Encryption Algorithm Negotiation Method, Network Element and Mobile Station
An encryption algorithm and mobile station technology, applied in electrical components, wireless communications, security devices, etc., can solve problems such as encryption process errors, SIM cannot support A5/4 encryption algorithm, etc., to avoid encryption errors.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 3
[0093] Such as Figure 4 Shown is the flow chart of Embodiment 3 of the encryption algorithm negotiation method of the present invention, including:
[0094] Step 401, receiving an encryption key sent by a core network element.
[0095] Step 402, if the encryption key does not match the first encryption algorithm, select an encryption algorithm from other encryption algorithms except the first encryption algorithm, and send the selected encryption algorithm to the mobile station.
[0096] The above-mentioned first encryption algorithm represents an encryption algorithm not supported by the plug-in card of the mobile station but supported by network elements of the core network.
[0097] For example, when the above-mentioned first encryption algorithm is the A5 / 4 encryption algorithm, the encryption key that does not match the first encryption algorithm may be a 64-bit encryption key. Then, through the method provided in Embodiment 3 of the present invention, no matter whethe...
Embodiment 4
[0098] Steps 401-402 in Embodiment 4 may be performed by a network element of the access network, for example, a BSC in the access network.
[0099] Such as Figure 5 Shown is the signaling interaction diagram of Embodiment 4 of the encryption algorithm negotiation method of the present invention. This embodiment is an encryption algorithm negotiation method involved in a mobile station location update process, including:
[0100] The implementation process of steps 501-505 is roughly the same as steps 301-305 respectively, and will not be repeated here.
[0101] Step 506, after the authentication is successfully completed, the MSC / VLR and the access network perform an encryption algorithm negotiation process, and the MSC / VLR sends an encryption mode command (cipher mode command) to the BSC, which carries a 64-bit encryption key Kc and the MSC / List of encryption algorithms allowed by VLR itself. In this embodiment, the MSC does not delete the A5 / 4 encryption algorithm, so t...
Embodiment 5
[0105] The process of the fifth embodiment of the encryption algorithm negotiation method of the present invention mainly includes:
[0106] If the type of the inserted card of the mobile station is a SIM card, the mobile station sends terminal capability information indicating that it does not support the first encryption algorithm to the network element of the access network; The algorithm list and the terminal capability information sent by the mobile station select an encryption algorithm from other encryption algorithms except the first encryption algorithm and send the selected encryption algorithm to the mobile station;
[0107]Or, if the type of the inserted card of the mobile station is a SIM card, the mobile station deletes the first encryption algorithm in the encryption algorithm list supported by itself, and sends the encryption algorithm list after the first encryption algorithm is deleted to the network element of the access network , so that the network element...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 