Repositioning processing method and system

A processing method and relocation technology, applied in the field of relocation, can solve the problems of not supporting encryption algorithms, failure of the relocation process, etc., and achieve the effect of avoiding the failure of the relocation process

Inactive Publication Date: 2011-04-27
ZTE CORP
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The technical effect of this patented technology allows for efficient rearrangement when an encrypted communication session fails due to differences or changes made during transmission over different networks (NW). This ensures continuous services are provided even if there were any issues with one network's protocol being used more frequently than another) while still providing reliable data transfers through these types of connections.

Problems solved by technology

Technological Problem addressed in this patents relating to wireless networks where multiple base stations provide services within their coverage areas while maintaining security measures against attacks caused by external sources like users' devices. Current solutions require manual intervention and have limitations in effectiveness because they only work at specific times based upon predetermined criteria.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Repositioning processing method and system
  • Repositioning processing method and system
  • Repositioning processing method and system

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0063] Example 1: The content carried in the relocation failure message is: the encryption algorithm used by the SRNC is not supported. This example includes the following steps:

[0064] Step 301, the target RNC receives a relocation request message. The message includes a list of preferred integrity protection algorithms and encryption algorithms recommended by the CN. The target RNC must select an available integrity algorithm and encryption algorithm from the integrity protection algorithm list and encryption algorithm list.

[0065] Step 302, the target RNC selects the integrity protection algorithm IA and encryption algorithm EA that the target RNC needs to use according to the integrity protection algorithm capability and encryption algorithm capability supported by itself, as well as the preferred integrity protection algorithm list recommended by the CN, and the preferred data encryption algorithm list .

[0066] Step 303, the target RNC acquires the integrity protect

example 2

[0068] Example 2: The content carried in the relocation failure message is: the encryption algorithm support capability of the target RNC itself. This example includes the following steps:

[0069] Step 401, the target RNC receives a relocation request message. The message includes a list of preferred integrity protection algorithms and encryption algorithms recommended by the CN. The target RNC must select an available integrity algorithm and encryption algorithm from the integrity protection algorithm list and encryption algorithm list.

[0070] Step 402, the target RNC selects the integrity protection algorithm IA and encryption algorithm EA that the target RNC needs to use according to the integrity protection algorithm capabilities and encryption algorithm capabilities supported by itself, as well as the preferred integrity protection algorithm list recommended by the CN, and the preferred data encryption algorithm list .

[0071] Step 403, the target RNC obtains the inte

example 3

[0073] Example 3: The content carried in the relocation failure message is: a list of preferred data encryption algorithms recommended by the CN. This example includes the following steps:

[0074] Step 501, the target RNC receives a relocation request message. The message includes a list of preferred integrity protection algorithms and encryption algorithms recommended by the CN. The target RNC must select an available integrity algorithm and encryption algorithm from the integrity protection algorithm list and encryption algorithm list.

[0075] Step 502, the target RNC selects the integrity protection algorithm IA and encryption algorithm EA that the target RNC needs to use according to the integrity protection algorithm capability and encryption algorithm capability supported by itself, as well as the preferred integrity protection algorithm list recommended by the CN, and the preferred data encryption algorithm list .

[0076] Step 503, the target RNC acquires the integri

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a repositioning processing method which comprises the following steps: the type of repositioning is as follows: when the repositioning does not involve a service radio network subsystem of user equipment, a target radio network controller (RNC) checks out that an encryption algorithm currently used by a source RNC in a repositioning request message is not matched with the encryption algorithm selected by a target RNC; and the target RNC returns a repositioning failure message to the source RNC. The invention also discloses a repositioning processing system. In the system, when the encryption algorithm currently used by the source RNC is not matched with the encryption algorithm selected by the target RNC, the target RNC returns the repositioning failure message to the source RNC through a repositioning failure message feedback unit. By adopting the method and the system, the problem of repositioning process failure caused as the encryption algorithm selected by the target RNC is different from the encryption algorithm currently used by the source RNC in the scene of SRNS repositioning not involving the UE can be solved.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products