CN102843675A - Cluster call voice encryption method, terminal and system - Google Patents
Cluster call voice encryption method, terminal and system Download PDFInfo
- Publication number
- CN102843675A CN102843675A CN201110173832.XA CN201110173832A CN102843675A CN 102843675 A CN102843675 A CN 102843675A CN 201110173832 A CN201110173832 A CN 201110173832A CN 102843675 A CN102843675 A CN 102843675A
- Authority
- CN
- China
- Prior art keywords
- terminal
- key
- called
- encryption
- kds
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a cluster call voice encryption method, a terminal and a system, and belongs to the technical field of cluster communications. The method comprises the following steps: all the member terminals of the calling and the called acquire a session key of an encrypted conversation from a key distribution server (KDS) through a base station subsystem (BBS) in an encryption call setup process respectively; all the member terminals of the calling and the called send an encryption conversation joining request to the BBS respectively to set up an encryption call; and after joining the encryption conversation, all the member terminals of the calling and the called encrypt a sent voice frame by using the same session key in the conversion process and decrypt a received voice frame. According to the invention, in a way of adopting a key in a conversation, all cluster member terminals adopt the same session key to carry out a voice encryption conversation, so as to implement the voice encryption of various cluster calls and ensure the security and confidentiality of conversation contents.
Description
Technical field
The present invention relates to the trunking communication field, relate to a kind of method, terminal and system of trunked call voice encryption.
Background technology
Trunked communication system is a kind of dispatching communication system of special use, comprises special-purpose commander and dispatching communication, and in use, cluster user can add calling simultaneously.Trunked call is that the trunking communication field basically the most also is most important business, through years of development, has been widely used in fields such as airport, harbour, high ferro, public transport, public safety, emergency relief.For the higher industry user of security requirement, such as police, army etc., expressly the level security of conversation is poor, dialog context very easily by the people from inflight acquisition, so one of important content that confidentiality and fail safe also are trunked calls need solve.
At present existing the conversation to cluster carried out in the voice encryption; The crypto set groupcall can only be initiated by client; The terminal can't be initiated, and key is also very complicated, and group key, user key, interim group key, group's key etc. are arranged; And each words power of switching all will generate new key and be distributed to all terminals and client, increases system burden.
Summary of the invention
Problem to be solved by this invention is, method, terminal and the system of voice encryption in a kind of trunked call is provided, and realizes omnidistance encryption and decryption, strengthens the level security in the trunked call.
In order to address the above problem, the invention provides the method for voice encryption in a kind of trunked call, this method comprises:
All member terminal of calling and called are set up at call encryption and are passed through BBS (base station sub-system) in the process respectively to KDS (Key Distribution Server; The encryption key distribution server) obtains the session key of this speech scrambling; Called member terminal is behind the called encryption notification message that receives the KDS transmission, to ask said session key to KDS, and said session key is that KDS is handed down to all member terminal through caller/called key response message with said session key; All member terminal of calling and called are sent to BBS respectively and are got into the speech scrambling request, set up call encryption; After getting into speech scrambling, all member terminal of calling and called all use session key that the speech frame that sends is encrypted in communication process, and the speech frame that receives is deciphered.
The present invention also provides the terminal of voice encryption in a kind of trunked call, and this terminal comprises vocoder, channel and radio frequency processing module, also comprises the encryption and decryption module; The encryption and decryption module is used to obtain the session key of this speech scrambling that KDS issues through calling/called key response message; Use session key to encrypt the signal of vocoder output at colony terminal during as transmitting terminal, be transferred to channel and radio frequency processing module after the encryption; At colony terminal during as receiving terminal, will use session key decipher from the speech frame that channel and radio-frequency module receive, be transferred to vocoder after the deciphering.
The present invention also provides the system of voice encryption in a kind of trunked call; Also comprise: KDS; KDS is used to receive the session key that produces this speech scrambling after the secret key request message of calling terminal, and is handed down to all group call participant terminals through calling/called key response message after with the session secret key encryption.
After adopting the present invention; Both can when initiating trunked call, specify and initiate the crypto set groupcall, and also can in common trunked call communication process, upgrade to the crypto set groupcall, any terminal in the conversation member can be initiated or the upgrade encryption trunked call; Mode through the key of once conversing; Session key is distributed to all terminals by KDS with the mode of encrypting, and all are participated in the terminal of conversation and use same key up to this end of conversation, and the session key rule is simple and safe; Realized various trunked calls; Comprise that individual calling, group calling, interim group, user's group etc. carry out voice encryption, both guaranteed the level security of dialog context, the burden of having avoided frequent distributed key to bring again to system.
Description of drawings
Accompanying drawing described herein is used to provide further understanding of the present invention, constitutes a part of the present invention, and illustrative examples of the present invention and explanation thereof are used to explain the present invention, does not constitute improper qualification of the present invention.In the accompanying drawings:
Fig. 1 is a trunked call encryption method flow chart of the present invention
Fig. 2 is the caller signaling process figure that the automated manner of the embodiment of the invention is initiated the crypto set groupcall
Fig. 3 is the called signaling process figure that the automated manner of the embodiment of the invention is initiated the crypto set groupcall
Fig. 4 is the caller signaling process figure that the manual mode of the embodiment of the invention is initiated the crypto set groupcall
Fig. 5 is the called signaling process figure that the manual mode of the embodiment of the invention is initiated the crypto set groupcall
Fig. 6 is the terminal module figure of the embodiment of the invention
Fig. 7 is the system configuration sketch map of the embodiment of the invention
Embodiment
In order to make technical problem to be solved by this invention, technical scheme and beneficial effect clearer, clear,, the present invention is further elaborated below in conjunction with accompanying drawing and embodiment.Should be appreciated that specific embodiment described herein only in order to explanation the present invention, and be not used in qualification the present invention.
Be illustrated in figure 1 as trunked call encryption method flow chart of the present invention,
All member terminal of [S101] calling and called are set up in the process at call encryption and are obtained the session key of this speech scrambling through base station sub-system BBS to encryption key distribution server KDS respectively; Wherein, Called member terminal is behind the called encryption notification message that receives the KDS transmission, to ask said session key to KDS, and said session key is that KDS is handed down to all member terminal through caller/called key response message with said session key;
All member terminal of [S102] calling and called are sent to BBS respectively and are got into the speech scrambling request, set up call encryption;
After [S103] got into speech scrambling, all member terminal of calling and called all used said session key that the speech frame that sends is encrypted in communication process, and the speech frame that receives is deciphered.
For the ease of describing, the calling terminal among the embodiment of back is meant a side who initiates speech scrambling, terminal called be meant passive adding speech scrambling all group busy the terminal member.
Embodiment one
Present embodiment is that automated manner is initiated the crypto set groupcall: the menu of a selective call attribute is set on can the terminal, and supplying user's designated call attribute is common trunked call or crypto set groupcall.This setting option provides common and supplies users to select with two options of encryption.When the user selects when common, after the user pressed the PTT key, call flows was with the call flow of common colony terminal; When the user selects to encrypt, after the user presses the PTT key, adopt following crypto set groupcall flow process:
Calling terminal starts common trunked call flow process; Before common trunked call is set up completion; All member terminal of calling and called are set up the session key that obtains this speech scrambling in the process respectively through base station sub-system BBS to KDS at call encryption; All member terminal of calling and called are sent to BBS respectively and are got into the speech scrambling request, set up call encryption; After getting into speech scrambling, all member terminal of calling and called all use same session key that the speech frame that sends is encrypted in communication process, and the speech frame that receives is deciphered.
As shown in Figure 2, the calling terminal signaling process is following:
[201] calling terminal selective call attribute is encryption, and makes a call by the PTT key;
[202] calling terminal starts common trunked call flow process, sets up the Traffic Channel of eating dishes without rice or wine, and before common trunked call is set up completion, inserts the call encryption of setting up of following 203-208 step;
[203] calling terminal produces a pair of interim public private key pair Pa and Ka, sends the caller secret key request message through BSS and gives KDS, carries Pa in this message, and partial content is used the KDS public key encryption in the message.Can mode flag parameter wherein be put 0 expression and use automated manner;
[204] KDS calls the session key of this conversation of key generating function generation of cipher machine, sends caller key response message through BSS and gives calling terminal.Carry session key in this message, partial content is encrypted with Pa earlier, uses the KDS private key signature again;
[205] calling terminal carries out signature verification with the KDS PKI to caller key response message, after checking is passed through, utilizes temporary private Ka deciphering to obtain session key again, destroys interim public private key pair Pa and Ka simultaneously;
[206] after the calling terminal deciphering obtains session key,, send and get into the speech scrambling request to BSS through type of service (SO) field in the business request information (Service Request Message);
[207] BSS sends professional connection message (Service Connect Message) and responds the terminal;
[208] calling terminal sends professional the connection and accomplishes message (Service Connect Complete) to BSS;
[209] get into speech scrambling, all member terminal of calling and called all use same session key that the speech frame that sends is encrypted in communication process, and the speech frame that receives is deciphered.If encrypted word is set up failure, end of calling then, standby interface is got back at the terminal.
As shown in Figure 3, the terminal called signaling process is following:
[301] terminal called starts common trunked call flow process, sets up the Traffic Channel of eating dishes without rice or wine, and before common trunked call is set up completion, inserts the call encryption of setting up of following 302-308 step;
[302] KDS sends called encryption notification message through BSS and gives terminal called;
[303] terminal called produces a pair of interim public private key pair Pb and Kb, sends called secret key request message through BSS and gives KDS, carries Pb in this message, and partial content is used the KDS public key encryption, can mode flag parameter wherein be put 0 expression and use automated manner;
[304] KDS sends called key response message through BSS to terminal called, carries session key in this message, and partial content is encrypted with Pb earlier, uses the KDS private key signature again;
[305] terminal called carries out signature verification with the KDS PKI to called key response message, after checking is passed through, utilizes temporary private Kb deciphering to obtain session key again, destroys interim public private key pair Pb and Kb simultaneously;
[306] after the terminal called deciphering obtains session key,, send and get into the speech scrambling request to BSS through the business type field in the business request information;
[307] BSS sends professional connection message and responds the terminal;
[308] terminal called sends professional the connection and accomplishes message to BSS;
[309] called entering speech scrambling, all member terminal of calling and called all use same session key that the speech frame that sends is encrypted in communication process, and the speech frame that receives is deciphered.If encrypted word is set up failure, end of calling then, standby interface is got back at the terminal.
Embodiment two
Present embodiment is that manual mode is initiated the crypto set groupcall: common trunked call is initiated the terminal call attribute and is set to common; After initiating common trunked call; Any trunked call member presses speech scrambling key (perhaps actions menu) in communication process after; Through behind the key agreement, set up the crypto set groupcall.Be specially: all member terminal of calling and called are set up the session key that obtains this speech scrambling in the process respectively through base station sub-system BBS to KDS at call encryption; All member terminal of calling and called are sent to BBS respectively and are got into the speech scrambling request, set up call encryption; After getting into speech scrambling, all member terminal of calling and called all use session key that the speech frame that sends is encrypted in communication process, and the speech frame that receives is deciphered.
As shown in Figure 4, the calling terminal signaling process is following:
[401] expressly (common) conversation is set up at the calling and called terminal;
[402] press speech scrambling key (perhaps actions menu) on the calling terminal;
[403] calling terminal produces a pair of interim public private key pair Pa and Ka, sends the caller secret key request message through BSS and gives KDS, carries Pa in this message, and partial content is used the KDS public key encryption, can mode flag parameter request wherein be put 1 expression and use manual mode;
[404] KDS calls the session key of this conversation of key generating function generation of cipher machine, sends caller key response message through BSS and gives calling terminal, carries session key in this message, and partial content is encrypted with Pa earlier, uses the KDS private key signature again;
[405] calling terminal carries out signature verification with the KDS PKI to caller key response message, after checking is passed through, utilizes temporary private Ka deciphering to obtain session key again, destroys interim public private key pair Pa and Ka simultaneously;
[406] after the calling terminal deciphering obtains session key,, send and get into the speech scrambling request to BSS through type of service (SO) field in the business request information (Service Request Message);
[407] BSS sends professional connection message and responds the terminal;
[408] calling terminal sends professional the connection and accomplishes message to BSS;
[409] caller gets into speech scrambling, and all member terminal of calling and called all use same session key that the speech frame that sends is encrypted in communication process, and the speech frame that receives is deciphered.If encrypted word is set up failure, then return back to original common conversation.
As shown in Figure 5, the terminal called signaling process is following:
[501] expressly (common) conversation is set up at the calling and called terminal;
[502] KDS sends called encryption notification message through BSS and gives terminal called;
[503] terminal called produces a pair of interim public private key pair Pb and Kb, sends called secret key request message through BSS and gives KDS, carries Pb in this message, and partial content is used the KDS public key encryption, can mode flag parameter request wherein be put 1 expression and use manual mode;
[504] KDS sends called key response message through BSS to terminal called, carries session key in this message, and partial content is encrypted with Pb earlier, uses the KDS private key signature again;
[505] terminal called carries out signature verification with the KDS PKI to called key response message, after checking is passed through, utilizes temporary private Kb deciphering to obtain session key again, destroys interim public private key pair Pb and Kb simultaneously;
[506] after the terminal called deciphering obtains session key,, send and get into the speech scrambling request to BSS through the business type field in the business request information;
[507] BSS sends professional connection message and responds the terminal;
[508] terminal called sends professional the connection and accomplishes message to BSS;
[509] called entering speech scrambling, all member terminal of calling and called all use session key that the speech frame that sends is encrypted in communication process, and the speech frame that receives is deciphered.If encrypted word is set up failure, then return back to original common conversation.
Crypto set group terminal as shown in Figure 6, that the embodiment of the invention provides is compared with common colony terminal, between vocoder and channel and radio frequency processing, has added an encryption and decryption module.The encryption and decryption module is obtained this speech scrambling session key that KDS issues through calling/called key response message.Colony terminal is during as transmitting terminal; Analog voice signal is transported to vocoder after sampling, quantification, coding; Encrypting module uses session key to encrypt to the signal of vocoder output; Be transferred to channel and radio frequency processing module after the encryption, channel and radio frequency processing module send to network side; At group terminal during as receiving terminal; Speech frame through from channel and radio-frequency module reception is an encrypted frame; The encryption and decryption module uses session key to decipher to encrypted frame; Be transferred to vocoder after the deciphering, play through finally outputing to audible device (loud speaker, earphone or receiver) after the digital-to-analogue conversion.
Preferably, be provided with call property in the terminal and select, be used for specifying and carry out ordinary call or call encryption.
Crypto set group communication system as shown in Figure 7, that the embodiment of the invention provides is compared with common trunked communication system, has increased KDS.KDS receives the session key that produces this speech scrambling after the secret key request message of calling terminal, and is handed down to all group call participant terminals through calling/called key response message after with said session key.For the GOTA group system, KDS can realize on same network element node with PDS.In order to guarantee fail safe, take the mode of one-time pad, the Ks that the each secret telephony in terminal uses is inequality, and the session key that at every turn is handed down to the terminal all adopts the interim public key encryption in terminal.
Preferably, session key is produced by the key generating function that KDS calls cipher machine.
Above-mentioned explanation illustrates and has described a preferred embodiment of the present invention; But as previously mentioned; Be to be understood that the present invention is not limited to the form that this paper discloses, should do not regard eliminating as, and can be used for various other combinations, modification and environment other embodiment; And can in invention contemplated scope described herein, change through the technology or the knowledge of above-mentioned instruction or association area.And change that those skilled in the art carried out and variation do not break away from the spirit and scope of the present invention, then all should be in the protection range of accompanying claims of the present invention.
Claims (12)
1. the method for a trunked call voice encryption is characterized in that, said method comprises:
1.1 all member terminal of calling and called are set up in the process at call encryption and are obtained the session key of this speech scrambling through base station sub-system BBS to encryption key distribution server KDS respectively; Wherein, Called member terminal is behind the called encryption notification message that receives the KDS transmission, to ask said session key to KDS, and said session key is that KDS is handed down to all member terminal through caller/called key response message with said session key;
1.2 all member terminal of calling and called are sent to BBS respectively and are got into the speech scrambling request, set up call encryption;
1.3 after the entering speech scrambling, all member terminal of calling and called all use said session key that the speech frame that sends is encrypted in communication process, and the speech frame that receives is deciphered.
2. method according to claim 1 is characterized in that, said master is obtained session key by the terminal to KDS and comprises:
2.1 calling terminal produces a pair of interim public private key pair Pa and Ka, sends the caller secret key request message to KDS, carries Pa in the message;
2.2 calling terminal receives the caller key response message that KDS sends, and utilizes temporary private Ka deciphering to obtain the session key that carries in the caller key response message.
3. method according to claim 2 also comprises that calling terminal destroys interim public private key pair Pa and Ka after the said step 2.2.
4. method according to claim 1 is characterized in that, said called member terminal is obtained session key and comprised:
4.1 called member terminal produces a pair of interim public private key pair Pb and Kb, sends called secret key request message through BSS and gives KDS, carries Pb in the message;
4.2 after called member terminal receives the called key response message of KDS through the BSS transmission, utilize temporary private Kb deciphering to obtain the session key that carries in the called key response message.
5. method according to claim 4 also comprises that called member terminal destroys interim public private key pair Pb and Kb after the said step 4.2.
6. according to each described method of claim 1 to 5, calling terminal is meant a side who initiates speech scrambling, and terminal called is meant the member terminal of the trunked call of passive adding speech scrambling.
7. a colony terminal comprises vocoder, channel and radio frequency processing module, it is characterized in that, also comprises the encryption and decryption module, is used to obtain this speech scrambling session key that encryption key distribution server KDS issues through calling/called key response message; Use said session key to encrypt the signal of vocoder output at said colony terminal during as transmitting terminal, be transferred to channel and radio frequency processing module after the encryption; At said colony terminal during as receiving terminal, will use said session key to decipher from the speech frame that channel and radio-frequency module receive, be transferred to vocoder after the deciphering.
8. terminal according to claim 7, said terminal are provided with call property and select, and are used for specifying carrying out ordinary call or call encryption.
9. group system; It is characterized in that; Comprise encryption key distribution server KDS; Said KDS is used to receive the session key that produces this speech scrambling after the secret key request message of calling terminal, and through calling/called key response message said session key is handed down to all group call participant terminals.
10. system according to claim 9 is characterized in that, said session key is that the key generating function of calling cipher machine produces.
11. system according to claim 9 is characterized in that, said KDS realizes separately or on PDS, realizes.
12. system according to claim 9 is characterized in that, said session key is to adopt the interim public key encryption in terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110173832.XA CN102843675A (en) | 2011-06-24 | 2011-06-24 | Cluster call voice encryption method, terminal and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110173832.XA CN102843675A (en) | 2011-06-24 | 2011-06-24 | Cluster call voice encryption method, terminal and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102843675A true CN102843675A (en) | 2012-12-26 |
Family
ID=47370678
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110173832.XA Pending CN102843675A (en) | 2011-06-24 | 2011-06-24 | Cluster call voice encryption method, terminal and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102843675A (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104219051A (en) * | 2014-08-20 | 2014-12-17 | 北京奇艺世纪科技有限公司 | In-group message communication method and system |
CN104427496A (en) * | 2013-08-29 | 2015-03-18 | 成都鼎桥通信技术有限公司 | TD-LTE cluster communication system encryption transmission method, device and system |
CN105357226A (en) * | 2015-12-16 | 2016-02-24 | 深圳市九鼎安华科技有限公司 | Encryption communication method based on VOIP (voice over internet phone) communication |
CN106211091A (en) * | 2016-09-08 | 2016-12-07 | 宇龙计算机通信科技(深圳)有限公司 | A kind of method and system setting up trunking communication |
CN106454757A (en) * | 2016-11-23 | 2017-02-22 | 北京坦达信息科技有限公司 | Communication encryption and decryption method for wireless broadband network |
CN106790281A (en) * | 2017-02-23 | 2017-05-31 | 深圳市沃阳精密科技有限公司 | A kind of end-to-end voice encryption device and encryption method towards intercom system |
CN106936788A (en) * | 2015-12-31 | 2017-07-07 | 北京大唐高鸿软件技术有限公司 | A kind of cryptographic key distribution method suitable for VOIP voice encryptions |
CN108347414A (en) * | 2017-01-24 | 2018-07-31 | 中国移动通信有限公司研究院 | A kind of method and apparatus of Voice Cryption |
CN110190964A (en) * | 2019-05-16 | 2019-08-30 | 苏州科达科技股份有限公司 | Identity identifying method and electronic equipment |
CN111092905A (en) * | 2019-12-27 | 2020-05-01 | 郑州信大捷安信息技术股份有限公司 | VOIP-based encrypted call method and system |
CN113163395A (en) * | 2020-01-07 | 2021-07-23 | 阿里巴巴集团控股有限公司 | Method and device for communication between terminal and server and key configuration |
CN114125824A (en) * | 2020-08-31 | 2022-03-01 | 中国电信股份有限公司 | Voice encryption processing method, server, terminal, system and storage medium |
WO2023039871A1 (en) * | 2021-09-18 | 2023-03-23 | 海能达通信股份有限公司 | Data monitoring method, apparatus, device and system |
-
2011
- 2011-06-24 CN CN201110173832.XA patent/CN102843675A/en active Pending
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104427496A (en) * | 2013-08-29 | 2015-03-18 | 成都鼎桥通信技术有限公司 | TD-LTE cluster communication system encryption transmission method, device and system |
CN104427496B (en) * | 2013-08-29 | 2018-06-26 | 成都鼎桥通信技术有限公司 | TD-LTE trunked communication systems encrypted transmission method, device and system |
CN104219051B (en) * | 2014-08-20 | 2018-04-13 | 北京奇艺世纪科技有限公司 | The communication means and system of a kind of inner group message |
CN104219051A (en) * | 2014-08-20 | 2014-12-17 | 北京奇艺世纪科技有限公司 | In-group message communication method and system |
CN105357226A (en) * | 2015-12-16 | 2016-02-24 | 深圳市九鼎安华科技有限公司 | Encryption communication method based on VOIP (voice over internet phone) communication |
CN106936788B (en) * | 2015-12-31 | 2019-10-22 | 北京大唐高鸿软件技术有限公司 | A kind of cryptographic key distribution method suitable for VOIP voice encryption |
CN106936788A (en) * | 2015-12-31 | 2017-07-07 | 北京大唐高鸿软件技术有限公司 | A kind of cryptographic key distribution method suitable for VOIP voice encryptions |
CN106211091A (en) * | 2016-09-08 | 2016-12-07 | 宇龙计算机通信科技(深圳)有限公司 | A kind of method and system setting up trunking communication |
CN106211091B (en) * | 2016-09-08 | 2020-04-24 | 宇龙计算机通信科技(深圳)有限公司 | Method and system for establishing cluster communication |
CN106454757A (en) * | 2016-11-23 | 2017-02-22 | 北京坦达信息科技有限公司 | Communication encryption and decryption method for wireless broadband network |
CN108347414A (en) * | 2017-01-24 | 2018-07-31 | 中国移动通信有限公司研究院 | A kind of method and apparatus of Voice Cryption |
WO2018153011A1 (en) * | 2017-02-23 | 2018-08-30 | 深圳市云密通讯技术有限公司 | End-to-end voice encryption apparatus and encryption method for intercom system |
CN106790281A (en) * | 2017-02-23 | 2017-05-31 | 深圳市沃阳精密科技有限公司 | A kind of end-to-end voice encryption device and encryption method towards intercom system |
CN110190964A (en) * | 2019-05-16 | 2019-08-30 | 苏州科达科技股份有限公司 | Identity identifying method and electronic equipment |
CN110190964B (en) * | 2019-05-16 | 2022-03-15 | 苏州科达科技股份有限公司 | Identity authentication method and electronic equipment |
CN111092905A (en) * | 2019-12-27 | 2020-05-01 | 郑州信大捷安信息技术股份有限公司 | VOIP-based encrypted call method and system |
CN111092905B (en) * | 2019-12-27 | 2021-10-15 | 郑州信大捷安信息技术股份有限公司 | VOIP-based encrypted call method and system |
CN113163395A (en) * | 2020-01-07 | 2021-07-23 | 阿里巴巴集团控股有限公司 | Method and device for communication between terminal and server and key configuration |
CN114125824A (en) * | 2020-08-31 | 2022-03-01 | 中国电信股份有限公司 | Voice encryption processing method, server, terminal, system and storage medium |
WO2023039871A1 (en) * | 2021-09-18 | 2023-03-23 | 海能达通信股份有限公司 | Data monitoring method, apparatus, device and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102843675A (en) | Cluster call voice encryption method, terminal and system | |
US7643817B2 (en) | Method and apparatus for rapid secure session establishment on half-duplex AD-hoc group voice cellular network channels | |
CN102291680B (en) | Encrypted group calling method based on long term evolution (TD-LTE) trunking communication system | |
KR101033750B1 (en) | Fast secure session on half-duplex voice network channels | |
JP2000504182A (en) | Method and apparatus for providing a private communication system in a public telephone network | |
US9258700B2 (en) | Systems and methods for utilizing IMS data security mechanisms in a circuit switched network | |
CN106982419B (en) | Single call end-to-end encryption method and system for broadband cluster system | |
CN104539433A (en) | Voice communication encryption system and encryption method thereof | |
CN105025475A (en) | Andriod system-oriented implement method of mobile secure terminal | |
CN102137393B (en) | Method and device for encrypting end-to-end | |
CN104955033A (en) | Voice encryption communication method | |
CN106604268A (en) | Voice encryption method and system and terminal | |
CN105553669A (en) | Identity authentication based information encryption transmission apparatus, method, and control method | |
CN104244188A (en) | Multi-user talking method in TD-LTE cluster system | |
CN105451195B (en) | End-to-end cluster cryptographic key distribution method and equipment of the core network | |
CN105049201A (en) | Mobile equipment secret communication system based on quantum cryptography and mobile equipment secret communication method based on quantum cryptography | |
CN102137394A (en) | Encrypted mobile communication terminal system and method under network access | |
CN106470199B (en) | Voice data processing method and device and intercom system | |
CN104936051B (en) | A kind of earphone, speaker and phone system | |
CN103634744A (en) | Cluster group call end-to-end encryption realization method | |
WO2022027476A1 (en) | Key management method and communication apparatus | |
CN100512103C (en) | Secret key distributing method of end-to-end encrypted telecommunication | |
CN101848425A (en) | PTT (Push-To-Talk) data processing method, terminal, PTT server and PTT system | |
WO2014180390A2 (en) | Trunking group communication public security implementation method and device | |
WO2022237421A1 (en) | Key transmission method and apparatus for temporary group, and terminal and network side device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20121226 |
|
RJ01 | Rejection of invention patent application after publication |