CN104243146A - Encryption communication method and device and terminal - Google Patents
Encryption communication method and device and terminal Download PDFInfo
- Publication number
- CN104243146A CN104243146A CN201410453445.5A CN201410453445A CN104243146A CN 104243146 A CN104243146 A CN 104243146A CN 201410453445 A CN201410453445 A CN 201410453445A CN 104243146 A CN104243146 A CN 104243146A
- Authority
- CN
- China
- Prior art keywords
- key
- encryption
- communication
- pki
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The invention discloses an encryption communication method and device and a terminal. The encryption communication method comprises the steps that when a side B is in communication based on a rich communication suite (RCS) mode, and after the side B receives a communication data encryption request, a secret key used for encrypting the communication data is obtained; the communication data encrypted through the secret key are sent to the side B. The secret key can be obtained without consultation of a side A and the side B, the complexity of encryption and decryption can be lowered, the flexibility of encryption and decryption is increased, and user experience is enhanced.
Description
Technical field
The present invention relates to communication technical field, particularly relate to a kind of encryption communication method, device and terminal.
Background technology
Along with the development of speech coding technology, when voice communication, usually can be encrypted voice, ensure communication safety.
In existing voice encryption mode, normally after calling party's request of making a call, calling party and callee consult encryption policy.By a series of negotiation, the parameter produced respectively by calling party and callee, draws encryption key by certain algorithm, and this encryption key can be sent to calling party and callee respectively by short message mode, negotiations process is comparatively complicated, and the obtain manner of encryption key is more single.
Summary of the invention
Main purpose of the present invention is to provide a kind of encryption communication method, device and terminal, with the problem that ciphersuite negotiation mode in the coded communication solving prior art is comparatively complicated.
For above-mentioned technical problem, the present invention solves by the following technical programs.
The invention provides a kind of encryption communication method, in the flow process that A end performs, comprising: when communicating in converged communication RCS mode with B end group, in B termination by after encryption of communicated data request, obtain the key for encrypting described communication data; And, will the communication data after described secret key encryption be utilized, send to described B end.
Wherein, described after B termination is subject to encryption of communicated data request, obtaining the key for encrypting described communication data, comprising: after sending encryption of communicated data request to B end, if the B receiving B end feedback holds PKI, then represent that B termination is by encryption of communicated data request; Obtain the first key information and the second key information; Wherein, the first key information is the information generated after using A to hold public key encryption key, the information of the second key information for generating after key described in use B end public key encryption; B is sent to hold described second key information; If get described first key information, then utilize A to hold described first key information of private key deciphering, obtain described key.
Wherein, it is described after B termination is subject to encryption of communicated data request, obtain the key for encrypting described communication data, comprise: send to B end and carry the encryption of communicated data request that A holds PKI, so that in B termination by after encryption of communicated data request, described A holds PKI as the key of coded communication data by B end; If the B receiving B end feedback holds PKI, then represent that B termination is by encryption of communicated data request, described B holds PKI as the key of coded communication data by A end.
Present invention also offers a kind of encryption communication method, in the flow process that B end performs, comprising: when communicating in RCS mode with A end group, after accepting encryption of communicated data request, receive the enciphered data that A end sends; Wherein, described enciphered data is encrypted communication data; Utilize the key obtained in advance, decipher described enciphered data, to obtain described communication data.
Wherein, the described mode obtaining key in advance, comprising: if receive A end send do not carry A hold PKI encryption of communicated data request after, then to A end feedback B hold PKI; And, after the second key information receiving the transmission of A end, utilize described B to hold described second key information of private key deciphering, obtain described key; Wherein, the information of the second key information for generating after key described in use B end public key encryption; Or, if receive the encryption of communicated data request carrying A end PKI of A end transmission, then held by B private key as the key of the described enciphered data of deciphering.
Invention further provides a kind of encrypt communication apparatus, be arranged at A end, described device, comprise: acquisition module, for when communicating in converged communication RCS mode with B end group, in B termination by after encryption of communicated data request, obtain the key for encrypting described communication data; And encrypting module, for the communication data that will utilize after described secret key encryption, sends to described B end.
Wherein, described acquisition module is used for: after sending encryption of communicated data request to B end, if the B receiving B end feedback holds PKI, then represents that B termination is by encryption of communicated data request; Obtain the first key information and the second key information; Wherein, the first key information is the information generated after using A to hold public key encryption key, the information of the second key information for generating after key described in use B end public key encryption; B is sent to hold described second key information; If get described first key information, then utilize A to hold described first key information of private key deciphering, obtain described key.
Wherein, described acquisition module is used for: send to B end and carry the encryption of communicated data request that A holds PKI, so that in B termination by after encryption of communicated data request, described A holds PKI as the key of coded communication data by B end; If the B receiving B end feedback holds PKI, then represent that B termination is by encryption of communicated data request, described B holds PKI as the key of coded communication data by A end.
Present invention also offers a kind of encrypt communication apparatus, be arranged at B end, described device, comprising: receiver module, for when communicating in RCS mode with A end group, after accepting encryption of communicated data request, receives the enciphered data that A end sends; Wherein, described enciphered data is encrypted communication data; Deciphering module, for utilizing the key obtained in advance, deciphers described enciphered data, to obtain described communication data.
Present invention also offers a kind of terminal, described terminal comprises the encrypt communication apparatus that this case provides.
Beneficial effect of the present invention is as follows:
When based on converged communication (Rich Communication Suite is called for short RCS), mode communicates side a and b, A end can hold shared key with B, and Serial Communication of going forward side by side is encrypted.The present invention is without the need to consulting to obtain key by side a and b, and the present invention can reduce the complexity of encryption, deciphering, increases the flexibility of encryption, deciphering, strengthens Consumer's Experience effect.
Accompanying drawing explanation
Accompanying drawing described herein is used to provide a further understanding of the present invention, and form a application's part, schematic description and description of the present invention, for explaining the present invention, does not form inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart of encryption communication method according to an embodiment of the invention;
Fig. 2 is the flow chart of encryption communication method according to an embodiment of the invention;
Fig. 3 is the schematic diagram of encryption communication method according to an embodiment of the invention;
Fig. 4 is the flow chart of encryption communication method according to an embodiment of the invention;
Fig. 5 is the flow chart of encryption communication method according to another embodiment of the present invention;
Fig. 6 is the structure chart of encrypt communication apparatus according to an embodiment of the invention;
Fig. 7 is the structure chart of encrypt communication apparatus according to an embodiment of the invention.
Embodiment
Main thought of the present invention is, when side a and b communicates based on RCS mode, if A end is wished encryption of communicated data, then, when B end is agreed to, A end holds shared key with B, and is encrypted communication data.The present invention encrypts the key of use without the need to consulting to obtain by side a and b, and therefore the present invention can reduce the complexity of encryption, deciphering, increases the flexibility of encryption, deciphering, strengthens Consumer's Experience effect.
Described RCS mode is integrated with abundant communication service, and it is by by original in terminal " call ", " message " and " contact person " three communications portal, is incorporated into terminal from operator's aspect.Further, compared to existing communication mode, RCS mode adopts Internet protocol (Internet Protocol, be called for short IP) territory, between side a and b when communication, shared key, more diversified, as adopted, the modes such as voice, short message, mail communicate, shared key.
For making the object, technical solutions and advantages of the present invention clearly, below in conjunction with drawings and the specific embodiments, the present invention is described in further detail.
According to embodiments of the invention, provide a kind of encryption communication method, be applied to A end.Fig. 1 is the flow chart of encryption method according to an embodiment of the invention.
Step S110, when communicating in converged communication RCS mode with B end group, in B termination by after encryption of communicated data request, obtains the key for encrypting described communication data.
A end is for being installed on the client in terminal A; B end is for being installed on the client in terminal B.When communicating, communicating pair is communicated by client, and communication mode adopts RCS mode.
Communication data comprises voice, text, picture, video etc.
If A end is judged to need to be encrypted communication data, with ensure A end and B hold between communication security, then A end sends encryption of communicated data request to B end, participates in coded communication to invite B end.If this communication encryption request of B end response, then represent that B termination is by encryption of communicated data request.
Specifically, A end comprises A end PKI and A end private key; B end comprises B and holds PKI and B to hold private key.PKI is used for enciphered data, and private key is used for data decryption.The data of public key encryption, the private key be merely able to by this PKI is corresponding is deciphered.Such as: A holds the data of public key encryption, can only be held private key to decipher by A.This feature of PKI and private key can be utilized, between side a and b, share the key for coded communication data, and ensure the fail safe of key.
Provide the embodiment that two kinds obtain key below, but two kinds of embodiments are not intended to limit the present invention below.
Embodiment one, after sending communication encryption request to B end, if the B receiving B end feedback holds PKI (response message), then represents that B termination is by encryption of communicated data request; A holds, and obtains the first key information and the second key information.Wherein, the first key information is the information generated after using A to hold public key encryption key, the information of the second key information for generating after key described in use B end public key encryption.Concrete, can be key server generate one for encrypt or decipher described communication data key after, utilize A to hold PKI and B to hold PKI to be encrypted described key respectively and obtain the first key information and the second key information, described first key information and the second key information send to A to hold by key server.
Second key information, after getting described second key information, sends to B to hold by A end, holds the private key utilizing B to hold to be decrypted described second key information obtain described key to facilitate B; If get the first key information, then utilize A to hold private key to decipher the first key information, obtain described key, so just achieve key sharing between side a and b, and ensure that the safety of key in communication process.At side a and b, this key may be used to coded communication data and enabling decryption of encrypted communication data, and these coded communication data are encrypted communication data.Such as, at A end, this key may be used for encrypting the communication data being about to be sent to B end, also may be used for deciphering the coded communication data from B end.
Embodiment two, A is held and is sent to B end the encryption of communicated data request carrying A end PKI, so that in B termination by after encryption of communicated data request, A holds PKI to hold the key of coded communication data as B by B end; If the B that A termination receives B end feedback holds PKI, then represent that B termination is by encryption of communicated data request, at this moment, B holds PKI to hold the key of coded communication data as A by A end.Like this, its A holds PKI to share to B end by A end, and its B holds PKI to share to A end by B end; After A end utilizes B to hold public key encryption communication data transfer to B end, B end utilizes B to hold the communication data of private key enabling decryption of encrypted; B end utilizes A to hold public key encryption communication data transfer to after A end, the communication data after A end utilizes A to hold private key enabling decryption of encrypted.
Step S120, will utilize the communication data after described secret key encryption, sends to described B end.
Learning that B termination is by after encryption of communicated data request, e.g., receives the response message of B end, namely can start to be encrypted communication data, send to B to hold.
When utilizing key encrypted communication data, if communication data is voice, then according to the time interval of presetting, the voice in each time interval can be gathered in turn, voice are encrypted, and send to B to hold the voice after encryption in turn; Communication data is that the processing mode of the situation of video and voice is similar.If communication data is text, then text can be carried out entirety encryption, and send to B to hold; Communication data is that the processing mode of the situation of picture and text is similar.
Present invention also offers a kind of encryption communication method, be applied to B end.As shown in Figure 2, Fig. 2 is the flow chart of encryption communication method according to an embodiment of the invention.
Step S210, when communicating in RCS mode with A end group, after accepting encryption of communicated data request, receives the enciphered data that A end sends.Wherein, enciphered data is encrypted communication data.
Step S220, utilizes the key obtained in advance, deciphers described enciphered data, to obtain communication data.
Corresponding above-described embodiment one, if B termination receives the communication encryption request of not carrying A end PKI that A end sends, then holds PKI to A end feedback B, represents that B termination is subject to encryption of communicated data request; And, after the second key information receiving the transmission of A end, utilize B to hold private key to decipher the second key information, obtain key; Wherein, the information of the second key information for generating after key described in use B end public key encryption.In the present embodiment, side a and b uses identical key.A end uses these key encrypted communication data, obtains enciphered data, and B end uses this enciphered data of this secret key decryption, obtains communication data.
Corresponding above-described embodiment two, if the encryption of communicated data request carrying A end PKI receiving the transmission of A end, then holds private key as the key of the described enciphered data of deciphering using B.
A end sends to B end and carries the encryption of communicated data request that A holds PKI, so that in B termination by after encryption of communicated data request, A holds PKI to hold the key of coded communication data as B by B end; If the B that A termination receives B end feedback holds PKI, then represent that B termination is by encryption of communicated data request, at this moment, B holds PKI to hold the key of coded communication data as A by A end.Like this, its A holds PKI to share to B end by A end, and its B holds PKI to share to A end by B end; After A end utilizes B to hold public key encryption communication data transfer to B end, B end utilizes B to hold the communication data of private key enabling decryption of encrypted; B end utilizes A to hold public key encryption communication data transfer to after A end, the communication data after A end utilizes A to hold private key enabling decryption of encrypted.
Below based on the schematic diagram of the encryption communication method shown in Fig. 3, above-described embodiment one and embodiment two are described in detail.
Embodiment one and embodiment two, based on LTE network, terminal A and terminal B is by RCS client communication process, key is sent by the mode shared, and carry out voice encryption and decryption processing in real time, dynamically, and when hope terminates voice encryption, normal voice call can be turned back to.
Fig. 4 is the flow chart of encryption communication method according to an embodiment of the invention.The corresponding embodiment one of this embodiment.
Step S410, terminal A and terminal B are conversed by RCS client.
Step S420, in communication process, terminal A wishes to be encrypted call with terminal B, terminal A initiating communication CIPHERING REQUEST.
After the RCS client of step S430, terminal B receives communication encryption request, response terminal A, determines to accept this communication encryption request.
Step S440, terminal A receive the response message of terminal B.The B carrying terminal B in this response message holds PKI.
Step S450, terminal A and Key Management server carry out alternately, obtain key from Key Management server.
The A of terminal A, with in Key Management server reciprocal process, holds the B of PKI and terminal B to hold PKI to send to Key Management server by terminal A.In addition, the information of the information of terminal A and terminal B can also be sent to Key Management server by terminal A, by Key Management server to terminal A and terminal B authentication.Terminal A and Key Management server be not limited to RCS mode alternately, can also be HTML (Hypertext Markup Language) (Hypertext transfer protocol, be called for short HTTP), the mode such as note service system (Short Message Service, be called for short SMS).
Key Management server generates a key, forms the first key information after utilizing A to hold this key of public key encryption, forms the second key information, the first key information and the second key information are returned terminal A after utilizing B to hold this key of public key encryption.
Step S460, terminal A pass through RCS mode in communication process, by Authentication theory to terminal B.Specifically, the second key information is sent to terminal B by terminal A.
Step S470, terminal B receive response terminal A after key, represent and receive key.
Step S480, terminal A and terminal B carry out voice encrypted word.
Terminal A utilizes A to hold private key to decipher the first key information, obtains key, and utilizes this double secret key voice call to encrypt and decrypt.
Terminal B utilizes B to hold private key to decipher the second key information, obtains key, and utilizes this double secret key voice call to encrypt and decrypt.
In one embodiment, terminal A can generate key, at this moment, terminal A then without the need to mutual with Key Management server, to obtain key.During the communication encryption request of terminal B response terminal A, carry B and hold PKI; After terminal A generates key, terminal A utilizes B to hold this key of public key encryption, forms the second key information, this second key information is sent to terminal B, and terminal B uses B to hold private key to decipher the second key information, obtains this key.
Fig. 5 is encryption communication method flow chart according to another embodiment of the present invention.The corresponding embodiment two of this embodiment.
Step S510, terminal A and terminal B are conversed by RCS client.
Step S520, in communication process, terminal A wishes to be encrypted call with terminal B, terminal A initiating communication CIPHERING REQUEST.In this communication encryption request, the A of carried terminal A holds PKI.
After the RCS client of step S530, terminal B receives communication encryption request, response terminal A, determines to accept this communication encryption request.
Step S540, terminal A receive the response message of terminal B.The B carrying terminal B in this response message holds PKI.
Step S550, terminal A and terminal B carry out voice encrypted word.
Terminal A utilizes B to hold PKI to be encrypted voice call, utilizes A to hold private key to be decrypted voice call.
Terminal B utilizes A to hold PKI to be encrypted voice call, utilizes B to hold private key to be decrypted voice call.
The mode of the present embodiment shared key is that RCS shares, and in the process, terminal B does not need to carry out key acquisition by Key Management server, is convenient to terminal A and is encrypted control and Authentication theory.
If communication process is group call, then in the present embodiment, the quantity of terminal A is one, and the quantity of terminal B is multiple.Terminal A is identical with the process of each terminal B shared key, is all suitable for above-mentioned encryption flow, and after multiple terminal B accepts communication encryption request, terminal A and multiple terminal B starts encryption of communicated data.If any terminal wishes that stopping is to encryption of communicated data in group, then can send encryption to other-end and stop request, all accept after this encryption termination request until other-end, the multiple terminals in group all stop coded communication data.
The invention provides a kind of encrypt communication apparatus, as shown in Figure 6, Fig. 6 is the structure chart of encrypt communication apparatus according to an embodiment of the invention.
This encrypt communication apparatus comprises:
Acquisition module 610, for when communicating in converged communication RCS mode with B end group, in B termination by after encryption of communicated data request, obtains the key for encrypting described communication data.
In one embodiment, acquisition module 610 for: after sending communication encryption request to B end, if the B receiving B end feedback holds PKI, then represent that B termination is by encryption of communicated data request; Obtain the first key information and the second key information; Wherein, the information of the first key information for generating after key described in use A end public key encryption, the information of the second key information for generating after key described in use B end public key encryption.Concrete, can be key server generate one for encrypt or decipher described communication data key after, utilize A to hold PKI and B to hold PKI to be encrypted described key respectively and obtain the first key information and the second key information, acquisition module 610 obtains described first key information and the second key information from key server.。
Second key information, after getting described second key information, sends to B to hold by acquisition module 610, holds the private key utilizing B to hold to be decrypted described second key information obtain described key to facilitate B; If get the first key information, then utilize A to hold private key to decipher the first key information, obtain described key, so just achieve key sharing between side a and b, and ensure that the safety of key in communication process.At side a and b, this key may be used to coded communication data, enabling decryption of encrypted communication data, and these coded communication data are encrypted communication data.Such as, at A end, this key may be used for encrypting the communication data being about to be sent to B end, also may be used for deciphering the coded communication data from B end
In another embodiment, acquisition module 610 for: send to B end and carry A and hold the encryption of communicated data request of PKI, so that in B termination by after encryption of communicated data request, described A holds PKI as the key of coded communication data by B end; If the B receiving B end feedback holds PKI, then represent that B termination is by encryption of communicated data request, described B holds PKI as the key of coded communication data by A end.
Encrypting module 620, for the communication data that will utilize after described secret key encryption, sends to described B end.
The function of the encryption device described in the present embodiment is described in the embodiment of the method shown in Fig. 1,3,4,5, therefore not detailed part in the description of the present embodiment, see the related description in previous embodiment, can not repeat at this.
The invention provides a kind of encrypt communication apparatus, be arranged at B end, as shown in Figure 7, Fig. 7 is the structure chart of encrypt communication apparatus according to an embodiment of the invention.
This encrypt communication apparatus comprises:
Receiver module 710, for when communicating in RCS mode with A end group, after accepting encryption of communicated data request, receives the enciphered data that A end sends; Wherein, described enciphered data is encrypted communication data.
Deciphering module 720, for utilizing the key obtained in advance, deciphers described enciphered data, to obtain described communication data.
In one embodiment, deciphering module 720, if for receiving the communication encryption request of not carrying A end PKI that A end sends, then hold PKI to A end feedback B, represent that B termination is subject to encryption of communicated data request; And, after the second key information receiving the transmission of A end, utilize described B to hold described second key information of private key deciphering, obtain described key; Wherein, the information of the second key information for generating after key described in use B end public key encryption.
In another embodiment, deciphering module 720, if for receiving the encryption of communicated data request carrying A end PKI that A end sends, then hold private key as the key of the described enciphered data of deciphering using B.
The function of the decryption device described in the present embodiment is described in the embodiment of the method shown in Fig. 2,3,4,5, therefore not detailed part in the description of the present embodiment, see the related description in previous embodiment, can not repeat at this.
Present invention also offers a kind of terminal, described terminal comprises encrypt communication apparatus provided by the invention.
The foregoing is only embodiments of the invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within right of the present invention.
Claims (10)
1. an encryption communication method, is characterized in that, in the flow process that A end performs, comprising:
When communicating in converged communication RCS mode with B end group, in B termination by after encryption of communicated data request, obtain the key for encrypting described communication data; And,
To the communication data after described secret key encryption be utilized, send to described B end.
2. encryption method according to claim 1, is characterized in that, described after B termination is subject to encryption of communicated data request, obtaining the key for encrypting described communication data, comprising:
After sending encryption of communicated data request to B end, if the B receiving B end feedback holds PKI, then represent that B termination is by encryption of communicated data request;
Obtain the first key information and the second key information; Wherein, the first key information is the information generated after using A to hold public key encryption key, the information of the second key information for generating after key described in use B end public key encryption;
B is sent to hold described second key information;
If get described first key information, then utilize A to hold described first key information of private key deciphering, obtain described key.
3. encryption method according to claim 1, is characterized in that, described after B termination is subject to encryption of communicated data request, obtaining the key for encrypting described communication data, comprising:
Send to B end and carry the encryption of communicated data request that A holds PKI, so that in B termination by after encryption of communicated data request, described A holds PKI as the key of coded communication data by B end;
If the B receiving B end feedback holds PKI, then represent that B termination is by encryption of communicated data request, described B holds PKI as the key of coded communication data by A end.
4. an encryption communication method, is characterized in that, in the flow process that B end performs, comprising:
When communicating in RCS mode with A end group, after accepting encryption of communicated data request, receive the enciphered data that A end sends; Wherein, described enciphered data is encrypted communication data;
Utilize the key obtained in advance, decipher described enciphered data, to obtain described communication data.
5. method according to claim 4, is characterized in that, the described mode obtaining key in advance, comprising:
If receive A end send do not carry A hold PKI encryption of communicated data request after, then to A end feedback B hold PKI;
And, after the second key information receiving the transmission of A end, utilize described B to hold described second key information of private key deciphering, obtain key; Wherein, the information of the second key information for generating after key described in use B end public key encryption;
Or,
If receive the encryption of communicated data request carrying A end PKI that A end sends, then held by B private key as the key of the described enciphered data of deciphering.
6. an encrypt communication apparatus, is characterized in that, be arranged at A end, described device, comprising:
Acquisition module, for when communicating in converged communication RCS mode with B end group, in B termination by after encryption of communicated data request, obtains the key for encrypting described communication data; And,
Encrypting module, for the communication data that will utilize after described secret key encryption, sends to described B end.
7. encrypt communication apparatus according to claim 6, is characterized in that, described acquisition module is used for:
After sending encryption of communicated data request to B end, if the B receiving B end feedback holds PKI, then represent that B termination is by encryption of communicated data request;
Obtain the first key information and the second key information; Wherein, the first key information is the information generated after using A to hold public key encryption key, the information of the second key information for generating after key described in use B end public key encryption;
B is sent to hold described second key information;
If get described first key information, then utilize A to hold described first key information of private key deciphering, obtain described key.
8. encryption device according to claim 6, is characterized in that, described acquisition module is used for:
Send to B end and carry the encryption of communicated data request that A holds PKI, so that in B termination by after encryption of communicated data request, described A holds PKI as the key of coded communication data by B end;
If the B receiving B end feedback holds PKI, then represent that B termination is by encryption of communicated data request, described B holds PKI as the key of coded communication data by A end.
9. an encrypt communication apparatus, is characterized in that, be arranged at B end, described device, comprising:
Receiver module, for when communicating in RCS mode with A end group, after accepting encryption of communicated data request, receives the enciphered data that A end sends; Wherein, described enciphered data is encrypted communication data;
Deciphering module, for utilizing the key obtained in advance, deciphers described enciphered data, to obtain described communication data.
10. a terminal, is characterized in that, described terminal comprises the encrypt communication apparatus described in any one of claim 6-9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410453445.5A CN104243146A (en) | 2014-09-05 | 2014-09-05 | Encryption communication method and device and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410453445.5A CN104243146A (en) | 2014-09-05 | 2014-09-05 | Encryption communication method and device and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104243146A true CN104243146A (en) | 2014-12-24 |
Family
ID=52230558
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410453445.5A Pending CN104243146A (en) | 2014-09-05 | 2014-09-05 | Encryption communication method and device and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104243146A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017063438A1 (en) * | 2015-10-15 | 2017-04-20 | 中兴通讯股份有限公司 | Voice encryption method, system and apparatus |
CN106790255A (en) * | 2017-01-24 | 2017-05-31 | 北京元心科技有限公司 | End to end security communication means and system |
CN108259486A (en) * | 2018-01-10 | 2018-07-06 | 芯盾网安(北京)科技发展有限公司 | End-to-end key exchange method based on certificate |
CN108270717A (en) * | 2016-12-30 | 2018-07-10 | 杭州华为企业通信技术有限公司 | VoIP communication means, equipment and communication system |
WO2019205932A1 (en) * | 2018-04-26 | 2019-10-31 | 中兴通讯股份有限公司 | Method, apparatus, and system for transmitting client service |
CN113300999A (en) * | 2020-02-21 | 2021-08-24 | 北京沃东天骏信息技术有限公司 | Information processing method, electronic device, and readable storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101867898A (en) * | 2010-07-02 | 2010-10-20 | 中国电信股份有限公司 | Short message encrypting communication system, method and secret key center |
CN103095704A (en) * | 2013-01-15 | 2013-05-08 | 杭州华三通信技术有限公司 | Trusted medium online validation method and device |
-
2014
- 2014-09-05 CN CN201410453445.5A patent/CN104243146A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101867898A (en) * | 2010-07-02 | 2010-10-20 | 中国电信股份有限公司 | Short message encrypting communication system, method and secret key center |
CN103095704A (en) * | 2013-01-15 | 2013-05-08 | 杭州华三通信技术有限公司 | Trusted medium online validation method and device |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017063438A1 (en) * | 2015-10-15 | 2017-04-20 | 中兴通讯股份有限公司 | Voice encryption method, system and apparatus |
CN108270717A (en) * | 2016-12-30 | 2018-07-10 | 杭州华为企业通信技术有限公司 | VoIP communication means, equipment and communication system |
CN106790255A (en) * | 2017-01-24 | 2017-05-31 | 北京元心科技有限公司 | End to end security communication means and system |
CN108259486A (en) * | 2018-01-10 | 2018-07-06 | 芯盾网安(北京)科技发展有限公司 | End-to-end key exchange method based on certificate |
WO2019205932A1 (en) * | 2018-04-26 | 2019-10-31 | 中兴通讯股份有限公司 | Method, apparatus, and system for transmitting client service |
CN113300999A (en) * | 2020-02-21 | 2021-08-24 | 北京沃东天骏信息技术有限公司 | Information processing method, electronic device, and readable storage medium |
CN113300999B (en) * | 2020-02-21 | 2023-12-05 | 北京沃东天骏信息技术有限公司 | Information processing method, electronic device, and readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9668230B2 (en) | Security integration between a wireless and a wired network using a wireless gateway proxy | |
EP2713546A1 (en) | Method and device for data transmission | |
CN104243146A (en) | Encryption communication method and device and terminal | |
CN103428221A (en) | Safety logging method, system and device of mobile application | |
CN104683291B (en) | Session key negotiation method based on IMS system | |
CN104486077A (en) | End-to-end secret key negotiation method for VoIP (Voice Over Internet Protocol) real-time data safety transmission | |
CN101997679A (en) | Encrypted message negotiation method, equipment and network system | |
CN113630407B (en) | Method and system for enhancing transmission security of MQTT protocol by using symmetric cryptographic technology | |
CN113612605A (en) | Method, system and equipment for enhancing MQTT protocol identity authentication by using symmetric cryptographic technology | |
CN104253801B (en) | Realize the methods, devices and systems of login authentication | |
CN104683304A (en) | Processing method, equipment and system of secure communication service | |
CN103391292A (en) | Mobile-application-oriented safe login method, system and device | |
CN105337740A (en) | Identity verification method, client, relay device and server | |
CN106936788A (en) | A kind of cryptographic key distribution method suitable for VOIP voice encryptions | |
CN105376261A (en) | Encryption method and system for instant communication message | |
CN114338618A (en) | Multi-party call method, system, conference server and electronic equipment | |
CN103795966A (en) | Method and system for realizing safe video call based on digital certificate | |
CN103973543B (en) | Instant communicating method and device | |
CN111064738B (en) | TLS (transport layer Security) secure communication method and system | |
CN108206738B (en) | Quantum key output method and system | |
CN105049201A (en) | Mobile equipment secret communication system based on quantum cryptography and mobile equipment secret communication method based on quantum cryptography | |
CN107294968A (en) | The monitoring method and system of a kind of audio, video data | |
WO2017197968A1 (en) | Data transmission method and device | |
CN109194905B (en) | Video conference connection encryption and establishment method, terminal, server and system | |
CN109120408A (en) | For authenticating the methods, devices and systems of user identity |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20141224 |
|
RJ01 | Rejection of invention patent application after publication |