Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and apparatus for ciphering called empty interval voice of beep-page between systems

A technology of voice encryption and implementation method, which is applied in the field of mobile communication and can solve problems such as no implementation scheme

Inactive Publication Date: 2008-11-12
ZTE CORP
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] At present, there is no specific implementation plan for how the serving MSC notifies the border MSC that it requires mandatory air interface voice encryption for the called party.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for ciphering called empty interval voice of beep-page between systems

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention will be described in more detail below with reference to the accompanying drawings and in conjunction with specific embodiments.

[0035] like figure 1 , in the inter-system paging call of the specific embodiment of the present invention, the specific steps of forcing the called air interface voice encryption process are as follows:

[0036] Step 101: The serving MSC judges that it is necessary to enforce air interface encryption on the called party, and finds that the called party is in the system boundary area, and needs to start inter-system paging, send an inter-system paging message (ISPAGE) to the boundary MSC, and increase the security mode parameter CMODES indication The border MSC implements mandatory air interface voice encryption on the called party;

[0037] Step 102: the border MSC sends a paging message to the base station subsystem BSS where the called user is located;

[0038] Step 103: the base station subsystem paging to the cal...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an implement method and a device of called bear speech encryption in intersystem paging. The implement method includes a call establishment process which includes the following steps: A. a caller makes a call for a service mobile switching center; when the service mobile switching center judges that the call is intersystem paging for called enforced bear speech encryption, ISPAGE information is sent to a boundary mobile exchanging center, and the ISPAGE information is carried with confidential mode parameters; B. the boundary mobile exchanging center obtains called private long-code mask-code information by the confidential mode parameters and finishes the bear speech encryption of the called. The implement device comprises the service mobile switching center and the boundary mobile exchanging center. The service mobile switching center comprises a judge processing module. Based on the existing network structure, the invention resolves the problem that intersystem paging calling cannot carry out forced bear speech encryption of the called and has the advantages of small change of the existing network and good compatibility.

Description

technical field [0001] The invention relates to the field of mobile communications, in particular to a method and device for realizing voice encryption of a called air interface in intersystem paging (InterSystemPage, ISPAGE). Background technique [0002] The air interface voice encryption service refers to the communication between the mobile phone (MS, Mobile Station, mobile station) and the base station subsystem (BSS, Base Station Sub-system) through the CDMA private long code mask (CDMAPLCM, CDMA Private Long Code Mask). The voice stream is modulated to prevent the voice in propagation from being eavesdropped. [0003] The air interface voice encryption of the calling MS and the called MS is relatively independent, and both can individually request to use the private long code mask to encrypt the air interface voice of the local call and enter the secure call mode. [0004] Mandatory over-the-air voice encryption for the called party means that in the use of the air-i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/22H04Q7/38H04K1/00
Inventor 朱振平
Owner ZTE CORP