CN103458400B - A kind of key management method in voice encryption communication system - Google Patents
A kind of key management method in voice encryption communication system Download PDFInfo
- Publication number
- CN103458400B CN103458400B CN201310398518.0A CN201310398518A CN103458400B CN 103458400 B CN103458400 B CN 103458400B CN 201310398518 A CN201310398518 A CN 201310398518A CN 103458400 B CN103458400 B CN 103458400B
- Authority
- CN
- China
- Prior art keywords
- key
- card
- mobile phone
- phone terminal
- communication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The invention discloses the key management method in a kind of voice encryption communication system, for the mobile phone terminal in voice encryption communication system and the construction features of the cryptographic calculations card with mobile phone terminal separation between machine and card, card key and the distribution of mobile phone key of cryptographic calculations card is completed by different communication channels, the transmission of the speech data after the application of session key and transmission and encryption, key management apparatus independently to cryptographic calculations card, mobile phone terminal assignment of password calculates card key, mobile phone key and session key ciphertext, mobile phone key and session key is obtained again from coordinating between cryptographic calculations card and mobile phone terminal, so that the transmission channel of each key separates with voice data transmission channel, improve the safety of enciphoring voice telecommunication system.
Description
Technical field
The present invention relates to field of mobile communication, particularly relate to the key management method in a kind of voice encryption communication system.
Background technology
At present, the encipherment scheme of more existing voice communications, voice encryption system has base in the solution of mobile phone terminal
Two types is realized with by software in hardware.Adding of basic employing one-time pad, is protected for voice encryption data
Close scheme, the key being encrypted speech data used in voice communication course is all different i.e. every time.Cause
And, how enabling communicating pair obtain identical session key is that voice encryption communication system guarantees speech data secret
The Important Problems of property.The session key agreement scheme used in voice encryption communication system mainly includes following two:
1, communicating pair directly communicates negotiation and determines session key.
As a example by the VOIP software Skype being widely used, in Skype voice communication system, Skype server
There is public private key pair, for carrying out authentication and coded communication between server and user.Each user is using
During Skype, generate one group of public private key pair the most voluntarily, and be sent to server, server after public key data encryption
After checking user profile, after its public key information uses privacy key encryption, the certificate as this user is distributed to system
In other users.When setting up voice communication between user, first carry out key agreement, use the PKI of both sides respectively
Key agreement data are encrypted, and then obtain can be used for the session key of this voice communication encryption.
2, there is KMC in communication system is that communicating pair distributes session key.
At present, most of existing voice communications are encrypted, and especially all there is key in mobile phone speech cryptographic communication system
Administrative center, the key used in generation system, and provide every time for the meeting of voice encryption for communication user
Words key, when setting up voice communication between user, needs first to obtain corresponding session key ability from KMC
Carrying out voice encryption communication, session key distribution data need to be encrypted protection, and key is preserved by user terminal,
The storage scheme of terminal key includes: (i), based on software, is stored in mobile phone operating system;(ii) based on hardware, deposit
It is stored in the secure hardware of SIM or mobile phone additional.
The key managing project that existing voice encryption communication system is used, can add for voice to a certain extent
Close communication system provides more preferable security guarantee, but is applied to mobile phone terminal, all there is certain problem and limitation
Property:
First, realized the safety to key at mobile phone terminal by software and protect, depend on the safety of FTP client FTP,
There is potential safety hazard.When the key storage for protecting session key agreement data is in the client of communicating pair
Time, the safety of mobile phone terminal is the basis of voice communication coded communication safety, due to current operation system of smart phone
All there is certain safety problem, in the case of mobile phone terminal exists leak or suffers malicious attack, only by mobile phone eventually
Key is protected and be there is certain potential safety hazard by end.
