Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, system and equipment for implementing end-to-end encipher of mobile cluster set call

A group call and trunking technology, applied in the field of communication

Inactive Publication Date: 2011-04-20
HUAWEI TECH CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] In the existing technology, it still cannot be performed in the case of a single-station cluster mode (or fault weakening mode) or a KMC failure (or communication interruption between the cluster system and KMC) End-to-end encrypted trunking group call; in addition, end-to-end encrypted group call KMC needs to participate in session key generation and distribution, which greatly increases the load of KMC and increases the call establishment delay of trunking group call end-to-end encrypted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and equipment for implementing end-to-end encipher of mobile cluster set call
  • Method, system and equipment for implementing end-to-end encipher of mobile cluster set call
  • Method, system and equipment for implementing end-to-end encipher of mobile cluster set call

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0038] The embodiment of the present invention discloses an implementation method applied to end-to-end encryption of trunking group calls, which is especially suitable for single-station trunking mode (or failure weakening mode) or KMC failure (or communication interruption between the system and KMC) scenarios End-to-end encryption of trunking group calls. The calling mobile station generates a session key SK (Session Key, session key) through the encryption modu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method for implementing group calling end-to-end encryption for mobile cluster comprising: transmitting session key request to calling encryption module, the session key request carrying group ID of group calling; receiving the session key of group key encryption corresponding to the group ID returned by the encryption module; transmitting the encryptedsession key to called mobile station. In the embodiment, end-to-end encryption cluster group calling can be still performed under single station cluster mode or KMC failure or end-to-end encryption application context of through mode; KMC is not needed to participate in session key generation and distribution in end-to-end encryption group calling, which largely reduces load of KMC and calling establishment time delay of end-to-end encryption of cluster group calling.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method, system and equipment for realizing end-to-end encryption of mobile cluster group calls. Background technique [0002] End-to-end encryption is the highest level of confidentiality in a dedicated communication system. It is suitable for occasions that have strict requirements on communication security, and it can realize the entire process of communication confidentiality from the sending end to the receiving end. During end-to-end encryption, the system does not participate in the generation and management of keys (encryption algorithms), and only provides transparent transmission channels. [0003] In the cluster network, multiple users can form a user group, each user group has a group number, a user group corresponds to a GK (Group Key, group key), and a user can belong to different groups. When the user prepares the group number, press the PTT (Push To Talk)...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W4/10H04W84/08H04W12/033H04W12/041
Inventor 肖飞龙
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products