[go: up one dir, main page]

CN103002439B - Confidential call communication method and user terminal - Google Patents

Confidential call communication method and user terminal Download PDF

Info

Publication number
CN103002439B
CN103002439B CN201110270174.6A CN201110270174A CN103002439B CN 103002439 B CN103002439 B CN 103002439B CN 201110270174 A CN201110270174 A CN 201110270174A CN 103002439 B CN103002439 B CN 103002439B
Authority
CN
China
Prior art keywords
calling
mark
user terminal
key
call
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201110270174.6A
Other languages
Chinese (zh)
Other versions
CN103002439A (en
Inventor
汪文清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Datang Linktech Infosystem Co., Ltd.
Original Assignee
Leadcore Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Leadcore Technology Co Ltd filed Critical Leadcore Technology Co Ltd
Priority to CN201110270174.6A priority Critical patent/CN103002439B/en
Publication of CN103002439A publication Critical patent/CN103002439A/en
Application granted granted Critical
Publication of CN103002439B publication Critical patent/CN103002439B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a confidential call communication method and a user terminal. The user terminal acquires and stores an identifier for calling during establishment of a call; the user terminal acquires and stores a key of the call during the establishment of the call, after a connected call or before the call, and establishes one-to-one correspondence between the stored identifier and the stored key. Therefore, during call waiting or call holding, the situation that the confidential call fails due to the key covered is avoided, and waiting and holding services of the confidential call are achieved.

Description

The communication means of secret telephony and user terminal
Technical field
The present invention relates to communication technical field, particularly a kind of communication means of secret telephony and user terminal.
Background technology
At present, in bright call except the basic session services such as this locality, national distance, National roaming, international roaming is provided, also for client provides supplementary service (Supplementary Service, SS), such as, Call Waiting (Call Wait, CW) business and calling keep (Call Hold, CH) business.
Wherein, when Call Waiting refers to that a user is in call, another user is had to call out this user, what this second user heard is not the busy tone that first user is conversing, but wait for the ring-back tone that first user connects, in addition, the prompting having other users to call out that this first user in call also will obtain terminal and provide is in.
Namely and the call hung between original correspondent calling keeps referring to the user conversed, and suspends and the call of original correspondent, but keeps original call simultaneously, and carries out the call with new correspondent; When needing to converse with original correspondent, then keep new call or hang up this new call, recover original call.
Such as, user A support call wait and call hold service, then when user A and user B is carrying out in voice call or video call process, user C calling party A (voice or visual telephone), namely user C sends call request to user A, and now, user C will hear the ring-back tone waiting for that user A connects, user A also will obtain the prompting of user C calling, and namely user A achieves call waiting; When user A is ready the call of listening user C, but when not wanting the call hanging up user B, then need the state keeping the call between (hold) and user B to hang on, namely the call between user A and user B is in hold mode, simultaneously, user A connects and calls out between user C, carries out voice or video calling; Then, user A needs again to converse with user B, do not want again the call hanging up user C simultaneously, then user A keeps the state that the call between user C is hung on, and the call recovered between (retrieve) and user B, namely user A and user B is in talking state, thus user A achieves call hold service.
In existing communication, in order to realize secure communication, also regularly carrying out secret telephony, namely communication data being encrypted.In secure communication, each secret telephony is in call establishment, generally all need between terminal and network or carry out key agreement between terminal and terminal, communicating pair is made to obtain the key of this secret telephony, the communication data using the double secret key oneself obtained in call establishment to send in communication process is encrypted, simultaneously to the coded communication decrypt data received.In secure communication, be all generally that different callings uses different keys (i.e. " words one key ").In addition, in existing terminal, security module can only call out corresponding key with one by management and for same security service type.
Thus, in the prior art, when needing Call Waiting and the call hold service carrying out secret telephony, key will be there is and cover, thus produce and cannot decipher, cause the problem that secure communication cannot be carried out.Such as, if user A and user B is utilizing key 1 to carry out in the process of secret telephony, and user C initiates a secret telephony to user A calls out and carried out cipher key agreement process, create the key 2 that can be carried out secret telephony use by user A and user C, carry out the key 1 that secret telephony uses in the security module of then user A terminal to be covered by key 2 with user B, thus, the secret telephony of the B of user A and user cannot continue.Reason is, when user A continues to carry out secret telephony with user B, user A carries out encryption and decryption by using key 2 pairs of communication datas of its up-to-date preservation, and user B will use key 1 pair of communication data to carry out encryption and decryption.Thus, carry out in the process of secret telephony at user A and user B, the problem that cannot decipher just creates, and result in secure communication cannot carry out, and namely cannot realize Call Waiting and the call hold service of secret telephony.
Summary of the invention
The object of the present invention is to provide a kind of communication means and user terminal of secret telephony, the Call Waiting of secret telephony or the problem of call hold service cannot be realized to solve in prior art.
For solving the problems of the technologies described above, the invention provides a kind of communication means of secret telephony, comprising: user terminal, in call establishment, obtains and preserves the mark for calling out; User terminal in call establishment or after call through, converse before, obtain and preserve the key of described calling, simultaneously to the described mark of preserving and Key Establishing one-to-one relationship; User terminal, in communication process, utilizes the cipher key pair communication data of the mark correspondence of the calling in communication process to carry out encryption and decryption; User terminal, after calling is hung up, deletes mark and the key of the described calling of preserving.
Optionally, in the communication means of described secret telephony, described user terminal at least carries out two callings, comprising: the first calling and the second calling, and wherein, when setting up the second calling, described first calling is set up.
Optionally, in the communication means of described secret telephony, described user terminal at least carries out two callings, comprising: the first calling and the second calling, and wherein, when setting up or connect the second calling, described first calling is in calling keep-process.
Optionally, in the communication means of described secret telephony, if described user terminal also carries out other callings, then when setting up or connect the second calling, other callings described are in calling keep-process.
Optionally, in the communication means of described secret telephony, before connecting described second calling, first keep described first calling or hang up described first calling.
Optionally, in the communication means of described secret telephony, described key comprises: for the encryption key to the encryption of communicated data sent and for the decruption key to the communication data deciphering received.
The present invention also provides a kind of user terminal, comprising: call manager unit, in order to carry out Call-Control1 to several callings; And obtain the mark of each calling; Cipher key management unit, in order to obtain the key of each calling; Preserve mark and the key of each calling, and to the mark of each calling of preserving and Key Establishing one-to-one relationship; And utilize the communication data of this calling of double secret key of the mark correspondence of each calling of described preservation to carry out encryption and decryption; Transmitting element, in order to send communication data; Receiving element, in order to received communication data.
Optionally, in described user terminal, described Call-Control1 comprises: call setup, call through, calling maintenance, call recovery and calling are hung up.
Optionally, in described user terminal, described call manager unit, in call establishment, obtains the mark for calling out, and described mark is transferred to described cipher key management unit, and described cipher key management unit preserves described mark; Described cipher key management unit in call establishment or after call through, converse before, obtain and preserve the key of described calling, simultaneously to the described mark of preserving and Key Establishing one-to-one relationship; Described cipher key management unit, in communication process, utilizes the cipher key pair communication data of the mark correspondence of the calling in communication process to carry out encryption and decryption; Described cipher key management unit, after calling is hung up, deletes mark and the key of the described calling of preserving.
Optionally, in described user terminal, described cipher key management unit is in communication process, utilize the cipher key pair communication data of the mark correspondence of the calling in communication process to carry out encryption and decryption and comprise the steps: that described call manager unit obtains the mark of the calling of connecting, and described mark is transferred to described receiving element and transmitting element; When described user terminal receives secure communication data, comprise the steps: the secure communication data that the other side that described receiving element receives the calling of connecting sends, and described mark is added to each secure communication data block received, will the secure communication transmission of data blocks of mark be added with to cipher key management unit; Described cipher key management unit is according to the mark of described secure communication data block, and described in the double secret key that the described mark utilizing it to preserve is corresponding, secure communication data block is decrypted, and the communicating data block after deciphering is transferred to described receiving element; Described receiving element carries out subsequent treatment to the communication data after described deciphering; When described user terminal sends secure communication data, comprise the steps: that described transmitting element will send to each unencryption communicating data block of the other side of the calling of described connection to add described mark, the unencryption communicating data block being added with mark is transferred to cipher key management unit; Described cipher key management unit is according to the mark of the described unencryption communicating data block received, and described in the double secret key that the described mark utilizing it to preserve is corresponding, unencryption communicating data block is encrypted, and the communicating data block after encryption is transferred to described transmitting element; Described transmitting element sends the communicating data block to be sent after described encryption.
Optionally, in described user terminal, described cipher key management unit is in communication process, utilize the cipher key pair communication data of the mark correspondence of the calling in communication process to carry out encryption and decryption and comprise the steps: that described call manager unit obtains the mark of the calling of connecting, and utilize described mark to activate in described cipher key management unit to preserve identify corresponding key with described, described key is made to be the current use key of cipher key management unit, until described call manager unit carries out activation key operation next time; When described user terminal receives secure communication data, comprise the steps: the secure communication data that the other side that described receiving element receives the calling of connecting sends, and the secure communication data of reception are transferred to cipher key management unit; Described cipher key management unit utilizes the secure communication decrypt data received described in the double secret key of current use, and the communicating data block after deciphering is transferred to described receiving element; Described receiving element carries out subsequent treatment to the communication data after described deciphering; When described user terminal sends secure communication data, comprise the steps: that described transmitting element will send to the unencryption communication data transfer of the other side of the calling of described connection to cipher key management unit; Described cipher key management unit utilizes unencryption communication data to be sent described in the double secret key of current use to be encrypted, and gives described transmitting element by the communication data transfer after encryption; Described transmitting element sends the communication data to be sent after described encryption.
Optionally, in described user terminal, described call manager unit at least controls two callings, comprising: the first calling and the second calling, and wherein, when setting up the second calling, described first calling is set up.
Optionally, in described user terminal, if described call manager unit also controls other callings, then when setting up or connect the second calling, other callings described are in calling keep-process.
Optionally, in described user terminal, before described call manager unit connects described second calling, first keep described first calling or hang up described first calling.
Optionally, in described user terminal, described call manager unit at least controls two callings, comprising: the first calling and the second calling, and wherein, when setting up or connect the second calling, described first calling is in calling keep-process.
Optionally, in described user terminal, if described call manager unit also controls other callings, then when setting up or connect the second calling, other callings described are in calling keep-process.
Optionally, in described user terminal, described key comprises: for the encryption key to the encryption of communicated data sent and for the decruption key to the communication data deciphering received.
The present invention also provides a kind of communication means of secret telephony, comprising: step 10: user terminal sets up the first calling, obtains the first time key being used for the first calling; Step 20: described user terminal connects described first calling, utilize described first time key and first the other side called out carry out secret telephony; Step 30: described user terminal keeps the first calling; Step 40: described user terminal sets up the second calling, obtains the second time key being used for the second calling; Step 50: described user terminal connects described second calling, utilizes described second time key and second the other side called out to carry out secret telephony; Step 60: described user terminal keeps the second calling; Step 70: described user terminal carries out the key agreement of the first calling, obtains the third time key being used for the first calling; Step 80: described user terminal connects described first calling, utilize described third time key and first the other side called out carry out secret telephony.
The present invention also provides a kind of communication means of secret telephony, comprising: step 10: user terminal sets up the first calling, obtains the first time key being used for the first calling; Step 20: described user terminal connects described first calling, utilize described first time key and first the other side called out carry out secret telephony; Step 30: described user terminal sets up the second call communication; Step 40: described user terminal keeps the first calling; Step 50: described user terminal carries out the key agreement of the second calling, obtains the second time key being used for the second calling; Step 60: described user terminal connects described second calling, utilizes described second time key and second the other side called out to carry out secret telephony; Step 70: described user terminal keeps the second calling; Step 80: described user terminal carries out the key agreement of the first calling, obtains the third time key being used for the first calling; Step 90: described user terminal connects described first calling, utilize described third time key and first the other side called out carry out secret telephony.
In the communication means and user terminal of the first secret telephony provided by the invention, by user terminal in call establishment, obtain and preserve the mark for calling out; User terminal in call establishment or after call through, converse before, obtain and preserve the key of described calling, simultaneously to the described mark of preserving and Key Establishing one-to-one relationship, thus when carrying out Call Waiting or calling keeps, there will not be key to be capped and the situation of secret telephony can not be carried out, just can realize Call Waiting and the call hold service of secret telephony thus.
In the communication means of the second secret telephony provided by the invention, user terminal is before the key agreement carrying out another calling, first keep active calls, thus after the key of the key that can prevent another from calling out covering active calls, the key that active calls uses due to both call sides is different and can not carry out secret telephony, thus, Call Waiting and the call hold service of secret telephony is achieved.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of the communication means of the secret telephony of the embodiment of the present invention one;
Fig. 2 is the schematic flow sheet of the communication means of the secret telephony of the embodiment of the present invention two;
Fig. 3 is the structural representation of the user terminal of the embodiment of the present invention three;
Fig. 4 is the structural representation of the user terminal of the embodiment of the present invention four;
Fig. 5 is the schematic flow sheet of the communication means of the secret telephony of the embodiment of the present invention five.
Embodiment
Below in conjunction with the drawings and specific embodiments, the communication means of secret telephony provided by the invention and user terminal are described in further detail.According to the following describes and claims, advantages and features of the invention will be clearer.It should be noted that, accompanying drawing all adopts the form simplified very much, only in order to object that is convenient, the aid illustration embodiment of the present invention lucidly.
Embodiment one
Please refer to Fig. 1, it is the schematic flow sheet of the communication means of the secret telephony of the embodiment of the present invention one.As shown in Figure 1, in the present embodiment, the communication means of described secret telephony is specific as follows:
First, perform step S10: user terminal A and user terminal B set up the first calling, in the first call establishment, user terminal A obtains and preserves the first mark and the first key being used for described first calling, and user terminal A is to described first mark and the first Key Establishing one-to-one relationship of preserving simultaneously.
In the present embodiment, described user terminal A realizes secret telephony supplementary service for needs, namely realizes the user terminal of Call Waiting and calling maintenance, therefore, in the present description, description will not made to the situation of the user terminal C of user terminal B and follow-up appearance.If need same with user terminal C of described user terminal B realizes secret telephony supplementary service, then described user terminal B and user terminal C can be thought that another uses terminal A; If described user terminal B and user terminal C does not need to realize secret telephony supplementary service, then what described user terminal B and user terminal C carried out is operating as prior art, and the application repeats no more this.
At this, in user terminal A, unique corresponding described first calling of described first mark, in the present embodiment, described first be designated can the Transaction Identifier (Transaction ID, be called for short TI) of unique identification this calling, and it just can be determined and obtain when setting up calling.In the present embodiment, described first key (and follow-up other keys for secret telephony used, the second key of such as follow-up appearance) obtained by the cipher key agreement process of secret telephony, it is prior art, and the application repeats no more this.Wherein, described first key can comprise: in order to sending the first encryption key of being encrypted of communication data and in order to the first decruption key to the secure communication decrypt data received, described first encryption key and the first decruption key can identical also can not be identical.
In other embodiments of the invention, described first key also can after the first call through, carry out call before obtained by cipher key agreement process.
Then, perform step S11: between described user terminal A connection with described user terminal B first calls out, described user terminal A utilization identifies the first corresponding key with described first and user terminal B (i.e. the first calling party) carries out secret telephony, comprising: send secure communication data and receive secure communication data.
Perform step S12: user terminal A and user terminal C set up the second calling, user terminal A obtains and preserves the second mark and the second key being used for described second calling, and user terminal A is to described second mark and the second Key Establishing one-to-one relationship of preserving simultaneously.At this, described second mark is also Transaction Identifier, and described second key also can comprise: the second encryption key and the second decruption key.Certainly, in other embodiments of the invention, described second key also can after the second call through, carry out call before obtained by cipher key agreement process.
Certainly, in other embodiments of the invention, when user terminal A and user terminal C set up the second calling, user terminal A and user terminal B also can be in set up call out after, before call establishment, namely the first calling is set up, but the first calling is not switched on.
Perform step S13: user terminal A keeps the first calling, namely user terminal A keeps between user terminal B first to call out and be not hung up.
Perform step S14: user terminal A connects the second calling, user terminal A utilization identifies the second corresponding key with second and user terminal C (i.e. the second calling party) carries out secret telephony, comprising: send secure communication data and receive secure communication data.
Perform step S15: user terminal A hangs up the second calling, meanwhile, delete the second mark and the second key, namely second mark of preserving when setting up the second calling and the second key are deleted by user terminal A.
Perform step S16: user terminal A recovers the first calling, utilizes the first mark and the first key and user terminal B to carry out secret telephony.
Finally, perform step S17: user terminal A hangs up the first calling, meanwhile, delete the first mark and the first key.
Certainly, in other embodiments of the invention, user terminal A can carry out more times switching of calling out between user terminal B and user terminal C, that is, such as: when performing step S15, and hang on the second calling, but keeps the second calling.
The second, in other embodiments of the invention, after setting up the second calling, if user terminal A does not need to keep first have called with user terminal B, then, when performing step S13, described user terminal A also can hang up the first calling.
3rd, the present embodiment is only schematic carries out Call Waiting and call hold service with user terminal A and user terminal B, C, in other embodiments of the invention, more users terminal can also be added, such as, user terminal A can also carry out Call Waiting and call hold service with user terminal D, E.......
4th, the present embodiment is only schematic realizes Call Waiting and call hold service for user terminal A, in other embodiments of the invention, also can be user terminal A, user terminal B, user terminal C all can realize Call Waiting and call hold service, namely can user terminal A and user terminal B keep calling out, user terminal A and user terminal C keep calling out, simultaneously, there are again user's terminal D and user terminal A call establishment, user terminal E and user terminal B call establishment, user terminal F and user terminal C call establishment etc.
Those skilled in the art are noted that on basis disclosed in the embodiment of the present invention one, and above-mentioned change case and more change case are all known and can realize.
In addition, in the present invention, described " described first mark and the first Key Establishing one-to-one relationship to preserving " refers to can retrieve the first key by described first mark.Certainly, term " described second mark and the second Key Establishing one-to-one relationship to preserving " etc. are also same reasons.
Embodiment two
Please refer to Fig. 2, it is the schematic flow sheet of the communication means of the secret telephony of the embodiment of the present invention two.As shown in Figure 2, in the present embodiment, the communication means of described secret telephony comprises the steps:
Step S20: user terminal A is set up and called out with first of user terminal B, obtains and preserves the first mark and the first key being used for the first calling, and user terminal A is to described first mark and the first Key Establishing one-to-one relationship of preserving.
Step S21: user terminal A connects the first calling, and utilization identifies the first corresponding key with first and user terminal B carries out secret telephony.
Step S22: user terminal A keeps the first calling.
Step S23: user terminal A is set up and called out with second of user terminal C, obtains and preserves the second mark and the second key being used for the second calling, and user terminal A is to described second mark and the second Key Establishing one-to-one relationship of preserving.
Step S24: user terminal A connects the second calling, and utilization identifies the second corresponding key with second and user terminal C carries out secret telephony.
Step S25: user terminal A hangs up the second calling, deletes the second mark and the second key simultaneously.
Step S26: user terminal A recovers the first calling, and utilization identifies the first corresponding key with first and user terminal B carries out secret telephony.
Step S270: user terminal A hangs up the first calling, deletes the first mark and the first key simultaneously.
The difference of the present embodiment and embodiment one is, the present embodiment is before setting up other callings, and first keep active calls, namely the present embodiment only achieves the call hold service of secret telephony supplementary service.Certainly, user terminal A in the present embodiment also can realize call waiting, when user terminal A is when setting up several callings, can preserve each calling mark and key and to each calling mark and Key Establishing one-to-one relationship time, it just can avoid the new key setting up calling to cover the key of active calls, the key causing active calls to use due to both call sides is different and can not carry out the problem of secret telephony, thus just can realize Call Waiting and the call hold service of secret telephony.
Embodiment three
Please refer to Fig. 3, it is the structural representation of the user terminal of the embodiment of the present invention three.As shown in Figure 3, user terminal 30 comprises:
Call manager unit 31, in order to carry out Call-Control1 to several callings; And obtain the mark of each calling;
Cipher key management unit 32, in order to obtain the key of each calling; Preserve mark and the key of each calling, and to the mark of each calling of preserving and Key Establishing one-to-one relationship; And utilize the communication data of this calling of double secret key of the mark correspondence of each calling of described preservation to carry out encryption and decryption;
Transmitting element 33, in order to send communication data;
Receiving element 34, in order to received communication data.
Described Call-Control1 comprises: call setup, call through, calling maintenance, call recovery and calling are hung up.
Concrete, when user terminal 30 needs to realize Call Waiting or call hold service, such as, the Call Waiting that the user terminal A in embodiment one realizes and call hold service, it realizes by following manner:
First, described call manager unit 31 sets up the first calling, in the first call establishment, obtains the first mark being used for the first calling, and described first mark is transferred to described cipher key management unit 32, described cipher key management unit 32 preserves described first mark.In addition, described cipher key management unit 32, in the first call establishment, obtains and preserves the described first the first key called out, simultaneously to described first mark and the first Key Establishing one-to-one relationship of preserving.Certainly, in other embodiments of the invention, described cipher key management unit 32 also can after the first call through, converse before, obtain and preserve the first key of the first calling.
Then, described call manager unit 31 connects described first calling; Specifically comprise:
Described call manager unit 31 obtains the mark (the first mark of first calling of namely connecting) of the calling of current connection, and described first mark is sent to described receiving element 34 and transmitting element 33;
When described user terminal A receives secure communication data, described receiving element 34 receives the secure communication data that the first calling party sends, and described first mark is added to each secure communication data block received, will the secure communication transmission of data blocks of the first mark be added with to cipher key management unit 32; Described cipher key management unit 32 is according to described first mark, utilize secure communication decrypt data described in the first double secret key, concrete, described cipher key management unit 32 identifies the first corresponding key according to what store in the first identification retrieval added in secure communication data block to cipher key management unit 32 with described first, then by secure communication decrypt data described in the first double secret key of this storage, and the communicating data block of deciphering is transferred to described receiving element 34 and carry out subsequent treatment;
When described user terminal A sends secure communication data, described transmitting element 33 will send to each unencryption communicating data block of the first calling party of described connection to add described first mark, and the unencryption communicating data block being added with the first mark is transferred to cipher key management unit 32; Cipher key management unit 32 is according to described first mark received, the first key is utilized to be encrypted to sent unencryption communication data, concrete, described cipher key management unit 32 identifies the first corresponding key according to what store in the first identification retrieval added in unencryption communicating data block to cipher key management unit 32 with described first, then be encrypted with unencryption communication data described in the first double secret key of this storage, and by the communication data transfer after encryption to transmitting element 33; Described transmitting element 33 sends the communication data (to the first calling party) after encryption.
Certainly, the step of above-mentioned reception secure communication data and transmission secure communication data can be carried out repeatedly.
Then, described call manager unit 31 sets up the second calling, in the second call establishment, obtains the second mark being used for the second calling, and described second mark is transferred to described cipher key management unit 32, described cipher key management unit 32 preserves described second mark.In addition, described cipher key management unit 32, in the second call establishment, obtains and preserves the described second the second key called out, simultaneously to described second mark and the second Key Establishing one-to-one relationship of preserving.Certainly, in other embodiments of the invention, described cipher key management unit 32 also can after the second call through, converse before, obtain and preserve the second key of the second calling.
Then, described call manager unit 31 keeps the first calling.
Then, described call manager unit 31 connects the second calling; To carry out the transmitting-receiving with the secure communication data of second the other side called out, and the transmitting-receiving of secure communication data between above-mentioned and the first calling party is similar, and the application repeats no more this.
Described call manager unit 31 hangs up the second calling, call manager unit 31 notifies that cipher key management unit 32 deletes the second mark of described second calling and the second key of correspondence thereof simultaneously, the second mark that described cipher key management unit 32 is preserved and the second key are deleted, thus discharge the part memory space of described cipher key management unit 32.
Then, described call manager unit 31 recovers the first calling; To carry out the transmitting-receiving with the secure communication data of first the other side called out.Specifically comprise:
Described call manager unit 31 obtains the mark (the first mark of first calling of namely connecting) being resumed the calling of (i.e. current connection), and described first mark is sent to described receiving element 34 and transmitting element 33;
When described user terminal A receives secure communication data, described receiving element 34 receives the secure communication data that the first calling party sends, and described first mark is added to each secure communication data block received, will the secure communication transmission of data blocks of the first mark be added with to cipher key management unit 32; Described cipher key management unit 32 is according to described first mark, utilize secure communication decrypt data described in the first double secret key, concrete, described cipher key management unit 32 identifies the first corresponding key according to what store in the first identification retrieval added in secure communication data block to cipher key management unit 32 with described first, then by secure communication decrypt data described in the first double secret key of this storage, and the communicating data block of deciphering is transferred to described receiving element 34 and carry out subsequent treatment;
When described user terminal A sends secure communication data, described transmitting element 33 will send to each unencryption communicating data block of the first calling party of described connection to add described first mark, and the unencryption communicating data block being added with the first mark is transferred to cipher key management unit 32; Cipher key management unit 32 is according to described first mark received, the first key is utilized to be encrypted to sent unencryption communication data, concrete, described cipher key management unit 32 identifies the first corresponding key according to what store in the first identification retrieval added in unencryption communicating data block to cipher key management unit 32 with described first, then be encrypted with unencryption communication data described in the first double secret key of this storage, and by the communication data transfer after encryption to transmitting element 33; Described transmitting element 33 sends the communication data (to the first calling party) after encryption.
Finally, described call manager unit 31 hangs up the first calling, call manager unit 31 notifies that cipher key management unit 32 deletes the first mark of described first calling and the first key of correspondence thereof simultaneously, and the first mark that described cipher key management unit 32 is preserved and the first key are deleted.
Further, in other embodiments of the invention, described user terminal 30 also can comprise a timer, needs in time or the frame number of business data frame changes the secret signalling of business datum encryption/decryption parameter for calling both sides in secret calling procedure.When a secret calling enters calling hold mode, the counter called out is kept described in call manager unit 31 starts, when described secret calling is resumed connection from hold mode, call manager unit 31 suspends the timer of described calling, and by the value of the timer of the mark of described calling and described calling notice cipher key management unit, the frame number of the business data frame that the value of cipher key management unit according to this timer or the value by this timer convert calculates new for encryption/decryption parameter that is time correlation, the synchronous of time correlation encryption/decryption parameter is realized with this secret calling party, after making this secret call recovery, secret telephony both sides still the security service data sent of the other side can carry out correct encryption and decryption.
Certainly, if when user terminal 30 keeps a calling, the untreated communication data being kept to call out can be emptied in transmitting element or receiving element simultaneously, prevent from sending mistake.
Embodiment four
Please refer to Fig. 4, it is the structural representation of the user terminal of the embodiment of the present invention four.As shown in Figure 4, user terminal 40 comprises:
Call manager unit 41, in order to carry out Call-Control1 to several callings; And obtain the mark of each calling;
Cipher key management unit 42, in order to obtain the key of each calling; Preserve mark and the key of each calling, and to the mark of each calling of preserving and Key Establishing one-to-one relationship; And utilize the communication data of this calling of double secret key of the mark correspondence of each calling of described preservation to carry out encryption and decryption;
Transmitting element 43, in order to send communication data;
Receiving element 44, in order to received communication data.
User terminal 40 in the present embodiment is with the difference of the user terminal 30 in embodiment three, in the present embodiment, after described call manager unit 41 is connected or is recovered the first calling, described call manager unit 41 obtains the first mark of first calling of connecting, and utilize described first mark to activate the first key preserved in described cipher key management unit 42, described first key is made to be current use key, until described call manager unit carries out activation key operation next time.
Then, described receiving element 44 receives the secure communication data that the first calling party sends, and by the secure communication transfer of data of reception to cipher key management unit 42; Described cipher key management unit 42 utilizes the secure communication decrypt data received described in the first double secret key of current use.Described transmitting element 43 will send to the unencryption communication data transfer of the first calling party to cipher key management unit 42; Cipher key management unit 42 utilizes the first double secret key unencrypted communication data to be sent of current use to be encrypted, and by the communication data transfer to be sent after encryption to described transmitting element 43; Described transmitting element 43 sends the communication data after encryption.
Namely receiving element 44 no longer needs to add call identification to the secure communication data received at every turn, or transmitting element 43 no longer needs the unencryption communication data to each needs send to add call identification, when cipher key management unit 42 is decrypted each data to be decrypted block or is encrypted each data block that will encrypt, no longer need each encryption and decryption key that all should will be used with retrieval by call identification.
When the user terminal 40 utilized in the present embodiment keeps the first calling, after connection or recovery second are called out, described call manager unit 41 obtains the second mark of second calling of connecting, and utilize described second mark to activate the second key preserved in described cipher key management unit 42, become the second key by current use key from the first key before, then utilize the second key to carry out secret telephony.
Embodiment five
Please refer to Fig. 5, it is the schematic flow sheet of the communication means of the secret telephony of the embodiment of the present invention five.As shown in Figure 5, in the present embodiment, the communication means of described secret telephony is specific as follows:
First, perform step S50: user terminal A is set up and called out with first of user terminal B, comprises and sets up the first call communication and carry out key agreement, obtains the first time key being used for the first calling;
Perform step S51: user terminal A connects the first calling, utilize key and user terminal B for the first time to carry out secret telephony;
Perform step S52: user terminal A is set up and called out with second of user terminal C;
Perform step S53: user terminal A keeps the first calling;
Perform step S54: user terminal A and user terminal C carry out key agreement, obtain the second time key being used for the second calling;
Perform step S55: user terminal A connects the second calling, utilize second time key and user terminal C to carry out secret telephony;
Perform step S56: user terminal A keeps the second calling;
Perform step S57: user terminal A and user terminal B carry out key agreement, obtain the third time key being used for the first calling;
Perform step S58: user terminal A connects the first calling, utilize key and user terminal B for the third time to carry out secret telephony.
In the present embodiment, user terminal is before the key agreement carrying out another calling, first keep active calls, thus after the key of the key that can prevent another from calling out covering active calls, the key that active calls uses due to both call sides is different and can not carry out secret telephony, thus, Call Waiting and the call hold service of secret telephony is achieved.
Certainly, in other embodiments of the invention, step S52 and step S53 is also commutative, namely user terminal A first keeps the first calling, then set up and call out with second of user terminal C, comprise and set up the second call communication and carry out key agreement, obtain the second time key being used for the second calling.
Foregoing description is only the description to present pre-ferred embodiments, any restriction not to the scope of the invention, and any change that the those of ordinary skill in field of the present invention does according to above-mentioned disclosure, modification, all belong to the protection range of claims.

Claims (15)

1. a communication means for secret telephony, is characterized in that, comprising:
User terminal, in call establishment, obtains and preserves the mark for calling out;
User terminal in call establishment or after call through, converse before, obtain and preserve the key of described calling, simultaneously to the described mark of preserving and Key Establishing one-to-one relationship;
User terminal, in communication process, utilizes the cipher key pair communication data of the mark correspondence of the calling in communication process to carry out encryption and decryption;
User terminal, after calling is hung up, deletes mark and the key of the described calling of preserving;
Described user terminal at least carries out two callings, comprising: the first calling and the second calling, and wherein, when setting up the second calling, described first calling is set up; When setting up or connect the second calling, described first calling is in calling keep-process.
2. the communication means of secret telephony as claimed in claim 1, is characterized in that, if described user terminal also carries out other callings, then when setting up or connect the second calling, other callings described are in calling keep-process.
3. the communication means of secret telephony as claimed in claim 1, is characterized in that, before connecting described second calling, first keeps described first calling or hangs up described first calling.
4. the communication means of secret telephony as claimed in claim 1, it is characterized in that, described key comprises: for the encryption key to the encryption of communicated data sent and for the decruption key to the communication data deciphering received.
5. a user terminal, is characterized in that, comprising:
Call manager unit, in order to carry out Call-Control1 to several callings; And obtain the mark of each calling;
Cipher key management unit, in order to obtain the key of each calling; Preserve mark and the key of each calling, and to the mark of each calling of preserving and Key Establishing one-to-one relationship; And utilize the communication data of this calling of double secret key of the mark correspondence of each calling of described preservation to carry out encryption and decryption;
Transmitting element, in order to send communication data;
Receiving element, in order to received communication data.
6. user terminal as claimed in claim 5, it is characterized in that, described Call-Control1 comprises: call setup, call through, calling maintenance, call recovery and calling are hung up.
7. user terminal as claimed in claim 6, is characterized in that,
Described call manager unit, in call establishment, obtains the mark for calling out, and described mark is transferred to described cipher key management unit, and described cipher key management unit preserves described mark;
Described cipher key management unit in call establishment or after call through, converse before, obtain and preserve the key of described calling, simultaneously to the described mark of preserving and Key Establishing one-to-one relationship;
Described cipher key management unit, in communication process, utilizes the cipher key pair communication data of the mark correspondence of the calling in communication process to carry out encryption and decryption;
Described cipher key management unit, after calling is hung up, deletes mark and the key of the described calling of preserving.
8. user terminal as claimed in claim 7, it is characterized in that, described cipher key management unit, in communication process, utilizes the cipher key pair communication data of the mark correspondence of the calling in communication process to carry out encryption and decryption and comprises the steps:
Described call manager unit obtains the mark of the calling of connecting, and described mark is transferred to described receiving element and transmitting element;
When described user terminal receives secure communication data, comprise the steps:
The secure communication data that the other side that described receiving element receives the calling of connecting sends, and described mark is added to each secure communication data block received, will the secure communication transmission of data blocks of mark be added with to cipher key management unit;
Described cipher key management unit is according to the mark of described secure communication data block, and described in the double secret key that the described mark utilizing it to preserve is corresponding, secure communication data block is decrypted, and the communicating data block after deciphering is transferred to described receiving element;
Described receiving element carries out subsequent treatment to the communicating data block after described deciphering; When described user terminal sends secure communication data, comprise the steps:
Described transmitting element will send to each unencryption communicating data block of the other side of the calling of described connection to add described mark, and the unencryption communicating data block being added with mark is transferred to cipher key management unit;
Described cipher key management unit is according to the mark of the described unencryption communicating data block received, and described in the double secret key that the described mark utilizing it to preserve is corresponding, unencryption communicating data block is encrypted, and the communicating data block after encryption is transferred to described transmitting element;
Described transmitting element sends the communicating data block after described encryption.
9. user terminal as claimed in claim 7, it is characterized in that, described cipher key management unit, in communication process, utilizes the cipher key pair communication data of the mark correspondence of the calling in communication process to carry out encryption and decryption and comprises the steps:
Described call manager unit obtains the mark of the calling of connecting, and utilize described mark to activate in described cipher key management unit to preserve identify corresponding key with described, described key is made to be the current use key of cipher key management unit, until described call manager unit carries out activation key operation next time; When described user terminal receives secure communication data, comprise the steps:
The secure communication data that the other side that described receiving element receives the calling of connecting sends, and the secure communication data of reception are transferred to cipher key management unit;
Described cipher key management unit utilizes the secure communication decrypt data received described in the double secret key of current use, and the communicating data block after deciphering is transferred to described receiving element;
Described receiving element carries out subsequent treatment to the communication data after described deciphering; When described user terminal sends secure communication data, comprise the steps:
Described transmitting element will send to the unencryption communication data transfer of the other side of the calling of described connection to cipher key management unit;
Described cipher key management unit utilizes unencryption communication data to be sent described in the double secret key of current use to be encrypted, and gives described transmitting element by the communication data transfer after encryption;
Described transmitting element sends the communication data after described encryption.
10. the user terminal as described in any one in claim 5 to 9, is characterized in that, described call manager unit at least controls two callings, comprising: the first calling and the second calling, and wherein, when setting up the second calling, described first calling is set up.
11. user terminals as claimed in claim 10, is characterized in that, if described call manager unit also controls other callings, then when setting up or connect the second calling, other callings described are in calling keep-process.
12. user terminals as claimed in claim 10, is characterized in that, before described call manager unit connects described second calling, first keep described first calling or hang up described first calling.
13. user terminals as described in any one in claim 5 to 9, it is characterized in that, described call manager unit at least controls two callings, comprise: the first calling and the second calling, wherein, when setting up or connect the second calling, described first calling is in calling keep-process.
14. user terminals as claimed in claim 13, is characterized in that, if described call manager unit also controls other callings, then when setting up or connect the second calling, other callings described are in calling keep-process.
15. user terminals as described in any one in claim 5 to 9, it is characterized in that, described key comprises: for the encryption key to the encryption of communicated data sent and for the decruption key to the communication data deciphering received.
CN201110270174.6A 2011-09-13 2011-09-13 Confidential call communication method and user terminal Active CN103002439B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110270174.6A CN103002439B (en) 2011-09-13 2011-09-13 Confidential call communication method and user terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110270174.6A CN103002439B (en) 2011-09-13 2011-09-13 Confidential call communication method and user terminal

Publications (2)

Publication Number Publication Date
CN103002439A CN103002439A (en) 2013-03-27
CN103002439B true CN103002439B (en) 2015-06-17

Family

ID=47930477

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110270174.6A Active CN103002439B (en) 2011-09-13 2011-09-13 Confidential call communication method and user terminal

Country Status (1)

Country Link
CN (1) CN103002439B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104066080B (en) * 2014-06-05 2017-12-08 天地融科技股份有限公司 A kind of data processing method of voice call
KR102457809B1 (en) 2014-09-24 2022-10-24 삼성전자주식회사 Method, Apparatus and System of Security of Data Communication
CN107343275A (en) * 2016-04-28 2017-11-10 宇龙计算机通信科技(深圳)有限公司 Speech scrambling control method and terminal
CN109429192B (en) * 2017-08-29 2021-07-16 中国移动通信有限公司研究院 A call processing method, transceiver device and computer-readable storage medium
CN109561407B (en) * 2017-09-27 2021-09-10 中国移动通信有限公司研究院 Call processing method and call terminal
CN109561224B (en) * 2017-09-27 2020-11-06 中国移动通信有限公司研究院 A call processing method and a call terminal

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1437350A (en) * 2002-01-10 2003-08-20 阿瓦雅技术公司 Method and equipment for safety Internetwork protocol communication in call processing system
CN101938725A (en) * 2010-08-30 2011-01-05 中兴通讯股份有限公司 Methods for realizing call holding and three-party service, cordless main phone and system
CN102027721A (en) * 2008-04-02 2011-04-20 特维里奥公司 System and method for processing telephony sessions

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7360096B2 (en) * 2002-11-20 2008-04-15 Microsoft Corporation Securely processing client credentials used for Web-based access to resources

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1437350A (en) * 2002-01-10 2003-08-20 阿瓦雅技术公司 Method and equipment for safety Internetwork protocol communication in call processing system
CN102027721A (en) * 2008-04-02 2011-04-20 特维里奥公司 System and method for processing telephony sessions
CN101938725A (en) * 2010-08-30 2011-01-05 中兴通讯股份有限公司 Methods for realizing call holding and three-party service, cordless main phone and system

Also Published As

Publication number Publication date
CN103002439A (en) 2013-03-27

Similar Documents

Publication Publication Date Title
CN103002439B (en) Confidential call communication method and user terminal
US8804961B2 (en) Method and system for mobile terminals handing over between clear session and encrypted session communications
CN114553422B (en) VoLTE voice encryption communication method, terminal and system
US20150089220A1 (en) Technique For Bypassing an IP PBX
EP2547051B1 (en) Confidential communication method using vpn, a system and program for the same, and memory media for program therefor
EP0671091A1 (en) Method for key management of point-to-point communications
WO2003049357B1 (en) Lawful interception of end-to-end encrypted data traffic
CN101917711A (en) Mobile communication system and voice call encryption method thereof
WO2013185735A2 (en) Encryption realization method and system
CN101909290A (en) Method, system and mobile terminal for encrypting voice call
CN106604268A (en) Voice encryption method and system and terminal
CN102137393B (en) Method and device for encrypting end-to-end
CN100466805C (en) Method for end-to-end enciphoring voice telecommunication
CN101159988A (en) Method and system of implementing different security level voice encryption
CN105025471A (en) Called terminal, calling terminal, voice communication method and system
CN113132090B (en) System for sharing quantum key and secret communication method based on system
CN100512103C (en) Secret key distributing method of end-to-end encrypted telecommunication
CN100388659C (en) Equipment, system and method for implementing encryption communication between heterogeneity network
CN101938743A (en) Generation method and device of safe keys
CN105025476B (en) A kind of mobile encrypted communication mechanism of space-time separation
CN107079290B (en) Encrypted call method and terminal
CN105763571A (en) SIP-based asymmetric voice encryption
CN205039896U (en) Terminal and phone system
CN105813035B (en) A method, system and network equipment for identifying confidential voice services
CN114760625B (en) Encryption call method, device and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20170515

Address after: 100094, No. 6 Yongjia North Road, Beijing, 5, 3, northwest side of Haidian District

Patentee after: Datang Semiconductor Design Co., Ltd.

Address before: 201203 Pudong New Area Mingyue Road, Shanghai, No. 1258

Patentee before: Leadcore Technology Co., Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20170914

Address after: 100083 No. 40, Haidian District, Beijing, Xueyuan Road

Patentee after: Datang Linktech Infosystem Co., Ltd.

Address before: 100094, No. 6 Yongjia North Road, Beijing, 5, 3, northwest side of Haidian District

Patentee before: Datang Semiconductor Design Co., Ltd.