CN101128033B - Method for changing encryption algorithm in relocation - Google Patents
Method for changing encryption algorithm in relocation Download PDFInfo
- Publication number
- CN101128033B CN101128033B CN2006101114556A CN200610111455A CN101128033B CN 101128033 B CN101128033 B CN 101128033B CN 2006101114556 A CN2006101114556 A CN 2006101114556A CN 200610111455 A CN200610111455 A CN 200610111455A CN 101128033 B CN101128033 B CN 101128033B
- Authority
- CN
- China
- Prior art keywords
- radio network
- network controller
- message
- rnc
- positioning
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/10—Reselecting an access point controller
Abstract
The utility model discloses a method to realize the change of encryption algorithm in re-positioning, which aims to resolve the problems that when any change occurs to the encryption algorithm during the re-positioning process, in which UE does not participate, and the target RNC does not support the encryption algorithm used in original RNC, the re-positioning cannot be done. The utility model comprises the following steps: after receiving the request message of re-positioning sent by the original RNC, the target RNC sends a response message of the re-positioning request to the original RNC; after receiving the response message of the re-positioning request, the original RNC sends an execution message of repositioning; after receiving the execution message of re-positioning, the target RNC waits for a response message from UE; the original RNC sends a re-positioning message to UE; after receiving the message to trigger re-positioning, UE encrypts the response message with novel encryption algorithm and sends to the target RNC; after the target RNC receives the response message from UE, the re-positioning process is completed. The utility model sends to UE the message of air interface to notify UE re-positioning with the encryption ability of the original RNC under the situation that the target RNC does not support the encryption algorithm of the original RNC.
Description
Technical field
The present invention relates to a kind of about the method for UE (terminal equipment) mobile management and encipherment protection between a plurality of RNS (RNS) in Wideband Code Division Multiple Access (WCDMA) (the WCDMA:Wideband Code Division Multi-Access) mobile communication system.
Background technology
Reorientation
When UE when the cell coverage area of a RNC (radio network controller) control moves to the cell coverage area of another one RNC control, first RNC (being referred to as former RNC) may determine to initiate the reorientation flow process, and the Radio Resource of UE is moved to second RNC (being referred to as Target RNC).To be the UE distributing radio resource by Target RNC after the reorientation flow process finishes, be supplied to the carrying that CN (core net) connects.This UE also will all discharge after the reorientation flow process finish at the Radio Resource of former RNC.
Repositioning process may be not only RNC change has taken place, if former RNC is managed by different CN with Target RNC, CN also can change after then reorientation was finished.Accordingly, if present, the CN of the former RNC of management is referred to as former CN, the CN of management objectives RNC is referred to as target CN.
The reorientation of two kinds of reorientation flow process: UE participations and the reorientation that UE does not participate in are arranged.
The reorientation that UE does not participate in requires before reorientation UE just to exist and being connected of Target RNC, former RNC will not notify UE when initiating reorientation, after reorientation is finished, just can use the message informing UE Radio Resource of air interface to begin to distribute and control by Target RNC.
The reorientation that UE participates in is to send one by former RNC to UE to carry out the message of switching in repositioning process, and having comprised Target RNC in the message is the new wireless resource information that UE distributes.UE sets up and being connected of Target RNC according to these information, has also finished repositioning process when finishing switching.
Encrypt
In order to protect user's safety of propagation data aloft, the WCDMA system can be to these data encryptions.In order to finish encryption function, need communication two party, refer to RNC and UE here, have identical key, use identical cryptographic algorithm, and use the encryption parameter that defines in other identical 3GPP (third generation mobile cooperative association) agreement.If the encryption parameter that communication two party uses is inconsistent, the data receiver who sends the recipient after will causing transmit leg to be encrypted to can't correctly decipher, and also just can't correctly receive.
For the correct execution of encryption function after guaranteeing from former RNC to the Target RNC reorientation, all encryption parameters all will pass to Target RNC by former RNC.Target RNC can use the encryption parameter identical with former RNC after reorientation was finished like this, under the situation of not interrupting encipherment protection, kept correct communicating by letter with UE.
The problem that exists
WCDMA system definition multiple encryption algorithms, actual configuration or the ability of using which kind of algorithm need consider CN, RNC and UE simultaneously in the communication process.When reorientation took place, former RNC and Target RNC or former CN were with target CN possible configuration or support different cryptographic algorithm, so repositioning process may cause the change of cryptographic algorithm.
If the reorientation that UE participates in, if changing encryption algorithm, then new cryptographic algorithm will be carried to be switched in the message.This sends to UE in former RNC to switch message, use the preceding cryptographic algorithm of reorientation, so UE can correctly receive switching message.After UE receives and switches message, use new cryptographic algorithm to set up immediately and communicate by letter with Target RNC.The repositioning process of UE participation even change has taken place cryptographic algorithm, also can complete successfully like this.
But if the reorientation that UE does not participate in, the message of notice UE reorientation need send to UE by Target RNC after reorientation is finished.If changing encryption algorithm, and UE can not know new cryptographic algorithm, so the Target RNC cryptographic algorithm that still must use former RNC to use when sending the message of notice UE reorientation.Require Target RNC must support the cryptographic algorithm that former RNC uses in this case, if do not support, reorientation just can't be carried out.
Summary of the invention
Defective and deficiency at the prior art existence, the invention provides and a kind ofly in the repositioning process that terminal equipment does not participate in, changing encryption algorithm takes place, and when Target RNC is not supported cryptographic algorithm that former RNC uses, realize the method for changing encryption algorithm in also can the reorientation of successful reorientation.
For achieving the above object, the present invention by the following technical solutions: realize the method for changing encryption algorithm in a kind of reorientation, comprise the steps:
After steps A, target radio network controller are received the RELOCATION REQUEST message of former radio network controller transmission, send re-positioning request and receive the response through core net to former radio network controller;
Step B after former radio network controller receives that re-positioning request is receiveed the response, sends trigger re-positioning message to terminal equipment, sends execution message of repositioning to target radio network controller;
Step C, target radio network controller is received execution message of repositioning, the data of beginning receiving terminal apparatus are waited for receiveing the response of terminal equipment;
After step D, terminal equipment receive trigger re-positioning message, therefrom obtain the new cryptographic algorithm of target radio network controller, terminal equipment uses new cryptographic algorithm encryption to receive the response, and sends to target radio network controller;
Step e, target radio network controller are received receiveing the response of terminal equipment, and repositioning process is finished.
Preferably: in described reorientation, realize in the method for changing encryption algorithm, in the receive the response cryptographic algorithm of the message that carries the reorientation of notice terminal equipment and new target radio network controller of re-positioning request described in the steps A.
Preferably: realize in the method for changing encryption algorithm, in described step B in described reorientation: former radio network controller sends trigger re-positioning message twice for terminal equipment at least.
Preferably: realize that in described reorientation described step e is specially in the method for changing encryption algorithm:
After target radio network controller is received receiveing the response of terminal equipment, discharge the transmission channel that is used to connect former radio network controller and target radio network controller, repositioning process is finished.
Preferably: in described reorientation, realize in the method for changing encryption algorithm, when former radio network controller sends trigger re-positioning message to terminal equipment described in the step B, use the cryptographic algorithm of old former radio network controller.
The present invention does not support at Target RNC will notify the air-interface information of UE reorientation to send to UE by the cryptographic capabilities of former RNC under the situation of former RNC cryptographic algorithm.
For the message that guarantees trigger re-positioning can pass to UE more reliably, described air-interface information is sent twice at least to terminal equipment at step D Central Plains RNC.
After the former RNC of step B sends execution message of repositioning to Target RNC, former RNC does not have to discharge the transmission channel that is used to be connected former RNC and Target RNC with Target RNC, received receiveing the response of UE up to Target RNC, in step G, former RNC just discharges the transmission channel that is used to be connected former RNC and Target RNC with Target RNC, to guarantee the reorientation success.
Description of drawings:
Fig. 1 is the method implementation process figure that realizes changing encryption algorithm in the reorientation of the present invention.
Embodiment
The present invention be directed to the reorientation that a) reorientation type is that UE does not participate in, and b) cryptographic algorithm selected for use of Target RNC is different with the cryptographic algorithm that former RNC uses, and c) Target RNC is not supported the cryptographic algorithm that former RNC uses, situation under realize the method for reorientation.
Elaborate below in conjunction with the method that realizes changing encryption algorithm in 1 pair of reorientation of the present invention of accompanying drawing.
Realize the method for changing encryption algorithm in a kind of reorientation, comprise the steps:
After steps A, Target RNC are received the RELOCATION REQUEST message of former RNC transmission, send re-positioning request and receive the response through core net to former RNC;
Step B after former RNC receives that re-positioning request is receiveed the response, sends trigger re-positioning message to terminal equipment, and for the message that guarantees trigger re-positioning can pass to UE more reliably, former RNC can repeatedly repeat to send this message; Former RNC sends execution message of repositioning to Target RNC;
Step C, target radio network controller is received execution message of repositioning, the data of beginning receiving terminal apparatus are waited for receiveing the response of terminal equipment;
After step D, terminal equipment receive trigger re-positioning message, therefrom obtain the new cryptographic algorithm of target radio network controller, terminal equipment uses new cryptographic algorithm encryption to receive the response, and sends to target radio network controller;
Step e: after target radio network controller is received receiveing the response of terminal equipment, discharge the transmission channel that is used to connect former radio network controller and target radio network controller, repositioning process is finished.
Claims (5)
1. realize the method for changing encryption algorithm in the reorientation, comprise the steps:
After steps A, target radio network controller are received the RELOCATION REQUEST message of former radio network controller transmission, send re-positioning request and receive the response through core net to former radio network controller;
Step B after former radio network controller receives that re-positioning request is receiveed the response, sends trigger re-positioning message to terminal equipment, sends execution message of repositioning to target radio network controller;
Step C, target radio network controller is received execution message of repositioning, the data of beginning receiving terminal apparatus are waited for receiveing the response of terminal equipment;
After step D, terminal equipment receive trigger re-positioning message, therefrom obtain the new cryptographic algorithm of target radio network controller, terminal equipment uses new cryptographic algorithm encryption to receive the response, and sends to target radio network controller;
Step e, target radio network controller are received receiveing the response of terminal equipment, and repositioning process is finished.
2. realize the method for changing encryption algorithm in the reorientation according to claim 1, it is characterized in that, in the receive the response cryptographic algorithm of the message that carries notice terminal equipment reorientation and new target radio network controller of re-positioning request described in the steps A.
3. realize the method for changing encryption algorithm in the reorientation according to claim 1, it is characterized in that in described step B: former radio network controller sends trigger re-positioning message one time for terminal equipment at least.
4. realize the method for changing encryption algorithm in the reorientation according to claim 1, it is characterized in that described step e is specially:
After target radio network controller is received receiveing the response of terminal equipment, discharge the transmission channel that is used to connect former radio network controller and target radio network controller, repositioning process is finished.
5. realize the method for changing encryption algorithm in the reorientation according to claim 3, it is characterized in that, when former radio network controller sends trigger re-positioning message to terminal equipment described in the step B, use the cryptographic algorithm of old former radio network controller.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2006101114556A CN101128033B (en) | 2006-08-18 | 2006-08-18 | Method for changing encryption algorithm in relocation |
RU2009109590/09A RU2423005C2 (en) | 2006-08-18 | 2006-12-29 | Method to change coding logic in reconfiguration |
PCT/CN2006/003676 WO2008022498A1 (en) | 2006-08-18 | 2006-12-29 | A method for changing the encryption algorithm in relocation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2006101114556A CN101128033B (en) | 2006-08-18 | 2006-08-18 | Method for changing encryption algorithm in relocation |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101128033A CN101128033A (en) | 2008-02-20 |
CN101128033B true CN101128033B (en) | 2011-04-20 |
Family
ID=39095917
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2006101114556A Expired - Fee Related CN101128033B (en) | 2006-08-18 | 2006-08-18 | Method for changing encryption algorithm in relocation |
Country Status (3)
Country | Link |
---|---|
CN (1) | CN101128033B (en) |
RU (1) | RU2423005C2 (en) |
WO (1) | WO2008022498A1 (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102036233B (en) * | 2009-09-27 | 2014-03-12 | 中兴通讯股份有限公司 | Repositioning processing method and system |
CN101835154B (en) | 2010-04-20 | 2016-03-30 | 中兴通讯股份有限公司 | A kind of method and system setting up the air interface key of enhancing |
CN101902736B (en) * | 2010-07-23 | 2018-01-23 | 江苏悦达数梦技术有限公司 | Update method, core net node and the wireless access system of air interface key |
CN101902738B (en) * | 2010-08-18 | 2016-03-30 | 中兴通讯股份有限公司 | The update method of air interface key, device and wireless access system |
CN101909292B (en) | 2010-08-18 | 2016-04-13 | 中兴通讯股份有限公司 | The update method of air interface key, core net node and subscriber equipment |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040203783A1 (en) * | 2002-11-08 | 2004-10-14 | Gang Wu | Wireless network handoff key |
CN1633762A (en) * | 2002-02-16 | 2005-06-29 | Lg电子株式会社 | Method of relocating SRNS |
-
2006
- 2006-08-18 CN CN2006101114556A patent/CN101128033B/en not_active Expired - Fee Related
- 2006-12-29 WO PCT/CN2006/003676 patent/WO2008022498A1/en active Application Filing
- 2006-12-29 RU RU2009109590/09A patent/RU2423005C2/en not_active IP Right Cessation
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1633762A (en) * | 2002-02-16 | 2005-06-29 | Lg电子株式会社 | Method of relocating SRNS |
US20040203783A1 (en) * | 2002-11-08 | 2004-10-14 | Gang Wu | Wireless network handoff key |
Also Published As
Publication number | Publication date |
---|---|
RU2009109590A (en) | 2010-09-27 |
CN101128033A (en) | 2008-02-20 |
WO2008022498A1 (en) | 2008-02-28 |
RU2423005C2 (en) | 2011-06-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108366362B (en) | MESH network and MESH equipment security network distribution method thereof | |
CN103945376B (en) | The wireless device and method that re-cipher key is carried out in the case where reducing packet loss conditions for high throughput wireless communication | |
EP2309698B1 (en) | Exchange of key material | |
CN101142790B (en) | Secure switching system for networks and method for secure switching | |
CN103179558B (en) | Group system group exhales encryption implementation method and system | |
CN101232731B (en) | Method and system for UE to generate cryptographic key switching from UTRAN to EUTRAN | |
CN102291680B (en) | Encrypted group calling method based on long term evolution (TD-LTE) trunking communication system | |
CN101518032B (en) | Encryption in a wireless telecommunications | |
CN101072236A (en) | Method and apparatus for setting ciphering activation time in a wireless communications system | |
CN101800943B (en) | Multicasting key negotiation method and system suitable for group calling system | |
CN1937489A (en) | Network key management and session key updating method | |
WO2006044251A2 (en) | Method for performing authenticated handover in a wireless local area network | |
CN101128033B (en) | Method for changing encryption algorithm in relocation | |
WO2013170499A1 (en) | System and method for establishing a secure connection in communications systems | |
CN100563186C (en) | A kind of method of in wireless access network, setting up escape way | |
US20110002272A1 (en) | Communication apparatus and communication method | |
CN104521261B (en) | Being provided in communication network can the method for Lawful intercept, user's set and base transceiver station | |
CN1937840B (en) | Method and device for obtaining safety alliance information during mobile terminal switching | |
CN101141789B (en) | Method and system for determining cipher key updating time | |
CN102711104A (en) | Method for determining secret key updating time and secret key using entity | |
CN101588576A (en) | Method and a system for protecting terminal privacy in wireless communication system | |
US8514748B2 (en) | Method and system for improved authentication for communications network setup | |
CN102469454A (en) | Key setting method in radio network controller (RNC) and wireless network controller as well as terminal | |
US20160095053A1 (en) | Security Feature Negotiation Between Network and User Terminal | |
CN116782211A (en) | Determination method of switching key, switching method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20110420 Termination date: 20190818 |