CN103596136A - Cluster group call end-to-end encryption method under single base station mode - Google Patents
Cluster group call end-to-end encryption method under single base station mode Download PDFInfo
- Publication number
- CN103596136A CN103596136A CN201210291188.0A CN201210291188A CN103596136A CN 103596136 A CN103596136 A CN 103596136A CN 201210291188 A CN201210291188 A CN 201210291188A CN 103596136 A CN103596136 A CN 103596136A
- Authority
- CN
- China
- Prior art keywords
- group
- group calling
- call
- calling
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 24
- 230000004044 response Effects 0.000 claims abstract description 22
- 239000003999 initiator Substances 0.000 claims abstract description 19
- 230000007246 mechanism Effects 0.000 claims description 4
- 238000004321 preservation Methods 0.000 claims description 4
- 230000005540 biological transmission Effects 0.000 claims description 3
- 241000776457 FCB group Species 0.000 claims description 2
- FGUUSXIOTUKUDN-IBGZPJMESA-N C1(=CC=CC=C1)N1C2=C(NC([C@H](C1)NC=1OC(=NN=1)C1=CC=CC=C1)=O)C=CC=C2 Chemical compound C1(=CC=CC=C1)N1C2=C(NC([C@H](C1)NC=1OC(=NN=1)C1=CC=CC=C1)=O)C=CC=C2 FGUUSXIOTUKUDN-IBGZPJMESA-N 0.000 claims 1
- 230000008569 process Effects 0.000 abstract description 4
- 101100282746 Oryza sativa subsp. japonica GID1 gene Proteins 0.000 description 9
- 101100156295 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) VID30 gene Proteins 0.000 description 9
- 230000006854 communication Effects 0.000 description 2
- 239000003550 marker Substances 0.000 description 2
- 230000011664 signaling Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides a single base station cluster group call end-to-end encryption method. The method comprises the following steps that a, a group call initiator sends a carrying group identity identification code, an encryption call tag and a group call establishment request message of a group call secret key; b, a base station receives the group call establishment request message, distributes downlink sharing channel resources and issues a group paging request message; c, a group call hearer receives the group paging request message, acquires and analyzes the group call secret key, and then a receiver and a microphone are opened after success and a group paging response message is sent; d, the base station receives the group paging response message and sends a group call establishment response message; e, the group call initiator receives the group call establishment response message and opens the receiver and a microphone; f, parties of the group call carry out cryptograph conversation. According to the method of the invention, the group call secret key is distributed and completed during a group call establishment process; group call turnon time delay is not increased; group call parties control the receiver and the microphone; a user is guaranteed to process a voice packet under the condition that the cluster secret key is analyzed successfully.
Description
Technical field
The present invention relates to wireless communication field, relate in particular to the implementation method of cluster multi call End to End Encryption under a kind of single base station mode.
Background technology
In the Chinese patent application that is CN101442742A at publication number, a kind of method that realizes cluster multi call End to End Encryption under single cluster of base stations pattern is disclosed, the method is by cluster multi call initiator spanning set group-calling key, then after cluster multi call has been set up, then send to separately each cluster multi call obedient party.The weak point of the method is: 1, and in air interface, each obedient party will set up Traffic Channel and carrys out signalling of bouquet group calling key, has increased air interface resource expense; 2, because cluster multi call plaintext passage is set up, and the initiator of cluster multi call and obedient party do not have the controlling mechanism of microphone and receiver, may cause the obedient party who does not receive cluster multi call key to play the media bag that does not pass through deciphering or Decryption failures.
