CN102843675A - Cluster call voice encryption method, terminal and system - Google Patents

Cluster call voice encryption method, terminal and system Download PDF

Info

Publication number
CN102843675A
CN102843675A CN201110173832.XA CN201110173832A CN102843675A CN 102843675 A CN102843675 A CN 102843675A CN 201110173832 A CN201110173832 A CN 201110173832A CN 102843675 A CN102843675 A CN 102843675A
Authority
CN
China
Prior art keywords
terminal
key
called
encryption
kds
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201110173832.XA
Other languages
Chinese (zh)
Inventor
廖召华
董文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201110173832.XA priority Critical patent/CN102843675A/en
Publication of CN102843675A publication Critical patent/CN102843675A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a cluster call voice encryption method, a terminal and a system, and belongs to the technical field of cluster communications. The method comprises the following steps: all the member terminals of the calling and the called acquire a session key of an encrypted conversation from a key distribution server (KDS) through a base station subsystem (BBS) in an encryption call setup process respectively; all the member terminals of the calling and the called send an encryption conversation joining request to the BBS respectively to set up an encryption call; and after joining the encryption conversation, all the member terminals of the calling and the called encrypt a sent voice frame by using the same session key in the conversion process and decrypt a received voice frame. According to the invention, in a way of adopting a key in a conversation, all cluster member terminals adopt the same session key to carry out a voice encryption conversation, so as to implement the voice encryption of various cluster calls and ensure the security and confidentiality of conversation contents.

