TW564619B - A system for ensuring encrypted communication after handover - Google Patents

A system for ensuring encrypted communication after handover Download PDF

Info

Publication number
TW564619B
TW564619B TW091109855A TW91109855A TW564619B TW 564619 B TW564619 B TW 564619B TW 091109855 A TW091109855 A TW 091109855A TW 91109855 A TW91109855 A TW 91109855A TW 564619 B TW564619 B TW 564619B
Authority
TW
Taiwan
Prior art keywords
information
mobile station
wireless access
access network
message
Prior art date
Application number
TW091109855A
Other languages
Chinese (zh)
Inventor
Jukka Vialen
Valtteri Niemi
Original Assignee
Nokia Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from FI20002613A external-priority patent/FI20002613A0/en
Priority claimed from PCT/FI2001/000870 external-priority patent/WO2002045453A1/en
Application filed by Nokia Corp filed Critical Nokia Corp
Application granted granted Critical
Publication of TW564619B publication Critical patent/TW564619B/en

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

A fraudulent intruder can eavesdrop on a call by removing information about an encryption algorithm when a multimode mobile station sends an unprotected initial signaling message containing this information over the radio interface to the mobile telecommunications system. The attempt can be prevented in a universal mobile telecommunications system (UMTS) comprising at least two radio access networks providing mobile stations with access to at least one core network, a multimode mobile station, and at least one core network. During connection setup with a first radio access network, the multimode mobile station sends an unprotected initial signaling message that includes information about those encryption algorithms that the multimode mobile station supports when it communicates in a second radio access network. The first radio access network saves some or all the information of it. Then it composes and sends an integrity-protected message that includes information about the encryption algorithms supported by the multimode mobile station in the second radio access network.

Description

564619 A7 B7 經濟部智慧財產局員工消費合作社印製 五、發明説明() 發明領域= 本發明大致關係於一種於電信系統中之真確性 (integrity)保護。 發明背景= 一第三代行動通訊系統在歐洲被稱為UMTS(通用行 動電信系統)。其係為國際電信聯盟IMT-2000系統之一部 份。UMTS/IMT-2000係為一種全球無線多媒體系統,其提 供較現行行動網路為高之傳輸速度(2百萬位元每秒)。 第1圖顯示一 GSM(全球式行動電話系統)網路與一 UMTS網路的一簡化方塊圖。該網路的主要部份為使用者 終端100及一網路部份,其包含一 GSM基地台次系統 BSS105及UMTS領域無線接取網路UTRAN101 (其係為現 行被指定於3 G P P (第三代協定計劃)之寬頻多接取無線網 路)及核心網路CN104。於使用者終端及UTRAN間之無線 界面係被稱為Uu及於UTRAN及3G核心網路間之界面係 被稱為1 u。於G S Μ基地台次系統B s S及真確性無線分封 服務GPRS核心網路間之界面係稱為Gb及於GSM基地台 次系統BSS及GSM核心網路間之界面被為a。使用者終 端可以為多模終端,其可以使用至少兩無線接取技術加以 操作,於此例子中例如為UMTS及GSM。UTRAN包含一 無線網路次系統RNS102,其更包含無線網路控制器 RNC103及一或多數節點B(未示於第1圖中)。於兩RNS 間之界面被稱為lur。於使用者終端及GSM基地台次系統 第5頁 (請先閲讀背面之注意事項再填寫本頁) 嫌· 一口 線_ 本紙張尺度適用中國國家標準(CNS)A4規格(210X 297公釐) 564619 A7 B7 五、發明説明() 經濟部智慧財產局員工消費合作社印製 BSS間之界面係被簡稱為”無線界面"。GSM基地台次系統 BSS包含基地台控制器BSC106及基地收發台BTS107。例 如(GSM)行動切換中心MSC及(GPRS)服務GPRS支援節點 SGSN之核心網路節點,可以控制兩類型之無線接取網 路,即UTRAN及BSS。另一可能網路架構係每一無線接 取網路(UTRAN及BSS)均具有其本身之控制核心網路節 點,分別為 MSC 及 SGSN,2G MSC,2G SGSN 及 3G MSC, 3G SGSN·但這些核心網路元件均連接至一相同家用位置 登錄HLR(未示於第1圖),其包含所有靜態使甩者資訊, 例如使用者之計帳即使當使用者終端能經有好幾個不同 無線接取網路操作時,仍可以由一位置加以控制。 需要被設定、重建及釋放無線方位服務之無線界面協 定係簡單討論如下。於接取階層中之無線界面協定架構包 含三個不同協定層,其由最上至最下分別為:無線網路層 (L3)、資料鏈結層(L2)及實體層(L1)。於這些層中之協定 實體係如下。無線網路層只包含一協定,其於UMTS無線 界面中被稱為RRC(無線求助控制)及於2G GSM無線界面 被稱為RR(無線求助協定)。資料鏈結層於UMTS無線界面 協定中包含幾個協定,被稱為PDCP(封包資料收斂協定)、 BMC(廣播多播控制協定)、rlC(無線鏈結控制協定)及 MAC(媒體接取控制協定)。於' GSM/GPRS無線界面中,層 2協定為LLC(邏輯鏈結控制)、LAPDm(於Dm頻道中之鏈 結接取協定)’ RLC(無線鏈結控制)、及]VIAC(媒體接取控 制協定)。實體層只有一 π協定”,其沒有指定名稱。所有上 第6頁 本紙張尺度適用中國國家標準(CNS)A4規格(21〇χ 297公釐) (請先閲讀背面之注意事項再填寫本頁} 、一 線· % 564619 A7 B7 五、發明説明() 述無線界面協定均指定用於個別一無線接取技術,這表示 對於例如GSM無線界面及UMTSUu界面均是不同的。 於UMTS中,RRC層經由為使用者終端侧中之較高協 定所用及為UTRAN側中之luRANAP(無線接取網路應用 部)協定所用之服務接取點提供服務給較高層,即至一非 接取階層NAS。所有較高層發信(行動力管理、啤叫控制、 會議管理等)均被密封於RRC信息中,用以傳輸於無線界 面上。 所有電信均受到如何確信所接收之資訊已經為一授 權者所送出而不是為想要假冒為送出者之人所送出的問 題。於蜂巢式電信系統中,問題更明顯,其中空中界面提 供一優良平台,用以藉由使用較高傳輸階層,而竊聽及替 換傳輸内容’甚至從遠方進行。解決此問題的基本解答是 各通訊方間之驗證。一驗證處理目標在於發現及檢查兩通 訊方之身份,使得每一方接收有關於另一方之身份的資訊 並可以^賴該身份至一足夠程度。驗證係典型執行於一連 接開始時之指定程序中。然而,這並不能適當地保護後續 信息不被未授權地操縱、插入及刪除。因此,有需要每一 傳送信息進行分開之驗證。隨後之工作可以藉由於傳送端 附加一彳§息驗證碼(M A C -1)至信息,並於接收端檢杳該 MAC-I值加以執行。 一 MAC-I典型為基於部份特定方式,在其所保護的 ^(吕息上之一相當短位元串’並且,在為送出者及信幸、接收 者兩方所知之秘密鑰上。該秘密鑰係典型地於連接開始 第7頁 本紙張尺度適用中國國家標準(CNS)A4規格(210X297公釐) (請先閲讀背面之注意事項再填寫本頁) 、\呑 線- 經濟部智慧財產局員工消費合作社印製 564619 五、發明説明( Α7 Β7 時,在驗證程序中時所產生及同意的。於部份例子中,用 以基於秘密鑰及演繹法所計算之MAC-I的演繹法同時也 疋秘推’但經常並不是如此。 單一信息之驗證程序經常被稱為真確性保護。為了保 證發信的真確性,發送方基於予以送出之信息及使用特定 演繹法之秘密鑰,而計算出ΜΑ(>Ι值,並送出具有ΜΑ(>Ι 值之信息。接收方基於該信息及秘密鑰依據指定演繹法而 再計算出MAC-I值,並比較所接收之mac-1及計算出之 MAC-I。若兩MAC-I值相符,則接收者可以相信該信息未 被更動並已經為授權方所傳送出。 第2圖例示出於UTRAN中之信息驗證碼之計算。用 於UTRAN中之MAC-I之長度為架構軟體32位元。 用於方塊200中之UMTS真確性演繹法係為基於第2 圖所示之輸入參數,來計算信息驗證碼(MAC-I)之單向加 密功能。單向功能表示即使只有一個輸入參數為未知,也 仍不可能由MAC-I導出諸輸入參數。 用以計算MAC-I之參入參數包含予以送出之實際發 信信息(於編碼後)、一秘密真確性鑰、一用以予以真確性 保護之信息的序向號COUNT-I、一表示傳輸方向的值,即 不管該信息係被送於上鏈(由使用者終端至網路)或下鏈 (由網路至使用者終端)方向、及一由網路所產生之隨機號 (更新)。COUNT-I係由一短序向號SN及一被稱為超訊框 號HFN之長序向號所構成。只有當短序向號被正常地與 信息送出,HFN係在每一通訊方中被區域地更新。 第8頁 本紙張尺度適用中國國家標準(CNS)A4規格(210X297公釐) (請先閲讀背面之注意事項再填寫本頁)564619 A7 B7 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 5. Description of the invention () Field of invention = The invention is roughly related to integrity protection in telecommunication systems. BACKGROUND OF THE INVENTION = A third generation mobile communication system is known in Europe as UMTS (Universal Mobile Telecommunications System). It is part of the International Telecommunication Union IMT-2000 system. UMTS / IMT-2000 is a global wireless multimedia system that provides higher transmission speeds (2 million bits per second) than current mobile networks. Figure 1 shows a simplified block diagram of a GSM (Global System for Mobile Phones) network and a UMTS network. The main part of the network is the user terminal 100 and a network part, which includes a GSM base station system BSS105 and a UMTS field wireless access network UTRAN101 (which is currently designated in 3 GPP (third Generation agreement plan), broadband multi-access wireless network) and core network CN104. The radio interface between the user terminal and UTRAN is called Uu and the interface between UTRAN and the 3G core network is called 1 u. The interface between the GSM base station system B s S and the authentic wireless packaging service GPRS core network is called Gb and the interface between the GSM base station system BSS and the GSM core network is called a. The user terminal can be a multi-mode terminal, which can be operated using at least two wireless access technologies, in this example, UMTS and GSM, for example. UTRAN includes a radio network subsystem RNS102, which further includes a radio network controller RNC103 and one or more Node Bs (not shown in Figure 1). The interface between two RNSs is called lur. On the user terminal and the GSM base station system, page 5 (please read the precautions on the back before filling this page) Suspected line_ This paper size applies to China National Standard (CNS) A4 (210X 297 mm) 564619 A7 B7 V. Description of Invention () The interface between BSS and BSS printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs is referred to as "wireless interface". The GSM base station system BSS includes base station controller BSC106 and base transceiver station BTS107. For example, the core network node of the (GSM) mobile switching center MSC and the (GPRS) serving GPRS support node SGSN can control two types of wireless access networks, namely UTRAN and BSS. Another possible network architecture is each wireless access The access network (UTRAN and BSS) has its own control core network nodes, which are MSC and SGSN, 2G MSC, 2G SGSN and 3G MSC, and 3G SGSN. But these core network components are connected to the same home location. Register HLR (not shown in Figure 1), which contains all static messenger information, such as the user's billing, even when the user terminal can operate through several different wireless access networks Controlled by a location. The wireless interface protocols that need to be set, rebuilt, and released for wireless location services are briefly discussed below. The wireless interface protocol architecture in the access hierarchy includes three different protocol layers, which are from top to bottom: : Wireless network layer (L3), data link layer (L2), and physical layer (L1). The protocol system in these layers is as follows. The wireless network layer contains only one protocol, which is called in the UMTS wireless interface. RRC (Wireless Help Control) and 2G GSM wireless interface is called RR (Wireless Help Protocol). The data link layer contains several protocols in the UMTS wireless interface protocol, called PDCP (Packet Data Convergence Protocol), BMC (Broadcast Multicast Control Protocol), rlC (Wireless Link Control Protocol) and MAC (Media Access Control Protocol). In the 'GSM / GPRS wireless interface, the layer 2 protocol is LLC (Logical Link Control), LAPDm (in Link access protocol in the Dm channel) 'RLC (Wireless Link Control), and VIAC (Media Access Control Protocol). The physical layer has only a π protocol ", which does not specify a name. All paper sizes on page 6 apply Chinese National Standard (CNS) A4 specifications (21〇χ 297 mm) (Please read the precautions on the back before filling out this page}, first line ·% 564619 A7 B7 V. Description of the invention ( The above-mentioned wireless interface protocols are specified for an individual wireless access technology, which means that, for example, the GSM wireless interface and the UMTSUu interface are different. In UMTS, the RRC layer is used by higher protocols in the user terminal side and Provide services to the service access points used by the luRANAP (Wireless Access Network Application Department) agreement in the UTRAN side to higher layers, ie to a non-access level NAS. All higher layers send letters (mobility management, beer control) , Conference management, etc.) are sealed in RRC information for transmission on the wireless interface. All telecommunications are subject to the assurance that the information received has been sent by an authorized person and not by someone who wants to impersonate the sender. The problem of sending out. In the cellular telecommunication system, the problem is more obvious. The air interface provides an excellent platform for eavesdropping and replacing the transmission content by using a higher transmission level. From a distant place. The basic solution to this problem is the verification between the communicating parties. The goal of a verification process is to discover and check the identity of the two communicating parties so that each party receives information about the identity of the other party and can rely on it. Identity to a sufficient degree. Authentication is typically performed in a designated procedure at the beginning of a connection. However, this does not properly protect subsequent information from unauthorized manipulation, insertion, and deletion. Therefore, it is necessary to perform each transmission of information. Separate verification. The subsequent work can be performed by attaching a message authentication code (MAC -1) to the message at the transmitting end and checking the MAC-I value at the receiving end. A MAC-I is typically part-based In a specific way, one of the protected ^ (s) is a relatively short bit string, and it is on a secret key known to both the sender, Shinko, and the receiver. The secret key is typically at the beginning of the connection Page 7 This paper size applies Chinese National Standard (CNS) A4 specification (210X297 mm) (Please read the precautions on the back before filling out this page), \ 呑 线-Consumer Affairs Bureau, Intellectual Property Bureau, Ministry of Economic Affairs Printed by Fei Cooperative Co., Ltd. 564619 V. Description of the invention (A7, B7, generated and agreed during the verification process. In some examples, the deduction method based on MAC-I calculated based on the secret key and deduction method is also "Secret push", but this is often not the case. The verification process of a single message is often called authenticity protection. To ensure the authenticity of the sender, the sender calculates based on the information sent and the secret key using a specific deduction method. ΜA (> I value, and send information with ΜA (> I value. Based on the information and secret key, the receiver calculates the MAC-I value according to the specified deduction method, and compares the received mac-1 with the calculation Out of MAC-I. If the two MAC-I values match, the receiver can believe that the information has not been changed and has been transmitted by the authorized party. Figure 2 illustrates the calculation of the message verification code in UTRAN. The length of MAC-I used in UTRAN is 32 bits of architecture software. The UMTS authenticity deduction method used in block 200 is a one-way encryption function that calculates a message authentication code (MAC-I) based on the input parameters shown in FIG. 2. The one-way function means that even if only one input parameter is unknown, it is still impossible to derive the input parameters from MAC-I. The input parameters used to calculate the MAC-I include the actual sending information (after encoding) to be sent, a secret authenticity key, a sequence number COUNT-I of the information used to protect authenticity, and a transmission The value of the direction, that is, whether the information is sent in the direction of the uplink (from the user terminal to the network) or the downlink (from the network to the user terminal), and a random number (update) generated by the network . COUNT-I consists of a short sequence number SN and a long sequence number called a super frame number HFN. Only when the short sequence number is normally sent with the information, the HFN is updated regionally in each communication party. Page 8 This paper size applies to China National Standard (CNS) A4 (210X297 mm) (Please read the precautions on the back before filling this page)

