Unlock instant, AI-driven research and patent intelligence for your innovation.

System and method for implementing ciphered synchronous information transmission in digital cluster

An encryption synchronization and information transmission technology, which is applied in wireless communication, broadcast service distribution, network topology, etc., can solve problems such as loss, business channel data transmission delay, and impact on communication quality, so as to balance contradictions, save wireless resources, and ensure encryption Voice Quality Effects

Inactive Publication Date: 2009-07-15
ZTE CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

From the perspective of saving wireless channel resources, it is most appropriate to multiplex synchronization information and normal communication data and transmit them on existing service channels, which can effectively save channel resources; but on the other hand, real-time transmission between various communication entities Synchronization information, if the existing traffic channels are directly reused, it will inevitably lead to the delay or even loss of data transmission of some traffic channels, which will affect the normal communication quality. Therefore, it is necessary to achieve an effective trade-off between channel resource saving and channel transmission quality

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for implementing ciphered synchronous information transmission in digital cluster

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] like figure 1 Shown, the implementation steps of the inventive method in the CDMA digital trunking network are as follows:

[0041] Step S101, the BSC regularly sends a radio resource occupation list to the PDS, which includes the radio resource occupation of all BTSs connected to the BSC, and after receiving the radio resource occupation list sent by the BSC, the PDS refreshes the BTS resource occupation record maintained by the PDS;

[0042]Step S102, when the MS initiates an encrypted trunking call, the BSC sends the call request to the PDS, and the PDS determines the occupancy of all BTS wireless resources involved in the coverage area of ​​the encrypted trunking call according to the maintained BTS resource occupancy records, and judges the available wireless resources Whether the minimum number of BTSs can use a dedicated channel to transmit encrypted synchronization information. If yes, the encryption synchronization information transmission method of the encrypt...

Embodiment 2

[0049] Step 201, the BSC regularly sends a radio resource occupation list to the PDS, which includes the radio resource occupation of all BTSs connected to the BSC. After the PDS receives the radio resource occupation list sent by the BSC, it refreshes the BTS resource occupation records maintained by the PDS. The refreshed BTS resource occupation record determines that the BTS uses a dedicated channel or a multiplexed channel to transmit encrypted synchronization information. The specific determination method is that the PDS compares the BTS wireless resource occupation value reported by the BSC with the wireless resource threshold value set by the system. If the occupancy value has exceeded the threshold value set by the system, it is judged that the BTS uses the multiplex channel mode, otherwise, the dedicated channel mode is used;

[0050] Step 202, when the MS initiates an encrypted trunking call, the BSC sends the call request to the PDS, and the PDS judges whether there ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system which can realize encrypted synchronizing information transmission in a digital cluster, comprising a base station controller and a cluster calling distributing server. The base station controller is used for providing occupation conditions of radio resource of a base station transreceiver which is connected with the base station controller to the cluster calling distributing server; the cluster calling distributing server is used for making sure the transmitting mode of encrypted cluster calling encrypted synchronizing information according to the occupation condition of radio resource; and the transmitting mode is informed to the base station controller involved in the encrypted cluster calling process. When the encrypted cluster calling encrypted synchronizing information is transmitted, the two aspects of channel resource conservation and channel transmission quality can both be emphasized.

Description

technical field [0001] The invention relates to the communication security field of digital trunking, in particular to a system and method for realizing encrypted synchronous information transmission in digital trunking. Background technique [0002] With the rapid development of communication technology, digital trunking has gradually become an indispensable tool in people's daily work and life, and the demand for digital trunking communication security is becoming increasingly strong. The wireless communication network is an open network. If no security measures are taken and the wireless network is directly used for data communication, security problems will arise. [0003] In order to ensure the security of the trunking call, an appropriate encryption algorithm is usually selected to encrypt the call content. At present, the encryption algorithms widely used in digital trunking voice encryption services can basically be divided into two categories: sequence ciphers and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/06H04W12/02H04W72/04H04W84/08
Inventor 蒋峄
Owner ZTE CORP