Method for protecting the integrity of messages in a mobile communications system

A mobile wireless and messaging technology, applied in transmission systems, wireless communications, wireless network protocols, etc., can solve the problems of increasing source SRNC processing capacity and complexity, lack of flexibility, and different algorithms

Inactive Publication Date: 2010-12-29
EVOLIUM
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0055] -The source SRNC must decode the RRC information unit to verify the MAC-I code calculation parameters, and then calculate the MAC-I code based on these parameters, which has the disadvantage of increasing the processing capacity and complexity of the source SRNC,
[0056] - The source SRNC must be able to implement the type of algorithm selected by the target SRNC, or in other words, the algorithm selected by the target SRNC cannot be different from the algorithm implemented in the source SRNC; in other words, its defect is that there are relatively strict restrictions or lack of flexibility, as well as
[0057] - In order to transmit RRC information in RANAP messages, the target SRNC must use a format known to the source SRNC, or in other words, the format chosen by the target SRNC must be known to the source SRNC; in other words, its drawback is that there are relatively strict restrictions or Lack of flexibility (such as the following situation: when specifying a new protocol type, one of the two SRNCs is using the new version and the other is using the old version)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting the integrity of messages in a mobile communications system
  • Method for protecting the integrity of messages in a mobile communications system
  • Method for protecting the integrity of messages in a mobile communications system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0105] Figure 4 An example of a method according to the present invention is shown, mainly aimed at and utilizing image 3 Relocation involving UE is shown as an example.

[0106] Step 10' indicates the start of the relocation process.

[0107] In step 20', the target SRNC generates RRC information. Apart from figure 2 For the above information generated in step 20, the RRC information unit generated by the target controller also includes additional information and explanatory text.

[0108] In step 20', the target SRNC calculates the MAC-I code. In general, in order to calculate the MAC-I code, the target SRNC can use calculation parameters, such as the calculation parameters sent to it by the source SRNC during the relocation process and / or the calculation parameters selected by the target SRNC, these parameters can be included in step 20 In the integrity protection mode information IE of the RRC information element generated in '. The additional information related to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a method of protecting the integrity of messages sent between a mobile terminal and a server radio access network controller in a mobile radio system, in which method a message sent is protected by a code calculated on sending and, in the event of a change of server radio access network controller from a source controller to a target controller, a message sent to the mobile terminal by the source controller, for forwarding to the mobile terminal information created in the target controller and then transferred by the target controller to the source controller, is protected by a code calculated in the target controller.

Description

[0001] This application is a divisional application of the invention patent application with the application number "03153353.1", the application date is "August 11, 2003", and the invention title is "A method for protecting the integrity of messages sent in mobile wireless systems" . technical field [0002] The invention relates to mobile radio systems. The invention is particularly applicable to third generation mobile radio systems, specifically the Universal Mobile Telecommunications System (UMTS). Background technique [0003] Generally speaking, a mobile wireless system is defined by a series of standards, and more information can be obtained from corresponding standards published by corresponding standard organizations. [0004] figure 1 An overview gives the general architecture of the mobile wireless system, basically including: [0005] - Radio Access Network (RAN)1 and [0006] - Core Network (CN)4. [0007] RAN is composed of base station 2 and base station...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/10H04W36/10H04W92/22
CPCH04L63/123H04W92/22H04W12/10H04W80/02H04W12/106
Inventor 帕特里克·菲舍尔增田广世
Owner EVOLIUM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products