CN112040479B - Method and system for transmitting encrypted information in real time for information security - Google Patents

Method and system for transmitting encrypted information in real time for information security Download PDF

Info

Publication number
CN112040479B
CN112040479B CN202011021033.6A CN202011021033A CN112040479B CN 112040479 B CN112040479 B CN 112040479B CN 202011021033 A CN202011021033 A CN 202011021033A CN 112040479 B CN112040479 B CN 112040479B
Authority
CN
China
Prior art keywords
transmitting
message
pusch message
pusch
base station
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011021033.6A
Other languages
Chinese (zh)
Other versions
CN112040479A (en
Inventor
包空军
包承欢
包毅豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou University of Light Industry
Original Assignee
Zhengzhou University of Light Industry
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou University of Light Industry filed Critical Zhengzhou University of Light Industry
Priority to CN202011021033.6A priority Critical patent/CN112040479B/en
Publication of CN112040479A publication Critical patent/CN112040479A/en
Application granted granted Critical
Publication of CN112040479B publication Critical patent/CN112040479B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0453Resources in frequency domain, e.g. a carrier in FDMA
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/12Wireless traffic scheduling
    • H04W72/1263Mapping of traffic onto schedule, e.g. scheduled allocation or multiplexing of flows
    • H04W72/1268Mapping of traffic onto schedule, e.g. scheduled allocation or multiplexing of flows of uplink data flows
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • H04W72/23Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method for transmitting encrypted information in real time for information security, which comprises the following steps: collecting, by the mobile terminal, the encrypted information; establishing, by the mobile terminal, a communication connection with the base station in response to collecting the encrypted information; determining, by the mobile terminal, PUCCH resources for transmitting the scheduling request in response to establishing the communication connection with the base station; transmitting, by the mobile terminal, a scheduling request to the base station in response to determining PUCCH resources for transmitting the scheduling request; in response to receiving the scheduling request, determining, by the base station, an operation mode of the base station; if the operation mode of the base station is judged to be the first operation mode, the base station sends a first PDCCH message and a second PDCCH message to the mobile terminal; in response to receiving the first PDCCH message, transmitting, by the mobile terminal, the first PUSCH message to the base station on resources for transmitting the first PUSCH message; in response to receiving the second PDCCH message, the second PUSCH message is transmitted by the mobile terminal to the base station on resources used to transmit the second PUSCH message.

Description

Method and system for transmitting encrypted information in real time for information security
Technical Field
The present invention relates to the field of information security technologies, and in particular, to a method and a system for transmitting encrypted information in real time for information security.
Background
Information security mainly includes the following five aspects, namely confidentiality, authenticity, integrity, unauthorized copying and security of parasitic systems of the information need to be ensured. Information security itself includes a wide range of information including how to protect against confidential leakage from commercial enterprises, to protect against browsing of bad information by teenagers, leakage of personal information, and the like. The information security system in the network environment is the key for ensuring the information security, and comprises a computer security operation system, various security protocols and security mechanisms (digital signature, message authentication, data encryption and the like), until the security system, the global security can be threatened as long as security holes exist. Information security means that an information system (including hardware, software, data, people, physical environments and infrastructure thereof) is protected from being damaged, altered and leaked by accidental or malicious reasons, the system continuously and reliably operates normally, information service is not interrupted, and service continuity is finally realized.
The prior art CN111371545B discloses an encryption method based on privacy protection. The method comprises the following steps: acquiring a ciphertext obtained by encrypting the data by a data owner through a semi-homomorphic encryption algorithm; the ciphertext is subjected to first calculation to obtain a standard type; the standard is a calculation made by the data owner; generating a random number; disturbing the standard type based on the random number to obtain a disturbance type; sending the disturbance formula to the data owner for calculation to obtain a disturbance formula result; obtaining an encryption disturbance result; and obtaining an encryption result based on the encryption disturbance type result, the standard type, the random number and the disturbance.
The information disclosed in this background section is only for enhancement of understanding of the general background of the invention and should not be taken as an acknowledgement or any form of suggestion that this information forms the prior art already known to a person of ordinary skill in the art.
Disclosure of Invention
The invention aims to provide a method and a system for transmitting encrypted information in real time for information security, which can overcome the defects of the prior art.
To achieve the above object, the present invention provides a method for transmitting encrypted information in real time for information security, comprising the steps of: collecting, by the mobile terminal, the encrypted information; establishing, by the mobile terminal, a communication connection with the base station in response to collecting the encrypted information; determining, by the mobile terminal, PUCCH resources for transmitting the scheduling request in response to establishing the communication connection with the base station; transmitting, by the mobile terminal, a scheduling request to the base station in response to determining PUCCH resources for transmitting the scheduling request; in response to receiving the scheduling request, determining, by the base station, an operation mode of the base station; if the operation mode of the base station is judged to be a first operation mode, the base station sends a first PDCCH message and a second PDCCH message to the mobile terminal, wherein the first PDCCH message comprises a first uplink grant, the first uplink grant indicates resources for sending the first PUSCH message, the second PDCCH message comprises a second uplink grant, and the second uplink grant indicates resources for sending the second PUSCH message; in response to receiving the first PDCCH message, transmitting, by the mobile terminal, the first PUSCH message to the base station on resources for transmitting the first PUSCH message, wherein the encryption information is included in the first PUSCH message, wherein the resources for transmitting the first PUSCH message are located on a first frequency band, the resources for transmitting the first PUSCH message occupy a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot; in response to receiving the second PDCCH message, transmitting, by the mobile terminal, a second PUSCH message to the base station on resources for transmitting the second PUSCH message, wherein the second PUSCH message includes a copy of the encryption information, wherein the resources for transmitting the second PUSCH message are located on a second frequency band, wherein the resources for transmitting the second PUSCH message occupy a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, wherein the first symbol for transmitting the second PUSCH message is located at a beginning of the second time slot; in response to receiving the encryption information, the encryption information is transmitted by the base station to the encryption server.
In a preferred embodiment, the method for secure real-time transmission of encrypted information comprises the steps of: if the operation mode of the base station is judged to be a second operation mode, the base station sends a first PDCCH message to the mobile terminal, wherein the first PDCCH message comprises a first uplink grant, the first uplink grant indicates resources for sending a first PUSCH message and a second PUSCH message, the first PDCCH message indicates that the mobile terminal needs to send the second PUSCH message, and the first PDCCH message indicates that the mobile terminal immediately sends the second PUSCH message after sending the first PUSCH message; in response to receiving the first PDCCH message, transmitting, by the mobile terminal, the first PUSCH message to the base station on resources for transmitting the first PUSCH message, wherein the encryption information is included in the first PUSCH message, wherein the resources for transmitting the first PUSCH message are located on a first frequency band, the resources for transmitting the first PUSCH message occupy a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot; in response to receiving the first PDCCH message, transmitting, by the mobile terminal, a second PUSCH message to the base station on resources for transmitting the second PUSCH message, wherein the second PUSCH message includes a copy of the encryption information, wherein the resources for transmitting the second PUSCH message are located on a second frequency band, wherein the resources for transmitting the second PUSCH message occupy a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, wherein the first symbol for transmitting the second PUSCH message is located at a beginning of the second time slot; in response to receiving the encryption information, the encryption information is transmitted by the base station to the encryption server.
In a preferred embodiment, the method for secure real-time transmission of encrypted information comprises the steps of: if the operation mode of the base station is judged to be a third operation mode, the base station sends a first PDCCH message and a second PDCCH message to the mobile terminal, wherein the first PDCCH message comprises a first uplink grant, the first uplink grant indicates resources for sending the first PUSCH message, the second PDCCH message comprises a second uplink grant, and the second uplink grant indicates resources for sending the second PUSCH message; in response to receiving the first PDCCH message, transmitting, by the mobile terminal, the first PUSCH message to the base station on resources for transmitting the first PUSCH message, wherein the encryption information is included in the first PUSCH message, wherein the resources for transmitting the first PUSCH message are located on a first frequency band, the resources for transmitting the first PUSCH message occupy a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot; in response to receiving the second PDCCH message, transmitting, by the mobile terminal, the second PUSCH message to the base station on resources for transmitting the second PUSCH message, wherein the second PUSCH message includes a copy of the encryption information, wherein the resources for transmitting the second PUSCH message are located on a second frequency band, the resources for transmitting the second PUSCH message occupy a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, and the first frequency band and the second frequency band belong to different bandwidth portions BWP, wherein a first symbol for transmitting the second PUSCH message and a last symbol for transmitting the first PUSCH message are separated by a plurality of symbols; in response to receiving the encryption information, the encryption information is transmitted by the base station to the encryption server.
In a preferred embodiment, the method for secure real-time transmission of encrypted information comprises the steps of: if the operation mode of the base station is judged to be a fourth operation mode, the base station sends a first PDCCH message to the mobile terminal, wherein the first PDCCH message comprises a first uplink grant, the first uplink grant indicates resources for sending a first PUSCH message and a second PUSCH message, the first PDCCH message indicates that the mobile terminal needs to send the second PUSCH message, and the first PDCCH message indicates that the mobile terminal immediately sends the second PUSCH message after sending the first PUSCH message; in response to receiving the first PDCCH message, transmitting, by the mobile terminal, the first PUSCH message to the base station on resources for transmitting the first PUSCH message, wherein the encryption information is included in the first PUSCH message, wherein the resources for transmitting the first PUSCH message are located on a first frequency band, the resources for transmitting the first PUSCH message occupy a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot.
