a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot; in response to receiving the second PDCCH message, transmitting, by the mobile terminal, the second PUSCH message to the base station on resources for transmitting the second PUSCH message, wherein the second PUSCH message includes a copy of the encryption information, wherein the resources for transmitting the second PUSCH message are located on a second frequency band, the resources for transmitting the second PUSCH message occupy a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, and the first frequency band and the second frequency band belong to different bandwidth portions BWP, wherein a first symbol for transmitting the second PUSCH message and a last symbol for transmitting the first PUSCH message are separated by a plurality of symbols; in response to receiving the encryption information, the encryption information is transmitted by the base station to the encryption server.
In a preferred embodiment, the method for secure real-time transmission of encrypted information comprises the steps of: if the operation mode of the base station is judged to be a fourth operation mode, the base station sends a first PDCCH message to the mobile terminal, wherein the first PDCCH message comprises a first uplink grant, the first uplink grant indicates resources for sending a first PUSCH message and a second PUSCH message, the first PDCCH message indicates that the mobile terminal needs to send the second PUSCH message, and the first PDCCH message indicates that the mobile terminal immediately sends the second PUSCH message after sending the first PUSCH message; in response to receiving the first PDCCH message, transmitting, by the mobile terminal, the first PUSCH message to the base station on resources for transmitting the first PUSCH message, wherein the encryption information is included in the first PUSCH message, wherein the resources for transmitting the first PUSCH message are located on a first frequency band, the resources for transmitting the first PUSCH message occupy a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot.
In a preferred embodiment, the method for secure real-time transmission of encrypted information comprises the steps of: in response to receiving the first PDCCH message, transmitting, by the mobile terminal, a second PUSCH message to the base station on resources for transmitting the second PUSCH message, wherein the second PUSCH message includes a copy of the encryption information, wherein the resources for transmitting the second PUSCH message are located on a second frequency band, the resources for transmitting the second PUSCH message occupy a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, and the first frequency band and the second frequency band belong to different bandwidth portions BWP, wherein a first symbol for transmitting the second PUSCH message and a last symbol for transmitting the first PUSCH message are separated by a plurality of symbols; in response to receiving the encryption information, the encryption information is transmitted by the base station to the encryption server.
The invention also provides a system for transmitting the encrypted information in real time for information security, which comprises: a unit for collecting encryption information by the mobile terminal; means for establishing a communication connection by the mobile terminal with the base station in response to collecting the encrypted information; means for determining, by the mobile terminal, PUCCH resources for transmitting the scheduling request in response to establishing the communication connection with the base station; means for transmitting, by the mobile terminal, a scheduling request to the base station in response to determining PUCCH resources for transmitting the scheduling request; means for determining, by the base station, an operation mode of the base station in response to receiving the scheduling request; if the operation mode of the base station is the first operation mode, the base station sends a first PDCCH message and a second PDCCH message to the mobile terminal, wherein the first PDCCH message comprises a first uplink grant, the first uplink grant indicates resources for sending the first PUSCH message, the second PDCCH message comprises a second uplink grant, and the second uplink grant indicates resources for sending the second PUSCH message; means for transmitting, by the mobile terminal, a first PUSCH message to the base station on resources for transmitting the first PUSCH message in response to receiving the first PDCCH message, wherein the ciphering information is included in the first PUSCH message, wherein the resources for transmitting the first PUSCH message are located on a first frequency band, the resources for transmitting the first PUSCH message occupy a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot; transmitting, by the mobile terminal, a second PUSCH message to the base station on resources for transmitting the second PUSCH message in response to receiving the second PDCCH message, wherein the second PUSCH message includes a copy of the encryption information, wherein the resources for transmitting the second PUSCH message are located on a second frequency band, wherein the resources for transmitting the second PUSCH message occupy a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, wherein the first symbol for transmitting the second PUSCH message is located at a beginning of the second time slot; and means for transmitting, by the base station, the encrypted information to the encryption server in response to receiving the encrypted information.
In a preferred embodiment, a system for secure real-time transmission of encrypted information comprises: a unit configured to send a first PDCCH message to the mobile terminal by the base station if the operation mode of the base station is determined to be the second operation mode, where the first PDCCH message includes a first uplink grant, where the first uplink grant indicates resources for sending a first PUSCH message and a second PUSCH message, where the first PDCCH message indicates that the mobile terminal needs to send the second PUSCH message, and where the first PDCCH message indicates that the mobile terminal sends the second PUSCH message immediately after sending the first PUSCH message; means for transmitting, by the mobile terminal, a first PUSCH message to the base station on resources for transmitting the first PUSCH message in response to receiving the first PDCCH message, wherein the ciphering information is included in the first PUSCH message, wherein the resources for transmitting the first PUSCH message are located on a first frequency band, the resources for transmitting the first PUSCH message occupy a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot; transmitting, by the mobile terminal, a second PUSCH message to the base station on resources for transmitting the second PUSCH message in response to receiving the first PDCCH message, wherein the second PUSCH message includes a copy of the encryption information, wherein the resources for transmitting the second PUSCH message are located on a second frequency band, wherein the resources for transmitting the second PUSCH message occupy a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, wherein the first symbol for transmitting the second PUSCH message is located at a beginning of the second time slot; and means for transmitting, by the base station, the encrypted information to the encryption server in response to receiving the encrypted information.
In a preferred embodiment, a system for secure real-time transmission of encrypted information comprises: if the operation mode of the base station is the third operation mode, the base station sends a first PDCCH message and a second PDCCH message to the mobile terminal, wherein the first PDCCH message comprises a first uplink grant, the first uplink grant indicates resources for sending the first PUSCH message, the second PDCCH message comprises a second uplink grant, and the second uplink grant indicates resources for sending the second PUSCH message; means for transmitting, by the mobile terminal, a first PUSCH message to the base station on resources for transmitting the first PUSCH message in response to receiving the first PDCCH message, wherein the ciphering information is included in the first PUSCH message, wherein the resources for transmitting the first PUSCH message are located on a first frequency band, the resources for transmitting the first PUSCH message occupy a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot; transmitting, by the mobile terminal, a second PUSCH message to the base station on resources for transmitting the second PUSCH message in response to receiving the second PDCCH message, wherein the second PUSCH message includes a copy of the encryption information, wherein the resources for transmitting the second PUSCH message are located on a second frequency band, wherein the resources for transmitting the second PUSCH message occupy a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, and the first frequency band and the second frequency band belong to different bandwidth portions BWP, wherein a first symbol for transmitting the second PUSCH message and a last symbol for transmitting the first PUSCH message are separated by a plurality of symbols; and means for transmitting, by the base station, the encrypted information to the encryption server in response to receiving the encrypted information.
In a preferred embodiment, a system for secure real-time transmission of encrypted information comprises: a unit configured to send a first PDCCH message to the mobile terminal by the base station if the operation mode of the base station is determined to be a fourth operation mode, where the first PDCCH message includes a first uplink grant, where the first uplink grant indicates resources for sending a first PUSCH message and a second PUSCH message, where the first PDCCH message indicates that the mobile terminal needs to send the second PUSCH message, and where the first PDCCH message indicates that the mobile terminal sends the second PUSCH message immediately after sending the first PUSCH message; and means for transmitting, by the mobile terminal, the first PUSCH message to the base station on resources for transmitting the first PUSCH message in response to receiving the first PDCCH message, wherein the ciphering information is included in the first PUSCH message, wherein the resources for transmitting the first PUSCH message are located on a first frequency band, the resources for transmitting the first PUSCH message occupy a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot.
In a preferred embodiment, a system for secure real-time transmission of encrypted information comprises: transmitting, by the mobile terminal, a second PUSCH message to the base station on resources for transmitting the second PUSCH message in response to receiving the first PDCCH message, wherein the second PUSCH message includes a copy of the encryption information, wherein the resources for transmitting the second PUSCH message are located on a second frequency band, wherein the resources for transmitting the second PUSCH message occupy a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, and the first frequency band and the second frequency band belong to different bandwidth portions BWP, wherein a first symbol for transmitting the second PUSCH message and a last symbol for transmitting the first PUSCH message are separated by a plurality of symbols; and means for transmitting, by the base station, the encrypted information to the encryption server in response to receiving the encrypted information.
Compared with the prior art, the method and the system for transmitting the encrypted information in real time for information security have the following advantages: in the internet age, various information of people can be transmitted by means of a network, and with the progress of technology and society, even if individuals do not want to transmit through the network, various companies and organizations can require individuals to transmit some information through the network. Thus, information security is particularly important in the present internet age, and information security is of course required to rely on the progress of encryption technology, but information security itself is also independent of information transmission. Based on the knowledge, the application provides a method and a system for transmitting encrypted information in real time for information security.
Drawings
Fig. 1 is a schematic diagram of a system architecture according to an embodiment of the present application.
FIG. 2 is a flow chart of a method according to an embodiment of the application.
Detailed Description
The following detailed description of embodiments of the application is, therefore, to be taken in conjunction with the accompanying drawings, and it is to be understood that the scope of the application is not limited to the specific embodiments.
Throughout the specification and claims, unless explicitly stated otherwise, the term "comprise" or variations thereof such as "comprises" or "comprising", etc. will be understood to include the stated element or component without excluding other elements or components.
Example 1
Fig. 1 is a schematic diagram of a system architecture according to an embodiment of the present application.
FIG. 2 is a flow chart of a method according to an embodiment of the application. As shown in fig. 2, the method for transmitting encrypted information in real time for information security of the present application comprises the steps of:
step 101: collecting encryption information by the mobile terminal, wherein the encryption information refers to all information related to data encryption, such as an identity verification code, can also be included in the scope of the encryption information of the application;
step 102: establishing, by the mobile terminal, a communication connection with the base station in response to collecting the encrypted information;
step 103: determining, by the mobile terminal, PUCCH resources for transmitting the scheduling request, which may be resources periodically allocated to the mobile terminal by the base station, in response to establishing the communication connection with the base station;
step 104: transmitting, by the mobile terminal, a scheduling request to the base station in response to determining PUCCH resources for transmitting the scheduling request;
step 105: in response to receiving the scheduling request, determining, by the base station, an operation mode of the base station;
step 106: if the operation mode of the base station is judged to be a first operation mode, the base station sends a first PDCCH message and a second PDCCH message to the mobile terminal, wherein the first PDCCH message comprises a first uplink grant, the first uplink grant indicates resources for sending the first PUSCH message, the second PDCCH message comprises a second uplink grant, and the second uplink grant indicates resources for sending the second PUSCH message;
Step 107: in response to receiving the first PDCCH message, transmitting, by the mobile terminal, the first PUSCH message to the base station on resources for transmitting the first PUSCH message, wherein the encryption information is included in the first PUSCH message, wherein the resources for transmitting the first PUSCH message are located on a first frequency band, the resources for transmitting the first PUSCH message occupy a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot;
step 108: transmitting, by the mobile terminal, a second PUSCH message to the base station on a resource for transmitting the second PUSCH message in response to receiving the second PDCCH message, wherein the second PUSCH message includes a copy of the encryption information (the copy of the encryption information refers to a copy of the encryption information or copy of the encryption information that is identical to the encryption information), wherein the resource for transmitting the second PUSCH message is located on a second frequency band, the resource for transmitting the second PUSCH message occupies a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap with the first frequency band, wherein the first symbol for transmitting the second PUSCH message is located at a beginning of the second time slot, wherein "immediately following the first time slot" refers to the first time slot and the second time slot being two time slots that are temporally consecutive, for example, the relationship between the first time slot and the second time slot in one LTE subframe is "the second time slot is the time slot immediately following the first time slot";
Step 109: in response to receiving the encryption information, the encryption information is transmitted by the base station to the encryption server.
Example 2
In a preferred embodiment, the method for secure real-time transmission of encrypted information comprises the steps of: if the operation mode of the base station is judged to be a second operation mode, the base station sends a first PDCCH message to the mobile terminal, wherein the first PDCCH message comprises a first uplink grant, the first uplink grant indicates resources for sending a first PUSCH message and a second PUSCH message, the first PDCCH message indicates that the mobile terminal needs to send the second PUSCH message, and the first PDCCH message indicates that the mobile terminal immediately sends the second PUSCH message after sending the first PUSCH message; in response to receiving the first PDCCH message, transmitting, by the mobile terminal, the first PUSCH message to the base station on resources for transmitting the first PUSCH message, wherein the encryption information is included in the first PUSCH message, wherein the resources for transmitting the first PUSCH message are located on a first frequency band, the resources for transmitting the first PUSCH message occupy a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot; in response to receiving the first PDCCH message, transmitting, by the mobile terminal, a second PUSCH message to the base station on resources for transmitting the second PUSCH message, wherein the second PUSCH message includes a copy of the encryption information, wherein the resources for transmitting the second PUSCH message are located on a second frequency band, wherein the resources for transmitting the second PUSCH message occupy a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, wherein the first symbol for transmitting the second PUSCH message is located at a beginning of the second time slot; in response to receiving the encryption information, the encryption information is transmitted by the base station to the encryption server.
In a preferred embodiment, the method for secure real-time transmission of encrypted information comprises the steps of: if the operation mode of the base station is judged to be a third operation mode, the base station sends a first PDCCH message and a second PDCCH message to the mobile terminal, wherein the first PDCCH message comprises a first uplink grant, the first uplink grant indicates resources for sending the first PUSCH message, the second PDCCH message comprises a second uplink grant, and the second uplink grant indicates resources for sending the second PUSCH message; in response to receiving the first PDCCH message, transmitting, by the mobile terminal, the first PUSCH message to the base station on resources for transmitting the first PUSCH message, wherein the encryption information is included in the first PUSCH message, wherein the resources for transmitting the first PUSCH message are located on a first frequency band, the resources for transmitting the first PUSCH message occupy a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot; in response to receiving the second PDCCH message, transmitting, by the mobile terminal, the second PUSCH message to the base station on resources for transmitting the second PUSCH message, wherein the second PUSCH message includes a copy of the encryption information, wherein the resources for transmitting the second PUSCH message are located on a second frequency band, the resources for transmitting the second PUSCH message occupy a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, and the first frequency band and the second frequency band belong to different bandwidth portions BWP, wherein a first symbol for transmitting the second PUSCH message and a last symbol for transmitting the first PUSCH message are separated by a plurality of symbols; in response to receiving the encryption information, the encryption information is transmitted by the base station to the encryption server.
In a preferred embodiment, the method for secure real-time transmission of encrypted information comprises the steps of: if the operation mode of the base station is judged to be a fourth operation mode, the base station sends a first PDCCH message to the mobile terminal, wherein the first PDCCH message comprises a first uplink grant, the first uplink grant indicates resources for sending a first PUSCH message and a second PUSCH message, the first PDCCH message indicates that the mobile terminal needs to send the second PUSCH message, and the first PDCCH message indicates that the mobile terminal immediately sends the second PUSCH message after sending the first PUSCH message; in response to receiving the first PDCCH message, transmitting, by the mobile terminal, the first PUSCH message to the base station on resources for transmitting the first PUSCH message, wherein the encryption information is included in the first PUSCH message, wherein the resources for transmitting the first PUSCH message are located on a first frequency band, the resources for transmitting the first PUSCH message occupy a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot.
In a preferred embodiment, the method for secure real-time transmission of encrypted information comprises the steps of: in response to receiving the first PDCCH message, transmitting, by the mobile terminal, a second PUSCH message to the base station on resources for transmitting the second PUSCH message, wherein the second PUSCH message includes a copy of the encryption information, wherein the resources for transmitting the second PUSCH message are located on a second frequency band, the resources for transmitting the second PUSCH message occupy a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, and the first frequency band and the second frequency band belong to different bandwidth portions BWP, wherein a first symbol for transmitting the second PUSCH message and a last symbol for transmitting the first PUSCH message are separated by a plurality of symbols; in response to receiving the encryption information, the encryption information is transmitted by the base station to the encryption server.
Example 3
In another preferred embodiment, the present invention also provides a system for transmitting encrypted information in real time for information security, comprising: a unit for collecting encryption information by the mobile terminal; means for establishing a communication connection by the mobile terminal with the base station in response to collecting the encrypted information; means for determining, by the mobile terminal, PUCCH resources for transmitting the scheduling request in response to establishing the communication connection with the base station; means for transmitting, by the mobile terminal, a scheduling request to the base station in response to determining PUCCH resources for transmitting the scheduling request; means for determining, by the base station, an operation mode of the base station in response to receiving the scheduling request; if the operation mode of the base station is the first operation mode, the base station sends a first PDCCH message and a second PDCCH message to the mobile terminal, wherein the first PDCCH message comprises a first uplink grant, the first uplink grant indicates resources for sending the first PUSCH message, the second PDCCH message comprises a second uplink grant, and the second uplink grant indicates resources for sending the second PUSCH message; means for transmitting, by the mobile terminal, a first PUSCH message to the base station on resources for transmitting the first PUSCH message in response to receiving the first PDCCH message, wherein the ciphering information is included in the first PUSCH message, wherein the resources for transmitting the first PUSCH message are located on a first frequency band, the resources for transmitting the first PUSCH message occupy a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot; transmitting, by the mobile terminal, a second PUSCH message to the base station on resources for transmitting the second PUSCH message in response to receiving the second PDCCH message, wherein the second PUSCH message includes a copy of the encryption information, wherein the resources for transmitting the second PUSCH message are located on a second frequency band, wherein the resources for transmitting the second PUSCH message occupy a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, wherein the first symbol for transmitting the second PUSCH message is located at a beginning of the second time slot; and means for transmitting, by the base station, the encrypted information to the encryption server in response to receiving the encrypted information.
Example 4
In a preferred embodiment, a system for secure real-time transmission of encrypted information comprises: a unit configured to send a first PDCCH message to the mobile terminal by the base station if the operation mode of the base station is determined to be the second operation mode, where the first PDCCH message includes a first uplink grant, where the first uplink grant indicates resources for sending a first PUSCH message and a second PUSCH message, where the first PDCCH message indicates that the mobile terminal needs to send the second PUSCH message, and where the first PDCCH message indicates that the mobile terminal sends the second PUSCH message immediately after sending the first PUSCH message; means for transmitting, by the mobile terminal, a first PUSCH message to the base station on resources for transmitting the first PUSCH message in response to receiving the first PDCCH message, wherein the ciphering information is included in the first PUSCH message, wherein the resources for transmitting the first PUSCH message are located on a first frequency band, the resources for transmitting the first PUSCH message occupy a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot; transmitting, by the mobile terminal, a second PUSCH message to the base station on resources for transmitting the second PUSCH message in response to receiving the first PDCCH message, wherein the second PUSCH message includes a copy of the encryption information, wherein the resources for transmitting the second PUSCH message are located on a second frequency band, wherein the resources for transmitting the second PUSCH message occupy a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, wherein the first symbol for transmitting the second PUSCH message is located at a beginning of the second time slot; and means for transmitting, by the base station, the encrypted information to the encryption server in response to receiving the encrypted information.
In a preferred embodiment, a system for secure real-time transmission of encrypted information comprises: if the operation mode of the base station is the third operation mode, the base station sends a first PDCCH message and a second PDCCH message to the mobile terminal, wherein the first PDCCH message comprises a first uplink grant, the first uplink grant indicates resources for sending the first PUSCH message, the second PDCCH message comprises a second uplink grant, and the second uplink grant indicates resources for sending the second PUSCH message; means for transmitting, by the mobile terminal, a first PUSCH message to the base station on resources for transmitting the first PUSCH message in response to receiving the first PDCCH message, wherein the ciphering information is included in the first PUSCH message, wherein the resources for transmitting the first PUSCH message are located on a first frequency band, the resources for transmitting the first PUSCH message occupy a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot; transmitting, by the mobile terminal, a second PUSCH message to the base station on resources for transmitting the second PUSCH message in response to receiving the second PDCCH message, wherein the second PUSCH message includes a copy of the encryption information, wherein the resources for transmitting the second PUSCH message are located on a second frequency band, wherein the resources for transmitting the second PUSCH message occupy a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, and the first frequency band and the second frequency band belong to different bandwidth portions BWP, wherein a first symbol for transmitting the second PUSCH message and a last symbol for transmitting the first PUSCH message are separated by a plurality of symbols; and means for transmitting, by the base station, the encrypted information to the encryption server in response to receiving the encrypted information.
In a preferred embodiment, a system for secure real-time transmission of encrypted information comprises: a unit configured to send a first PDCCH message to the mobile terminal by the base station if the operation mode of the base station is determined to be a fourth operation mode, where the first PDCCH message includes a first uplink grant, where the first uplink grant indicates resources for sending a first PUSCH message and a second PUSCH message, where the first PDCCH message indicates that the mobile terminal needs to send the second PUSCH message, and where the first PDCCH message indicates that the mobile terminal sends the second PUSCH message immediately after sending the first PUSCH message; and means for transmitting, by the mobile terminal, the first PUSCH message to the base station on resources for transmitting the first PUSCH message in response to receiving the first PDCCH message, wherein the ciphering information is included in the first PUSCH message, wherein the resources for transmitting the first PUSCH message are located on a first frequency band, the resources for transmitting the first PUSCH message occupy a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot.
In a preferred embodiment, a system for secure real-time transmission of encrypted information comprises: transmitting, by the mobile terminal, a second PUSCH message to the base station on resources for transmitting the second PUSCH message in response to receiving the first PDCCH message, wherein the second PUSCH message includes a copy of the encryption information, wherein the resources for transmitting the second PUSCH message are located on a second frequency band, wherein the resources for transmitting the second PUSCH message occupy a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, and the first frequency band and the second frequency band belong to different bandwidth portions BWP, wherein a first symbol for transmitting the second PUSCH message and a last symbol for transmitting the first PUSCH message are separated by a plurality of symbols; and means for transmitting, by the base station, the encrypted information to the encryption server in response to receiving the encrypted information.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The foregoing descriptions of specific exemplary embodiments of the present invention are presented for purposes of illustration and description. It is not intended to limit the invention to the precise form disclosed, and obviously many modifications and variations are possible in light of the above teaching. The exemplary embodiments were chosen and described in order to explain the specific principles of the invention and its practical application to thereby enable one skilled in the art to make and utilize the invention in various exemplary embodiments and with various modifications as are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the claims and their equivalents.
Claims (10)
1. A method for information-secure real-time transmission of encrypted information, the method for information-secure real-time transmission of encrypted information comprising the steps of:
collecting, by the mobile terminal, the encrypted information;
establishing, by the mobile terminal, a communication connection with the base station in response to collecting the encrypted information;
determining, by the mobile terminal, PUCCH resources for transmitting the scheduling request in response to establishing the communication connection with the base station;
transmitting, by the mobile terminal, a scheduling request to the base station in response to determining PUCCH resources for transmitting the scheduling request;
in response to receiving the scheduling request, judging an operation mode of the base station by the base station;
if the operation mode of the base station is judged to be a first operation mode, a base station sends a first PDCCH message and a second PDCCH message to the mobile terminal, wherein the first PDCCH message comprises a first uplink grant, the first uplink grant indicates resources for sending a first PUSCH message, the second PDCCH message comprises a second uplink grant, and the second uplink grant indicates resources for sending a second PUSCH message;
In response to receiving the first PDCCH message, transmitting, by the mobile terminal, a first PUSCH message to the base station on the resource for transmitting the first PUSCH message, wherein the encryption information is included in the first PUSCH message, wherein the resource for transmitting the first PUSCH message is located on a first frequency band, the resource for transmitting the first PUSCH message occupies a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot;
transmitting, by the mobile terminal, a second PUSCH message to the base station on the resource for transmitting a second PUSCH message in response to receiving the second PDCCH message, wherein the second PUSCH message includes a copy of the encryption information, wherein the resource for transmitting a second PUSCH message is located on a second frequency band, the resource for transmitting a second PUSCH message occupies a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, wherein a first symbol for transmitting a second PUSCH message is located at a beginning of the second time slot;
The encrypted information is sent by the base station to the encryption server in response to receiving the encrypted information.
2. The method for information-secured real-time transmission of encrypted information according to claim 1, wherein the method for information-secured real-time transmission of encrypted information comprises the steps of:
if the operation mode of the base station is judged to be a second operation mode, a first PDCCH message is sent to the mobile terminal by the base station, wherein the first PDCCH message comprises a first uplink grant, the first uplink grant indicates resources for sending a first PUSCH message and a second PUSCH message, the first PDCCH message indicates that the mobile terminal needs to send a second PUSCH message, and the first PDCCH message indicates that the mobile terminal immediately sends the second PUSCH message after sending the first PUSCH message;
in response to receiving the first PDCCH message, transmitting, by the mobile terminal, a first PUSCH message to the base station on the resource for transmitting the first PUSCH message, wherein the encryption information is included in the first PUSCH message, wherein the resource for transmitting the first PUSCH message is located on a first frequency band, the resource for transmitting the first PUSCH message occupies a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot;
Transmitting, by the mobile terminal, a second PUSCH message to the base station on the resource for transmitting a second PUSCH message in response to receiving the first PDCCH message, wherein the second PUSCH message includes a copy of the encryption information, wherein the resource for transmitting a second PUSCH message is located on a second frequency band, the resource for transmitting a second PUSCH message occupies a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, wherein a first symbol for transmitting a second PUSCH message is located at a beginning of the second time slot;
the encrypted information is sent by the base station to the encryption server in response to receiving the encrypted information.
