CN113543118B - Negotiation generation method of dynamic group TSM security algorithm - Google Patents

Negotiation generation method of dynamic group TSM security algorithm Download PDF

Info

Publication number
CN113543118B
CN113543118B CN202010242524.7A CN202010242524A CN113543118B CN 113543118 B CN113543118 B CN 113543118B CN 202010242524 A CN202010242524 A CN 202010242524A CN 113543118 B CN113543118 B CN 113543118B
Authority
CN
China
Prior art keywords
group
gtcf
group member
htcf
dynamic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010242524.7A
Other languages
Chinese (zh)
Other versions
CN113543118A (en
Inventor
王丽丽
周志宏
范晨
袁乃华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu TD Tech Ltd
Original Assignee
Chengdu TD Tech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu TD Tech Ltd filed Critical Chengdu TD Tech Ltd
Priority to CN202010242524.7A priority Critical patent/CN113543118B/en
Publication of CN113543118A publication Critical patent/CN113543118A/en
Application granted granted Critical
Publication of CN113543118B publication Critical patent/CN113543118B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
    • H04W4/08User group management
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Abstract

The application discloses a negotiation generation method of a dynamic group TSM security algorithm, which is applied to a B-trunk C system and is characterized by comprising the following steps: when a group is created, a group cluster control function (GTCF) triggers a home cluster control function (HTCF) of each group member to report the group calling security capability of each group member to the GTCF; and the GTCF generates a TSM security algorithm according to the group calling security capability negotiation of all the current online group members and issues the TSM security algorithm to each group member. By applying the technical scheme disclosed by the application, the cluster service time delay can be shortened, and the system resources can be saved.

Description

Negotiation generation method of dynamic group TSM security algorithm
Technical Field
The present disclosure relates to the field of trunking communication technologies, and in particular, to a method for generating negotiations for a dynamic group TSM security algorithm.
Background
Currently, a broadband trunking communication (B-trunk) system only provides that a dynamic group TSM security algorithm (TSM Security Algorithm) is generated by a group trunking control function (abbreviated as G-TCF or GTCF), and in a group updating flow after group generation, after a terminal reports its group calling security capability through a registration process, the GTCF can decide whether to update the TSM security algorithm according to the group calling security capability of an online terminal in the group.
From the current standard, in the dynamic group scenario, the flow of reporting the security capability of the terminal to the GTCF lags behind the group generation flow, namely: when a dispatching Desk (DC) starts a state group generation request to a GTCF through a home cluster control function (HTCF) (DC), and a group member crosses the TCF, the GTCF does not know the group encryption capability of all members in the dynamic group, at the moment, the GTCF cannot accurately determine the TSM security algorithm of the dynamic group, and only after the group information updating of each terminal is finished, the terminal can re-register and report the group calling security capability of the terminal, then the accurate TSM security algorithm can be re-given, and the TSM security algorithm is issued to each terminal through the group information updating flow.
When there are many group members in the dynamic group, this may result in a significant increase in the delay of the group service, and the real-time performance of the group service is one of the key indicators. Meanwhile, the correct TSM security algorithm can also cause the group calling service which occurs before the group member is successfully issued to the group member to be unavailable. In addition, the group information updating process is executed twice for each terminal, so that the signaling interaction of the whole air interface is increased, and the resource waste exists.
Disclosure of Invention
The application provides a negotiation generation method of a dynamic group TSM security algorithm, which is used for shortening the time delay of a cluster service and saving system resources.
The application discloses a negotiation generation method of a dynamic group TSM security algorithm, which is applied to a B-trunk C system and comprises the following steps:
when a group is created, a group cluster control function body GTCF triggers a home cluster control function body HTCF of each group member to report the group calling security capability of each group member to the GTCF;
and the GTCF generates a TSM security algorithm according to the group calling security capability negotiation of all the current online group members and issues the TSM security algorithm to each group member.
Preferably, before the GTCF triggers the HTCF of each group member to report the group call security capability of each group member to the GTCF, the method includes:
after receiving a dynamic reorganization creation request sent by a dispatching desk, the GTCF acquires a group member list from the request;
the GTCF determines non-local group members from the list of group members.
Preferably, the triggering, by the GTCF, the HTCF of each group member to report the group call security capability of each group member to the GTCF includes:
the GTCF respectively sends registration requests to each HTCF where non-local group members are located, wherein the registration requests respectively carry lists of all the group members under each HTCF;
and each HTCF receiving the registration request initiates a registration process to the GTCF respectively, and sends the group calling security capability of the corresponding group member to the GTCF according to the list of the group member carried in the registration request.
Preferably, the generating, by the GTCF, the TSM security algorithm according to the group call security capability negotiation of all the current online group members includes:
and the GTCF negotiates the TSM security algorithm used by the dynamic group in an intersection mode according to the group calling security capability of all the current online group members.
Preferably, the method further comprises:
when receiving a modification request of dynamic group generation or group member change, the GTCF negotiates an encryption algorithm supported by all group members as the encryption algorithm of the group by adopting an intersection mode according to the saved group calling security capability of the current group member.
The application also discloses a negotiation generating system of the dynamic group TSM security algorithm, which is applied to the B-trunk C system and at least comprises: GTCF and HTCF for each group member, wherein:
the GTCF is used for triggering the HTCF of each group member to report the group calling security capability of each group member to the GTCF when the group is created;
the GTCF is also used for generating a TSM security algorithm according to the group calling security capability negotiation of all the current online group members and issuing the TSM security algorithm to each group member.
Preferably, the system further comprises a dispatch station, wherein:
the dispatching desk is used for sending a dynamic reorganization creating request to the GTCF;
and the GTCF is used for acquiring a group member list from the request after receiving a dynamic reorganization creation request sent by the dispatching desk, and determining non-local group members according to the group member list.
Preferably, the GTCF is configured to send a registration request to each HTCF where a non-local group member is located, where the registration request carries a list of all group members under each HTCF;
