CN104640108A - Terminal communication voice encryption method and system - Google Patents
Terminal communication voice encryption method and system Download PDFInfo
- Publication number
- CN104640108A CN104640108A CN201510045144.3A CN201510045144A CN104640108A CN 104640108 A CN104640108 A CN 104640108A CN 201510045144 A CN201510045144 A CN 201510045144A CN 104640108 A CN104640108 A CN 104640108A
- Authority
- CN
- China
- Prior art keywords
- terminal
- key
- speech frame
- negotiation request
- sent
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 28
- 238000004891 communication Methods 0.000 title abstract description 8
- 238000012795 verification Methods 0.000 claims description 32
- 230000005540 biological transmission Effects 0.000 claims description 12
- 238000010200 validation analysis Methods 0.000 abstract 1
- 238000010586 diagram Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 238000004590 computer program Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 239000013307 optical fiber Substances 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the invention discloses a terminal communication voice encryption method and system. The method comprises the following steps: obtaining a first secret key from a first encryption card of a first terminal by the first terminal and sending a secret key negotiation request carrying the first secret key to a second terminal; receiving a message which is sent by the second terminal and shows that validation is passed; sending a voice frame to the first encryption card and encrypting the voice frame by using the first secret key; sending the encrypted voice frame to the second terminal. According to the terminal communication voice encryption method disclosed by the embodiment of the invention, communication voices are encrypted by a dynamic secret key and are not easy to decode, so that the safety is higher.
Description
Technical field
The present invention relates to the communications field, particularly relate to a kind of terminal call speech ciphering method and voice encryption system.
Background technology
Flourish along with communications industry, the communication terminals such as mobile phone have become necessity for life, simultaneously, the problem that the voice information whose stealing mobile phone by means such as eavesdroppings causes user data to leak is on the rise, for cellphone subscriber causes very large loss, therefore, the safety issue of mobile phone communication becomes more and more important, when carrying out some important calls, user can be encrypted call voice.
Voice of the prior art and data encryption product, the encryption technology of employing is mostly and uses single key to encrypt and decrypt, but single key is easy to be decrypted, and fail safe is lower.
Summary of the invention
The embodiment of the present invention provides a kind of terminal call speech ciphering method and voice encryption system, and the method is encrypted call voice by dynamic key.
The embodiment of the present invention provides a kind of terminal call speech ciphering method, comprising:
First terminal obtains the first key from the first encrypted card of described first terminal, sends the key negotiation request of carrying described first key to the second terminal;
The message that the verification receiving described second terminal transmission is passed through, is sent to described first encrypted card, uses speech frame described in described first double secret key to be encrypted by speech frame;
Described speech frame after encryption is sent to described second terminal.
In the preferred implementation of the embodiment of the present invention, first terminal obtains the first key from the first encrypted card of first terminal, sends the key negotiation request of carrying described first key, comprising to the second terminal:
First terminal sends the key negotiation request of carrying described first key every preset time period to described second terminal, and the described default time cycle is fixed time period or on-fixed time cycle.
In the preferred implementation of the embodiment of the present invention, described first key is random transmission.
The embodiment of the present invention also provides another kind of terminal call speech ciphering method, comprising:
Second terminal receives the key negotiation request of carrying described first key that described first terminal sends, and verifies the legitimacy of described key negotiation request;
If the legitimacy verification of described key negotiation request is passed through, then send the message verifying and pass through to described first terminal;
Receive the speech frame after encryption, the speech frame after described encryption is sent in the second encrypted card of described second terminal, the speech frame after deciphering is sent to the receiver of described second terminal.
In the preferred implementation of the embodiment of the present invention, also comprise:
If the legitimacy verification of described key negotiation request is not passed through, then send the unsanctioned message of verification to described first terminal, described first terminal sends unencrypted speech frame to described second terminal.
Accordingly, the embodiment of the present invention also provides a kind of voice encryption system, comprising: first terminal and the second terminal, wherein,
Described first terminal is used for, the first key is obtained from the first encrypted card of described first terminal, the key negotiation request of carrying described first key is sent to the second terminal, the message that the verification receiving described second terminal transmission is passed through, speech frame is sent to described first encrypted card, use speech frame described in described first double secret key to be encrypted, the described speech frame after encryption is sent to described second terminal.
In the preferred implementation of the embodiment of the present invention, described first terminal also for,
Described first terminal sends the key negotiation request of carrying described first key every preset time period to described second terminal, and the described default time cycle is fixed time period or on-fixed time cycle.
In the preferred implementation of the embodiment of the present invention, described first key is random transmission.
In the preferred implementation of the embodiment of the present invention, described second terminal is used for,
Receive the key negotiation request of carrying described first key that described first terminal sends, the legitimacy of described key negotiation request is verified, if the legitimacy verification of described key negotiation request is passed through, the message verifying and pass through then is sent to described first terminal, receive the speech frame after encryption, speech frame after described encryption is sent in the second encrypted card of described second terminal, the speech frame after deciphering is sent to the receiver of described second terminal.
In the preferred implementation of the embodiment of the present invention, the second terminal also for,
If the legitimacy verification of described key negotiation request is not passed through, then send the unsanctioned message of verification to described first terminal, described first terminal sends unencrypted speech frame to described second terminal.
The terminal call speech ciphering method that the embodiment of the present invention provides and voice encryption system, the method is encrypted call voice by dynamic key, is not easy to be decrypted, and fail safe is higher.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is first embodiment of the invention terminal call speech ciphering method flow chart;
Fig. 2 is second embodiment of the invention terminal call speech ciphering method flow chart;
Fig. 3 is first embodiment of the invention voice encryption system architecture diagram;
Fig. 4 is embodiment of the present invention voice encryption system signal flow diagram.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
Refer to Fig. 1, be first embodiment of the invention terminal call speech ciphering method flow chart, the method specifically comprises:
S101, first terminal obtain the first key from its first encrypted card, send the key negotiation request of carrying the first key to the second terminal.
Concrete, the physical interface definition of the size conforms standard Micro SD (TF) of the first encrypted card of the embodiment of the present invention, similar with SD card, can be inserted in terminal, first encrypted card is connected with terminal by standard Micro SD interface, further, multiple separate keys is preserved in the first encrypted card.
The message that the verification that S102, first terminal receive the second terminal transmission is passed through, is sent to the first encrypted card, uses the first double secret key speech frame to be encrypted by speech frame.
Concrete, second terminal receives the key negotiation request of carrying the first key that first terminal sends, key negotiation request is verified, if verification is passed through, then send and verify the message passed through to first terminal, first terminal receives this message, and speech frame is sent to the first encrypted card, is encrypted in the first encrypted card to speech frame.
Be to be understood that, first terminal sends the key negotiation request of carrying the first key to the second terminal every preset time period, wherein, the time cycle of presetting is fixed time period or on-fixed time cycle, such as, first terminal sent the key negotiation request of carrying the first key every 2 seconds to the second terminal, or, first terminal sends the key negotiation request of carrying the first key at random as the second terminal, to improve the fail safe of first terminal and the second terminal call, use above-mentioned dynamic secret key encryption, make the more difficult decoding of call voice.
Such as, it is understood that described first key is random transmission, the first key that first time sends is 1234, and the first key that second time sent afterwards every 2 seconds is 1478, then the first key sent for the third time afterwards every 2 seconds is 7895, that is, the value of the first key is real-time change.
Speech frame after encryption is sent to the second terminal by S103, first terminal.
Concrete, the speech frame after encryption is sent to the second terminal by first terminal, and the second terminal is decrypted above-mentioned speech frame.
The terminal call speech ciphering method that the embodiment of the present invention provides and voice encryption system, the method is encrypted call voice by dynamic key, is not easy to be decrypted, and fail safe is higher.
Refer to Fig. 2, be second embodiment of the invention terminal call speech ciphering method flow chart, the method specifically comprises:
S201, the second terminal receive the key negotiation request of carrying the first key that first terminal sends, and verify the legitimacy of key negotiation request.
Concrete, the second terminal preserves the key information of first terminal, verifies the legitimacy of the key negotiation request that first terminal sends.
If the legitimacy verification of S202 key negotiation request is passed through, then the second terminal sends the message verifying and pass through to first terminal.
Concrete, if the legitimacy verification of key negotiation request is passed through, then the second terminal sends to first terminal and confirms to verify the message passed through, and proves that the second terminal is the trusted terminal of this call.
It is understood that, if the legitimacy verification of key negotiation request is not passed through, then send the unsanctioned message of verification to first terminal, first terminal sends unencrypted speech frame to described second terminal, namely, if the second terminal sends verification not by message, the second terminal can not be encrypted call with first terminal, the voice call that first terminal and the second terminal are not directly encrypted.
S203, the second terminal receive the speech frame after encryption, are sent in the second encrypted card of the second terminal by the speech frame after encryption, the speech frame after deciphering are sent to the receiver of the second terminal.
Concrete, second terminal comprises the second encrypted card, second encrypted card and the first encrypted card similar, the physical interface definition of size conforms standard Micro SD (TF), similar with SD card, can be inserted in terminal, the second encrypted card is connected with terminal by standard Micro SD interface, further, the multiple separate keys corresponding with the first encrypted card are preserved in the second encrypted card.Second encrypted card is used for deciphering, and therefore, the second terminal receives the speech frame after encryption, is sent in the second encrypted card of the second terminal by the speech frame after encryption and is decrypted, and the receiver speech frame after deciphering being sent to the second terminal carries out voice call.
The terminal call speech ciphering method that the embodiment of the present invention provides and voice encryption system, the method is encrypted call voice by dynamic key, is not easy to be decrypted, and fail safe is higher.
Refer to Fig. 3 and Fig. 4, this voice encryption system 1 comprises: first terminal 10 and the second terminal 20, and first terminal 10 comprises the first encrypted card 11, second terminal 20 and comprises the second encrypted card 21, wherein,
First terminal 10 for, the first key is obtained from the first encrypted card of first terminal 10, the key negotiation request of carrying described first key is sent to the second terminal, the message that the verification receiving the second terminal transmission is passed through, speech frame is sent to the first encrypted card 11, use the first double secret key speech frame to be encrypted, the speech frame after encryption is sent to the second terminal.
Concrete, the physical interface definition of the size conforms standard Micro SD (TF) of the first encrypted card 11 of the embodiment of the present invention, similar with SD card, can be inserted in terminal, first encrypted card 11 is connected with terminal by standard MicroSD interface, further, multiple separate keys is preserved in the first encrypted card 11.
It is understood that, first terminal 10 also for,
First terminal 10 sends the key negotiation request of carrying described first key every preset time period to described second terminal 20.The time cycle of presetting is fixed time period or on-fixed time cycle.
Concrete, second terminal 20 receives the key negotiation request of carrying the first key that first terminal 10 sends, key negotiation request is verified, if verification is passed through, then send and verify the message passed through to first terminal, first terminal 10 receives this message, and speech frame is sent to the first encrypted card 11, is encrypted in the first encrypted card 11 to speech frame.
Be to be understood that, first terminal 10 sends the key negotiation request of carrying the first key to the second terminal every preset time period, wherein, the time cycle of presetting is fixed time period or on-fixed time cycle, such as, first terminal 10 sent the key negotiation request of carrying the first key every 2 seconds to the second terminal, or, first terminal 10 sends the key negotiation request of carrying the first key at random as the second terminal 20, to improve the fail safe of first terminal 10 and the call of the second terminal 20, use above-mentioned dynamic secret key encryption, make the more difficult decoding of call voice.
Such as, it is understood that described first key is random transmission, and, the first key that first time sends is 1234, and the first key that second time sent afterwards every 2 seconds is 1478.
Second terminal 20 for,
Receive the key negotiation request of carrying the first key that first terminal 10 sends, the legitimacy of key negotiation request is verified, if the legitimacy verification of key negotiation request is passed through, the message verifying and pass through then is sent to first terminal 10, receive the speech frame after encryption, speech frame after encryption is sent in the second encrypted card 21 of described second terminal 20, the speech frame after deciphering is sent to the receiver of the second terminal 20.
Concrete, the second terminal 20 preserves the key information of first terminal 10, verifies the legitimacy of the key negotiation request that first terminal 10 sends.
If the legitimacy verification of key negotiation request is passed through, then the second terminal 20 sends to first terminal 10 and confirms to verify the message passed through, and proves that the second terminal 20 is trusted terminal of this call
Concrete, second terminal 20 comprises the second encrypted card, second encrypted card 21 and the first encrypted card 11 similar, the physical interface definition of size conforms standard Micro SD (TF), similar with SD card, can be inserted in terminal, the second encrypted card 21 is connected with terminal by standard Micro SD interface, further, the multiple separate keys corresponding with the first encrypted card 11 are preserved in the second encrypted card 21.Second encrypted card 21 is for deciphering, therefore, second terminal 20 receives the speech frame after encryption, is sent in the second encrypted card 21 of the second terminal 20 by the speech frame after encryption and is decrypted, and the receiver speech frame after deciphering being sent to the second terminal 20 carries out voice call.
Second terminal 20 also for, if the legitimacy verification of key negotiation request is not passed through, then send the unsanctioned message of verification to first terminal 10, first terminal sends unencrypted speech frame to the second terminal 20.
It is understood that, if the legitimacy verification of key negotiation request is not passed through, then send the unsanctioned message of verification to first terminal 10, first terminal 10 sends unencrypted speech frame to described second terminal 20, namely, if the second terminal 20 sends verification not by message, the second terminal 20 can not be encrypted call with first terminal 10, the voice call that first terminal 10 and the second terminal 20 are not directly encrypted.
The voice encryption system that the embodiment of the present invention provides, is encrypted call voice by dynamic key, and be not easy to be decrypted, fail safe is higher.
Should be appreciated that above-mentioned first terminal and the second terminal are not order of representation relation, but in order to distinguish different terminals.In like manner, the first encrypted card, the second encrypted card are to represent different Executive Modules, not repeating them here.
One of ordinary skill in the art will appreciate that the possible implementation of various aspects of the present invention or various aspects can be embodied as system, method or computer program.In addition, the possible implementation of each aspect of the present invention or various aspects can adopt the form of computer program, and computer program refers to the computer readable program code be stored in computer-readable medium.
Computer-readable medium can be computer-readable signal media or computer-readable recording medium.Computer-readable recording medium is including but not limited to electronics, magnetic, optics, electromagnetism, infrared or semiconductor system, equipment or device, or aforesaid appropriately combined arbitrarily, as random access memory (RAM), read-only memory (ROM), Erasable Programmable Read Only Memory EPROM (EPROM or flash memory), optical fiber, portable read-only memory (CD-ROM).
Processor in computer reads the computer readable program code be stored in computer-readable medium, makes processor can perform the function action specified in the combination of each step or each step in flow charts; Generate the device implementing the function action specified in the combination of each block of block diagram or each piece.
Computer readable program code can perform completely on the computer of user, part performs on the computer of user, as independent software kit, part on the local computer of user and part on the remote computer, or to perform on remote computer or server completely.Also it should be noted that in some alternate embodiment, in flow charts in each step or block diagram each piece the function that indicates may not according to occurring in sequence of indicating in figure.Such as, depend on involved function, in fact two steps illustrated in succession or two blocks may be executed substantially concurrently, or these blocks sometimes may be performed by with reverse order.
Above disclosedly be only present pre-ferred embodiments, certainly can not limit the interest field of the present invention with this, therefore according to the equivalent variations that the claims in the present invention are done, still belong to the scope that the present invention is contained.
Claims (10)
1. a terminal call speech ciphering method, is characterized in that, comprising:
First terminal obtains the first key from the first encrypted card of described first terminal, sends the key negotiation request of carrying described first key to the second terminal;
The message that the verification receiving described second terminal transmission is passed through, is sent to described first encrypted card, uses speech frame described in described first double secret key to be encrypted by speech frame;
Described speech frame after encryption is sent to described second terminal.
2. the method for claim 1, is characterized in that, described first terminal obtains the first key from the first encrypted card of described first terminal, sends the key negotiation request of carrying described first key, comprising to the second terminal:
Described first terminal sends the key negotiation request of carrying described first key every preset time period to described second terminal, and the described default time cycle is fixed time period or on-fixed time cycle.
3. method as claimed in claim 2, is characterized in that, described first key is random transmission.
4. a terminal call speech ciphering method, is characterized in that, comprising:
Second terminal receives the key negotiation request of carrying described first key that described first terminal sends, and verifies the legitimacy of described key negotiation request;
If the legitimacy verification of described key negotiation request is passed through, then send the message verifying and pass through to described first terminal;
Receive the speech frame after encryption, the speech frame after described encryption is sent in the second encrypted card of described second terminal, the speech frame after deciphering is sent to the receiver of described second terminal.
5. method as claimed in claim 4, is characterized in that, also comprise:
If the legitimacy verification of described key negotiation request is not passed through, then send the unsanctioned message of verification to described first terminal, described first terminal sends unencrypted speech frame to described second terminal.
6. a voice encryption system, is characterized in that, comprising: first terminal and the second terminal, wherein,
Described first terminal is used for, the first key is obtained from the first encrypted card of described first terminal, the key negotiation request of carrying described first key is sent to the second terminal, the message that the verification receiving described second terminal transmission is passed through, speech frame is sent to described first encrypted card, use speech frame described in described first double secret key to be encrypted, the described speech frame after encryption is sent to described second terminal.
7. voice encryption system as claimed in claim 6, is characterized in that, described first terminal also for,
Described first terminal sends the key negotiation request of carrying described first key every preset time period to described second terminal, and the described default time cycle is fixed time period or on-fixed time cycle.
8. voice encryption system as claimed in claim 7, is characterized in that, described first key is random transmission.
9. voice encryption system as claimed in claim 6, it is characterized in that, described second terminal is used for,
Receive the key negotiation request of carrying described first key that described first terminal sends, the legitimacy of described key negotiation request is verified, if the legitimacy verification of described key negotiation request is passed through, the message verifying and pass through then is sent to described first terminal, receive the speech frame after encryption, speech frame after described encryption is sent in the second encrypted card of described second terminal, the speech frame after deciphering is sent to the receiver of described second terminal.
10. voice encryption system as claimed in claim 9, is characterized in that, described second terminal also for,
If the legitimacy verification of described key negotiation request is not passed through, then send the unsanctioned message of verification to described first terminal, described first terminal sends unencrypted speech frame to described second terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510045144.3A CN104640108A (en) | 2015-01-28 | 2015-01-28 | Terminal communication voice encryption method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510045144.3A CN104640108A (en) | 2015-01-28 | 2015-01-28 | Terminal communication voice encryption method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104640108A true CN104640108A (en) | 2015-05-20 |
Family
ID=53218314
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510045144.3A Pending CN104640108A (en) | 2015-01-28 | 2015-01-28 | Terminal communication voice encryption method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104640108A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105743896A (en) * | 2016-02-01 | 2016-07-06 | 成都三零瑞通移动通信有限公司 | Encrypted voice communication key negotiation data exchange and transmission method |
CN106559393A (en) * | 2015-09-29 | 2017-04-05 | 华为数字技术(苏州)有限公司 | A kind of method of call encryption, apparatus and system |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1542427A1 (en) * | 2003-12-10 | 2005-06-15 | Sony Corporation | Secure in-vehicle communication system, method, terminal, program recording medium, and program |
CN101909290A (en) * | 2010-08-25 | 2010-12-08 | 中兴通讯股份有限公司 | Method, system and mobile terminal for encrypting voice call |
CN101917711A (en) * | 2010-08-25 | 2010-12-15 | 中兴通讯股份有限公司 | Mobile communication system and voice call encryption method thereof |
CN102158861A (en) * | 2011-03-18 | 2011-08-17 | 钱袋网(北京)信息技术有限公司 | Expansion card, encryption card, mobile terminal, communication data receiving and transmitting method and equipment |
CN103974241A (en) * | 2013-02-05 | 2014-08-06 | 东南大学常州研究院 | Voice end-to-end encryption method aiming at mobile terminal with Android system |
CN103986712A (en) * | 2014-05-16 | 2014-08-13 | 天地融科技股份有限公司 | Data processing method for voice communication |
CN104113836A (en) * | 2014-07-29 | 2014-10-22 | 深圳市中兴移动通信有限公司 | Conversation encryption method, communication terminal and base station |
CN104284328A (en) * | 2013-07-09 | 2015-01-14 | 北京鼎普科技股份有限公司 | Method and device for encrypting mobile phone communication content |
-
2015
- 2015-01-28 CN CN201510045144.3A patent/CN104640108A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1542427A1 (en) * | 2003-12-10 | 2005-06-15 | Sony Corporation | Secure in-vehicle communication system, method, terminal, program recording medium, and program |
CN101909290A (en) * | 2010-08-25 | 2010-12-08 | 中兴通讯股份有限公司 | Method, system and mobile terminal for encrypting voice call |
CN101917711A (en) * | 2010-08-25 | 2010-12-15 | 中兴通讯股份有限公司 | Mobile communication system and voice call encryption method thereof |
CN102158861A (en) * | 2011-03-18 | 2011-08-17 | 钱袋网(北京)信息技术有限公司 | Expansion card, encryption card, mobile terminal, communication data receiving and transmitting method and equipment |
CN103974241A (en) * | 2013-02-05 | 2014-08-06 | 东南大学常州研究院 | Voice end-to-end encryption method aiming at mobile terminal with Android system |
CN104284328A (en) * | 2013-07-09 | 2015-01-14 | 北京鼎普科技股份有限公司 | Method and device for encrypting mobile phone communication content |
CN103986712A (en) * | 2014-05-16 | 2014-08-13 | 天地融科技股份有限公司 | Data processing method for voice communication |
CN104113836A (en) * | 2014-07-29 | 2014-10-22 | 深圳市中兴移动通信有限公司 | Conversation encryption method, communication terminal and base station |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106559393A (en) * | 2015-09-29 | 2017-04-05 | 华为数字技术(苏州)有限公司 | A kind of method of call encryption, apparatus and system |
CN106559393B (en) * | 2015-09-29 | 2021-02-05 | 华为数字技术(苏州)有限公司 | Method, device and system for encrypting call |
CN105743896A (en) * | 2016-02-01 | 2016-07-06 | 成都三零瑞通移动通信有限公司 | Encrypted voice communication key negotiation data exchange and transmission method |
CN105743896B (en) * | 2016-02-01 | 2019-03-22 | 成都三零瑞通移动通信有限公司 | A kind of transmission method of enciphoring voice telecommunication key agreement data exchange |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104079581B (en) | Identity identifying method and equipment | |
CN103905903B (en) | A kind of communication partner method of digital TV terminal, terminal and system | |
CN105634737B (en) | Data transmission method, terminal and system | |
CN105227537A (en) | Method for authenticating user identity, terminal and service end | |
JP2012530311A5 (en) | ||
CN104484596A (en) | Method and terminal for creating password in multi-operation system | |
WO2016095473A1 (en) | Security call method, terminal and system, and computer storage medium | |
CN107645378A (en) | Key management platform, communication encrypting method and terminal | |
CN105376059A (en) | Method and system for performing application signature based on electronic key | |
CN107707562B (en) | Method and device for encrypting and decrypting algorithm of asymmetric dynamic token | |
CN103973696B (en) | A kind of data processing method of voice call | |
CN102056077A (en) | Method and device for applying smart card by key | |
CN102916810B (en) | Method, system and apparatus for authenticating sensor | |
CN102264068B (en) | Shared key consultation method, system, network platform and terminal | |
CN104065648B (en) | A kind of data processing method of voice call | |
CN104955029A (en) | Address book protection method, address book protection device and communication system | |
CN104640108A (en) | Terminal communication voice encryption method and system | |
CN103974243B (en) | A kind of data handling system of voice call | |
CN105262759A (en) | Method and system for encrypted communication | |
CN102045709B (en) | Mobile terminal application data downloading method, system and mobile terminal | |
CN103974242B (en) | A kind of data processing method of voice call | |
CN111064577A (en) | Security authentication method and device and electronic equipment | |
CN105721144A (en) | Password storage method of wireless network access point and terminal | |
CN105451201A (en) | Mobile terminal, remote control method of mobile terminal, remote control device of mobile terminal and remote control system of mobile terminal | |
CN112367329B (en) | Communication connection authentication method, device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20150520 |