經濟部智慧財產局員工消費合作社印製 564619 經濟部智慧財產局員Η消費合作社印製 A7 B7 五、發明説明() —計算方塊200藉由施加上述參數至真確性演繹法而計 算信息驗證碼,該真確性演繹法施3GPP公開,99規袼中 係被稱為f9演繹法。於未來之新規格的公開中,也可能 可以取得更多之演繹法。於真碟性保護開始前,使用者終 知通4 ”祠路其所支援之真確性演繹法,然後,網路選擇這 些演繹法之一用以作為連接用。一有關於所支援演繹法之 類似機制係用以作為加密。 第3圖例示一予以送於例如無線界面上之信息。該信 息為一層N協定資料單元(pdu)3〇〇,其係於層NlpDu3〇i 中被傳送為資料部(payl〇ad)。於本例子中,層N代表於無 線界面中之無線資源控制(RRC)協定及層N-1代表無線鏈 結控制(RLC)層。層N-1PDU 一般具有固定大小,其係取 決於所用之實體層(如於第2圖中未見到之最低層)頻道類 型及例如調變、頻道編碼及内插之參數而定。若層N pDu 並不是正常地剛好為層N-;!所提供之資料部的大小,則層 N-1可以利用例如分裂、連結及填塞之功能使得層n_ ^ PDU永遠為一固定大小。於本案中,吾人考量於由實際發 信„資料及真確性檢查資訊所構成之層N PDU。真確性檢查 資訊包含MAC-I及於檢視端用以再計算MAC-I所需之信 息序號SN。該信息之總長然後為發信資料位元及真確性 檢查資訊位元之組合。 第4圖例示一由無線接取網路至一 gsm基地台次系 統之系統間移交。為了簡單,只有一行動交換中心被顯示 於第4圖中。實際上,其包含一 GSM(2G或第二代)行動 第9頁 本紙張尺度適用中國國家標準(CNS)A4規格(210Χ 297公釐) (請先閲讀背面之注意事項再填寫本頁}Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economy 564619 Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 B7 V. Description of the invention ()-Calculation block 200 calculates the information verification code by applying the above parameters to the true deduction method, which The authentic deduction method is published by 3GPP, and the 99-series system is called f9 deduction method. In the future disclosure of new specifications, more deduction methods may also be available. Before the protection of real discs begins, users will finally know the authentic deduction methods supported by 4 ”Temple Road, and then the Internet will choose one of these deduction methods for connection. One is about the supported deduction methods. A similar mechanism is used for encryption. Figure 3 illustrates a message sent to, for example, a wireless interface. The message is a layer of N protocol data unit (pdu) 300, which is transmitted as data in layer NlpDu30i. In this example, layer N represents the radio resource control (RRC) protocol in the radio interface and layer N-1 represents the radio link control (RLC) layer. Layer N-1PDUs generally have a fixed size. It depends on the type of physical layer used (such as the lowest layer not seen in Figure 2) and the parameters such as modulation, channel coding and interpolation. If the layer N pDu is not normally just Layer N- ;! The size of the data department provided, then layer N-1 can use functions such as splitting, linking and stuffing to make layer n_ ^ PDU always be a fixed size. In this case, we considered the actual sending of the letter „Composed of data and authenticity check information Layer N PDU. The authenticity check information includes the MAC-I and the information serial number SN required for recalculation of the MAC-I at the viewing end. The total length of the message is then the combination of the transmitted data bit and the authenticity check information bit. Figure 4 illustrates a system transfer from a wireless access network to a gsm base station system. For simplicity, only one mobile switching center is shown in Figure 4. In fact, it includes a GSM (2G or 2G) operation. Page 9 This paper size is applicable to the Chinese National Standard (CNS) A4 specification (210 × 297 mm) (Please read the precautions on the back before filling this page}

564619 A7 B7 五、發明説明() 交換中心MSC及一 UMTS(3G或第三代)行動交換中心, 其可以實體為一個或兩個分離之MS C。於這兩行動交換中 心(若它們為兩分離之實體)間之互動以實際本發明看來並 不是必要的,因此,其將不再說明。 首先’一連接存在於使用者終端及無線接取網路間, 該無線網路於此特別例子中為UTRAN。基於例如相鄰蜂 巢負載資訊,來自於該使用者終端之量測,及於附近地理 區域中之GSM蜂巢的存在及使用者終端能力(也支援GSm 模式)之存在的各種參數,無線接取網路可以啟始一系統 間交接至基地台次系統BSS。第一,UTRAN要求使用者 終端藉由送出一含系統間指定參數之量測控制信息4〇〇,564619 A7 B7 V. Description of the invention () Switching center MSC and a UMTS (3G or third generation) mobile switching center, which can be one or two separate MS C entities. The interaction between these two action exchange centers (if they are two separate entities) does not seem to be necessary for the actual invention, and therefore, it will not be described further. First of all, a connection exists between a user terminal and a wireless access network, which in this particular example is UTRAN. The wireless access network is based on various parameters such as the load information of the adjacent honeycomb, measurement from the user terminal, and the existence of the GSM honeycomb and the user terminal capability (also supports GSm mode) in the nearby geographic area. The road can initiate a handover between systems to the base station secondary system BSS. First, UTRAN requires the user terminal to send a measurement control message containing specified parameters between the systems 400.

而開始於GSM載波上之系統間量測。當被送至一量測報 告之規則(於量測控制信息中所述者)被實施時,使用者終 端送出一量測報告401。系統間交接決定然後完成於 UTRAN。於該決定後,一位於UTRAN中之月艮務無線網路 控制器SRNC經由lu送出一再定位要求402給行動交換中 心(3G MSC)。一旦接收後,該行動交換中心(2G MSC)送 出一交接要求信息403給目標基地台次系統之信息包含有 例如用以連接之加密演繹法及加密鑰的資訊以及例如指 示哪些演繹法係為使用者終端所支援的Ms等級資訊。因 此,有可能行動交換中心MSC選擇加密演繹法並指示只 有該所選定演繹法至基地台次系統B s S,或者有可能該行 動父換中心M S C送出一列可能加密演繹法至該基地台次 系統BSS ’其然後作出最終選擇。MS等級資訊係於UMTS 第10頁 本紙張尺度適用中國國家標準(CNS)A4規格(210x297公釐) (請先閲讀背面之注意事項再填寫本頁) 訂· 線- 經濟部智慧財產局員工消費合作社印製 564619 A7 B7 五、發明説明() 連接開始時,為使用者終端所送至行動交換中心MSC。有 可能該MS等級資訊係於UMTS連接開始時,由使用者終 端所送至UMTS無線接取網路(UTRAN)。當來自UMTS至 GSM之系統間交接被觸動時,MS等級資訊係由UTRAN 送至MSC。當一 GSM基地台控制器接收該信息時,其由 指定GS Μ蜂巢作成保留並反應以送回一交接要求a CK信 息404,以表示於基地台次系統BSS可以支撐之要求交接 以及使用者終端應被指向之無線頻道。交接要求ACK404 同時指出已經被接受之要求交接演繹法,或者,若交接要 求403包含幾項演繹法,則指出哪一交接演繹法已經被選 擇。若基地台次系統B S S並未能支援任一指定加密演繹 法,則其送回交接故障信息(而不是404),及行動交換中 心MSC指出交接至UTRAN之失敗。於階段405,行動交 換中心(3G MSC)對於階段402由位於UTRAN中之服務 無線網路控制器所送出之信息,反應以在lu界面上之再定 位命令信息。該再定位命令承載於一例如有關GSM頻道 之資訊與加密模式資訊之資料部中。UTRAN命令使用者 終端以藉由送出一系統間交接命令406信息,而執行交 接,該406信息包含用於目標gsM之頻道資訊。另外, 其他資訊也可以包含,例如GSM加密模式設定資訊,其 才曰出至少予以用於G S Μ連接中之加密演繹法。在切換至 指定GSM頻道後,行動台一般送出四次之交接接取信息 407於在主DCCH上之四個後續層1中。這些信息係被以 GSM接取突發資料框中,這些資料框並未被加密。於部份 第11頁 本紙張尺度適用中國國家標準(CNS)A4規格(210x297公爱) (請先閲讀背面之注意事項再填寫本頁) -訂 線 經濟部智慧財產局員工消費合作社印製 564619 A7 B7 五、發明説明() 狀態中,有可能不必送出這些交接接取信息,如果如此, 則指定於系統間交接命令406中。該終端可以接收一實體 資訊408信息作為對交接接取信息的反應。實體資訊信息 只含有GSM時序進行資訊。一實體資訊信息的接收造成 終端停止送出接取突發資料框。若使用交接接取信息的 話,則其觸發於基地台系統中之GSM基地台控制器以一 交接檢出信息409通知狀況給行動交換中心(2G)。 在較低層連接成功建立後,行動台送回一交接完成 410信息給在主DCCH上之GSM基地台次系統。當接收交 接完成信息4 1 0時,於此例子中,網路釋放UTRAN頻道 之舊頻道。於第4圖中,來自此釋放程序之三個信息係被 顯示出,但實際上需要於網路元件間有很多其他未為第4 圖所示出之信息。這三個信息係首先由GSM基地台次系 統之交接完成彳§息41 1至行動交換中心,然後,一 ιυ釋 放命令412經由lu界面至UTRAN或更正確地說至服務無 線網路控制器。第三信息為一 IU釋放完成信息4丨3。 於系統間交接後所使用之加密鑰係被以一在交接 前,來自UTRAN所用之加密鑰之轉換功能加以導出。此 轉換功能存在於行動台及行動交換中心,因此,在無線界 面上並不需要額外之程序。如上所述,予以於系統間交接 後所使用之GSM加密演繹法係為MSC或為BSS所選擇並 被通知行動台(於信息405及406)。GSM加密演繹法能力 (包含於GSM MS等級資訊元件中)係於現行對utran之 透通規格中。然而,GSM MS等級資訊元件RRC連接建立 第12頁 本紙張尺度適用中國國家標準(CNS)A4規格(210X297公釐) "' ------ (請先閲讀背面之注意事項再填寫本頁) 訂· 線 經濟部智慧財產局員工消費合作社印製 564619 A7 B7 五、發明説明() 程序中被由行動台送至UTRAN,這隨後予以於系統間交 接至GSM時被送至核心網路。 第5圖為一發信圖,顯示用於3GPP UTRAN中之基本 連接設定及保全模式設定程序。第5圖一方面只顯示於一 行動台及一在無線接取網路中之服務無線網路控制器間 之最重要發信,另一方面,顯示於服務無線網路控制器及 一行動交換中心或一服務GPRS支援節點間之發信。 於行動台及服務無線網路控制器間之無線資源控制 (RRC)連接之建立係經由Uu界面500加以執行。於RRC 連接建立時,行動台可以傳送例如加密及真確性保護演繹 法所需之使用者設備保全能力及開始值之資訊。使用者設 備保全能力包含有關所支援(UMTS)加密演繹法及(UMTS) 真確性演繹法之資訊。所有上述之值均被儲存,以於後續 階段501之服務無線網路控制器中。同時,GSM等級資訊 (MS等級2及MS等級3)係於RRC連接建立時,被由行動 台傳送至UTRAN,及其可以被儲存,隨後用於服務無線 網路控制器中。The inter-system measurement on the GSM carrier is started. When the rules sent to a measurement report (described in the measurement control information) are implemented, the user terminal sends a measurement report 401. The inter-system handover decision is then completed at UTRAN. After this decision, a wireless network controller SRNC located in UTRAN sends a relocation request 402 to the mobile switching center (3G MSC) via lu. Once received, the mobile switching center (2G MSC) sends a handover request message 403 to the target base station system. The information contains information such as the encryption deduction method and encryption key used to connect, and for example, which deduction method is used. Ms level information supported by the user terminal. Therefore, it is possible that the mobile switching center MSC chooses the encrypted deduction method and instructs only the selected deduction method to the base station system B s S, or it is possible that the mobile parent exchange center MSC sends a list of possible encrypted deduction methods to the base station system. BSS 'It then makes the final choice. MS grade information is on page 10 of UMTS. This paper size is applicable to Chinese National Standard (CNS) A4 specification (210x297 mm) (Please read the precautions on the back before filling this page.) Printed by the cooperative 564619 A7 B7 V. Description of the invention () When the connection starts, it is sent to the mobile switching center MSC by the user terminal. It is possible that the MS-level information is sent by the user terminal to the UMTS wireless access network (UTRAN) when the UMTS connection starts. When the inter-system handover from UMTS to GSM is triggered, MS level information is sent from UTRAN to MSC. When a GSM base station controller receives this information, it is reserved and responded by the designated GS MU honeycomb to send back a handover request a CK information 404, which indicates that the base station secondary system BSS can support the request handover and the user terminal. The wireless channel that should be pointed to. The transfer request ACK404 also indicates that a transfer deduction method has been accepted, or, if the transfer request 403 contains several deduction methods, it indicates which transfer deduction method has been selected. If the base station system B S S does not support any of the specified encryption deduction methods, it returns handover failure information (instead of 404), and the mobile switching center MSC indicates that the handover to UTRAN has failed. In phase 405, the mobile switching center (3G MSC) responds to the information sent by the serving radio network controller located in UTRAN in phase 402 with the relocation command information on the lu interface. The relocation command is carried in a data section such as information about the GSM channel and information about the encryption mode. The UTRAN commands the user terminal to perform handover by sending an inter-system handover command 406 information, which contains the channel information for the target gsM. In addition, other information can also be included, such as the GSM encryption mode setting information, which can be used as an encryption deduction method for at least the GSM connection. After switching to the designated GSM channel, the mobile station generally sends four times of handover information 407 in the four subsequent layers 1 on the main DCCH. These messages are accessed by the GSM burst data frame, which are not encrypted. On page 11 of this part, the paper size applies the Chinese National Standard (CNS) A4 specification (210x297 public love) (Please read the notes on the back before filling out this page)-Printed by the Intellectual Property Bureau of the Ministry of Economic Affairs, Consumer Consumption Cooperative, printed 564619 A7 B7 5. In the state of invention (), it may not be necessary to send these transfer information. If so, it is specified in the inter-system transfer command 406. The terminal can receive an entity information 408 message as a response to the handover information. Entity information contains only GSM timing information. The reception of an entity information message causes the terminal to stop sending out the burst data frame. If handover information is used, it triggers the GSM base station controller in the base station system to notify the mobile switching center (2G) with a handover detection message 409. After the lower layer connection is successfully established, the mobile station sends back a handover completed 410 message to the GSM base station secondary system on the primary DCCH. When receiving the handover completion message 4 10, in this example, the network releases the old channel of the UTRAN channel. In Figure 4, the three messages from this release procedure are shown, but in reality many other messages are needed between the network components that are not shown in Figure 4. These three messages are first transferred by the GSM base station system to the mobile switching center, and then a release command 412 is sent to the UTRAN or more accurately to the serving wireless network controller via the lu interface. The third message is an IU release completion message 4 丨 3. The encryption key used after the handover between systems is derived with a conversion function of the encryption key used by UTRAN before the handover. This conversion function exists in mobile stations and mobile switching centers, so no additional procedures are required on the wireless interface. As mentioned above, the GSM encryption deduction method used after handover between systems is selected by the MSC or BSS and notified to the mobile station (in messages 405 and 406). The GSM encryption deduction capability (included in the GSM MS-level information element) is included in the current transparent specifications for utran. However, the GSM MS-level information element RRC connection is established on page 12. This paper size is applicable to the Chinese National Standard (CNS) A4 specification (210X297 mm) " '------ (Please read the precautions on the back before filling in this Page) Printed by the Consumer Property Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs 564619 A7 B7 V. Description of the invention () The program was sent from the mobile station to UTRAN, which was then sent to the core network when the system was handed over to GSM . Figure 5 is a signaling diagram showing the basic connection setting and security mode setting procedures used in 3GPP UTRAN. Figure 5 on the one hand shows only the most important transmissions between a mobile station and a serving wireless network controller in a wireless access network, and on the other hand shows the serving wireless network controller and a mobile exchange. Signaling between the center or a serving GPRS support node. The establishment of a radio resource control (RRC) connection between the mobile station and the serving radio network controller is performed via the Uu interface 500. When the RRC connection is established, the mobile station can transmit information such as the user equipment security capabilities and starting values required for encryption and authenticity protection deduction. User equipment security capabilities include information on supported (UMTS) cryptographic deduction methods and (UMTS) authentic deduction methods. All the above values are stored in the serving wireless network controller in the subsequent stage 501. Meanwhile, GSM class information (MS class 2 and MS class 3) is transmitted by the mobile station to UTRAN when the RRC connection is established, and it can be stored and then used to serve the radio network controller.

