CN103458400B - A kind of key management method in voice encryption communication system - Google Patents

A kind of key management method in voice encryption communication system Download PDF

Info

Publication number
CN103458400B
CN103458400B CN201310398518.0A CN201310398518A CN103458400B CN 103458400 B CN103458400 B CN 103458400B CN 201310398518 A CN201310398518 A CN 201310398518A CN 103458400 B CN103458400 B CN 103458400B
Authority
CN
China
Prior art keywords
key
card
mobile phone
phone terminal
communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310398518.0A
Other languages
Chinese (zh)
Other versions
CN103458400A (en
Inventor
王琼霄
王平建
王跃武
荆继武
周健
雷灵光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Data Assurance and Communication Security Research Center of CAS
Original Assignee
Data Assurance and Communication Security Research Center of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Data Assurance and Communication Security Research Center of CAS filed Critical Data Assurance and Communication Security Research Center of CAS
Priority to CN201310398518.0A priority Critical patent/CN103458400B/en
Publication of CN103458400A publication Critical patent/CN103458400A/en
Application granted granted Critical
Publication of CN103458400B publication Critical patent/CN103458400B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses the key management method in a kind of voice encryption communication system, for the mobile phone terminal in voice encryption communication system and the construction features of the cryptographic calculations card with mobile phone terminal separation between machine and card, card key and the distribution of mobile phone key of cryptographic calculations card is completed by different communication channels, the transmission of the speech data after the application of session key and transmission and encryption, key management apparatus independently to cryptographic calculations card, mobile phone terminal assignment of password calculates card key, mobile phone key and session key ciphertext, mobile phone key and session key is obtained again from coordinating between cryptographic calculations card and mobile phone terminal, so that the transmission channel of each key separates with voice data transmission channel, improve the safety of enciphoring voice telecommunication system.

