CN1599484A - Group system group key managing method - Google Patents
Group system group key managing method Download PDFInfo
- Publication number
- CN1599484A CN1599484A CN 03157437 CN03157437A CN1599484A CN 1599484 A CN1599484 A CN 1599484A CN 03157437 CN03157437 CN 03157437 CN 03157437 A CN03157437 A CN 03157437A CN 1599484 A CN1599484 A CN 1599484A
- Authority
- CN
- China
- Prior art keywords
- group key
- group
- colony terminal
- key
- network side
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
This invention discloses a management method to set cryptographic keys by a cluster system including: A The network takes the CK corresponding to the cluster end set with key(CK) as the CK and ciphers it to get a SKG1 to compute a first abstract according to the set cryptographic keys, then an order carried with SKG1 and the first abstract is delivered to said cluster terminal, B The terminal deciphers the SKG1 by its own CK to get a set CK and computes a second abstract based on said CK, compares if the second is in conformity with the first, if so, step C is carried out, if not, the set design is lost and jumps out of the flow C. Said terminal utilizes the set CK deciphered in step B to design.
Description
Technical field
The present invention relates to the safety management technology of group system, be meant a kind of management method of group system group key especially.
Background technology
Wireless trunking communication system, hereinafter to be referred as group system, be a kind of less expensive, command dispatching and communication system more flexibly, be widely used in units such as government bodies, energy traffic, airport harbour, industrial and mining enterprises, fire-fighting police, water conservancy and military affairs, to satisfy the needs of constituent parts intercommunication.
It is voice group call service (VGCS) that group system provides the most basic business.VGCS allows the user to be established to the one group of user's who belongs to a certain given service area and group id (GID) calling, the professional employing semiduplex mode that provides, any member can become the speaker during the calling, but arbitrary moment only allow a speaker, other members are the hearer.Service area can be made up of some sub-districts that belong to same mobile switching centre (MSC) or different MS C, each related cell has a group-calling channel during calling, wherein up link is only used for current talker, can be described as the group emission mode, all hearers wait on down link, can be described as group receive mode, the notification message of group-calling channel configuration is broadcasted on notification channel (NCH) notification channel.Because same community user is shared a down channel, thereby has saved Radio Resource greatly.
Public security, military contour confidentiality unit have relatively high expectations for communication security, require group-calling service is carried out End to End Encryption.Because group calling is a kind of communication of multi-to-multi, so necessarily require shared group key (KG) between each member of same group, the End to End Encryption key and the integrity protection key that use when being used to generate each group calling.And KG and corresponding GID are kept in each user's Subscriber Identity Module (SIM) card, and network side also needs to preserve the KG of GID correspondence.
When the control centre dynamically builds group, need distribute new group key for each group membership; Based on the consideration of safety, each key has certain life cycle in addition, so the control centre also may initiate periodic group key management.When the certain user withdraws from group in addition, cancelled its group authority because of certain terminal is stolen as the control centre, the group key that also must upgrade other group membership can not continue to participate in cluster group calling to guarantee the user who is cancelled authority.
The management method of group key comprises following several technical scheme in the existing group system.
First kind: KMC is a plurality of fixing group keys of each group allocation, and each group key comes unique definite by the group key sign.These fixing group key sequences write in each group membership's the SIM card by the special SIM card read-write equipment.When carrying out group calling or multicast service, when promptly needing to use encryption function, can identify by the group key in professional promoter or the network selecting group key system, and with selected group key as add, decruption key, and with every user who participates in group service in the pairing sign of this key notice group.
In group system, each group member is not changeless.When group increased the newcomer, if just simply original group key is write newcomer's SIM card, then this member who increases newly can use group key to decrypt former group communication information.And certain member may withdraw from this group in the group, and this member can not continue to participate in this group service according to the rules, if but group key does not in time obtain renewal, and the member who has withdrawed from so still can decrypt the secure communication of group.As seen, group key is carried out safety, upgrades for ensureing that group communication safety is very necessary timely.And adopt first kind of technical scheme more during new key, and need special-purpose SIM card read-write equipment, in time obtain upgrading so be difficult to guarantee group key, therefore can't guarantee the group system secure communication.
