WO2018129652A1 - 集群组呼解密方法及用户设备 - Google Patents

集群组呼解密方法及用户设备 Download PDF

Info

Publication number
WO2018129652A1
WO2018129652A1 PCT/CN2017/070744 CN2017070744W WO2018129652A1 WO 2018129652 A1 WO2018129652 A1 WO 2018129652A1 CN 2017070744 W CN2017070744 W CN 2017070744W WO 2018129652 A1 WO2018129652 A1 WO 2018129652A1
Authority
WO
WIPO (PCT)
Prior art keywords
group call
target cell
superframe number
base station
user equipment
Prior art date
Application number
PCT/CN2017/070744
Other languages
English (en)
French (fr)
Inventor
张祥云
Original Assignee
海能达通信股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 海能达通信股份有限公司 filed Critical 海能达通信股份有限公司
Priority to DE112017006767.7T priority Critical patent/DE112017006767T5/de
Priority to US16/476,812 priority patent/US11057765B2/en
Priority to PCT/CN2017/070744 priority patent/WO2018129652A1/zh
Publication of WO2018129652A1 publication Critical patent/WO2018129652A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/146Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/46Arrangements for calling a number of substations in a predetermined sequence until an answer is obtained
    • H04M3/465Arrangements for simultaneously calling a number of substations until an answer is obtained
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0433Key management protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • H04W12/45Security arrangements using identity modules using multiple identity modules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/34Reselection control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/065Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/08Reselecting an access point

Definitions

  • the present invention relates to the field of mobile communications, and in particular, to a cluster group call decryption method and user equipment.
  • the cells in the base station establish a session and apply the encryption parameters to send the call code stream.
  • the encryption parameters of each cell may be inconsistent and the encryption context is not synchronized. Therefore, when the user equipment switches from the current cell to the adjacent target cell, The encryption parameters and status of the target cell must be obtained for decryption, resulting in a longer delay in the group call service interruption.
  • the technical problem to be solved by the present invention is to provide a cluster group call decryption method and user equipment, so as to reduce the group call service interruption delay and improve the user experience.
  • a technical solution adopted by the present invention is to provide a cluster group call decryption method, and the method is applied to user equipment, including:
  • the step of receiving the group call data from the base station of the target cell and obtaining the range of the superframe number of the target cell according to the first superframe number includes:
  • the second superframe number is within a range of [X-M, X+N], where X is the first superframe number, and M and N are both natural numbers;
  • the step of traversing the second superframe number according to the interval range of the second superframe number and obtaining the plaintext according to the second superframe number includes:
  • the step of traversing the second superframe number to decrypt successfully, and performing the decryption operation according to the second superframe number includes:
  • the order of traversing the second superframe number is:
  • M and N are set to 2.
  • the step of switching from the current cell to the target cell includes:
  • the step of performing a decryption operation according to the second superframe number includes:
  • the method further includes: before the step of receiving the encrypted group call data of the target cell, the method further includes:
  • the base station of the target cell receives the encrypted group call data of the target cell, and sends the key of the target cell to the base station of the current cell, and then the base station of the current cell The key of the target cell is sent to the user equipment.
  • the step of switching from the current cell to the target cell includes:
  • a technical solution adopted by the present invention is to provide a user equipment, where the user equipment includes:
  • the monitoring module is configured to monitor the group call data of the user equipment in the current cell, and obtain the superframe number of the current cell from the base station of the current cell as the first superframe number;
  • a transceiver module configured to receive group call data from a base station of the target cell and obtain a superframe number of the target cell according to the first superframe number, when the user equipment is handed over from the current cell to a target cell
  • the range of the interval, the superframe number of the target cell is a second superframe number
  • a processing module configured to connect the monitoring module and the transceiver module, to traverse the second superframe number according to the interval range of the second superframe number, and obtain a plaintext according to the second superframe number, and The group call session information included in the description is compared with the group call data of the current cell. If the comparison result is consistent, the traversing the second superframe number is successfully decrypted, and the decryption operation is performed according to the second superframe number.
  • the second superframe number is within a range of [XM, X+N], where X is the first superframe number, and M and N are both natural numbers; in the [XM, X+N The value of the second superframe number is changed within a range of the interval, and the processing module performs a decryption operation according to the changed value of the second superframe number to obtain the plaintext.
  • the order in which the processing module traverses the second superframe number is:
  • M and N are set to 2.
  • the user equipment further includes an establishing module and a key module.
  • the establishing module initiates and establishes a group call session, so that the base station establishes a cluster service bearer. Adding a field to carry the encryption parameter of the group call data, and saving the encryption parameter;
  • the key module adds or multiplexes one of the signalings to carry the current cell session key identifier or directly carries the key of the current cell. ;
  • the transceiver module receives the encrypted group call data of the target cell
  • the processing module performs a decryption operation on the encrypted group call data of the target cell according to the second superframe number.
  • the key module further sends the current cell session key identifier or the key of the current cell to the base station of the target cell, and the base station of the target cell identifies the current cell session key or the location Comparing the key of the current cell with the key of the target cell;
  • the transceiver module receives the encrypted group call data of the target cell from the base station of the target cell;
  • the base station of the target cell receives the encrypted group call data of the target cell, and sends the key of the target cell to the base station of the current cell, and then the base station of the current cell The key of the target cell is sent to the user equipment.
  • the user equipment further includes an establishing module, where the establishing module initiates and establishes a group call session, so that the base station adds a cluster service bearer when the user equipment is switched from the current cell to the target cell.
  • the field carries the group call encryption parameter, and saves the group call encryption parameter;
  • the transceiver module receives encrypted group call data of the target cell from a base station of the target cell.
  • a technical solution adopted by the present invention is to provide a user equipment, where the user equipment includes:
  • a memory for storing program instructions
  • the processor is configured to monitor the group call data of the user equipment in the current cell, and obtain the superframe number of the current cell from the base station of the current cell as the first superframe number;
  • the processor is further configured to: when the user equipment is handed over from the current cell to a target cell, receive group call data from a base station of the target cell, and obtain the target cell according to the first superframe number. a range of the superframe number, where the superframe number of the target cell is a second superframe number;
  • a controller configured to traverse the second superframe number according to the interval range of the second superframe number, obtain a plaintext according to the second superframe number, and set the group call session information included in the plaintext The group call data of the current cell is compared. If the comparison result is consistent, the traversing of the second superframe number is successfully decrypted, and the decryption operation is performed according to the second superframe number.
  • the second superframe number is within a range of [XM, X+N], where X is the first superframe number, and M and N are both natural numbers; in the [XM, X+N The value of the second superframe number is changed within a range of the interval, and the processing module performs a decryption operation according to the changed value of the second superframe number to obtain the plaintext.
  • the order in which the processing module traverses the second superframe number is:
  • M and N are set to 2.
  • the processor When the user equipment is handed over from the current cell to the target cell, the processor initiates and establishes a group call session, so that when the base station establishes a cluster service bearer, a new field is added to carry the encryption parameter of the group call data. And saving the encryption parameter;
  • the processor When the user equipment is switched from the current cell to the target cell, the processor adds or multiplexes one of the signalings to carry the current cell session key identifier or directly carries the key of the current cell;
  • the controller performs a decryption operation on the encrypted group call data of the target cell according to the second superframe number.
  • the processor further sends the current cell session key identifier or the current cell key to the base station of the target cell, where the base station of the target cell identifies the current cell session key or the The key of the current cell is compared with the key of the target cell;
  • the processor receives the encrypted group call data of the target cell from the base station of the target cell;
  • the processor sends the key of the target cell to the base station of the current cell while receiving the encrypted group call data of the target cell from the base station of the target cell, and then by the current The base station of the cell sends the key of the target cell to the user equipment.
  • the processor When the user equipment is handed over from the current cell to the target cell, the processor initiates and establishes a group call session, so that the base station adds a field to carry the group call encryption parameter when establishing the cluster service bearer, and Saving the group call encryption parameter;
  • the processor receives encrypted group call data of the target cell from a base station of the target cell.
  • the cluster group call decryption method of the present invention is deduced according to the first superframe number of the current cell in the current cell when the user equipment switches from the current cell to the target cell. Deriving a reasonable range of the second superframe number of the target cell, traversing the second superframe number according to the interval range of the second superframe number, and performing traversal decryption according to the second superframe number, and successfully decrypting Then, the decryption operation is performed according to the second superframe number, thereby reducing the group call service interruption delay and improving the user experience.
  • FIG. 1 is a flowchart of a cluster group call decryption method of the present invention
  • Figure 2 is a flow chart of a first embodiment of the specific steps of Figure 1;
  • FIG. 3 is a flow chart of the specific steps in Figure 2;
  • Figure 4 is a flow chart of a second embodiment of the specific steps of Figure 1;
  • FIG. 5 is a block diagram showing the structure of a user equipment based on a cluster group call decryption method according to the present invention
  • FIG. 6 is a schematic diagram showing the hardware structure of a user equipment based on the cluster group call decryption method of the present invention.
  • FIG. 1 is a flowchart of a cluster group call decryption method according to the present invention.
  • the method disclosed in this embodiment is applied to a user equipment, and the method includes the following steps:
  • Step S1 Listening to the group call data of the current cell, and acquiring the superframe number of the current cell from the base station of the current cell as the first superframe number.
  • the base call data transmission is performed between each base station and multiple cells.
  • the current cell and the target cell may perform group call data transmission with the same base station, or may be different from two.
  • the base station performs group call data transmission.
  • the cells in the base station establish a session synchronously, and apply the encryption parameters to send the call code stream to ensure that the number and content of the group call code streams of different cells are the same, so the packet data convergence protocol (Packet) The Super Frame Number (HFN) of the Data Convergence Protocol (PDCP) layer will be approximately the same.
  • Packet packet data convergence protocol
  • HFN Super Frame Number
  • PDCP Data Convergence Protocol
  • Step S2 When switching from the current cell to the target cell, receiving group call data from the base station of the target cell and obtaining a range of the superframe number of the target cell according to the first superframe number, The superframe number of the target cell is the second superframe number.
  • the second superframe number is in the range of [X-M, X+N], where X is the first superframe number, and M and N are both natural numbers.
  • the first embodiment of the step of switching from the current cell to the target cell in step S2 includes:
  • Step S21 Initiating and establishing a group call session, so that when the base station establishes a trunking service bearer, a new field is added to carry the encryption parameter of the group call data, and the encryption parameter is saved.
  • the calling user equipment When the group call service is established as the calling user equipment, the calling user equipment identifier and the area range information set by the calling user are obtained, and the first request for establishing a call is sent to the control device, where the first request includes the calling party.
  • User device ID, group call service type, and area range information set by the calling user may be a user terminal, an in-vehicle terminal, a dispatching station, or the like.
  • the control device may be a control center or a base station.
  • the group call setup request When receiving the group call setup request sent by the control device as the called user equipment, the group call setup request includes the calling user equipment identifier, the area range information set by the calling user, the assigned group identifier, and the service channel. Obtaining its own location information, and determining whether its own location is within the range of the area, and, when its own location is within the range of the area, participating in the group call service and switching to the traffic channel.
  • the group identification and the traffic channel may be allocated by the control center, or may be allocated by the base station, or one of the control centers may be allocated, and the other may be allocated by the base station.
  • Step S22 Switching from the current cell to the target cell, adding or multiplexing one of the signalings to carry the current cell session key identifier or directly carrying the key of the current cell.
  • the session key identifier can use shortMac-i.
  • Step S23 Receive encrypted group call data of the target cell.
  • Step S24 Perform a decryption operation on the encrypted group call data of the target cell according to the second superframe number.
  • step S22 a step is further included between step S22 and step S23:
  • Step S221 Send the current cell session key identifier or the key of the current cell to the base station of the target cell, where the base station of the target cell identifies the current cell session key or the current cell The key is compared with the key of the target cell to determine whether the key is consistent.
  • Step S222 If they are consistent, the encrypted group call data of the target cell is received from the base station of the target cell.
  • Step S223 If the data is inconsistent, the base station of the target cell receives the encrypted group call data of the target cell, and sends the key of the target cell to the base station of the current cell, and then the current cell. The base station sends the key of the target cell to the user equipment.
  • the user equipment switches from the current cell to the target cell in a connected state.
  • the second embodiment of the step of switching from the current cell to the target cell in step S2 includes:
  • Step S25 Initiating and establishing a group call session, so that when the base station establishes a trunking service bearer, a new field is added to carry the group call encryption parameter, and the group call encryption parameter is saved.
  • the calling user equipment When the group call service is established as the calling user equipment, the calling user equipment identifier and the area range information set by the calling user are obtained, and the first request for establishing a call is sent to the control device, where the first request includes the calling party.
  • User device ID, group call service type, and area range information set by the calling user may be a user terminal, an in-vehicle terminal, a dispatching station, or the like.
  • the control device may be a control center or a base station.
  • the group call setup request When receiving the group call setup request sent by the control device as the called user equipment, the group call setup request includes the calling user equipment identifier, the area range information set by the calling user, the assigned group identifier, and the service channel. Obtaining its own location information, and determining whether its own location is within the range of the area, and, when its own location is within the range of the area, participating in the group call service and switching to the traffic channel.
  • the group identification and the traffic channel may be allocated by the control center, or may be allocated by the base station, or one of the control centers may be allocated, and the other may be allocated by the base station.
  • Step S26 Receive encrypted group call data of the target cell from a base station of the target cell.
  • the user equipment switches from the current cell to the target cell in an idle state.
  • Step S3 traversing the second superframe number according to the interval range of the second superframe number, and obtaining a plaintext according to the second superframe number, and the group call session information included in the plaintext and the current The group call data of the cell is compared.
  • the plaintext according to the second superframe number is specifically: changing the value of the second superframe number within the interval of the [XM, X+N], and according to the changed second super
  • the value of the frame number is decrypted to obtain the plaintext.
  • Step S4 If the comparison result is consistent, the traversing of the second superframe number is successfully decrypted, and the decryption operation is performed according to the second superframe number.
  • the traversing the second superframe number is successfully decrypted.
  • the order of traversing the second superframe number is: X->X-1->X+1->X-2->X+2...- >XM...->X+N.
  • the group call data is configured as a PDCP SN.
  • M and N are set to 2
  • other group calls are configured to 1.
  • the decrypted input parameters are a superframe number, a key, a group call data ciphertext block, an encryption algorithm, and other parameters.
  • the standard decryption process is performed to obtain the plaintext, and the group call session information included in the plaintext is compared with the group call context of the user equipment in the current cell. If the comparison result is consistent, the traversal superframe number decryption process ends, and it is considered that The superframe number value is a valid value, and thereafter the superframe number value is maintained for decryption.
  • the cluster group call decryption method obtains a reasonable range of the second superframe number of the target cell according to the first superframe number of the current cell of the user equipment, and according to The second superframe number is traversed and decrypted, thereby reducing the group call service interruption delay and improving the user experience.
  • FIG. 5 is a block diagram of a user equipment of a cluster group call decryption method according to the present invention.
  • the user equipment includes an establishing module 10, a key module 20, a listening module 30, a transceiver module 40, and a processing module 50.
  • the monitoring module 30 is configured to monitor the group call data of the user equipment in the current cell, and obtain the superframe number of the current cell from the base station of the current cell as the first superframe number.
  • the base call data transmission is performed between each base station and multiple cells.
  • the current cell and the target cell may perform group call data transmission with the same base station, or may be different from two.
  • the base station performs group call data transmission.
  • the cells in the base station establish a session synchronously, and apply the encryption parameters to send the call code stream to ensure that the number and content of the group call code streams of different cells are the same, so the packet data convergence protocol (Packet) The Super Frame Number (HFN) of the Data Convergence Protocol (PDCP) layer will be approximately the same.
  • Packet packet data convergence protocol
  • HFN Super Frame Number
  • PDCP Data Convergence Protocol
  • the transceiver module 40 is configured to: when the user equipment is handed over from the current cell to the target cell, receive the group call data from the base station of the target cell, and obtain the super frame number of the target cell according to the first superframe number.
  • the range of the interval, the superframe number of the target cell is the second superframe number.
  • the second superframe number is in the range of [X-M, X+N], where X is the first superframe number, and M and N are both natural numbers.
  • the establishing module 10 is configured to initiate and establish a group call session, so that when the base station establishes a trunking service bearer, a new field is added to carry the encryption parameter of the group call data, and the encryption parameter is saved.
  • the calling user equipment When the group call service is established as the calling user equipment, the calling user equipment identifier and the area range information set by the calling user are obtained, and the first request for establishing a call is sent to the control device, where the first request includes the calling party.
  • User device ID, group call service type, and area range information set by the calling user may be a user terminal, an in-vehicle terminal, a dispatching station, or the like.
  • the control device may be a control center or a base station.
  • the group call setup request When receiving the group call setup request sent by the control device as the called user equipment, the group call setup request includes the calling user equipment identifier, the area range information set by the calling user, the assigned group identifier, and the service channel. Obtaining its own location information, and determining whether its own location is within the range of the area, and, when its own location is within the range of the area, participating in the group call service and switching to the traffic channel.
  • the group identification and the traffic channel may be allocated by the control center, or may be allocated by the base station, or one of the control centers may be allocated, and the other may be allocated by the base station.
  • the key module 20 is configured to: when the user equipment is handed over from the current cell to the target cell, add or multiplex one of the signalings to carry the current cell session key identifier or directly carry the key of the current cell.
  • the session key identifier can use shortMac-i.
  • the transceiver module 40 receives the encrypted group call data of the target cell.
  • the processing module 50 is configured to perform a decryption operation on the encrypted group call data of the target cell according to the second superframe number.
  • the key module 20 is further configured to send the current cell session key identifier or the current cell key to the base station of the target cell, where the base station of the target cell identifies the current cell session key or The key of the current cell is compared with the key of the target cell.
  • the transceiver module 40 receives the encrypted group call data of the target cell from the base station of the target cell.
  • the transceiver module 40 sends the key of the target cell to the base station of the current cell, and receives the encrypted group call data of the target cell from the base station of the target cell, and then The base station of the current cell sends the key of the target cell to the user equipment.
  • the user equipment switches from the current cell to the target cell in a connected state.
  • the establishing module 10 is configured to initiate and establish a group call session, so that when the base station establishes a trunking service bearer, a new field is added to carry the group call encryption parameter, and the group call encryption parameter is saved.
  • the calling user equipment When the group call service is established as the calling user equipment, the calling user equipment identifier and the area range information set by the calling user are obtained, and the first request for establishing a call is sent to the control device, where the first request includes the calling party.
  • User device ID, group call service type, and area range information set by the calling user may be a user terminal, an in-vehicle terminal, a dispatching station, or the like.
  • the control device may be a control center or a base station.
  • the group call setup request When receiving the group call setup request sent by the control device as the called user equipment, the group call setup request includes the calling user equipment identifier, the area range information set by the calling user, the assigned group identifier, and the service channel. Obtaining its own location information, and determining whether its own location is within the range of the area, and, when its own location is within the range of the area, participating in the group call service and switching to the traffic channel.
  • the group identification and the traffic channel may be allocated by the control center, or may be allocated by the base station, or one of the control centers may be allocated, and the other may be allocated by the base station.
  • the transceiver module 40 is configured to receive encrypted group call data of the target cell from a base station of the target cell.
  • the user equipment switches from the current cell to the target cell in an idle state.
  • the processing module 50 is configured to traverse the second superframe number according to the interval range of the second superframe number, obtain a plaintext according to the second superframe number, and set the group call session information included in the plaintext Compare with the group call data of the current cell.
  • the plaintext according to the second superframe number is specifically: changing the value of the second superframe number within the interval of the [XM, X+N], and according to the changed second super
  • the value of the frame number is decrypted to obtain the plaintext.
  • the processing module 50 traverses the second superframe number to decrypt successfully, and performs a decryption operation according to the second superframe number.
  • the traversing the second superframe number is successfully decrypted.
  • the order of traversing the second superframe number is: X->X-1->X+1->X-2->X+2...- >XM...->X+N.
  • the group call data is configured as a PDCP SN.
  • M and N are set to 2
  • other group calls are configured to 1.
  • the decrypted input parameters are a superframe number, a key, a group call data ciphertext block, an encryption algorithm, and other parameters.
  • the standard decryption process is performed to obtain the plaintext, and the group call session information included in the plaintext is compared with the group call context of the user equipment in the current cell. If the comparison result is consistent, the traversal superframe number decryption process ends, and it is considered that The superframe number value is a valid value, and thereafter the superframe number value is maintained for decryption.
  • the foregoing module of the user equipment of the embodiment of the present invention has the same technical effect as the cluster group call decryption method of the foregoing embodiment.
  • the division of the above modules is a logical function division, and the actual implementation may have another division manner, for example, two modules may be integrated into another system, or some features may be ignored or not executed.
  • the connections between the modules may be through some interfaces, or may be electrical or other forms.
  • the above modules may be implemented in the form of a software function box or in the form of hardware such as shown in FIG. 6.
  • FIG. 6 is a hardware structure diagram of a user equipment based on a cluster group call decryption method according to the present invention.
  • the user equipment includes a memory 110, a processor 120, a controller 130, and a communication bus 140.
  • Communication bus 140 is used by processor 120 to call various data
  • memory 110 is used to store program instructions.
  • the number of the processor 120, the memory 110, the communication bus 140, and the controller 130 shown in FIG. 6 is one.
  • the memory 110 stores all program instructions of the establishing module 10, the key module 20, the listening module 30, the transceiver module 40, and the processing module 50.
  • the processor 120 monitors the group call data of the user equipment in the current cell, and acquires the superframe number of the current cell from the base station of the current cell as the first superframe number.
  • the base call data transmission is performed between each base station and multiple cells.
  • the current cell and the target cell may perform group call data transmission with the same base station, or may be different from two.
  • the base station performs group call data transmission.
  • the cells in the base station establish a session synchronously, and apply the encryption parameters to send the call code stream to ensure that the number and content of the group call code streams of different cells are the same, so the packet data convergence protocol (Packet) The Super Frame Number (HFN) of the Data Convergence Protocol (PDCP) layer will be approximately the same.
  • Packet packet data convergence protocol
  • HFN Super Frame Number
  • PDCP Data Convergence Protocol
  • the processor 120 receives the group call data from the base station of the target cell and obtains the interval of the superframe number of the target cell according to the first superframe number when the user equipment is handed over from the current cell to the target cell.
  • the range, the superframe number of the target cell is a second superframe number.
  • the second superframe number is in the range of [X-M, X+N], where X is the first superframe number, and M and N are both natural numbers.
  • the processor 120 initiates and establishes a group call session, so that when the base station establishes a trunking service bearer, a new field is added to carry the encryption parameter of the group call data, and the encryption parameter is saved.
  • the calling user equipment When the group call service is established as the calling user equipment, the calling user equipment identifier and the area range information set by the calling user are obtained, and the first request for establishing a call is sent to the control device, where the first request includes the calling party.
  • User device ID, group call service type, and area range information set by the calling user may be a user terminal, an in-vehicle terminal, a dispatching station, or the like.
  • the control device may be a control center or a base station.
  • the group call setup request When receiving the group call setup request sent by the control device as the called user equipment, the group call setup request includes the calling user equipment identifier, the area range information set by the calling user, the assigned group identifier, and the service channel. Obtaining its own location information, and determining whether its own location is within the range of the area, and, when its own location is within the range of the area, participating in the group call service and switching to the traffic channel.
  • the group identification and the traffic channel may be allocated by the control center, or may be allocated by the base station, or one of the control centers may be allocated, and the other may be allocated by the base station.
  • the processor 120 adds or multiplexes one of the signalings to carry the current cell session key identifier or directly carries the key of the current cell.
  • the session key identifier can use shortMac-i.
  • the processor 120 receives the encrypted group call data of the target cell.
  • the controller 130 is configured to perform a decryption operation on the encrypted group call data of the target cell according to the second superframe number.
  • the processor 120 further sends the current cell session key identifier or the key of the current cell to the base station of the target cell, where the base station of the target cell identifies the current cell session key or the current The key of the cell is compared with the key of the target cell.
  • the processor 120 receives the encrypted group call data of the target cell from the base station of the target cell.
  • the processor 120 sends the key of the target cell to the base station of the current cell, and receives the encrypted group call data of the target cell from the base station of the target cell, and then The base station of the current cell sends the key of the target cell to the user equipment.
  • the user equipment switches from the current cell to the target cell in a connected state.
  • the processor 120 initiates and establishes a group call session, so that when the base station establishes a cluster service bearer, a new field is added to carry the group call encryption parameter, and the group call encryption parameter is saved.
  • the calling user equipment When the group call service is established as the calling user equipment, the calling user equipment identifier and the area range information set by the calling user are obtained, and the first request for establishing a call is sent to the control device, where the first request includes the calling party.
  • User device ID, group call service type, and area range information set by the calling user may be a user terminal, an in-vehicle terminal, a dispatching station, or the like.
  • the control device may be a control center or a base station.
  • the group call setup request When receiving the group call setup request sent by the control device as the called user equipment, the group call setup request includes the calling user equipment identifier, the area range information set by the calling user, the assigned group identifier, and the service channel. Obtaining its own location information, and determining whether its own location is within the range of the area, and, when its own location is within the range of the area, participating in the group call service and switching to the traffic channel.
  • the group identification and the traffic channel may be allocated by the control center, or may be allocated by the base station, or one of the control centers may be allocated, and the other may be allocated by the base station.
  • the processor 120 receives the encrypted group call data of the target cell from the base station of the target cell.
  • the user equipment switches from the current cell to the target cell in an idle state.
  • the controller 130 is configured to traverse the second superframe number according to the interval range of the second superframe number, obtain a plaintext according to the second superframe number, and set the group call session information included in the plaintext Compare with the group call data of the current cell.
  • the plaintext according to the second superframe number is specifically: changing the value of the second superframe number within the interval of the [XM, X+N], and according to the changed second super
  • the value of the frame number is decrypted to obtain the plaintext.
  • the controller 130 traverses the second superframe number to decrypt successfully, and performs a decryption operation according to the second superframe number.
  • the traversing the second superframe number is successfully decrypted.
  • the order of traversing the second superframe number is: X->X-1->X+1->X-2->X+2...- >XM...->X+N.
  • the group call data is configured as a PDCP SN.
  • M and N are set to 2
  • other group calls are configured to 1.
  • the decrypted input parameters are a superframe number, a key, a group call data ciphertext block, an encryption algorithm, and other parameters.
  • the standard decryption process is performed to obtain the plaintext, and the group call session information included in the plaintext is compared with the group call context of the user equipment in the current cell. If the comparison result is consistent, the traversal superframe number decryption process ends, and it is considered that The superframe number value is a valid value, and thereafter the superframe number value is maintained for decryption.
  • the cluster group call decryption method derivates a reasonable range of the second superframe number of the target cell according to the first superframe number of the current cell when the user equipment switches from the current cell to the target cell, according to the The interval range of the second superframe number traverses the second superframe number and performs traversal decryption according to the second superframe number, and after the decryption succeeds, performs a decryption operation according to the second superframe number, thereby reducing
  • the group call service is interrupted and the user experience is improved.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明提供一种集群组呼解密方法及用户设备。所述方法包括监听在当前小区的组呼数据并获取超帧号为第一超帧号;在从当前小区切换至目标小区时,获得组呼数据并根据第一超帧号获得目标小区的超帧号的区间范围,目标小区的超帧号为第二超帧号;根据第二超帧号的区间范围遍历第二超帧号并得到明文,将明文所包括的组呼会话信息与当前小区的组呼数据进行比较;若一致,则遍历第二超帧号解密成功,并根据第二超帧号进行解密操作。

Description

集群组呼解密方法及用户设备
【技术领域】
本发明涉及移动通信领域,特别是涉及一种集群组呼解密方法及用户设备。
【背景技术】
组呼会话发起后,基站下各小区建立会话、应用加密参数发组呼码流,各小区配置加密参数可能不一致、加密上下文并不同步,因此当用户设备从当前小区切换至相邻的目标小区时必须获取目标小区的加密参数及状态才能解密,导致组呼业务中断时延较长。
【发明内容】
本发明主要解决的技术问题是提供一种集群组呼解密方法及用户设备,以减小组呼业务中断时延,提高用户体验。
为解决上述技术问题,本发明采用的一个技术方案是:提供一种集群组呼解密方法,所述方法应用于用户设备,包括:
监听在当前小区的组呼数据,并从所述当前小区的基站获取所述当前小区的超帧号为第一超帧号;
在从所述当前小区切换至目标小区时,从所述目标小区的基站接收组呼数据并根据所述第一超帧号获得所述目标小区的超帧号的区间范围,所述目标小区的超帧号为第二超帧号;
根据所述第二超帧号的区间范围遍历所述第二超帧号并根据所述第二超帧号得到明文,并将所述明文所包括的组呼会话信息与所述当前小区的组呼数据进行比较;
若比较结果一致,则遍历所述第二超帧号解密成功,并根据所述第二超帧号进行解密操作。
其中,从所述目标小区的基站接收组呼数据并根据所述第一超帧号获得所述目标小区的超帧号的区间范围的步骤包括:
所述第二超帧号为在[X-M,X+N]的区间范围内,其中X为所述第一超帧号,M和N均为自然数;
根据所述第二超帧号的区间范围遍历所述第二超帧号并根据所述第二超帧号得到明文的步骤包括:
在所述[X-M,X+N]的区间范围内改变所述第二超帧号的值,并根据改变后的所述第二超帧号的值进行解密操作,以得到所述明文。
其中,遍历所述第二超帧号解密成功,并根据所述第二超帧号进行解密操作的步骤包括:
遍历所述第二超帧号的顺序为:
X->X-1->X+1->X-2->X+2…->X-M…->X+N。
其中,在所述组呼数据配置为PDCP SN 5bit且包间隔20毫秒时,M和N设置为2。
其中,所述从所述当前小区切换至目标小区的步骤包括:
发起并建立组呼会话,以使基站在建立集群业务承载时,新增字段以携带组呼数据的加密参数,并且保存所述加密参数;
从所述当前小区切换至所述目标小区,新增或复用其中一条信令携带所述当前小区会话密钥标识或直接携带所述当前小区的密钥;
接收到所述目标小区的加密组呼数据;
所述根据所述第二超帧号进行解密操作的步骤包括:
根据所述第二超帧号对所述目标小区的加密组呼数据进行解密操作。
其中,在接收到所述目标小区的加密组呼数据的步骤之前,所述方法进一步包括:
发送所述当前小区会话密钥标识或者所述当前小区的密钥给所述目标小区的基站,所述目标小区的基站将所述当前小区会话密钥标识或者所述当前小区的密钥与所述目标小区的密钥进行比较;
若一致,则从所述目标小区的基站接收到所述目标小区的加密组呼数据;
若不一致,则从所述目标小区的基站接收到所述目标小区的加密组呼数据的同时将所述目标小区的密钥发送给所述当前小区的基站,再由所述当前小区的基站将所述目标小区的密钥发送给所述用户设备。
其中,所述从所述当前小区切换至目标小区的步骤包括:
发起并建立组呼会话,以使基站在建立集群业务承载时,新增字段以携带组呼加密参数,并且保存所述组呼加密参数;
从所述目标小区的基站接收到所述目标小区的加密组呼数据。
为解决上述技术问题,本发明采用的一个技术方案是:提供一种用户设备,所述用户设备包括:
监听模块,用于监听用户设备在当前小区的组呼数据,并从所述当前小区的基站获取所述当前小区的超帧号为第一超帧号;
收发模块,用于在所述用户设备从所述当前小区切换至目标小区时,从所述目标小区的基站接收组呼数据并根据所述第一超帧号获得所述目标小区的超帧号的区间范围,所述目标小区的超帧号为第二超帧号;
处理模块,连接所述监听模块及所述收发模块,用于根据所述第二超帧号的区间范围遍历所述第二超帧号并根据所述第二超帧号得到明文,并将所述明文所包括的组呼会话信息与所述当前小区的组呼数据进行比较,若比较结果一致,则遍历所述第二超帧号解密成功,并根据所述第二超帧号进行解密操作。
其中,所述第二超帧号为在[X-M,X+N]的区间范围内,其中X为所述第一超帧号,M和N均为自然数;在所述[X-M,X+N]的区间范围内改变所述第二超帧号的值,所述处理模块根据改变后的所述第二超帧号的值进行解密操作,以得到所述明文。
其中,所述处理模块遍历所述第二超帧号的顺序为:
X->X-1->X+1->X-2->X+2…->X-M…->X+N。
其中,在所述组呼数据配置为PDCP SN 5bit且包间隔20毫秒时,M和N设置为2。
其中,所述用户设备还包括建立模块及密钥模块,所述用户设备在从所述当前小区切换至目标小区时,所述建立模块发起并建立组呼会话,以使基站在建立集群业务承载时,新增字段以携带组呼数据的加密参数,并且保存所述加密参数;
所述用户设备从所述当前小区切换至所述目标小区时,所述密钥模块新增或复用其中一条信令携带所述当前小区会话密钥标识或直接携带所述当前小区的密钥;
所述收发模块接收到所述目标小区的加密组呼数据;
所述处理模块根据所述第二超帧号对所述目标小区的加密组呼数据进行解密操作。
其中,所述密钥模块还发送所述当前小区会话密钥标识或者所述当前小区的密钥给所述目标小区的基站,所述目标小区的基站将所述当前小区会话密钥标识或者所述当前小区的密钥与所述目标小区的密钥进行比较;
若一致,则所述收发模块从所述目标小区的基站接收到所述目标小区的加密组呼数据;
若不一致,则从所述目标小区的基站接收到所述目标小区的加密组呼数据的同时将所述目标小区的密钥发送给所述当前小区的基站,再由所述当前小区的基站将所述目标小区的密钥发送给所述用户设备。
其中,所述用户设备还包括建立模块,在所述用户设备从所述当前小区切换至目标小区时,所述建立模块发起并建立组呼会话,以使基站在建立集群业务承载时,新增字段以携带组呼加密参数,并且保存所述组呼加密参数;
所述收发模块从所述目标小区的基站接收到所述目标小区的加密组呼数据。
为解决上述技术问题,本发明采用的一个技术方案是:提供一种用户设备,所述用户设备包括:
存储器,用于存储程序指令;
处理器,用于监听用户设备在当前小区的组呼数据,并从所述当前小区的基站获取所述当前小区的超帧号为第一超帧号;
所述处理器,还用于在所述用户设备从所述当前小区切换至目标小区时,从所述目标小区的基站接收组呼数据并根据所述第一超帧号获得所述目标小区的超帧号的区间范围,所述目标小区的超帧号为第二超帧号;
控制器,用于根据所述第二超帧号的区间范围遍历所述第二超帧号并根据所述第二超帧号得到明文,并将所述明文所包括的组呼会话信息与所述当前小区的组呼数据进行比较,若比较结果一致,则遍历所述第二超帧号解密成功,并根据所述第二超帧号进行解密操作。
其中,所述第二超帧号为在[X-M,X+N]的区间范围内,其中X为所述第一超帧号,M和N均为自然数;在所述[X-M,X+N]的区间范围内改变所述第二超帧号的值,所述处理模块根据改变后的所述第二超帧号的值进行解密操作,以得到所述明文。
其中,所述处理模块遍历所述第二超帧号的顺序为:
X->X-1->X+1->X-2->X+2…->X-M…->X+N;
在所述组呼数据配置为PDCP SN 5bit且包间隔20毫秒时,M和N设置为2。
其中,所述用户设备在从所述当前小区切换至目标小区时,所述处理器发起并建立组呼会话,以使基站在建立集群业务承载时,新增字段以携带组呼数据的加密参数,并且保存所述加密参数;
所述用户设备从所述当前小区切换至所述目标小区时,所述处理器新增或复用其中一条信令携带所述当前小区会话密钥标识或直接携带所述当前小区的密钥;
所述处理器接收到所述目标小区的加密组呼数据;
所述控制器根据所述第二超帧号对所述目标小区的加密组呼数据进行解密操作。
其中,所述处理器还发送所述当前小区会话密钥标识或者所述当前小区的密钥给所述目标小区的基站,所述目标小区的基站将所述当前小区会话密钥标识或者所述当前小区的密钥与所述目标小区的密钥进行比较;
若一致,则所述处理器从所述目标小区的基站接收到所述目标小区的加密组呼数据;
若不一致,则所述处理器从所述目标小区的基站接收到所述目标小区的加密组呼数据的同时将所述目标小区的密钥发送给所述当前小区的基站,再由所述当前小区的基站将所述目标小区的密钥发送给所述用户设备。
其中,在所述用户设备从所述当前小区切换至目标小区时,所述处理器发起并建立组呼会话,以使基站在建立集群业务承载时,新增字段以携带组呼加密参数,并且保存所述组呼加密参数;
所述处理器从所述目标小区的基站接收到所述目标小区的加密组呼数据。
本发明的有益效果是:区别于现有技术的情况,本发明所述集群组呼解密方法在用户设备从当前小区切换至目标小区时,根据用户设备在当前小区的第一超帧号推导得出目标小区的第二超帧号的合理区间范围,根据所述第二超帧号的区间范围遍历所述第二超帧号并根据所述第二超帧号进行遍历解密,在解密成功后根据所述第二超帧号进行解密操作,以此减小组呼业务中断时延,提高用户体验。
【附图说明】
图1是本发明的集群组呼解密方法的流程图;
图2是图1中的具体步骤的第一实施例的流程图;
图3是图2中的具体步骤的流程图;
图4是图1中的具体步骤的第二实施例的流程图;
图5是本发明的基于集群组呼解密方法的用户设备的方框结构示意图;
图6是本发明的基于集群组呼解密方法的用户设备的硬件结构示意图。
【具体实施方式】
下面将结合本发明实施例中的附图,对本发明所提供的各个示例性的实施例的技术方案进行清楚、完整地描述。在不冲突的情况下,下述各个实施例以及实施例中的特征可以相互组合。
请参阅图1,是本发明集群组呼解密方法的流程图。本实施例所揭示的方法应用于用户设备,该方法包括以下步骤:
步骤S1:监听在当前小区的组呼数据,并从当前小区的基站获取所述当前小区的超帧号为第一超帧号。
其中,每一基站与多个小区之间进行组呼数据传输,在本实施例中,所述当前小区与所述目标小区可以与同一个基站进行组呼数据传输,也可以与两个不同的基站进行组呼数据传输。组呼会话发起后,基站下各小区大致同步建立会话,应用加密参数发组呼码流,保证不同小区的组呼码流数目及内容相同,因此分组数据汇聚协议(Packet Data Convergence Protocol,PDCP)层的超帧号(HFN)会大致相同。
步骤S2:在从所述当前小区切换至目标小区时,从所述目标小区的基站接收组呼数据并根据所述第一超帧号获得所述目标小区的超帧号的区间范围,所述目标小区的超帧号为第二超帧号。
其中,所述第二超帧号为在[X-M,X+N]的区间范围内,其中X为所述第一超帧号,M和N均为自然数。
请参阅图2,其中,步骤S2中从所述当前小区切换至目标小区的步骤的第一实施例包括:
步骤S21:发起并建立组呼会话,以使基站在建立集群业务承载时,新增字段以携带组呼数据的加密参数,并且保存所述加密参数。
在作为主叫用户设备建立组呼业务时,获取主叫用户设备标识及主叫用户所设置的区域范围信息,并向控制装置发送请求建立呼叫的第一请求,所述第一请求包括主叫用户设备标识、组呼业务类型和主叫用户所设置的区域范围信息。在该步骤中,需说明的是,主叫用户设备可为用户终端、车载终端、调度台等, 而且,在不同控制方式的集群通信系统中,控制装置可为控制中心或基站。
在作为被叫用户设备接收到控制装置发送的组呼建立请求时,所述组呼建立请求包括主叫用户设备标识、主叫用户所设置的区域范围信息、所分配的组标识和业务信道,获取自身的位置信息,并判断自身位置是否在所述区域范围内,而且,当自身位置在所述区域范围内时,参与该组呼业务并切换到所述业务信道。在该步骤中,需说明的是,在不同控制方式的集群通信系统中,组标识和业务信道可由控制中心来分配,也可由基站来分配,或者其中一个控制中心分配,另一个由基站来分配。
步骤S22:从所述当前小区切换至所述目标小区,新增或复用其中一条信令携带所述当前小区会话密钥标识或直接携带所述当前小区的密钥。
其中,会话密钥标识可使用shortMac-i。
步骤S23:接收到所述目标小区的加密组呼数据。
步骤S24:根据所述第二超帧号对所述目标小区的加密组呼数据进行解密操作。
请参阅图3,在步骤S22与步骤S23之间还包括步骤:
步骤S221:发送所述当前小区会话密钥标识或者所述当前小区的密钥给所述目标小区的基站,所述目标小区的基站将所述当前小区会话密钥标识或者所述当前小区的密钥与所述目标小区的密钥进行比较,判断是否一致。
步骤S222:若一致,则从所述目标小区的基站接收到所述目标小区的加密组呼数据。
步骤S223:若不一致,则从所述目标小区的基站接收到所述目标小区的加密组呼数据的同时将所述目标小区的密钥发送给所述当前小区的基站,再由所述当前小区的基站将所述目标小区的密钥发送给所述用户设备。
在所述第一实施例中,所述用户设备以连接态从当前小区切换至目标小区。
请参阅图4,其中,在步骤S2中从所述当前小区切换至目标小区的步骤的第二实施例包括:
步骤S25:发起并建立组呼会话,以使基站在建立集群业务承载时,新增字段以携带组呼加密参数,并且保存所述组呼加密参数。
在作为主叫用户设备建立组呼业务时,获取主叫用户设备标识及主叫用户所设置的区域范围信息,并向控制装置发送请求建立呼叫的第一请求,所述第一请求包括主叫用户设备标识、组呼业务类型和主叫用户所设置的区域范围信息。在该步骤中,需说明的是,主叫用户设备可为用户终端、车载终端、调度台等, 而且,在不同控制方式的集群通信系统中,控制装置可为控制中心或基站。
在作为被叫用户设备接收到控制装置发送的组呼建立请求时,所述组呼建立请求包括主叫用户设备标识、主叫用户所设置的区域范围信息、所分配的组标识和业务信道,获取自身的位置信息,并判断自身位置是否在所述区域范围内,而且,当自身位置在所述区域范围内时,参与该组呼业务并切换到所述业务信道。在该步骤中,需说明的是,在不同控制方式的集群通信系统中,组标识和业务信道可由控制中心来分配,也可由基站来分配,或者其中一个控制中心分配,另一个由基站来分配。
步骤S26:从所述目标小区的基站接收到所述目标小区的加密组呼数据。
在所述第二实施例中,所述用户设备以空闲态从当前小区切换至目标小区。
步骤S3:根据所述第二超帧号的区间范围遍历所述第二超帧号并根据所述第二超帧号得到明文,并将所述明文所包括的组呼会话信息与所述当前小区的组呼数据进行比较。
其中,根据所述第二超帧号得到明文具体为:在所述[X-M,X+N]的区间范围内改变所述第二超帧号的值,并根据改变后的所述第二超帧号的值进行解密操作,以得到所述明文。
步骤S4:若比较结果一致,则遍历所述第二超帧号解密成功,并根据所述第二超帧号进行解密操作。
其中,遍历所述第二超帧号解密成功具体为:遍历所述第二超帧号的顺序为:X->X-1->X+1->X-2->X+2…->X-M…->X+N。
在本实施例中,优选在所述组呼数据配置为PDCP SN 5bit且包间隔20毫秒时,M和N设置为2,其它组呼配置为1,当然越大越可靠,但是耗时相应增大。
其中,解密的输入参数为超帧号、密钥、组呼数据密文块、加密算法及其它参数,对于不同小区只有超帧号可能不同,所以固定不变参数,通过只改变超帧号值的方式进行标准的解密流程,得到明文,并将明文所包含的组呼会话信息与用户设备在当前小区的组呼上下文进行比对,如果比对结果一致,遍历超帧号解密流程结束,认为该超帧号值为有效值,此后维护此超帧号值进行解密操作。
所述集群组呼解密方法在用户设备从当前小区切换至目标小区时,根据用户设备在当前小区的第一超帧号推导得出目标小区的第二超帧号的合理区间范围,并根据所述第二超帧号进行遍历解密,以此减小组呼业务中断时延,提高用户体验。
请参阅图5,为本发明的基于集群组呼解密方法的用户设备的方框结构示意图。所述用户设备包括建立模块10、密钥模块20、监听模块30、收发模块40及处理模块50。
所述监听模块30用于监听用户设备在当前小区的组呼数据,并从所述当前小区的基站获取所述当前小区的超帧号为第一超帧号。
其中,每一基站与多个小区之间进行组呼数据传输,在本实施例中,所述当前小区与所述目标小区可以与同一个基站进行组呼数据传输,也可以与两个不同的基站进行组呼数据传输。组呼会话发起后,基站下各小区大致同步建立会话,应用加密参数发组呼码流,保证不同小区的组呼码流数目及内容相同,因此分组数据汇聚协议(Packet Data Convergence Protocol,PDCP)层的超帧号(HFN)会大致相同。
所述收发模块40用于用户设备在从所述当前小区切换至目标小区时,从所述目标小区的基站接收组呼数据并根据所述第一超帧号获得所述目标小区的超帧号的区间范围,所述目标小区的超帧号为第二超帧号。
其中,所述第二超帧号为在[X-M,X+N]的区间范围内,其中X为所述第一超帧号,M和N均为自然数。
其中,从所述当前小区切换至目标小区的第一实施例包括:
所述建立模块10用于发起并建立组呼会话,以使基站在建立集群业务承载时,新增字段以携带组呼数据的加密参数,并且保存所述加密参数。
在作为主叫用户设备建立组呼业务时,获取主叫用户设备标识及主叫用户所设置的区域范围信息,并向控制装置发送请求建立呼叫的第一请求,所述第一请求包括主叫用户设备标识、组呼业务类型和主叫用户所设置的区域范围信息。在该步骤中,需说明的是,主叫用户设备可为用户终端、车载终端、调度台等, 而且,在不同控制方式的集群通信系统中,控制装置可为控制中心或基站。
在作为被叫用户设备接收到控制装置发送的组呼建立请求时,所述组呼建立请求包括主叫用户设备标识、主叫用户所设置的区域范围信息、所分配的组标识和业务信道,获取自身的位置信息,并判断自身位置是否在所述区域范围内,而且,当自身位置在所述区域范围内时,参与该组呼业务并切换到所述业务信道。在该步骤中,需说明的是,在不同控制方式的集群通信系统中,组标识和业务信道可由控制中心来分配,也可由基站来分配,或者其中一个控制中心分配,另一个由基站来分配。
密钥模块20用于用户设备从所述当前小区切换至所述目标小区时,新增或复用其中一条信令携带所述当前小区会话密钥标识或直接携带所述当前小区的密钥。
其中,会话密钥标识可使用shortMac-i。
所述收发模块40接收到所述目标小区的加密组呼数据。
所述处理模块50用于根据所述第二超帧号对所述目标小区的加密组呼数据进行解密操作。
所述密钥模块20还用于发送所述当前小区会话密钥标识或者所述当前小区的密钥给所述目标小区的基站,所述目标小区的基站将所述当前小区会话密钥标识或者所述当前小区的密钥与所述目标小区的密钥进行比较。
若一致,则所述收发模块40从所述目标小区的基站接收到所述目标小区的加密组呼数据。
若不一致,则所述收发模块40从所述目标小区的基站接收到所述目标小区的加密组呼数据的同时将所述目标小区的密钥发送给所述当前小区的基站,再由所述当前小区的基站将所述目标小区的密钥发送给所述用户设备。
在所述第一实施例中,所述用户设备以连接态从当前小区切换至目标小区。
其中,从所述当前小区切换至目标小区的第二实施例包括:
所述建立模块10用于发起并建立组呼会话,以使基站在建立集群业务承载时,新增字段以携带组呼加密参数,并且保存所述组呼加密参数。
在作为主叫用户设备建立组呼业务时,获取主叫用户设备标识及主叫用户所设置的区域范围信息,并向控制装置发送请求建立呼叫的第一请求,所述第一请求包括主叫用户设备标识、组呼业务类型和主叫用户所设置的区域范围信息。在该步骤中,需说明的是,主叫用户设备可为用户终端、车载终端、调度台等, 而且,在不同控制方式的集群通信系统中,控制装置可为控制中心或基站。
在作为被叫用户设备接收到控制装置发送的组呼建立请求时,所述组呼建立请求包括主叫用户设备标识、主叫用户所设置的区域范围信息、所分配的组标识和业务信道,获取自身的位置信息,并判断自身位置是否在所述区域范围内,而且,当自身位置在所述区域范围内时,参与该组呼业务并切换到所述业务信道。在该步骤中,需说明的是,在不同控制方式的集群通信系统中,组标识和业务信道可由控制中心来分配,也可由基站来分配,或者其中一个控制中心分配,另一个由基站来分配。
所述收发模块40用于从所述目标小区的基站接收到所述目标小区的加密组呼数据。
在所述第二实施例中,所述用户设备以空闲态从当前小区切换至目标小区。
所述处理模块50用于根据所述第二超帧号的区间范围遍历所述第二超帧号并根据所述第二超帧号得到明文,并将所述明文所包括的组呼会话信息与所述当前小区的组呼数据进行比较。
其中,根据所述第二超帧号得到明文具体为:在所述[X-M,X+N]的区间范围内改变所述第二超帧号的值,并根据改变后的所述第二超帧号的值进行解密操作,以得到所述明文。
若比较结果一致,则所述处理模块50遍历所述第二超帧号解密成功,并根据所述第二超帧号进行解密操作。
其中,遍历所述第二超帧号解密成功具体为:遍历所述第二超帧号的顺序为:X->X-1->X+1->X-2->X+2…->X-M…->X+N。
在所述组呼数据配置为PDCP SN 5bit且包间隔20毫秒时,M和N设置为2,其它组呼配置为1,当然越大越可靠,但是耗时相应增大。
其中,解密的输入参数为超帧号、密钥、组呼数据密文块、加密算法及其它参数,对于不同小区只有超帧号可能不同,所以固定不变参数,通过只改变超帧号值的方式进行标准的解密流程,得到明文,并将明文所包含的组呼会话信息与用户设备在当前小区的组呼上下文进行比对,如果比对结果一致,遍历超帧号解密流程结束,认为该超帧号值为有效值,此后维护此超帧号值进行解密操作。
本发明实施例的用户设备的上述模块对应执行上述实施例的基于集群组呼解密的方法,具有与其相同的技术效果。
应该理解到,上述模块的划分为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如两个模块可以集成到另一个系统中,或一些特征可以忽略,或不执行。另外,模块相互之间的连接可以通过一些接口,也可以是电性或其它形式。上述模块既可以采用软件功能框的形式实现,也可以采用例如图6所示的硬件的形式实现。
请参阅图6,是本发明基于集群组呼解密方法的用户设备的硬件结构示意图。所述用户设备包括存储器110、处理器120、控制器130及通信总线140。通信总线140用于处理器120调用各种数据,存储器110用于存储程序指令。为了方便说明,图6所示处理器120、存储器110、通信总线140及控制器130的数量均为一个。
其中,所述存储器110将建立模块10、密钥模块20、监听模块30、收发模块40及处理模块50的所有程序指令进行存储。
所述处理器120监听用户设备在当前小区的组呼数据,并从所述当前小区的基站获取所述当前小区的超帧号为第一超帧号。
其中,每一基站与多个小区之间进行组呼数据传输,在本实施例中,所述当前小区与所述目标小区可以与同一个基站进行组呼数据传输,也可以与两个不同的基站进行组呼数据传输。组呼会话发起后,基站下各小区大致同步建立会话,应用加密参数发组呼码流,保证不同小区的组呼码流数目及内容相同,因此分组数据汇聚协议(Packet Data Convergence Protocol,PDCP)层的超帧号(HFN)会大致相同。
所述处理器120在用户设备从所述当前小区切换至目标小区时,从所述目标小区的基站接收组呼数据并根据所述第一超帧号获得所述目标小区的超帧号的区间范围,所述目标小区的超帧号为第二超帧号。
其中,所述第二超帧号为在[X-M,X+N]的区间范围内,其中X为所述第一超帧号,M和N均为自然数。
其中,用户设备从所述当前小区切换至目标小区的第一实施例包括:
处理器120发起并建立组呼会话,以使基站在建立集群业务承载时,新增字段以携带组呼数据的加密参数,并且保存所述加密参数。
在作为主叫用户设备建立组呼业务时,获取主叫用户设备标识及主叫用户所设置的区域范围信息,并向控制装置发送请求建立呼叫的第一请求,所述第一请求包括主叫用户设备标识、组呼业务类型和主叫用户所设置的区域范围信息。在该步骤中,需说明的是,主叫用户设备可为用户终端、车载终端、调度台等, 而且,在不同控制方式的集群通信系统中,控制装置可为控制中心或基站。
在作为被叫用户设备接收到控制装置发送的组呼建立请求时,所述组呼建立请求包括主叫用户设备标识、主叫用户所设置的区域范围信息、所分配的组标识和业务信道,获取自身的位置信息,并判断自身位置是否在所述区域范围内,而且,当自身位置在所述区域范围内时,参与该组呼业务并切换到所述业务信道。在该步骤中,需说明的是,在不同控制方式的集群通信系统中,组标识和业务信道可由控制中心来分配,也可由基站来分配,或者其中一个控制中心分配,另一个由基站来分配。
用户设备从所述当前小区切换至所述目标小区时,所述处理器120新增或复用其中一条信令携带所述当前小区会话密钥标识或直接携带所述当前小区的密钥。
其中,会话密钥标识可使用shortMac-i。
所述处理器120接收到所述目标小区的加密组呼数据。
所述控制器130用于根据所述第二超帧号对所述目标小区的加密组呼数据进行解密操作。
所述处理器120还发送所述当前小区会话密钥标识或者所述当前小区的密钥给所述目标小区的基站,所述目标小区的基站将所述当前小区会话密钥标识或者所述当前小区的密钥与所述目标小区的密钥进行比较。
若一致,则所述处理器120从所述目标小区的基站接收到所述目标小区的加密组呼数据。
若不一致,则所述处理器120从所述目标小区的基站接收到所述目标小区的加密组呼数据的同时将所述目标小区的密钥发送给所述当前小区的基站,再由所述当前小区的基站将所述目标小区的密钥发送给所述用户设备。
在所述第一实施例中,所述用户设备以连接态从当前小区切换至目标小区。
其中,用户设备从所述当前小区切换至目标小区的第二实施例包括:
所述处理器120发起并建立组呼会话,以使基站在建立集群业务承载时,新增字段以携带组呼加密参数,并且保存所述组呼加密参数。
在作为主叫用户设备建立组呼业务时,获取主叫用户设备标识及主叫用户所设置的区域范围信息,并向控制装置发送请求建立呼叫的第一请求,所述第一请求包括主叫用户设备标识、组呼业务类型和主叫用户所设置的区域范围信息。在该步骤中,需说明的是,主叫用户设备可为用户终端、车载终端、调度台等, 而且,在不同控制方式的集群通信系统中,控制装置可为控制中心或基站。
在作为被叫用户设备接收到控制装置发送的组呼建立请求时,所述组呼建立请求包括主叫用户设备标识、主叫用户所设置的区域范围信息、所分配的组标识和业务信道,获取自身的位置信息,并判断自身位置是否在所述区域范围内,而且,当自身位置在所述区域范围内时,参与该组呼业务并切换到所述业务信道。在该步骤中,需说明的是,在不同控制方式的集群通信系统中,组标识和业务信道可由控制中心来分配,也可由基站来分配,或者其中一个控制中心分配,另一个由基站来分配。
所述处理器120从所述目标小区的基站接收到所述目标小区的加密组呼数据。
在所述第二实施例中,所述用户设备以空闲态从当前小区切换至目标小区。
所述控制器130用于根据所述第二超帧号的区间范围遍历所述第二超帧号并根据所述第二超帧号得到明文,并将所述明文所包括的组呼会话信息与所述当前小区的组呼数据进行比较。
其中,根据所述第二超帧号得到明文具体为:在所述[X-M,X+N]的区间范围内改变所述第二超帧号的值,并根据改变后的所述第二超帧号的值进行解密操作,以得到所述明文。
若比较结果一致,则所述控制器130遍历所述第二超帧号解密成功,并根据所述第二超帧号进行解密操作。
其中,遍历所述第二超帧号解密成功具体为:遍历所述第二超帧号的顺序为:X->X-1->X+1->X-2->X+2…->X-M…->X+N。
在所述组呼数据配置为PDCP SN 5bit且包间隔20毫秒时,M和N设置为2,其它组呼配置为1,当然越大越可靠,但是耗时相应增大。
其中,解密的输入参数为超帧号、密钥、组呼数据密文块、加密算法及其它参数,对于不同小区只有超帧号可能不同,所以固定不变参数,通过只改变超帧号值的方式进行标准的解密流程,得到明文,并将明文所包含的组呼会话信息与用户设备在当前小区的组呼上下文进行比对,如果比对结果一致,遍历超帧号解密流程结束,认为该超帧号值为有效值,此后维护此超帧号值进行解密操作。
所述集群组呼解密方法在用户设备从当前小区切换至目标小区时,根据用户设备在当前小区的第一超帧号推导得出目标小区的第二超帧号的合理区间范围,根据所述第二超帧号的区间范围遍历所述第二超帧号并根据所述第二超帧号进行遍历解密,在解密成功后根据所述第二超帧号进行解密操作,以此减小组呼业务中断时延,提高用户体验。
以上仅为本发明的实施方式,并非因此限制本发明的专利范围,凡是利用本发明说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本发明的专利保护范围内。

Claims (20)

  1. 一种集群组呼解密方法,其中,所述方法应用于用户设备,包括:
    监听在当前小区的组呼数据,并从所述当前小区的基站获取所述当前小区的超帧号为第一超帧号;
    在从所述当前小区切换至目标小区时,从所述目标小区的基站接收组呼数据并根据所述第一超帧号获得所述目标小区的超帧号的区间范围,所述目标小区的超帧号为第二超帧号;
    根据所述第二超帧号的区间范围遍历所述第二超帧号并根据所述第二超帧号得到明文,并将所述明文所包括的组呼会话信息与所述当前小区的组呼数据进行比较;
    若比较结果一致,则遍历所述第二超帧号解密成功,并根据所述第二超帧号进行解密操作。
  2. 根据权利要求1所述的集群组呼解密方法,其中,从所述目标小区的基站接收组呼数据并根据所述第一超帧号获得所述目标小区的超帧号的区间范围的步骤包括:
    所述第二超帧号为在[X-M,X+N]的区间范围内,其中X为所述第一超帧号,M和N均为自然数;
    根据所述第二超帧号的区间范围遍历所述第二超帧号并根据所述第二超帧号得到明文的步骤包括:
    在所述[X-M,X+N]的区间范围内改变所述第二超帧号的值,并根据改变后的所述第二超帧号的值进行解密操作,以得到所述明文。
  3. 根据权利要求2所述的集群组呼解密方法,其中,遍历所述第二超帧号解密成功,并根据所述第二超帧号进行解密操作的步骤包括:
    遍历所述第二超帧号的顺序为:
    X->X-1->X+1->X-2->X+2…->X-M…->X+N。
  4. 根据权利要求2所述的集群组呼解密方法,其中,在所述组呼数据配置为PDCP SN 5bit且包间隔20毫秒时,M和N设置为2。
  5. 根据权利要求1所述的集群组呼解密方法,其中,所述从所述当前小区切换至目标小区的步骤包括:
    发起并建立组呼会话,以使基站在建立集群业务承载时,新增字段以携带组呼数据的加密参数,并且保存所述加密参数;
    从所述当前小区切换至所述目标小区,新增或复用其中一条信令携带所述当前小区会话密钥标识或直接携带所述当前小区的密钥;
    接收到所述目标小区的加密组呼数据;
    所述根据所述第二超帧号进行解密操作的步骤包括:
    根据所述第二超帧号对所述目标小区的加密组呼数据进行解密操作。
  6. 根据权利要求5所述的集群组呼解密方法,其中,在接收到所述目标小区的加密组呼数据的步骤之前,所述方法进一步包括:
    发送所述当前小区会话密钥标识或者所述当前小区的密钥给所述目标小区的基站,所述目标小区的基站将所述当前小区会话密钥标识或者所述当前小区的密钥与所述目标小区的密钥进行比较;
    若一致,则从所述目标小区的基站接收到所述目标小区的加密组呼数据;
    若不一致,则从所述目标小区的基站接收到所述目标小区的加密组呼数据的同时将所述目标小区的密钥发送给所述当前小区的基站,再由所述当前小区的基站将所述目标小区的密钥发送给所述用户设备。
  7. 根据权利要求1所述的集群组呼解密方法,其中,所述从所述当前小区切换至目标小区的步骤包括:
    发起并建立组呼会话,以使基站在建立集群业务承载时,新增字段以携带组呼加密参数,并且保存所述组呼加密参数;
    从所述目标小区的基站接收到所述目标小区的加密组呼数据。
  8. 一种用户设备,其中,所述用户设备包括:
    监听模块,用于监听用户设备在当前小区的组呼数据,并从所述当前小区的基站获取所述当前小区的超帧号为第一超帧号;
    收发模块,用于在所述用户设备从所述当前小区切换至目标小区时,从所述目标小区的基站接收组呼数据并根据所述第一超帧号获得所述目标小区的超帧号的区间范围,所述目标小区的超帧号为第二超帧号;
    处理模块,连接所述监听模块及所述收发模块,用于根据所述第二超帧号的区间范围遍历所述第二超帧号并根据所述第二超帧号得到明文,并将所述明文所包括的组呼会话信息与所述当前小区的组呼数据进行比较,若比较结果一致,则遍历所述第二超帧号解密成功,并根据所述第二超帧号进行解密操作。
  9. 根据权利要求8所述的用户设备,其中,所述第二超帧号为在[X-M,X+N]的区间范围内,其中X为所述第一超帧号,M和N均为自然数;在所述[X-M,X+N]的区间范围内改变所述第二超帧号的值,所述处理模块根据改变后的所述第二超帧号的值进行解密操作,以得到所述明文。
  10. 根据权利要求9所述的用户设备,其中,所述处理模块遍历所述第二超帧号的顺序为:
    X->X-1->X+1->X-2->X+2…->X-M…->X+N。
  11. 根据权利要求10所述的用户设备,其中,在所述组呼数据配置为PDCP SN 5bit且包间隔20毫秒时,M和N设置为2。
  12. 根据权利要求9所述的用户设备,其中,所述用户设备还包括建立模块及密钥模块,所述用户设备在从所述当前小区切换至目标小区时,所述建立模块发起并建立组呼会话,以使基站在建立集群业务承载时,新增字段以携带组呼数据的加密参数,并且保存所述加密参数;
    所述用户设备从所述当前小区切换至所述目标小区时,所述密钥模块新增或复用其中一条信令携带所述当前小区会话密钥标识或直接携带所述当前小区的密钥;
    所述收发模块接收到所述目标小区的加密组呼数据;
    所述处理模块根据所述第二超帧号对所述目标小区的加密组呼数据进行解密操作。
  13. 根据权利要求12所述的用户设备,其中,所述密钥模块还发送所述当前小区会话密钥标识或者所述当前小区的密钥给所述目标小区的基站,所述目标小区的基站将所述当前小区会话密钥标识或者所述当前小区的密钥与所述目标小区的密钥进行比较;
    若一致,则所述收发模块从所述目标小区的基站接收到所述目标小区的加密组呼数据;
    若不一致,则从所述目标小区的基站接收到所述目标小区的加密组呼数据的同时将所述目标小区的密钥发送给所述当前小区的基站,再由所述当前小区的基站将所述目标小区的密钥发送给所述用户设备。
  14. 根据权利要求8所述的用户设备,其中,所述用户设备还包括建立模块,在所述用户设备从所述当前小区切换至目标小区时,所述建立模块发起并建立组呼会话,以使基站在建立集群业务承载时,新增字段以携带组呼加密参数,并且保存所述组呼加密参数;
    所述收发模块从所述目标小区的基站接收到所述目标小区的加密组呼数据。
  15. 一种用户设备,其中,所述用户设备包括:
    存储器,用于存储程序指令;
    处理器,用于监听用户设备在当前小区的组呼数据,并从所述当前小区的基站获取所述当前小区的超帧号为第一超帧号;
    所述处理器,还用于在所述用户设备从所述当前小区切换至目标小区时,从所述目标小区的基站接收组呼数据并根据所述第一超帧号获得所述目标小区的超帧号的区间范围,所述目标小区的超帧号为第二超帧号;
    控制器,用于根据所述第二超帧号的区间范围遍历所述第二超帧号并根据所述第二超帧号得到明文,并将所述明文所包括的组呼会话信息与所述当前小区的组呼数据进行比较,若比较结果一致,则遍历所述第二超帧号解密成功,并根据所述第二超帧号进行解密操作。
  16. 根据权利要求15所述的用户设备,其中,所述第二超帧号为在[X-M,X+N]的区间范围内,其中X为所述第一超帧号,M和N均为自然数;在所述[X-M,X+N]的区间范围内改变所述第二超帧号的值,所述处理模块根据改变后的所述第二超帧号的值进行解密操作,以得到所述明文。
  17. 根据权利要求16所述的用户设备,其中,所述处理模块遍历所述第二超帧号的顺序为:
    X->X-1->X+1->X-2->X+2…->X-M…->X+N;
    在所述组呼数据配置为PDCP SN 5bit且包间隔20毫秒时,M和N设置为2。
  18. 根据权利要求15所述的用户设备,其中,所述用户设备在从所述当前小区切换至目标小区时,所述处理器发起并建立组呼会话,以使基站在建立集群业务承载时,新增字段以携带组呼数据的加密参数,并且保存所述加密参数;
    所述用户设备从所述当前小区切换至所述目标小区时,所述处理器新增或复用其中一条信令携带所述当前小区会话密钥标识或直接携带所述当前小区的密钥;
    所述处理器接收到所述目标小区的加密组呼数据;
    所述控制器根据所述第二超帧号对所述目标小区的加密组呼数据进行解密操作。
  19. 根据权利要求18所述的用户设备,其中,所述处理器还发送所述当前小区会话密钥标识或者所述当前小区的密钥给所述目标小区的基站,所述目标小区的基站将所述当前小区会话密钥标识或者所述当前小区的密钥与所述目标小区的密钥进行比较;
    若一致,则所述处理器从所述目标小区的基站接收到所述目标小区的加密组呼数据;
    若不一致,则所述处理器从所述目标小区的基站接收到所述目标小区的加密组呼数据的同时将所述目标小区的密钥发送给所述当前小区的基站,再由所述当前小区的基站将所述目标小区的密钥发送给所述用户设备。
  20. 根据权利要求15所述的用户设备,其中,在所述用户设备从所述当前小区切换至目标小区时,所述处理器发起并建立组呼会话,以使基站在建立集群业务承载时,新增字段以携带组呼加密参数,并且保存所述组呼加密参数;
    所述处理器从所述目标小区的基站接收到所述目标小区的加密组呼数据。
PCT/CN2017/070744 2017-01-10 2017-01-10 集群组呼解密方法及用户设备 WO2018129652A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
DE112017006767.7T DE112017006767T5 (de) 2017-01-10 2017-01-10 Entschlüsselungsverfahren für einen Trunking-Gruppenruf und Benutzereinrichtung
US16/476,812 US11057765B2 (en) 2017-01-10 2017-01-10 Decryption method for trunking group call, and user equipment
PCT/CN2017/070744 WO2018129652A1 (zh) 2017-01-10 2017-01-10 集群组呼解密方法及用户设备

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/070744 WO2018129652A1 (zh) 2017-01-10 2017-01-10 集群组呼解密方法及用户设备

Publications (1)

Publication Number Publication Date
WO2018129652A1 true WO2018129652A1 (zh) 2018-07-19

Family

ID=62839225

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/070744 WO2018129652A1 (zh) 2017-01-10 2017-01-10 集群组呼解密方法及用户设备

Country Status (3)

Country Link
US (1) US11057765B2 (zh)
DE (1) DE112017006767T5 (zh)
WO (1) WO2018129652A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPWO2022210914A1 (zh) * 2021-03-30 2022-10-06

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009045160A1 (en) * 2007-10-02 2009-04-09 Telefonaktiebolaget L M Ericsson (Publ) A method and apparatus for secure handover in a communication network
CN101729377A (zh) * 2008-10-30 2010-06-09 华为技术有限公司 超帧号的通知方法、装置和系统
CN104684030A (zh) * 2013-12-02 2015-06-03 普天信息技术研究院有限公司 一种集群系统中实现安全参数同步的方法
CN104853388A (zh) * 2015-04-02 2015-08-19 四川大学 一种集群通信系统中群组数据包序列号的生成方法和基站

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FI96652C (fi) * 1994-06-27 1996-07-25 Nokia Telecommunications Oy Menetelmä radiokanavien allokoimiseksi
US6097817A (en) * 1997-12-10 2000-08-01 Omnipoint Corporation Encryption and decryption in communication system with wireless trunk
TWI429221B (zh) * 2006-11-01 2014-03-01 Ericsson Telefon Ab L M 電信系統中廣播/多播資料之分佈
US8208498B2 (en) 2007-10-30 2012-06-26 Qualcomm Incorporated Methods and systems for HFN handling at inter-base station handover in mobile communication networks
KR101391861B1 (ko) * 2008-02-04 2014-05-07 삼성전자주식회사 이동통신시스템에서 암호화 및 해독화를 위한 하이퍼프레임 넘버 관리 방법 및 장치
US20120230240A1 (en) * 2008-10-31 2012-09-13 Wi-Lan, Inc. Multicast broadcast service controller
CN102123460B (zh) 2010-01-07 2014-11-05 普天信息技术研究院有限公司 集群移动通信系统中实现组呼业务切换的方法
US9392510B2 (en) 2012-01-09 2016-07-12 Samsung Electronics Co., Ltd. Handover method and apparatus in wireless communication system
CN103179558B (zh) * 2012-09-20 2016-06-22 中兴通讯股份有限公司 集群系统组呼加密实现方法及系统
EP3125585B1 (en) 2014-03-26 2019-09-25 Hytera Communications Corporation Limited Mobile station, repeater and methods for trunking communication

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009045160A1 (en) * 2007-10-02 2009-04-09 Telefonaktiebolaget L M Ericsson (Publ) A method and apparatus for secure handover in a communication network
CN101729377A (zh) * 2008-10-30 2010-06-09 华为技术有限公司 超帧号的通知方法、装置和系统
CN104684030A (zh) * 2013-12-02 2015-06-03 普天信息技术研究院有限公司 一种集群系统中实现安全参数同步的方法
CN104853388A (zh) * 2015-04-02 2015-08-19 四川大学 一种集群通信系统中群组数据包序列号的生成方法和基站

Also Published As

Publication number Publication date
US11057765B2 (en) 2021-07-06
US20190364421A1 (en) 2019-11-28
DE112017006767T5 (de) 2019-11-28

Similar Documents

Publication Publication Date Title
WO2011153714A1 (zh) 支持多imsi的方法、装置和系统
WO2014000187A1 (zh) 参数配置方法及基站、用户设备
WO2013183971A1 (en) Method and system for selective protection of data exchanged between user equipment and network
WO2017113918A1 (zh) 一种基于非授权频段的通信方法、相关设备及系统
WO2014019139A1 (zh) 一种实现无线资源控制连接释放的方法、装置及系统
WO2014065632A1 (en) Method and device for managing security key for communication authentication of subscriber station used in cooperative communication of multiple base station in radio communication system
WO2020019735A1 (zh) 家电设备及其联网控制方法、装置、移动终端
WO2014157979A1 (en) Transmission method on physical uplink shared channel and user equipment
WO2014019185A1 (zh) 一种控制和转发解耦下协议处理方法及控制面设备、转发面设备
WO2015115798A1 (en) User terminal device and secured communication method thereof
WO2015109435A1 (zh) 频点测量控制方法及基站、用户设备
WO2018099415A1 (zh) 一种面向5g平台的节点发现方法及系统、电子设备
WO2015078129A1 (zh) 调制解调器及其通信方法、无线充电方法及设备
WO2017219636A1 (zh) 数据交互方法、云端服务器以及智能终端
WO2018157405A1 (zh) 传输数据的方法和设备
WO2017185647A1 (zh) 基于SoftSIM的IMSI号码管理及呼叫方法、服务器及网络侧设备
WO2019245339A1 (ko) 이동 통신 시스템에서 기지국 노드 간 패킷 복제 동작 동기화 방법 및 장치
WO2019223600A1 (zh) 蓝牙音频传输方法、装置及计算机可读存储介质
WO2017071348A1 (zh) 网络接入方法、服务器、终端及系统
WO2015027458A1 (zh) 非接入层消息的处理方法、用户设备和网络侧设备
WO2018076293A1 (zh) 多媒体通信的参数调整方法、装置及移动终端
WO2015131376A1 (zh) 基站、终端及切换方法
WO2018129652A1 (zh) 集群组呼解密方法及用户设备
WO2020004986A1 (ko) 무선 통신 시스템에서 통신 방법 및 장치
WO2020113679A1 (zh) 扩展频谱的方法、芯片、显示面板及可读存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17891271

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 18.11.2019)

122 Ep: pct application non-entry in european phase

Ref document number: 17891271

Country of ref document: EP

Kind code of ref document: A1