CN102006644A - Method and system for repositioning and encrypting third generation mobile communication system - Google Patents

Method and system for repositioning and encrypting third generation mobile communication system Download PDF

Info

Publication number
CN102006644A
CN102006644A CN2009101672700A CN200910167270A CN102006644A CN 102006644 A CN102006644 A CN 102006644A CN 2009101672700 A CN2009101672700 A CN 2009101672700A CN 200910167270 A CN200910167270 A CN 200910167270A CN 102006644 A CN102006644 A CN 102006644A
Authority
CN
China
Prior art keywords
encryption
reorientation
network controller
parameter
time information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2009101672700A
Other languages
Chinese (zh)
Inventor
杨杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN2009101672700A priority Critical patent/CN102006644A/en
Publication of CN102006644A publication Critical patent/CN102006644A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a method and a system for repositioning and encrypting a third generation mobile communication system. The method comprises the following steps that: a service wireless network controller initiates a repositioning requirement to a core network, wherein the repositioning requirement comprises encrypted activation time information which is not started; after receiving the repositioning requirement, the core network initiates a repositioning request to a target wireless network controller, wherein the repositioning request comprises encrypted activation time information which is not started; after receiving the repositioning request, the target wireless network controller performs encryption according to the encrypted activation time information which is not started; if the current time exceeds the encryption activation time, encryption is started at once and a correct encryption parameter is calculated; and if the current time does not reach the encryption activation time, the original encryption parameter is calculated, the original encryption algorithm is executed, and a new parameter which is not encrypted is stored. By the method and the system, after the target wireless network controller is repositioned, the encrypted parameter can be maintained correct and the normal operation of the encryption function is guaranteed.

