Method and device for processing SRVCC switching, and terminal

 

A method and device for processing Single Radio Voice Call Continuity switching, and a related terminal are disclosed. In a technical solution of the disclosure, two sets of authentication parameters can be stored during the process of SRVCC switching, one set of which is stored into a card and the other set is stored into a temporary data area, and specific access to the authentication parameters is controlled by a switch variable so that a user does not need to consider using which data area. It is determined, after the SRVCC switching succeeds or fails, whether authentication parameters in the temporary data area need to be written into the card. Calculated authentication parameters are directly written into the card after the SRVCC switching is started, so that update of the authentication parameters is more flexible and signalling interaction with a network can be reduced.

 

 

TECHNICAL FIELD
The disclosure relates to the field of communications, and more particularly to a method and device for processing Single Radio Voice Call Continuity (SRVCC) switching, and an associated terminal.
BACKGROUND
With the continuous development of communication technologies, the technology in which it is able to make the voice service switched from a Packet Switching (PS) domain to a Circuit Switching (CS) domain appears. This technology is called SRVCC switching technology. The mode of SRVCC switching includes switching from a Time Division-Synchronization Code Division Multiple Access (TD-SCDMA) system to a TD-SCDMA system, switching from a TD-SCDMA system to a Global System for Mobile Communications (GSM) system, switching from a Long Term Evolution (LTE) system to a TD-SCDMA system, and switching from an LTE system to a GSM system. In a multi-mode system, the application of the SRVCC switching technology can greatly improve user experience.
A process of SRVCC switching is briefly described by taking SRVCC switching from an LTE system to a TD-SCDMA system for an example.
If the current system of a terminal is the LTE system, then a PS domain voice service is initiated. After the PS domain voice service is established, during the process of a call, a network side decides, due to signal quality, to carry out SRVCC switching. After resources of the network side are switched, the network side informs the terminal to switch to the TD-SCDMA system from the current LTE system. After the switching is completed, the terminal can continue to carry out the voice service under the TD-SCDMA system. During the process, other PS domain voice services may also be switched to the TD-SCDMA system for proceeding.
Due to that a voice service under an original system may be subjected to encryption and integrity protection, in order to switch the voice service to a target system from the original system successfully, original authentication parameters need to be treated such that they are applicable to the target system. During the mapping, the following problems would be involved, for example, whether to convert authentication parameters, when to start the conversion of the authentication parameters, when to store the converted authentication parameters into a card, and how to proceed the authentication parameters when the SRVCC switching fails. However, no related technology capable of solving the above problems is disclosed at present.
SUMMARY
The disclosure provides a method and device for processing SRVCC switching, and an associated terminal, which can be used to process authentication parameters during the process of SRVCC switching so that the SRVCC switching can be completed successfully without impacting a service.
To this end, a technical solution of the disclosure is implemented as follows.
A method for processing SRVCC switching includes that:
after a terminal receives an SRVCC switching command sent by a network side, the terminal determines whether a Packet Switching (PS) domain voice service under a current system of the terminal is subjected to encryption and integrity protection;
when the PS domain voice service under the current system of the terminal is subjected to encryption and integrity protection, PS domain authentication parameters in the current system are converted into Circuit Switching (CS) domain authentication parameters and PS domain authentication parameters in a target system;
the CS domain authentication parameters and the PS domain authentication parameters in the target system are stored into a temporary data area which can be accessed by a Non-Access Stratus (NAS) and an Access Stratus (AS), and a switch variable is set for the temporary data area; and
when the terminal determines that the SRVCC switching succeeds, the CS domain authentication parameters and the PS domain authentication parameters in the target system stored in the temporary data area are written into a card, and the switch variable is set as reading from the card.
When the terminal is switched to from an LTE system to a Time Division-Synchronization Code Division Multiple Access (TD-SCDMA) or Global System for Mobile Communications (GSM) system by terms of an SRVCC switching mode, the step of converting PS domain authentication parameters in the current LTE system into CS domain authentication parameters and PS domain authentication parameters in the TD-SCDMA or GSM system may include that:
the card to receive an Access Security Management Entity of Key (KASME), a downlink NAS COUNT value and a Key Set Identifier for E-UTRAN (Evolved Universal Terrestrial Radio Access Network) (eKsi) in the LTE system are read;
a Universal Mobile Telecommunications System (UMTS) integrity key (IK) and a UMTS ciphering key (Ck) are calculated;
a GSM ciphering key (Kc) of 64 bits is calculated according to the calculated IK and Ck;
a Kc of 128 bits is calculated according to the calculated IK and Ck;
a NewFlag used for indicating whether the calculated keys are new keys is set as invalid; and
a UMTS ciphering key sequence number (CKSN) and a GSM key set identifier (KSI) are set as the eKsi in the LTE system.
When the terminal is switched to from a TD-SCDMA system to a TD-SCDMA or GSM system by terms of an SRVCC switching mode, the step of converting PS domain authentication parameters in the current TD-SCDMA system into CS domain authentication parameters in the TD-SCDMA system or into CS domain authentication parameters and PS domain authentication parameters in the GSM system may include that:
an IK and a Ck are calculated;
a Kc of 64 bits is calculated according to the calculated IK and Ck;
a Kc of 128 bits is calculated according to the calculated IK and Ck;
a NewFlag is set as invalid; and
a CKSN and a KSI are set as a PS domain KSI in the current TD-SCDMA system.
A device for processing SRVCC switching includes:
an SRVCC switching command receiving module, configured to receive an SRVCC switching command sent by a network side;
an authentication parameter conversion module, configured to: determine whether a PS domain voice service under a current system of the terminal is subjected to encryption and integrity protection, and when the PS domain voice service under the current system of the terminal is subjected to encryption and integrity protection, convert PS domain authentication parameters in the current system into CS domain authentication parameters and PS domain authentication parameters in a target system;
an authentication parameter processing module, configured to: store the CS domain authentication parameters and the PS domain authentication parameters in the target system into a temporary data area which can be accessed by an NAS and an AS, and set a switch variable for the temporary data area; and
an authentication parameter writing module, configured to: when the terminal carries out SRVCC switching successfully, write, into a card, the CS domain authentication parameters and the PS domain authentication parameters in the target system stored in the temporary data area, and set the switch variable as reading from the card.
When the device is switched to from an LTE system to a TD-SCDMA or GSM system by terms of an SRVCC switching mode, the authentication parameter processing module may be further configured to:
read the card to receive a KASME, a downlink NAS COUNT value and an eKsi in the LTE system;
calculate an IK and a Ck;
calculate a Kc of 64 bits according to the calculated IK and Ck;
calculate a Kc of 128 bits according to the calculated IK and Ck;
set a NewFlag used for indicating whether the calculated keys are new keys, as invalid; and
set a CKSN and a KSI as the eKsi in the LTE system.
When the device is switched to from a TD-SCDMA system to a TD-SCDMA or GSM system by terms of an SRVCC switching mode, the authentication parameter processing module may be further configured to:
calculate an IK and a Ck;
calculate a Kc of 64 bits according to the calculated IK and Ck;
calculate a Kc of 128 bits according to the calculated IK and Ck;
set a NewFlag as invalid; and
set a CKSN and a KSI as a PS domain KSI in the current TD-SCDMA system.
A terminal includes a device for processing SRVCC switching, which includes:
an SRVCC switching command receiving module, configured to receive an SRVCC switching command sent by a network side;
an authentication parameter conversion module, configured to: determine whether a PS domain voice service under a current system of the terminal is subjected to encryption and integrity protection, and when the PS domain voice service under the current system of the terminal is subjected to encryption and integrity protection, convert PS domain authentication parameters in the current system into CS domain authentication parameters and PS domain authentication parameters in a target system;
an authentication parameter processing module, configured to: store the CS domain authentication parameters and the PS domain authentication parameters in the target system into a temporary data area which can be accessed by an NAS and an AS, and set a switch variable for the temporary data area; and
an authentication parameter writing module, configured to: when the terminal carries out SRVCC switching successfully, write, into a card, the CS domain authentication parameters and the PS domain authentication parameters in the target system stored in the temporary data area, and set the switch variable as reading from the card.
When the terminal is switched to from an LTE system to a TD-SCDMA or GSM system by terms of an SRVCC switching mode, the authentication parameter processing module may be further configured to:
read the card to receive a KASME, a downlink NAS COUNT value and an eKsi in the LTE system;
calculate an IK and a Ck by using a formula derived key=HMAC-SHA-256 (Key, S);
calculate a Kc of 64 bits according to the calculated IK and Ck;
calculate a Kc of 128 bits according to the calculated IK and Ck;
set a NewFlag used for indicating whether the calculated keys are new keys, as invalid; and
set a CKSN and a KSI as the eKsi in the LTE system.
When the terminal is switched to from a TD-SCDMA system to a TD-SCDMA or GSM system by terms of an SRVCC switching mode, the authentication parameter processing module may be further configured to:
calculate an IK and a Ck;
calculate a Kc of 64 bits according to the calculated IK and Ck;
calculate a Kc of 128 bits according to the calculated IK and Ck;
set a NewFlag as invalid; and
set a CKSN and a KSI as a PS domain KSI in the current TD-SCDMA system.
It can be seen from the solution of the disclosure, compared with the existing technologies, two sets of authentication parameters can be stored during the process of SRVCC switching, one set of which is stored into a card and the other set of which is stored into a temporary data area, and access to the authentication parameters is controlled by a switch variable so that a user does not need to consider using which data area. It is determined, after the SRVCC switching succeeds or fails, whether authentication parameters in the temporary data area need to be written into the card. Calculated authentication parameters are directly written into the card after the SRVCC switching is started, so that update of the authentication parameters is more flexible and signalling interaction with a network can be reduced.
