CA2039699C - Synchronizing method in a mobile radio system - Google Patents
Synchronizing method in a mobile radio systemInfo
- Publication number
- CA2039699C CA2039699C CA002039699A CA2039699A CA2039699C CA 2039699 C CA2039699 C CA 2039699C CA 002039699 A CA002039699 A CA 002039699A CA 2039699 A CA2039699 A CA 2039699A CA 2039699 C CA2039699 C CA 2039699C
- Authority
- CA
- Canada
- Prior art keywords
- station
- mobile
- mobile station
- base station
- ciphering
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/12—Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/037—Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Time-Division Multiplex Systems (AREA)
Abstract
A synchronizing method in a mobile radio system which operates with Time Division Multiple Access (TDMA) but which lacks global time reference for all base stations and mobiles in the system.
The inventive method is intended for ciphered transmission of data and speech in accordance with a given ciphering key (E2). When handing-over a call, the ciphering synchronism is lost. In accordance with the method, subsequent to hand-off (the time t2), the take-over base station (BS2) signals non-ciphered information (S1) to the mobile (MS) disclosing the number of frames (R1-R13) which shall pass until ciphering can again be commenced, calculated from a given frame (R1). Call information is transmitted in the following frame (R2), this information now being ciphered with the aid of a ciphering key (E1) different to the original key. This other ciphering key consists of a periodic bit sequence having a period which is equal to one frame interval.
The inventive method is intended for ciphered transmission of data and speech in accordance with a given ciphering key (E2). When handing-over a call, the ciphering synchronism is lost. In accordance with the method, subsequent to hand-off (the time t2), the take-over base station (BS2) signals non-ciphered information (S1) to the mobile (MS) disclosing the number of frames (R1-R13) which shall pass until ciphering can again be commenced, calculated from a given frame (R1). Call information is transmitted in the following frame (R2), this information now being ciphered with the aid of a ciphering key (E1) different to the original key. This other ciphering key consists of a periodic bit sequence having a period which is equal to one frame interval.
Description
SYNCHRONIZING METHOD IN A MO$ILE RADIO SYSTEM ~%' ~~i ~a ~~''T ~ r~
;", .J r,~ ,.. Vii' TECHNICAL FIELD
The present invention relates to a synchronizing method in a mobile radio system which lacks a global time reference, i.e. a system which lacks a time reference that is common to all mobiles and base stations in the system. More specifically, although not exclusively, the present invention relates to a method of synchro-nizing a random bit flow which is superimposed cryptically on the normal traffic flow during call transmission or data transmission between the base stations and the mobiles. The proposed method can be applied solely to a so-called TDMA-system, i.e. a mobile radio system in which calls are transferred in frames and time slots by means of time multiplex.
BACKGROUND ART
It is desirable in mobile radio systems, and in TDMA-systems in particular, to be able to maintain the security of calls so as to prevent unauthorized persons from setting-up and making calls over the network. In order to meet this requirement, it has been suggested that the calls are ciphered; see for instance EP-A-273289.
Calls between a base station and a mobile are cipheredby proces-sing the speech message in a scrambler, which functions to convert the speech signals into a random sequence an accordance with a given key. For instance, the speech signals can be superimposed with a random sequence of bits of relatively long duration (several minutes). In this case, the cipher key consists in the knowledge of the total bit pattern of the sequence and also knowledge of the time at which the sequence was commenced. An authorized subscriber can plug into a circuit module in the apparatus which stores this sequence and said starting time-point, and is thus able to decode incoming calls.
;", .J r,~ ,.. Vii' TECHNICAL FIELD
The present invention relates to a synchronizing method in a mobile radio system which lacks a global time reference, i.e. a system which lacks a time reference that is common to all mobiles and base stations in the system. More specifically, although not exclusively, the present invention relates to a method of synchro-nizing a random bit flow which is superimposed cryptically on the normal traffic flow during call transmission or data transmission between the base stations and the mobiles. The proposed method can be applied solely to a so-called TDMA-system, i.e. a mobile radio system in which calls are transferred in frames and time slots by means of time multiplex.
BACKGROUND ART
It is desirable in mobile radio systems, and in TDMA-systems in particular, to be able to maintain the security of calls so as to prevent unauthorized persons from setting-up and making calls over the network. In order to meet this requirement, it has been suggested that the calls are ciphered; see for instance EP-A-273289.
Calls between a base station and a mobile are cipheredby proces-sing the speech message in a scrambler, which functions to convert the speech signals into a random sequence an accordance with a given key. For instance, the speech signals can be superimposed with a random sequence of bits of relatively long duration (several minutes). In this case, the cipher key consists in the knowledge of the total bit pattern of the sequence and also knowledge of the time at which the sequence was commenced. An authorized subscriber can plug into a circuit module in the apparatus which stores this sequence and said starting time-point, and is thus able to decode incoming calls.
r-d ~ e.i ... ~r a) DISCLOSURE Of THE INVENTION
Some TDMA mobile radio systems lack a global time reference, i.e.
means in the mobile telephone exchange which contains a clack common to the overall system and operative to produce the same time reference for all base stations and mobiles in the system.
The purpose of such a common time reference is to enable the mobiles and the base stations to be synchronized with one another in certain frames arid time slots when synchronizing from signal-ling or data/speech signals falls away for some reason or other.
When transferring (hand-off) a call from one radio channel to another radio channel, synchronization between the mobile and its base station may be lost, since a brief interruption will occur during the actual transmission or swithching of the call. If the call is also ciphered, a further problem can occur as a result of fall-off of the synchronism of the actual ciphering key concerned, thereby rendering deciphering impossible.
These problems also occur when setting up ciphered calls, although said problems are most pronounced during "hand-off'°.
The present invention is based on the time sharing in different frames of the traffic flow (TDhlA-principle) and also on the access to a given ciphering sequence of relatively long duration (about 3 minutes) in relation to the time during which coupling or "hand-off" shall take place. The invention is alsa based on ciphering by superimposing a bit sequence on the normal traffic flow (data or speech and signalling). Prior to handing-off a call or during a given time interval during hand-off where synchronization of the ciphering sequence has ceased, non-ciphered signalling is effec-ted and thereafter the traffic flow is ciphered with a periodic bit sequency whose period is equal to a frame time interval. This ~ enables synchronization data to be transmitted to a mobile from a base station simultaneously with a ciphered traffic flora and discloses when normal ciphering shall commence.
An object of the present invention is thus to achieve synchronization of a cryptosequence when setting up or "handing-off" calls in a mobile telephone system which lacks a common time reference.
Thus, the present invention provides a method for reestablishing the ciphering of information in a mobile radio system which lacks a global time reference, wherein the data messages and the signalling messages between a 1o first base station and a mobile station are transmitted in frames having time slots and said messages are ciphered by combining said messages with a pseudorandom bit stream, wherein upon handing over the communication of the mobile from the first base station to a second base station ciphering is interrupted for a given period of time during which synchronization of the pseudorandom bit stream with said messages between the mobile and the first base station is lost due to the absence of said global time reference and frame synchronization is established between the mobile 2o and the second base station. The method includes the steps of generating a first signal which discloses a time point counted in numbers of frame intervals which shall pass until said ciphering is recommenced, subsequent to completing the hand-over of said messages transmitting said first signal from the second base station to the mobile station, and recommencing said ciphering upon occurrence of said time point.
By another aspect this invention provides a method for reestablishing encryption of information in a mobile radio system having first and second fixed stations and a mobile station. The method comprises the steps of: encrypting information exchanged between said first fixed station and said mobile station using a first encryption code; handing-off communications with said mobile station from said first fixed station to said second fixed station, said handing-off including establishing frame synchronization between 1o said second fixed station and said mobile station;
temporarily ceasing use of said first encryption code for communications with said mobile station; sending notification from said second fixed station to said mobile station informing said mobile station that the use of said first encryption code is to~be resumed at a time point after a certain number of frame times have elapsed in communications between said second fixed station and said mobile station; and reestablishing encryption upon occurrence of said time point.
BRIEF DESCRIPTION OF THE DRAWINGS
The invention will now be described in more detail with reference to the accompanying drawings, in which Figure 1 is a schematic illustration of two base stations and a mobile unit;
- 3a -Figure 2 is a time diagram for transmitting and receiving in accordance with the TDMA-principle;
Figure 3 is a time diagram for ciphering in accordance with the proposed method; and Figure 4 illustrates, in more detail, signalling during a given time interval in accordance with Figure 3.K1 BEST MODE OF CARRYING OUT THE INVENTION
1o Figure 1 illustrates schematically two base stations BS1 and BS2 and a mobile MS which is assumed to move from the base station BS1 towards the base station BS2. The base station BS1 serves traffic within the cell C1 and the base station BS2 serves traffic within the cell C2. The cells C1 and C2 have a common border G. When the mobile M
approaches the border G, the speech quality for a coupled call served by the base station BS1 over a given radio channel K1 will fall-off. Switching of a new radio channel K2 to MS from BS1 is effected, by measuring the field 2o strength of the radio signal and making calculations in accordance with known principles. This new channel K2 is served by BS2. During the actual switching sequence, which may have a duration of about 100 ms, MS will not receive and the receiving circuits in MS can loose the synchronism of the traffic flow, i.e. the time position of frames and time slots from base station BS1.
- 3b -f:~ ';i :~ '' _<;~ ~3 Figure 2 illustrates a transmitting frame and a receiving frame (RX and TX respectively) for the mobile MS.
It is assumed that prior to "hand-off", the traffic flow is ciphered with a certain key E2. This key consists of a bit sequence or a section of a longer, random bit sequence E (e.g. about 3 minutes long), which is superimposed on the traffic flow through modulo 2-addition bit for bit. As will be understood, the key E is known to 'the mobile MS when this is authorized to transmit and receive calls, and the base station BS1 transmit data concer-ning the starting time point, i.e. the place in the sequence E at which the bit Flow shall commence, i. e. E2 is known to the mobile MS. This ciphering technique is known in the art.
Figure 3 is a time diagram which illustrates application of the method during "hand°off" . It is assumed that the base station BS1 communicates with the mobile MS and that the communication (the speech) is ciphered by means of a crypto key E2 up to the time point t1. Hand-off takes place at the time t1.
Upon termination of the °°hand-off" process at time t2, MS
has synchronized with the new base station BS2. There is namely transmitted from this base station on a given control channel (SY
in Figure 2) during the time t1-t2 a synchronizing sequence which denotes the time position of the frames and the allotted time slot for the continued call communication between BS2 and MS. This is effected in a known manner by means of a correlation process in MS.
Thus, at the time t=t2, there is frame synchronization for speech/data transmission between BS2 and MS, but not for the ciphering. At t=t2, the base station BS2 transmits a non-ciphered signal which denotes when ciphering in accordance with the key E2 shall recommence, i.e. BS2 announces the time point t3. The traffic flaw (speech/data) is ciphered in subsequent frames with a key E1 which consists of a periodic, random bit sequence having a period equal to the frame interval. This enables the mobile MS
to count the number of frame intervals (announced by the non-ciphered signal) until ciphering in accordance with the key E2 is commenced by BS2. Possibly the ciphering key E1 can consist of ~ ,.
~~eb . :~N. .~
zeros only, i.e. the traffic flow in subsequent frames is trans-mitted unciphered (interval t2-t3) . The mobile MS can anyway count the number of frame intervals in spite of absence of 'the periodic bit sequence in the key E1, due to the presence of frame synchroni-zation in the control channel SY from the time point t2.
Figure 4 illustrates the sequence during the time interval t2-t3 more clearly.
According to Figure 3, at time t2 the mobile MS is synchronized to the new base station BS2 and the normal traffic flow (data, speech, synchronization) should have commenced if no ciphering has been employed. Synchronization with respect to the bit flow in the ciphering key E2 up to the time tl, however, has been lost. The base station therefore sends to MS a signal S1 which indicates how many frames shall pass until ciphering according to key E2 is to be commenced. This frame number is assumed to be 13 in the Figure 4 illustration. This message can be transmitted in a non-ciphered form on the so-called FACCH (Fast Associated Control Channel) formed by a reserved time slot within a frame, see Figure 2. This time slot is thus located in frame R1. During the frames R2, R3, ... R6 following the frame R1, the ciphered call information is transmitted and ciphered with the key E1. As before mentioned, this key is a periodic bit sequence whose period equals one frame interval and which can be superimposed on the call information by modulo-2 addition. Consequently, the mobile MS is aware of the time at which counting shall commence and also of the number of frame intervals to be counted. When this is understood by the mobile, a confirmation signal A1 is transmitted back to the base station BS2 and received in frame R6. When the base station BS2 receives this signal, the station will wait for a period of time which equals the agreed number of frames, i.e. to frame R13 (t=t3) where ciphering in accordance with the key E2 is commenced.
The base station BS2 thus 'waits a given length of time ( in Figure 4 a time equalling 5 frame intervals) for receipt of the confirma-tion signal A1. If, for some reason or other, this signal is not received by the base station BS2 within a given period of time, a "~a'~'~~~;i~°~
f~vrns.._ ,c signal S2 is again transmitted in frame R7 and a new confirmation signal A2 is awaited. The signal A1 can fall away because, e.g., of fading or difficult surrounding conditions at precisely the interval in which the signal A1 is transmitted. Thus, the number of frames (=R13) from the base station BS2 should be sufficien-tly large to enable repeated signalling according to the above to be carried out.
The signal delay between base station and mobile has been assumed to be about 2-3 frame intervals (~15 ms) in the Figure 4 illustra-Lion. This delay should also be taken into account. Thus, the ciphering time point t3 will preferably be chosen so that t2-t3 >
4 times the maximum propagation time. This calculation offers no difficulties, since the mobile is located on the border between two cells C1, C2 according to Figure 1, i.e. at a maximum distance from a base station.
Some TDMA mobile radio systems lack a global time reference, i.e.
means in the mobile telephone exchange which contains a clack common to the overall system and operative to produce the same time reference for all base stations and mobiles in the system.
The purpose of such a common time reference is to enable the mobiles and the base stations to be synchronized with one another in certain frames arid time slots when synchronizing from signal-ling or data/speech signals falls away for some reason or other.
When transferring (hand-off) a call from one radio channel to another radio channel, synchronization between the mobile and its base station may be lost, since a brief interruption will occur during the actual transmission or swithching of the call. If the call is also ciphered, a further problem can occur as a result of fall-off of the synchronism of the actual ciphering key concerned, thereby rendering deciphering impossible.
These problems also occur when setting up ciphered calls, although said problems are most pronounced during "hand-off'°.
The present invention is based on the time sharing in different frames of the traffic flow (TDhlA-principle) and also on the access to a given ciphering sequence of relatively long duration (about 3 minutes) in relation to the time during which coupling or "hand-off" shall take place. The invention is alsa based on ciphering by superimposing a bit sequence on the normal traffic flow (data or speech and signalling). Prior to handing-off a call or during a given time interval during hand-off where synchronization of the ciphering sequence has ceased, non-ciphered signalling is effec-ted and thereafter the traffic flow is ciphered with a periodic bit sequency whose period is equal to a frame time interval. This ~ enables synchronization data to be transmitted to a mobile from a base station simultaneously with a ciphered traffic flora and discloses when normal ciphering shall commence.
An object of the present invention is thus to achieve synchronization of a cryptosequence when setting up or "handing-off" calls in a mobile telephone system which lacks a common time reference.
Thus, the present invention provides a method for reestablishing the ciphering of information in a mobile radio system which lacks a global time reference, wherein the data messages and the signalling messages between a 1o first base station and a mobile station are transmitted in frames having time slots and said messages are ciphered by combining said messages with a pseudorandom bit stream, wherein upon handing over the communication of the mobile from the first base station to a second base station ciphering is interrupted for a given period of time during which synchronization of the pseudorandom bit stream with said messages between the mobile and the first base station is lost due to the absence of said global time reference and frame synchronization is established between the mobile 2o and the second base station. The method includes the steps of generating a first signal which discloses a time point counted in numbers of frame intervals which shall pass until said ciphering is recommenced, subsequent to completing the hand-over of said messages transmitting said first signal from the second base station to the mobile station, and recommencing said ciphering upon occurrence of said time point.
By another aspect this invention provides a method for reestablishing encryption of information in a mobile radio system having first and second fixed stations and a mobile station. The method comprises the steps of: encrypting information exchanged between said first fixed station and said mobile station using a first encryption code; handing-off communications with said mobile station from said first fixed station to said second fixed station, said handing-off including establishing frame synchronization between 1o said second fixed station and said mobile station;
temporarily ceasing use of said first encryption code for communications with said mobile station; sending notification from said second fixed station to said mobile station informing said mobile station that the use of said first encryption code is to~be resumed at a time point after a certain number of frame times have elapsed in communications between said second fixed station and said mobile station; and reestablishing encryption upon occurrence of said time point.
BRIEF DESCRIPTION OF THE DRAWINGS
The invention will now be described in more detail with reference to the accompanying drawings, in which Figure 1 is a schematic illustration of two base stations and a mobile unit;
- 3a -Figure 2 is a time diagram for transmitting and receiving in accordance with the TDMA-principle;
Figure 3 is a time diagram for ciphering in accordance with the proposed method; and Figure 4 illustrates, in more detail, signalling during a given time interval in accordance with Figure 3.K1 BEST MODE OF CARRYING OUT THE INVENTION
1o Figure 1 illustrates schematically two base stations BS1 and BS2 and a mobile MS which is assumed to move from the base station BS1 towards the base station BS2. The base station BS1 serves traffic within the cell C1 and the base station BS2 serves traffic within the cell C2. The cells C1 and C2 have a common border G. When the mobile M
approaches the border G, the speech quality for a coupled call served by the base station BS1 over a given radio channel K1 will fall-off. Switching of a new radio channel K2 to MS from BS1 is effected, by measuring the field 2o strength of the radio signal and making calculations in accordance with known principles. This new channel K2 is served by BS2. During the actual switching sequence, which may have a duration of about 100 ms, MS will not receive and the receiving circuits in MS can loose the synchronism of the traffic flow, i.e. the time position of frames and time slots from base station BS1.
- 3b -f:~ ';i :~ '' _<;~ ~3 Figure 2 illustrates a transmitting frame and a receiving frame (RX and TX respectively) for the mobile MS.
It is assumed that prior to "hand-off", the traffic flow is ciphered with a certain key E2. This key consists of a bit sequence or a section of a longer, random bit sequence E (e.g. about 3 minutes long), which is superimposed on the traffic flow through modulo 2-addition bit for bit. As will be understood, the key E is known to 'the mobile MS when this is authorized to transmit and receive calls, and the base station BS1 transmit data concer-ning the starting time point, i.e. the place in the sequence E at which the bit Flow shall commence, i. e. E2 is known to the mobile MS. This ciphering technique is known in the art.
Figure 3 is a time diagram which illustrates application of the method during "hand°off" . It is assumed that the base station BS1 communicates with the mobile MS and that the communication (the speech) is ciphered by means of a crypto key E2 up to the time point t1. Hand-off takes place at the time t1.
Upon termination of the °°hand-off" process at time t2, MS
has synchronized with the new base station BS2. There is namely transmitted from this base station on a given control channel (SY
in Figure 2) during the time t1-t2 a synchronizing sequence which denotes the time position of the frames and the allotted time slot for the continued call communication between BS2 and MS. This is effected in a known manner by means of a correlation process in MS.
Thus, at the time t=t2, there is frame synchronization for speech/data transmission between BS2 and MS, but not for the ciphering. At t=t2, the base station BS2 transmits a non-ciphered signal which denotes when ciphering in accordance with the key E2 shall recommence, i.e. BS2 announces the time point t3. The traffic flaw (speech/data) is ciphered in subsequent frames with a key E1 which consists of a periodic, random bit sequence having a period equal to the frame interval. This enables the mobile MS
to count the number of frame intervals (announced by the non-ciphered signal) until ciphering in accordance with the key E2 is commenced by BS2. Possibly the ciphering key E1 can consist of ~ ,.
~~eb . :~N. .~
zeros only, i.e. the traffic flow in subsequent frames is trans-mitted unciphered (interval t2-t3) . The mobile MS can anyway count the number of frame intervals in spite of absence of 'the periodic bit sequence in the key E1, due to the presence of frame synchroni-zation in the control channel SY from the time point t2.
Figure 4 illustrates the sequence during the time interval t2-t3 more clearly.
According to Figure 3, at time t2 the mobile MS is synchronized to the new base station BS2 and the normal traffic flow (data, speech, synchronization) should have commenced if no ciphering has been employed. Synchronization with respect to the bit flow in the ciphering key E2 up to the time tl, however, has been lost. The base station therefore sends to MS a signal S1 which indicates how many frames shall pass until ciphering according to key E2 is to be commenced. This frame number is assumed to be 13 in the Figure 4 illustration. This message can be transmitted in a non-ciphered form on the so-called FACCH (Fast Associated Control Channel) formed by a reserved time slot within a frame, see Figure 2. This time slot is thus located in frame R1. During the frames R2, R3, ... R6 following the frame R1, the ciphered call information is transmitted and ciphered with the key E1. As before mentioned, this key is a periodic bit sequence whose period equals one frame interval and which can be superimposed on the call information by modulo-2 addition. Consequently, the mobile MS is aware of the time at which counting shall commence and also of the number of frame intervals to be counted. When this is understood by the mobile, a confirmation signal A1 is transmitted back to the base station BS2 and received in frame R6. When the base station BS2 receives this signal, the station will wait for a period of time which equals the agreed number of frames, i.e. to frame R13 (t=t3) where ciphering in accordance with the key E2 is commenced.
The base station BS2 thus 'waits a given length of time ( in Figure 4 a time equalling 5 frame intervals) for receipt of the confirma-tion signal A1. If, for some reason or other, this signal is not received by the base station BS2 within a given period of time, a "~a'~'~~~;i~°~
f~vrns.._ ,c signal S2 is again transmitted in frame R7 and a new confirmation signal A2 is awaited. The signal A1 can fall away because, e.g., of fading or difficult surrounding conditions at precisely the interval in which the signal A1 is transmitted. Thus, the number of frames (=R13) from the base station BS2 should be sufficien-tly large to enable repeated signalling according to the above to be carried out.
The signal delay between base station and mobile has been assumed to be about 2-3 frame intervals (~15 ms) in the Figure 4 illustra-Lion. This delay should also be taken into account. Thus, the ciphering time point t3 will preferably be chosen so that t2-t3 >
4 times the maximum propagation time. This calculation offers no difficulties, since the mobile is located on the border between two cells C1, C2 according to Figure 1, i.e. at a maximum distance from a base station.
Claims (10)
1. A method for reestablishing the ciphering of information in a mobile radio system which lacks a global time reference, wherein the data messages and the signalling messages between a first base station and a mobile station are transmitted in frames having time slots and said messages are ciphered by combining said messages with a pseudorandom bit stream, wherein upon handing over the communication of the mobile from the first base station to a second base station ciphering is interrupted for a given period of time during which synchronization of the pseudorandom bit stream with said messages between the mobile and the first base station is lost due to the absence of said global time reference and frame synchronization is established between the mobile and the second base station, the method for reestablishing the ciphering comprising the steps of:
generating a first signal which discloses a time point counted in numbers of frame intervals which shall pass until said ciphering is recommenced;
subsequent to completing the hand-over of said messages, transmitting said first signal from the second base station to the mobile station; and recommencing said ciphering upon occurrence of said time point.
generating a first signal which discloses a time point counted in numbers of frame intervals which shall pass until said ciphering is recommenced;
subsequent to completing the hand-over of said messages, transmitting said first signal from the second base station to the mobile station; and recommencing said ciphering upon occurrence of said time point.
2. A method according to claim 1, wherein the messages up to said time point are transmitted by means of a ciphering sequence which comprises a periodic bit sequence whose period is equal to a frame interval.
3. A method according to claim 1 or 2, wherein said first signal is transmitted during a frame which immediately precedes the frames which transmit said messages and in the time slot assigned to the mobile station in said frame, and the mobile station when receiving said first signal transmits a confirmation signal to the second base station.
4. A method according to claim 3, wherein if the second base station fails to receive said confirmation signal subsequent to a given time lapse, a further signal is transmitted by the second base station having the same information as the first signal so as to obtain a confirmation signal.
5. A method according to any one of claims 1 or 4, wherein said first signal from the second base station to the mobile station is ciphered.
6. A method according to any one of claims 1 to 4, wherein said first signal from the second base station to the mobile station is non-ciphered.
7. A method for reestablishing encryption of information in a mobile radio system having first and second fixed stations and a mobile station, the method comprising the steps of:
encrypting information exchanged between said first fixed station and said mobile station using a first encryption code;
handing-off communications with said mobile station from said first fixed station to said second fixed station, said handing-off including establishing frame synchronization between said second fixed station and said mobile station;
temporarily ceasing use of said first encryption code for communications with said mobile station;
sending notification from said second fixed station to said mobile station informing said mobile station that the use of said first encryption code is to be resumed at a time point after a certain number of frame times have elapsed in communications between said second fixed station and said mobile station; and reestablishing encryption upon occurrence of said time point.
encrypting information exchanged between said first fixed station and said mobile station using a first encryption code;
handing-off communications with said mobile station from said first fixed station to said second fixed station, said handing-off including establishing frame synchronization between said second fixed station and said mobile station;
temporarily ceasing use of said first encryption code for communications with said mobile station;
sending notification from said second fixed station to said mobile station informing said mobile station that the use of said first encryption code is to be resumed at a time point after a certain number of frame times have elapsed in communications between said second fixed station and said mobile station; and reestablishing encryption upon occurrence of said time point.
8. The method of claim 7, wherein information exchanged between said second fixed station and said mobile station is encrypted using a second encryption code, consisting of a periodic bit sequence whose period is equal to a frame interval, during the time when use of said first encryption code is temporarily ceased.
9. The method of claim 7 or 8, wherein said notification is sent from said second fixed station to said mobile station immediately following hand-off, and wherein said mobile station confirms to said second fixed station receipt of said notification.
10. The method of claim 9, wherein if said second fixed station is not confirmed of said mobile station's receipt of said notification within a predetermined period of time, said notification is re-sent to said mobile station, which confirms receipt of said notification resent.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SE8902994-6 | 1989-09-12 | ||
SE8902994A SE464553B (en) | 1989-09-12 | 1989-09-12 | METHOD OF SYNCHRONIZATION IN A MOBILE RADIO SYSTEM |
PCT/SE1990/000497 WO1991004620A1 (en) | 1989-09-12 | 1990-07-19 | Synchronizing method in a mobile radio system |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2039699A1 CA2039699A1 (en) | 1991-03-13 |
CA2039699C true CA2039699C (en) | 1999-09-28 |
Family
ID=20376856
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002039699A Expired - Fee Related CA2039699C (en) | 1989-09-12 | 1990-07-19 | Synchronizing method in a mobile radio system |
Country Status (13)
Country | Link |
---|---|
JP (1) | JP2978243B2 (en) |
KR (1) | KR970002747B1 (en) |
CN (1) | CN1023283C (en) |
AU (1) | AU625469B2 (en) |
CA (1) | CA2039699C (en) |
DE (1) | DE4026698C2 (en) |
FR (1) | FR2652468B1 (en) |
GB (1) | GB2236458B (en) |
HK (1) | HK58695A (en) |
MY (1) | MY106831A (en) |
NZ (1) | NZ234720A (en) |
SE (1) | SE464553B (en) |
WO (1) | WO1991004620A1 (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2260245B (en) * | 1991-10-04 | 1995-03-08 | Technophone Ltd | Digital radio receiver |
WO1994022245A1 (en) * | 1993-03-23 | 1994-09-29 | Telefonaktiebolaget Lm Ericsson | A method for cascading of microbases |
CN1494236A (en) * | 1997-04-24 | 2004-05-05 | ��ʽ����Ntt����Ħ | Mobile communication method and mobile communication system |
FR2809576B1 (en) * | 2000-05-23 | 2002-11-15 | Nortel Matra Cellular | METHOD FOR CONTROLLING A CHANNEL BETWEEN A RADIO TERMINAL AND A CELLULAR RADIO COMMUNICATION INFRASTRUCTURE, AND ACCESS NETWORK IMPLEMENTING SUCH A METHOD |
FR2809579B1 (en) * | 2000-05-23 | 2003-07-04 | Nortel Matra Cellular | METHOD FOR CONTROLLING A CHANNEL BETWEEN A RADIO TERMINAL AND A CELLULAR RADIO COMMUNICATION INFRASTRUCTURE, AND ACCESS NETWORK IMPLEMENTING SUCH A METHOD |
DE10056361A1 (en) * | 2000-11-14 | 2002-05-23 | Philips Corp Intellectual Pty | Wireless network for the transmission of parameters for encrypted data transmission |
US8804609B2 (en) * | 2004-11-02 | 2014-08-12 | Apple Inc. | Systems and methods for use with orthogonal frequency division multiplexing |
KR100902112B1 (en) * | 2006-11-13 | 2009-06-09 | 한국전자통신연구원 | Insertion method and transmission method of vector information for voice data estimating in key re-synchronization, and voice data estimating method in key re-synchronization using vector information |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB1429469A (en) * | 1961-07-19 | 1976-03-24 | Hell Rudolf | Method for subsequently setting data receivers in a contrinuous transmission of encoded data transmitted in binary code form |
DE978043C (en) * | 1962-08-27 | 1977-04-21 | Siemens Ag | Method and device for the encrypted transmission of telex messages |
EP0028272A1 (en) * | 1979-11-03 | 1981-05-13 | PATELHOLD Patentverwertungs- & Elektro-Holding AG | Method and device for the transmission of enciphered information |
US4555805A (en) * | 1980-03-14 | 1985-11-26 | Harris Corporation | Secure mobile telephone system |
US4411017A (en) * | 1980-03-14 | 1983-10-18 | Harris Corporation | Secure mobile telephone system |
DE3150254A1 (en) * | 1981-04-13 | 1983-07-14 | Siemens AG, 1000 Berlin und 8000 München | DEVICE FOR ENCRYPTED DIGITAL INFORMATION TRANSFER |
US4549308A (en) * | 1982-07-12 | 1985-10-22 | At&T Bell Laboratories | Secure mobile radio telephony |
TR23067A (en) * | 1985-07-12 | 1989-02-21 | Siemens Ag | A METHOD AND EQUIPMENT TO INCRETE THE ENCRYPED RADIO TRAFFIC |
JPS62137937A (en) * | 1985-12-12 | 1987-06-20 | Fujitsu Ltd | Line changeover system |
US4803726A (en) * | 1986-12-31 | 1989-02-07 | Motorola, Inc. | Bit synchronization method for a digital radio telephone system |
-
1989
- 1989-09-12 SE SE8902994A patent/SE464553B/en not_active IP Right Cessation
-
1990
- 1990-07-19 AU AU63535/90A patent/AU625469B2/en not_active Ceased
- 1990-07-19 KR KR1019910700472A patent/KR970002747B1/en not_active IP Right Cessation
- 1990-07-19 JP JP2512660A patent/JP2978243B2/en not_active Expired - Lifetime
- 1990-07-19 CA CA002039699A patent/CA2039699C/en not_active Expired - Fee Related
- 1990-07-19 WO PCT/SE1990/000497 patent/WO1991004620A1/en active Application Filing
- 1990-07-31 NZ NZ234720A patent/NZ234720A/en unknown
- 1990-08-09 MY MYPI90001333A patent/MY106831A/en unknown
- 1990-08-09 GB GB9017473A patent/GB2236458B/en not_active Expired - Fee Related
- 1990-08-23 DE DE4026698A patent/DE4026698C2/en not_active Expired - Fee Related
- 1990-09-05 FR FR909011029A patent/FR2652468B1/en not_active Expired - Lifetime
- 1990-09-12 CN CN90107657A patent/CN1023283C/en not_active Expired - Fee Related
-
1995
- 1995-04-20 HK HK58695A patent/HK58695A/en not_active IP Right Cessation
Also Published As
Publication number | Publication date |
---|---|
GB9017473D0 (en) | 1990-09-26 |
SE464553B (en) | 1991-05-06 |
NZ234720A (en) | 1992-12-23 |
DE4026698C2 (en) | 1999-06-17 |
JP2978243B2 (en) | 1999-11-15 |
DE4026698A1 (en) | 1991-03-14 |
GB2236458A (en) | 1991-04-03 |
GB2236458B (en) | 1993-10-13 |
SE8902994L (en) | 1991-03-13 |
SE8902994D0 (en) | 1989-09-12 |
JPH04501944A (en) | 1992-04-02 |
CA2039699A1 (en) | 1991-03-13 |
MY106831A (en) | 1995-07-31 |
AU625469B2 (en) | 1992-07-09 |
CN1050294A (en) | 1991-03-27 |
HK58695A (en) | 1995-04-28 |
FR2652468A1 (en) | 1991-03-29 |
KR970002747B1 (en) | 1997-03-10 |
CN1023283C (en) | 1993-12-22 |
WO1991004620A1 (en) | 1991-04-04 |
KR920702120A (en) | 1992-08-12 |
FR2652468B1 (en) | 1992-07-03 |
AU6353590A (en) | 1991-04-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5293423A (en) | Synchronizing method in a mobile radio system | |
KR100359325B1 (en) | Selective Synchronization in Digital Cellular Communication Systems | |
US5081679A (en) | Resynchronization of encryption systems upon handoff | |
KR100680049B1 (en) | Wireless network with a cipher key change procedure | |
KR960011190B1 (en) | Continuous cipher synchronization for cellular communication system | |
CA2053865C (en) | Continuous cipher synchronization for cellular communication system | |
US5119502A (en) | Periodic system ordered rescan in a cellular communication system | |
WO1996009725A9 (en) | Selective resynchronization in a digital cellular communications system during handover | |
JP4774047B2 (en) | Communication decoding method and apparatus | |
US5384828A (en) | Method and apparatus for synchronization in a wireless telephone system | |
CA2039699C (en) | Synchronizing method in a mobile radio system | |
KR20020037686A (en) | Wireless network for transmitting parameters for an encoded data transmission | |
JP2001339386A (en) | Radio communication system, radio network controller, user terminal | |
JPH06237248A (en) | Digital communication method | |
WO2000024139A1 (en) | Encryption support in a hybrid gsm/cdma network | |
WO2000031918A1 (en) | Method and apparatus for synchronizing cipher encoding |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKLA | Lapsed | ||
MKLA | Lapsed |
Effective date: 20030721 |