CN1599484A - Group system group key managing method - Google Patents

Group system group key managing method Download PDF

Info

Publication number
CN1599484A
CN1599484A CN 03157437 CN03157437A CN1599484A CN 1599484 A CN1599484 A CN 1599484A CN 03157437 CN03157437 CN 03157437 CN 03157437 A CN03157437 A CN 03157437A CN 1599484 A CN1599484 A CN 1599484A
Authority
CN
China
Prior art keywords
group key
group
colony terminal
key
network side
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 03157437
Other languages
Chinese (zh)
Other versions
CN100344183C (en
Inventor
冯凯锋
郑志彬
周国安
陈德
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNB031574378A priority Critical patent/CN100344183C/en
Publication of CN1599484A publication Critical patent/CN1599484A/en
Application granted granted Critical
Publication of CN100344183C publication Critical patent/CN100344183C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

This invention discloses a management method to set cryptographic keys by a cluster system including: A The network takes the CK corresponding to the cluster end set with key(CK) as the CK and ciphers it to get a SKG1 to compute a first abstract according to the set cryptographic keys, then an order carried with SKG1 and the first abstract is delivered to said cluster terminal, B The terminal deciphers the SKG1 by its own CK to get a set CK and computes a second abstract based on said CK, compares if the second is in conformity with the first, if so, step C is carried out, if not, the set design is lost and jumps out of the flow C. Said terminal utilizes the set CK deciphered in step B to design.

Description

A kind of group system group key management method
Technical field
The present invention relates to the safety management technology of group system, be meant a kind of management method of group system group key especially.
Background technology
Wireless trunking communication system, hereinafter to be referred as group system, be a kind of less expensive, command dispatching and communication system more flexibly, be widely used in units such as government bodies, energy traffic, airport harbour, industrial and mining enterprises, fire-fighting police, water conservancy and military affairs, to satisfy the needs of constituent parts intercommunication.
It is voice group call service (VGCS) that group system provides the most basic business.VGCS allows the user to be established to the one group of user's who belongs to a certain given service area and group id (GID) calling, the professional employing semiduplex mode that provides, any member can become the speaker during the calling, but arbitrary moment only allow a speaker, other members are the hearer.Service area can be made up of some sub-districts that belong to same mobile switching centre (MSC) or different MS C, each related cell has a group-calling channel during calling, wherein up link is only used for current talker, can be described as the group emission mode, all hearers wait on down link, can be described as group receive mode, the notification message of group-calling channel configuration is broadcasted on notification channel (NCH) notification channel.Because same community user is shared a down channel, thereby has saved Radio Resource greatly.
Public security, military contour confidentiality unit have relatively high expectations for communication security, require group-calling service is carried out End to End Encryption.Because group calling is a kind of communication of multi-to-multi, so necessarily require shared group key (KG) between each member of same group, the End to End Encryption key and the integrity protection key that use when being used to generate each group calling.And KG and corresponding GID are kept in each user's Subscriber Identity Module (SIM) card, and network side also needs to preserve the KG of GID correspondence.
When the control centre dynamically builds group, need distribute new group key for each group membership; Based on the consideration of safety, each key has certain life cycle in addition, so the control centre also may initiate periodic group key management.When the certain user withdraws from group in addition, cancelled its group authority because of certain terminal is stolen as the control centre, the group key that also must upgrade other group membership can not continue to participate in cluster group calling to guarantee the user who is cancelled authority.
The management method of group key comprises following several technical scheme in the existing group system.
First kind: KMC is a plurality of fixing group keys of each group allocation, and each group key comes unique definite by the group key sign.These fixing group key sequences write in each group membership's the SIM card by the special SIM card read-write equipment.When carrying out group calling or multicast service, when promptly needing to use encryption function, can identify by the group key in professional promoter or the network selecting group key system, and with selected group key as add, decruption key, and with every user who participates in group service in the pairing sign of this key notice group.
In group system, each group member is not changeless.When group increased the newcomer, if just simply original group key is write newcomer's SIM card, then this member who increases newly can use group key to decrypt former group communication information.And certain member may withdraw from this group in the group, and this member can not continue to participate in this group service according to the rules, if but group key does not in time obtain renewal, and the member who has withdrawed from so still can decrypt the secure communication of group.As seen, group key is carried out safety, upgrades for ensureing that group communication safety is very necessary timely.And adopt first kind of technical scheme more during new key, and need special-purpose SIM card read-write equipment, in time obtain upgrading so be difficult to guarantee group key, therefore can't guarantee the group system secure communication.
Second kind, consult to produce group key by the group membership.The starting point of this technical scheme is that the Diffie-Hellman IKE that will be used for two side's key agreements expands to group communication.
Group's Diffie-Hellman IKE is described below: n member arranged in the group, be designated as M respectively 1, M 2... M n, disclose a big prime number q with and primitive element α, the computing in the agreement is all carried out on finite field gf (q).Key agreement is divided into up (n-1) wheel and descending (n-1) two stages of wheel, and finally each member can both calculate group key α N1N2...Nn, N wherein iBe member M iThe independent random number that produces and maintain secrecy.
In the up stage, member M iCalculate the N of last element of its set that receives iInferior power is issued M together with the numerical value that receives then I+1, and in the descending stage, user M iCalculate the N of the last element of its set that receives iInferior power is as group key, then the N of other element in the set of computations iInferior power, and send to M I-1As shown in table 1, at uplink interaction stage: i wheel, i=1 ..., n-1, M iTo M I+1Send { α Π ( N k | k ∈ [ 1 , i ] ) | j ∈ [ 1 , i ] } ; In the descending mutual stage, the n-1+i wheel, i=1 ..., n-1M N-iTo M N-i+1Send { α Π ( N k | k ∉ [ i , j ] ) | j ∈ [ 1 , i ] } .
Figure A0315743700073
Table 1
With n=5 is example, in the uplink interaction stage, and user M 4To receive set { α N1, α N1N2, α N1N2N3, he utilizes α N1N2N3With the random number N that oneself generates 4Calculate α N1N2N3N4, and send { α N1, α N1N2, α N1N2N3, α N1N2N3N4To M 5M 5Utilize α N1N2N3N4Calculate final group key α N1N2N3N4N5And preserve, after this be the descending mutual stage, M 5Calculate the median set and send to M 4, user M 4Receive set { α N4N5, α N1N4N5, α N1N2N4N5, utilize α N1N2N3N5Also can calculate final key, calculate median set { α then N5, α N1N5, α N1N2N5, α N1N2N3N5Send to M 3
In this scheme, group key is consulted to produce by n group membership, needs mutual through between the inferior group membership of 2 (n-1) altogether.For wireless system, the request channel resource that all needs alternately between each group membership connects, and certainly leads to huge system resources consumption like this; And in the process that produces group key, each group membership will carry out repeatedly large module power multiplication, and the computing capability of portable terminal is limited at present, and numerical value will exceed the computer capacity of portable terminal too greatly sometimes.
Summary of the invention
In view of this, the purpose of this invention is to provide the management method of group key in a kind of group system, make it adapt to group system group membership's dynamic change, make the group system communication security.
The management method of group key comprises in a kind of group system provided by the invention:
A. network side group key will be set the pairing CK of colony terminal as key, the group key that will be provided with is encrypted and is obtained SKG i,, calculate first summary according to the described group key that will be provided with simultaneously according to certain algorithm; To carry SKG then i, first summary group key order be set be sent to described colony terminal;
B. described colony terminal utilizes the CK of self that the SKGi deciphering of receiving is obtained group key, and according to algorithm identical in the steps A, calculate second summary according to oneself deciphering the group key that obtains, relatively whether second summary is consistent with first summary, if consistent, execution in step C then, otherwise, group key is provided with failure, jumps out this flow process;
C. described colony terminal utilizes the group key that decrypts among the step B to be provided with.
First summary described in the steps A is the described colony terminal group key management sequence number calculating of network side according to described group key that will be provided with and network side preservation;
Group key described in the steps A is provided with order and also comprises colony terminal group key management sequence number;
The then described colony terminal group key management sequence number calculating that sends of group key that to be described colony terminal obtain according to own deciphering of second summary described in the step B and network side.
Before execution in step C, this method may further include:
C1, described colony terminal are judged the described colony terminal group key management sequence number of network side preservation whether greater than the group key management sequence number of self preserving, if greater than, execution in step C then, otherwise group key is provided with failure, jumps out this flow process.
First summary described in the steps A is that network side calculates according to described group key that will be provided with and current time;
Group key described in the steps A is provided with order and comprises that also network side will calculate the current time of first summary;
Second summary described in the step B is that described colony terminal calculates according to group key that will be provided with and current time.
Before execution in step C, this method may further include:
C2, described colony terminal judge calculate second summary time whether greater than time of described calculating first summary and both differences whether within predefined scope, if, execution in step C then, otherwise group key is provided with failure, jumps out this flow process.
Step C can comprise:
Colony terminal judges whether self has the group id record, if have, then utilize the described group id of the group key management that self decrypts to write down pairing group key, if do not have, then increase group id record list item, the group key that self is decrypted is kept in the group id record list item again.
After step C, this method may further include: described colony terminal informing network side group key is provided with success, and network side upgrades the management accounts of self preserving according to this result.
The group key that will be provided with described in the steps A is the random sequence that network side produces.
After group key was provided with failure, this method may further include: described colony terminal informing network side group key is provided with failure.
This method may further include: set in advance the cluster group membership tabulation that is in state of activation, further before execution in step A:
A1, according to described cluster group membership tabulation, judge whether to have or not and finish the colony terminal that this group key is provided with, if also have, select one of them as will carrying out the colony terminal that group key is provided with, execution in step A, otherwise, jump out this flow process;
And after execution in step C, execution in step A1.
Be set to the update group key described in the step C, or group key is set first.
Group key described in the steps A is provided with order can also comprise group id;
Then before step B, further comprise: described colony terminal judges according to group id whether needs are provided with group key for self, if desired, and execution in step B then, otherwise, do not handle, jump out this flow process.
The present invention determines the group key that will be provided with by network side, and after encrypting with the group key that the security information CK that each group membership and network in the cluster group are shared will be provided with as key, by each group membership of signaling, calculate simple, convenient; And owing to use summary info, thereby ensured the integrality of key updating signaling, also can differentiate promoter's true identity; This method also uses SQN or time stamp to resist playback group key change Signaling attack, so safe.
Description of drawings
Fig. 1 is for realizing the schematic flow sheet of the inventive method;
Fig. 2 is for realizing the specific embodiment one flow process schematic diagram of the inventive method;
Fig. 3 is for realizing the specific embodiment two flow process schematic diagrames of the inventive method.
Embodiment
For wireless system, network equipment can be used as believable KMC, directly grasps the group key of group system.Therefore, for the production process of simplifying group key and the safety of group system, method of the present invention is to determine the group key that will be provided with by network side, and the security information CK that shares with each group membership and network in the cluster group is as key, the group key that will be provided with is encrypted, and then by each group membership of signaling; Each group membership utilizes the CK of self that the group key that will be provided with is decrypted, and obtains the group key that will be provided with.
Participate in shown in Figure 1ly, realize that the detailed process of the inventive method is as follows:
Step 101: network side will be provided with the pairing CK of colony terminal of group key as key, and the group key that will be provided with is encrypted and obtained SKG i,, calculate first summary according to the described group key that will be provided with simultaneously according to certain algorithm; To carry SKG then i, first summary group key order be set be sent to described colony terminal;
Step 102: described colony terminal utilizes the CK of self that SKGi is deciphered and obtains group key, and according to algorithm same in the step 101, calculate second summary according to oneself deciphering the group key that obtains, relatively whether second summary is consistent with first summary, if consistent, then execution in step 103, otherwise, group key is provided with failure, jumps out this flow process;
