Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method for realizing information encryption transmission in wireless communication system

A wireless communication system and information encryption technology, which is applied in the field of information encryption transmission in wireless communication systems, can solve the problems of difficulty in prohibiting illegal access, no solution, hidden dangers, etc., and achieves low processing capacity requirements and small changes. , the effect of confidentiality performance guarantee

Inactive Publication Date: 2008-12-10
SHENZHEN TINNO WIRELESS TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] In addition, due to the long distance between the base station and the base station controller in the cluster communication network, it is difficult to prohibit illegal personnel from physically accessing through the Abis interface; Big security risk
[0011] Therefore, solving the encryption problem of the Abis interface of the trunking system based on the GSM system is a problem that needs to be solved first before popularizing the system, but there is no corresponding solution at present

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing information encryption transmission in wireless communication system
  • Method for realizing information encryption transmission in wireless communication system
  • Method for realizing information encryption transmission in wireless communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The core of the method of the present invention is to use a predetermined encryption mode on the TRAU and the base station channel baseband processing unit to encrypt the service flow to be transmitted, and to decrypt the received service flow to obtain the restored service flow . In this way, the voice or service data of the Abis interface of the digital trunking system based on the GSM system is encrypted, so as to effectively prevent the calls between trunking users in the trunking system from being monitored at the Abis interface

[0051] That is, in the present invention, when it is necessary to carry out voice or data service communication on the Abis interface, the corresponding encryption process is enabled, and the data carried by the TRAU frame transmitted between the specific TRAU and the specific base station channel baseband processing unit Encrypt so that the code stream of the voice service and data service transmitted on the Abis interface is an encrypte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A kind of information ciphering transmission method in the wireless communication system, which includes: first, allocate the encryption pattern information separately to the base station and the transcoder and rate adapter unit TRAU in the wireless communication system; and then, when the base station need to proceed information interactive with TRAU, encrypt the information which is to be alternated with the allocated encryption pattern information between the base station and TRAU. This invention can encrypt the voice service or data service code stream which is transmitted at Abis interface in the voice service or data service processing procedure of the GSM digital cluster system, thus can prevent to look through voice service or data service at Abis interface effectively. The encryption algorithm which is selected by the invention is simple, thus, the required processing capacity of the interface bilateral baseband processing unit is low and implementation procedure's complexity unit is low and the modification to the original transaction processing is less.

Description

technical field [0001] The invention relates to the technical field of network communication, in particular to a method for realizing encrypted transmission of information in a wireless communication system. Background technique [0002] At present, due to the different technical systems adopted by the cluster private network, the development of the cluster communication network adopts the idea of ​​cluster private network construction. Disadvantages such as high cost and network maintenance costs. For this reason, with the development of trunking communication technology from analog to digital, the construction of trunking network presents a development direction from independent private network construction to cluster common network construction. [0003] Since the GSM system has the most extensive user base in the world, and Europe has formulated a set of international standard GSM-R for railway mobile trunking communication, GSM-R uses GSM communication technology as th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04Q7/30H04W12/02
CPCH04L63/0428H04W12/03
Inventor 夏志立
Owner SHENZHEN TINNO WIRELESS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products