Second kind, consult to produce group key by the group membership.The starting point of this technical scheme is that the Diffie-Hellman IKE that will be used for two side's key agreements expands to group communication.
Group's Diffie-Hellman IKE is described below: n member arranged in the group, be designated as M respectively
1, M
2... M
n, disclose a big prime number q with and primitive element α, the computing in the agreement is all carried out on finite field gf (q).Key agreement is divided into up (n-1) wheel and descending (n-1) two stages of wheel, and finally each member can both calculate group key α
N1N2...Nn, N wherein
iBe member M
iThe independent random number that produces and maintain secrecy.
In the up stage, member M
iCalculate the N of last element of its set that receives
iInferior power is issued M together with the numerical value that receives then
I+1, and in the descending stage, user M
iCalculate the N of the last element of its set that receives
iInferior power is as group key, then the N of other element in the set of computations
iInferior power, and send to M
I-1As shown in table 1, at uplink interaction stage: i wheel, i=1 ..., n-1, M
iTo M
I+1Send
In the descending mutual stage, the n-1+i wheel, i=1 ..., n-1M
N-iTo M
N-i+1Send
Table 1
With n=5 is example, in the uplink interaction stage, and user M
4To receive set { α
N1, α
N1N2, α
N1N2N3, he utilizes α
N1N2N3With the random number N that oneself generates
4Calculate α
N1N2N3N4, and send { α
N1, α
N1N2, α
N1N2N3, α
N1N2N3N4To M
5M
5Utilize α
N1N2N3N4Calculate final group key α
N1N2N3N4N5And preserve, after this be the descending mutual stage, M
5Calculate the median set and send to M
4, user M
4Receive set { α
N4N5, α
N1N4N5, α
N1N2N4N5, utilize α
N1N2N3N5Also can calculate final key, calculate median set { α then
N5, α
N1N5, α
N1N2N5, α
N1N2N3N5Send to M
3
In this scheme, group key is consulted to produce by n group membership, needs mutual through between the inferior group membership of 2 (n-1) altogether.For wireless system, the request channel resource that all needs alternately between each group membership connects, and certainly leads to huge system resources consumption like this; And in the process that produces group key, each group membership will carry out repeatedly large module power multiplication, and the computing capability of portable terminal is limited at present, and numerical value will exceed the computer capacity of portable terminal too greatly sometimes.
Summary of the invention
In view of this, the purpose of this invention is to provide the management method of group key in a kind of group system, make it adapt to group system group membership's dynamic change, make the group system communication security.
The management method of group key comprises in a kind of group system provided by the invention:
A. network side group key will be set the pairing CK of colony terminal as key, the group key that will be provided with is encrypted and is obtained SKG
i,, calculate first summary according to the described group key that will be provided with simultaneously according to certain algorithm; To carry SKG then
i, first summary group key order be set be sent to described colony terminal;
B. described colony terminal utilizes the CK of self that the SKGi deciphering of receiving is obtained group key, and according to algorithm identical in the steps A, calculate second summary according to oneself deciphering the group key that obtains, relatively whether second summary is consistent with first summary, if consistent, execution in step C then, otherwise, group key is provided with failure, jumps out this flow process;
C. described colony terminal utilizes the group key that decrypts among the step B to be provided with.
First summary described in the steps A is the described colony terminal group key management sequence number calculating of network side according to described group key that will be provided with and network side preservation;
Group key described in the steps A is provided with order and also comprises colony terminal group key management sequence number;
The then described colony terminal group key management sequence number calculating that sends of group key that to be described colony terminal obtain according to own deciphering of second summary described in the step B and network side.
Before execution in step C, this method may further include:
C1, described colony terminal are judged the described colony terminal group key management sequence number of network side preservation whether greater than the group key management sequence number of self preserving, if greater than, execution in step C then, otherwise group key is provided with failure, jumps out this flow process.
First summary described in the steps A is that network side calculates according to described group key that will be provided with and current time;
Group key described in the steps A is provided with order and comprises that also network side will calculate the current time of first summary;
Second summary described in the step B is that described colony terminal calculates according to group key that will be provided with and current time.
Before execution in step C, this method may further include:
C2, described colony terminal judge calculate second summary time whether greater than time of described calculating first summary and both differences whether within predefined scope, if, execution in step C then, otherwise group key is provided with failure, jumps out this flow process.
Step C can comprise:
Colony terminal judges whether self has the group id record, if have, then utilize the described group id of the group key management that self decrypts to write down pairing group key, if do not have, then increase group id record list item, the group key that self is decrypted is kept in the group id record list item again.
After step C, this method may further include: described colony terminal informing network side group key is provided with success, and network side upgrades the management accounts of self preserving according to this result.
The group key that will be provided with described in the steps A is the random sequence that network side produces.
After group key was provided with failure, this method may further include: described colony terminal informing network side group key is provided with failure.
This method may further include: set in advance the cluster group membership tabulation that is in state of activation, further before execution in step A:
A1, according to described cluster group membership tabulation, judge whether to have or not and finish the colony terminal that this group key is provided with, if also have, select one of them as will carrying out the colony terminal that group key is provided with, execution in step A, otherwise, jump out this flow process;
And after execution in step C, execution in step A1.
Be set to the update group key described in the step C, or group key is set first.
Group key described in the steps A is provided with order can also comprise group id;
Then before step B, further comprise: described colony terminal judges according to group id whether needs are provided with group key for self, if desired, and execution in step B then, otherwise, do not handle, jump out this flow process.
The present invention determines the group key that will be provided with by network side, and after encrypting with the group key that the security information CK that each group membership and network in the cluster group are shared will be provided with as key, by each group membership of signaling, calculate simple, convenient; And owing to use summary info, thereby ensured the integrality of key updating signaling, also can differentiate promoter's true identity; This method also uses SQN or time stamp to resist playback group key change Signaling attack, so safe.
Description of drawings
Fig. 1 is for realizing the schematic flow sheet of the inventive method;
Fig. 2 is for realizing the specific embodiment one flow process schematic diagram of the inventive method;
Fig. 3 is for realizing the specific embodiment two flow process schematic diagrames of the inventive method.
Embodiment
For wireless system, network equipment can be used as believable KMC, directly grasps the group key of group system.Therefore, for the production process of simplifying group key and the safety of group system, method of the present invention is to determine the group key that will be provided with by network side, and the security information CK that shares with each group membership and network in the cluster group is as key, the group key that will be provided with is encrypted, and then by each group membership of signaling; Each group membership utilizes the CK of self that the group key that will be provided with is decrypted, and obtains the group key that will be provided with.
Participate in shown in Figure 1ly, realize that the detailed process of the inventive method is as follows:
Step 101: network side will be provided with the pairing CK of colony terminal of group key as key, and the group key that will be provided with is encrypted and obtained SKG
i,, calculate first summary according to the described group key that will be provided with simultaneously according to certain algorithm; To carry SKG then
i, first summary group key order be set be sent to described colony terminal;
Step 102: described colony terminal utilizes the CK of self that SKGi is deciphered and obtains group key, and according to algorithm same in the step 101, calculate second summary according to oneself deciphering the group key that obtains, relatively whether second summary is consistent with first summary, if consistent, then execution in step 103, otherwise, group key is provided with failure, jumps out this flow process;
Step 103: this colony terminal utilizes the group key that self decrypts that group key is set.The setting here comprises two kinds of situations, and self has preserved group key, and be the update group key this moment; Another kind is that group key is set first.
Certainly, if being provided with order, group key described in the step 101 also comprises group id, then before step 102, colony terminal judges according to the group id that receives whether needs are provided with group key for self, and if desired, then execution in step 102, otherwise, do not handle, jump out this flow process.
