CN100345452C - Counter checking method for encrypting synchronization in mobile communication system - Google Patents

Counter checking method for encrypting synchronization in mobile communication system Download PDF

Info

Publication number
CN100345452C
CN100345452C CNB200310104529XA CN200310104529A CN100345452C CN 100345452 C CN100345452 C CN 100345452C CN B200310104529X A CNB200310104529X A CN B200310104529XA CN 200310104529 A CN200310104529 A CN 200310104529A CN 100345452 C CN100345452 C CN 100345452C
Authority
CN
China
Prior art keywords
counter
encryption synchronisation
communication system
mobile communication
inspection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB200310104529XA
Other languages
Chinese (zh)
Other versions
CN1607843A (en
Inventor
李迦
张华�
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNB200310104529XA priority Critical patent/CN100345452C/en
Priority to PCT/CN2004/001141 priority patent/WO2005039101A1/en
Publication of CN1607843A publication Critical patent/CN1607843A/en
Application granted granted Critical
Publication of CN100345452C publication Critical patent/CN100345452C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/037Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Abstract

The present invention relates to a synchronous encryption method for communication data in a mobile communication system, which discloses a method for checking a counter used for synchronous encryption in a mobile communication system to avoid abnormal RRC connection release caused by a check initiated by the counter in a wrong occasion. The present invention comprises the following steps: A: determining a believable range of the check of a connection frame number. B: determining whether sequence numbers of protocol data units of the connection frame number in a lower row and in an upper row in a radio link control layer are both in the believable range; if true, the connection frame number check is initiated.

Description

The method on opportunity is initiated in the counter inspection that is used for encryption synchronisation in a kind of definite mobile communication system
Technical field
The present invention relates to the synchronous method of encryption of communicated data in the mobile communication system, the method on opportunity is initiated in the counter inspection that is used for encryption synchronisation in particularly definite mobile communication system.
Background technology
Wideband Code Division Multiple Access (WCDMA) (Wideband Code Division Multiple Access, be called for short " WCDMA ") as one of 3G (Third Generation) Moblie standard, by core net (Core Net, abbreviation " CN "), Universal Terrestrial Radio Access Network (UMTS Terrestrial Radio Access Network, be called for short " UTRAN ") and user's set (User Equipment is called for short " UE ") composition.
Great majority control signaling between UE and the UTRAN is radio resource control layer (RadioResource Controller is called for short " RRC ") message.RRC message comprises foundation, modification and releasing layer 2 and the required whole parameters of layer 1 protocol entity.Usually, invaded by non-source message, need to check whether UE is consistent with the up-downgoing data volume that UTRAN sends in a RRC connects for the message that prevents to send between UTRAN and UE.
There is a kind of time-varying parameter (being called for short " COUNT-C ") at present by checking encryption synchronisation, be that the current Connection Frame Number that is sending prevents the method for invading: each uses affirmation mode (Acknowledged Mode, be called for short " AM ") or Unacknowledged Mode (Unacknowledged Mode, be called for short " UM ") Radio Link control (Radio Link Controller, abbreviation " RLC ") radio bearer (Radio Bearers, abbreviation " RB ") a uplink and downlink COUNT-C is all arranged, length is 32 bits, form with low 12 Radio Link control affirmation mode sequence number by high 20 HFN, by to all AM of certain UE, the up-downgoing COUNT-C of the professional RB of UM pattern checks, can determine in a RRC connects, whether UE is consistent with the up-downgoing data volume that UTRAN sends, thereby prevents invasion.
Fig. 1 is in the above-mentioned existing scheme, the process schematic diagram that Connection Frame Number is checked, and shown in the accompanying drawing, in step 101, UTRAN is put into the COUNT-C of each AM, UM mode business RB in COUNTER_CHECK (counter inspection) message and issues UE; Then, in step 102, UE checks each COUNT-C value, and and each COUNT-C value of local storage is compared, if receive that COUNT-C is consistent in HFN part (COUNT-C's is high 20) with local COUNT-C, then send COUNTER_CHECK_RESPONSE (the counter inspection response) message of not carrying COUNT-C and give UTRAN, otherwise, COUNTER_CHECK_RESPONSE (the counter inspection response) message of carrying local COUNT-C sent.UTRAN side high-level signaling chain of command is received the response message that does not comprise any COUNT-C value, and then flow process finishes, otherwise, discharge whole RRC and connect.
In actual applications, there is following problem in such scheme: if the opportunity that the initiation counter is checked is improper, the inconsistent meeting of check result causes not right RRC to connect release.
For example, in communication process, the sequence number of UTRAN side (Sequence Number, abbreviation " SN ") arrived next cycle, and UE side sequence number also rests in the one-period owing to the reason of transmitting, and verifies the release that will cause RRC to connect as initiating at this moment.
Cause a main cause of this situation to be, the COUNT-C of the RLC of AM pattern is by super frame number (Hyper Frame Number, be called for short " HFN ") and the Radio Link control affirmation mode sequence number composition of 12 bits, data of every transmission, this sequence number adds 1, whenever this sequence number is finished a circulation (4096), HFN adds 1.Because transmission delay, the sequence number of UTRAN side has arrived next cycle, and UE side sequence number also rests on a sequence number in the cycle, if initiate this moment to verify, because both sides' HFN is inconsistent, and the release that must cause RRC to connect.
Summary of the invention
The technical problem to be solved in the present invention provides the counter inspection that is used for encryption synchronisation in a kind of definite mobile communication system and initiates the method on opportunity, makes the not right RRC that causes because the opportunity that the counter inspection is initiated is not suitable for connect to discharge and is avoided.
In order to solve the problems of the technologies described above, the invention provides the counter inspection that is used for encryption synchronisation in a kind of definite mobile communication system and initiate the method on opportunity, comprise following steps:
A determines the credible scope that Connection Frame Number is checked;
B judges whether protocol Data Unit all is arranged in described credible scope at the sequence number of wireless chain control layer in the current descending and up Connection Frame Number, if then initiate the Connection Frame Number inspection.
Wherein, described mobile communication system adopts sliding window protocol to carry out transfer of data, and described credible scope is meant that from 0 to T, described T is specially:
Send window size-constant in the described sliding window protocol of T=4096-.
The two ends of described uplink and downlink are respectively subscriber equipment and universal mobile telecommunications system grounding wireless access network.
The inspection of described initiation Connection Frame Number comprises following steps:
The B1 universal mobile telecommunications system grounding wireless access network time-varying parameter that is used for encryption synchronisation professional each affirmation mode and the Unacknowledged Mode business is put into counter and checks that message sends to subscriber equipment;
The described counter that the described subscriber equipment of B2 is relatively received is checked in the message value of the time-varying parameter that is used for encryption synchronisation of the value of the time-varying parameter that each is used for encryption synchronisation and local storage, judge two described time-varying parameters that are used for encryption synchronisation high 20 whether identical, receive the response if then return the counter inspection of not carrying the time-varying parameter that is used for encryption synchronisation, carry the counter inspection that this locality is used for the time-varying parameter of encryption synchronisation and receive the response otherwise return;
The described universal mobile telecommunications system grounding wireless access network of B3 judges the described counter inspection of receiving receives the response whether comprise the time-varying parameter that is used for encryption synchronisation, if then discharge whole described Radio Resource control connection.
Described protocol Data Unit is meant at the sequence number of wireless chain control layer and low 12 of up-downgoing Connection Frame Number obtains by checking the variable that transmitting terminal, receiving terminal are safeguarded.
By relatively can finding, technical scheme difference with the prior art of the present invention is, whether low 12 bit sequence number by checking up-downgoing COUNT-C in pre-configured credible scope, are determined to initiate the opportunity that counter is checked.
Difference on this technical scheme, brought comparatively significantly beneficial effect, promptly by increasing range check to low 12 bit sequence number of up-downgoing COUNT-C, effectively avoided the RRC that is not suitable for causing owing to the opportunity of initiating the counter inspection to discharge, reduce unnecessary spending, improved communication efficiency.
Description of drawings
Fig. 1 is the process schematic diagram that is used for the counter inspection of encryption synchronisation in the prior art;
Fig. 2 determines to be used in the mobile communication system flow chart that the method on opportunity is initiated in the counter inspection of encryption synchronisation according to an embodiment of the invention.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, the present invention is described in further detail below in conjunction with accompanying drawing.
Check in the decision method on opportunity at the Connection Frame Number that the present invention proposes, at first determine the credible scope that a configurable counter is checked, low 12 that check up-downgoing COUNT-C is protocol Data Unit (Protocol Data Unit, abbreviation " PDU ") whether the sequence number at rlc layer is in this scope, thereby judges and initiate the opportunity that counter is checked.
Sliding window protocol is adopted in communication between UTRAN and the UE, wherein, UTRAN side maintenance state variable V tA, this variable represents to send the starting point of window, has just sent but does not obtain the sequence number of the PDU that UE confirms.UE side maintenance state variable V rR, the sequence number of the next PDU that the expression expectation receives in proper order.The sequence number maximum of PDU is 4096, and this maximum is represented maximum window size, and supposition receiver window and transmission window equal and opposite in direction.
Below in conjunction with flow chart, illustrate according to Connection Frame Number inspection of the present invention and determine method opportunity.
As shown in Figure 2, determine the credible scope A that a configurable counter is checked, B in step 210.Specifically, the selected of A, B should be limited to sequence number near the window starting point, and by state variable VtA, VrR judges.After this, enter step 220.
In step 220, check that whether low 12 (PDU is at the descending sequence numbers of rlc layer) are at above-mentioned credible scope A, between the B among the descending COUNT-C.
The specific implementation method of this step is to check whether state variable VtA arrives between (4096-send window size-constant) 0, need to prove, (4096-send window size-constant) expression is limited near the small range window starting point with sequence number, 4096 represent the size of maximized window, the send window size is a parameter of the high-rise configuration of RLC, and the constant in the expression formula can not be negative.After this, enter step 230.
In step 230, judge according to the check result of step 220, if condition satisfies then enters step 240, continue to check otherwise jump to step 220;
In step 240, owing to judge that in step 220,230 low 12 (PDU is at the descending sequence numbers of rlc layer) are at above-mentioned credible scope A among the descending COUNT-C, between the B, therefore in this step, check that further whether low 12 (PDU is at the up sequence numbers of rlc layer) are at A, between the B among the up COUNT-C.
The specific implementation method of this step is to check whether VrR arrives between (4096-send window size-constant) 0.After this, enter step 250.
In step 250, judge according to the check result of step 240, if condition satisfies then enters step 260, continue to check otherwise jump to step 240;
In step 260, owing to judge by the step of front, among the uplink and downlink COUNT-C, low 12 (PDU is at the sequence numbers of rlc layer) are positioned at above-mentioned credible scope A, and between the B, counter is checked and determined opportunity, initiate counter inspection inspection, in connecting according to RRC, whether the up-downgoing data volume that UE and UTRAN send is consistent determines that process ends or release RRC are connected, whole flow process end.Specifically, UTRAN is put into the COUNT-C of each AM, UM mode business RB in COUNTER_CHECK (counter inspection) message and issues UE; Then, UE checks each COUNT-C value, and and each COUNT-C value of local storage is compared, if receive that COUNT-C is consistent in HFN part (COUNT-C's is high 20) with local COUNT-C, then send COUNTER_CHECK_RESPONSE (the counter inspection response) message of not carrying COUNT-C and give UTRAN, otherwise, send COUNTER_CHECK_RESPONSE (the counter inspection response) message of carrying local COUNT-C.UTRAN side high-level signaling chain of command is received the response message that does not comprise any COUNT-C value, and then flow process finishes, otherwise, discharge whole RRC and connect.
Need to prove, because the VtA of UTRAN side and the VrR of UE side have corresponding relation, when the UTRAN side satisfies above-mentioned scale relationships, just can avoid effectively that HFN's that because the sequence number of an end is finished the one-period circulation other end also causes in a last circulation is inconsistent.
Though by reference some preferred embodiment of the present invention, the present invention is illustrated and describes, but those of ordinary skill in the art should be understood that, can do various changes to it in the form and details, and the spirit and scope of the present invention that do not depart from appended claims and limited.

Claims (5)

1. the method on opportunity is initiated in the counter inspection that is used for encryption synchronisation in the definite mobile communication system, it is characterized in that, comprises following steps:
A determines the credible scope that Connection Frame Number is checked;
B judges whether protocol Data Unit all is arranged in described credible scope at the sequence number of wireless chain control layer in the current descending and up Connection Frame Number, if then initiate the Connection Frame Number inspection.
2. the method on opportunity is initiated in the counter inspection that is used for encryption synchronisation in definite mobile communication system according to claim 1, it is characterized in that, described mobile communication system adopts sliding window protocol to carry out transfer of data, and described credible scope is meant that from 0 to T, described T is specially:
Send window size-constant in the described sliding window protocol of T=4096-
3. the method on opportunity is initiated in the counter inspection that is used for encryption synchronisation in definite mobile communication system according to claim 1, it is characterized in that the two ends of described uplink and downlink are respectively subscriber equipment and universal mobile telecommunications system grounding wireless access network.
4. the method on opportunity is initiated in the counter inspection that is used for encryption synchronisation in definite mobile communication system according to claim 3, it is characterized in that the inspection of described initiation Connection Frame Number comprises following steps:
The B1 universal mobile telecommunications system grounding wireless access network time-varying parameter that is used for encryption synchronisation professional each affirmation mode and the Unacknowledged Mode business is put into counter and checks that message sends to subscriber equipment;
The described counter that the described subscriber equipment of B2 is relatively received is checked in the message value of the time-varying parameter that is used for encryption synchronisation of the value of the time-varying parameter that each is used for encryption synchronisation and local storage, judge two described time-varying parameters that are used for encryption synchronisation high 20 whether identical, receive the response if then return the counter inspection of not carrying the time-varying parameter that is used for encryption synchronisation, carry the counter inspection that this locality is used for the time-varying parameter of encryption synchronisation and receive the response otherwise return;
The described universal mobile telecommunications system grounding wireless access network of B3 judges the described counter inspection of receiving receives the response whether comprise the time-varying parameter that is used for encryption synchronisation, if then discharge whole described Radio Resource control connection.
5. the method on opportunity is initiated in the counter inspection that is used for encryption synchronisation in definite mobile communication system according to claim 1, it is characterized in that, described protocol Data Unit is meant at the sequence number of wireless chain control layer and low 12 of up-downgoing Connection Frame Number obtains by checking the variable that transmitting terminal, receiving terminal are safeguarded.
CNB200310104529XA 2003-10-16 2003-10-16 Counter checking method for encrypting synchronization in mobile communication system Expired - Fee Related CN100345452C (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CNB200310104529XA CN100345452C (en) 2003-10-16 2003-10-16 Counter checking method for encrypting synchronization in mobile communication system
PCT/CN2004/001141 WO2005039101A1 (en) 2003-10-16 2004-10-09 A method for encrypting synchronous counter checking in a mobile communication system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB200310104529XA CN100345452C (en) 2003-10-16 2003-10-16 Counter checking method for encrypting synchronization in mobile communication system

Publications (2)

Publication Number Publication Date
CN1607843A CN1607843A (en) 2005-04-20
CN100345452C true CN100345452C (en) 2007-10-24

Family

ID=34438471

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB200310104529XA Expired - Fee Related CN100345452C (en) 2003-10-16 2003-10-16 Counter checking method for encrypting synchronization in mobile communication system

Country Status (2)

Country Link
CN (1) CN100345452C (en)
WO (1) WO2005039101A1 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2295540A1 (en) * 1998-11-19 2011-03-16 Organogenesis, Inc. Bioengineered tissue constructs and methods for producing and using them
US7817595B2 (en) * 2007-05-17 2010-10-19 Htc Corporation Communication system, user device thereof and synchronization method thereof
KR100892169B1 (en) * 2007-07-26 2009-04-10 성균관대학교산학협력단 Resynchronization method for mobile communication terminal
CN101742513B (en) * 2008-11-26 2014-01-01 大唐移动通信设备有限公司 Counter check processing method, system and equipment
CN102480747B (en) * 2010-11-25 2014-12-03 大唐移动通信设备有限公司 Service bearer counting check method and apparatus thereof
CN102448089A (en) * 2011-10-25 2012-05-09 华为技术有限公司 Business data statistic validation method and user equipment
CN107342853B (en) * 2017-05-25 2019-12-06 兴唐通信科技有限公司 Counter synchronization method with low interaction overhead

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5966450A (en) * 1996-08-13 1999-10-12 Lucent Technologies Variable mask for encryption generated independently at communications stations
WO2002051058A2 (en) * 2000-12-19 2002-06-27 At & T Wireless Services, Inc. Synchronization of encryption in a wireless communication system
CN1406448A (en) * 2000-03-01 2003-03-26 诺基亚公司 Counter initialization, particularly for radio frames

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE60132351T2 (en) * 2000-11-28 2009-01-02 Telefonaktiebolaget Lm Ericsson (Publ) SUBSCRIBER DEPOSIT USING A CALL PROCESS IN A CELLULAR COMMUNICATION SYSTEM

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5966450A (en) * 1996-08-13 1999-10-12 Lucent Technologies Variable mask for encryption generated independently at communications stations
CN1406448A (en) * 2000-03-01 2003-03-26 诺基亚公司 Counter initialization, particularly for radio frames
WO2002051058A2 (en) * 2000-12-19 2002-06-27 At & T Wireless Services, Inc. Synchronization of encryption in a wireless communication system

Also Published As

Publication number Publication date
CN1607843A (en) 2005-04-20
WO2005039101A1 (en) 2005-04-28

Similar Documents

Publication Publication Date Title
CN100352299C (en) Method for data flow control in a mobile communications system
CA2451620C (en) Transmission of compression identifier of headers on data packet connection
KR101163275B1 (en) Method for transmitting pdcp status report
US7450511B2 (en) Method and system for polling PDU of radio link control layer
TW589813B (en) Method and apparatus for call setup latency reduction
US7539197B2 (en) Apparatus and method for moving a receive window in a radio access network
CN101204049B (en) Method for establishing radio link control in wireless communication networks and related communication terminal
EP1956862A1 (en) Method for improving high-speed downlink operation in cell_fach state for a wireless communications system and related apparatus
EP1315341A1 (en) Receiver polling for data transmission with sliding window data flow control
WO2008084992A1 (en) Method of generating data block in wireless communication system
TW554620B (en) Method and apparatus for call setup latency reduction
KR20100113457A (en) Method of receiving a point-to-multipoint service in a wireless communication system
CN100345452C (en) Counter checking method for encrypting synchronization in mobile communication system
WO2005004414A2 (en) Method for updating and managing synchronization identifier by using release messages or status request and response
WO2003069853A1 (en) Method for controlling data transmission, and data transmission system
WO2022193932A1 (en) Lte pdcp data decryption enhancement method and apparatus
CN1773902A (en) Method for controlling radio chain-circuit synchronous/asynchronous in radio communication system
Zieliński Efficiency analysis of IEEE 802.11 protocol with block acknowledge and frame aggregation
US8411697B2 (en) Method and arrangement for improving media transmission quality using robust representation of media frames
EP1984917B1 (en) Method and arrangement for improving media transmission quality
CN112532354B (en) RLC layer AM mode transmission method and device
EP4109962A1 (en) Method for transmitting pdcp status report

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CI03 Correction of invention patent

Correction item: Summary drawings|specifications

Correct: The correct abstract, drawings and specifications are shown in page first

False: Error summary, drawings and specifications, first pages

Volume: 23

COR Change of bibliographic data

Free format text: CORRECT: FIGURE OF ABSTRACT AND ¬ FIGURE OF DESCRIPTION; FROM: FALSE FIGURE OF ABSTRACT AND FIGURE OF DESCRIPTION PAGE 1 TO: CORRECT CORRECT FIGURE OF ABSTRACT AND FIGURE OF DESCRIPTION PAGE 1

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20071024

Termination date: 20201016