Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Trunking group call service encryption method and trunking core network

An encryption method and core network technology, applied in broadcast service distribution, wireless communication, electrical components, etc., can solve problems such as security, one call and one secret, hidden dangers, etc., and achieve the effect of high security

Active Publication Date: 2020-02-11
DATANG MOBILE COMM EQUIP CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] Aiming at the defects of the prior art, the present invention provides a trunking group call service encryption method and a trunking core network, which can solve the problem that the trunking group call process in the prior art cannot realize trunking group call one-call-one-encryption, resulting in easy occurrence of security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trunking group call service encryption method and trunking core network
  • Trunking group call service encryption method and trunking core network
  • Trunking group call service encryption method and trunking core network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0044] figure 1 It is a schematic flow diagram of a cluster group call service encryption method in an embodiment of the present invention. In this embodiment, the execution subject is a cluster core network, such as figure 1 As shown, the trunking group call service encryption method in this embodiment includes steps S1 to S3, specifically as follows:

[0045] S1: After each group call is completed, the trunking core network adjusts a preset first group call...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a trunking group call service encryption method and a trunking core network. The method includes: the trunking core network adjusts a preset first group call parameter after each group call is completed, and the first call The parameter is used to indicate the number of group calls; the cluster core network obtains a new key by using a preset key derivation algorithm according to the root key information and the first group call parameters; the cluster core network obtains a new key during the group call process In the method, the first group call parameter is sent to the trunking terminal of the corresponding group, so that the trunking terminal determines a new key according to the first group call parameter and pre-acquired root key information. The invention meets the requirement of one-call-one-secret in the trunking group call process, has high security, and has little change to the standard.

Description

technical field [0001] The invention relates to the technical field, in particular to a cluster group call service encryption method and a cluster core network. Background technique [0002] The group call service is a typical service of the trunking. For the trunking terminals belonging to the same group, the group members share a downlink channel. According to the group call definition of the trunking service, the group call service transfers signaling services or data services through point-to-multiple The channel of the channel is shared with group users under all cells under the same tracking area (Tracking Area, TA for short). The existing group call process specifically includes: [0003] (1) According to the current CCSA cluster specification, after the LTE terminal is attached, it initiates cluster registration. After the registration is successful, the terminal will request group information from the network side. The process includes: the cluster terminal sends a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/08H04W72/04H04W88/08H04W88/14
CPCH04W4/08H04W88/08H04W88/14H04W72/29H04W72/51
Inventor 苏丽芳张玲
Owner DATANG MOBILE COMM EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products