Describe technical scheme of the present invention in detail below in conjunction with the drawings and specific embodiments.
In group system, each colony terminal, i.e. each group membership shares a secret data CK with network side respectively, is used for communicating by letter between refined net and user.Present embodiment has used CK in the process of carrying out group key management, cryptographic algorithm f
E, decipherment algorithm f
D, digest algorithm H.
Referring to shown in Figure 2, the detailed process of present embodiment management group key is as follows:
Step 201: when group key management and group key distribution flow are initiated in the network side decision, generate a random sequence as new K
G, i.e. the group key that will be provided with, and generation is in group membership's tabulation of state of activation, notifies user's update group key one by one according to step 202~209.
Step 202: network side is obtained pairing CK of group membership I and SQN, and wherein, SQN represents the sequence number of user's group key management situation; Use the pairing CK of group membership I as key then, use cryptographic algorithm f
EEncrypt K
GObtain SKGi, i.e. SKGi=f
E(CKi, K
G).
Step 203: network side utilizes digest algorithm H, SQNi and K
G, calculate first summary DIGTi=H (SQNi, the K
G).
Step 204: network side sends the group key management instruction that carries GID, SKGi, SQNi and DIGTi to group membership I.
Step 205: after group membership I receives the group key management instruction that carries GID, SKGi, SQNi and DIGTi, decipher SKGi, obtain rec_KG with own CK, promptly rec_KG=fD (CKi, SKGi).
Step 206: group membership I calculates second summary according to SQNi and rec_KG, be rec_DIGT=H (SQNi, rec_KG), and whether the second summary rec_DIGT that relatively self calculates is consistent with the first summary DIGTi that network side calculates, if consistent, then execution in step 207, otherwise, group key is provided with failure, and the informing network side, jumps out this flow process.
Step 207: whether group membership I judges SQNi greater than the group key management sequence number SQN that self preserves, if greater than, think that then the group key management instruction is legal, execution in step 208, otherwise loopback key updating failed signaling is jumped out this flow process.
Step 208: group membership I utilizes self rec_KG of drawing of deciphering that group key is set.After the success of group membership I update group key, send group key management success signaling, and SQN in the SIM card is updated to SQNi to network side.
Here, if in the group ID tabulation GID is arranged in group membership I self SIM card, then the pairing group key management of this GID of institute is rec_KG, is GID otherwise increase a group ID, and group key is the record of rec_KG.
Step 209: network side is updated to SQNi+1 with the corresponding SQN of group membership I after receiving the group key management affirmation signaling of group membership I, and the group key of mark group membership I upgrades.
The group key that said process has only been described a colony terminal is provided with, and current being in the activation tabulation too may comprise a plurality of group memberships, and network side wants repeated execution of steps 202~209 to finish.Certainly, for the current group membership who is not in state of activation, can when carrying out location registers, it use same process that its group key is set.
Lift specific embodiment two below and describe technical scheme of the present invention in detail.
Referring to shown in Figure 3, the detailed process that present embodiment carries out group key management is as follows:
Step 301: when group key management and group key distribution flow are initiated in the network side decision, generate a random sequence as new K
G, and generate the group membership's tabulation that is in state of activation, notify user's update group key one by one according to step 302~309.
Step 302: the pairing CK of group membership I that network side is preserved according to self, and with this CK as key, use cryptographic algorithm f
EEncrypt K
G, obtain SKGi, i.e. SKGi=f
E(CKi, K
G).
Step 303: network side utilizes abstract function H, K
GWith current time TS, calculate the first summary DIGT
i, DIGT
i=H (TS, K
G);
Step 304: network side sends to group membership I and carries GID, SKG
i, TS and DIGT
iGroup key management instruction.
Step 305: after group membership I receives the group key management instruction that carries GID, SKGi, SQNi and DIGTi, decipher SKGi, obtain rec_KG with own CK, promptly rec_KG=fD (CKi, SKGi).
Step 306: group membership I obtains rec_KG according to current time and self deciphering, calculate the second summary rec_DIGT, be rec_DIGT=H (TS, rec_KG), and the second summary rec_DIGT and the first summary DIGT are compared, if consistent, it is legal to think that then this group key is provided with, otherwise key is provided with failure.
Step 307: group membership I is TS and current time TS` relatively, if TS` greater than TS and both differences in predefined time range, think that then the group key management instruction is legal, utilize the group key that self decrypts to be provided with, execution in step 308 then, otherwise, send the key updating failed signaling to network side.
Here, if had GID in the group ID tabulation in the SIM card of group membership I, group membership I then utilizes rec_KG to upgrade the pairing group key of GID, otherwise increasing a group ID in the SIM card of self is that GID, group key are the record of rec_KG.And described time range is mainly set according to the transmission time of signaling.
Step 308: after the success of group membership I update group key, informing network side group key management success signaling.After network side received the group key management success signaling of group membership I, the group key of mark group membership I upgraded.
With embodiment illustrated in fig. 2 different be that present embodiment utilizes time stab information to replace SQN to resist multi-sending attack, such as the cdma system in the network that adopts the whole network synchronised clock.Utilize this method need not preserve SQN information, can save memory space at network side and terminal.
Claims (12)
1, a kind of management method of group system group key is characterized in that, this method may further comprise the steps:
A. network side group key will be set the pairing CK of colony terminal as key, the group key that will be provided with is encrypted and is obtained SKG
i,, calculate first summary according to the described group key that will be provided with simultaneously according to certain algorithm; To carry SKG then
i, first summary group key order be set be sent to described colony terminal;
B. described colony terminal utilizes the SKG of CK to receiving of self
iDeciphering obtains group key, and according to algorithm identical in the steps A, calculates second summary according to oneself deciphering the group key that obtains, relatively whether second summary is consistent with first summary, if unanimity, then execution in step C, otherwise group key is provided with failure, jumps out this flow process;
C. described colony terminal utilizes the group key that decrypts among the step B to be provided with.
2, method according to claim 1 is characterized in that,
First summary described in the steps A is the described colony terminal group key management sequence number calculating of network side according to described group key that will be provided with and network side preservation;
Group key described in the steps A is provided with order and also comprises colony terminal group key management sequence number;
The then described colony terminal group key management sequence number calculating that sends of group key that to be described colony terminal obtain according to own deciphering of second summary described in the step B and network side.
3, method according to claim 2 is characterized in that, before execution in step C, this method further comprises:
C1, described colony terminal are judged the described colony terminal group key management sequence number of network side preservation whether greater than the group key management sequence number of self preserving, if greater than, execution in step C then, otherwise group key is provided with failure, jumps out this flow process.
4, method according to claim 1 is characterized in that, first summary described in the steps A is that network side calculates according to described group key that will be provided with and current time;
Group key described in the steps A is provided with order and comprises that also network side will calculate the current time of first summary;
Second summary described in the step B is that described colony terminal calculates according to group key that will be provided with and current time.
5, method according to claim 4 is characterized in that, before execution in step C, this method further comprises:
C2, described colony terminal judge calculate second summary time whether greater than time of described calculating first summary and both differences whether within predefined scope, if, execution in step C then, otherwise group key is provided with failure, jumps out this flow process.
6, method according to claim 1 is characterized in that, step C comprises:
Colony terminal judges whether self has the group id record, if have, then utilize the described group id of the group key management that self decrypts to write down pairing group key, if do not have, then increase group id record list item, the group key that self is decrypted is kept in the group id record list item again.
7, method according to claim 1 is characterized in that, after step C, this method further comprises: described colony terminal informing network side group key is provided with success, and network side upgrades the management accounts of self preserving according to this result.
8, method according to claim 1 is characterized in that, the group key that will be provided with described in the steps A is the random sequence that network side produces.
9, method according to claim 1 is characterized in that, after group key was provided with failure, this method further comprised: described colony terminal informing network side group key is provided with failure.
10, method according to claim 1 is characterized in that, this method further comprises: set in advance the cluster group membership tabulation that is in state of activation, further before execution in step A:
A1, according to described cluster group membership tabulation, judge whether to have or not and finish the colony terminal that this group key is provided with, if also have, select one of them as will carrying out the colony terminal that group key is provided with, execution in step A, otherwise, jump out this flow process;
And after execution in step C, execution in step A1.
11, method according to claim 1 is characterized in that, is set to the update group key described in the step C, or group key is set first.
12, method according to claim 1 is characterized in that, group key described in the steps A is provided with order and also comprises group id;
Before step B, further comprise:
Described colony terminal judges according to group id whether needs are provided with group key for self, if desired, and execution in step B then, otherwise, do not handle, jump out this flow process.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB031574378A CN100344183C (en) | 2003-09-19 | 2003-09-19 | Group system group key managing method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB031574378A CN100344183C (en) | 2003-09-19 | 2003-09-19 | Group system group key managing method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1599484A true CN1599484A (en) | 2005-03-23 |
CN100344183C CN100344183C (en) | 2007-10-17 |
Family
ID=34660301
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB031574378A Expired - Fee Related CN100344183C (en) | 2003-09-19 | 2003-09-19 | Group system group key managing method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100344183C (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100344208C (en) * | 2005-07-15 | 2007-10-17 | 华为技术有限公司 | Identification method for preventing replay attack |
CN101511082B (en) * | 2008-02-15 | 2011-01-05 | 中国移动通信集团公司 | Method, equipment and system for updating group cipher key |
CN101291214B (en) * | 2007-04-19 | 2011-08-10 | 华为技术有限公司 | Group cipher key generating method, system and apparatus |
CN102561678A (en) * | 2012-01-12 | 2012-07-11 | 中国建筑第八工程局有限公司 | Construction method of fair-faced concrete wall with wood grain finish |
CN102571328A (en) * | 2010-12-30 | 2012-07-11 | 中国移动通信集团公司 | Method and system for invoking service of user terminal, and user terminal |
CN102638794A (en) * | 2007-03-22 | 2012-08-15 | 华为技术有限公司 | Authentication and key negotiation method, and authentication method, system and equipment |
CN101751986B (en) * | 2008-12-11 | 2013-09-25 | 群联电子股份有限公司 | Flash memory storing system and controller thereof, and data alteration resistant method |
CN104980269A (en) * | 2014-04-03 | 2015-10-14 | 华为技术有限公司 | Secret key sharing method, device and system |
CN106998320A (en) * | 2016-01-25 | 2017-08-01 | 展讯通信(上海)有限公司 | The transmission method and device of the group root key of cluster multi call |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5109384A (en) * | 1988-11-02 | 1992-04-28 | Tseung Lawrence C N | Guaranteed reliable broadcast network |
IL106796A (en) * | 1993-08-25 | 1997-11-20 | Algorithmic Res Ltd | Broadcast encryption |
US5748736A (en) * | 1996-06-14 | 1998-05-05 | Mittra; Suvo | System and method for secure group communications via multicast or broadcast |
US6049878A (en) * | 1998-01-20 | 2000-04-11 | Sun Microsystems, Inc. | Efficient, secure multicasting with global knowledge |
US6636968B1 (en) * | 1999-03-25 | 2003-10-21 | Koninklijke Philips Electronics N.V. | Multi-node encryption and key delivery |
US6240188B1 (en) * | 1999-07-06 | 2001-05-29 | Matsushita Electric Industrial Co., Ltd. | Distributed group key management scheme for secure many-to-many communication |
-
2003
- 2003-09-19 CN CNB031574378A patent/CN100344183C/en not_active Expired - Fee Related
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100344208C (en) * | 2005-07-15 | 2007-10-17 | 华为技术有限公司 | Identification method for preventing replay attack |
CN102638794A (en) * | 2007-03-22 | 2012-08-15 | 华为技术有限公司 | Authentication and key negotiation method, and authentication method, system and equipment |
CN102638794B (en) * | 2007-03-22 | 2016-03-30 | 华为技术有限公司 | Authentication and cryptographic key negotiation method, authentication method, system and equipment |
CN101291214B (en) * | 2007-04-19 | 2011-08-10 | 华为技术有限公司 | Group cipher key generating method, system and apparatus |
CN101511082B (en) * | 2008-02-15 | 2011-01-05 | 中国移动通信集团公司 | Method, equipment and system for updating group cipher key |
CN101751986B (en) * | 2008-12-11 | 2013-09-25 | 群联电子股份有限公司 | Flash memory storing system and controller thereof, and data alteration resistant method |
CN102571328A (en) * | 2010-12-30 | 2012-07-11 | 中国移动通信集团公司 | Method and system for invoking service of user terminal, and user terminal |
CN102571328B (en) * | 2010-12-30 | 2016-01-27 | 中国移动通信集团公司 | The service calling method of user terminal, system and user terminal |
CN102561678A (en) * | 2012-01-12 | 2012-07-11 | 中国建筑第八工程局有限公司 | Construction method of fair-faced concrete wall with wood grain finish |
CN104980269A (en) * | 2014-04-03 | 2015-10-14 | 华为技术有限公司 | Secret key sharing method, device and system |
CN106998320A (en) * | 2016-01-25 | 2017-08-01 | 展讯通信(上海)有限公司 | The transmission method and device of the group root key of cluster multi call |
Also Published As
Publication number | Publication date |
---|---|
CN100344183C (en) | 2007-10-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101094065B (en) | Method and system for distributing cipher key in wireless communication network | |
CN102291680B (en) | Encrypted group calling method based on long term evolution (TD-LTE) trunking communication system | |
CN101137123B (en) | Encrypted group calling, individual calling, and dynamic restructuring call implementing method of cluster system | |
CN101836470B (en) | Methods and apparatuses for enabling non-access stratum (nas) security in LTE mobile units | |
CN102170636B (en) | Methods and devices for computing shared encryption key | |
CN101242630B (en) | Method, device and network system for secure algorithm negotiation | |
CN103369523A (en) | Method for improving cluster downlink safety | |
CN1878058B (en) | Subscriber terminal cipher key update method used in broadcast service | |
RU2014126582A (en) | SIMPLIFIED MANAGEMENT OF GROUP SECRET KEYS | |
CN100344183C (en) | Group system group key managing method | |
CN100359968C (en) | Method for changing group key in group system | |
CN1705261A (en) | End-to-end encrypting communication system and method | |
CN100456669C (en) | Method of distributing group secret keys | |
US10601586B2 (en) | Method and apparatus for key management of end encrypted transmission | |
CN101651944B (en) | Cluster system and encrypted communication method | |
CN105515757B (en) | Security information exchange device based on credible performing environment | |
US20150200779A1 (en) | Method, System, And Terminal For Communication Between Cluster System Encryption Terminal And Encryption Module | |
CN101364866B (en) | Entity secret talk establishing system based on multiple key distribution centers and method therefor | |
CN100387091C (en) | Method of carrying out fast calling setup | |
CN101043660A (en) | Method for realizing end-to-end encrypting call in cluster system | |
WO2017012425A1 (en) | Method for managing shared channel of broadband cluster system, system, terminal and base station | |
CN102325321B (en) | Secret key obtaining method in evolution wireless communication network and user equipment | |
CN111083700A (en) | 5G terminal equipment access method, equipment and storage medium based on block chain | |
WO2018137617A1 (en) | Secure small data transmission method and device utilized in mobile network | |
CN108156112B (en) | Data encryption method, electronic equipment and network side equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20071017 Termination date: 20150919 |
|
EXPY | Termination of patent right or utility model |