[go: up one dir, main page]

CN100373991C - An Encryption Negotiation Method for Voice Communication in Packet Network - Google Patents

An Encryption Negotiation Method for Voice Communication in Packet Network Download PDF

Info

Publication number
CN100373991C
CN100373991C CNB2005100120485A CN200510012048A CN100373991C CN 100373991 C CN100373991 C CN 100373991C CN B2005100120485 A CNB2005100120485 A CN B2005100120485A CN 200510012048 A CN200510012048 A CN 200510012048A CN 100373991 C CN100373991 C CN 100373991C
Authority
CN
China
Prior art keywords
message
calling party
party
called party
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2005100120485A
Other languages
Chinese (zh)
Other versions
CN1710985A (en
Inventor
孙毅
金鑫
田霖
石晶林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING DINGSOFT TECHNOLOGY CO LTD
Beijing Dongfangjianyu Institute Of Concrete Science & Technology Ltd Compan
BEIJING XINHANG BUILDING MATERIAL GROUP Co Ltd
Original Assignee
Institute of Computing Technology of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Computing Technology of CAS filed Critical Institute of Computing Technology of CAS
Priority to CNB2005100120485A priority Critical patent/CN100373991C/en
Publication of CN1710985A publication Critical patent/CN1710985A/en
Application granted granted Critical
Publication of CN100373991C publication Critical patent/CN100373991C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明属于网络安全技术领域,是分组网络中语音通信的一种加密协商方法。其步骤包括:每一个通信终端都有一个通信标志符和一对公私钥,其中各通信终端在设备入网的时候就把本终端的通信标志符和公钥注册到核心网上的注册服务器;当通信终端开机或者是越区切换时,需要把本机当前的地址信息在注册服务器登记;当呼叫发起时,主叫方首先从注册服务器获取被叫的当前地址和公钥,然后由主叫方指定本次通话的加密算法和密钥,并通知被叫方,被叫方收到通知消息后,检查自己是否支持主叫方指定的加密算法,如果支持,被叫向主叫发送确认消息,否则,被叫向主叫发送相应的出错消息,主叫根据被叫发来的出错消息,重新选择加密算法和密钥。

Figure 200510012048

The invention belongs to the technical field of network security, and relates to an encryption negotiation method for voice communication in a packet network. The steps include: each communication terminal has a communication identifier and a pair of public and private keys, wherein each communication terminal registers the communication identifier and public key of the terminal to the registration server on the core network when the device is connected to the network; When the terminal is turned on or handed over, it needs to register the current address information of the terminal in the registration server; when a call is initiated, the calling party first obtains the called current address and public key from the registration server, and then the calling party specifies The encryption algorithm and key of this call, and notify the called party. After receiving the notification message, the called party checks whether it supports the encryption algorithm specified by the calling party. If yes, the called party sends a confirmation message to the calling party, otherwise , the called party sends a corresponding error message to the calling party, and the calling party reselects the encryption algorithm and key according to the error message sent by the called party.

Figure 200510012048

Description

The encrypted negotiation method of voice communication in a kind of packet network
Technical field
The invention belongs to the network security technology field, the method for voice communication encrypted negotiation in particularly a kind of packet network.
Background technology
In recent ten years, the Speech Communication technology on the Packet Based Network (Voice over IP-VoIP) is the research focus of telecommunications industry and computer industry always.Document [1] " Voice over IPFundamentals ", Cisco Press, www.cisco.com.Be accompanied by being extensive use of of voip technology, the fail safe that how to improve voice communication just becomes the problem of a key.Speech data is encrypted, can be guaranteed the confidentiality of speech transmissions.Consider that voice communication is the very strong business of a kind of real-time, should adopt symmetric key algorithm, and the prerequisite of symmetric key algorithm work is exactly to share cryptographic algorithm and session key between the both sides of Speech Communication through consultation the encryption of speech data.
Summary of the invention
The object of the present invention is to provide a kind of in packet network the encrypted negotiation method of Speech Communication.It can share information such as cryptographic algorithm, session key by introducing mechanism such as public and private key, eap-message digest between the both sides of Speech Communication, thereby improves the fail safe and the reliability of voice communication.
The present invention is based upon in the packet network environment, and network is made up of functional entitys such as voice communication terminal (IP mobile telephone, personal digital assistant, notebook computer, desktop computer etc.), access device (base station, cable access router etc.), registrar.Wherein, voice communication terminal is by wired or wireless mode access network, and registrar is arranged in core network, is used to safeguard the Speech Communication relevant information of all communication terminals.See Fig. 1.
The present invention is a kind of implementation method of voice communication encrypted negotiation in the packet network.Each communication terminal all has a communication mark symbol and a pair of public and private key, wherein each communication terminal just is registered to registrar on the core net to the communication mark of this terminal symbol and PKI when equipment networks, has preserved the legal PKI and the cryptographic algorithm index value of registrar simultaneously and tabulate in this terminal; When communication terminal start or handover, need on registrar, register the current address information of this machine; When audio call is initiated, the calling party at first obtains called current address and PKI from registrar, is specified the cryptographic algorithm and the key of this conversation then by the calling party, and notifies the callee, after the notified message of callee, check whether oneself supports the cryptographic algorithm of calling party's appointment, if support, called party to calling party sends acknowledge message, otherwise, called party to calling party sends corresponding error messages, and caller is reselected cryptographic algorithm and key according to the called error messages of sending.
The present invention is the encrypted negotiation method of voice communication in a kind of packet network, and its implementation is as follows:
Each communication terminal all has a communication mark symbol, the communication mark symbol can adopt the form of telephone number also can adopt other all legal identifiers, the communication mark symbol is used for indicating uniquely a verbal system, and all legal communication mark symbols all have uniqueness not to be repeated mutually.The IP address of corresponding with it is each communication terminal is unfixed, so the IP address can not be used for the identification communication terminal equipment.In order to improve fail safe, each communication terminal also has a pair of public and private key, wherein private key is left in device interior in confidence and can not be disclosed, PKI just has been registered to the registrar on the core net together with the communication mark symbol in the initial networking of communication equipment, in registration process, communication terminal device also obtains and has preserved the legal PKI of registrar and the index value tabulation of cryptographic algorithm simultaneously.After the registration that completes successfully communication mark symbol and PKI, communication terminal device just can have been opened the voice service on the Packet Based Network.
Because the IP address of each communication terminal device is unfixed, so starting voice service or terminal equipment each time at communication terminal is moved and switches and when causing the IP address to change, all need the up-to-date address information of terminal by ADDR_SET message informing registrar, registrar is the relative recording of this terminal equipment in the new database more.For the ease of registrar terminal is carried out authentication, ADDR_SET message need be signed with the private key of terminal, and message content comprises information such as the communication mark symbol of terminal equipment and address.
When calling party's communication terminal need be initiated audio call, it sent to registrar core net on together with calling party and callee's communication mark symbol by INFO_REQ message with timestamp.After registrar is received INFO_REQ message, the database of inquiring about oneself finds callee current IP address and PKI, constitute the plaintext of INFO_RES message then together with the timestamp in the INFO_REQ message, and message expressly calculated eap-message digest, at last INFO_RES message is signed with the private key of registrar itself and send to the calling party.The calling party is decrypted INFO_RES message with the PKI of registrar, recomputate message summary info expressly then, and whether destroyed with this integrality of judging INFO_RES message, calling party's terminal also can contrast timestamp and the own original timestamp that writes down in the INFO_RES message simultaneously, if both upcheck at identical and message integrity, then the calling party just uses the process that the callee current address that comprises in the INFO_RES message and PKI continue the voice communication encrypted negotiation, otherwise the calling party must resend the correct answer of INFO_REQ message and queued for log-on server.