Secondly, use hardware to realize the safety to key at mobile phone terminal and protect, depend on mobile phone hardware transformation, no
Tool versatility.If the safeguard protection of key uses the secure hardware added by mobile phone terminal to realize, then be accomplished by opponent
Machine has special hsrdware requirements, can not be applicable on market the general mobile phone that can directly buy;On the other hand, if
Key safety is protected by SIM, it is necessary to the security service being provided corresponding key management by operator, does not has
There is the good suitability.
Summary of the invention
The invention provides the key management method in a kind of voice encryption communication system, by the difference used in system
The key of kind is distributed respectively by different communication ports and is transmitted, encrypted voice communication use and key
Transmit different network data transmission modes to be transmitted so that key data and speech data have carried out good isolation,
The key distribution of diversification and transmission means, improve the degree of protection for key, ensure that key data well
Safety in transmitting procedure, and then improve the safety of mobile phone speech cryptographic communication system.
For solving the problems referred to above, the invention provides the key management method in a kind of voice encryption communication system, described
Voice encryption communication system includes mobile phone terminal, separate with mobile phone terminal cryptographic calculations card and key management apparatus;
Described method includes:
Card key and mobile phone key distributing step:
Key management apparatus generates the card key of cryptographic calculations card;
Key management apparatus is connected by the first communication port foundation with cryptographic calculations card, is sent out by the described card key generated
Deliver to cryptographic calculations card;
Mobile phone terminal is connected by the second communication port foundation with key management apparatus, asks mobile phone to key management apparatus
Key;
Key management apparatus generates mobile phone key, sends the corresponding card key of use by the second communication port to mobile phone terminal
The mobile phone key ciphertext of encryption;
Mobile phone terminal is connected with cryptographic calculations card, the card key of cryptographic calculations card decipher mobile phone key ciphertext and obtain mobile phone
Key;
Session key distribution step:
Calling party's mobile phone terminal sends session key solicited message by third communication passage to key management apparatus;
Key management apparatus generates session key, and described session key is utilized respectively card key and the hands of communicating pair
Secret key encryption obtains session key ciphertext, and key management apparatus will be calculated by calling party's mobile phone key and calling party passcode
Card card key encryption the first session key ciphertext, by called party cell phone key and the Herba Carlinae biebersteinii of callee's cryptographic calculations card
Second session key ciphertext of key encryption is supplied to calling party's mobile phone terminal and called party cell phone terminal;
Voice encryption stage of communication:
Voice encryption communication calling party utilizes calling party's mobile phone key and card key to decipher the first session key ciphertext, called
Fang Liyong called party cell phone key and card key are deciphered the second session key ciphertext and are obtained session key, voice encryption communication
Both sides use session key, are encrypted voice communication data, and the speech data after encryption passes through fourth communication channel
It is transmitted.
Further, in described session key distribution step, key management apparatus will be by calling party's mobile phone key and calling party
Cryptographic calculations card card key encryption the first session key ciphertext, by called party cell phone key and callee's cryptographic calculations
Second session key ciphertext of the card key encryption of card is sent to calling party's mobile phone terminal, caller by third communication channel
Side mobile phone terminal before voice secret stage of communication by the second session key ciphertext by fourth communication channel be transmitted to by
The side's of crying mobile phone terminal.
Further, in described session key distribution step, key management apparatus will be by calling party's mobile phone key and calling party
Cryptographic calculations card card key encryption the first session key ciphertext, by called party cell phone key and callee's cryptographic calculations
Second session key ciphertext of the card key encryption of card is sent to called party cell phone terminal by third communication channel, called
Second session key ciphertext was transmitted to main before voice secret stage of communication by side's mobile phone terminal by fourth communication channel
The side's of crying mobile phone terminal.
Further, in session key distribution step, key management apparatus will be by calling party's mobile phone key and calling party passcode
First session key ciphertext of the card key encryption calculating card is sent to calling party's mobile phone terminal by third communication channel,
And by the second session key ciphertext of being encrypted by the card key of called party cell phone key and callee's cryptographic calculations card by the
Three communication channels send to calling party's mobile phone terminal.
