CN100393031C - Encrypted active point confirming method in wireless resource controlling layer - Google Patents

Encrypted active point confirming method in wireless resource controlling layer Download PDF

Info

Publication number
CN100393031C
CN100393031C CNB200410042779XA CN200410042779A CN100393031C CN 100393031 C CN100393031 C CN 100393031C CN B200410042779X A CNB200410042779X A CN B200410042779XA CN 200410042779 A CN200410042779 A CN 200410042779A CN 100393031 C CN100393031 C CN 100393031C
Authority
CN
China
Prior art keywords
control layer
message
length
wireless chain
expression
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB200410042779XA
Other languages
Chinese (zh)
Other versions
CN1585327A (en
Inventor
王前
王之曦
李炜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Global Innovation Polymerization LLC
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CNB200410042779XA priority Critical patent/CN100393031C/en
Publication of CN1585327A publication Critical patent/CN1585327A/en
Application granted granted Critical
Publication of CN100393031C publication Critical patent/CN100393031C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The present invention discloses an encrypted active point confirming method in a wireless resource controlling layer. A wireless resource controlling layer acquires the number of messages to be divided in a wireless link controlling layer; when the wireless resource controlling layer is ready to send an encrypted message, the wireless link controlling layer divides data of a first frame number, which is allocated by operation; the wireless resource controlling layer combines the wireless link controlling layer and the relative configuration of the divided message according to the acquired data; then, minimum encrypted delay is calculated. The obtained minimum encrypted delay is added to the first frame number by the wireless resource controlling layer to be used as an encrypted active point. The method of the present invention can avoid the problems caused by the inaccuracy of UE and UTRAN encrypted active points at the time of encryption; therefore, the utilization efficiency of encryption resources is improved, and new encryption parameters are started by the fastest delay.

Description

Definite method of ciphering activation point in the radio resource control layer
Technical field
The present invention relates to radio resource control in the mobile communication system (RRC agreement), relate in particular to the method for determining the ciphering activation point of radio bearer (RB) in this agreement.
Background technology
Encryption flow in the RRC agreement refers to the process that the data flow on the radio bearer of land radio access web (UTRAN:UniversalTerrestrial Radio Access Network) side and user's set (UE:User Equipment) side is carried out encryption.In this flow process, encryption for the radio bearer of Unacknowledged Mode (UM) or affirmation mode (AM), be to negotiate consistent ciphering activation point by UTRAN with the UE side, the expression mode of this ciphering activation point is the data frame number (SN) of wireless chain control layer (RLC).
Fig. 1 is the mutual schematic diagram of enciphered message between UTRAN and UE.Uplink and downlink enciphered message among the figure is included in the message of UTRAN and the transmission of UE interface.The UTRAN side tells by the message (hereinafter referred to as descending encrypting messages) that comprises descending enciphered message this side of UE oneself from which SN begins to encrypt, and same UE tells by the message (hereinafter referred to as up encrypting messages) that comprises up enciphered message this side of UTRAN oneself from which SN begins to encrypt.Both sides are write down the other side's ciphering activation point mutually, in the data frame encryption of the moment to sending separately that ciphering activation point arrives, to the Frame deciphering that receives.
Described descending and up encrypting messages is a rrc layer message, please refer to Fig. 2, is divided into packet (PDU) one by one by the rlc layer entity when these message send on RB, each SN that is responsible for assigning.When receiving, these packets (PDU) are serially connected by rlc layer again and revert to original rrc layer message.
During work, the UE side has only after all packets of receiving descending encrypting messages fully, just can solve descending enciphered message, thereby knows the ciphering activation point of UTRAN side.So the UTRAN side is when selecting ciphering activation point, must guarantee to explain this message under the encrypted state of UE before receiving all packets of descending encrypting messages, promptly the ciphering activation point SN of Que Dinging can not drop among the SN of the packet that descending encrypting messages is divided into, and the highest SN of the packet of cutting apart than descending encrypting messages at least is big by 1 in theory.In like manner, when the UE side was selected up ciphering activation point SN, also the highest SN than the packet that up encrypting messages was divided into was big by 1.The deviate of first SN that the rlc layer cutting operation will distribute when ciphering activation point SN sent relevant encrypting messages with RRC is encrypted delay exactly.
Determine not provide relevant account form for the ciphering activation point of the radio bearer of UM or AM pattern in the RRC agreement, and under the prerequisite in the SN that guarantees the packet that ciphering activation point SN does not drop on descending encrypting messages and is divided into, clearly regulation will be with the encryption delay start encryption of minimum again for agreement.In the application of reality, calculating to the ciphering activation point of radio bearer does not have unified standard at present yet, most equipment manufacturer adopts the mode of estimation, and the ciphering activation point that obtains is not accurate enough, can't satisfy the requirement of encrypting with the encryption delay start of minimum in the RRC agreement.
Summary of the invention
The technical problem to be solved in the present invention provides definite method of ciphering activation point in a kind of radio resource control layer, can encrypt with the encryption delay start of minimum.
In order to solve the problems of the technologies described above, the invention provides definite method of ciphering activation point in a kind of radio resource control layer, may further comprise the steps:
(a) radio resource control layer obtains the message number to be split of wireless chain control layer, the length of every message, and described radio resource control layer is when being ready for sending encrypting messages, the data of first frame number that this wireless chain control layer cutting operation will distribute;
(b) described radio resource control layer is cut apart relevant configuration according to the described data of obtaining in conjunction with described wireless chain control layer and message, calculates minimum encryption and postpones;
(c) the described radio resource control layer described minimum encryption that will obtain postpones to add the above first frame number, as the ciphering activation point.
Said method can have following characteristics: described step (a) further can be divided into following steps:
When radio resource control layer is ready for sending encrypting messages, send a request message, require to obtain data relevant in the described wireless chain control layer with encrypting delay to wireless chain control layer;
Described wireless chain control layer returns response, with message number to be split in the layer, the length of every message, and this moment cutting operation first frame number that will distribute the described radio resource control layer of data notification.
Said method can have following characteristics: described and message are cut apart figure place that relevant configuration comprises the Length Indication that described wireless chain control layer uses, pattern that radio bearer uses and whether are adopted the particular length indication.
Said method can have following characteristics: when calculating the minimum encryption delay in the described step (b), think that described wireless chain control layer all adopts the mode of cutting apart separately to all message to be split.
As from the foregoing, the present invention can reduce UE and the inaccurate problem that causes of UTRAN ciphering activation point when encrypting with the new encryption parameter of the fastest, safest delay start, and the utilization ratio of encrypt asset is improved.
Description of drawings
Fig. 1 is the mutual schematic diagram of enciphered message between UTRAN and UE.
Fig. 2 is the schematic diagram of RRC and RLC functional interface.
Fig. 3 is the flow chart that the embodiment of the invention is determined ciphering activation point.
Embodiment
According to the requirement of agreement to ciphering activation point, ciphering activation point Sn ActiveAccount form be:
Sn Activet=Sn current+Sn offset
Wherein: Sn ActiveBe the corresponding frame number of ciphering activation point; Sn CurrentWhen being ready for sending the upstream or downstream enciphered message for rrc layer, first frame number that the RLC cutting operation will distribute; Sn OffsetFor ciphering activation is put relative Sn CurrentThe frame number deviation, the minimum encryption that promptly will calculate postpones.
Fig. 2 is the schematic diagram of RRC and RLC functional interface.As shown in the figure, RLC cut apart have enciphered message rrc layer encrypting messages (referring to comprise the upstream or downstream encrypting messages of enciphered message) before, may also leave other undivided message, suppose among the RLC to also have k bar message to be split.These message will be divided into a plurality of PDU by rlc layer together with the encrypting messages of rrc layer, and each PDU distributes a SN.
Postpone in order to calculate minimum encryption, RRC at first will require to obtain the rlc layer data relevant with encrypting delay to RLC transmission interface message before encrypting messages is sent to rlc layer.When rlc layer is returned response message to RRC, message number k (k=0,1 that rlc layer is to be split ... n), the length Size of every message k(work as k=0, Size k=0), first frame number Sn that this moment, the RLC cutting operation will distribute CurrentThe notice rrc layer.When calculating minimum encryption so and postponing, need to consider to comprise the encrypting messages that k bar message that rlc layer is to be split and RRC are ready for sending, i=k+1 bar message altogether, its length separately is respectively Size i(i=1,2 ... k, k+1), wherein the length of encrypting messages is numbered Size K+1
According to the principle that RLC is cut apart, if all message to be split are not connected in series, but to be cut apart separately, the number of the PDU that then is divided into is maximum, and is corresponding, and minimum encryption postpones just big more; If all message to be split all are serially connected and do as a whole cutting apart, the minimum number of the PDU that then is divided into, corresponding, minimum encryption postpones also just more little.Because RRC can't be known the situation of cutting apart that RLC is concrete, present embodiment calculates to encrypt based on the mode of cutting apart separately and postpones Sn Offset, guaranteeing that be met all cuts apart the possible safest minimum delay, so-called the safest be exactly that the packet of downlink or uplink encrypting messages is distributed in this delay fully.
When calculating minimum encryption and postpone, need to determine the number of each message with the packet that is divided into, what this will consider that RB uses is AM pattern or UM pattern; Being to use 15-bit still is the Length Indication (Length Indicators refers in a PDU, and byte length that certain Service Data Unit (SDU) takies when this PDU finishes or the implication that some are specific are as filling indication) of 7-bit; If use the UM pattern, to consider that also (special LI represents that first byte of certain SDU just in time begins in this PDU in the particular length indication.) whether use.These configurations all can have influence on the number of the PDU that message is divided into, and then influences the calculating of minimum encryption delay.
To be given in Sn under the various configurations below OffsetConcrete computing formula, these configurations are by the RRC appointment, the algorithm that RRC is can be according to different selection of configuration different.In various, k=0,1 ... n; I=1,2 ... k, k+1; Size iBe message-length, unit is Byte; Size PduBe the length of the PDU cut apart, unit is Byte.In the formula
Figure C20041004277900081
Represent downward rounding operation, for example
Figure C20041004277900082
A) the rlc layer agreement is used the 7-bit Length Indication, when RB uses the AM pattern:
Figure C20041004277900083
Figure C20041004277900084
The following describes derivation: because the byte length of every message is Size i, every message all has the Length Indication of 1 byte.So the real bytes length of every message is Size i+ 1.The PDU byte size of cutting apart is Size Pdu, remove the header of 2 bytes, in fact have only Size Pdu-2 bytes can be put the content of the message that will cut apart.Because the actual message-length of cutting apart may not necessarily be by Size Pdu-2 divide exactly, so add Size Pdu-3 carry out the rounding operation.Amounting to needs i+1 bar message is cut apart.Add up and obtain above formula.
B) the rlc layer agreement is used the 7-bit Length Indication, and RB uses the UM pattern, and when using the particular length indication:
Figure C20041004277900091
Figure C20041004277900092
The RB of UM pattern has only the header of 1 byte, so in fact have only Size Pdu-1 byte can be put the content of the message that will cut apart.Because use the particular length indication, then the real bytes length of each message is exactly (Size i+ 1)+1,1 of bracket the inside is the Length Indication of message self, and 1 of bracket outside is the particular length indication of 1 byte.
C) the rlc layer agreement is used the 7-bit Length Indication, and RB uses the UM pattern, when not using the particular length indication:
Figure C20041004277900093
Figure C20041004277900094
This configuration is not down because of using special LI, and then the real bytes length of each message is exactly Size i+ 1, thereby can derive above-mentioned formula.
For 15-bit " Length Indicators ".The Length Indication of every message self and special LI are 2 bytes, and same principle can be derived following formula.
D) the rlc layer agreement is used the 15-bit Length Indication, when RB uses the AM pattern:
Figure C20041004277900101
Figure C20041004277900102
E) the rlc layer agreement is used the 15-bit Length Indication, and RB uses the UM pattern, and when using the particular length indication:
Figure C20041004277900103
Figure C20041004277900104
F) the rlc layer agreement is used the 15-bit Length Indication, and RB uses the UM pattern, when not using the particular length indication:
Figure C20041004277900105
Figure C20041004277900106
By above analysis, can draw the flow process of definite method of ciphering activation point in the embodiment of the invention rrc layer, as shown in Figure 3, may further comprise the steps:
Step 110, RRC earlier to RLC transmission interface message, required to obtain data relevant with encrypting delay in the rlc layer before sending encrypting messages;
Step 120, RLC returns response to RRC, the message number k that rlc layer is to be split, the length Size of every message kAnd first frame number Sn that this moment, the RLC cutting operation will distribute CurrentThe notice rrc layer;
Step 130, rrc layer be according to the data that obtain, and figure place, the pattern that RB uses and the configuration of whether adopting the particular length indication of the Length Indication of using in conjunction with rlc layer are calculated minimum encryption and postponed Sn Offset, different configurations corresponding computing formula are down listed hereinbefore;
Step 140 postpones Sn with the minimum encryption that obtains OffsetAdd the above first frame number Sn Current, promptly obtained the ciphering activation point Sn that will determine Active
It is to be noted; the method that the present invention calculates the minimum encryption delay is not limited to listed several computing formula; also may adopt other and message to cut apart relevant configuration parameter among the RLC; according to design of the present invention; can derive the corresponding calculated formula equally; therefore, protection scope of the present invention should be as the criterion with the content of claims.

Claims (10)

1. definite method of ciphering activation point in the radio resource control layer may further comprise the steps:
(a) radio resource control layer obtains the message number to be split of wireless chain control layer, the length of every message, and described radio resource control layer is when being ready for sending encrypting messages, the data of first frame number that this wireless chain control layer cutting operation will distribute;
(b) described radio resource control layer is according to the message number of obtaining described to be split, the length of message, cuts apart relevant configuration in conjunction with the length of the protocol Data Unit PDU of described wireless chain control layer with message, calculates the minimum encryption delay;
(c) the described radio resource control layer described minimum encryption that will obtain postpones to add the above first frame number, as the ciphering activation point.
2. the method for claim 1 is characterized in that, described step (a) further can be divided into following steps:
When radio resource control layer is ready for sending encrypting messages, send a request message, require to obtain data relevant in the described wireless chain control layer with encrypting delay to wireless chain control layer;
Described wireless chain control layer returns response, with message number to be split in the layer, the length of every message, and this moment cutting operation first frame number that will distribute the described radio resource control layer of data notification.
3. method as claimed in claim 1 or 2, it is characterized in that described wireless chain control layer and message are cut apart figure place that relevant configuration comprises the Length Indication that described wireless chain control layer uses, pattern that radio bearer uses and whether adopted the particular length indication.
4. method as claimed in claim 1 or 2 is characterized in that, when calculating the minimum encryption delay in the described step (b), thinks that described wireless chain control layer all adopts the mode of cutting apart separately to all message to be split.
5. method as claimed in claim 3 is characterized in that, described wireless chain control layer agreement is used the indication of 7 bit lengths, and radio bearer uses affirmation mode, and described minimum encryption postpones to calculate as follows:
Figure C2004100427790002C1
Wherein: Sn OffsetThe expression minimum encryption postpones Size PduThe length of the PDU that expression is cut apart, unit is a byte, Size iThe length of expression message, unit is a byte, k represents message number to be split in the described wireless chain control layer, k=0,1 ... n.
6. method as claimed in claim 3 is characterized in that, described wireless chain control layer agreement is used the indication of 7 bit lengths, and radio bearer uses Unacknowledged Mode and uses the particular length indication, and described minimum encryption postpones to calculate as follows:
Figure C2004100427790003C1
Wherein: Sn OffsetThe expression minimum encryption postpones Size PduThe length of the PDU that expression is cut apart, unit is a byte, Size iThe length of expression message, unit is byte, and k represents message number to be split in the described wireless chain control layer, k=0,1 ... n.
7. method as claimed in claim 3 is characterized in that, described wireless chain control layer agreement is used the indication of 7 bit lengths, and radio bearer uses Unacknowledged Mode, does not use the particular length indication, and described minimum encryption postpones to calculate as follows:
Figure C2004100427790003C2
Wherein: Sn OffsetThe expression minimum encryption postpones Size PduThe length of the PDU that expression is cut apart, unit is a byte, Size iThe length of expression message, unit is byte, and k represents message number to be split in the described wireless chain control layer, k=0,1 ... n.
8. method as claimed in claim 3 is characterized in that, described wireless chain control layer agreement is used the indication of 15 bit lengths, and radio bearer uses affirmation mode, and described minimum encryption postpones to calculate as follows:
Figure C2004100427790003C3
Wherein: Sn OffsetThe expression minimum encryption postpones Size PduThe length of the PDU that expression is cut apart, unit is a byte, Size iThe length of expression message, unit is byte, and k represents message number to be split in the described wireless chain control layer, k=0,1 ... n.
9. method as claimed in claim 3 is characterized in that, described wireless chain control layer agreement is used the indication of 15 bit lengths, and radio bearer uses Unacknowledged Mode and uses the particular length indication, and described minimum encryption postpones to calculate as follows:
Figure C2004100427790004C1
Wherein: Sn OffsetThe expression minimum encryption postpones Size PduThe length of the PDU that expression is cut apart, unit is a byte, Size iThe length of expression message, unit is byte, and k represents message number to be split in the described wireless chain control layer, k=0,1 ... n.
10. method as claimed in claim 3 is characterized in that, described wireless chain control layer agreement is used the indication of 15 bit lengths, and radio bearer uses Unacknowledged Mode, does not use the particular length indication, and described minimum encryption postpones to calculate as follows:
Figure C2004100427790004C2
Wherein: Sn OffsetThe expression minimum encryption postpones Size PduThe length of the PDU that expression is cut apart, unit is a byte, Size iThe length of expression message, unit is byte, and k represents message number to be split in the described wireless chain control layer, k=0,1 ... n.
CNB200410042779XA 2004-05-27 2004-05-27 Encrypted active point confirming method in wireless resource controlling layer Expired - Fee Related CN100393031C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB200410042779XA CN100393031C (en) 2004-05-27 2004-05-27 Encrypted active point confirming method in wireless resource controlling layer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB200410042779XA CN100393031C (en) 2004-05-27 2004-05-27 Encrypted active point confirming method in wireless resource controlling layer

Publications (2)

Publication Number Publication Date
CN1585327A CN1585327A (en) 2005-02-23
CN100393031C true CN100393031C (en) 2008-06-04

Family

ID=34601669

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB200410042779XA Expired - Fee Related CN100393031C (en) 2004-05-27 2004-05-27 Encrypted active point confirming method in wireless resource controlling layer

Country Status (1)

Country Link
CN (1) CN100393031C (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2006332006A1 (en) 2005-12-22 2007-07-05 Interdigital Technology Corporation Method and apparatus for data security and automatic repeat request implementation in a wireless communication system
TWI452887B (en) * 2006-11-21 2014-09-11 Innovative Sonic Ltd Method and apparatus for performing ciphering in a wireless communications system
US11129017B2 (en) 2017-09-28 2021-09-21 Futurewei Technologies, Inc. System and method for security activation with session granularity

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1126019A (en) * 1993-06-23 1996-07-03 诺基亚电信公司 Method for call establishment
US6526030B2 (en) * 1997-09-16 2003-02-25 Qualcomm Incorporated Channel structure for communication systems
CN1451250A (en) * 2000-03-23 2003-10-22 西门子移动通讯公司 Handover procedures in radio communication system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1126019A (en) * 1993-06-23 1996-07-03 诺基亚电信公司 Method for call establishment
US6526030B2 (en) * 1997-09-16 2003-02-25 Qualcomm Incorporated Channel structure for communication systems
CN1451250A (en) * 2000-03-23 2003-10-22 西门子移动通讯公司 Handover procedures in radio communication system

Also Published As

Publication number Publication date
CN1585327A (en) 2005-02-23

Similar Documents

Publication Publication Date Title
CN101843157B (en) Buffer status reporting based on radio bearer configuration
TW200303148A (en) Inter node B serving HS-DSCH cell change mechanism in high speed wireless communication system
US20230413103A1 (en) Quality of service implementations for separating user plane
KR20120115954A (en) Method and apparatus for transmitting and receiving data in mobile communication system
CN108702660A (en) Communication means, terminal device and the network equipment
EP4033842A1 (en) Method for transmitting downlink feedback information, base station, and terminal device
CN104780016B (en) A kind of transmission method and equipment of data resource
US20180069919A1 (en) System, method, and device for providing application service
WO2018201902A1 (en) Data transmission method and device
JP6454412B2 (en) Control message transmission method, apparatus, and computer storage medium
EP3886488A1 (en) Bsr reporting method and device
EP3562204A1 (en) Method and apparatus for selecting user plane anchor
WO2022048773A1 (en) Method and apparatus to synchronize radio bearers
EP2706808B1 (en) Service data scheduling method, base station, and base station controller
US9503995B2 (en) Method and system for synchronous service-flow transmission in heterogeneous network
JP2012195722A (en) Wireless communication system, base station, wireless communication terminal, and access scheduling method
CN100393031C (en) Encrypted active point confirming method in wireless resource controlling layer
US20190230537A1 (en) Wireless communication method, terminal device, and access network device
CN109561443B (en) Information processing method, device, equipment and computer readable storage medium
EP3866528A1 (en) A communication method and apparatus
CN100441042C (en) Radio allocation activation time selecting method controlled by radio resource
CN116743788A (en) Method and device for acquiring perception data and method and device for reporting perception data
CN112911693B (en) Message processing method and device
WO2010016149A1 (en) Communication device, communication method therefor, and communication program
WO2017185368A1 (en) Signalling transmission method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20180710

Address after: California, USA

Patentee after: Global innovation polymerization LLC

Address before: 518057, Nanshan District high tech Industrial Park, Guangdong province Shenzhen science and technology south road Zhongxing building A block 6

Patentee before: ZTE Corp.

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20080604