Method of selecting safety communication algorithm

A technology for secure communication and algorithm, applied in secure communication devices, security devices, wireless communication, etc., can solve the problem of not providing the priority of encryption algorithm, and achieve the effect of small impact, simple implementation and less modification

Inactive Publication Date: 2009-08-05
HUAWEI TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the prior art, there is no solution for how to perform encryption algorithm priority selection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of selecting safety communication algorithm
  • Method of selecting safety communication algorithm
  • Method of selecting safety communication algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The secure communication algorithm mentioned in the present invention may be an encryption algorithm or an integrity algorithm. The following will take the encryption algorithm as an example and further describe the present invention in detail in conjunction with the accompanying drawings and embodiments.

[0042]The premise that the present invention realizes is: if multiple licensed standard encryption algorithms are defined in the standard, in order to support international roaming in all countries in the world, the system is required to support all standard encryption algorithms, which is exactly what all existing 3G mobile communication systems conditions that must be met.

[0043] Moreover, for countries or operators with special encryption algorithm requirements, in addition to supporting all the above-mentioned standard encryption algorithms, the mobile communication system must also support at least one set of self-developed non-standard encryption algorithms. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for selecting a security communication algorithm. The user terminal and the core network respectively send the indication of the security communication algorithm supported by themselves to the access network through messages, and the access network selects the final security communication algorithm to be used. The process of the algorithm also includes: a) the access network judges whether the secure communication algorithm supported by the core network includes an autonomous secure communication algorithm, and if not, executes step b; otherwise, judges whether both the user terminal and the access network support autonomous secure communication algorithms. Secure communication algorithm, if supported, select an autonomous secure communication algorithm; otherwise, perform step b; b) determine whether both the user terminal and the access network support at least one standard secure communication algorithm, if yes, select a user terminal The standard secure communication algorithm supported by both the access network and the access network; otherwise, end the current secure communication process. The method enables different operator systems or countries to preferentially choose to adopt an autonomous security algorithm, thereby improving the security and confidentiality of mobile users.

Description

technical field [0001] The invention relates to encryption technology in a mobile communication system, in particular to a method for preferentially selecting an autonomous safe communication algorithm. Background of the invention [0002] At present, in various communication systems, especially mobile communication systems, in order to ensure the security and confidentiality of information between users, the realization of confidential communication is very important, which requires encrypted protection of transmitted data. Usually, encrypting and protecting information is to use encryption algorithms on both sides of the communication. The sender encrypts the data to be transmitted according to the selected encryption algorithm and then transmits it. After receiving it, the receiver decrypts it according to the selected encryption algorithm and analyzes it for use. [0003] In third generation (3G) mobile communication systems, the encryption function of the air interface ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04J13/00H04L9/28H04L9/00H04W12/03
Inventor 郑志彬
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products