and each HTCF receiving the registration request is respectively used for initiating a registration process to the GTCF, and sending the group calling security capability of the corresponding group member to the GTCF according to the list of the group member carried in the registration request received respectively.
Preferably, the GTCF is configured to negotiate a TSM security algorithm used by the dynamic group by adopting an intersection manner according to the group calling security capabilities of all current online group members.
Preferably, when receiving a modification request of dynamic group generation or group member change, the GTCF is further configured to negotiate an encryption algorithm supported by all group members as an encryption algorithm of the group by adopting an intersection mode according to the saved group call security capability of the current group member.
As can be seen from the above technical solutions, the method and system for generating dynamic negotiation of a dynamic group TSM security algorithm in a B-trunk system according to the present application trigger each HTCF by a GTCF to report the group call security capability of all group members stored locally to the GTCF when a group is created; then, the GTCF negotiates according to the group calling security capability of all the current online group members to generate a TSM security algorithm and issues the TSM security algorithm to each group member, so that the GTCF can obtain the group calling security capability of all the group members to the HTCF of the group member in time when creating the group, and the GTCF does not need to passively wait until the group information of each subsequent terminal is updated, and the TSM security algorithm is generated by using a simplified process in a shorter time through the improvement on the process. The technical scheme is used in the B-trunk system protocol, so that the negotiation flow of the dynamic group downlink encryption algorithm under the cross TCF scene can be optimized, the cluster time delay is shortened, and the system resources are saved.
Drawings
FIG. 1 is a schematic diagram of a negotiation generation method of a dynamic group TSM security algorithm applied to a B-trunk system;
fig. 2 is a flow chart of a dynamic group TSM security algorithm generated by negotiation at the time of group creation according to a preferred embodiment of the present application.
Detailed Description
For the purposes of making the objects, technical solutions and advantages of the present application more apparent, the present application will be described in further detail below with reference to the accompanying drawings and examples.
In order to solve the problems existing in the prior art, the application provides a dynamic negotiation generation scheme of a dynamic group TSM security algorithm in a B-trunk system, and the main idea is that: when a group is created, the GTCF triggers each HTCF to report the group calling security capability of all the group members stored locally to the GTCF; then, the GTCF negotiates according to the group calling security capability of all the current online group members to generate a TSM security algorithm, and issues the TSM security algorithm to each group member. Therefore, the TSM security algorithm is generated by adopting a dynamic negotiation mode of group members in a shorter time and using a simplified flow, and in the B-trunk C system protocol, the negotiation flow of the dynamic group downlink encryption algorithm under a cross TCF scene is optimized, the cluster time delay is shortened, and the system resource is saved.
Fig. 1 is a schematic diagram of a negotiation generation method of a dynamic group TSM security algorithm applied to a B-trunk system, where the method includes:
step 101: when a group is created, the GTCF triggers the HTCF of each group member to report the group calling security capability of each group member to the GTCF;
step 102: and the GTCF generates a TSM security algorithm according to the group calling security capability negotiation of all the current online group members and issues the TSM security algorithm to each group member.
Before the GTCF triggers the HTCF of each group member to report the group call security capability of each group member to the GTCF, the method further includes: the GTCF receives a dynamic reorganization creating request sent by the dispatching desk, acquires a group member list from the dynamic reorganization creating request, and determines non-local group members according to the group member list. Then, aiming at the non-local group members, the GTCF respectively sends registration requests to each HTCF where the non-local group members are located, wherein the registration requests respectively carry lists of all the group members under each HTCF; each HTCF receiving the registration request initiates a registration process to the GTCF respectively, and sends the group calling security capability of the corresponding group member to the GTCF according to the list of the group member carried in the registration request received respectively.
After the GTCF obtains the group calling security capability of all the current online group members, negotiating a TSM security algorithm used by the dynamic group in an intersection mode according to the group calling security capability of all the current online group members, and issuing the TSM security algorithm to each group member.
When receiving a modification request of dynamic group generation or group member change, the GTCF negotiates an encryption algorithm supported by all group members as the encryption algorithm of the group by adopting an intersection mode according to the saved group calling security capability of the current group member.
Corresponding to the method, the application also provides a negotiation generating system of the dynamic group TSM security algorithm, which is applied to the B-trunk C system and at least comprises: GTCF and HTCF for each group member, wherein:
the GTCF is used for triggering the HTCF of each group member to report the group calling security capability of each group member to the GTCF when the group is created;
the GTCF is also used for generating a TSM security algorithm according to the group calling security capability negotiation of all the current online group members and issuing the TSM security algorithm to each group member.
Preferably, the system further comprises a dispatch station, wherein:
the dispatching desk is used for sending a dynamic reorganization creating request to the GTCF;
and the GTCF is used for acquiring a group member list from the request after receiving a dynamic reorganization creation request sent by the dispatching desk, and determining non-local group members according to the group member list.
Preferably, the GTCF is configured to send a registration request to each HTCF where a non-local group member is located, where the registration request carries a list of all group members under each HTCF;
and each HTCF receiving the registration request is respectively used for initiating a registration process to the GTCF, and sending the group calling security capability of the corresponding group member to the GTCF according to the list of the group member carried in the registration request received respectively.
Preferably, the GTCF is configured to negotiate a TSM security algorithm used by the dynamic group by adopting an intersection manner according to the group calling security capabilities of all current online group members.
Preferably, when receiving a modification request of dynamic group generation or group member change, the GTCF is further configured to negotiate an encryption algorithm supported by all group members as an encryption algorithm of the group by adopting an intersection mode according to the saved group call security capability of the current group member.
Fig. 2 is a flowchart of a dynamic group TSM security algorithm generated by negotiation at the time of group creation according to a preferred embodiment of the present application, the flowchart includes the following steps:
step 1: the Dispatcher (DC) sends a dynamic reorganization creation request (MESSAGE as shown) to the GTCF of the group through the HTCF (DC) on the DC side), which carries the group member list information of the group.
Step 2: after receiving the dynamic reorganization creating request, the GTCF checks the group member list of the group, confirms whether all HTCFs of the group members are local, and for non-local group members, proceeds to step 3.
Step 3: the GTCF sends registration requests to HTCF where non-local group members are located, respectively.
Here, a new TC2 MESSAGE (GTCF requires the HTCF where the non-native group member is located to register, and the MESSAGE carries a list of all group members under the HTCF).
The HTCF herein may also be referred to as a terminal HTCF, labeled HTCF (UE) in the figure, as distinguished from the HTCF (DC) on the DC side. In this step, the MESSAGE sent by the GTCF to each terminal HTCF needs to carry a UDN (user dialing number: user Dialing Number) list of all group members that require the corresponding HTCF to register this time, and may also carry a group name, GDN (group dialing number: group Dialing Number) information, and so on.
Step 4: after each HTCF receives the registration request of the GTCF, it returns a 200OK message to the GTCF to inform that the registration request has been received.
Step 5: each HTCF initiates a registration procedure with the GTCF using a MESSAGE (terminal HTCF registers with the GTCF). Here, the existing MESSAGE needs to be modified (the terminal HTCF registers with the GTCF), the registration MESSAGE of only one UE in the protocol is modified to be able to carry registration MESSAGEs of multiple UEs, the UDN information of the UE needs to be the same as the UDN information in the registration request in step 3, and the registration MESSAGE of each UE carries the group call security capability of the UE.
Step 6: after receiving the MESSAGE (the terminal HTCF registers with the GTCF), the GTCF returns a 200OK MESSAGE to the corresponding HTCF.
Step 7: after the GTCF receives MESSAGE returned by the HTCF where all the group members are located (the terminal HTCF registers with the GTCF), the group calling security capability of all the group members of the dynamic group is obtained, and TSM security algorithm used by the dynamic group finally can be negotiated by adopting modes of intersection taking and the like.
And when receiving a modification request of dynamic group generation or group member change, the GTCF can acquire an intersection set according to the group calling security capability of the current group member stored by the GTCF, so that the encryption algorithm supported by all the group members is acquired as the encryption algorithm of the group, and if a plurality of encryption algorithms meet the requirement, one encryption algorithm can be selected by self.
Step 8: the GTCF sends a GroupInfo-Config-Request message to the eHSS, and fills in corresponding information according to the B-Trunc standard requirement, wherein the TSM security algorithm is the TSM security algorithm negotiated in the step 7.
Step 9: after receiving the GroupInfo-Config-Request message, the hss performs a correlation check, and after the correlation check passes, generates information such as gkasce and GKVer for the group.
Step 10: the eHSS carries information such as encryption algorithm, gkasme, GKVER and the like in GroupInfo-Config-Answer according to a standard protocol and returns the information to the GTCF.
The other subsequent procedures are the same as the standard B-trunk procedure and will not be described here again.
The foregoing description of the preferred embodiments of the present invention is not intended to limit the invention to the precise form disclosed, and any modifications, equivalents, improvements and alternatives falling within the spirit and principles of the present invention are intended to be included within the scope of the present invention.

Claims (6)

1. The negotiation generation method of the dynamic group TSM security algorithm is applied to a B-TruC system and is characterized by comprising the following steps:
when a group is created, a group cluster control function body GTCF triggers a home cluster control function body HTCF of each group member to report the group calling security capability of each group member to the GTCF;
the GTCF generates a TSM security algorithm according to the group calling security capability negotiation of all the current online group members and issues the TSM security algorithm to each group member;
before the GTCF triggers the HTCF of each group member to report the group call security capability of each group member to the GTCF, the method includes:
after receiving a dynamic reorganization creation request sent by a dispatching desk, the GTCF acquires a group member list from the request;
the GTCF determines non-local group members according to the group member list;
triggering the HTCF of each group member by the GTCF to report the group call security capability of each group member to the GTCF includes:
the GTCF respectively sends registration requests to each HTCF where non-local group members are located, wherein the registration requests respectively carry lists of all the group members under each HTCF;
and each HTCF receiving the registration request initiates a registration process to the GTCF respectively, and sends the group calling security capability of the corresponding group member to the GTCF according to the list of the group member carried in the registration request.
2. The method of claim 1 wherein the GTCF generating a TSM security algorithm based on group call security capability negotiations for all current online group members comprises:
and the GTCF negotiates the TSM security algorithm used by the dynamic group in an intersection mode according to the group calling security capability of all the current online group members.
3. The method according to claim 2, characterized in that the method further comprises:
when receiving a modification request of dynamic group generation or group member change, the GTCF negotiates an encryption algorithm supported by all group members as the encryption algorithm of the group by adopting an intersection mode according to the saved group calling security capability of the current group member.
4. A negotiation generation system of a dynamic group TSM security algorithm, applied to a B-trunk c system, comprising at least: GTCF and HTCF for each group member, wherein:
the GTCF is used for triggering the HTCF of each group member to report the group calling security capability of each group member to the GTCF when the group is created;
the GTCF is also used for generating a TSM security algorithm according to the group calling security capability negotiation of all the current online group members and issuing the TSM security algorithm to each group member;
the system further comprises a dispatch station, wherein:
the dispatching desk is used for sending a dynamic reorganization creating request to the GTCF;
the GTCF is used for acquiring a group member list from the request after receiving a dynamic reorganization creation request sent by a dispatching desk, and determining non-local group members according to the group member list;
the GTCF is used for respectively sending registration requests to each HTCF where the non-local group member is located, wherein the registration requests respectively carry lists of all the group members under each HTCF;
and each HTCF receiving the registration request is respectively used for initiating a registration process to the GTCF, and sending the group calling security capability of the corresponding group member to the GTCF according to the list of the group member carried in the registration request received respectively.
5. The system according to claim 4, wherein:
the GTCF is used for negotiating the TSM security algorithm used by the dynamic group in an intersection mode according to the group calling security capability of all the current online group members.
6. The system according to claim 5, wherein:
when receiving a modification request of dynamic group generation or group member change, the GTCF is also used for negotiating an encryption algorithm supported by all group members as the encryption algorithm of the group by adopting an intersection mode according to the saved group calling security capability of the current group member.
CN202010242524.7A 2020-03-31 2020-03-31 Negotiation generation method of dynamic group TSM security algorithm Active CN113543118B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010242524.7A CN113543118B (en) 2020-03-31 2020-03-31 Negotiation generation method of dynamic group TSM security algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010242524.7A CN113543118B (en) 2020-03-31 2020-03-31 Negotiation generation method of dynamic group TSM security algorithm

Publications (2)

Publication Number Publication Date
CN113543118A CN113543118A (en) 2021-10-22
CN113543118B true CN113543118B (en) 2023-08-04

Family

ID=78087659

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010242524.7A Active CN113543118B (en) 2020-03-31 2020-03-31 Negotiation generation method of dynamic group TSM security algorithm

Country Status (1)

Country Link
CN (1) CN113543118B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103167421A (en) * 2011-12-08 2013-06-19 中兴通讯股份有限公司 Achieving method of dynamic regrouping serve and broadband digital cluster system
CN105792143A (en) * 2014-12-25 2016-07-20 成都鼎桥通信技术有限公司 Dynamic regrouping realization method in LTE digital cluster system
WO2017206058A1 (en) * 2016-05-31 2017-12-07 海能达通信股份有限公司 Communication configuration method and apparatus for use in broadband trunking communication
CN107786511A (en) * 2016-08-27 2018-03-09 北京信威通信技术股份有限公司 The method that group communication safety is realized in group system
CN108235242A (en) * 2016-12-12 2018-06-29 普天信息技术有限公司 Group region configuration method, dispatching desk and cluster controller TCF based on dynamic reorganization
CN108696828A (en) * 2017-02-13 2018-10-23 普天信息技术有限公司 The roaming processing method of wireless dispatching desk
CN109068285A (en) * 2018-07-26 2018-12-21 成都鼎桥通信技术有限公司 A kind of implementation method in cluster pond
CN109996190A (en) * 2017-12-29 2019-07-09 普天信息技术有限公司 A kind of public affairs private network cluster emerging system group call business realizing method and system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103167421A (en) * 2011-12-08 2013-06-19 中兴通讯股份有限公司 Achieving method of dynamic regrouping serve and broadband digital cluster system
CN105792143A (en) * 2014-12-25 2016-07-20 成都鼎桥通信技术有限公司 Dynamic regrouping realization method in LTE digital cluster system
WO2017206058A1 (en) * 2016-05-31 2017-12-07 海能达通信股份有限公司 Communication configuration method and apparatus for use in broadband trunking communication
CN107786511A (en) * 2016-08-27 2018-03-09 北京信威通信技术股份有限公司 The method that group communication safety is realized in group system
CN108235242A (en) * 2016-12-12 2018-06-29 普天信息技术有限公司 Group region configuration method, dispatching desk and cluster controller TCF based on dynamic reorganization
CN108696828A (en) * 2017-02-13 2018-10-23 普天信息技术有限公司 The roaming processing method of wireless dispatching desk
CN109996190A (en) * 2017-12-29 2019-07-09 普天信息技术有限公司 A kind of public affairs private network cluster emerging system group call business realizing method and system
CN109068285A (en) * 2018-07-26 2018-12-21 成都鼎桥通信技术有限公司 A kind of implementation method in cluster pond

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘荣朵 ; 陈钢 ; 李晓华 ; .基于LTE的宽带集群通信系统核心网络设备测试方法研究.信息通信技术与政策.2018,(第11期),QU全文. *

Also Published As

Publication number Publication date
CN113543118A (en) 2021-10-22

Similar Documents

Publication Publication Date Title
CN111565404B (en) Data distribution method and device
KR101133850B1 (en) Terminal and server in location service providing system and method thereof
JP4870760B2 (en) Method and system for handover negotiation in a wireless network
US20060116137A1 (en) Remote control system in mobile communication terminal and method thereof
EP3588862A1 (en) Communication system core network and method for providing heart-beat messages
EP3755049B1 (en) Subscription information update method and apparatus
EP4284083A2 (en) Methods and devices for bearer identifier determination and corresponding storage medium
EP3934368B1 (en) Session processing method, communication device and communication system
WO2015017968A1 (en) Method, device and system for network configuration
KR102005998B1 (en) Method, apparatus, and system for joining nodes to a network
EP4366334A1 (en) Message processing method, electronic device, and storage medium
US7366156B2 (en) Context synchronization method in mobile communication system
CN110417876A (en) Node server and main control device in session method, distributed system
CN113543118B (en) Negotiation generation method of dynamic group TSM security algorithm
WO2019201111A1 (en) Information processing method, apparatus and device, and computer-readable storage medium
WO2018153173A1 (en) Terminal identification processing method, apparatus, and related device
CN101860804A (en) Accession implementing method and accession implementing system for predefined accession group session
CN111866762B (en) Special bearer establishment method and user equipment
CN111818531B (en) Short message verification code processing method, terminal and third-party system
CN114095615A (en) Session establishment method, device, equipment and storage medium
CN109120578B (en) Method and device for realizing link connection processing
CN111371843B (en) Data storage method and device
CN112995569B (en) Conference creation method, terminal, server side and storage medium
CN113660702B (en) Information transmission method, node selection method, device and equipment
CN113316096B (en) Method and system for forwarding video to group in broadband cluster

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant