CN106162626A - Group communication is eated dishes without rice or wine the methods, devices and systems of security control - Google Patents

Group communication is eated dishes without rice or wine the methods, devices and systems of security control Download PDF

Info

Publication number
CN106162626A
CN106162626A CN201510186171.2A CN201510186171A CN106162626A CN 106162626 A CN106162626 A CN 106162626A CN 201510186171 A CN201510186171 A CN 201510186171A CN 106162626 A CN106162626 A CN 106162626A
Authority
CN
China
Prior art keywords
key
group
encryption
signaling
issues
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201510186171.2A
Other languages
Chinese (zh)
Inventor
王淑坤
赵春平
许瑞锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xinwei Telecom Technology Inc
Original Assignee
Beijing Xinwei Telecom Technology Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xinwei Telecom Technology Inc filed Critical Beijing Xinwei Telecom Technology Inc
Priority to CN201510186171.2A priority Critical patent/CN106162626A/en
Publication of CN106162626A publication Critical patent/CN106162626A/en
Withdrawn legal-status Critical Current

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention proposes to eat dishes without rice or wine in a kind of group communication method of controlling security; including: for each group configuring cipher key; for deriving UE side key and the base station side key of described group; described UE side key is UE side for generating the input key of the key of signaling encryption and data encryption and/or signaling integrity protection, and described base station side key is that base station side is for generating the input key of the key of signaling encryption and data encryption and/or signaling integrity protection;In UE cluster registration process, core net issues the UE side key of described UE place group to described UE;In group call establishment process, described core net issues the base station side key of described group to the eNB at each UE place under described group.The present invention can carry out encryption and decryption with the chain of command of group communication and user face and process and signaling integrity protection, makes cluster group communication safe and reliable.

Description

Group communication is eated dishes without rice or wine the methods, devices and systems of security control
Technical field
The present invention relates to trunking communication field, particularly relate to group communication and eat dishes without rice or wine the method for security control, device And system.
Background technology
Trunked communication system, has become in addition to public mobile communication system vital the most Personal communication system.The command scheduling being had due to it and emergent feature are (such as one-touch intercommunication, promptly Calling and many group schedulings etc.), the most including that army, airport, public security, railway and electric power etc. are many Individual important industry is widely used.
Along with the development of Clustering, trunked communication system develops to Digital Clustering from simulation cluster, arrowband collection Group is developed to broadband cluster.Wireless wideband multimedia cluster refers to that, based on broadband wireless communication technique, employing is many Media business form, based on the private wireless communication system of command scheduling function, is called for short broadband cluster.
Along with standardization and the commercialization of LTE, LTE has increasingly becomed broadband connections focus.Utilize It is also inevitable development trend that LTE system does private network broadband cluster.
At present can only be for the closeest based in usim card of connected state user and unicast service in LTE system Key is encrypted decryption processing.And the End to End Encryption mentioned in B-TrunC is also just for business datum It is encrypted, chain of command data is not encrypted.
Summary of the invention
For the problems referred to above, the present invention proposes to eat dishes without rice or wine in a kind of group communication method of controlling security, including:
For each group configuring cipher key, it is used for deriving UE side key and the base station side key of described group, institute Stating UE side key is that UE side is for generating signaling encryption and data encryption and/or signaling integrity protection The input key of key, described base station side key be base station side for generate signaling encryption and data encryption and / or the input key of key of signaling integrity protection;
In UE cluster registration process, core net issues the UE side key of described UE place group to institute State UE;
In group call establishment process, described core net issues the base station side key of described group under described group The eNB at each UE place.
Preferably, also including: in group call establishment process, described core net also issues the Group of described group Id, NAS layer AES and signaling protection algorithm integrallty give described eNB;Described eNB issues AS Layer AES, NAS layer AES and signaling protection algorithm integrallty give the UE of described group;Described After the UE of group receives, derive NAS layer key and AS layer key, and activate NAS layer safe machine System and AS layer security mechanism.Further, described NAS layer security mechanism and AS layer security mechanism are swashed After work, the RRC information that described eNB issues carries out AS encryption and integrity protection, the NAS wherein comprised Message carries out NAS layer encryption and integrity protection;Described UE receives the group of encryption of eating dishes without rice or wine and exhales data.
Preferably, described UE side key be permanent key Group K, intermediate key Group KASMEOr Intermediate key Group CK/Group IK, described base station side key is Group KeNB.Further, when When described UE side key is permanent key Group K, described core net also issues for generating signaling encryption And the random parameter RAND of the key of data encryption and/or signaling integrity protection and authentication token AUTN.When described UE side key is intermediate key Group CK/Group IK, described core net is also Issue for generating signaling encryption and the authentication token of key of data encryption and/or signaling integrity protection AUTN;Further, described core net also issues random parameter RAND, for UE side to core net Carry out legitimacy certification.
Based on identical design, the present invention also proposes a kind of core-network side device for said method, including: Configuration module, for for each group configuring cipher key, described key is close for the UE side deriving described group Key and base station side key;Issue module, in UE cluster registration process, issue described UE place The UE side key of group gives described UE;In group call establishment process, the base station side issuing described group is close Key, Group Id, NAS layer AES of described group and signaling protection algorithm integrallty give described group Under the eNB at each UE place.
Further, when described UE side key is permanent key Group K, described in issue module also under Hair is in the random parameter RAND of the key generating signaling encryption, data encryption and/or signaling integrity protection With authentication token AUTN.When described UE side key is intermediate key Group CK/Group IK, institute State and issue module and also issue for generating the close of signaling encryption and data encryption and/or signaling integrity protection The authentication token AUTN of key.
Based on identical design, the present invention also proposes a kind of eNB device for said method, including: Receiver module, for receiving the base station side key of the described group that core-network side issues in group call establishment process Group Id, NAS layer AES and signaling protection algorithm integrallty with described group;Issue module, Protect for issuing AS layer AES, NAS layer AES and signaling integrity in group call establishment process Protect the algorithm UE to described group;Secure processing module, for exhaling NAS layer security mechanism and AS in group After layer security mechanism is activated, the RRC information issued is carried out AS encryption and integrity protection, to it In the NAS message that comprises carry out NAS layer encryption and integrity protection.
Based on identical design, the present invention also proposes a kind of UE device for said method, including: connect Receive module, for receiving the UE side key of its place group that network side issues in cluster registration process; AS layer AES, NAS layer AES and the signaling that network side issues is received in group call establishment process Protection algorithm integrallty;Safety management module, is used for deriving NAS layer key and AS layer key, activates NAS layer security mechanism and AS layer security mechanism;Deciphering module, in described NAS layer security mechanism After being activated with AS layer security mechanism, data are exhaled to be decrypted process the group of the encryption of eating dishes without rice or wine received.
Finally, the present invention proposes a kind of system for said method, fills including core-network side as above Put, eNB device and UE device.
The present invention has all carried out encrypting and decrypting process to chain of command and the user face of group communication, makes group communication Safe and reliable.
Accompanying drawing explanation
Accompanying drawing in describing below is some embodiments of the present invention, comes for those of ordinary skill in the art Say, on the premise of not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is that the group communication of the embodiment of the present invention 1 is eated dishes without rice or wine security control signaling process figure;
Fig. 2 is that the group communication of the embodiment of the present invention 2 is eated dishes without rice or wine security control signaling process figure;
Fig. 3 is that the group communication of the embodiment of the present invention 3 is eated dishes without rice or wine security control signaling process figure;
Fig. 4 is the core-network side apparatus function structural representation that the present invention proposes;
Fig. 5 is the eNB apparatus function structural representation that the present invention proposes;
Fig. 6 is the UE apparatus function structural representation that the present invention proposes.
Detailed description of the invention
For making the purpose of the embodiment of the present invention, technical scheme and advantage clearer, below in conjunction with the present invention Accompanying drawing in embodiment, is clearly and completely described the technical scheme in the embodiment of the present invention, it is clear that Described embodiment is a part of embodiment of the present invention rather than whole embodiments;It should be noted that In the case of not conflicting, the embodiment in the application and the feature in embodiment can be mutually combined.Based on Embodiment in the present invention, those of ordinary skill in the art are obtained under not making creative work premise Every other embodiment, broadly fall into the scope of protection of the invention.
The present invention proposes method of controlling security of eating dishes without rice or wine in a kind of group communication, including:
For each group configuring cipher key, it is used for deriving UE side key and the base station side key of described group;Institute Stating UE side key is that UE side is for generating signaling encryption and data encryption and/or signaling integrity protection The input key of key, described base station side key be base station side for generate signaling encryption, data encryption and/ Or the input key of the key of signaling integrity protection;
In UE cluster registration process, described core net issues the UE side key of described UE place group To described UE;
In group call establishment process, described core net issues the base station side key of described group under described group The eNB at each UE place.
Further, in group call establishment process, described core net also issue described group Group Id, NAS layer AES and signaling protection algorithm integrallty give described eNB;Described eNB issues AS layer and adds Close algorithm, NAS layer AES and signaling protection algorithm integrallty give the UE of described group;Described group UE receive after, derive NAS layer key and AS layer key, and activate NAS layer security mechanism and AS layer security mechanism.
After described NAS layer security mechanism and AS layer security mechanism are activated, the RRC that described eNB issues Message carries out AS encryption and integrity protection, and the NAS message wherein comprised carries out the encryption of NAS layer with complete Whole property is protected;Described UE receives the group of encryption of eating dishes without rice or wine and exhales data.
Wherein, UE side key can be permanent key Group K or intermediate key Group KASME, Can also be intermediate key Group CK/Group IK;Base station side key is Group KeNB
Below, as a example by B-TrunC system, the method proposing the present invention is described in detail.
Embodiment 1:UE side key is cluster multi call process during permanent key Group K.
As the permanent key Group K that UE side key is this group of group, described core net also issues For generate the key of signaling encryption, data encryption and/or signaling integrity protection random parameter RAND and Authentication token AUTN.The eat dishes without rice or wine signaling process of security control of the group communication of this situation refer to accompanying drawing 1, Detailed process is as follows:
UE attachment network also enters RRC connection status;
UE initiates cluster registration process;Core-network side (such as MME) accepts message in cluster registration The UE side carrying group Group Id and correspondence thereof inside TRUNKING REGISTER ACCEPT is close Key (permanent key Group K).
After the registration of UE cluster, idle state can be entered without business.
When certain UE initiation group service in group:
Core-network side initiates group call establishment process to eNB, and in this process, notice this group of eNB is exhaled Group ID, base station side key Group KeNB, NAS layer AES and protection algorithm integrallty, and Random parameter RAND and token AUTN.
ENB carry out group exhale set up time, in clustering paging message, notify that the UE of this group is about AS layer AES, NAS layer AES and protection algorithm integrallty, and random parameter RAND and token AUTN。
Each UE is according to receiving permanent key Group K, RAND, AUTN and AES, complete The information such as property protection algorism derive for data and the encryption key of signaling and close for signaling integrity protection Key.
So far, AS layer safety and the NAS layer of group communication is activated safely.The RRC that follow-up eNB issues Message carries out the encryption of AS layer and signaling integrity protection, and the NAS information wherein comprised carries out NAS layer and adds Close and signaling integrity protection.
In this example, eNB issues and comprises NAS message GROUP CALL SETUP INDICATION RRC information Groupcallconfig, this RRC information carried out AS encryption and integrity protection, bag The NAS information contained has carried out the encryption of NAS layer and integrity protection.
The group that UE reception eNB has carried out eating dishes without rice or wine to encrypt exhales data, uses derivative corresponding secret key to carry out message Deciphering.
Embodiment 2:UE side key is cluster multi call process during intermediate key Group CK/Group IK.
When described UE side key is intermediate key Group CK/Group IK, cluster multi call process and reality Execute example 1 essentially identical.Being with the difference of embodiment 1, UE side derives signaling encryption and data add Close key and signaling tegrity protection key are no longer necessary to random parameter RAND, so at group call establishment process In, core net can not send random parameter RAND.Random parameter RAND, UE side can certainly be issued Can use this random number that core net is carried out legitimacy certification.The group communication of this situation is eated dishes without rice or wine security control Signaling process refer to accompanying drawing 2.
Embodiment 3:UE side key is intermediate key Group KASMETime cluster multi call process.
When described UE side, key is intermediate key Group KASMETime, cluster multi call process and embodiment 1 Essentially identical with 2, refer to accompanying drawing 3.Difference is, UE side derives signaling encryption and data add Random parameter RAND and authentication token AUTN it is no longer necessary to when close key and signaling tegrity protection key, So in group call establishment process, core net no longer issues AUTN and RAND.
By above-described embodiment it can be seen that the method that the present invention proposes can be to the user face number of cluster multi call It is encrypted and signaling integrity protection according to control panel signaling, it is ensured that the safety of group communication.
Based on identical design, the present invention also proposes a kind of core-network side device for said method, eNB Device and UE device.
Core-network side device as shown in Figure 4, including configuration module, for for each group configuring cipher key, Described key is for deriving UE side key and the base station side key of described group;Issue module, be used for In UE cluster registration process, issue the UE side key of described UE place group to described UE;Exhale in group During foundation, issue the base station side key of described group, described group ID, NAS layer AES and Signaling protection algorithm integrallty gives the eNB at each UE place under described group.
Further, when described UE side key is permanent key Group K, described in issue module also under Hair is in the random parameter RAND of the key generating signaling encryption, data encryption and/or signaling integrity protection With authentication token AUTN.
Further, when described UE side key is intermediate key Group CK/Group IK, described under Send out module and also issue recognizing of key for generating signaling encryption, data encryption and/or signaling integrity protection Card token AUTN.Further, also issue random parameter RAND, for UE side, core net is carried out Legitimacy certification.
ENB device is as it is shown in figure 5, include: receiver module, for receiving core in group call establishment process The net base station side key of described group that issues of side and Group Id, NAS layer AES of described group and Signaling protection algorithm integrallty;Issue module, for issue in group call establishment process AS layer AES, NAS layer AES and signaling protection algorithm integrallty give the UE of described group;Secure processing module, uses In after group exhales NAS layer security mechanism and AS layer security mechanism is activated, the RRC information issued is entered Row AS encryption and integrity protection, carry out NAS layer encryption and integrity to the NAS message wherein comprised Protection.
UE device as shown in Figure 6, including:
Receiver module, for receiving the UE side of its place group that network side issues in cluster registration process Key;AS layer AES, NAS layer AES that network side issues is received in group call establishment process With signaling protection algorithm integrallty;
Safety management module, is used for deriving NAS layer key and AS layer key, activates NAS layer safe machine System and AS layer security mechanism;
Deciphering module, for after described NAS layer security mechanism and AS layer security mechanism are activated, right The group of the encryption of eating dishes without rice or wine received exhales data to be decrypted process.
Finally, the present invention also proposes a kind of system for said method, including: core net as above Core-network side device, eNB device and UE device.
One of ordinary skill in the art will appreciate that: all or part of step realizing said method embodiment can Completing with the hardware relevant by programmed instruction, aforesaid program can be stored in an embodied on computer readable and deposit In storage media, this program upon execution, performs to include the step of said method embodiment;And aforesaid storage Medium includes: the various media that can store program code such as ROM, RAM, magnetic disc or CD.
Last it is noted that above example is only in order to illustrate technical scheme, rather than it is limited System;Although the present invention being described in detail with reference to previous embodiment, those of ordinary skill in the art It is understood that the technical scheme described in foregoing embodiments still can be modified by it, or to it Middle part technical characteristic carries out equivalent;And these amendments or replacement, do not make appropriate technical solution Essence departs from the spirit and scope of various embodiments of the present invention technical scheme.

Claims (16)

1. a group communication is eated dishes without rice or wine method of controlling security, it is characterised in that including:
For each group configuring cipher key, it is used for deriving UE side key and the base station side key of described group;Institute Stating UE side key is that UE side is for generating the close of signaling encryption, data encryption and/or signaling integrity protection The input key of key, described base station side key be base station side for generate signaling encryption, data encryption and/or The input key of the key of signaling integrity protection;
In UE cluster registration process, described core net issues the UE side key of described UE place group To described UE;
In group call establishment process, described core net issues the base station side key of described group under described group The eNB at each UE place.
Method the most according to claim 1, it is characterised in that also include:
In group call establishment process, described core net also issues Group Id, NAS layer encryption of described group Algorithm and signaling protection algorithm integrallty give described eNB;Described eNB issues AS layer AES and signaling Protection algorithm integrallty, NAS layer AES and signaling protection algorithm integrallty give the UE of described group;
After the UE of described group receives, derive NAS layer key and AS layer key, and activate NAS Layer security mechanism and AS layer security mechanism.
Method the most according to claim 2, it is characterised in that also include: described NAS layer safety Mechanism and after AS layer security mechanism be activated, the RRC information that described eNB issues carry out AS encryption and Integrity protection, the NAS message wherein comprised carries out NAS layer encryption and integrity protection;Described UE The group receiving encryption of eating dishes without rice or wine exhales data.
4. according to the method described in claims 1 to 3 any one, it is characterised in that
Described UE side key is permanent key Group K, intermediate key Group KASMEOr intermediate key Group CK/Group IK;
Described base station side key is Group KeNB
Method the most according to claim 4, it is characterised in that also include:
When described UE side key is permanent key Group K, described core net also issues for generating letter The random parameter RAND of the key of order encryption, data encryption and/or signaling integrity protection and authentication token AUTN。
Method the most according to claim 4, it is characterised in that also include:
When described UE side key is intermediate key Group CK/Group IK, described core net also issues For generating the authentication token AUTN of the key of signaling encryption, data encryption and/or signaling integrity protection.
Method the most according to claim 6, it is characterised in that also include: described core net also under Send out random parameter RAND, for UE side, core net is carried out legitimacy certification.
8. according to the method described in claim 1~7 any one, it is characterised in that
In described cluster registration process, described core net passes through TRUNKING REGISTER ACCEPT message issues described in carrying out;
In described group call establishment process, described eNB carries out institute by TRUNKING PAGING message State and issue.
Method the most according to claim 8, it is characterised in that also include: described NAS layer safety After being activated safely with AS layer, described eNB issues and comprises NAS message GROUP CALL SETUP RRC information GROUPCALLCONFIG of INDICATION gives described UE, described RRC information Carried out AS encryption and integrity protection, described in the NAS message that comprises carried out NAS layer encryption and complete Whole property is protected.
10. the core-network side device for method as claimed in claim 1, it is characterised in that including:
Configuration module, for for each group configuring cipher key, described key is for deriving the UE of described group Side key and base station side key;
Issue module, in UE cluster registration process, issue the UE side of described UE place group Key gives described UE;In group call establishment process, issue the base station side key of described group, described group ID, NAS layer AES and signaling protection algorithm integrallty give the eNB at each UE place under described group.
11. core-network side devices according to claim 10, it is characterised in that when described UE side When key is permanent key K, described in issue module also issue for generate signaling encryption, data encryption and/ Or the random parameter RAND of the key of signaling integrity protection and authentication token AUTN.
12. core-network side devices according to claim 10, it is characterised in that when described UE side When key is intermediate key CK/IK, described in issue module also issue for generate signaling encryption, data encryption And/or the authentication token AUTN of the key of signaling integrity protection.
13. core-network side devices according to claim 12, it is characterised in that described in issue module Also issue random parameter RAND, for UE side, core net is carried out legitimacy certification.
14. 1 kinds of eNB devices for method the most according to claim 1, it is characterised in that bag Include:
Receiver module, for receiving the base station side of the described group that core-network side issues in group call establishment process Key and described group ID, NAS layer AES and signaling protection algorithm integrallty;
Issue module, for issuing AS layer AES and signaling integrity protection in group call establishment process Algorithm, NAS layer AES and signaling protection algorithm integrallty give the UE of described group;
Secure processing module, is used for after group exhales NAS layer security mechanism and AS layer security mechanism is activated, The RRC information issued is carried out AS encryption and integrity protection, the NAS message wherein comprised is carried out The encryption of NAS layer and integrity protection.
15. 1 kinds of UE devices for method as claimed in claim 1, it is characterised in that including:
Receiver module, for receiving the UE side of its place group that network side issues in cluster registration process Key;AS layer AES, NAS layer AES that network side issues is received in group call establishment process With signaling protection algorithm integrallty;
Safety management module, is used for deriving NAS layer key and AS layer key, activates NAS layer safe machine System and AS layer security mechanism;
Deciphering module, for after described NAS layer security mechanism and AS layer security mechanism are activated, right The group of the encryption of eating dishes without rice or wine received exhales data to be decrypted process.
16. 1 kinds for realizing the system of method as claimed in claim 1, it is characterised in that including: as Core-network side device described in claim 10~13 any one, eNB as claimed in claim 14 fill Put and UE device as claimed in claim 15.
CN201510186171.2A 2015-04-20 2015-04-20 Group communication is eated dishes without rice or wine the methods, devices and systems of security control Withdrawn CN106162626A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510186171.2A CN106162626A (en) 2015-04-20 2015-04-20 Group communication is eated dishes without rice or wine the methods, devices and systems of security control

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510186171.2A CN106162626A (en) 2015-04-20 2015-04-20 Group communication is eated dishes without rice or wine the methods, devices and systems of security control

Publications (1)

Publication Number Publication Date
CN106162626A true CN106162626A (en) 2016-11-23

Family

ID=58058128

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510186171.2A Withdrawn CN106162626A (en) 2015-04-20 2015-04-20 Group communication is eated dishes without rice or wine the methods, devices and systems of security control

Country Status (1)

Country Link
CN (1) CN106162626A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108124238A (en) * 2016-11-28 2018-06-05 大唐移动通信设备有限公司 The signal processing method and device of a kind of cluster group
CN109729522A (en) * 2017-10-27 2019-05-07 普天信息技术有限公司 Eat dishes without rice or wine encryption method and device under fail soft mode
WO2019090515A1 (en) * 2017-11-08 2019-05-16 Oppo广东移动通信有限公司 Integrity protection control method, network device and computer storage medium
WO2020063540A1 (en) * 2018-09-28 2020-04-02 华为技术有限公司 Method for secure communication, and method and apparatus for determining encryption information
CN112564894A (en) * 2020-11-11 2021-03-26 杭州浙程科技有限公司 Method for unlocking passive lock by intelligent key dynamic secret key
CN112954610A (en) * 2019-11-22 2021-06-11 成都鼎桥通信技术有限公司 Group signaling transmission method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102291680A (en) * 2010-06-18 2011-12-21 普天信息技术研究院有限公司 Encrypted group calling method based on long term evolution (TD-LTE) trunking communication system
CN103596136A (en) * 2012-08-15 2014-02-19 北京信威通信技术股份有限公司 Cluster group call end-to-end encryption method under single base station mode
CN103609147A (en) * 2012-10-25 2014-02-26 华为技术有限公司 Cluster communication system, cluster server, access network and cluster communication method
CN104010276A (en) * 2013-02-27 2014-08-27 中兴通讯股份有限公司 Group key hierarchical management method and system for broadband cluster system, and terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102291680A (en) * 2010-06-18 2011-12-21 普天信息技术研究院有限公司 Encrypted group calling method based on long term evolution (TD-LTE) trunking communication system
CN103596136A (en) * 2012-08-15 2014-02-19 北京信威通信技术股份有限公司 Cluster group call end-to-end encryption method under single base station mode
CN103609147A (en) * 2012-10-25 2014-02-26 华为技术有限公司 Cluster communication system, cluster server, access network and cluster communication method
CN104010276A (en) * 2013-02-27 2014-08-27 中兴通讯股份有限公司 Group key hierarchical management method and system for broadband cluster system, and terminal

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108124238A (en) * 2016-11-28 2018-06-05 大唐移动通信设备有限公司 The signal processing method and device of a kind of cluster group
CN108124238B (en) * 2016-11-28 2020-07-10 大唐移动通信设备有限公司 Method and device for processing signaling of cluster group
CN109729522A (en) * 2017-10-27 2019-05-07 普天信息技术有限公司 Eat dishes without rice or wine encryption method and device under fail soft mode
WO2019090515A1 (en) * 2017-11-08 2019-05-16 Oppo广东移动通信有限公司 Integrity protection control method, network device and computer storage medium
US11277745B2 (en) 2017-11-08 2022-03-15 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Integrity protection control method, network device and computer storage medium
TWI775979B (en) * 2017-11-08 2022-09-01 大陸商Oppo廣東移動通信有限公司 Integrity protection control method and network device
WO2020063540A1 (en) * 2018-09-28 2020-04-02 华为技术有限公司 Method for secure communication, and method and apparatus for determining encryption information
CN110972135A (en) * 2018-09-28 2020-04-07 华为技术有限公司 Secure communication method, encrypted information determination method and device
CN112954610A (en) * 2019-11-22 2021-06-11 成都鼎桥通信技术有限公司 Group signaling transmission method and device
CN112954610B (en) * 2019-11-22 2022-07-26 成都鼎桥通信技术有限公司 Group signaling transmission method and device
CN112564894A (en) * 2020-11-11 2021-03-26 杭州浙程科技有限公司 Method for unlocking passive lock by intelligent key dynamic secret key

Similar Documents

Publication Publication Date Title
CN107079023B (en) User plane security for next generation cellular networks
CN106162626A (en) Group communication is eated dishes without rice or wine the methods, devices and systems of security control
CN108353275B (en) Security for proxied devices
CN103179558B (en) Group system group exhales encryption implementation method and system
EP3605942B1 (en) Key agreement for wireless communication
CN101640886B (en) Authentication method, re-authentication method and communication device
CN102090093B (en) Method and device for establishing security mechanism of air interface link
WO2017114123A1 (en) Key configuration method and key management center, and network element
CN101917272B (en) Secret communication method and system among neighboring user terminals
EP3002965B1 (en) Efficient terminal authentication in telecommunication networks
CN101945386B (en) A kind of method and system realizing safe key synchronous binding
KR102173534B1 (en) Methods for providing information of mobile network operator and apparatus for performing the same
CN107018676A (en) Being mutually authenticated between user equipment and evolution block core
CN101720539A (en) Key refresh sae/lte system
CN109417706A (en) Method and apparatus for storing contextual information in a mobile device
JP2018504033A5 (en)
CN104113839A (en) Mobile data safety protection system and method based on SDN
EP2656648A1 (en) Operator-assisted key establishment
CN104065485A (en) Power grid dispatching mobile platform safety guaranteeing and controlling method
EP3713147B1 (en) Railway signal security encryption method and system
CN104468126A (en) Safety communication system and method
CN101895881A (en) Method for realizing GBA secret key and pluggable equipment of terminal
CN105553669A (en) Identity authentication based information encryption transmission apparatus, method, and control method
EP3664486A1 (en) Method and apparatuses for ensuring secure attachment in size constrained authentication protocols
CN103813272A (en) Cluster group calling downlink transmission method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20161123