Step 103: this colony terminal utilizes the group key that self decrypts that group key is set.The setting here comprises two kinds of situations, and self has preserved group key, and be the update group key this moment; Another kind is that group key is set first.
Certainly, if being provided with order, group key described in the step 101 also comprises group id, then before step 102, colony terminal judges according to the group id that receives whether needs are provided with group key for self, and if desired, then execution in step 102, otherwise, do not handle, jump out this flow process.
Describe technical scheme of the present invention in detail below in conjunction with the drawings and specific embodiments.
In group system, each colony terminal, i.e. each group membership shares a secret data CK with network side respectively, is used for communicating by letter between refined net and user.Present embodiment has used CK in the process of carrying out group key management, cryptographic algorithm f E, decipherment algorithm f D, digest algorithm H.
Referring to shown in Figure 2, the detailed process of present embodiment management group key is as follows:
Step 201: when group key management and group key distribution flow are initiated in the network side decision, generate a random sequence as new K G, i.e. the group key that will be provided with, and generation is in group membership's tabulation of state of activation, notifies user's update group key one by one according to step 202~209.
Step 202: network side is obtained pairing CK of group membership I and SQN, and wherein, SQN represents the sequence number of user's group key management situation; Use the pairing CK of group membership I as key then, use cryptographic algorithm f EEncrypt K GObtain SKGi, i.e. SKGi=f E(CKi, K G).
Step 203: network side utilizes digest algorithm H, SQNi and K G, calculate first summary DIGTi=H (SQNi, the K G).
Step 204: network side sends the group key management instruction that carries GID, SKGi, SQNi and DIGTi to group membership I.
Step 205: after group membership I receives the group key management instruction that carries GID, SKGi, SQNi and DIGTi, decipher SKGi, obtain rec_KG with own CK, promptly rec_KG=fD (CKi, SKGi).
Step 206: group membership I calculates second summary according to SQNi and rec_KG, be rec_DIGT=H (SQNi, rec_KG), and whether the second summary rec_DIGT that relatively self calculates is consistent with the first summary DIGTi that network side calculates, if consistent, then execution in step 207, otherwise, group key is provided with failure, and the informing network side, jumps out this flow process.
Step 207: whether group membership I judges SQNi greater than the group key management sequence number SQN that self preserves, if greater than, think that then the group key management instruction is legal, execution in step 208, otherwise loopback key updating failed signaling is jumped out this flow process.
Step 208: group membership I utilizes self rec_KG of drawing of deciphering that group key is set.After the success of group membership I update group key, send group key management success signaling, and SQN in the SIM card is updated to SQNi to network side.
Here, if in the group ID tabulation GID is arranged in group membership I self SIM card, then the pairing group key management of this GID of institute is rec_KG, is GID otherwise increase a group ID, and group key is the record of rec_KG.
Step 209: network side is updated to SQNi+1 with the corresponding SQN of group membership I after receiving the group key management affirmation signaling of group membership I, and the group key of mark group membership I upgrades.
The group key that said process has only been described a colony terminal is provided with, and current being in the activation tabulation too may comprise a plurality of group memberships, and network side wants repeated execution of steps 202~209 to finish.Certainly, for the current group membership who is not in state of activation, can when carrying out location registers, it use same process that its group key is set.
Lift specific embodiment two below and describe technical scheme of the present invention in detail.
Referring to shown in Figure 3, the detailed process that present embodiment carries out group key management is as follows:
Step 301: when group key management and group key distribution flow are initiated in the network side decision, generate a random sequence as new K G, and generate the group membership's tabulation that is in state of activation, notify user's update group key one by one according to step 302~309.
Step 302: the pairing CK of group membership I that network side is preserved according to self, and with this CK as key, use cryptographic algorithm f EEncrypt K G, obtain SKGi, i.e. SKGi=f E(CKi, K G).
Step 303: network side utilizes abstract function H, K GWith current time TS, calculate the first summary DIGT i, DIGT i=H (TS, K G);
Step 304: network side sends to group membership I and carries GID, SKG i, TS and DIGT iGroup key management instruction.
Step 305: after group membership I receives the group key management instruction that carries GID, SKGi, SQNi and DIGTi, decipher SKGi, obtain rec_KG with own CK, promptly rec_KG=fD (CKi, SKGi).
Step 306: group membership I obtains rec_KG according to current time and self deciphering, calculate the second summary rec_DIGT, be rec_DIGT=H (TS, rec_KG), and the second summary rec_DIGT and the first summary DIGT are compared, if consistent, it is legal to think that then this group key is provided with, otherwise key is provided with failure.
Step 307: group membership I is TS and current time TS` relatively, if TS` greater than TS and both differences in predefined time range, think that then the group key management instruction is legal, utilize the group key that self decrypts to be provided with, execution in step 308 then, otherwise, send the key updating failed signaling to network side.
Here, if had GID in the group ID tabulation in the SIM card of group membership I, group membership I then utilizes rec_KG to upgrade the pairing group key of GID, otherwise increasing a group ID in the SIM card of self is that GID, group key are the record of rec_KG.And described time range is mainly set according to the transmission time of signaling.
Step 308: after the success of group membership I update group key, informing network side group key management success signaling.After network side received the group key management success signaling of group membership I, the group key of mark group membership I upgraded.
With embodiment illustrated in fig. 2 different be that present embodiment utilizes time stab information to replace SQN to resist multi-sending attack, such as the cdma system in the network that adopts the whole network synchronised clock.Utilize this method need not preserve SQN information, can save memory space at network side and terminal.

Claims (12)

1, a kind of management method of group system group key is characterized in that, this method may further comprise the steps:
A. network side group key will be set the pairing CK of colony terminal as key, the group key that will be provided with is encrypted and is obtained SKG i,, calculate first summary according to the described group key that will be provided with simultaneously according to certain algorithm; To carry SKG then i, first summary group key order be set be sent to described colony terminal;
B. described colony terminal utilizes the SKG of CK to receiving of self iDeciphering obtains group key, and according to algorithm identical in the steps A, calculates second summary according to oneself deciphering the group key that obtains, relatively whether second summary is consistent with first summary, if unanimity, then execution in step C, otherwise group key is provided with failure, jumps out this flow process;
C. described colony terminal utilizes the group key that decrypts among the step B to be provided with.
2, method according to claim 1 is characterized in that,
First summary described in the steps A is the described colony terminal group key management sequence number calculating of network side according to described group key that will be provided with and network side preservation;
Group key described in the steps A is provided with order and also comprises colony terminal group key management sequence number;
The then described colony terminal group key management sequence number calculating that sends of group key that to be described colony terminal obtain according to own deciphering of second summary described in the step B and network side.
3, method according to claim 2 is characterized in that, before execution in step C, this method further comprises:
C1, described colony terminal are judged the described colony terminal group key management sequence number of network side preservation whether greater than the group key management sequence number of self preserving, if greater than, execution in step C then, otherwise group key is provided with failure, jumps out this flow process.
4, method according to claim 1 is characterized in that, first summary described in the steps A is that network side calculates according to described group key that will be provided with and current time;
Group key described in the steps A is provided with order and comprises that also network side will calculate the current time of first summary;
Second summary described in the step B is that described colony terminal calculates according to group key that will be provided with and current time.
5, method according to claim 4 is characterized in that, before execution in step C, this method further comprises:
C2, described colony terminal judge calculate second summary time whether greater than time of described calculating first summary and both differences whether within predefined scope, if, execution in step C then, otherwise group key is provided with failure, jumps out this flow process.
6, method according to claim 1 is characterized in that, step C comprises:
Colony terminal judges whether self has the group id record, if have, then utilize the described group id of the group key management that self decrypts to write down pairing group key, if do not have, then increase group id record list item, the group key that self is decrypted is kept in the group id record list item again.
7, method according to claim 1 is characterized in that, after step C, this method further comprises: described colony terminal informing network side group key is provided with success, and network side upgrades the management accounts of self preserving according to this result.
8, method according to claim 1 is characterized in that, the group key that will be provided with described in the steps A is the random sequence that network side produces.
9, method according to claim 1 is characterized in that, after group key was provided with failure, this method further comprised: described colony terminal informing network side group key is provided with failure.
10, method according to claim 1 is characterized in that, this method further comprises: set in advance the cluster group membership tabulation that is in state of activation, further before execution in step A:
A1, according to described cluster group membership tabulation, judge whether to have or not and finish the colony terminal that this group key is provided with, if also have, select one of them as will carrying out the colony terminal that group key is provided with, execution in step A, otherwise, jump out this flow process;
And after execution in step C, execution in step A1.
11, method according to claim 1 is characterized in that, is set to the update group key described in the step C, or group key is set first.
12, method according to claim 1 is characterized in that, group key described in the steps A is provided with order and also comprises group id;
Before step B, further comprise:
Described colony terminal judges according to group id whether needs are provided with group key for self, if desired, and execution in step B then, otherwise, do not handle, jump out this flow process.
CNB031574378A 2003-09-19 2003-09-19 Group system group key managing method Expired - Fee Related CN100344183C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB031574378A CN100344183C (en) 2003-09-19 2003-09-19 Group system group key managing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB031574378A CN100344183C (en) 2003-09-19 2003-09-19 Group system group key managing method

Publications (2)

Publication Number Publication Date
CN1599484A true CN1599484A (en) 2005-03-23
CN100344183C CN100344183C (en) 2007-10-17

Family

ID=34660301

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB031574378A Expired - Fee Related CN100344183C (en) 2003-09-19 2003-09-19 Group system group key managing method

Country Status (1)

Country Link
CN (1) CN100344183C (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100344208C (en) * 2005-07-15 2007-10-17 华为技术有限公司 Identification method for preventing replay attack
CN101511082B (en) * 2008-02-15 2011-01-05 中国移动通信集团公司 Method, equipment and system for updating group cipher key
CN101291214B (en) * 2007-04-19 2011-08-10 华为技术有限公司 Group cipher key generating method, system and apparatus
CN102561678A (en) * 2012-01-12 2012-07-11 中国建筑第八工程局有限公司 Construction method of fair-faced concrete wall with wood grain finish
CN102571328A (en) * 2010-12-30 2012-07-11 中国移动通信集团公司 Method and system for invoking service of user terminal, and user terminal
CN102638794A (en) * 2007-03-22 2012-08-15 华为技术有限公司 Authentication and key negotiation method, and authentication method, system and equipment
CN101751986B (en) * 2008-12-11 2013-09-25 群联电子股份有限公司 Flash memory storing system and controller thereof, and data alteration resistant method
CN104980269A (en) * 2014-04-03 2015-10-14 华为技术有限公司 Secret key sharing method, device and system
CN106998320A (en) * 2016-01-25 2017-08-01 展讯通信(上海)有限公司 The transmission method and device of the group root key of cluster multi call

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5109384A (en) * 1988-11-02 1992-04-28 Tseung Lawrence C N Guaranteed reliable broadcast network
IL106796A (en) * 1993-08-25 1997-11-20 Algorithmic Res Ltd Broadcast encryption
US5748736A (en) * 1996-06-14 1998-05-05 Mittra; Suvo System and method for secure group communications via multicast or broadcast
US6049878A (en) * 1998-01-20 2000-04-11 Sun Microsystems, Inc. Efficient, secure multicasting with global knowledge
US6636968B1 (en) * 1999-03-25 2003-10-21 Koninklijke Philips Electronics N.V. Multi-node encryption and key delivery
US6240188B1 (en) * 1999-07-06 2001-05-29 Matsushita Electric Industrial Co., Ltd. Distributed group key management scheme for secure many-to-many communication

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100344208C (en) * 2005-07-15 2007-10-17 华为技术有限公司 Identification method for preventing replay attack
CN102638794A (en) * 2007-03-22 2012-08-15 华为技术有限公司 Authentication and key negotiation method, and authentication method, system and equipment
CN102638794B (en) * 2007-03-22 2016-03-30 华为技术有限公司 Authentication and cryptographic key negotiation method, authentication method, system and equipment
CN101291214B (en) * 2007-04-19 2011-08-10 华为技术有限公司 Group cipher key generating method, system and apparatus
CN101511082B (en) * 2008-02-15 2011-01-05 中国移动通信集团公司 Method, equipment and system for updating group cipher key
CN101751986B (en) * 2008-12-11 2013-09-25 群联电子股份有限公司 Flash memory storing system and controller thereof, and data alteration resistant method
CN102571328A (en) * 2010-12-30 2012-07-11 中国移动通信集团公司 Method and system for invoking service of user terminal, and user terminal
CN102571328B (en) * 2010-12-30 2016-01-27 中国移动通信集团公司 The service calling method of user terminal, system and user terminal
CN102561678A (en) * 2012-01-12 2012-07-11 中国建筑第八工程局有限公司 Construction method of fair-faced concrete wall with wood grain finish
CN104980269A (en) * 2014-04-03 2015-10-14 华为技术有限公司 Secret key sharing method, device and system
CN106998320A (en) * 2016-01-25 2017-08-01 展讯通信(上海)有限公司 The transmission method and device of the group root key of cluster multi call

Also Published As

Publication number Publication date
CN100344183C (en) 2007-10-17

Similar Documents

Publication Publication Date Title
CN101094065B (en) Method and system for distributing cipher key in wireless communication network
CN102291680B (en) Encrypted group calling method based on long term evolution (TD-LTE) trunking communication system
CN101137123B (en) Encrypted group calling, individual calling, and dynamic restructuring call implementing method of cluster system
CN101836470B (en) Methods and apparatuses for enabling non-access stratum (nas) security in LTE mobile units
CN102170636B (en) Methods and devices for computing shared encryption key
CN101242630B (en) Method, device and network system for secure algorithm negotiation
CN103369523A (en) Method for improving cluster downlink safety
CN1878058B (en) Subscriber terminal cipher key update method used in broadcast service
RU2014126582A (en) SIMPLIFIED MANAGEMENT OF GROUP SECRET KEYS
CN100344183C (en) Group system group key managing method
CN100359968C (en) Method for changing group key in group system
CN1705261A (en) End-to-end encrypting communication system and method
CN100456669C (en) Method of distributing group secret keys
US10601586B2 (en) Method and apparatus for key management of end encrypted transmission
CN101651944B (en) Cluster system and encrypted communication method
CN105515757B (en) Security information exchange device based on credible performing environment
US20150200779A1 (en) Method, System, And Terminal For Communication Between Cluster System Encryption Terminal And Encryption Module
CN101364866B (en) Entity secret talk establishing system based on multiple key distribution centers and method therefor
CN100387091C (en) Method of carrying out fast calling setup
CN101043660A (en) Method for realizing end-to-end encrypting call in cluster system
WO2017012425A1 (en) Method for managing shared channel of broadband cluster system, system, terminal and base station
CN102325321B (en) Secret key obtaining method in evolution wireless communication network and user equipment
CN111083700A (en) 5G terminal equipment access method, equipment and storage medium based on block chain
WO2018137617A1 (en) Secure small data transmission method and device utilized in mobile network
CN108156112B (en) Data encryption method, electronic equipment and network side equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20071017

Termination date: 20150919

EXPY Termination of patent right or utility model