Description

A kind of method and system of 3-G (Generation Three mobile communication system) reorientation encryption
Technical field
The present invention relates to 3-G (Generation Three mobile communication system), processing method and system when particularly circuit domain business is encrypted reorientation.
Background technology
As shown in Figure 1, the wireless access network (UTRAN) of UMTS (Universal Mobile Telecommunications System, universal mobile telecommunications system) system is made up of Radio Network System (RNS), and these RNS link to each other with core net by the Iu interface.A RNS comprises a radio network controller (RNC) and one or more NodeB (Node B).NodeB links to each other with RNC by Iub interface.RNC between the RNS links to each other by the Iur interface.
Sometime, specific certain has been initiated professional subscriber equipment (UE), exist a RNC be responsible for its Radio Resource configuration, administer and maintain, this RNC is called Serving RNC (SRNC), and the Access Network side tie point that is connected on the IU interface between UE and the core net (CN) also is positioned on the SRNC.Because roaming or other reasons in the time of need making another one RNC become SRNC, will trigger the repositioning process of SRNC.In repositioning process, the RNC that will bear SRNC role is called Target RNC (target RNC), and the RNC that SRNC role is produced is called source RNC (SourceRNC).Agreement 3GPP 25303V7.0.0 has pointed out to carry out three kinds of situations of SRNC reorientation, first kind of situation: do not have other to follow flow process in the repositioning process; Second kind of situation: repositioning process is attended by cell update or Acceditation Area and upgrades.The third situation: in repositioning process, be attended by direct-cut operation.At the translate phase of carrying out the reorientation role, there be the mutual of message between source RNC and Target RNC and the CN.
Fig. 2 has described does not have other to follow the repositioning process of flow process.Reorientation is initiated in the SRNC decision, initiate the reorientation demand to CN, in the SRNC relocation information in message (SRNCRELOCATION INFO), SRNC fills in the related service information of this UE, CN initiates re-positioning request to Target RNC, after Target RNC is received RELOCATION REQUEST message, carry out the preparation of reorientation, after finishing, preparation sends the re-positioning request response to CN, CN initiates the reorientation order to SRNC, SRNC initiates the reorientation submission to Target RNC after receiving the reorientation order, Target RNC sends the Utran mobility information to UE then, UE sends the response of Utran mobility information to UTRAN and finishes. and Target RNC detects with reorientation to CN transmission reorientation and finishes, and repositioning process finishes.
Exist under circuit domain (CS Domain) business and the ciphering startup situation, in the above repositioning process, SRNC need be transmitted to Target RNC to enciphered message by the reorientation requirement message by CN, 25.331 stipulated the filling in of field of some encryptions in the V7.12.1 agreement, computations counter (CountC) as each radio bearer (RB), the System Frame Numbers of Target cell (SFN) etc. are as Fig. 3.Target RNC obtains the current correct encryption parameter of corresponding RB according to these values, thereby proceeds the normal process of encrypting after reorientation.
But do not describe how to handle following scene in the agreement, when initiating reorientation, the CS business has the encryption that does not start as yet as SRNC.At this moment, do not have corresponding field among the SRNCRELOCATION INFO of reorientation requirement message, SRNC can not be with this state notification target RNC accurately, and the parameter that will cause Target RNC to be encrypted after reorientation is incorrect like this, causes the failure of encrypting.A kind of typical scene is that direct-cut operation has just taken place RNC, and UE finishes in the message with the activationary time of encrypting at the physical channel reprovision, in this encryption time no show still, reorientation has taken place.
Summary of the invention
Technical problem to be solved by this invention provides a kind of method and system of 3-G (Generation Three mobile communication system) reorientation encryption, when solving reorientation, if there is the encryption of the CS territory business that does not start as yet, can not correctly handle the problem of encryption so after the reorientation according to agreement.
In order to solve the problems of the technologies described above, the invention provides a kind of method of 3-G (Generation Three mobile communication system) reorientation encryption, comprising:
Service wireless network controller is initiated the reorientation demand to core net, comprising the activationary time information of the encryption that does not start;
After core net receives described reorientation demand, initiate re-positioning request, comprise the activationary time information of the encryption that does not start in the described request to target radio network controller;
After target radio network controller is received described re-positioning request, carry out encryption according to the activationary time information of the described encryption that does not start.
In order to solve the problems of the technologies described above, the present invention also provides a kind of system of 3-G (Generation Three mobile communication system) reorientation encryption, comprising:
Reorientation demand sending module is arranged at service wireless network controller, is used for service wireless network controller and initiates the reorientation demand to core net, comprising the activationary time information of the encryption that does not start;
The re-positioning request sending module is arranged at core net, is used for core net and initiates re-positioning request to target radio network controller, comprises the activationary time information of the encryption that does not start in the described request;
Encryption processing module is arranged at target radio network controller, is used for after target radio network controller is received re-positioning request, carries out encryption according to the activationary time information of the described encryption that does not start.
Existence disclosed in this invention is the processing method that does not have other reorientations of following flow process and the system of the encryption of start-up circuit territory not, can solve and before reorientation, have the encryption that does not start as yet, such as having taken place as direct-cut operation, and under the situation about not starting as yet of the new encryption behind the direct-cut operation, the problem of service exception takes place after the reorientation, the parameter that makes Target RNC encrypt after reorientation is correct, and encryption function is normally moved.
Description of drawings
Fig. 1 is the structural representation of universal mobile telecommunications system.
