CN102811422B - A kind of Trunked Radio System - Google Patents

A kind of Trunked Radio System Download PDF

Info

Publication number
CN102811422B
CN102811422B CN201210265498.5A CN201210265498A CN102811422B CN 102811422 B CN102811422 B CN 102811422B CN 201210265498 A CN201210265498 A CN 201210265498A CN 102811422 B CN102811422 B CN 102811422B
Authority
CN
China
Prior art keywords
terminal
terminal device
platform server
trunked radio
radio system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210265498.5A
Other languages
Chinese (zh)
Other versions
CN102811422A (en
Inventor
邹新生
李燕舞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing BNC Technologies Co Ltd
Original Assignee
Beijing BNC Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing BNC Technologies Co Ltd filed Critical Beijing BNC Technologies Co Ltd
Priority to CN201210265498.5A priority Critical patent/CN102811422B/en
Publication of CN102811422A publication Critical patent/CN102811422A/en
Application granted granted Critical
Publication of CN102811422B publication Critical patent/CN102811422B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a kind of Trunked Radio System, this system comprises rights management terminal, Platform Server, dispatch terminal and activation server; Rights management terminal, is connected with Platform Server, for the binding information of the user profile of storage cluster dispatching patcher and terminal device corresponding to user profile; Platform Server, terminal device accesses Trunked Radio System by Platform Server, and Platform Server carries out login authentication according to the binding information by rights management terminal storage to the terminal device of access Trunked Radio System, with the access of control terminal; Dispatch terminal, is connected with Platform Server, according to the authentication result of Platform Server, the terminal device of access Trunked Radio System is dispatched; Activation server, is connected with Platform Server, for the terminal device transmitting system activation notification to Trunked Radio System.

Description

A kind of Trunked Radio System
Technical field
The present invention is about mobile communication technology, particularly about the colony dispatching communication technology of mobile communication,A kind of Trunked Radio System concretely.
Background technology
The communication technology and mobile Internet have been obtained significant progress at present, because group user, industry are usedThe power of management, scheduling, therefore trunking communicating technology need to be exercised to the user group in compass of competency in familyAlso development, the security of trunked communication system and extensibility are for development and the popularization of system simultaneouslyPlay a part very important.
In prior art, adopt taking hardware chip as main Trunked Radio System, intercommunication needs custom terminal,Limited and the business of terminal kind is difficult to expansion, makes Trunked Radio System can not make full use of intelligent terminalAbility, do not possess the crucial application such as video, location, and because information source is relatively deficient, its schedulingAbility relatively a little less than, and scheduling mode is more single. Adopt user name, cryptoguard mechanism simultaneously, beThe security of system is relatively low. And traditional digital cluster system iDEN need to set up exclusive communication networkAnd a complete set of hardware platform of Motorola, and the operable bandwidth ratio of each terminal use is less, only canSupport the voice of specific compression rate, weak and cannot support video and location to the tenability of new business.
Summary of the invention
The embodiment of the present invention provides a kind of Trunked Radio System, and this Trunked Radio System comprises:
Rights management terminal, Platform Server, dispatch terminal and activation server; Wherein,
Rights management terminal, is connected with described Platform Server, for storing described Trunked Radio SystemIn user profile and the binding information of terminal device corresponding to described user profile;
Platform Server, described terminal device accesses described colony dispatching by described Platform Server and isSystem, described Platform Server according to the binding information by described rights management terminal storage to terminal deviceCarry out login authentication, send session key to the terminal device by login authentication, and by described sessionKey sends to described dispatch terminal and signs in to other terminal device in Trunked Radio System;
Dispatch terminal, is connected with described Platform Server, for according to the instruction of input to described in accessingThe terminal device of Trunked Radio System is dispatched;
Activation server, is connected with described Platform Server, sends system for the terminal device to describedSystem activation notification, described terminal device is according to the activation notification login Trunked Radio System receiving.
The security system of the multimedia cluster communication system of a set of across a network fusion of platforms is proposed, this system withThe binding of terminal and user profile, log in that authentication, administrative power and scheduling power separate, remote destroying and self-destruction,Data encryption, optional single channel encryption are transmitted as feature. The present invention by this security system successfully for system.Safety system provides the safety guarantee that is equivalent to commercial encryption standard for system. The present invention joins with motive objectsNet and mobile Internet are applied as background, round Realization a kind of across 3G/2G/WIFI/PSTN fusion of platformsThe security system of Trunked Radio System.
For above and other object of the present invention, feature and advantage can be become apparent, cited below particularlyGood embodiment, and coordinate appended graphicly, be described in detail below.
Brief description of the drawings
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, below will be to realityThe accompanying drawing of executing required use in example or description of the Prior Art is briefly described, apparently, belowAccompanying drawing in description is only some embodiments of the present invention, for those of ordinary skill in the art,Do not paying under the prerequisite of creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is the schematic diagram of Trunked Radio System of the present invention;
Fig. 2 is the schematic diagram of Trunked Radio System of the present invention;
Fig. 3 is the login authentication flow chart of Trunked Radio System disclosed by the invention to intelligent terminal;
Fig. 4 is that the dispatch terminal of Dispatch and Command Center is dispatched the video data of intelligent terminal collectionFlow chart;
Fig. 5 is the structured flowchart of the disclosed Trunked Radio System of inventive embodiments;
Fig. 6 is each parts annexation figure in native system;
Fig. 7 is remote destroying schematic diagram;
Fig. 8 is Intelligent terminal data self-destruction schematic diagram;
Fig. 9 is the distribution schematic diagram of key;
Figure 10 is the use schematic diagram of key.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried outDescribe clearly and completely, obviously, described embodiment is only the present invention's part embodiment, andNot whole embodiment. Based on the embodiment in the present invention, those of ordinary skill in the art are not doingGo out the every other embodiment obtaining under creative work prerequisite, all belong to the scope of protection of the invention.
As shown in Figure 1, the invention discloses a kind of Trunked Radio System, this Trunked Radio System comprises:Rights management terminal 101, Platform Server 102, dispatch terminal 103 and activation server 104; PowerLimit office terminal 101, is connected with Platform Server, for the user profile of storage cluster dispatching patcherBinding information with terminal device 105 corresponding to user profile; Platform Server 102, terminal device passes throughPlatform Server 102 accesses Trunked Radio System, and Platform Server 102 bases are by rights management terminalThe binding information of 101 storages carries out login authentication to the terminal device 105 of access Trunked Radio System, to controlThe access of terminal device 105 processed; Dispatch terminal 103, is connected with Platform Server 102, for basisThe authentication result of Platform Server 102 is dispatched the terminal device 105 of access Trunked Radio System;Activation server 105, is connected with Platform Server 102, establishes for the terminal to Trunked Radio SystemStandby 105 transmitting system activation notifications. Wherein, Platform Server comprises: authentication module, and for according to endThe logging request of end equipment and terminal device being stepped on by the binding information of rights management terminal storageRecord certification, generates login authentication result; Key production module, for according to login authentication result, Xiang TongThe terminal device of crossing login authentication sends the random session key generating; Forwarding module, for close by sessionKey is transmitted to other terminal device signing in in described Trunked Radio System.
In addition, Trunked Radio System of the present invention also comprises circuit domain gateway, and circuit domain gateway is responsible for circuit domainTo incoming call exhalation control, VoP format conversion and the encapsulation in IP territory. Circuit domain gateway is as oneThe Platform Server of special terminal access core subsystem, can separate deployment with Platform Server, also canTo share a station server, without disposing other network element.
Terminal device in the present invention comprises: IP territory terminal device and circuit domain terminal equipment. IP territory terminalDesignated software need to be installed, possess intercommunication, GPS, video, mail function, as mobile phone, PC etc.Circuit domain terminal, without mounting software, is specified the access of special service number completion system by dialing, and possesses intercommunicationFunction. IP territory terminal comprises the 2G user that 3G/WIFI/ accesses in IP mode. Circuit domain terminal comprises PSTNOrdinary telephone subscriber/with the 2G user of circuit mode access. 2G user's access way can be according to networkSituation is switched. The actual vector of terminal device comprises PSTN terminal, android terminal, mobile terminal.As shown in Figure 2, cellphone subscriber's android terminal directly and Platform Server 102 communicate to connect, circuitThe plain old telephone equipment 107 of territory terminal device is connected with Platform Server 102 by circuit domain gateway 108Connect. The data of the terminal device collection in the present invention comprise video data, voice data and GPS location numberAccording to, the terminal device in the present invention also has encrypting module in addition, can establish terminal according to session keyThe standby data that gather are encrypted.
Trunked Radio System disclosed by the invention, Platform Server 102 is cores of system, is mainly responsible forThe transfer of data, and authentication and Access Control are provided. Platform Server, based on channel management, is realized soft friendshipChange function, improve response speed and the extensibility of system. Platform Server is supported UDP voice, with itIts equipment solves common network delay problem in mobile Internet application together.
Rights management terminal in backstage is for completion system rights management, background maintenance. After main completion systemThe typing of number of units certificate, comprises user profile, corresponding authority, and the end message of binding mutually with user profile,And the information relevant to cluster. Independent rights management center, backstage is conducive to administrative power and scheduling power etc.Other authority separates, and provides security for system, for industry user's management system is carried in system management aspectSupply facility.
The mode that activation server provides a kind of notification terminal user to reach the standard grade for system. Based on activation mechanism, beSystem is need not user always online, can in officely what is the need for when wanting by notifications, like this, large leap aheadThe terminal standby time.
Dispatch terminal is operated in IP territory, and supervised terminal device is dispatched. Dispatch in conventional clusterOn the basis of technology, dispatch terminal is introduced the visual means such as video, geographical location information, map in a large number,For colony dispatching decision-making provides abundanter information.
Be the fundamental diagram of Trunked Radio System disclosed by the invention as shown in Figure 3 and Figure 4:
For the login authentication of intelligent terminal, as shown in Figure 3, intelligent terminal initial landing, platform serviceDevice carries out authentication to logging in request. After authentication is passed through, Platform Server notice intelligent terminal logs in successfully,And sending the intelligent terminal session key generating at random to intelligent terminal, intelligent terminal is received session keyBackward Platform Server confirms, for not receiving that session key or system think more new session keySituation, Platform Server possesses retransmission mechanism. Receive after the confirmation of intelligent terminal platform serviceDevice is sent to dispatch terminal by the session key of intelligent terminal and signs in to other terminal of Trunked Radio SystemEquipment. Above information exchange is crossed the rear transmission of the exclusive transmission security key encryption of each equipment that system prestores. With intelligence eventuallyEnd is example, and the information of SIM and terminal deposits platform service in after correspondence one by one by backstage rights management terminalDevice, the foundation of authentication while login as terminal, when intelligent terminal logs in to Platform Server request, together withStep sends the information of SIM and terminal, and user's identity information. Platform Server is received to log in and is askedAfter asking, from the information database by rights management central service, extract relevant information and authority, if letterBreath is consistent, and intelligent terminal possesses corresponding authority, and authentication is passed through. Now, Platform Server is sent out to terminalSend and reply, terminal landing success.
The dispatch terminal that Figure 4 shows that Dispatch and Command Center is adjusted the video data of intelligent terminal collectionThe flow chart of degree, dispatch terminal sends monitoring intelligent terminal 1 video instructions to Platform Server, and by putting downStation server is issued to intelligent terminal 1. Intelligent terminal 1 completes after video signal collective, to Video coding,And use session key. Data after encryption send to Platform Server by intelligent terminal 1, are forwarded toDispatch and Command Center. Receive after video data the intelligent terminal 1 for dispatch terminal in Dispatch and Command CenterSession key deciphering, and to video decode, and then realize video and show.
Be illustrated in figure 5 the structured flowchart of the disclosed Trunked Radio System of the embodiment of the present invention, native system adoptsC/S framework, comprises kernel subsystems 401, circuit domain gateway subsystem 402, Dispatch and Command Center's subsystemSystem 403 and terminal subsystem 404. Kernel subsystems 401 comprises in Platform Server, backstage rights managementThe heart, activation server, for completion system rights management, background maintenance, authentication and Access Control, withAnd the transfer of data. Kernel subsystems 401 is operated in IP territory. Dispatch and Command Center's subsystem 403 is workedIn IP territory, supervised terminal device is dispatched. Circuit domain gateway subsystem 402 is responsible for circuit domainTo incoming call exhalation control, VoP format conversion and the encapsulation in IP territory. Circuit domain gateway subsystem 402As the Platform Server of a special terminal access core subsystem, can with Platform Server separate partAdministration, also can share a station server, without disposing other network element. Terminal subsystem 404 is divided into IP territoryTerminal and the large class of circuit domain terminal two. IP territory terminal need to be installed designated software, possess intercommunication, GPS,Video, mail function. Circuit domain terminal is without mounting software, specifies special service number to complete to be by dialingSystem access, possesses intercommunication function. As shown in Figure 6, be the annexation figure of each server in native system.
The disclosed Trunked Radio System of the embodiment of the present invention possesses multiple safe mechanism. First, terminal and useFamily information binding, Platform Server logs in authentication by this binding information. Rights management center, backstageInformation to terminal and dispatching desk is bound, taking intelligent terminal as example, the information of SIM and terminal byRights management center, backstage deposits Platform Server in after correspondence one by one, the foundation of authentication while login as terminal.
Secondly, the administrative power of system separates with scheduling power, and turnkey console, for back-end data management, is controlled eventuallyAccess and the authority of end, Dispatch and Command Center is responsible for scheduling, relates to use back-end data. By managementSeparating of two dimensions of power and scheduling power, for utilizing better system to provide safeguard.
Its three, system has the security mechanism based on remote destroying and self-destruction. The terminal device tool of native systemThere is height mobility, have the possibility of unauthorized operation. For preventing unauthorized use, system adopts a kind ofBased on the safety approach of remote destroying and self-destruction, for the protection of security of system and secure user data. TerminalEquipment has self-destruction Executive Module, for destroying terminal device data according to the remote destroying instruction receiving.Remote destroying is under the unauthorized use states such as terminal loss. Dispatch and Command Center passes through remote destroyingFunction is destroyed terminal program and subscriber data, and forbids this terminal connecting system. As shown in Figure 7, long-rangeDestroy and initiated by dispatch terminal, via Platform Server and activation server transfer, and send out by destroying signalRaw device produces signal specific, and then sends to terminal, final complete under the cooperation of terminal background monitoring softwareBecome function.
In addition, terminal device has self-destruction detection module, self-destruction detection module detect terminal device inWhen unauthorized use state, generate command-destruct. As shown in Figure 8, intelligent terminal self-destruction data, terminalSelf-destruction detection module does not detect when the SIM information of terminal SIM information and binding is inconsistent and starts, sameDelete program and data.
Its four, system has realized the data encryption of voice, video, mail, encryption key is by platform serviceDevice generates and distributes at random after terminal landing. System adopts data encryption to business datum, with specific closeAfter the data such as key encrypted speech, video, mail, for transmitting procedure. For guarantee system is in data encryptionCan proper communication when working method, adopt following key distribution mechanism:
Key and summary. Key is used for the data of encrypted transmission, and summary is used for the validity of authentication secret.Platform Server is that each Dispatch and Command Center and intelligent terminal generate independent key, and key refers in schedulingWave when center or intelligent terminal log in and dynamically generate, and generate the summary of key simultaneously.
The distribution opportunity of key. Key and corresponding summary at Platform Server to Dispatch and Command Center or intelligenceCan terminal log in and while replying, send to Dispatch and Command Center and intelligent terminal, and in this Dispatch and Command CenterOr broadcast in group under intelligent terminal. The tune of this key of reception that key and summary are stored by Platform ServerThe exclusive transmission security key of degree command centre or intelligent terminal sends after encrypting, and by Dispatch and Command Center or intelligenceCan terminal decipher after reception. Receive after key and summary corresponding Dispatch and Command Center in correct and decipheringSend and reply to Platform Server with intelligent terminal. Reply for not receiving in a certain time intervalDispatch and Command Center and intelligent terminal, Platform Server can send again. Be illustrated in figure 9 dividing of keySend out schematic diagram.
The use of key. Each Dispatch and Command Center and intelligent terminal have key and the summary of oneself, andStored by other Dispatch and Command Center or intelligent terminal on the same group. Dispatch and Command Center or intelligent terminal are being sent outSend data front secret key encryption summary and data with oneself, other member receives rear corresponding with what store on the same groupKey is decrypted cryptographic digest and data, and compares with the summary of storage, if summary is consistentSuccessful decryption. As shown in figure 10, be the use schematic diagram of key.
Its five, system can select to dispose single channel encryption, terminal configuration between terminal and Platform ServerEncrypt TF card, Platform Server front-end configuration encryption gateway, like this, terminal and Platform Server formation addSecret letter road, has further strengthened the security of public network transmission.
Adopt UDP transmission for real time business, and be optimized. Speech talkback is typical real time business.There is larger time delay for mobile wireless network, and easily cause that congested this is different from the spy of cable networkPoint. System complete has realized the QOS security mechanisms such as UDP sequence, re-transmission, error correction, and in conjunction with voiceBe optimized. Further, system, in conjunction with the Real-Time Monitoring to network, is selected corresponding UDP adaptivelyStrategy, and complete as required the switching of TCP/UDP, even start-up circuit territory transmission.
Introduce intelligent terminal technology and circuit domain gateway, support 3G/2G/WIFI/PSTN access. And solveThe adaptive problem that intelligent terminal individuation difference causes.
Taking backstage rights management and Platform Server channel management as basis, build visual scheduling. BackstageRights management is for dispatching the Back ground Information that terminal use is provided. System is taking channel as basic thread.The calling of Dispatch and Command Center, monitor, toll breakdown, intrusion is all to realize on the basis of channel. GPSProvide more diversified supplementary means with video for dispatching.
Key problem in technology point of the present invention has:
(1) the C/S framework that security strengthens
Native system is implemented following enhanced scheme to adopted C/S framework:
A. based on a whole set of security mechanism, the safety of the safety of protection system, especially terminal.
B. system is based on authority work, and the access authentication of system and every business are all retrained by corresponding authority.
C. all data of system are by the unified storage of database of Platform Server, and other network element of system canObtain as required the backup of data from Platform Server.
D. database can only directly be accessed by Platform Server, the data flow of other network element and Platform ServerTurn by message mechanism and undertaken.
Like this, the C/S framework of enhancing has the following advantages:
A. the fast response time of system, is applicable to instant messaging.
B. be more suitable for completing based on intelligent terminal collection and the encoding and decoding work of the data such as audio frequency, video.
C. can adapt to more flexibly the network bandwidth. Intelligent terminal can adopt different compression ratios as requiredEncryption algorithm. Can control better like this bandwidth that data flow takies.
D. server burden is light, can support more user and more massive cluster.
E. the uniformity of data is fine.
F. system has tight security.
(2) Softswitch technology
System adopts Softswitch technology, in Platform Server side, adopts respectively different modules to connect authenticationEntering the carrying with business datum manages. Soft switch comprises exchange of speech, control signal exchange, video friendshipChange. System is taking channel as key concept, and realizing setting up calling based on channel is the control signal mould of objectExchange of speech, video exchange business module after piece and call setup success are separated. It is soft that system adoptsSwitching technology can be mated current network technology well, adapts to mobile Internet and Next Generation InternetCommunication construction. Like this, the extensibility of system and greatly strengthening with the fusion faculty of other platform.
Adopt the system after soft switch to have the following advantages:
A. system access speed is fast; The utilization rate of system platform resource is high.
B. because access separates with carrying, system can be better and existing IP network and 3G network compatibility,Platform extensibility is strong.
C. system can be supported 3G/2G/WIFI/PSTN terminal use, access way variation easily.
D. system can realize centralized dispatching, such as can the PSTN access of Platform Server being adopted and be dividedIn time, calls, and more reasonably utilizes this relative scarce resource.
(3) trunking communicating technology
Support visual scheduling, comprise group calling, group busy, individual calling, monitor, toll breakdown, intrusion, distantly get killed,Activation, video, Geographic mapping. This technical theme relates to system core business. Trunking communicationTechnology is taking other key technology as basis, for the service logic that realizes native system provides support.
(4) network communications technology
Comprise TCP/UDP. The network communications technology is the carrier of system data flow and Business Stream, is that cluster is logicalThe communication mechanism of communication system bottom. Say in principle the industry taking packet arrival order as main performance indexBusiness data acquisition transmits with Transmission Control Protocol, and taking real-time communication as main performance index, packet is arrivedThe audio-video frequency media data acquisition udp protocol that order has certain tolerance transmits.
(5) encryption technology
Comprise data encryption, single channel encryption. Encryption technology is the Main Means guaranteeing system security. AndSecurity is again the structural issue that the system based on C/S framework needs emphasis to solve. By encryption technology,System possesses the safe class that is similar to business's Data Encryption Standard. And, according to the development level of current encryption technologyWith the business characteristic of system, for key user and key business provide the optional more encryption of high safety gradeService.
In the present invention, apply specific embodiment principle of the present invention and embodiment have been set forth, withThe explanation of upper embodiment is just for helping to understand method of the present invention and core concept thereof; Meanwhile, forOne of ordinary skill in the art, according to thought of the present invention, in specific embodiments and applicationsAll will change, in sum, this description should not be construed as limitation of the present invention.

Claims (5)

1. a Trunked Radio System, is characterized in that, described Trunked Radio System comprises: authority pipeReason terminal, Platform Server, dispatch terminal and activation server; Wherein,
Rights management terminal, is connected with described Platform Server, for storing described Trunked Radio SystemIn user profile and the binding information of terminal device corresponding to described user profile, wherein, described endEnd equipment comprises: IP territory terminal device and circuit domain terminal equipment;
Platform Server, described terminal device accesses described colony dispatching by described Platform Server and isSystem, described Platform Server according to the binding information by described rights management terminal storage to terminal deviceCarry out login authentication, send session key to the terminal device by login authentication, and by described sessionKey sends to described dispatch terminal and signs in to other terminal device in Trunked Radio System;
Dispatch terminal, is connected with described Platform Server, for according to the instruction of input to described in accessingThe terminal device of Trunked Radio System is dispatched;
Activation server, is connected with described Platform Server, sends system for the terminal device to describedSystem activation notification, described terminal device is according to the activation notification login Trunked Radio System receiving;
Circuit domain gateway, described circuit domain terminal equipment is by described circuit domain gateway and described platform clothesBusiness device is connected;
Between described Platform Server and dispatch terminal, real time business is adopted UDP transmission and optimized; Wherein,
Described Platform Server comprises:
Authentication module, for according to the logging request of described terminal device and by described rights management eventuallyThe binding information of end storage carries out login authentication to described terminal device, generates login authentication result;
Key production module, for according to described login authentication result, to by the terminal of login authenticationEquipment sends the random session key generating;
Forwarding module, signs in to described Trunked Radio System for described session key is transmitted toOther terminal device;
Described terminal device has encrypting module, for the session generating according to described key production moduleKey is encrypted the data of described terminal device collection.
2. Trunked Radio System as claimed in claim 1, is characterized in that, described IP territory terminal is establishedStandby comprising: the 2G terminal device accessing with 3G, WIFI and IP mode.
3. Trunked Radio System as claimed in claim 1, is characterized in that, described circuit domain terminalEquipment comprises: with the 2G terminal device of PSTN and circuit mode access.
4. Trunked Radio System as claimed in claim 1, is characterized in that, described terminal device toolHave self-destruction detection module, described self-destruction detection module detects that described terminal device is in unauthorized use shapeWhen state, generate command-destruct.
5. Trunked Radio System as claimed in claim 4, is characterized in that, described terminal device toolThere is self-destruction Executive Module, for the remote destroying instruction or the institute that send according to the described dispatch terminal receivingState the command-destruct destruction terminal device data that self-destruction detection module generates.
CN201210265498.5A 2012-07-27 2012-07-27 A kind of Trunked Radio System Active CN102811422B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210265498.5A CN102811422B (en) 2012-07-27 2012-07-27 A kind of Trunked Radio System

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210265498.5A CN102811422B (en) 2012-07-27 2012-07-27 A kind of Trunked Radio System

Publications (2)

Publication Number Publication Date
CN102811422A CN102811422A (en) 2012-12-05
CN102811422B true CN102811422B (en) 2016-05-11

Family

ID=47234973

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210265498.5A Active CN102811422B (en) 2012-07-27 2012-07-27 A kind of Trunked Radio System

Country Status (1)

Country Link
CN (1) CN102811422B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103347252B (en) * 2013-07-16 2018-05-11 上海德思普微电子技术有限公司 Multimedia cluster communication system, communication terminal and switching centre
CN105807733A (en) * 2014-12-31 2016-07-27 北京国基科技股份有限公司 Dispatching system and method
CN104660384A (en) * 2015-02-02 2015-05-27 武汉爱科唯自动化科技有限公司 Network remote monitoring method for open numerical control system
CN106162563B (en) * 2015-04-02 2019-08-20 成都鼎桥通信技术有限公司 Group system user management method and server
CN104850936A (en) * 2015-04-16 2015-08-19 泉州市铁通电子设备有限公司 Method and system for talkback visual dispatching
CN105227349B (en) * 2015-08-27 2018-04-17 北京泰乐德信息技术有限公司 Nomadic ad hoc network dispatches system and its dispatching method
CN106295997A (en) * 2016-08-10 2017-01-04 合肥品恩智能科技有限公司 A kind of frontier inspection intelligent management system
CN108513286B (en) * 2017-02-28 2021-10-22 普天信息技术有限公司 Method, device and system for positioning terminal after remote halo
CN107172719B (en) * 2017-06-27 2020-06-09 青岛海信移动通信技术股份有限公司 Method for establishing a communication connection

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005120103A1 (en) * 2004-06-02 2005-12-15 Zte Corporation A system of group communication and a method of group call processing based on cdma 2000 high-speed packet data network
CN101060664A (en) * 2006-04-21 2007-10-24 中兴通讯股份有限公司 A TD-SCDMA technology-based wireless cluster communication system
CN101072390A (en) * 2006-05-12 2007-11-14 中兴通讯股份有限公司 Dynamic group management method for digital trunking communication system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005120103A1 (en) * 2004-06-02 2005-12-15 Zte Corporation A system of group communication and a method of group call processing based on cdma 2000 high-speed packet data network
CN101060664A (en) * 2006-04-21 2007-10-24 中兴通讯股份有限公司 A TD-SCDMA technology-based wireless cluster communication system
CN101072390A (en) * 2006-05-12 2007-11-14 中兴通讯股份有限公司 Dynamic group management method for digital trunking communication system

Also Published As

Publication number Publication date
CN102811422A (en) 2012-12-05

Similar Documents

Publication Publication Date Title
CN102811422B (en) A kind of Trunked Radio System
CN105307108A (en) Internet of things information interactive communication method and system
RU2495532C2 (en) Method and apparatus for end-to-end encrypted communication
CN104333455A (en) Secrete communication system and method for smart phone
CN102202299A (en) Realization method of end-to-end voice encryption system based on 3G/B3G
CN105553669B (en) A kind of information encryption transmission device and method and monitoring and managing method based on ID authentication
KR20070082179A (en) Mutual authentication apparatus and method
CN1925681A (en) End-to-end encrypting method and system based on mobile communication network
CN102761568A (en) Remote control method and server
CN112153641B (en) Secondary authentication enhancement and end-to-end encryption method and system based on edge UPF
CN105554912A (en) IOT (Internet of Things) terminal based on virtual SIM/USIM
CN103139769B (en) A kind of wireless communications method and network subsystem
CN104683098A (en) Implementation method, equipment and system of secure communication service
CN106911745A (en) A kind of electric power mobile is met an urgent need platform and its implementation
CN102123361B (en) Method and device for realizing encrypted message communication
CN105357225A (en) Virtual SIM/USIM card authentication management cloud platform
US20170366918A1 (en) Unified communication system based on micro base station
CN103607706A (en) NFC-technology based conversation method, NFC terminal and far-end server
CN104468825A (en) Remote authorization method and system
CN1972278B (en) A method for implementing safe remote video monitoring
CN102149079B (en) Method, device and system for obtaining user identity identifier
CN103634744A (en) Cluster group call end-to-end encryption realization method
CN108449758A (en) A kind of binding method and system of Intelligent hardware
CN100512103C (en) Secret key distributing method of end-to-end encrypted telecommunication
CN103987032A (en) Mobile communication terminal voice encryption method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant