CN113543118B - Negotiation generation method of dynamic group TSM security algorithm - Google Patents
Negotiation generation method of dynamic group TSM security algorithm Download PDFInfo
- Publication number
- CN113543118B CN113543118B CN202010242524.7A CN202010242524A CN113543118B CN 113543118 B CN113543118 B CN 113543118B CN 202010242524 A CN202010242524 A CN 202010242524A CN 113543118 B CN113543118 B CN 113543118B
- Authority
- CN
- China
- Prior art keywords
- group
- gtcf
- group member
- htcf
- dynamic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/06—Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
- H04W4/08—User group management
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Abstract
The application discloses a negotiation generation method of a dynamic group TSM security algorithm, which is applied to a B-trunk C system and is characterized by comprising the following steps: when a group is created, a group cluster control function (GTCF) triggers a home cluster control function (HTCF) of each group member to report the group calling security capability of each group member to the GTCF; and the GTCF generates a TSM security algorithm according to the group calling security capability negotiation of all the current online group members and issues the TSM security algorithm to each group member. By applying the technical scheme disclosed by the application, the cluster service time delay can be shortened, and the system resources can be saved.
Description
Technical Field
The present disclosure relates to the field of trunking communication technologies, and in particular, to a method for generating negotiations for a dynamic group TSM security algorithm.
Background
Currently, a broadband trunking communication (B-trunk) system only provides that a dynamic group TSM security algorithm (TSM Security Algorithm) is generated by a group trunking control function (abbreviated as G-TCF or GTCF), and in a group updating flow after group generation, after a terminal reports its group calling security capability through a registration process, the GTCF can decide whether to update the TSM security algorithm according to the group calling security capability of an online terminal in the group.
From the current standard, in the dynamic group scenario, the flow of reporting the security capability of the terminal to the GTCF lags behind the group generation flow, namely: when a dispatching Desk (DC) starts a state group generation request to a GTCF through a home cluster control function (HTCF) (DC), and a group member crosses the TCF, the GTCF does not know the group encryption capability of all members in the dynamic group, at the moment, the GTCF cannot accurately determine the TSM security algorithm of the dynamic group, and only after the group information updating of each terminal is finished, the terminal can re-register and report the group calling security capability of the terminal, then the accurate TSM security algorithm can be re-given, and the TSM security algorithm is issued to each terminal through the group information updating flow.
When there are many group members in the dynamic group, this may result in a significant increase in the delay of the group service, and the real-time performance of the group service is one of the key indicators. Meanwhile, the correct TSM security algorithm can also cause the group calling service which occurs before the group member is successfully issued to the group member to be unavailable. In addition, the group information updating process is executed twice for each terminal, so that the signaling interaction of the whole air interface is increased, and the resource waste exists.
Disclosure of Invention
The application provides a negotiation generation method of a dynamic group TSM security algorithm, which is used for shortening the time delay of a cluster service and saving system resources.
The application discloses a negotiation generation method of a dynamic group TSM security algorithm, which is applied to a B-trunk C system and comprises the following steps:
when a group is created, a group cluster control function body GTCF triggers a home cluster control function body HTCF of each group member to report the group calling security capability of each group member to the GTCF;
and the GTCF generates a TSM security algorithm according to the group calling security capability negotiation of all the current online group members and issues the TSM security algorithm to each group member.
Preferably, before the GTCF triggers the HTCF of each group member to report the group call security capability of each group member to the GTCF, the method includes:
after receiving a dynamic reorganization creation request sent by a dispatching desk, the GTCF acquires a group member list from the request;
the GTCF determines non-local group members from the list of group members.
Preferably, the triggering, by the GTCF, the HTCF of each group member to report the group call security capability of each group member to the GTCF includes:
the GTCF respectively sends registration requests to each HTCF where non-local group members are located, wherein the registration requests respectively carry lists of all the group members under each HTCF;
and each HTCF receiving the registration request initiates a registration process to the GTCF respectively, and sends the group calling security capability of the corresponding group member to the GTCF according to the list of the group member carried in the registration request.
