Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Decryption failure recovery method, device, user terminal and network equipment

A recovery method and data frame technology, applied in the field of communication, can solve problems such as loss or disorder of data frames, failure of decryption at the receiving end, failure to recover, etc., and achieve the effect of reducing time and quickly restoring service use

Active Publication Date: 2015-02-11
SPREADTRUM COMM (SHANGHAI) CO LTD
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In non-acknowledged mode, data frames are often lost or out of order when they are transmitted in the network. At this time, the data frames received by the receiving end will also be lost or out of order, which affects the OC value of the receiving end. Update, resulting in a mismatch between the OC values ​​of the sending end and the receiving end, and the decryption at the receiving end fails and cannot be recovered, resulting in users being unable to use the service
[0008] At present, in view of the above-mentioned problems, the methods in the prior art can only restore the use of user services when the user terminal is restarted or the network end resets the user terminal, but it will still cause the user to wait for a long period of time. The business cannot be used within

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Decryption failure recovery method, device, user terminal and network equipment
  • Decryption failure recovery method, device, user terminal and network equipment
  • Decryption failure recovery method, device, user terminal and network equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] The recovery method of decryption failure described in this embodiment includes the following steps:

[0040] Step 102: monitoring whether the decryption of the received data frame fails;

[0041] Step 104: Count the number of consecutive failures to decrypt the data frame;

[0042] Step 106: When the number of consecutive failures reaches a preset threshold, notify the mobility management unit to re-trigger the attach process.

[0043] In a specific implementation, the execution subject of the method may be a user terminal or a network terminal. The user terminal may be a receiving end, and at this time, the network end is a sending end. When the user terminal is used as the receiving end, the method described in this embodiment is applied. Compared with the method of restarting the user terminal to restore the service, it does not require user participation, and only needs to re-trigger the attachment process of the user terminal, so it can be more convenient , Qui...

Embodiment 2

[0046] see figure 2 , the following are detailed steps through specific steps:

[0047] Step 202, decrypt the received data frame.

[0048] In a specific implementation, each time the sending end sends a data frame, the frame number of the next data frame to be sent will be correspondingly increased by 1. The value range of the frame number is between 0 and 511. When the frame number of the sent data frame is equal to 511, the frame number of the next data frame to be sent starts from 0 again, that is, the frame number of the data frame occurs reverse. When the frame number is reversed from 511 to 0, an operation of adding 512 to the OC value at the sending end is performed. When the receiving end finds that the received data frame is reversed, that is, when the data frame with frame number 511 is received, it is necessary to add 512 to the OC value of the receiving end to ensure that the OC values ​​​​of the sending end and the receiving end are the same. match, so that ...

Embodiment 3

[0062] see image 3 , this embodiment provides a recovery device for decryption failure, the device includes;

[0063] A monitoring unit 302, configured to monitor whether the decryption of the received data frame fails;

[0064] A counting unit 306, configured to count the number of consecutive failures to decrypt the data frame;

[0065] A notification unit 308, configured to notify a mobility management unit when the number of consecutive failures reaches a preset threshold;

[0066] The mobility management unit 310 is configured to re-trigger an attach process when receiving the notification from the notification unit 308 .

[0067] In a specific implementation, the device may be set at a user terminal or at a network end. Wherein, the user terminal may be a receiving end, and at this time, the network end is a sending end. When the user terminal is used as the receiving end, the device described in this embodiment is applied. Compared with the method of restarting the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a decryption failure recovery method and device, a user terminal and network equipment. The method comprises the following steps: monitoring whether the decryption on a received data frame is failed or not; counting up the number of times of consecutive failures of decryption of the data frame; when the number of times of consecutive failures reaches a preset threshold value, notifying a mobility management unit to retrigger an attachment process. The method and device can quickly recover the use of user service.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a recovery method, device, user terminal and network equipment for decryption failure. Background technique [0002] The Logical Link Control (LLC) layer protocol is used for packet data transmission between LLC entities, and ensures the reliability and confidentiality of data transmission through encryption. [0003] Under the Global System for Mobile communications (GSM) network, the LLC layer can support two modes of information transmission: acknowledged mode and unacknowledged mode. Among them, the confirmed mode provides reliable information transmission service, while the non-confirmed mode provides unreliable information transmission service. [0004] The general process of LLC layer information transmission is: After receiving the data to be transmitted by the upper layer, the sender adds the frame header of the LLC layer in front of the data to be transmitted, t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W24/02
Inventor 郝速志夏少华孙翔陈贤亮武海峰朱云
Owner SPREADTRUM COMM (SHANGHAI) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products