Summary of the invention
In order to address the above problem, the present invention proposes the method for cluster multi call End to End Encryption under a kind of single base station mode, the method comprises the following steps:
A, group call initiator sends group calling and sets up request message to base station, and described group calling is set up in request message and is carried and organize identity code, call encryption mark and group calling key;
B, base station receives group calling and sets up request message, preservation group identity code and group calling key, for described cluster multi call allocation of downlink shared channel resources, then on broadcast channel, issue group paging request message, in described group of paging request message, carry group identity code, call encryption mark, DSCH Downlink Shared Channel resource and group calling key;
C, group calling obedient party receives after group paging request message, and judging whether to organize identity code is that own affiliated group and this calling is call encryption, if, obtain group calling key and resolve, after successfully resolved, opening receiver and microphone transmission group page-response message to base station;
D, base station receives group page-response message, sends group calling and sets up response message to group call initiator;
E, group call initiator receives group calling and sets up response message, opens receiver and microphone;
F. group call initiator and group calling obedient party enter ciphertext call.
Preferably, described group call initiator generates group calling key according to described group of identity code.
Preferably, described group calling key is not identical in each group calling.
Preferably, described group calling key is not actual group calling working key, and group call member adopts predetermined algorithmic rule to calculate actual group calling working key according to described group calling key.Further, group call initiator, receiving after group calling sets up response message, calculates actual group calling working key; Group calling obedient party calculates immediately actual group calling working key after successfully resolving group calling key.
Preferably, in step b, described group of paging request message adopts two continuous frames paging mechanism, and the first frame group paging request message is carried group identity code, call encryption mark and DSCH Downlink Shared Channel resource; The second frame group paging request message is carried group calling key; Accordingly, in step c, described group calling obedient party is after receiving the first frame group paging request message, and judging group identity code is that own affiliated group and this type of call is call encryption, waits for that next frame obtains group calling key.
Preferably, described ciphertext call is encrypted for group calling speaker, and group calling obedient party deciphers, and any encryption and decryption operation is not done to voice packet in base station.
Preferably, group calling obedient party receives after group paging request message, if group identity code is not own affiliated group or the failure of parsing group calling key, does not add this group calling; After base station waits group page-response message is overtime, send group calling release message to group call initiator, group calling finishes.
Compared with prior art, the invention has the advantages that:
(1) End to End Encryption cluster multi call Establishing process of the present invention is with expressly cluster multi call Establishing process is in full accord, in the signaling procedure that is distributed in cluster multi call foundation of cluster multi call key, complete, can not increase because newly increasing interacting message cluster multi call and connect time delay.
(2) cluster multi call obedient party obtains cluster multi call key at DSCH Downlink Shared Channel, saves air interface resource.
(3) group call initiator and obedient party control receiver and microphone, guarantee that user just can processed voice bag under the prerequisite of successful analytic sets group cipher.
(4) cluster multi call operation flow has guaranteed just to have got when cluster multi call obedient party adds group calling group calling key, avoid because obedient party first adds group calling, after obtain group calling key and cause obedient party to play not the situation through the voice packet of deciphering or Decryption failures.
Accompanying drawing explanation
Fig. 1 is the realization flow figure of cluster multi call End to End Encryption under single base station mode of the present invention.
Embodiment
Below in conjunction with accompanying drawing, by specific embodiment, the present invention is described in further details.
In the present embodiment, the terminal A under single base station, terminal B, terminal C are a cluster group, and setting this cluster group identity code is GID1.The group identity code that gets affiliated cluster group in the group service register flow path that terminal A, terminal B, terminal C carry out in start is GID1.Referring to Fig. 1, the realization flow of the cluster multi call End to End Encryption of the present embodiment comprises:
The group calling key of the present embodiment is generated according to group identity code GID1 by terminal A, it is not actual group calling working key, but the predecessor of actual group calling working key, cluster obedient party obtains after this group calling key, calculates actual group calling working key under predetermined algorithmic rule again.In order to strengthen maintaining secrecy, group calling key can be not identical in each group calling.
Here base station preservation group identity code and group calling key, be in order to issue group calling key lagging in entering beep-page message, or when the group membership of this cluster group under this base station issues DSCH Downlink Shared Channel resource, issue group calling key for being switched to.
The group paging request message of the present embodiment adopts two continuous frames paging mechanism, the first frame paging request message indication group identity code, call encryption and DSCH Downlink Shared Channel resource; The second frame paging request message is carried group calling key.
In the above-mentioned steps of the present embodiment, terminal B or terminal C receive after group paging request message, if judge group identity code, it not own affiliated group, or resolve the failure of group calling key, do not add this group calling, do not open receiver and microphone, do not send group page-response message to base station yet; Accordingly, after base station waits group page-response message is overtime, send group calling release message to terminal A, group calling so far finishes.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, all any modifications of doing within the spirit and principles in the present invention, be equal to and replace and improvement etc., within all should being included in protection scope of the present invention.
Claims (8)
1. a method for cluster multi call End to End Encryption under single base station mode, is characterized in that, comprises the following steps:
A, group call initiator sends group calling and sets up request message to base station, and described group calling is set up in request message and is carried and organize identity code, call encryption mark and group calling key;
B, base station receives group calling and sets up request message, preservation group identity code and group calling key, for described cluster multi call allocation of downlink shared channel resources, then on broadcast channel, issue group paging request message, in described group of paging request message, carry group identity code, call encryption mark, DSCH Downlink Shared Channel resource and group calling key;
C, group calling obedient party receives after group paging request message, and judging whether to organize identity code is that own affiliated group and this calling is call encryption, if, obtain group calling key and resolve, after successfully resolved, opening receiver and microphone transmission group page-response message to base station;
D, base station receives group page-response message, sends group calling and sets up response message to group call initiator;
E, group call initiator receives group calling and sets up response message, opens receiver and microphone;
F. group call initiator and group calling obedient party enter ciphertext call.
2. method according to claim 1, is characterized in that, described group call initiator generates group calling key according to described group of identity code.
3. method according to claim 1, is characterized in that, described group calling key is not identical in each group calling.
4. method according to claim 1, is characterized in that, described group calling key is not actual group calling working key, and group call member adopts predetermined algorithmic rule to calculate actual group calling working key according to described group calling key.
5. method according to claim 4, is characterized in that, group call initiator, receiving after group calling sets up response message, calculates actual group calling working key; Group calling obedient party calculates immediately actual group calling working key after successfully resolving group calling key.
6. method according to claim 1, is characterized in that:
Step b, described group of paging request message adopts two continuous frames paging mechanism, and the first frame group paging request message is carried group identity code, call encryption mark and DSCH Downlink Shared Channel resource; The second frame group paging request message is carried group calling key;
Step c, described group calling obedient party is after receiving the first frame group paging request message, and judging group identity code is that own affiliated group and this type of call is call encryption, waits for that next frame obtains group calling key.
7. method according to claim 1, is characterized in that step f, and described ciphertext call is encrypted for group calling speaker, and group calling obedient party deciphers, and any encryption and decryption operation is not done to voice packet in base station.
8. method according to claim 1, is characterized in that: group calling obedient party receives after group paging request message, if group identity code is not own affiliated group or the failure of parsing group calling key, does not add this group calling; After base station waits group page-response message is overtime, send group calling release message to group call initiator, group calling finishes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210291188.0A CN103596136A (en) | 2012-08-15 | 2012-08-15 | Cluster group call end-to-end encryption method under single base station mode |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210291188.0A CN103596136A (en) | 2012-08-15 | 2012-08-15 | Cluster group call end-to-end encryption method under single base station mode |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103596136A true CN103596136A (en) | 2014-02-19 |
Family
ID=50086083
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210291188.0A Pending CN103596136A (en) | 2012-08-15 | 2012-08-15 | Cluster group call end-to-end encryption method under single base station mode |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103596136A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106162626A (en) * | 2015-04-20 | 2016-11-23 | 北京信威通信技术股份有限公司 | Group communication is eated dishes without rice or wine the methods, devices and systems of security control |
WO2018045638A1 (en) * | 2016-09-08 | 2018-03-15 | 宇龙计算机通信科技(深圳)有限公司 | Method and system for establishing push-to-talk communication |
CN113411758A (en) * | 2020-03-16 | 2021-09-17 | 成都鼎桥通信技术有限公司 | Method and device for determining group call key event of private network cluster terminal |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101137123A (en) * | 2007-04-09 | 2008-03-05 | 中兴通讯股份有限公司 | Encrypted group calling, individual calling, and dynamic restructuring call implementing method of cluster system |
CN101442742A (en) * | 2008-12-12 | 2009-05-27 | 华为技术有限公司 | Method, system and equipment for implementing end-to-end encipher of mobile cluster set call |
CN102291680A (en) * | 2010-06-18 | 2011-12-21 | 普天信息技术研究院有限公司 | Encrypted group calling method based on long term evolution (TD-LTE) trunking communication system |
-
2012
- 2012-08-15 CN CN201210291188.0A patent/CN103596136A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101137123A (en) * | 2007-04-09 | 2008-03-05 | 中兴通讯股份有限公司 | Encrypted group calling, individual calling, and dynamic restructuring call implementing method of cluster system |
CN101442742A (en) * | 2008-12-12 | 2009-05-27 | 华为技术有限公司 | Method, system and equipment for implementing end-to-end encipher of mobile cluster set call |
CN102291680A (en) * | 2010-06-18 | 2011-12-21 | 普天信息技术研究院有限公司 | Encrypted group calling method based on long term evolution (TD-LTE) trunking communication system |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106162626A (en) * | 2015-04-20 | 2016-11-23 | 北京信威通信技术股份有限公司 | Group communication is eated dishes without rice or wine the methods, devices and systems of security control |
WO2018045638A1 (en) * | 2016-09-08 | 2018-03-15 | 宇龙计算机通信科技(深圳)有限公司 | Method and system for establishing push-to-talk communication |
CN113411758A (en) * | 2020-03-16 | 2021-09-17 | 成都鼎桥通信技术有限公司 | Method and device for determining group call key event of private network cluster terminal |
CN113411758B (en) * | 2020-03-16 | 2022-08-09 | 成都鼎桥通信技术有限公司 | Method and device for determining group call key event of private network cluster terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102291680B (en) | Encrypted group calling method based on long term evolution (TD-LTE) trunking communication system | |
US7643817B2 (en) | Method and apparatus for rapid secure session establishment on half-duplex AD-hoc group voice cellular network channels | |
CN101180828B (en) | Device and method for encrypting and transmitting data in combined network | |
US7747021B2 (en) | Method and apparatus for fast secure session establishment on half-duplex point-to-point voice cellular network channels | |
EP2034781A3 (en) | Methods and devices for establishing security associations and performing handoff authentication in communications systems | |
EP2992696A1 (en) | Data encryption protocols for mobile satellite communications | |
CN103179558A (en) | Method and system for implementing group call encryption in trunking system | |
CN102843675A (en) | Cluster call voice encryption method, terminal and system | |
CN102137393B (en) | Method and device for encrypting end-to-end | |
KR20100087023A (en) | End-to-end encrypted communication | |
CN101933387A (en) | Communication Systems | |
CN104955033A (en) | Voice encryption communication method | |
CN102598706A (en) | Delivery of identification information | |
CN103634744A (en) | Cluster group call end-to-end encryption realization method | |
CN105451195B (en) | End-to-end cluster cryptographic key distribution method and equipment of the core network | |
CN103596136A (en) | Cluster group call end-to-end encryption method under single base station mode | |
CN103813272A (en) | Cluster group calling downlink transmission method | |
CN103002439A (en) | Confidential call communication method and user terminal | |
CN101166177B (en) | A method and system for initialization signaling transmission at non access layer | |
CN101848425A (en) | PTT (Push-To-Talk) data processing method, terminal, PTT server and PTT system | |
JP2005341348A (en) | Wireless communication system and confidential control method | |
WO2018037235A1 (en) | Interworking between tetra and mcptt systems during end-to-end encrypted speech calls. | |
CN101547269A (en) | Calling control method and voice terminal | |
CN109714295B (en) | Voice encryption and decryption synchronous processing method and device | |
CN112866994B (en) | Encryption communication method and system for carrying narrowband speech coding by LTE (Long term evolution) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20140219 |