The method on opportunity is initiated in the counter inspection that is used for encryption synchronisation in a kind of definite mobile communication system
Technical field
The present invention relates to the synchronous method of encryption of communicated data in the mobile communication system, the method on opportunity is initiated in the counter inspection that is used for encryption synchronisation in particularly definite mobile communication system.
Background technology
Wideband Code Division Multiple Access (WCDMA) (Wideband Code Division Multiple Access, be called for short " WCDMA ") as one of 3G (Third Generation) Moblie standard, by core net (Core Net, abbreviation " CN "), Universal Terrestrial Radio Access Network (UMTS Terrestrial Radio Access Network, be called for short " UTRAN ") and user's set (User Equipment is called for short " UE ") composition.
Great majority control signaling between UE and the UTRAN is radio resource control layer (RadioResource Controller is called for short " RRC ") message.RRC message comprises foundation, modification and releasing layer 2 and the required whole parameters of layer 1 protocol entity.Usually, invaded by non-source message, need to check whether UE is consistent with the up-downgoing data volume that UTRAN sends in a RRC connects for the message that prevents to send between UTRAN and UE.
There is a kind of time-varying parameter (being called for short " COUNT-C ") at present by checking encryption synchronisation, be that the current Connection Frame Number that is sending prevents the method for invading: each uses affirmation mode (Acknowledged Mode, be called for short " AM ") or Unacknowledged Mode (Unacknowledged Mode, be called for short " UM ") Radio Link control (Radio Link Controller, abbreviation " RLC ") radio bearer (Radio Bearers, abbreviation " RB ") a uplink and downlink COUNT-C is all arranged, length is 32 bits, form with low 12 Radio Link control affirmation mode sequence number by high 20 HFN, by to all AM of certain UE, the up-downgoing COUNT-C of the professional RB of UM pattern checks, can determine in a RRC connects, whether UE is consistent with the up-downgoing data volume that UTRAN sends, thereby prevents invasion.
Fig. 1 is in the above-mentioned existing scheme, the process schematic diagram that Connection Frame Number is checked, and shown in the accompanying drawing, in step 101, UTRAN is put into the COUNT-C of each AM, UM mode business RB in COUNTER_CHECK (counter inspection) message and issues UE; Then, in step 102, UE checks each COUNT-C value, and and each COUNT-C value of local storage is compared, if receive that COUNT-C is consistent in HFN part (COUNT-C's is high 20) with local COUNT-C, then send COUNTER_CHECK_RESPONSE (the counter inspection response) message of not carrying COUNT-C and give UTRAN, otherwise, COUNTER_CHECK_RESPONSE (the counter inspection response) message of carrying local COUNT-C sent.UTRAN side high-level signaling chain of command is received the response message that does not comprise any COUNT-C value, and then flow process finishes, otherwise, discharge whole RRC and connect.
In actual applications, there is following problem in such scheme: if the opportunity that the initiation counter is checked is improper, the inconsistent meeting of check result causes not right RRC to connect release.
For example, in communication process, the sequence number of UTRAN side (Sequence Number, abbreviation " SN ") arrived next cycle, and UE side sequence number also rests in the one-period owing to the reason of transmitting, and verifies the release that will cause RRC to connect as initiating at this moment.
Cause a main cause of this situation to be, the COUNT-C of the RLC of AM pattern is by super frame number (Hyper Frame Number, be called for short " HFN ") and the Radio Link control affirmation mode sequence number composition of 12 bits, data of every transmission, this sequence number adds 1, whenever this sequence number is finished a circulation (4096), HFN adds 1.Because transmission delay, the sequence number of UTRAN side has arrived next cycle, and UE side sequence number also rests on a sequence number in the cycle, if initiate this moment to verify, because both sides' HFN is inconsistent, and the release that must cause RRC to connect.
Summary of the invention
The technical problem to be solved in the present invention provides the counter inspection that is used for encryption synchronisation in a kind of definite mobile communication system and initiates the method on opportunity, makes the not right RRC that causes because the opportunity that the counter inspection is initiated is not suitable for connect to discharge and is avoided.
In order to solve the problems of the technologies described above, the invention provides the counter inspection that is used for encryption synchronisation in a kind of definite mobile communication system and initiate the method on opportunity, comprise following steps:
A determines the credible scope that Connection Frame Number is checked;
B judges whether protocol Data Unit all is arranged in described credible scope at the sequence number of wireless chain control layer in the current descending and up Connection Frame Number, if then initiate the Connection Frame Number inspection.
Wherein, described mobile communication system adopts sliding window protocol to carry out transfer of data, and described credible scope is meant that from 0 to T, described T is specially:
Send window size-constant in the described sliding window protocol of T=4096-.
The two ends of described uplink and downlink are respectively subscriber equipment and universal mobile telecommunications system grounding wireless access network.
The inspection of described initiation Connection Frame Number comprises following steps:
The B1 universal mobile telecommunications system grounding wireless access network time-varying parameter that is used for encryption synchronisation professional each affirmation mode and the Unacknowledged Mode business is put into counter and checks that message sends to subscriber equipment;
The described counter that the described subscriber equipment of B2 is relatively received is checked in the message value of the time-varying parameter that is used for encryption synchronisation of the value of the time-varying parameter that each is used for encryption synchronisation and local storage, judge two described time-varying parameters that are used for encryption synchronisation high 20 whether identical, receive the response if then return the counter inspection of not carrying the time-varying parameter that is used for encryption synchronisation, carry the counter inspection that this locality is used for the time-varying parameter of encryption synchronisation and receive the response otherwise return;
The described universal mobile telecommunications system grounding wireless access network of B3 judges the described counter inspection of receiving receives the response whether comprise the time-varying parameter that is used for encryption synchronisation, if then discharge whole described Radio Resource control connection.
Described protocol Data Unit is meant at the sequence number of wireless chain control layer and low 12 of up-downgoing Connection Frame Number obtains by checking the variable that transmitting terminal, receiving terminal are safeguarded.
By relatively can finding, technical scheme difference with the prior art of the present invention is, whether low 12 bit sequence number by checking up-downgoing COUNT-C in pre-configured credible scope, are determined to initiate the opportunity that counter is checked.
Difference on this technical scheme, brought comparatively significantly beneficial effect, promptly by increasing range check to low 12 bit sequence number of up-downgoing COUNT-C, effectively avoided the RRC that is not suitable for causing owing to the opportunity of initiating the counter inspection to discharge, reduce unnecessary spending, improved communication efficiency.
Description of drawings
Fig. 1 is the process schematic diagram that is used for the counter inspection of encryption synchronisation in the prior art;
Fig. 2 determines to be used in the mobile communication system flow chart that the method on opportunity is initiated in the counter inspection of encryption synchronisation according to an embodiment of the invention.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, the present invention is described in further detail below in conjunction with accompanying drawing.
Check in the decision method on opportunity at the Connection Frame Number that the present invention proposes, at first determine the credible scope that a configurable counter is checked, low 12 that check up-downgoing COUNT-C is protocol Data Unit (Protocol Data Unit, abbreviation " PDU ") whether the sequence number at rlc layer is in this scope, thereby judges and initiate the opportunity that counter is checked.
Sliding window protocol is adopted in communication between UTRAN and the UE, wherein, UTRAN side maintenance state variable V tA, this variable represents to send the starting point of window, has just sent but does not obtain the sequence number of the PDU that UE confirms.UE side maintenance state variable V rR, the sequence number of the next PDU that the expression expectation receives in proper order.The sequence number maximum of PDU is 4096, and this maximum is represented maximum window size, and supposition receiver window and transmission window equal and opposite in direction.
Below in conjunction with flow chart, illustrate according to Connection Frame Number inspection of the present invention and determine method opportunity.
As shown in Figure 2, determine the credible scope A that a configurable counter is checked, B in step 210.Specifically, the selected of A, B should be limited to sequence number near the window starting point, and by state variable VtA, VrR judges.After this, enter step 220.
In step 220, check that whether low 12 (PDU is at the descending sequence numbers of rlc layer) are at above-mentioned credible scope A, between the B among the descending COUNT-C.
The specific implementation method of this step is to check whether state variable VtA arrives between (4096-send window size-constant) 0, need to prove, (4096-send window size-constant) expression is limited near the small range window starting point with sequence number, 4096 represent the size of maximized window, the send window size is a parameter of the high-rise configuration of RLC, and the constant in the expression formula can not be negative.After this, enter step 230.
In step 230, judge according to the check result of step 220, if condition satisfies then enters step 240, continue to check otherwise jump to step 220;
In step 240, owing to judge that in step 220,230 low 12 (PDU is at the descending sequence numbers of rlc layer) are at above-mentioned credible scope A among the descending COUNT-C, between the B, therefore in this step, check that further whether low 12 (PDU is at the up sequence numbers of rlc layer) are at A, between the B among the up COUNT-C.
The specific implementation method of this step is to check whether VrR arrives between (4096-send window size-constant) 0.After this, enter step 250.
In step 250, judge according to the check result of step 240, if condition satisfies then enters step 260, continue to check otherwise jump to step 240;
In step 260, owing to judge by the step of front, among the uplink and downlink COUNT-C, low 12 (PDU is at the sequence numbers of rlc layer) are positioned at above-mentioned credible scope A, and between the B, counter is checked and determined opportunity, initiate counter inspection inspection, in connecting according to RRC, whether the up-downgoing data volume that UE and UTRAN send is consistent determines that process ends or release RRC are connected, whole flow process end.Specifically, UTRAN is put into the COUNT-C of each AM, UM mode business RB in COUNTER_CHECK (counter inspection) message and issues UE; Then, UE checks each COUNT-C value, and and each COUNT-C value of local storage is compared, if receive that COUNT-C is consistent in HFN part (COUNT-C's is high 20) with local COUNT-C, then send COUNTER_CHECK_RESPONSE (the counter inspection response) message of not carrying COUNT-C and give UTRAN, otherwise, send COUNTER_CHECK_RESPONSE (the counter inspection response) message of carrying local COUNT-C.UTRAN side high-level signaling chain of command is received the response message that does not comprise any COUNT-C value, and then flow process finishes, otherwise, discharge whole RRC and connect.
Need to prove, because the VtA of UTRAN side and the VrR of UE side have corresponding relation, when the UTRAN side satisfies above-mentioned scale relationships, just can avoid effectively that HFN's that because the sequence number of an end is finished the one-period circulation other end also causes in a last circulation is inconsistent.
Though by reference some preferred embodiment of the present invention, the present invention is illustrated and describes, but those of ordinary skill in the art should be understood that, can do various changes to it in the form and details, and the spirit and scope of the present invention that do not depart from appended claims and limited.