Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method for selecting encrypted algorithm in radio communication system

A wireless communication system and encryption algorithm technology, which is applied in the field of selecting encryption algorithms to achieve the effect of ensuring interconnectivity, reasonable and simple logic, and high efficiency.

Inactive Publication Date: 2005-12-14
ZTE CORP
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing method of arbitrarily selecting an encryption algorithm cannot meet the above requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for selecting encrypted algorithm in radio communication system
  • Method for selecting encrypted algorithm in radio communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] When the method of the present invention is applied in a wireless communication system, multiple encryption methods must be jointly approved by the terminal, the core network, and the access network; otherwise, the process of selecting an encryption algorithm will not be performed. Secondly, the terminal has the ability to report the set information of its licensed encryption algorithm to the access network, and the core network has the ability to initiate the encryption process to ensure that the encryption process can be processed normally.

[0042] Below in conjunction with accompanying drawing, the implementation of technical scheme is described in further detail:

[0043]This embodiment provides a method for selecting an encryption algorithm based on the encryption priority of the wireless access network. The encryption priority principle of the access network is used to select the encryption algorithm.

[0044] On the access network side, it is necessary to confi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method of selecting enciphering algorithm in radio communication system includes the following steps: configuring priority level information for each of the enciphering algorithms the access network admits; receiving and maintaining enciphering algorithm set of the terminal and the kernel network in the access network; the access network's selecting the enciphering algorithm with highest priority level from the enciphering algorithms the terminal, the kernel network and the access network admit, performing local configuration and informing the terminal and the kernel network to configure based on the selected enciphering algorithm; and performing the enciphered communication between the terminal and the access network in the selected enciphering algorithm after reaching the united activating time. The present invention solves well the priority and selecting problem of coexisting standard enciphering algorithms and non-standard ones and is universal.

Description

technical field [0001] The invention relates to wireless communication encryption, in particular to a method for selecting an encryption algorithm during encrypted communication in a wireless communication system. Background technique [0002] In the wireless communication system, due to the dependence on the open transmission medium, in addition to the security threat of the wired network, it is especially vulnerable to the threats of fake users, abuse of resources and eavesdropped wireless link communications. Therefore, the wireless communication system must provide a complete and reliable encryption security mechanism. Some encryption algorithm must be used between the terminal, the core network, and the access network to communicate in an encrypted manner to ensure information security. In this way, the sender uses an encryption algorithm to encrypt the original data, and transmits user information and signaling information on the wireless link in the form of cipher tex...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/28
Inventor 程翔王之曦
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products