BRIEF DESCRIPTION OF THE DRAWINGS
The accompanying drawings illustrated here are intended to provide further understanding to the disclosure, and constitute a portion of the disclosure. Illustrative embodiments of the disclosure and description thereof are used to explain the disclosure instead of constituting improper restriction to the disclosure. In the accompanying drawings:
FIG. 1 is a flowchart of a method for processing SRVCC switching according to the disclosure;
FIG. 2 is a flowchart of a method for processing SRVCC switching according to an embodiment of the disclosure; and
FIG. 3 is a structural diagram of a device for processing SRVCC switching according to the disclosure.
DETAILED DESCRIPTION
To make a technical problem to be solved, a technical solution, and beneficial effects of the disclosure clearer and easier to be understood, the disclosure is further elaborated below with reference to the drawings and embodiments. It should be understood that the specific embodiments described here are only intended to interpret the disclosure instead of limiting the disclosure.
As shown in FIG. 1, a method for processing SRVCC switching according to the disclosure includes the following steps.
Step 101: after a terminal receives an SRVCC switching command sent by a network side, the terminal determines whether a PS domain voice service under a current system of the terminal is subjected to encryption and integrity protection, and when the PS domain voice service under the current system of the terminal is subjected to encryption and integrity protection, the terminal converts PS domain authentication parameters in the current system into CS domain authentication parameters and PS domain authentication parameters in a target system.
Step 102: the CS domain authentication parameters and the PS domain authentication parameters in the target system are stored into a temporary data area which can be accessed by an NAS and an AS, and a switch variable is set for the temporary data area.
Step 103: when the terminal determines the SRVCC switching succeeds, the terminal writes, into a card, the CS domain authentication parameters and the PS domain authentication parameters in the target system stored in the temporary data area, and sets the switch variable as reading from the card.
In Step 101, when the SRVCC switching is performed on the terminal, the current system of the terminal may be LTE or TD-SCDMA system, and the target system of the terminal may be TD-SCDMA or GSM system. For example, when it is switched from the current LTE system to the TD-SCDMA or GSM system for the SRVCC of the terminal, the process of converting PS domain authentication parameters in the current LTE system into CS domain authentication parameters and PS domain authentication parameters in the TD-SCDMA or GSM system includes that:
(1) the card is read to receive an Access Security Management Entity of Key (KASME), a downlink NAS COUNT value and a Key Set Identifier for E-UTRAN (eKsi) in the LTE system,
(2) an IK and a Ck are calculated,
(3) a Kc of 64 bits is calculated according to the calculated IK and Ck,
(4) a Kc of 128 bits is calculated according to the calculated IK and Ck,
(5) a NewFlag used for indicating whether the calculated keys are new keys is set as invalid, and
(6) a CKSN and a KSI are set as the eKsi in the LTE system.
In another example, when it is switched from the current TD-SCDMA system to the TD-SCDMA or GSM system for the SRVCC of the terminal, the process of converting PS domain authentication parameters in the current TD-SCDMA system into CS domain authentication parameters in the TD-SCDMA system or into CS domain authentication parameters and PS domain authentication parameters in the GSM system includes that:
(1) an IK and a Ck are calculated,
(2) a Kc of 64 bits is calculated according to the calculated IK and Ck,
(3) a Kc of 128 bits is calculated according to the calculated IK and Ck,
(4) a NewFlag is set as invalid, and
(5) a CKSN and a KSI are set as a PS domain KSI in the current TD-SCDMA system.
Referring to FIG. 2, FIG. 2 is a flowchart of a method for processing SRVCC switching according to an embodiment of the disclosure. The method may mainly include the following steps.
Step 201: a terminal determines whether to calculate authentication parameters. If authentication parameters need to be calculated, Step 202 is executed. If no authentication parameters need to be calculated, the current flow ends.
Step 202: the terminal calculates the authentication parameters with reference to the following second step.
Step 203: the terminal stores the authentication parameters into a temporary data area, and sets a read switch variable as reading from the temporary data area.
Step 204: the terminal carries out SRVCC switching by using the authentication parameters in the temporary data area.
Step 205: it is determined whether the SRVCC switching succeeds. If the SRVCC switching succeeds, Step 206 is executed. If the SRVCC switching fails, Step 207 is executed.
Step 206: the terminal stores the authentication parameters in the temporary data area into a card, and Step 208 is executed.
Step 207: the terminal cancels the authentication parameters in the temporary data area, and Step 208 is executed.
Step 208: the terminal sets the switch variable as reading from the card, and the current flow ends.
During the process of communications, an encryption key and an integrity protection key are generated by the card through calculation and stored in the card, and the encryption key or the integrity protection key is obtained from the card when there is a need for encryption or integrity protection. The flow of the method for processing SRVCC switching according to the embodiment of the disclosure includes the following steps.
First step: if a PS domain voice service is an emergency voice service, then the PS domain voice service may not be subjected to integrity protection. In view of this situation, the terminal needs not to calculate the authentication parameters in the case of SRVCC switching.
Second step: when a voice service under the current system is subjected to encryption and integrity protection, it needs to calculate CS domain authentication parameters and PS domain authentication parameters in a target system according to PS domain authentication parameters in the current system. The calculation process is as follows.
In one case, when it is switched from the LTE system to the TD-SCDMA or GSM system for the SRVCC of the terminal,
a) The card is read to receive a KASME, a downlink NAS COUNT value and an eKsi in the LTE system. The downlink NAS COUNT value is a value of a counter used for counting NAS messages from a Mobile Management Entity (MME) and from a terminal, which value would be used at the time of integrity protection.
b) An IK and a Ck are calculated, where a specific calculation formula is derived key=HMAC-SHA-256 (Key, S) with reference to 33.220 B2 of the 3GPP protocol. For the input parameters, it can be referred to the 33.041 A.12 of the 3GPP protocol. HMAC-SHA-256 is a Hash encryption algorithm, with the parameters Key and S. The derived key is an encryption key calculated by the Hash encryption algorithm. A Hash Message Authentication Code (HMAC) Algorithm and a Secure Hash Algorithm (SHA) are a series of cryptographic Hash functions which are designed by the U.S. National Security Agency and published by the U.S. National Institute of Standards and Technology (NIST). Please refer to 33.220 B2 of the 3GPP protocol for the details of these algorithms, which are not repeated here. In the aforementioned mathematical formula,
S=FC∥P0∥L0∥P1∥L1∥P2∥L2∥P3∥L3∥ . . . ∥Pn∥Ln;
FC=0x1A;
P0=downlink NAS COUNT value;
L0=length of downlink NAS COUNT value (i.e. 0x00 0x04);
K=KASME;
derived key=CK∥IK,
Please refer to the 33.041 A.12 of the 3GPP protocol for the values of these parameters.
c) A Kc of 64 bits is calculated according to the calculated IK and Ck, by means of the C3 algorithm (6.8.1.2 of 33.102 of the 3GPP protocol).
After the IK and Ck are calculated according to the above step b), a Kc of 64 bits is calculated by means of the C3 algorithm according to the calculated IK and Ck. Please refer to 33.102 of the 3GPP protocol for the specific calculating method.
C3: Kc=CK1 xor CK2 xor IK1 xor IK2;
CK=CK1∥CK2;
IK=IK1∥K2,
where the CK1, CK2, Ik1 and Ik2 are of 64 bits respectively.
d) A Kc of 128 bits is calculated according to the calculated IK and Ck, please refer to 33.102 B.5 of the 3GPP protocol for specific parameter setting, and a specific calculation formula is derived key=HMAC-SHA-256 (Key, S) with reference to 33.220 B2 of the 3GPP protocol.
The calculation of the Kc of 128 bits is performed by means of the HMAC-SHA-256 algorithm with reference to a corresponding method in 33.102 B.5 of the 3GPP protocol.
FC=0x32;
K=CK∥IK;
derived key=Kc of 128 bits;
No input parameters (Pi, Li).
e) A NewFlag is set as invalid, whether the NewFlag is used for indicating whether the calculated keys are new keys, and will be used in the TD-SCDMA system.
f) A CKSN and a KSI are set as an eKsi.
In another example, when it is switched from the TD-SCDMA system to the TD-SCDMA or GSM system for the SRVCC of the terminal, a specific calculation method is as follows.
a) An IK and a Ck are calculated by means of the formula derived key=HMAC-SHA-256 (Key, S) with reference to 33.220 B2 of the 3GPP protocol. For the input parameters, please refer to 33.102 B.3 of the 3GPP protocol (a Nounce value).
b) A Kc of 64 bits is calculated according to the calculated IK and Ck. For the used specific algorithm, please refer to the C3 algorithm (6.8.1.2 of 33.102 of the 3GPP protocol).
c) A Kc of 128 bits is calculated according to the calculated IK and Ck. For specific parameter setting, please refer to 33.102 B.5 of the 3GPP protocol, and a specific calculation formula is derived key=HMAC-SHA-256 (Key, S) with reference to 33.220 B2 of the 3GPP protocol.
d) A NewFlag is set as invalid.
e) A CKSN and a KSI are set as a PS domain KSI.
Third step: after authentication parameters in a target system are calculated, the authentication parameters in the target system need not be stored into a card but are temporarily stored into a memory area which can be accessed by the NAS and the AS, and a switch variable is set, so that a temporary data area can be accessed by an access interface on the AS, and a read switch is set by the NAS for the interface without modification to the interface when the AS accesses the temporary data area.
Fourth step: if the SRVCC switching succeeds, the NAS is responsible for writing the authentication parameters stored in the temporary data area into the card, and setting the switch variable as reading from the card. If the SRVCC switching fails, the authentication parameters may not be written into the card, instead, the authentication parameters stored in the temporary data area are cancelled, and the switch variable is set as reading from the card.
Through the above steps, authentication processing and signalling interaction over an air interface may be reduced during the process of going back to the original system or switching to the target system.
The disclosure further provides a device for processing SRVCC switching. As shown in FIG. 3, the device for processing SRVCC switching includes:
an SRVCC switching command receiving module 10, configured to receive an SRVCC switching command sent by a network side,
an authentication parameter conversion module 20, configured to: determine whether a PS domain voice service under a current system of the device is subjected to encryption and integrity protection, and when the PS domain voice service under the current system of the device is subjected to encryption and integrity protection, convert PS domain authentication parameters in the current system into CS domain authentication parameters and PS domain authentication parameters in a target system,
an authentication parameter processing module 30, configured to: store the CS domain authentication parameters and the PS domain authentication parameters in the target system into a temporary data area which can be accessed by an NAS and an AS, and set a switch variable for the temporary data area, and
an authentication parameter writing module 40, configured to: when the terminal carries out SRVCC switching successfully, write, into a card, the CS domain authentication parameters and the PS domain authentication parameters in the target system stored in the temporary data area, and set the switch variable as reading from the card.
When the SRVCC switching is performed, the current system may be the LTE or TD-SCDMA system and the target system may is the TD-SCDMA or GSM system. For example, when the device is switched to from an LTE system to a TD-SCDMA or GSM system by terms of an SRVCC switching mode, the authentication parameter processing module may specifically be configured to:
read the card to receive a KASME, a downlink NAS COUNT value and an eKsi in the LTE system,
calculate an IK and a Ck by a calculation formula derived key=HMAC-SHA-256 (Key, S),
calculate a GSM ciphering key (Kc) of 64 bits according to the calculated IK and Ck,
calculate a Kc of 128 bits according to the calculated IK and Ck,
set a NewFlag used for indicating whether the calculated keys are new keys, as invalid, and
set a CKSN and a KSI as the eKsi in the LTE system.
For another example, when the device is switched to from a TD-SCDMA system to a TD-SCDMA or GSM system by terms of an SRVCC switching mode, the authentication parameter processing module may specifically configured to:
calculate an IK and a Ck by a calculation formula derived key=HMAC-SHA-256 (Key, S),
calculate a Kc of 64 bits according to the calculated IK and Ck,
calculate a Kc of 128 bits by a calculation formula derived key=HMAC-SHA-256 (Key, S) according to the calculated IK and Ck,
set a NewFlag as invalid, and
set a CKSN and a KSI as a PS domain KSI in the current TD-SCDMA system.
An embodiment of the disclosure further provides a terminal, which includes the aforementioned device for processing SRVCC switching. Referring to FIG. 3, the device for processing SRVCC switching includes:
an SRVCC switching command receiving module 10, configured to receive an SRVCC switching command sent by a network side,
an authentication parameter conversion module 20, configured to: determine whether a PS domain voice service under a current system of the terminal is subjected to encryption and integrity protection, and when the PS domain voice service under the current system of the terminal is subjected to encryption and integrity protection, convert PS domain authentication parameters in the current system into CS domain authentication parameters and PS domain authentication parameters in a target system,
an authentication parameter processing module 30, configured to: store the CS domain authentication parameters and the PS domain authentication parameters in the target system into a temporary data area which can be accessed by an NAS and an AS, and set a switch variable for the temporary data area, and
an authentication parameter writing module 40, configured to: when the terminal carries out SRVCC switching successfully, write, into a card, the CS domain authentication parameters and the PS domain authentication parameters in the target system stored in the temporary data area, and set the switch variable as reading from the card.
When the terminal is switched to from an LTE system to a TD-SCDMA or GSM system by terms of an SRVCC switching mode, the authentication parameter processing module may specifically be configured to:
read the card to receive a KASME, a downlink NAS COUNT value and an eKsi in the LTE system,
calculate an IK and a Ck by a calculation formula derived key=HMAC-SHA-256 (Key, S),
calculate a GSM ciphering key (Kc) of 64 bits according to the calculated IK and Ck,
calculate a Kc of 128 bits according to the calculated IK and Ck,
set a NewFlag used for indicating whether the calculated keys are new keys, as invalid, and
set a CKSN and a KSI as the eKsi in the LTE system.
Alternatively, when the terminal is switched to from a TD-SCDMA system to a TD-SCDMA or GSM system by terms of an SRVCC switching mode, the authentication parameter processing module may specifically configured to:
calculate an IK and a Ck by a calculation formula derived key=HMAC-SHA-256 (Key, S),
calculate a Kc of 64 bits according to the calculated IK and Ck,
calculate a Kc of 128 bits by a calculation formula derived key=HMAC-SHA-256 (Key, S) according to the calculated IK and Ck,
set a NewFlag as invalid, and
set a CKSN and a KSI as a PS domain KSI in the current TD-SCDMA system.
The terminal provided by the disclosure can store two sets of authentication parameters during the process of SRVCC switching, one set of which is stored into a card and the other set is stored into a temporary data area, and specific access to the authentication parameters is controlled by a switch variable so that a user does not need to consider using which data area. It is determined, only after the SRVCC switching succeeds or fails, whether authentication parameters in the temporary data area need to be written into the card. Calculated authentication parameters are directly written into the card after the SRVCC switching is started, so that update of the authentication parameters is more flexible and signalling interaction with a network can be reduced.
The foregoing description illustrates and describes the preferable embodiments of the disclosure. However, as previously mentioned, it should be understood that the disclosure is not restricted to the form disclosed by the present document and should not be regarded as exclusion of other embodiments, but can be used to various other combinations, modifications and environments and can be modified according to the above teaching or technologies or knowledge of related fields within the scope of conception of the disclosure described in the present document. Furthermore, modifications and changes made by those skilled in the art without departing from the spirit and principle of the disclosure shall fall within the scope of protection of the claims of the disclosure.


1. A method for processing Single Radio Voice Call Continuity (SRVCC) switching, comprising:
after a terminal receives an SRVCC switching command sent by a network side, determining, by the terminal, whether a Packet Switching (PS) domain voice service under a current system of the terminal is subjected to encryption and integrity protection;
when the PS domain voice service under the current system of the terminal is subjected to encryption and integrity protection, converting PS domain authentication parameters in the current system into Circuit Switching (CS) domain authentication parameters and PS domain authentication parameters in a target system;
storing, the CS domain authentication parameters and the PS domain authentication parameters in the target system into a temporary data area which can be accessed by a Non-Access Stratus (NAS) and an Access Stratus (AS), and setting a switch variable for the temporary data area; and
when the terminal determines that the SRVCC switching succeeds, writing, into a card, the CS domain authentication parameters and the PS domain authentication parameters in the target system stored in the temporary data area, and setting the switch variable as reading from the card.
2. The method according to claim 1, wherein when the terminal is switched from an LTE system to a Time Division-Synchronization Code Division Multiple Access (TD-SCDMA) or Global System for Mobile Communications (GSM) system by terms of an SRVCC switching mode, the step of converting PS domain authentication parameters in the current LTE system into CS domain authentication parameters and PS domain authentication parameters in the TD-SCDMA or GSM system comprises:
reading the card to receive an Access Security Management Entity of Key (KASME), a downlink NAS COUNT value and a Key Set Identifier for E-UTRAN (eKsi) in the LTE system;
calculating a Universal Mobile Telecommunications System (UMTS) integrity key (IK) and a UMTS ciphering key (Ck);
calculating a GSM ciphering key (Kc) of 64 bits according to the calculated IK and Ck;
calculating a Kc of 128 bits according to the calculated IK and Ck;
setting a NewFlag used for indicating whether the calculated keys are new keys, as invalid; and
setting a UMTS ciphering key sequence number (CKSN) and a GSM key set identifier (KSI) as the eKsi in the LTE system.
3. The method according to claim 1, wherein when the terminal is switched from a TD-SCDMA system to a TD-SCDMA or GSM system by terms of an SRVCC switching mode, the step of converting PS domain authentication parameters in the current TD-SCDMA system into CS domain authentication parameters in the TD-SCDMA system or into CS domain authentication parameters and PS domain authentication parameters in the GSM system comprises:
calculating an IK and a Ck;
calculating a Kc of 64 bits according to the calculated IK and Ck;
calculating a Kc of 128 bits according to the calculated IK and Ck;
setting a NewFlag as invalid; and
setting a CKSN and a KSI as a PS domain KSI in the current TD-SCDMA system.
4. A device for processing Single Radio Voice Call Continuity (SRVCC) switching, comprising:
an SRVCC switching command receiving module, configured to receive an SRVCC switching command sent by a network side;
an authentication parameter conversion module, configured to: determine whether a Packet Switching (PS) domain voice service under a current system of the device is subjected to encryption and integrity protection, and when the PS domain voice service under the current system of the device is subjected to encryption and integrity protection, convert PS domain authentication parameters in the current system into Circuit Switching (CS) domain authentication parameters and PS domain authentication parameters in a target system;
an authentication parameter processing module, configured to: store the CS domain authentication parameters and the PS domain authentication parameters in the target system into a temporary data area which can be accessed by a Non-Access Stratus (NAS) and an Access Stratus (AS), and set a switch variable for the temporary data area; and
an authentication parameter writing module, configured to: when the terminal carries out SRVCC switching successfully, write, into a card, the CS domain authentication parameters and the PS domain authentication parameters in the target system stored in the temporary data area, and set the switch variable as reading from the card.
5. The device according to claim 4, wherein when the device is switched to from an LTE system to a Time Division-Synchronization Code Division Multiple Access (TD-SCDMA) or Global System for Mobile Communications (GSM) system by terms of an SRVCC switching mode, the authentication parameter processing module is further configured to:
read the card to receive an Access Security Management Entity of Key (KASME), a downlink NAS COUNT value and a Key Set Identifier for E-UTRAN (eKsi) in the LTE system;
calculate a Universal Mobile Telecommunications System (UMTS) integrity key (IK) and a UMTS ciphering key (Ck);
calculate a GSM ciphering key (Kc) of 64 bits according to the calculated IK and Ck;
calculate a Kc of 128 bits according to the calculated IK and Ck;
set a NewFlag used for indicating whether the calculated keys are new keys, as invalid; and
set a UMTS ciphering key sequence number (CKSN) and a GSM key set identifier (KSI) as the eKsi in the LTE system.
6. The device according to claim 4, wherein when the device is switched to from a TD-SCDMA system to a TD-SCDMA or GSM system by terms of an SRVCC switching mode, the authentication parameter processing module is further configured to:
calculate an IK and a Ck;
calculate a Kc of 64 bits according to the calculated IK and Ck;
calculate a Kc of 128 bits according to the calculated IK and Ck;
set a NewFlag as invalid; and
set a CKSN and a KSI as a PS domain KSI in the current TD-SCDMA system.
7. A terminal, comprising: a device for processing Single Radio Voice Call Continuity (SRVCC) switching, which comprises:
an SRVCC switching command receiving module, configured to receive an SRVCC switching command sent by a network side;
an authentication parameter conversion module, configured to: determine whether a Packet Switching (PS) domain voice service under a current system of the terminal is subjected to encryption and integrity protection, and when the PS domain voice service under the current system of the terminal is subjected to encryption and integrity protection, convert PS domain authentication parameters in the current system into Circuit Switching (CS) domain authentication parameters and PS domain authentication parameters in a target system;
an authentication parameter processing module, configured to: store the CS domain authentication parameters and the PS domain authentication parameters in the target system into a temporary data area which can be accessed by a Non-Access Stratus (NAS) and an Access Stratus (AS), and set a switch variable for the temporary data area; and
an authentication parameter writing module, configured to: when the terminal carries out SRVCC switching successfully, write, into a card, the CS domain authentication parameters and the PS domain authentication parameters in the target system stored in the temporary data area, and set the switch variable as reading from the card.
8. The terminal according to claim 7, wherein when the terminal is switched to from an LTE system to a Time Division-Synchronization Code Division Multiple Access (TD-SCDMA) or Global System for Mobile Communications (GSM) system by terms of an SRVCC switching mode, the authentication parameter processing module is further configured to:
read the card to receive an Access Security Management Entity of Key (KASME), a downlink NAS COUNT value and a Key Set Identifier for E-UTRAN (eKsi) in the LTE system;
calculate a Universal Mobile Telecommunications System (UMTS) integrity key (1K) and a UMTS ciphering key (Ck) by using a formula derived key=HMAC-SHA-256 (Key, S);
calculate a GSM ciphering key (Kc) of 64 bits according to the calculated IK and Ck;
calculate a Kc of 128 bits according to the calculated IK and Ck;
set a NewFlag used for indicating whether the calculated keys are new keys, as invalid; and
set a UMTS ciphering key sequence number (CKSN) and a GSM key set identifier (KSI) as the eKsi in the LTE system.
9. The terminal according to claim 7, wherein when the terminal is switched to from a TD-SCDMA system to a TD-SCDMA or GSM system by terms of an SRVCC switching mode, the authentication parameter processing module is further configured to:
calculate an IK and a Ck;
calculate a Kc of 64 bits according to the calculated IK and Ck;
calculate a Kc of 128 bits according to the calculated IK and Ck;
set a NewFlag as invalid; and
set a CKSN and a KSI as a PS domain KSI in the current TD-SCDMA system.

 

 

Patent trol of patentswamp
Similar patents
a method for supporting broadcast transmission in a wireless communication system that comprises a plurality of communication cells, with broadcast content being routed from a base station to at least one wireless communication unit via at least one relay node is described. the method comprises, at the base station broadcasting the broadcast content from the base station to at least one from a group consisting of: the at least one rn , the at least one wireless communication unit ; and supplementing the broadcast transmission with at least one augmented unicast transmission associated with the broadcast content. a base station , an integrated circuit and a non-transitory computer program product comprising executable program code are also described. a relay node , an integrated circuit, a method performed at the relay node and a non-transitory computer program product comprising executable program code are also described.
a control information transmission apparatus which can reduce the interference power of the control signal of the terminal connected to the femtocell is provided. the control information transmission apparatus comprises an arrangement unit that arranges some or all of control signals for a terminal in an extension part among resources including a compatible part and the extension part; and a transmission unit that transmits some or all of the arranged control signals for the terminal.
the present invention provides a new system structure of mobile cellular system based on layered cloud computing. a core network part of the system structure includes a crg node, and an access network part includes an mc node and a du node. the system structure proposed in the present invention is compatible with all conventional mobile air interface protocols, supports the layered cloud computing function, and is capable of providing joint signal processing and joint scheduling, flexibly allocating computing resources among nodes, and compressing the structure of the core network, so that larger network data throughput can be provided for users with lower deployment cost.
Base station system // US9439241
a base station system includes a base station device , a wireless transmission device and a data transfer device , each of which can be installed outdoors. enclosures of the devices each provide a degree of protection from water and dust ingress necessary for being installed outdoors. the enclosure of the base station device accommodates electronic equipment functioning as a base station. the enclosure of the wireless transmission device accommodates electronic equipment functioning as a radio station to perform wireless transmission with the other device for connecting the base station device to a mobile backhaul network. the enclosure of the data transfer device accommodates electronic equipment functioning as a router or a switch to transfer data packets or data flames between the base station device and the wireless transmission device . this eliminates the need for construction of a building/shelter to install the base station system.
certain aspects of the present disclosure provide a method for wireless communications. the method generally includes allocating resources of a backhaul link between a donor base station and a relay base station to the relay station for communicating with the donor base station and transmitting a control channel indicating the allocated resources to the relay base station, wherein the control channel is transmitted on a subset of physical resource blocks of subframes assigned for downlink communications on the backhaul link.
a method for receiving a downlink signal at a downlink reception entity in a wireless communication system, the method includes: receiving downlink control information by demodulating an advanced physical downlink control channel of a first resource block pair of a rb bundle based on a downlink channel estimated by a first demodulation reference signal in the first rb pair; and receiving downlink data by demodulating a physical downlink shared channel of a second rb pair of the rb bundle based on a downlink channel estimated by a second dmrs in the second rb pair, wherein the same dmrs pattern is used for the first and the second dmrss, and wherein antenna ports for the first and the second dmrss are different.
a method is provided in one example embodiment and includes querying by a first communications network a database maintained by a second communications network for location data comprising a path typically taken by a mobile device; using the location data to identify network elements of the first communications network located proximate the path; and sending a page request for the mobile device only to the identified network elements. the method may further include mapping a first identifier for the mobile device to the second identifier for the mobile device; and using the second identifier to perform the querying. in certain embodiments, the mapping is initiated responsive to a call received for the mobile device.
a method manages the state of a plurality of micro base stations inside a mobile communication network. the network comprises at least a macro cell containing at least one tracking area covering a plurality of micro cells each one associated with a micro base station. the method to manage the states of micro cells comprises the steps of: switching on of all the micro base stations contained in said tracking area of the macro cell, counting of the messages of paging to determine the number of portable devices in idle mode inside said tracking area, and switching off at least one micro base station in the tracking area when the number of portable devices in idle mode in the said tracking area is lower than a first determined value. according to an improvement, the switching on of all the micro base stations contained in a tracking area is triggered when the current load of the macro cell exceeds a second determined value.
the present invention provides a method for implementation in mobile unit that is configured to communicate with a wireless communication system that includes macrocells and femtocells. the macrocells and the femtocells use different generation radio access technologies. the method includes determining a distance between the mobile unit and the femtocell and transmitting a first measurement report when the distance between the mobile unit and the femtocell is less than a threshold distance. the method also includes performing an inter-radio access technology handoff from the base transceiver station to the femtocell when the distance is less than a threshold distance.
wireless network data router for a vehicle, and operating method thereof, comprising: a multi-connection interface for wireless access in vehicular environments, herewith wave; a wireless local area network, herewith wi-fi, interface; a mobile network data interface; a downlink data connection for the vehicle and/or users in the vehicle and its vicinity; a data processing unit for routing data between said interfaces; wherein the data processing unit is configured to: calculate a score for each reachable network on the wave, wi-fi and mobile network interfaces; switch the uplink connection of the wireless network data router to the reachable network with the best score. also a wireless network data router for vehicles for connecting vehicles to the internet through a multi-network device, said router being a mobile router suitable to form a mesh network of connected vehicles, wherein the router is arranged for using parked cars for redistributing wi-fi signal from fixed hotspots.
To top