CN104486077B - A kind of end-to-end cryptographic key negotiation method of VoIP real time datas safe transmission - Google Patents

A kind of end-to-end cryptographic key negotiation method of VoIP real time datas safe transmission Download PDF

Info

Publication number
CN104486077B
CN104486077B CN201410669878.4A CN201410669878A CN104486077B CN 104486077 B CN104486077 B CN 104486077B CN 201410669878 A CN201410669878 A CN 201410669878A CN 104486077 B CN104486077 B CN 104486077B
Authority
CN
China
Prior art keywords
communication
key
server
encryption
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201410669878.4A
Other languages
Chinese (zh)
Other versions
CN104486077A (en
Inventor
顾小卓
周卫华
朱大立
张仁军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Information Engineering of CAS
Original Assignee
Institute of Information Engineering of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Information Engineering of CAS filed Critical Institute of Information Engineering of CAS
Priority to CN201410669878.4A priority Critical patent/CN104486077B/en
Publication of CN104486077A publication Critical patent/CN104486077A/en
Application granted granted Critical
Publication of CN104486077B publication Critical patent/CN104486077B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a kind of end-to-end cryptographic key negotiation method suitable for mobile phone terminal VoIP real time data safe transmissions.This method is:1) transmitting the SIP signalings between stage, client and server end in signaling security uses tls protocol to carry out two-way authentication and protection;2) in end-to-end key agreement phase; by the way of two layers is encrypted; in first layer; between communication initiator and server; tls protocol is respectively adopted between server and communication receiver to be protected; in the second layer, the key agreement parameter information of communication initiator and communication receiver are protected respectively using the SM2 public keys of communication initiator and communication receiver.The present invention is protected using two layers of encryption method to key agreement parameter, and carries out two-way authentication and protection to signaling in the signalling stage, substantially increases the security of information transfer.

Description

A kind of end-to-end cryptographic key negotiation method of VoIP real time datas safe transmission
Technical field
The present invention relates to a kind of end-to-end cryptographic key negotiation method, more particularly to a kind of end of VoIP real time datas safe transmission To end cryptographic key negotiation method, it is adaptable to which VoIP communicates (Voice over Internet Protocol), belongs to digital network skill Art field.
Background technology
With developing rapidly for mobile communication technology, intelligent mobile phone terminal is widely applied, operation thereon each Application is planted, such as VoIP voice communications and instant messaging, the Working Life given people bring great convenience.In April, 2013, Microsoft announces that Skype Global Subscriber adds up the time exchanged using Skype with other people up to 2,000,000,000 minutes daily, already takes up The internal long distance call share of global a quarter.VoIP general principle is that speech data is compiled using voice compression algorithm Code is compressed processing, then is transmitted by TCP/IP standard bag forms, and packet is delivered to destination by IP network, receives Side strings together these VoPs, by decompression processing, reverts to original voice signal.
VoIP is greatly enriched the life of people, reduces rate, but VoIP is due to using IP as transmission medium, Some safety defects of natural presence, such as it cannot be guaranteed that privacy and communication security of user.Therefore, the number transmitted for VoIP Turn into urgent problem according to protection is encrypted.
Safety and enciphering and deciphering algorithm based on PKI systems are one of preferable safety approach generally acknowledged at present.Current Traditional method is encrypted using RSA public keys, to protect the safety of session key.But " Snowdon event " takes off to us Show the world cryptographic algorithm be not it is safe and reliable, the information protected using international cryptography algorithm be likely to by The monitoring and monitoring of foreign countries' tissue.
Session initiation protocol (Session Initial Protocol, SIP) be core protocol in next generation network it One, it is widely used in controlling the voice and video call on multimedia communication sessions, such as IP network.SIP is for creating, changing, end The session being only made up of one or more Media Streams, and two sides can be used for or multi-party conversation (to be referred on SIP: Rosenberg J, Schulzrinne H, Camanilo G.SIP:Session initiation protocol.Internet RFC 3261,2002)。
Chinese patent (number of patent application CN201010111260.8) discloses a kind of end-to-end session cipher negotiating method And system, in the network architecture separated for identity with position.This method includes:When the first access node receives first During the call encryption request that user terminal is initiated, the identity mark of the second user terminal carried in being asked using the call encryption Know, inquire about the Route Distinguisher and effective public key of the second access node;First access node generates end-to-end session key, And the end-to-end session key is sent to first user terminal, and using the effective public key inquired by the end pair Second access node is sent to after the session key of end;Second access node utilizes the effective public key correspondence Private key decrypt and obtain the end-to-end session key, and it is whole that the end-to-end session key is sent into the second user End.
Chinese patent CN201010243957.0 discloses a kind of Weak authentication and cryptographic key negotiation method based on symmetric cryptography, Comprise the following steps:1) the preset long-term shared secret key k between any two apparatus for network node A and B;2) in node A and B It is upper that a clock is each set;3) built-in encryption algorithm E and hash function H (x) between node A and B point;4) node A and B it Between set up certification and session key, method is:Node A sends the ciphertext and A of encrypted algorithm E and long-term shared secret key k encryptions Relevant information give node B, node A session keys;Node B is using decipherment algorithm and long-term shared secret key k to ciphertext solution Close, node B is compareed the information after decryption with node A relevant information, if information is legal, certification passes through, then node A Session key is shared between B;Session key is hash function H (x).
Chinese patent CN200410030855.5 discloses a kind of cryptographic key distribution method of end-to-end encrypted communication, each User terminal and KDC are stored with respectively corresponds to user's private data of user, and this method includes:VoIP server After the setup requests for receiving calling terminal, sent to KDC and obtain key request;KDC receives After request, caller encryption key characteristic and called encryption key characteristic are produced respectively, and produced encryption is close Key characteristic returns to VoIP server;VoIP server distinguishes resulting caller and called encryption key characteristic It is sent to calling terminal and terminal called;Calling terminal and terminal called pass through currently available encryption key characteristic respectively The encryption communication key of this calling is produced with user's private data of itself storage, and passes through produced encryption communication key Carry out the encryption voice call of both sides.This method can realize the key distribution of high security in port-to-port encryption communication system.
Chinese patent (number of patent application:N201110390564.7) disclose a kind of based on the close of SM2 IKEs Key machinery of consultation, it is characterised in that including:Determine the value of elliptic curve parameter rank n used in this key agreement;Calculate During the rank n≤2x, X minimum positive integer value, and the minimum positive integer value acquisition parameter W of the X based on acquisition value;It is based on The value of the parameter W carries out key agreement with consulting opposite end.
The scheme that existing patent is proposed is not particularly suited for the safeguard protection of VoIP data transmission.In the signalling stage, only Tls protocol is employed to be protected, but the content of transmission is visible for server.
The content of the invention
The invention provides a kind of suitable for mobile phone terminal VoIP secure voices, the end-to-end key agreement side of video communication Method, is protected to ensure the security of key agreement using two layers of encryption method of TLS and SM2 public keys to key agreement parameter.
The present invention uses following technical scheme:
It is a kind of be used for VoIP secure voices, the cryptographic key negotiation method of video, including:
(1) the signaling security transmission stage
The transmission of signaling is protected using tls protocol.The RSA public keys of other side are preserved at client and server end, visitor SIP signalings between family end and server end carry out two-way authentication and protection using tls protocol.
(2) end-to-end key agreement phase
This stage using two layers encrypt by the way of, between first layer, communication initiator and server, server and communication Tls protocol is respectively adopted between recipient to be protected, in the second layer, the key agreement ginseng of communication initiator and communication receiver Number information is protected respectively using the SM2 public keys of communication initiator and communication receiver.Communication initiator and communication receiver All preserve the SM2 public keys of other side.Communication initiator, communication receiver and server all preserve other side RSA public keys (on Rsa encryption method, the content such as SM2 encryption methods and digital signature is referred to:R.L.Rivest,A.Shamir,and L.Adleman.A method for obtaining digital signatures and public-key Cryptosystems.Communications of the ACM, 21 (2):120-126,1978;SM2 curve public keys are close The national Password Management offices of code algorithm, in December, 2010).
Communication initiator is carried for voice and video communication in the communication request message (INVITE message) of transmission When used session key parameter SK1.Communication initiator first by communication receiver SM2 public keys to session key parameter SK1 is encrypted, and is signed using the SK1 after the SM2 private key pair encryptions of oneself, then by the combination of this two parts one Rise, form packet.Initiator is using the encryption keys packet of the TLS passages between server, the number after encryption Signed according to bag using the RSA private keys of communication initiator.Packet after encryption and signature is sent to server by initiator, Data between initiator and server are protected using tls protocol.
Server is received after the packet of communication initiator's transmission, and signing messages is isolated first, is initiated using communication The RSA public keys of side are verified to signature.After being verified, server uses the encryption key decryption packet of TLS passages, it The key with the TLS passages of communication receiver is used to be encrypted the packet of decryption again afterwards, and it is private using the RSA of server Communication receiver is sent to after key signature.Communication receiver is received after the communication data of server transmission, and label are isolated first Name, is verified using the RSA public keys of server to signature.After being verified, communication receiver is close using the encryption of TLS passages Key decrypted data packet.In the data of communication receiver after decryption, the signing messages of communication initiator is isolated, and use communication The SM2 public keys of initiator are verified to signature, after being verified, and use recipient's to the data that communication initiator encrypts SM2 private keys are decrypted, and obtain session key parameter SK1.
Communication receiver is carried for voice and video communication when institute in the response message for answering the INVITE message The session key parameter SK2 used.Communication receiver first by communication initiator SM2 public keys to session key parameter SK2 It is encrypted, and is signed using the SK2 after the SM2 private key pair encryptions of oneself, is then combined this two parts, shape Into packet, the encryption key for reusing the TLS passages between server is encrypted, and the packet after encryption is connect using communication The RSA private keys of debit are signed.Packet after encryption and signature is sent to server by communication receiver.Communication receiver XOR is carried out to SK1 and SK2, this session key SK is generated.
Server is received after the packet of communication receiver's transmission, and signing messages is isolated first, communications reception is used The RSA public keys of side are verified to signature.After being verified, server uses the encryption key decryption packet in TLS passages. Then the TLS channel keys between communication initiator are used to be encrypted the data after decryption, and it is private using the RSA of server Key is signed.Packet after encryption and signature is sent to communication initiator by server.
Communication initiator is received after the communication data of server transmission, and signature is isolated first, the RSA of server is used Public key is verified to signature.After being verified, communication initiator uses the encryption key decryption data with server TLS passages Bag.In the data of communication initiator after decryption, the signing messages of communication receiver is isolated, and use communication receiver's SM2 public keys are verified to signature.After being verified, communication initiator decrypts the data after encryption using the SM2 private keys of oneself, Obtain session key parameter SK2.Communication initiator carries out XOR to SK1 and SK2, generates this session key SK.
(3) the Security Data Transmission stage.
In communication process, communication initiator is protected using SRTP agreements to data, and session key is second stage The SK of negotiation, AES uses the close SM4 algorithms of state.Communication initiator is signed to the packet after encryption using SM2 algorithms Name is simultaneously sent.Communication receiver is received after packet, and signature is isolated first, using communication initiator public key to sign into Row checking, dialog context is decrypted after being verified using session key SK.
Compared with prior art, the positive effect of the present invention is:
The present invention is protected using two layers of encryption method to key agreement parameter, and in the signalling stage to signaling Two-way authentication and protection are carried out, the security of information transfer is substantially increased.
Brief description of the drawings
Fig. 1 is the Principle of Communication figure that the stage is transmitted in signaling security of the present invention;
Fig. 2 is that key agreement phase initiator message of the present invention sends schematic diagram;
Fig. 3 is that key agreement phase recipient message of the present invention sends schematic diagram;
Fig. 4 is Security Data Transmission stage schematic diagram of the present invention.
Embodiment
The present invention is described more fully below in conjunction with the accompanying drawings:
The present invention is a kind of end-to-end cryptographic key negotiation method for mobile phone terminal VoIP real time data safe transmissions, including Two stages:Stage and key agreement phase are transmitted in signaling security, and the first stage is protected using tls protocol, second stage Use two layers of encryption method of tls protocol and SM2 public keys.
As shown in figure 1, transmitting the stage in signaling security, transmitted the stage in voip signaling, client and server end is preserved There are the RSA public keys of other side.SIP signalings between client and server end carry out two-way authentication and protection using tls protocol.It is logical When letter is initiated, client is protected using tls protocol to Content of Communication, and is utilized after the RSA private key pair encryptions of client Content of Communication is signed.
After the data that received server-side is sent to client, signature is isolated first, and utilize the RSA public keys of client Signature is verified, after being verified, server end uses the encryption key decryption packet of TLS passages.Server will be solved Packet after close is protected using tls protocol, and uses RSA private key signatures.
In end-to-end key agreement phase, by the way of two layers is encrypted.Between communication initiator and server, service Tls protocol is respectively adopted between device and communication receiver to be protected.Key parameter information to negotiation uses communication initiator Protected respectively with the SM2 public keys of communication receiver.The SM2 that communication initiator and communication receiver preserve other side is public Key.Communication initiator, communication receiver and server all preserve the RSA public keys of other side.
Communication initiator is carried for voice and video communication in the communication request message (INVITE message) of transmission When used session key parameter SK1.Communication initiator first by communication receiver SM2 public keys to session key parameter SK1 is encrypted, and is signed using the SK1 after the SM2 private key pair encryptions of oneself, then by the combination of this two parts one Rise, form packet.Initiator is using the encryption keys packet of the TLS passages between server, the data after encryption Bag is signed using the RSA private keys of communication initiator.Packet after encryption and signature is sent to server by initiator, hair The passage risen between side and server is protected using tls protocol.
Server is received after the packet of communication initiator's transmission, and signing messages is isolated first, is initiated using communication The RSA public keys of side are verified to signature.After being verified, server uses the encryption key decryption packet of TLS passages, so Use the TLS channel keys between communication receiver to be encrypted the data after decryption afterwards, and use the RSA private keys of server Signed.Packet after encryption and signature is sent to communication initiator by server.
As shown in Fig. 2 communication receiver is received after the communication data of server transmission, signature is isolated first, is used The RSA public keys of server are verified to signature.After being verified, communication receiver uses the encryption key decryption of TLS passages Packet.In the data of communication receiver after decryption, the signing messages of communication initiator is isolated, and uses communication initiator SM2 public keys to signature verify, after being verified, to communication initiator encrypt data use recipient SM2 private keys It is decrypted, obtains session key parameter SK1.
Communication receiver is carried for voice and video communication when institute in the response message for answering the INVITE message The session key parameter SK2 used.Communication receiver first by communication initiator SM2 public keys to session key parameter SK2 It is encrypted, and is signed using the SK2 after the SM2 private key pair encryptions of oneself, is then combined this two parts, shape Into packet, the encryption key for reusing the TLS passages between server is encrypted, and the packet after encryption is connect using communication The RSA private keys of debit are signed.Packet after encryption and signature is sent to server by communication receiver.Communication receiver XOR is carried out to SK1 and SK2, this session key SK is generated.
Server is received after the packet of communication receiver's transmission, and signing messages is isolated first, communications reception is used The RSA public keys of side are verified to signature.After being verified, server uses close with encryption in communication receiver's TLS passages Key decrypted data packet.Then the data after decryption are protected using the TLS passages of server and communication initiator, and used The RSA private keys of server are signed.Packet after encryption and signature is sent to communication initiator by server.
As shown in figure 3, communication initiator is received after the communication data of server transmission, signature is isolated first, is used The RSA public keys of server are verified to signature.After being verified, communication initiator uses the encryption key decryption of TLS passages Packet.In the data of communication initiator after decryption, the signing messages of communication receiver is isolated, and uses communication receiver SM2 public keys to signature verify.After being verified, communication initiator uses the number after the SM2 private keys decryption encryption of oneself According to obtaining session key parameter SK2.Communication initiator carries out XOR to SK1 and SK2, generates this session key SK.
As shown in figure 4, in the Security Data Transmission stage, in communication process, communication initiator is using SRTP agreements to logical Letter voice or video are encrypted, and session key is SK, and AES uses the close SM4 algorithms of state.After communication initiator is to encryption Packet signed and sent using SM2 algorithms.Communication receiver is received after packet, and signature is isolated first, is made Signature is verified with the public key of communication initiator, dialog context is decrypted using session key SK after being verified.

Claims (4)

1. a kind of end-to-end cryptographic key negotiation method of VoIP real time datas safe transmission, its step is:
1) signaling security transmission the stage, communication party generation signaling data simultaneously protected using tls protocol, then using oneself Encryption data and signature are sent to server by the data after RSA private key pair encryptions after being signed;The server by utilizing communication The RSA public keys of side are verified to signature, with the encryption key decryption of the TLS passages encryption data after being verified, are somebody's turn to do The signaling data of communication party;
2) communication request message of generation is sent to server by key agreement phase, communication initiator;The communication request disappears The generation method of breath is:Communication initiator generates session key parameter SK1, and it is encrypted with the SM2 public keys of communication receiver, Then signed with the SK1 after the SM2 private key pair encryptions of oneself, then by the SK1 after encryption and signature generation packet, then The packet is encrypted using the encryption key of TLS passages, and signed using the RSA private keys of oneself, will finally be added Packet and signed data after close generate the communication request message;
3) the RSA public keys of the server by utilizing communication initiator are verified to the signature in the communication request message, and checking is logical Later, server uses the encryption key decryption packet of the TLS passages between communication initiator, afterwards again by the number of decryption It is encrypted according to bag using the encryption key with the TLS passages of communication receiver, and uses hair after the RSA private key signatures of server Give communication receiver;
4) communication receiver is verified using the RSA public keys of server to receiving the signature in data, after being verified, is used Encryption data in the encryption key decryption packet of TLS passages;Then with the SM2 public keys of communication initiator to communication initiator Signature verified, after being verified, to communication initiator encrypt data solved using the SM2 private keys of communication receiver It is close, obtain session key parameter SK1;
5) communication receiver generates response message and is sent to server;The generation method of the response message is:Communications reception Side firstly generate a session key parameter SK2 and it be encrypted with the SM2 public keys of communication initiator, then with oneself SK2 after SM2 private key pair encryptions is signed, and the SK2 and signature after encryption then are formed into packet, reused and server Between TLS passages encryption keys packet, and the packet after encryption is entered using the RSA private keys of communication receiver Row signature, finally generates the response message by encryption data and signed data;Communication receiver generates this according to SK1 and SK2 Secondary session key SK;
6) server is verified using the RSA public keys of communication receiver to the signature in the response message, after being verified, is made With the encryption key decryption packet of TLS passages, then the data after decryption are led to using the TLS of server and communication initiator Road is protected, and the data after protection are signed using the RSA private keys of server, after encryption data and signature combination It is sent to the communication initiator;
7) communication initiator is verified with the RSA public keys of server to receiving the signature in data, after being verified, is used Encryption data in the encryption key decryption packet of TLS passages, then with the SM2 public keys of communication receiver to the label after decryption Name is verified, after being verified, and using the data after the SM2 private keys decryption encryption of oneself, is obtained
Session key parameter SK2;Communication initiator generates this session key SK according to SK1 and SK2;
Wherein, Key Management server is that each communication party distributes two group keys pair:RSA key pair and SM2 keys pair;Communication hair Play side and communication receiver preserve the public key of the key pair of other side two respectively, and server RSA public keys;Server is preserved The RSA public keys of each communication party.
2. the method as described in claim 1, it is characterised in that the communication initiator is locally different to SK1 and SK2 progress Or, generate this session key SK;The communication receiver is locally carrying out XOR to SK1 and SK2, generates this session key SK。
3. method as claimed in claim 1 or 2, it is characterised in that in the Security Data Transmission stage, communication initiator uses SRTP agreements are protected to communication speech or video, and session key is SK, then use SM2 algorithms to the packet after encryption Signed and sent;Communication receiver is received after packet, and signature is isolated first, public using the SM2 of communication initiator Key is verified to signature, and dialog context is decrypted using session key SK after being verified.
4. method as claimed in claim 1 or 2, it is characterised in that the key agreement between communication initiator and communication receiver Data are authenticated and protected using SM2 public keys.
CN201410669878.4A 2014-11-20 2014-11-20 A kind of end-to-end cryptographic key negotiation method of VoIP real time datas safe transmission Expired - Fee Related CN104486077B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410669878.4A CN104486077B (en) 2014-11-20 2014-11-20 A kind of end-to-end cryptographic key negotiation method of VoIP real time datas safe transmission

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410669878.4A CN104486077B (en) 2014-11-20 2014-11-20 A kind of end-to-end cryptographic key negotiation method of VoIP real time datas safe transmission

Publications (2)

Publication Number Publication Date
CN104486077A CN104486077A (en) 2015-04-01
CN104486077B true CN104486077B (en) 2017-09-15

Family

ID=52760585

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410669878.4A Expired - Fee Related CN104486077B (en) 2014-11-20 2014-11-20 A kind of end-to-end cryptographic key negotiation method of VoIP real time datas safe transmission

Country Status (1)

Country Link
CN (1) CN104486077B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107846567A (en) * 2017-11-02 2018-03-27 苏州科达科技股份有限公司 A kind of SRTP capability negotiations method and conference terminal
CN109302412A (en) * 2018-11-06 2019-02-01 晋商博创(北京)科技有限公司 VoIP communication processing method, terminal, server and storage medium based on CPK

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017035725A1 (en) * 2015-08-31 2017-03-09 林建华 Communication method for electronic communication system in open environment
CN106549906A (en) * 2015-09-17 2017-03-29 中兴通讯股份有限公司 Realize method, terminal and the network side element of end-to-end call encryption
CN105743896B (en) * 2016-02-01 2019-03-22 成都三零瑞通移动通信有限公司 A kind of transmission method of enciphoring voice telecommunication key agreement data exchange
CN106060807A (en) * 2016-05-24 2016-10-26 中国科学院信息工程研究所 Message transmission method applicable to circuit domain encrypted communication
CN106534183A (en) * 2016-12-12 2017-03-22 中国航天系统工程有限公司 SM2/SM3/SM4 hybrid encryption method aiming at remote measurement and control terminal system
CN106603231B (en) * 2017-01-20 2019-08-23 武汉理工大学 Based on the distributed SM2 digital signature generation method and system for going secretization
CN107508842A (en) * 2017-09-30 2017-12-22 中城智慧科技有限公司 A kind of intelligent electric meter control module and method based on CCKS
CN107547570B (en) * 2017-09-30 2023-12-05 国信优易数据股份有限公司 Data security service platform and data security transmission method
CN109768948A (en) * 2017-11-10 2019-05-17 中国电信股份有限公司 Information push method, system and messaging device
CN107995210A (en) * 2017-12-19 2018-05-04 芯盾(北京)信息技术有限公司 The voice encryption communication means that key and ciphertext are transmitted by different domain transmissions
CN108040071B (en) * 2017-12-30 2023-02-17 深圳市潮流网络技术有限公司 Dynamic switching method for VoIP audio and video encryption key
CN110858835B (en) * 2018-08-24 2022-02-18 中国电信股份有限公司 Communication method, system and related device and computer readable storage medium
CN111050321B (en) * 2018-10-12 2023-05-16 中兴通讯股份有限公司 Data processing method, device and storage medium
EP3767909A1 (en) * 2019-07-17 2021-01-20 Siemens Mobility GmbH Method and communication unit for cryptographically protected unidirectional data transmission of useful data between two networks
CN111083164A (en) * 2019-12-30 2020-04-28 宁波和利时信息安全研究院有限公司 Safety protection method of industrial control system and related equipment
CN112039657B (en) * 2020-07-20 2021-05-25 北京邮电大学 Method, device, equipment and storage medium for generating key
CN112422530B (en) * 2020-11-04 2023-05-30 无锡沐创集成电路设计有限公司 Key security protection method and password device for server in TLS handshake process
CN113630248B (en) * 2021-09-15 2024-01-30 深圳市国信量子科技有限公司 Session key negotiation method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101340443A (en) * 2008-08-28 2009-01-07 中国电信股份有限公司 Session key negotiating method, system and server in communication network
CN101459506A (en) * 2007-12-14 2009-06-17 华为技术有限公司 Cipher key negotiation method, system, customer terminal and server for cipher key negotiation
CN101729536A (en) * 2009-06-29 2010-06-09 中兴通讯股份有限公司 Method and system for transmitting delayed media information of IP multimedia subsystem
CN101790160A (en) * 2009-01-23 2010-07-28 中兴通讯股份有限公司 Method and device for safely consulting session key
CN102595403A (en) * 2011-01-14 2012-07-18 中兴通讯股份有限公司 Authentication method and authentication device for relay node binding
CN103036872A (en) * 2012-11-19 2013-04-10 华为技术有限公司 Method, equipment and system for encryption and decryption of data transmission

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102005026982A1 (en) * 2005-06-10 2006-12-14 Siemens Ag Method for agreeing a security key between at least one first and a second communication subscriber for securing a communication connection

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101459506A (en) * 2007-12-14 2009-06-17 华为技术有限公司 Cipher key negotiation method, system, customer terminal and server for cipher key negotiation
CN101340443A (en) * 2008-08-28 2009-01-07 中国电信股份有限公司 Session key negotiating method, system and server in communication network
CN101790160A (en) * 2009-01-23 2010-07-28 中兴通讯股份有限公司 Method and device for safely consulting session key
CN101729536A (en) * 2009-06-29 2010-06-09 中兴通讯股份有限公司 Method and system for transmitting delayed media information of IP multimedia subsystem
CN102595403A (en) * 2011-01-14 2012-07-18 中兴通讯股份有限公司 Authentication method and authentication device for relay node binding
CN103036872A (en) * 2012-11-19 2013-04-10 华为技术有限公司 Method, equipment and system for encryption and decryption of data transmission

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107846567A (en) * 2017-11-02 2018-03-27 苏州科达科技股份有限公司 A kind of SRTP capability negotiations method and conference terminal
CN109302412A (en) * 2018-11-06 2019-02-01 晋商博创(北京)科技有限公司 VoIP communication processing method, terminal, server and storage medium based on CPK
CN109302412B (en) * 2018-11-06 2021-09-21 晋商博创(北京)科技有限公司 VoIP communication processing method based on CPK, terminal, server and storage medium

Also Published As

Publication number Publication date
CN104486077A (en) 2015-04-01

Similar Documents

Publication Publication Date Title
CN104486077B (en) A kind of end-to-end cryptographic key negotiation method of VoIP real time datas safe transmission
CN107947913B (en) Anonymous authentication method and system based on identity
CN104618110B (en) A kind of VoIP security conferences session key transmission method
CN104219051B (en) The communication means and system of a kind of inner group message
CN103354498B (en) A kind of file encryption transmission method of identity-based
CN102547688B (en) Virtual-dedicated-channel-based establishment method for high-credibility mobile security communication channel
CN104683304B (en) A kind of processing method of secure traffic, equipment and system
CN103458400B (en) A kind of key management method in voice encryption communication system
CN103974241A (en) Voice end-to-end encryption method aiming at mobile terminal with Android system
WO2011017099A3 (en) Secure communication using asymmetric cryptography and light-weight certificates
CN104821944A (en) Hybrid encrypted network data security method and system
CN107342977A (en) Suitable for the information security method of point-to-point instant messaging
CN104901935A (en) Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)
Wang et al. A dependable privacy protection for end-to-end VoIP via Elliptic-Curve Diffie-Hellman and dynamic key changes
CN105792193A (en) End-to-end voice encryption method of mobile terminal based on iOS operating system
CN105323070A (en) Method for realizing security electronic mail based on digital envelope
CN106936788A (en) A kind of cryptographic key distribution method suitable for VOIP voice encryptions
CN101958907A (en) Method, system and device for transmitting key
CN101277513B (en) Method for ciphering wireless mobile terminal communication
CN106549858B (en) Instant messaging encryption method based on identification password
CN105530100A (en) VoLTE secure communication method
CN101277512A (en) Method for ciphering wireless mobile terminal communication
TW201537937A (en) Unified identity authentication platform and authentication method thereof
CN101790160A (en) Method and device for safely consulting session key
WO2016082401A1 (en) Conversation method and apparatus, user terminal and computer storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170915

Termination date: 20211120