CN106330436A - Communication method and system, and secure terminal - Google Patents

Communication method and system, and secure terminal Download PDF

Info

Publication number
CN106330436A
CN106330436A CN201610781260.6A CN201610781260A CN106330436A CN 106330436 A CN106330436 A CN 106330436A CN 201610781260 A CN201610781260 A CN 201610781260A CN 106330436 A CN106330436 A CN 106330436A
Authority
CN
China
Prior art keywords
terminal
key factor
call
security terminal
cryptographic key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610781260.6A
Other languages
Chinese (zh)
Inventor
钟焰涛
傅文治
蒋罗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201610781260.6A priority Critical patent/CN106330436A/en
Priority to PCT/CN2016/107961 priority patent/WO2018040330A1/en
Publication of CN106330436A publication Critical patent/CN106330436A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]

Abstract

The invention provides a communication method and system, and a secure terminal. The method comprises the steps that a first secure terminal initiates a call request to a second secure terminal, wherein the call request comprises a first key factor; the first secure terminal receives a message fed back by a second secure terminal, wherein the message comprises a second key factor; the first secure terminal calculates the first key factor and the second key factor through utilization of a preset algorithm to obtain a call key; and the first secure terminal carries out encrypted speech communication with the second secure terminal according to the call key. Visibly, through application of the technical scheme provided by the method, the system and the secure terminal, the key can be determined according to the information provided by two call parties, and an encrypted call is carried out according to the key, thereby improving the call security.

Description

A kind of method of communication, security terminal and system
Technical field
The present invention relates to the communications field, relate to a kind of method of communication, terminal and system.
Background technology
In recent years, along with the development of terminal (such as smart mobile phone, panel computer etc.) is with universal, terminal is in the daily life of people Work has become as an indispensable part.In some important events, need when user calls to carry out voice encryption.
In existing voice encryption call scheme, used in ciphering process, key is all to be selected, so by the side conversed After be sent to both call sides, when these both sides converse, can add according to the double secret key audio data stream being sent to both sides Close to prevent from being ravesdropping.
Although audio data stream can be encrypted by above-mentioned key in case stop-pass words are ravesdropping, but by side's choosing of conversing The method determining key is easily caused key from stealing, thus causes decrypted risk to the audio data stream of encryption.
Summary of the invention
Embodiments provide a kind of method of communication, security terminal and system, it is possible to provide according to both call sides Information determine key, and then be encrypted call according to key, thus promote call safety.
Embodiment of the present invention first aspect discloses a kind of method of communication, and described method includes:
First security terminal to second security terminal initiate call request, described call request include the first key because of Son;
Described first security terminal receives the message of described second security terminal feedback, and described message includes the second key The factor;
Described first security terminal utilizes preset algorithm to carry out described first cryptographic key factor and described second cryptographic key factor Calculate to obtain call key;
Described first security terminal is encrypted voice communication according to described call key and described second security terminal.
In conjunction with first aspect, in the first possible implementation of first aspect, described first security terminal utilizes Described first cryptographic key factor and described second cryptographic key factor are calculated to obtain call key by preset algorithm, including:
Described first cryptographic key factor and described second cryptographic key factor are input to breathe out by described first security terminal as parameter Uncommon function carries out calculating to obtain cryptographic Hash;
The cryptographic Hash of acquisition is set to described call key by described first security terminal.
In conjunction with the first possible implementation of first aspect or first aspect, possible at the second of first aspect In implementation, described first security terminal is encrypted voice according to described call key and described second security terminal and leads to Letter, including:
Described first security terminal receives the voice messaging of user's input;
Described first security terminal utilizes voice messaging described in described call double secret key to be encrypted to obtain encryption voice Data stream;
Described first security terminal sends described encrypted voice data stream to described second security terminal.
Second aspect present invention discloses a kind of method of communication, and described method includes:
Second security terminal receive first security terminal initiate call request, described call request include the first key because of Son;
Described second security terminal to described first security terminal feedback message, described message include the second key because of Son;
Described second security terminal utilizes preset algorithm to carry out described first cryptographic key factor and described second cryptographic key factor Calculate to obtain call key;
Described second security terminal is encrypted voice communication according to described call key and described first security terminal.
In conjunction with second aspect, in the first possible implementation of second aspect, described second security terminal utilizes Described first cryptographic key factor and described second cryptographic key factor are calculated to obtain call key by preset algorithm, including:
Described first cryptographic key factor and described second cryptographic key factor are input to breathe out by described second security terminal as parameter Uncommon function carries out calculating to obtain cryptographic Hash;
The cryptographic Hash of acquisition is set to described call key by described second security terminal.
Third aspect present invention discloses a kind of security terminal, and described security terminal includes:
Initiate unit, for second security terminal initiate call request, described call request include the first key because of Son;
Receive unit, for receive described second security terminal feedback message, described message include the second key because of Son;
Computing unit, is used for utilizing preset algorithm to calculate described first cryptographic key factor and described second cryptographic key factor To obtain call key;
Coded communication unit, for being encrypted voice communication according to described call key and described second security terminal.
In conjunction with the third aspect, in the first possible implementation of the third aspect, described computing unit includes calculating Subelement and subelement is set;
Described computation subunit, for being input to described first cryptographic key factor and described second cryptographic key factor as parameter Hash function is carried out calculate to obtain cryptographic Hash;
Described subelement is set, for the cryptographic Hash of acquisition being set to described call key.
In conjunction with the first possible implementation of the third aspect or the third aspect, possible at the second of the third aspect In implementation, described coded communication unit includes receiving subelement, encryption sub-unit operable and transmission subelement;
Described reception subelement, for receiving the voice messaging of user's input;
Described encryption sub-unit operable, is used for utilizing voice messaging described in described call double secret key to be encrypted and adds cipher to obtain Sound data stream;
Described transmission subelement, for sending described encrypted voice data stream to described second security terminal.
Fourth aspect present invention discloses a kind of security terminal, and described security terminal includes:
Receiving unit, initiate call request for receiving the first security terminal, described call request includes the first key The factor;
Transmitting element, for described first security terminal feedback message, described message includes the second cryptographic key factor;
Computing unit, is used for utilizing preset algorithm to calculate described first cryptographic key factor and described second cryptographic key factor To obtain call key;
Coded communication unit, for being encrypted voice communication according to described call key and described first security terminal.
In conjunction with fourth aspect, in the first possible implementation of fourth aspect, described computing unit includes:
Computation subunit, for being input to Hash using described first cryptographic key factor and described second cryptographic key factor as parameter Function is carried out calculate to obtain cryptographic Hash;
Subelement is set, for the cryptographic Hash of acquisition is set to described call key.
Fifth aspect present invention discloses a kind of communication system, and described system includes the first security terminal and the second safety eventually End,
Described first security terminal, for initiating call request to the second security terminal, described call request includes the One cryptographic key factor;
Described second security terminal, for when receiving the call request that described first security terminal sends, to described First security terminal feedback message, described message includes the second cryptographic key factor;
Described first security terminal, is used for utilizing preset algorithm to described first cryptographic key factor and described second cryptographic key factor Carry out calculating to obtain call key;
Described second security terminal, is used for utilizing preset algorithm to described first cryptographic key factor and described second cryptographic key factor Carry out calculating to obtain call key;
Described first security terminal, leads to for being encrypted voice according to described call key and described second security terminal Letter.
It can be seen that in the scheme of the embodiment of the present invention, the first security terminal initiates call request to the second security terminal, Described call request includes the first cryptographic key factor;Described first security terminal receives disappearing of described second security terminal feedback Breath, described message includes the second cryptographic key factor;Described first security terminal utilizes preset algorithm to described first cryptographic key factor Carry out calculating to obtain call key with described second cryptographic key factor;Described first security terminal is according to described call key and institute State the second security terminal and be encrypted voice communication.It is hereby understood that by implementing the technical scheme that the present invention provides, it is possible to according to The information that both call sides provides determines key, and then is encrypted call according to key, thus promotes call safety.
Accompanying drawing explanation
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, below by use required in embodiment Accompanying drawing is briefly described, it should be apparent that, the accompanying drawing in describing below is some embodiments of the present invention, general for this area From the point of view of logical technical staff, on the premise of not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
The schematic flow sheet of the method for a kind of communication that Fig. 1 provides for the embodiment of the present invention;
The schematic flow sheet of the method for the another kind of communication that Fig. 2 provides for the embodiment of the present invention;
The structural representation of a kind of security terminal that Fig. 3 provides for the embodiment of the present invention;
The structural representation of the another kind of security terminal that Fig. 4 provides for the embodiment of the present invention;
The entity apparatus structural representation of a kind of security terminal that Fig. 5 provides for the embodiment of the present invention;
The entity apparatus structural representation of the another kind of security terminal that Fig. 6 provides for the embodiment of the present invention;
The entity apparatus schematic diagram of a kind of communication system that Fig. 7 provides for the embodiment of the present invention.
Detailed description of the invention
Embodiments provide a kind of method of communication, security terminal and system, it is possible to provide according to both call sides Information determine key, and then be encrypted call according to key, thus promote call safety.
In order to make those skilled in the art be more fully understood that the present invention program, below in conjunction with in the embodiment of the present invention Accompanying drawing, is explicitly described the technical scheme in the embodiment of the present invention, it is clear that described embodiment is the present invention one The embodiment divided rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art are not doing Go out the every other embodiment obtained under creative work premise, all should belong to the scope of protection of the invention.
In description of the invention, claims and accompanying drawing, the term " first " of appearance, " second " and " the 3rd " etc. are to use In the object that difference is different, and it is not intended to describe specific order.Additionally, term " includes " and " having " and they are any Deformation, it is intended that cover non-exclusive comprising.Such as contain series of steps or the process of unit, method, system, product Or equipment is not limited to step or the unit listed, but the most also include step or the unit do not listed, or can Selection of land also includes other step intrinsic for these processes, method, product or equipment or unit.
A kind of method that the invention provides communication, described method includes: the first security terminal is sent out to the second security terminal Playing call request, described call request includes the first cryptographic key factor;Described first security terminal receives described second safety eventually The message of end feedback, described message includes the second cryptographic key factor;Described first security terminal utilizes preset algorithm to described One cryptographic key factor and described second cryptographic key factor carry out calculating to obtain call key;Described first security terminal is according to described logical Words key is encrypted voice communication with described second security terminal.
Refer to the schematic flow sheet that Fig. 1, Fig. 1 are the methods of a kind of communication that one embodiment of the invention provides.Wherein, As it is shown in figure 1, the method for a kind of communication of one embodiment of the present of invention offer includes herein below, wherein it is desired to point out It is that the executive agent of the method is security terminal, such as, can be smart mobile phone, panel computer, Intelligent wearable equipment, calculating Machines etc. have the electronic equipment of voice call function.
S101, the first security terminal initiate call request to the second security terminal, and described call request includes that first is close The key factor.
Wherein, described first security terminal is the initiator of call, and described second security terminal is the recipient of call.
Wherein, described first security terminal is initiated call request to the second security terminal and specifically be may include that working as first pacifies During full terminal call the second security terminal, first security terminal stochastic generation the first cryptographic key factor, the first security terminal is by described First cryptographic key factor is sent to the second security terminal.
Wherein, described first cryptographic key factor can be a string character and the telephone number of the first security terminal.
S102, described first security terminal receive the message of described second security terminal feedback, and described message includes the Two cryptographic key factors.
Wherein, described second cryptographic key factor can include a string character and the telephone number of the second security terminal.
S103, described first security terminal utilize preset algorithm to described first cryptographic key factor and described second cryptographic key factor Carry out calculating to obtain call key.
Wherein, optionally, described first security terminal utilizes preset algorithm to described first cryptographic key factor and described second Cryptographic key factor carries out calculating obtaining call key, including: described first security terminal by described first cryptographic key factor and described Second cryptographic key factor is input in hash function carry out calculating to obtain cryptographic Hash as parameter;Described first security terminal will obtain The cryptographic Hash taken is set to described call key.
S104, described first security terminal are encrypted voice according to described call key and described second security terminal and lead to Letter.
Wherein, optionally, described first security terminal adds with described second security terminal according to described call key Close voice communication, including: described first security terminal receives the voice messaging of user's input;Described first security terminal utilizes institute State voice messaging described in call double secret key to be encrypted to obtain encrypted voice data stream;Described first security terminal is to described Two security terminals send described encrypted voice data stream.
It can be seen that in the scheme of the embodiment of the present invention, the first security terminal initiates call request to the second security terminal, Described call request includes the first cryptographic key factor;Described first security terminal receives disappearing of described second security terminal feedback Breath, described message includes the second cryptographic key factor;Described first security terminal utilizes preset algorithm to described first cryptographic key factor Carry out calculating to obtain call key with described second cryptographic key factor;Described first security terminal is according to described call key and institute State the second security terminal and be encrypted voice communication.It is hereby understood that by implementing the technical scheme that the present invention provides, it is possible to according to The information that both call sides provides determines key, and then is encrypted call according to key, thus promotes call safety.
A kind of method that the invention provides communication, described method includes: the second security terminal receives the first security terminal Initiating call request, described call request includes the first cryptographic key factor;Described second security terminal is to described first safety eventually End feedback message, described message includes the second cryptographic key factor;Described second security terminal utilizes preset algorithm to described first Cryptographic key factor and described second cryptographic key factor carry out calculating to obtain call key;Described second security terminal is according to described call Key and described first security terminal are encrypted voice communication.
Optionally, a kind of method providing communication in another embodiment of the invention, described method includes: first eventually Holding and initiate call request to the second terminal, described call request includes the first cryptographic key factor;Described first terminal receives described The message of the second terminal feedback, described message includes the second cryptographic key factor;Described first terminal utilizes preset algorithm to described First cryptographic key factor and described second cryptographic key factor carry out calculating to obtain call key;Described first terminal is according to described call Key and described second terminal are encrypted voice communication.Wherein, described first terminal is according to described call key and described the Two terminals are encrypted voice communication, including: described first terminal receives the voice messaging of user's input;Described first terminal profit It is encrypted to obtain encrypted voice data stream with voice messaging described in described call double secret key;Described first terminal is to described Two terminals send described encrypted voice data stream.
Refer to the schematic flow sheet that Fig. 2, Fig. 2 are the methods of a kind of communication that an alternative embodiment of the invention provides. Wherein, as in figure 2 it is shown, a kind of method of communication that an alternative embodiment of the invention provides can include herein below, wherein, The executive agent that it is pointed out that the method is security terminal, such as, can be that smart mobile phone, panel computer, intelligence are dressed Formula equipment, computer etc. have the electronic equipment of voice call function.
S201, the second security terminal receive the call request that the first security terminal is initiated, and described call request includes the One cryptographic key factor.
Wherein, described first cryptographic key factor can include a string character and the telephone number of the first security terminal.
To described first security terminal feedback message, described message, S202, described second security terminal include that second is close The key factor.
Wherein, described second security terminal is specifically as follows to described first security terminal feedback message: when the second safety When terminal receives the calling of the first security terminal, second security terminal stochastic generation the second cryptographic key factor, the second security terminal Described second cryptographic key factor is sent to the first security terminal.
Wherein, described second cryptographic key factor can include a string character and the telephone number of the second security terminal.
S203, described second security terminal utilize preset algorithm to described first cryptographic key factor and described second cryptographic key factor Carry out calculating to obtain call key;
Wherein, described second security terminal utilizes preset algorithm to described first cryptographic key factor and described second cryptographic key factor Carry out calculating to obtain call key, including: described second security terminal is by described first cryptographic key factor and described second key The factor is input in hash function carry out calculating to obtain cryptographic Hash as parameter;The Hash that described second security terminal will obtain Value is set to described call key.
S204, described second security terminal are encrypted voice according to described call key and described first security terminal and lead to Letter.
It can be seen that in the scheme of the embodiment of the present invention, the second security terminal receives the first security terminal initiation call please Asking, described call request includes the first cryptographic key factor;Described second security terminal to described first security terminal feedback message, Described message includes the second cryptographic key factor;Described second security terminal utilizes preset algorithm to described first cryptographic key factor and institute State the second cryptographic key factor to carry out calculating to obtain call key;Described second security terminal is according to described call key and described the One security terminal is encrypted voice communication.It is hereby understood that by implementing the technical scheme that the present invention provides, it is possible to according to call The information that both sides provide determines key, and then is encrypted call according to key, thus promotes call safety.
Refer to the structural representation that Fig. 3, Fig. 3 are a kind of security terminals that one embodiment of the present of invention provides.Wherein, As it is shown on figure 3, a kind of security terminal 300 that one embodiment of the present of invention provides, wherein, this security terminal can be intelligence hands Machine, panel computer, Intelligent worn device etc. have the electronic equipment of communication function.This security terminal 300 includes initiating unit 301, unit 302, computing unit 303, coded communication unit 304 are received.
Initiating unit 301, for initiating call request to the second security terminal, described call request includes the first key The factor.
Receiving unit 302, for receiving the message of described second security terminal feedback, described message includes the second key The factor.
Computing unit 303, is used for utilizing preset algorithm to carry out described first cryptographic key factor and described second cryptographic key factor Calculate to obtain call key.
Wherein, described computing unit 303 includes computation subunit 3031 and arranges subelement 3032;Described computation subunit 3031, for being input in hash function calculate as parameter using described first cryptographic key factor and described second cryptographic key factor To obtain cryptographic Hash;Described subelement 3032 is set, for the cryptographic Hash of acquisition being set to described call key.
Coded communication unit 304, leads to for being encrypted voice according to described call key and described second security terminal Letter.
Wherein, optionally, described coded communication unit 304 includes receiving subelement 3041, encryption sub-unit operable 3042 and sending out Send subelement 3043;Described reception subelement 3041, for receiving the voice messaging of user's input;Described encryption sub-unit operable 3042, it is used for utilizing voice messaging described in described call double secret key to be encrypted to obtain encrypted voice data stream;Described transmission Subelement 3043, for sending described encrypted voice data stream to described second security terminal.
Wherein, initiate unit 301, reception unit 302, computing unit 303 and coded communication unit 304 to may be used for holding Method described in step S101 to S104 in row embodiment 1, specifically describes the detailed in Example 1 description to described method, at this Repeat no more.
Refer to the structural representation that Fig. 4, Fig. 4 are a kind of security terminals that an alternative embodiment of the invention provides.Its In, as shown in Figure 4, a kind of security terminal 400 that one embodiment of the present of invention provides, wherein, this security terminal 400 can be Smart mobile phone, panel computer, Intelligent worn device etc. have the electronic equipment of communication function.This security terminal 400 includes receiving Unit 401, transmitting element 402, computing unit 403 and coded communication unit 404.
Receiving unit 401, initiate call request for receiving the first security terminal, described call request includes that first is close The key factor;
Transmitting element 402, for described first security terminal feedback message, described message include the second key because of Son;
Computing unit 403, is used for utilizing preset algorithm to carry out described first cryptographic key factor and described second cryptographic key factor Calculate to obtain call key;
Wherein, described computing unit includes computation subunit 4031 and arranges subelement 4032: described computation subunit 4031, for being input in hash function calculate as parameter using described first cryptographic key factor and described second cryptographic key factor To obtain cryptographic Hash;Described subelement 4032 is set, for the cryptographic Hash of acquisition being set to described call key.
Coded communication unit 404, leads to for being encrypted voice according to described call key and described first security terminal Letter.
Wherein, receive unit 401, transmitting element 402, computing unit 403 and coded communication unit 404 to may be used for holding Method described in step S201 to S204 in row embodiment 2, specifically describes the detailed in Example 2 description to described method, at this Repeat no more.
Refer to Fig. 5, in another embodiment of the present invention, it is provided that a kind of security terminal.Described security terminal 500 wraps Include CPU501, memorizer 502, bus 503, display screen 504 hardware such as grade.Wherein, this security terminal 500 can be smart mobile phone, Panel computer, Intelligent worn device etc. support the electronic equipment of Wireless Fidelity online.
Wherein, CPU501 performs to be stored in advance in the program in memorizer 502, and this execution process specifically includes:
First security terminal to second security terminal initiate call request, described call request include the first key because of Son;
Described first security terminal receives the message of described second security terminal feedback, and described message includes the second key The factor;
Described first security terminal utilizes preset algorithm to carry out described first cryptographic key factor and described second cryptographic key factor Calculate to obtain call key;
Described first security terminal is encrypted voice communication according to described call key and described second security terminal.
Optionally, described first security terminal utilize preset algorithm to described first cryptographic key factor and described second key because of Son carries out calculating to obtain call key, and this execution process also includes:
Described first cryptographic key factor and described second cryptographic key factor are input to breathe out by described first security terminal as parameter Uncommon function carries out calculating to obtain cryptographic Hash;
The cryptographic Hash of acquisition is set to described call key by described first security terminal.
Optionally, described first security terminal is encrypted voice according to described call key and described second security terminal Communication, this execution process also includes:
Described first security terminal receives the voice messaging of user's input;
Described first security terminal utilizes voice messaging described in described call double secret key to be encrypted to obtain encryption voice Data stream;
Described first security terminal sends described encrypted voice data stream to described second security terminal.
It can be seen that in the scheme of the embodiment of the present invention, the first security terminal initiates call request to the second security terminal, Described call request includes the first cryptographic key factor;Described first security terminal receives disappearing of described second security terminal feedback Breath, described message includes the second cryptographic key factor;Described first security terminal utilizes preset algorithm to described first cryptographic key factor Carry out calculating to obtain call key with described second cryptographic key factor;Described first security terminal is according to described call key and institute State the second security terminal and be encrypted voice communication.It is hereby understood that by implementing the technical scheme that the present invention provides, it is possible to according to The information that both call sides provides determines key, and then is encrypted call according to key, thus promotes call safety.
Refer to Fig. 6, in another embodiment of the present invention, it is provided that a kind of security terminal.Described security terminal 500 wraps Include CPU601, memorizer 602, bus 603, display screen 604 hardware such as grade.Wherein, this security terminal 600 can be smart mobile phone, Panel computer, Intelligent worn device etc. support the electronic equipment of Wireless Fidelity online.
Wherein, CPU601 performs the program prestored in the memory 602, and this execution process specifically includes:
Second security terminal receive first security terminal initiate call request, described call request include the first key because of Son;
Described second security terminal to described first security terminal feedback message, described message include the second key because of Son;
Described second security terminal utilizes preset algorithm to carry out described first cryptographic key factor and described second cryptographic key factor Calculate to obtain call key;
Described second security terminal is encrypted voice communication according to described call key and described first security terminal.
Optionally, described second security terminal utilize preset algorithm to described first cryptographic key factor and described second key because of Son carries out calculating to obtain call key, and this execution process also includes:
Described first cryptographic key factor and described second cryptographic key factor are input to breathe out by described second security terminal as parameter Uncommon function carries out calculating to obtain cryptographic Hash;
The cryptographic Hash of acquisition is set to described call key by described second security terminal.
It can be seen that in the scheme of the embodiment of the present invention, the second security terminal receives the first security terminal initiation call please Asking, described call request includes the first cryptographic key factor;Described second security terminal to described first security terminal feedback message, Described message includes the second cryptographic key factor;Described second security terminal utilizes preset algorithm to described first cryptographic key factor and institute State the second cryptographic key factor to carry out calculating to obtain call key;Described second security terminal is according to described call key and described the One security terminal is encrypted voice communication.It is hereby understood that by implementing the technical scheme that the present invention provides, it is possible to according to call The information that both sides provide determines key, and then is encrypted call according to key, thus promotes call safety.
Referring to Fig. 7, the embodiment of the present invention also provides for a kind of communication system, and described system includes: the first security terminal 701 With described second security terminal 702.
First security terminal 701, for initiating call request to the second security terminal 702, described call request includes First cryptographic key factor;
Described second security terminal 702, is used for when receiving the call request that described first security terminal 701 sends, To described first security terminal 701 feedback message, described message includes the second cryptographic key factor;
Described first security terminal 701, is used for utilizing preset algorithm to described first cryptographic key factor and described second key The factor carries out calculating to obtain call key;
Described second security terminal 702, is used for utilizing preset algorithm to described first cryptographic key factor and described second key The factor carries out calculating to obtain call key;
Described first security terminal 701, for being encrypted with described second security terminal 702 according to described call key Voice communication
Optionally, in some possible embodiments of the present invention, described first security terminal 701 and described second safety Terminal 702 also has binding relationship with wearable device;Described first security terminal 701 and described second security terminal 702 are also For, send described call request to described wearable device, in order to described wearable device enters based on described call request Row speech scrambling operates.
In Fig. 7 mainly as a example by the first security terminal and the second security terminal are as smart mobile phone.
It is understood that the function of first security terminal 701 of the present embodiment and the second security terminal 702 can be according to upper The method stated in embodiment of the method implements, and it implements process and is referred to the associated description of said method embodiment, Here is omitted.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not has the portion described in detail in certain embodiment Point, may refer to the associated description of other embodiments.
In several embodiments provided herein, it should be understood that disclosed device, can be by another way Realize.Such as, device embodiment described above is only schematically, and the division of the most described unit is only one Logic function divides, actual can have when realizing other dividing mode, the most multiple unit or assembly can in conjunction with or can To be integrated into another system, or some features can be ignored, or does not performs.Another point, shown or discussed each other Coupling direct-coupling or communication connection can be the INDIRECT COUPLING by some interfaces, device or unit or communication connection, Can be being electrical or other form.
The described unit illustrated as separating component can be or may not be physically separate, shows as unit The parts shown can be or may not be physical location, i.e. may be located at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected according to the actual needs to realize the mesh of the present embodiment scheme 's.
It addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it is also possible to It is that unit is individually physically present, it is also possible to two or more unit are integrated in a unit.Above-mentioned integrated list Unit both can realize to use the form of hardware, it would however also be possible to employ the form of SFU software functional unit realizes.
If described integrated unit realizes and as independent production marketing or use using the form of SFU software functional unit Time, can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially The part that in other words prior art contributed or this technical scheme completely or partially can be with the form of software product Embodying, this computer software product is stored in a storage medium, including some instructions with so that a computer Equipment (can be for personal computer, server or the network equipment etc.) perform the whole of method described in each embodiment of the present invention or Part steps.And aforesaid storage medium includes: USB flash disk, read only memory (ROM, Read-Only Memory), random access memory are deposited Reservoir (RAM, Random Access Memory), portable hard drive, magnetic disc or CD etc. are various can store program code Medium.
The above, above example only in order to technical scheme to be described, is not intended to limit;Although with reference to front State embodiment the present invention has been described in detail, it will be understood by those within the art that: it still can be to front State the technical scheme described in each embodiment to modify, or wherein portion of techniques feature is carried out equivalent;And these Amendment or replacement, do not make the essence of appropriate technical solution depart from the scope of various embodiments of the present invention technical scheme.

Claims (11)

1. the method for a communication, it is characterised in that described method includes:
First terminal initiates call request to the second terminal, and described call request includes the first cryptographic key factor;
Described first terminal receives the message of described second terminal feedback, and described message includes the second cryptographic key factor;
Described first terminal utilizes preset algorithm to calculate to obtain to described first cryptographic key factor and described second cryptographic key factor Take call key;
Described first terminal is encrypted voice communication according to described call key and described second terminal.
Method the most according to claim 1, it is characterised in that described first terminal utilizes preset algorithm to described first close The key factor and described second cryptographic key factor carry out calculating to obtain call key, including:
Described first cryptographic key factor and described second cryptographic key factor are input in hash function by described first terminal as parameter Carry out calculating to obtain cryptographic Hash;
The cryptographic Hash of acquisition is set to described call key by described first terminal.
Method the most according to claim 1 and 2, it is characterised in that described first terminal is according to described call key and institute State the second terminal and be encrypted voice communication, including:
Described first terminal receives the voice messaging of user's input;
Described first terminal utilizes voice messaging described in described call double secret key to be encrypted to obtain encrypted voice data stream;
Described first terminal sends described encrypted voice data stream to described second terminal.
4. the method for a communication, it is characterised in that described method includes:
Second terminal receives first terminal and initiates call request, and described call request includes the first cryptographic key factor;
Described second terminal includes the second cryptographic key factor to described first terminal feedback message, described message;
Described second terminal utilizes preset algorithm to calculate to obtain to described first cryptographic key factor and described second cryptographic key factor Take call key;
Described second terminal is encrypted voice communication according to described call key and described first terminal.
Method the most according to claim 4, it is characterised in that described second terminal utilizes preset algorithm to described first close The key factor and described second cryptographic key factor carry out calculating to obtain call key, including:
Described first cryptographic key factor and described second cryptographic key factor are input in hash function by described second terminal as parameter Carry out calculating to obtain cryptographic Hash;
The cryptographic Hash of acquisition is set to described call key by described second terminal.
6. a security terminal, it is characterised in that described security terminal includes:
Initiating unit, for initiating call request to the second security terminal, described call request includes the first cryptographic key factor;
Receiving unit, for receiving the message of described second security terminal feedback, described message includes the second cryptographic key factor;
Computing unit, is used for utilizing preset algorithm to calculate to obtain to described first cryptographic key factor and described second cryptographic key factor Take call key;
Coded communication unit, for being encrypted voice communication according to described call key and described second security terminal.
Security terminal the most according to claim 6, it is characterised in that described computing unit includes computation subunit and setting Subelement;
Described computation subunit, for being input to Hash using described first cryptographic key factor and described second cryptographic key factor as parameter Function is carried out calculate to obtain cryptographic Hash;
Described subelement is set, for the cryptographic Hash of acquisition being set to described call key.
8. according to the security terminal described in claim 6 or 7, it is characterised in that it is single that described coded communication unit includes receiving son Unit, encryption sub-unit operable and transmission subelement;
Described reception subelement, for receiving the voice messaging of user's input;
Described encryption sub-unit operable, is used for utilizing voice messaging described in described call double secret key to be encrypted to obtain encryption voice number According to stream;
Described transmission subelement, for sending described encrypted voice data stream to described second security terminal.
9. a security terminal, it is characterised in that described security terminal includes:
Receiving unit, initiate call request for receiving the first security terminal, described call request includes the first cryptographic key factor;
Transmitting element, for described first security terminal feedback message, described message includes the second cryptographic key factor;
Computing unit, is used for utilizing preset algorithm to calculate to obtain to described first cryptographic key factor and described second cryptographic key factor Take call key;
Coded communication unit, for being encrypted voice communication according to described call key and described first security terminal.
Security terminal the most according to claim 9, it is characterised in that described computing unit includes computation subunit and sets Put subelement:
Described computation subunit, for being input to Hash using described first cryptographic key factor and described second cryptographic key factor as parameter Function is carried out calculate to obtain cryptographic Hash;
Described subelement is set, for the cryptographic Hash of acquisition being set to described call key.
11. 1 kinds of communication systems, described system includes the first security terminal and the second security terminal, it is characterised in that
Described first terminal, for second security terminal initiate call request, described call request include the first key because of Son;
Described second terminal, for when receiving the call request that described first security terminal sends, to described first terminal Feedback message, described message includes the second cryptographic key factor;
Described first security terminal, is used for utilizing preset algorithm to carry out described first cryptographic key factor and described second cryptographic key factor Calculate to obtain call key;
Described second security terminal, is used for utilizing preset algorithm to carry out described first cryptographic key factor and described second cryptographic key factor Calculate to obtain call key;
Described first security terminal, for being encrypted voice communication according to described call key and described second security terminal.
CN201610781260.6A 2016-08-30 2016-08-30 Communication method and system, and secure terminal Pending CN106330436A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610781260.6A CN106330436A (en) 2016-08-30 2016-08-30 Communication method and system, and secure terminal
PCT/CN2016/107961 WO2018040330A1 (en) 2016-08-30 2016-11-30 Communication method, secure terminal, and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610781260.6A CN106330436A (en) 2016-08-30 2016-08-30 Communication method and system, and secure terminal

Publications (1)

Publication Number Publication Date
CN106330436A true CN106330436A (en) 2017-01-11

Family

ID=57789576

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610781260.6A Pending CN106330436A (en) 2016-08-30 2016-08-30 Communication method and system, and secure terminal

Country Status (2)

Country Link
CN (1) CN106330436A (en)
WO (1) WO2018040330A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101997676A (en) * 2009-08-28 2011-03-30 中国移动通信集团公司 VoIP voice encryption protection method, node and system
CN102257842A (en) * 2008-12-17 2011-11-23 交互数字专利控股公司 Enhanced security for direct link communications
CN102938696A (en) * 2011-08-15 2013-02-20 国民技术股份有限公司 Generating method of session key and module
CN104158567A (en) * 2014-07-25 2014-11-19 天地融科技股份有限公司 Pairing method and system and data interaction method and system for Bluetooth equipment
CN104868994A (en) * 2015-05-26 2015-08-26 北京数字认证股份有限公司 Collaboration secret key management method, device and system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8259949B2 (en) * 2008-05-27 2012-09-04 Intel Corporation Methods and apparatus for protecting digital content
CN103973696B (en) * 2014-05-16 2017-09-19 天地融科技股份有限公司 A kind of data processing method of voice call
CN105634737B (en) * 2014-10-31 2020-03-20 腾讯科技(深圳)有限公司 Data transmission method, terminal and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102257842A (en) * 2008-12-17 2011-11-23 交互数字专利控股公司 Enhanced security for direct link communications
CN101997676A (en) * 2009-08-28 2011-03-30 中国移动通信集团公司 VoIP voice encryption protection method, node and system
CN102938696A (en) * 2011-08-15 2013-02-20 国民技术股份有限公司 Generating method of session key and module
CN104158567A (en) * 2014-07-25 2014-11-19 天地融科技股份有限公司 Pairing method and system and data interaction method and system for Bluetooth equipment
CN104868994A (en) * 2015-05-26 2015-08-26 北京数字认证股份有限公司 Collaboration secret key management method, device and system

Also Published As

Publication number Publication date
WO2018040330A1 (en) 2018-03-08

Similar Documents

Publication Publication Date Title
CA2830283C (en) Interrogating an authentication device
CN103856640B (en) Method and system for processing user resource information
US20170331819A1 (en) System and method for enabling secure authentication
CN105814591A (en) Verification information transmission method and terminal
CN104683591A (en) Message disturbance-free method based on mobile terminal and mobile terminal using method
CN104079581A (en) Identity authentication method and device
CN109493043A (en) The blocking method, apparatus of transaction record, electronic equipment and storage medium
CN103942676A (en) Mobile payment method and system
CN105915978A (en) Vehicle-mounted display control method and device thereof
CN103853993A (en) Information processing method and electronic equipment
CN104954126A (en) Sensitive operation verification method, device and system
US20140045467A1 (en) Method and apparatus for recording information during a call
CN106445743A (en) Data backup transmission method and mobile terminal
CN107315658A (en) A kind of data back up method and device, computer installation and readable storage medium storing program for executing
CN104598245B (en) The method, device and mobile terminal of chat
CN104113836B (en) A kind of method of encryption of conversing, communication terminal and base station
CN104022873A (en) Offline dynamic identifying code generating method
CN108763976B (en) Information display method based on double screens, mobile terminal and storage medium
CN105516933A (en) Message processing method, message processing device, mobile terminal and server
CN106330436A (en) Communication method and system, and secure terminal
CN204463209U (en) A kind of two generation USBKey devices using carrier network to transmit data
CN103957104A (en) Dynamic token anti-phishing method and device
CN104765538A (en) Information handling method and terminal
CN104683586A (en) Method and terminal for information display
CN111178893B (en) Anti-theft safety authentication method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170111