Fig. 2 does not have other to follow the repositioning process schematic diagram of flow process.
Fig. 3 fills in for the field of some encryptions in the reorientation requirement message that SRNC sent.
Fig. 4 is the schematic diagram that increases the activationary time of the encryption that does not start in the SRNS relocation information.
Fig. 5 is the implementation method flow chart of reorientation cipher processing method SRNC side of the present invention.
Fig. 6 is the implementation method flow chart of reorientation cipher processing method Target RNC side of the present invention.
Fig. 7 is the system configuration schematic diagram of 3-G (Generation Three mobile communication system) reorientation encryption of the present invention.
Embodiment
Main thought of the present invention is: SRNC increases the activationary time of the encryption that does not start in SRNS RELOCATION INFO, and field name adopts Mac d HFN.Target RNC is judged according to these values when receiving these information, if the current time has surpassed the ciphering activation time, starts so immediately and encrypts, and calculate correct encryption parameter CountC.If the ciphering activation time does not arrive, calculate original encryption parameter so, carry out original cryptographic algorithm, and preserve the new parameter of unencrypted still, in the moment that activationary time arrives, carry out the switching of new encryption parameter.
Below in conjunction with accompanying drawing and preferred implementation technical solution of the present invention is elaborated.
With reference to shown in Figure 4, for increasing the schematic diagram of the activationary time of the encryption that does not start in the SRNC relocation information.After in reorientation requirement message shown in Figure 3, increasing the activationary time of the encryption that does not start shown in Figure 4, the described not activationary time of the encryption of startup is sent to Target RNC.
With reference to shown in Figure 5, be the implementation method flow chart of reorientation cipher processing method SRNC side of the present invention, described method comprises:
Reorientation is initiated in step 501:SRNC decision;
Step 502: if there is the encryption of the circuit domain business that has started, SRNC obtains the CountC of current encryption to user's face, obtains the current SFN of Target cell;
Step 503: if exist the circuit domain that does not start to encrypt, then acquire the activationary time of this encryption, and the Mac d HFN that is about to come into force (Mac d HFN is the Hyper Frame Number that MAC d safeguards, COUNTC is the number of 32bit, high 24bit is Mac d HFN, in the low current moment of 8bit representative,, Mac d HFN encrypts whether correct important parameter) so being decision;
Step 504:SRNC fills in above information among the SRNCRELOCATION INFO in the reorientation requirement message, and message is sent to CN.
With reference to shown in Figure 6, be the implementation method flow chart of reorientation cipher processing method Target RNC side of the present invention, described method comprises:
Step 601: Target RNC is received the SRNC RELOCATION INFO that CN forwards;
Step 602: Target RNC is after reorientation is finished, according to the COUNTC among the COUNTC List among the SRNC RELOCATION INFO (computations counter), the SFN of Target cell among the Calculation time forciphering related information (computing time of enciphered message), the SFN of current goal sub-district, the CFN of current data (Connected Frame Number, Connection Frame Number), calculate the COUNTC of the current encryption that has activated, carry out the processing of encryption and decryption with this COUNTC during the data transmit-receive of TM RB (transparent moderadio bear, the radio bearer of transparent mode).
Step 603: Target RNC is after reorientation is finished, if there is Not Applied Ciphering Info (unactivated enciphered message) among the SRNC RELOCATION INFO, then according to wherein ciphering activation time, COUNTC among the COUNTC List, the SFN of Target cell among the Calculation time for cipheringrelated information, the SFN of current goal sub-district, the CFN of current data, it is overtime to judge whether this encryption that does not start has activated;
Step 604: if overtime, think that then new encryption starts, COUNTC uses Mac dHFN to add the CFN of current data, finishes;
Step 605: if not overtime, then with activationary time, Mac d HFN preserves, and waits for activationary time, and activationary time then then switches to this new encryption, finishes.
Fig. 7 is the system configuration schematic diagram of 3-G (Generation Three mobile communication system) reorientation encryption of the present invention.Described system comprises:
Reorientation demand sending module 701 is arranged at service wireless network controller, is used for service wireless network controller and initiates the reorientation demand to core net, comprising the activationary time information of the encryption that does not start;
Re-positioning request sending module 702 is arranged at core net, is used for core net and initiates re-positioning request to target radio network controller, comprises the activationary time information of the encryption that does not start in the described request;
Encryption processing module 703 is arranged at target radio network controller, is used for after target radio network controller is received re-positioning request, carries out encryption according to the activationary time information of the described encryption that does not start.
In a preferred embodiment of the invention, described encryption processing module 703 is used for having surpassed the ciphering activation time when the current time, then starts immediately and encrypts, and calculate correct encryption parameter.
In another preferred embodiment of the present invention, described encryption processing module 703 is used for not arriving when the ciphering activation time, then calculates original encryption parameter, carries out original cryptographic algorithm, and preserves the new parameter of unencrypted still.Described encryption processing module 703 also is used for carrying out the switching of new encryption parameter in the moment of activationary time arrival.
Also comprise in the reorientation demand that described reorientation demand sending module 701 sends: the computations counter of radio bearer, the System Frame Number information of Target cell.
Above embodiment only be used to illustrate the present invention be applied to exist start-up circuit territory not professional encrypt do not have other to follow the repositioning process of flow process, be not applied to the reorientation flow process that other use these parameters and do not get rid of.
It is pointed out that illustrating of above-mentioned each concrete steps is comparatively concrete, can not therefore think the restriction to scope of patent protection of the present invention, scope of patent protection of the present invention should be as the criterion with claims.

