CN103002439A - Confidential call communication method and user terminal - Google Patents

Confidential call communication method and user terminal Download PDF

Info

Publication number
CN103002439A
CN103002439A CN2011102701746A CN201110270174A CN103002439A CN 103002439 A CN103002439 A CN 103002439A CN 2011102701746 A CN2011102701746 A CN 2011102701746A CN 201110270174 A CN201110270174 A CN 201110270174A CN 103002439 A CN103002439 A CN 103002439A
Authority
CN
China
Prior art keywords
calling
user terminal
key
sign
call
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011102701746A
Other languages
Chinese (zh)
Other versions
CN103002439B (en
Inventor
汪文清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Datang Linktech Infosystem Co., Ltd.
Original Assignee
Leadcore Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Leadcore Technology Co Ltd filed Critical Leadcore Technology Co Ltd
Priority to CN201110270174.6A priority Critical patent/CN103002439B/en
Publication of CN103002439A publication Critical patent/CN103002439A/en
Application granted granted Critical
Publication of CN103002439B publication Critical patent/CN103002439B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention provides a confidential call communication method and a user terminal. The user terminal acquires and stores an identifier for calling during establishment of a call; the user terminal acquires and stores a key of the call during the establishment of the call, after a connected call or before the call, and establishes one-to-one correspondence between the stored identifier and the stored key. Therefore, during call waiting or call holding, the situation that the confidential call fails due to the key covered is avoided, and waiting and holding services of the confidential call are achieved.

Description

The communication means of secret telephony and user terminal
Technical field
The present invention relates to communication technical field, particularly a kind of communication means of secret telephony and user terminal.
Background technology
At present, in the bright conversation except the basic session services such as this locality, national distance, National roaming, international roaming is provided, also provide supplementary service (Supplementary Service for the client, SS), for example, Call Waiting (Call Wait, CW) is professional to keep (Call Hold, CH) business with calling out.
Wherein, when Call Waiting refers to that a user is in the conversation, there is another user to call out this user, what this second user heard is not the busy tone that first user is conversing, but wait for the ring-back tone that first user connects, in addition, this first user who is in the conversation also will obtain the prompting that has other users to call out that terminal provides.
Call out to keep referring to the user that conversing, suspend the conversation with original correspondent, but keep simultaneously original conversation, namely and hang on and original correspondent between conversation, and carry out conversation with new correspondent; In the time need to conversing with original correspondent, then keep new conversation or hang up this new conversation, recover original conversation.
For example, user A support call wait and call hold service, then working as user A and user B is carrying out in voice call or the video call process, user C calling party A (voice or visual telephone), be that user C sends call request to user A, at this moment, user C will hear the ring-back tone of waiting for that user A connects, user A also will obtain the prompting that user C calls out, and namely user A has realized call waiting; When user A is ready the conversation of listening user C, but when not wanting to hang up the conversation of user B, the state that then needs the conversation between maintenance (hold) and the user B to hang on, be that conversation between user A and the user B is in hold mode, simultaneously, call out between user A connection and the user C, carry out voice or video calling; Then, user A needs again to converse with user B, simultaneously do not want to hang up again the conversation of user C, then user A keep and user C between the state hung on of conversation, and recover conversation between (retrieve) and the user B, be that user A and user B are in talking state, thereby user A has realized call hold service.
In existing communication, in order to realize secure communication, also regularly carry out secret telephony, namely communication data is encrypted.In the secure communication, each secret telephony is in call establishment, generally all key agreement need to carried out between terminal and the network or between terminal and terminal, make communicating pair obtain the key of this secret telephony, the communication data that the key that obtains in the use call establishment in communication process sends oneself is encrypted, and simultaneously the coded communication data that receive is decrypted.In secure communication, generally all be that different key (i.e. " words one key ") is used in different callings.In addition, security module can only be called out corresponding key with one by management and using for same security service type in the existing terminal.
Thus, in the prior art, when needs carry out the Call Waiting of secret telephony and call hold service, key will occur cover, can't decipher the problem that causes secure communication to carry out thereby produce.For example, if user A and user B are utilizing key 1 to carry out in the process of secret telephony, and user C initiates a secret telephony calling and has carried out cipher key agreement process to user A, produced and to have been carried out the key 2 that secret telephony uses by user A and user C, then carrying out the employed key 1 of secret telephony with user B in the security module of user A terminal will be covered by key 2, thus, the secret telephony of user A and user's B can't continue.Reason is, when user A continues to carry out secret telephony with user B, user A will use 2 pairs of communication datas of key of its up-to-date preservation to carry out encryption and decryption, and user B will use 1 pair of communication data of key to carry out encryption and decryption.Thus, carry out in the process of secret telephony at user A and user B, the problem that can't decipher has just produced, and has caused secure communication to carry out, and namely can't realize Call Waiting and the call hold service of secret telephony.
Summary of the invention
The object of the present invention is to provide a kind of communication means and user terminal of secret telephony, can't realize the Call Waiting of secret telephony or the problem of call hold service to solve in the prior art.
For solving the problems of the technologies described above, the invention provides a kind of communication means of secret telephony, comprising: user terminal obtains and preserves for the sign of calling out in call establishment; User terminal in call establishment or behind call through, converse before, obtain and preserve the key of described calling, simultaneously described sign and the Key Establishing one-to-one relationship to preserving; User terminal utilizes the cipher key pair communication data of the sign correspondence of the calling in the communication process to carry out encryption and decryption in communication process; User terminal is deleted sign and the key of the described calling of preserving after calling is hung up.
Optionally, in the communication means of described secret telephony, described user terminal carries out two callings at least, comprising: first calls out and the second calling, and wherein, when setting up the second calling, described the first calling is set up.
Optionally, in the communication means of described secret telephony, described user terminal carries out two callings at least, comprising: first calls out and the second calling, and wherein, when setting up or connecting the second calling, described the first calling is in calls out in the keep-process.
Optionally, in the communication means of described secret telephony, if described user terminal also carries out other callings, when then setting up or connecting the second calling, described other callings are in calls out in the keep-process.
Optionally, in the communication means of described secret telephony, connect before described the second calling, keep first described first to call out or hang up described the first calling.
Optionally, in the communication means of described secret telephony, described key comprises: be used for the encryption key of the encryption of communicated data that sends and be used for decruption key to the communication data deciphering that receives.
The present invention also provides a kind of user terminal, comprising: the call manager unit, in order to control is called out in several callings; And obtain the sign of each calling; Cipher key management unit is in order to obtain the key of each calling; Preserve sign and the key of each calling, and to sign and the Key Establishing one-to-one relationship of each calling of preserving; And utilize the key of sign correspondence of each calling of described preservation that the communication data of this calling is carried out encryption and decryption; Transmitting element is in order to send communication data; Receiving element is in order to the received communication data.
Optionally, in described user terminal, described call control packet is drawn together: call setup, call through, calling maintenance, call recovery and calling are hung up.
Optionally, in described user terminal, described call manager unit obtains for the sign of calling out in call establishment, and described sign is transferred to described cipher key management unit, and described cipher key management unit is preserved described sign; Described cipher key management unit in call establishment or behind call through, converse before, obtain and preserve the key of described calling, simultaneously described sign and the Key Establishing one-to-one relationship to preserving; Described cipher key management unit utilizes the cipher key pair communication data of the sign correspondence of the calling in the communication process to carry out encryption and decryption in communication process; Described cipher key management unit is deleted sign and the key of the described calling of preserving after calling is hung up.
Optionally, in described user terminal, described cipher key management unit is in communication process, utilize the cipher key pair communication data of the sign correspondence of the calling in the communication process to carry out encryption and decryption and comprise the steps: that described call manager unit obtains the sign of the calling of connection, and described sign is transferred to described receiving element and transmitting element; When described user terminal receives the secure communication data, comprise the steps: that described receiving element receives the secure communication data that the other side of the calling of connecting sends, and each the secure communication data block that receives added described sign, will be added with the secure communication transmission of data blocks of sign to cipher key management unit; Described cipher key management unit utilize the key corresponding to described sign of its preservation that described secure communication data block is decrypted, and the communicating data block after will deciphering is transferred to described receiving element according to the sign of described secure communication data block; The communication data of described receiving element after to described deciphering carries out subsequent treatment; When described user terminal sends the secure communication data, comprise the steps: that each unencryption communicating data block of the other side that described transmitting element will send to the calling of described connection adds described sign, is transferred to cipher key management unit with the unencryption communicating data block that is added with sign; Described cipher key management unit utilize the key corresponding to described sign of its preservation that described unencryption communicating data block is encrypted, and the communicating data block after will encrypting is transferred to described transmitting element according to the sign of the described unencryption communicating data block that receives; Described transmitting element sends the communicating data block to be sent after the described encryption.
Optionally, in described user terminal, described cipher key management unit is in communication process, utilize the cipher key pair communication data of the sign correspondence of the calling in the communication process to carry out encryption and decryption and comprise the steps: that described call manager unit obtains the sign of the calling of connection, and the key corresponding with described sign that utilizes described sign to activate to preserve in the described cipher key management unit, so that the described key current use key that is cipher key management unit, until described call manager unit carries out next time activation key operation; When described user terminal receives the secure communication data, comprise the steps: that described receiving element receives the secure communication data that the other side of the calling of connecting sends, and with the secure communication transfer of data that receives to cipher key management unit; The key that described cipher key management unit is utilized current use is decrypted the secure communication data of described reception, and the communicating data block after will deciphering is transferred to described receiving element; The communication data of described receiving element after to described deciphering carries out subsequent treatment; When described user terminal sends the secure communication data, comprise the steps: that the other side's the unencryption communication data that described transmitting element will send to the calling of described connection is transferred to cipher key management unit; Described cipher key management unit utilizes the key of current use that described unencryption communication data to be sent is encrypted, and the communication data after will encrypting is transferred to described transmitting element; Described transmitting element sends the communication data to be sent after the described encryption.
Optionally, in described user terminal, described call manager unit is controlled two callings at least, comprising: first calls out and the second calling, and wherein, when setting up the second calling, described the first calling is set up.
Optionally, in described user terminal, if other callings are also controlled in described call manager unit, when then setting up or connecting the second calling, described other callings are in calls out in the keep-process.
Optionally, in described user terminal, described call manager unit is connected before described the second calling, keeps first described first to call out or hang up described the first calling.
Optionally, in described user terminal, described call manager unit is controlled two callings at least, comprising: first calls out and the second calling, and wherein, when setting up or connecting the second calling, described the first calling is in calls out in the keep-process.
Optionally, in described user terminal, if other callings are also controlled in described call manager unit, when then setting up or connecting the second calling, described other callings are in calls out in the keep-process.
Optionally, in described user terminal, described key comprises: be used for the encryption key of the encryption of communicated data that sends and be used for decruption key to the communication data deciphering that receives.
The present invention also provides a kind of communication means of secret telephony, comprising: step 10: user terminal is set up first and is called out, and obtains the key first time of calling out for first; Step 20: described user terminal is connected described first and is called out, and utilizes described first time key to carry out secret telephony with the other side of the first calling; Step 30: described user terminal keeps first to call out; Step 40: described user terminal is set up second and is called out, and obtains the key second time of calling out for second; Step 50: described user terminal is connected described second and is called out, and utilizes described second time key to carry out secret telephony with the other side of the second calling; Step 60: described user terminal keeps second to call out; Step 70: described user terminal carries out the first key agreement of calling out, and obtains for the third time key of calling out for first; Step 80: described user terminal is connected described first and is called out, and utilizes described for the third time key and first the other side who calls out to carry out secret telephony.
The present invention also provides a kind of communication means of secret telephony, comprising: step 10: user terminal is set up first and is called out, and obtains the key first time of calling out for first; Step 20: described user terminal is connected described first and is called out, and utilizes described first time key to carry out secret telephony with the other side of the first calling; Step 30: described user terminal is set up the second call communication; Step 40: described user terminal keeps first to call out; Step 50: described user terminal carries out the second key agreement of calling out, and obtains the key second time of calling out for second; Step 60: described user terminal is connected described second and is called out, and utilizes described second time key to carry out secret telephony with the other side of the second calling; Step 70: described user terminal keeps second to call out; Step 80: described user terminal carries out the first key agreement of calling out, and obtains for the third time key of calling out for first; Step 90: described user terminal is connected described first and is called out, and utilizes described for the third time key and first the other side who calls out to carry out secret telephony.
In the communication means and user terminal of the first secret telephony provided by the invention,, in call establishment, obtain and preserve for the sign of calling out by user terminal; User terminal in call establishment or behind call through, converse before, obtain and preserve the key of described calling, described sign and the Key Establishing one-to-one relationship to preserving simultaneously, thereby when carrying out Call Waiting or calling out maintenance, key is capped and can not carry out the situation of secret telephony with not occurring, and just can realize thus Call Waiting and the call hold service of secret telephony.
In the communication means of the second secret telephony provided by the invention, user terminal is before the key agreement that carries out another calling, keep first current calling, thereby the key that can prevent another calling covers after the key of current calling, current calling can not be carried out secret telephony because the employed key of both call sides is different, thus, Call Waiting and the call hold service of secret telephony have been realized.
Description of drawings
Fig. 1 is the schematic flow sheet of communication means of the secret telephony of the embodiment of the invention one;
Fig. 2 is the schematic flow sheet of communication means of the secret telephony of the embodiment of the invention two;
Fig. 3 is the structural representation of the user terminal of the embodiment of the invention three;
Fig. 4 is the structural representation of the user terminal of the embodiment of the invention four;
Fig. 5 is the schematic flow sheet of communication means of the secret telephony of the embodiment of the invention five.
Embodiment
Be described in further detail below in conjunction with communication means and the user terminal of the drawings and specific embodiments to secret telephony provided by the invention.According to the following describes and claims, advantages and features of the invention will be clearer.It should be noted that, accompanying drawing all adopts very the form of simplifying, only in order to convenient, the purpose of the aid illustration embodiment of the invention lucidly.
Embodiment one
Please refer to Fig. 1, it is the schematic flow sheet of communication means of the secret telephony of the embodiment of the invention one.As shown in Figure 1, in the present embodiment, the communication means of described secret telephony is specific as follows:
At first, execution in step S10: user terminal A and user terminal B set up first and call out, in the first call establishment, the first sign and the first key of calling out for described first obtained and preserved to user terminal A, simultaneously described first sign and the first Key Establishing one-to-one relationship of user terminal A to preserving.
In the present embodiment, described user terminal A realizes the secret telephony supplementary service for needing, and namely realizes Call Waiting and calls out the user terminal that keeps, therefore, in the present invention describes, the situation to the user terminal C of user terminal B and follow-up appearance is not made description.If described user terminal B and user terminal C need to realize the secret telephony supplementary service equally, described user terminal B and user terminal C can be thought that then another uses terminal A; If described user terminal B and user terminal C do not need to realize the secret telephony supplementary service, then described user terminal B and user terminal C carry out is operating as prior art, and the application repeats no more this.
At this, in user terminal A, the unique correspondence of described the first sign described first is called out, in the present embodiment, described first be designated can this time of unique identification calling Transaction Identifier (Transaction ID is called for short TI), it just can be determined and obtain setting up when calling out.In the present embodiment, described the first key (and follow-up other keys that are used for secret telephony of using, for example second key of follow-up appearance) obtains by the cipher key agreement process of secret telephony, and it is prior art, and the application repeats no more this.Wherein, described the first key can comprise: in order to the first encryption key and the first decruption key in order to the secure communication data that receive are decrypted that is encrypted sending communication data, described the first encryption key and the first decruption key can be identical can be not identical yet.
In other embodiments of the invention, described the first key also can be behind the first call through, obtain by cipher key agreement process before conversing.
Then, execution in step S11: first between described user terminal A connection and the described user terminal B calls out, described user terminal A utilization first key and the user terminal B (i.e. first calling party) corresponding with described the first sign carries out secret telephony, comprising: send the secure communication data and receive the secure communication data.
Execution in step S12: user terminal A and user terminal C set up second and call out, the second sign and the second key of calling out for described second obtained and preserved to user terminal A, simultaneously described second sign and the second Key Establishing one-to-one relationship of user terminal A to preserving.At this, described the second sign also is Transaction Identifier, and described the second key also can comprise: the second encryption key and the second decruption key.Certainly, in other embodiments of the invention, described the second key also can be behind the second call through, obtain by cipher key agreement process before conversing.
Certainly, in other embodiments of the invention, when user terminal A and user terminal C set up second when calling out, user terminal A and user terminal B also can be in set up call out after, before the call establishment, namely first calls out and set up, but the first calling is not switched on.
Execution in step S13: user terminal A keeps first to call out, i.e. first between user terminal A maintenance and the user terminal B calls out and be not hung up.
Execution in step S14: user terminal A is connected second and is called out, and user terminal A utilization second key and the user terminal C (i.e. second calling party) corresponding with the second sign carries out secret telephony, comprising: send the secure communication data and receive the secure communication data.
Execution in step S15: user terminal A is hung up second and is called out, simultaneously, deletion the second sign and the second key, namely user terminal A will be deleted setting up the second the second sign and the second key of preserving when calling out.
Execution in step S16: user terminal A is recovered the first calling, utilizes the first sign and the first key and user terminal B to carry out secret telephony.
At last, execution in step S17: user terminal A is hung up the first calling, simultaneously, and deletion the first sign and the first key.
Certainly, in other embodiments of the invention, user terminal A can be carried out the switching of more times calling between user terminal B and user terminal C, that is, and for example: during execution in step S15, and hang on second and call out, but keep second to call out.
The second, in other embodiments of the invention, after setting up the second calling, if user terminal A does not need to keep first to call out with user terminal B, then when execution in step S13, described user terminal A also can be hung up the first calling.
The 3rd, the present embodiment only schematically carries out Call Waiting and call hold service with user terminal A and user terminal B, C, in other embodiments of the invention, can also add the more users terminal, for example, user terminal A can also be carried out Call Waiting and call hold service with user terminal D, E.......
The 4th, the present embodiment only schematically realizes that take user terminal A Call Waiting and call hold service are as example, in other embodiments of the invention, also can be that user terminal A, user terminal B, user terminal C all can realize Call Waiting and call hold service, namely can user terminal A and user terminal B keep calling out, user terminal A and user terminal C keep calling out, simultaneously, user's terminal D and user terminal A call establishment are arranged again, user terminal E and user terminal B call establishment, user terminal F and user terminal C call establishment etc.
Those skilled in the art are noted that on the embodiment of the invention one disclosed basis, above-mentioned variation example and more to change example all clear and can realize.
In addition, in the present invention, described " to described first sign and the first Key Establishing one-to-one relationship of preserving " refers to can retrieve the first key by described the first sign.Certainly, term " to described second sign and the second Key Establishing one-to-one relationship of preserving " etc. also is same reason.
Embodiment two
Please refer to Fig. 2, it is the schematic flow sheet of communication means of the secret telephony of the embodiment of the invention two.As shown in Figure 2, in the present embodiment, the communication means of described secret telephony comprises the steps:
Step S20: user terminal A is set up with first of user terminal B and is called out, and obtains and preserve the first sign and the first key of calling out for first, described first sign and the first Key Establishing one-to-one relationship of user terminal A to preserving.
Step S21: user terminal A is connected first and is called out, and utilizes first key and the user terminal B corresponding with the first sign to carry out secret telephony.
Step S22: user terminal A keeps first to call out.
Step S23: user terminal A is set up with second of user terminal C and is called out, and obtains and preserve the second sign and the second key of calling out for second, described second sign and the second Key Establishing one-to-one relationship of user terminal A to preserving.
Step S24: user terminal A is connected second and is called out, and utilizes second key and the user terminal C corresponding with the second sign to carry out secret telephony.
Step S25: user terminal A is hung up the second calling, deletes simultaneously the second sign and the second key.
Step S26: user terminal A is recovered the first calling, and corresponding the first key and the user terminal B of utilization and the first sign carries out secret telephony.
Step S270: user terminal A is hung up the first calling, deletes simultaneously the first sign and the first key.
The difference of the present embodiment and embodiment one is, the present embodiment keeps first current calling setting up before other call out, and namely the present embodiment has only been realized the call hold service of secret telephony supplementary service.Certainly, user terminal A in the present embodiment also can realize call waiting, when user terminal A is being set up several and is being called out, can preserve the sign of each calling and key and during to the sign of each calling and Key Establishing one-to-one relationship, it just can avoid the new key that the key of calling out covers current calling of setting up, cause current calling can not carry out the problem of secret telephony owing to the employed key difference of both call sides, thereby just can realize Call Waiting and the call hold service of secret telephony.
Embodiment three
Please refer to Fig. 3, it is the structural representation of the user terminal of the embodiment of the invention three.As shown in Figure 3, user terminal 30 comprises:
Call manager unit 31 is in order to call out control to several callings; And obtain the sign of each calling;
Cipher key management unit 32 is in order to obtain the key of each calling; Preserve sign and the key of each calling, and to sign and the Key Establishing one-to-one relationship of each calling of preserving; And utilize the key of sign correspondence of each calling of described preservation that the communication data of this calling is carried out encryption and decryption;
Transmitting element 33 is in order to send communication data;
Receiving element 34 is in order to the received communication data.
Described call control packet is drawn together: call setup, call through, calling maintenance, call recovery and calling are hung up.
Concrete, when user terminal 30 needs to realize Call Waiting or call hold service, for example, the Call Waiting that the user terminal A among the embodiment one realizes and call hold service, it can be realized by following manner:
At first, described call manager unit 31 is set up first and is called out, and in the first call establishment, obtains first sign of calling out for first, and described the first sign is transferred to described cipher key management unit 32, described cipher key management unit 32 is preserved described the first sign.In addition, described first the first key of calling out is obtained and preserved to described cipher key management unit 32 in the first call establishment, simultaneously described the first sign and the first Key Establishing one-to-one relationship to preserving.Certainly, in other embodiments of the invention, described cipher key management unit 32 also can be behind the first call through, converse before, obtain and preserve first the first key of calling out.
Then, described call manager unit 31 connections described first are called out; Specifically comprise:
Described call manager unit 31 obtains the sign (the first first sign of calling out of namely connecting) of the calling of current connection, and described the first sign is sent to described receiving element 34 and transmitting element 33;
When described user terminal A receives the secure communication data, described receiving element 34 receives the secure communication data that the first calling party sends, and each the secure communication data block that receives added described the first sign, will be added with the secure communication transmission of data blocks of the first sign to cipher key management unit 32; Described cipher key management unit 32 is according to described the first sign, utilize the first key that described secure communication data are decrypted, concrete, described cipher key management unit 32 retrieves first key corresponding with described the first sign of storage in the cipher key management unit 32 according to first sign of adding in the secure communication data block, then the first key with this storage is decrypted described secure communication data, and the communicating data block of deciphering is transferred to described receiving element 34 and carries out subsequent treatment;
When described user terminal A sends the secure communication data, each unencryption communicating data block that described transmitting element 33 will send to the first calling party of described connection adds described the first sign, and the unencryption communicating data block that is added with the first sign is transferred to cipher key management unit 32; Cipher key management unit 32 is according to described the first sign that receives, utilize the first key to be encrypted to sent the unencryption communication data, concrete, described cipher key management unit 32 retrieves first key corresponding with described the first sign of storage in the cipher key management unit 32 according to first sign of adding in the unencryption communicating data block, then the first key with this storage is encrypted described unencryption communication data, and the communication data after will encrypting transfers to transmitting element 33; The communication data (to the first calling party) that described transmitting element 33 sends after encrypting.
Certainly, above-mentioned reception secure communication data and the step that sends the secure communication data can be carried out repeatedly.
Then, described call manager unit 31 is set up second and is called out, and in the second call establishment, obtains second sign of calling out for second, and described the second sign is transferred to described cipher key management unit 32, described cipher key management unit 32 is preserved described the second sign.In addition, described second the second key of calling out is obtained and preserved to described cipher key management unit 32 in the second call establishment, simultaneously described the second sign and the second Key Establishing one-to-one relationship to preserving.Certainly, in other embodiments of the invention, described cipher key management unit 32 also can be behind the second call through, converse before, obtain and preserve second the second key of calling out.
Then, described call manager unit 31 maintenances first are called out.
Then, described call manager unit 31 connections second are called out; Carrying out the transmitting-receiving with second the other side's who calls out secure communication data, and the transmitting-receiving of the secure communication data between above-mentioned and the first calling party is similar, and the application repeats no more this.
The second calling is hung up in described call manager unit 31, the second sign and the second corresponding key thereof that simultaneously call manager unit 31 notice cipher key management unit 32 deletions described second are called out, described cipher key management unit 32 is deleted the second sign and second key of its preservation, thereby discharges the part memory space of described cipher key management unit 32.
Then, described call manager unit 31 recoveries first are called out; To carry out the transmitting-receiving with first the other side's who calls out secure communication data.Specifically comprise:
Described call manager unit 31 obtains the sign (the first first sign of calling out of namely connecting) of the calling that is resumed (being current connection), and described the first sign is sent to described receiving element 34 and transmitting element 33;
When described user terminal A receives the secure communication data, described receiving element 34 receives the secure communication data that the first calling party sends, and each the secure communication data block that receives added described the first sign, will be added with the secure communication transmission of data blocks of the first sign to cipher key management unit 32; Described cipher key management unit 32 is according to described the first sign, utilize the first key that described secure communication data are decrypted, concrete, described cipher key management unit 32 retrieves first key corresponding with described the first sign of storage in the cipher key management unit 32 according to first sign of adding in the secure communication data block, then the first key with this storage is decrypted described secure communication data, and the communicating data block of deciphering is transferred to described receiving element 34 and carries out subsequent treatment;
When described user terminal A sends the secure communication data, each unencryption communicating data block that described transmitting element 33 will send to the first calling party of described connection adds described the first sign, and the unencryption communicating data block that is added with the first sign is transferred to cipher key management unit 32; Cipher key management unit 32 is according to described the first sign that receives, utilize the first key to be encrypted to sent the unencryption communication data, concrete, described cipher key management unit 32 retrieves first key corresponding with described the first sign of storage in the cipher key management unit 32 according to first sign of adding in the unencryption communicating data block, then the first key with this storage is encrypted described unencryption communication data, and the communication data after will encrypting transfers to transmitting element 33; The communication data (to the first calling party) that described transmitting element 33 sends after encrypting.
At last, the first calling is hung up in described call manager unit 31, the first sign and the first corresponding key thereof that simultaneously call manager unit 31 notice cipher key management unit 32 deletions described first are called out, described cipher key management unit 32 is with the first sign and the deletion of the first key of its preservation.
Further, in other embodiments of the invention, described user terminal 30 also can comprise a timer, and being used for needing in time or the frame number of business data frame changes the secret signalling of business datum encryption/decryption parameter in secret calling procedure calling both sides.When a secret calling enters the calling hold mode, call manager unit 31 starts the described counter that is held to call out, when described secret calling is resumed connection from hold mode, call manager unit 31 suspends the timer of described calling, and with the value notice cipher key management unit of the timer of the sign of described calling and described calling, the frame number of the business data frame that cipher key management unit converts according to the value of this timer or by the value of this timer calculates new and encryption/decryption parameter time correlation, realize the synchronous of time correlation encryption/decryption parameter with this secret calling party, after making this secret call recovery, the security service data that the secret telephony both sides still can the other side send are carried out correct encryption and decryption.
Certainly, if when user terminal 30 keeps one to call out, can simultaneously the untreated communication data that is held to call out in transmitting element or the receiving element be emptied, prevent from sending mistake.
Embodiment four
Please refer to Fig. 4, it is the structural representation of the user terminal of the embodiment of the invention four.As shown in Figure 4, user terminal 40 comprises:
Call manager unit 41 is in order to call out control to several callings; And obtain the sign of each calling;
Cipher key management unit 42 is in order to obtain the key of each calling; Preserve sign and the key of each calling, and to sign and the Key Establishing one-to-one relationship of each calling of preserving; And utilize the key of sign correspondence of each calling of described preservation that the communication data of this calling is carried out encryption and decryption;
Transmitting element 43 is in order to send communication data;
Receiving element 44 is in order to the received communication data.
User terminal 40 in the present embodiment and the difference of the user terminal 30 among the embodiment three are, in the present embodiment, after described call manager unit 41 is connected or is recovered the first calling, described call manager unit 41 obtains the first sign that first of connection is called out, and utilize described the first sign to activate the first key of preserving in the described cipher key management unit 42, so that described the first key is current use key, until described call manager unit carries out next time activation key operation.
Then, described receiving element 44 receives the secure communication data that the first calling party sends, and with the secure communication transfer of data that receives to cipher key management unit 42; The first key that described cipher key management unit 42 is utilized current use is decrypted the secure communication data of described reception.The unencryption communication data that described transmitting element 43 will send to the first calling party transfers to cipher key management unit 42; Cipher key management unit 42 utilizes the first key of current use that unencrypted communication data to be sent is encrypted, and the communication data to be sent after will encrypting transfers to described transmitting element 43; The communication data that described transmitting element 43 sends after encrypting.
Be that receiving element 44 no longer needs the secure communication data that at every turn receive are added call identification, perhaps transmitting element 43 no longer needs the unencryption communication data of each needs transmission is added call identification, when cipher key management unit 42 is decrypted each data to be decrypted piece or each data block that will encrypt is encrypted, no longer need each encryption and decryption key that all will should use with retrieval by call identification.
User terminal 40 in utilizing the present embodiment keeps first to call out, connect or recover second call out after, described call manager unit 41 obtains the second sign that second of connection is called out, and utilize described the second sign to activate the second key of preserving in the described cipher key management unit 42, be about to current use key and become the second key by before the first key, then utilize the second key to carry out secret telephony.
Embodiment five
Please refer to Fig. 5, it is the schematic flow sheet of communication means of the secret telephony of the embodiment of the invention five.As shown in Figure 5, in the present embodiment, the communication means of described secret telephony is specific as follows:
At first, execution in step S50: user terminal A is set up with first of user terminal B and is called out, and comprises and sets up the first call communication and carry out key agreement, obtains the key first time of calling out for first;
Execution in step S51: user terminal A is connected first and is called out, and the utilization key first time and user terminal B carry out secret telephony;
Execution in step S52: user terminal A is set up with second of user terminal C and is called out;
Execution in step S53: user terminal A keeps first to call out;
Execution in step S54: user terminal A and user terminal C carry out key agreement, obtain the key second time of calling out for second;
Execution in step S55: user terminal A is connected second and is called out, and the utilization key second time and user terminal C carry out secret telephony;
Execution in step S56: user terminal A keeps second to call out;
Execution in step S57: user terminal A and user terminal B carry out key agreement, obtain for the third time key of calling out for first;
Execution in step S58: user terminal A is connected first and is called out, and utilizing for the third time, key and user terminal B carry out secret telephony.
In the present embodiment, user terminal is before the key agreement that carries out another calling, keep first current calling, thereby the key that can prevent another calling covers after the key of current calling, current calling can not be carried out secret telephony because the employed key of both call sides is different, thus, Call Waiting and the call hold service of secret telephony have been realized.
Certainly, in other embodiments of the invention, step S52 and step S53 are also commutative, be that user terminal A keeps first first to call out, then set up with second of user terminal C and call out, comprise and set up the second call communication and carry out key agreement, obtain the key second time of calling out for second.
Foregoing description only is the description to preferred embodiment of the present invention, is not any restriction to the scope of the invention, and any change, modification that the those of ordinary skill in field of the present invention is done according to above-mentioned disclosure all belong to the protection range of claims.

Claims (19)

1. the communication means of a secret telephony is characterized in that, comprising:
User terminal obtains and preserves for the sign of calling out in call establishment;
User terminal in call establishment or behind call through, converse before, obtain and preserve the key of described calling, simultaneously described sign and the Key Establishing one-to-one relationship to preserving;
User terminal utilizes the cipher key pair communication data of the sign correspondence of the calling in the communication process to carry out encryption and decryption in communication process;
User terminal is deleted sign and the key of the described calling of preserving after calling is hung up.
2. the communication means of secret telephony as claimed in claim 1 is characterized in that, described user terminal carries out two callings at least, comprising: first calls out and the second calling, and wherein, when setting up the second calling, described the first calling is set up.
3. the communication means of secret telephony as claimed in claim 1 is characterized in that, described user terminal carries out two callings at least, comprise: first calls out and the second calling, wherein, when setting up or connecting the second calling, described the first calling is in calls out in the keep-process.
4. the communication means of secret telephony as claimed in claim 2 or claim 3 is characterized in that, if described user terminal also carries out other callings, then sets up or connect second when calling out, and described other callings are in calls out in the keep-process.
5. the communication means of secret telephony as claimed in claim 2 is characterized in that, connects before described the second calling, keeps first described first to call out or hang up described the first calling.
6. such as the communication means of each the described secret telephony in the claims 1 to 3, it is characterized in that, described key comprises: be used for the encryption key of the encryption of communicated data that sends and be used for decruption key to the communication data deciphering that receives.
7. a user terminal is characterized in that, comprising:
The call manager unit is in order to call out control to several callings; And obtain the sign of each calling;
Cipher key management unit is in order to obtain the key of each calling; Preserve sign and the key of each calling, and to sign and the Key Establishing one-to-one relationship of each calling of preserving; And utilize the key of sign correspondence of each calling of described preservation that the communication data of this calling is carried out encryption and decryption;
Transmitting element is in order to send communication data;
Receiving element is in order to the received communication data.
8. user terminal as claimed in claim 7 is characterized in that, described call control packet is drawn together: call setup, call through, calling maintenance, call recovery and calling are hung up.
9. user terminal as claimed in claim 8 is characterized in that,
Described call manager unit obtains for the sign of calling out in call establishment, and described sign is transferred to described cipher key management unit, and described cipher key management unit is preserved described sign;
Described cipher key management unit in call establishment or behind call through, converse before, obtain and preserve the key of described calling, simultaneously described sign and the Key Establishing one-to-one relationship to preserving;
Described cipher key management unit utilizes the cipher key pair communication data of the sign correspondence of the calling in the communication process to carry out encryption and decryption in communication process;
Described cipher key management unit is deleted sign and the key of the described calling of preserving after calling is hung up.
10. user terminal as claimed in claim 9 is characterized in that, described cipher key management unit is utilized the cipher key pair communication data of the sign correspondence of the calling in the communication process to carry out encryption and decryption and comprised the steps: in communication process
Described call manager unit obtains the sign of the calling of connection, and described sign is transferred to described receiving element and transmitting element;
When described user terminal receives the secure communication data, comprise the steps:
Described receiving element receives the secure communication data that the other side of the calling of connecting sends, and each the secure communication data block that receives is added described sign, will be added with the secure communication transmission of data blocks of sign to cipher key management unit;
Described cipher key management unit utilize the key corresponding to described sign of its preservation that described secure communication data block is decrypted, and the communicating data block after will deciphering is transferred to described receiving element according to the sign of described secure communication data block;
The communication data of described receiving element after to described deciphering carries out subsequent treatment;
When described user terminal sends the secure communication data, comprise the steps:
Each unencryption communicating data block of the other side that described transmitting element will send to the calling of described connection adds described sign, and the unencryption communicating data block that is added with sign is transferred to cipher key management unit;
Described cipher key management unit utilize the key corresponding to described sign of its preservation that described unencryption communicating data block is encrypted, and the communicating data block after will encrypting is transferred to described transmitting element according to the sign of the described unencryption communicating data block that receives;
Described transmitting element sends the communicating data block to be sent after the described encryption.
11. user terminal as claimed in claim 9 is characterized in that, described cipher key management unit is utilized the cipher key pair communication data of the sign correspondence of the calling in the communication process to carry out encryption and decryption and is comprised the steps: in communication process
Described call manager unit obtains the sign of the calling of connection, and the key corresponding with described sign that utilizes described sign to activate to preserve in the described cipher key management unit, so that the described key current use key that is cipher key management unit, until described call manager unit carries out next time activation key operation;
When described user terminal receives the secure communication data, comprise the steps:
Described receiving element receives the secure communication data that the other side of the calling of connecting sends, and with the secure communication transfer of data that receives to cipher key management unit;
The key that described cipher key management unit is utilized current use is decrypted the secure communication data of described reception, and the communicating data block after will deciphering is transferred to described receiving element;
The communication data of described receiving element after to described deciphering carries out subsequent treatment;
When described user terminal sends the secure communication data, comprise the steps:
The other side's the unencryption communication data that described transmitting element will send to the calling of described connection is transferred to cipher key management unit;
Described cipher key management unit utilizes the key of current use that described unencryption communication data to be sent is encrypted, and the communication data after will encrypting is transferred to described transmitting element;
Described transmitting element sends the communication data to be sent after the described encryption.
12. each the described user terminal as in the claim 7 to 11 is characterized in that, described call manager unit is controlled two callings at least, comprising: first calls out and the second calling, and wherein, when setting up the second calling, described the first calling is set up.
13. user terminal as claimed in claim 12 is characterized in that, if other callings are also controlled in described call manager unit, when then setting up or connecting the second calling, described other callings are in calls out in the keep-process.
14. user terminal as claimed in claim 12 is characterized in that, described call manager unit is connected before described the second calling, keeps first described first to call out or hang up described the first calling.
15. each the described user terminal as in the claim 7 to 11 is characterized in that described call manager unit is controlled two callings at least, comprise: first calls out and the second calling, wherein, when setting up or connecting the second calling, described the first calling is in calls out in the keep-process.
16. user terminal as claimed in claim 15 is characterized in that, if other callings are also controlled in described call manager unit, when then setting up or connecting the second calling, described other callings are in calls out in the keep-process.
17. each the described user terminal as in the claim 7 to 11 is characterized in that, described key comprises: be used for the encryption key of the encryption of communicated data that sends and be used for decruption key to the communication data deciphering that receives.
18. the communication means of a secret telephony is characterized in that, comprising:
Step 10: user terminal is set up first and is called out, and obtains the key first time of calling out for first;
Step 20: described user terminal is connected described first and is called out, and utilizes described first time key to carry out secret telephony with the other side of the first calling;
Step 30: described user terminal keeps first to call out;
Step 40: described user terminal is set up second and is called out, and obtains the key second time of calling out for second;
Step 50: described user terminal is connected described second and is called out, and utilizes described second time key to carry out secret telephony with the other side of the second calling;
Step 60: described user terminal keeps second to call out;
Step 70: described user terminal carries out the first key agreement of calling out, and obtains for the third time key of calling out for first;
Step 80: described user terminal is connected described first and is called out, and utilizes described for the third time key and first the other side who calls out to carry out secret telephony.
19. the communication means of a secret telephony is characterized in that, comprising:
Step 10: user terminal is set up first and is called out, and obtains the key first time of calling out for first;
Step 20: described user terminal is connected described first and is called out, and utilizes described first time key to carry out secret telephony with the other side of the first calling;
Step 30: described user terminal is set up the second call communication;
Step 40: described user terminal keeps first to call out;
Step 50: described user terminal carries out the second key agreement of calling out, and obtains the key second time of calling out for second;
Step 60: described user terminal is connected described second and is called out, and utilizes described second time key to carry out secret telephony with the other side of the second calling;
Step 70: described user terminal keeps second to call out;
Step 80: described user terminal carries out the first key agreement of calling out, and obtains for the third time key of calling out for first;
Step 90: described user terminal is connected described first and is called out, and utilizes described for the third time key and first the other side who calls out to carry out secret telephony.
CN201110270174.6A 2011-09-13 2011-09-13 Confidential call communication method and user terminal Active CN103002439B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110270174.6A CN103002439B (en) 2011-09-13 2011-09-13 Confidential call communication method and user terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110270174.6A CN103002439B (en) 2011-09-13 2011-09-13 Confidential call communication method and user terminal

Publications (2)

Publication Number Publication Date
CN103002439A true CN103002439A (en) 2013-03-27
CN103002439B CN103002439B (en) 2015-06-17

Family

ID=47930477

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110270174.6A Active CN103002439B (en) 2011-09-13 2011-09-13 Confidential call communication method and user terminal

Country Status (1)

Country Link
CN (1) CN103002439B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104066080A (en) * 2014-06-05 2014-09-24 天地融科技股份有限公司 Data processing method of voice communication
WO2017185804A1 (en) * 2016-04-28 2017-11-02 宇龙计算机通信科技(深圳)有限公司 Encrypted call control method and terminal
CN109429192A (en) * 2017-08-29 2019-03-05 中国移动通信有限公司研究院 A kind of dial-up processing method, transceiver and computer readable storage medium
CN109561407A (en) * 2017-09-27 2019-04-02 中国移动通信有限公司研究院 A kind of call handling method and call terminal
CN109561224A (en) * 2017-09-27 2019-04-02 中国移动通信有限公司研究院 A kind of call handling method and call terminal
US10454904B2 (en) 2014-09-24 2019-10-22 Samsung Electronics Co., Ltd. Method, apparatus and system for secure data communication

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1437350A (en) * 2002-01-10 2003-08-20 阿瓦雅技术公司 Method and equipment for safety Internetwork protocol communication in call processing system
US20040098609A1 (en) * 2002-11-20 2004-05-20 Bracewell Shawn Derek Securely processing client credentials used for Web-based access to resources
CN101938725A (en) * 2010-08-30 2011-01-05 中兴通讯股份有限公司 Methods for realizing call holding and three-party service, cordless main phone and system
CN102027721A (en) * 2008-04-02 2011-04-20 特维里奥公司 System and method for processing telephony sessions

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1437350A (en) * 2002-01-10 2003-08-20 阿瓦雅技术公司 Method and equipment for safety Internetwork protocol communication in call processing system
US20040098609A1 (en) * 2002-11-20 2004-05-20 Bracewell Shawn Derek Securely processing client credentials used for Web-based access to resources
CN102027721A (en) * 2008-04-02 2011-04-20 特维里奥公司 System and method for processing telephony sessions
CN101938725A (en) * 2010-08-30 2011-01-05 中兴通讯股份有限公司 Methods for realizing call holding and three-party service, cordless main phone and system

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104066080A (en) * 2014-06-05 2014-09-24 天地融科技股份有限公司 Data processing method of voice communication
CN104066080B (en) * 2014-06-05 2017-12-08 天地融科技股份有限公司 A kind of data processing method of voice call
US10454904B2 (en) 2014-09-24 2019-10-22 Samsung Electronics Co., Ltd. Method, apparatus and system for secure data communication
WO2017185804A1 (en) * 2016-04-28 2017-11-02 宇龙计算机通信科技(深圳)有限公司 Encrypted call control method and terminal
CN107343275A (en) * 2016-04-28 2017-11-10 宇龙计算机通信科技(深圳)有限公司 Speech scrambling control method and terminal
CN109429192A (en) * 2017-08-29 2019-03-05 中国移动通信有限公司研究院 A kind of dial-up processing method, transceiver and computer readable storage medium
CN109429192B (en) * 2017-08-29 2021-07-16 中国移动通信有限公司研究院 Call call processing method, transceiving equipment and computer readable storage medium
CN109561407A (en) * 2017-09-27 2019-04-02 中国移动通信有限公司研究院 A kind of call handling method and call terminal
CN109561224A (en) * 2017-09-27 2019-04-02 中国移动通信有限公司研究院 A kind of call handling method and call terminal
CN109561224B (en) * 2017-09-27 2020-11-06 中国移动通信有限公司研究院 Call processing method and call terminal
CN109561407B (en) * 2017-09-27 2021-09-10 中国移动通信有限公司研究院 Call processing method and call terminal

Also Published As

Publication number Publication date
CN103002439B (en) 2015-06-17

Similar Documents

Publication Publication Date Title
US10397775B2 (en) Key exchange method and apparatus
CN101836470B (en) Methods and apparatuses for enabling non-access stratum (nas) security in LTE mobile units
CN103002439B (en) Confidential call communication method and user terminal
CN100466805C (en) Method for end-to-end enciphoring voice telecommunication
WO2003049357B1 (en) Lawful interception of end-to-end encrypted data traffic
IL110822A (en) Method for key management of point-to-point communications
CA2360781A1 (en) Key management for telephone calls to protect signaling and call packets between cta's
US9185092B2 (en) Confidential communication method using VPN, system thereof, program thereof, and recording medium for the program
CN114553422B (en) VoLTE voice encryption communication method, terminal and system
CN101909290A (en) Method, system and mobile terminal for encrypting voice call
CN101917711A (en) Mobile communication system and voice call encryption method thereof
CN102137393B (en) Method and device for encrypting end-to-end
WO2017063438A1 (en) Voice encryption method, system and apparatus
CN104955033A (en) Voice encryption communication method
CN115348579A (en) Voice encryption method applied to wireless earphone and encryption type wireless earphone
CN105049201A (en) Mobile equipment secret communication system based on quantum cryptography and mobile equipment secret communication method based on quantum cryptography
US20130136260A1 (en) Wcdma 3g voice communication protection method and terminal using the same
CN103634744A (en) Cluster group call end-to-end encryption realization method
CN101159988A (en) Method and system of implementing different security level voice encryption
CN100512103C (en) Secret key distributing method of end-to-end encrypted telecommunication
CN100388659C (en) Equipment, system and method for implementing encryption communication between heterogeneity network
CN107079290B (en) Encrypted call method and terminal
CN105763571A (en) SIP-based asymmetric voice encryption
CN105025476B (en) A kind of mobile encrypted communication mechanism of space-time separation
CN104955037A (en) Communication encryption method and device for GSM (global system for mobile communications) mobile phones

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20170515

Address after: 100094, No. 6 Yongjia North Road, Beijing, 5, 3, northwest side of Haidian District

Patentee after: Datang Semiconductor Design Co., Ltd.

Address before: 201203 Pudong New Area Mingyue Road, Shanghai, No. 1258

Patentee before: Leadcore Technology Co., Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20170914

Address after: 100083 No. 40, Haidian District, Beijing, Xueyuan Road

Patentee after: Datang Linktech Infosystem Co., Ltd.

Address before: 100094, No. 6 Yongjia North Road, Beijing, 5, 3, northwest side of Haidian District

Patentee before: Datang Semiconductor Design Co., Ltd.

TR01 Transfer of patent right