Service customizing method and system suitable for clustered system

A trunking system and business technology, applied in the field of network security, can solve problems such as unfavorable SCDMA broadband access technology business development, and achieve the effect of resisting selected plaintext attacks, effective and rapid business ordering, and improving protection.

Inactive Publication Date: 2011-11-02
CHINA IWNCOMM
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the communication scheme between a user terminal (UT, User Terminal) and a base station (BS, Base Station) in the SCDMA technical standard, there is no method for the base station BS to judge that it needs to subscribe to a certain service based on the message sent by the user terminal UT To describe, the business customization method and system are an important part of business development. Without the business customization method and system, it is not conducive to the business development of SCDMA broadband access technology in the trunking system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present invention provides a service ordering method suitable for a trunking system. The method is how the base station BS and the user terminal UT judge that the user terminal UT needs to order a certain service from the base station BS according to the exchanged messages. The method includes the following steps :

[0023] 1) The base station BSi in the network (i represents the i-th base station BS in the network) directly or indirectly notifies the user terminal UT of the new access network of the message of the base station BSi itself, and the message includes FLAG (message interaction mechanism identifier), PFLAG (this article message ID), MEKID (multicast key security association), LIST1 (list of service messages provided, including base station BSi ID, base station BSi digital certificate and service name), user terminal UTID (identification of user terminal UT), TEKID (encrypted key index), NBS (random number to ensure message freshness) and MIC (use the int...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a service customizing method suitable for a clustered system, which comprises the following steps: (1) a base station BS in a network directly or indirectly notifies a user terminal UT of a new accessed network of the message of the base station BS; (2) the user terminal UT sends a request message for customizing the service to the base station BS; (3) a public key in the request message for customizing the service sent to the base station BS through the user terminal UT is encrypted to a service key request result and the service key request result is fed back to the user terminal UT; and (4) after the user terminal UT receives the fed back message for customizing the service sent from the base station BS, the ciphertext message in the message of the selected base station BS for customizing the service is decrypted. The invention provides the service customizing method and a system suitable for the clustered system, which can effectively resist selected plaintext attack, can ensure that messages of different contents can obtain a specific meaning, and can effectively and rapidly achieve the purpose of customizing service.

Description

technical field [0001] The invention belongs to the field of network security, in particular to a service customization method and system suitable for a cluster system. Background technique [0002] SCDMA (Synchronous Code Division Multiple Access) is a synchronous code division multiple access broadband wireless access technology, which uses advanced technologies such as smart antennas, software radios, and the self-developed SWAP (Synchronous Wireless Access Protocol) air interface protocol. It is a brand-new system, a brand-new third-generation wireless communication technology standard with complete independent intellectual property rights in my country, which can form a network and conduct business in a cluster. In the communication scheme between a user terminal (UT, User Terminal) and a base station (BS, Base Station) in the SCDMA technical standard, there is no method for the base station BS to judge that it needs to subscribe to a certain service based on the message...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W8/18H04W12/04H04W84/08H04W12/041H04W12/0431H04W12/069
CPCH04W12/12H04W88/08H04W12/04H04W28/06H04W12/0433
Inventor 胡亚楠庞辽军黄振海铁满霞曹军
Owner CHINA IWNCOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products