Further, after communicating pair mobile phone terminal completes voice encryption communication, communicating pair mobile phone terminal deletes session
Key.
Described key management method farther includes mobile phone key and card key updates and cancels step:
Preset mobile phone key and card key updates Rule of judgment;
When meeting the renewal Rule of judgment preset, key management apparatus nullifies existing card key and mobile phone key, and
Perform card key and mobile phone key distributing step, it is achieved mobile phone key and card key update and cancel.
Further, described first communication port be NFC, RFID, infrared or blue-teeth data interface channel.
Further, described second communication port is note data passage, cable data passage or Bluetooth data channel.
Further, described third communication passage is note data passage.
Further, described fourth communication channel be WIFI, GSM, CDMA, CDMA2000, WCDMA,
TD-CDMA or LTE data communication channel.
Use the key management method in the voice encryption communication system of present invention offer, for voice encryption communication system
In mobile phone terminal and the construction features of cryptographic calculations card with mobile phone terminal separation between machine and card, believed by different communication
After road completes the card key of cryptographic calculations card and the distribution of mobile phone key, the application of session key and transmission and encryption
The transmission of speech data, key management apparatus independently to cryptographic calculations card, mobile phone terminal assignment of password calculate card
Key, mobile phone key and session key ciphertext, then obtained mobile phone from coordinating between cryptographic calculations card and mobile phone terminal
Key and session key, so that the transmission channel of each key separates with voice data transmission channel, improve and add cipher
The safety of sound communication system.
Accompanying drawing explanation
Fig. 1 is the structural representation of voice encryption communication system of the present invention;
Fig. 2 is the schematic flow sheet of key management method of the present invention;
Fig. 3 is that in key management method voice of the present invention, mobile phone key and card key update and cancel steps flow chart and show
It is intended to.
Detailed description of the invention
In order to make the purpose of the present invention, technical scheme and advantage clearer, develop simultaneously reality referring to the drawings
Execute example, the present invention is described in further detail.
As Fig. 1 discloses the structural representation of a kind of voice encryption communication system, it includes mobile phone terminal and hands
The cryptographic calculations card of machine terminal separation and key management apparatus.
Based on voice encryption communication system architecture as shown in Figure 1, the invention provides a kind of key management method,
Key management method of the present invention is the generation including key, the broad sense key management transmitted and use,
Concrete, key management method includes:
Card key and mobile phone key distributing step:
Key management apparatus generates the card key of cryptographic calculations card;
Key management apparatus is connected by the first communication port foundation with cryptographic calculations card, is sent out by the described card key generated
Deliver to cryptographic calculations card;
Mobile phone terminal is connected by the second communication port foundation with key management apparatus, asks mobile phone to key management apparatus
Key;
Key management apparatus generates mobile phone key, sends the corresponding card key of use by the second communication port to mobile phone terminal
The mobile phone key ciphertext of encryption;
Mobile phone terminal is connected with cryptographic calculations card, the card key of cryptographic calculations card decipher mobile phone key ciphertext and obtain mobile phone
Key;
Session key distribution step:
Calling party's mobile phone terminal sends session key solicited message by third communication passage to key management apparatus;
Key management apparatus generates session key, and described session key is utilized respectively card key and the hands of communicating pair
Secret key encryption obtains session key ciphertext, and key management apparatus will be calculated by calling party's mobile phone key and calling party passcode
Card card key encryption the first session key ciphertext, by called party cell phone key and the Herba Carlinae biebersteinii of callee's cryptographic calculations card
Second session key ciphertext of key encryption is supplied to calling party's mobile phone terminal and called party cell phone terminal;
Voice encryption stage of communication:
Voice encryption communication calling party utilizes calling party's mobile phone key and card key to decipher the first session key ciphertext, called
Fang Liyong called party cell phone key and card key are deciphered the second session key ciphertext and are obtained session key, voice encryption communication
Both sides use session key, are encrypted voice communication data, and the speech data after encryption passes through fourth communication channel
It is transmitted;
Wherein, the first session key ciphertext and the second session key ciphertext are supplied to calling party by key management apparatus
Mobile phone terminal and called party cell phone terminal specifically can include following three kinds of implementations:
One, key management apparatus will be calculated the card key encryption of card by calling party's mobile phone key and calling party passcode
The first session key ciphertext, encrypted by the card key of called party cell phone key and callee's cryptographic calculations card the
Two session key ciphertexts are sent to calling party's mobile phone terminal by third communication channel, and calling party's mobile phone terminal is at language
Before the sound confidential communication stage, the second session key ciphertext is transmitted to called party cell phone eventually by fourth communication channel
End;
Its two, key management apparatus will be calculated the card key encryption of card by calling party's mobile phone key and calling party passcode
The first session key ciphertext, encrypted by the card key of called party cell phone key and callee's cryptographic calculations card the
Two session key ciphertexts are sent to called party cell phone terminal by third communication channel, and called party cell phone terminal is at language
Before the sound confidential communication stage, the second session key ciphertext is transmitted to calling party's mobile phone eventually by fourth communication channel
End;
Its three, key management apparatus will be calculated the card key encryption of card by calling party's mobile phone key and calling party passcode
The first session key ciphertext sent to calling party's mobile phone terminal by third communication channel, and will be by callee's hands
Second session key ciphertext of the card key encryption of secret key and callee's cryptographic calculations card is by third communication channel
Send to calling party's mobile phone terminal.
As preferably, the first communication port is NFC, RFID, infrared or blue-teeth data interface channel;Described second
Communication port is note data passage, cable data passage or Bluetooth data channel;Described third communication passage is note
Data channel;Described fourth communication channel is WIFI, GSM, CDMA, CDMA2000, WCDMA,
TD-CDMA or LTE data communication channel.
It should be noted that in key management apparatus session key distribution step, it will words key is utilized respectively logical
The card key of the cryptographic calculations card of letter both sides and mobile phone key encryption obtain the means of session key ciphertext and can use
Mode to session key sectional encryption, such as, in using the part of cryptographic calculations card key encryption session key
Holding, other partial contents of recycling mobile phone key encryption session key, accordingly when deciphering, by password meter
After calculation card key and mobile phone key decipher respective encrypted content respectively, recombinant forms final session key;Also
The can be formed after such as using cryptographic calculations card key encryption session key to use in the way of dual nested partitions method
Ciphertext, then have formation second time ciphertext after mobile phone key encryption, successively use cryptographic calculations Herba Carlinae biebersteinii during deciphering
Key and mobile phone key deciphering finally give session key etc. mode, do not repeat them here.
Further, after communicating pair mobile phone terminal completes voice encryption communication, communicating pair mobile phone terminal is deleted
Session key;As preferably, the session key obtained is deciphered for the first key ciphertext and the second key ciphertext,
All among the internal memory of calling party's mobile phone terminal and called party cell phone terminal, after voice encryption communication completes, caller
Side's mobile phone terminal and called party cell phone terminal remove internal memory automatically, to guarantee that communication two party is obtaining session key extremely
During sign off, session key is not read by other programs.
Further, key management method includes that mobile phone key and cryptographic calculations card key update and cancel step, as
Shown in Fig. 3:
The card key presetting mobile phone key and cryptographic calculations card updates Rule of judgment;
When meeting the renewal Rule of judgment preset, key management apparatus nullifies the card of the cryptographic calculations card generated
Key and mobile phone key, and perform described cryptographic calculations card key and mobile phone key distributing step, it is achieved mobile phone is close
Key and card key update and cancel.
It should be noted that those skilled in the art can need to set according to concrete application updates Rule of judgment, as
Set the threshold value of design parameter, compared by parameter value and threshold value and judge to update whether Rule of judgment meets
Realize, etc. means, the judgement whether default update condition meets, or when cryptographic calculations card is lost, again send out
During row cryptographic calculations card, key management apparatus needs to update card key and corresponding mobile phone key, the most superfluous at this
State.
Use the key management method in the voice encryption communication system of present invention offer, for voice encryption communication
Mobile phone terminal in system and the construction features of the cryptographic calculations card with mobile phone terminal separation between machine and card, by difference
Communication channel complete card key and the distribution of mobile phone key, the application of session key and the transmission of cryptographic calculations card
And the transmission of speech data after encryption, key management apparatus independently to cryptographic calculations card, mobile phone eventually
End assignment of password calculates card key, mobile phone key and session key ciphertext, more whole with mobile phone by cryptographic calculations card
Cooperation between end obtains mobile phone key and session key, so that the transmission channel of each key passes with speech data
Defeated channel separates, and improves the safety of enciphoring voice telecommunication system.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all in the present invention
Spirit and principle within, any modification, equivalent substitution and improvement etc. done, should be included in the present invention protect
Within the scope of protecting.
Claims (10)
1. the key management method in a voice encryption communication system, it is characterised in that described voice encryption communication system
System includes mobile phone terminal, the cryptographic calculations card that separates with mobile phone terminal and key management apparatus;Described method includes:
Card key and mobile phone key distributing step:
Key management apparatus generates the card key of cryptographic calculations card;
Key management apparatus is connected by the first communication port foundation with cryptographic calculations card, is sent out by the described card key generated
Deliver to cryptographic calculations card;
Mobile phone terminal is connected by the second communication port foundation with key management apparatus, asks mobile phone to key management apparatus
Key;
Key management apparatus generates mobile phone key, sends the corresponding card key of use by the second communication port to mobile phone terminal
The mobile phone key ciphertext of encryption;
Mobile phone terminal is connected with cryptographic calculations card, the card key of cryptographic calculations card decipher mobile phone key ciphertext and obtain mobile phone
Key;
Session key distribution step:
Calling party's mobile phone terminal sends session key solicited message by third communication passage to key management apparatus;
Key management apparatus generates session key, and described session key is utilized respectively card key and the hands of communicating pair
Secret key encryption obtains session key ciphertext, and key management apparatus will be calculated by calling party's mobile phone key and calling party passcode
Card card key encryption the first session key ciphertext, by called party cell phone key and the Herba Carlinae biebersteinii of callee's cryptographic calculations card
Second session key ciphertext of key encryption is supplied to calling party's mobile phone terminal and called party cell phone terminal;
Voice encryption stage of communication:
Voice encryption communication calling party utilizes calling party's mobile phone key and card key to decipher the first session key ciphertext, called
Fang Liyong called party cell phone key and card key are deciphered the second session key ciphertext and are obtained session key, voice encryption communication
Both sides use session key, are encrypted voice communication data, and the speech data after encryption passes through fourth communication channel
It is transmitted.
Key management method the most according to claim 1, it is characterised in that in described session key distribution step,
Key management apparatus will be calculated the first session key of the card key encryption of card by calling party's mobile phone key and calling party passcode
Ciphertext, the second session key ciphertext encrypted by the card key of called party cell phone key and callee's cryptographic calculations card are passed through
Third communication channel sends to calling party's mobile phone terminal, calling party's mobile phone terminal before voice encryption stage of communication by the
Two session key ciphertexts are transmitted to called party cell phone terminal by fourth communication channel.
Key management method the most according to claim 1, it is characterised in that in described session key distribution step,
Key management apparatus will be calculated the first session key of the card key encryption of card by calling party's mobile phone key and calling party passcode
Ciphertext, the second session key ciphertext encrypted by the card key of called party cell phone key and callee's cryptographic calculations card are passed through
Third communication channel sends to called party cell phone terminal, called party cell phone terminal before voice encryption stage of communication by the
Two session key ciphertexts are transmitted to calling party's mobile phone terminal by fourth communication channel.
Key management method the most according to claim 1, it is characterised in that in session key distribution step, close
Key management equipment is by close for the first session key being calculated the card key encryption of card by calling party's mobile phone key and calling party passcode
Literary composition is sent to calling party's mobile phone terminal by third communication channel, and will be by called party cell phone key and callee's password meter
Second session key ciphertext of the card key encryption calculating card is sent to calling party's mobile phone terminal by third communication channel.
Key management method the most according to claim 1, it is characterised in that when communicating pair mobile phone terminal completes
After voice encryption communication, communicating pair mobile phone terminal deletes session key.
Key management method the most according to claim 1, it is characterised in that farther include mobile phone key and card
Key updating with cancel step:
Preset mobile phone key and card key updates Rule of judgment;
When meeting the renewal Rule of judgment preset, key management apparatus nullifies existing card key and mobile phone key, and
Perform card key and mobile phone key distributing step, it is achieved mobile phone key and card key update and cancel.
7. according to the key management method described in any one of claim 1 to 6, it is characterised in that described first communication
Passage is NFC, RFID, infrared or blue-teeth data interface channel.
8. according to the key management method described in any one of claim 1 to 6, it is characterised in that described second leads to
Letter passage is note data passage, cable data passage or Bluetooth data channel.
9. according to the key management method described in any one of claim 1 to 6, it is characterised in that the described third communication
Passage is note data passage.
Key management method the most according to claim 1, it is characterised in that described fourth communication channel is
WIFI, GSM, CDMA, CDMA2000, WCDMA, TD-CDMA or LTE data communication channel.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310398518.0A CN103458400B (en) | 2013-09-05 | 2013-09-05 | A kind of key management method in voice encryption communication system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310398518.0A CN103458400B (en) | 2013-09-05 | 2013-09-05 | A kind of key management method in voice encryption communication system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103458400A CN103458400A (en) | 2013-12-18 |
CN103458400B true CN103458400B (en) | 2017-01-04 |
Family
ID=49740273
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310398518.0A Active CN103458400B (en) | 2013-09-05 | 2013-09-05 | A kind of key management method in voice encryption communication system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103458400B (en) |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103452840A (en) * | 2013-09-12 | 2013-12-18 | 安徽奥特佳科技发展有限公司 | Electric scroll compressor realizing two-stage compression and middle injection for automobile heat pump |
CN104836660A (en) * | 2014-02-12 | 2015-08-12 | 中国银联股份有限公司 | Password management method and system |
CN105592434A (en) * | 2014-10-23 | 2016-05-18 | 中兴通讯股份有限公司 | Method and device for managing D2D (Device to Device) communication group |
CN106301767B (en) * | 2015-05-13 | 2020-01-03 | 中兴通讯股份有限公司 | Encrypted call processing method, device, terminal and KMC |
CN106936767A (en) * | 2015-12-29 | 2017-07-07 | 北京大唐高鸿数据网络技术有限公司 | Secure communication terminal and its communication means |
CN105722069A (en) * | 2016-03-24 | 2016-06-29 | 深圳市创百通讯科技有限公司 | Mobile terminal capable of encrypting voice information and encryption method thereof |
CN107872319A (en) * | 2016-09-22 | 2018-04-03 | 国民技术股份有限公司 | Information transferring method, device and message receiving method, device |
CN106788989B (en) * | 2016-11-30 | 2020-01-21 | 华为技术有限公司 | Method and equipment for establishing secure encrypted channel |
CN107995210A (en) * | 2017-12-19 | 2018-05-04 | 芯盾(北京)信息技术有限公司 | The voice encryption communication means that key and ciphertext are transmitted by different domain transmissions |
CN111107038B (en) * | 2018-10-25 | 2022-07-29 | 山东量子科学技术研究院有限公司 | Encryption method, decryption method and device |
