WO2014101214A1 - Procédé et dispositif de décodage - Google Patents

Procédé et dispositif de décodage Download PDF

Info

Publication number
WO2014101214A1
WO2014101214A1 PCT/CN2012/088101 CN2012088101W WO2014101214A1 WO 2014101214 A1 WO2014101214 A1 WO 2014101214A1 CN 2012088101 W CN2012088101 W CN 2012088101W WO 2014101214 A1 WO2014101214 A1 WO 2014101214A1
Authority
WO
WIPO (PCT)
Prior art keywords
data packet
type
encrypted data
encrypted
predicted
Prior art date
Application number
PCT/CN2012/088101
Other languages
English (en)
Chinese (zh)
Inventor
吴宁
朱有团
郭房富
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2012/088101 priority Critical patent/WO2014101214A1/fr
Priority to CN201280002790.6A priority patent/CN103404101B/zh
Publication of WO2014101214A1 publication Critical patent/WO2014101214A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Definitions

  • the present invention relates to the field of communications and, more particularly, to a method and apparatus for decoding. Background technique
  • IP-based services such as web browsing and video on demand account for an increasing proportion of network traffic of terminals.
  • network browsing and video on demand services bring new demands such as higher speed and shorter delay to mobile networks, and these services themselves also present new features.
  • These services require a large downlink transmission rate, but for the uplink, it is usually mainly to feed back a large number of TCP/IP acknowledgment small packets for downlink transmission, and a small part of these packets are attached with a small amount of content on the TCP/IP header. Most of them only include TCP/IP headers.
  • the TCP/IP header has a lot of fixed information, such as the source address in the IP header and some fixed padding fields. These fixed information contain a wealth of known information that can be utilized, but the received data packets are encrypted by the upper layer, and the known information is unknown to the physical layer on the base station side, and cannot be physically located on the base station side. Auxiliary decoding is performed using these encrypted known information.
  • the physical layer is simply considered to be all 0s or all 1s. If it is encrypted, it is no longer all 0s or all 1s, and auxiliary decoding cannot be performed.
  • Embodiments of the present invention provide a decoding method and a decoding apparatus, which can improve the efficiency of decoding using known information bits.
  • a decoding method including: acquiring a first type of encrypted data packet, wherein the first type of encrypted data packet is encrypted known information bit information, and the first type of encrypted data packet is from a wireless chain. a layer control (Radio Link Control, referred to as "RLC") layer; receiving a second type of encrypted data packet, predicting an SN of the second type of encrypted data packet; according to the predicted SN, using the first type of encrypted data packet The second type of encrypted data packet is decoded by the encrypted known information bit information.
  • RLC Radio Link Control
  • the method before the obtaining the first type of encrypted data packet, the method further The method includes: generating, in the RLC layer entity, a cipher stream corresponding to the SN according to each SN in the SN group corresponding to the RLC entity, and encrypting the known information bit information by using the cipher stream to obtain the first type of encrypted data. package.
  • the method further includes: determining whether the second type of encrypted data packet is the data packet of the attention type; and when the determining result is the second type of encrypted data packet For the type of interest packet, the SN corresponding to the known information bit in the second type of encrypted data packet is predicted.
  • the method further includes: determining whether the second type of the encrypted data packet is the data packet of the attention type; When the second type of encrypted data packet is the data packet of the attention type, the SN group corresponding to the RLC entity having the highest probability of occurrence in the upper receiving period is selected, and then the corresponding information bit in the second type of encrypted data packet is predicted. SN.
  • the predicting the SN of the second type of encrypted data packet includes: determining the second Whether the class-encrypted data packet is a new transmission; when it is determined whether the second type of the encrypted data packet is a new transmission, and the second type of the encrypted data packet is a new transmission, determining the second type of the encrypted data packet Whether a second type of encrypted data packet is correctly received; when the judgment result of determining whether the previous second type of encrypted data packet of the second type of encrypted data packet is correctly received is that the previous second type of encrypted data packet is correctly received, Predicting that the SN is 1 for the SN of the previous second type of encrypted data packet or predicting that the SN is 1 for the SN of the previous second type of encrypted data packet and modulo the SN.
  • the determination result is The previous second type of encrypted data packet is not correctly received, and the number n of the second type of encrypted data packet between the second type of encrypted data packet and the previously correctly received second type of encrypted data packet is predicted, and the known information is predicted.
  • the SN of the bit packet is the SN of the previously correctly received second type of encrypted data packet plus the n plus 1 or the SN of the previously correctly received second type of encrypted data packet is incremented by 1 and overfilled and modulo .
  • the second type of encrypted data packet when determining whether the second type of encrypted data packet is a new transmission, the second type of encrypted data packet is not new.
  • the SN of the data packet predicting the known information bit is the predicted SN of the first type of encrypted data packet.
  • the SN according to the prediction, using the first type of encrypted data packet includes: selecting a first type of encrypted data packet corresponding to the predicted SN; and using the known information bit on the first type of encrypted data packet The information assists in decoding the second type of encrypted data packet.
  • a decoding apparatus including: a receiving module, configured to acquire a first type of encrypted data packet, where the first type of encrypted data packet is encrypted known information bit information, The first type of encrypted data packet is from the RLC layer, and is also used to receive the second type of encrypted data packet, the second type of encrypted data packet is from the physical layer of the transmitting end, and the processing module is configured to predict the SN of the second type of encrypted data packet; a code module, configured to decode the second type of encrypted data packet by using the encrypted known information bit information in the first type of encrypted data packet according to the predicted SN
  • the method further includes: a storage module, configured to store the first type of encrypted data packet and the second type of encrypted data packet.
  • the first type of encrypted data packet is generated by the RLC layer, including: in the RLC layer entity, based on the RLC Each SN in the SN group corresponding to the entity generates a cipher stream corresponding to the SN, and encrypts the known information bit information by using the cipher stream to obtain the first type of encrypted data packet.
  • the processing module predicts The SN of the packet of the known information bit.
  • the processing module is further configured to: when using the basic decoding manner to the second The class encryption data packet is decoded incorrectly.
  • the first type of encrypted data packet corresponds to multiple RLC entities
  • the SN group corresponding to the RLC entity predicts the SN corresponding to the known information bit in the second type of encrypted data packet.
  • the processing module is further configured to determine whether the second type of encrypted data packet is combined with the second aspect or the first to fourth possible implementation manners of the second aspect For the new transmission; when it is determined whether the second type of encrypted data packet is a new transmission, and the second type of encrypted data packet is a new transmission, determining the second type of encryption of the second type of encrypted data packet Whether the data packet is correctly received; when the judgment result of determining whether the previous second type encrypted data packet of the second type of encrypted data packet is correctly received is that the previous second type encrypted data packet is correctly received, predicting the SN is the The SN of the previous second type of encrypted data packet is incremented by 1 or the SN is predicted to be 1 for the SN of the previous second type of encrypted data packet and is oversampled.
  • the processing module is further configured to: when determining the second type of encrypted data
  • the judgment result of whether the previous second type of encrypted data packet of the packet is correctly received is that the previous second type of encrypted data packet is not correctly received, and the second type of encrypted data packet and the second correctly received second type of encrypted data are predicted.
  • the number of encrypted packets of the second type between the packets is n, and the SN is predicted to be the SN of the previously correctly received second type of encrypted data packet plus the n plus one.
  • the second aspect or the first to the sixth possible implementation manner of the second aspect when determining whether the second type of encrypted data packet is a new transmission The result is that when the second type of encrypted data packet is not newly transmitted, the SN is predicted to be the predicted SN of the second type of encrypted data packet.
  • the decoding module is further configured to: select the corresponding SN corresponding to the second aspect, or any one of the first to the seventh possible implementation manners of the second aspect A type of encrypted data packet; assisting decoding of the second type of encrypted data packet by using the known information bit information on the first type of encrypted data packet.
  • a third aspect provides a decoding apparatus, including: a receiver, configured to acquire a first type of encrypted data packet, where the first type of encrypted data packet is encrypted known information bit information, the first type of encryption The data packet is from the RLC layer, and is further configured to receive a second type of encrypted data packet, the second type of encrypted data packet is from a physical layer of the transmitting end, and a processor is configured to predict a SN of the second type of encrypted data packet, and is further configured to The predicted SN, decoding the second type of encrypted data packet by using the encrypted known information bit information in the first type of encrypted data packet
  • the method further includes: a memory, configured to store the first type of encryption The data packet and the second type of encrypted data packet.
  • the first type of encrypted data packet is generated by the RLC layer, including: in the RLC layer entity, based on the RLC Each SN in the SN group corresponding to the entity generates a cipher stream corresponding to the SN, and encrypts the known information bit information by using the cipher stream to obtain the first type of encrypted data packet.
  • the processor is further configured to: when the second type of encrypted data is used in a basic decoding manner Packet decoding error, when the first type of encrypted data packet corresponds to an RLC entity, determining whether the second type of encrypted data packet is the data packet of the attention type; the judgment result is that the second type of encrypted data packet is the data of the attention type At the time of the packet, the processor predicts the SN of the packet of the known information bit.
  • the processor is further configured to: when using the basic decoding manner to the second The class encryption data packet is decoded incorrectly.
  • the first type of encrypted data packet corresponds to multiple RLC entities
  • the SN group corresponding to the RLC entity having the highest probability of occurrence in the upper receiving time is selected, and the SN corresponding to the known information bit in the second type of encrypted data packet is predicted.
  • the processor is further configured to: determine whether the second type of encrypted data packet is For the new transmission; when it is determined whether the second type of encrypted data packet is a new transmission, and the second type of encrypted data packet is a new transmission, determining the second type of encryption of the second type of encrypted data packet Whether the data packet is correctly received; when the judgment result of determining whether the previous second type encrypted data packet of the second type of encrypted data packet is correctly received is that the previous second type encrypted data packet is correctly received, predicting the SN is the The SN of the previous second type of encrypted data packet is incremented by 1 or the SN is predicted to be 1 for the SN of the previous second type of encrypted data packet and is oversampled.
  • the processor is further configured to: when determining the second type of encrypted data
  • the judgment result of whether the previous second type of encrypted data packet of the packet is correctly received is that the previous second type of encrypted data packet is not correctly received, and the second type of encrypted data packet and the second correctly received second type of encrypted data are predicted.
  • the number of encrypted packets of the second type between the packets is n, and the SN is predicted to be the SN of the previously correctly received second type of encrypted data packet plus the n plus one.
  • a seventh possible implementation in combination with the third aspect or the first to sixth possible implementation manners of the third aspect, when determining whether the second type of encrypted data packet is a new transmission The result is that when the second type of encrypted data packet is not newly transmitted, the SN is predicted to be the predicted SN of the second type of encrypted data packet.
  • the processor is further configured to: select the first corresponding to the predicted SN Class-encrypting data packet; assisting decoding of the second type of encrypted data packet by using the known information bit information on the first type of encrypted data packet.
  • the physical layer in order to improve the decoding efficiency of the physical layer, can use the encrypted known information bits to decode, and predict the SN of the second type of encrypted data packet at the physical layer, thereby high probability.
  • the known information bits in the first type of encrypted information corresponding to the SN are found, and the encrypted data packet is decoded by using the information on the known information bits. Thereby effectively improving the decoding speed and improving the decoding performance.
  • FIG. 1 is a schematic flow chart of a method of decoding according to an embodiment of the present invention.
  • FIG. 2 is a schematic block diagram of a decoding apparatus according to an embodiment of the present invention.
  • FIG. 3 is another schematic block diagram of a decoding apparatus according to an embodiment of the present invention. detailed description
  • FIG. 1 shows a schematic flow diagram of a method 100 of coding in accordance with an embodiment of the present invention.
  • the method of Figure 1 is performed at the physical layer.
  • the method 100 includes: S110. Acquire a first type of encrypted data packet, where the first type of encrypted data packet is encrypted known information bit information, where the first type of encrypted data packet is from a radio link control (Radio Link Control, referred to as "RLC").
  • RLC Radio Link Control
  • the physical layer may use the encrypted known information bits for decoding, and predict the SN of the second type of encrypted data packet at the physical layer, thereby finding a high probability.
  • the known information bit in the first type of encrypted information corresponding to the SN, and the encrypted data packet is decoded by using the information on the known information bit.
  • a first type of encrypted data packet is obtained, and the first type of encrypted data packet is encrypted known information bit information, and the first type of encrypted data packet is from an RLC layer.
  • the physical layer obtains the first type of encrypted data packet obtained by interacting with the RLC layer, and the first type of encrypted data packet is obtained by encrypting the data packet at the RLC layer.
  • the data packet part of the information bits are fixed, and the fixed information bits are called known information bits.
  • the physical layer deletes the encrypted information bits of the known information bits corresponding to the SN of the data packet in the information layer of the physical layer for the correctly received first type of encrypted data packet.
  • the method 100 further includes:
  • S140 in the RLC layer entity, generate a cipher stream corresponding to the SN based on each SN in the SN group corresponding to the RLC entity, and encrypt the known information bit information by using the cipher stream to obtain the first type of encrypted data. package.
  • S140 includes:
  • each RLC entity has its corresponding SN group.
  • Each SN group consists of several SNs.
  • the RLC entity is different, and the SN group is different.
  • a cipher stream corresponding to the SN is generated for each SN in the SN group. This password stream is used to encrypt the data packet.
  • the known information bits are respectively encrypted by the cipher stream in the RLC layer to generate encrypted known information, and the encrypted known information is the first type of encrypted data packet.
  • the known bit information is encrypted by the cipher stream, and there are various encryption methods, for example. If the known bit information is XORed bit by bit using the cipher stream, the encrypted first type encrypted data packet can be obtained.
  • the RLC layer transmits the first type of encrypted data packet to the physical layer in interactive communication.
  • the SN of the second type of encrypted data packet is predicted, and the second type of encrypted data packet is from the physical layer of the transmitting end.
  • the second type of encrypted data packet is from a physical layer of the transmitting end, and the second type of encrypted data packet is also encrypted at the RLC layer.
  • the SN of the second type of encrypted data packet wherein the SN is in the first type of encrypted data packet, and the known information bit corresponding to the SN is the same as or related to the known information bit included in the second type of encrypted number packet corresponding to the SN. correspond.
  • S120 includes,
  • S121. Determine whether the second type of encrypted data packet is a new transmission.
  • the first type of encrypted data packets are transmitted by the RLC layer to the physical layer through the RLC layer and the physical layer.
  • the second type of encrypted data packet is transmitted by the transmitting end from the physical layer to the receiving end of the physical layer by the transmission channel, and is decoded at the receiving end.
  • the first type of encrypted data packet and the second type of encrypted data packet contain the same known bit. Since the second type of encrypted data packet passes through the transmission channel, it may be interfered by other factors such as noise, and the first type of encrypted data may also be utilized.
  • the known information bits in the packet decode the second type of encrypted data packet.
  • the physical layer of the sending end sends the second type of encrypted data packet to the receiving end.
  • the transmitting end resends the second type of encrypted data packet that failed to be received.
  • the second type of encrypted data packet is newly transmitted.
  • a receiving state of the second type of encrypted data packet received by the receiving end is stored, where the receiving state indicates whether the received second type of encrypted data packet is successfully received, according to the indication information, If the received second type of data packet is not recorded as receiving failure at the receiving end, it may be determined that the second type of encrypted data packet is a new transmission, and when the received second type of data packet is recorded as receiving failure at the receiving end, It is determined that the second type of encrypted data packet is a retransmission, not a new one.
  • S120 further includes
  • the SN of the second type of encrypted data packet is predicted to be the last time of the second type.
  • the predicted SN of the encrypted packet indicates that the first time the encrypted data packet is transmitted to the receiving end of the physical layer, the receiving end fails to resend the second type of encrypted data packet, and the physical layer receiving end receives the first time.
  • the second type of encrypted data packet has been predicted SN by the second type of encrypted data packet.
  • the prediction step refers to step S120, and the physical layer receiving end receives the second type encrypted data packet retransmitted by the physical layer sending end.
  • the SN of the data packet predicting the known information bit is the last predicted SN of the second type of encrypted data packet.
  • S120 further includes
  • S120 further includes
  • S120 further includes
  • S123b in S122b, determining a previous second type of data packet of the second type of encrypted data packet, and determining whether the previous second type data packet of the second type of encrypted data packet is correctly received is the encryption
  • the previous second type of data packet of the data packet is not correctly received, and the number of SNs between the encrypted data packet and the previously correctly received second type data packet is predicted, and the predicted SN is the previous correctly received data.
  • the prediction when the prediction is performed for the first time, in the case that there is no previous second type of data packet or there is no second type of encrypted data packet received correctly, the previous one is The SN of the second type of data packet is 0 or the SN of the second type of encrypted data packet received correctly is 0.
  • the method 100 further includes: S150.
  • S150 When the encrypted data packet is from an RLC entity, determining whether the encrypted data packet is a data packet of interest type; The result is that the SN is predicted when the encrypted data packet is a type of interest packet.
  • the attention type data packet refers to a data packet containing a rich amount of known bit information in the data packet, for example A TCP ACK packet, or a data packet with additional information bits added to the data with known bit information.
  • the type of interest packet is the data packet to be encrypted.
  • the TCPACK packet in the current network is 354 bits, and it is judged whether it is a type packet of interest according to the packet size. For the received data packet, if the data packet size is 354 bits, it can be assisted to decode when the basic decoding algorithm fails.
  • the TCP header will also appear 32bytes and 44bytes.
  • the entire TCPACK will be split into two 354bits packets, and the second packet will be composed of the remaining information of the TCP header and additional information bits.
  • the known information of the packet is considered to be TCP ACK.
  • the known information in the second packet of the packet is the known information in the first packet of the TCPACK packet.
  • the method 100 further includes: S160.
  • S160 When the encrypted data is from multiple RLC entities, the SN of the data packet of the known information bit in the encrypted data packet is predicted. Previously, it also included:
  • the RLC entity with the highest probability of occurrence in the upper receiving period is selected, and the receiving time of the upper segment can be selected according to the specific application scenario.
  • the attention type data packet refers to a data packet in which the data packet contains rich known bit information, such as a TCP ACK packet, or a data packet in which additional information bits are added with known bit information.
  • the type packet is the packet to be encrypted.
  • the TCPACK packet in the current network is 354 bits, and it is judged whether it is a type packet of interest according to the packet size. For the received data packet, if the data packet size is 354 bits, it can be assisted to decode when the basic decoding algorithm fails.
  • the TCP header will also appear 32bytes and 44bytes.
  • the entire TCPACK will be split into two 354bits packets, and the second packet will be composed of the remaining information of the TCP header and additional information bits.
  • the known information of the packet is considered to be TCP ACK.
  • the known information in the second packet of the packet is the known information in the first packet of the TCPACK packet.
  • the judgment result is that the encrypted data packet is the TCP ACK and/or with additional information bits.
  • the prediction step is as described in S120, and will not be described here.
  • the data packets corresponding to other RLC entities can be selected one by one.
  • S130 includes,
  • S130 includes,
  • Auxiliary decoding is to decode using known information bits, optionally
  • the Bit identified as known information is mapped to the infinity value of the corresponding polarity of the demodulated LLR or set to some The saturation value is added or replaced to the system bit corresponding to the demodulation LLR.
  • the Bit identified as known information is mapped to an infinity value of the corresponding polarity of the demodulated LLR or a set saturation value, and the value is added or replaced to the corresponding system bit.
  • this replacement or addition process may be performed each time the component decoder decodes, or may initialize the prior information before the decoding starts.
  • the physical layer may use the encrypted known information bits for decoding, and predict the SN of the second type of encrypted data packet at the physical layer, thereby finding a high probability.
  • the known information bit in the first type of encrypted information corresponding to the SN, and the encrypted data packet is decoded by using the information on the known information bit.
  • the size of the sequence numbers of the above processes does not mean the order of execution, and the order of execution of each process should be determined by its function and internal logic, and should not be taken to the embodiments of the present invention.
  • the implementation process constitutes any limitation.
  • FIG. 2 shows a schematic block diagram of a decoding device 200 in accordance with an embodiment of the present invention.
  • the apparatus disclosed in FIG. 2 and its description may be based on the embodiment of the present invention and the method of decoding based on the embodiment of the present invention.
  • the decoding device 200 may correspond to a method of decoding according to an embodiment of the present invention, and the above and other operations and/or functions of the respective modules in the decoding device 200 are respectively Corresponding processes for implementing the various methods in FIG. 1 are omitted for brevity.
  • the decoding device includes:
  • a receiving module configured to obtain a first type of encrypted data packet, where the first type of encrypted data packet is encrypted known information bit information, the first type of encrypted data packet is from the RLC layer, and is further configured to receive the second type of encrypted data packet. Packet, the second type of encrypted data packet is from the physical layer of the transmitting end;
  • a processing module configured to predict a SN of the second type of encrypted data packet
  • a decoding module configured to decode the second type of encrypted data packet by using the encrypted known information bit information in the first type of encrypted data packet according to the predicted SN.
  • the decoding apparatus may further include: a storage module, configured to store the first type of encrypted data packet and the second type of encrypted data packet.
  • the first type of encrypted data packet is generated by the RLC layer, and includes:
  • a cipher stream corresponding to the SN is generated based on each SN in the SN group corresponding to the RLC entity, and the known information bit information is encrypted by using the cipher stream to obtain the first type of encrypted data packet.
  • the processing module is further configured to: when the second type of encrypted data packet is decoded by a basic decoding manner, and the first type of encrypted data packet corresponds to an RLC entity, determine whether the second type of encrypted data packet is For the type of interest packet;
  • the processing module predicts the SN of the data packet of the known information bit.
  • the processing module is further configured to: when the second type of encrypted data packet is decoded by a basic decoding manner, and the first type of encrypted data packet is stored by the plurality of RLC entities, determine the second type of encrypted data. Whether the packet is the data packet of the attention type; the judgment result is that when the second type of encrypted data packet is the data packet of the attention type, the SN group corresponding to the RLC entity having the highest probability of occurrence in the upper receiving time is selected, and the first The SN corresponding to the known information bit in the second type of encrypted data packet.
  • the processing module is further configured to: determine whether the second type of encrypted data packet is a new transmission; and determine, according to whether the second type of the encrypted data packet is a new transmission, the second type of encrypted data packet When it is a new transmission, it is judged whether the previous second type of encrypted data packet of the second type of encrypted data packet is correctly received.
  • the result of the determination is that the previous second type of encrypted data packet is correctly received, and the SN is predicted to be the previous second type.
  • the SN of the encrypted data packet is incremented by 1 or the SN is predicted to be the previous second type of encryption number. According to the package SN plus 1 and add over the modulo.
  • the processing module is further configured to: when determining whether the previous second type of encrypted data packet of the second type of encrypted data packet is correctly received, determining that the previous second type of encrypted data packet is not correctly received Predicting the number n of the second type of encrypted data packets between the second type of encrypted data packet and the second correctly received second type of encrypted data packet, and predicting that the SN is the second correctly received second type encrypted data packet. SN plus the n plus one.
  • predicting the SN is a prediction of the second type of the encrypted data packet.
  • the decoding module is further configured to: select the first type of encrypted data packet corresponding to the predicted SN;
  • the second type of encrypted data packet is assisted by the known information bit information on the first type of encrypted data packet.
  • the step of assisting decoding may be referred to in S130 in the method embodiment of the present invention, and is not described here.
  • the decoding device 200 disclosed in the embodiment of the present invention may be located in various devices including the base station in the physical layer, or different modules may be located in different devices in the physical layer, which is not limited by the present invention.
  • the physical layer may use the encrypted known information bits for decoding, and predict the SN of the second type of encrypted data packet at the physical layer, thereby finding a high probability.
  • the known information bit in the first type of encrypted information corresponding to the SN, and the encrypted data packet is decoded by using the information on the known information bit.
  • FIG. 3 shows a schematic block diagram of a decoding device 300 in accordance with an embodiment of the present invention.
  • the apparatus disclosed in FIG. 3 and its description may be based on the embodiment of the present invention and the method of decoding based on FIG. 1 of the embodiment of the present invention, and the apparatus disclosed based on FIG.
  • the decoding device 300 may correspond to a method of decoding according to an embodiment of the present invention, and the above and other operations and/or functions of the respective devices in the decoding device 300 are respectively implemented in order to implement each of FIG. The corresponding process of the method, for the sake of brevity, will not be repeated here.
  • the decoding device includes:
  • a receiver configured to obtain a first type of encrypted data packet, where the first type of encrypted data packet is encrypted known information bit information, the first type of encrypted data packet is from the RLC layer, and is also used to receive the second type of encrypted data packet. Packet, the second type of encrypted data packet is from the physical layer of the transmitting end; a processor, configured to predict a SN of the second type of encrypted data packet, and configured to use the encrypted known information bit information in the first type of encrypted data packet to encrypt the second type of encrypted data packet according to the predicted SN Perform decoding.
  • the decoding apparatus may further include: a memory, configured to store the first type of encrypted data packet and the second type of encrypted data packet.
  • the first type of encrypted data packet is generated by the RLC layer, and includes:
  • the cryptographic stream corresponding to the SN is used to encrypt the known information bit information to obtain the first type of encrypted data packet.
  • the processor is further configured to: when the second type of encrypted data packet is decoded by a basic decoding manner, and the first type of encrypted data packet corresponds to an RLC entity, determine whether the second type of encrypted data packet is For the type of interest packet;
  • the processor predicts the SN of the data packet of the known information bit.
  • the processor is further configured to: when the second type of encrypted data packet is decoded by a basic decoding manner, and the first type of the encrypted data packet is corresponding to the plurality of RLC entities, determine the second type of encrypted data. Whether the packet is the data packet of the attention type; the judgment result is that when the second type of encrypted data packet is the data packet of the attention type, the SN group corresponding to the RLC entity having the highest probability of occurrence in the upper receiving time is selected, and the first The SN corresponding to the known information bit in the second type of encrypted data packet.
  • the processor is further configured to: determine whether the second type of encrypted data packet is a new transmission; and determine, according to whether the second type of the encrypted data packet is a new transmission, the second type of the encrypted data packet When it is a new transmission, it is judged whether the previous second type of encrypted data packet of the second type of encrypted data packet is correctly received.
  • the result of the determination is that the previous second type of encrypted data packet is correctly received, and the SN is predicted to be the previous second type.
  • the SN of the encrypted data packet is incremented by 1 or the SN is predicted to be 1 for the SN of the previous second type of encrypted data packet, and the modulo is added.
  • the processor is further configured to: when determining whether the previous second type of encrypted data packet of the second type of encrypted data packet is correctly received, determining that the previous second type of encrypted data packet is not correctly received Predicting the number n of the second type of encrypted data packets between the second type of encrypted data packet and the second correctly received second type of encrypted data packet, and predicting that the SN is the second correctly received second The SN of the class-encrypted data packet is incremented by one.
  • predicting the SN is a prediction of the second type of the encrypted data packet.
  • the processor is further configured to: select the first type of encrypted data packet corresponding to the predicted SN; and use the known information bit information on the first type of encrypted data packet to perform the second type of encrypted data packet.
  • Auxiliary decoding may be referred to in S130 in the method embodiment of the present invention, and is not described here.
  • the decoding device 300 disclosed in the embodiment of the present invention may be located in various devices of the physical layer including the base station, or different devices may be located in different devices of the physical layer, which is not limited by the present invention.
  • the physical layer in order to improve the decoding efficiency of the physical layer, the physical layer may use the encrypted known information bits for decoding, and predict the SN of the second type of encrypted data packet at the physical layer, thereby finding a high probability.
  • the known information bit in the first type of encrypted information corresponding to the SN, and the encrypted data packet is decoded by using the information on the known information bit. Thereby, the decoding speed is effectively improved, and the decoding performance is improved.
  • the term "and/or” is merely an association describing the associated object, indicating that there may be three relationships.
  • a and / or B can mean: A exists separately, there are A and B, and there are three cases of B alone.
  • the character "/" in this article generally indicates that the contextual object is an "or" relationship.
  • the disclosed systems, devices, and The method can be implemented in other ways.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, or an electrical, mechanical or other form of connection.
  • the components displayed for the unit may or may not be physical units, ie may be located in one place, or may be distributed over multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the embodiments of the present invention.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium.
  • the technical solution of the present invention contributes in essence or to the prior art, or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium.
  • a number of instructions are included to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present invention.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk or an optical disk, and the like. The medium of the code.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Communication Control (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

La présente invention décrit, dans un mode de réalisation, un procédé et un dispositif de décodage, le procédé comprenant : l'acquisition d'un premier paquet de données chiffrées, le premier paquet de données chiffrées étant des informations de bits d'information chiffrées connues provenant d'une couche RLC; la prédiction du SN d'un second paquet de données chiffrées, le second paquet de données chiffrées provenant de la couche physique d'un terminal de transmission; l'utilisation des informations de bits d'information connues chiffrées du premier paquet de données chiffrées pour décoder le second paquet de données chiffrées selon le SN prédit. Le procédé et le dispositif de décodage dans le mode de réalisation de la présente invention peuvent utiliser plus efficacement les informations de bits d'information connues pour le décodage, améliorant ainsi l'efficacité du décodage.
PCT/CN2012/088101 2012-12-31 2012-12-31 Procédé et dispositif de décodage WO2014101214A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2012/088101 WO2014101214A1 (fr) 2012-12-31 2012-12-31 Procédé et dispositif de décodage
CN201280002790.6A CN103404101B (zh) 2012-12-31 2012-12-31 译码的方法和装置

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2012/088101 WO2014101214A1 (fr) 2012-12-31 2012-12-31 Procédé et dispositif de décodage

Publications (1)

Publication Number Publication Date
WO2014101214A1 true WO2014101214A1 (fr) 2014-07-03

Family

ID=49565860

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2012/088101 WO2014101214A1 (fr) 2012-12-31 2012-12-31 Procédé et dispositif de décodage

Country Status (2)

Country Link
CN (1) CN103404101B (fr)
WO (1) WO2014101214A1 (fr)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101199158A (zh) * 2005-04-26 2008-06-11 高通股份有限公司 在无线通信系统中对包进行加密和重新排序
CN101795184A (zh) * 2010-01-27 2010-08-04 华为终端有限公司 内存管理方法和装置

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2809579B1 (fr) * 2000-05-23 2003-07-04 Nortel Matra Cellular Procede de controle d'un canal entre un terminal radio et une infrastructure de radiocommunication cellulaire, et reseau d'acces mettant en oeuvre un tel procede
CN100370853C (zh) * 2004-09-21 2008-02-20 华为技术有限公司 一种无线接入网络及其通信方法
CN1917411B (zh) * 2005-08-16 2012-03-07 中兴通讯股份有限公司 一种实现多载波高速下行分组接入的系统和方法

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101199158A (zh) * 2005-04-26 2008-06-11 高通股份有限公司 在无线通信系统中对包进行加密和重新排序
CN101795184A (zh) * 2010-01-27 2010-08-04 华为终端有限公司 内存管理方法和装置

Also Published As

Publication number Publication date
CN103404101A (zh) 2013-11-20
CN103404101B (zh) 2015-11-25

Similar Documents

Publication Publication Date Title
US8276035B1 (en) High performance digital communications resiliency in a roamable virtual private network
KR101370901B1 (ko) 이동 통신 시스템에서의 통신 방법
US8004992B2 (en) Adding hybrid ARQ to WLAN protocols with MAC based feedback
EP2437421B1 (fr) Procédé, dispositif et système de communication pour retransmission fondée sur correction d'erreur sans voie de retour
US20090319850A1 (en) Local drop control for a transmit buffer in a repeat transmission protocol device
CN106899390B (zh) 基于harq传输的方法、装置及系统
JP4608000B2 (ja) セキュアで帯域効率の良い暗号化同期方法
JP5392102B2 (ja) 無線ネットワークにおいてオーバヘッドを低減する装置及び方法
WO2016070790A1 (fr) Procédé et dispositif de renvoi d'informations d'accusé de réception harq
JP5598018B2 (ja) 無線ネットワーク内のオーバーヘッドを縮小するシステム及び方法
US20170142077A1 (en) Data encryption and transmission method and apparatus
EP2782281A1 (fr) Transmission de données en utilisant codage sans débit
EP3637657B1 (fr) Procédé de communication, dispositif de réseau et terminal
TW200935801A (en) Hierarchical CRC scheme
US11477170B2 (en) Decoding method and apparatus
Du et al. Security enhancement for multicast over internet of things by dynamically constructed fountain codes
JP2017508408A (ja) データ送信及びフィードバック処理方法並びに装置
CN114513418B (zh) 一种数据处理方法及相关设备
US8631313B2 (en) Method of error detection for wireless transmission
KR20100081902A (ko) 랜덤선형부호화를 사용한 데이터 송수신 방법
WO2015077960A1 (fr) Procédé et dispositif de transmission de paquet de données
WO2014101214A1 (fr) Procédé et dispositif de décodage
Konduru et al. Huffman Coding and Multi-Generation Mixing Assisted Network Coding Based MAC for QoS-Centric Secure Data Communication over MANETs
EP3128717B1 (fr) Système de communication, dispositif de transmission, procédé de communication, et programme
KR20200102029A (ko) 사물 인터넷 통신에서 협력 재전송 방법 및 그 장치

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12890873

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 12890873

Country of ref document: EP

Kind code of ref document: A1