Unlock instant, AI-driven research and patent intelligence for your innovation.

Encryption Algorithm Negotiation Method, Network Element and Mobile Station

An encryption algorithm and mobile station technology, applied in electrical components, wireless communications, security devices, etc., can solve problems such as encryption process errors, SIM cannot support A5/4 encryption algorithm, etc., to avoid encryption errors.

Active Publication Date: 2016-12-07
HUAWEI TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For a mobile station whose inserted card type is a SIM card, the SIM cannot support the A5 / 4 encryption algorithm. In the process of data interaction between the mobile station and the network side, the use of the A5 / 4 encryption algorithm will cause errors in the encryption process.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption Algorithm Negotiation Method, Network Element and Mobile Station
  • Encryption Algorithm Negotiation Method, Network Element and Mobile Station
  • Encryption Algorithm Negotiation Method, Network Element and Mobile Station

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 3

[0093] Such as Figure 4 Shown is the flow chart of Embodiment 3 of the encryption algorithm negotiation method of the present invention, including:

[0094] Step 401, receiving an encryption key sent by a core network element.

[0095] Step 402, if the encryption key does not match the first encryption algorithm, select an encryption algorithm from other encryption algorithms except the first encryption algorithm, and send the selected encryption algorithm to the mobile station.

[0096] The above-mentioned first encryption algorithm represents an encryption algorithm not supported by the plug-in card of the mobile station but supported by network elements of the core network.

[0097] For example, when the above-mentioned first encryption algorithm is the A5 / 4 encryption algorithm, the encryption key that does not match the first encryption algorithm may be a 64-bit encryption key. Then, through the method provided in Embodiment 3 of the present invention, no matter whethe...

Embodiment 4

[0098] Steps 401-402 in Embodiment 4 may be performed by a network element of the access network, for example, a BSC in the access network.

[0099] Such as Figure 5 Shown is the signaling interaction diagram of Embodiment 4 of the encryption algorithm negotiation method of the present invention. This embodiment is an encryption algorithm negotiation method involved in a mobile station location update process, including:

[0100] The implementation process of steps 501-505 is roughly the same as steps 301-305 respectively, and will not be repeated here.

[0101] Step 506, after the authentication is successfully completed, the MSC / VLR and the access network perform an encryption algorithm negotiation process, and the MSC / VLR sends an encryption mode command (cipher mode command) to the BSC, which carries a 64-bit encryption key Kc and the MSC / List of encryption algorithms allowed by VLR itself. In this embodiment, the MSC does not delete the A5 / 4 encryption algorithm, so t...

Embodiment 5

[0105] The process of the fifth embodiment of the encryption algorithm negotiation method of the present invention mainly includes:

[0106] If the type of the inserted card of the mobile station is a SIM card, the mobile station sends terminal capability information indicating that it does not support the first encryption algorithm to the network element of the access network; The algorithm list and the terminal capability information sent by the mobile station select an encryption algorithm from other encryption algorithms except the first encryption algorithm and send the selected encryption algorithm to the mobile station;

[0107]Or, if the type of the inserted card of the mobile station is a SIM card, the mobile station deletes the first encryption algorithm in the encryption algorithm list supported by itself, and sends the encryption algorithm list after the first encryption algorithm is deleted to the network element of the access network , so that the network element...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention discloses an encryption algorithm negotiation method, a network element and a mobile station, wherein the method includes: obtaining information that the plug-in card of the mobile station does not support the first encryption algorithm; according to the fact that the plug-in card of the mobile station does not support the first Encryption algorithm information, delete the first encryption algorithm from the encryption algorithm list allowed by the core network element itself; send the encryption algorithm list allowed by the core network element itself to the access network element, so that all The network element of the access network selects an encryption algorithm according to the encryption algorithm list allowed by the network element of the core network and the terminal capability information sent by the mobile station, and sends the selected encryption algorithm to the mobile station. The method, network element and mobile station provided by the invention can avoid errors in the encryption process caused by the insertion card of the mobile station not supporting a certain encryption algorithm.

Description

technical field [0001] The invention relates to encryption and decryption technology, in particular to an encryption algorithm negotiation method, a network element and a mobile station. Background technique [0002] The algorithm negotiation method in the GSM / EDGE Radio Access Network (GSM / EDGE Radio Access Network, referred to as GERAN) includes: a mobile station (Mobile Station, referred to as MS) sends an access network element base station controller (Base Station Controller, referred to as BSC) ) to report the encryption algorithm supported by the mobile station, the core network sends a list of encryption algorithms allowed by itself to the BSC, and the BSC selects an appropriate encryption algorithm according to the encryption algorithm reported on the core network and the terminal capability information reported by the mobile station. [0003] In the communication system, for an encryption algorithm not supported by the plug-in card of the mobile station, if the enc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04W12/04H04W12/03H04W12/0431
Inventor 陈璟邓永锋张爱琴秦钧
Owner HUAWEI TECH CO LTD