再者,行動台經由服務無線網路控制器,經過lu界 面送出一啟始較高層信息502(其可以例如為CM服務要 求、位置更新要求或CM再建立要求)至行動交換中心,其 包含例如使用者身份、一鑰組識別KSI及MS等級指示, 例如當系統間交接至GSM被啟始時,所支援的GSM加密 演繹法。網路啟始驗證程序,這也造成新保全鑰503之產 生。再者,網路決定UMTS真確性演繹法UIA及UMTS 第13頁 本紙張尺度適用中國國家標準(CNS)A4規格(210X 297公釐) (請先閲讀背面之注意事項再填寫本頁) 訂· 線丨滅 經濟部智慧財產局員工消費合作社印製 564619 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明説明() 加密演繹法UEA之組,用於此連接之UIA及UEA可以由 該處選擇504。然後,於階段505,行動交換中心送出一 保全模式命令信息給服務無線網路控制器,其中,它通知 被使用之加密鑰CK,真確性鑰ικ,及可允許之UIA及 UEA 組。 基於在階段50 1所儲存之使用者設備保全能力及於階 段505中由行動交換中心所接收之可能uia及UEA的名 單’服務無線網路控制器選擇於連接時所予以使用之演繹 法。它同時也產生一隨機值更新予以作為真確性演繹法 (第2圖)及加密演繹法之輸入參數。它同時也開始解密及 真確性保護506。Furthermore, the mobile station sends an initial higher-level information 502 (which may be, for example, a CM service request, a location update request, or a CM re-establishment request) to the mobile switching center via the service wireless network controller through the lu interface, which includes, for example, User identity, a key group identification KSI and MS level indication, such as the supported GSM encryption deduction method when GSM is handed over between systems. The network initiated the verification process, which also resulted in the creation of a new security key 503. In addition, the Internet determines the UMTS authenticity deduction UIA and UMTS page 13. This paper size applies the Chinese National Standard (CNS) A4 specification (210X 297 mm) (Please read the precautions on the back before filling out this page) Order · Printed by the Consumers ’Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs and printed by 564619 Printed by the Consumers’ Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs and printed by A7 B7 V. Description of the Invention Choose 504. Then, at stage 505, the mobile switching center sends a security mode command message to the serving radio network controller, where it notifies the used encryption key CK, the authenticity key ικ, and the allowed UIA and UEA groups. Based on the user equipment security capabilities stored in phase 501 and the possible uia and UEA lists received by the mobile switching center in phase 505, the serving wireless network controller chooses a deductive method to use when connecting. It also generates a random value update as an input parameter to the authentic deduction method (Figure 2) and the cryptographic deduction method. It also began decryption and authenticity protection 506.

第一真確性保護信息保全模式命令507係由服務無線 網路控制經由無線界面被傳送至行動台。該信息包含選定 UIA及UEA與予以被使用之UE更新參數。另外,保全 模式命令包含相同UE保全能力,其係於rrc連接建立 5 00時,由使用者設備接收。播放此資訊回到UE的原因 疋給予使用者檢查網路是否正確接收此資訊的可能性。此 機制是必要的’因為這些於RRC連接建立500時所送出 之#息並未加役也未作真確性保護。一用於真碟性保護之 信息驗證碼M A C -1係附接到保全模式命令信息5 〇 7。 於階段508中,行動台比較是否所接收之UE 夂月匕 力與於RRC連接建立程序500中送出的相同。若兩UE保 全能力相符’則行動台可以相信該網路已正確地接收該保 全能力。否則,UE放開RRC連接並進入一閒置狀熊。 (請先閲讀背面之注意事项再填寫本頁}The first authenticity protection information preservation mode command 507 is transmitted to the mobile station via a wireless interface controlled by the serving wireless network. This information contains the selected UIA and UEA and the UE update parameters to be used. In addition, the security mode command includes the same UE security capability, which is received by the user equipment when the rrc connection is established at 5 00. Reasons for playing this information back to UE 疋 Give the user the possibility to check if the network receives this information correctly. This mechanism is necessary, because these #interests sent out when the RRC connection is established 500 are not promoted nor are they authentically protected. A message verification code M A C -1 for authenticity protection is attached to the security mode command message 507. In phase 508, the mobile station compares whether the received UE 夂 moon force is the same as that sent in the RRC connection establishment procedure 500. If the security capabilities of the two UEs match, the mobile station can trust that the network has correctly received the security capability. Otherwise, the UE releases the RRC connection and enters an idle bear. (Please read the notes on the back before filling this page}

第14頁Page 14

564619 A7 B7 經濟部智慧財產局員工消費合作社印製 五、發明説明() 若比較成功,則行動台反應於保全模式完成信息 509。這也是真破性保護信息;因此,於送出此信息前, 行動台產生用於該信息之MAC-I。 當於階段5 1 0服務無線網路控制器接收其所驗證之信 息時,首先,藉由計算期待信息驗證碼XMAC-I,然後, 比較計算出之XMAC-I與接收之MAC-I。若兩值相符,則 服務無線網路控制器送出一保全模式完成信息5 1 1給行動 交換中心,其例如包含選定UIA及UEA之資訊。 於UTRAN無線界面中,真確性保護係為使用者終端 及無線網路控制器間之無線求助控制協定的函數。因為所 有較高層發信均被承載為於特定無線求助控制信息(例如 啟始直接傳送、上鏈直接傳送、下鏈直接傳送)中之資料 部,所以較高層發信係為無線資源控制協定層所作真確性 保護。問題是在第一較高層信息送出前,並未執行驗證, 該第一層信息係被承載於啟始直接傳送中。這造成最高 層,即非接取階層信息502不能作真確性保護之情形。 當於RRC連接建立時(於第5圖之步驟5〇〇)中,第一 信息被送出時,並未作用真確性保護的主要問題發生。沒 有了真確性保護,會有一入侵者改變包含於步驟5〇〇中之 信息中之加密演繹法資訊成為”GSM加密演繹法不能用” 之值。於GSM中時,核心網路接收具有行動台等級 資訊元件(CM2及CM3)之此資訊,該等資訊元件係被包含 於再定位要求信息(第4圖中之信息402)。當使用者設備 執行一系統間交接時,例如由UTRAN至GSM基地台次系 第15頁 本紙張尺度適用中國國家標準(CNS)A4規格(210χ 297公爱) (請先閲讀背面之注意事項再填寫本頁)564619 A7 B7 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs. 5. Description of the invention () If it is successful, the mobile station responds to the security mode completion information 509. This is also really destructive protection information; therefore, before sending this information, the mobile station generates a MAC-I for that information. When the serving wireless network controller receives the verified information in stage 5 10, first, it calculates the expected information verification code XMAC-I, and then compares the calculated XMAC-I with the received MAC-I. If the two values match, the serving radio network controller sends a security mode completion message 5 1 1 to the mobile switching center, which contains, for example, information of the selected UIA and UEA. In the UTRAN radio interface, authenticity protection is a function of the radio help control protocol between the user terminal and the radio network controller. Because all higher layer transmissions are carried as the data part in specific wireless assistance control information (such as initial direct transmission, direct transmission on the chain, and direct transmission on the downlink), the higher layer transmission is the radio resource control protocol layer Authenticity made. The problem is that before the first higher layer information is sent, no verification is performed, and the first layer information is carried in the initial direct transmission. This results in the highest level, that is, the situation where the non-access hierarchy information 502 cannot be protected for authenticity. When the RRC connection is established (in step 500 of Fig. 5), the first problem is that when the first information is sent out, the authenticity protection is not performed. Without authenticity protection, an intruder will change the encryption deduction information contained in the message in step 500 to the value of "GSM encryption deduction method cannot be used". In GSM, the core network receives this information with mobile station-level information components (CM2 and CM3), which are included in the relocation request information (information 402 in Figure 4). When the user equipment performs an inter-system handover, for example, from UTRAN to GSM base station, page 15 This paper standard is applicable to China National Standard (CNS) A4 (210x297). (Please read the precautions on the back before (Fill in this page)

564619 A7 B7 五、發明説明() 統BSS(第4圖)時,行動交換中心認知該UE並不支援任 何GSM加密演繹法並且必須不加密地設定於(JSMBSS中 之連接。現在’即很容易使入侵者開始竊聽該呼叫。 發明目的及椒诚i 本發明之一目的係想出一行動電信系統,其揭露了一 假冒入侵者想要去除有關加密演繹法之資訊的意圖,當一 多模行動台送出一未保護發信信息至該行動電信系統,該 發信信息包含此於無線界面之資訊。依據現行規格,此發 心"is息為RRC連接設定完成。 該系統包含至少兩無線接取網路,提供行動台以接取 至至少一核心網路、一多模行動台及至少一核心網路。於 與第一無線接取網路設立連接時,多模行動台送出至少一 未保護發信信息,其包含有關為第二無線接取網路中之多 模行動台所支援的加密演繹法的資訊。當一交接至第二無 線接取網路被觸發時(第4圖中之信息402),核心網路經 由第一無線接取網路接收有關加密演繹法之資訊。第一無 線接取網路具有發明特徵。即,於由核心網路接收命令信 息時,以指令多模行動台以加密第一無線接取網路時,第 一無線接取網路構成一真確性保護命令信息,該信息包含 有關為第二無線接取網路中、之多模行動台所接收之加密 演繹法之資訊。 所保護命令信息包含一資料部及一信息驗證碼。該有 關於第二無線接取網路中之支援演繹法之資訊係位於該 第16頁 本紙張尺度適用中酬家標準(CNS)A4規格(21GX 297公董) (請先閲讀背面之注意事項再塡寫本頁) 訂· 經濟部智慧財產局員工消費合作社印製 564619 五 、發明說明() 資料部中或者該資訊係用以作為當計算信息驗證碼時之 一參數。 於兩情形中,該多模行動台係能由所接收之保護信息 中結論出是否内藏於信息中之資訊相符於為前一發信信 息中之多模行動台所送出之資訊。若所送之資訊與為多模 行動台所接收之資訊彼此不同,則似乎一假冒入侵者已經 改變加密資訊。則,該多模行動台啟始該連接之放開。 本發明將參考以下附圖加以詳細說明。 ........f (請先閲讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 單說明: 第1圖為連接至相同核心網路之GSM及UMTS無線接取 網路的簡化方塊圖; 第2圖為一信息驗證碼的計算; 第3圖為一信息的内容; 第4圖為由UMTS網路交接至GSM網路之系統間交接發 信圖; 圖為一發信圖,其顯示用於3GPP UTRAN中之基本連 接設定及保全模式設定程序; 圖為依據本發明之實施方法的第一例流程圖 圖為依據本發明之實施方法的第二例流程圖 圖為依據本發明之實施方法的第三例流程圖 第9圖為依據本發明之實施方法的第四例流程圖 第1 〇圖為依據本發明之實施方法的第五例圖; 第11圖為依據本發明之實施方法的第六例圖; 第 第 第 第 第17頁 本紙張尺度適用中國國家標準(CNS)A4規格(210X297公釐) 訂 線 564619 A7 B7 五、發明説明() 圖號對照說明: 100 使用者終端 101 無線接取網路 102 無線網路次系統 103 無線網路控制器 104 核心網路 105 基地次系統 106 基地台控制器 107 基地收發台 發明詳細說明: 以下所說明的方法的想法係增加於電信網路中之保 全’特別是屬於經由無線界面之發信的保全。 應注意的是,所有名詞”終端”、”使用者終端”、,,行動 台"及”使用者設備”均表示相同設備。564619 A7 B7 V. Description of the invention () When the system is under the BSS (Figure 4), the mobile switching center recognizes that the UE does not support any GSM encryption deduction method and must be set in (JSMBSS connection without encryption. Now 'that is easy Let the intruder start eavesdropping on the call. Purpose of the Invention and Jiao Chengi One of the objects of the present invention is to come up with a mobile telecommunications system that reveals the intention of a fake intruder to remove information about cryptographic deduction, and to be a multimode The mobile station sends an unprotected sending message to the mobile telecommunications system. The sending message contains the information on the wireless interface. According to the current specifications, this sending message is set for the RRC connection. The system contains at least two wireless Access network, providing mobile stations to access at least one core network, a multi-mode mobile station, and at least one core network. When establishing a connection with the first wireless access network, the multi-mode mobile station sends at least one Unprotected sending information, which contains information about the encryption deduction method supported by the multi-mode mobile station in the second wireless access network. When a handover to the second wireless access network is At the time of transmission (information 402 in FIG. 4), the core network receives information about the encryption deduction method through the first wireless access network. The first wireless access network has an inventive feature. That is, it is received by the core network. When commanding information, when the multi-mode mobile station is instructed to encrypt the first wireless access network, the first wireless access network constitutes authenticity protection command information, and the information includes information for the second wireless access network, The information of the encrypted deduction method received by the multi-mode mobile station. The protected command information includes a data section and an information verification code. The information about the deduction method support in the second wireless access network is located on page 16 This paper size applies the CNS A4 specification (21GX 297 public directors) (Please read the precautions on the back before writing this page) Order · Printed by the Intellectual Property Bureau of the Ministry of Economic Affairs and Consumer Cooperatives 564619 V. Description of the invention () The information department or the information is used as a parameter when calculating the information verification code. In two cases, the multi-mode mobile station can determine whether it is embedded in the protection information received. The information in the message corresponds to the information sent for the multi-mode mobile station in the previous message. If the information sent and the information received for the multi-mode mobile station are different from each other, it seems that a fake intruder has changed the encrypted information. Then, the multi-mode mobile station initiates the release of the connection. The present invention will be described in detail with reference to the following drawings ..... f (Please read the precautions on the back before filling this page) Ministry of Economic Affairs Intellectual Property Bureau employee consumer cooperative printed instructions: Figure 1 is a simplified block diagram of GSM and UMTS wireless access networks connected to the same core network; Figure 2 is the calculation of an information verification code; Figure 3 is The content of a message; Figure 4 is a diagram of the handover and transmission between the systems handed over from the UMTS network to the GSM network; Figure 4 is a signalling diagram showing the basic connection setting and security mode setting procedures used in 3GPP UTRAN; The figure is a first example flowchart of an implementation method according to the present invention. The figure is a second example flowchart of an implementation method according to the present invention. The figure is a third example flowchart of an implementation method according to the present invention. Implementer The flow chart of the fourth example of FIG. 10 is a fifth example of the implementation method according to the present invention; FIG. 11 is the sixth example of the implementation method according to the present invention; China National Standard (CNS) A4 specification (210X297 mm) Order line 564619 A7 B7 V. Description of invention () Drawing number comparison description: 100 user terminal 101 wireless access network 102 wireless network sub-system 103 wireless network control Device 104 core network 105 base station system 106 base station controller 107 base transceiver station invention detailed description: The idea of the method described below is added to the security of the telecommunication network ', especially the security of the transmission via the wireless interface . It should be noted that all the terms "terminal", "user terminal", "mobile station", and "user equipment" refer to the same equipment.

多數送於使用者終端及網路間之發信信息必須例如 被真確性保護。此等信息例如為RRC、MM、CC、GMM 及SM信息◎真確性保護係被應用至rrc層,於使用者終 端及網路中。 真確性保護通常係執行於所有RRC(無線求助控制)信 息,但有部份例外。這些例外可以是: 1 ·指定給一個以上接收之信息, 2·於用於連接之真確性鑰建立前,信息即被送出,及 3 ·經常重覆信息,包含資訊但不必真確性保護。 由於保全,真確性保護上述例外2中之信息或至少於 其中之重要資訊元件係特別重要的。如前述,沒有真確性 保”蒦’會一起有入侵者改變包含於信息5〇〇中之加密演繹 資訊至”加密演繹法不能用"之值的危險。 第 18*1· 本紙張尺度適用中國國家標準(CNS)A4規格(21〇χ^^) (請先閲讀背面之注意事項再填寫本頁) 、τ 線一 經濟部智慧財產局員工消費合作社印製 564619 A7 B7 五、發明説明() 有好幾種不同實施&,以増加安全但只有部份實施法 被顯不出來。 本發明將參考第6至9圖之四個例子加以詳細說明。 於開始時,一連接係建立於一使用者終端及一 umts 網路間。隨後,一交接係由UMTS網路進行至一 gsm網 路。 第6圖顯示依據本發明之方法的實施流程圖。其假設 發仏相當於不於第5圖之狀態,直到核心網路接收信息 503為止。 另外’其假設使用者終端為一雙模式(UMTS/GSM)終 端,其在UMTS模式時送出第一非接取階層信息於無線資 源、控制中之無線界面上一啟始直接傳送信息(相當於第5 圖中之信息502)。其進一步假設rrc連接建立(500)已經 被執行’因此,使用者終端係於閒置狀態,及當一要求到 達設定於核心網路的連接時沒有現行PRC連接。 核心網路由使用者終端,於此即行動台接收啟始信息 5 02中之GSM等級資訊。此資訊指示於GSM模式中之一 般行動台特徵,其包含當於GSM模式中,該終端中有哪 些GSM加密演繹法被支援的有關資訊。名詞”等級”必須 被了解為GSM專用,另一名詞可以用於其他系統中。於 核心網路中之行動交換中心加入為該行動台所支援的加 密演繹法之資訊至該保全模式命令信息6〇〇中。該信息然 後經由lu界面被送至服務無線網路控制器。於編碼前 60 1 ’該服務無線網路控制器加入此有關為行動台所支援 第19頁 本紙張尺度適用中國國家標準(CNS)A4規格(210X297公釐) (請先閱讀背面之注意事項再填寫本頁) -訂- 線 經濟部智慧財產局員工消費合作社印製 564619 A7Most outgoing messages sent between the user terminal and the network must, for example, be protected by authenticity. Such information is, for example, RRC, MM, CC, GMM, and SM information. ◎ Authenticity protection is applied to the rrc layer, in the user terminal and the network. Authenticity protection is usually performed on all RRC (Wireless Help Control) information, with some exceptions. These exceptions can be: 1 · Assigned to more than one received message, 2 · The message is sent before the authenticity key for the connection is established, and 3 · The message is often repeated, including the information but not necessarily protected by authenticity. Due to security, the authenticity of the information in Exception 2 above or at least the important information components therein is particularly important. As mentioned above, there is no real guarantee that "蒦 '" together will have the risk that an intruder will change the encrypted deduction information contained in the message 500 to "the encrypted deduction method cannot use the value of" ". Article 18 * 1 · This paper size applies to Chinese National Standard (CNS) A4 specification (21〇χ ^^) (Please read the precautions on the back before filling out this page), τ Line 1 Printed by the Consumers ’Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs System 564619 A7 B7 5. Description of the invention () There are several different implementations & to increase safety but only some implementation methods are not shown. The present invention will be described in detail with reference to the four examples of FIGS. 6 to 9. At the beginning, a connection was established between a user terminal and a umts network. Subsequently, a handover is performed from the UMTS network to a gsm network. Figure 6 shows a flow chart of the implementation of the method according to the invention. It is assumed that the hairpin is equivalent to the state in FIG. 5 until the core network receives the information 503. In addition, it assumes that the user terminal is a dual-mode (UMTS / GSM) terminal. In the UMTS mode, it sends the first non-access hierarchy information to the wireless resource and the wireless interface under control. Information 502 in Figure 5). It further assumes that the rrc connection establishment (500) has been performed. Therefore, the user terminal is in an idle state, and there is no current PRC connection when a request reaches a connection set in the core network. The core network is routed to the user terminal, where the mobile station receives the GSM level information in the start message 5 02. This information indicates a general mobile station feature in the GSM mode, and includes information about which GSM encryption deduction methods are supported in the terminal when in the GSM mode. The term "level" must be understood to be GSM specific, and another term can be used in other systems. Add the information of the encryption deduction method supported by the mobile station to the mobile switching center in the core network to the security mode command information 600. This information is then sent to the serving wireless network controller via the lu interface. Before the code 60 1 'The service wireless network controller joins this. It is supported by the mobile station. Page 19 This paper size applies the Chinese National Standard (CNS) A4 specification (210X297 mm) (Please read the precautions on the back before filling in (This page)-Ordered-Printed by the Consumers' Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs 564619 A7

五、發明説明() 的加密演繹法資訊至一保全命令信息,該資訊包含有關所 支援加密演繹法之資訊。一 32位元信息驗證碼MAC — I係 被計算並被加入至該編碼信息中。 另外,所編碼信息MAC-I也基於其他幾個參數。以 下輸入參數係為計算真確性演繹法所需:編碼信息、4位 兀序號SN、28位元超訊框數HFN、32位元隨機數更新、 1位元方向指標DIR、及最重要參數]28位元真確性鑰 ικ。短序號SN及長序號HFN 一起構成該真確性序號 COUNT-I 〇 當信息驗證碼使用真確性演繹法及上述參數加以計 算時,保證實際發送者外均不能加入正確ΜΑ(%Ι碼至發信 信息中。例如,MAC-I防止相同信息被重覆送出。然而, 若為了其他理由,該相同發信信息予以被重覆送出,則此 MAC-I與於先前送出發信信息中之ΜΑ(%Ι不同。此目的 係儘可能地強烈反抗竊聽及其他假冒使用者。因此,為了 此特疋發明,應注意到有關為行動台所支援的加密演繹法 的GSM資訊係被加入至保全模式命令信息5〇7中作真確 性保護,使得行動台可以確定此資訊並未為一入侵者所改 變〇 經濟部智慧財產局員工消費合作社印製 (請先閲讀背面之注意事項再填寫本頁) 再者’於階段602 ’當行動台接收保全模式命令信息 時’接收於此信息中之為行動台所支援的加密演繹法的資 訊係被與由行動台所早先進出至網路之啟始信息5〇2之加 密演繹法之資訊加以比較。因此,依據先前技藝,所接收 之UE(UMTS)保全能力參數係與被送出之ue保全能力參 第20頁 本紙張尺度適用中國國家標準(CNS)A4規格(21〇χ 297公爱) 經濟部智慧財產局員工消費合作社印製 564619 A7 _____ B7 五、發明説明() 數相比。若兩比較均成功,則行動台接收該連接604,若 否,則連接被釋放開603。 第7圖顯示此方法之第二實施法的流程圖。 於階段700中,行動台送出一啟始直接傳送信息(相 當於第5圖之信息502)經由無線接取網路中之服務無線網 路控制器給核心網路。該信息構成為兩主要部份:一 RRC 部及一非接取階層部,其係為RRC所視為一透通資料部》 再者,該資料部包含以下諸信息之一:CM服務要求、位 置更新要求、CM再建立要求或傳呼反應。 當服務無線網路控制器接收信息時,其儲存信息70 1 並將該資料部或NAS部經由lu界傳送至核心網路702。 核心網路反應以一般保全模式命令信息7 〇 3。如同於前一 例子,信息驗證碼MAC-I係被計算以保護信息被傳送至行 動台。該碼然後被加入至該信息。信息驗證碼取決於其所 保護之信息中之指定方式。於此,計算係使用以下切斷位 元串作為信息參數加以執行。 信息==保全模式命令+RRC連接要求+rrc啟始直接傳送 隨後,有真確性保護之保全模式命令信息被送入行動 台 704。 應注意的是,於此解答中,不必要包含UE(UMTS)保 全能力參數進入上述信息中。'然而,當MAC-I碼被計算 時,保全相關參數,即UE保全能力參數及GSM等級參數 均為輸入參數。 接收端,即行動台具有計算信息驗證碼之相同演繹 本紙張尺度適用中國國家標準(CNS)A4規格(210X 297公釐) (請先閲讀背面之注意事項再填寫本頁)Fifth, the invention's description of the encrypted deduction method information to a security order information, the information contains information about the supported encrypted deduction method. A 32-bit message verification code MAC-I is calculated and added to the coded message. In addition, the encoded information MAC-I is also based on several other parameters. The following input parameters are required to calculate the authentic deduction method: encoding information, 4-bit serial number SN, 28-bit super frame number HFN, 32-bit random number update, 1-bit direction indicator DIR, and the most important parameters] 28-bit authenticity key ικ. The short sequence number SN and the long sequence number HFN together constitute the authenticity sequence number COUNT-I 〇 When the information verification code is calculated using the authenticity deduction method and the above parameters, it is guaranteed that the correct sender cannot be added outside the actual sender. In the message. For example, MAC-I prevents the same message from being repeatedly sent. However, if the same sending message is repeatedly sent for other reasons, this MAC-I is the same as the MA (I) in the previous sending message. % I is different. This purpose is to fight against eavesdropping and other impersonation users as strongly as possible. Therefore, for this special invention, it should be noted that GSM information about the encryption deduction method supported by the mobile station is added to the security mode command information The authenticity protection in 507 allows the mobile station to determine that this information has not been changed by an intruder. ○ Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs (please read the precautions on the back before filling this page). 'At stage 602' When the mobile station receives the security mode command information 'The information received in this message for the cryptographic deduction method supported by the mobile station is compared with the operation The information of the encryption deduction method of the start information 502 that was released to the Internet by the Taiwan Institute is compared. Therefore, according to the previous technology, the received UE (UMTS) security capability parameter is the same as the UE security capability sent on page 20. This paper size applies the Chinese National Standard (CNS) A4 specification (21〇χ 297 public love) Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 564619 A7 _____ B7 5. Comparison of the invention () If both comparisons are successful, The mobile station receives the connection 604, and if not, the connection is released 603. Figure 7 shows a flowchart of the second implementation of this method. In stage 700, the mobile station sends a direct direct message (equivalent to Information 502 in FIG. 5) is provided to the core network through a service wireless network controller in the wireless access network. The information is composed of two main parts: an RRC part and a non-access level part, which is RRC It is regarded as a transparent data department. Furthermore, the data department contains one of the following information: CM service request, location update request, CM re-establishment request or paging response. When the serving wireless network controller receives the information, it The information 70 1 is stored and the data department or the NAS department is transmitted to the core network 702 through the Lu world. The core network responds to the information in the general security mode and orders the information 7 〇. As in the previous example, the message verification code MAC-I is The calculation is transmitted to the mobile station to protect the message. This code is then added to the message. The verification code of the message depends on the specified method in the message it protects. Here, the calculation uses the following cut-off bit string as the message parameter. Information == Security Mode Command + RRC Connection Requirement + rrc Begins Direct Transmission Subsequently, the security mode command information with authenticity protection is sent to the mobile station 704. It should be noted that it is not necessary to include the UE in this answer (UMTS) security capability parameters enter the above information. 'However, when the MAC-I code is calculated, the security related parameters, that is, the UE security capability parameters and the GSM level parameters are all input parameters. The receiving end, that is, the mobile station has the same interpretation of the calculation information verification code. This paper size applies to the Chinese National Standard (CNS) A4 specification (210X 297 mm) (Please read the precautions on the back before filling this page)

564619 A7 ______B7 五、發明説明() (請先閲讀背面之注意事項再填寫本頁) 法’以驗證所接收之信息驗證碼係相同於所計算之碼 705。因此,行動台已經儲存早先送出之信息、RRC連接 要求信息(500)及RRC啟始直接傳送信息(5〇2),以計算用 於接收保全模式命令信息之XMAC-I。當所接收MAC-I值 及被計算之XMAC-I值相符時,行動台假設該網路已經接 收有關保全能力及GSM等級之正確資訊,及連接被接受 於707。否則,連接於706被放開。 該解答有一缺點,即該被編碼信息RRC連接要求及 RRC啟始直接傳送必須儲存於服務無線網路控制器及行 動台的s己憶體中’直到保全模式命令信息被送出/接收為 止。但另一方面,此解答有可能由先前技藝之保全模式命 令信息中省略UE保全能力,以於該信息中節省32位元之 空間。 第8圖顯示第三實施方法之流程圖。 此解答略微不同於第二解答,即只有方塊8〇1、804 及805係不同於第7圖中之方塊者。因此,此二方塊現在 加以詳細說明。 經濟部智慧財產局員工消費合作社印製 於階段8 0 1中,不同於儲存整個信息,該服務無線網 路控制器只儲存用於下次使用之信息的資料部。換句話 說’其只儲存以下信息之一 :CM服務要求、位置更新要 求、CM再建立要求或傳呼要求。因此,此解答相較於第 二解答節省記憶體空間。 於階ί又8 0 4中’為了保護信息,信息驗證碼μ a c -1 係使用先前儲存之資料部加以計算。信息係被形成如下: 第22頁 本紙張尺度適用中國國家標準(CNS)A4規格(21〇χ 297公董) 564619 A7 B7 五、發明説明() 化息=保全模式命令+UE保全能力+啟始直接傳送信 息之NAS信息部 八有保全模式命令信息被傳送於該Uu界面至該行動 台。这表不用於UE保全能力及GSM MS等級之保全參數 均用以計算該信息驗證碼MAC-I,但於該信息中並不需要 包含它們。然而,這並不會降低安全性。 於階段805,行動台藉由使用與階段804中所用之網 路相同之信息參數計算,即,先前儲存之啟始直接傳送信 息之UE保全能力及NAS信息部之參數,以計算XMAC-I。 第9圖顯示第四實施法之流程圖。此解答係為第一及 第三解答的組合。 於無線接取網路中之行動台及服務無線網路控制器 間作連接建立時,網路控制器接收並儲存使用者設備能力 資訊UEC於其記憶體中,供隨後使用900。於行動台送出 例如含有為行動台所支援之加密演繹法之第一非接取階 層信息作為於RRC啟始直接傳送信息中之資料部給無線 接取網路時,其隨後送出NAS信息給核心網路90 1。於階 段902及903中,於核心網路中之行動交換中心加入有關 為行動台參數所支援的加密演繹法的資訊給保全模式命 令信息,並且,經由lu界面送出信息至無線接取網路中之 服務無線網路控制器。 於階段904,服務無線網路控制器以先前所述方式計 算MAC-I碼,將信息參數加入先前所述之參數中,該信息 參數係由以下形成: 第23頁 本紙張尺度適用中國國家標準(CNS)A4規格(210X 297公釐) (請先閲讀背面之注意事項再填寫本頁) # -訂· 經濟部智慧財產局員工消費合作社印製 564619 A7 __B7 五、發明説明() (請先閱讀背面之注意事項再填寫本頁} 信息=保全模式命令+UE保全能力+GSM等級 以與前一例子相同之方式,保全參數UE保全能力及 GSM等級均用以計算信息驗證碼MAC-I,但其中並不必要 將之包含於該信息中。此解答的優點在於於行動台或無線 網路控制器中並不需要其他記憶體。 基本上,於上述解答中,核心網路為一 3 G網路元件, 因此’控制至少UMTS無線接取網路也可以控制GSM基 地台次系統。 本發明之實施及實施例已經以部份例子加以說明。然 而’可以了解的是,本發明並不限定於上述實施例的細 節,同時各種變化及修改均可以在不脫離本發明之特徵下 加以為熟習於本技藝者所完成。所述之實施例係作例示用 並不是限定用。因此,本發明只為隨附之申請專利範圍所 限定。為申請專利範圍所界定之其他實施法及等效實施法 均被包含於本發明之範圍中。 線- 經濟部智慧財產局員工消費合作社印製 例如,來源無線接取網路可以例如為UTRAN、GSM 基地台次系統、GPRS系統(一般封包無線服務)、GSM邊 緣、GSM1 8 00、或其他系統。相同地,目標無線接取系統 可以為例如UTRAN、GSM基地台次系統、GPRS(—般封 包無線服務)、GSM邊緣、GSM1800或其他系統。 再者,有關於為多模行動台所支援的GSM保全演繹564619 A7 ______B7 V. Description of the invention () (Please read the precautions on the back before filling this page) Method ’to verify that the information received is the same as the calculated code 705. Therefore, the mobile station has stored the information sent earlier, the RRC connection request message (500) and the RRC start direct transmission message (502) to calculate the XMAC-I for receiving the security mode command message. When the received MAC-I value and the calculated XMAC-I value match, the mobile station assumes that the network has received the correct information about the security capabilities and GSM level, and the connection is accepted at 707. Otherwise, the connection at 706 is released. This solution has a disadvantage, that is, the RRC connection request of the encoded information and the initial direct transmission of RRC must be stored in the memory of the serving radio controller and mobile station 'until the security mode command information is sent / received. However, on the other hand, this solution may omit the UE security capability from the security mode command information of the prior art, in order to save 32 bits of space in the information. FIG. 8 shows a flowchart of the third implementation method. This answer is slightly different from the second answer, that is, only the blocks 801, 804, and 805 are different from the blocks in Figure 7. Therefore, these two blocks are now described in detail. Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs in stage 801. Unlike storing the entire information, the service wireless network controller only stores the data department for the next use of information. In other words, it only stores one of the following information: CM service request, location update request, CM re-establishment request, or paging request. Therefore, this solution saves memory space compared to the second solution. In order to protect the information, Yu Jie 8 0 4 ’uses the previously stored data to calculate the information verification code μ a c -1. The information system is formed as follows: Page 22 This paper size applies the Chinese National Standard (CNS) A4 specification (21 × χ 297 public directors) 564619 A7 B7 V. Description of the invention () Chemical interest = security mode command + UE security capability + start The NAS information section of the NAS information section that directly transmitted the information has the security mode command information transmitted from the Uu interface to the mobile station. This table is not used for UE security capabilities and GSM MS level security parameters are used to calculate the message authentication code MAC-I, but they do not need to be included in the message. However, this does not reduce security. At stage 805, the mobile station calculates XMAC-I by using the same information parameters as the network used in stage 804, that is, the previously stored UE security capabilities and the parameters of the NAS information department that directly transmit the information. Fig. 9 shows a flowchart of the fourth embodiment. This answer is a combination of the first and third answers. When a connection is established between the mobile station and the serving wireless network controller in the wireless access network, the network controller receives and stores the user equipment capability information UEC in its memory for subsequent use 900. When the mobile station sends, for example, the first non-access hierarchy information containing the encrypted deduction method supported by the mobile station as the data part of the information directly transmitted to the wireless access network at the beginning of RRC, it then sends the NAS information to the core network. Road 90 1. In phases 902 and 903, the mobile switching center in the core network adds information about the encryption deduction method supported by the mobile station parameters to the security mode command information, and sends the information to the wireless access network via the lu interface. Service wireless network controller. At stage 904, the serving wireless network controller calculates the MAC-I code in the manner previously described, and adds information parameters to the previously described parameters. The information parameters are formed as follows: Page 23 This paper standard applies Chinese national standards (CNS) A4 specification (210X 297 mm) (Please read the notes on the back before filling out this page) # -Order · Printed by the Intellectual Property Bureau Employee Consumer Cooperative of the Ministry of Economic Affairs 564619 A7 __B7 V. Description of the invention () (please first Read the notes on the back and fill in this page again} Information = Security Mode Command + UE Security Capability + GSM Level In the same way as in the previous example, the security parameter UE security capability and GSM level are used to calculate the message verification code MAC-I. But it is not necessary to include it in the information. The advantage of this solution is that no other memory is needed in the mobile station or wireless network controller. Basically, in the above solution, the core network is a 3 G Network components, so 'controlling at least the UMTS wireless access network can also control the GSM base station system. The implementation and embodiments of the present invention have been described with some examples. However,' yes It is to be understood that the present invention is not limited to the details of the above embodiments, and various changes and modifications can be made by those skilled in the art without departing from the characteristics of the present invention. The embodiments described are for illustration and use. It is not limited. Therefore, the present invention is only limited by the scope of the accompanying patent application. Other implementation methods and equivalent implementation methods defined by the scope of the patent application are included in the scope of the present invention. Line-Intellectual Property of the Ministry of Economic Affairs Printed by the Bureau ’s consumer cooperative, for example, the source wireless access network can be, for example, UTRAN, GSM base station system, GPRS system (general packet wireless service), GSM edge, GSM 1 800, or other systems. Similarly, the target wireless The access system can be, for example, UTRAN, GSM base station system, GPRS (General Packet Radio Service), GSM edge, GSM1800, or other systems. Furthermore, there are GSM security interpretations supported by multi-mode mobile stations.

法(Α5/1、Α5/2、Α5/3等)的資訊可以被加入作為umtS,,UE 無線接取能力’’的一部份。或者,該資訊可以為分離資訊 元件或甚至UE保全能力參數的一部份。實際上,此資訊 第24頁 本紙張尺度適用中國國家標準(CNS)A4規格(210X297公爱) " *— 564619 A7 B7 五、發明説明() 必須被加入至RRC連接建立程序中(見第5圖之階段 5 0 0),及至保全模式命令信息(見第5圖之階段507)中。 如同於早先所述之其他可能實施法,並加入有關實際nRAT 間無線接取能力"(包含有關被支援的GSM保全演繹法之 資訊)資訊元件至RRC保全模式命令信息只是一替代法, 並引入部份虛耗至該發信中,因為行動台並不儘然需要此 資訊元件,只要確認網路已正確接收它即可。這三個解 答,即第五、第六及第七例實施法係以下加以說明。 於第五實施法中,一只包含GSM加密演繹法能力之 新RRC資訊元件係被界定。這需要7位元。此資訊元件 然後被加入至RRC保全模式命令信息。此解答之缺點是 編碼此新資訊元件進入該信息中,UTRANRRC協定首先必 須解碼GSM等級2及等級3資訊元件,其編碼/解碼規則 並不是UTRANRRC協定的一部份。 第1 0圖例示第六例之實施法。於UTRAN側,被接收 之GSM等級2及等級3資訊(RRC資訊元件’’RAT間UE 無線接取能力’’1001)與’’UE保全能力"1 002(包含有關支援 UTRAN保全演繹法之資訊)係被用以計算RRC保全模式命 令信息1 000之MAC-I(及XMAC-I)。這基本上係與第9圖 之解答相同,除了於RRC連接建立階段(900)時,(來自行 動台,而不是來自核心網路(902))之GSM等級資訊已經被 接收並儲存於服務無線網路控制器外。予以送至行動台之 保全模式命令並未包含nUE保全能力”,也未包含”RAT間 UE無線接取能力’’,這些資訊元件只有當計算此信息之 第25頁 本紙張尺度適用中國國家標準(CNS)A4規格(210X297公釐) (請先閱讀背面之注意事項再塡寫本頁) 訂· 線:· 經濟部智慧財產局員工消費合作社印製 564619 A7 B7 五、發明説明() 經濟部智慧財產局員工消費合作社印製 MAC-I時被使用。 第六實施法之缺點為用於MAC-I計算之額外資訊元 件(“UE保全能力”及,,RAT間UE無線接取能力")之編碼必 須明確疋義。右此為不可接受,貝卜更直接實施法係如於 第11圖(此方法之第弋實施法)所示。於此,當計算用於 RRC—保全-模式—命令信息1〇〇〇時,整個編碼rrc_連接一 設定—完成信息被使用(不同於第六實施法中只有兩資訊 元件被使用)。事實上,這表示於RRC連接建立程序中(見 第5圖之階段500),當送出RRC 一連接一設定—完成信息時, 行動台儲存一拷貝之編碼信息於其記憶體中,直到其接收 到保全—模式—命令信息並已檢查其真確性核對和為止。在 網路側(於服務無線網路控制器中之UTRAN),所接收之一 拷貝之(未解碼)RRC —連接一設定一完成信息必須保持於記 憶體中’直到用於保全—模式—命令信息之MAC-I碼已經被 計算出為止。由實施法之觀點看來,可能相當容易在信息 被送出(UE側)或於接收後在被傳送至解碼器前(UTRan 側),儲存整個已編碼信息於記憶體中。因此,用於保.全 模式—命令之MAC-I將藉由設定用於真確性演繹法之信息 輸入參數加以計算如下: 信息=保全—模式—命令+RRC一連接一設定—完成 此相較於第六實施法之'缺點為其解答需要一略多一 點之記憶體,不管是在行動台或是在網路側。G S Μ等級資 訊包含為行動台所支援的加密演繹法。 第26頁 本紙張尺度適用中國國家標準(CNS)A4規格(210Χ 297公釐) (請先閲讀背面之注意事項再填寫本頁) 訂· 線_The information of the method (Α5 / 1, A5 / 2, A5 / 3, etc.) can be added as a part of umtS, UE's wireless access capability. Alternatively, the information may be part of a separate information element or even a UE security capability parameter. In fact, page 24 of this information applies to the Chinese National Standard (CNS) A4 specification (210X297 public love) " * — 564619 A7 B7 V. Description of the invention () must be added to the RRC connection establishment procedure (see section 5 in stage 5 0), and to the security mode command information (see stage 507 in FIG. 5). As mentioned earlier, other possible implementation methods, and adding information about actual nRAT wireless access capabilities (including information about supported GSM security deduction methods) to the RRC security mode command information are just an alternative method, and Introduce some wasting to the message, because the mobile station does not necessarily need this information component, just confirm that the network has received it correctly. These three answers, namely, the fifth, sixth, and seventh examples, are described below. In the fifth implementation method, a new RRC information element containing the GSM encryption deduction capability is defined. This requires 7 bits. This information element is then added to the RRC security mode command information. The disadvantage of this solution is that to encode this new information element into the message, the UTRANRRC protocol must first decode the GSM Level 2 and Level 3 information elements. The encoding / decoding rules are not part of the UTRANRRC protocol. Fig. 10 illustrates an implementation method of the sixth example. On the UTRAN side, the received GSM Level 2 and Level 3 information (RRC information element `` UE wireless access capability between RATs '' 1001) and `` UE security capabilities '' 1 002 (including information about supporting UTRAN security deduction method) Information) is used to calculate the MAC-I (and XMAC-I) of the RRC security mode command information 1,000. This is basically the same as the solution in Figure 9, except that during the RRC connection establishment phase (900), the GSM level information (from the mobile station, not from the core network (902)) has been received and stored in the serving radio. Outside the network controller. The security mode command sent to the mobile station does not include the nUE security capability "or the" inter-RAT UE wireless access capability ". These information components are only applicable to the calculation of this information on page 25. This paper standard applies Chinese national standards (CNS) A4 specification (210X297 mm) (Please read the notes on the back before writing this page) Order: Line: · Printed by the Intellectual Property Bureau Staff Consumer Cooperatives of the Ministry of Economic Affairs 564619 A7 B7 V. Description of Invention () Ministry of Economic Affairs Used by Intellectual Property Bureau employee consumer cooperatives when printing MAC-I. The disadvantage of the sixth implementation method is that the encoding of the additional information element ("UE security capability" and, inter-RAT UE wireless access capability ") used for MAC-I calculation must be clearly defined. The right is unacceptable. Beb's more direct implementation method is shown in Figure 11 (the second implementation method of this method). Here, when the calculation is used for the RRC—security-mode—command information 1000, the entire code rrc_connection-setting-completion information is used (unlike the two information elements used in the sixth implementation method). In fact, this is indicated in the RRC connection establishment procedure (see stage 500 in Fig. 5). When sending the RRC-connection-setting-completion message, the mobile station stores a copy of the encoded information in its memory until it receives it. Until the security-mode-command information has been checked for authenticity. On the network side (for UTRAN in the serving radio network controller), a copy of the (undecoded) RRC received—connection-setting-complete information must be kept in memory 'until used for security—mode—command information The MAC-I code has been calculated so far. From the point of view of the implementation law, it may be quite easy to store the entire encoded message in memory before it is sent out (UE side) or before it is transmitted to the decoder (UTRan side). Therefore, the MAC-I used for the full mode—command will be calculated by setting the information input parameters used for authenticity deduction as follows: information = preservation—mode—command + RRC-connection-setting—complete this compared to The disadvantage of the sixth implementation method is that its solution requires a little more memory, whether it is on the mobile station or on the network side. G S M grade information includes cryptographic deduction methods supported by mobile stations. Page 26 This paper size applies Chinese National Standard (CNS) A4 specification (210 × 297 mm) (Please read the precautions on the back before filling in this page)

Claims (1)

564619 經濟部智慧財產局員工消費合作社印製 A8 B8 C8 D8 申請專利範圍 1 · 一種行動電信系統,至少包含: 多數無線接取網路,提供行動台以接取至少一核心 網路; 一多模行動台,於與第一無線接取網路設定連接 時,送出至少一未保護啟始發信信息,該信息包含有關 為第二無線接取網路中之多模行動台所支援的加密演 繹法的資訊; 一核心網路,接收有關加密演繹法之資訊; 第一無線接取網路適用以 由核心網路接收一命令信息,命令該多模行動台加 密其他通訊; 合成並送出一真確性保護命令信息給該多模行動 台’該命令信息包含有關為第二無線接取網路中之多模 行動台所支援的加密演繹法的資訊,該保護命令信息包 含含信息驗證碼之資料部,及 該多模行動台適用以結論出是否被接收於該真確性 保護命令信息♦之加密演繹法之資訊相符於為啟始發 信信息中之多模行動台所送出之資訊。 2·如申請專利範圍第1項所述之系統,其中上述之第一無 線接取網路將於命令信息中所接收之有關加密演繹法 之資訊附加至為保護命令信息之資料部中,並施加該資 料部至一計算信息驗證碼之一演繹法中。 第27頁 本紙張尺度適用中國國家標準(CNS)A4規格(210X297公釐) (請先閱讀背面之注意事項再填寫本頁)564619 Printed by the Consumer Property Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs A8 B8 C8 D8 Patent application scope 1 · A mobile telecommunications system at least: Most wireless access networks, providing mobile stations to access at least one core network; a multi-mode The mobile station sends at least one unprotected originating message when it is connected to the first wireless access network setting, and the information includes information about the encrypted deduction method supported by the multi-mode mobile station in the second wireless access network. A core network that receives information about the cryptographic deduction method; the first wireless access network is adapted to receive a command message from the core network to instruct the multi-mode mobile station to encrypt other communications; synthesize and send a authenticity Protecting the order information to the multi-mode mobile station 'The order information contains information about the encryption deduction method supported by the multi-mode mobile station in the second wireless access network, and the protection order information includes a data section including an information verification code, And the multi-mode mobile station is applicable to the information phase of the encrypted deduction method to determine whether it is received in the authenticity protection order information Fu Yu is the information sent by the multi-mode mobile station in the initial message. 2. The system described in item 1 of the scope of patent application, wherein the first wireless access network mentioned above adds the information about the encryption deduction method received in the command information to the data department for protecting the command information, and Apply the data section to a deductive method of a computational information verification code. Page 27 This paper size is applicable to China National Standard (CNS) A4 (210X297 mm) (Please read the precautions on the back before filling this page) 564619 經濟部智慧財產局員工消費合作社印製 A8 B8 C8 _·—__D8 申請專利範圍 3 ·如申請專利範圍第丨項所述之系統,其中上述之第一無 線接取網路儲存接收自多模行動台之未保護啟始發信 扣息並使用該信息以計算該信息驗證碼。 4·如申請專利範圍第丨項所述之系統,其中上述之第一無 線接取網路儲存接收自多模行動台之未保護啟始發信 信息的資料部並使用該資料部以計算該信息驗證碼。 5 ·如申請專利範圍第1項所述之系統,其中上述之第一無 線接取網路儲存於連接設定時所接收自多模行動台之 有關行動台能力之資訊,並使用該信息配合上有關於内 藏於該接收自核心網路之命令信息中之加密演繹法的 資訊’以計算該信息驗證碼。 6 ·如申請專利範圍第1或5項所述之系統,其中上述之行 動台於連接設立時,送出有關加密演繹法之資訊,該第 一無線接取網路儲存該資訊並使用該資訊以構成該保 護命令信息。 7 · —種無線接取網路,用以提供多模行動台以接取至少一 核心網路的能力, 該無線接取網路係適用以 由一多模行動台經由一無線界面接收一未保護發信 信息’該信息包含有關為另一無線接取網路中之多模行 第28頁 本紙張尺度適用中國國家標準(CNS)A4規格(210X297公釐) (請先閲讀背面之注意事項再填寫本頁) 9 1X 46 6 5 六564619 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs A8 B8 C8 _ · —__ D8 Patent Application Scope 3 · The system described in Item 丨 of the Patent Application Scope, wherein the first wireless access network storage is received from a multi-mode The unprotected originator of the mobile station sends a discount and uses this information to calculate the information verification code. 4. The system according to item 丨 in the scope of patent application, wherein the above-mentioned first wireless access network stores the data portion of the unprotected originating transmission information received from the multi-mode mobile station and uses the data portion to calculate the Message verification code. 5 · The system described in item 1 of the scope of patent application, wherein the above-mentioned first wireless access network stores the information about the capabilities of the mobile station received from the multi-mode mobile station during the connection setting, and uses the information to cooperate with The information about the encryption deduction method embedded in the command information received from the core network is used to calculate the information verification code. 6 · The system described in item 1 or 5 of the scope of patent application, in which the above mobile station sends information about the encrypted deduction method when the connection is established, the first wireless access network stores the information and uses the information to This protection order information is composed. 7 · A wireless access network for providing the capability of a multi-mode mobile station to access at least one core network, the wireless access network is adapted to receive a wireless communication network by a multi-mode mobile station through a wireless interface Protecting Sending Information 'This information contains information about multi-mode for another wireless access network. Page 28 This paper is sized for China National Standard (CNS) A4 (210X297 mm) (Please read the precautions on the back first) (Fill in this page again) 9 1X 46 6 5 Sat 動台所支援的加密演繹法的資訊,並儲存此資訊供未來 使用, 由該核心網路接收一第一命令信息,以指示多模行 動台以加密其他通訊, 構成一第二命令信息,其包含有關一信息驗證碼之 資料部, 藉由使用為另一無線接取網路中之多模行動台所支 援的加《、演繹法有關之計算參數資訊之一,以計算該信 息驗證碼’及 送出第二命令信息給該多模行動台。 8·如申請專利範圍第7項所述之無線接取網路,其中上述 之加密演繹法的資訊係附著至該第二命令信息的資料 部。 9.如申請專利範圍第7項所述之無線接取網路,其中上述 之由多模行動台所接收之未保護啟始發信信息被儲存 及該信息係被使用以計算該信息驗證碼。 10·如申請專利範圍第7項所述之無線接取網路,其中上述 之由多模行動台所接收之未保護啟始發信信息被儲存 及所儲存之資料部係被用以計算該信息驗證碼。 第29頁 本紙張尺度適用中國國家標準(CNS)A4規格(210X297公釐) (請先閲讀背面之注意事項再填寫本頁} .訂· 線 經濟部智慧財產局員工消費合作社印製The information of the encrypted deduction method supported by the mobile station and stores this information for future use. The core network receives a first command message to instruct the multi-mode mobile station to encrypt other communications to form a second command message, which contains The data part of an information verification code is calculated by using one of the calculation parameter information related to the deduction method and supported by the multi-mode mobile station in another wireless access network. The second command information is given to the multi-mode mobile station. 8. The wireless access network as described in item 7 of the scope of patent application, wherein the information of the above-mentioned encryption deduction method is attached to the data section of the second order information. 9. The wireless access network as described in item 7 of the scope of the patent application, wherein the unprotected originating message received by the multi-mode mobile station as described above is stored and the information is used to calculate the information verification code. 10. The wireless access network as described in item 7 of the scope of patent application, wherein the unprotected originating message received by the multi-mode mobile station as described above is stored and the stored data department is used to calculate the information Verification code. Page 29 This paper size applies to China National Standard (CNS) A4 (210X297 mm) (Please read the precautions on the back before filling out this page}. Order · Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs
TW091109855A 2000-11-28 2002-05-10 A system for ensuring encrypted communication after handover TW564619B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
FI20002613A FI20002613A0 (en) 2000-11-28 2000-11-28 A system to secure encrypted data transmission after handover
PCT/FI2001/000870 WO2002045453A1 (en) 2000-11-28 2001-10-09 A system for ensuring encrypted communication after handover
US10/013,257 US7403621B2 (en) 2000-11-28 2001-11-06 System for ensuring encrypted communication after handover

Publications (1)

Publication Number Publication Date
TW564619B true TW564619B (en) 2003-12-01

Family

ID=34621604

Family Applications (1)

Application Number Title Priority Date Filing Date
TW091109855A TW564619B (en) 2000-11-28 2002-05-10 A system for ensuring encrypted communication after handover

Country Status (1)

Country Link
TW (1) TW564619B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI393414B (en) * 2005-07-06 2013-04-11 Nokia Corp Secure session keys context
TWI425802B (en) * 2006-06-19 2014-02-01 Interdigital Tech Corp Method and wireless transmit/receive unit for securing wireless communications

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI393414B (en) * 2005-07-06 2013-04-11 Nokia Corp Secure session keys context
TWI425802B (en) * 2006-06-19 2014-02-01 Interdigital Tech Corp Method and wireless transmit/receive unit for securing wireless communications

Similar Documents

Publication Publication Date Title
JP5937664B2 (en) System to ensure encrypted communication after handover
US10187794B2 (en) Integrity check in a communication system
FI110974B (en) Initialization of a counter, especially for radio frames
JP4688808B2 (en) Enhanced security configuration for encryption in mobile communication systems
CN101232731B (en) Method and system for UE to generate cryptographic key switching from UTRAN to EUTRAN
CN101179854B (en) Local authentication in a communication system
EP2293515B1 (en) Method, network element, and mobile station for negotiating encryption algorithms
KR20080049080A (en) Integrity protection count synchronization method
WO2009152755A1 (en) Method and system for generating an identity identifier of a key
TW564619B (en) A system for ensuring encrypted communication after handover
CN101909368B (en) Wireless network security solution method and equipment
CN101383702A (en) Method and system protecting cipher generating parameter in tracing region updating
ZA200302555B (en) A system for ensuring encrypted communication after handover.
WP USECA

Legal Events

Date Code Title Description
GD4A Issue of patent certificate for granted invention patent
MK4A Expiration of patent term of an invention patent