Claims (10)

1. the method for a 3-G (Generation Three mobile communication system) reorientation encryption is characterized in that, comprising:
Service wireless network controller is initiated the reorientation demand to core net, comprising the activationary time information of the encryption that does not start;
After core net receives described reorientation demand, initiate re-positioning request, comprise the activationary time information of the encryption that does not start in the described request to target radio network controller;
After target radio network controller is received described re-positioning request, carry out encryption according to the activationary time information of the described encryption that does not start.
2. the method for claim 1 is characterized in that, described activationary time information according to the described encryption that does not start is carried out encryption, comprising:
If the current time has surpassed the ciphering activation time, then start immediately and encrypt, and calculate correct encryption parameter.
3. the method for claim 1 is characterized in that, described activationary time information according to the described encryption that does not start is carried out encryption, comprising:
If the ciphering activation time does not arrive, then calculate original encryption parameter, carry out original cryptographic algorithm, and preserve the new parameter of unencrypted still.
4. method as claimed in claim 3 is characterized in that, also comprises:
In the moment that activationary time arrives, carry out the switching of new encryption parameter.
5. the method for claim 1 is characterized in that, also comprises in the described reorientation demand:
The computations counter of radio bearer, the System Frame Number information of Target cell.
6. the system of a 3-G (Generation Three mobile communication system) reorientation encryption is characterized in that, comprising:
Reorientation demand sending module is arranged at service wireless network controller, is used for service wireless network controller and initiates the reorientation demand to core net, comprising the activationary time information of the encryption that does not start;
The re-positioning request sending module is arranged at core net, is used for core net and initiates re-positioning request to target radio network controller, comprises the activationary time information of the encryption that does not start in the described request;
Encryption processing module is arranged at target radio network controller, is used for after target radio network controller is received re-positioning request, carries out encryption according to the activationary time information of the described encryption that does not start.
7. system as claimed in claim 6 is characterized in that, described encryption processing module is used for having surpassed the ciphering activation time when the current time, then starts immediately and encrypts, and calculate correct encryption parameter.
8. system as claimed in claim 6 is characterized in that, described encryption processing module is used for not arriving when the ciphering activation time, then calculates original encryption parameter, carries out original cryptographic algorithm, and preserves the new parameter of unencrypted still.
9. system as claimed in claim 8 is characterized in that, described encryption processing module also is used for carrying out the switching of new encryption parameter in the moment of activationary time arrival.
10. system as claimed in claim 6 is characterized in that, also comprises in the reorientation demand that described reorientation demand sending module sends:
The computations counter of radio bearer, the System Frame Number information of Target cell.
CN2009101672700A 2009-09-02 2009-09-02 Method and system for repositioning and encrypting third generation mobile communication system Pending CN102006644A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009101672700A CN102006644A (en) 2009-09-02 2009-09-02 Method and system for repositioning and encrypting third generation mobile communication system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009101672700A CN102006644A (en) 2009-09-02 2009-09-02 Method and system for repositioning and encrypting third generation mobile communication system

Publications (1)

Publication Number Publication Date
CN102006644A true CN102006644A (en) 2011-04-06

Family

ID=43813616

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009101672700A Pending CN102006644A (en) 2009-09-02 2009-09-02 Method and system for repositioning and encrypting third generation mobile communication system

Country Status (1)

Country Link
CN (1) CN102006644A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104365127A (en) * 2012-05-30 2015-02-18 耐瑞唯信有限公司 Method for tracking a mobile device onto a remote displaying unit
CN108696347A (en) * 2017-04-12 2018-10-23 展讯通信(上海)有限公司 Bluetooth AES encryption starts method, system and the master and slave equipment of bluetooth

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1725894A (en) * 2004-07-19 2006-01-25 华为技术有限公司 Method for solving off normal encipher-decipher after transport of service radio network system
EP1641304A1 (en) * 2004-09-24 2006-03-29 M-Stack Limited Methods and apparatus for reducing airlink congestion and processing time associated with ciphering information in a wireless network
CN101202936A (en) * 2006-12-11 2008-06-18 大唐移动通信设备有限公司 Method, system realizing RRC signal order integrality protection referring to SRNS relocation and wireless network controller

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1725894A (en) * 2004-07-19 2006-01-25 华为技术有限公司 Method for solving off normal encipher-decipher after transport of service radio network system
EP1641304A1 (en) * 2004-09-24 2006-03-29 M-Stack Limited Methods and apparatus for reducing airlink congestion and processing time associated with ciphering information in a wireless network
CN101202936A (en) * 2006-12-11 2008-06-18 大唐移动通信设备有限公司 Method, system realizing RRC signal order integrality protection referring to SRNS relocation and wireless network controller

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104365127A (en) * 2012-05-30 2015-02-18 耐瑞唯信有限公司 Method for tracking a mobile device onto a remote displaying unit
CN104365127B (en) * 2012-05-30 2017-10-03 耐瑞唯信有限公司 Method for following the trail of mobile device in remote display unit
CN108696347A (en) * 2017-04-12 2018-10-23 展讯通信(上海)有限公司 Bluetooth AES encryption starts method, system and the master and slave equipment of bluetooth
CN108696347B (en) * 2017-04-12 2021-02-19 展讯通信(上海)有限公司 Bluetooth AES encryption starting method and system and Bluetooth master and slave devices

Similar Documents

Publication Publication Date Title
US9503901B2 (en) Encryption in a wireless telecommunications
US8627092B2 (en) Asymmetric cryptography for wireless systems
AU2009233486B2 (en) Methods, apparatuses, and computer program products for providing multi-hop cryptographic separation for handovers
EP2309698B1 (en) Exchange of key material
US9350537B2 (en) Enhanced key management for SRNS relocation
US20170359719A1 (en) Key generation method, device, and system
CN102158855B (en) Method of handling security in srvcc handover and related communication device
US20080039096A1 (en) Apparatus, method and computer program product providing secure distributed HO signaling for 3.9G with secure U-plane location update from source eNB
EP2034658B1 (en) Method and system for distributing key in wireless network
US8938071B2 (en) Method for updating air interface key, core network node and radio access system
US20080010677A1 (en) Apparatus, method and computer program product providing improved sequence number handling in networks
EP1601215A2 (en) Wireless communication system and encryption control method
EP1999930B1 (en) A method and apparatus for handling keys used for encryption and integrity
CN102006644A (en) Method and system for repositioning and encrypting third generation mobile communication system
CN102469454A (en) Key setting method in radio network controller (RNC) and wireless network controller as well as terminal
CN102036200A (en) Repositioning execution method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20110406