Method and wireless network controller for enabling encryption in call establishment process

A call establishment and network-side technology, applied in wireless communication, radio/inductive link selection arrangement, communication between multiple stations, etc., can solve the problems that data cannot be analyzed by the other party, and the sound of running water occurs, so as to ensure synchronization Consistency, avoiding the sound of running water, and ensuring the effect of voice quality

Active Publication Date: 2008-01-16
XFUSION DIGITAL TECH CO LTD
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] Step 6': The RNC starts encryption when it reaches "TCipher" 74 again after the CFN cycle. At this time, the CFN of the RNC and the UE are consistent, but the HFN of the two are inconsistent, because after a cycle of CFN, the terminal The HFN has been increased by 1, and the RNC still uses the HFN in the "RB SETUPCOMPLETE" message when configuring encryption. In this way, when the terminal and the RNC start encryption, the HFN is inconsistent, resulting in the data sent by both parties being unable to be parsed by the other party, and the sound of running water appears.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and wireless network controller for enabling encryption in call establishment process
  • Method and wireless network controller for enabling encryption in call establishment process
  • Method and wireless network controller for enabling encryption in call establishment process

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] Fig. 1 is the flowchart of the first embodiment of the method for starting encryption in the call setup process of the present invention, including:

[0034] Step 101: After the RNC receives the "RB SETUP COMPLETE" message sent by the terminal, the RNC calculates the encryption activation time provided by the terminal according to the HFN and CFN contained in the "RB SETUP COMPLETE" message, and compares it with the time maintained by itself to judge Whether the current time exceeds the encryption activation time provided by the "RB SETUP COMPLETE" message; if so, it indicates that the terminal has started encryption, and the RNC executes step 102; otherwise, it indicates that the "RB SETUP COMPLETE" message is not delayed, and executes step 103.

[0035] Step 102: The RNC uses the HFN in the "RB SETUP COMPLETE" message and the current CFN maintained by the RNC as encryption parameters to start encryption, avoiding the CFN cycle caused by the RNC waiting and causing the ...

Embodiment 2

[0038] Fig. 3 is the flow chart of the second embodiment of the method for starting encryption in the call setup process of the present invention, which specifically includes the following steps:

[0039] Step 201: After receiving the "RB SETUP COMPLETE" message sent by the terminal, the RNC judges whether the current time exceeds the encryption activation time provided in the "RB SETUP COMPLETE" message; if so, execute step 202; otherwise, execute step 206.

[0040] Step 202: The RNC judges whether the CFN cycle occurs during the transmission of the "RB SETUP COMPLETE message. If so, in this embodiment, it is assumed that the CFN has cycled once, and step 203 is performed; otherwise, step 205 is performed.

[0041] Step 203: RNC calculates HFN according to the "START VALUE" value given in the "RB SETUP COMPLETE" message, and adds 1 to HFN. Then go to step 204 .

[0042] Step 204: Use HFN+1 and the current CFN maintained by the RNC as encryption parameters to start encryption...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for initiating encryption during call establishing procedure and a wireless network controller. The method includes receiving a message of that a call has been established; determining whether the present time is longer than the encryption activating time provided in the message; and if yes, initiating encryption using the exceed frame number in the message and the present connecting frame number at network side as the encryption parameters. Synchronization of encryption parameters of RNC and the encryption terminal is ensured, therefore flow noise of audio is prevented and the audio quality is further ensured. The wireless network controller includes a message receiving module, a time determining module and an encryption initiating module to ensure synchronization of encryption parameters of RNC and the encryption terminal, therefore flow noise of audio is prevented and the audio quality is further ensured.

Description

technical field [0001] The invention relates to a mobile communication technology, in particular to a method for starting encryption during call establishment and a wireless network controller. Background technique [0002] With the rapid development of communication technologies, users have higher and higher security requirements for voice services. Among them, the wideband code division multiple access (WCDMA) mobile communication system ensures the security of the network and the user by encrypting the user's signaling and data during the call establishment process. As shown in Figure 6, on the timeline 7 of the connection frame number (CFN) in the range of 0-255, the existing call setup process includes: [0003] Step 1: The radio network controller (RNC) sends the radio bearer establishment request message "RBSetup Request" to the terminal, and establishes a call at the time point "TRbSetup" 71 when the radio bearer is established; wherein, the "RB Setup Request" messa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/38H04B7/26H04W12/02H04W76/02
Inventor 段忠毅龚晓东李鹏
Owner XFUSION DIGITAL TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products