TWI358918B - Communication system and method thereof - Google Patents

Communication system and method thereof Download PDF

Info

Publication number
TWI358918B
TWI358918B TW96149651A TW96149651A TWI358918B TW I358918 B TWI358918 B TW I358918B TW 96149651 A TW96149651 A TW 96149651A TW 96149651 A TW96149651 A TW 96149651A TW I358918 B TWI358918 B TW I358918B
Authority
TW
Taiwan
Prior art keywords
data
base station
mobile device
connection channel
transmission
Prior art date
Application number
TW96149651A
Other languages
Chinese (zh)
Other versions
TW200929920A (en
Inventor
Yi Hsueh Tsai
Frank Chee Da Tsai
Hua Chang Yin
Original Assignee
Inst Information Industry
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inst Information Industry filed Critical Inst Information Industry
Priority to TW96149651A priority Critical patent/TWI358918B/en
Publication of TW200929920A publication Critical patent/TW200929920A/en
Application granted granted Critical
Publication of TWI358918B publication Critical patent/TWI358918B/en

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Description

九、發明說明: 【發明所屬之技術領域】 本發月制a種無線通訊機制,尤指—種在不經由基地台下 將:行動裝置之資料透射繼裝置直接傳輸至另—行動裝置的通 訊系統及其相關方法。 【先前技術】 目刖對於符合802.16X系列規格的通訊系統而言,例如是全球 互通微波存取(Worldwide Interoperability for Microwave Access)系 、”充其最基礎的架構係利用一基地台(base stati〇n)來對其所服務 (serve)之行動裝置(subscrjber伽行011或m〇biie stati〇n)進行資料傳 輸’在此情形7 ’兩行絲置若欲進行資料傳輸,騎傳輸之資 料皆需通過該基地台;此時係依據一單點對多點 (point-to-multipoint)模式進行資料傳輸。為了達到改善資料輸出量 (throughput enhancement)與增加覆蓋範圍(coverage extensi〇n)的目 的’在802.16j規格說明書提到可於基地台與行動裝置間另使用複 數個中繼站(relay stati〇n)來轉傳資料,而此時基地台、中繼站與行 動裝置間之無線聯結拓墣通常係依據一樹狀扣沈)模式來進行控制 訊息與倾雜。朗巾獅綠善麵輸出量與增加覆蓋範圍 時’是透過基地台來控制相關的傳輸機制與實際傳輸的資料,並 避免讓兩行練置私下彼此進行輯。做賴狀—旦需要 計費或中斷傳輸服務(service intermption)B夺,相關的傳輸機制可直 接藉由基地台來加以控制,而此時僅基地台本身具有可結束傳輸 1358918 服務(service destruction)的能力。 然而,如果所有的資料皆需通過基地台的話,則相 被傳送至—基地台,然後該筆資料在下行網 路(d〇wnh,路徑上則可能是由此基地台傳送該筆資料至該中 繼站,爾後再經由該中繼站將該料料傳送至行_置觀;如 上所述’顯財發現在傳送該筆資料時其上行網路與下行網路會 重複佔用上述中繼站與基地台間的頻寬與運算資源。細,直覺 上若為了省去基地台所耗費之系統資源而在上述中繼站接收該筆 資料之後直祕其觀至行械1MS2,取不符合此—系統規 格由基地台中央管控的精神。因此,目前較為可行的作法是相關 的傳輸機制(signaling da_受地台所㈣而實際上資料 (b—耐藉由令繼站來將其轉送至另—行動裝置而不需通 過基地台。如此作的原因是,—般用於控制該傳輸機制的控制訊 號不會浪費衫_寬’反之,由於實際傳輸的㈣可能是多媒 體資料而較侧過多_寬資源;但以全敍職赫取系統來 說,利用中繼站來進行資料轉傳而不通過基地台將會造成另一嚴 重的問題:接收該筆資料的行動裝置將無法對該筆資料進行解 密。由於全球互賴波存取純係域謂端安全㈣如㈤ security)-行動纟與基地台間彼此擁有的私密金輸(shared娜如 ㈣,中間複數個中舰均不具有…所以,原先若所有資料皆需 通過基地台的話,則行動萝 後,基地台可彻麵將該筆資料加密 咖對該筆資料加密,而行開,然後該基地台再以金錄 傳送過__進行解密。;:==: 筆責料而不通地台,·㈣來轉傳該 料進行加密,而行_置_置觀以金細Y1對該筆資 勢必無法正確地卿__咖) 但卻無法解開。即便基可被正確地接收 站可利用金鑰ΚΕΥ1酬行^=鑰〇給中繼站錢得該中繼 利用金_Υ2加密所解、顧= 傳达過來的資料,並再 KEY2解密此—f料 j订動裝置MS2即可利用金鎗 更新基地台盘-個或純,一作法將需要更複雜的機制來同步 该通訊糸統嫩_—〜將破壞 【發明内容】 率並:::==算!源之耗費叫進傳輸效 之-在於提供-種傳ΠΓ 4解密’本發明之目的 行動裝置可編輪如使該些 決上述所提到的問題。綱通糸献其_方法,來解 行繼 仃動敦置的通訊系統。該通訊系统包含有一 地。與t繼裝置’其中該基地台係用來設定該資料之上行網 路與其下行網路分卿應於—第—連線通道酬碼與—第二連線 識奶馬’並傳播—傳輸加密金錄至該第―、第二行動裝置以 第 第一行動裝置共享該傳輸加密金錄,而該中繼裝置 則係輕接於該基地台與該第―、第二行動裝置之間,並用來接收 猎由該傳輸域金鑰進行加贿之鮮料錢在秘由該基地台 下依據該f -、帛二連線财翻聰由適當賴㈣phg)將該 第行動裝置之該貧料轉送至該第二行動裝置。 -欠依據本發明之實施例,其另揭露一種用於將一第一行動裝置 之身料傳送至—第二行_置的通訊方法。該通财法包含有下 列步驟.提供-基地台’使用絲地台來設定該資料之上行網路 與下仃網路係分卿應於—第—連線通道翻碼與—第二連線通 f識別碼,並傳播—傳輪加密麵至該第-、第二行動裝置以使 付》亥第、第一仃動裂置共享該傳輸加密金錄;以及利用一中繼 裝置來接收藉由該傳輪加密金鑰進行加密後之該資料並在不經由 該基地台下依_第—、第二連線通道酬碼經由適當轉換 (mapping_第—行_置之該龍騎魏第二行動装置。 【實施方式】 一:參閱第1圖’第1圖是本發明—實施例之通訊系統100# 不意圖。如圖所示’通訊系統廳包含有-基地台105、-補 置11〇(在本實施例中其係—中繼站RS1)以及其他的令繼站,並名 1358918 :-王球互通财存取通訊協定,㈣_行動裝置可經由通訊 系統100進打資料轉送(cr〇ssc〇m_icati〇n)來傳輪資料例如, 在第1圖中,可藉由通訊系統·將一第一行動 _送至一第二行動裝置MS2,其中虛線箭頭係表 貝枓的上行網路(uplink)與下行網路(downlink), 出實際上_料會通過的路徑。基地台105會設定 料之上行網路與其下行網路分別對應於—第—連線通道識^貝 (—η10 ’㈤)與一第二連線通道識別碼,並傳播-傳輸加 被金錄(traffic enc_〇n key ’ TEK)至第一、第二行動裝置繼盘 MS2以使得第一、第二行動裝置顧與ms2可丑享 二 金錄,耐繼裝置11G_接於基地請與第—、 置MS卜MS2之間,並用來接收藉由該傳輸加密金瑜進行加 之該資料叹在秘料⑼下罐料—1二連線通道 識^碼將第-行動裝置MS1之該請轉送至第二行動裝置_ ; 換^之’中繼裝置11〇僅是進行資料轉送而不對資料進行任何的 加/解密運算。詳細來說,本發明之通訊系統卿仍透過基.⑽ 來控制相關的傳輸機制,並且基地台105會週期性地更新該傳輸 加密金鑰,使得第一、第-耔叙壯 祕h A 置腿、觀可同時享有相同 的傳輸加费金鑰,所以,行動裝置贿可直接解密第一行動裝置 MSI所傳送過來的資料。 在本實施例中,基地台1〇5週期性更新該傳輸加密麵的方 ,以下兩種實施方式。方法―,以多重賴㈣__方式來 <S) 1358918 定期性地更新該傳輸加密金鑰,首先基地台加密用來加解密該傳 輸加密金錄 GTEK(Group Traffic Encryption Key)之金錄 GKEK(Group Key Encryption Key)並藉由一主要管理連線通道 (primary management connection)來對行動裝置 MSI 與 MS2 加以更 新,接著該傳輸加密金鑰GTEK則在經金鑰GKEK加密後,由基 地台以廣播方式傳輸予行動裝置MSI與MS2 ’實際資料則經由傳 輸連線通道(transport connection)來進行傳輸。如此,本實施例將 _ 可解決習知技術所說的問題。另外,由於第一、第二行動裝置 MSI、MS2係共享相同的傳輸加密金錄gteK,而相同的傳輸加 密金鑰亦代表著該筆資料在被傳輸時的安全防護等級是一致的, 且其中路徑上各中繼站由於未取得金鑰GKEK,並無法解密傳輸 中之資料,因此,本發明之通訊系統1〇〇可確實地支援端對端的 消費者安全。 方法二,基地台不以多重傳播(multicast)的方式來定期性地更 ® 新該傳輸加密金錄,而由第-、第二行動裝置MSI與MS2主動 更新傳輸加密金鑰。倘若第一、第二行動裝置MS1與MS2的其 中之-告知基地台1G5該傳輸加密麵失效(expired),此時基地台 1〇5不會立刻更新該傳輸加密金錄,而是直到第__、第二行動裝置 MSI與MS2中的另-行動裝置告知基地台1〇5該傳輸加密金錄失 效才會更新該傳輸加密金錄;如此,即可使得兩行動裝置題與 MS2中之該傳輸加密金輪可被同步地更新。為了簡化本說明書的 篇幅’在此省略更新該傳輸加密金糾相_循序圖(_ 12 CS > 1358918 diagram)。 為了達到資料轉送(CC--Cross Communicate)的目的,本實施例 中具資料轉送能力(CC-capable)的中繼裝置110(亦即中繼站Rs j) 係具有一對照表(mappingtabie),該對照表係記錄著會將該筆資料 之該第一連線通道識別碼映射成該第二連線通道識別碼以便中繼 裝置110將第一行動裝置MS1的該筆資料轉送至第二行動裝置 MS2。一般來說,基地台1〇5於設定該第一、第二連線通道識別 碼時會將其設定成不同的連線通道識別碼,所以,依據該對照表 中繼裝置110即可將該筆資料的該第一連線通道識別碼映射成該 第二連線通道識別碼並接著將該筆資料轉送至第二行動裝置 MS2;而在另一例子,基地台1〇5在設定連線通道(c〇nnecti〇n 時亦可將該第一、第二連線通道識別碼設定成相同的連線通道識 別碼,亦即,該筆資料的上行網路與其下行網路皆對應於相同的 連線通道識別碼,此時該對照表的功能會是非必要的(〇pti〇nai), 而中繼裝置110不需要修改該筆資料之該第一連線通道識別碼(因 為該第一、第二連線通道識別碼實際上是相同的)即可將該筆資料 轉送至第二行動裝置MS2。 另外,在另-實施例中,-中繼裝置亦可由包含兩個或兩個 以上的中繼站所組成,例如第2圖所示之通訊純的中繼裝 置210’亦即’本發明並不限定一中繼裝置中所包含之中繼站的個 數。此外’由於並非所有的中繼站皆具有本發明所述之執行資料 13 <S) 1358918 轉送的能力,所以在進行資料轉送之前,本發明會先找出具有資 料轉送能力的中繼站並決定出哪-傳送路徑係一最短路徑,而該 最短路㈣定義可以是使崎少連線通道進行傳輸的路徑、佔用 最少頻寬資源的路徑或者是最不易形成網路鎮neg 气料,端視-設計麵設計f轉加以考量。 如上所述’ s第-、第二行動襄置㈣與觀欲進行溝通 (⑺mrmmication)時,上述的通訊系統⑽或勘)首先會找出第一 行動裝置MSI之該筆眘斜_夕μ〜、 _ 之上仃,周路路徑上的中繼站,例如,第 1圖所示之通訊系統卿會找出中繼站RS1、RS2與RS3;然後會 再找出該筆資料的下行網路路徑上的中繼站,例如,第工圖中的 通訊系統UK)會找出中繼站RS1與RS4。接著通訊系統卿會將 上射獅巾不具備資料轉送魏者剔除Μ訂具有資料轉送 中繼站’因此’最後可依據系統設計者所自行做的最短 控定義來挑選出適合的中綱作為上述實施例中之中繼裝置。 • Si::圖中即是輸一1來作為第-實施例 的資^系=卿中的基地台105之後會對中繼站脱進行相關IX. Description of the invention: [Technical field to which the invention pertains] A wireless communication mechanism of the present invention, in particular, a communication that transmits a data transmission device of a mobile device directly to another mobile device without going through a base station. The system and its associated methods. [Prior Art] For the communication system that conforms to the 802.16X series specifications, for example, the Worldwide Interoperability for Microwave Access system, "the most basic architecture utilizes a base station (base stati〇). n) to carry out the data transmission of the service device (subscrjber gamma 011 or m〇biie stati〇n) served by it. In this case, the two lines are arranged for data transmission. It needs to pass through the base station; in this case, data is transmitted according to a point-to-multipoint mode. In order to improve the throughput enhancement and coverage extensi〇n 'In the 802.16j specification, it is mentioned that a plurality of relay stations (relay stati〇n) can be used between the base station and the mobile device to transfer data. At this time, the wireless connection between the base station, the relay station and the mobile device is usually According to a tree-like buckle pattern, the control message and the miscellaneous are used. When the output of the Langshi Lion Green Face is increased and the coverage is increased, it is controlled by the base station. The mechanism and the actual transmission of the data, and to avoid letting the two lines practice privately with each other. Doing the need to charge or interrupt the transmission service (service intermption) B, the relevant transmission mechanism can be directly used by the base station Control, at this time only the base station itself has the ability to end the transmission of service 1538918. However, if all the data needs to pass through the base station, then the phase is transmitted to the base station, and then the data is down. Network (d〇wnh, the path may be that the base station transmits the data to the relay station, and then the material is transmitted to the line via the relay station; as described above, 'the discovery is transmitting the When the data is written, the uplink network and the downlink network repeatedly occupy the bandwidth and computing resources between the relay station and the base station. Finely, intuitively, after receiving the data in the relay station in order to save the system resources consumed by the base station Straight to its view to the 1MS2, it does not meet this - the system specifications are controlled by the central control of the base station. Therefore, the current feasible method is related The transmission mechanism (signaling da_ is subject to the platform (4) and the actual data (b-resistant by the relay station to transfer it to another mobile device without going through the base station. The reason for this is that - for the general purpose The control signal that controls the transmission mechanism will not waste the shirt_width. Conversely, since the actual transmission (4) may be multimedia material and the side is too _ wide resource; but in the full-reported system, the relay station is used for data conversion. Passing through the base station will cause another serious problem: the mobile device receiving the data will not be able to decrypt the data. Because the global inter-wave access to pure domain-predicate security (four) such as (five) security) - action 纟 and the base station have private gold (shared Na (4), the middle of the number of medium ships do not have ... so, if the original If all the data needs to pass through the base station, then after the action is taken, the base station can encrypt the data by encrypting the data, and then the base station transmits the __ to decrypt it. ;:==: The pen blame does not pass the platform, (4) to transfer the material for encryption, and the line _ set _ to view the gold fine Y1 the pen will not be able to correctly __ coffee) but can not Untied. Even if the base can be correctly received by the station, the key can be used to pay for the key = ^ key to the relay station, the relay uses the gold _ Υ 2 encryption solution, Gu = the information conveyed, and then KEY2 decrypt this - f material j, the ordering device MS2 can use the gold gun to update the base plate - one or pure, one way will require a more complicated mechanism to synchronize the communication system _ _ ~ will destroy [invention content] rate and ::::== The cost of the source is called the transmission effect - it is provided - the type of transmission 4 decryption 'the purpose of the present invention mobile device can be programmed to make the above mentioned problems. Gang Tong provided his _ method to solve the communication system following the move. The communication system includes a ground. And the t-substation 'where the base station is used to set the data of the uplink network and its downlink network division should be - the first connection channel remuneration code - the second connection line to identify the milk horse' and spread - transmission encryption The first and second mobile devices share the transmission encrypted record with the first mobile device, and the relay device is lightly connected between the base station and the first and second mobile devices, and To receive the fresh money for the bribe by the transmission domain key in the secret base of the base station according to the f-, 帛二连财财聪 Cong by the appropriate reliance (four) phg) the poor mobile material of the mobile device To the second mobile device. - In accordance with an embodiment of the present invention, a communication method for transmitting a body of a first mobile device to a second line is disclosed. The financial method includes the following steps: Providing - the base station's use of the silk platform to set up the data of the upstream network and the network of the next division should be - the first connection channel and the second connection Passing the identification code, and propagating - transmitting the encrypted surface to the first and second mobile devices to enable the first and second mobile devices to share the transmission encrypted record; and using a relay device to receive the borrowing The data encrypted by the pass-through encryption key is not converted via the base station according to the _---the second connection channel via the appropriate conversion (mapping_first-line_set the dragon ride Weidi) [Embodiment] A: Refer to Fig. 1 'The first figure is the present invention - the communication system 100# of the embodiment is not intended. As shown in the figure, the communication system hall includes - base station 105, - supplement 11〇 (in this embodiment, the system is the relay station RS1) and other relay stations, and the name is 1358918: - the ball exchange agreement, (4) _ mobile device can transfer data via the communication system 100 (cr 〇ssc〇m_icati〇n) to transmit information, for example, in Figure 1, by communication system A first action_ is sent to a second mobile device MS2, wherein the dotted arrow is the uplink and downlink of the table, and the path through which the data is actually passed. The upstream network of the setting material and its downlink network respectively correspond to the first-connection channel identification ^ (-η10 '(5)) and a second connection channel identification code, and the propagation-transmission plus the gold record (traffic enc_) 〇n key ' TEK) to the first and second mobile devices to follow the disk MS2 so that the first and second mobile devices can take care of the second record with the ms2, and the relay device 11G_ is connected to the base and the first and the second Between MS and MS2, and used to receive the encryption by the transmission of Jin Yu, the data is sighed under the secret material (9), the canister - the first two connection channel identification code, the first mobile device MS1 should be transferred to the second The mobile device _ ; the relay device 11 is only for data transfer without any encryption/decryption operation on the data. In detail, the communication system of the present invention still controls the relevant transmission mechanism through the base (10). And the base station 105 periodically updates the transport encryption key so that the first In the present embodiment, the base device can directly decrypt the data transmitted by the first mobile device MSI. In this embodiment, the base is used to locate the same transmission plus fee key. The station 1〇5 periodically updates the side of the transmission encryption plane, the following two embodiments. The method ―, the multiple (4) __ way to < S) 1358918 periodically update the transmission encryption key, first base station encryption To encrypt and decrypt the GTEK (Group Traffic Encryption Key) GKEK (Group Key Encryption Key) and update the mobile devices MSI and MS2 by a primary management connection, and then The transmission encryption key GTEK is transmitted by the base station to the mobile devices MSI and MS2 by the base station after being encrypted by the key GKEK. The actual data is transmitted via a transmission connection. Thus, this embodiment will solve the problems of the prior art. In addition, since the first and second mobile devices MSI and MS2 share the same transmission encryption record gteK, the same transmission encryption key also indicates that the security protection level of the data is consistent when transmitted, and wherein Since the relay stations on the path do not acquire the key GKEK and cannot decrypt the data in the transmission, the communication system 1 of the present invention can surely support end-to-end consumer security. In the second method, the base station does not periodically transmit the encrypted encryption record in a multi-cast manner, and the first and second mobile devices MSI and MS2 actively update the transmission encryption key. If the first and second mobile devices MS1 and MS2 inform the base station 1G5 that the transmission encryption plane is expired, the base station 1〇5 will not immediately update the transmission encryption record, but until the _ _, the second mobile device MSI and the other mobile device in the MS2 inform the base station 1 〇 5 that the transmission encryption record is invalidated to update the transmission encryption record; thus, the two mobile device problems and the MS2 in the MS2 The transmission encryption gold wheel can be updated synchronously. In order to simplify the description of the present specification, the update of the transmission encryption phase correction_sequence map (_ 12 CS > 1358918 diagram) is omitted here. In order to achieve the purpose of CC--Cross Communicate, the CC-capable relay device 110 (ie, the relay station Rs j) in this embodiment has a mapping table (mapping tabie). The system records that the first connection channel identification code of the data is mapped to the second connection channel identification code for the relay device 110 to forward the data of the first mobile device MS1 to the second mobile device MS2. . Generally, the base station 1〇5 sets the first and second connection channel identification codes to different connection channel identification codes, so according to the comparison table, the relay device 110 can The first connection channel identification code of the pen data is mapped to the second connection channel identification code and then transferred to the second mobile device MS2; and in another example, the base station 1〇5 is in the set connection The channel (c〇nnecti〇n may also set the first and second connection channel identifiers to the same connection channel identifier, that is, the uplink network of the data and the downlink network thereof correspond to the same Connection channel identification code, at this time the function of the comparison table may be unnecessary (〇pti〇nai), and the relay device 110 does not need to modify the first connection channel identification code of the data (because the first And the second connection channel identification code is actually the same), the data can be transferred to the second mobile device MS2. In addition, in another embodiment, the relay device can also include two or more The relay station consists of, for example, the communication in the middle of Figure 2 The device 210', that is, the present invention does not limit the number of relay stations included in a relay device. Further, since not all relay stations have the capability of the execution data 13 <S) 1358918 referred to in the present invention, Therefore, before performing data transfer, the present invention first finds a relay station having data transfer capability and determines which transmission path is a shortest path, and the shortest path (four) definition may be a path for transmitting a small number of connection channels, The path that occupies the least bandwidth resource is the least likely to form a network town neg gas material, and the end-design surface design f is considered. When the above-mentioned communication system (10) or the above-mentioned communication system (10) or survey) first finds the first mobile device MSI, the above-mentioned communication system (10) or the first action device MSI , _ above, the relay station on the path of the road, for example, the communication system shown in Figure 1 will find the relay stations RS1, RS2 and RS3; then the relay station on the downlink network path of the data will be found again. For example, the communication system UK in the drawing will find the relay stations RS1 and RS4. Then, the communication system secretary will transfer the lion towel without the data to the Wei, and the data transfer relay station will be selected. Therefore, the system can be selected according to the shortest control definition made by the system designer as the above embodiment. Relay device in the middle. • Si:: In the figure, the input is one. As the base station of the first embodiment, the base station 105 in the middle of the base station 105 will be related to the relay station.

論轉达Μ。請參閲第3圖,第3圖是第!圖所示之基地A :T卿進行資料轉送設定的循序圖一般來說,如第。3 可^對除不具備資料轉送功能的中繼站之後由選定之 ί 如前—節所述)具有資料轉送 月…繼站(例如是中繼站RS1)發出資料轉送的請求命令 14 1358918 CC-REQ至基地台1〇5,然後由基地台i〇5來決定是否接受或拒絕 此中繼站RS1來進行資料轉送(亦即資料轉送的相關傳輸機制仍由 基地台所控制);若是接受,則基地台1〇5會發出一回應命令 CC-RSP至中繼站RS1 ’而中繼站RS1在接收到回應命令cc_Rsp 之後亦送出一回覆命令CC-ACK給基地台1〇5,此時中繼站RS1 已被設定為中繼裝置110並且上述所提之中繼站RS1的對照表亦 已完成設定而可立即進行資料轉送。當然,在前述設定資料轉送 的程序前,亦需由第一行動裝置MS1與基地台1〇5進行動態增加 服務(dynamic service addition)的三向交握(three-way handshake)設 疋,在此為簡化說明在第3圖中將此動態增加服務的三向交握設 疋僅利用MS-initiated-DSA加以表示,而之後基地台與第二 行動裝置MS2之間之動態增加服務的三向交握設定亦利用 BS-untiated-DSA來表示之。最後,須注意的是,在本說明書中上 述之通訊系統係符合該全球互通微波存取通訊協定;然而,此非 本發明的限制。 以上所述僅為本發明之較佳實施例,凡依本發明申請專利範 圍所做之均等變化與修飾,皆應屬本發明之涵蓋範圍。 【圖式簡單說明】 第1圖為本發明—實施例之通訊系統的示意圖。 第2圖為本發明另一實施例之通訊系統的示意圖。 第3圖為第1圖所示之基地台對中繼站脱進行資料轉送設定的 15 1358918 循序圖。 【主要元件符號說明】 100、200 通訊系統 105 基地台 110、210 中繼裝置On the transfer of Μ. Please refer to Figure 3, and Figure 3 is the first! The base diagram of the base A: T Qing's data transfer setting is generally as shown in the figure. 3 Can be used to send a data transfer request to a relay station that does not have a data transfer function after the relay station that has the data transfer function, as described in the previous section (for example, the relay station RS1). 14 1358918 CC-REQ to the base The station 1〇5, then the base station i〇5 decides whether to accept or reject the relay station RS1 for data transfer (that is, the relevant transmission mechanism of data transfer is still controlled by the base station); if accepted, the base station 1〇5 A response command CC-RSP is sent to the relay station RS1' and the relay station RS1 also sends a reply command CC-ACK to the base station 1〇5 after receiving the response command cc_Rsp, at which time the relay station RS1 has been set as the relay device 110 and The comparison table of the relay station RS1 mentioned above has also been set and the data transfer can be performed immediately. Of course, before the process of setting the data transfer, the three-way handshake setting of the dynamic service addition by the first mobile device MS1 and the base station 1〇5 is also required. In order to simplify the description, the three-way handshake of this dynamic increase service is shown in FIG. 3 using only MS-initiated-DSA, and then the dynamic addition service between the base station and the second mobile device MS2 is three-way. The grip setting is also indicated by BS-untiated-DSA. Finally, it should be noted that the communication system described above in this specification conforms to the Worldwide Interoperability for Microwave Access Protocol; however, this is not a limitation of the present invention. The above are only the preferred embodiments of the present invention, and all changes and modifications made to the scope of the present invention should fall within the scope of the present invention. BRIEF DESCRIPTION OF THE DRAWINGS Fig. 1 is a schematic diagram of a communication system of the present invention. 2 is a schematic diagram of a communication system according to another embodiment of the present invention. Figure 3 is a sequence diagram of the 15 1358918 set by the base station shown in Figure 1 for data transfer from the relay station. [Main component symbol description] 100, 200 communication system 105 base station 110, 210 relay device

1616

Claims (1)

1358918 十、申請專利範圍: 1. 一種通訊系統,用於將一第-行動裝置(m〇bilestati〇狀資料傳 — 送至一第二行動裝置,該通訊系統包含有: ' 一基地台(base station),用來設定該資料之上行網路(Upiink) 與下行網路(Downlink)係分別對應於一第一連線通道識 別碼(connectionID,CID)與一第二連線通道識別碼,並 傳播一傳輸加密金錄(traffic encryption key,TEK)至該第 # —、第二行動裝置以使得該第一、第二行動裝置共享該 傳輸加密金鑰;以及 一中繼裝置’耦接於該基地台與該第一、第二行動裝置之間, 祕收糾轉輸城麵進行加錢捕資料並在 不經由雜地台下依據該第―、n魏道識別碼將 δ玄第一行動裝置之該資料轉送至該第二行動裝置。 2. 如申請專利範圍第1項所述之通訊系統,其中該第—連線通道 • _碼係相同於該第二連線通道識別碼,以及該基地台係設定該 資料之該上行網路触下行網路對應於細之連親道識別碼。 3·如申請專利範圍第1項所述之通訊系統,其中該基地台係定期 更新該第…第二行絲置所共享謂傳輸城金鑰。 4.如申請專利I巳圍第3項所述之通訊系統,該基地台主動定期以 群播_—〇方式更新該第一、第二行動裝置之該傳輸加密金 17 ί S ) 輪以確保該傳輸加密金输不致失效(expired)。 5 I ^申π專她圍第3項所述之通訊系統,其中當該第一、第二 丁動裝置之其中之—告知該基地台該傳輸加密金錄失效㈣㈣ 時該基地台不更新該傳輸加密金绩直到該第一、第二行動裝置 之另一告知該基地台該傳輸加密金鑰失效。 6’如申料概®第1項所述之通訊緖,其巾該巾繼裝置係一 繼站(relay station),其具有一對照表扣叩^丨哗tabie),該中繼站 係用來接收該資料並藉由該對照表將該資料之該第一連線通道 識別碼映射成該第二連線通道識別碼以便將該第一行動裝置之 該資料轉送至該第二行動裝置。 7. 如申請專利範圍第1項所述之通訊系統,其中該中繼裝置包含 有複數個中繼站,該複數個中繼站係用於接收該資料並在不經由 該基地台下將該第一行動装置之該資料轉送至該第二行動裝置。 8. 如申請專利範圍第1項所述之通訊系統,其係符合—全球互通 微波存取(Worldwide Interoperability for Microwave Access, WIMAX)通訊協定。 9. 一種用於將一第一行動裝置之資料傳送至一第二行動裝置之通 訊方法,其包含有: 18 (S〉 1358918 提供一基地台,使用該基地台來設定該資料之上行網路與下 行網路係分別對應於一第一連線通道識別碼與一第二連 線通道識別碼’並傳播一傳輸加密金鑰至該第一、第二 行動裝置以使得該第一、第二行動裝置共享該傳輸加密 金鑰;以及 利用一中繼裝置來接收藉由該傳輸加密金鑰進行加密後之該 資料並在不經由該基地台下依據該第·τ、第二連線通道 Φ 識別碼將該第一行動裝置之該資料轉送至該第二行動裝 置。 10. 如申請專利範圍第9項所述之通訊方法,其中該第一連線通道 識別碼係相同於該第二連線通道識別碼,以及設定該資料之該上 行網路與該下行網路分別對應於一第一連線通道識別碼與一第 二連線通道識別碼之步驟包含有: 設定該資料之該上行網路與該下行網路對應於相同之連線通 • 道識別碼。 11. 如申請專利範圍第9項所述之通訊方法,其另包含有: 定期更新該第一、第二行動裝置所共享之該傳輸加密金輪。 12如申請專利範圍第11項所述之通訊方法,其另包含有: 主動定期以群播(multicast)方式更新該第一、第二行動裝置之 該傳輸加密金鑰,以確保該傳輸加密金鑰不致失效 19 (expired) 〇 以如申請專利範圍第u項所述之通訊 當該第―、第二物裝置 ,其另包含有: 密金翁失效時,不更射偟2。知該基地台該傳輪加 二行動裝置以密麵直第—、第 置之另-告知抑_輸加密麵失效。 4中2 9韻叙通财法,其愧帽裝置係- 如_====觸-行動裝 '、對“、、表,接收該資料並藉由該對照表將該資料之該第 —連線通道咖碼映射成該第二連線通道朗碼以便將 、第行動裝置之該資料轉送至該第二行動裝置。 15·如申睛專利範圍第9項所述之通訊方法,其係符合一全球互通 微波存取通訊協定。 十一、囷式: 201358918 X. Patent application scope: 1. A communication system for transmitting a first mobile device (m〇bilestati data to a second mobile device, the communication system includes: 'a base station (base) Station), the uplink network (Upiink) and the downlink network (Downlink) for setting the data respectively correspond to a first connection channel identifier (connectionID, CID) and a second connection channel identifier, and Transmitting a transmission encryption key (TEK) to the ##, the second mobile device to enable the first and second mobile devices to share the transmission encryption key; and a relay device 'coupled to the Between the base station and the first and second mobile devices, the secret is transferred to the city to carry out the money to capture the data and the first action of the δ Xuan will be based on the first and the second Weidao identification codes. The device of the device is transferred to the second mobile device. 2. The communication system of claim 1, wherein the first connection channel • _ code is the same as the second connection channel identifier, and The base station set the capital The uplink network touches the downlink network corresponding to the detailed affiliate identification code. 3. The communication system described in claim 1, wherein the base station periodically updates the second line The shared transmission city key. 4. If the communication system described in the third application of Patent I is applied, the base station actively updates the transmission encryption of the first and second mobile devices in a multicast mode. Gold 17 ί S ) round to ensure that the transmission of the encrypted gold input will not expire (expired). 5 I 申 π 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用 专用The encrypted data is transmitted until another of the first and second mobile devices informs the base station that the transmission encryption key has failed. 6', as described in the item 1 of the application, the towel is a relay station, which has a checkpoint 叩^丨哗tabie), and the relay station is used for receiving And comparing the first connection channel identification code of the data to the second connection channel identification code to transfer the data of the first mobile device to the second mobile device. 7. The communication system of claim 1, wherein the relay device comprises a plurality of relay stations, the plurality of relay stations are configured to receive the data and to perform the first mobile device without passing through the base station The information is forwarded to the second mobile device. 8. The communication system described in claim 1 is in compliance with the Worldwide Interoperability for Microwave Access (WIMAX) protocol. 9. A communication method for transmitting data of a first mobile device to a second mobile device, comprising: 18 (S> 1358918 providing a base station, using the base station to set an uplink network of the data Corresponding to a first connection channel identifier and a second connection channel identifier and respectively transmitting a transmission encryption key to the first and second mobile devices to enable the first and second The mobile device shares the transmission encryption key; and uses a relay device to receive the data encrypted by the transmission encryption key and according to the first τ, the second connection channel Φ without passing through the base station The identification code transfers the data of the first mobile device to the second mobile device. 10. The communication method of claim 9, wherein the first connection channel identification code is the same as the second connection The line channel identification code, and the step of the uplink network and the downlink network corresponding to the first connection channel identification code and the second connection channel identification code respectively included in the step include: setting the capital The uplink network and the downlink network correspond to the same connection channel identification code. 11. The communication method according to claim 9 of the patent application, further comprising: periodically updating the first and second The communication encryption method is shared by the mobile device. The communication method of claim 11, further comprising: actively updating the transmission of the first and second mobile devices in a multicast manner. Encryption key to ensure that the transmission encryption key is not expired 19 (expired), as described in the scope of application of the scope of the invention, as the first and second devices, which additionally include: , do not shoot more 2. Know that the base station of the transmission wheel plus two mobile devices to the secret surface of the first -, the first set of the other - to inform the _ loss of encryption surface failure. 4 in the 2 9 rhyme to pass the law, and then The cap device system - such as _====touch-action device', for ",, table, receiving the data and mapping the first-line channel coffee code of the data to the second connection by the comparison table Channel ram code to transfer the data of the mobile device to the second . 15. The actuating means apply eye range of the Patent communication method of claim 9, which conforms to a system WiMAX protocol eleven, granary formula: 20
TW96149651A 2007-12-24 2007-12-24 Communication system and method thereof TWI358918B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW96149651A TWI358918B (en) 2007-12-24 2007-12-24 Communication system and method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW96149651A TWI358918B (en) 2007-12-24 2007-12-24 Communication system and method thereof

Publications (2)

Publication Number Publication Date
TW200929920A TW200929920A (en) 2009-07-01
TWI358918B true TWI358918B (en) 2012-02-21

Family

ID=44864698

Family Applications (1)

Application Number Title Priority Date Filing Date
TW96149651A TWI358918B (en) 2007-12-24 2007-12-24 Communication system and method thereof

Country Status (1)

Country Link
TW (1) TWI358918B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI397279B (en) * 2009-11-27 2013-05-21 Inst Information Industry Femto access point and communication method thereof

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI397279B (en) * 2009-11-27 2013-05-21 Inst Information Industry Femto access point and communication method thereof
US9084226B2 (en) 2009-11-27 2015-07-14 Institute For Information Industry Femto access point and communication method thereof

Also Published As

Publication number Publication date
TW200929920A (en) 2009-07-01

Similar Documents

Publication Publication Date Title
US8838972B2 (en) Exchange of key material
US8964987B2 (en) Method and apparatus for storing and distributing encryption keys
US7522727B2 (en) Method and apparatus for providing authentication in a communication system
US10530573B2 (en) System and method for wireless network access protection and security architecture
JP5625703B2 (en) Mobile communication system, communication control method, and radio base station
US20190165934A1 (en) Apparatus, system and method for secure direct communication in proximity based services
KR100749846B1 (en) Device for realizing security function in mac of portable internet system and authentication method using the device
US20180288013A1 (en) End-to-end secured communication for mobile sensor in an iot network
CN110445747A (en) System and method for the exchange of encrypted transport data service
US8462953B2 (en) Communication system and method thereof
JP2010503328A (en) Tunnel forwarding of security connection messages over mesh networks
CN107113901A (en) Data forwarding in dual link is supported
CA2972455C (en) Method and apparatus for providing access to local services and applications to multi-agency responders
JP2002281010A (en) Key distributing system for protecting path update notification in micro mobility network
CN108781110A (en) For the system and method by relay in telecommunication network data
TWI430674B (en) Security method in wireless communication method having relay node
EP4184860A1 (en) Key management method and communication apparatus
TWI358918B (en) Communication system and method thereof
KR101568940B1 (en) Authentication method for device to device communication in mobile open iptv system and device to device communication method in mobile open iptv system
WO2022094976A1 (en) Key generation method and apparatus
US11856074B2 (en) Apparatus, system and method for MTC
CN108924826A (en) The control method and equipment of data transmission
CN101471720B (en) Communication system and correlation method thereof
CA2616445C (en) Communication system and method for transmitting data of first mobile station to second mobile station without going via base station
CN116508278A (en) Resource efficiency enhancement for IAB networks