After in case the calling party has obtained callee's legal address and PKI from registrar, next it will and specify corresponding session key (it is that 0 this conversation of expression need not to encrypt that the calling party also can be provided with the cryptographic algorithm index value) for the selected a kind of cryptographic algorithm of this communication, cryptographic algorithm is represented by an index value, different cryptographic algorithm index value differences, the index value tabulation of cryptographic algorithm is safeguarded by registrar is unified, terminal equipment obtains and has preserved this tabulation from registrar when networking, in addition, terminal equipment also can dynamically be downloaded this tabulation to the registrar request by LIST_REQ message.The plaintext that cryptographic algorithm index that the calling party selects and session key have constituted CIPH_SET message, before sending this message, the calling party need at first calculate message summary expressly, then CIPH_SET message is encrypted with callee's PKI, and passes to the current address of terminal called.
After terminal called is received CIPH_SET message, decipher this message with the private key of oneself, recomputate message summary expressly then, and whether destroyed with this integrality of judging CIPH_SET message, if message integrity check is not passed through, the callee will send CIPH_SET_ERROR message to the calling party, and type of error is made as " integrity checking failure ", after the calling party receives this type of error message, can transmit CIPH_SET message again; If message integrity check is passed through, terminal called will continue to detect the cryptographic algorithm whether this machine supports appointment in the CIPH_SET message, if do not support, then terminal called will send CIPH_SET_ERROR message to the calling party, type of error is made as " cryptographic algorithm is not supported ", the index value information that in such CIPH_SET_ERROR message, also can comprise all cryptographic algorithm of terminal called support simultaneously, after the calling party receives this type of error message, can reassign the cryptographic algorithm and the session key (it is that 0 this conversation of expression need not to encrypt that the calling party also can be provided with the cryptographic algorithm index value) of this voice call according to the cryptographic algorithm that the callee supports, and then send CIPH_SET message; If the callee supports the cryptographic algorithm that the calling party selectes, then the callee can send CIPH_SET_CONF message to the calling party, after the calling party finally receives the CIPH_SET_CONF message that the callee sends, the encrypted negotiation process finishes, and communicating pair just can utilize the cryptographic algorithm and the session key that consult to come the enciphoring voice telecommunication packet.
The present invention has the following advantages:
1) the encrypted negotiation process at most only need be shaken hands for 4 times, and is simple.
2) different terminals can be supported different cryptographic algorithm, and flexibility is good.
3) introduce mechanism such as timestamp, eap-message digest, can solve safety issues such as Replay Attack, content tampering.
Description of drawings
Fig. 1 is the packet network topology diagram.
Fig. 2 is the flow chart of the encrypted negotiation process that experiences of a voice call.
Embodiment
Among Fig. 2, the concrete steps of the encrypted negotiation that a voice call is experienced are as follows:
Rapid S2.1: the calling party sends call request;
Step S2.2: the registrar of calling party on core net sends INFO_REQ message, this message has comprised caller, called party information and timestamp, registrar is replied INFO_RES to the calling party, this message is signed with the private key of registrar, and content comprises the current IP address of timestamp, the callee of calling party's appointment, callee's PKI and eap-message digest etc.; Step S2.3: the calling party by the validity of timestamp inspection INFO_RES message, checks the integrality of INFO_RES message with the PKI deciphering INFO_RES message of registrar by summary, if above inspection is all passed through, then enter S2.4, otherwise, S2.2 returned;
Step S2.4: the calling party selects cryptographic algorithm and session key for this voice communication, and send CIPH_SET message to the callee, this message uses callee's PKI to encrypt, and content comprises cryptographic algorithm index value, session key and the eap-message digest etc. that the calling party selectes;
Step S2.5: the callee receives CIPH_SET message, deciphers this message with private key;
Step S2.6: the callee judges the integrality of CIPH_SET message by calculating eap-message digest, if integrity checking passes through, enters S2.8, if message integrity is destroyed, enters S2.7;
Step S2.7: the callee sends CIPH_SET_ERROR message to the calling party, and type of error is the integrity checking failure, returns S2.4;
Step S2.8: the called cryptographic algorithm that judges whether to support that caller is selected if support, enters S2.10; Otherwise, enter S2.9;
Step S2.9: the callee sends CIPH_SET_ERROR message to the calling party, and type of error is that cryptographic algorithm is not supported, has comprised all cryptographic algorithm index values that the callee supports in this message simultaneously, returns S2.4;
Step S2.10: the callee sends CIPH_SET_CONF message to the calling party, and setting completed for the caller notification enciphered message;
Step S2.11: the calling party receives CIPH_SET_CONF message, and the encrypted negotiation process finishes.

Claims (3)

1.一种分组网络中语音通信的加密协商方法,其特征在于,每一个通信终端都有一个通信标志符和一对公私钥,其中各通信终端在设备入网的时候就把本终端的通信标志符和公钥注册到核心网上的注册服务器,同时在本终端中保存了注册服务器的合法公钥以及加密算法索引值列表;当通信终端开机或者是越区切换时,需要把本机当前的地址信息在注册服务器上进行登记;当语音呼叫发起时,主叫方首先从注册服务器获取被叫的当前地址和公钥,然后由主叫方指定本次通话的加密算法和密钥,并通知被叫方,被叫方收到通知消息后,检查自己是否支持主叫方指定的加密算法,如果支持,被叫向主叫发送确认消息,否则,被叫向主叫发送相应的出错消息,主叫根据被叫发来的出错消息,重新选择加密算法和密钥。1. An encryption negotiation method for voice communication in a packet network, characterized in that each communication terminal has a communication identifier and a pair of public-private keys, wherein each communication terminal puts the communication identifier of this terminal when the equipment is connected to the network. Signature and public key are registered to the registration server on the core network, and at the same time, the legal public key of the registration server and the index value list of the encryption algorithm are saved in the terminal; The information is registered on the registrar server; when a voice call is initiated, the calling party first obtains the called party’s current address and public key from the registrar server, and then the calling party specifies the encryption algorithm and key for this call, and notifies the called party The calling party and the called party check whether they support the encryption algorithm specified by the calling party after receiving the notification message. If they support it, the called party sends a confirmation message to the calling party; The caller reselects the encryption algorithm and key according to the error message sent by the called party. 2.根据权利要求1所述的分组网络中语音通信的加密协商方法,其特征是:2. the encryption negotiation method of voice communication in the packet network according to claim 1, is characterized in that: 当通信终端开机或者是越区切换时,所述把本机当前的地址信息在注册服务器上进行登记,是把本机私钥签名的当前地址在注册服务器登记;When the communication terminal is turned on or is handed over, the registration of the current address information of the local machine on the registration server is to register the current address signed by the private key of the local machine at the registration server; 当语音呼叫发起时,所述加密协商方法具体包括:主叫方将当前时间戳连同通信双方的信息发送给核心网上的注册服务器,注册服务器收到主叫方发来的查询请求后,向主叫方回复相应消息,回复消息用注册服务器的私钥签名,内容包括主叫方指明的时间戳、被叫方当前的IP地址、被叫方的公钥以及消息摘要,主叫方收到注册服务器发来的回复消息后,用注册服务器的公钥解密该消息,并通过“时间戳”和“摘要”字段检测消息的有效性和完整性,如果检测没有通过,主叫方需要重新向注册服务器发出请求,如果检测通过,主叫方就为本次语音通信选择加密算法和会话密钥,并向被叫方发送加密设置消息,该消息用被叫方的公钥进行加密,内容包括主叫方选定的加密算法、会话密钥以及消息摘要,被叫方收到加密设置消息后,用私钥解密该消息,然后通过“摘要”字段检测消息的完整性,如果检测不通过,被叫方会向主叫方发送相应的出错消息,通知主叫方重传该消息,如果检测通过,被叫方检查本机是否支持主叫方选定的加密算法,如果不支持,则被叫方会向主叫方发送相应的出错消息,把被叫方支持的各种加密算法信息通知主叫方,以便让主叫方重新进行加密信息的选择,如果被叫支持主叫选定的加密算法,则被叫会向主叫发送相应的确认消息,主叫方收到确认消息后,加密协商过程结束。When a voice call is initiated, the encryption negotiation method specifically includes: the calling party sends the current time stamp together with the information of both communication parties to the registration server on the core network, and the registration server sends the caller the query request sent by the calling party. The calling party replies to the corresponding message, and the reply message is signed with the private key of the registration server. After the reply message sent by the server, use the public key of the registered server to decrypt the message, and check the validity and integrity of the message through the "time stamp" and "digest" fields. If the test fails, the calling party needs to re-register The server sends a request, and if the test passes, the calling party selects an encryption algorithm and a session key for this voice communication, and sends an encryption setting message to the called party, which is encrypted with the called party’s public key, and the content includes The encryption algorithm, session key, and message digest selected by the calling party. After receiving the encryption setting message, the called party decrypts the message with the private key, and then checks the integrity of the message through the "summary" field. If the test fails, the called party The calling party will send a corresponding error message to the calling party, and notify the calling party to retransmit the message. If the detection is passed, the called party will check whether the machine supports the encryption algorithm selected by the calling party. If not, the called party will The party will send a corresponding error message to the calling party, and inform the calling party of the various encryption algorithms supported by the called party, so that the calling party can re-select the encryption information. If the called party supports the encryption algorithm selected by the calling party algorithm, the called party will send a corresponding confirmation message to the calling party. After the calling party receives the confirmation message, the encryption negotiation process ends. 3.根据权利要求1所述的分组网络中语音通信的加密协商方法,该方法具体包括如下步骤:3. the encryption negotiation method of voice communication in the packet network according to claim 1, the method specifically comprises the steps: 步骤S2.1:主叫方发出呼叫请求;Step S2.1: the calling party sends a call request; 步骤S2.2:主叫方向核心网上的注册服务器发送INFO_REQ消息,该消息包含了主叫、被叫方信息以及时间戳,注册服务器向主叫方回复INFO_RES,该消息用注册服务器的私钥进行签名,内容包括主叫方指定的时间戳、被叫方当前的IP地址、被叫方的公钥以及消息摘要;Step S2.2: The calling party sends an INFO_REQ message to the registrar server on the core network. The message contains the information of the calling party and the called party and a time stamp. The registrar server replies to the calling party with INFO_RES. Signature, including the timestamp specified by the calling party, the current IP address of the called party, the public key of the called party, and the message digest; 步骤S2.3:主叫方用注册服务器的公钥解密INFO_RES消息,通过时间戳检查INFO_RES消息的有效性,通过摘要检查INFO_RES消息的完整性,如果以上检查都通过,则进入S2.4,否则,返回S2.2;Step S2.3: The calling party decrypts the INFO_RES message with the public key of the registrar, checks the validity of the INFO_RES message through the timestamp, and checks the integrity of the INFO_RES message through the digest. If the above checks pass, go to S2.4, otherwise , return to S2.2; 步骤S2.4:主叫方为本次语音通信选择加密算法和会话密钥,并向被叫方发送CIPH_SET消息,该消息使用被叫方的公钥进行加密,内容包括主叫方选定的加密算法索引值、会话密钥以及消息摘要;Step S2.4: The calling party selects an encryption algorithm and a session key for this voice communication, and sends a CIPH_SET message to the called party, which is encrypted with the public key of the called party, and the content includes the Encryption algorithm index value, session key and message digest; 步骤S2.5:被叫方收到CIPH_SET消息,用私钥解密该消息;Step S2.5: The called party receives the CIPH_SET message, and decrypts the message with the private key; 步骤S2.6:被叫方通过计算消息摘要判断CIPH_SET消息的完整性,如果完整性检查通过,进入S2.8,如果消息完整性遭到破坏,进入S2.7;Step S2.6: The called party judges the integrity of the CIPH_SET message by calculating the message digest. If the integrity check is passed, go to S2.8. If the message integrity is damaged, go to S2.7; 步骤S2.7:被叫方向主叫方发送CIPH_SET_ERROR消息,错误类型是完整性检查失败,返回S2.4;Step S2.7: The called party sends a CIPH_SET_ERROR message to the calling party, the error type is integrity check failure, return to S2.4; 步骤S2.8:被叫判断是否支持主叫选定的加密算法,如果支持,进入S2.10;否则,进入S2.9;Step S2.8: The called party judges whether the encryption algorithm selected by the calling party is supported, and if so, proceeds to S2.10; otherwise, proceeds to S2.9; 步骤S2.9:被叫方向主叫方发送CIPH_SET_ERROR消息,错误类型是加密算法不支持,该消息中同时包含了被叫方支持的所有加密算法索引值,返回S2.4;Step S2.9: The called party sends a CIPH_SET_ERROR message to the calling party. The error type is that the encryption algorithm is not supported. The message also includes all encryption algorithm index values supported by the called party, and returns to S2.4; 步骤S2.10:被叫方向主叫方发送CIPH_SET_CONF消息,通知主叫方加密信息设置完毕;Step S2.10: The called party sends a CIPH_SET_CONF message to the calling party to notify the calling party that the encrypted information is set; 步骤S2.11:主叫方收到CIPH_SET_CONF消息,加密协商过程结束。Step S2.11: The calling party receives the CIPH_SET_CONF message, and the encryption negotiation process ends.
CNB2005100120485A 2005-06-30 2005-06-30 An Encryption Negotiation Method for Voice Communication in Packet Network Expired - Fee Related CN100373991C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005100120485A CN100373991C (en) 2005-06-30 2005-06-30 An Encryption Negotiation Method for Voice Communication in Packet Network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005100120485A CN100373991C (en) 2005-06-30 2005-06-30 An Encryption Negotiation Method for Voice Communication in Packet Network

Publications (2)

Publication Number Publication Date
CN1710985A CN1710985A (en) 2005-12-21
CN100373991C true CN100373991C (en) 2008-03-05

Family

ID=35707143

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005100120485A Expired - Fee Related CN100373991C (en) 2005-06-30 2005-06-30 An Encryption Negotiation Method for Voice Communication in Packet Network

Country Status (1)

Country Link
CN (1) CN100373991C (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106101081A (en) * 2016-05-31 2016-11-09 宇龙计算机通信科技(深圳)有限公司 Speech ciphering method, device, terminal, key management platform and system

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101378591B (en) 2007-08-31 2010-10-27 华为技术有限公司 Method, system and device for negotiating safety capability when terminal is moving
CN101399767B (en) 2007-09-29 2011-04-20 华为技术有限公司 Method, system and apparatus for security capability negotiation during terminal moving
CN101227638A (en) * 2007-12-27 2008-07-23 华为技术有限公司 Apparatus and method for implementing called terminal startup notifying
CN101741820B (en) * 2008-11-13 2013-12-18 华为技术有限公司 Method, system and device for recognizing and determining color graphic adapter (CGA) public key
CN101789863B (en) * 2009-01-22 2013-01-23 深圳市文鼎创数据科技有限公司 Safe data information transmission method
CN105282734B (en) * 2014-06-11 2018-10-26 中国移动通信集团公司 A kind of method that realizing across a network secret telephony, terminal, radio network gateway and system
CN105592451A (en) * 2014-10-22 2016-05-18 北京元心科技有限公司 Voice call method, voice response method, and mobile terminal
CN104539433A (en) * 2014-10-30 2015-04-22 马洁韵 Voice communication encryption system and encryption method thereof
WO2016183731A1 (en) 2015-05-15 2016-11-24 华为技术有限公司 Signal processing method, apparatus and system
EP3276920B1 (en) 2015-05-25 2020-01-15 Huawei Technologies Co., Ltd. Message processing method, device and system
CN104955034A (en) * 2015-05-28 2015-09-30 盛耀无线通讯科技(北京)有限公司 Communication conversation method
CN104955033A (en) * 2015-05-28 2015-09-30 盛耀无线通讯科技(北京)有限公司 Voice encryption communication method
CN107786494A (en) * 2016-08-25 2018-03-09 联想移动通信科技有限公司 A kind of mode and terminal of speech data encryption and decryption
CN108322451B (en) * 2018-01-12 2020-09-22 深圳壹账通智能科技有限公司 Data processing method, data processing device, computer equipment and storage medium
CN113099444B (en) * 2021-02-23 2022-06-24 中国科学院大学 Information transmission method and system for protecting privacy
CN113746807A (en) * 2021-08-11 2021-12-03 北银金融科技有限责任公司 Block chain node point support cryptographic algorithm communication detection method
CN113411190B (en) * 2021-08-20 2021-11-09 北京数业专攻科技有限公司 Key deployment, data communication, key exchange and security reinforcement method and system
CN115022024B (en) * 2022-05-31 2023-09-29 中国电信股份有限公司 Method and device for encrypting call, storage medium and electronic equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020191787A1 (en) * 2001-06-19 2002-12-19 Litwin Louis Robert Method for using an access card to create a secure sub-network on a public network
EP1416665A2 (en) * 2002-10-31 2004-05-06 Matsushita Electric Industrial Co., Ltd. Communication device, communication system, and cryptographic algorithm selection method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020191787A1 (en) * 2001-06-19 2002-12-19 Litwin Louis Robert Method for using an access card to create a secure sub-network on a public network
EP1416665A2 (en) * 2002-10-31 2004-05-06 Matsushita Electric Industrial Co., Ltd. Communication device, communication system, and cryptographic algorithm selection method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
kerberos assisted authentication in mobile Ad-hoc networks. Asad,Amir,Pirzada,,Chris,McDonald.27th Australasian Computer Science Conference ,Dunedin, New Zealand. 2004 *
密码编码学与网络安全-原理与实践. William Stllings,第7章,电子工业出版社. 2004 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106101081A (en) * 2016-05-31 2016-11-09 宇龙计算机通信科技(深圳)有限公司 Speech ciphering method, device, terminal, key management platform and system

Also Published As

Publication number Publication date
CN1710985A (en) 2005-12-21

Similar Documents

Publication Publication Date Title
CN100373991C (en) An Encryption Negotiation Method for Voice Communication in Packet Network
CN101406021B (en) SIM based authentication
FI108590B (en) Encryption system for mobile phone
US8327144B2 (en) Authentication method, system, and apparatus thereof for inter-domain information communication
JP5790653B2 (en) Service provision system
CN100409612C (en) Method, system and mobile terminal for checking integrity of data
US20150089220A1 (en) Technique For Bypassing an IP PBX
TWI711293B (en) Method of identity authentication for voice over internet protocol call and related device
CN106101068A (en) Terminal communicating method and system
JP2007528650A (en) Method for verifying first ID and second ID of entity
CN1249588A (en) Method for updating encrypted shared data in radio communication system
CN101083530A (en) Method for realizing intra-mobile entity authentication and cipher key negotiation using short message
CN1611032B (en) Authentication usage service method involving setting requirements for authentication data content
CN102202299A (en) Realization method of end-to-end voice encryption system based on 3G/B3G
CN113347215B (en) Encryption method for mobile video conference
CN1659558B (en) Mediator-based interworking using hierarchical certificates
Hwang et al. On the security of an enhanced UMTS authentication and key agreement protocol
CN100466805C (en) Method for end-to-end enciphoring voice telecommunication
US10595203B2 (en) Enhanced establishment of IMS session with secure media
JP4827717B2 (en) COMMUNICATION SYSTEM, TRANSMITTING TERMINAL TERMINAL DEVICE, AND RECEIVING SIDE TERMINAL DEVICE
CN113923668B (en) Method, device, chip and readable storage medium for identifying network attack behavior
CN106559402A (en) The identity identifying method and device of user terminal and its encryption voice telephone service
CN113132323B (en) Communication method and device
CN107801186A (en) Non-Access Stratum abstract authentication method in a kind of trunked communication system
JP2004274602A (en) Network communication system for identifying impersonation of VoIP communication terminal under wireless LAN

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: BEIJING DONGFANGJIANYU INSTITUTE OF CONCRETE SCIEN

Free format text: FORMER OWNER: INST. OF COMPUTING TECHNOLOGY, CHINESE ACADEMY OF SCIENCES

Effective date: 20110110

Owner name: BEIJING DINGSOFT TECHNOLOGY CO., LTD. BEIJING XINH

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 100080 NO. 6, KEXUEYUAN SOUTH ROAD, ZHONGGUANCUN, HAIDIAN DISTRICT, BEIJING TO: 100080 ROOM 1708, 17/F, YINGU BUILDING, NO. 9, N. 4TH RING WEST ROAD, HAIDIAN DISTRICT, BEIJING

TR01 Transfer of patent right

Effective date of registration: 20110110

Address after: 100080 Beijing city Haidian District North Fourth Ring Road No. 9 building 17 room 1708 Silver Valley

Co-patentee after: Beijing Dingsoft Technology Co.,Ltd.

Patentee after: Beijing Dongfangjianyu Institute of Concrete Science & Technology Limited Compan

Co-patentee after: Beijing Xinhang Building Material Group Co., Ltd.

Address before: 100080 Haidian District, Zhongguancun Academy of Sciences, South Road, No. 6, No.

Patentee before: Institute of Computing Technology, Chinese Academy of Sciences

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20080305

Termination date: 20180630