Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Achieving method and device for trunking group communication public security

A technology for public safety and trunking communication, applied in the field of communication, which can solve problems such as not supporting terminals

Inactive Publication Date: 2015-06-24
ZTE CORP
View PDF7 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a method and device for public security of trunking communication, to at least solve the problem in the related art that does not support terminals on the downlink public channel and realize multi-user security for point-to-multiple trunking services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Achieving method and device for trunking group communication public security
  • Achieving method and device for trunking group communication public security
  • Achieving method and device for trunking group communication public security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Hereinafter, the present invention will be described in detail with reference to the drawings and examples. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0029] figure 1 It is a flow chart of a method for implementing public security of trunking communication according to an embodiment of the present invention. Such as figure 1 As shown, the method includes: step S102 to step S108,

[0030] S102: When a terminal in the group initiates a group call, it receives a random number from the network side; before the terminal in the group initiates a group call, the following steps are required: the terminal is turned on and registered, and the network side initiates group information update reception The root key sent by the network side. The root key provided by the embodiment of the present invention is different from the existing LTE system. For examp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a trunking group communication public security implementation method and device, wherein said method comprises: when a terminal within a group initiates a group call, receiving a random number from a network side; in accordance with said random number and with a root key obtained in advance from the network side, generating an intermediate parameter, and also a first key used for non-access stratum (NAS) decryption and integrity protection; generating a second key in accordance with said intermediate parameter; in accordance with the second key, engaging in the decryption and integrity protection of data coming from a trunking group control channel (TGCCH) and from a trunking group traffic channel (TGTCH). The above technical solution provided in the present invention solves the problem of the related art whereby a terminal is not supported on a downlink shared channel in regard to a point-to-multipoint type of trunking group traffic, thus achieving multi-user security. A security mechanism for trunking group UE terminal trunking group communication public channels is thus implemented.

Description

technical field [0001] The communication field of the present invention, more specifically, relates to a method and device for realizing public security of trunking communication. Background technique [0002] In the existing LTE system, the downlink public broadcast channel does not have security protection, and the dedicated channel has its own security parameters for each user. However, due to the special requirements of the cluster, multiple users in the same group need to monitor a common channel together, so multiple security parameters need to be synchronized. [0003] At present, in related technologies, terminals are not supported on the downlink public channel, and for point-to-multiple trunking services, the problem of realizing multi-user security has not been proposed yet. Contents of the invention [0004] The present invention provides a method and device for trunking communication public security, to at least solve the problem in the related art that does ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/06H04W12/04
CPCH04L9/0869H04L9/3242H04L63/065H04M2203/609H04W12/04H04L12/1818H04M3/5116H04M2203/152H04W12/0431
Inventor 潘磊
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products