Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Cluster group call security encryption synchronization method

A security encryption and group call technology, which is applied in the field of communication, can solve problems such as passwords are easy to be cracked, the duration of secure calls is short, and the security of trunk group calls cannot be met, so as to achieve the effect of improving security

Inactive Publication Date: 2014-03-26
POTEVIO INFORMATION TECH
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] It is safe for cluster group calls to be made within the safe call time. If the safe call time is exceeded, the password is easy to be cracked
Obviously, the security call duration in the prior art is too short to meet the security requirements of trunking group calls

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cluster group call security encryption synchronization method
  • Cluster group call security encryption synchronization method
  • Cluster group call security encryption synchronization method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the object, technical solution and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0024] In the embodiment of the present invention, the number of SN digits in the PDU header is extended by N bits, the COUNT is composed of the extended SN and HFN, and the total length is still 32 bits; the encryption and decryption is performed by the COUNT including the extended SN using the stream cipher algorithm Password sync. Due to the adoption of the above technical solution, N is determined by the group call time limit. On the one hand, the safe call time can meet the needs of group calls. On the other hand, the SN will not overflow during a call. Therefore, eNB and UE do not need to maintain the HFN value. In addition, since the SN becomes longer and no longer overflows, the out-of-sync probability of the communication sys...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Provided is a cluster group call security encryption synchronization method. The method comprises that: an N is confirmed via cluster group call communication limit time; length of an SN is extended for N bits in a packet data convergence protocol PDCP layer protocol data unit PDU transmitting cluster group call information; and password synchronization is performed in encryption and / or decryption by a synchronization code COUNT comprising the extended SN via adopting a stream password algorithm. After application of the embodiment of the invention, security communication limit time is increased and security of a cluster group call is further enhanced.

Description

technical field [0001] The present application relates to the technical field of communications, and more specifically, to a method for secure encryption and synchronization of trunking group calls. Background technique [0002] The trunking communication system is a dedicated wireless communication system developed to meet the command and dispatch needs of industry users and is oriented to specific industry applications. In the system, a large number of wireless users share a small number of wireless channels, and the main application is command and dispatch. It is a multi-purpose, high-efficiency wireless communication system. Trunking communication systems are widely used in government departments, public safety, emergency communications, electric power, civil aviation, petrochemical and military fields. [0003] Since the transmission information of the trunking communication system requires high confidentiality, this requires the trunking communication system to have a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W4/08H04W12/02
Inventor 刘文清李瑞林陈永
Owner POTEVIO INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products