3. The method for information-secured real-time transmission of encrypted information according to claim 2, wherein the method for information-secured real-time transmission of encrypted information comprises the steps of:
if the operation mode of the base station is judged to be a third operation mode, a base station sends a first PDCCH message and a second PDCCH message to the mobile terminal, wherein the first PDCCH message comprises a first uplink grant, the first uplink grant indicates resources for sending a first PUSCH message, the second PDCCH message comprises a second uplink grant, and the second uplink grant indicates resources for sending a second PUSCH message;
In response to receiving the first PDCCH message, transmitting, by the mobile terminal, a first PUSCH message to the base station on the resource for transmitting the first PUSCH message, wherein the encryption information is included in the first PUSCH message, wherein the resource for transmitting the first PUSCH message is located on a first frequency band, the resource for transmitting the first PUSCH message occupies a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot;
transmitting, by the mobile terminal, a second PUSCH message to the base station on the resource for transmitting a second PUSCH message in response to receiving the second PDCCH message, wherein the second PUSCH message includes a copy of the encryption information, wherein the resource for transmitting a second PUSCH message is located on a second frequency band, the resource for transmitting a second PUSCH message occupies a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, and the first frequency band and the second frequency band belong to different bandwidth portions BWP, wherein a first symbol for transmitting a second PUSCH message is spaced apart from a last symbol for transmitting a first PUSCH message by a plurality of symbols;
The encrypted information is sent by the base station to the encryption server in response to receiving the encrypted information.
4. The method for information-secured real-time transmission of encrypted information according to claim 3, wherein the method for information-secured real-time transmission of encrypted information comprises the steps of:
if the operation mode of the base station is judged to be a fourth operation mode, a first PDCCH message is sent to the mobile terminal by the base station, wherein the first PDCCH message comprises a first uplink grant, the first uplink grant indicates resources for sending a first PUSCH message and a second PUSCH message, the first PDCCH message indicates that the mobile terminal needs to send a second PUSCH message, and the first PDCCH message indicates that the mobile terminal immediately sends the second PUSCH message after sending the first PUSCH message;
in response to receiving the first PDCCH message, transmitting, by the mobile terminal, a first PUSCH message to the base station on the resource for transmitting the first PUSCH message, wherein the encryption information is included in the first PUSCH message, wherein the resource for transmitting the first PUSCH message is located on a first frequency band, the resource for transmitting the first PUSCH message occupies a plurality of symbols in a first time slot, and wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot.
5. The method for information-secured real-time transmission of encrypted information according to claim 4, wherein the method for information-secured real-time transmission of encrypted information comprises the steps of:
transmitting, by the mobile terminal, a second PUSCH message to the base station on the resource for transmitting a second PUSCH message in response to receiving the first PDCCH message, wherein the second PUSCH message includes a copy of the encryption information, wherein the resource for transmitting the second PUSCH message is located on a second frequency band, the resource for transmitting the second PUSCH message occupies a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, and the first frequency band and the second frequency band belong to different bandwidth portions BWP, wherein a first symbol for transmitting the second PUSCH message is spaced apart from a last symbol for transmitting the first PUSCH message by a plurality of symbols;
the encrypted information is sent by the base station to the encryption server in response to receiving the encrypted information.
6. A system for secure real-time transmission of encrypted information, the system for secure real-time transmission of encrypted information comprising:
A unit for collecting encryption information by the mobile terminal;
means for establishing a communication connection by the mobile terminal with the base station in response to collecting the encrypted information;
means for determining, by the mobile terminal, PUCCH resources for transmitting the scheduling request in response to establishing the communication connection with the base station;
means for transmitting, by a mobile terminal, a scheduling request to the base station in response to determining PUCCH resources for transmitting the scheduling request;
means for determining, by a base station, an operating mode of the base station in response to receiving the scheduling request;
if the operation mode of the base station is judged to be a first operation mode, the base station sends a first PDCCH message and a second PDCCH message to the mobile terminal, wherein the first PDCCH message comprises a first uplink grant, the first uplink grant indicates resources for sending the first PUSCH message, the second PDCCH message comprises a second uplink grant, and the second uplink grant indicates resources for sending the second PUSCH message;
means for transmitting, by a mobile terminal, a first PUSCH message to the base station on the resource for transmitting the first PUSCH message in response to receiving the first PDCCH message, wherein the encryption information is included in the first PUSCH message, wherein the resource for transmitting the first PUSCH message is located on a first frequency band, the resource for transmitting the first PUSCH message occupies a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot;
Means for transmitting, by a mobile terminal, a second PUSCH message to the base station on the resource for transmitting a second PUSCH message in response to receiving the second PDCCH message, wherein the second PUSCH message comprises a copy of the encryption information, wherein the resource for transmitting a second PUSCH message is located on a second frequency band, the resource for transmitting a second PUSCH message occupies a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, wherein a first symbol for transmitting a second PUSCH message is located at a beginning of the second time slot;
and means for transmitting, by the base station, the encrypted information to an encryption server in response to receiving the encrypted information.
7. The system for secure real-time transmission of encrypted information according to claim 6, wherein the system for secure real-time transmission of encrypted information comprises:
a unit configured to send, by a base station, a first PDCCH message to the mobile terminal if the operation mode of the base station is determined to be a second operation mode, where the first PDCCH message includes a first uplink grant, where the first uplink grant indicates resources for sending a first PUSCH message and a second PUSCH message, where the first PDCCH message indicates that the mobile terminal needs to send a second PUSCH message, and where the first PDCCH message indicates that the mobile terminal sends the second PUSCH message immediately after sending the first PUSCH message;
Means for transmitting, by a mobile terminal, a first PUSCH message to the base station on the resource for transmitting the first PUSCH message in response to receiving the first PDCCH message, wherein the encryption information is included in the first PUSCH message, wherein the resource for transmitting the first PUSCH message is located on a first frequency band, the resource for transmitting the first PUSCH message occupies a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot;
means for transmitting, by a mobile terminal, a second PUSCH message to the base station on the resource for transmitting a second PUSCH message in response to receiving the first PDCCH message, wherein the second PUSCH message comprises a copy of the encryption information, wherein the resource for transmitting a second PUSCH message is located on a second frequency band, the resource for transmitting a second PUSCH message occupies a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, wherein a first symbol for transmitting a second PUSCH message is located at a beginning of the second time slot;
And means for transmitting, by the base station, the encrypted information to an encryption server in response to receiving the encrypted information.
8. The system for secure real-time transmission of encrypted information according to claim 7, wherein the system for secure real-time transmission of encrypted information comprises:
if the operation mode of the base station is judged to be a third operation mode, the base station sends a first PDCCH message and a second PDCCH message to the mobile terminal, wherein the first PDCCH message comprises a first uplink grant, the first uplink grant indicates resources for sending the first PUSCH message, the second PDCCH message comprises a second uplink grant, and the second uplink grant indicates resources for sending the second PUSCH message;
means for transmitting, by a mobile terminal, a first PUSCH message to the base station on the resource for transmitting the first PUSCH message in response to receiving the first PDCCH message, wherein the encryption information is included in the first PUSCH message, wherein the resource for transmitting the first PUSCH message is located on a first frequency band, the resource for transmitting the first PUSCH message occupies a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot;
Means for transmitting, by a mobile terminal, a second PUSCH message to the base station on the resource for transmitting a second PUSCH message in response to receiving the second PDCCH message, wherein the second PUSCH message comprises a copy of the encryption information, wherein the resource for transmitting a second PUSCH message is located on a second frequency band, the resource for transmitting a second PUSCH message occupies a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, and the first frequency band and the second frequency band belong to different bandwidth portions BWP, wherein a first symbol for transmitting a second PUSCH message is spaced apart from the last symbol for transmitting a first PUSCH message by a plurality of symbols;
and means for transmitting, by the base station, the encrypted information to an encryption server in response to receiving the encrypted information.
9. The system for secure real-time transmission of encrypted information according to claim 8, wherein the system for secure real-time transmission of encrypted information comprises:
A unit configured to send, by a base station, a first PDCCH message to the mobile terminal if the operation mode of the base station is determined to be a fourth operation mode, where the first PDCCH message includes a first uplink grant, where the first uplink grant indicates resources for sending a first PUSCH message and a second PUSCH message, where the first PDCCH message indicates that the mobile terminal needs to send a second PUSCH message, and where the first PDCCH message indicates that the mobile terminal sends the second PUSCH message immediately after sending the first PUSCH message;
and means for transmitting, by the mobile terminal, a first PUSCH message to the base station on the resource for transmitting the first PUSCH message in response to receiving the first PDCCH message, wherein the encryption information is included in the first PUSCH message, wherein the resource for transmitting the first PUSCH message is located on a first frequency band, the resource for transmitting the first PUSCH message occupies a plurality of symbols in a first time slot, and wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot.
10. The system for secure real-time transmission of encrypted information according to claim 9, wherein the system for secure real-time transmission of encrypted information comprises:
Means for transmitting, by a mobile terminal, a second PUSCH message to the base station on the resource for transmitting a second PUSCH message in response to receiving the first PDCCH message, wherein the second PUSCH message comprises a copy of the encryption information, wherein the resource for transmitting a second PUSCH message is located on a second frequency band, the resource for transmitting a second PUSCH message occupies a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, and the first frequency band and the second frequency band belong to different bandwidth portions BWP, wherein a first symbol for transmitting a second PUSCH message is spaced apart from the last symbol for transmitting a first PUSCH message by a plurality of symbols;
and means for transmitting, by the base station, the encrypted information to an encryption server in response to receiving the encrypted information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011021033.6A CN112040479B (en) | 2020-09-25 | 2020-09-25 | Method and system for transmitting encrypted information in real time for information security |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011021033.6A CN112040479B (en) | 2020-09-25 | 2020-09-25 | Method and system for transmitting encrypted information in real time for information security |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112040479A CN112040479A (en) | 2020-12-04 |
CN112040479B true CN112040479B (en) | 2023-10-27 |
Family
ID=73575295
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011021033.6A Active CN112040479B (en) | 2020-09-25 | 2020-09-25 | Method and system for transmitting encrypted information in real time for information security |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112040479B (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20170029379A (en) * | 2015-09-07 | 2017-03-15 | 한국전자통신연구원 | Method and apparatus for requesting uplink persistent scheduling in mobile communication systems |
CN108370594A (en) * | 2015-12-31 | 2018-08-03 | 华为技术有限公司 | Data transmission processing method, user equipment and base station |
CN108886448A (en) * | 2016-03-27 | 2018-11-23 | Lg 电子株式会社 | The method and device thereof of around uplink demodulation reference signal are sent and received in wireless communication system |
CN110380830A (en) * | 2019-07-19 | 2019-10-25 | 展讯通信(上海)有限公司 | Terminal, base station, communication system, data transmission method and storage medium |
CN110603765A (en) * | 2017-05-04 | 2019-12-20 | 夏普株式会社 | Hybrid automatic repeat request for uplink ultra-high reliability and low latency communication |
CN110831200A (en) * | 2018-08-07 | 2020-02-21 | 财团法人资讯工业策进会 | User device and base station for mobile communication system |
CN111405642A (en) * | 2019-01-03 | 2020-07-10 | 华为技术有限公司 | Message sending method, message receiving method, device and equipment |
CN111417102A (en) * | 2020-03-31 | 2020-07-14 | 倪航标 | Method and system for transmitting intelligent household security alarm information in real time |
CN111555854A (en) * | 2020-05-20 | 2020-08-18 | 蚌埠珠领智能科技有限公司 | 3D rendering switching method and system for mobile terminal game process |
CN111669822A (en) * | 2020-06-18 | 2020-09-15 | 河南工学院 | Vehicle driving position information transmission method and system based on Internet of vehicles |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11477771B2 (en) * | 2016-04-05 | 2022-10-18 | Qualcomm Incorporated | Indicating start and stop symbols of PDSCH and PUSCH through PDCCH |
US11259293B2 (en) * | 2019-01-10 | 2022-02-22 | Ofinno, Llc | Two-stage preamble transmission |
-
2020
- 2020-09-25 CN CN202011021033.6A patent/CN112040479B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20170029379A (en) * | 2015-09-07 | 2017-03-15 | 한국전자통신연구원 | Method and apparatus for requesting uplink persistent scheduling in mobile communication systems |
CN108370594A (en) * | 2015-12-31 | 2018-08-03 | 华为技术有限公司 | Data transmission processing method, user equipment and base station |
CN108886448A (en) * | 2016-03-27 | 2018-11-23 | Lg 电子株式会社 | The method and device thereof of around uplink demodulation reference signal are sent and received in wireless communication system |
CN110603765A (en) * | 2017-05-04 | 2019-12-20 | 夏普株式会社 | Hybrid automatic repeat request for uplink ultra-high reliability and low latency communication |
CN110831200A (en) * | 2018-08-07 | 2020-02-21 | 财团法人资讯工业策进会 | User device and base station for mobile communication system |
CN111405642A (en) * | 2019-01-03 | 2020-07-10 | 华为技术有限公司 | Message sending method, message receiving method, device and equipment |
CN110380830A (en) * | 2019-07-19 | 2019-10-25 | 展讯通信(上海)有限公司 | Terminal, base station, communication system, data transmission method and storage medium |
CN111417102A (en) * | 2020-03-31 | 2020-07-14 | 倪航标 | Method and system for transmitting intelligent household security alarm information in real time |
CN111555854A (en) * | 2020-05-20 | 2020-08-18 | 蚌埠珠领智能科技有限公司 | 3D rendering switching method and system for mobile terminal game process |
CN111669822A (en) * | 2020-06-18 | 2020-09-15 | 河南工学院 | Vehicle driving position information transmission method and system based on Internet of vehicles |
Non-Patent Citations (2)
Title |
---|
Chalakorn Karupongsiri ; Kumudu S. Munasinghe ; Abbas Jamalipour.Smart meter packet transmission via the control signal at dynamic load on eNode-B in LTE networks.IEEE.2015,全文. * |
一种降低LTE DTX的方法;刘阅希;;中国新通信(第10期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN112040479A (en) | 2020-12-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108737430B (en) | Encryption communication method and system for block chain node | |
US10680805B2 (en) | Data encryption control using multiple controlling authorities | |
US20140052989A1 (en) | Secure data exchange using messaging service | |
US20180234426A1 (en) | Authorization server, authorization method and non-transitory computer readable medium thereof | |
CN105553951A (en) | Data transmission method and data transmission device | |
CN105450406A (en) | Data processing method and device | |
Kwon et al. | Towards 5G-based IoT security analysis against Vo5G eavesdropping | |
CN101404576A (en) | Network resource query method and system | |
JP4975252B2 (en) | Method and apparatus for detecting a shared secret without compromising the non-shared secret | |
CN111246474B (en) | Base station authentication method and device | |
CN110855695A (en) | Improved SDN network security authentication method and system | |
CN104243452B (en) | A kind of cloud computing access control method and system | |
CN115473655B (en) | Terminal authentication method, device and storage medium for access network | |
Gao et al. | A lightweight cryptographic algorithm for the transmission of images from road environments in self-driving | |
CN108900595B (en) | Method, device and equipment for accessing data of cloud storage server and computing medium | |
CN114520726A (en) | Processing method and device based on block chain data, processor and electronic equipment | |
CN114223233A (en) | Data security for network slice management | |
Damir et al. | A beyond-5G authentication and key agreement protocol | |
CN104243153A (en) | Method for spotting equipment user, and user equipment | |
CN110807210B (en) | Information processing method, platform, system and computer storage medium | |
CN107995616B (en) | User behavior data processing method and device | |
CN112040479B (en) | Method and system for transmitting encrypted information in real time for information security | |
CN109492359B (en) | Secure network middleware for identity authentication and implementation method and device thereof | |
JP2022523068A (en) | Systems and methods for secure electronic data transfer | |
CN115001719B (en) | Private data processing system, method, device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |