[go: up one dir, main page]

CN104284328A - Method and device for encrypting mobile phone communication content - Google Patents

Method and device for encrypting mobile phone communication content Download PDF

Info

Publication number
CN104284328A
CN104284328A CN201310285573.9A CN201310285573A CN104284328A CN 104284328 A CN104284328 A CN 104284328A CN 201310285573 A CN201310285573 A CN 201310285573A CN 104284328 A CN104284328 A CN 104284328A
Authority
CN
China
Prior art keywords
recipient
encryption
voice
initiator
voice encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310285573.9A
Other languages
Chinese (zh)
Inventor
于晴
王江波
王海洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING TIP TECHNOLOGY CO Ltd
Original Assignee
BEIJING TIP TECHNOLOGY CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING TIP TECHNOLOGY CO Ltd filed Critical BEIJING TIP TECHNOLOGY CO Ltd
Priority to CN201310285573.9A priority Critical patent/CN104284328A/en
Publication of CN104284328A publication Critical patent/CN104284328A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a method and device for encrypting mobile phone communication content, and relates to the information technology. The method comprises the steps that during communication of two parties, the initiator of voice encryption sends a request for voice encryption to the receiver; the receiver judges whether the receiver has the voice encryption and decryption capability or not according to the request; if the receiver judges that the receiver has the voice encryption and decryption capability, the receiver generates dynamic secret keys for encrypting and decrypting voice signals at random, and sends the dynamic secret keys to the initiator so that encrypted communication between the two parties can be carried out through the dynamic secret keys; if the receiver judges that the receiver does not have the voice encryption and decryption capability, the message that the receiver does not have the voice encryption and decryption capability is sent to the initiator. The method and device can guarantee the communication safety of personal mobile phones.

Description

A kind of method and device encrypting mobile phone communication content
Technical field
The present invention relates to information technology, particularly a kind of method and relevant apparatus encrypting mobile phone communication content.
Background technology
GSM cryptographic algorithm has used and has exceeded Two decades years, and for the mobile subscriber in the whole world 80% provides personal secrets to protect, within 2009, GSM network cryptographic algorithm is cracked by declaration.But for vast mobile communication user, no matter be select GSM network, or the cdma network that fail safe is higher, all can only by a few carrier supplying service, but these operators can not provide necessary guarantee to personal user on communication privacy, the fail safe of therefore conversing is subject to common concern.
Summary of the invention
The object of the present invention is to provide a kind of method and the device of encrypting mobile phone communication content, personal mobile phone call safety issue can be solved better.
According to an aspect of the present invention, provide a kind of method of encrypting mobile phone communication content, comprising:
During double-talk, the initiator of voice encryption is to the request of recipient's transmission for carrying out voice encryption;
Recipient, according to described request, judges whether it possesses voice encryption decryption capabilities;
If recipient judges that it possesses voice encryption decryption capabilities, then the dynamic key of stochastic generation for encrypting and decrypting voice signal, and be sent to initiator, be encrypted call for both sides;
If recipient judges that it does not possess voice encryption decryption capabilities, then message recipient not being possessed voice encryption decryption capabilities is sent to initiator.
Preferably, the step that the initiator of described voice encryption sends for the request carrying out voice encryption to recipient comprises:
During double-talk, the initiator of voice encryption generates the request for carrying out voice encryption, and described request is sent to recipient, wherein, comprises initiator's PKI in described request.
Preferably, described recipient, according to described request, judges that the step whether it possesses voice encryption decryption capabilities comprises:
Recipient, according to described request, detects it and whether has voice encryption deciphering module for encrypting and decrypting voice signal;
If detect, recipient has voice encryption deciphering module, then judge that recipient possesses voice encryption decryption capabilities, otherwise, judge that recipient does not possess voice encryption decryption capabilities.
Preferably, if described recipient judges that it possesses voice encryption decryption capabilities, then the dynamic key of stochastic generation for encrypting and decrypting voice signal, and the step being sent to initiator comprises:
When recipient judges that it possesses voice encryption decryption capabilities, recipient's stochastic generation is used for the dynamic key encrypted and decrypted voice signal;
Recipient utilizes described initiator's PKI, is encrypted described dynamic key, obtains encrypting dynamic key, and is sent to initiator;
Initiator utilizes initiator's private key after receiving described encryption dynamic key, is decrypted process, obtains dynamic key to described encryption dynamic key.
Preferably, the step that described both sides are encrypted call comprises:
Initiator/recipient utilizes described dynamic key, is encrypted voice signal, and is sent to recipient/transmit leg;
Recipient/transmit leg utilizes described dynamic key, is decrypted process, obtains voice signal to the voice signal of described encryption.
According to a further aspect in the invention, provide a kind of device encrypting mobile phone communication content, comprising:
Voice encryption request module, for during double-talk, the recipient to voice encryption sends the request for carrying out voice encryption;
Encryption and decryption ability judge module, for according to described request, judges whether recipient possesses voice encryption decryption capabilities;
Dynamic key production module, for when judging that recipient possesses voice encryption decryption capabilities, stochastic generation is used for the dynamic key encrypted and decrypted voice signal, and is sent to the initiator of voice encryption, is encrypted call for both sides;
Voice encryption notification module, for when judging that recipient does not possess voice encryption decryption capabilities, message recipient not being possessed voice encryption decryption capabilities is sent to initiator.
Preferably, described voice encryption request module comprises:
Request generates submodule, for during double-talk, generating the request for carrying out voice encryption, wherein, comprising initiator's PKI in described request;
Request sends submodule, for described request is sent to recipient.
Preferably, described encryption and decryption ability judge module comprises:
Detection sub-module, for according to described request, detects recipient and whether has voice encryption deciphering module for encrypting and decrypting voice signal;
Judging submodule, for when detecting that recipient has voice encryption deciphering module, judging that recipient possesses voice encryption decryption capabilities, otherwise, judge that recipient does not possess voice encryption decryption capabilities.
Preferably, described dynamic key production module comprises:
Secret generating submodule, for when judging that recipient possesses voice encryption decryption capabilities, stochastic generation is used for the dynamic key encrypted and decrypted voice signal;
Secret key encryption submodule, for utilizing described initiator's PKI, is encrypted described dynamic key, obtains encrypting dynamic key, and is sent to initiator;
Secret key decryption submodule, for after receiving described encryption dynamic key, utilizes initiator's private key, is decrypted process, obtains dynamic key to described encryption dynamic key.
Preferably, also comprise:
Voice encryption deciphering module, for utilizing described dynamic key, being encrypted voice signal, being sent to the other side, and utilizes described dynamic key, is decrypted process, obtains voice signal to the voice signal of the encryption from the other side.
Compared with prior art, beneficial effect of the present invention is:
The present invention is encrypted transmission by the dynamic key of stochastic generation to voice signal, need not worry that the third party comprising operator obtains dialog context by means such as intercepting, crack, thus ensure that the fail safe of mobile phone communication content.
Accompanying drawing explanation
Fig. 1 is the Method And Principle block diagram of encryption mobile phone communication content provided by the invention;
Fig. 2 is the device block diagram of encryption mobile phone communication content provided by the invention;
Fig. 3 is the call theory diagram of the mobile phone with device described in Fig. 2;
Fig. 4 is the flow chart that device described in Fig. 2 is applied in mobile phone;
Fig. 5 is the information interactive process figure of the both call sides that the embodiment of the present invention provides;
Fig. 6 is the dynamic key production flow chart that the embodiment of the present invention provides.
Embodiment
Below in conjunction with accompanying drawing to a preferred embodiment of the present invention will be described in detail, should be appreciated that following illustrated preferred embodiment is only for instruction and explanation of the present invention, is not intended to limit the present invention.
Fig. 1 is the Method And Principle block diagram of encryption mobile phone communication content provided by the invention, and as shown in Figure 1, step comprises:
During step 101, double-talk, the initiator of voice encryption is to the request of recipient's transmission for carrying out voice encryption.
During double-talk, the initiator of voice encryption generates the request for carrying out voice encryption, and described request is sent to recipient, wherein, comprises initiator's PKI in described request.
Step 102, recipient, according to described request, judge whether it possesses voice encryption decryption capabilities.
Recipient is according to described request, detect it and whether possess voice encryption deciphering module for encrypting and decrypting voice signal, if detect, recipient has described voice encryption deciphering module, then judge that recipient possesses voice encryption decryption capabilities, otherwise, judge that recipient does not possess voice encryption decryption capabilities.
If step 103 recipient judges that it possesses voice encryption decryption capabilities, then the dynamic key of stochastic generation for encrypting and decrypting voice signal, and be sent to initiator, be encrypted call for both sides.
When recipient possesses voice encryption decryption capabilities, recipient's stochastic generation is used for the dynamic key encrypted and decrypted voice signal, and utilizes described initiator's PKI, is encrypted described dynamic key, obtain encrypting dynamic key, and be sent to initiator; Initiator utilizes initiator's private key after receiving described encryption dynamic key, is decrypted process, obtains dynamic key to described encryption dynamic key.Now, initiator/recipient utilizes described dynamic key, voice signal is encrypted, and be sent to recipient/transmit leg, recipient/transmit leg utilizes described dynamic key, is decrypted process, obtains voice signal to the voice signal of described encryption, achieve the encrypted transmission of mobile phone communication content, ensure call fail safe.
If step 104 recipient judges that it does not possess voice encryption decryption capabilities, then message recipient not being possessed voice encryption decryption capabilities is sent to initiator, notifying that initiator cannot carry out voice encryption, namely refusing the request for carrying out voice encryption.
Present invention also offers a kind of device encrypting mobile phone communication content, hereinafter referred to as voice encryption device, described voice encryption device carries out transparent encryption and decryption constantly to mobile phone dialog context, encryption and decryption key adopts the mode of dynamic key, it can comprise variform, such as: can be the hardware module, line control earphone form, bluetooth earphone form etc. that are directly plugged into handset earphone jack.Owing to being the external device of mobile phone, therefore not needing to do any change to mobile phone itself, be applicable to the mobile phone of any brand, model.The functional block diagram of described voice encryption device, as shown in Figure 2, comprising:
Voice encryption request module 201, for during double-talk, the recipient to voice encryption sends the request for carrying out voice encryption.Described voice encryption request module 201 comprises asks to generate submodule and request transmission submodule, and described request generation submodule sends submodule by described request and described request is sent to recipient after generating and comprising the described request of initiator's PKI.
Encryption and decryption ability judge module 202, for according to described request, judges whether recipient possesses voice encryption decryption capabilities.Described encryption and decryption ability judge module 202 comprises detection sub-module and judges submodule, described detection sub-module is according to described request, whether detection recipient has the voice encryption deciphering module for encrypting and decrypting voice signal, when detecting that recipient has voice encryption deciphering module, described judgement submodule judges that recipient possesses voice encryption decryption capabilities, otherwise, judge that recipient does not possess voice encryption decryption capabilities.
Dynamic key production module 203, for when judging that recipient possesses voice encryption decryption capabilities, stochastic generation is used for the dynamic key encrypted and decrypted voice signal, and is sent to the initiator of voice encryption, is encrypted call for both sides.Described dynamic key production module 203 comprises secret generating submodule, secret key encryption submodule and secret key decryption submodule.When judging that recipient possesses voice encryption decryption capabilities, described secret generating submodule stochastic generation is used for the dynamic key encrypted and decrypted voice signal, described secret key encryption submodule utilizes described initiator's PKI, described dynamic key is encrypted, obtain encrypting dynamic key, and be sent to initiator; The secret key decryption submodule of initiator, after receiving described encryption dynamic key, utilizes initiator's private key, is decrypted process, obtains dynamic key to described encryption dynamic key.
Voice encryption notification module 204, for when judging that recipient does not possess voice encryption decryption capabilities, message recipient not being possessed voice encryption decryption capabilities is sent to initiator.
Voice encryption deciphering module 205, for utilizing described dynamic key, being encrypted voice signal, being sent to the other side, and utilizes described dynamic key, is decrypted process, obtains voice signal to the voice signal of the encryption from the other side.
Visible, the major function of described voice encryption device comprises:
1, the dynamic key of stochastic generation for encrypting and decrypting voice signal;
2, voice signal is carried out constantly, transparent encryption and decryption.
Fig. 3 is the call theory diagram of the mobile phone with device described in Fig. 2, and as shown in Figure 3, step comprises:
After step 301, initiation mobile phone communication, mobile phone both sides are in normal talking state;
In step 302, both call sides, any one party (i.e. the initiator of voice encryption) is by the button on described voice encryption device, make the request (i.e. voice encryption request) of voice encryption request module generation for carrying out voice encryption, to being sent to the opposing party (i.e. the recipient of voice encryption), in described request, comprise initiator's PKI.
After step 303, recipient receive described request, its encryption and decryption ability judge module judges whether self possesses voice encryption decryption capabilities, and when judged result is for possessing described voice encryption decryption capabilities, accepts described voice encryption request.Now, utilize its dynamic key production module stochastic generation for carrying out the dynamic key of encryption and decryption to voice signal, and use initiator's PKI to after described dynamic key encryption, be sent to initiator.The dynamic key production module of initiator utilizes the dynamic key of its private key to described encryption to be decrypted process, obtains described dynamic key.
Whether recipient can have voice encryption deciphering module (or judging the whether external described voice encryption device of mobile phone) by detecting it, judge whether it possesses voice encryption decryption capabilities, also can inquire in normal talking whether the other side is circumscribed with described voice encryption device in advance.If recipient has installed described voice encryption device, then can select to accept request or refuse request according to the prompting of voice encryption device.When recipient rejects said request, the voice encryption notification module of recipient notifies that initiator can not carry out voice encryption.
After step 304, both call sides all obtain described dynamic key, enter Voice Cryption state.That is, the voice encryption deciphering module of one side utilizes described dynamic key to after audio encryption, subsequent treatment is carried out by mobile phone, and be sent to the opposing party, the voice encryption deciphering module of the opposing party utilizes described dynamic key to receive mobile phone and signal after processing is decrypted process, obtains described voice signal.
In step 305, both call sides, any one party all cancels voice encryption request by the button on voice encryption device.
After step 306, end of conversation, voice encryption state automatically terminates.
Known by above-mentioned steps, before initiating voice encryption, both call sides is in normal talking state, and user can initiate the request for carrying out voice encryption as required.
Fig. 4 is the flow chart that device described in Fig. 2 is applied in mobile phone, and as shown in Figure 4, step comprises:
Step 401, voice encryption device is plugged on mobile phone, such as, is directly plugged on handset earphone jack.
Step 402, call and connect, both call sides is in normal talking state.
Initiator's (any one party in both call sides) of step 403, voice encryption presses the start button (switch) on voice encryption device, starts voice call encryption function.
Step 404, the request of generation voice encryption, and be sent to the recipient of voice encryption.
Whether the recipient of step 405, voice encryption has voice encryption deciphering module by detecting it, judge whether it possesses voice encryption decryption capabilities, if having voice encryption deciphering module, then recipient has voice encryption decryption capabilities, perform step 406, otherwise perform step 408.
The voice encryption device of step 406, recipient generates dynamic key, and sends to initiator, carries out real-time encryption and decryption process to voice call analog signal.
For ensureing the fail safe in dynamic key transmitting procedure, recipient uses initiator's PKI to send to initiator to after described dynamic key encryption, and initiator obtains described dynamic key after utilizing its private key to be decrypted process.That is, by the authentication procedures between initiator and recipient, deliver " dynamic key " for encrypting and decrypting voice signal.
The step that voice call analog signal is encrypted is comprised: after the voice signal of simulation to be sent is carried out A/D conversion by a side, obtain the voice signal of numeral, after utilizing the voice signal of described dynamic key to described numeral to be encrypted, again carry out D/A conversion, be converted to encryption analog voice signal, finally pass to mobile phone, undertaken encoding by mobile phone, send after the process such as modulation.
The step that voice call analog signal is decrypted is comprised: the opposing party receives the encryption analog voice signal after via process such as mobile phone demodulation, decodings, after A/D conversion is carried out to described encryption analog voice signal, obtain enciphered digital voice signal, after utilizing described dynamic key to be decrypted described enciphered digital voice signal, again carry out D/A conversion, be converted to the voice signal of simulation, so that described voice play by mobile phone.
If voice signal is intercepted by third party, owing to not having described dynamic key, can not be decrypted well the voice signal of encryption, therefore, the dialog context heard is all noise, cannot crack and obtain dialog context.
The start button (switch) that either party of step 407, both call sides presses voice encryption device can terminate speech scrambling, or hangs up the telephone and automatically terminate.
Step 408, can not normal encryption and decryption, notify that initiator cannot carry out voice encryption, namely refuse described voice encryption request.
Fig. 5 is the information interactive process figure of the both call sides that the embodiment of the present invention provides, and as shown in Figure 5, step comprises:
Step 501, cellphone subscriber 1 calling handset user 2, start call.
Step 502, cellphone subscriber 2 accept the call request of cellphone subscriber 1, and both sides carry out normal talking.
Step 503, cellphone subscriber 1 utilize its voice encryption device to initiate voice encryption request to cellphone subscriber 2.
Step 504, cellphone subscriber 2 accept the voice encryption request of cellphone subscriber 1, and the dynamic key of generation is sent to cellphone subscriber 1.
Step 505, cellphone subscriber 1 and cellphone subscriber 2, utilize described dynamic key, carries out voice encryption, ensures this fail safe of conversing.
High-performance processor is comprised in described voice encryption device, each voice encryption, stochastic generation is only applied to " dynamic key " of this voice encryption, and described " dynamic key " generating algorithm is run by the high-performance processor in described voice encryption device and produces final result.
Fig. 6 is the dynamic key production flow chart that the embodiment of the present invention provides, and as shown in Figure 6, step comprises:
Step 601, each voice encryption device preserve a pair unsymmetrical key pair, and when initiating voice encryption, first the PKI Kpublic of oneself is passed to recipient with clear-text way by initiator.
Step 602, recipient produce a key K at random, are also " dynamic key K ", then use the PKI Kpublic received to be encrypted with binary algorithm F1, i.e. F1 (K, Kpublic)=K1, obtain encryption dynamic key K1.
Implicit dynamic key K, by transmitting encryption dynamic key K1 to initiator, is informed initiator by step 603, recipient.
Step 604, initiator utilize the private key Kprivate of oneself to be decrypted K1 with binary algorithm F2, i.e. F2 (K1, Kprivate)=K, and after deciphering, initiator obtains " dynamic key K ".
From step 601 to step 604, the present invention adopts asymmetric encryption system to carry out the encrypted transmission of dynamic key, and this process is equivalent to carry out one-time identity authentication between initiator and recipient.
Step 605, initiator and recipient all use symmetric encipherment algorithm F, encrypt and decrypt voice signal with dynamic key K.
In sum, the present invention has following technique effect:
1, the present invention can be encrypted secret dialog context, password adopts dynamic key technology, need not worry that the third party comprising operator obtains dialog context by means such as intercepting and capturing, crack, necessary call safety guarantee, particularly personal mobile phone user are provided to user.
2, device of the present invention is the external device of mobile phone, is applicable to the mobile phone of any brand, model.
Although above to invention has been detailed description, the present invention is not limited thereto, those skilled in the art of the present technique can carry out various amendment according to principle of the present invention.Therefore, all amendments done according to the principle of the invention, all should be understood to fall into protection scope of the present invention.

Claims (10)

1. encrypt a method for mobile phone communication content, it is characterized in that, comprising:
During double-talk, the initiator of voice encryption is to the request of recipient's transmission for carrying out voice encryption;
Recipient, according to described request, judges whether it possesses voice encryption decryption capabilities;
If recipient judges that it possesses voice encryption decryption capabilities, then the dynamic key of stochastic generation for encrypting and decrypting voice signal, and be sent to initiator, be encrypted call for both sides;
If recipient judges that it does not possess voice encryption decryption capabilities, then message recipient not being possessed voice encryption decryption capabilities is sent to initiator.
2. method according to claim 1, is characterized in that, the step that the initiator of described voice encryption sends for the request carrying out voice encryption to recipient comprises:
During double-talk, the initiator of voice encryption generates the request for carrying out voice encryption, and described request is sent to recipient, wherein, comprises initiator's PKI in described request.
3. method according to claim 2, is characterized in that, described recipient, according to described request, judges that the step whether it possesses voice encryption decryption capabilities comprises:
Recipient, according to described request, detects it and whether has voice encryption deciphering module for encrypting and decrypting voice signal;
If detect, recipient has voice encryption deciphering module, then judge that recipient possesses voice encryption decryption capabilities, otherwise, judge that recipient does not possess voice encryption decryption capabilities.
4. method according to claim 3, is characterized in that, if described recipient judges that it possesses voice encryption decryption capabilities, then and the dynamic key of stochastic generation for encrypting and decrypting voice signal, and the step being sent to initiator comprises:
When recipient judges that it possesses voice encryption decryption capabilities, recipient's stochastic generation is used for the dynamic key encrypted and decrypted voice signal;
Recipient utilizes described initiator's PKI, is encrypted described dynamic key, obtains encrypting dynamic key, and is sent to initiator;
Initiator utilizes initiator's private key after receiving described encryption dynamic key, is decrypted process, obtains dynamic key to described encryption dynamic key.
5. method according to claim 4, is characterized in that, the step that described both sides are encrypted call comprises:
Initiator/recipient utilizes described dynamic key, is encrypted voice signal, and is sent to recipient/transmit leg;
Recipient/transmit leg utilizes described dynamic key, is decrypted process, obtains voice signal to the voice signal of described encryption.
6. encrypt a device for mobile phone communication content, it is characterized in that, comprising:
Voice encryption request module, for during double-talk, the recipient to voice encryption sends the request for carrying out voice encryption;
Encryption and decryption ability judge module, for according to described request, judges whether recipient possesses voice encryption decryption capabilities;
Dynamic key production module, for when judging that recipient possesses voice encryption decryption capabilities, stochastic generation is used for the dynamic key encrypted and decrypted voice signal, and is sent to the initiator of voice encryption, is encrypted call for both sides;
Voice encryption notification module, for when judging that recipient does not possess voice encryption decryption capabilities, message recipient not being possessed voice encryption decryption capabilities is sent to initiator.
7. device according to claim 6, is characterized in that, described voice encryption request module comprises:
Request generates submodule, for during double-talk, generating the request for carrying out voice encryption, wherein, comprising initiator's PKI in described request;
Request sends submodule, for described request is sent to recipient.
8. device according to claim 7, is characterized in that, described encryption and decryption ability judge module comprises:
Detection sub-module, for according to described request, detects recipient and whether has voice encryption deciphering module for encrypting and decrypting voice signal;
Judging submodule, for when detecting that recipient has voice encryption deciphering module, judging that recipient possesses voice encryption decryption capabilities, otherwise, judge that recipient does not possess voice encryption decryption capabilities.
9. device according to claim 8, is characterized in that, described dynamic key production module comprises:
Secret generating submodule, for when judging that recipient possesses voice encryption decryption capabilities, stochastic generation is used for the dynamic key encrypted and decrypted voice signal;
Secret key encryption submodule, for utilizing described initiator's PKI, is encrypted described dynamic key, obtains encrypting dynamic key, and is sent to initiator;
Secret key decryption submodule, for after receiving described encryption dynamic key, utilizes initiator's private key, is decrypted process, obtains dynamic key to described encryption dynamic key.
10. device according to claim 9, is characterized in that, also comprises:
Voice encryption deciphering module, for utilizing described dynamic key, being encrypted voice signal, being sent to the other side, and utilizes described dynamic key, is decrypted process, obtains voice signal to the voice signal of the encryption from the other side.
CN201310285573.9A 2013-07-09 2013-07-09 Method and device for encrypting mobile phone communication content Pending CN104284328A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310285573.9A CN104284328A (en) 2013-07-09 2013-07-09 Method and device for encrypting mobile phone communication content

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310285573.9A CN104284328A (en) 2013-07-09 2013-07-09 Method and device for encrypting mobile phone communication content

Publications (1)

Publication Number Publication Date
CN104284328A true CN104284328A (en) 2015-01-14

Family

ID=52258705

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310285573.9A Pending CN104284328A (en) 2013-07-09 2013-07-09 Method and device for encrypting mobile phone communication content

Country Status (1)

Country Link
CN (1) CN104284328A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104640108A (en) * 2015-01-28 2015-05-20 深圳市比维视创科技有限公司 Terminal communication voice encryption method and system
CN105471876A (en) * 2015-12-02 2016-04-06 东莞见达信息技术有限公司 Method and device for communication encryption
CN105722069A (en) * 2016-03-24 2016-06-29 深圳市创百通讯科技有限公司 Mobile terminal capable of encrypting voice information and encryption method thereof
CN113206737A (en) * 2015-09-01 2021-08-03 北京三星通信技术研究有限公司 Voice communication encryption method, decryption method and device
CN114839891A (en) * 2022-05-11 2022-08-02 海南创兴高科技有限公司 Intelligent bedside table control method based on Internet of things, computer and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1479489A (en) * 2002-08-29 2004-03-03 ����ͨѶ�ɷ����޹�˾ A method of transmitting broadband multimedia data over ISDN
CN1764108A (en) * 2004-10-22 2006-04-26 华为技术有限公司 Method for controlling start of encryption process
CN1859081A (en) * 2006-02-17 2006-11-08 华为技术有限公司 Immediate news enciphering transmission method and system
CN1881869A (en) * 2005-11-01 2006-12-20 华为技术有限公司 Method for realizing encryption communication
CN1753359B (en) * 2004-09-24 2011-01-19 华为技术有限公司 Method of implementing SyncML synchronous data transmission
CN103096304A (en) * 2011-11-08 2013-05-08 深圳市中诺通讯股份有限公司 Method for encryption and decryption of secure voice tendencies of internet protocol (IP) network communication terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1479489A (en) * 2002-08-29 2004-03-03 ����ͨѶ�ɷ����޹�˾ A method of transmitting broadband multimedia data over ISDN
CN1753359B (en) * 2004-09-24 2011-01-19 华为技术有限公司 Method of implementing SyncML synchronous data transmission
CN1764108A (en) * 2004-10-22 2006-04-26 华为技术有限公司 Method for controlling start of encryption process
CN1881869A (en) * 2005-11-01 2006-12-20 华为技术有限公司 Method for realizing encryption communication
CN1859081A (en) * 2006-02-17 2006-11-08 华为技术有限公司 Immediate news enciphering transmission method and system
CN103096304A (en) * 2011-11-08 2013-05-08 深圳市中诺通讯股份有限公司 Method for encryption and decryption of secure voice tendencies of internet protocol (IP) network communication terminal

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104640108A (en) * 2015-01-28 2015-05-20 深圳市比维视创科技有限公司 Terminal communication voice encryption method and system
CN113206737A (en) * 2015-09-01 2021-08-03 北京三星通信技术研究有限公司 Voice communication encryption method, decryption method and device
CN105471876A (en) * 2015-12-02 2016-04-06 东莞见达信息技术有限公司 Method and device for communication encryption
CN105722069A (en) * 2016-03-24 2016-06-29 深圳市创百通讯科技有限公司 Mobile terminal capable of encrypting voice information and encryption method thereof
CN114839891A (en) * 2022-05-11 2022-08-02 海南创兴高科技有限公司 Intelligent bedside table control method based on Internet of things, computer and storage medium

Similar Documents

Publication Publication Date Title
US10038676B2 (en) Call encryption systems and methods
CN101909290A (en) Method, system and mobile terminal for encrypting voice call
CN102843677A (en) Voice communication method, device and system
CN104284328A (en) Method and device for encrypting mobile phone communication content
CN106790281A (en) A kind of end-to-end voice encryption device and encryption method towards intercom system
CN102137393B (en) Method and device for encrypting end-to-end
CN200990610Y (en) Communication ciphered cell phone
CN103973696B (en) A kind of data processing method of voice call
CN104065648B (en) A kind of data processing method of voice call
CN106100980A (en) Instant messaging communication means end to end and device
CN102761867A (en) Method for increasing session safety and session equipment
CN105553669A (en) Identity authentication based information encryption transmission apparatus, method, and control method
CN106856606A (en) Communication means, communication system and mobile terminal
CN103458401B (en) A kind of voice encryption communication system and communication means
CN105049201A (en) Mobile equipment secret communication system based on quantum cryptography and mobile equipment secret communication method based on quantum cryptography
CN104581714A (en) Method for encrypting speech on basis of TD-SCDMA (time division-synchronization code division multiple access) circuit domains
CN104113836A (en) Conversation encryption method, communication terminal and base station
KR20160121828A (en) Separate Anti-eavesdropping function apparatus and method for voice and data communication between terminals
US9467428B2 (en) Information security attachment device for voice communication and information security method for voice communication using the same
CN101951554A (en) Method and system for realizing pre-access of encrypted conference call
CN102811439A (en) Method and system for voice processing
CN103986711B (en) A kind of data processing method of voice call
CN104581711A (en) Mobile terminal with communication encryption function as well as communication encryption method thereof
CN104080080B (en) A kind of data handling system of voice call
CN103974242A (en) Data processing method of voice communication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 100086 Beijing Haidian District Dijin Road 9 Courtyard 9 Building 4 Floor 101

Applicant after: Beijing Tip Technology Co ., Ltd.

Address before: 100084 Second and Third Floors of Block 2C, Liangcheng, Silicon Valley, No. 1 Nongda South Road, Haidian District, Beijing

Applicant before: Beijing Tip Technology Co ., Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20150114