Preferably, the generating, by the GTCF, the TSM security algorithm according to the group call security capability negotiation of all the current online group members includes:
and the GTCF negotiates the TSM security algorithm used by the dynamic group in an intersection mode according to the group calling security capability of all the current online group members.
Preferably, the method further comprises:
when receiving a modification request of dynamic group generation or group member change, the GTCF negotiates an encryption algorithm supported by all group members as the encryption algorithm of the group by adopting an intersection mode according to the saved group calling security capability of the current group member.
The application also discloses a negotiation generating system of the dynamic group TSM security algorithm, which is applied to the B-trunk C system and at least comprises: GTCF and HTCF for each group member, wherein:
the GTCF is used for triggering the HTCF of each group member to report the group calling security capability of each group member to the GTCF when the group is created;
the GTCF is also used for generating a TSM security algorithm according to the group calling security capability negotiation of all the current online group members and issuing the TSM security algorithm to each group member.
Preferably, the system further comprises a dispatch station, wherein:
the dispatching desk is used for sending a dynamic reorganization creating request to the GTCF;
and the GTCF is used for acquiring a group member list from the request after receiving a dynamic reorganization creation request sent by the dispatching desk, and determining non-local group members according to the group member list.
Preferably, the GTCF is configured to send a registration request to each HTCF where a non-local group member is located, where the registration request carries a list of all group members under each HTCF;
and each HTCF receiving the registration request is respectively used for initiating a registration process to the GTCF, and sending the group calling security capability of the corresponding group member to the GTCF according to the list of the group member carried in the registration request received respectively.
Preferably, the GTCF is configured to negotiate a TSM security algorithm used by the dynamic group by adopting an intersection manner according to the group calling security capabilities of all current online group members.
Preferably, when receiving a modification request of dynamic group generation or group member change, the GTCF is further configured to negotiate an encryption algorithm supported by all group members as an encryption algorithm of the group by adopting an intersection mode according to the saved group call security capability of the current group member.
As can be seen from the above technical solutions, the method and system for generating dynamic negotiation of a dynamic group TSM security algorithm in a B-trunk system according to the present application trigger each HTCF by a GTCF to report the group call security capability of all group members stored locally to the GTCF when a group is created; then, the GTCF negotiates according to the group calling security capability of all the current online group members to generate a TSM security algorithm and issues the TSM security algorithm to each group member, so that the GTCF can obtain the group calling security capability of all the group members to the HTCF of the group member in time when creating the group, and the GTCF does not need to passively wait until the group information of each subsequent terminal is updated, and the TSM security algorithm is generated by using a simplified process in a shorter time through the improvement on the process. The technical scheme is used in the B-trunk system protocol, so that the negotiation flow of the dynamic group downlink encryption algorithm under the cross TCF scene can be optimized, the cluster time delay is shortened, and the system resources are saved.
Drawings
FIG. 1 is a schematic diagram of a negotiation generation method of a dynamic group TSM security algorithm applied to a B-trunk system;
fig. 2 is a flow chart of a dynamic group TSM security algorithm generated by negotiation at the time of group creation according to a preferred embodiment of the present application.
Detailed Description
For the purposes of making the objects, technical solutions and advantages of the present application more apparent, the present application will be described in further detail below with reference to the accompanying drawings and examples.
In order to solve the problems existing in the prior art, the application provides a dynamic negotiation generation scheme of a dynamic group TSM security algorithm in a B-trunk system, and the main idea is that: when a group is created, the GTCF triggers each HTCF to report the group calling security capability of all the group members stored locally to the GTCF; then, the GTCF negotiates according to the group calling security capability of all the current online group members to generate a TSM security algorithm, and issues the TSM security algorithm to each group member. Therefore, the TSM security algorithm is generated by adopting a dynamic negotiation mode of group members in a shorter time and using a simplified flow, and in the B-trunk C system protocol, the negotiation flow of the dynamic group downlink encryption algorithm under a cross TCF scene is optimized, the cluster time delay is shortened, and the system resource is saved.
Fig. 1 is a schematic diagram of a negotiation generation method of a dynamic group TSM security algorithm applied to a B-trunk system, where the method includes:
step 101: when a group is created, the GTCF triggers the HTCF of each group member to report the group calling security capability of each group member to the GTCF;
step 102: and the GTCF generates a TSM security algorithm according to the group calling security capability negotiation of all the current online group members and issues the TSM security algorithm to each group member.
Before the GTCF triggers the HTCF of each group member to report the group call security capability of each group member to the GTCF, the method further includes: the GTCF receives a dynamic reorganization creating request sent by the dispatching desk, acquires a group member list from the dynamic reorganization creating request, and determines non-local group members according to the group member list. Then, aiming at the non-local group members, the GTCF respectively sends registration requests to each HTCF where the non-local group members are located, wherein the registration requests respectively carry lists of all the group members under each HTCF; each HTCF receiving the registration request initiates a registration process to the GTCF respectively, and sends the group calling security capability of the corresponding group member to the GTCF according to the list of the group member carried in the registration request received respectively.
After the GTCF obtains the group calling security capability of all the current online group members, negotiating a TSM security algorithm used by the dynamic group in an intersection mode according to the group calling security capability of all the current online group members, and issuing the TSM security algorithm to each group member.
When receiving a modification request of dynamic group generation or group member change, the GTCF negotiates an encryption algorithm supported by all group members as the encryption algorithm of the group by adopting an intersection mode according to the saved group calling security capability of the current group member.
Corresponding to the method, the application also provides a negotiation generating system of the dynamic group TSM security algorithm, which is applied to the B-trunk C system and at least comprises: GTCF and HTCF for each group member, wherein:
the GTCF is used for triggering the HTCF of each group member to report the group calling security capability of each group member to the GTCF when the group is created;
the GTCF is also used for generating a TSM security algorithm according to the group calling security capability negotiation of all the current online group members and issuing the TSM security algorithm to each group member.
Preferably, the system further comprises a dispatch station, wherein:
the dispatching desk is used for sending a dynamic reorganization creating request to the GTCF;
and the GTCF is used for acquiring a group member list from the request after receiving a dynamic reorganization creation request sent by the dispatching desk, and determining non-local group members according to the group member list.
Preferably, the GTCF is configured to send a registration request to each HTCF where a non-local group member is located, where the registration request carries a list of all group members under each HTCF;
and each HTCF receiving the registration request is respectively used for initiating a registration process to the GTCF, and sending the group calling security capability of the corresponding group member to the GTCF according to the list of the group member carried in the registration request received respectively.
Preferably, the GTCF is configured to negotiate a TSM security algorithm used by the dynamic group by adopting an intersection manner according to the group calling security capabilities of all current online group members.
Preferably, when receiving a modification request of dynamic group generation or group member change, the GTCF is further configured to negotiate an encryption algorithm supported by all group members as an encryption algorithm of the group by adopting an intersection mode according to the saved group call security capability of the current group member.
Fig. 2 is a flowchart of a dynamic group TSM security algorithm generated by negotiation at the time of group creation according to a preferred embodiment of the present application, the flowchart includes the following steps:
step 1: the Dispatcher (DC) sends a dynamic reorganization creation request (MESSAGE as shown) to the GTCF of the group through the HTCF (DC) on the DC side), which carries the group member list information of the group.
Step 2: after receiving the dynamic reorganization creating request, the GTCF checks the group member list of the group, confirms whether all HTCFs of the group members are local, and for non-local group members, proceeds to step 3.
Step 3: the GTCF sends registration requests to HTCF where non-local group members are located, respectively.
Here, a new TC2 MESSAGE (GTCF requires the HTCF where the non-native group member is located to register, and the MESSAGE carries a list of all group members under the HTCF).
The HTCF herein may also be referred to as a terminal HTCF, labeled HTCF (UE) in the figure, as distinguished from the HTCF (DC) on the DC side. In this step, the MESSAGE sent by the GTCF to each terminal HTCF needs to carry a UDN (user dialing number: user Dialing Number) list of all group members that require the corresponding HTCF to register this time, and may also carry a group name, GDN (group dialing number: group Dialing Number) information, and so on.
Step 4: after each HTCF receives the registration request of the GTCF, it returns a 200OK message to the GTCF to inform that the registration request has been received.
Step 5: each HTCF initiates a registration procedure with the GTCF using a MESSAGE (terminal HTCF registers with the GTCF). Here, the existing MESSAGE needs to be modified (the terminal HTCF registers with the GTCF), the registration MESSAGE of only one UE in the protocol is modified to be able to carry registration MESSAGEs of multiple UEs, the UDN information of the UE needs to be the same as the UDN information in the registration request in step 3, and the registration MESSAGE of each UE carries the group call security capability of the UE.
Step 6: after receiving the MESSAGE (the terminal HTCF registers with the GTCF), the GTCF returns a 200OK MESSAGE to the corresponding HTCF.
Step 7: after the GTCF receives MESSAGE returned by the HTCF where all the group members are located (the terminal HTCF registers with the GTCF), the group calling security capability of all the group members of the dynamic group is obtained, and TSM security algorithm used by the dynamic group finally can be negotiated by adopting modes of intersection taking and the like.
And when receiving a modification request of dynamic group generation or group member change, the GTCF can acquire an intersection set according to the group calling security capability of the current group member stored by the GTCF, so that the encryption algorithm supported by all the group members is acquired as the encryption algorithm of the group, and if a plurality of encryption algorithms meet the requirement, one encryption algorithm can be selected by self.
Step 8: the GTCF sends a GroupInfo-Config-Request message to the eHSS, and fills in corresponding information according to the B-Trunc standard requirement, wherein the TSM security algorithm is the TSM security algorithm negotiated in the step 7.
Step 9: after receiving the GroupInfo-Config-Request message, the hss performs a correlation check, and after the correlation check passes, generates information such as gkasce and GKVer for the group.
Step 10: the eHSS carries information such as encryption algorithm, gkasme, GKVER and the like in GroupInfo-Config-Answer according to a standard protocol and returns the information to the GTCF.
The other subsequent procedures are the same as the standard B-trunk procedure and will not be described here again.
The foregoing description of the preferred embodiments of the present invention is not intended to limit the invention to the precise form disclosed, and any modifications, equivalents, improvements and alternatives falling within the spirit and principles of the present invention are intended to be included within the scope of the present invention.
Claims (6)
1. The negotiation generation method of the dynamic group TSM security algorithm is applied to a B-TruC system and is characterized by comprising the following steps:
when a group is created, a group cluster control function body GTCF triggers a home cluster control function body HTCF of each group member to report the group calling security capability of each group member to the GTCF;
the GTCF generates a TSM security algorithm according to the group calling security capability negotiation of all the current online group members and issues the TSM security algorithm to each group member;
before the GTCF triggers the HTCF of each group member to report the group call security capability of each group member to the GTCF, the method includes:
after receiving a dynamic reorganization creation request sent by a dispatching desk, the GTCF acquires a group member list from the request;
the GTCF determines non-local group members according to the group member list;
triggering the HTCF of each group member by the GTCF to report the group call security capability of each group member to the GTCF includes:
the GTCF respectively sends registration requests to each HTCF where non-local group members are located, wherein the registration requests respectively carry lists of all the group members under each HTCF;
and each HTCF receiving the registration request initiates a registration process to the GTCF respectively, and sends the group calling security capability of the corresponding group member to the GTCF according to the list of the group member carried in the registration request.
2. The method of claim 1 wherein the GTCF generating a TSM security algorithm based on group call security capability negotiations for all current online group members comprises:
and the GTCF negotiates the TSM security algorithm used by the dynamic group in an intersection mode according to the group calling security capability of all the current online group members.
3. The method according to claim 2, characterized in that the method further comprises:
when receiving a modification request of dynamic group generation or group member change, the GTCF negotiates an encryption algorithm supported by all group members as the encryption algorithm of the group by adopting an intersection mode according to the saved group calling security capability of the current group member.
4. A negotiation generation system of a dynamic group TSM security algorithm, applied to a B-trunk c system, comprising at least: GTCF and HTCF for each group member, wherein:
the GTCF is used for triggering the HTCF of each group member to report the group calling security capability of each group member to the GTCF when the group is created;
the GTCF is also used for generating a TSM security algorithm according to the group calling security capability negotiation of all the current online group members and issuing the TSM security algorithm to each group member;
the system further comprises a dispatch station, wherein:
the dispatching desk is used for sending a dynamic reorganization creating request to the GTCF;
the GTCF is used for acquiring a group member list from the request after receiving a dynamic reorganization creation request sent by a dispatching desk, and determining non-local group members according to the group member list;
the GTCF is used for respectively sending registration requests to each HTCF where the non-local group member is located, wherein the registration requests respectively carry lists of all the group members under each HTCF;
and each HTCF receiving the registration request is respectively used for initiating a registration process to the GTCF, and sending the group calling security capability of the corresponding group member to the GTCF according to the list of the group member carried in the registration request received respectively.
5. The system according to claim 4, wherein:
the GTCF is used for negotiating the TSM security algorithm used by the dynamic group in an intersection mode according to the group calling security capability of all the current online group members.
6. The system according to claim 5, wherein:
when receiving a modification request of dynamic group generation or group member change, the GTCF is also used for negotiating an encryption algorithm supported by all group members as the encryption algorithm of the group by adopting an intersection mode according to the saved group calling security capability of the current group member.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010242524.7A CN113543118B (en) | 2020-03-31 | 2020-03-31 | Negotiation generation method of dynamic group TSM security algorithm |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010242524.7A CN113543118B (en) | 2020-03-31 | 2020-03-31 | Negotiation generation method of dynamic group TSM security algorithm |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113543118A CN113543118A (en) | 2021-10-22 |
CN113543118B true CN113543118B (en) | 2023-08-04 |
Family
ID=78087659
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010242524.7A Active CN113543118B (en) | 2020-03-31 | 2020-03-31 | Negotiation generation method of dynamic group TSM security algorithm |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113543118B (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103167421A (en) * | 2011-12-08 | 2013-06-19 | 中兴通讯股份有限公司 | Achieving method of dynamic regrouping serve and broadband digital cluster system |
CN105792143A (en) * | 2014-12-25 | 2016-07-20 | 成都鼎桥通信技术有限公司 | Dynamic regrouping realization method in LTE digital cluster system |
WO2017206058A1 (en) * | 2016-05-31 | 2017-12-07 | 海能达通信股份有限公司 | Communication configuration method and apparatus for use in broadband trunking communication |
CN107786511A (en) * | 2016-08-27 | 2018-03-09 | 北京信威通信技术股份有限公司 | The method that group communication safety is realized in group system |
CN108235242A (en) * | 2016-12-12 | 2018-06-29 | 普天信息技术有限公司 | Group region configuration method, dispatching desk and cluster controller TCF based on dynamic reorganization |
CN108696828A (en) * | 2017-02-13 | 2018-10-23 | 普天信息技术有限公司 | The roaming processing method of wireless dispatching desk |
CN109068285A (en) * | 2018-07-26 | 2018-12-21 | 成都鼎桥通信技术有限公司 | A kind of implementation method in cluster pond |
CN109996190A (en) * | 2017-12-29 | 2019-07-09 | 普天信息技术有限公司 | A kind of public affairs private network cluster emerging system group call business realizing method and system |
-
2020
- 2020-03-31 CN CN202010242524.7A patent/CN113543118B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103167421A (en) * | 2011-12-08 | 2013-06-19 | 中兴通讯股份有限公司 | Achieving method of dynamic regrouping serve and broadband digital cluster system |
CN105792143A (en) * | 2014-12-25 | 2016-07-20 | 成都鼎桥通信技术有限公司 | Dynamic regrouping realization method in LTE digital cluster system |
WO2017206058A1 (en) * | 2016-05-31 | 2017-12-07 | 海能达通信股份有限公司 | Communication configuration method and apparatus for use in broadband trunking communication |
CN107786511A (en) * | 2016-08-27 | 2018-03-09 | 北京信威通信技术股份有限公司 | The method that group communication safety is realized in group system |
CN108235242A (en) * | 2016-12-12 | 2018-06-29 | 普天信息技术有限公司 | Group region configuration method, dispatching desk and cluster controller TCF based on dynamic reorganization |
CN108696828A (en) * | 2017-02-13 | 2018-10-23 | 普天信息技术有限公司 | The roaming processing method of wireless dispatching desk |
CN109996190A (en) * | 2017-12-29 | 2019-07-09 | 普天信息技术有限公司 | A kind of public affairs private network cluster emerging system group call business realizing method and system |
CN109068285A (en) * | 2018-07-26 | 2018-12-21 | 成都鼎桥通信技术有限公司 | A kind of implementation method in cluster pond |
Non-Patent Citations (1)
Title |
---|
刘荣朵 ; 陈钢 ; 李晓华 ; .基于LTE的宽带集群通信系统核心网络设备测试方法研究.信息通信技术与政策.2018,(第11期),QU全文. * |
Also Published As
Publication number | Publication date |
---|---|
CN113543118A (en) | 2021-10-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111565404B (en) | Data distribution method and device | |
KR101133850B1 (en) | Terminal and server in location service providing system and method thereof | |
JP4870760B2 (en) | Method and system for handover negotiation in a wireless network | |
US20060116137A1 (en) | Remote control system in mobile communication terminal and method thereof | |
EP3588862A1 (en) | Communication system core network and method for providing heart-beat messages | |
EP3755049B1 (en) | Subscription information update method and apparatus | |
EP4284083A2 (en) | Methods and devices for bearer identifier determination and corresponding storage medium | |
EP3934368B1 (en) | Session processing method, communication device and communication system | |
WO2015017968A1 (en) | Method, device and system for network configuration | |
KR102005998B1 (en) | Method, apparatus, and system for joining nodes to a network | |
EP4366334A1 (en) | Message processing method, electronic device, and storage medium | |
US7366156B2 (en) | Context synchronization method in mobile communication system | |
CN110417876A (en) | Node server and main control device in session method, distributed system | |
CN113543118B (en) | Negotiation generation method of dynamic group TSM security algorithm | |
WO2019201111A1 (en) | Information processing method, apparatus and device, and computer-readable storage medium | |
WO2018153173A1 (en) | Terminal identification processing method, apparatus, and related device | |
CN101860804A (en) | Accession implementing method and accession implementing system for predefined accession group session | |
CN111866762B (en) | Special bearer establishment method and user equipment | |
CN111818531B (en) | Short message verification code processing method, terminal and third-party system | |
CN114095615A (en) | Session establishment method, device, equipment and storage medium | |
CN109120578B (en) | Method and device for realizing link connection processing | |
CN111371843B (en) | Data storage method and device | |
CN112995569B (en) | Conference creation method, terminal, server side and storage medium | |
CN113660702B (en) | Information transmission method, node selection method, device and equipment | |
CN113316096B (en) | Method and system for forwarding video to group in broadband cluster |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |