Method and wireless network controller for enabling encryption in call establishment process
A call establishment and network-side technology, applied in wireless communication, radio/inductive link selection arrangement, communication between multiple stations, etc., can solve the problems that data cannot be analyzed by the other party, and the sound of running water occurs, so as to ensure synchronization Consistency, avoiding the sound of running water, and ensuring the effect of voice quality
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0033] Fig. 1 is the flowchart of the first embodiment of the method for starting encryption in the call setup process of the present invention, including:
[0034] Step 101: After the RNC receives the "RB SETUP COMPLETE" message sent by the terminal, the RNC calculates the encryption activation time provided by the terminal according to the HFN and CFN contained in the "RB SETUP COMPLETE" message, and compares it with the time maintained by itself to judge Whether the current time exceeds the encryption activation time provided by the "RB SETUP COMPLETE" message; if so, it indicates that the terminal has started encryption, and the RNC executes step 102; otherwise, it indicates that the "RB SETUP COMPLETE" message is not delayed, and executes step 103.
[0035] Step 102: The RNC uses the HFN in the "RB SETUP COMPLETE" message and the current CFN maintained by the RNC as encryption parameters to start encryption, avoiding the CFN cycle caused by the RNC waiting and causing the ...
Embodiment 2
[0038] Fig. 3 is the flow chart of the second embodiment of the method for starting encryption in the call setup process of the present invention, which specifically includes the following steps:
[0039] Step 201: After receiving the "RB SETUP COMPLETE" message sent by the terminal, the RNC judges whether the current time exceeds the encryption activation time provided in the "RB SETUP COMPLETE" message; if so, execute step 202; otherwise, execute step 206.
[0040] Step 202: The RNC judges whether the CFN cycle occurs during the transmission of the "RB SETUP COMPLETE message. If so, in this embodiment, it is assumed that the CFN has cycled once, and step 203 is performed; otherwise, step 205 is performed.
[0041] Step 203: RNC calculates HFN according to the "START VALUE" value given in the "RB SETUP COMPLETE" message, and adds 1 to HFN. Then go to step 204 .
[0042] Step 204: Use HFN+1 and the current CFN maintained by the RNC as encryption parameters to start encryption...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com