Cluster group calling key distribution method based on asymmetric encryption system

An asymmetric encryption and clustering technology, applied in key distribution, can solve problems such as storage space and index limitations, and achieve the effect of strong confidentiality and enhanced confidentiality.

Inactive Publication Date: 2014-06-11
BEIJING XINWEI TELECOM TECH
View PDF8 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this method is that the group protection key needs to be preset in the terminal device, resulting in limitations of storage space and indexing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cluster group calling key distribution method based on asymmetric encryption system
  • Cluster group calling key distribution method based on asymmetric encryption system
  • Cluster group calling key distribution method based on asymmetric encryption system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The present invention will be further described in detail through specific embodiments below in conjunction with the accompanying drawings.

[0018] The network architecture of the wireless trunking communication system corresponding to this embodiment is as follows figure 1 As shown, it includes terminal, base station, switch and key management center. The functions of these components are described as follows:

[0019] Terminal: realizes the terminal function of the wireless trunking communication system network, is the interactive interface for users (not limited to humans, but also machines) to access the system, and provides users with services such as trunking voice.

[0020] Base station: realize the air interface function of the wireless trunking communication system, including the air interface physical layer, MAC layer and network layer functions, and connect users to different business service networks.

[0021] Switch: completes the control and management ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a cluster group calling key distribution method based on an asymmetric encryption system. The method includes the following steps that first, a group public key and a group private key are distributed to each cluster group; second, when a terminal initiates registration, the group private key of the cluster group which the terminal belongs to is acquired from an HLR; third, when the terminal initiates a cluster group encryption call, a cluster group calling key application message is sent to a key management center; fourth, the key management center generates a cluster group calling key, and the cluster group calling key is encrypted through the group public key of the cluster group which the terminal belongs to and then sent to all terminals in the cluster groups; fifth, the cluster group calling key is recovered after being decrypted by the terminal through the group private key belonging to the cluster group. The asymmetric group protection key is adopted for the method and does not need to be preset in terminal equipment, and thus the confidentiality is higher.

Description

technical field [0001] The invention relates to the field of wireless communication, in particular to a method for distributing trunk group call keys based on an asymmetric encryption system. Background technique [0002] In the cluster network, multiple users can form a cluster group, each cluster group corresponds to a group ID, and a group ID corresponds to a cluster group call end-to-end encryption key GEK, a user can be attached to in multiple cluster groups. [0003] In order to ensure the safe distribution of GEK, GEK needs to be encrypted before distribution. The current public distribution method is generally based on a symmetric encryption system, that is, the same key is used for encryption and decryption. This key is called a group protection key. The disadvantage of this method is that the group protection key needs to be preset in the terminal device, thus causing limitations in storage space and indexing. Contents of the invention [0004] In order to solv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30H04L9/08H04W4/08H04W4/10H04W8/04H04W12/04
Inventor 赵春平朱锋赵晓军许瑞锋
Owner BEIJING XINWEI TELECOM TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products