Description

A kind of method of trunked call voice encryption, terminal and system
Technical field
The present invention relates to the trunking communication field, relate to a kind of method, terminal and system of trunked call voice encryption.
Background technology
Trunked communication system is a kind of dispatching communication system of special use, comprises special-purpose commander and dispatching communication, and in use, cluster user can add calling simultaneously.Trunked call is that the trunking communication field basically the most also is most important business, through years of development, has been widely used in fields such as airport, harbour, high ferro, public transport, public safety, emergency relief.For the higher industry user of security requirement, such as police, army etc., expressly the level security of conversation is poor, dialog context very easily by the people from inflight acquisition, so one of important content that confidentiality and fail safe also are trunked calls need solve.
At present existing the conversation to cluster carried out in the voice encryption; The crypto set groupcall can only be initiated by client; The terminal can't be initiated, and key is also very complicated, and group key, user key, interim group key, group's key etc. are arranged; And each words power of switching all will generate new key and be distributed to all terminals and client, increases system burden.
Summary of the invention
Problem to be solved by this invention is, method, terminal and the system of voice encryption in a kind of trunked call is provided, and realizes omnidistance encryption and decryption, strengthens the level security in the trunked call.
In order to address the above problem, the invention provides the method for voice encryption in a kind of trunked call, this method comprises:
All member terminal of calling and called are set up at call encryption and are passed through BBS (base station sub-system) in the process respectively to KDS (Key Distribution Server; The encryption key distribution server) obtains the session key of this speech scrambling; Called member terminal is behind the called encryption notification message that receives the KDS transmission, to ask said session key to KDS, and said session key is that KDS is handed down to all member terminal through caller/called key response message with said session key; All member terminal of calling and called are sent to BBS respectively and are got into the speech scrambling request, set up call encryption; After getting into speech scrambling, all member terminal of calling and called all use session key that the speech frame that sends is encrypted in communication process, and the speech frame that receives is deciphered.
The present invention also provides the terminal of voice encryption in a kind of trunked call, and this terminal comprises vocoder, channel and radio frequency processing module, also comprises the encryption and decryption module; The encryption and decryption module is used to obtain the session key of this speech scrambling that KDS issues through calling/called key response message; Use session key to encrypt the signal of vocoder output at colony terminal during as transmitting terminal, be transferred to channel and radio frequency processing module after the encryption; At colony terminal during as receiving terminal, will use session key decipher from the speech frame that channel and radio-frequency module receive, be transferred to vocoder after the deciphering.
The present invention also provides the system of voice encryption in a kind of trunked call; Also comprise: KDS; KDS is used to receive the session key that produces this speech scrambling after the secret key request message of calling terminal, and is handed down to all group call participant terminals through calling/called key response message after with the session secret key encryption.
After adopting the present invention; Both can when initiating trunked call, specify and initiate the crypto set groupcall, and also can in common trunked call communication process, upgrade to the crypto set groupcall, any terminal in the conversation member can be initiated or the upgrade encryption trunked call; Mode through the key of once conversing; Session key is distributed to all terminals by KDS with the mode of encrypting, and all are participated in the terminal of conversation and use same key up to this end of conversation, and the session key rule is simple and safe; Realized various trunked calls; Comprise that individual calling, group calling, interim group, user's group etc. carry out voice encryption, both guaranteed the level security of dialog context, the burden of having avoided frequent distributed key to bring again to system.
Description of drawings
Accompanying drawing described herein is used to provide further understanding of the present invention, constitutes a part of the present invention, and illustrative examples of the present invention and explanation thereof are used to explain the present invention, does not constitute improper qualification of the present invention.In the accompanying drawings:
Fig. 1 is a trunked call encryption method flow chart of the present invention
Fig. 2 is the caller signaling process figure that the automated manner of the embodiment of the invention is initiated the crypto set groupcall
Fig. 3 is the called signaling process figure that the automated manner of the embodiment of the invention is initiated the crypto set groupcall
Fig. 4 is the caller signaling process figure that the manual mode of the embodiment of the invention is initiated the crypto set groupcall
Fig. 5 is the called signaling process figure that the manual mode of the embodiment of the invention is initiated the crypto set groupcall
Fig. 6 is the terminal module figure of the embodiment of the invention
Fig. 7 is the system configuration sketch map of the embodiment of the invention
Embodiment
In order to make technical problem to be solved by this invention, technical scheme and beneficial effect clearer, clear,, the present invention is further elaborated below in conjunction with accompanying drawing and embodiment.Should be appreciated that specific embodiment described herein only in order to explanation the present invention, and be not used in qualification the present invention.
Be illustrated in figure 1 as trunked call encryption method flow chart of the present invention,
All member terminal of [S101] calling and called are set up in the process at call encryption and are obtained the session key of this speech scrambling through base station sub-system BBS to encryption key distribution server KDS respectively; Wherein, Called member terminal is behind the called encryption notification message that receives the KDS transmission, to ask said session key to KDS, and said session key is that KDS is handed down to all member terminal through caller/called key response message with said session key;
All member terminal of [S102] calling and called are sent to BBS respectively and are got into the speech scrambling request, set up call encryption;
After [S103] got into speech scrambling, all member terminal of calling and called all used said session key that the speech frame that sends is encrypted in communication process, and the speech frame that receives is deciphered.
For the ease of describing, the calling terminal among the embodiment of back is meant a side who initiates speech scrambling, terminal called be meant passive adding speech scrambling all group busy the terminal member.
Embodiment one
Present embodiment is that automated manner is initiated the crypto set groupcall: the menu of a selective call attribute is set on can the terminal, and supplying user's designated call attribute is common trunked call or crypto set groupcall.This setting option provides common and supplies users to select with two options of encryption.When the user selects when common, after the user pressed the PTT key, call flows was with the call flow of common colony terminal; When the user selects to encrypt, after the user presses the PTT key, adopt following crypto set groupcall flow process:
Calling terminal starts common trunked call flow process; Before common trunked call is set up completion; All member terminal of calling and called are set up the session key that obtains this speech scrambling in the process respectively through base station sub-system BBS to KDS at call encryption; All member terminal of calling and called are sent to BBS respectively and are got into the speech scrambling request, set up call encryption; After getting into speech scrambling, all member terminal of calling and called all use same session key that the speech frame that sends is encrypted in communication process, and the speech frame that receives is deciphered.
As shown in Figure 2, the calling terminal signaling process is following:
[201] calling terminal selective call attribute is encryption, and makes a call by the PTT key;
[202] calling terminal starts common trunked call flow process, sets up the Traffic Channel of eating dishes without rice or wine, and before common trunked call is set up completion, inserts the call encryption of setting up of following 203-208 step;
[203] calling terminal produces a pair of interim public private key pair Pa and Ka, sends the caller secret key request message through BSS and gives KDS, carries Pa in this message, and partial content is used the KDS public key encryption in the message.Can mode flag parameter wherein be put 0 expression and use automated manner;
[204] KDS calls the session key of this conversation of key generating function generation of cipher machine, sends caller key response message through BSS and gives calling terminal.Carry session key in this message, partial content is encrypted with Pa earlier, uses the KDS private key signature again;
[205] calling terminal carries out signature verification with the KDS PKI to caller key response message, after checking is passed through, utilizes temporary private Ka deciphering to obtain session key again, destroys interim public private key pair Pa and Ka simultaneously;
[206] after the calling terminal deciphering obtains session key,, send and get into the speech scrambling request to BSS through type of service (SO) field in the business request information (Service Request Message);
[207] BSS sends professional connection message (Service Connect Message) and responds the terminal;
[208] calling terminal sends professional the connection and accomplishes message (Service Connect Complete) to BSS;
[209] get into speech scrambling, all member terminal of calling and called all use same session key that the speech frame that sends is encrypted in communication process, and the speech frame that receives is deciphered.If encrypted word is set up failure, end of calling then, standby interface is got back at the terminal.
As shown in Figure 3, the terminal called signaling process is following:
[301] terminal called starts common trunked call flow process, sets up the Traffic Channel of eating dishes without rice or wine, and before common trunked call is set up completion, inserts the call encryption of setting up of following 302-308 step;
[302] KDS sends called encryption notification message through BSS and gives terminal called;
[303] terminal called produces a pair of interim public private key pair Pb and Kb, sends called secret key request message through BSS and gives KDS, carries Pb in this message, and partial content is used the KDS public key encryption, can mode flag parameter wherein be put 0 expression and use automated manner;
[304] KDS sends called key response message through BSS to terminal called, carries session key in this message, and partial content is encrypted with Pb earlier, uses the KDS private key signature again;
[305] terminal called carries out signature verification with the KDS PKI to called key response message, after checking is passed through, utilizes temporary private Kb deciphering to obtain session key again, destroys interim public private key pair Pb and Kb simultaneously;
[306] after the terminal called deciphering obtains session key,, send and get into the speech scrambling request to BSS through the business type field in the business request information;
[307] BSS sends professional connection message and responds the terminal;
[308] terminal called sends professional the connection and accomplishes message to BSS;
[309] called entering speech scrambling, all member terminal of calling and called all use same session key that the speech frame that sends is encrypted in communication process, and the speech frame that receives is deciphered.If encrypted word is set up failure, end of calling then, standby interface is got back at the terminal.
Embodiment two
Present embodiment is that manual mode is initiated the crypto set groupcall: common trunked call is initiated the terminal call attribute and is set to common; After initiating common trunked call; Any trunked call member presses speech scrambling key (perhaps actions menu) in communication process after; Through behind the key agreement, set up the crypto set groupcall.Be specially: all member terminal of calling and called are set up the session key that obtains this speech scrambling in the process respectively through base station sub-system BBS to KDS at call encryption; All member terminal of calling and called are sent to BBS respectively and are got into the speech scrambling request, set up call encryption; After getting into speech scrambling, all member terminal of calling and called all use session key that the speech frame that sends is encrypted in communication process, and the speech frame that receives is deciphered.
As shown in Figure 4, the calling terminal signaling process is following:
[401] expressly (common) conversation is set up at the calling and called terminal;
[402] press speech scrambling key (perhaps actions menu) on the calling terminal;
[403] calling terminal produces a pair of interim public private key pair Pa and Ka, sends the caller secret key request message through BSS and gives KDS, carries Pa in this message, and partial content is used the KDS public key encryption, can mode flag parameter request wherein be put 1 expression and use manual mode;
[404] KDS calls the session key of this conversation of key generating function generation of cipher machine, sends caller key response message through BSS and gives calling terminal, carries session key in this message, and partial content is encrypted with Pa earlier, uses the KDS private key signature again;
[405] calling terminal carries out signature verification with the KDS PKI to caller key response message, after checking is passed through, utilizes temporary private Ka deciphering to obtain session key again, destroys interim public private key pair Pa and Ka simultaneously;
[406] after the calling terminal deciphering obtains session key,, send and get into the speech scrambling request to BSS through type of service (SO) field in the business request information (Service Request Message);
[407] BSS sends professional connection message and responds the terminal;
[408] calling terminal sends professional the connection and accomplishes message to BSS;
[409] caller gets into speech scrambling, and all member terminal of calling and called all use same session key that the speech frame that sends is encrypted in communication process, and the speech frame that receives is deciphered.If encrypted word is set up failure, then return back to original common conversation.
As shown in Figure 5, the terminal called signaling process is following:
[501] expressly (common) conversation is set up at the calling and called terminal;
[502] KDS sends called encryption notification message through BSS and gives terminal called;
[503] terminal called produces a pair of interim public private key pair Pb and Kb, sends called secret key request message through BSS and gives KDS, carries Pb in this message, and partial content is used the KDS public key encryption, can mode flag parameter request wherein be put 1 expression and use manual mode;
[504] KDS sends called key response message through BSS to terminal called, carries session key in this message, and partial content is encrypted with Pb earlier, uses the KDS private key signature again;
[505] terminal called carries out signature verification with the KDS PKI to called key response message, after checking is passed through, utilizes temporary private Kb deciphering to obtain session key again, destroys interim public private key pair Pb and Kb simultaneously;
[506] after the terminal called deciphering obtains session key,, send and get into the speech scrambling request to BSS through the business type field in the business request information;
[507] BSS sends professional connection message and responds the terminal;
[508] terminal called sends professional the connection and accomplishes message to BSS;
[509] called entering speech scrambling, all member terminal of calling and called all use session key that the speech frame that sends is encrypted in communication process, and the speech frame that receives is deciphered.If encrypted word is set up failure, then return back to original common conversation.
Crypto set group terminal as shown in Figure 6, that the embodiment of the invention provides is compared with common colony terminal, between vocoder and channel and radio frequency processing, has added an encryption and decryption module.The encryption and decryption module is obtained this speech scrambling session key that KDS issues through calling/called key response message.Colony terminal is during as transmitting terminal; Analog voice signal is transported to vocoder after sampling, quantification, coding; Encrypting module uses session key to encrypt to the signal of vocoder output; Be transferred to channel and radio frequency processing module after the encryption, channel and radio frequency processing module send to network side; At group terminal during as receiving terminal; Speech frame through from channel and radio-frequency module reception is an encrypted frame; The encryption and decryption module uses session key to decipher to encrypted frame; Be transferred to vocoder after the deciphering, play through finally outputing to audible device (loud speaker, earphone or receiver) after the digital-to-analogue conversion.
Preferably, be provided with call property in the terminal and select, be used for specifying and carry out ordinary call or call encryption.
Crypto set group communication system as shown in Figure 7, that the embodiment of the invention provides is compared with common trunked communication system, has increased KDS.KDS receives the session key that produces this speech scrambling after the secret key request message of calling terminal, and is handed down to all group call participant terminals through calling/called key response message after with said session key.For the GOTA group system, KDS can realize on same network element node with PDS.In order to guarantee fail safe, take the mode of one-time pad, the Ks that the each secret telephony in terminal uses is inequality, and the session key that at every turn is handed down to the terminal all adopts the interim public key encryption in terminal.
Preferably, session key is produced by the key generating function that KDS calls cipher machine.
Above-mentioned explanation illustrates and has described a preferred embodiment of the present invention; But as previously mentioned; Be to be understood that the present invention is not limited to the form that this paper discloses, should do not regard eliminating as, and can be used for various other combinations, modification and environment other embodiment; And can in invention contemplated scope described herein, change through the technology or the knowledge of above-mentioned instruction or association area.And change that those skilled in the art carried out and variation do not break away from the spirit and scope of the present invention, then all should be in the protection range of accompanying claims of the present invention.

