WO2008022498A1 - Procédé servant à modifier l'algorithme de cryptage en réadressage - Google Patents

Procédé servant à modifier l'algorithme de cryptage en réadressage Download PDF

Info

Publication number
WO2008022498A1
WO2008022498A1 PCT/CN2006/003676 CN2006003676W WO2008022498A1 WO 2008022498 A1 WO2008022498 A1 WO 2008022498A1 CN 2006003676 W CN2006003676 W CN 2006003676W WO 2008022498 A1 WO2008022498 A1 WO 2008022498A1
Authority
WO
WIPO (PCT)
Prior art keywords
relocation
message
rnc
encryption algorithm
network controller
Prior art date
Application number
PCT/CN2006/003676
Other languages
English (en)
Chinese (zh)
Inventor
Jicheng Wang
Original Assignee
Zte Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zte Corporation filed Critical Zte Corporation
Publication of WO2008022498A1 publication Critical patent/WO2008022498A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/10Reselecting an access point controller

Definitions

  • the present invention relates to a UE (terminal) between multiple RNSs (Radio Network Subsystems) in a Wideband Code Division Multi-Access (WCDMA) mobile communication system.
  • Equipment Mobility management and encryption protection methods.
  • BACKGROUND OF THE INVENTION Relocation When a UE moves from a cell coverage controlled by one RNC (Radio Network Controller) to another cell coverage covered by an RNC, the first RNC (referred to as the original RNC) may decide to initiate a relocation procedure. , the UE's radio resources are migrated to the second RNC (referred to as the target RNC). After the relocation process is completed, the target RNC will allocate radio resources to the UE and provide its bearer to the CN (core network) connection.
  • the CN core network
  • the radio resources of the UE in the original RNC will also be released after the relocation process is completed.
  • the relocation process may not only change the RNC. If the original RNC and the target RNC are managed by different CNs, the CN will also change after the relocation is completed. Correspondingly, if it exists, the CN that manages the original RNC is called the original CN, and the CN that manages the target RNC is called the target CN.
  • the relocation that the UE does not participate in requires that the UE already has a connection with the target RNC before relocation.
  • the original RNC initiates relocation, the UE will not be notified.
  • the air interface message is used to notify the UE that the radio resource starts. Assigned and controlled by the target RNC.
  • the relocation in which the UE participates is that the original RNC sends a message to the UE to perform the handover in the relocation process, and the message includes the new radio resource information allocated by the target RNC to the UE.
  • the UE establishes a connection with the target RNC according to the information, and completes the handover and completes the relocation process.
  • Encryption To protect the security of users transmitting data over the air, WCDMA systems encrypt this data.
  • the communication parties are required.
  • the RNC and the UE have the same key, so that Use the same encryption algorithm, and use the same encryption parameters defined in other 3GPP (Third Mobile Cooperative Organization) protocols. If the communication is used by both parties. If the secret parameters are inconsistent, the sender of the data transmitted to the receiver after encryption will not be correctly decrypted, and the receiver will not receive it correctly.
  • all encryption parameters will be transmitted from the original RNC to the target RNC. After the relocation is completed, the target RNC can use the same encryption parameters as the original RNC to maintain correct communication with the UE without interrupting the encryption protection.
  • the WCDMA system defines a variety of encryption algorithms. Which algorithm is actually used in the communication process needs to consider the configuration or capabilities of the CN, RNC, and UE simultaneously.
  • the original RNC and the target RNC or the original CN and the target CN may configure or support different encryption algorithms, so the relocation process may result in a change in the encryption algorithm.
  • the new encryption algorithm will be carried in the handover message.
  • the handover message itself is sent to the UE at the original RNC, and the encryption algorithm before relocation is used, so the UE can correctly receive the handover message. After receiving the handover message, the UE immediately establishes communication with the target RNC using a new encryption algorithm.
  • the relocation process in which the UE participates can be successfully completed even if the encryption algorithm is changed.
  • the message informing the UE that the relocation needs to be sent by the target RNC to the UE after the relocation is completed.
  • the target RNC must still use the encryption algorithm used by the original RNC when transmitting the message informing the UE to relocate. In this case, the target RNC must support the encryption algorithm used by the original RNC. If it is not supported, the relocation cannot be performed.
  • the present invention provides a method for relocating an encryption algorithm when a relocation process that the terminal device does not participate in, and the target RNC does not support an encryption algorithm used by the original RNC.
  • a method of implementing encryption algorithm changes in relocation.
  • a method for implementing an encryption algorithm change in relocation includes the following steps: Step A: After receiving the relocation request message sent by the original radio network controller, the target radio network controller sends a relocation request response message to the original radio network controller via the core network; Step B, the original radio network controller receives the weight After the location request response message is sent, the terminal device sends a trigger relocation message to the target radio network controller to send a relocation execution message.
  • Step C the target radio network controller receives the relocation execution message, starts receiving the data of the terminal device, and waits a response message of the terminal device;
  • Step D After receiving the trigger relocation message, the terminal device obtains a new encryption algorithm of the target radio network controller, and the terminal device encrypts the response message by using a new encryption algorithm, and sends the response message to the target radio network controller.
  • Step E The target radio network controller receives the response message from the terminal device, and the relocation process is completed.
  • the relocation request response message carries a message informing the terminal device to relocate and an encryption algorithm of the new target radio network controller.
  • the step B the original radio network controller sends the trigger relocation message to the terminal device at least twice.
  • the step E is specifically: after the target radio network controller receives the response message of the terminal device, releasing the connection for connecting the original radio network controller and the target wireless The transmission channel of the network controller, the relocation process is completed.
  • the encryption algorithm of the old original radio network controller is used.
  • the air interface message notifying the UE of the relocation is sent to the UE by means of the encryption capability of the original RNC.
  • the original RNC sends the air interface message at least twice to the terminal device.
  • the original RNC and the target RNC do not release the transmission channel for connecting the original RNC and the target RNC until the target RNC receives the response message from the UE.
  • the original The RNC and the target RNC release the transport channel used to connect the original RNC and the target RNC to ensure successful relocation.
  • FIG. 1 is a diagram showing an implementation process of a method for implementing an encryption algorithm change in the relocation of the present invention.
  • DETAILED DESCRIPTION OF THE INVENTION The present invention is directed to a) that the relocation type is a relocation in which the UE does not participate, and b) that the encryption algorithm selected by the target RNC is different from the encryption algorithm used by the original RNC, and c) that the target RNC does not support encryption used by the original RNC.
  • Algorithm the method of implementing relocation. The method for implementing the encryption algorithm change in the relocation of the present invention will be described in detail below with reference to FIG.
  • a method for implementing an encryption algorithm change in relocation includes the following steps: Step A: After receiving the relocation request message sent by the original RNC, the target RNC sends a relocation request response message to the original RNC through the core network; Step B: After receiving the relocation request response message, the original RNC sends a trigger relocation message to the terminal device. To ensure that the message that triggers the relocation can be more reliably transmitted to the UE, the original RNC may repeatedly send the message; the original RNC is sent to the target RNC.
  • Step C the target radio network controller receives the relocation execution message, starts receiving the data of the terminal device, and waits for the response message of the terminal device;
  • Step D after receiving the trigger relocation message, the terminal device obtains the message A new encryption algorithm of the target radio network controller, the terminal device encrypts the response message by using a new encryption algorithm, and sends the response message to the target radio network controller.
  • Step E After receiving the response message of the terminal device, the target radio network controller is released for The transmission channel connecting the original radio network controller and the target radio network controller, the relocation process carry out.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Procédé servant à modifier l'algorithme de cryptage en réadressage et à résoudre le problème posé par l'impossibilité d'effectuer le réadressage quand l'algorithme de cryptage est modifié pendant le processus de réadressage, étant donné la non participation de UE et l'absence de support par le RNC de destination de l'algorithme de cryptage utilisé par le RNC d'origine. Ce procédé consiste en ce qui suit: après réception du message de demande de réadressage transmis par le RNC d'origine, transmission par le RNC de destination d'une réponse à la demande de réadressage au RNC d'origine; après réception du message de réponse à la demande de réadressage, le RNC d'origine transmet un message d'exécution de réadressage au RNC de destination; le RNC de destination reçoit le message d'exécution de réadressage et attend le message de réponse de UE; le RNC original transmet un message de réadressage à UE; après réception du message de déclenchement du réadressage, UE transmet un message de réponse crypté au moyen du nouvel algorithme de cryptage au RNC de destination; le RNC de destination reçoit le message de réponse de UE et le processus de réadressage se termine. Si le RNC de destination ne supporte pas l'algorithme de cryptage du RNC original, l'invention permet de transmettre un message par interface hertzienne afin d'informer UE du réadressage à l'UE utilisant la capacité de cryptage du RNC d'origine.
PCT/CN2006/003676 2006-08-18 2006-12-29 Procédé servant à modifier l'algorithme de cryptage en réadressage WO2008022498A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200610111455.6 2006-08-18
CN2006101114556A CN101128033B (zh) 2006-08-18 2006-08-18 重定位中实现加密算法改变的方法

Publications (1)

Publication Number Publication Date
WO2008022498A1 true WO2008022498A1 (fr) 2008-02-28

Family

ID=39095917

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2006/003676 WO2008022498A1 (fr) 2006-08-18 2006-12-29 Procédé servant à modifier l'algorithme de cryptage en réadressage

Country Status (3)

Country Link
CN (1) CN101128033B (fr)
RU (1) RU2423005C2 (fr)
WO (1) WO2008022498A1 (fr)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102036233B (zh) * 2009-09-27 2014-03-12 中兴通讯股份有限公司 一种重定位处理方法及系统
CN101835154B (zh) 2010-04-20 2016-03-30 中兴通讯股份有限公司 一种建立增强的空口密钥的方法及系统
CN101902736B (zh) * 2010-07-23 2018-01-23 江苏悦达数梦技术有限公司 空中接口密钥的更新方法、核心网节点及无线接入系统
CN101909292B (zh) 2010-08-18 2016-04-13 中兴通讯股份有限公司 空中接口密钥的更新方法、核心网节点及用户设备
CN101902738B (zh) * 2010-08-18 2016-03-30 中兴通讯股份有限公司 空中接口密钥的更新方法、装置及无线接入系统

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040203783A1 (en) * 2002-11-08 2004-10-14 Gang Wu Wireless network handoff key
CN1633762A (zh) * 2002-02-16 2005-06-29 Lg电子株式会社 用于再定位srns的方法

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1633762A (zh) * 2002-02-16 2005-06-29 Lg电子株式会社 用于再定位srns的方法
US20040203783A1 (en) * 2002-11-08 2004-10-14 Gang Wu Wireless network handoff key

Also Published As

Publication number Publication date
CN101128033A (zh) 2008-02-20
CN101128033B (zh) 2011-04-20
RU2009109590A (ru) 2010-09-27
RU2423005C2 (ru) 2011-06-27

Similar Documents

Publication Publication Date Title
JP4066371B2 (ja) Umtsにおけるセキュリティ再構成
JP5718271B2 (ja) 通信システムの同期方法
KR101507482B1 (ko) Lte 모바일 유닛에서의 비접속 계층(nas) 보안을 가능하게 하는 방법 및 장치
US20200280848A1 (en) Security Key Usage Across Handover That Keeps The Same Wireless Termination
KR101147067B1 (ko) 키 파생 방법, 장치 및 시스템
JP6016643B2 (ja) 無線電気通信における暗号化
JP2007306564A (ja) 無線通信システムにおいて暗号化起動時間を設定する方法及び装置
TWM360523U (en) Activating and deactivating packet data convergence protocol WTRU
TW200847678A (en) Method for processing radio protocol in mobile telecommunications system and transmitter of mobile telecommunications
KR20090108560A (ko) 핸드오버 절차를 처리하는 방법 및 장치
WO2012171281A1 (fr) Procédé de modification de paramètre de sécurité, et station de base
WO2014110908A1 (fr) Procédé de transmission de données sécurisée et système de réseau d'accès lte
WO2007131451A1 (fr) Procédé, dispositif et système d'initialisation de cryptage côté utilisateur
WO2008022498A1 (fr) Procédé servant à modifier l'algorithme de cryptage en réadressage
JP4980251B2 (ja) 通信システム、そのユーザ装置、及びその同期方法
JP2004173261A (ja) 移動通信システムの転送情報暗号化及び暗号化解除装置及びその方法
WO2011095077A1 (fr) Procédé, système et appareil pour gérer une clé de mappage d'interface radio dans un système de communication sans fil
WO2011147154A1 (fr) Procédé et système permettant de mettre en œuvre la synchronisation d'un algorithme de sécurité de couche d'accès
WO2014111049A1 (fr) Dispositif et procédé d'optimisation de cellule
WO2015006980A1 (fr) Procédé et appareil de traitement de paramètres de chiffrement
WO2013020420A1 (fr) Procédé d'activation de clé de sécurité, nœud de réseau d'accès, équipement utilisateur et système
WO2016019586A1 (fr) Dispositif de mise à jour d'élément de flux de clés de cryptage, procédé et système de connexion double

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 06840706

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 1766/DELNP/2009

Country of ref document: IN

ENP Entry into the national phase

Ref document number: 2009109590

Country of ref document: RU

Kind code of ref document: A

122 Ep: pct application non-entry in european phase

Ref document number: 06840706

Country of ref document: EP

Kind code of ref document: A1