CN101043476B - Process, equipment and system for preventing user information from interception - Google Patents
Process, equipment and system for preventing user information from interception Download PDFInfo
- Publication number
- CN101043476B CN101043476B CN200710064327A CN200710064327A CN101043476B CN 101043476 B CN101043476 B CN 101043476B CN 200710064327 A CN200710064327 A CN 200710064327A CN 200710064327 A CN200710064327 A CN 200710064327A CN 101043476 B CN101043476 B CN 101043476B
- Authority
- CN
- China
- Prior art keywords
- media gateway
- user profile
- module
- encryption
- ntfy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The provided method for preventing user message from eavesdropping comprises: MGW extracts user message from detected DTMF signal to encipher and report the NTFY_REQ carrying enciphered user message to MGC; the latter extracts the enciphered message to decipher and obtain user message. Wherein, the MGW comprises a detection module, an extract module, an enciphering module, and a reporting module; the MGC comprises a receiving module and a deciphering module. This invention overcomes defects in prior art, and realizes protection for user message.
Description
Technical field
The present invention relates to field of network communication, particularly user profile anti-eavesdrop technology.
Background technology
In initial IP phone gateway design, the encoding and decoding of signaling process, address transition, voice flow and transmission all realize in same equipment.Because the function of gateway is too concentrated, it is complicated to cause equipment to realize, disposal ability reduces, and becomes the bottleneck of IP telephony network easily, and is unfavorable for the intercommunication between different vendor's product.In order to address this problem, the notion that gateway decomposes has been proposed, gateway function is decomposed into calls out control (high level) and resource management/medium processing (low layer) two parts.High level is made intelligent management to calling, and the operation of indication low layer, also can finish the function of signaling conversion when needed, perhaps isolates independent signaling conversion portion in addition again.Gateway function decomposes the back high-level device and low layer equipment is called MGC (MediaGateway Controller, Media Gateway Controller) equipment and MGW (Media Gateway, media gateway) equipment.
Media gateway is subjected to the control of soft switch, the action of its overwhelming majority, particularly relevant with business action all is to finish under the control of soft switch, selection as coding, compression algorithm, call establishment, release, the distribution of resource and release, the detection of distinctive signal and processing etc., these actions are all finished by the control of (MGCP) message H.248.MGC is with after MGW separates, and needs the user profile of collecting in the miscellaneous service process, as PIN code (Personal IdentificationNumber, personal identification code), need detect under the control of MGC by MGW, and send to MGC by message H.248.
Referring to Fig. 1, the flow process of collecting user's PIN code on MGC and MGW interface is as follows:
(1) MGC issues ADD_REQ (increasing request) message and sets up the end points that the speech business carrying needs to MGW, this end points can be TDM (Time Division Multiplexing, time division multiplexing), any form among IP or the ATM (Asynchronous TransferMode, asynchronous transfer mode);
(2) MGW returns ADD_REPLY (response increases request) message and gives MGC;
(3) MGC issues MOD_REQ (revising request) message (be and detect request event) herein and gives MGW, require MGW on the end points of appointment, to detect DTMF (the Dual Tone Multipe Frequency that comprises user's PIN code, dual-tone multifrequency) signal, and require MGW after detecting dtmf signal, to report, MGC also can require MGW to broadcast voice suggestion simultaneously, and the prompting user imports PIN code information;
(4) MGW returns MOD_REPLY (response modification request) message and gives MGC;
(5) MGW inserts the detection resource of DTMF incident on specified endpoint, when detecting first dtmf signal, gives MGC by NTFY_REQ (notice request) message report;
(6) MGC returns NTFY_REPLY (response notice request) message and gives response confirmation;
When (7) MGW detects second dtmf signal, give MGC by the NTFY_REQ message report;
(8) MGC returns the NTFY_REPLY response message and gives response confirmation;
So repeat, MGW reports MGC with the dtmf signal of collecting (comprising user's PIN code information).
Referring to Fig. 2, user's PIN code information is to carry by the VALUE cell in the parameter of above-mentioned NTFY_REQ message (being the Notify order).The VALUE cell has two kinds of coded systems: binary coding mode and text code mode.After MGW detects dtmf signal, extract user's PIN code information, and, report MGC by NTFY_REQ then with the VALUE cell in the user's PIN code information structuring NTFY_REQ message that extracts; After MGC receives, resolve the VALUE cell in the NTFY_REQ message, extract user's PIN code information.
In the present prior art H.248 agreement regulation adopt IPSec (IP Security Protocol, IP security protocol) mechanism or transitional AH (Authentication Header, authentication header) scheme prevent that undelegated entity from setting up illegal calling or influence is called out normally.Employing IPSec mechanism can be set up data channel that encrypt, reliable between two end points of permission communication; but IPSec mechanism needs the support of bottom IP network; depend on the bottom IP network; when having only two end points and middle transmission network all to support IPSec mechanism, could realize the protection of end-to-end user profile.The AH scheme provides data source authentication and data integrity check by increasing secure fields for IP communication; it can protect communication to avoid distorting; but encrypted transmission content not; if the third party intercepts NTFY_REQ message; then be easy to parse user's information; as PIN code, can cause user profile stolen.
Summary of the invention
Be directed to this, the embodiment of the invention provides a kind of method that prevents that user profile from being eavesdropped.
Described method comprises:
MGW extracts user profile from detected dtmf signal, described user profile is encrypted, user profile after in NTFY_REQ message, carrying encryption, give MGC with described NTFY_REQ information reporting, after described MGC receives described NTFY_REQ message, extract the user profile after the described encryption, be decrypted and obtain described user profile.
The embodiment of the invention also provides a kind of media gateway, and described media gateway comprises:
Detection module is used to detect dtmf signal;
Extraction module is used for extracting user profile from the detected dtmf signal of described detection module;
Encrypt and reporting module, be used for the user profile that described extraction module obtains is encrypted, in NTFY_REQ message, carry the user profile after the described encryption, give Media Gateway Controller described NTFY_REQ information reporting.
The embodiment of the invention also provides a kind of Media Gateway Controller, and described Media Gateway Controller comprises:
Receiver module is used for the NTFY_REQ message that the receiving media gateway sends, and carries the user profile after the encryption in the described NTFY_REQ message, and described user profile is that described media gateway is extracted from detected dtmf signal;
Deciphering module is used for extracting user profile after the encryption from the NTFY_REQ message that described receiver module is received, is decrypted and obtains user profile.
In addition, the embodiment of the invention also provides a kind of system for carrying out said process that realizes.
A kind of system that prevents that user profile from being eavesdropped, described system comprises media gateway and Media Gateway Controller, described media gateway comprises:
Detection module is used to detect dtmf signal;
Extraction module is used for extracting user profile from the detected dtmf signal of described detection module;
Encrypt and reporting module, be used for the user profile that described extraction module obtains is encrypted, in NTFY_REQ message, carry the user profile after the described encryption, give described Media Gateway Controller described NTFY_REQ information reporting.
Described Media Gateway Controller comprises:
Receiver module is used to receive the NTFY_REQ message that described media gateway sends;
Deciphering module is used for extracting user profile after the encryption from the NTFY_REQ message that described receiver module is received, is decrypted and obtains user profile.
The embodiment of the invention realizes the protection to user profile by in the mode of user profile being encrypted and be decrypted on the MGW on MGC, prevent that MGW and MGC user profile in message interaction process from being eavesdropped.
Description of drawings
Fig. 1 is the schematic flow sheet that MGC and MGW collect user's PIN code in the prior art;
Fig. 2 is the schematic flow sheet that transmits user's PIN code information in the prior art between MGW and the MGC;
Fig. 3 is that the embodiment of the invention prevents the method flow diagram that user profile is eavesdropped;
Fig. 4 is the schematic flow sheet that transmits user's PIN code information between embodiment of the invention MGW and the MGC;
Fig. 5 is the structure chart of embodiment of the invention MGW;
Fig. 6 is the structure chart of embodiment of the invention MGC;
Fig. 7 is that the embodiment of the invention prevents the system construction drawing that user profile is eavesdropped.
Embodiment
The invention will be further described below in conjunction with the drawings and specific embodiments, but the present invention is not limited to the following examples.
The embodiment of the invention realizes the protection to user profile by in the mode of user profile being encrypted and be decrypted on the MGW on MGC, prevent that MGW and MGC user profile in message interaction process from being eavesdropped.
Present embodiment is that user's PIN code is an example with user profile, the MGC issuing message is set up the end points that the speech business carrying needs to MGW, obtain issuing after the response that MGW returns and detect request event and give MGW, require MGW on the end points of appointment, to detect the dtmf signal that comprises user's PIN code; Return response message after MGW receives and on specified endpoint, insert the detection resource of DTMF incident.Referring to Fig. 3 and Fig. 4, the embodiment of the invention provides a kind of method that prevents that user profile from being eavesdropped, and specifically may further comprise the steps:
Step 101: when MGW detects dtmf signal, from dtmf signal, extract user's PIN code information;
The VALUE cell of step 102:MGW in the user's PIN code information structuring NTFY_REQ message that obtains;
Step 103:MGW carries out cryptographic operation to the VALUE cell of constructing, and the NTFY_REQ information reporting that will comprise the VALUE cell after the encryption is then given MGC;
After step 104:MGC receives NTFY_REQ message, return the NTFY_REPLY response message and give MGW, and read the VALUE cell in the NTFY_REQ message, this VALUE cell is decrypted operation;
Step 105:MGC extracts user's PIN code information from the VALUE cell after the deciphering.
The operation of above-mentioned encryption and decryption can have following dual mode:
1) the encryption and decryption algorithm is open, the mode that key is privately owned
Key is configuration respectively on MGW and MGC, guarantees unanimity, and has only MGC and MGW to know key; Cryptographic algorithm and decipherment algorithm all are disclosed;
2) the encryption and decryption algorithm is privately owned, does not need the mode of key
Dispose cryptographic algorithm on MGW, dispose decipherment algorithm on MGC, cryptographic algorithm and decipherment algorithm are underground, have only MGW and MGC to know, do not need key during encryption and decryption.
The embodiment of the invention can also be carried in MGC is handed down to the MOD_REQ message of MGW needs the sign encrypted, MGW is after receiving MOD_REQ message, judge whether the sign that needs encryption is arranged in this message, if have, then carry out the operation of encrypting, otherwise do not encrypt, and handle by the handling process of standard.
Referring to Fig. 5, the embodiment of the invention also provides a kind of media gateway, specifically comprises:
(1) detection module is used to detect dtmf signal;
(2) extraction module is used for extracting user profile from the detected dtmf signal of detection module;
(3) encrypt and reporting module, be used for the user profile that extraction module obtains is encrypted, the user profile carry encryption in NTFY_REQ message after is given Media Gateway Controller with the NTFY_REQ information reporting.
Above-mentioned encryption and reporting module specifically comprise:
1) ciphering unit, the user profile that is used for obtaining with extraction module is constructed the VALUE cell of NTFY_REQ message, and the VALUE cell is encrypted;
2) report the unit, be used for giving Media Gateway Controller the NTFY_REQ information reporting after encrypting.
Above-mentioned encryption and reporting module can be used disclosed cryptographic algorithm, and correspondingly, above-mentioned media gateway also comprises:
Configuration module is used to dispose private cipher key.
Above-mentioned media gateway can also comprise:
Configuration module is used to dispose privately owned cryptographic algorithm.
Above-mentioned media gateway can also comprise:
The identification (RNC-ID) analytic module is used for the MOD_REQ message that the receiving media gateway controller issues, and judges whether the sign that needs encryption is arranged in the MOD_REQ message.
Referring to Fig. 6, the embodiment of the invention also provides a kind of Media Gateway Controller, specifically comprises:
(1) receiver module is used for the NTFY_REQ message that the receiving media gateway sends;
(2) deciphering module is used for extracting user profile after the encryption from the NTFY_REQ message that receiver module is received, is decrypted and obtains user profile.
Above-mentioned deciphering module can use disclosed decipherment algorithm, and correspondingly, above-mentioned Media Gateway Controller also comprises:
Configuration module is used to dispose private cipher key.
Above-mentioned Media Gateway Controller can also comprise:
Configuration module is used to dispose privately owned decipherment algorithm.
Above-mentioned Media Gateway Controller also comprises:
The encryption identification module is used for when needs are encrypted, and carries the sign that needs encryption in being handed down to the MOD_REQ message of media gateway.
Referring to Fig. 7, the embodiment of the invention also provides a kind of system that prevents that user profile from being eavesdropped, and specifically comprises media gateway and Media Gateway Controller, and media gateway comprises:
(1) detection module is used to detect dtmf signal;
(2) extraction module is used for extracting user profile from the detected dtmf signal of detection module;
(3) encrypt and reporting module, be used for the user profile that extraction module obtains is encrypted, the user profile carry encryption in NTFY_REQ message after is given Media Gateway Controller with the NTFY_REQ information reporting.
Media Gateway Controller comprises:
(1) receiver module is used for the NTFY_REQ message that the receiving media gateway sends;
(2) deciphering module is used for extracting user profile after the encryption from the NTFY_REQ message that receiver module is received, is decrypted and obtains user profile.
Above-mentioned encryption and reporting module specifically comprise:
1) ciphering unit, the user profile that is used for obtaining with extraction module is constructed the VALUE cell of NTFY_REQ message, and the VALUE cell is encrypted;
3) report the unit, be used for giving Media Gateway Controller the NTFY_REQ information reporting.
Above-mentioned encryption and reporting module can be used disclosed cryptographic algorithm, and deciphering module can use disclosed decipherment algorithm, and correspondingly, above-mentioned media gateway also comprises configuration module, is used to dispose private cipher key; Above-mentioned Media Gateway Controller also comprises configuration module, is used to dispose the identical private cipher key of private cipher key that disposes with above-mentioned media gateway.
Above-mentioned media gateway can also comprise configuration module, is used to dispose privately owned cryptographic algorithm; Correspondingly, above-mentioned Media Gateway Controller also comprises configuration module, is used to dispose the corresponding privately owned decipherment algorithm of privately owned cryptographic algorithm that disposes with above-mentioned media gateway.
In order to increase the flexibility of system, above-mentioned Media Gateway Controller can also comprise:
The encryption identification module is used for when needs are encrypted, and carries the sign that needs encryption in being handed down to the MOD_REQ message of above-mentioned media gateway;
Correspondingly, above-mentioned media gateway also comprises:
The identification (RNC-ID) analytic module is used for after receiving the MOD_REQ message that above-mentioned Media Gateway Controller is sent, and judges whether the described sign that needs encryption is arranged in the MOD_REQ message.
The embodiment of the invention can utilize software to realize, as realizing that with Programming with Pascal Language such as C, C++, VB or JAVA corresponding software can be stored in the storage medium that can read, in the hard disk or internal memory as MGC or MGW.
The embodiment of the invention has realized the protection to user profile by in the mode of user profile being encrypted and be decrypted on the MGW on MGC, prevent that MGW and MGC user profile in message interaction process from being eavesdropped; Can adopt the mode that the encryption and decryption algorithm is open, key is privately owned in the implementation procedure, also can adopt the encryption and decryption algorithm privately owned, do not need the mode of key, encrypt the flexibility that realizes thereby improved; Even illegal third party intercepts NTFY_REQ message,, be difficult to get access to user profile owing to do not know key or decipherment algorithm; Select whether to encrypt according to the sign that in MOD_REQ message, whether carries the needs encryption, can satisfy the demand for security of the user profile of different significance levels, improved application flexibility.
Above-described embodiment is a more preferably embodiment of the present invention, and common variation that those skilled in the art carries out in the technical solution of the present invention scope and replacement all should be included in protection scope of the present invention.
Claims (19)
1. a method that prevents that user profile from being eavesdropped is characterized in that, described method comprises:
Media gateway MGW extracts user profile from detected dual tone multi-frequency dtmf signal, described user profile is encrypted, user profile after in notice request NTFY_REQ message, carrying encryption, give media gateway controller MGC with described NTFY_REQ information reporting, after described MGC receives described NTFY_REQ message, extract the user profile after the described encryption, be decrypted and obtain described user profile.
2. the method that prevents that user profile from being eavesdropped according to claim 1 is characterized in that described MGW encrypts described user profile, and the step of the user profile carry encryption in NTFY_REQ message after is specially:
Described MGW constructs VALUE cell in the described NTFY_REQ message with described user profile, and described VALUE cell is encrypted.
3. the method that prevents that user profile from being eavesdropped according to claim 1 is characterized in that described method is used disclosed cryptographic algorithm and decipherment algorithm, and described method also comprises:
On described MGW and MGC, dispose identical private cipher key respectively.
4. the method that prevents that user profile from being eavesdropped according to claim 1 is characterized in that, described method also comprises:
The privately owned cryptographic algorithm of configuration on described MGW, the privately owned decipherment algorithm of configuration on described MGC.
5. the method that prevents that user profile from being eavesdropped according to claim 1 is characterized in that, described method also comprises:
Whether described MGC carries in being handed down to the MOD_REQ message of described MGW needs the sign encrypted, and whether described MGW carries out the operation of encryption according to described sign decision after receiving described MOD_REQ message.
6. a media gateway is characterized in that, described media gateway comprises:
Detection module is used to detect the dual tone multi-frequency dtmf signal;
Extraction module is used for extracting user profile from the detected dtmf signal of described detection module;
Encrypt and reporting module, be used for the user profile that described extraction module obtains is encrypted, the user profile carry described encryption in notice request NTFY_REQ message after is given Media Gateway Controller with described NTFY_REQ information reporting.
7. media gateway according to claim 6 is characterized in that, described encryption and reporting module specifically comprise:
Ciphering unit is used for constructing with the user profile that described extraction module obtains the VALUE cell of described NTFY_REQ message, and described VALUE cell is encrypted;
Report the unit, be used for giving Media Gateway Controller the NTFY_REQ information reporting after the described encryption.
8. media gateway according to claim 6 is characterized in that described encryption and reporting module are used disclosed cryptographic algorithm, and described media gateway also comprises:
Configuration module is used to dispose private cipher key.
9. media gateway according to claim 6 is characterized in that, described media gateway also comprises:
Configuration module is used to dispose privately owned cryptographic algorithm.
10. media gateway according to claim 6 is characterized in that, described media gateway also comprises:
The identification (RNC-ID) analytic module is used for the MOD_REQ message that the receiving media gateway controller issues, and judges whether the sign that needs encryption is arranged in the described MOD_REQ message.
11. a Media Gateway Controller is characterized in that, described Media Gateway Controller comprises:
Receiver module is used for the notice request NTFY_REQ message that the receiving media gateway sends, and carries the user profile after the encryption in the described NTFY_REQ message, and described user profile is that described media gateway is extracted from detected dual tone multi-frequency dtmf signal;
Deciphering module is used for extracting user profile after the encryption from the NTFY_REQ message that described receiver module is received, is decrypted and obtains user profile.
12. Media Gateway Controller according to claim 11 is characterized in that, described deciphering module uses disclosed decipherment algorithm, and described Media Gateway Controller also comprises:
Configuration module is used to dispose private cipher key.
13. Media Gateway Controller according to claim 11 is characterized in that, described Media Gateway Controller also comprises:
Configuration module is used to dispose privately owned decipherment algorithm.
14. Media Gateway Controller according to claim 11 is characterized in that, described Media Gateway Controller also comprises:
The encryption identification module is used for when needs are encrypted, and carries the sign that needs encryption in being handed down to the MOD_REQ message of described media gateway.
15. a system that prevents that user profile from being eavesdropped is characterized in that described system comprises media gateway and Media Gateway Controller, described media gateway comprises:
Detection module is used to detect the dual tone multi-frequency dtmf signal;
Extraction module is used for extracting user profile from the detected dtmf signal of described detection module;
Encrypt and reporting module, be used for the user profile that described extraction module obtains is encrypted, the user profile carry described encryption in notice request NTFY_REQ message after is given described Media Gateway Controller with described NTFY_REQ information reporting.
Described Media Gateway Controller comprises:
Receiver module is used to receive the NTFY_REQ message that described media gateway sends;
Deciphering module is used for extracting user profile after the encryption from the NTFY_REQ message that described receiver module is received, is decrypted and obtains user profile.
16. the system that prevents that user profile from being eavesdropped according to claim 15 is characterized in that, described encryption and reporting module specifically comprise:
Ciphering unit is used for constructing with the user profile that described extraction module obtains the VALUE cell of described NTFY_REQ message, and described VALUE cell is encrypted;
Report the unit, be used for giving described Media Gateway Controller the NTFY_REQ information reporting after the described encryption.
17. the system that prevents that user profile from being eavesdropped according to claim 15 is characterized in that described encryption and reporting module are used disclosed cryptographic algorithm, described deciphering module uses disclosed decipherment algorithm, and described media gateway also comprises:
Configuration module is used to dispose private cipher key;
Described Media Gateway Controller also comprises:
Configuration module is used to dispose the identical private cipher key of private cipher key that disposes with described media gateway.
18. the system that prevents that user profile from being eavesdropped according to claim 15 is characterized in that, described media gateway also comprises:
Configuration module is used to dispose privately owned cryptographic algorithm;
Described Media Gateway Controller also comprises:
Configuration module is used to dispose the corresponding privately owned decipherment algorithm of privately owned cryptographic algorithm that disposes with described media gateway.
19. the system that prevents that user profile from being eavesdropped according to claim 15 is characterized in that, described Media Gateway Controller also comprises:
The encryption identification module is used for when needs are encrypted, and carries the sign that needs encryption in being handed down to the MOD_REQ message of described media gateway;
Described media gateway also comprises:
The identification (RNC-ID) analytic module is used for after receiving the MOD_REQ message that described Media Gateway Controller is sent, and judges whether the described sign that needs encryption is arranged in the described MOD_REQ message.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200710064327A CN101043476B (en) | 2007-03-12 | 2007-03-12 | Process, equipment and system for preventing user information from interception |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200710064327A CN101043476B (en) | 2007-03-12 | 2007-03-12 | Process, equipment and system for preventing user information from interception |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101043476A CN101043476A (en) | 2007-09-26 |
CN101043476B true CN101043476B (en) | 2010-05-19 |
Family
ID=38808673
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200710064327A Expired - Fee Related CN101043476B (en) | 2007-03-12 | 2007-03-12 | Process, equipment and system for preventing user information from interception |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101043476B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110177350B (en) * | 2019-05-27 | 2020-10-27 | 清华大学 | Distributed anti-eavesdrop sparse signal detection method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1551557A (en) * | 2003-05-19 | 2004-12-01 | 日本电气株式会社 | Cryptographic communication method in communication system |
CN1571409A (en) * | 2003-07-25 | 2005-01-26 | 华为技术有限公司 | A method of safety authentication between media gateway and media gateway controller |
CN1878399A (en) * | 2005-11-29 | 2006-12-13 | 华为技术有限公司 | Method for carrying out encryption transfer on 2833 information in CDMA |
CN1889700A (en) * | 2005-06-29 | 2007-01-03 | 华为技术有限公司 | Content transmitting method in media gate control protocol calling |
-
2007
- 2007-03-12 CN CN200710064327A patent/CN101043476B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1551557A (en) * | 2003-05-19 | 2004-12-01 | 日本电气株式会社 | Cryptographic communication method in communication system |
CN1571409A (en) * | 2003-07-25 | 2005-01-26 | 华为技术有限公司 | A method of safety authentication between media gateway and media gateway controller |
CN1889700A (en) * | 2005-06-29 | 2007-01-03 | 华为技术有限公司 | Content transmitting method in media gate control protocol calling |
CN1878399A (en) * | 2005-11-29 | 2006-12-13 | 华为技术有限公司 | Method for carrying out encryption transfer on 2833 information in CDMA |
Non-Patent Citations (2)
Title |
---|
秦开涌.NGN架构中保证和提高网关语音质量的研究.中国优秀博硕士学位论文全文数据库(硕士)信息科技辑 8.2006,(8),31-37. |
秦开涌.NGN架构中保证和提高网关语音质量的研究.中国优秀博硕士学位论文全文数据库(硕士)信息科技辑 8.2006,(8),31-37. * |
Also Published As
Publication number | Publication date |
---|---|
CN101043476A (en) | 2007-09-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101197674B (en) | Encrypted communication method, server and encrypted communication system | |
KR100372495B1 (en) | Method and system for securely transferring a data set in a data communications system | |
US7284123B2 (en) | Secure communication system and method for integrated mobile communication terminals comprising a short-distance communication module | |
RU2495532C2 (en) | Method and apparatus for end-to-end encrypted communication | |
CN101720071A (en) | Short message two-stage encryption transmission and secure storage method based on safety SIM card | |
CN102202299A (en) | Realization method of end-to-end voice encryption system based on 3G/B3G | |
CN107094138B (en) | A kind of smart home safe communication system and communication means | |
CN101909290A (en) | Method, system and mobile terminal for encrypting voice call | |
CN102377560A (en) | Data encryption method and device for mobile communication terminal | |
CN102647279A (en) | Encryption method, encryption card, terminal equipment and machine-card interlocking device | |
CN101257358B (en) | Method and system for updating user cipher key | |
CN107070653B (en) | POS transaction encryption system and method, POSP front-end server and POS terminal | |
CN107517184A (en) | Message transmitting method, apparatus and system | |
CN101043476B (en) | Process, equipment and system for preventing user information from interception | |
CN101242453B (en) | A transmission method and system for dual-audio multi-frequency signal | |
CN106211146A (en) | Safety communication record adding method, information communicating method and call method and system | |
CN111740941A (en) | Industrial scene real-time data file encryption transmission method | |
CN114866778A (en) | Monitoring video safety system | |
CN112054905A (en) | Secure communication method and system of mobile terminal | |
WO1998027517A1 (en) | A method and a system for the encryption of codes | |
CN111641646A (en) | Safety enhancement type communication positioning terminal | |
KR100461860B1 (en) | Apparatus and method for preventing a forgery/an alteration of a conversation data in computer telephony integration | |
CN105516968A (en) | Smart password key-based mobile phone data transmission method | |
CN106533686B (en) | Encrypted communication method and system, communication unit and client | |
JPH07303104A (en) | Storage type communication system with ciphering function |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20100519 Termination date: 20180312 |
|
CF01 | Termination of patent right due to non-payment of annual fee |