Claims (12)

1. the method for a trunked call voice encryption is characterized in that, said method comprises:
1.1 all member terminal of calling and called are set up in the process at call encryption and are obtained the session key of this speech scrambling through base station sub-system BBS to encryption key distribution server KDS respectively; Wherein, Called member terminal is behind the called encryption notification message that receives the KDS transmission, to ask said session key to KDS, and said session key is that KDS is handed down to all member terminal through caller/called key response message with said session key;
1.2 all member terminal of calling and called are sent to BBS respectively and are got into the speech scrambling request, set up call encryption;
1.3 after the entering speech scrambling, all member terminal of calling and called all use said session key that the speech frame that sends is encrypted in communication process, and the speech frame that receives is deciphered.
2. method according to claim 1 is characterized in that, said master is obtained session key by the terminal to KDS and comprises:
2.1 calling terminal produces a pair of interim public private key pair Pa and Ka, sends the caller secret key request message to KDS, carries Pa in the message;
2.2 calling terminal receives the caller key response message that KDS sends, and utilizes temporary private Ka deciphering to obtain the session key that carries in the caller key response message.
3. method according to claim 2 also comprises that calling terminal destroys interim public private key pair Pa and Ka after the said step 2.2.
4. method according to claim 1 is characterized in that, said called member terminal is obtained session key and comprised:
4.1 called member terminal produces a pair of interim public private key pair Pb and Kb, sends called secret key request message through BSS and gives KDS, carries Pb in the message;
4.2 after called member terminal receives the called key response message of KDS through the BSS transmission, utilize temporary private Kb deciphering to obtain the session key that carries in the called key response message.
5. method according to claim 4 also comprises that called member terminal destroys interim public private key pair Pb and Kb after the said step 4.2.
6. according to each described method of claim 1 to 5, calling terminal is meant a side who initiates speech scrambling, and terminal called is meant the member terminal of the trunked call of passive adding speech scrambling.
7. a colony terminal comprises vocoder, channel and radio frequency processing module, it is characterized in that, also comprises the encryption and decryption module, is used to obtain this speech scrambling session key that encryption key distribution server KDS issues through calling/called key response message; Use said session key to encrypt the signal of vocoder output at said colony terminal during as transmitting terminal, be transferred to channel and radio frequency processing module after the encryption; At said colony terminal during as receiving terminal, will use said session key to decipher from the speech frame that channel and radio-frequency module receive, be transferred to vocoder after the deciphering.
8. terminal according to claim 7, said terminal are provided with call property and select, and are used for specifying carrying out ordinary call or call encryption.
9. group system; It is characterized in that; Comprise encryption key distribution server KDS; Said KDS is used to receive the session key that produces this speech scrambling after the secret key request message of calling terminal, and through calling/called key response message said session key is handed down to all group call participant terminals.
10. system according to claim 9 is characterized in that, said session key is that the key generating function of calling cipher machine produces.
11. system according to claim 9 is characterized in that, said KDS realizes separately or on PDS, realizes.
12. system according to claim 9 is characterized in that, said session key is to adopt the interim public key encryption in terminal.
CN201110173832.XA 2011-06-24 2011-06-24 Cluster call voice encryption method, terminal and system Pending CN102843675A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110173832.XA CN102843675A (en) 2011-06-24 2011-06-24 Cluster call voice encryption method, terminal and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110173832.XA CN102843675A (en) 2011-06-24 2011-06-24 Cluster call voice encryption method, terminal and system

Publications (1)

Publication Number Publication Date
CN102843675A true CN102843675A (en) 2012-12-26

Family

ID=47370678

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110173832.XA Pending CN102843675A (en) 2011-06-24 2011-06-24 Cluster call voice encryption method, terminal and system

Country Status (1)

Country Link
CN (1) CN102843675A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104219051A (en) * 2014-08-20 2014-12-17 北京奇艺世纪科技有限公司 In-group message communication method and system
CN104427496A (en) * 2013-08-29 2015-03-18 成都鼎桥通信技术有限公司 TD-LTE cluster communication system encryption transmission method, device and system
CN105357226A (en) * 2015-12-16 2016-02-24 深圳市九鼎安华科技有限公司 Encryption communication method based on VOIP (voice over internet phone) communication
CN106211091A (en) * 2016-09-08 2016-12-07 宇龙计算机通信科技(深圳)有限公司 A kind of method and system setting up trunking communication
CN106454757A (en) * 2016-11-23 2017-02-22 北京坦达信息科技有限公司 Communication encryption and decryption method for wireless broadband network
CN106790281A (en) * 2017-02-23 2017-05-31 深圳市沃阳精密科技有限公司 A kind of end-to-end voice encryption device and encryption method towards intercom system
CN106936788A (en) * 2015-12-31 2017-07-07 北京大唐高鸿软件技术有限公司 A kind of cryptographic key distribution method suitable for VOIP voice encryptions
CN108347414A (en) * 2017-01-24 2018-07-31 中国移动通信有限公司研究院 A kind of method and apparatus of Voice Cryption
CN110190964A (en) * 2019-05-16 2019-08-30 苏州科达科技股份有限公司 Identity identifying method and electronic equipment
CN111092905A (en) * 2019-12-27 2020-05-01 郑州信大捷安信息技术股份有限公司 VOIP-based encrypted call method and system
CN113163395A (en) * 2020-01-07 2021-07-23 阿里巴巴集团控股有限公司 Method and device for communication between terminal and server and key configuration
CN114125824A (en) * 2020-08-31 2022-03-01 中国电信股份有限公司 Voice encryption processing method, server, terminal, system and storage medium
WO2023039871A1 (en) * 2021-09-18 2023-03-23 海能达通信股份有限公司 Data monitoring method, apparatus, device and system

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104427496A (en) * 2013-08-29 2015-03-18 成都鼎桥通信技术有限公司 TD-LTE cluster communication system encryption transmission method, device and system
CN104427496B (en) * 2013-08-29 2018-06-26 成都鼎桥通信技术有限公司 TD-LTE trunked communication systems encrypted transmission method, device and system
CN104219051B (en) * 2014-08-20 2018-04-13 北京奇艺世纪科技有限公司 The communication means and system of a kind of inner group message
CN104219051A (en) * 2014-08-20 2014-12-17 北京奇艺世纪科技有限公司 In-group message communication method and system
CN105357226A (en) * 2015-12-16 2016-02-24 深圳市九鼎安华科技有限公司 Encryption communication method based on VOIP (voice over internet phone) communication
CN106936788B (en) * 2015-12-31 2019-10-22 北京大唐高鸿软件技术有限公司 A kind of cryptographic key distribution method suitable for VOIP voice encryption
CN106936788A (en) * 2015-12-31 2017-07-07 北京大唐高鸿软件技术有限公司 A kind of cryptographic key distribution method suitable for VOIP voice encryptions
CN106211091A (en) * 2016-09-08 2016-12-07 宇龙计算机通信科技(深圳)有限公司 A kind of method and system setting up trunking communication
CN106211091B (en) * 2016-09-08 2020-04-24 宇龙计算机通信科技(深圳)有限公司 Method and system for establishing cluster communication
CN106454757A (en) * 2016-11-23 2017-02-22 北京坦达信息科技有限公司 Communication encryption and decryption method for wireless broadband network
CN108347414A (en) * 2017-01-24 2018-07-31 中国移动通信有限公司研究院 A kind of method and apparatus of Voice Cryption
WO2018153011A1 (en) * 2017-02-23 2018-08-30 深圳市云密通讯技术有限公司 End-to-end voice encryption apparatus and encryption method for intercom system
CN106790281A (en) * 2017-02-23 2017-05-31 深圳市沃阳精密科技有限公司 A kind of end-to-end voice encryption device and encryption method towards intercom system
CN110190964A (en) * 2019-05-16 2019-08-30 苏州科达科技股份有限公司 Identity identifying method and electronic equipment
CN110190964B (en) * 2019-05-16 2022-03-15 苏州科达科技股份有限公司 Identity authentication method and electronic equipment
CN111092905A (en) * 2019-12-27 2020-05-01 郑州信大捷安信息技术股份有限公司 VOIP-based encrypted call method and system
CN111092905B (en) * 2019-12-27 2021-10-15 郑州信大捷安信息技术股份有限公司 VOIP-based encrypted call method and system
CN113163395A (en) * 2020-01-07 2021-07-23 阿里巴巴集团控股有限公司 Method and device for communication between terminal and server and key configuration
CN114125824A (en) * 2020-08-31 2022-03-01 中国电信股份有限公司 Voice encryption processing method, server, terminal, system and storage medium
WO2023039871A1 (en) * 2021-09-18 2023-03-23 海能达通信股份有限公司 Data monitoring method, apparatus, device and system

Similar Documents

Publication Publication Date Title
CN102843675A (en) Cluster call voice encryption method, terminal and system
US7643817B2 (en) Method and apparatus for rapid secure session establishment on half-duplex AD-hoc group voice cellular network channels
CN102291680B (en) Encrypted group calling method based on long term evolution (TD-LTE) trunking communication system
KR101033750B1 (en) Fast secure session on half-duplex voice network channels
JP2000504182A (en) Method and apparatus for providing a private communication system in a public telephone network
US9258700B2 (en) Systems and methods for utilizing IMS data security mechanisms in a circuit switched network
CN106982419B (en) Single call end-to-end encryption method and system for broadband cluster system
CN104539433A (en) Voice communication encryption system and encryption method thereof
CN105025475A (en) Andriod system-oriented implement method of mobile secure terminal
CN102137393B (en) Method and device for encrypting end-to-end
CN104955033A (en) Voice encryption communication method
CN106604268A (en) Voice encryption method and system and terminal
CN105553669A (en) Identity authentication based information encryption transmission apparatus, method, and control method
CN104244188A (en) Multi-user talking method in TD-LTE cluster system
CN105451195B (en) End-to-end cluster cryptographic key distribution method and equipment of the core network
CN105049201A (en) Mobile equipment secret communication system based on quantum cryptography and mobile equipment secret communication method based on quantum cryptography
CN102137394A (en) Encrypted mobile communication terminal system and method under network access
CN106470199B (en) Voice data processing method and device and intercom system
CN104936051B (en) A kind of earphone, speaker and phone system
CN103634744A (en) Cluster group call end-to-end encryption realization method
WO2022027476A1 (en) Key management method and communication apparatus
CN100512103C (en) Secret key distributing method of end-to-end encrypted telecommunication
CN101848425A (en) PTT (Push-To-Talk) data processing method, terminal, PTT server and PTT system
WO2014180390A2 (en) Trunking group communication public security implementation method and device
WO2022237421A1 (en) Key transmission method and apparatus for temporary group, and terminal and network side device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20121226

RJ01 Rejection of invention patent application after publication