CN100393031C - Encrypted active point confirming method in wireless resource controlling layer - Google Patents
Encrypted active point confirming method in wireless resource controlling layer Download PDFInfo
- Publication number
- CN100393031C CN100393031C CNB200410042779XA CN200410042779A CN100393031C CN 100393031 C CN100393031 C CN 100393031C CN B200410042779X A CNB200410042779X A CN B200410042779XA CN 200410042779 A CN200410042779 A CN 200410042779A CN 100393031 C CN100393031 C CN 100393031C
- Authority
- CN
- China
- Prior art keywords
- control layer
- message
- length
- wireless chain
- expression
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention discloses an encrypted active point confirming method in a wireless resource controlling layer. A wireless resource controlling layer acquires the number of messages to be divided in a wireless link controlling layer; when the wireless resource controlling layer is ready to send an encrypted message, the wireless link controlling layer divides data of a first frame number, which is allocated by operation; the wireless resource controlling layer combines the wireless link controlling layer and the relative configuration of the divided message according to the acquired data; then, minimum encrypted delay is calculated. The obtained minimum encrypted delay is added to the first frame number by the wireless resource controlling layer to be used as an encrypted active point. The method of the present invention can avoid the problems caused by the inaccuracy of UE and UTRAN encrypted active points at the time of encryption; therefore, the utilization efficiency of encryption resources is improved, and new encryption parameters are started by the fastest delay.
Description
Technical field
The present invention relates to radio resource control in the mobile communication system (RRC agreement), relate in particular to the method for determining the ciphering activation point of radio bearer (RB) in this agreement.
Background technology
Encryption flow in the RRC agreement refers to the process that the data flow on the radio bearer of land radio access web (UTRAN:UniversalTerrestrial Radio Access Network) side and user's set (UE:User Equipment) side is carried out encryption.In this flow process, encryption for the radio bearer of Unacknowledged Mode (UM) or affirmation mode (AM), be to negotiate consistent ciphering activation point by UTRAN with the UE side, the expression mode of this ciphering activation point is the data frame number (SN) of wireless chain control layer (RLC).
Fig. 1 is the mutual schematic diagram of enciphered message between UTRAN and UE.Uplink and downlink enciphered message among the figure is included in the message of UTRAN and the transmission of UE interface.The UTRAN side tells by the message (hereinafter referred to as descending encrypting messages) that comprises descending enciphered message this side of UE oneself from which SN begins to encrypt, and same UE tells by the message (hereinafter referred to as up encrypting messages) that comprises up enciphered message this side of UTRAN oneself from which SN begins to encrypt.Both sides are write down the other side's ciphering activation point mutually, in the data frame encryption of the moment to sending separately that ciphering activation point arrives, to the Frame deciphering that receives.
Described descending and up encrypting messages is a rrc layer message, please refer to Fig. 2, is divided into packet (PDU) one by one by the rlc layer entity when these message send on RB, each SN that is responsible for assigning.When receiving, these packets (PDU) are serially connected by rlc layer again and revert to original rrc layer message.
During work, the UE side has only after all packets of receiving descending encrypting messages fully, just can solve descending enciphered message, thereby knows the ciphering activation point of UTRAN side.So the UTRAN side is when selecting ciphering activation point, must guarantee to explain this message under the encrypted state of UE before receiving all packets of descending encrypting messages, promptly the ciphering activation point SN of Que Dinging can not drop among the SN of the packet that descending encrypting messages is divided into, and the highest SN of the packet of cutting apart than descending encrypting messages at least is big by 1 in theory.In like manner, when the UE side was selected up ciphering activation point SN, also the highest SN than the packet that up encrypting messages was divided into was big by 1.The deviate of first SN that the rlc layer cutting operation will distribute when ciphering activation point SN sent relevant encrypting messages with RRC is encrypted delay exactly.
Determine not provide relevant account form for the ciphering activation point of the radio bearer of UM or AM pattern in the RRC agreement, and under the prerequisite in the SN that guarantees the packet that ciphering activation point SN does not drop on descending encrypting messages and is divided into, clearly regulation will be with the encryption delay start encryption of minimum again for agreement.In the application of reality, calculating to the ciphering activation point of radio bearer does not have unified standard at present yet, most equipment manufacturer adopts the mode of estimation, and the ciphering activation point that obtains is not accurate enough, can't satisfy the requirement of encrypting with the encryption delay start of minimum in the RRC agreement.
Summary of the invention
The technical problem to be solved in the present invention provides definite method of ciphering activation point in a kind of radio resource control layer, can encrypt with the encryption delay start of minimum.
In order to solve the problems of the technologies described above, the invention provides definite method of ciphering activation point in a kind of radio resource control layer, may further comprise the steps:
(a) radio resource control layer obtains the message number to be split of wireless chain control layer, the length of every message, and described radio resource control layer is when being ready for sending encrypting messages, the data of first frame number that this wireless chain control layer cutting operation will distribute;
(b) described radio resource control layer is cut apart relevant configuration according to the described data of obtaining in conjunction with described wireless chain control layer and message, calculates minimum encryption and postpones;
(c) the described radio resource control layer described minimum encryption that will obtain postpones to add the above first frame number, as the ciphering activation point.
Said method can have following characteristics: described step (a) further can be divided into following steps:
When radio resource control layer is ready for sending encrypting messages, send a request message, require to obtain data relevant in the described wireless chain control layer with encrypting delay to wireless chain control layer;
Described wireless chain control layer returns response, with message number to be split in the layer, the length of every message, and this moment cutting operation first frame number that will distribute the described radio resource control layer of data notification.
Said method can have following characteristics: described and message are cut apart figure place that relevant configuration comprises the Length Indication that described wireless chain control layer uses, pattern that radio bearer uses and whether are adopted the particular length indication.
Said method can have following characteristics: when calculating the minimum encryption delay in the described step (b), think that described wireless chain control layer all adopts the mode of cutting apart separately to all message to be split.
As from the foregoing, the present invention can reduce UE and the inaccurate problem that causes of UTRAN ciphering activation point when encrypting with the new encryption parameter of the fastest, safest delay start, and the utilization ratio of encrypt asset is improved.
Description of drawings
Fig. 1 is the mutual schematic diagram of enciphered message between UTRAN and UE.
Fig. 2 is the schematic diagram of RRC and RLC functional interface.
Fig. 3 is the flow chart that the embodiment of the invention is determined ciphering activation point.
Embodiment
According to the requirement of agreement to ciphering activation point, ciphering activation point Sn
ActiveAccount form be:
Sn
Activet=Sn
current+Sn
offset
Wherein: Sn
ActiveBe the corresponding frame number of ciphering activation point; Sn
CurrentWhen being ready for sending the upstream or downstream enciphered message for rrc layer, first frame number that the RLC cutting operation will distribute; Sn
OffsetFor ciphering activation is put relative Sn
CurrentThe frame number deviation, the minimum encryption that promptly will calculate postpones.
Fig. 2 is the schematic diagram of RRC and RLC functional interface.As shown in the figure, RLC cut apart have enciphered message rrc layer encrypting messages (referring to comprise the upstream or downstream encrypting messages of enciphered message) before, may also leave other undivided message, suppose among the RLC to also have k bar message to be split.These message will be divided into a plurality of PDU by rlc layer together with the encrypting messages of rrc layer, and each PDU distributes a SN.
Postpone in order to calculate minimum encryption, RRC at first will require to obtain the rlc layer data relevant with encrypting delay to RLC transmission interface message before encrypting messages is sent to rlc layer.When rlc layer is returned response message to RRC, message number k (k=0,1 that rlc layer is to be split ... n), the length Size of every message
k(work as k=0, Size
k=0), first frame number Sn that this moment, the RLC cutting operation will distribute
CurrentThe notice rrc layer.When calculating minimum encryption so and postponing, need to consider to comprise the encrypting messages that k bar message that rlc layer is to be split and RRC are ready for sending, i=k+1 bar message altogether, its length separately is respectively Size
i(i=1,2 ... k, k+1), wherein the length of encrypting messages is numbered Size
K+1
According to the principle that RLC is cut apart, if all message to be split are not connected in series, but to be cut apart separately, the number of the PDU that then is divided into is maximum, and is corresponding, and minimum encryption postpones just big more; If all message to be split all are serially connected and do as a whole cutting apart, the minimum number of the PDU that then is divided into, corresponding, minimum encryption postpones also just more little.Because RRC can't be known the situation of cutting apart that RLC is concrete, present embodiment calculates to encrypt based on the mode of cutting apart separately and postpones Sn
Offset, guaranteeing that be met all cuts apart the possible safest minimum delay, so-called the safest be exactly that the packet of downlink or uplink encrypting messages is distributed in this delay fully.
When calculating minimum encryption and postpone, need to determine the number of each message with the packet that is divided into, what this will consider that RB uses is AM pattern or UM pattern; Being to use 15-bit still is the Length Indication (Length Indicators refers in a PDU, and byte length that certain Service Data Unit (SDU) takies when this PDU finishes or the implication that some are specific are as filling indication) of 7-bit; If use the UM pattern, to consider that also (special LI represents that first byte of certain SDU just in time begins in this PDU in the particular length indication.) whether use.These configurations all can have influence on the number of the PDU that message is divided into, and then influences the calculating of minimum encryption delay.
To be given in Sn under the various configurations below
OffsetConcrete computing formula, these configurations are by the RRC appointment, the algorithm that RRC is can be according to different selection of configuration different.In various, k=0,1 ... n; I=1,2 ... k, k+1; Size
iBe message-length, unit is Byte; Size
PduBe the length of the PDU cut apart, unit is Byte.In the formula
Represent downward rounding operation, for example
A) the rlc layer agreement is used the 7-bit Length Indication, when RB uses the AM pattern:
The following describes derivation: because the byte length of every message is Size
i, every message all has the Length Indication of 1 byte.So the real bytes length of every message is Size
i+ 1.The PDU byte size of cutting apart is Size
Pdu, remove the header of 2 bytes, in fact have only Size
Pdu-2 bytes can be put the content of the message that will cut apart.Because the actual message-length of cutting apart may not necessarily be by Size
Pdu-2 divide exactly, so add Size
Pdu-3 carry out the rounding operation.Amounting to needs i+1 bar message is cut apart.Add up and obtain above formula.
B) the rlc layer agreement is used the 7-bit Length Indication, and RB uses the UM pattern, and when using the particular length indication:
The RB of UM pattern has only the header of 1 byte, so in fact have only Size
Pdu-1 byte can be put the content of the message that will cut apart.Because use the particular length indication, then the real bytes length of each message is exactly (Size
i+ 1)+1,1 of bracket the inside is the Length Indication of message self, and 1 of bracket outside is the particular length indication of 1 byte.
C) the rlc layer agreement is used the 7-bit Length Indication, and RB uses the UM pattern, when not using the particular length indication:
This configuration is not down because of using special LI, and then the real bytes length of each message is exactly Size
i+ 1, thereby can derive above-mentioned formula.
For 15-bit " Length Indicators ".The Length Indication of every message self and special LI are 2 bytes, and same principle can be derived following formula.
D) the rlc layer agreement is used the 15-bit Length Indication, when RB uses the AM pattern:
E) the rlc layer agreement is used the 15-bit Length Indication, and RB uses the UM pattern, and when using the particular length indication:
F) the rlc layer agreement is used the 15-bit Length Indication, and RB uses the UM pattern, when not using the particular length indication:
By above analysis, can draw the flow process of definite method of ciphering activation point in the embodiment of the invention rrc layer, as shown in Figure 3, may further comprise the steps:
It is to be noted; the method that the present invention calculates the minimum encryption delay is not limited to listed several computing formula; also may adopt other and message to cut apart relevant configuration parameter among the RLC; according to design of the present invention; can derive the corresponding calculated formula equally; therefore, protection scope of the present invention should be as the criterion with the content of claims.
Claims (10)
1. definite method of ciphering activation point in the radio resource control layer may further comprise the steps:
(a) radio resource control layer obtains the message number to be split of wireless chain control layer, the length of every message, and described radio resource control layer is when being ready for sending encrypting messages, the data of first frame number that this wireless chain control layer cutting operation will distribute;
(b) described radio resource control layer is according to the message number of obtaining described to be split, the length of message, cuts apart relevant configuration in conjunction with the length of the protocol Data Unit PDU of described wireless chain control layer with message, calculates the minimum encryption delay;
(c) the described radio resource control layer described minimum encryption that will obtain postpones to add the above first frame number, as the ciphering activation point.
2. the method for claim 1 is characterized in that, described step (a) further can be divided into following steps:
When radio resource control layer is ready for sending encrypting messages, send a request message, require to obtain data relevant in the described wireless chain control layer with encrypting delay to wireless chain control layer;
Described wireless chain control layer returns response, with message number to be split in the layer, the length of every message, and this moment cutting operation first frame number that will distribute the described radio resource control layer of data notification.
3. method as claimed in claim 1 or 2, it is characterized in that described wireless chain control layer and message are cut apart figure place that relevant configuration comprises the Length Indication that described wireless chain control layer uses, pattern that radio bearer uses and whether adopted the particular length indication.
4. method as claimed in claim 1 or 2 is characterized in that, when calculating the minimum encryption delay in the described step (b), thinks that described wireless chain control layer all adopts the mode of cutting apart separately to all message to be split.
5. method as claimed in claim 3 is characterized in that, described wireless chain control layer agreement is used the indication of 7 bit lengths, and radio bearer uses affirmation mode, and described minimum encryption postpones to calculate as follows:
Wherein: Sn
OffsetThe expression minimum encryption postpones Size
PduThe length of the PDU that expression is cut apart, unit is a byte, Size
iThe length of expression message, unit is a byte, k represents message number to be split in the described wireless chain control layer, k=0,1 ... n.
6. method as claimed in claim 3 is characterized in that, described wireless chain control layer agreement is used the indication of 7 bit lengths, and radio bearer uses Unacknowledged Mode and uses the particular length indication, and described minimum encryption postpones to calculate as follows:
Wherein: Sn
OffsetThe expression minimum encryption postpones Size
PduThe length of the PDU that expression is cut apart, unit is a byte, Size
iThe length of expression message, unit is byte, and k represents message number to be split in the described wireless chain control layer, k=0,1 ... n.
7. method as claimed in claim 3 is characterized in that, described wireless chain control layer agreement is used the indication of 7 bit lengths, and radio bearer uses Unacknowledged Mode, does not use the particular length indication, and described minimum encryption postpones to calculate as follows:
Wherein: Sn
OffsetThe expression minimum encryption postpones Size
PduThe length of the PDU that expression is cut apart, unit is a byte, Size
iThe length of expression message, unit is byte, and k represents message number to be split in the described wireless chain control layer, k=0,1 ... n.
8. method as claimed in claim 3 is characterized in that, described wireless chain control layer agreement is used the indication of 15 bit lengths, and radio bearer uses affirmation mode, and described minimum encryption postpones to calculate as follows:
Wherein: Sn
OffsetThe expression minimum encryption postpones Size
PduThe length of the PDU that expression is cut apart, unit is a byte, Size
iThe length of expression message, unit is byte, and k represents message number to be split in the described wireless chain control layer, k=0,1 ... n.
9. method as claimed in claim 3 is characterized in that, described wireless chain control layer agreement is used the indication of 15 bit lengths, and radio bearer uses Unacknowledged Mode and uses the particular length indication, and described minimum encryption postpones to calculate as follows:
Wherein: Sn
OffsetThe expression minimum encryption postpones Size
PduThe length of the PDU that expression is cut apart, unit is a byte, Size
iThe length of expression message, unit is byte, and k represents message number to be split in the described wireless chain control layer, k=0,1 ... n.
10. method as claimed in claim 3 is characterized in that, described wireless chain control layer agreement is used the indication of 15 bit lengths, and radio bearer uses Unacknowledged Mode, does not use the particular length indication, and described minimum encryption postpones to calculate as follows:
Wherein: Sn
OffsetThe expression minimum encryption postpones Size
PduThe length of the PDU that expression is cut apart, unit is a byte, Size
iThe length of expression message, unit is byte, and k represents message number to be split in the described wireless chain control layer, k=0,1 ... n.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB200410042779XA CN100393031C (en) | 2004-05-27 | 2004-05-27 | Encrypted active point confirming method in wireless resource controlling layer |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB200410042779XA CN100393031C (en) | 2004-05-27 | 2004-05-27 | Encrypted active point confirming method in wireless resource controlling layer |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1585327A CN1585327A (en) | 2005-02-23 |
CN100393031C true CN100393031C (en) | 2008-06-04 |
Family
ID=34601669
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB200410042779XA Expired - Fee Related CN100393031C (en) | 2004-05-27 | 2004-05-27 | Encrypted active point confirming method in wireless resource controlling layer |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100393031C (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103199971B (en) * | 2005-12-22 | 2017-03-15 | 美商内数位科技公司 | The data safety that is implemented by WTRU and the method for automatic repeat request and WTRU |
CN101188869B (en) * | 2006-11-21 | 2011-04-20 | 创新音速有限公司 | Method and apparatus for performing ciphering in a wireless communications system |
US11129017B2 (en) * | 2017-09-28 | 2021-09-21 | Futurewei Technologies, Inc. | System and method for security activation with session granularity |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1126019A (en) * | 1993-06-23 | 1996-07-03 | 诺基亚电信公司 | Method for call establishment |
US6526030B2 (en) * | 1997-09-16 | 2003-02-25 | Qualcomm Incorporated | Channel structure for communication systems |
CN1451250A (en) * | 2000-03-23 | 2003-10-22 | 西门子移动通讯公司 | Handover procedures in radio communication system |
-
2004
- 2004-05-27 CN CNB200410042779XA patent/CN100393031C/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1126019A (en) * | 1993-06-23 | 1996-07-03 | 诺基亚电信公司 | Method for call establishment |
US6526030B2 (en) * | 1997-09-16 | 2003-02-25 | Qualcomm Incorporated | Channel structure for communication systems |
CN1451250A (en) * | 2000-03-23 | 2003-10-22 | 西门子移动通讯公司 | Handover procedures in radio communication system |
Also Published As
Publication number | Publication date |
---|---|
CN1585327A (en) | 2005-02-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101843157B (en) | Buffer status reporting based on radio bearer configuration | |
CN106797348B (en) | Throughput guidance based on user plane insight | |
TW200303148A (en) | Inter node B serving HS-DSCH cell change mechanism in high speed wireless communication system | |
US20230413103A1 (en) | Quality of service implementations for separating user plane | |
KR20120115954A (en) | Method and apparatus for transmitting and receiving data in mobile communication system | |
JP2010508754A (en) | Data block generation method in wireless communication system | |
CN108702660A (en) | Communication means, terminal device and the network equipment | |
EP3886488A1 (en) | Bsr reporting method and device | |
JP6454412B2 (en) | Control message transmission method, apparatus, and computer storage medium | |
EP4033842A1 (en) | Method for transmitting downlink feedback information, base station, and terminal device | |
US20180069919A1 (en) | System, method, and device for providing application service | |
WO2018201902A1 (en) | Data transmission method and device | |
EP3562204A1 (en) | Method and apparatus for selecting user plane anchor | |
WO2022048773A1 (en) | Method and apparatus to synchronize radio bearers | |
EP2706808B1 (en) | Service data scheduling method, base station, and base station controller | |
US9503995B2 (en) | Method and system for synchronous service-flow transmission in heterogeneous network | |
JP2012195722A (en) | Wireless communication system, base station, wireless communication terminal, and access scheduling method | |
CN100393031C (en) | Encrypted active point confirming method in wireless resource controlling layer | |
US20190230537A1 (en) | Wireless communication method, terminal device, and access network device | |
CN109561443B (en) | Information processing method, device, equipment and computer readable storage medium | |
EP3866528A1 (en) | A communication method and apparatus | |
CN100441042C (en) | Radio allocation activation time selecting method controlled by radio resource | |
CN112911693B (en) | Message processing method and device | |
WO2010016149A1 (en) | Communication device, communication method therefor, and communication program | |
Calin et al. | LTE application and congestion performance |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20180710 Address after: California, USA Patentee after: Global innovation polymerization LLC Address before: 518057, Nanshan District high tech Industrial Park, Guangdong province Shenzhen science and technology south road Zhongxing building A block 6 Patentee before: ZTE Corp. |
|
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20080604 |