In a preferred embodiment, the method for secure real-time transmission of encrypted information comprises the steps of: in response to receiving the first PDCCH message, transmitting, by the mobile terminal, a second PUSCH message to the base station on resources for transmitting the second PUSCH message, wherein the second PUSCH message includes a copy of the encryption information, wherein the resources for transmitting the second PUSCH message are located on a second frequency band, the resources for transmitting the second PUSCH message occupy a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, and the first frequency band and the second frequency band belong to different bandwidth portions BWP, wherein a first symbol for transmitting the second PUSCH message and a last symbol for transmitting the first PUSCH message are separated by a plurality of symbols; in response to receiving the encryption information, the encryption information is transmitted by the base station to the encryption server.
The invention also provides a system for transmitting the encrypted information in real time for information security, which comprises: a unit for collecting encryption information by the mobile terminal; means for establishing a communication connection by the mobile terminal with the base station in response to collecting the encrypted information; means for determining, by the mobile terminal, PUCCH resources for transmitting the scheduling request in response to establishing the communication connection with the base station; means for transmitting, by the mobile terminal, a scheduling request to the base station in response to determining PUCCH resources for transmitting the scheduling request; means for determining, by the base station, an operation mode of the base station in response to receiving the scheduling request; if the operation mode of the base station is the first operation mode, the base station sends a first PDCCH message and a second PDCCH message to the mobile terminal, wherein the first PDCCH message comprises a first uplink grant, the first uplink grant indicates resources for sending the first PUSCH message, the second PDCCH message comprises a second uplink grant, and the second uplink grant indicates resources for sending the second PUSCH message; means for transmitting, by the mobile terminal, a first PUSCH message to the base station on resources for transmitting the first PUSCH message in response to receiving the first PDCCH message, wherein the ciphering information is included in the first PUSCH message, wherein the resources for transmitting the first PUSCH message are located on a first frequency band, the resources for transmitting the first PUSCH message occupy a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot; transmitting, by the mobile terminal, a second PUSCH message to the base station on resources for transmitting the second PUSCH message in response to receiving the second PDCCH message, wherein the second PUSCH message includes a copy of the encryption information, wherein the resources for transmitting the second PUSCH message are located on a second frequency band, wherein the resources for transmitting the second PUSCH message occupy a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, wherein the first symbol for transmitting the second PUSCH message is located at a beginning of the second time slot; and means for transmitting, by the base station, the encrypted information to the encryption server in response to receiving the encrypted information.
In a preferred embodiment, a system for secure real-time transmission of encrypted information comprises: a unit configured to send a first PDCCH message to the mobile terminal by the base station if the operation mode of the base station is determined to be the second operation mode, where the first PDCCH message includes a first uplink grant, where the first uplink grant indicates resources for sending a first PUSCH message and a second PUSCH message, where the first PDCCH message indicates that the mobile terminal needs to send the second PUSCH message, and where the first PDCCH message indicates that the mobile terminal sends the second PUSCH message immediately after sending the first PUSCH message; means for transmitting, by the mobile terminal, a first PUSCH message to the base station on resources for transmitting the first PUSCH message in response to receiving the first PDCCH message, wherein the ciphering information is included in the first PUSCH message, wherein the resources for transmitting the first PUSCH message are located on a first frequency band, the resources for transmitting the first PUSCH message occupy a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot; transmitting, by the mobile terminal, a second PUSCH message to the base station on resources for transmitting the second PUSCH message in response to receiving the first PDCCH message, wherein the second PUSCH message includes a copy of the encryption information, wherein the resources for transmitting the second PUSCH message are located on a second frequency band, wherein the resources for transmitting the second PUSCH message occupy a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, wherein the first symbol for transmitting the second PUSCH message is located at a beginning of the second time slot; and means for transmitting, by the base station, the encrypted information to the encryption server in response to receiving the encrypted information.
In a preferred embodiment, a system for secure real-time transmission of encrypted information comprises: if the operation mode of the base station is the third operation mode, the base station sends a first PDCCH message and a second PDCCH message to the mobile terminal, wherein the first PDCCH message comprises a first uplink grant, the first uplink grant indicates resources for sending the first PUSCH message, the second PDCCH message comprises a second uplink grant, and the second uplink grant indicates resources for sending the second PUSCH message; means for transmitting, by the mobile terminal, a first PUSCH message to the base station on resources for transmitting the first PUSCH message in response to receiving the first PDCCH message, wherein the ciphering information is included in the first PUSCH message, wherein the resources for transmitting the first PUSCH message are located on a first frequency band, the resources for transmitting the first PUSCH message occupy a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot; transmitting, by the mobile terminal, a second PUSCH message to the base station on resources for transmitting the second PUSCH message in response to receiving the second PDCCH message, wherein the second PUSCH message includes a copy of the encryption information, wherein the resources for transmitting the second PUSCH message are located on a second frequency band, wherein the resources for transmitting the second PUSCH message occupy a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, and the first frequency band and the second frequency band belong to different bandwidth portions BWP, wherein a first symbol for transmitting the second PUSCH message and a last symbol for transmitting the first PUSCH message are separated by a plurality of symbols; and means for transmitting, by the base station, the encrypted information to the encryption server in response to receiving the encrypted information.
In a preferred embodiment, a system for secure real-time transmission of encrypted information comprises: a unit configured to send a first PDCCH message to the mobile terminal by the base station if the operation mode of the base station is determined to be a fourth operation mode, where the first PDCCH message includes a first uplink grant, where the first uplink grant indicates resources for sending a first PUSCH message and a second PUSCH message, where the first PDCCH message indicates that the mobile terminal needs to send the second PUSCH message, and where the first PDCCH message indicates that the mobile terminal sends the second PUSCH message immediately after sending the first PUSCH message; and means for transmitting, by the mobile terminal, the first PUSCH message to the base station on resources for transmitting the first PUSCH message in response to receiving the first PDCCH message, wherein the ciphering information is included in the first PUSCH message, wherein the resources for transmitting the first PUSCH message are located on a first frequency band, the resources for transmitting the first PUSCH message occupy a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot.
In a preferred embodiment, a system for secure real-time transmission of encrypted information comprises: transmitting, by the mobile terminal, a second PUSCH message to the base station on resources for transmitting the second PUSCH message in response to receiving the first PDCCH message, wherein the second PUSCH message includes a copy of the encryption information, wherein the resources for transmitting the second PUSCH message are located on a second frequency band, wherein the resources for transmitting the second PUSCH message occupy a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, and the first frequency band and the second frequency band belong to different bandwidth portions BWP, wherein a first symbol for transmitting the second PUSCH message and a last symbol for transmitting the first PUSCH message are separated by a plurality of symbols; and means for transmitting, by the base station, the encrypted information to the encryption server in response to receiving the encrypted information.
Compared with the prior art, the method and the system for transmitting the encrypted information in real time for information security have the following advantages: in the internet age, various information of people can be transmitted by means of a network, and with the progress of technology and society, even if individuals do not want to transmit through the network, various companies and organizations can require individuals to transmit some information through the network. Thus, information security is particularly important in the present internet age, and information security is of course required to rely on the progress of encryption technology, but information security itself is also independent of information transmission. Based on the knowledge, the application provides a method and a system for transmitting encrypted information in real time for information security.
Drawings
Fig. 1 is a schematic diagram of a system architecture according to an embodiment of the present application.
FIG. 2 is a flow chart of a method according to an embodiment of the application.
Detailed Description
The following detailed description of embodiments of the application is, therefore, to be taken in conjunction with the accompanying drawings, and it is to be understood that the scope of the application is not limited to the specific embodiments.
Throughout the specification and claims, unless explicitly stated otherwise, the term "comprise" or variations thereof such as "comprises" or "comprising", etc. will be understood to include the stated element or component without excluding other elements or components.
Example 1
Fig. 1 is a schematic diagram of a system architecture according to an embodiment of the present application.
FIG. 2 is a flow chart of a method according to an embodiment of the application. As shown in fig. 2, the method for transmitting encrypted information in real time for information security of the present application comprises the steps of:
step 101: collecting encryption information by the mobile terminal, wherein the encryption information refers to all information related to data encryption, such as an identity verification code, can also be included in the scope of the encryption information of the application;
step 102: establishing, by the mobile terminal, a communication connection with the base station in response to collecting the encrypted information;
step 103: determining, by the mobile terminal, PUCCH resources for transmitting the scheduling request, which may be resources periodically allocated to the mobile terminal by the base station, in response to establishing the communication connection with the base station;
step 104: transmitting, by the mobile terminal, a scheduling request to the base station in response to determining PUCCH resources for transmitting the scheduling request;
step 105: in response to receiving the scheduling request, determining, by the base station, an operation mode of the base station;
step 106: if the operation mode of the base station is judged to be a first operation mode, the base station sends a first PDCCH message and a second PDCCH message to the mobile terminal, wherein the first PDCCH message comprises a first uplink grant, the first uplink grant indicates resources for sending the first PUSCH message, the second PDCCH message comprises a second uplink grant, and the second uplink grant indicates resources for sending the second PUSCH message;
Step 107: in response to receiving the first PDCCH message, transmitting, by the mobile terminal, the first PUSCH message to the base station on resources for transmitting the first PUSCH message, wherein the encryption information is included in the first PUSCH message, wherein the resources for transmitting the first PUSCH message are located on a first frequency band, the resources for transmitting the first PUSCH message occupy a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot;
step 108: transmitting, by the mobile terminal, a second PUSCH message to the base station on a resource for transmitting the second PUSCH message in response to receiving the second PDCCH message, wherein the second PUSCH message includes a copy of the encryption information (the copy of the encryption information refers to a copy of the encryption information or copy of the encryption information that is identical to the encryption information), wherein the resource for transmitting the second PUSCH message is located on a second frequency band, the resource for transmitting the second PUSCH message occupies a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap with the first frequency band, wherein the first symbol for transmitting the second PUSCH message is located at a beginning of the second time slot, wherein "immediately following the first time slot" refers to the first time slot and the second time slot being two time slots that are temporally consecutive, for example, the relationship between the first time slot and the second time slot in one LTE subframe is "the second time slot is the time slot immediately following the first time slot";
Step 109: in response to receiving the encryption information, the encryption information is transmitted by the base station to the encryption server.
Example 2
In a preferred embodiment, the method for secure real-time transmission of encrypted information comprises the steps of: if the operation mode of the base station is judged to be a second operation mode, the base station sends a first PDCCH message to the mobile terminal, wherein the first PDCCH message comprises a first uplink grant, the first uplink grant indicates resources for sending a first PUSCH message and a second PUSCH message, the first PDCCH message indicates that the mobile terminal needs to send the second PUSCH message, and the first PDCCH message indicates that the mobile terminal immediately sends the second PUSCH message after sending the first PUSCH message; in response to receiving the first PDCCH message, transmitting, by the mobile terminal, the first PUSCH message to the base station on resources for transmitting the first PUSCH message, wherein the encryption information is included in the first PUSCH message, wherein the resources for transmitting the first PUSCH message are located on a first frequency band, the resources for transmitting the first PUSCH message occupy a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot; in response to receiving the first PDCCH message, transmitting, by the mobile terminal, a second PUSCH message to the base station on resources for transmitting the second PUSCH message, wherein the second PUSCH message includes a copy of the encryption information, wherein the resources for transmitting the second PUSCH message are located on a second frequency band, wherein the resources for transmitting the second PUSCH message occupy a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, wherein the first symbol for transmitting the second PUSCH message is located at a beginning of the second time slot; in response to receiving the encryption information, the encryption information is transmitted by the base station to the encryption server.
In a preferred embodiment, the method for secure real-time transmission of encrypted information comprises the steps of: if the operation mode of the base station is judged to be a third operation mode, the base station sends a first PDCCH message and a second PDCCH message to the mobile terminal, wherein the first PDCCH message comprises a first uplink grant, the first uplink grant indicates resources for sending the first PUSCH message, the second PDCCH message comprises a second uplink grant, and the second uplink grant indicates resources for sending the second PUSCH message; in response to receiving the first PDCCH message, transmitting, by the mobile terminal, the first PUSCH message to the base station on resources for transmitting the first PUSCH message, wherein the encryption information is included in the first PUSCH message, wherein the resources for transmitting the first PUSCH message are located on a first frequency band, the resources for transmitting the first PUSCH message occupy a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot; in response to receiving the second PDCCH message, transmitting, by the mobile terminal, the second PUSCH message to the base station on resources for transmitting the second PUSCH message, wherein the second PUSCH message includes a copy of the encryption information, wherein the resources for transmitting the second PUSCH message are located on a second frequency band, the resources for transmitting the second PUSCH message occupy a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, and the first frequency band and the second frequency band belong to different bandwidth portions BWP, wherein a first symbol for transmitting the second PUSCH message and a last symbol for transmitting the first PUSCH message are separated by a plurality of symbols; in response to receiving the encryption information, the encryption information is transmitted by the base station to the encryption server.
In a preferred embodiment, the method for secure real-time transmission of encrypted information comprises the steps of: if the operation mode of the base station is judged to be a fourth operation mode, the base station sends a first PDCCH message to the mobile terminal, wherein the first PDCCH message comprises a first uplink grant, the first uplink grant indicates resources for sending a first PUSCH message and a second PUSCH message, the first PDCCH message indicates that the mobile terminal needs to send the second PUSCH message, and the first PDCCH message indicates that the mobile terminal immediately sends the second PUSCH message after sending the first PUSCH message; in response to receiving the first PDCCH message, transmitting, by the mobile terminal, the first PUSCH message to the base station on resources for transmitting the first PUSCH message, wherein the encryption information is included in the first PUSCH message, wherein the resources for transmitting the first PUSCH message are located on a first frequency band, the resources for transmitting the first PUSCH message occupy a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot.
In a preferred embodiment, the method for secure real-time transmission of encrypted information comprises the steps of: in response to receiving the first PDCCH message, transmitting, by the mobile terminal, a second PUSCH message to the base station on resources for transmitting the second PUSCH message, wherein the second PUSCH message includes a copy of the encryption information, wherein the resources for transmitting the second PUSCH message are located on a second frequency band, the resources for transmitting the second PUSCH message occupy a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, and the first frequency band and the second frequency band belong to different bandwidth portions BWP, wherein a first symbol for transmitting the second PUSCH message and a last symbol for transmitting the first PUSCH message are separated by a plurality of symbols; in response to receiving the encryption information, the encryption information is transmitted by the base station to the encryption server.
Example 3
In another preferred embodiment, the present invention also provides a system for transmitting encrypted information in real time for information security, comprising: a unit for collecting encryption information by the mobile terminal; means for establishing a communication connection by the mobile terminal with the base station in response to collecting the encrypted information; means for determining, by the mobile terminal, PUCCH resources for transmitting the scheduling request in response to establishing the communication connection with the base station; means for transmitting, by the mobile terminal, a scheduling request to the base station in response to determining PUCCH resources for transmitting the scheduling request; means for determining, by the base station, an operation mode of the base station in response to receiving the scheduling request; if the operation mode of the base station is the first operation mode, the base station sends a first PDCCH message and a second PDCCH message to the mobile terminal, wherein the first PDCCH message comprises a first uplink grant, the first uplink grant indicates resources for sending the first PUSCH message, the second PDCCH message comprises a second uplink grant, and the second uplink grant indicates resources for sending the second PUSCH message; means for transmitting, by the mobile terminal, a first PUSCH message to the base station on resources for transmitting the first PUSCH message in response to receiving the first PDCCH message, wherein the ciphering information is included in the first PUSCH message, wherein the resources for transmitting the first PUSCH message are located on a first frequency band, the resources for transmitting the first PUSCH message occupy a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot; transmitting, by the mobile terminal, a second PUSCH message to the base station on resources for transmitting the second PUSCH message in response to receiving the second PDCCH message, wherein the second PUSCH message includes a copy of the encryption information, wherein the resources for transmitting the second PUSCH message are located on a second frequency band, wherein the resources for transmitting the second PUSCH message occupy a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, wherein the first symbol for transmitting the second PUSCH message is located at a beginning of the second time slot; and means for transmitting, by the base station, the encrypted information to the encryption server in response to receiving the encrypted information.
Example 4
In a preferred embodiment, a system for secure real-time transmission of encrypted information comprises: a unit configured to send a first PDCCH message to the mobile terminal by the base station if the operation mode of the base station is determined to be the second operation mode, where the first PDCCH message includes a first uplink grant, where the first uplink grant indicates resources for sending a first PUSCH message and a second PUSCH message, where the first PDCCH message indicates that the mobile terminal needs to send the second PUSCH message, and where the first PDCCH message indicates that the mobile terminal sends the second PUSCH message immediately after sending the first PUSCH message; means for transmitting, by the mobile terminal, a first PUSCH message to the base station on resources for transmitting the first PUSCH message in response to receiving the first PDCCH message, wherein the ciphering information is included in the first PUSCH message, wherein the resources for transmitting the first PUSCH message are located on a first frequency band, the resources for transmitting the first PUSCH message occupy a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot; transmitting, by the mobile terminal, a second PUSCH message to the base station on resources for transmitting the second PUSCH message in response to receiving the first PDCCH message, wherein the second PUSCH message includes a copy of the encryption information, wherein the resources for transmitting the second PUSCH message are located on a second frequency band, wherein the resources for transmitting the second PUSCH message occupy a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, wherein the first symbol for transmitting the second PUSCH message is located at a beginning of the second time slot; and means for transmitting, by the base station, the encrypted information to the encryption server in response to receiving the encrypted information.
In a preferred embodiment, a system for secure real-time transmission of encrypted information comprises: if the operation mode of the base station is the third operation mode, the base station sends a first PDCCH message and a second PDCCH message to the mobile terminal, wherein the first PDCCH message comprises a first uplink grant, the first uplink grant indicates resources for sending the first PUSCH message, the second PDCCH message comprises a second uplink grant, and the second uplink grant indicates resources for sending the second PUSCH message; means for transmitting, by the mobile terminal, a first PUSCH message to the base station on resources for transmitting the first PUSCH message in response to receiving the first PDCCH message, wherein the ciphering information is included in the first PUSCH message, wherein the resources for transmitting the first PUSCH message are located on a first frequency band, the resources for transmitting the first PUSCH message occupy a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot; transmitting, by the mobile terminal, a second PUSCH message to the base station on resources for transmitting the second PUSCH message in response to receiving the second PDCCH message, wherein the second PUSCH message includes a copy of the encryption information, wherein the resources for transmitting the second PUSCH message are located on a second frequency band, wherein the resources for transmitting the second PUSCH message occupy a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, and the first frequency band and the second frequency band belong to different bandwidth portions BWP, wherein a first symbol for transmitting the second PUSCH message and a last symbol for transmitting the first PUSCH message are separated by a plurality of symbols; and means for transmitting, by the base station, the encrypted information to the encryption server in response to receiving the encrypted information.
In a preferred embodiment, a system for secure real-time transmission of encrypted information comprises: a unit configured to send a first PDCCH message to the mobile terminal by the base station if the operation mode of the base station is determined to be a fourth operation mode, where the first PDCCH message includes a first uplink grant, where the first uplink grant indicates resources for sending a first PUSCH message and a second PUSCH message, where the first PDCCH message indicates that the mobile terminal needs to send the second PUSCH message, and where the first PDCCH message indicates that the mobile terminal sends the second PUSCH message immediately after sending the first PUSCH message; and means for transmitting, by the mobile terminal, the first PUSCH message to the base station on resources for transmitting the first PUSCH message in response to receiving the first PDCCH message, wherein the ciphering information is included in the first PUSCH message, wherein the resources for transmitting the first PUSCH message are located on a first frequency band, the resources for transmitting the first PUSCH message occupy a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot.
In a preferred embodiment, a system for secure real-time transmission of encrypted information comprises: transmitting, by the mobile terminal, a second PUSCH message to the base station on resources for transmitting the second PUSCH message in response to receiving the first PDCCH message, wherein the second PUSCH message includes a copy of the encryption information, wherein the resources for transmitting the second PUSCH message are located on a second frequency band, wherein the resources for transmitting the second PUSCH message occupy a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, and the first frequency band and the second frequency band belong to different bandwidth portions BWP, wherein a first symbol for transmitting the second PUSCH message and a last symbol for transmitting the first PUSCH message are separated by a plurality of symbols; and means for transmitting, by the base station, the encrypted information to the encryption server in response to receiving the encrypted information.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The foregoing descriptions of specific exemplary embodiments of the present invention are presented for purposes of illustration and description. It is not intended to limit the invention to the precise form disclosed, and obviously many modifications and variations are possible in light of the above teaching. The exemplary embodiments were chosen and described in order to explain the specific principles of the invention and its practical application to thereby enable one skilled in the art to make and utilize the invention in various exemplary embodiments and with various modifications as are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the claims and their equivalents.

Claims (10)

1. A method for information-secure real-time transmission of encrypted information, the method for information-secure real-time transmission of encrypted information comprising the steps of:
collecting, by the mobile terminal, the encrypted information;
establishing, by the mobile terminal, a communication connection with the base station in response to collecting the encrypted information;
determining, by the mobile terminal, PUCCH resources for transmitting the scheduling request in response to establishing the communication connection with the base station;
transmitting, by the mobile terminal, a scheduling request to the base station in response to determining PUCCH resources for transmitting the scheduling request;
in response to receiving the scheduling request, judging an operation mode of the base station by the base station;
if the operation mode of the base station is judged to be a first operation mode, a base station sends a first PDCCH message and a second PDCCH message to the mobile terminal, wherein the first PDCCH message comprises a first uplink grant, the first uplink grant indicates resources for sending a first PUSCH message, the second PDCCH message comprises a second uplink grant, and the second uplink grant indicates resources for sending a second PUSCH message;
In response to receiving the first PDCCH message, transmitting, by the mobile terminal, a first PUSCH message to the base station on the resource for transmitting the first PUSCH message, wherein the encryption information is included in the first PUSCH message, wherein the resource for transmitting the first PUSCH message is located on a first frequency band, the resource for transmitting the first PUSCH message occupies a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot;
transmitting, by the mobile terminal, a second PUSCH message to the base station on the resource for transmitting a second PUSCH message in response to receiving the second PDCCH message, wherein the second PUSCH message includes a copy of the encryption information, wherein the resource for transmitting a second PUSCH message is located on a second frequency band, the resource for transmitting a second PUSCH message occupies a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, wherein a first symbol for transmitting a second PUSCH message is located at a beginning of the second time slot;
The encrypted information is sent by the base station to the encryption server in response to receiving the encrypted information.
2. The method for information-secured real-time transmission of encrypted information according to claim 1, wherein the method for information-secured real-time transmission of encrypted information comprises the steps of:
if the operation mode of the base station is judged to be a second operation mode, a first PDCCH message is sent to the mobile terminal by the base station, wherein the first PDCCH message comprises a first uplink grant, the first uplink grant indicates resources for sending a first PUSCH message and a second PUSCH message, the first PDCCH message indicates that the mobile terminal needs to send a second PUSCH message, and the first PDCCH message indicates that the mobile terminal immediately sends the second PUSCH message after sending the first PUSCH message;
in response to receiving the first PDCCH message, transmitting, by the mobile terminal, a first PUSCH message to the base station on the resource for transmitting the first PUSCH message, wherein the encryption information is included in the first PUSCH message, wherein the resource for transmitting the first PUSCH message is located on a first frequency band, the resource for transmitting the first PUSCH message occupies a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot;
Transmitting, by the mobile terminal, a second PUSCH message to the base station on the resource for transmitting a second PUSCH message in response to receiving the first PDCCH message, wherein the second PUSCH message includes a copy of the encryption information, wherein the resource for transmitting a second PUSCH message is located on a second frequency band, the resource for transmitting a second PUSCH message occupies a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, wherein a first symbol for transmitting a second PUSCH message is located at a beginning of the second time slot;
the encrypted information is sent by the base station to the encryption server in response to receiving the encrypted information.
3. The method for information-secured real-time transmission of encrypted information according to claim 2, wherein the method for information-secured real-time transmission of encrypted information comprises the steps of:
if the operation mode of the base station is judged to be a third operation mode, a base station sends a first PDCCH message and a second PDCCH message to the mobile terminal, wherein the first PDCCH message comprises a first uplink grant, the first uplink grant indicates resources for sending a first PUSCH message, the second PDCCH message comprises a second uplink grant, and the second uplink grant indicates resources for sending a second PUSCH message;
In response to receiving the first PDCCH message, transmitting, by the mobile terminal, a first PUSCH message to the base station on the resource for transmitting the first PUSCH message, wherein the encryption information is included in the first PUSCH message, wherein the resource for transmitting the first PUSCH message is located on a first frequency band, the resource for transmitting the first PUSCH message occupies a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot;
transmitting, by the mobile terminal, a second PUSCH message to the base station on the resource for transmitting a second PUSCH message in response to receiving the second PDCCH message, wherein the second PUSCH message includes a copy of the encryption information, wherein the resource for transmitting a second PUSCH message is located on a second frequency band, the resource for transmitting a second PUSCH message occupies a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, and the first frequency band and the second frequency band belong to different bandwidth portions BWP, wherein a first symbol for transmitting a second PUSCH message is spaced apart from a last symbol for transmitting a first PUSCH message by a plurality of symbols;
The encrypted information is sent by the base station to the encryption server in response to receiving the encrypted information.
4. The method for information-secured real-time transmission of encrypted information according to claim 3, wherein the method for information-secured real-time transmission of encrypted information comprises the steps of:
if the operation mode of the base station is judged to be a fourth operation mode, a first PDCCH message is sent to the mobile terminal by the base station, wherein the first PDCCH message comprises a first uplink grant, the first uplink grant indicates resources for sending a first PUSCH message and a second PUSCH message, the first PDCCH message indicates that the mobile terminal needs to send a second PUSCH message, and the first PDCCH message indicates that the mobile terminal immediately sends the second PUSCH message after sending the first PUSCH message;
in response to receiving the first PDCCH message, transmitting, by the mobile terminal, a first PUSCH message to the base station on the resource for transmitting the first PUSCH message, wherein the encryption information is included in the first PUSCH message, wherein the resource for transmitting the first PUSCH message is located on a first frequency band, the resource for transmitting the first PUSCH message occupies a plurality of symbols in a first time slot, and wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot.
5. The method for information-secured real-time transmission of encrypted information according to claim 4, wherein the method for information-secured real-time transmission of encrypted information comprises the steps of:
transmitting, by the mobile terminal, a second PUSCH message to the base station on the resource for transmitting a second PUSCH message in response to receiving the first PDCCH message, wherein the second PUSCH message includes a copy of the encryption information, wherein the resource for transmitting the second PUSCH message is located on a second frequency band, the resource for transmitting the second PUSCH message occupies a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, and the first frequency band and the second frequency band belong to different bandwidth portions BWP, wherein a first symbol for transmitting the second PUSCH message is spaced apart from a last symbol for transmitting the first PUSCH message by a plurality of symbols;
the encrypted information is sent by the base station to the encryption server in response to receiving the encrypted information.
6. A system for secure real-time transmission of encrypted information, the system for secure real-time transmission of encrypted information comprising:
A unit for collecting encryption information by the mobile terminal;
means for establishing a communication connection by the mobile terminal with the base station in response to collecting the encrypted information;
means for determining, by the mobile terminal, PUCCH resources for transmitting the scheduling request in response to establishing the communication connection with the base station;
means for transmitting, by a mobile terminal, a scheduling request to the base station in response to determining PUCCH resources for transmitting the scheduling request;
means for determining, by a base station, an operating mode of the base station in response to receiving the scheduling request;
if the operation mode of the base station is judged to be a first operation mode, the base station sends a first PDCCH message and a second PDCCH message to the mobile terminal, wherein the first PDCCH message comprises a first uplink grant, the first uplink grant indicates resources for sending the first PUSCH message, the second PDCCH message comprises a second uplink grant, and the second uplink grant indicates resources for sending the second PUSCH message;
means for transmitting, by a mobile terminal, a first PUSCH message to the base station on the resource for transmitting the first PUSCH message in response to receiving the first PDCCH message, wherein the encryption information is included in the first PUSCH message, wherein the resource for transmitting the first PUSCH message is located on a first frequency band, the resource for transmitting the first PUSCH message occupies a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot;
Means for transmitting, by a mobile terminal, a second PUSCH message to the base station on the resource for transmitting a second PUSCH message in response to receiving the second PDCCH message, wherein the second PUSCH message comprises a copy of the encryption information, wherein the resource for transmitting a second PUSCH message is located on a second frequency band, the resource for transmitting a second PUSCH message occupies a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, wherein a first symbol for transmitting a second PUSCH message is located at a beginning of the second time slot;
and means for transmitting, by the base station, the encrypted information to an encryption server in response to receiving the encrypted information.
7. The system for secure real-time transmission of encrypted information according to claim 6, wherein the system for secure real-time transmission of encrypted information comprises:
a unit configured to send, by a base station, a first PDCCH message to the mobile terminal if the operation mode of the base station is determined to be a second operation mode, where the first PDCCH message includes a first uplink grant, where the first uplink grant indicates resources for sending a first PUSCH message and a second PUSCH message, where the first PDCCH message indicates that the mobile terminal needs to send a second PUSCH message, and where the first PDCCH message indicates that the mobile terminal sends the second PUSCH message immediately after sending the first PUSCH message;
Means for transmitting, by a mobile terminal, a first PUSCH message to the base station on the resource for transmitting the first PUSCH message in response to receiving the first PDCCH message, wherein the encryption information is included in the first PUSCH message, wherein the resource for transmitting the first PUSCH message is located on a first frequency band, the resource for transmitting the first PUSCH message occupies a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot;
means for transmitting, by a mobile terminal, a second PUSCH message to the base station on the resource for transmitting a second PUSCH message in response to receiving the first PDCCH message, wherein the second PUSCH message comprises a copy of the encryption information, wherein the resource for transmitting a second PUSCH message is located on a second frequency band, the resource for transmitting a second PUSCH message occupies a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, wherein a first symbol for transmitting a second PUSCH message is located at a beginning of the second time slot;
And means for transmitting, by the base station, the encrypted information to an encryption server in response to receiving the encrypted information.
8. The system for secure real-time transmission of encrypted information according to claim 7, wherein the system for secure real-time transmission of encrypted information comprises:
if the operation mode of the base station is judged to be a third operation mode, the base station sends a first PDCCH message and a second PDCCH message to the mobile terminal, wherein the first PDCCH message comprises a first uplink grant, the first uplink grant indicates resources for sending the first PUSCH message, the second PDCCH message comprises a second uplink grant, and the second uplink grant indicates resources for sending the second PUSCH message;
means for transmitting, by a mobile terminal, a first PUSCH message to the base station on the resource for transmitting the first PUSCH message in response to receiving the first PDCCH message, wherein the encryption information is included in the first PUSCH message, wherein the resource for transmitting the first PUSCH message is located on a first frequency band, the resource for transmitting the first PUSCH message occupies a plurality of symbols in a first time slot, wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot;
Means for transmitting, by a mobile terminal, a second PUSCH message to the base station on the resource for transmitting a second PUSCH message in response to receiving the second PDCCH message, wherein the second PUSCH message comprises a copy of the encryption information, wherein the resource for transmitting a second PUSCH message is located on a second frequency band, the resource for transmitting a second PUSCH message occupies a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, and the first frequency band and the second frequency band belong to different bandwidth portions BWP, wherein a first symbol for transmitting a second PUSCH message is spaced apart from the last symbol for transmitting a first PUSCH message by a plurality of symbols;
and means for transmitting, by the base station, the encrypted information to an encryption server in response to receiving the encrypted information.
9. The system for secure real-time transmission of encrypted information according to claim 8, wherein the system for secure real-time transmission of encrypted information comprises:
A unit configured to send, by a base station, a first PDCCH message to the mobile terminal if the operation mode of the base station is determined to be a fourth operation mode, where the first PDCCH message includes a first uplink grant, where the first uplink grant indicates resources for sending a first PUSCH message and a second PUSCH message, where the first PDCCH message indicates that the mobile terminal needs to send a second PUSCH message, and where the first PDCCH message indicates that the mobile terminal sends the second PUSCH message immediately after sending the first PUSCH message;
and means for transmitting, by the mobile terminal, a first PUSCH message to the base station on the resource for transmitting the first PUSCH message in response to receiving the first PDCCH message, wherein the encryption information is included in the first PUSCH message, wherein the resource for transmitting the first PUSCH message is located on a first frequency band, the resource for transmitting the first PUSCH message occupies a plurality of symbols in a first time slot, and wherein a last symbol for transmitting the first PUSCH message is located at an end of the first time slot.
10. The system for secure real-time transmission of encrypted information according to claim 9, wherein the system for secure real-time transmission of encrypted information comprises:
Means for transmitting, by a mobile terminal, a second PUSCH message to the base station on the resource for transmitting a second PUSCH message in response to receiving the first PDCCH message, wherein the second PUSCH message comprises a copy of the encryption information, wherein the resource for transmitting a second PUSCH message is located on a second frequency band, the resource for transmitting a second PUSCH message occupies a plurality of symbols in a second time slot, wherein the second time slot is a time slot immediately following the first time slot, wherein the second frequency band does not overlap the first frequency band, and the first frequency band and the second frequency band belong to different bandwidth portions BWP, wherein a first symbol for transmitting a second PUSCH message is spaced apart from the last symbol for transmitting a first PUSCH message by a plurality of symbols;
and means for transmitting, by the base station, the encrypted information to an encryption server in response to receiving the encrypted information.
CN202011021033.6A 2020-09-25 2020-09-25 Method and system for transmitting encrypted information in real time for information security Active CN112040479B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011021033.6A CN112040479B (en) 2020-09-25 2020-09-25 Method and system for transmitting encrypted information in real time for information security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011021033.6A CN112040479B (en) 2020-09-25 2020-09-25 Method and system for transmitting encrypted information in real time for information security

Publications (2)

Publication Number Publication Date
CN112040479A CN112040479A (en) 2020-12-04
CN112040479B true CN112040479B (en) 2023-10-27

Family

ID=73575295

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011021033.6A Active CN112040479B (en) 2020-09-25 2020-09-25 Method and system for transmitting encrypted information in real time for information security

Country Status (1)

Country Link
CN (1) CN112040479B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20170029379A (en) * 2015-09-07 2017-03-15 한국전자통신연구원 Method and apparatus for requesting uplink persistent scheduling in mobile communication systems
CN108370594A (en) * 2015-12-31 2018-08-03 华为技术有限公司 Data transmission processing method, user equipment and base station
CN108886448A (en) * 2016-03-27 2018-11-23 Lg 电子株式会社 The method and device thereof of around uplink demodulation reference signal are sent and received in wireless communication system
CN110380830A (en) * 2019-07-19 2019-10-25 展讯通信(上海)有限公司 Terminal, base station, communication system, data transmission method and storage medium
CN110603765A (en) * 2017-05-04 2019-12-20 夏普株式会社 Hybrid automatic repeat request for uplink ultra-high reliability and low latency communication
CN110831200A (en) * 2018-08-07 2020-02-21 财团法人资讯工业策进会 User device and base station for mobile communication system
CN111405642A (en) * 2019-01-03 2020-07-10 华为技术有限公司 Message sending method, message receiving method, device and equipment
CN111417102A (en) * 2020-03-31 2020-07-14 倪航标 Method and system for transmitting intelligent household security alarm information in real time
CN111555854A (en) * 2020-05-20 2020-08-18 蚌埠珠领智能科技有限公司 3D rendering switching method and system for mobile terminal game process
CN111669822A (en) * 2020-06-18 2020-09-15 河南工学院 Vehicle driving position information transmission method and system based on Internet of vehicles

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11477771B2 (en) * 2016-04-05 2022-10-18 Qualcomm Incorporated Indicating start and stop symbols of PDSCH and PUSCH through PDCCH
US11259293B2 (en) * 2019-01-10 2022-02-22 Ofinno, Llc Two-stage preamble transmission

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20170029379A (en) * 2015-09-07 2017-03-15 한국전자통신연구원 Method and apparatus for requesting uplink persistent scheduling in mobile communication systems
CN108370594A (en) * 2015-12-31 2018-08-03 华为技术有限公司 Data transmission processing method, user equipment and base station
CN108886448A (en) * 2016-03-27 2018-11-23 Lg 电子株式会社 The method and device thereof of around uplink demodulation reference signal are sent and received in wireless communication system
CN110603765A (en) * 2017-05-04 2019-12-20 夏普株式会社 Hybrid automatic repeat request for uplink ultra-high reliability and low latency communication
CN110831200A (en) * 2018-08-07 2020-02-21 财团法人资讯工业策进会 User device and base station for mobile communication system
CN111405642A (en) * 2019-01-03 2020-07-10 华为技术有限公司 Message sending method, message receiving method, device and equipment
CN110380830A (en) * 2019-07-19 2019-10-25 展讯通信(上海)有限公司 Terminal, base station, communication system, data transmission method and storage medium
CN111417102A (en) * 2020-03-31 2020-07-14 倪航标 Method and system for transmitting intelligent household security alarm information in real time
CN111555854A (en) * 2020-05-20 2020-08-18 蚌埠珠领智能科技有限公司 3D rendering switching method and system for mobile terminal game process
CN111669822A (en) * 2020-06-18 2020-09-15 河南工学院 Vehicle driving position information transmission method and system based on Internet of vehicles

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Chalakorn Karupongsiri ; Kumudu S. Munasinghe ; Abbas Jamalipour.Smart meter packet transmission via the control signal at dynamic load on eNode-B in LTE networks.IEEE.2015,全文. *
一种降低LTE DTX的方法;刘阅希;;中国新通信(第10期);全文 *

Also Published As

Publication number Publication date
CN112040479A (en) 2020-12-04

Similar Documents

Publication Publication Date Title
CN108737430B (en) Encryption communication method and system for block chain node
US10680805B2 (en) Data encryption control using multiple controlling authorities
US20140052989A1 (en) Secure data exchange using messaging service
US20180234426A1 (en) Authorization server, authorization method and non-transitory computer readable medium thereof
CN105553951A (en) Data transmission method and data transmission device
CN105450406A (en) Data processing method and device
Kwon et al. Towards 5G-based IoT security analysis against Vo5G eavesdropping
CN101404576A (en) Network resource query method and system
JP4975252B2 (en) Method and apparatus for detecting a shared secret without compromising the non-shared secret
CN111246474B (en) Base station authentication method and device
CN110855695A (en) Improved SDN network security authentication method and system
CN104243452B (en) A kind of cloud computing access control method and system
CN115473655B (en) Terminal authentication method, device and storage medium for access network
Gao et al. A lightweight cryptographic algorithm for the transmission of images from road environments in self-driving
CN108900595B (en) Method, device and equipment for accessing data of cloud storage server and computing medium
CN114520726A (en) Processing method and device based on block chain data, processor and electronic equipment
CN114223233A (en) Data security for network slice management
Damir et al. A beyond-5G authentication and key agreement protocol
CN104243153A (en) Method for spotting equipment user, and user equipment
CN110807210B (en) Information processing method, platform, system and computer storage medium
CN107995616B (en) User behavior data processing method and device
CN112040479B (en) Method and system for transmitting encrypted information in real time for information security
CN109492359B (en) Secure network middleware for identity authentication and implementation method and device thereof
JP2022523068A (en) Systems and methods for secure electronic data transfer
CN115001719B (en) Private data processing system, method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant