CN101128033B - Method for changing encryption algorithm in relocation - Google Patents

Method for changing encryption algorithm in relocation Download PDF

Info

Publication number
CN101128033B
CN101128033B CN2006101114556A CN200610111455A CN101128033B CN 101128033 B CN101128033 B CN 101128033B CN 2006101114556 A CN2006101114556 A CN 2006101114556A CN 200610111455 A CN200610111455 A CN 200610111455A CN 101128033 B CN101128033 B CN 101128033B
Authority
CN
China
Prior art keywords
radio network
network controller
message
rnc
positioning
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2006101114556A
Other languages
Chinese (zh)
Other versions
CN101128033A (en
Inventor
王继承
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN2006101114556A priority Critical patent/CN101128033B/en
Priority to RU2009109590/09A priority patent/RU2423005C2/en
Priority to PCT/CN2006/003676 priority patent/WO2008022498A1/en
Publication of CN101128033A publication Critical patent/CN101128033A/en
Application granted granted Critical
Publication of CN101128033B publication Critical patent/CN101128033B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/10Reselecting an access point controller

Abstract

The utility model discloses a method to realize the change of encryption algorithm in re-positioning, which aims to resolve the problems that when any change occurs to the encryption algorithm during the re-positioning process, in which UE does not participate, and the target RNC does not support the encryption algorithm used in original RNC, the re-positioning cannot be done. The utility model comprises the following steps: after receiving the request message of re-positioning sent by the original RNC, the target RNC sends a response message of the re-positioning request to the original RNC; after receiving the response message of the re-positioning request, the original RNC sends an execution message of repositioning; after receiving the execution message of re-positioning, the target RNC waits for a response message from UE; the original RNC sends a re-positioning message to UE; after receiving the message to trigger re-positioning, UE encrypts the response message with novel encryption algorithm and sends to the target RNC; after the target RNC receives the response message from UE, the re-positioning process is completed. The utility model sends to UE the message of air interface to notify UE re-positioning with the encryption ability of the original RNC under the situation that the target RNC does not support the encryption algorithm of the original RNC.

Description

Realize the method for changing encryption algorithm in the reorientation
Technical field
The present invention relates to a kind of about the method for UE (terminal equipment) mobile management and encipherment protection between a plurality of RNS (RNS) in Wideband Code Division Multiple Access (WCDMA) (the WCDMA:Wideband Code Division Multi-Access) mobile communication system.
Background technology
Reorientation
When UE when the cell coverage area of a RNC (radio network controller) control moves to the cell coverage area of another one RNC control, first RNC (being referred to as former RNC) may determine to initiate the reorientation flow process, and the Radio Resource of UE is moved to second RNC (being referred to as Target RNC).To be the UE distributing radio resource by Target RNC after the reorientation flow process finishes, be supplied to the carrying that CN (core net) connects.This UE also will all discharge after the reorientation flow process finish at the Radio Resource of former RNC.
Repositioning process may be not only RNC change has taken place, if former RNC is managed by different CN with Target RNC, CN also can change after then reorientation was finished.Accordingly, if present, the CN of the former RNC of management is referred to as former CN, the CN of management objectives RNC is referred to as target CN.
The reorientation of two kinds of reorientation flow process: UE participations and the reorientation that UE does not participate in are arranged.
The reorientation that UE does not participate in requires before reorientation UE just to exist and being connected of Target RNC, former RNC will not notify UE when initiating reorientation, after reorientation is finished, just can use the message informing UE Radio Resource of air interface to begin to distribute and control by Target RNC.
The reorientation that UE participates in is to send one by former RNC to UE to carry out the message of switching in repositioning process, and having comprised Target RNC in the message is the new wireless resource information that UE distributes.UE sets up and being connected of Target RNC according to these information, has also finished repositioning process when finishing switching.
Encrypt
In order to protect user's safety of propagation data aloft, the WCDMA system can be to these data encryptions.In order to finish encryption function, need communication two party, refer to RNC and UE here, have identical key, use identical cryptographic algorithm, and use the encryption parameter that defines in other identical 3GPP (third generation mobile cooperative association) agreement.If the encryption parameter that communication two party uses is inconsistent, the data receiver who sends the recipient after will causing transmit leg to be encrypted to can't correctly decipher, and also just can't correctly receive.
For the correct execution of encryption function after guaranteeing from former RNC to the Target RNC reorientation, all encryption parameters all will pass to Target RNC by former RNC.Target RNC can use the encryption parameter identical with former RNC after reorientation was finished like this, under the situation of not interrupting encipherment protection, kept correct communicating by letter with UE.
The problem that exists
WCDMA system definition multiple encryption algorithms, actual configuration or the ability of using which kind of algorithm need consider CN, RNC and UE simultaneously in the communication process.When reorientation took place, former RNC and Target RNC or former CN were with target CN possible configuration or support different cryptographic algorithm, so repositioning process may cause the change of cryptographic algorithm.
If the reorientation that UE participates in, if changing encryption algorithm, then new cryptographic algorithm will be carried to be switched in the message.This sends to UE in former RNC to switch message, use the preceding cryptographic algorithm of reorientation, so UE can correctly receive switching message.After UE receives and switches message, use new cryptographic algorithm to set up immediately and communicate by letter with Target RNC.The repositioning process of UE participation even change has taken place cryptographic algorithm, also can complete successfully like this.
But if the reorientation that UE does not participate in, the message of notice UE reorientation need send to UE by Target RNC after reorientation is finished.If changing encryption algorithm, and UE can not know new cryptographic algorithm, so the Target RNC cryptographic algorithm that still must use former RNC to use when sending the message of notice UE reorientation.Require Target RNC must support the cryptographic algorithm that former RNC uses in this case, if do not support, reorientation just can't be carried out.
Summary of the invention
Defective and deficiency at the prior art existence, the invention provides and a kind ofly in the repositioning process that terminal equipment does not participate in, changing encryption algorithm takes place, and when Target RNC is not supported cryptographic algorithm that former RNC uses, realize the method for changing encryption algorithm in also can the reorientation of successful reorientation.
For achieving the above object, the present invention by the following technical solutions: realize the method for changing encryption algorithm in a kind of reorientation, comprise the steps:
After steps A, target radio network controller are received the RELOCATION REQUEST message of former radio network controller transmission, send re-positioning request and receive the response through core net to former radio network controller;
Step B after former radio network controller receives that re-positioning request is receiveed the response, sends trigger re-positioning message to terminal equipment, sends execution message of repositioning to target radio network controller;
Step C, target radio network controller is received execution message of repositioning, the data of beginning receiving terminal apparatus are waited for receiveing the response of terminal equipment;
After step D, terminal equipment receive trigger re-positioning message, therefrom obtain the new cryptographic algorithm of target radio network controller, terminal equipment uses new cryptographic algorithm encryption to receive the response, and sends to target radio network controller;
Step e, target radio network controller are received receiveing the response of terminal equipment, and repositioning process is finished.
Preferably: in described reorientation, realize in the method for changing encryption algorithm, in the receive the response cryptographic algorithm of the message that carries the reorientation of notice terminal equipment and new target radio network controller of re-positioning request described in the steps A.
Preferably: realize in the method for changing encryption algorithm, in described step B in described reorientation: former radio network controller sends trigger re-positioning message twice for terminal equipment at least.
Preferably: realize that in described reorientation described step e is specially in the method for changing encryption algorithm:
After target radio network controller is received receiveing the response of terminal equipment, discharge the transmission channel that is used to connect former radio network controller and target radio network controller, repositioning process is finished.
Preferably: in described reorientation, realize in the method for changing encryption algorithm, when former radio network controller sends trigger re-positioning message to terminal equipment described in the step B, use the cryptographic algorithm of old former radio network controller.
The present invention does not support at Target RNC will notify the air-interface information of UE reorientation to send to UE by the cryptographic capabilities of former RNC under the situation of former RNC cryptographic algorithm.
For the message that guarantees trigger re-positioning can pass to UE more reliably, described air-interface information is sent twice at least to terminal equipment at step D Central Plains RNC.
After the former RNC of step B sends execution message of repositioning to Target RNC, former RNC does not have to discharge the transmission channel that is used to be connected former RNC and Target RNC with Target RNC, received receiveing the response of UE up to Target RNC, in step G, former RNC just discharges the transmission channel that is used to be connected former RNC and Target RNC with Target RNC, to guarantee the reorientation success.
Description of drawings:
Fig. 1 is the method implementation process figure that realizes changing encryption algorithm in the reorientation of the present invention.
Embodiment
The present invention be directed to the reorientation that a) reorientation type is that UE does not participate in, and b) cryptographic algorithm selected for use of Target RNC is different with the cryptographic algorithm that former RNC uses, and c) Target RNC is not supported the cryptographic algorithm that former RNC uses, situation under realize the method for reorientation.
Elaborate below in conjunction with the method that realizes changing encryption algorithm in 1 pair of reorientation of the present invention of accompanying drawing.
Realize the method for changing encryption algorithm in a kind of reorientation, comprise the steps:
After steps A, Target RNC are received the RELOCATION REQUEST message of former RNC transmission, send re-positioning request and receive the response through core net to former RNC;
Step B after former RNC receives that re-positioning request is receiveed the response, sends trigger re-positioning message to terminal equipment, and for the message that guarantees trigger re-positioning can pass to UE more reliably, former RNC can repeatedly repeat to send this message; Former RNC sends execution message of repositioning to Target RNC;
Step C, target radio network controller is received execution message of repositioning, the data of beginning receiving terminal apparatus are waited for receiveing the response of terminal equipment;
After step D, terminal equipment receive trigger re-positioning message, therefrom obtain the new cryptographic algorithm of target radio network controller, terminal equipment uses new cryptographic algorithm encryption to receive the response, and sends to target radio network controller;
Step e: after target radio network controller is received receiveing the response of terminal equipment, discharge the transmission channel that is used to connect former radio network controller and target radio network controller, repositioning process is finished.

Claims (5)

1. realize the method for changing encryption algorithm in the reorientation, comprise the steps:
After steps A, target radio network controller are received the RELOCATION REQUEST message of former radio network controller transmission, send re-positioning request and receive the response through core net to former radio network controller;
Step B after former radio network controller receives that re-positioning request is receiveed the response, sends trigger re-positioning message to terminal equipment, sends execution message of repositioning to target radio network controller;
Step C, target radio network controller is received execution message of repositioning, the data of beginning receiving terminal apparatus are waited for receiveing the response of terminal equipment;
After step D, terminal equipment receive trigger re-positioning message, therefrom obtain the new cryptographic algorithm of target radio network controller, terminal equipment uses new cryptographic algorithm encryption to receive the response, and sends to target radio network controller;
Step e, target radio network controller are received receiveing the response of terminal equipment, and repositioning process is finished.
2. realize the method for changing encryption algorithm in the reorientation according to claim 1, it is characterized in that, in the receive the response cryptographic algorithm of the message that carries notice terminal equipment reorientation and new target radio network controller of re-positioning request described in the steps A.
3. realize the method for changing encryption algorithm in the reorientation according to claim 1, it is characterized in that in described step B: former radio network controller sends trigger re-positioning message one time for terminal equipment at least.
4. realize the method for changing encryption algorithm in the reorientation according to claim 1, it is characterized in that described step e is specially:
After target radio network controller is received receiveing the response of terminal equipment, discharge the transmission channel that is used to connect former radio network controller and target radio network controller, repositioning process is finished.
5. realize the method for changing encryption algorithm in the reorientation according to claim 3, it is characterized in that, when former radio network controller sends trigger re-positioning message to terminal equipment described in the step B, use the cryptographic algorithm of old former radio network controller.
CN2006101114556A 2006-08-18 2006-08-18 Method for changing encryption algorithm in relocation Expired - Fee Related CN101128033B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN2006101114556A CN101128033B (en) 2006-08-18 2006-08-18 Method for changing encryption algorithm in relocation
RU2009109590/09A RU2423005C2 (en) 2006-08-18 2006-12-29 Method to change coding logic in reconfiguration
PCT/CN2006/003676 WO2008022498A1 (en) 2006-08-18 2006-12-29 A method for changing the encryption algorithm in relocation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2006101114556A CN101128033B (en) 2006-08-18 2006-08-18 Method for changing encryption algorithm in relocation

Publications (2)

Publication Number Publication Date
CN101128033A CN101128033A (en) 2008-02-20
CN101128033B true CN101128033B (en) 2011-04-20

Family

ID=39095917

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2006101114556A Expired - Fee Related CN101128033B (en) 2006-08-18 2006-08-18 Method for changing encryption algorithm in relocation

Country Status (3)

Country Link
CN (1) CN101128033B (en)
RU (1) RU2423005C2 (en)
WO (1) WO2008022498A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102036233B (en) * 2009-09-27 2014-03-12 中兴通讯股份有限公司 Repositioning processing method and system
CN101835154B (en) 2010-04-20 2016-03-30 中兴通讯股份有限公司 A kind of method and system setting up the air interface key of enhancing
CN101902736B (en) * 2010-07-23 2018-01-23 江苏悦达数梦技术有限公司 Update method, core net node and the wireless access system of air interface key
CN101902738B (en) * 2010-08-18 2016-03-30 中兴通讯股份有限公司 The update method of air interface key, device and wireless access system
CN101909292B (en) 2010-08-18 2016-04-13 中兴通讯股份有限公司 The update method of air interface key, core net node and subscriber equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040203783A1 (en) * 2002-11-08 2004-10-14 Gang Wu Wireless network handoff key
CN1633762A (en) * 2002-02-16 2005-06-29 Lg电子株式会社 Method of relocating SRNS

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1633762A (en) * 2002-02-16 2005-06-29 Lg电子株式会社 Method of relocating SRNS
US20040203783A1 (en) * 2002-11-08 2004-10-14 Gang Wu Wireless network handoff key

Also Published As

Publication number Publication date
RU2009109590A (en) 2010-09-27
CN101128033A (en) 2008-02-20
WO2008022498A1 (en) 2008-02-28
RU2423005C2 (en) 2011-06-27

Similar Documents

Publication Publication Date Title
CN108366362B (en) MESH network and MESH equipment security network distribution method thereof
CN103945376B (en) The wireless device and method that re-cipher key is carried out in the case where reducing packet loss conditions for high throughput wireless communication
EP2309698B1 (en) Exchange of key material
CN101142790B (en) Secure switching system for networks and method for secure switching
CN103179558B (en) Group system group exhales encryption implementation method and system
CN101232731B (en) Method and system for UE to generate cryptographic key switching from UTRAN to EUTRAN
CN102291680B (en) Encrypted group calling method based on long term evolution (TD-LTE) trunking communication system
CN101518032B (en) Encryption in a wireless telecommunications
CN101072236A (en) Method and apparatus for setting ciphering activation time in a wireless communications system
CN101800943B (en) Multicasting key negotiation method and system suitable for group calling system
CN1937489A (en) Network key management and session key updating method
WO2006044251A2 (en) Method for performing authenticated handover in a wireless local area network
CN101128033B (en) Method for changing encryption algorithm in relocation
WO2013170499A1 (en) System and method for establishing a secure connection in communications systems
CN100563186C (en) A kind of method of in wireless access network, setting up escape way
US20110002272A1 (en) Communication apparatus and communication method
CN104521261B (en) Being provided in communication network can the method for Lawful intercept, user's set and base transceiver station
CN1937840B (en) Method and device for obtaining safety alliance information during mobile terminal switching
CN101141789B (en) Method and system for determining cipher key updating time
CN102711104A (en) Method for determining secret key updating time and secret key using entity
CN101588576A (en) Method and a system for protecting terminal privacy in wireless communication system
US8514748B2 (en) Method and system for improved authentication for communications network setup
CN102469454A (en) Key setting method in radio network controller (RNC) and wireless network controller as well as terminal
US20160095053A1 (en) Security Feature Negotiation Between Network and User Terminal
CN116782211A (en) Determination method of switching key, switching method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20110420

Termination date: 20190818