WO2014180390A3 - Trunking group communication public security implementation method and device - Google Patents
Trunking group communication public security implementation method and device Download PDFInfo
- Publication number
- WO2014180390A3 WO2014180390A3 PCT/CN2014/078185 CN2014078185W WO2014180390A3 WO 2014180390 A3 WO2014180390 A3 WO 2014180390A3 CN 2014078185 W CN2014078185 W CN 2014078185W WO 2014180390 A3 WO2014180390 A3 WO 2014180390A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- trunking group
- trunking
- key
- accordance
- terminal
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations
- H04L12/18—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
- H04L12/1813—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
- H04L12/1818—Conference organisation arrangements, e.g. handling schedules, setting up parameters needed by nodes to attend a conference, booking network resources, notifying involved parties
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2203/00—Aspects of automatic or semi-automatic exchanges
- H04M2203/15—Aspects of automatic or semi-automatic exchanges related to dial plan and call routing
- H04M2203/152—Temporary dial plan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2203/00—Aspects of automatic or semi-automatic exchanges
- H04M2203/60—Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
- H04M2203/609—Secret communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/50—Centralised arrangements for answering calls; Centralised arrangements for recording messages for absent or busy subscribers ; Centralised arrangements for recording messages
- H04M3/51—Centralised call answering arrangements requiring operator intervention, e.g. call or contact centers for telemarketing
- H04M3/5116—Centralised call answering arrangements requiring operator intervention, e.g. call or contact centers for telemarketing for emergency applications
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Multimedia (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention provides a trunking group communication public security implementation method and device, wherein said method comprises: when a terminal within a group initiates a group call, receiving a random number from a network side; in accordance with said random number and with a root key obtained in advance from the network side, generating an intermediate parameter, and also a first key used for non-access stratum (NAS) decryption and integrity protection; generating a second key in accordance with said intermediate parameter; in accordance with the second key, engaging in the decryption and integrity protection of data coming from a trunking group control channel (TGCCH) and from a trunking group traffic channel (TGTCH). The above technical solution provided in the present invention solves the problem of the related art whereby a terminal is not supported on a downlink shared channel in regard to a point-to-multipoint type of trunking group traffic, thus achieving multi-user security. A security mechanism for trunking group UE terminal trunking group communication public channels is thus implemented.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310714496.4A CN104735626A (en) | 2013-12-20 | 2013-12-20 | Achieving method and device for trunking group communication public security |
CN201310714496.4 | 2013-12-20 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2014180390A2 WO2014180390A2 (en) | 2014-11-13 |
WO2014180390A3 true WO2014180390A3 (en) | 2014-12-24 |
Family
ID=51867811
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2014/078185 WO2014180390A2 (en) | 2013-12-20 | 2014-05-22 | Trunking group communication public security implementation method and device |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN104735626A (en) |
WO (1) | WO2014180390A2 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107529159B (en) * | 2016-06-22 | 2020-10-02 | 南京中兴软件有限责任公司 | Access layer encryption, decryption and integrity protection method and device for broadband cluster downlink shared channel and security implementation method |
CN107820221B (en) * | 2016-09-12 | 2020-02-11 | 大唐移动通信设备有限公司 | Cluster group call service encryption method and cluster core network |
CN109729522A (en) * | 2017-10-27 | 2019-05-07 | 普天信息技术有限公司 | Eat dishes without rice or wine encryption method and device under fail soft mode |
CN112954610B (en) * | 2019-11-22 | 2022-07-26 | 成都鼎桥通信技术有限公司 | Group signaling transmission method and device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102300167A (en) * | 2010-06-23 | 2011-12-28 | 中兴通讯股份有限公司 | Method and system for realizing fail soft |
CN102625300A (en) * | 2011-01-28 | 2012-08-01 | 华为技术有限公司 | Generation method and device for key |
CN103369523A (en) * | 2013-07-18 | 2013-10-23 | 成都鼎桥通信技术有限公司 | Method for improving cluster downlink safety |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100466501C (en) * | 2003-09-04 | 2009-03-04 | 华为技术有限公司 | Method for producing long code mask for cluster service |
CN100456669C (en) * | 2003-09-22 | 2009-01-28 | 华为技术有限公司 | Method of distributing group secret keys |
CN102291680B (en) * | 2010-06-18 | 2013-12-25 | 普天信息技术研究院有限公司 | Encrypted group calling method based on long term evolution (TD-LTE) trunking communication system |
CN102572819B (en) * | 2010-12-22 | 2015-05-13 | 华为技术有限公司 | Method, device and system for generating secret key |
CN103297958B (en) * | 2012-02-22 | 2017-04-12 | 华为技术有限公司 | Security context establishing method, device and system |
CN103179558B (en) * | 2012-09-20 | 2016-06-22 | 中兴通讯股份有限公司 | Group system group exhales encryption implementation method and system |
-
2013
- 2013-12-20 CN CN201310714496.4A patent/CN104735626A/en active Pending
-
2014
- 2014-05-22 WO PCT/CN2014/078185 patent/WO2014180390A2/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102300167A (en) * | 2010-06-23 | 2011-12-28 | 中兴通讯股份有限公司 | Method and system for realizing fail soft |
CN102625300A (en) * | 2011-01-28 | 2012-08-01 | 华为技术有限公司 | Generation method and device for key |
CN103369523A (en) * | 2013-07-18 | 2013-10-23 | 成都鼎桥通信技术有限公司 | Method for improving cluster downlink safety |
Also Published As
Publication number | Publication date |
---|---|
CN104735626A (en) | 2015-06-24 |
WO2014180390A2 (en) | 2014-11-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP4290918A3 (en) | Access stratum security for efficient packet processing | |
EP4247034A3 (en) | Method and system for providing security from a radio access network | |
WO2018125686A3 (en) | Methods and devices for radio communications | |
MX2019010926A (en) | Security solution for switching on and off security for up data between ue and ran in 5g. | |
PH12021550635A1 (en) | Systems and method for security protection of nas messages | |
WO2012141555A3 (en) | Method and apparatus for providing machine-to-machine service | |
MX2020005097A (en) | Improvements related to random access in wireless communications. | |
MY169151A (en) | Security key generation for dual connectivity | |
MY201177A (en) | Access method, device and system for user equipment (ue) | |
MX354833B (en) | Data encryption protocols for mobile satellite communications. | |
GB2425694B (en) | A method and an apparatus for securely communicating between a management server and a managed node associated with a dynamic provisioning system | |
EP3796737A3 (en) | Techniques for accessing a cell using an unlicensed radio frequency spectrum band | |
WO2014168570A3 (en) | A user equipment, a network node and methods therein for performing and enabling device-to-device (d2d) communication in a radio communications network | |
EP3326323A4 (en) | Method and system for shared key and message authentication over an insecure shared communication medium | |
EP4221410A3 (en) | Method and apparatus for transmitting wireless local area network data | |
TR201911098T4 (en) | Secure communication for computing devices using proximity services. | |
WO2015157693A3 (en) | System and method for an efficient authentication and key exchange protocol | |
WO2014116944A3 (en) | Cell identity design for lte-advanced | |
WO2015036789A3 (en) | Communicating with a device | |
WO2015119679A3 (en) | Method and system for securely establishing cryptographic keys for aircraft-to-aircraft communications | |
MX342841B (en) | Systems and methods for accessing a network. | |
GB201101981D0 (en) | Telecommunications method and system | |
EP3007478A4 (en) | Mobile secret communications method based on quantum key distribution network | |
WO2012077999A3 (en) | Traffic encryption key management for machine to machine multicast group | |
WO2015023332A3 (en) | Incorruptible public key using quantum cryptography for secure wired and wireless communications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14794804 Country of ref document: EP Kind code of ref document: A2 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 14794804 Country of ref document: EP Kind code of ref document: A2 |