This application is based upon and claims the benefit of priority from the prior Japanese Patent Application No. 2006-052429, filed on Feb. 28, 2006, the entire contents of which are incorporated herein by reference.
1. Field of the Invention
The present invention relates to a communication network including a mobile radio equipment and a radio control system, especially relates to a mobile radio equipment and a radio control system suitably applied to the 3rd generation partnership project (3GPP), a standard of the mobile communication system developed by the standardization project of the 3rd generation mobile communication system.
2. Description of the Related Art
A network constituted by the radio network controllers (RNC) 2 and their subordinate radio base stations (Node B) 3 is called a UMTS Terrestrial Radio Access Network (UTRAN) 5. In the following explanation, the whole system on the base station side containing the UTRAN 5 and the core network (CN) 1 is called a radio control system, in contrast to the mobile radio equipment (UE) 4.
Communication through a transmission line (Uu) between the mobile radio equipment (UE) 4 and the radio base station (Node B) 3 is performed by radio. On the other hand, communications through a transmission line (Iub) between the radio base station (Node B) 3 and the radio network controller (RNC) 2, through a transmission line (Iu) between the radio network controller (RNC) 2 and the core network (CN) 1, and through a transmission line (Iur) between the radio network controller (RNC) 2 and another radio network controller (RNC) 2 are performed by wire.
In the 3GPP, the data flow direction from the core network (CN) 1 to the mobile radio equipment (UE) 4 is referred to as downlink (DL), and it's opposite direction as uplink (UL). Generally in the 3GPP, 96 radio base stations (Node B) 3 maximum are connected to each radio network controller (RNC) 2. About 1,000 mobile radio equipments (UE) 4 can be accommodated per one cell.
In the 3GPP system, for preventing third party from interception, information transmitted between the mobile radio equipment (UE) 4 and the UTRAN 5, such as user data, control information, and Temporary Mobile Subscriber Identity (TMSI) which is a temporary user-identifier are encrypted/decrypted by KASUMI algorism. The technical particulars of the encryption/decryption are explained in the documents TS33.102 (see, for example, “3GPP Specification detail”, http://www.3gpp.org/ftp/Specs/html-info/33102.htm (searched on Feb. 7, 2006)) and TS33.105 (see, for example, “3GPP Specification detail”, http://www.3gpp.org/ftp/Specs/html-info/33105.htm (searched on Feb. 7, 2006)) disclosed in the official website of 3GPP.
Here, the encryption/decryption mechanism is explained briefly.
The confidentiality-code generation block 7 performs f8 algorism specified by the 3GPP based on confidentiality parameters to generate a confidentiality code KEYSTREAM BLOCK. The exclusive OR operation unit 8 takes an exclusive OR of the confidentiality code KEYSTREAM BLOCK and unencrypted data bit by bit, to encrypt the unencrypted data. Confidentiality parameters required to generate the confidentiality code KEYSTREAM BLOCK are: a frame number COUNT-C; a connection type BEARER; transmission direction DIRECTION; the bit length to be encrypted or decrypted LENGTH; and the confidentiality key CK.
The frame number COUNT-C is variable and changes with conditions. The frame number COUNT-C consists of total of 32 bits consisting of a long period part (HFN) of 24, 25 or 20 bits and a short period part (CFN or SN) of 8, 7, or 12 bits. After confidentiality start time, every time when the short period part takes a round, the long period part is incremented. Other confidentiality parameters are fixed values. On the receiver side, the confidentiality-code generation block 7 generates a confidentiality code KEYSTREAM BLOCK by f8 algorism using the same confidentiality parameters as the transmitter side; and the exclusive OR operation unit 8 calculates bit by bit the exclusive OR of the confidentiality code KEYSTREAM BLOCK and the received data, to decrypt the data encrypted by the transmitter side.
The initial value of the hyper frame number (HFN) which is the long period part of the frame number COUNT-C, is notified from the mobile radio equipment (UE) 4, after the RRC connection is established. As shown in
In the example shown in
In such a case, a radio bearer setup signal may sometimes reach the mobile radio equipment (UE) 4 after the original confidentiality start time intended by the side of UTRAN 5 is over. Since the mobile radio equipment (UE) 4 derives the activation time from the received radio bearer setup signal, a gap will be produced between the confidentiality start time of UTRAN 5 and that of the mobile radio equipment (UE) 4.
On the other hand, there has been suggested a mobile communication terminal having security communication facilities and a server device communicating with the mobile communication terminal through a communication network (see, for example, Japanese Patent Application Laid-Open No. 2002-281558). When communicating, the mobile communication terminal detects the security level of the connection destination by a detection unit, and reports the detected security level to a user by a reporting unit. By these procedures, the user can check whether the security is ensured at the connection destination.
The server device includes a server side detection unit for detecting the security level, and a server side security level setting unit for setting up at least either a security level with which communication is permitted or a security level with which communication is not permitted. This allows a user to freely set up a required security level.
However, in the confidentiality processing described above, a different confidentiality code KEYSTREAM BLOCK is generated for every smallest unit of transmission to apply confidentiality on the data, so that most throughput capacity of the radio network controller (RNC) 2 and of the mobile radio equipment (UE) 4 is spent on this confidentiality processing. Therefore, the throughput capacity of both devices will be lowered. If the throughput capacity of the radio network controller (RNC) 2 is low, it will affect the mobile radio equipment (UE) 4 accommodating capacity, and the number of the mobile radio equipments (UE) 4 to be accommodated will be restricted.
Moreover, as described above, in the case when the confidentiality synchronization cannot be established between the radio network controller (RNC) 2 and the mobile radio equipment (UE) 4 due to the phase shifting of the frame number COUNT-C, there is no way to make the phases of the frame numbers COUNT-C coincide after that, thereby preventing the user of the mobile radio equipment (UE) 4 from utilizing the communication service. Furthermore, since the 3GPP system has no function to detect the difference of the phases of the frame numbers COUNT-C, the service providers cannot recognize that they are in the state where they cannot provide services. The same holds also at the time of a trouble outbreak.
It is an object of the present invention to at least solve the problems in the conventional technology.
A communication network according to an aspect of the present invention includes a mobile radio equipment and a radio control system between which data encrypted at different security levels are transmitted bi-directionally. The mobile radio equipment includes: a security-level selection unit that selects a security level from among a plurality of security levels; an encryption unit that encrypts transmitting data to be transmitted to the radio control system using confidentiality parameters that are notified from the radio control system and correspond to the security level chosen by the security-level selection unit; and a decryption unit that decrypts received data from the radio control system using the confidentiality parameters that are notified from the radio control system and correspond to the security level chosen by the security-level selection unit.
The other objects, features, and advantages of the present invention are specifically set forth in or will become apparent from the following detailed description of the invention when read in conjunction with the accompanying drawings.
Exemplary embodiments of the present invention are explained in detail below with reference to the accompanying drawings.
The security-level selection unit 11 selects one security level among a plurality of security levels. Upon selection, the user may just operate a user interface, such as a numerical keypad (not shown) of the mobile radio equipment (UE) 100. The security-level registration unit 12 registers beforehand with the radio control system 200 the security level used by the mobile radio equipment (UE) 100 for receiving signals.
The security-level-change request unit 13 requests the radio control system 200 to change the security level during a call. Upon request, the user may just operate the user interface, such as the numerical keypad of the mobile radio equipment (UE) 100, during a call.
The encryption unit 14 encrypts the data to be transmitted to the radio control system 200 using the confidentiality parameters notified from the radio control system 200 corresponding to the security level chosen by the security-level selection unit 11. When a security level change is requested by the security-level-change request unit 13 during a call, the encryption unit 14 changes the confidentiality parameters used for encrypting the transmitting data to the confidentiality parameters corresponding to the security level after change, with the timing notified from the radio control system 200 in response to the change request of the security level.
The decryption unit 15 decrypts the data received from the radio control system 200 using the confidentiality parameters notified from the radio control system 200 in response to the security level chosen by the security-level selection unit 11. When a change of a security level is requested by the security-level-change request unit 13 during a call, the decryption unit 15 changes the confidentiality parameters used for decrypting the received data to the confidentiality parameters corresponding to the security level after change, with the timing notified from the radio control system 200 in response to the change request of the security level.
The signal line 20 is a bus when the radio control system 200 consists of a single device, but it is a signal line by wire, such as a fiber-optic cable, when the radio control system 200 is constituted by two or more devices. The transmitting unit 28 transmits data to the mobile radio equipment (UE) 100 by radio. The receiving unit 29 receives data from the mobile radio equipment (UE) 100 by radio.
The confidentiality-parameter notifying unit 21 notifies the confidentiality parameters corresponding to the security level notified from the mobile radio equipment (UE) 100 to the mobile radio equipment (UE) 100. When the security-level acquisition unit 23 acquires a security level from the security-level storage unit 22, the confidentiality-parameter notifying unit 21 notifies the confidentiality parameters corresponding to the security level which the security-level acquisition unit 23 has acquired, to the mobile radio equipment (UE) 100.
Furthermore, when the security-level-change-request acquisition unit 24 acquires a security level change request from the mobile radio equipment (UE) 100, the confidentiality-parameter notifying unit 21 notifies the confidentiality parameters corresponding to the security level after change and the security level change start timing to the mobile radio equipment (UE) 100. The security-level storage unit 22 stores the security level notified from the mobile radio equipment (UE) 100 in advance to be used for receiving data. The security-level acquisition unit 23 acquires the security level stored in the security-level storage unit 22.
The security-level-change-request acquisition unit 24 acquires the security level change request from the mobile radio equipment (UE) 100 during a call. The fee change unit 25 changes the fee corresponding to the security level before the change into the fee corresponding to the security level after the change, when the security-level-change-request acquisition unit 24 acquires the security level change request from the mobile radio equipment (UE) 100.
The encryption unit 26 encrypts the data for transmitting to the mobile radio equipment (UE) 100, using the same confidentiality parameters as those the confidentiality-parameter notifying unit 21 has notified to the mobile radio equipment (UE) 100. When the security-level-change-request acquisition unit 24 acquires the security level change request during a call, the encryption unit 26 changes the confidentiality parameters used for encrypting the transmitting data to the confidentiality parameters corresponding to the security level after change, with a security level change start timing which the confidentiality-parameter notifying unit 21 has notified to the mobile radio equipment (UE) 100.
The decryption unit 26 decrypts the data received from the mobile radio equipment (UE) 100, using the same confidentiality parameters as those the confidentiality-parameter notifying unit 21 has notified to the mobile radio equipment (UE) 100. When the security-level-change-request acquisition unit 24 acquires the security level change request during a call, the decryption unit 27 changes the confidentiality parameters used for decrypting the received data to the confidentiality parameters corresponding to the security level after change, with the security level change start timing which the confidentiality-parameter notifying unit 21 has notified to the mobile radio equipment (UE) 100.
Hereafter, explanation is made using an example where the mobile radio equipment (UE) 100 and the radio control system 200 described above are applied to the 3GPP system shown in
The security-level acquisition unit 23 and the fee change unit 25 correspond to the MSC. The security-level storage unit 22 corresponds to a home location register (HLR) (not shown) in the core network (CN) 1 in the network configuration shown in
An example of the confidentiality parameters are given in the following Table 1, and an example system of the security levels and the fee is shown in the following Table 2.
In the examples of Table 1 and Table 2, when the ciphering algorism ALGORISM is “01”, for example, the security level is “1” and a confidentiality processing is not performed so that the fee is least expensive. At the security level 1, since a calculation of confidentiality code KEYSTREAM BROCK by f8 algorism is not necessary and scramble is not performed on data, the processing load on the radio network controller (RNC) is reduced. Therefore, the number of users to be accommodated can be increased. In addition, in the code-division multiple access (CDMA) system, since the code is multiplexed and interception is difficult, sufficient security is guaranteed even if confidentiality processing is not performed.
When the ciphering algorism ALGORISM is “02”, the security level is “2”.
However, since it is not necessary to calculate the confidentiality code KEYSTREAM BLOCK with f8 algorism at the security level 2, the fee is less expensive than the security level 3 and security level 4 described later. Moreover, since the processing load on the radio network controller (RNC) is reduced compared with the load of confidentiality processing at the security level 4 described later, a user accommodation capacity can be improved.
When the ciphering algorism ALGORISM is “03”, the security level is “3”.
Since the frame number COUNT-C is fixed at the security level 3, the values of COUNT-C do not differ between the mobile radio equipment (UE) and the radio network controller (RNC). That is, it is always possible to establish the confidentiality synchronization. Therefore, the mobile radio equipment (UE) and the radio network controller (RNC) do not need to regulate (synchronize) the frame numbers COUNT-C, a processing load of the radio network controller (RNC) is reduced by that amount, and the user accommodation capacity is improved.
When the ciphering algorism ALGORISM is “04”, the security level is “4”. Since confidentiality processing is performed using a variable frame number COUNT-C, the connection type BEARER, the transmission direction DIRECTION, the bit length LENGTH, and the confidentiality key CK, the fee is the highest. At the security level 4, the confidentiality processing is the same as in the conventional 3GPP system.
Subsequently, the mobile radio equipment (UE) notifies a CM service request to MSC, in order to request the service to use and the security level upon receiving the service (Step S2). Parameters of the CM service request are given in the following Table 3.
Next, MSC transmits an authentication request to the mobile radio equipment (UE), in order to perform authentication with the mobile radio equipment (UE) (Step S3). The mobile radio equipment (UE) performs authentication when it receives the authentication request, and notifies the authentication result to MSC by an authentication response (Step S4).
Upon receiving the authentication response, MSC notifies the confidentiality parameters conforming with the security level notified from mobile radio equipment (UE) to the radio network controller (RNC) by a security mode command (Step S5). On that occasion, MSC notifies all the confidentiality parameters in order to deal with the security level switching-over during telecommunication.
The radio network controller (RNC) receives the security mode command and notifies the parameters to be used to the mobile radio equipment (UE) by the security mode command, in order to establish the confidentiality synchronization with the mobile radio equipment (UE) following the specified confidentiality procedure (Step S6). Thus, the confidentiality at the security level specified by the mobile radio equipment (UE) becomes executable, and subsequently a call (communication) establishment procedure is performed.
Next, MSC executes paging in order to notify the destination mobile radio equipment (UE) that it has received an arrival (Step S14). When an RRC connection is established between RNC and the destination mobile radio equipment (UE), the destination mobile radio equipment (UE) receives the paging and returns a paging response to MSC (Step S15). Subsequently, MSC transmits an authentication request to the destination mobile radio equipment (UE) in order to perform authentication with the destination mobile radio equipment (UE) (Step S16). When the destination mobile radio equipment (UE) receives authentication request, it performs authentication and notifies the authentication result to MSC by the authentication response (Step S17).
Next, MSC makes a request to HLR for acquisition of the security level registered beforehand by the destination mobile radio equipment (UE) (Step S18), and acquires (downloads) the registered security level from HLR (Step S19). Then, MSC notifies the confidentiality parameters matched to the security level acquired from HLR to the radio network controller (RNC) by a security mode command (Step S20). On that occasion, MSC notifies all the confidentiality parameters in order to deal with the security level switching-over during telecommunication.
The radio network controller (RNC) receives the security mode command and notifies the parameters to be used to the destination mobile radio equipment (UE) by the security mode command, in order to establish confidentiality synchronization with the destination mobile radio equipment (UE) following the specified confidentiality procedure (Step S21). Then, a call (communication) establishment procedure is performed. Thus, the confidentiality at the security level registered beforehand by the destination mobile radio equipment (UE) becomes executable.
Subsequently, the mobile radio equipment (UE) notifies to MSC by a CM service request that it is a security level registration (Step S32). Then, MSC transmits an authentication request to the mobile radio equipment (UE), in order to perform authentication with the mobile radio equipment (UE) (Step S33). Upon receiving the authentication request, the mobile radio equipment (UE) performs authentication and notifies the authentication result to MSC by an authentication response (Step S34).
Upon receiving the authentication response, if the security level on reception has been already registered, MSC notifies the confidentiality parameters matched with the registered security level to the radio network controller (RNC) by the security mode command. When the security level on reception has not yet been registered, the confidentiality parameters matched with the default security level are notified (Step S35). The default setup is, although not particularly limited, is security level 4, for example.
The radio network controller (RNC) receives the security mode command and notifies the mobile radio equipment (UE) by the security mode command of the parameters to be used, in order to establish the confidentiality synchronization with the mobile radio equipment (UE) following the specified confidentiality procedure (Step S36). Next, after the confidentiality is established, the mobile radio equipment (UE) notifies the security level it requests to MSC by a security level request (Step S37).
MSC receives the security level request and asks for registration of the requested security level to HLR (Step S38). HLR returns a registration completion response to MSC, after registration of the security level is completed (Step S39). Upon receiving the registration completion response, MSC transmits a security level complete to the mobile radio equipment (UE) to notify that the registration of the security level is completed (Step S40). Thus, the security level of the mobile radio equipment (UE) on reception is registered.
Upon receiving the security level change request, the radio network controller (RNC) computes an activation time to determine the timing for changing the security level. It is necessary to change the fee system together with the change of the security level. Thus, the radio network controller (RNC) transmits the security level change request to MSC to notify that the security level is changed (Step S53).
Upon receiving the security level change request, MSC changes the fee setting. After completion of the fee setting change, MSC transmits security level change complete to the radio network controller (RNC) to notify the radio network controller (RNC) that change of fee setting has been completed (Step S54). On receiving the security level change complete, the radio network controller (RNC) notifies the computed activation time to the mobile radio equipment (UE) by a security level change complete (Step S55).
Thus, with the timing determined by the activation time, the mobile radio equipment (UE) and the radio network controller (RNC) switch-over the confidentiality level synchronously. This is effective when interception by a third party must be prevented for the reasons such as change of the transmitting topic to an important one in the middle of a call.
An example of accounting of CS call is shown in the following Table 4. An example of accounting of packet switched (PS) call is shown in the following Table 5. For example, in the case of CS call, communication time is measured and charge is imposed according to the communication time. In the case of PS call, a packet quantity is measured, and charge is imposed according to the packet quantity.
As explained above, according to the embodiment, the user of the mobile radio equipment (UE) can select the security level freely. Thus, such users of mobile radio equipments that select the security level 3 or the security level 4 of high confidentiality for transmission and reception of highly confidential data and select the security level 1 or the security level 2 of low confidentiality for transmission and reception of low confidentiality data will increase in number so that the load on the radio control system side can be reduced. And therefore, the mobile radio equipment accommodation capacity can be increased. Moreover, when the user of the mobile radio equipment (UE) cannot utilize the communication service due to the reason that the confidentiality synchronization cannot be established, the user can restore from the state unable to establish confidentiality synchronization by changing the security level, and becomes able to utilize the communication service.
Although the invention has been described with respect to a specific embodiment for a complete and clear disclosure, the appended claims are not to be thus limited but are to be construed as embodying all modifications and alternative constructions that may occur to one skilled in the art that fairly fall within the basic teaching herein set forth.
Number | Date | Country | Kind |
---|---|---|---|
2006-052429 | Feb 2006 | JP | national |