CN103596136A - Cluster group call end-to-end encryption method under single base station mode - Google Patents
Cluster group call end-to-end encryption method under single base station mode Download PDFInfo
- Publication number
- CN103596136A CN103596136A CN201210291188.0A CN201210291188A CN103596136A CN 103596136 A CN103596136 A CN 103596136A CN 201210291188 A CN201210291188 A CN 201210291188A CN 103596136 A CN103596136 A CN 103596136A
- Authority
- CN
- China
- Prior art keywords
- group
- group calling
- call
- calling
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides a single base station cluster group call end-to-end encryption method. The method comprises the following steps that a, a group call initiator sends a carrying group identity identification code, an encryption call tag and a group call establishment request message of a group call secret key; b, a base station receives the group call establishment request message, distributes downlink sharing channel resources and issues a group paging request message; c, a group call hearer receives the group paging request message, acquires and analyzes the group call secret key, and then a receiver and a microphone are opened after success and a group paging response message is sent; d, the base station receives the group paging response message and sends a group call establishment response message; e, the group call initiator receives the group call establishment response message and opens the receiver and a microphone; f, parties of the group call carry out cryptograph conversation. According to the method of the invention, the group call secret key is distributed and completed during a group call establishment process; group call turnon time delay is not increased; group call parties control the receiver and the microphone; a user is guaranteed to process a voice packet under the condition that the cluster secret key is analyzed successfully.
Description
Technical field
The present invention relates to wireless communication field, relate in particular to the implementation method of cluster multi call End to End Encryption under a kind of single base station mode.
Background technology
In the Chinese patent application that is CN101442742A at publication number, a kind of method that realizes cluster multi call End to End Encryption under single cluster of base stations pattern is disclosed, the method is by cluster multi call initiator spanning set group-calling key, then after cluster multi call has been set up, then send to separately each cluster multi call obedient party.The weak point of the method is: 1, and in air interface, each obedient party will set up Traffic Channel and carrys out signalling of bouquet group calling key, has increased air interface resource expense; 2, because cluster multi call plaintext passage is set up, and the initiator of cluster multi call and obedient party do not have the controlling mechanism of microphone and receiver, may cause the obedient party who does not receive cluster multi call key to play the media bag that does not pass through deciphering or Decryption failures.
Summary of the invention
In order to address the above problem, the present invention proposes the method for cluster multi call End to End Encryption under a kind of single base station mode, the method comprises the following steps:
A, group call initiator sends group calling and sets up request message to base station, and described group calling is set up in request message and is carried and organize identity code, call encryption mark and group calling key;
B, base station receives group calling and sets up request message, preservation group identity code and group calling key, for described cluster multi call allocation of downlink shared channel resources, then on broadcast channel, issue group paging request message, in described group of paging request message, carry group identity code, call encryption mark, DSCH Downlink Shared Channel resource and group calling key;
C, group calling obedient party receives after group paging request message, and judging whether to organize identity code is that own affiliated group and this calling is call encryption, if, obtain group calling key and resolve, after successfully resolved, opening receiver and microphone transmission group page-response message to base station;
D, base station receives group page-response message, sends group calling and sets up response message to group call initiator;
E, group call initiator receives group calling and sets up response message, opens receiver and microphone;
F. group call initiator and group calling obedient party enter ciphertext call.
Preferably, described group call initiator generates group calling key according to described group of identity code.
Preferably, described group calling key is not identical in each group calling.
Preferably, described group calling key is not actual group calling working key, and group call member adopts predetermined algorithmic rule to calculate actual group calling working key according to described group calling key.Further, group call initiator, receiving after group calling sets up response message, calculates actual group calling working key; Group calling obedient party calculates immediately actual group calling working key after successfully resolving group calling key.
Preferably, in step b, described group of paging request message adopts two continuous frames paging mechanism, and the first frame group paging request message is carried group identity code, call encryption mark and DSCH Downlink Shared Channel resource; The second frame group paging request message is carried group calling key; Accordingly, in step c, described group calling obedient party is after receiving the first frame group paging request message, and judging group identity code is that own affiliated group and this type of call is call encryption, waits for that next frame obtains group calling key.
Preferably, described ciphertext call is encrypted for group calling speaker, and group calling obedient party deciphers, and any encryption and decryption operation is not done to voice packet in base station.
Preferably, group calling obedient party receives after group paging request message, if group identity code is not own affiliated group or the failure of parsing group calling key, does not add this group calling; After base station waits group page-response message is overtime, send group calling release message to group call initiator, group calling finishes.
Compared with prior art, the invention has the advantages that:
(1) End to End Encryption cluster multi call Establishing process of the present invention is with expressly cluster multi call Establishing process is in full accord, in the signaling procedure that is distributed in cluster multi call foundation of cluster multi call key, complete, can not increase because newly increasing interacting message cluster multi call and connect time delay.
(2) cluster multi call obedient party obtains cluster multi call key at DSCH Downlink Shared Channel, saves air interface resource.
(3) group call initiator and obedient party control receiver and microphone, guarantee that user just can processed voice bag under the prerequisite of successful analytic sets group cipher.
(4) cluster multi call operation flow has guaranteed just to have got when cluster multi call obedient party adds group calling group calling key, avoid because obedient party first adds group calling, after obtain group calling key and cause obedient party to play not the situation through the voice packet of deciphering or Decryption failures.
Accompanying drawing explanation
Fig. 1 is the realization flow figure of cluster multi call End to End Encryption under single base station mode of the present invention.
Embodiment
Below in conjunction with accompanying drawing, by specific embodiment, the present invention is described in further details.
In the present embodiment, the terminal A under single base station, terminal B, terminal C are a cluster group, and setting this cluster group identity code is GID1.The group identity code that gets affiliated cluster group in the group service register flow path that terminal A, terminal B, terminal C carry out in start is GID1.Referring to Fig. 1, the realization flow of the cluster multi call End to End Encryption of the present embodiment comprises:
The group calling key of the present embodiment is generated according to group identity code GID1 by terminal A, it is not actual group calling working key, but the predecessor of actual group calling working key, cluster obedient party obtains after this group calling key, calculates actual group calling working key under predetermined algorithmic rule again.In order to strengthen maintaining secrecy, group calling key can be not identical in each group calling.
Here base station preservation group identity code and group calling key, be in order to issue group calling key lagging in entering beep-page message, or when the group membership of this cluster group under this base station issues DSCH Downlink Shared Channel resource, issue group calling key for being switched to.
The group paging request message of the present embodiment adopts two continuous frames paging mechanism, the first frame paging request message indication group identity code, call encryption and DSCH Downlink Shared Channel resource; The second frame paging request message is carried group calling key.
In the above-mentioned steps of the present embodiment, terminal B or terminal C receive after group paging request message, if judge group identity code, it not own affiliated group, or resolve the failure of group calling key, do not add this group calling, do not open receiver and microphone, do not send group page-response message to base station yet; Accordingly, after base station waits group page-response message is overtime, send group calling release message to terminal A, group calling so far finishes.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, all any modifications of doing within the spirit and principles in the present invention, be equal to and replace and improvement etc., within all should being included in protection scope of the present invention.
Claims (8)
1. a method for cluster multi call End to End Encryption under single base station mode, is characterized in that, comprises the following steps:
A, group call initiator sends group calling and sets up request message to base station, and described group calling is set up in request message and is carried and organize identity code, call encryption mark and group calling key;
B, base station receives group calling and sets up request message, preservation group identity code and group calling key, for described cluster multi call allocation of downlink shared channel resources, then on broadcast channel, issue group paging request message, in described group of paging request message, carry group identity code, call encryption mark, DSCH Downlink Shared Channel resource and group calling key;
C, group calling obedient party receives after group paging request message, and judging whether to organize identity code is that own affiliated group and this calling is call encryption, if, obtain group calling key and resolve, after successfully resolved, opening receiver and microphone transmission group page-response message to base station;
D, base station receives group page-response message, sends group calling and sets up response message to group call initiator;
E, group call initiator receives group calling and sets up response message, opens receiver and microphone;
F. group call initiator and group calling obedient party enter ciphertext call.
2. method according to claim 1, is characterized in that, described group call initiator generates group calling key according to described group of identity code.
3. method according to claim 1, is characterized in that, described group calling key is not identical in each group calling.
4. method according to claim 1, is characterized in that, described group calling key is not actual group calling working key, and group call member adopts predetermined algorithmic rule to calculate actual group calling working key according to described group calling key.
5. method according to claim 4, is characterized in that, group call initiator, receiving after group calling sets up response message, calculates actual group calling working key; Group calling obedient party calculates immediately actual group calling working key after successfully resolving group calling key.
6. method according to claim 1, is characterized in that:
Step b, described group of paging request message adopts two continuous frames paging mechanism, and the first frame group paging request message is carried group identity code, call encryption mark and DSCH Downlink Shared Channel resource; The second frame group paging request message is carried group calling key;
Step c, described group calling obedient party is after receiving the first frame group paging request message, and judging group identity code is that own affiliated group and this type of call is call encryption, waits for that next frame obtains group calling key.
7. method according to claim 1, is characterized in that step f, and described ciphertext call is encrypted for group calling speaker, and group calling obedient party deciphers, and any encryption and decryption operation is not done to voice packet in base station.
8. method according to claim 1, is characterized in that: group calling obedient party receives after group paging request message, if group identity code is not own affiliated group or the failure of parsing group calling key, does not add this group calling; After base station waits group page-response message is overtime, send group calling release message to group call initiator, group calling finishes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210291188.0A CN103596136A (en) | 2012-08-15 | 2012-08-15 | Cluster group call end-to-end encryption method under single base station mode |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210291188.0A CN103596136A (en) | 2012-08-15 | 2012-08-15 | Cluster group call end-to-end encryption method under single base station mode |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103596136A true CN103596136A (en) | 2014-02-19 |
Family
ID=50086083
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210291188.0A Pending CN103596136A (en) | 2012-08-15 | 2012-08-15 | Cluster group call end-to-end encryption method under single base station mode |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103596136A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106162626A (en) * | 2015-04-20 | 2016-11-23 | 北京信威通信技术股份有限公司 | Group communication is eated dishes without rice or wine the methods, devices and systems of security control |
WO2018045638A1 (en) * | 2016-09-08 | 2018-03-15 | 宇龙计算机通信科技(深圳)有限公司 | Method and system for establishing push-to-talk communication |
CN113411758A (en) * | 2020-03-16 | 2021-09-17 | 成都鼎桥通信技术有限公司 | Method and device for determining group call key event of private network cluster terminal |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101137123A (en) * | 2007-04-09 | 2008-03-05 | 中兴通讯股份有限公司 | Encrypted group calling, individual calling, and dynamic restructuring call implementing method of cluster system |
CN101442742A (en) * | 2008-12-12 | 2009-05-27 | 华为技术有限公司 | Method, system and equipment for implementing end-to-end encipher of mobile cluster set call |
CN102291680A (en) * | 2010-06-18 | 2011-12-21 | 普天信息技术研究院有限公司 | Encrypted group calling method based on long term evolution (TD-LTE) trunking communication system |
-
2012
- 2012-08-15 CN CN201210291188.0A patent/CN103596136A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101137123A (en) * | 2007-04-09 | 2008-03-05 | 中兴通讯股份有限公司 | Encrypted group calling, individual calling, and dynamic restructuring call implementing method of cluster system |
CN101442742A (en) * | 2008-12-12 | 2009-05-27 | 华为技术有限公司 | Method, system and equipment for implementing end-to-end encipher of mobile cluster set call |
CN102291680A (en) * | 2010-06-18 | 2011-12-21 | 普天信息技术研究院有限公司 | Encrypted group calling method based on long term evolution (TD-LTE) trunking communication system |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106162626A (en) * | 2015-04-20 | 2016-11-23 | 北京信威通信技术股份有限公司 | Group communication is eated dishes without rice or wine the methods, devices and systems of security control |
WO2018045638A1 (en) * | 2016-09-08 | 2018-03-15 | 宇龙计算机通信科技(深圳)有限公司 | Method and system for establishing push-to-talk communication |
CN113411758A (en) * | 2020-03-16 | 2021-09-17 | 成都鼎桥通信技术有限公司 | Method and device for determining group call key event of private network cluster terminal |
CN113411758B (en) * | 2020-03-16 | 2022-08-09 | 成都鼎桥通信技术有限公司 | Method and device for determining group call key event of private network cluster terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103179558B (en) | Group system group exhales encryption implementation method and system | |
CN101836470B (en) | Methods and apparatuses for enabling non-access stratum (nas) security in LTE mobile units | |
CN102291680B (en) | Encrypted group calling method based on long term evolution (TD-LTE) trunking communication system | |
US7747021B2 (en) | Method and apparatus for fast secure session establishment on half-duplex point-to-point voice cellular network channels | |
US7643817B2 (en) | Method and apparatus for rapid secure session establishment on half-duplex AD-hoc group voice cellular network channels | |
CN100466805C (en) | Method for end-to-end enciphoring voice telecommunication | |
CN101933387B (en) | Communications node and method for executing when communications node | |
CN101180828A (en) | Device and method for encrypting and transmitting data in combined network | |
EP2034781A3 (en) | Methods and devices for establishing security associations and performing handoff authentication in communications systems | |
CN102137393B (en) | Method and device for encrypting end-to-end | |
CN100415005C (en) | Method for realizing switch-over between open call/secrete call in end-to-end voice telecommunication | |
CN102843675A (en) | Cluster call voice encryption method, terminal and system | |
KR20100087023A (en) | End-to-end encrypted communication | |
CN1937487A (en) | LTE authentication and encryption method | |
CN106549906A (en) | Realize method, terminal and the network side element of end-to-end call encryption | |
CN103813272A (en) | Cluster group calling downlink transmission method | |
CN103634744A (en) | Cluster group call end-to-end encryption realization method | |
CN105451195B (en) | End-to-end cluster cryptographic key distribution method and equipment of the core network | |
CN103596136A (en) | Cluster group call end-to-end encryption method under single base station mode | |
CN103002439A (en) | Confidential call communication method and user terminal | |
CN101166177B (en) | A method and system for initialization signaling transmission at non access layer | |
CN108123951B (en) | Cluster communication off-line direct-communication voice group call transmission encryption method and device | |
CN112866994B (en) | Encryption communication method and system for carrying narrowband speech coding by LTE (Long term evolution) | |
CN114158041B (en) | Method for realizing 5G network data confidentiality and integrity multistage security | |
CN101848425A (en) | PTT (Push-To-Talk) data processing method, terminal, PTT server and PTT system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20140219 |