CN104243146A - Encryption communication method and device and terminal - Google Patents

Encryption communication method and device and terminal Download PDF

Info

Publication number
CN104243146A
CN104243146A CN201410453445.5A CN201410453445A CN104243146A CN 104243146 A CN104243146 A CN 104243146A CN 201410453445 A CN201410453445 A CN 201410453445A CN 104243146 A CN104243146 A CN 104243146A
Authority
CN
China
Prior art keywords
key
encryption
communication
pki
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410453445.5A
Other languages
Chinese (zh)
Inventor
王庆波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201410453445.5A priority Critical patent/CN104243146A/en
Publication of CN104243146A publication Critical patent/CN104243146A/en
Pending legal-status Critical Current

Links

Abstract

The invention discloses an encryption communication method and device and a terminal. The encryption communication method comprises the steps that when a side B is in communication based on a rich communication suite (RCS) mode, and after the side B receives a communication data encryption request, a secret key used for encrypting the communication data is obtained; the communication data encrypted through the secret key are sent to the side B. The secret key can be obtained without consultation of a side A and the side B, the complexity of encryption and decryption can be lowered, the flexibility of encryption and decryption is increased, and user experience is enhanced.

Description

A kind of encryption communication method, device and terminal
Technical field
The present invention relates to communication technical field, particularly relate to a kind of encryption communication method, device and terminal.
Background technology
Along with the development of speech coding technology, when voice communication, usually can be encrypted voice, ensure communication safety.
In existing voice encryption mode, normally after calling party's request of making a call, calling party and callee consult encryption policy.By a series of negotiation, the parameter produced respectively by calling party and callee, draws encryption key by certain algorithm, and this encryption key can be sent to calling party and callee respectively by short message mode, negotiations process is comparatively complicated, and the obtain manner of encryption key is more single.
Summary of the invention
Main purpose of the present invention is to provide a kind of encryption communication method, device and terminal, with the problem that ciphersuite negotiation mode in the coded communication solving prior art is comparatively complicated.
For above-mentioned technical problem, the present invention solves by the following technical programs.
The invention provides a kind of encryption communication method, in the flow process that A end performs, comprising: when communicating in converged communication RCS mode with B end group, in B termination by after encryption of communicated data request, obtain the key for encrypting described communication data; And, will the communication data after described secret key encryption be utilized, send to described B end.
Wherein, described after B termination is subject to encryption of communicated data request, obtaining the key for encrypting described communication data, comprising: after sending encryption of communicated data request to B end, if the B receiving B end feedback holds PKI, then represent that B termination is by encryption of communicated data request; Obtain the first key information and the second key information; Wherein, the first key information is the information generated after using A to hold public key encryption key, the information of the second key information for generating after key described in use B end public key encryption; B is sent to hold described second key information; If get described first key information, then utilize A to hold described first key information of private key deciphering, obtain described key.
Wherein, it is described after B termination is subject to encryption of communicated data request, obtain the key for encrypting described communication data, comprise: send to B end and carry the encryption of communicated data request that A holds PKI, so that in B termination by after encryption of communicated data request, described A holds PKI as the key of coded communication data by B end; If the B receiving B end feedback holds PKI, then represent that B termination is by encryption of communicated data request, described B holds PKI as the key of coded communication data by A end.
Present invention also offers a kind of encryption communication method, in the flow process that B end performs, comprising: when communicating in RCS mode with A end group, after accepting encryption of communicated data request, receive the enciphered data that A end sends; Wherein, described enciphered data is encrypted communication data; Utilize the key obtained in advance, decipher described enciphered data, to obtain described communication data.
Wherein, the described mode obtaining key in advance, comprising: if receive A end send do not carry A hold PKI encryption of communicated data request after, then to A end feedback B hold PKI; And, after the second key information receiving the transmission of A end, utilize described B to hold described second key information of private key deciphering, obtain described key; Wherein, the information of the second key information for generating after key described in use B end public key encryption; Or, if receive the encryption of communicated data request carrying A end PKI of A end transmission, then held by B private key as the key of the described enciphered data of deciphering.
Invention further provides a kind of encrypt communication apparatus, be arranged at A end, described device, comprise: acquisition module, for when communicating in converged communication RCS mode with B end group, in B termination by after encryption of communicated data request, obtain the key for encrypting described communication data; And encrypting module, for the communication data that will utilize after described secret key encryption, sends to described B end.
Wherein, described acquisition module is used for: after sending encryption of communicated data request to B end, if the B receiving B end feedback holds PKI, then represents that B termination is by encryption of communicated data request; Obtain the first key information and the second key information; Wherein, the first key information is the information generated after using A to hold public key encryption key, the information of the second key information for generating after key described in use B end public key encryption; B is sent to hold described second key information; If get described first key information, then utilize A to hold described first key information of private key deciphering, obtain described key.
Wherein, described acquisition module is used for: send to B end and carry the encryption of communicated data request that A holds PKI, so that in B termination by after encryption of communicated data request, described A holds PKI as the key of coded communication data by B end; If the B receiving B end feedback holds PKI, then represent that B termination is by encryption of communicated data request, described B holds PKI as the key of coded communication data by A end.
Present invention also offers a kind of encrypt communication apparatus, be arranged at B end, described device, comprising: receiver module, for when communicating in RCS mode with A end group, after accepting encryption of communicated data request, receives the enciphered data that A end sends; Wherein, described enciphered data is encrypted communication data; Deciphering module, for utilizing the key obtained in advance, deciphers described enciphered data, to obtain described communication data.
Present invention also offers a kind of terminal, described terminal comprises the encrypt communication apparatus that this case provides.
Beneficial effect of the present invention is as follows:
When based on converged communication (Rich Communication Suite is called for short RCS), mode communicates side a and b, A end can hold shared key with B, and Serial Communication of going forward side by side is encrypted.The present invention is without the need to consulting to obtain key by side a and b, and the present invention can reduce the complexity of encryption, deciphering, increases the flexibility of encryption, deciphering, strengthens Consumer's Experience effect.
Accompanying drawing explanation
Accompanying drawing described herein is used to provide a further understanding of the present invention, and form a application's part, schematic description and description of the present invention, for explaining the present invention, does not form inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart of encryption communication method according to an embodiment of the invention;
Fig. 2 is the flow chart of encryption communication method according to an embodiment of the invention;
Fig. 3 is the schematic diagram of encryption communication method according to an embodiment of the invention;
Fig. 4 is the flow chart of encryption communication method according to an embodiment of the invention;
Fig. 5 is the flow chart of encryption communication method according to another embodiment of the present invention;
Fig. 6 is the structure chart of encrypt communication apparatus according to an embodiment of the invention;
Fig. 7 is the structure chart of encrypt communication apparatus according to an embodiment of the invention.
Embodiment
Main thought of the present invention is, when side a and b communicates based on RCS mode, if A end is wished encryption of communicated data, then, when B end is agreed to, A end holds shared key with B, and is encrypted communication data.The present invention encrypts the key of use without the need to consulting to obtain by side a and b, and therefore the present invention can reduce the complexity of encryption, deciphering, increases the flexibility of encryption, deciphering, strengthens Consumer's Experience effect.
Described RCS mode is integrated with abundant communication service, and it is by by original in terminal " call ", " message " and " contact person " three communications portal, is incorporated into terminal from operator's aspect.Further, compared to existing communication mode, RCS mode adopts Internet protocol (Internet Protocol, be called for short IP) territory, between side a and b when communication, shared key, more diversified, as adopted, the modes such as voice, short message, mail communicate, shared key.
For making the object, technical solutions and advantages of the present invention clearly, below in conjunction with drawings and the specific embodiments, the present invention is described in further detail.
According to embodiments of the invention, provide a kind of encryption communication method, be applied to A end.Fig. 1 is the flow chart of encryption method according to an embodiment of the invention.
Step S110, when communicating in converged communication RCS mode with B end group, in B termination by after encryption of communicated data request, obtains the key for encrypting described communication data.
A end is for being installed on the client in terminal A; B end is for being installed on the client in terminal B.When communicating, communicating pair is communicated by client, and communication mode adopts RCS mode.
Communication data comprises voice, text, picture, video etc.
If A end is judged to need to be encrypted communication data, with ensure A end and B hold between communication security, then A end sends encryption of communicated data request to B end, participates in coded communication to invite B end.If this communication encryption request of B end response, then represent that B termination is by encryption of communicated data request.
Specifically, A end comprises A end PKI and A end private key; B end comprises B and holds PKI and B to hold private key.PKI is used for enciphered data, and private key is used for data decryption.The data of public key encryption, the private key be merely able to by this PKI is corresponding is deciphered.Such as: A holds the data of public key encryption, can only be held private key to decipher by A.This feature of PKI and private key can be utilized, between side a and b, share the key for coded communication data, and ensure the fail safe of key.
Provide the embodiment that two kinds obtain key below, but two kinds of embodiments are not intended to limit the present invention below.
Embodiment one, after sending communication encryption request to B end, if the B receiving B end feedback holds PKI (response message), then represents that B termination is by encryption of communicated data request; A holds, and obtains the first key information and the second key information.Wherein, the first key information is the information generated after using A to hold public key encryption key, the information of the second key information for generating after key described in use B end public key encryption.Concrete, can be key server generate one for encrypt or decipher described communication data key after, utilize A to hold PKI and B to hold PKI to be encrypted described key respectively and obtain the first key information and the second key information, described first key information and the second key information send to A to hold by key server.
Second key information, after getting described second key information, sends to B to hold by A end, holds the private key utilizing B to hold to be decrypted described second key information obtain described key to facilitate B; If get the first key information, then utilize A to hold private key to decipher the first key information, obtain described key, so just achieve key sharing between side a and b, and ensure that the safety of key in communication process.At side a and b, this key may be used to coded communication data and enabling decryption of encrypted communication data, and these coded communication data are encrypted communication data.Such as, at A end, this key may be used for encrypting the communication data being about to be sent to B end, also may be used for deciphering the coded communication data from B end.
Embodiment two, A is held and is sent to B end the encryption of communicated data request carrying A end PKI, so that in B termination by after encryption of communicated data request, A holds PKI to hold the key of coded communication data as B by B end; If the B that A termination receives B end feedback holds PKI, then represent that B termination is by encryption of communicated data request, at this moment, B holds PKI to hold the key of coded communication data as A by A end.Like this, its A holds PKI to share to B end by A end, and its B holds PKI to share to A end by B end; After A end utilizes B to hold public key encryption communication data transfer to B end, B end utilizes B to hold the communication data of private key enabling decryption of encrypted; B end utilizes A to hold public key encryption communication data transfer to after A end, the communication data after A end utilizes A to hold private key enabling decryption of encrypted.
Step S120, will utilize the communication data after described secret key encryption, sends to described B end.
Learning that B termination is by after encryption of communicated data request, e.g., receives the response message of B end, namely can start to be encrypted communication data, send to B to hold.
When utilizing key encrypted communication data, if communication data is voice, then according to the time interval of presetting, the voice in each time interval can be gathered in turn, voice are encrypted, and send to B to hold the voice after encryption in turn; Communication data is that the processing mode of the situation of video and voice is similar.If communication data is text, then text can be carried out entirety encryption, and send to B to hold; Communication data is that the processing mode of the situation of picture and text is similar.
Present invention also offers a kind of encryption communication method, be applied to B end.As shown in Figure 2, Fig. 2 is the flow chart of encryption communication method according to an embodiment of the invention.
Step S210, when communicating in RCS mode with A end group, after accepting encryption of communicated data request, receives the enciphered data that A end sends.Wherein, enciphered data is encrypted communication data.
Step S220, utilizes the key obtained in advance, deciphers described enciphered data, to obtain communication data.
Corresponding above-described embodiment one, if B termination receives the communication encryption request of not carrying A end PKI that A end sends, then holds PKI to A end feedback B, represents that B termination is subject to encryption of communicated data request; And, after the second key information receiving the transmission of A end, utilize B to hold private key to decipher the second key information, obtain key; Wherein, the information of the second key information for generating after key described in use B end public key encryption.In the present embodiment, side a and b uses identical key.A end uses these key encrypted communication data, obtains enciphered data, and B end uses this enciphered data of this secret key decryption, obtains communication data.
Corresponding above-described embodiment two, if the encryption of communicated data request carrying A end PKI receiving the transmission of A end, then holds private key as the key of the described enciphered data of deciphering using B.
A end sends to B end and carries the encryption of communicated data request that A holds PKI, so that in B termination by after encryption of communicated data request, A holds PKI to hold the key of coded communication data as B by B end; If the B that A termination receives B end feedback holds PKI, then represent that B termination is by encryption of communicated data request, at this moment, B holds PKI to hold the key of coded communication data as A by A end.Like this, its A holds PKI to share to B end by A end, and its B holds PKI to share to A end by B end; After A end utilizes B to hold public key encryption communication data transfer to B end, B end utilizes B to hold the communication data of private key enabling decryption of encrypted; B end utilizes A to hold public key encryption communication data transfer to after A end, the communication data after A end utilizes A to hold private key enabling decryption of encrypted.
Below based on the schematic diagram of the encryption communication method shown in Fig. 3, above-described embodiment one and embodiment two are described in detail.
Embodiment one and embodiment two, based on LTE network, terminal A and terminal B is by RCS client communication process, key is sent by the mode shared, and carry out voice encryption and decryption processing in real time, dynamically, and when hope terminates voice encryption, normal voice call can be turned back to.
Fig. 4 is the flow chart of encryption communication method according to an embodiment of the invention.The corresponding embodiment one of this embodiment.
Step S410, terminal A and terminal B are conversed by RCS client.
Step S420, in communication process, terminal A wishes to be encrypted call with terminal B, terminal A initiating communication CIPHERING REQUEST.
After the RCS client of step S430, terminal B receives communication encryption request, response terminal A, determines to accept this communication encryption request.
Step S440, terminal A receive the response message of terminal B.The B carrying terminal B in this response message holds PKI.
Step S450, terminal A and Key Management server carry out alternately, obtain key from Key Management server.
The A of terminal A, with in Key Management server reciprocal process, holds the B of PKI and terminal B to hold PKI to send to Key Management server by terminal A.In addition, the information of the information of terminal A and terminal B can also be sent to Key Management server by terminal A, by Key Management server to terminal A and terminal B authentication.Terminal A and Key Management server be not limited to RCS mode alternately, can also be HTML (Hypertext Markup Language) (Hypertext transfer protocol, be called for short HTTP), the mode such as note service system (Short Message Service, be called for short SMS).
Key Management server generates a key, forms the first key information after utilizing A to hold this key of public key encryption, forms the second key information, the first key information and the second key information are returned terminal A after utilizing B to hold this key of public key encryption.
Step S460, terminal A pass through RCS mode in communication process, by Authentication theory to terminal B.Specifically, the second key information is sent to terminal B by terminal A.
Step S470, terminal B receive response terminal A after key, represent and receive key.
Step S480, terminal A and terminal B carry out voice encrypted word.
Terminal A utilizes A to hold private key to decipher the first key information, obtains key, and utilizes this double secret key voice call to encrypt and decrypt.
Terminal B utilizes B to hold private key to decipher the second key information, obtains key, and utilizes this double secret key voice call to encrypt and decrypt.
In one embodiment, terminal A can generate key, at this moment, terminal A then without the need to mutual with Key Management server, to obtain key.During the communication encryption request of terminal B response terminal A, carry B and hold PKI; After terminal A generates key, terminal A utilizes B to hold this key of public key encryption, forms the second key information, this second key information is sent to terminal B, and terminal B uses B to hold private key to decipher the second key information, obtains this key.
Fig. 5 is encryption communication method flow chart according to another embodiment of the present invention.The corresponding embodiment two of this embodiment.
Step S510, terminal A and terminal B are conversed by RCS client.
Step S520, in communication process, terminal A wishes to be encrypted call with terminal B, terminal A initiating communication CIPHERING REQUEST.In this communication encryption request, the A of carried terminal A holds PKI.
After the RCS client of step S530, terminal B receives communication encryption request, response terminal A, determines to accept this communication encryption request.
Step S540, terminal A receive the response message of terminal B.The B carrying terminal B in this response message holds PKI.
Step S550, terminal A and terminal B carry out voice encrypted word.
Terminal A utilizes B to hold PKI to be encrypted voice call, utilizes A to hold private key to be decrypted voice call.
Terminal B utilizes A to hold PKI to be encrypted voice call, utilizes B to hold private key to be decrypted voice call.
The mode of the present embodiment shared key is that RCS shares, and in the process, terminal B does not need to carry out key acquisition by Key Management server, is convenient to terminal A and is encrypted control and Authentication theory.
If communication process is group call, then in the present embodiment, the quantity of terminal A is one, and the quantity of terminal B is multiple.Terminal A is identical with the process of each terminal B shared key, is all suitable for above-mentioned encryption flow, and after multiple terminal B accepts communication encryption request, terminal A and multiple terminal B starts encryption of communicated data.If any terminal wishes that stopping is to encryption of communicated data in group, then can send encryption to other-end and stop request, all accept after this encryption termination request until other-end, the multiple terminals in group all stop coded communication data.
The invention provides a kind of encrypt communication apparatus, as shown in Figure 6, Fig. 6 is the structure chart of encrypt communication apparatus according to an embodiment of the invention.
This encrypt communication apparatus comprises:
Acquisition module 610, for when communicating in converged communication RCS mode with B end group, in B termination by after encryption of communicated data request, obtains the key for encrypting described communication data.
In one embodiment, acquisition module 610 for: after sending communication encryption request to B end, if the B receiving B end feedback holds PKI, then represent that B termination is by encryption of communicated data request; Obtain the first key information and the second key information; Wherein, the information of the first key information for generating after key described in use A end public key encryption, the information of the second key information for generating after key described in use B end public key encryption.Concrete, can be key server generate one for encrypt or decipher described communication data key after, utilize A to hold PKI and B to hold PKI to be encrypted described key respectively and obtain the first key information and the second key information, acquisition module 610 obtains described first key information and the second key information from key server.。
Second key information, after getting described second key information, sends to B to hold by acquisition module 610, holds the private key utilizing B to hold to be decrypted described second key information obtain described key to facilitate B; If get the first key information, then utilize A to hold private key to decipher the first key information, obtain described key, so just achieve key sharing between side a and b, and ensure that the safety of key in communication process.At side a and b, this key may be used to coded communication data, enabling decryption of encrypted communication data, and these coded communication data are encrypted communication data.Such as, at A end, this key may be used for encrypting the communication data being about to be sent to B end, also may be used for deciphering the coded communication data from B end
In another embodiment, acquisition module 610 for: send to B end and carry A and hold the encryption of communicated data request of PKI, so that in B termination by after encryption of communicated data request, described A holds PKI as the key of coded communication data by B end; If the B receiving B end feedback holds PKI, then represent that B termination is by encryption of communicated data request, described B holds PKI as the key of coded communication data by A end.
Encrypting module 620, for the communication data that will utilize after described secret key encryption, sends to described B end.
The function of the encryption device described in the present embodiment is described in the embodiment of the method shown in Fig. 1,3,4,5, therefore not detailed part in the description of the present embodiment, see the related description in previous embodiment, can not repeat at this.
The invention provides a kind of encrypt communication apparatus, be arranged at B end, as shown in Figure 7, Fig. 7 is the structure chart of encrypt communication apparatus according to an embodiment of the invention.
This encrypt communication apparatus comprises:
Receiver module 710, for when communicating in RCS mode with A end group, after accepting encryption of communicated data request, receives the enciphered data that A end sends; Wherein, described enciphered data is encrypted communication data.
Deciphering module 720, for utilizing the key obtained in advance, deciphers described enciphered data, to obtain described communication data.
In one embodiment, deciphering module 720, if for receiving the communication encryption request of not carrying A end PKI that A end sends, then hold PKI to A end feedback B, represent that B termination is subject to encryption of communicated data request; And, after the second key information receiving the transmission of A end, utilize described B to hold described second key information of private key deciphering, obtain described key; Wherein, the information of the second key information for generating after key described in use B end public key encryption.
In another embodiment, deciphering module 720, if for receiving the encryption of communicated data request carrying A end PKI that A end sends, then hold private key as the key of the described enciphered data of deciphering using B.
The function of the decryption device described in the present embodiment is described in the embodiment of the method shown in Fig. 2,3,4,5, therefore not detailed part in the description of the present embodiment, see the related description in previous embodiment, can not repeat at this.
Present invention also offers a kind of terminal, described terminal comprises encrypt communication apparatus provided by the invention.
The foregoing is only embodiments of the invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within right of the present invention.

Claims (10)

1. an encryption communication method, is characterized in that, in the flow process that A end performs, comprising:
When communicating in converged communication RCS mode with B end group, in B termination by after encryption of communicated data request, obtain the key for encrypting described communication data; And,
To the communication data after described secret key encryption be utilized, send to described B end.
2. encryption method according to claim 1, is characterized in that, described after B termination is subject to encryption of communicated data request, obtaining the key for encrypting described communication data, comprising:
After sending encryption of communicated data request to B end, if the B receiving B end feedback holds PKI, then represent that B termination is by encryption of communicated data request;
Obtain the first key information and the second key information; Wherein, the first key information is the information generated after using A to hold public key encryption key, the information of the second key information for generating after key described in use B end public key encryption;
B is sent to hold described second key information;
If get described first key information, then utilize A to hold described first key information of private key deciphering, obtain described key.
3. encryption method according to claim 1, is characterized in that, described after B termination is subject to encryption of communicated data request, obtaining the key for encrypting described communication data, comprising:
Send to B end and carry the encryption of communicated data request that A holds PKI, so that in B termination by after encryption of communicated data request, described A holds PKI as the key of coded communication data by B end;
If the B receiving B end feedback holds PKI, then represent that B termination is by encryption of communicated data request, described B holds PKI as the key of coded communication data by A end.
4. an encryption communication method, is characterized in that, in the flow process that B end performs, comprising:
When communicating in RCS mode with A end group, after accepting encryption of communicated data request, receive the enciphered data that A end sends; Wherein, described enciphered data is encrypted communication data;
Utilize the key obtained in advance, decipher described enciphered data, to obtain described communication data.
5. method according to claim 4, is characterized in that, the described mode obtaining key in advance, comprising:
If receive A end send do not carry A hold PKI encryption of communicated data request after, then to A end feedback B hold PKI;
And, after the second key information receiving the transmission of A end, utilize described B to hold described second key information of private key deciphering, obtain key; Wherein, the information of the second key information for generating after key described in use B end public key encryption;
Or,
If receive the encryption of communicated data request carrying A end PKI that A end sends, then held by B private key as the key of the described enciphered data of deciphering.
6. an encrypt communication apparatus, is characterized in that, be arranged at A end, described device, comprising:
Acquisition module, for when communicating in converged communication RCS mode with B end group, in B termination by after encryption of communicated data request, obtains the key for encrypting described communication data; And,
Encrypting module, for the communication data that will utilize after described secret key encryption, sends to described B end.
7. encrypt communication apparatus according to claim 6, is characterized in that, described acquisition module is used for:
After sending encryption of communicated data request to B end, if the B receiving B end feedback holds PKI, then represent that B termination is by encryption of communicated data request;
Obtain the first key information and the second key information; Wherein, the first key information is the information generated after using A to hold public key encryption key, the information of the second key information for generating after key described in use B end public key encryption;
B is sent to hold described second key information;
If get described first key information, then utilize A to hold described first key information of private key deciphering, obtain described key.
8. encryption device according to claim 6, is characterized in that, described acquisition module is used for:
Send to B end and carry the encryption of communicated data request that A holds PKI, so that in B termination by after encryption of communicated data request, described A holds PKI as the key of coded communication data by B end;
If the B receiving B end feedback holds PKI, then represent that B termination is by encryption of communicated data request, described B holds PKI as the key of coded communication data by A end.
9. an encrypt communication apparatus, is characterized in that, be arranged at B end, described device, comprising:
Receiver module, for when communicating in RCS mode with A end group, after accepting encryption of communicated data request, receives the enciphered data that A end sends; Wherein, described enciphered data is encrypted communication data;
Deciphering module, for utilizing the key obtained in advance, deciphers described enciphered data, to obtain described communication data.
10. a terminal, is characterized in that, described terminal comprises the encrypt communication apparatus described in any one of claim 6-9.
CN201410453445.5A 2014-09-05 2014-09-05 Encryption communication method and device and terminal Pending CN104243146A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410453445.5A CN104243146A (en) 2014-09-05 2014-09-05 Encryption communication method and device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410453445.5A CN104243146A (en) 2014-09-05 2014-09-05 Encryption communication method and device and terminal

Publications (1)

Publication Number Publication Date
CN104243146A true CN104243146A (en) 2014-12-24

Family

ID=52230558

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410453445.5A Pending CN104243146A (en) 2014-09-05 2014-09-05 Encryption communication method and device and terminal

Country Status (1)

Country Link
CN (1) CN104243146A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017063438A1 (en) * 2015-10-15 2017-04-20 中兴通讯股份有限公司 Voice encryption method, system and apparatus
CN106790255A (en) * 2017-01-24 2017-05-31 北京元心科技有限公司 End to end security communication means and system
CN108259486A (en) * 2018-01-10 2018-07-06 芯盾网安(北京)科技发展有限公司 End-to-end key exchange method based on certificate
CN108270717A (en) * 2016-12-30 2018-07-10 杭州华为企业通信技术有限公司 VoIP communication means, equipment and communication system
WO2019205932A1 (en) * 2018-04-26 2019-10-31 中兴通讯股份有限公司 Method, apparatus, and system for transmitting client service
CN113300999A (en) * 2020-02-21 2021-08-24 北京沃东天骏信息技术有限公司 Information processing method, electronic device, and readable storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101867898A (en) * 2010-07-02 2010-10-20 中国电信股份有限公司 Short message encrypting communication system, method and secret key center
CN103095704A (en) * 2013-01-15 2013-05-08 杭州华三通信技术有限公司 Trusted medium online validation method and device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101867898A (en) * 2010-07-02 2010-10-20 中国电信股份有限公司 Short message encrypting communication system, method and secret key center
CN103095704A (en) * 2013-01-15 2013-05-08 杭州华三通信技术有限公司 Trusted medium online validation method and device

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017063438A1 (en) * 2015-10-15 2017-04-20 中兴通讯股份有限公司 Voice encryption method, system and apparatus
CN108270717A (en) * 2016-12-30 2018-07-10 杭州华为企业通信技术有限公司 VoIP communication means, equipment and communication system
CN106790255A (en) * 2017-01-24 2017-05-31 北京元心科技有限公司 End to end security communication means and system
CN108259486A (en) * 2018-01-10 2018-07-06 芯盾网安(北京)科技发展有限公司 End-to-end key exchange method based on certificate
WO2019205932A1 (en) * 2018-04-26 2019-10-31 中兴通讯股份有限公司 Method, apparatus, and system for transmitting client service
CN113300999A (en) * 2020-02-21 2021-08-24 北京沃东天骏信息技术有限公司 Information processing method, electronic device, and readable storage medium
CN113300999B (en) * 2020-02-21 2023-12-05 北京沃东天骏信息技术有限公司 Information processing method, electronic device, and readable storage medium

Similar Documents

Publication Publication Date Title
US9668230B2 (en) Security integration between a wireless and a wired network using a wireless gateway proxy
EP2713546A1 (en) Method and device for data transmission
CN104243146A (en) Encryption communication method and device and terminal
CN103428221A (en) Safety logging method, system and device of mobile application
CN104683291B (en) Session key negotiation method based on IMS system
CN104486077A (en) End-to-end secret key negotiation method for VoIP (Voice Over Internet Protocol) real-time data safety transmission
CN101997679A (en) Encrypted message negotiation method, equipment and network system
CN113630407B (en) Method and system for enhancing transmission security of MQTT protocol by using symmetric cryptographic technology
CN113612605A (en) Method, system and equipment for enhancing MQTT protocol identity authentication by using symmetric cryptographic technology
CN104253801B (en) Realize the methods, devices and systems of login authentication
CN104683304A (en) Processing method, equipment and system of secure communication service
CN103391292A (en) Mobile-application-oriented safe login method, system and device
CN105337740A (en) Identity verification method, client, relay device and server
CN106936788A (en) A kind of cryptographic key distribution method suitable for VOIP voice encryptions
CN105376261A (en) Encryption method and system for instant communication message
CN114338618A (en) Multi-party call method, system, conference server and electronic equipment
CN103795966A (en) Method and system for realizing safe video call based on digital certificate
CN103973543B (en) Instant communicating method and device
CN111064738B (en) TLS (transport layer Security) secure communication method and system
CN108206738B (en) Quantum key output method and system
CN105049201A (en) Mobile equipment secret communication system based on quantum cryptography and mobile equipment secret communication method based on quantum cryptography
CN107294968A (en) The monitoring method and system of a kind of audio, video data
WO2017197968A1 (en) Data transmission method and device
CN109194905B (en) Video conference connection encryption and establishment method, terminal, server and system
CN109120408A (en) For authenticating the methods, devices and systems of user identity

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20141224

RJ01 Rejection of invention patent application after publication