Description

A kind of key management method in voice encryption communication system
Technical field
The present invention relates to field of mobile communication, particularly relate to the key management method in a kind of voice encryption communication system.
Background technology
At present, the encipherment scheme of more existing voice communications, voice encryption system has base in the solution of mobile phone terminal Two types is realized with by software in hardware.Adding of basic employing one-time pad, is protected for voice encryption data Close scheme, the key being encrypted speech data used in voice communication course is all different i.e. every time.Cause And, how enabling communicating pair obtain identical session key is that voice encryption communication system guarantees speech data secret The Important Problems of property.The session key agreement scheme used in voice encryption communication system mainly includes following two:
1, communicating pair directly communicates negotiation and determines session key.
As a example by the VOIP software Skype being widely used, in Skype voice communication system, Skype server There is public private key pair, for carrying out authentication and coded communication between server and user.Each user is using During Skype, generate one group of public private key pair the most voluntarily, and be sent to server, server after public key data encryption After checking user profile, after its public key information uses privacy key encryption, the certificate as this user is distributed to system In other users.When setting up voice communication between user, first carry out key agreement, use the PKI of both sides respectively Key agreement data are encrypted, and then obtain can be used for the session key of this voice communication encryption.
2, there is KMC in communication system is that communicating pair distributes session key.
At present, most of existing voice communications are encrypted, and especially all there is key in mobile phone speech cryptographic communication system Administrative center, the key used in generation system, and provide every time for the meeting of voice encryption for communication user Words key, when setting up voice communication between user, needs first to obtain corresponding session key ability from KMC Carrying out voice encryption communication, session key distribution data need to be encrypted protection, and key is preserved by user terminal, The storage scheme of terminal key includes: (i), based on software, is stored in mobile phone operating system;(ii) based on hardware, deposit It is stored in the secure hardware of SIM or mobile phone additional.
The key managing project that existing voice encryption communication system is used, can add for voice to a certain extent Close communication system provides more preferable security guarantee, but is applied to mobile phone terminal, all there is certain problem and limitation Property:
First, realized the safety to key at mobile phone terminal by software and protect, depend on the safety of FTP client FTP, There is potential safety hazard.When the key storage for protecting session key agreement data is in the client of communicating pair Time, the safety of mobile phone terminal is the basis of voice communication coded communication safety, due to current operation system of smart phone All there is certain safety problem, in the case of mobile phone terminal exists leak or suffers malicious attack, only by mobile phone eventually Key is protected and be there is certain potential safety hazard by end.
Secondly, use hardware to realize the safety to key at mobile phone terminal and protect, depend on mobile phone hardware transformation, no Tool versatility.If the safeguard protection of key uses the secure hardware added by mobile phone terminal to realize, then be accomplished by opponent Machine has special hsrdware requirements, can not be applicable on market the general mobile phone that can directly buy;On the other hand, if Key safety is protected by SIM, it is necessary to the security service being provided corresponding key management by operator, does not has There is the good suitability.
Summary of the invention
The invention provides the key management method in a kind of voice encryption communication system, by the difference used in system The key of kind is distributed respectively by different communication ports and is transmitted, encrypted voice communication use and key Transmit different network data transmission modes to be transmitted so that key data and speech data have carried out good isolation, The key distribution of diversification and transmission means, improve the degree of protection for key, ensure that key data well Safety in transmitting procedure, and then improve the safety of mobile phone speech cryptographic communication system.
For solving the problems referred to above, the invention provides the key management method in a kind of voice encryption communication system, described Voice encryption communication system includes mobile phone terminal, separate with mobile phone terminal cryptographic calculations card and key management apparatus; Described method includes:
Card key and mobile phone key distributing step:
Key management apparatus generates the card key of cryptographic calculations card;
Key management apparatus is connected by the first communication port foundation with cryptographic calculations card, is sent out by the described card key generated Deliver to cryptographic calculations card;
Mobile phone terminal is connected by the second communication port foundation with key management apparatus, asks mobile phone to key management apparatus Key;
Key management apparatus generates mobile phone key, sends the corresponding card key of use by the second communication port to mobile phone terminal The mobile phone key ciphertext of encryption;
Mobile phone terminal is connected with cryptographic calculations card, the card key of cryptographic calculations card decipher mobile phone key ciphertext and obtain mobile phone Key;
Session key distribution step:
Calling party's mobile phone terminal sends session key solicited message by third communication passage to key management apparatus;
Key management apparatus generates session key, and described session key is utilized respectively card key and the hands of communicating pair Secret key encryption obtains session key ciphertext, and key management apparatus will be calculated by calling party's mobile phone key and calling party passcode Card card key encryption the first session key ciphertext, by called party cell phone key and the Herba Carlinae biebersteinii of callee's cryptographic calculations card Second session key ciphertext of key encryption is supplied to calling party's mobile phone terminal and called party cell phone terminal;
Voice encryption stage of communication:
Voice encryption communication calling party utilizes calling party's mobile phone key and card key to decipher the first session key ciphertext, called Fang Liyong called party cell phone key and card key are deciphered the second session key ciphertext and are obtained session key, voice encryption communication Both sides use session key, are encrypted voice communication data, and the speech data after encryption passes through fourth communication channel It is transmitted.
Further, in described session key distribution step, key management apparatus will be by calling party's mobile phone key and calling party Cryptographic calculations card card key encryption the first session key ciphertext, by called party cell phone key and callee's cryptographic calculations Second session key ciphertext of the card key encryption of card is sent to calling party's mobile phone terminal, caller by third communication channel Side mobile phone terminal before voice secret stage of communication by the second session key ciphertext by fourth communication channel be transmitted to by The side's of crying mobile phone terminal.
Further, in described session key distribution step, key management apparatus will be by calling party's mobile phone key and calling party Cryptographic calculations card card key encryption the first session key ciphertext, by called party cell phone key and callee's cryptographic calculations Second session key ciphertext of the card key encryption of card is sent to called party cell phone terminal by third communication channel, called Second session key ciphertext was transmitted to main before voice secret stage of communication by side's mobile phone terminal by fourth communication channel The side's of crying mobile phone terminal.
Further, in session key distribution step, key management apparatus will be by calling party's mobile phone key and calling party passcode First session key ciphertext of the card key encryption calculating card is sent to calling party's mobile phone terminal by third communication channel, And by the second session key ciphertext of being encrypted by the card key of called party cell phone key and callee's cryptographic calculations card by the Three communication channels send to calling party's mobile phone terminal.
Further, after communicating pair mobile phone terminal completes voice encryption communication, communicating pair mobile phone terminal deletes session Key.
Described key management method farther includes mobile phone key and card key updates and cancels step:
Preset mobile phone key and card key updates Rule of judgment;
When meeting the renewal Rule of judgment preset, key management apparatus nullifies existing card key and mobile phone key, and Perform card key and mobile phone key distributing step, it is achieved mobile phone key and card key update and cancel.
Further, described first communication port be NFC, RFID, infrared or blue-teeth data interface channel.
Further, described second communication port is note data passage, cable data passage or Bluetooth data channel.
Further, described third communication passage is note data passage.
Further, described fourth communication channel be WIFI, GSM, CDMA, CDMA2000, WCDMA, TD-CDMA or LTE data communication channel.
Use the key management method in the voice encryption communication system of present invention offer, for voice encryption communication system In mobile phone terminal and the construction features of cryptographic calculations card with mobile phone terminal separation between machine and card, believed by different communication After road completes the card key of cryptographic calculations card and the distribution of mobile phone key, the application of session key and transmission and encryption The transmission of speech data, key management apparatus independently to cryptographic calculations card, mobile phone terminal assignment of password calculate card Key, mobile phone key and session key ciphertext, then obtained mobile phone from coordinating between cryptographic calculations card and mobile phone terminal Key and session key, so that the transmission channel of each key separates with voice data transmission channel, improve and add cipher The safety of sound communication system.
Accompanying drawing explanation
Fig. 1 is the structural representation of voice encryption communication system of the present invention;
Fig. 2 is the schematic flow sheet of key management method of the present invention;
Fig. 3 is that in key management method voice of the present invention, mobile phone key and card key update and cancel steps flow chart and show It is intended to.
Detailed description of the invention
In order to make the purpose of the present invention, technical scheme and advantage clearer, develop simultaneously reality referring to the drawings Execute example, the present invention is described in further detail.
As Fig. 1 discloses the structural representation of a kind of voice encryption communication system, it includes mobile phone terminal and hands The cryptographic calculations card of machine terminal separation and key management apparatus.
Based on voice encryption communication system architecture as shown in Figure 1, the invention provides a kind of key management method, Key management method of the present invention is the generation including key, the broad sense key management transmitted and use, Concrete, key management method includes:
Card key and mobile phone key distributing step:
Key management apparatus generates the card key of cryptographic calculations card;
Key management apparatus is connected by the first communication port foundation with cryptographic calculations card, is sent out by the described card key generated Deliver to cryptographic calculations card;
Mobile phone terminal is connected by the second communication port foundation with key management apparatus, asks mobile phone to key management apparatus Key;
Key management apparatus generates mobile phone key, sends the corresponding card key of use by the second communication port to mobile phone terminal The mobile phone key ciphertext of encryption;
Mobile phone terminal is connected with cryptographic calculations card, the card key of cryptographic calculations card decipher mobile phone key ciphertext and obtain mobile phone Key;
Session key distribution step:
Calling party's mobile phone terminal sends session key solicited message by third communication passage to key management apparatus;
Key management apparatus generates session key, and described session key is utilized respectively card key and the hands of communicating pair Secret key encryption obtains session key ciphertext, and key management apparatus will be calculated by calling party's mobile phone key and calling party passcode Card card key encryption the first session key ciphertext, by called party cell phone key and the Herba Carlinae biebersteinii of callee's cryptographic calculations card Second session key ciphertext of key encryption is supplied to calling party's mobile phone terminal and called party cell phone terminal;
Voice encryption stage of communication:
Voice encryption communication calling party utilizes calling party's mobile phone key and card key to decipher the first session key ciphertext, called Fang Liyong called party cell phone key and card key are deciphered the second session key ciphertext and are obtained session key, voice encryption communication Both sides use session key, are encrypted voice communication data, and the speech data after encryption passes through fourth communication channel It is transmitted;
Wherein, the first session key ciphertext and the second session key ciphertext are supplied to calling party by key management apparatus Mobile phone terminal and called party cell phone terminal specifically can include following three kinds of implementations:
One, key management apparatus will be calculated the card key encryption of card by calling party's mobile phone key and calling party passcode The first session key ciphertext, encrypted by the card key of called party cell phone key and callee's cryptographic calculations card the Two session key ciphertexts are sent to calling party's mobile phone terminal by third communication channel, and calling party's mobile phone terminal is at language Before the sound confidential communication stage, the second session key ciphertext is transmitted to called party cell phone eventually by fourth communication channel End;
Its two, key management apparatus will be calculated the card key encryption of card by calling party's mobile phone key and calling party passcode The first session key ciphertext, encrypted by the card key of called party cell phone key and callee's cryptographic calculations card the Two session key ciphertexts are sent to called party cell phone terminal by third communication channel, and called party cell phone terminal is at language Before the sound confidential communication stage, the second session key ciphertext is transmitted to calling party's mobile phone eventually by fourth communication channel End;
Its three, key management apparatus will be calculated the card key encryption of card by calling party's mobile phone key and calling party passcode The first session key ciphertext sent to calling party's mobile phone terminal by third communication channel, and will be by callee's hands Second session key ciphertext of the card key encryption of secret key and callee's cryptographic calculations card is by third communication channel Send to calling party's mobile phone terminal.
As preferably, the first communication port is NFC, RFID, infrared or blue-teeth data interface channel;Described second Communication port is note data passage, cable data passage or Bluetooth data channel;Described third communication passage is note Data channel;Described fourth communication channel is WIFI, GSM, CDMA, CDMA2000, WCDMA, TD-CDMA or LTE data communication channel.
It should be noted that in key management apparatus session key distribution step, it will words key is utilized respectively logical The card key of the cryptographic calculations card of letter both sides and mobile phone key encryption obtain the means of session key ciphertext and can use Mode to session key sectional encryption, such as, in using the part of cryptographic calculations card key encryption session key Holding, other partial contents of recycling mobile phone key encryption session key, accordingly when deciphering, by password meter After calculation card key and mobile phone key decipher respective encrypted content respectively, recombinant forms final session key;Also The can be formed after such as using cryptographic calculations card key encryption session key to use in the way of dual nested partitions method Ciphertext, then have formation second time ciphertext after mobile phone key encryption, successively use cryptographic calculations Herba Carlinae biebersteinii during deciphering Key and mobile phone key deciphering finally give session key etc. mode, do not repeat them here.
Further, after communicating pair mobile phone terminal completes voice encryption communication, communicating pair mobile phone terminal is deleted Session key;As preferably, the session key obtained is deciphered for the first key ciphertext and the second key ciphertext, All among the internal memory of calling party's mobile phone terminal and called party cell phone terminal, after voice encryption communication completes, caller Side's mobile phone terminal and called party cell phone terminal remove internal memory automatically, to guarantee that communication two party is obtaining session key extremely During sign off, session key is not read by other programs.
Further, key management method includes that mobile phone key and cryptographic calculations card key update and cancel step, as Shown in Fig. 3:
The card key presetting mobile phone key and cryptographic calculations card updates Rule of judgment;
When meeting the renewal Rule of judgment preset, key management apparatus nullifies the card of the cryptographic calculations card generated Key and mobile phone key, and perform described cryptographic calculations card key and mobile phone key distributing step, it is achieved mobile phone is close Key and card key update and cancel.
It should be noted that those skilled in the art can need to set according to concrete application updates Rule of judgment, as Set the threshold value of design parameter, compared by parameter value and threshold value and judge to update whether Rule of judgment meets Realize, etc. means, the judgement whether default update condition meets, or when cryptographic calculations card is lost, again send out During row cryptographic calculations card, key management apparatus needs to update card key and corresponding mobile phone key, the most superfluous at this State.
Use the key management method in the voice encryption communication system of present invention offer, for voice encryption communication Mobile phone terminal in system and the construction features of the cryptographic calculations card with mobile phone terminal separation between machine and card, by difference Communication channel complete card key and the distribution of mobile phone key, the application of session key and the transmission of cryptographic calculations card And the transmission of speech data after encryption, key management apparatus independently to cryptographic calculations card, mobile phone eventually End assignment of password calculates card key, mobile phone key and session key ciphertext, more whole with mobile phone by cryptographic calculations card Cooperation between end obtains mobile phone key and session key, so that the transmission channel of each key passes with speech data Defeated channel separates, and improves the safety of enciphoring voice telecommunication system.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all in the present invention Spirit and principle within, any modification, equivalent substitution and improvement etc. done, should be included in the present invention protect Within the scope of protecting.

Claims (10)

1. the key management method in a voice encryption communication system, it is characterised in that described voice encryption communication system System includes mobile phone terminal, the cryptographic calculations card that separates with mobile phone terminal and key management apparatus;Described method includes:
Card key and mobile phone key distributing step:
Key management apparatus generates the card key of cryptographic calculations card;
Key management apparatus is connected by the first communication port foundation with cryptographic calculations card, is sent out by the described card key generated Deliver to cryptographic calculations card;
Mobile phone terminal is connected by the second communication port foundation with key management apparatus, asks mobile phone to key management apparatus Key;
Key management apparatus generates mobile phone key, sends the corresponding card key of use by the second communication port to mobile phone terminal The mobile phone key ciphertext of encryption;
Mobile phone terminal is connected with cryptographic calculations card, the card key of cryptographic calculations card decipher mobile phone key ciphertext and obtain mobile phone Key;
Session key distribution step:
Calling party's mobile phone terminal sends session key solicited message by third communication passage to key management apparatus;
Key management apparatus generates session key, and described session key is utilized respectively card key and the hands of communicating pair Secret key encryption obtains session key ciphertext, and key management apparatus will be calculated by calling party's mobile phone key and calling party passcode Card card key encryption the first session key ciphertext, by called party cell phone key and the Herba Carlinae biebersteinii of callee's cryptographic calculations card Second session key ciphertext of key encryption is supplied to calling party's mobile phone terminal and called party cell phone terminal;
Voice encryption stage of communication:
Voice encryption communication calling party utilizes calling party's mobile phone key and card key to decipher the first session key ciphertext, called Fang Liyong called party cell phone key and card key are deciphered the second session key ciphertext and are obtained session key, voice encryption communication Both sides use session key, are encrypted voice communication data, and the speech data after encryption passes through fourth communication channel It is transmitted.
Key management method the most according to claim 1, it is characterised in that in described session key distribution step, Key management apparatus will be calculated the first session key of the card key encryption of card by calling party's mobile phone key and calling party passcode Ciphertext, the second session key ciphertext encrypted by the card key of called party cell phone key and callee's cryptographic calculations card are passed through Third communication channel sends to calling party's mobile phone terminal, calling party's mobile phone terminal before voice encryption stage of communication by the Two session key ciphertexts are transmitted to called party cell phone terminal by fourth communication channel.
Key management method the most according to claim 1, it is characterised in that in described session key distribution step, Key management apparatus will be calculated the first session key of the card key encryption of card by calling party's mobile phone key and calling party passcode Ciphertext, the second session key ciphertext encrypted by the card key of called party cell phone key and callee's cryptographic calculations card are passed through Third communication channel sends to called party cell phone terminal, called party cell phone terminal before voice encryption stage of communication by the Two session key ciphertexts are transmitted to calling party's mobile phone terminal by fourth communication channel.
Key management method the most according to claim 1, it is characterised in that in session key distribution step, close Key management equipment is by close for the first session key being calculated the card key encryption of card by calling party's mobile phone key and calling party passcode Literary composition is sent to calling party's mobile phone terminal by third communication channel, and will be by called party cell phone key and callee's password meter Second session key ciphertext of the card key encryption calculating card is sent to calling party's mobile phone terminal by third communication channel.
Key management method the most according to claim 1, it is characterised in that when communicating pair mobile phone terminal completes After voice encryption communication, communicating pair mobile phone terminal deletes session key.
Key management method the most according to claim 1, it is characterised in that farther include mobile phone key and card Key updating with cancel step:
Preset mobile phone key and card key updates Rule of judgment;
When meeting the renewal Rule of judgment preset, key management apparatus nullifies existing card key and mobile phone key, and Perform card key and mobile phone key distributing step, it is achieved mobile phone key and card key update and cancel.
7. according to the key management method described in any one of claim 1 to 6, it is characterised in that described first communication Passage is NFC, RFID, infrared or blue-teeth data interface channel.
8. according to the key management method described in any one of claim 1 to 6, it is characterised in that described second leads to Letter passage is note data passage, cable data passage or Bluetooth data channel.
9. according to the key management method described in any one of claim 1 to 6, it is characterised in that the described third communication Passage is note data passage.
Key management method the most according to claim 1, it is characterised in that described fourth communication channel is WIFI, GSM, CDMA, CDMA2000, WCDMA, TD-CDMA or LTE data communication channel.
CN201310398518.0A 2013-09-05 2013-09-05 A kind of key management method in voice encryption communication system Active CN103458400B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310398518.0A CN103458400B (en) 2013-09-05 2013-09-05 A kind of key management method in voice encryption communication system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310398518.0A CN103458400B (en) 2013-09-05 2013-09-05 A kind of key management method in voice encryption communication system

Publications (2)

Publication Number Publication Date
CN103458400A CN103458400A (en) 2013-12-18
CN103458400B true CN103458400B (en) 2017-01-04

Family

ID=49740273

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310398518.0A Active CN103458400B (en) 2013-09-05 2013-09-05 A kind of key management method in voice encryption communication system

Country Status (1)

Country Link
CN (1) CN103458400B (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103452840A (en) * 2013-09-12 2013-12-18 安徽奥特佳科技发展有限公司 Electric scroll compressor realizing two-stage compression and middle injection for automobile heat pump
CN104836660A (en) * 2014-02-12 2015-08-12 中国银联股份有限公司 Password management method and system
CN105592434A (en) * 2014-10-23 2016-05-18 中兴通讯股份有限公司 Method and device for managing D2D (Device to Device) communication group
CN106301767B (en) * 2015-05-13 2020-01-03 中兴通讯股份有限公司 Encrypted call processing method, device, terminal and KMC
CN106936767A (en) * 2015-12-29 2017-07-07 北京大唐高鸿数据网络技术有限公司 Secure communication terminal and its communication means
CN105722069A (en) * 2016-03-24 2016-06-29 深圳市创百通讯科技有限公司 Mobile terminal capable of encrypting voice information and encryption method thereof
CN107872319A (en) * 2016-09-22 2018-04-03 国民技术股份有限公司 Information transferring method, device and message receiving method, device
CN106788989B (en) * 2016-11-30 2020-01-21 华为技术有限公司 Method and equipment for establishing secure encrypted channel
CN107995210A (en) * 2017-12-19 2018-05-04 芯盾(北京)信息技术有限公司 The voice encryption communication means that key and ciphertext are transmitted by different domain transmissions
CN111107038B (en) * 2018-10-25 2022-07-29 山东量子科学技术研究院有限公司 Encryption method, decryption method and device
CN110086800B (en) * 2019-04-23 2021-08-27 北京中宸泓昌科技有限公司 Method and device for secret communication
CN111818023A (en) * 2020-06-23 2020-10-23 中国商用飞机有限责任公司 Data transmission method and data transmission system suitable for air-ground communication link

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN200990610Y (en) * 2006-10-27 2007-12-12 上海复旦微电子股份有限公司 Communication ciphered cell phone
CN101635924A (en) * 2009-08-27 2010-01-27 成都卫士通信息产业股份有限公司 CDMA port-to-port encryption communication system and key distribution method thereof
CN101808320A (en) * 2010-02-01 2010-08-18 中兴通讯股份有限公司 Encryption method and system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101330634A (en) * 2008-07-04 2008-12-24 金法银 Multifunctional digital ciphering walkie-talkie and implementing method thereof
CN103279648A (en) * 2013-05-06 2013-09-04 天津踏浪科技股份有限公司 Electronic noting handheld terminal based on voice password

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN200990610Y (en) * 2006-10-27 2007-12-12 上海复旦微电子股份有限公司 Communication ciphered cell phone
CN101635924A (en) * 2009-08-27 2010-01-27 成都卫士通信息产业股份有限公司 CDMA port-to-port encryption communication system and key distribution method thereof
CN101808320A (en) * 2010-02-01 2010-08-18 中兴通讯股份有限公司 Encryption method and system

Also Published As

Publication number Publication date
CN103458400A (en) 2013-12-18

Similar Documents

Publication Publication Date Title
CN103458400B (en) A kind of key management method in voice encryption communication system
CN104486077B (en) A kind of end-to-end cryptographic key negotiation method of VoIP real time datas safe transmission
CN101340443B (en) Session key negotiating method, system and server in communication network
CN102572817B (en) Method and intelligent memory card for realizing mobile communication confidentiality
CN102547688B (en) Virtual-dedicated-channel-based establishment method for high-credibility mobile security communication channel
CN101102186B (en) Method for implementing general authentication framework service push
CN102045210B (en) End-to-end session key consultation method and system for supporting lawful interception
CN104769982B (en) The method and device securely communicated between user equipment
CN101515319B (en) Cipher key processing method, cipher key cryptography service system and cipher key consultation method
CN104092663A (en) Encryption communication method and encryption communication system
CN101635924B (en) CDMA port-to-port encryption communication system and key distribution method thereof
CN104468126B (en) A kind of safe communication system and method
CN102202299A (en) Realization method of end-to-end voice encryption system based on 3G/B3G
CN106603504A (en) VoIP (Voice over Internet Protocol) encrypting and monitoring methods and VoIP encrypting and monitoring devices
CN102036230A (en) Method for implementing local route service, base station and system
CN101895882A (en) Data transmission method, system and device in WiMAX system
CN104901803A (en) Data interaction safety protection method based on CPK identity authentication technology
CN104168565A (en) Method for controlling safe communication of intelligent terminal under undependable wireless network environment
CN103684783A (en) Communication encryption method based on communication network
CN105262759A (en) Method and system for encrypted communication
CN107451647B (en) Built-in safety mechanism's special SIM card of barracks
CN106209384B (en) Use the client terminal of security mechanism and the communication authentication method of charging unit
CN113365264A (en) Block chain wireless network data transmission method, device and system
CN110166410A (en) A kind of method of safety-oriented data transfer, terminal and multi-mode communication terminal
CN109586899A (en) Signaling manipulation and its indicating means, device and computer storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant