Method for producing long code mask for cluster service

A technology for long code masking and trunking services, which is applied in multiplexing code allocation, image coding, broadcast service distribution, etc. The code is not the same, etc.

Inactive Publication Date: 2009-03-04
HUAWEI TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0040] The methods for generating the above-mentioned public long code mask and private long code mask cannot meet the requirements of trunking services for channel sharing because the ESNs of each MS are different, and the long code masks calculated by users in the same group are different. need
[0041] It can be seen that the methods for generating public long code masks and private long code masks in the prior art cannot be directly used for setting traffic channel parameters in cluster services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for producing long code mask for cluster service
  • Method for producing long code mask for cluster service
  • Method for producing long code mask for cluster service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the embodiments and accompanying drawings.

[0066] The core idea of ​​the method for generating the long code mask for trunking services of the present invention is to replace the parameters in the private long code mask algorithm with new parameters on the basis of the CDMA2000 private long code mask algorithm, and use the private The long code mask algorithm is used to calculate and generate a long code mask that satisfies the confidentiality and sharing of cluster services.

[0067] Refer to Table 1 for parameter replacement:

[0068] parameter Input when calculating the private long code Input when calculating the cluster long code RAND_CHALLENGE RANDC is given by the network side RANDC is given by the network side ESN MS ESN ESN of the MS that initiated t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention discloses a long code and mask generation method used in the cluster service including 1) when a MS having signed the cluster service opens an account, the cluster service discrimination ciphered key and shared ciphered data are stored separately at the MS and the network side, 2) The said MS sends a set calling request of ESN to the network containing set number and MS, 3) The network generates random number(RANDC) and broadcasts information to the set service zone containing RANDC, set number and ESN of MS uses same parameter and algorithm to compute the long code and mask.

Description

technical field [0001] The invention relates to a method for generating a long code mask in a code division multiple access (CDMA) 2000 system, in particular to a method for generating a long code mask for trunking services. Background technique [0002] The CDMA2000 standard belongs to one of the 3G system standard systems, and the CDMA2000 system provides users with voice and high-speed packet data services. According to the IS2000 protocol, the long code mask is used for channel physical layer parameter setting. Long code masks are divided into public long code masks and private long code masks. The former is usually generated when a mobile station (MS) initiates or accepts a call and is used to set traffic channel parameters; the latter is generally used during a call. In order to improve the confidentiality of the call, it is generated after the MS or the network side initiates a request to change the long code mask, and is used to reset the traffic channel parameters....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04J13/02H04Q7/20H04B7/26H04N7/173C07C67/52C07C67/54C07C69/82G01S1/02G01S5/02G01S5/06G01S5/12G01S19/27G02B26/10G03B11/00G03B17/02G04G7/02G06F1/16G06F11/10G06F15/00G06F21/24G06K17/00G06K19/00G06T9/00G09C1/00G09G3/02G10L19/00G11B20/10G11B20/14G11B20/18G11B20/22H01Q1/24H01Q21/24H03L7/091H03M13/03H03M13/13H03M13/23H03M13/29H04B1/16H04B1/707H04B7/005H04B7/24H04B14/00H04H60/72H04J3/06H04J13/00H04J13/16H04L1/00H04L7/00H04L9/00H04L9/08H04L9/10H04L9/32H04L12/24H04L12/26H04L12/28H04L12/54H04L25/02H04L25/03H04L25/49H04L25/497H04L27/10H04L27/156H04L27/18H04L29/06H04L29/12H04M1/66H04M1/724H04M1/72415H04M1/73H04M3/22H04M11/00H04N5/225H04N5/38H04N5/44H04N5/46H04N5/64H04N5/66H04N5/74H04N5/76H04N5/765H04N5/775H04N5/85H04N5/907H04N5/92H04N7/01H04N7/08H04N7/16H04N7/26H04N7/36H04N7/52H04N9/31H04N9/64H04N9/79H04N9/804H04N17/00H04N21/41H04N21/414H04Q3/00H04W4/06H04W4/10H04W4/12H04W4/14H04W4/16H04W8/02H04W8/06H04W8/08H04W8/16H04W8/20H04W8/24H04W8/26H04W12/03H04W12/041H04W12/0431H04W24/00H04W24/04H04W24/08H04W24/10H04W28/02H04W28/04H04W28/08H04W28/16H04W28/22H04W36/02H04W36/04H04W36/18H04W36/30H04W40/22H04W48/06H04W48/08H04W48/16H04W52/02H04W52/24H04W56/00H04W60/00H04W64/00H04W68/00H04W68/02H04W72/04H04W72/08H04W72/12H04W72/14H04W76/02H04W76/04H04W76/06H04W80/06H04W84/04H04W84/08H04W84/12H04W84/18H04W88/02H04W88/04H04W88/06H04W88/12H04W88/18
CPCH04L47/822H04L1/0066G01S5/021H04N7/17327H04W4/14H04W8/265H04M1/72533H04L1/1841Y02B60/43H04L12/4641H04B10/25754H04L25/03038H03M13/2903H04N21/47211H03L7/091G11B20/22G06F21/6209H03M7/4006H04N7/163H04W74/0833H04W88/085H04W76/02H04L51/04H04W24/00G11B20/10009H04W88/16H03M13/23G06F21/305H04L47/72H04W40/00H04N19/00884H04L51/28H04W76/064G06F3/0481H04N5/4448H04L47/15H04N2201/3222H04W84/08H04N9/642G01S5/06H04N5/907H04N7/0122H04N5/64H04N5/85H03M13/6362H04L63/126H04W28/18H04L27/156H04L29/12471Y10S370/906H04L47/765G06F21/74H04N21/4181H04W8/26H03M13/6356H04N19/00951G06F2221/2115H04Q3/0025H04N19/00812Y02B60/50H04N19/00593H04N5/2257H04W28/26H04L47/824H04J13/0077H04W52/0274H04W52/0225H04W72/042H04L25/4904H04W76/06G06F21/88H04L25/4902G11B20/10425H04L65/1006H04N21/6582H04N5/66H04N9/7925H04L65/4061H04W68/00H04N2201/3274H04W84/12H04N21/433Y10S707/99943H04L47/745H04N19/00036H04N5/45H04N21/6175H04L65/1043H04N5/76H04N21/4623H04M1/72519H04J3/0658H04L41/5009H04W4/10H04N5/775Y10S370/907H04L51/38H04J13/16G06F2221/2105H04W74/008H04N9/8042H04L61/2553H04M3/42221H04W4/12H04W88/06H04N19/00587H04L1/0068H04W56/00H04N9/3129H04L65/1016G06F1/1626H04N5/2251H04N19/00151H04L9/304H04W48/08H04L41/06H04N5/46H04N7/0112H04W64/00H04N21/6187H04W76/027H04L29/06027H04N1/40G06F1/1639H04N1/32106H04N19/0069H04L1/1685H04L25/497H03M13/2993H04N5/445H04B7/2687H04L9/085H04M7/0057H04W36/02H04L12/5695H04N1/00957H04W12/10H04N2201/3212G01S1/026H04W76/005H04N5/4401H04W28/04H04B7/2628H04N5/38H04W52/30H04W84/042H04W8/245H04M7/1295H04N21/2543H04W76/022H04W28/00H04N2201/0094H04L43/0829H04N19/139H04N19/70H04N19/51H04N19/109H04N19/91H04N19/527H04N19/517H04N19/625H04L47/70H04W76/18H04W76/45H04W76/30H04W76/34H04W76/12H04W76/10H04N21/426Y02D30/70H04M1/72415H04M1/724H04L51/48H04L51/58H04L65/1104H04N23/57H04W72/23
Inventor 王强
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products