CN1219407C - Method of wireless link encrypting aglorithm for autonomous selective secret communication - Google Patents

Method of wireless link encrypting aglorithm for autonomous selective secret communication Download PDF

Info

Publication number
CN1219407C
CN1219407C CN02125676.4A CN02125676A CN1219407C CN 1219407 C CN1219407 C CN 1219407C CN 02125676 A CN02125676 A CN 02125676A CN 1219407 C CN1219407 C CN 1219407C
Authority
CN
China
Prior art keywords
mcc
cryptographic algorithm
algorithm
base station
encryption algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN02125676.4A
Other languages
Chinese (zh)
Other versions
CN1471326A (en
Inventor
郑志彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN02125676.4A priority Critical patent/CN1219407C/en
Publication of CN1471326A publication Critical patent/CN1471326A/en
Application granted granted Critical
Publication of CN1219407C publication Critical patent/CN1219407C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention discloses a method for a wireless link encryption algorithm for autonomous selective secret communication. Encryption algorithm indication supported by user equipment and encryption algorithm indication supported by a core network are respectively sent to an access network by messages. A final used encryption algorithm is selected by a base station controller of the access network, which further comprises: a) a mobile country code (MCC) corresponding table is arranged in the base station controller of the access network in advance, and a corresponding autonomous developing encryption algorithm and a corresponding MCC are stored; b) that a standard encryption algorithm and a current autonomous developing encryption algorithm are selected, or the connection of the time is canceled is determined by the base station controller according to the state of the MCC corresponding table or elemental relationships in the MCC and the MCC corresponding table of a current user. The user can use an effective encryption algorithm for normal secret communication in any area by the method. The standard encryption algorithm and the autonomous developing encryption algorithm can be permitted to coexist, and the selecting process of the encryption algorithm is simplified so as to further ensure user benefit and service quality.

Description

The method of Radio Link cryptographic algorithm in a kind of autonomous selective secret communication
Technical field
The present invention relates to the selection of cryptographic algorithm in the communication of 3G system secrecy, refer to the method for Radio Link cryptographic algorithm in a kind of autonomous selective secret communication especially.
Background of invention
At present, in various communication systems especially mobile communication system, in order to ensure the level security of user-user information, the realization of secure communication is very important, and this just need carry out encipherment protection to the data of being transmitted.Usually, it is exactly to adopt cryptographic algorithm at communicating pair that information is carried out encipherment protection, and the data that transmit leg will transmit are encrypted the back transmission by selected cryptographic algorithm, uses by selected cryptographic algorithm deciphering post analysis after the recipient receives again.
In the third generation (3G) mobile communication system, the encryption function of air interface realizes between end user device (UE) and grounding wireless access network (RAN) usually.Regulation according to existing protocol, the all corresponding cryptographic algorithm sign of each cryptographic algorithm, the selection of existing cryptographic algorithm is to obtain by the cryptographic algorithm ability of relatively UE support and the cryptographic algorithm of core net (CN) permission to use, is relatively selecting according to the cryptographic algorithm sign in Access Network.Referring to shown in Figure 1, the specific implementation process that is used for the air-interface encryption protection in the existing mobile communication system is such:
1) UE is with the security capabilities notice Access Network of self.
After UE and Access Network successfully connected, UE can carry the cryptographic algorithm ability parameter that UE possesses by the message A that is sent to Access Network, the cryptographic algorithm that this terminal of notice Access Network can be supported, and Access Network is received the cryptographic algorithm information that back this terminal of storage is supported.
2) core net (CN) is initiated safety mode process.
When CN initiated to set up safe mode, CN determined according to being provided with in advance which cryptographic algorithm permission selects for use, and sent the message B that carries the cryptographic algorithm information that network supports to Access Network.
3) be identified for the cryptographic algorithm of secure communication by Access Network.
After Access Network is received message B,, determine the cryptographic algorithm that a kind of terminal and Access Network are all supported, as the cryptographic algorithm of secure communication according to the cryptographic algorithm sign of the core net permission to use that is received and the cryptographic algorithm that UE the supported sign of storage in advance.Then, Access Network sends the message C that carries the selected encryption algorithm indication to UE, the cryptographic algorithm that the notice core net is finally determined.
4) UE is provided with the local security algorithm that uses.
After UE receives message C, the local terminal security cryptographic algorithm of using is set earlier is cryptographic algorithm specified among the received message C, then, send the message D that UE is provided with the safe mode success to Access Network.
5) Access Network successfully is provided with to core net indication safe mode.
After Access Network receives message D, send the message E that carries the selected encryption algorithm parameter to core net, this message represents that safe mode is provided with success.
6) core net is finished the safe mode setting up procedure.
After core net receives the message that safe mode completes successfully, finish the setting up procedure of inherently safe pattern, wait for then, wait arrive the fixed time after, terminal and Access Network begin secure communication, carry out encryption and decryption according to selected cryptographic algorithm.
The cryptographic algorithm that is applied to the wireless link information encryption and decryption in the said process is placed on respectively in terminal and the Access Network, and the cryptographic algorithm of permission to use must be the cryptographic algorithm that Access Network is supported among the CN.Usually cryptographic algorithm is not unique, can define multiple different cryptographic algorithm, and every kind of corresponding cryptographic algorithm sign of cryptographic algorithm, and operator can support to select different cryptographic algorithm.Equity realizes in Access Network and terminal but because Radio Link is encrypted, consider between different Access Networks and the terminal equipment and must interconnect, also be necessary for interconnection and interflow between Access Network between the different operators and the terminal, it must be agreement specified standard cryptographic algorithm that therefore at present all cryptographic algorithm require.
If the multiple standards cryptographic algorithm is arranged in the standard, in order to support global roaming, then must comprise all canonical algorithms in the system, the Standard Encryption algorithm that CN is also all with permission to use, the selection of algorithm is to obtain by the algorithm ability of relatively UE support and the available algorithm of CN appointment.If through comparing, when terminal and Access Network have a plurality of identical available standards cryptographic algorithm, Access Network can be selected any one common cryptographic algorithm of supporting in available algorithm, in the standard criterion regulation select the method for cryptographic algorithm and select priority, adopt identical algorithm as long as guarantee in terminal and the Access Network.If terminal does not have identical cryptographic algorithm optional with Access Network, but core net requires and must encrypt, and terminal then can not be carried out normal secure communication.
Because the particularity that password is used, for own country or the own network information security and confidentiality are considered, country variant or operator more wish to use the independent encryption algorithm of independent development, even some operator of national requirements this country can not use other people cryptographic algorithm, can not adopt standardization, cause uncertain loss to prevent key to be easy to be cracked.So, when roaming, the user will produce two kinds of problems:
1) if terminal and Access Network both sides, a side supports the cryptographic algorithm of independent development, and the opposing party can not support, then can not select the cryptographic algorithm of common support owing to communicating pair, causes it can not carry out normal secure communication.
2) must adopt the independent development cryptographic algorithm to carry out the country or the operator of air-interface encryption for some, reserve some cryptographic algorithm signs in the existing mobile communications system and come the cryptographic algorithm of corresponding different independent developments, but, there is not unified standard for reserving selecting for use of cryptographic algorithm ident value at present, each country or operator can choose one of them that reserve ident value wantonly, when the mobile subscriber roams, the cryptographic algorithm conflict just takes place probably like this.Such as: two different countries have adopted the cryptographic algorithm of different independent developments, and identical cryptographic algorithm sign has been selected for this cryptographic algorithm by two countries, so, process according to existing safe mode setting, when certain national user roams to another country, during consulted encryption algorithm, because the cryptographic algorithm ident value is identical, both sides can set up normal connection, but in fact cryptographic algorithm is different, then because the conflict of cryptographic algorithm sign can cause both sides not communicate by letter normally.
In view of this, once in another patent application, a solution was proposed the problems referred to above, this method is: increase user ID (CI) bit, and increase the judgement of the cryptographic algorithm that this CI and active user and network are supported, when all supporting the Standard Encryption algorithm for external user and user and network, or when all supporting the cryptographic algorithm of the same a kind of independent development beyond the Standard Encryption algorithm, can carry out normal secure communication for domestic user and user and network; Otherwise both sides can not carry out secure communication.But, because this scheme has increased redetermination bit and differentiation process, make whole message structure, message transmission, parameter value setting and control flow all need corresponding increase or change, existing handling process is had certain influence, realize it not being very convenient.
Summary of the invention
Therefore, main purpose of the present invention is to provide the method for Radio Link cryptographic algorithm in a kind of autonomous selective secret communication, make the user all can adopt effective cryptographic algorithm to carry out normal secure communication anywhere, both allowed the coexistence of Standard Encryption algorithm and independent development cryptographic algorithm, simplify the selected process of cryptographic algorithm again, and then guaranteed user's the interests and the quality of service.
For achieving the above object, technical scheme of the present invention is achieved in that
The method of Radio Link cryptographic algorithm in a kind of autonomous selective secret communication, subscriber equipment (UE) and core net are sent to Access Network by message with the cryptographic algorithm indication of oneself supporting respectively, by the selected final cryptographic algorithm of using of the base station controller of Access Network, wherein, subscriber equipment is sent in the message of Access Network and also carries user ID; This Access Network selected encryption algorithm specifically may further comprise the steps:
A., Mobile Country Code MCC (MCC) correspondence table is set in the access network base stations controller in advance, and at least a independent development cryptographic algorithm that storage current country or operator support in this MCC correspondence table, and use the country of identical algorithms or the MCC of operator with every kind of independent development cryptographic algorithm;
B. base station controller obtains active user's MCC according to the user ID (UE ID) that receives, then, judge whether the MCC correspondence table of self storing is empty, if the MCC correspondence table is not for containing the MCC identical with active user MCC in sky and the MCC correspondence table, then base station controller judges according to the core net cryptographic algorithm indication that receives whether core net supports the independent development cryptographic algorithm of active user MCC correspondence, if support, then selected this independent development cryptographic algorithm is as the cryptographic algorithm of secure communication, otherwise, cancel this connection; If do not have MCC or MCC correspondence table identical in the MCC correspondence table for empty with this MCC, the Standard Encryption algorithm that then selected a kind of UE and core net are all supported.
Wherein, the Standard Encryption algorithm all supported of selected UE of base station controller described in the step b and core net specifically: base station controller is selected according to the UE security capabilities algorithm indication of the core net cryptographic algorithm indication that receives and self storage.
Step b further comprises: as MCC identical with active user MCC in the MCC correspondence table during more than, base station controller will be according to the cryptographic algorithm ability of UE and the core net cryptographic algorithm indication that receives, judge respectively whether UE and core net support these more than one independent development cryptographic algorithm simultaneously, if all support, the cryptographic algorithm of the independent development of then choosing any one kind of them is as the cryptographic algorithm of secure communication; Otherwise a kind of independent development cryptographic algorithm that selected UE and core net are all supported is as the cryptographic algorithm of secure communication.
In the said process, base station controller can be stored in the register after extracting active user's MCC.
When described MCC correspondence table is empty, illustrate that the active user supports the Standard Encryption algorithm of all permissions to use.When active user's MCC is not contained in the MCC correspondence table that prestores in the base station controller, illustrate that this user only supports the Standard Encryption algorithm of all permissions to use.
By such scheme as can be seen, key of the present invention is: set in advance the MCC correspondence table in Access Network, select the cryptographic algorithm of carrying out secure communication according to the relation of element in the state of MCC correspondence table or active user MCC and the MCC correspondence table again.
As seen, the method for Radio Link cryptographic algorithm in the autonomous selective secret communication provided by the present invention has following advantage and characteristics:
1) the MCC correspondence table of the present invention by in the base station controller of Access Network, setting in advance, select the cryptographic algorithm of current use, just the part of existing techniques in realizing process Access Network selected encryption algorithm is changed a little, and need not change whole security implementation flow process, revise few, little to the whole system influence, be easy to realize.
2) because method of the present invention has set in advance the MCC correspondence table in Access Network, use the country of identical independent development cryptographic algorithm or the MCC of operator's correspondence to be stored in this MCC correspondence table all, when the user roams, Access Network can be by the comparison to element in the active user MCC and the MCC correspondence table that prestores, select cryptographic algorithm, the conflict that may occur when like this, not only having avoided the user to roam; Simultaneously, can guarantee between a plurality of friendly operators with specific (special) requirements the interconnection and interflow when adopting identical independent development cryptographic algorithm, be a kind of implementation method that international roaming and air interface allow standard and non-standard algorithm application to coexist mutually that solves.
3) increased the processing of obtaining MCC the user ID (UE ID) from the active user in the process of the present invention, but be used to extract the UE ID of active user MCC, provide by existing message in the handling process, need not to increase extra bit or message, realize simple, convenient.
4) method of the present invention is changed into the method for judging selection according to MCC with the former cryptographic algorithm selection mode that fixes, and not only realization is simple, flexible, and is applicable to various mobile communications networks, has suitable versatility.
5) the present invention is in the MCC correspondence table that Access Network sets in advance, comprise that all and this country use the friendly countries or the operator of identical independent development cryptographic algorithm, this MCC correspondence table can be set to sky, when the MCC correspondence table is sky, illustrate that this country or this operator only support to use the Standard Encryption algorithm, be identical with prior art this moment.So, no matter the user is in local call or roaming, and Access Network all can be determined corresponding cryptographic algorithm directly by the comparison of element in the active user MCC and the MCC correspondence table that prestores.Therefore, the conflicting of existence between the present invention not only efficiently solves when roaming independent development cryptographic algorithm demand and the Standard Encryption algorithm is selected, and meet the demand that only adopts canonical algorithm operator fully.
Description of drawings
Fig. 1 is the signaling process figure that determines cryptographic algorithm in the prior art;
Fig. 2 determines the implementation method flow chart of cryptographic algorithm for the present invention.
Embodiment
The present invention is further described in more detail below in conjunction with drawings and the specific embodiments.
The prerequisite that the present invention realizes is: if when having defined the Standard Encryption algorithm of multiple permission in the standard, in order to be supported in the international roaming of global All Countries, the requirement system supports all Standard Encryption algorithms, the condition that must satisfy in these existing just all 3G mobile communication system.
For having country or the business system that special cryptographic algorithm requires, except supporting above-mentioned all Standard Encryption algorithms, core net also must be supported the non-standard cryptographic algorithm of at least one cover independent development.And, provide all to have all Standard Encryption algorithms and this non-standard cryptographic algorithm in the terminal of service and the Access Network simultaneously for the system user that must take special non-standard cryptographic algorithm.
Usually, when each user's start-up logging, the user sends connectivity request message to the base station controller of Access Network earlier, comprises the user ID (UE ID) of representing user identity in this connectivity request message, i.e. this user's IMSI; After Access Network is received this connectivity request message, take out user ID, promptly take out user's IMSI and preservation.Therefore, all can preserve its each user's of subordinate IMSI in each base station controller.
Based on above-mentioned prerequisite, the present invention proposes a kind of in Access Network the effective scheme of autonomously selecting enciphered algorithm, this method on the disposed of in its entirety flow process of safe mode with the prior art basically identical, just different on the cryptographic algorithm that Access Network is determined to be adopted, further say, the corresponding lists of the independent development cryptographic algorithm that a Mobile Country Code MCC (MCC) and current country or operator supported that in the base station controller of Access Network, prestores exactly, table 1 is depicted as an instantiation, current country or operator support two kinds of independent development cryptographic algorithm in the table 1, the country of every kind of corresponding several same these cryptographic algorithm of support of cryptographic algorithm or the MCC of operator.This base station controller is selected suitable cryptographic algorithm according to the state and the content of MCC correspondence table, and base station controller herein is meant BSC among the 2G or the radio network controller among the 3G (RNC) or the access control equipment with equal effect.
The independent development cryptographic algorithm of supporting Support the MCC of corresponding cryptographic algorithm
Independent development cryptographic algorithm 1 MCC1
MCC6
MCC8
Independent development cryptographic algorithm 2 MCC2
MCC3
MCC8
MCC9
Table 1
Adopt autonomously selecting enciphered algorithm of the present invention to realize the detailed process of secure communication, as shown in Figure 2, may further comprise the steps at least:
Step 201: in the base station controller of Access Network, set in advance a MCC correspondence table, use the country of identical independent development cryptographic algorithm or the MCC of operator to be stored in advance in this MCC correspondence table with current country or operator all.This table can be sky, also can comprise multiple independent development cryptographic algorithm or a plurality of MCC, when this country or operator support multiple independent development cryptographic algorithm simultaneously, and the independent development cryptographic algorithm of respectively corresponding each self-supporting of the MCC that is stored, as shown in table 1.When this table is sky, illustrate that current system only supports the cryptographic algorithm of standard; When corresponding every kind of independent development cryptographic algorithm has more than a MCC in this table, illustrated that a plurality of countries support the off-gauge cryptographic algorithm of this kind, an algorithm sign of the corresponding agreement in advance of this non-standard cryptographic algorithm.
Step 202: when the user makes a call or called out, UE carries the cryptographic algorithm ability parameter that UE possesses by the message A that is sent to Access Network, referring to shown in Figure 1, the cryptographic algorithm that this terminal of base station controller of notice Access Network is supported, this base station controller is stored the cryptographic algorithm information that current terminal is supported.Simultaneously, this user is sent to the UE id information of self in the Access Network, the base station controller of Access Network obtains corresponding M CC from receive the UE id information, this MCC can be temporary in the register, and UE ID herein typically refers to temporary mobile subscriber identity (TMSI).When core net was initiated safe mode, core net determined according to prior configuration which cryptographic algorithm permission selects for use, and issued Access Network by the information that message B will carry the network support cryptographic algorithm.
Step 203: after base station controller extracts MCC, judge that at first the MCC correspondence table of self storing is empty? if be empty, then enter step 208; If the MCC correspondence table is not empty, then enter step 204.
Step 204,205: base station controller compares element in MCC that extracts and the MCC correspondence table that self prestores one by one, if the MCC identical with active user MCC arranged in the MCC correspondence table, then enters step 206; Otherwise, enter step 208.
Step 206,207: base station controller is according to the cryptographic algorithm ability of UE and the core net cryptographic algorithm indication that receives, do you judge that respectively UE and core net support the cryptographic algorithm of this kind independent development? if support, then the cryptographic algorithm of selected this independent development is as the cryptographic algorithm of secure communication, enter step 209 then, though the MCC of current UE is contained in the MCC correspondence table, but because MCC is from user's UE ID, this UE ID is stored in the SIM card of portable terminal, and cryptographic algorithm is stored in the portable terminal, so need herein to judge once more whether UE supports current independent development cryptographic algorithm; Otherwise, cancel this connection.Wherein, for selecting of independent development cryptographic algorithm, if MCC identical with active user MCC in the MCC correspondence table is more than one, then base station controller will be according to the cryptographic algorithm ability of UE and the core net cryptographic algorithm indication that receives, do you judge respectively whether UE and core net support the cryptographic algorithm of this multiple independent development simultaneously? if all support, the cryptographic algorithm of the independent development of then choosing any one kind of them is as the cryptographic algorithm of secure communication; Otherwise a kind of independent development cryptographic algorithm that selected UE and core net are all supported is as the cryptographic algorithm of secure communication.
Step 208: base station controller is according to the handling process of prior art, UE security capabilities algorithm indication according to core net cryptographic algorithm indication that receives and storage, the Standard Encryption algorithm that selected a kind of terminal and core net are all supported enters step 209 then, finishes secure communication;
Step 209: Access Network is issued terminal use and core net by message C and message E respectively with the cryptographic algorithm sign of selected encryption algorithm correspondence, and as shown in Figure 1, both sides promptly adopt this selected cryptographic algorithm to carry out secure communication.
Said method is for the user that must take special non-standard cryptographic algorithm, provide the terminal and the network equipment of service all to have Standard Encryption algorithm and non-standard cryptographic algorithm, when in having the business system of non-standard cryptographic algorithm, using, will take special cryptographic algorithm according to the selection of MCC; If roam in the business system of other support Standard Encryption algorithms, can take the cryptographic algorithm communication of standard by the selection of MCC; If other terminal roaming of supporting the Standard Encryption algorithms when supporting the business system of non-standard cryptographic algorithm, also can adopt the encryption algorithm communication of standard by the MCC selection.
In addition, owing in base station controller, carry out the selection of cryptographic algorithm according to MCC, will seek common ground and all preserve identical MCC correspondence table in an operator all base station controllers in it comprises the region, when user's base station controller migration, corresponding UE ID also can move, and therefore can not influence above-mentioned process.
According to said method,, illustrate that this user adopts national non-standard cryptographic algorithm if the MCC that base station controller obtains is included in the MCC correspondence table; If the MCC that base station controller obtains is not included in the MCC correspondence table, illustrate that this user supports all Standard Encryption algorithms; If the MCC correspondence table is a null value, also be equal to the situation of only supporting to use the Standard Encryption algorithm fully.In other words be exactly: when national user uses at home, will choose this special cryptographic algorithm according to the selection of MCC and encrypt; When if national user uses in country that has identical non-standard cryptographic algorithm or business system, will choose this special cryptographic algorithm according to the selection of MCC and encrypt; When if national user roams into the country of other support Standard Encryption algorithm or business system, encrypt by the cryptographic algorithm of relatively selecting to select a kind of standard of MCC.Similarly, if when country that other supports the user of Standard Encryption algorithm to roam into to support non-standard cryptographic algorithm or business system, the encryption algorithm of relatively selecting to select a kind of standard too by MCC is encrypted, if when using in country that supports the user of certain non-standard cryptographic algorithm to roam into to have identical non-standard cryptographic algorithm or the business system, will choose this special cryptographic algorithm according to the selection of MCC and encrypt.
By said method, the problem between cryptographic algorithm demand and Standard Encryption algorithm are selected in the time of both can having solved roaming has guaranteed that again domestic, external user can select corresponding different cryptographic algorithm to carry out secure communication in different regions.

Claims (6)

1, the method for Radio Link cryptographic algorithm in a kind of autonomous selective secret communication, user equipment (UE) and core net are sent to Access Network by message with the cryptographic algorithm indication of oneself supporting respectively, by the selected final cryptographic algorithm of using of the base station controller of Access Network, wherein, subscriber equipment is sent in the message of Access Network and also carries user ID; It is characterized in that the Access Network selected encryption algorithm specifically may further comprise the steps:
A., Mobile Country Code MCC MCC correspondence table is set in the access network base stations controller in advance, and at least a independent development cryptographic algorithm that storage current country or operator support in this MCC correspondence table, and use the country of identical algorithms or the MCC of operator with every kind of independent development cryptographic algorithm;
B. base station controller obtains active user's MCC according to the user ID that receives, then, judge whether the MCC correspondence table of self storing is empty, if the MCC correspondence table is not for containing the MCC identical with active user MCC in sky and the MCC correspondence table, then base station controller judges according to the core net cryptographic algorithm indication that receives whether core net supports the independent development cryptographic algorithm of active user MCC correspondence, if support, then selected this independent development cryptographic algorithm is as the cryptographic algorithm of secure communication, otherwise, cancel this connection; If do not have MCC or MCC correspondence table identical in the MCC correspondence table for empty with this MCC, the Standard Encryption algorithm that then selected a kind of UE and core net are all supported.
2, method according to claim 1 is characterized in that: the Standard Encryption algorithm that selected UE of base station controller described in the step b and core net are all supported specifically: base station controller is selected according to the UE security capabilities algorithm indication of the core net cryptographic algorithm indication that receives and self storage.
3, method according to claim 1, it is characterized in that step b further comprises: as MCC identical in the MCC correspondence table during more than one with active user MCC, base station controller will be according to the cryptographic algorithm ability of UE and the core net cryptographic algorithm indication that receives, judge respectively whether UE and core net support these more than one independent development cryptographic algorithm simultaneously, if all support, the cryptographic algorithm of the independent development of then choosing any one kind of them is as the cryptographic algorithm of secure communication; Otherwise a kind of independent development cryptographic algorithm that selected UE and core net are all supported is as the cryptographic algorithm of secure communication.
4, method according to claim 1 is characterized in that: base station controller can be stored in the register after extracting active user's MCC.
5, method according to claim 1 is characterized in that: when described MCC correspondence table was empty, the active user supported the Standard Encryption algorithm of all permissions to use.
6, method according to claim 1 is characterized in that: when active user's MCC was not contained in the MCC correspondence table that prestores in the base station controller, this user only supported the Standard Encryption algorithm of all permissions to use.
CN02125676.4A 2002-07-26 2002-07-26 Method of wireless link encrypting aglorithm for autonomous selective secret communication Expired - Fee Related CN1219407C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN02125676.4A CN1219407C (en) 2002-07-26 2002-07-26 Method of wireless link encrypting aglorithm for autonomous selective secret communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN02125676.4A CN1219407C (en) 2002-07-26 2002-07-26 Method of wireless link encrypting aglorithm for autonomous selective secret communication

Publications (2)

Publication Number Publication Date
CN1471326A CN1471326A (en) 2004-01-28
CN1219407C true CN1219407C (en) 2005-09-14

Family

ID=34142999

Family Applications (1)

Application Number Title Priority Date Filing Date
CN02125676.4A Expired - Fee Related CN1219407C (en) 2002-07-26 2002-07-26 Method of wireless link encrypting aglorithm for autonomous selective secret communication

Country Status (1)

Country Link
CN (1) CN1219407C (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1332569C (en) * 2004-04-23 2007-08-15 中兴通讯股份有限公司 Method for selecting aerial interface encryption algorithm by negotiation
CN1697353B (en) * 2004-05-12 2010-04-21 北京信威通信技术股份有限公司 Encryption and encrypted communication method suitable to personal wireless communication system
GB0428084D0 (en) * 2004-12-22 2005-01-26 Nokia Corp Method for producing authentication information
CN101242629B (en) * 2007-02-05 2012-02-15 华为技术有限公司 Method, system and device for selection of algorithm of user plane
CN101262337B (en) * 2008-02-05 2012-06-06 中兴通讯股份有限公司 Secure function control method and system
CN102014381B (en) 2009-09-08 2012-12-12 华为技术有限公司 Encryption algorithm consultation method, network element and mobile station
CN102970678B (en) * 2009-09-08 2016-12-07 华为技术有限公司 Cryptographic algorithm negotiating method, network element and mobile station
CN102711105B (en) * 2012-05-18 2016-03-02 华为技术有限公司 The method, the Apparatus and system that communicate is carried out by mobile communications network
CN107454042A (en) * 2016-05-31 2017-12-08 中兴通讯股份有限公司 Message sending, receiving method and device
CN114222303A (en) * 2021-12-09 2022-03-22 北京航空航天大学 Method and device for realizing UE customized confidentiality and integrity protection algorithm

Also Published As

Publication number Publication date
CN1471326A (en) 2004-01-28

Similar Documents

Publication Publication Date Title
CN1184833C (en) Method of determining encrypted algorithm in secret communication based on mobile national code
CN1172469C (en) Method for realizing secrete communication by autonomously selecting enciphered algorithm
US20220312215A1 (en) Methods and systems for mitigating denial of service (dos) attack in a wireless network
CN1157982C (en) A security procedure in universal mobile telephone service
US20010044295A1 (en) Communication control apparatus and radio communications system
CN1214688C (en) Authentication method and authentication device for secured communications between an ATM mobile terminal and an ATM access node of a wireless ATM radio communication network
KR100690762B1 (en) A telephone call method and system for using many number in mobile communication station
US11234124B2 (en) Terminal information transfer method and relevant products
CN1666465A (en) System, apparatus and method for SIM-based authentication and encryption in wireless local area network access
CN1879335A (en) System for application server autonomous access across different types of access technology networks
CN1674507A (en) Multimedia information receiving and transmitting method system, gateway and customer's equipment
CN103491646A (en) Remote access to local network
CN1365562A (en) Method and apparatus for secure communication
WO2007086705A1 (en) Communication method for wireless network and wireless network system
EP1379097A1 (en) Method of furnishing illegal mobile equipment user information
FR2872366A1 (en) REUSING IDENTITY DATA OF AN IDENTITY MODULE IN A USER EQUIPMENT BY A PERIPHERAL DEVICE
CN1219407C (en) Method of wireless link encrypting aglorithm for autonomous selective secret communication
US6363151B1 (en) Method and system for subscriber authentification and/or encryption of items of information
KR101574594B1 (en) Non -Access Stratum protocol MANAGEMENT METHOD AND SYSTEM IN MOBILE TELECOMMUNICATION SYSTEM
CN101754210B (en) Method and system for authenticating home base station equipment
CN1601943A (en) Method of selecting safety communication algorithm
CN1659917A (en) Methods for allocating roaming number and forming visitor location register in mobile network, and mobile network
CN1489341A (en) Method and service device for allocating local network resource to terminal according to types of terminal
CN1315344C (en) Method of transmitting data in cluster business
CN1225871C (en) Method for distributing enciphered key in wireless local area network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20050914

Termination date: 20130726