CN104539433A - Voice communication encryption system and encryption method thereof - Google Patents
Voice communication encryption system and encryption method thereof Download PDFInfo
- Publication number
- CN104539433A CN104539433A CN201510028231.8A CN201510028231A CN104539433A CN 104539433 A CN104539433 A CN 104539433A CN 201510028231 A CN201510028231 A CN 201510028231A CN 104539433 A CN104539433 A CN 104539433A
- Authority
- CN
- China
- Prior art keywords
- encryption
- key
- communication
- mobile
- voice
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The invention discloses a voice communication encryption system and an encryption method thereof. The voice communication encryption system comprises at least two mobile intelligent communication terminals, a network client end or APP, a mobile encryption unit and a voice communication server end, wherein the network client end or the APP is arranged at the mobile intelligent communication terminal and used for voice communication, the mobile encryption unit is arranged at the mobile intelligent communication terminal and consists of a mobile identity identification module and an encryption module, the encryption module consists of at least one group of encryption units based on PKI. The encryption method comprises the following steps: when the mobile intelligent communication terminal provided with the mobile encryption unit launches or receives voice communication, the encryption unit or the network client end or the APP of the mobile intelligent communication terminal of one communication party produces a temporary session key, the temporary session key is singed by using a private key, and meanwhile, after carrying out encryption by using respective public keys of other communication parties, the voice communication after encryption is transferred to other communication parties; and after the public key of the temporary session key production party is checked and signed, other communication parties carry out decryption by using own private keys to obtain the temporary session key, so that voice encryption communication is established. The voice communication encryption system and the encryption method are capable of realizing encryption transmission of the voices and identity verification of the two communication parties, and high cost of customizing the mobile intelligent communication terminals is prevented.
Description
Technical field
The invention belongs to voice encryption field, particularly relate to a kind of voice call encryption system and encryption method.
Background technology
The mode one of current intelligent movable communicating terminal voice encryption takes customization intelligent movable communicating terminal, adds encrypting module, thus realize call or voice encryption in the circuit of intelligent movable communicating terminal.
Another mode develops corresponding APP or relative clients end software exactly on intelligent movable communicating terminal, adds the algorithm of encryption or scrambling class in software, carries out network speech scrambling by the mode of software cryptography.
This mode of the call that customization intelligent movable communicating terminal completes or voice encryption, due to the customization of needs intelligent movable communicating terminal, the cost dropped on the one hand is higher, on the other hand because each user is to the different requirements of intelligent movable communicating terminal, popularize certain difficulty, this mode is all for special or professional voice encryption environment substantially.And by special APP or relative clients end software; network realizes this mode of voice call encryption; owing to using software encryption technique; on hardware without any protection; easily be cracked in actual use procedure; and user directly converses and can not confirm the true identity of both sides, for the communication of user hides some dangers for.
Summary of the invention
The invention provides the voice call encryption system on a kind of new intelligent movable communicating terminal and encryption method, based on the mobile encrypted unit used in APP in intelligent movable communicating terminal or networking client and intelligent movable communicating terminal, both cooperatively interact, realize Internet phone-calling encryption, avoid the fund input of customization intelligent movable communicating terminal.
The present invention is realized by following technological means:
A kind of voice call encryption system, comprise at least two intelligent movable communicating terminals, be arranged at networking client or the APP of the voice call of described intelligent movable communicating terminal, be arranged at the mobile encrypted unit of described intelligent movable communicating terminal, and voice call service device end; Described mobile encrypted unit comprises mobile identification module and encrypting module, and described encrypting module comprises the ciphering unit based on PKI of at least one group; Described mobile identification module logs in the unique identities that GSM network determines mobile subscriber, and described encrypting module is for generation of interim conversation key and utilize the exchange of PKI system to interim conversation key to be encrypted, sign and the validity of certifying signature; When the described intelligent movable communicating terminal being provided with mobile encrypted unit is initiated or receives voice call, produced interim conversation key by the ciphering unit of one of them described correspondent or the networking client of intelligent movable communicating terminal or APP and with the private key of oneself, this interim conversation key signed, after using other correspondent public key encryption separately, be transferred to other each correspondent respectively simultaneously; After the PKI sign test of other described each correspondent interim conversation secret generating sides is passed through, with oneself private key this ciphertext is decrypted and obtains interim conversation key, thus set up voice encryption call.
Based on an encryption method for above-mentioned encryption system, first user is in APP or networking client registration, and obtains the mutual certification with server end; Then set up voice call between at least two side's intelligent movable communicating terminals to connect; The interim conversation key of described speech communication by a wherein correspondent generation, and is signed to this interim conversation key with the private key of oneself, after using other users public key encryption separately, is transferred to other each side respectively simultaneously; After other described each side pass through by the PKI sign test of secret generating side, with oneself private key this ciphertext is decrypted and obtains interim conversation key, and utilize this interim conversation key to carry out voice encryption communication.
Wherein, the channel of described voice encryption communication can be VoIP passage, also can be the language channels of GSM network.
Wherein, the process setting up speech communication between described intelligent movable communicating terminal is: APP or networking client obtain certificate or other relevant informations in the IP of user's intelligent movable communicating terminal, mobile encrypted unit, after related algorithm process, private key in mobile encrypted unit is signed to it, and uses server public key to be encrypted to be sent to server end and verify; After privacy key deciphering, reduction related data, verifies this user certificate or relevant information, is verified, and re-uses this client public key authentication of users signature, obtains User IP and related data; When server receives the request of enciphoring voice telecommunication, server end by the packet of the call IP address of each side, server certificate or his relevant information through related algorithm process, privacy key is used to sign to the data crossed through algorithm process, and use corresponding client public key to encrypt APP or networking client that this signed data is sent to respective user; APP or networking client use private key decrypted signature data in mobile encrypted unit, and use server public key authentication server signature, after all passing through, related data is reduced simultaneously, and client obtains IP and the related data of call each side; APP or networking client utilize the IP address of acquisition and other intelligent terminals to set up and contact.
Voice encryption system on the intelligent movable communicating terminal more than realized and encryption method, utilize the PKI function of mobile encrypted unit in intelligent movable communicating terminal, the identity validation of encrypted transmission to both call sides voice and both call sides can be realized, avoid the high cost customizing mobile intelligent terminal, and because this mode employs PKI technology, cracking of algorithm can not be realized substantially, and safety, cost are low.
Accompanying drawing explanation
Fig. 1 is the process schematic setting up speech communication between intelligent movable communicating terminal;
Fig. 2 is double-talk voice encryption realization flow figure;
Fig. 3 is tripartite's voice call voice encryption realization flow figure.
Embodiment
Below with reference to accompanying drawing, specific implementation process of the present invention is described in detail.
Applicant submits Chinese invention patent application in July, 2014, and application number is 201410341832.X, and it is on the books that the present invention quotes its institute.
A kind of voice call encryption system, comprise the intelligent movable communicating terminal of at least two, be arranged at networking client or the APP of the voice call of described intelligent movable communicating terminal, be arranged at the mobile encrypted unit of described intelligent movable communicating terminal, and voice call service device end.
Specifically, described mobile encrypted unit comprises mobile identification module and encrypting module, and described encrypting module comprises the ciphering unit based on PKI of at least one group; Described mobile identification module logs in the unique identities that GSM network determines mobile subscriber, and described encrypting module is for generation of interim conversation key and utilize the exchange of PKI system to interim conversation key to be encrypted, sign and the validity of certifying signature.
When the described intelligent movable communicating terminal being provided with mobile encrypted unit is initiated or receives voice call, produced interim conversation key by the ciphering unit of one of them described correspondent or the networking client of intelligent movable communicating terminal or APP and with the private key of oneself, this interim conversation key signed, after using other correspondent public key encryption separately, be transferred to other each correspondent respectively simultaneously; After the PKI sign test of other described each correspondent interim conversation secret generating sides is passed through, with oneself private key this ciphertext is decrypted and obtains interim conversation key, thus set up voice encryption call.
Voice call based on both sides, tripartite or more the side of above voice encryption system generation is encrypted by the following method: first user in APP or networking client registration, and need obtain the mutual certification with server end; As two sides or after in many ways setting up voice call connection between intelligent movable communicating terminal, produced interim conversation key by any one call participant and with the private key of oneself, this interim conversation key signed, after using other users public key encryption separately, be transferred to other each side respectively simultaneously; Then, after other described each side pass through by the PKI sign test of secret generating side, with oneself private key this ciphertext is decrypted and obtains interim conversation key, and utilize this interim conversation key to carry out voice encryption communication.Described voice encryption communication channel can be VoIP passage, also can be the language channels of GSM network.
Wherein, when each side of described participation speech communication is in transmission or before receiving encrypted speech information, as shown in Figure 1, first client obtains certificate or other relevant informations in the IP of user, mobile encrypted unit, after related algorithm process, by the private key in mobile encrypted unit, it is signed, and use server public key to be encrypted to be sent to server end and verify.After privacy key deciphering, reduction related data, verifies this user certificate or relevant information, is verified, and re-uses this client public key authentication of users signature, obtains this User IP and related data; Then server end to the packet containing server ip, server certificate or his relevant information through related algorithm process, privacy key is used to sign to the data crossed through algorithm process, and use corresponding client public key to encrypt client that this signed data is sent to this user.Client uses private key decrypted signature data in mobile encrypted unit card, use server public key authentication server signature, after all passing through, related data is reduced simultaneously, client obtains server ip and related data, and namely client and server sets up communication connection.
Further illustrate the process of voice call encryption between correspondent below for double-talk and Three-Way Calling, the intelligent movable communicating terminal of following user adopts APP initiating speech conversation.
When the intelligent movable communication terminal user A and user B that use voice encryption system of the present invention carry out voice call, interim conversation key can be produced by user A, also can be produced by user B, as shown in Figure 2, such as pass through APP initiating speech conversation by party A-subscriber, start and connect ca authentication server, be legal through CA central authentication user A, interim conversation key is generated in the mobile encrypted unit card of user A, then user B PKI is used to be encrypted this interim conversation key, and use the private key of oneself to sign to the data after encryption, send to user B; After user B uses user A PKI sign test to pass through, with oneself private key this ciphertext is decrypted and obtains interim conversation key.The speech data that now user A and user B uses these interim conversation double secret key both sides to produce is encrypted, and secured session is set up.If user A is illegal through CA central authentication, then terminate the speech communication that this is initiated through APP.
When using intelligent movable communication terminal user A, the user B of voice encryption system of the present invention, user C is when carrying out tripartite's voice call, interim conversation key can be produced by user A, user B or user C any one party, as shown in Figure 3, user A, user B, user C run APP client, start connection server, and by CA central authentication legitimacy, APP client and server is set up VOIP and is connected; In user A, user B, user C, side's server should find IP and the PKI of B, C etc., and these information are passed to A, and A just can directly directly be connected with B, C.Centre does not need and server interaction again.The wherein side that this interim conversation key is participated in by session produces, and signs to this interim conversation key with the private key of oneself, after using other users public key encryption separately, is transferred to other each side respectively simultaneously.After other each side APP receives, enciphered data is passed in respective mobile encrypted unit, and decrypt interim conversation key by the private key in respective mobile encrypted unit, the PKI simultaneously obtaining initiator is verified this interim conversation key, thus each side obtains this interim conversation key.User A, user B, user C multi-user are encrypted call by the interim conversation key enciphering/deciphering speech data obtained.
The voice encryption system more than realized and encryption method, make two to send out or the user of MPTY does not need customization intelligent movable communicating terminal, but the encrypted transmission of both call sides voice is achieved by the PKI system of mobile encrypted unit, also achieve the identity validation of both call sides simultaneously, cost is low, implementation is succinct, and be cracked hardly, fail safe is high.
The scheme of simple change gained is carried out also within the scope of protection of the invention to the present invention, does not enumerate at this.
Claims (4)
1. a voice call encryption system, comprise at least two intelligent movable communicating terminals, be arranged at networking client or the APP of the voice call of described intelligent movable communicating terminal, be arranged at the mobile encrypted unit of described intelligent movable communicating terminal, and voice call service device end; Described mobile encrypted unit comprises mobile identification module and encrypting module, and described encrypting module comprises the ciphering unit based on PKI of at least one group; Described mobile identification module logs in the unique identities that GSM network determines mobile subscriber, and described encrypting module is for generation of interim conversation key and utilize the exchange of PKI system to interim conversation key to be encrypted, sign and the validity of certifying signature; When the described intelligent movable communicating terminal being provided with mobile encrypted unit is initiated or receives voice call, produced interim conversation key by the ciphering unit of one of them described correspondent or the networking client of intelligent movable communicating terminal or APP and with the private key of oneself, this interim conversation key signed, after using other correspondent public key encryption separately, be transferred to other each correspondent respectively simultaneously; After the PKI sign test of other described each correspondent interim conversation secret generating sides is passed through, with oneself private key this ciphertext is decrypted and obtains interim conversation key, thus set up voice encryption call.
2., based on an encryption method for encryption system described in claim 1, comprise following steps:
S1, user in APP or networking client registration, and obtains the mutual certification with server end;
S2, sets up voice call and connects between at least two side's intelligent movable communicating terminals;
S3, the interim conversation key of described speech communication by a wherein correspondent generation, and is signed to this interim conversation key with the private key of oneself, after using other users public key encryption separately, is transferred to the IP address of other each side respectively simultaneously;
S4, after other described each side pass through by the PKI sign test of secret generating side, to be decrypted this ciphertext with oneself private key and to obtain interim conversation key, and utilize this interim conversation key to carry out voice encryption communication.
3. encryption method according to claim 2, is characterized in that: the communication channel that described voice encryption communication adopts is the language channels of VoIP passage or GSM network.
4. encryption method according to claim 2, is characterized in that: the process setting up speech communication between described intelligent movable communicating terminal is:
S201, APP or networking client obtain certificate or other relevant informations in the IP of user's intelligent movable communicating terminal, mobile encrypted unit, after related algorithm process, the private key in mobile encrypted unit is signed to it, and uses server public key to be encrypted to be sent to server end and verify;
S202, after privacy key deciphering, reduction related data, verifies this user certificate or relevant information, is verified, and re-uses this client public key authentication of users signature, obtains User IP and related data;
S203, when server receives the request of enciphoring voice telecommunication, server end by the packet of the call IP address of each side, server certificate or his relevant information through related algorithm process, privacy key is used to sign to the data crossed through algorithm process, and use corresponding client public key to encrypt APP or networking client that this signed data is sent to respective user;
S204, APP or networking client use private key decrypted signature data in mobile encrypted unit, and use server public key authentication server signature, after all passing through, related data is reduced simultaneously, and client obtains IP and the related data of call each side;
S205, APP or networking client utilize the IP address of acquisition and other intelligent terminals to set up and contact.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510028231.8A CN104539433A (en) | 2014-10-30 | 2015-01-20 | Voice communication encryption system and encryption method thereof |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2014106059386 | 2014-10-30 | ||
CN201410605938 | 2014-10-30 | ||
CN201510028231.8A CN104539433A (en) | 2014-10-30 | 2015-01-20 | Voice communication encryption system and encryption method thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104539433A true CN104539433A (en) | 2015-04-22 |
Family
ID=52854904
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510028231.8A Pending CN104539433A (en) | 2014-10-30 | 2015-01-20 | Voice communication encryption system and encryption method thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104539433A (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105553669A (en) * | 2015-12-21 | 2016-05-04 | 中城智慧科技有限公司 | Identity authentication based information encryption transmission apparatus, method, and control method |
CN105656895A (en) * | 2015-12-31 | 2016-06-08 | 深圳中兴网信科技有限公司 | Communication method, virtual machine communication device, client communication device and communication system |
CN106130724A (en) * | 2016-08-26 | 2016-11-16 | 浪潮集团有限公司 | A kind of internet-of-things terminal safety implementation method using key agreement |
CN106603504A (en) * | 2016-11-23 | 2017-04-26 | 深圳市金立通信设备有限公司 | VoIP (Voice over Internet Protocol) encrypting and monitoring methods and VoIP encrypting and monitoring devices |
CN106856606A (en) * | 2015-12-08 | 2017-06-16 | 中兴通讯股份有限公司 | Communication means, communication system and mobile terminal |
CN106935242A (en) * | 2015-12-30 | 2017-07-07 | 北京明朝万达科技股份有限公司 | A kind of voice communication encryption system and method |
CN107395552A (en) * | 2016-05-17 | 2017-11-24 | 中兴通讯股份有限公司 | A kind of data transmission method and device |
CN107566324A (en) * | 2016-06-30 | 2018-01-09 | 南京中兴新软件有限责任公司 | Encryption method, decryption method and device |
CN108737428A (en) * | 2018-05-24 | 2018-11-02 | 中国联合网络通信集团有限公司 | Method and apparatus are determined based on the skin disease of image recognition |
CN109462705A (en) * | 2018-11-30 | 2019-03-12 | 广州华多网络科技有限公司 | A kind of audio communication method and device based on channel |
CN109905876A (en) * | 2019-01-04 | 2019-06-18 | 广东安创信息科技开发有限公司 | A kind of speech ciphering method based on coprocessor |
CN109994115A (en) * | 2018-01-03 | 2019-07-09 | 阿里巴巴集团控股有限公司 | The means of communication and device, data processing method and equipment |
CN111314072A (en) * | 2020-02-21 | 2020-06-19 | 北京邮电大学 | Extensible identity authentication method and system based on SM2 algorithm |
US10694034B1 (en) | 2018-12-12 | 2020-06-23 | International Business Machines Corporation | Avoiding identity fraud and unwarranted calls by authorization mechanism in communication system |
CN113300999A (en) * | 2020-02-21 | 2021-08-24 | 北京沃东天骏信息技术有限公司 | Information processing method, electronic device, and readable storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1710985A (en) * | 2005-06-30 | 2005-12-21 | 中国科学院计算技术研究所 | Enciphered consulating method for speech-sound communication in grouped network |
CN1925681A (en) * | 2006-09-20 | 2007-03-07 | 北京太极联合实验室科技有限公司 | End-to-end encrypting method and system based on mobile communication network |
CN101340443A (en) * | 2008-08-28 | 2009-01-07 | 中国电信股份有限公司 | Session key negotiating method, system and server in communication network |
CN103974241A (en) * | 2013-02-05 | 2014-08-06 | 东南大学常州研究院 | Voice end-to-end encryption method aiming at mobile terminal with Android system |
CN104065648A (en) * | 2014-06-05 | 2014-09-24 | 天地融科技股份有限公司 | Data processing method of voice communication |
-
2015
- 2015-01-20 CN CN201510028231.8A patent/CN104539433A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1710985A (en) * | 2005-06-30 | 2005-12-21 | 中国科学院计算技术研究所 | Enciphered consulating method for speech-sound communication in grouped network |
CN1925681A (en) * | 2006-09-20 | 2007-03-07 | 北京太极联合实验室科技有限公司 | End-to-end encrypting method and system based on mobile communication network |
CN101340443A (en) * | 2008-08-28 | 2009-01-07 | 中国电信股份有限公司 | Session key negotiating method, system and server in communication network |
CN103974241A (en) * | 2013-02-05 | 2014-08-06 | 东南大学常州研究院 | Voice end-to-end encryption method aiming at mobile terminal with Android system |
CN104065648A (en) * | 2014-06-05 | 2014-09-24 | 天地融科技股份有限公司 | Data processing method of voice communication |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106856606A (en) * | 2015-12-08 | 2017-06-16 | 中兴通讯股份有限公司 | Communication means, communication system and mobile terminal |
CN105553669B (en) * | 2015-12-21 | 2019-01-08 | 中城智慧科技有限公司 | A kind of information encryption transmission device and method and monitoring and managing method based on ID authentication |
CN105553669A (en) * | 2015-12-21 | 2016-05-04 | 中城智慧科技有限公司 | Identity authentication based information encryption transmission apparatus, method, and control method |
CN106935242A (en) * | 2015-12-30 | 2017-07-07 | 北京明朝万达科技股份有限公司 | A kind of voice communication encryption system and method |
CN105656895A (en) * | 2015-12-31 | 2016-06-08 | 深圳中兴网信科技有限公司 | Communication method, virtual machine communication device, client communication device and communication system |
CN107395552A (en) * | 2016-05-17 | 2017-11-24 | 中兴通讯股份有限公司 | A kind of data transmission method and device |
CN107566324A (en) * | 2016-06-30 | 2018-01-09 | 南京中兴新软件有限责任公司 | Encryption method, decryption method and device |
CN106130724A (en) * | 2016-08-26 | 2016-11-16 | 浪潮集团有限公司 | A kind of internet-of-things terminal safety implementation method using key agreement |
CN106603504A (en) * | 2016-11-23 | 2017-04-26 | 深圳市金立通信设备有限公司 | VoIP (Voice over Internet Protocol) encrypting and monitoring methods and VoIP encrypting and monitoring devices |
CN109994115A (en) * | 2018-01-03 | 2019-07-09 | 阿里巴巴集团控股有限公司 | The means of communication and device, data processing method and equipment |
CN109994115B (en) * | 2018-01-03 | 2023-07-07 | 阿里巴巴集团控股有限公司 | Communication method and device, data processing method and device |
CN108737428A (en) * | 2018-05-24 | 2018-11-02 | 中国联合网络通信集团有限公司 | Method and apparatus are determined based on the skin disease of image recognition |
CN109462705A (en) * | 2018-11-30 | 2019-03-12 | 广州华多网络科技有限公司 | A kind of audio communication method and device based on channel |
CN109462705B (en) * | 2018-11-30 | 2020-04-17 | 广州华多网络科技有限公司 | Voice communication method and device based on channel |
US11272053B2 (en) | 2018-11-30 | 2022-03-08 | Guangzhou Huaduo Network Technology Co., Ltd. | Channel-based voice call method and apparatus |
US10694034B1 (en) | 2018-12-12 | 2020-06-23 | International Business Machines Corporation | Avoiding identity fraud and unwarranted calls by authorization mechanism in communication system |
CN109905876A (en) * | 2019-01-04 | 2019-06-18 | 广东安创信息科技开发有限公司 | A kind of speech ciphering method based on coprocessor |
CN111314072A (en) * | 2020-02-21 | 2020-06-19 | 北京邮电大学 | Extensible identity authentication method and system based on SM2 algorithm |
CN113300999A (en) * | 2020-02-21 | 2021-08-24 | 北京沃东天骏信息技术有限公司 | Information processing method, electronic device, and readable storage medium |
CN113300999B (en) * | 2020-02-21 | 2023-12-05 | 北京沃东天骏信息技术有限公司 | Information processing method, electronic device, and readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104539433A (en) | Voice communication encryption system and encryption method thereof | |
US8831224B2 (en) | Method and apparatus for secure pairing of mobile devices with vehicles using telematics system | |
CN104486077B (en) | A kind of end-to-end cryptographic key negotiation method of VoIP real time datas safe transmission | |
CN106936570B (en) | Key configuration method, key management center and network element | |
CN104618110B (en) | A kind of VoIP security conferences session key transmission method | |
CN102036238B (en) | Method for realizing user and network authentication and key distribution based on public key | |
US20150089220A1 (en) | Technique For Bypassing an IP PBX | |
WO2017201809A1 (en) | Communication method and system for terminal | |
CN104301115B (en) | Mobile phone and Bluetooth key signature verification ciphertext communication method | |
CN102547688B (en) | Virtual-dedicated-channel-based establishment method for high-credibility mobile security communication channel | |
JP6800169B2 (en) | Systems and methods for making secure VOIP multi-party calls | |
CN104901935A (en) | Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem) | |
CN104754581A (en) | Public key password system based LTE wireless network security certification system | |
CN101635924B (en) | CDMA port-to-port encryption communication system and key distribution method thereof | |
CN104683291B (en) | Session key negotiation method based on IMS system | |
WO2012024906A1 (en) | Mobile communication system and voice call encryption method thereof | |
CN102685749A (en) | Wireless safety authentication method orienting to mobile terminal | |
CN108390755A (en) | The safe input method of SIM pasting cards based on built-in security chip | |
CN106856606A (en) | Communication means, communication system and mobile terminal | |
CN106209384B (en) | Use the client terminal of security mechanism and the communication authentication method of charging unit | |
CN105991277B (en) | Cryptographic key distribution method based on SIP communication system | |
WO2014084711A1 (en) | A system and method for duty-shared authenticated group key transport | |
CN104581706A (en) | Data security interactive method based on asymmetric encryption technology between intelligent mobile terminals | |
CN104753869A (en) | SIP protocol based session encryption method | |
CN110574335B (en) | Key distribution system, method and recording medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20150422 |
|
RJ01 | Rejection of invention patent application after publication |