CN110086800B (en) * | 2019-04-23 | 2021-08-27 | 北京中宸泓昌科技有限公司 | Method and device for secret communication |
CN111818023A (en) * | 2020-06-23 | 2020-10-23 | 中国商用飞机有限责任公司 | Data transmission method and data transmission system suitable for air-ground communication link |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN200990610Y (en) * | 2006-10-27 | 2007-12-12 | 上海复旦微电子股份有限公司 | Communication ciphered cell phone |
CN101635924A (en) * | 2009-08-27 | 2010-01-27 | 成都卫士通信息产业股份有限公司 | CDMA port-to-port encryption communication system and key distribution method thereof |
CN101808320A (en) * | 2010-02-01 | 2010-08-18 | 中兴通讯股份有限公司 | Encryption method and system |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101330634A (en) * | 2008-07-04 | 2008-12-24 | 金法银 | Multifunctional digital ciphering walkie-talkie and implementing method thereof |
CN103279648A (en) * | 2013-05-06 | 2013-09-04 | 天津踏浪科技股份有限公司 | Electronic noting handheld terminal based on voice password |
-
2013
- 2013-09-05 CN CN201310398518.0A patent/CN103458400B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN200990610Y (en) * | 2006-10-27 | 2007-12-12 | 上海复旦微电子股份有限公司 | Communication ciphered cell phone |
CN101635924A (en) * | 2009-08-27 | 2010-01-27 | 成都卫士通信息产业股份有限公司 | CDMA port-to-port encryption communication system and key distribution method thereof |
CN101808320A (en) * | 2010-02-01 | 2010-08-18 | 中兴通讯股份有限公司 | Encryption method and system |
Also Published As
Publication number | Publication date |
---|---|
CN103458400A (en) | 2013-12-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103458400B (en) | A kind of key management method in voice encryption communication system | |
CN104486077B (en) | A kind of end-to-end cryptographic key negotiation method of VoIP real time datas safe transmission | |
CN101340443B (en) | Session key negotiating method, system and server in communication network | |
CN102572817B (en) | Method and intelligent memory card for realizing mobile communication confidentiality | |
CN102547688B (en) | Virtual-dedicated-channel-based establishment method for high-credibility mobile security communication channel | |
CN101102186B (en) | Method for implementing general authentication framework service push | |
CN102045210B (en) | End-to-end session key consultation method and system for supporting lawful interception | |
CN104769982B (en) | The method and device securely communicated between user equipment | |
CN101515319B (en) | Cipher key processing method, cipher key cryptography service system and cipher key consultation method | |
CN104092663A (en) | Encryption communication method and encryption communication system | |
CN101635924B (en) | CDMA port-to-port encryption communication system and key distribution method thereof | |
CN104468126B (en) | A kind of safe communication system and method | |
CN102202299A (en) | Realization method of end-to-end voice encryption system based on 3G/B3G | |
CN106603504A (en) | VoIP (Voice over Internet Protocol) encrypting and monitoring methods and VoIP encrypting and monitoring devices | |
CN102036230A (en) | Method for implementing local route service, base station and system | |
CN101895882A (en) | Data transmission method, system and device in WiMAX system | |
CN104901803A (en) | Data interaction safety protection method based on CPK identity authentication technology | |
CN104168565A (en) | Method for controlling safe communication of intelligent terminal under undependable wireless network environment | |
CN103684783A (en) | Communication encryption method based on communication network | |
CN105262759A (en) | Method and system for encrypted communication | |
CN107451647B (en) | Built-in safety mechanism's special SIM card of barracks | |
CN106209384B (en) | Use the client terminal of security mechanism and the communication authentication method of charging unit | |
CN113365264A (en) | Block chain wireless network data transmission method, device and system | |
CN110166410A (en) | A kind of method of safety-oriented data transfer, terminal and multi-mode communication terminal | |
CN109586899A (en) | Signaling manipulation and its indicating means, device and computer storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |