CN103596136A - Cluster group call end-to-end encryption method under single base station mode - Google Patents

Cluster group call end-to-end encryption method under single base station mode Download PDF

Info

Publication number
CN103596136A
CN103596136A CN201210291188.0A CN201210291188A CN103596136A CN 103596136 A CN103596136 A CN 103596136A CN 201210291188 A CN201210291188 A CN 201210291188A CN 103596136 A CN103596136 A CN 103596136A
Authority
CN
China
Prior art keywords
group
group calling
call
calling
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201210291188.0A
Other languages
Chinese (zh)
Inventor
赵春平
赵晓军
许瑞锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xinwei Telecom Technology Inc
Original Assignee
Beijing Xinwei Telecom Technology Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xinwei Telecom Technology Inc filed Critical Beijing Xinwei Telecom Technology Inc
Priority to CN201210291188.0A priority Critical patent/CN103596136A/en
Publication of CN103596136A publication Critical patent/CN103596136A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a single base station cluster group call end-to-end encryption method. The method comprises the following steps that a, a group call initiator sends a carrying group identity identification code, an encryption call tag and a group call establishment request message of a group call secret key; b, a base station receives the group call establishment request message, distributes downlink sharing channel resources and issues a group paging request message; c, a group call hearer receives the group paging request message, acquires and analyzes the group call secret key, and then a receiver and a microphone are opened after success and a group paging response message is sent; d, the base station receives the group paging response message and sends a group call establishment response message; e, the group call initiator receives the group call establishment response message and opens the receiver and a microphone; f, parties of the group call carry out cryptograph conversation. According to the method of the invention, the group call secret key is distributed and completed during a group call establishment process; group call turnon time delay is not increased; group call parties control the receiver and the microphone; a user is guaranteed to process a voice packet under the condition that the cluster secret key is analyzed successfully.

Description

A kind of method of cluster multi call End to End Encryption under single base station mode
Technical field
The present invention relates to wireless communication field, relate in particular to the implementation method of cluster multi call End to End Encryption under a kind of single base station mode.
Background technology
In the Chinese patent application that is CN101442742A at publication number, a kind of method that realizes cluster multi call End to End Encryption under single cluster of base stations pattern is disclosed, the method is by cluster multi call initiator spanning set group-calling key, then after cluster multi call has been set up, then send to separately each cluster multi call obedient party.The weak point of the method is: 1, and in air interface, each obedient party will set up Traffic Channel and carrys out signalling of bouquet group calling key, has increased air interface resource expense; 2, because cluster multi call plaintext passage is set up, and the initiator of cluster multi call and obedient party do not have the controlling mechanism of microphone and receiver, may cause the obedient party who does not receive cluster multi call key to play the media bag that does not pass through deciphering or Decryption failures.
Summary of the invention
In order to address the above problem, the present invention proposes the method for cluster multi call End to End Encryption under a kind of single base station mode, the method comprises the following steps:
A, group call initiator sends group calling and sets up request message to base station, and described group calling is set up in request message and is carried and organize identity code, call encryption mark and group calling key;
B, base station receives group calling and sets up request message, preservation group identity code and group calling key, for described cluster multi call allocation of downlink shared channel resources, then on broadcast channel, issue group paging request message, in described group of paging request message, carry group identity code, call encryption mark, DSCH Downlink Shared Channel resource and group calling key;
C, group calling obedient party receives after group paging request message, and judging whether to organize identity code is that own affiliated group and this calling is call encryption, if, obtain group calling key and resolve, after successfully resolved, opening receiver and microphone transmission group page-response message to base station;
D, base station receives group page-response message, sends group calling and sets up response message to group call initiator;
E, group call initiator receives group calling and sets up response message, opens receiver and microphone;
F. group call initiator and group calling obedient party enter ciphertext call.
Preferably, described group call initiator generates group calling key according to described group of identity code.
Preferably, described group calling key is not identical in each group calling.
Preferably, described group calling key is not actual group calling working key, and group call member adopts predetermined algorithmic rule to calculate actual group calling working key according to described group calling key.Further, group call initiator, receiving after group calling sets up response message, calculates actual group calling working key; Group calling obedient party calculates immediately actual group calling working key after successfully resolving group calling key.
Preferably, in step b, described group of paging request message adopts two continuous frames paging mechanism, and the first frame group paging request message is carried group identity code, call encryption mark and DSCH Downlink Shared Channel resource; The second frame group paging request message is carried group calling key; Accordingly, in step c, described group calling obedient party is after receiving the first frame group paging request message, and judging group identity code is that own affiliated group and this type of call is call encryption, waits for that next frame obtains group calling key.
Preferably, described ciphertext call is encrypted for group calling speaker, and group calling obedient party deciphers, and any encryption and decryption operation is not done to voice packet in base station.
Preferably, group calling obedient party receives after group paging request message, if group identity code is not own affiliated group or the failure of parsing group calling key, does not add this group calling; After base station waits group page-response message is overtime, send group calling release message to group call initiator, group calling finishes.
Compared with prior art, the invention has the advantages that:
(1) End to End Encryption cluster multi call Establishing process of the present invention is with expressly cluster multi call Establishing process is in full accord, in the signaling procedure that is distributed in cluster multi call foundation of cluster multi call key, complete, can not increase because newly increasing interacting message cluster multi call and connect time delay.
(2) cluster multi call obedient party obtains cluster multi call key at DSCH Downlink Shared Channel, saves air interface resource.
(3) group call initiator and obedient party control receiver and microphone, guarantee that user just can processed voice bag under the prerequisite of successful analytic sets group cipher.
(4) cluster multi call operation flow has guaranteed just to have got when cluster multi call obedient party adds group calling group calling key, avoid because obedient party first adds group calling, after obtain group calling key and cause obedient party to play not the situation through the voice packet of deciphering or Decryption failures.
Accompanying drawing explanation
Fig. 1 is the realization flow figure of cluster multi call End to End Encryption under single base station mode of the present invention.
Embodiment
Below in conjunction with accompanying drawing, by specific embodiment, the present invention is described in further details.
In the present embodiment, the terminal A under single base station, terminal B, terminal C are a cluster group, and setting this cluster group identity code is GID1.The group identity code that gets affiliated cluster group in the group service register flow path that terminal A, terminal B, terminal C carry out in start is GID1.Referring to Fig. 1, the realization flow of the cluster multi call End to End Encryption of the present embodiment comprises:
Step 101, terminal A initiate the encryption group calling of GID1, send group calling and set up request message to base station, in message, carry: call encryption mark, group identity code GID1, group calling key.
The group calling key of the present embodiment is generated according to group identity code GID1 by terminal A, it is not actual group calling working key, but the predecessor of actual group calling working key, cluster obedient party obtains after this group calling key, calculates actual group calling working key under predetermined algorithmic rule again.In order to strengthen maintaining secrecy, group calling key can be not identical in each group calling.
Step 102, base station receive group calling and set up request message, first preservation group identity code and group calling key, and set up the corresponding relation of GID1 and group calling key; Then according to this type of call of call encryption marker for judgment, be call encryption, DSCH Downlink Shared Channel resource for group identity code GID1 allocation set group-calling, and on broadcast channel, issue group paging request message, in message, carry group identity code GID1, call encryption mark and group calling key.
Here base station preservation group identity code and group calling key, be in order to issue group calling key lagging in entering beep-page message, or when the group membership of this cluster group under this base station issues DSCH Downlink Shared Channel resource, issue group calling key for being switched to.
The group paging request message of the present embodiment adopts two continuous frames paging mechanism, the first frame paging request message indication group identity code, call encryption and DSCH Downlink Shared Channel resource; The second frame paging request message is carried group calling key.
Step 103, terminal B and terminal C receive the first frame group paging request message, according to the group identity code in message, be judged as own affiliated group, and be call encryption according to this type of call of call encryption marker for judgment, wait for that next frame obtains group calling key, successfully resolving group calling key and according to predetermined algorithmic rule, calculating after actual group calling working key, add this group calling, open receiver and microphone, transmission group page-response message is to base station.
Step 104, base station receive group page-response message, send group calling and set up response message to terminal A, carry group identity code GID1 in message.Terminal A receives group calling and sets up after response message, according to predetermined algorithmic rule, calculates actual group calling working key, then adds this group calling, opens microphone and receiver.
Step 105, terminal A and terminal B, terminal C enter ciphertext call.In ciphertext communication process, group calling speaker is encrypted, group calling obedient party deciphering, and any encryption and decryption operation is not done to voice packet in base station.
In the above-mentioned steps of the present embodiment, terminal B or terminal C receive after group paging request message, if judge group identity code, it not own affiliated group, or resolve the failure of group calling key, do not add this group calling, do not open receiver and microphone, do not send group page-response message to base station yet; Accordingly, after base station waits group page-response message is overtime, send group calling release message to terminal A, group calling so far finishes.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, all any modifications of doing within the spirit and principles in the present invention, be equal to and replace and improvement etc., within all should being included in protection scope of the present invention.

Claims (8)

1. a method for cluster multi call End to End Encryption under single base station mode, is characterized in that, comprises the following steps:
A, group call initiator sends group calling and sets up request message to base station, and described group calling is set up in request message and is carried and organize identity code, call encryption mark and group calling key;
B, base station receives group calling and sets up request message, preservation group identity code and group calling key, for described cluster multi call allocation of downlink shared channel resources, then on broadcast channel, issue group paging request message, in described group of paging request message, carry group identity code, call encryption mark, DSCH Downlink Shared Channel resource and group calling key;
C, group calling obedient party receives after group paging request message, and judging whether to organize identity code is that own affiliated group and this calling is call encryption, if, obtain group calling key and resolve, after successfully resolved, opening receiver and microphone transmission group page-response message to base station;
D, base station receives group page-response message, sends group calling and sets up response message to group call initiator;
E, group call initiator receives group calling and sets up response message, opens receiver and microphone;
F. group call initiator and group calling obedient party enter ciphertext call.
2. method according to claim 1, is characterized in that, described group call initiator generates group calling key according to described group of identity code.
3. method according to claim 1, is characterized in that, described group calling key is not identical in each group calling.
4. method according to claim 1, is characterized in that, described group calling key is not actual group calling working key, and group call member adopts predetermined algorithmic rule to calculate actual group calling working key according to described group calling key.
5. method according to claim 4, is characterized in that, group call initiator, receiving after group calling sets up response message, calculates actual group calling working key; Group calling obedient party calculates immediately actual group calling working key after successfully resolving group calling key.
6. method according to claim 1, is characterized in that:
Step b, described group of paging request message adopts two continuous frames paging mechanism, and the first frame group paging request message is carried group identity code, call encryption mark and DSCH Downlink Shared Channel resource; The second frame group paging request message is carried group calling key;
Step c, described group calling obedient party is after receiving the first frame group paging request message, and judging group identity code is that own affiliated group and this type of call is call encryption, waits for that next frame obtains group calling key.
7. method according to claim 1, is characterized in that step f, and described ciphertext call is encrypted for group calling speaker, and group calling obedient party deciphers, and any encryption and decryption operation is not done to voice packet in base station.
8. method according to claim 1, is characterized in that: group calling obedient party receives after group paging request message, if group identity code is not own affiliated group or the failure of parsing group calling key, does not add this group calling; After base station waits group page-response message is overtime, send group calling release message to group call initiator, group calling finishes.
CN201210291188.0A 2012-08-15 2012-08-15 Cluster group call end-to-end encryption method under single base station mode Pending CN103596136A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210291188.0A CN103596136A (en) 2012-08-15 2012-08-15 Cluster group call end-to-end encryption method under single base station mode

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210291188.0A CN103596136A (en) 2012-08-15 2012-08-15 Cluster group call end-to-end encryption method under single base station mode

Publications (1)

Publication Number Publication Date
CN103596136A true CN103596136A (en) 2014-02-19

Family

ID=50086083

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210291188.0A Pending CN103596136A (en) 2012-08-15 2012-08-15 Cluster group call end-to-end encryption method under single base station mode

Country Status (1)

Country Link
CN (1) CN103596136A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106162626A (en) * 2015-04-20 2016-11-23 北京信威通信技术股份有限公司 Group communication is eated dishes without rice or wine the methods, devices and systems of security control
WO2018045638A1 (en) * 2016-09-08 2018-03-15 宇龙计算机通信科技(深圳)有限公司 Method and system for establishing push-to-talk communication
CN113411758A (en) * 2020-03-16 2021-09-17 成都鼎桥通信技术有限公司 Method and device for determining group call key event of private network cluster terminal

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101137123A (en) * 2007-04-09 2008-03-05 中兴通讯股份有限公司 Encrypted group calling, individual calling, and dynamic restructuring call implementing method of cluster system
CN101442742A (en) * 2008-12-12 2009-05-27 华为技术有限公司 Method, system and equipment for implementing end-to-end encipher of mobile cluster set call
CN102291680A (en) * 2010-06-18 2011-12-21 普天信息技术研究院有限公司 Encrypted group calling method based on long term evolution (TD-LTE) trunking communication system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101137123A (en) * 2007-04-09 2008-03-05 中兴通讯股份有限公司 Encrypted group calling, individual calling, and dynamic restructuring call implementing method of cluster system
CN101442742A (en) * 2008-12-12 2009-05-27 华为技术有限公司 Method, system and equipment for implementing end-to-end encipher of mobile cluster set call
CN102291680A (en) * 2010-06-18 2011-12-21 普天信息技术研究院有限公司 Encrypted group calling method based on long term evolution (TD-LTE) trunking communication system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106162626A (en) * 2015-04-20 2016-11-23 北京信威通信技术股份有限公司 Group communication is eated dishes without rice or wine the methods, devices and systems of security control
WO2018045638A1 (en) * 2016-09-08 2018-03-15 宇龙计算机通信科技(深圳)有限公司 Method and system for establishing push-to-talk communication
CN113411758A (en) * 2020-03-16 2021-09-17 成都鼎桥通信技术有限公司 Method and device for determining group call key event of private network cluster terminal
CN113411758B (en) * 2020-03-16 2022-08-09 成都鼎桥通信技术有限公司 Method and device for determining group call key event of private network cluster terminal

Similar Documents

Publication Publication Date Title
CN103179558B (en) Group system group exhales encryption implementation method and system
CN101836470B (en) Methods and apparatuses for enabling non-access stratum (nas) security in LTE mobile units
CN102291680B (en) Encrypted group calling method based on long term evolution (TD-LTE) trunking communication system
US7747021B2 (en) Method and apparatus for fast secure session establishment on half-duplex point-to-point voice cellular network channels
US7643817B2 (en) Method and apparatus for rapid secure session establishment on half-duplex AD-hoc group voice cellular network channels
CN100466805C (en) Method for end-to-end enciphoring voice telecommunication
CN101933387B (en) Communications node and method for executing when communications node
CN101180828A (en) Device and method for encrypting and transmitting data in combined network
EP2034781A3 (en) Methods and devices for establishing security associations and performing handoff authentication in communications systems
CN102137393B (en) Method and device for encrypting end-to-end
CN100415005C (en) Method for realizing switch-over between open call/secrete call in end-to-end voice telecommunication
CN102843675A (en) Cluster call voice encryption method, terminal and system
KR20100087023A (en) End-to-end encrypted communication
CN1937487A (en) LTE authentication and encryption method
CN106549906A (en) Realize method, terminal and the network side element of end-to-end call encryption
CN103813272A (en) Cluster group calling downlink transmission method
CN103634744A (en) Cluster group call end-to-end encryption realization method
CN105451195B (en) End-to-end cluster cryptographic key distribution method and equipment of the core network
CN103596136A (en) Cluster group call end-to-end encryption method under single base station mode
CN103002439A (en) Confidential call communication method and user terminal
CN101166177B (en) A method and system for initialization signaling transmission at non access layer
CN108123951B (en) Cluster communication off-line direct-communication voice group call transmission encryption method and device
CN112866994B (en) Encryption communication method and system for carrying narrowband speech coding by LTE (Long term evolution)
CN114158041B (en) Method for realizing 5G network data confidentiality and integrity multistage security
CN101848425A (en) PTT (Push-To-Talk) data processing method, terminal, PTT server and PTT system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20140219