Claims
- 1. A method of setting encryption for a connection in a radio system which comprises a plurality of mobile terminals, at least one switching center and at least one radio access network unit communicating with the switching center, the radio access network further comprising at least one control unit and, under its control, at least one base station, wherein commands are transmitted in the system using a plurality of protocol layers and wherein handling of encryption settings between the switching center and the base station in the radio system is carried out at different protocol layers than the handling of encryption settings of the mobile terminals, the method comprising the steps of:transmitting an encryption setting from the switching center to the control unit of the radio access network unit; encrypting the connection between the radio access network unit and the mobile terminal with the encryption settings, and transferring the encryption setting from the control unit to the mobile terminal transparently from the base station point of view.
- 2. A method as claimed in claim 1, in which the connection between the base station and the mobile terminal is encrypted with the encryption settings, wherein the method comprises the step of:transferring the encryption setting from the control unit to the base station for exclusive use by the base station.
- 3. A method as claimed in claim 2, further comprising the steps of:transferring the encryption setting from the control unit to the base station with a first protocol; and transferring the encryption setting from the control unit to mobile terminal with a second protocol, which is different than the first protocol.
- 4. A method as claimed in claim 3, further comprising the steps of:transmitting a message from the control unit to the base station to inform the base station of the encryption settings; transmitting a message from the base station to the control unit to acknowledge the encryption settings of the base station; transmitting a message from the control unit to the mobile terminal to inform the mobile terminal of the encryption settings; and transmitting a message from the mobile terminal to the control unit to acknowledge the encryption settings of the mobile terminal.
- 5. A method as claimed in claim 4, wherein the acknowledgement message on the base station encryption settings is additionally transferred control unit internally from one protocol to the next.
- 6. A method as claimed in claim 4, further comprising the steps of:encrypting the information message on the encryption settings to the mobile terminal with the old encryption setting; and encrypting the acknowledgement message on the encryption settings from the mobile terminal with the new encryption setting.
- 7. A method as claimed in claim 1, further comprising the step of:transferring the encryption setting in the middle of the communication connection to change the encryption into another.
Priority Claims (1)
Number |
Date |
Country |
Kind |
974133 |
Nov 1997 |
FI |
|
Parent Case Info
This application is a continuation of international application Ser. No. PCT/FI98/00857, filed Nov. 4, 1998.
US Referenced Citations (5)
Number |
Name |
Date |
Kind |
5717762 |
Aihara et al. |
Feb 1998 |
A |
5761619 |
Danne et al. |
Jun 1998 |
A |
5878036 |
Spartz et al. |
Mar 1999 |
A |
5987137 |
Karppanen et al. |
Nov 1999 |
A |
6249584 |
Hamalainen et al. |
Jun 2001 |
B1 |
Foreign Referenced Citations (2)
Number |
Date |
Country |
9826538 |
Jun 1998 |
WO |
9837721 |
Aug 1998 |
WO |
Non-Patent Literature Citations (2)
Entry |
International Search Report for PCT/FI98/00857, May 21, 1999. |
“The GSM System for Mobile Communications” Mouly, et al, 1992. |
Continuations (1)
|
Number |
Date |
Country |
Parent |
PCT/FI98/00857 |
Nov 1998 |
US |
Child |
09/559838 |
|
US |