Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for processing a security setup control message in mobile communication system

A technology of mobile communication system and safety message, applied in the field of message processing of mobile communication

Inactive Publication Date: 2006-03-15
LG ELECTRONICS INC
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the security-related information contained in the security-settings control message itself can be changed by an unauthenticated third party, or sent by an unauthenticated sender, so such security-related information cannot be relied upon

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for processing a security setup control message in mobile communication system
  • Method for processing a security setup control message in mobile communication system
  • Method for processing a security setup control message in mobile communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Reference will now be made in detail to the preferred embodiments of the invention, examples of which are illustrated in the accompanying drawings. Wherever possible, the same reference numbers will be used throughout the drawings to refer to the same or like parts.

[0028] figure 1 is a flowchart illustrating a general message processing method.

[0029] refer to figure 1 , UE (User Equipment) first receives a general message (S11) and performs an integrity check on it (S12). Depending on the result of the integrity check, the message is processed normally or discarded. That is, if the message passes the integrity check, it is processed normally (S13). If the message does not pass the integrity check, it will be discarded due to security issues (S14).

[0030] figure 2 is a flowchart illustrating a method of processing a security setting control message according to the first embodiment of the present invention.

[0031] refer to figure 2 , UE (User Equipmen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed is a method for processing security message in a radio resource control (RRC) layer of a mobile communication system. The method for processing a security message includes the steps of receiving the security message (S31), storing previous security-relating variables, carrying out an integrity check (S34) on the received security message, discarding (S37) or processing (S36) the security message according to a result of the integrity check (S34), and updating the security-relating variables (S33). Accordingly, a secutity setup control message processing method is provided which includes an integrity check of the received security message.

Description

technical field [0001] The present invention relates to a message processing method applied to mobile communication, and more specifically, relates to a method for processing safety messages in the RRC layer. Background technique [0002] The Universal Mobile Telecommunications System UMTS includes user equipment UE, UMTS terrestrial radio access network UTRAN and core network CN. Moreover, UTRAN includes multiple radio network subsystems RNS. Each RNS contains a radio network controller RNC and multiple Node Bs managed by the RNC. Node B receives uplink signals from UEs and transmits downlink signals to UEs. RNC is responsible for the allocation and management of radio resources and serves as an access point connecting Node B to CN. Each UE connected to UMTS is managed by a specific RNC in UTRAN, and this specific RNC is called SRNC (Serving RNC). [0003] The UTRAN configures, maintains and manages the Radio Access Bearer RAB for communication between UE and CN. The C...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/38H04W12/00H04M1/68H04W88/02
CPCH04W88/02H04W12/06H04L63/123H04W12/10H04W12/037
Inventor 千成德李承俊李英大
Owner LG ELECTRONICS INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products