CN104539433A - Voice communication encryption system and encryption method thereof - Google Patents

Voice communication encryption system and encryption method thereof Download PDF

Info

Publication number
CN104539433A
CN104539433A CN201510028231.8A CN201510028231A CN104539433A CN 104539433 A CN104539433 A CN 104539433A CN 201510028231 A CN201510028231 A CN 201510028231A CN 104539433 A CN104539433 A CN 104539433A
Authority
CN
China
Prior art keywords
encryption
key
communication
mobile
voice
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510028231.8A
Other languages
Chinese (zh)
Inventor
马洁韵
唐毅
牛毅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201510028231.8A priority Critical patent/CN104539433A/en
Publication of CN104539433A publication Critical patent/CN104539433A/en
Pending legal-status Critical Current

Links

Abstract

The invention discloses a voice communication encryption system and an encryption method thereof. The voice communication encryption system comprises at least two mobile intelligent communication terminals, a network client end or APP, a mobile encryption unit and a voice communication server end, wherein the network client end or the APP is arranged at the mobile intelligent communication terminal and used for voice communication, the mobile encryption unit is arranged at the mobile intelligent communication terminal and consists of a mobile identity identification module and an encryption module, the encryption module consists of at least one group of encryption units based on PKI. The encryption method comprises the following steps: when the mobile intelligent communication terminal provided with the mobile encryption unit launches or receives voice communication, the encryption unit or the network client end or the APP of the mobile intelligent communication terminal of one communication party produces a temporary session key, the temporary session key is singed by using a private key, and meanwhile, after carrying out encryption by using respective public keys of other communication parties, the voice communication after encryption is transferred to other communication parties; and after the public key of the temporary session key production party is checked and signed, other communication parties carry out decryption by using own private keys to obtain the temporary session key, so that voice encryption communication is established. The voice communication encryption system and the encryption method are capable of realizing encryption transmission of the voices and identity verification of the two communication parties, and high cost of customizing the mobile intelligent communication terminals is prevented.

Description

A kind of voice call encryption system and encryption method
Technical field
The invention belongs to voice encryption field, particularly relate to a kind of voice call encryption system and encryption method.
Background technology
The mode one of current intelligent movable communicating terminal voice encryption takes customization intelligent movable communicating terminal, adds encrypting module, thus realize call or voice encryption in the circuit of intelligent movable communicating terminal.
Another mode develops corresponding APP or relative clients end software exactly on intelligent movable communicating terminal, adds the algorithm of encryption or scrambling class in software, carries out network speech scrambling by the mode of software cryptography.
This mode of the call that customization intelligent movable communicating terminal completes or voice encryption, due to the customization of needs intelligent movable communicating terminal, the cost dropped on the one hand is higher, on the other hand because each user is to the different requirements of intelligent movable communicating terminal, popularize certain difficulty, this mode is all for special or professional voice encryption environment substantially.And by special APP or relative clients end software; network realizes this mode of voice call encryption; owing to using software encryption technique; on hardware without any protection; easily be cracked in actual use procedure; and user directly converses and can not confirm the true identity of both sides, for the communication of user hides some dangers for.
Summary of the invention
The invention provides the voice call encryption system on a kind of new intelligent movable communicating terminal and encryption method, based on the mobile encrypted unit used in APP in intelligent movable communicating terminal or networking client and intelligent movable communicating terminal, both cooperatively interact, realize Internet phone-calling encryption, avoid the fund input of customization intelligent movable communicating terminal.
The present invention is realized by following technological means:
A kind of voice call encryption system, comprise at least two intelligent movable communicating terminals, be arranged at networking client or the APP of the voice call of described intelligent movable communicating terminal, be arranged at the mobile encrypted unit of described intelligent movable communicating terminal, and voice call service device end; Described mobile encrypted unit comprises mobile identification module and encrypting module, and described encrypting module comprises the ciphering unit based on PKI of at least one group; Described mobile identification module logs in the unique identities that GSM network determines mobile subscriber, and described encrypting module is for generation of interim conversation key and utilize the exchange of PKI system to interim conversation key to be encrypted, sign and the validity of certifying signature; When the described intelligent movable communicating terminal being provided with mobile encrypted unit is initiated or receives voice call, produced interim conversation key by the ciphering unit of one of them described correspondent or the networking client of intelligent movable communicating terminal or APP and with the private key of oneself, this interim conversation key signed, after using other correspondent public key encryption separately, be transferred to other each correspondent respectively simultaneously; After the PKI sign test of other described each correspondent interim conversation secret generating sides is passed through, with oneself private key this ciphertext is decrypted and obtains interim conversation key, thus set up voice encryption call.
Based on an encryption method for above-mentioned encryption system, first user is in APP or networking client registration, and obtains the mutual certification with server end; Then set up voice call between at least two side's intelligent movable communicating terminals to connect; The interim conversation key of described speech communication by a wherein correspondent generation, and is signed to this interim conversation key with the private key of oneself, after using other users public key encryption separately, is transferred to other each side respectively simultaneously; After other described each side pass through by the PKI sign test of secret generating side, with oneself private key this ciphertext is decrypted and obtains interim conversation key, and utilize this interim conversation key to carry out voice encryption communication.
Wherein, the channel of described voice encryption communication can be VoIP passage, also can be the language channels of GSM network.
Wherein, the process setting up speech communication between described intelligent movable communicating terminal is: APP or networking client obtain certificate or other relevant informations in the IP of user's intelligent movable communicating terminal, mobile encrypted unit, after related algorithm process, private key in mobile encrypted unit is signed to it, and uses server public key to be encrypted to be sent to server end and verify; After privacy key deciphering, reduction related data, verifies this user certificate or relevant information, is verified, and re-uses this client public key authentication of users signature, obtains User IP and related data; When server receives the request of enciphoring voice telecommunication, server end by the packet of the call IP address of each side, server certificate or his relevant information through related algorithm process, privacy key is used to sign to the data crossed through algorithm process, and use corresponding client public key to encrypt APP or networking client that this signed data is sent to respective user; APP or networking client use private key decrypted signature data in mobile encrypted unit, and use server public key authentication server signature, after all passing through, related data is reduced simultaneously, and client obtains IP and the related data of call each side; APP or networking client utilize the IP address of acquisition and other intelligent terminals to set up and contact.
Voice encryption system on the intelligent movable communicating terminal more than realized and encryption method, utilize the PKI function of mobile encrypted unit in intelligent movable communicating terminal, the identity validation of encrypted transmission to both call sides voice and both call sides can be realized, avoid the high cost customizing mobile intelligent terminal, and because this mode employs PKI technology, cracking of algorithm can not be realized substantially, and safety, cost are low.
Accompanying drawing explanation
Fig. 1 is the process schematic setting up speech communication between intelligent movable communicating terminal;
Fig. 2 is double-talk voice encryption realization flow figure;
Fig. 3 is tripartite's voice call voice encryption realization flow figure.
Embodiment
Below with reference to accompanying drawing, specific implementation process of the present invention is described in detail.
Applicant submits Chinese invention patent application in July, 2014, and application number is 201410341832.X, and it is on the books that the present invention quotes its institute.
A kind of voice call encryption system, comprise the intelligent movable communicating terminal of at least two, be arranged at networking client or the APP of the voice call of described intelligent movable communicating terminal, be arranged at the mobile encrypted unit of described intelligent movable communicating terminal, and voice call service device end.
Specifically, described mobile encrypted unit comprises mobile identification module and encrypting module, and described encrypting module comprises the ciphering unit based on PKI of at least one group; Described mobile identification module logs in the unique identities that GSM network determines mobile subscriber, and described encrypting module is for generation of interim conversation key and utilize the exchange of PKI system to interim conversation key to be encrypted, sign and the validity of certifying signature.
When the described intelligent movable communicating terminal being provided with mobile encrypted unit is initiated or receives voice call, produced interim conversation key by the ciphering unit of one of them described correspondent or the networking client of intelligent movable communicating terminal or APP and with the private key of oneself, this interim conversation key signed, after using other correspondent public key encryption separately, be transferred to other each correspondent respectively simultaneously; After the PKI sign test of other described each correspondent interim conversation secret generating sides is passed through, with oneself private key this ciphertext is decrypted and obtains interim conversation key, thus set up voice encryption call.
Voice call based on both sides, tripartite or more the side of above voice encryption system generation is encrypted by the following method: first user in APP or networking client registration, and need obtain the mutual certification with server end; As two sides or after in many ways setting up voice call connection between intelligent movable communicating terminal, produced interim conversation key by any one call participant and with the private key of oneself, this interim conversation key signed, after using other users public key encryption separately, be transferred to other each side respectively simultaneously; Then, after other described each side pass through by the PKI sign test of secret generating side, with oneself private key this ciphertext is decrypted and obtains interim conversation key, and utilize this interim conversation key to carry out voice encryption communication.Described voice encryption communication channel can be VoIP passage, also can be the language channels of GSM network.
Wherein, when each side of described participation speech communication is in transmission or before receiving encrypted speech information, as shown in Figure 1, first client obtains certificate or other relevant informations in the IP of user, mobile encrypted unit, after related algorithm process, by the private key in mobile encrypted unit, it is signed, and use server public key to be encrypted to be sent to server end and verify.After privacy key deciphering, reduction related data, verifies this user certificate or relevant information, is verified, and re-uses this client public key authentication of users signature, obtains this User IP and related data; Then server end to the packet containing server ip, server certificate or his relevant information through related algorithm process, privacy key is used to sign to the data crossed through algorithm process, and use corresponding client public key to encrypt client that this signed data is sent to this user.Client uses private key decrypted signature data in mobile encrypted unit card, use server public key authentication server signature, after all passing through, related data is reduced simultaneously, client obtains server ip and related data, and namely client and server sets up communication connection.
Further illustrate the process of voice call encryption between correspondent below for double-talk and Three-Way Calling, the intelligent movable communicating terminal of following user adopts APP initiating speech conversation.
When the intelligent movable communication terminal user A and user B that use voice encryption system of the present invention carry out voice call, interim conversation key can be produced by user A, also can be produced by user B, as shown in Figure 2, such as pass through APP initiating speech conversation by party A-subscriber, start and connect ca authentication server, be legal through CA central authentication user A, interim conversation key is generated in the mobile encrypted unit card of user A, then user B PKI is used to be encrypted this interim conversation key, and use the private key of oneself to sign to the data after encryption, send to user B; After user B uses user A PKI sign test to pass through, with oneself private key this ciphertext is decrypted and obtains interim conversation key.The speech data that now user A and user B uses these interim conversation double secret key both sides to produce is encrypted, and secured session is set up.If user A is illegal through CA central authentication, then terminate the speech communication that this is initiated through APP.
When using intelligent movable communication terminal user A, the user B of voice encryption system of the present invention, user C is when carrying out tripartite's voice call, interim conversation key can be produced by user A, user B or user C any one party, as shown in Figure 3, user A, user B, user C run APP client, start connection server, and by CA central authentication legitimacy, APP client and server is set up VOIP and is connected; In user A, user B, user C, side's server should find IP and the PKI of B, C etc., and these information are passed to A, and A just can directly directly be connected with B, C.Centre does not need and server interaction again.The wherein side that this interim conversation key is participated in by session produces, and signs to this interim conversation key with the private key of oneself, after using other users public key encryption separately, is transferred to other each side respectively simultaneously.After other each side APP receives, enciphered data is passed in respective mobile encrypted unit, and decrypt interim conversation key by the private key in respective mobile encrypted unit, the PKI simultaneously obtaining initiator is verified this interim conversation key, thus each side obtains this interim conversation key.User A, user B, user C multi-user are encrypted call by the interim conversation key enciphering/deciphering speech data obtained.
The voice encryption system more than realized and encryption method, make two to send out or the user of MPTY does not need customization intelligent movable communicating terminal, but the encrypted transmission of both call sides voice is achieved by the PKI system of mobile encrypted unit, also achieve the identity validation of both call sides simultaneously, cost is low, implementation is succinct, and be cracked hardly, fail safe is high.
The scheme of simple change gained is carried out also within the scope of protection of the invention to the present invention, does not enumerate at this.

Claims (4)

1. a voice call encryption system, comprise at least two intelligent movable communicating terminals, be arranged at networking client or the APP of the voice call of described intelligent movable communicating terminal, be arranged at the mobile encrypted unit of described intelligent movable communicating terminal, and voice call service device end; Described mobile encrypted unit comprises mobile identification module and encrypting module, and described encrypting module comprises the ciphering unit based on PKI of at least one group; Described mobile identification module logs in the unique identities that GSM network determines mobile subscriber, and described encrypting module is for generation of interim conversation key and utilize the exchange of PKI system to interim conversation key to be encrypted, sign and the validity of certifying signature; When the described intelligent movable communicating terminal being provided with mobile encrypted unit is initiated or receives voice call, produced interim conversation key by the ciphering unit of one of them described correspondent or the networking client of intelligent movable communicating terminal or APP and with the private key of oneself, this interim conversation key signed, after using other correspondent public key encryption separately, be transferred to other each correspondent respectively simultaneously; After the PKI sign test of other described each correspondent interim conversation secret generating sides is passed through, with oneself private key this ciphertext is decrypted and obtains interim conversation key, thus set up voice encryption call.
2., based on an encryption method for encryption system described in claim 1, comprise following steps:
S1, user in APP or networking client registration, and obtains the mutual certification with server end;
S2, sets up voice call and connects between at least two side's intelligent movable communicating terminals;
S3, the interim conversation key of described speech communication by a wherein correspondent generation, and is signed to this interim conversation key with the private key of oneself, after using other users public key encryption separately, is transferred to the IP address of other each side respectively simultaneously;
S4, after other described each side pass through by the PKI sign test of secret generating side, to be decrypted this ciphertext with oneself private key and to obtain interim conversation key, and utilize this interim conversation key to carry out voice encryption communication.
3. encryption method according to claim 2, is characterized in that: the communication channel that described voice encryption communication adopts is the language channels of VoIP passage or GSM network.
4. encryption method according to claim 2, is characterized in that: the process setting up speech communication between described intelligent movable communicating terminal is:
S201, APP or networking client obtain certificate or other relevant informations in the IP of user's intelligent movable communicating terminal, mobile encrypted unit, after related algorithm process, the private key in mobile encrypted unit is signed to it, and uses server public key to be encrypted to be sent to server end and verify;
S202, after privacy key deciphering, reduction related data, verifies this user certificate or relevant information, is verified, and re-uses this client public key authentication of users signature, obtains User IP and related data;
S203, when server receives the request of enciphoring voice telecommunication, server end by the packet of the call IP address of each side, server certificate or his relevant information through related algorithm process, privacy key is used to sign to the data crossed through algorithm process, and use corresponding client public key to encrypt APP or networking client that this signed data is sent to respective user;
S204, APP or networking client use private key decrypted signature data in mobile encrypted unit, and use server public key authentication server signature, after all passing through, related data is reduced simultaneously, and client obtains IP and the related data of call each side;
S205, APP or networking client utilize the IP address of acquisition and other intelligent terminals to set up and contact.
CN201510028231.8A 2014-10-30 2015-01-20 Voice communication encryption system and encryption method thereof Pending CN104539433A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510028231.8A CN104539433A (en) 2014-10-30 2015-01-20 Voice communication encryption system and encryption method thereof

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN2014106059386 2014-10-30
CN201410605938 2014-10-30
CN201510028231.8A CN104539433A (en) 2014-10-30 2015-01-20 Voice communication encryption system and encryption method thereof

Publications (1)

Publication Number Publication Date
CN104539433A true CN104539433A (en) 2015-04-22

Family

ID=52854904

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510028231.8A Pending CN104539433A (en) 2014-10-30 2015-01-20 Voice communication encryption system and encryption method thereof

Country Status (1)

Country Link
CN (1) CN104539433A (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105553669A (en) * 2015-12-21 2016-05-04 中城智慧科技有限公司 Identity authentication based information encryption transmission apparatus, method, and control method
CN105656895A (en) * 2015-12-31 2016-06-08 深圳中兴网信科技有限公司 Communication method, virtual machine communication device, client communication device and communication system
CN106130724A (en) * 2016-08-26 2016-11-16 浪潮集团有限公司 A kind of internet-of-things terminal safety implementation method using key agreement
CN106603504A (en) * 2016-11-23 2017-04-26 深圳市金立通信设备有限公司 VoIP (Voice over Internet Protocol) encrypting and monitoring methods and VoIP encrypting and monitoring devices
CN106856606A (en) * 2015-12-08 2017-06-16 中兴通讯股份有限公司 Communication means, communication system and mobile terminal
CN106935242A (en) * 2015-12-30 2017-07-07 北京明朝万达科技股份有限公司 A kind of voice communication encryption system and method
CN107395552A (en) * 2016-05-17 2017-11-24 中兴通讯股份有限公司 A kind of data transmission method and device
CN107566324A (en) * 2016-06-30 2018-01-09 南京中兴新软件有限责任公司 Encryption method, decryption method and device
CN108737428A (en) * 2018-05-24 2018-11-02 中国联合网络通信集团有限公司 Method and apparatus are determined based on the skin disease of image recognition
CN109462705A (en) * 2018-11-30 2019-03-12 广州华多网络科技有限公司 A kind of audio communication method and device based on channel
CN109905876A (en) * 2019-01-04 2019-06-18 广东安创信息科技开发有限公司 A kind of speech ciphering method based on coprocessor
CN109994115A (en) * 2018-01-03 2019-07-09 阿里巴巴集团控股有限公司 The means of communication and device, data processing method and equipment
CN111314072A (en) * 2020-02-21 2020-06-19 北京邮电大学 Extensible identity authentication method and system based on SM2 algorithm
US10694034B1 (en) 2018-12-12 2020-06-23 International Business Machines Corporation Avoiding identity fraud and unwarranted calls by authorization mechanism in communication system
CN113300999A (en) * 2020-02-21 2021-08-24 北京沃东天骏信息技术有限公司 Information processing method, electronic device, and readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1710985A (en) * 2005-06-30 2005-12-21 中国科学院计算技术研究所 Enciphered consulating method for speech-sound communication in grouped network
CN1925681A (en) * 2006-09-20 2007-03-07 北京太极联合实验室科技有限公司 End-to-end encrypting method and system based on mobile communication network
CN101340443A (en) * 2008-08-28 2009-01-07 中国电信股份有限公司 Session key negotiating method, system and server in communication network
CN103974241A (en) * 2013-02-05 2014-08-06 东南大学常州研究院 Voice end-to-end encryption method aiming at mobile terminal with Android system
CN104065648A (en) * 2014-06-05 2014-09-24 天地融科技股份有限公司 Data processing method of voice communication

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1710985A (en) * 2005-06-30 2005-12-21 中国科学院计算技术研究所 Enciphered consulating method for speech-sound communication in grouped network
CN1925681A (en) * 2006-09-20 2007-03-07 北京太极联合实验室科技有限公司 End-to-end encrypting method and system based on mobile communication network
CN101340443A (en) * 2008-08-28 2009-01-07 中国电信股份有限公司 Session key negotiating method, system and server in communication network
CN103974241A (en) * 2013-02-05 2014-08-06 东南大学常州研究院 Voice end-to-end encryption method aiming at mobile terminal with Android system
CN104065648A (en) * 2014-06-05 2014-09-24 天地融科技股份有限公司 Data processing method of voice communication

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106856606A (en) * 2015-12-08 2017-06-16 中兴通讯股份有限公司 Communication means, communication system and mobile terminal
CN105553669B (en) * 2015-12-21 2019-01-08 中城智慧科技有限公司 A kind of information encryption transmission device and method and monitoring and managing method based on ID authentication
CN105553669A (en) * 2015-12-21 2016-05-04 中城智慧科技有限公司 Identity authentication based information encryption transmission apparatus, method, and control method
CN106935242A (en) * 2015-12-30 2017-07-07 北京明朝万达科技股份有限公司 A kind of voice communication encryption system and method
CN105656895A (en) * 2015-12-31 2016-06-08 深圳中兴网信科技有限公司 Communication method, virtual machine communication device, client communication device and communication system
CN107395552A (en) * 2016-05-17 2017-11-24 中兴通讯股份有限公司 A kind of data transmission method and device
CN107566324A (en) * 2016-06-30 2018-01-09 南京中兴新软件有限责任公司 Encryption method, decryption method and device
CN106130724A (en) * 2016-08-26 2016-11-16 浪潮集团有限公司 A kind of internet-of-things terminal safety implementation method using key agreement
CN106603504A (en) * 2016-11-23 2017-04-26 深圳市金立通信设备有限公司 VoIP (Voice over Internet Protocol) encrypting and monitoring methods and VoIP encrypting and monitoring devices
CN109994115A (en) * 2018-01-03 2019-07-09 阿里巴巴集团控股有限公司 The means of communication and device, data processing method and equipment
CN109994115B (en) * 2018-01-03 2023-07-07 阿里巴巴集团控股有限公司 Communication method and device, data processing method and device
CN108737428A (en) * 2018-05-24 2018-11-02 中国联合网络通信集团有限公司 Method and apparatus are determined based on the skin disease of image recognition
CN109462705A (en) * 2018-11-30 2019-03-12 广州华多网络科技有限公司 A kind of audio communication method and device based on channel
CN109462705B (en) * 2018-11-30 2020-04-17 广州华多网络科技有限公司 Voice communication method and device based on channel
US11272053B2 (en) 2018-11-30 2022-03-08 Guangzhou Huaduo Network Technology Co., Ltd. Channel-based voice call method and apparatus
US10694034B1 (en) 2018-12-12 2020-06-23 International Business Machines Corporation Avoiding identity fraud and unwarranted calls by authorization mechanism in communication system
CN109905876A (en) * 2019-01-04 2019-06-18 广东安创信息科技开发有限公司 A kind of speech ciphering method based on coprocessor
CN111314072A (en) * 2020-02-21 2020-06-19 北京邮电大学 Extensible identity authentication method and system based on SM2 algorithm
CN113300999A (en) * 2020-02-21 2021-08-24 北京沃东天骏信息技术有限公司 Information processing method, electronic device, and readable storage medium
CN113300999B (en) * 2020-02-21 2023-12-05 北京沃东天骏信息技术有限公司 Information processing method, electronic device, and readable storage medium

Similar Documents

Publication Publication Date Title
CN104539433A (en) Voice communication encryption system and encryption method thereof
US8831224B2 (en) Method and apparatus for secure pairing of mobile devices with vehicles using telematics system
CN104486077B (en) A kind of end-to-end cryptographic key negotiation method of VoIP real time datas safe transmission
CN106936570B (en) Key configuration method, key management center and network element
CN104618110B (en) A kind of VoIP security conferences session key transmission method
CN102036238B (en) Method for realizing user and network authentication and key distribution based on public key
US20150089220A1 (en) Technique For Bypassing an IP PBX
WO2017201809A1 (en) Communication method and system for terminal
CN104301115B (en) Mobile phone and Bluetooth key signature verification ciphertext communication method
CN102547688B (en) Virtual-dedicated-channel-based establishment method for high-credibility mobile security communication channel
JP6800169B2 (en) Systems and methods for making secure VOIP multi-party calls
CN104901935A (en) Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)
CN104754581A (en) Public key password system based LTE wireless network security certification system
CN101635924B (en) CDMA port-to-port encryption communication system and key distribution method thereof
CN104683291B (en) Session key negotiation method based on IMS system
WO2012024906A1 (en) Mobile communication system and voice call encryption method thereof
CN102685749A (en) Wireless safety authentication method orienting to mobile terminal
CN108390755A (en) The safe input method of SIM pasting cards based on built-in security chip
CN106856606A (en) Communication means, communication system and mobile terminal
CN106209384B (en) Use the client terminal of security mechanism and the communication authentication method of charging unit
CN105991277B (en) Cryptographic key distribution method based on SIP communication system
WO2014084711A1 (en) A system and method for duty-shared authenticated group key transport
CN104581706A (en) Data security interactive method based on asymmetric encryption technology between intelligent mobile terminals
CN104753869A (en) SIP protocol based session encryption method
CN110574335B (en) Key distribution system, method and recording medium

Legal Events

Date Code Title Description
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20150422

RJ01 Rejection of invention patent application after publication