CN107786511A - The method that group communication safety is realized in group system - Google Patents

The method that group communication safety is realized in group system Download PDF

Info

Publication number
CN107786511A
CN107786511A CN201610744491.XA CN201610744491A CN107786511A CN 107786511 A CN107786511 A CN 107786511A CN 201610744491 A CN201610744491 A CN 201610744491A CN 107786511 A CN107786511 A CN 107786511A
Authority
CN
China
Prior art keywords
group
security algorithm
security
membership
cluster
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201610744491.XA
Other languages
Chinese (zh)
Inventor
袁建设
赵春平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xinwei Telecom Technology Inc
Original Assignee
Beijing Xinwei Telecom Technology Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xinwei Telecom Technology Inc filed Critical Beijing Xinwei Telecom Technology Inc
Priority to CN201610744491.XA priority Critical patent/CN107786511A/en
Publication of CN107786511A publication Critical patent/CN107786511A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/065Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services

Abstract

The present invention proposes a kind of method that group communication safety is realized in group system, including:The priority of the security algorithm of the community supporting is set during group creating, a group security algorithm is arranged to a group attribute;According to group membership's cluster safety ability determination group security algorithm;Group security algorithm is issued to each group membership by group information updating message;Message is established by group context and issues cluster AS layers security algorithm to each base station where group membership.The selection of present invention group security algorithm has higher reliability and applicability;Group security algorithm issues the trigger mechanism for not destroying the message in existing flow, it is easy to accomplish;The transmission of NAS layer security algorithms is sightless to access network layer without AS layers;AS layers security algorithm is directly distributed by core net, has the whole network uniformity, saves handover delay.

Description

The method that group communication safety is realized in group system
Technical field
The present invention relates to the method that group communication safety is realized in wireless cluster communication, more particularly to group system.
Background technology
Trunked communication system is developed, the nothing towards specific industry application to meet industry user's command scheduling demand Line communication system.A large amount of wireless users share a small amount of wireless channel in system, are a kind of multi-purpose using command scheduling as main body application On the way, high-performance, dynamical wireless communication system.Broadband cluster communication system is widely used in government, public safety, meets an urgent need and lead to The fields such as letter, electric power, civil aviaton, petrochemical industry and army.Because trunked communication system is mainly used in private network field, it is desirable to higher Confidentiality.
When cluster group is established, core net exhales root key according to a group mark generation group, and preserves in the core network.Terminal During registration, group key and group mark are handed down to terminal by core net by point-to-point NAS message group information updating message.Terminal will Group identification information, group exhale root key information to be stored in RAM.When user establishes group calling, core net sends key parameter To terminal, terminal derives the Integrity Key and encryption key of NAS layers and AS layers according to relevant parameter.But how core net is selected Specific security algorithm is selected, and is had the problems such as how security algorithm is passed to terminal or eNB by core net to be solved.
In standard LTE network, the selection of algorithm only needs to consider the security capabilities of core net and unique user;And cluster leads to In communication network, the selection of algorithm needs to consider core net and the security capabilities of all group memberships, and core net needs to wait all groups After constituent clusters' registration, obtaining the security capabilities of group membership can just be selected afterwards.In the LTE network of standard, core NAS message security mode command and security mode complete cross in Netcom, complete NAS layer security algorithms Issue, eNB pass through AS layer message security mode command and security mode complete, complete AS layers Security algorithm issues.Because cluster registration occurs after LTE standard registration is completed, core net may not also obtain cluster group The whole security information of member, and SMC message has issued in LTE, so can not directly use SMC message in LTE on the time Transmit security algorithm identification;If after cluster registration is completed, the message for increasing by two similar SMC is carried out under security algorithm Hair, increased two message can upset original cluster message trigger mechanism, and can increase extra development amount.
The content of the invention
In view of the above-mentioned problems, the present invention proposes a kind of method that group communication safety is realized in group system, including:
During the group creating, the priority of the security algorithm of the community supporting is set, a group security algorithm is arranged to Group attribute;
According to the security algorithm priority of the group, client's hobby, group safety requirements rank, group membership's cluster safety energy Power or its any combination determine the group security algorithm of the group;
By group information updating message issue the group cluster NAS layers security algorithm and cluster AS layers security algorithm to Each group membership of the group;
Message is established by a group context, issues group membership of the cluster AS layers security algorithm of the group to the group Each base station at place.
Further, the priority for the security algorithm that the group is supported is according to the group attribute and/or use of the group Family hobby is set.
Further, group membership's cluster safety ability in the group membership of the group when cluster is registered by reporting.
Further, it is described according to the security algorithm priority of the group, client's hobby, group safety requirements rank, group Constituent clusters' security capabilities or its any combination determine the group security algorithm of the group, including:According to group membership's cluster Security capabilities, select the group security algorithm of security algorithm that each group membership of the group supports as the group.
Further, in addition to:If the security algorithm that each group membership of group supports is a variety of, further root According to security algorithm priority, client's hobby and/or group safety requirements rank, a kind of conduct is selected from a variety of security algorithms The group security algorithm of the group.
Further, in addition to:The security algorithm supported if there is no each group membership of the group, then described in setting Group is the group without safety assurance;Or, the security algorithm supported if there is no each group membership of the group, then:Root It is that each group membership of the group distributes weighted value according to group membership's priority;Calculate each security algorithm weight, the security algorithm power Weight is the weighted value sum for each group membership for supporting the algorithm;The maximum security algorithm of security algorithm weight is selected as the group The group security algorithm of group.
Further, in addition to:It is if there is multiple weight identical security algorithms, then further excellent according to security algorithm First level, client's hobby and/or group safety requirements rank, select a group as the group from the multiple security algorithm Security algorithm.
Further, it is described according to the security algorithm priority of the group, client's hobby, group safety requirements rank, group Constituent clusters' security capabilities or its any combination determine the group security algorithm of the group, including:According to group membership's priority, Weighted value is distributed for each group membership of the group;Each security algorithm weight is calculated, the security algorithm weight is the support algorithm Each group membership weighted value sum;The maximum security algorithm of security algorithm weight is selected to be calculated safely as the group of the group Method.
Further, in addition to:It is if there is multiple weight identical security algorithms, then further excellent according to security algorithm First level, client's hobby and/or group safety requirements rank, select a group as the group from the multiple security algorithm Security algorithm.
Further, in addition to:Group is exhaled when establishing, and derivative group exhales NAS safe keys and group to exhale AS safe keys, carries out group Group secure communication.
Being conceived based on identical, the present invention also proposes a kind of method that group communication safety is realized in group system, including: The group membership of the group reports cluster security capabilities when cluster is registered;Adhere to network and after connected state, pass through a group letter Cease new information and receive the group security algorithm of the group, and preserve;Group is exhaled when establishing, and receives the security parameter issued, derivative Group exhales safe key, carries out group security communication.
Further, described group of security algorithm includes cluster NAS security algorithms and cluster AS security algorithms.
Being conceived based on identical, the present invention also proposes a kind of method that group communication safety is realized in group system, including: The cluster AS security algorithms of group described in message sink are established by group context, and are preserved;Group is exhaled when establishing, and derivative group exhales peace Full key, carry out group security communication.
The method of the present invention is according to regular choice set groups such as the group membership's cluster safety ability and core net of group configurations The security algorithm of group, and algorithm mark safety is passed into UE and eNB.In the present invention, the selection of cluster group security algorithm is The rules such as the configuration of security capabilities and core net based on group membership are selected, and have higher reliability and applicability.Core Heart net establishes the security algorithm that message issues cluster group by using original group information updating message and group context, does not destroy The trigger mechanism of the message in existing flow, and be easily achieved.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are this hairs Some bright embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, can be with root Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is the basic step block diagram for the method that group security communication is realized in the group system of the present invention;
Fig. 2 is the overview flow chart that group security communicates in the embodiment of the present invention 1;
Fig. 3 is the schematic flow sheet that core net builds group, endpoint registration and group security algorithm selection in the embodiment of the present invention 2.
Fig. 4 is the FB(flow block) of the determination group security algorithm in the embodiment of the present invention 3;
Fig. 5 is the FB(flow block) of the determination group security algorithm in the embodiment of the present invention 4;
Fig. 6 is the FB(flow block) of the determination group security algorithm in the embodiment of the present invention 5;
Fig. 7 is the schematic flow sheet of core hair security algorithm off the net in the embodiment of the present invention 6.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is Part of the embodiment of the present invention, rather than whole embodiments;It should be noted that in the case where not conflicting, in the application Embodiment and embodiment in feature can be mutually combined.Based on the embodiment in the present invention, those of ordinary skill in the art The every other embodiment obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
One embodiment of the present of invention proposes a kind of method that group communication safety is realized in group system, refer to Fig. 1, Including:During group creating, the priority of the security algorithm of the community supporting is set, a group security algorithm is arranged to a group attribute; According to the security algorithm priority of the group, client's hobby, group safety requirements rank, group membership's cluster safety ability or its Any combination determines the group security algorithm of the group;The cluster NAS layers that the group is issued by group information updating message are pacified Full algorithm and cluster AS layers security algorithm give each group membership of the group;Message is established by a group context, issues the group The cluster AS layers security algorithm of group is to each base station where the group membership of the group.
In one alternate embodiment, the priority for the security algorithm that the group is supported is according to the group category of the group Property and/or user preferences set.
In one alternate embodiment, group membership's cluster safety ability in the group membership of the group in cluster by noting Reported during volume.
In one alternate embodiment, according to the security algorithm priority of the group, client's hobby, group safety requirements level Not, group membership's cluster safety ability or its any combination determine the group security algorithm of the group, including:According to the composition Member's cluster safety ability, select the security algorithm that each group membership of the group supports and calculated safely as the group of the group Method.
In one alternate embodiment, in addition to:If the security algorithm that each group membership of group supports is a variety of, Then further liked according to security algorithm priority, client and/or organize safety requirements rank, selected from a variety of security algorithms Go out a kind of group security algorithm as the group.
In one alternate embodiment, in addition to:The security algorithm supported if there is no each group membership of the group, It is the group without safety assurance then to set the group;Or, the safety supported if there is no each group membership of the group Algorithm, then:It is that each group membership of the group distributes weighted value according to group membership's priority;Each security algorithm weight is calculated, it is described Security algorithm weight is the weighted value sum for each group membership for supporting the algorithm;Select the maximum security algorithm of security algorithm weight Group security algorithm as the group.
In one alternate embodiment, in addition to:If there is multiple weight identical security algorithms, then further basis Security algorithm priority, client's hobby and/or group safety requirements rank, one is selected from the multiple security algorithm and is used as institute State the group security algorithm of group.
In one alternate embodiment, the security algorithm priority, client's hobby, group safety according to the group will Rank, group membership's cluster safety ability or its any combination is asked to determine the group security algorithm of the group, including:According to composition Member's priority, it is that each group membership of the group distributes weighted value;Each security algorithm weight is calculated, the security algorithm weight is branch Hold the weighted value sum of each group membership of the algorithm;Select group of the maximum security algorithm of security algorithm weight as the group Security algorithm.
In one alternate embodiment, in addition to:If there is multiple weight identical security algorithms, then further basis Security algorithm priority, client's hobby and/or group safety requirements rank, one is selected from the multiple security algorithm and is used as institute State the group security algorithm of group.
In one alternate embodiment, in addition to:Group is exhaled when establishing, and derivative group exhales NAS safe keys and group to exhale AS safe Key, carry out group security communication.
An alternative embodiment of the invention proposes a kind of method that group communication safety is realized in group system, including:Institute The group membership for stating group reports cluster security capabilities when cluster is registered;Adhere to network and after connected state, pass through group information New information receives the group security algorithm of the group, and preserves;Group is exhaled when establishing, and receives the security parameter issued, derivative group Safe key is exhaled, carries out group security communication.
In one alternate embodiment, described group of security algorithm includes cluster NAS security algorithms and cluster AS security algorithms.
An alternative embodiment of the invention also proposes a kind of method that group communication safety is realized in group system, including: The cluster AS security algorithms of group described in message sink are established by group context, and are preserved;Group is exhaled when establishing, and derivative group exhales peace Full key, carry out group security communication.
Method provided by the invention has advantages below:The selection of cluster group security algorithm is the safe energy based on group membership The rules such as the configuration of power and core net are selected, and have higher reliability and applicability;Core net is by using original Group information updating message and group context establish the security algorithm that message issues cluster group, do not destroy the message in existing flow Trigger mechanism, and be easily achieved;The transmission of NAS layer security algorithms is sightless to access network layer without AS layers;AS layers Security algorithm is directly distributed by core net, and the security algorithm of the base station where group membership has the whole network uniformity, once group z z z There is identical group to exhale key for base station during crying where group membership, and user switches in the base station that group membership belongs to be saved Save handover delay.
Example 1
Fig. 2 is refer to, the overall procedure of group security communication comprises the following steps:
Core net creates group, distribution group mark, according to the derivative group root key of group mark, setting group security algorithm it is preferential Level, and a group security algorithm is arranged to a group attribute;
Terminal carries out cluster registration, the cluster safety ability of reporting terminal itself in registration message;The collection of certain terminal Group's security capabilities can also allow core-network side to know using other modes.
Core net is according to rule (such as algorithm priority, users such as the configurations of cluster safety ability and core net of group membership Hobby, group security level required etc.), determine the group security algorithm of the group;
Group security algorithm is handed down to each base station where group membership and group membership by core net respectively;
Group membership and base station preserve security algorithm, the security parameter then issued according to group call establishment process, and derivative group is exhaled Safe key, Secure Group Communication then can be carried out between group membership.
Embodiment 2
Fig. 3 is refer to, wherein UE is user equipment, and eNB is base station equipment, and CN is core net.Colony terminal is registered and collection The basic process of group security algorithms selection is as follows:
1st, core net builds group, and according to the derivative group root key of group mark, a group security algorithm is arranged into a group attribute;
2nd, terminal sends login request message, the cluster safety ability of carried terminal;
3rd, UE is judged for validated user, and core net returns to response;
4th, UE notifies core net, and registration is completed.
5th, core net is according to the cluster safety ability of terminal, algorithm priority, user preferences, group security level required isotactic The group security algorithm of the group is then selected, and is preserved in the core network as group attribute.
It is determined that the specific method of group security algorithm refers to 3~embodiment of embodiment 5.
Embodiment 3, it is determined that group security algorithm one, refer to Fig. 4.
The security algorithm that each group membership supports is selected according to group membership's cluster safety ability;
If the security algorithm selected is one, the group security algorithm using it as group.
If the security algorithm selected is a variety of, is further liked according to security algorithm priority, client and/or group is pacified Rank is required entirely, therefrom selects a kind of group security algorithm as group.
The security algorithm supported if there is no each group membership, then it is without safety assurance to set the group Group.
Embodiment 4, it is determined that group security algorithm two, refer to Fig. 5.
The security algorithm that each group membership supports is selected according to group membership's cluster safety ability;
If the security algorithm selected is one, the group security algorithm using it as group.
If the security algorithm selected is a variety of, is further liked according to security algorithm priority, client and/or group is pacified Rank is required entirely, therefrom selects a kind of group security algorithm as group.
The security algorithm supported if there is no each group membership, then:
It is that each group membership of the group distributes weighted value according to group membership's priority;Each security algorithm weight is calculated, safety Algorithm weights are equal to the weighted value sum for each group membership for supporting the algorithm;Then the safety calculation that security algorithm weight is maximum is selected Group security algorithm of the method as group;If weight identical security algorithm has more than one, further calculated according to safety Method priority, client's hobby and/or group safety requirements rank, therefrom select a group security algorithm as group.
Embodiment 5, it is determined that group security algorithm two, refer to Fig. 6.
It is that each group membership of the group distributes weighted value according to group membership's priority;
Each security algorithm weight is calculated, security algorithm weight is equal to the weighted value sum for each group membership for supporting the algorithm;
Select group security algorithm of the maximum security algorithm of security algorithm weight as group.
If there is multiple weight identical security algorithms, then further according to security algorithm priority, client's hobby and/ Or group safety requirements rank etc., a group security algorithm as the group is selected from the multiple security algorithm.
Embodiment 6
Fig. 7 is refer to, the flow that core net issues group security algorithm is as follows:
Terminal adheres to network and is in connected state;
1a, core net issue group information updating message Group Information Update Command, carry group NAS layers security algorithm identification and AS layer security algorithm identifications;
After 2a, terminal receive message, security information is stored in local, and return to response;
1b, core net issue a group context and establish message initialGroupContextSetupRequest, carry group AS layer security algorithm identifications;
After 2b, eNB receive message, security information is stored in local, and return to response
One of ordinary skill in the art will appreciate that:Realizing all or part of step of above method embodiment can pass through Programmed instruction related hardware is completed, and foregoing program can be stored in a computer read/write memory medium, the program Upon execution, the step of execution includes above method embodiment;And foregoing storage medium includes:ROM, RAM, magnetic disc or light Disk etc. is various can be with the medium of store program codes.
Finally it should be noted that:The above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although The present invention is described in detail with reference to the foregoing embodiments, it will be understood by those within the art that:It still may be used To be modified to the technical scheme described in foregoing embodiments, or equivalent substitution is carried out to which part technical characteristic; And these modification or replace, do not make appropriate technical solution essence depart from various embodiments of the present invention technical scheme spirit and Scope.

Claims (13)

1. the method for group communication safety is realized in a kind of group system, it is characterised in that including:
During the group creating, the priority of the security algorithm of the community supporting is set, a group security algorithm is arranged to a group category Property;According to the security algorithm priority of the group, client's hobby, group safety requirements rank, group membership's cluster safety ability or It is combined the group security algorithm for determining the group;
By group information updating message issue the group cluster NAS layers security algorithm and cluster AS layers security algorithm to described Each group membership of group;
Message is established by a group context, issues the cluster AS layers security algorithm of the group to where the group membership of the group Each base station.
2. according to the method for claim 1, it is characterised in that the priority for the security algorithm that the group is supported according to The group attribute and/or user preferences of the group are set.
3. according to the method for claim 1, it is characterised in that group membership's cluster safety ability by the group group Reported in member when cluster is registered.
4. according to the method for claim 1, it is characterised in that the security algorithm priority according to the group, visitor Family hobby, group safety requirements rank, group membership's cluster safety ability or its any combination determine that the group of the group is calculated safely Method, including:
According to group membership's cluster safety ability, select described in the security algorithm conduct that each group membership of the group supports The group security algorithm of group.
5. according to the method for claim 4, it is characterised in that also include:
If the security algorithm that each group membership of group supports is a variety of, further according to security algorithm priority, visitor Family likes and/or group safety requirements rank, and a kind of group as the group is selected from a variety of security algorithms and is calculated safely Method.
6. the method according to claim 4 or 5, it is characterised in that also include:
The security algorithm supported if there is no each group membership of the group, then it is without safety assurance to set the group Group;Or,
The security algorithm supported if there is no each group membership of the group, then:It is the group according to group membership's priority Each group membership distributes weighted value;Each security algorithm weight is calculated, the security algorithm weight is to support each group membership of the algorithm Weighted value sum;Select group security algorithm of the maximum security algorithm of security algorithm weight as the group.
7. according to the method for claim 6, it is characterised in that also include:
If there is multiple weight identical security algorithms, then further according to security algorithm priority, client's hobby and/or group Safety requirements rank, a group security algorithm as the group is selected from the multiple security algorithm.
8. according to the method for claim 1, it is characterised in that the security algorithm priority according to the group, visitor Family hobby, group safety requirements rank, group membership's cluster safety ability or its any combination determine that the group of the group is calculated safely Method, including:
It is that each group membership of the group distributes weighted value according to group membership's priority;
Each security algorithm weight is calculated, the security algorithm weight is the weighted value sum for each group membership for supporting the algorithm;
Select group security algorithm of the maximum security algorithm of security algorithm weight as the group.
9. according to the method for claim 8, it is characterised in that also include:
If there is multiple weight identical security algorithms, then further according to security algorithm priority, client's hobby and/or group Safety requirements rank, a group security algorithm as the group is selected from the multiple security algorithm.
10. according to the method described in claim 1~9 any one, it is characterised in that also include:
Group is exhaled when establishing, and derivative group exhales NAS safe keys and group to exhale AS safe keys, carries out group security communication.
11. the method for group communication safety is realized in a kind of group system, it is characterised in that including:
The group membership of the group reports cluster security capabilities when cluster is registered;
Adhere to network and after connected state, by the group security algorithm of group described in group information updating message sink, and preserve;
Group is exhaled when establishing, and receives the security parameter issued, and derivative group exhales safe key, carries out group security communication.
12. according to the method for claim 11, it is characterised in that described group of security algorithm includes cluster NAS security algorithms With cluster AS security algorithms.
13. the method for group communication safety is realized in a kind of group system, it is characterised in that including:
The cluster AS security algorithms of group described in message sink are established by group context, and are preserved;
Group is exhaled when establishing, and derivative group exhales safe key, carries out group security communication.
CN201610744491.XA 2016-08-27 2016-08-27 The method that group communication safety is realized in group system Withdrawn CN107786511A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610744491.XA CN107786511A (en) 2016-08-27 2016-08-27 The method that group communication safety is realized in group system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610744491.XA CN107786511A (en) 2016-08-27 2016-08-27 The method that group communication safety is realized in group system

Publications (1)

Publication Number Publication Date
CN107786511A true CN107786511A (en) 2018-03-09

Family

ID=61441083

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610744491.XA Withdrawn CN107786511A (en) 2016-08-27 2016-08-27 The method that group communication safety is realized in group system

Country Status (1)

Country Link
CN (1) CN107786511A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020153894A1 (en) * 2019-01-21 2020-07-30 Telefonaktiebolaget Lm Ericsson (Publ) Securing the user plane path for a group communication session based on a security policy common to all devices in the group
CN113543118A (en) * 2020-03-31 2021-10-22 成都鼎桥通信技术有限公司 Consultation generation method for dynamic group TSM security algorithm
CN114020363A (en) * 2021-11-15 2022-02-08 海能达通信股份有限公司 Group attachment method and corresponding device
WO2022171156A1 (en) * 2021-02-10 2022-08-18 华为技术有限公司 Method for configuring evolved packet system non-access stratum security algorithm, and related apparatus

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101494538A (en) * 2008-01-23 2009-07-29 华为技术有限公司 Data transmission control method and communication system and encipher control network element
US20090262682A1 (en) * 2008-04-18 2009-10-22 Amit Khetawat Method and Apparatus for Transport of RANAP Messages over the Iuh Interface in a Home Node B System
CN104219655A (en) * 2013-06-04 2014-12-17 中兴通讯股份有限公司 Method for selecting security algorithms for interfaces in wireless communication systems and MME (mobility management entity)
CN104618089A (en) * 2013-11-04 2015-05-13 华为技术有限公司 Negotiation processing method for security algorithm, control network element and system
WO2015157502A1 (en) * 2014-04-09 2015-10-15 Convida Wireless, Llc Service enabler function
CN105323231A (en) * 2014-07-31 2016-02-10 中兴通讯股份有限公司 Security algorithm selection method, security algorithm selection device and security algorithm selection system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101494538A (en) * 2008-01-23 2009-07-29 华为技术有限公司 Data transmission control method and communication system and encipher control network element
US20090262682A1 (en) * 2008-04-18 2009-10-22 Amit Khetawat Method and Apparatus for Transport of RANAP Messages over the Iuh Interface in a Home Node B System
CN104219655A (en) * 2013-06-04 2014-12-17 中兴通讯股份有限公司 Method for selecting security algorithms for interfaces in wireless communication systems and MME (mobility management entity)
CN104618089A (en) * 2013-11-04 2015-05-13 华为技术有限公司 Negotiation processing method for security algorithm, control network element and system
WO2015157502A1 (en) * 2014-04-09 2015-10-15 Convida Wireless, Llc Service enabler function
CN105323231A (en) * 2014-07-31 2016-02-10 中兴通讯股份有限公司 Security algorithm selection method, security algorithm selection device and security algorithm selection system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020153894A1 (en) * 2019-01-21 2020-07-30 Telefonaktiebolaget Lm Ericsson (Publ) Securing the user plane path for a group communication session based on a security policy common to all devices in the group
CN113543118A (en) * 2020-03-31 2021-10-22 成都鼎桥通信技术有限公司 Consultation generation method for dynamic group TSM security algorithm
CN113543118B (en) * 2020-03-31 2023-08-04 成都鼎桥通信技术有限公司 Negotiation generation method of dynamic group TSM security algorithm
WO2022171156A1 (en) * 2021-02-10 2022-08-18 华为技术有限公司 Method for configuring evolved packet system non-access stratum security algorithm, and related apparatus
CN114020363A (en) * 2021-11-15 2022-02-08 海能达通信股份有限公司 Group attachment method and corresponding device
CN114020363B (en) * 2021-11-15 2023-12-15 海能达通信股份有限公司 Group attachment method and corresponding equipment

Similar Documents

Publication Publication Date Title
CN107786511A (en) The method that group communication safety is realized in group system
Zhang et al. Enhancing spectral-energy efficiency forLTE-advanced heterogeneous networks: a users social pattern perspective
CN109151906A (en) Communication means, the network equipment, terminal device and system
CN104219328B (en) The share system and sharing method of a kind of internet of things equipment
US7477632B1 (en) Subscriber management and service profiles
CN104010300B (en) Data transmission method
KR20210125868A (en) Method and apparatus for providing authorized network slices in wireless communication system
CN100369434C (en) Method for implementing virtual LAN based on WAPI system in WLAN
CN107071011A (en) A kind of network data communication method based on cloud
CN108141890A (en) User apparatus and accidental access method
CN110110509A (en) Right management method and Related product
CN108271227A (en) A kind of SOT state of termination across RAT determines method and terminal
JP2023500329A (en) Communication method and system, base station and terminal
CN109379274A (en) A kind of method for sending information and device of instant messaging group
CN104640177B (en) Cell selecting method based on efficiency in multilayer heterogeneous network
CN107172007A (en) The concentration authorization management method and device of a kind of multifactor adaptation
CN107257292B (en) A kind of cross-domain distributed big data communication system design planning method
CN104080057B (en) A kind of method of control terminal group call right
Qiang et al. A novel distributed network selection scheme for heterogeneous wireless network environments
CN113766506B (en) Hierarchical access control method for Internet of things
CN112788738A (en) Code number processing method and device for public and private network convergence system
Zhang et al. Statistical multiplexing gain analysis of processing resources in centralized radio access networks
CN104640213B (en) A kind of connection method for building up of wireless body area network
CN105050197B (en) A kind of wireless communications method, relevant device and system
Fan et al. Energy-efficient resource allocation for dynamic priority-based vehicular mobile-health communications

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20180309

WW01 Invention patent application withdrawn after publication