CN104640108A - Terminal communication voice encryption method and system - Google Patents

Terminal communication voice encryption method and system Download PDF

Info

Publication number
CN104640108A
CN104640108A CN201510045144.3A CN201510045144A CN104640108A CN 104640108 A CN104640108 A CN 104640108A CN 201510045144 A CN201510045144 A CN 201510045144A CN 104640108 A CN104640108 A CN 104640108A
Authority
CN
China
Prior art keywords
terminal
key
speech frame
negotiation request
sent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510045144.3A
Other languages
Chinese (zh)
Inventor
梁晓东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN BVC TECHNOLOGY Co Ltd
Original Assignee
SHENZHEN BVC TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN BVC TECHNOLOGY Co Ltd filed Critical SHENZHEN BVC TECHNOLOGY Co Ltd
Priority to CN201510045144.3A priority Critical patent/CN104640108A/en
Publication of CN104640108A publication Critical patent/CN104640108A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the invention discloses a terminal communication voice encryption method and system. The method comprises the following steps: obtaining a first secret key from a first encryption card of a first terminal by the first terminal and sending a secret key negotiation request carrying the first secret key to a second terminal; receiving a message which is sent by the second terminal and shows that validation is passed; sending a voice frame to the first encryption card and encrypting the voice frame by using the first secret key; sending the encrypted voice frame to the second terminal. According to the terminal communication voice encryption method disclosed by the embodiment of the invention, communication voices are encrypted by a dynamic secret key and are not easy to decode, so that the safety is higher.

Description

A kind of terminal call speech ciphering method and voice encryption system
Technical field
The present invention relates to the communications field, particularly relate to a kind of terminal call speech ciphering method and voice encryption system.
Background technology
Flourish along with communications industry, the communication terminals such as mobile phone have become necessity for life, simultaneously, the problem that the voice information whose stealing mobile phone by means such as eavesdroppings causes user data to leak is on the rise, for cellphone subscriber causes very large loss, therefore, the safety issue of mobile phone communication becomes more and more important, when carrying out some important calls, user can be encrypted call voice.
Voice of the prior art and data encryption product, the encryption technology of employing is mostly and uses single key to encrypt and decrypt, but single key is easy to be decrypted, and fail safe is lower.
Summary of the invention
The embodiment of the present invention provides a kind of terminal call speech ciphering method and voice encryption system, and the method is encrypted call voice by dynamic key.
The embodiment of the present invention provides a kind of terminal call speech ciphering method, comprising:
First terminal obtains the first key from the first encrypted card of described first terminal, sends the key negotiation request of carrying described first key to the second terminal;
The message that the verification receiving described second terminal transmission is passed through, is sent to described first encrypted card, uses speech frame described in described first double secret key to be encrypted by speech frame;
Described speech frame after encryption is sent to described second terminal.
In the preferred implementation of the embodiment of the present invention, first terminal obtains the first key from the first encrypted card of first terminal, sends the key negotiation request of carrying described first key, comprising to the second terminal:
First terminal sends the key negotiation request of carrying described first key every preset time period to described second terminal, and the described default time cycle is fixed time period or on-fixed time cycle.
In the preferred implementation of the embodiment of the present invention, described first key is random transmission.
The embodiment of the present invention also provides another kind of terminal call speech ciphering method, comprising:
Second terminal receives the key negotiation request of carrying described first key that described first terminal sends, and verifies the legitimacy of described key negotiation request;
If the legitimacy verification of described key negotiation request is passed through, then send the message verifying and pass through to described first terminal;
Receive the speech frame after encryption, the speech frame after described encryption is sent in the second encrypted card of described second terminal, the speech frame after deciphering is sent to the receiver of described second terminal.
In the preferred implementation of the embodiment of the present invention, also comprise:
If the legitimacy verification of described key negotiation request is not passed through, then send the unsanctioned message of verification to described first terminal, described first terminal sends unencrypted speech frame to described second terminal.
Accordingly, the embodiment of the present invention also provides a kind of voice encryption system, comprising: first terminal and the second terminal, wherein,
Described first terminal is used for, the first key is obtained from the first encrypted card of described first terminal, the key negotiation request of carrying described first key is sent to the second terminal, the message that the verification receiving described second terminal transmission is passed through, speech frame is sent to described first encrypted card, use speech frame described in described first double secret key to be encrypted, the described speech frame after encryption is sent to described second terminal.
In the preferred implementation of the embodiment of the present invention, described first terminal also for,
Described first terminal sends the key negotiation request of carrying described first key every preset time period to described second terminal, and the described default time cycle is fixed time period or on-fixed time cycle.
In the preferred implementation of the embodiment of the present invention, described first key is random transmission.
In the preferred implementation of the embodiment of the present invention, described second terminal is used for,
Receive the key negotiation request of carrying described first key that described first terminal sends, the legitimacy of described key negotiation request is verified, if the legitimacy verification of described key negotiation request is passed through, the message verifying and pass through then is sent to described first terminal, receive the speech frame after encryption, speech frame after described encryption is sent in the second encrypted card of described second terminal, the speech frame after deciphering is sent to the receiver of described second terminal.
In the preferred implementation of the embodiment of the present invention, the second terminal also for,
If the legitimacy verification of described key negotiation request is not passed through, then send the unsanctioned message of verification to described first terminal, described first terminal sends unencrypted speech frame to described second terminal.
The terminal call speech ciphering method that the embodiment of the present invention provides and voice encryption system, the method is encrypted call voice by dynamic key, is not easy to be decrypted, and fail safe is higher.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is first embodiment of the invention terminal call speech ciphering method flow chart;
Fig. 2 is second embodiment of the invention terminal call speech ciphering method flow chart;
Fig. 3 is first embodiment of the invention voice encryption system architecture diagram;
Fig. 4 is embodiment of the present invention voice encryption system signal flow diagram.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
Refer to Fig. 1, be first embodiment of the invention terminal call speech ciphering method flow chart, the method specifically comprises:
S101, first terminal obtain the first key from its first encrypted card, send the key negotiation request of carrying the first key to the second terminal.
Concrete, the physical interface definition of the size conforms standard Micro SD (TF) of the first encrypted card of the embodiment of the present invention, similar with SD card, can be inserted in terminal, first encrypted card is connected with terminal by standard Micro SD interface, further, multiple separate keys is preserved in the first encrypted card.
The message that the verification that S102, first terminal receive the second terminal transmission is passed through, is sent to the first encrypted card, uses the first double secret key speech frame to be encrypted by speech frame.
Concrete, second terminal receives the key negotiation request of carrying the first key that first terminal sends, key negotiation request is verified, if verification is passed through, then send and verify the message passed through to first terminal, first terminal receives this message, and speech frame is sent to the first encrypted card, is encrypted in the first encrypted card to speech frame.
Be to be understood that, first terminal sends the key negotiation request of carrying the first key to the second terminal every preset time period, wherein, the time cycle of presetting is fixed time period or on-fixed time cycle, such as, first terminal sent the key negotiation request of carrying the first key every 2 seconds to the second terminal, or, first terminal sends the key negotiation request of carrying the first key at random as the second terminal, to improve the fail safe of first terminal and the second terminal call, use above-mentioned dynamic secret key encryption, make the more difficult decoding of call voice.
Such as, it is understood that described first key is random transmission, the first key that first time sends is 1234, and the first key that second time sent afterwards every 2 seconds is 1478, then the first key sent for the third time afterwards every 2 seconds is 7895, that is, the value of the first key is real-time change.
Speech frame after encryption is sent to the second terminal by S103, first terminal.
Concrete, the speech frame after encryption is sent to the second terminal by first terminal, and the second terminal is decrypted above-mentioned speech frame.
The terminal call speech ciphering method that the embodiment of the present invention provides and voice encryption system, the method is encrypted call voice by dynamic key, is not easy to be decrypted, and fail safe is higher.
Refer to Fig. 2, be second embodiment of the invention terminal call speech ciphering method flow chart, the method specifically comprises:
S201, the second terminal receive the key negotiation request of carrying the first key that first terminal sends, and verify the legitimacy of key negotiation request.
Concrete, the second terminal preserves the key information of first terminal, verifies the legitimacy of the key negotiation request that first terminal sends.
If the legitimacy verification of S202 key negotiation request is passed through, then the second terminal sends the message verifying and pass through to first terminal.
Concrete, if the legitimacy verification of key negotiation request is passed through, then the second terminal sends to first terminal and confirms to verify the message passed through, and proves that the second terminal is the trusted terminal of this call.
It is understood that, if the legitimacy verification of key negotiation request is not passed through, then send the unsanctioned message of verification to first terminal, first terminal sends unencrypted speech frame to described second terminal, namely, if the second terminal sends verification not by message, the second terminal can not be encrypted call with first terminal, the voice call that first terminal and the second terminal are not directly encrypted.
S203, the second terminal receive the speech frame after encryption, are sent in the second encrypted card of the second terminal by the speech frame after encryption, the speech frame after deciphering are sent to the receiver of the second terminal.
Concrete, second terminal comprises the second encrypted card, second encrypted card and the first encrypted card similar, the physical interface definition of size conforms standard Micro SD (TF), similar with SD card, can be inserted in terminal, the second encrypted card is connected with terminal by standard Micro SD interface, further, the multiple separate keys corresponding with the first encrypted card are preserved in the second encrypted card.Second encrypted card is used for deciphering, and therefore, the second terminal receives the speech frame after encryption, is sent in the second encrypted card of the second terminal by the speech frame after encryption and is decrypted, and the receiver speech frame after deciphering being sent to the second terminal carries out voice call.
The terminal call speech ciphering method that the embodiment of the present invention provides and voice encryption system, the method is encrypted call voice by dynamic key, is not easy to be decrypted, and fail safe is higher.
Refer to Fig. 3 and Fig. 4, this voice encryption system 1 comprises: first terminal 10 and the second terminal 20, and first terminal 10 comprises the first encrypted card 11, second terminal 20 and comprises the second encrypted card 21, wherein,
First terminal 10 for, the first key is obtained from the first encrypted card of first terminal 10, the key negotiation request of carrying described first key is sent to the second terminal, the message that the verification receiving the second terminal transmission is passed through, speech frame is sent to the first encrypted card 11, use the first double secret key speech frame to be encrypted, the speech frame after encryption is sent to the second terminal.
Concrete, the physical interface definition of the size conforms standard Micro SD (TF) of the first encrypted card 11 of the embodiment of the present invention, similar with SD card, can be inserted in terminal, first encrypted card 11 is connected with terminal by standard MicroSD interface, further, multiple separate keys is preserved in the first encrypted card 11.
It is understood that, first terminal 10 also for,
First terminal 10 sends the key negotiation request of carrying described first key every preset time period to described second terminal 20.The time cycle of presetting is fixed time period or on-fixed time cycle.
Concrete, second terminal 20 receives the key negotiation request of carrying the first key that first terminal 10 sends, key negotiation request is verified, if verification is passed through, then send and verify the message passed through to first terminal, first terminal 10 receives this message, and speech frame is sent to the first encrypted card 11, is encrypted in the first encrypted card 11 to speech frame.
Be to be understood that, first terminal 10 sends the key negotiation request of carrying the first key to the second terminal every preset time period, wherein, the time cycle of presetting is fixed time period or on-fixed time cycle, such as, first terminal 10 sent the key negotiation request of carrying the first key every 2 seconds to the second terminal, or, first terminal 10 sends the key negotiation request of carrying the first key at random as the second terminal 20, to improve the fail safe of first terminal 10 and the call of the second terminal 20, use above-mentioned dynamic secret key encryption, make the more difficult decoding of call voice.
Such as, it is understood that described first key is random transmission, and, the first key that first time sends is 1234, and the first key that second time sent afterwards every 2 seconds is 1478.
Second terminal 20 for,
Receive the key negotiation request of carrying the first key that first terminal 10 sends, the legitimacy of key negotiation request is verified, if the legitimacy verification of key negotiation request is passed through, the message verifying and pass through then is sent to first terminal 10, receive the speech frame after encryption, speech frame after encryption is sent in the second encrypted card 21 of described second terminal 20, the speech frame after deciphering is sent to the receiver of the second terminal 20.
Concrete, the second terminal 20 preserves the key information of first terminal 10, verifies the legitimacy of the key negotiation request that first terminal 10 sends.
If the legitimacy verification of key negotiation request is passed through, then the second terminal 20 sends to first terminal 10 and confirms to verify the message passed through, and proves that the second terminal 20 is trusted terminal of this call
Concrete, second terminal 20 comprises the second encrypted card, second encrypted card 21 and the first encrypted card 11 similar, the physical interface definition of size conforms standard Micro SD (TF), similar with SD card, can be inserted in terminal, the second encrypted card 21 is connected with terminal by standard Micro SD interface, further, the multiple separate keys corresponding with the first encrypted card 11 are preserved in the second encrypted card 21.Second encrypted card 21 is for deciphering, therefore, second terminal 20 receives the speech frame after encryption, is sent in the second encrypted card 21 of the second terminal 20 by the speech frame after encryption and is decrypted, and the receiver speech frame after deciphering being sent to the second terminal 20 carries out voice call.
Second terminal 20 also for, if the legitimacy verification of key negotiation request is not passed through, then send the unsanctioned message of verification to first terminal 10, first terminal sends unencrypted speech frame to the second terminal 20.
It is understood that, if the legitimacy verification of key negotiation request is not passed through, then send the unsanctioned message of verification to first terminal 10, first terminal 10 sends unencrypted speech frame to described second terminal 20, namely, if the second terminal 20 sends verification not by message, the second terminal 20 can not be encrypted call with first terminal 10, the voice call that first terminal 10 and the second terminal 20 are not directly encrypted.
The voice encryption system that the embodiment of the present invention provides, is encrypted call voice by dynamic key, and be not easy to be decrypted, fail safe is higher.
Should be appreciated that above-mentioned first terminal and the second terminal are not order of representation relation, but in order to distinguish different terminals.In like manner, the first encrypted card, the second encrypted card are to represent different Executive Modules, not repeating them here.
One of ordinary skill in the art will appreciate that the possible implementation of various aspects of the present invention or various aspects can be embodied as system, method or computer program.In addition, the possible implementation of each aspect of the present invention or various aspects can adopt the form of computer program, and computer program refers to the computer readable program code be stored in computer-readable medium.
Computer-readable medium can be computer-readable signal media or computer-readable recording medium.Computer-readable recording medium is including but not limited to electronics, magnetic, optics, electromagnetism, infrared or semiconductor system, equipment or device, or aforesaid appropriately combined arbitrarily, as random access memory (RAM), read-only memory (ROM), Erasable Programmable Read Only Memory EPROM (EPROM or flash memory), optical fiber, portable read-only memory (CD-ROM).
Processor in computer reads the computer readable program code be stored in computer-readable medium, makes processor can perform the function action specified in the combination of each step or each step in flow charts; Generate the device implementing the function action specified in the combination of each block of block diagram or each piece.
Computer readable program code can perform completely on the computer of user, part performs on the computer of user, as independent software kit, part on the local computer of user and part on the remote computer, or to perform on remote computer or server completely.Also it should be noted that in some alternate embodiment, in flow charts in each step or block diagram each piece the function that indicates may not according to occurring in sequence of indicating in figure.Such as, depend on involved function, in fact two steps illustrated in succession or two blocks may be executed substantially concurrently, or these blocks sometimes may be performed by with reverse order.
Above disclosedly be only present pre-ferred embodiments, certainly can not limit the interest field of the present invention with this, therefore according to the equivalent variations that the claims in the present invention are done, still belong to the scope that the present invention is contained.

Claims (10)

1. a terminal call speech ciphering method, is characterized in that, comprising:
First terminal obtains the first key from the first encrypted card of described first terminal, sends the key negotiation request of carrying described first key to the second terminal;
The message that the verification receiving described second terminal transmission is passed through, is sent to described first encrypted card, uses speech frame described in described first double secret key to be encrypted by speech frame;
Described speech frame after encryption is sent to described second terminal.
2. the method for claim 1, is characterized in that, described first terminal obtains the first key from the first encrypted card of described first terminal, sends the key negotiation request of carrying described first key, comprising to the second terminal:
Described first terminal sends the key negotiation request of carrying described first key every preset time period to described second terminal, and the described default time cycle is fixed time period or on-fixed time cycle.
3. method as claimed in claim 2, is characterized in that, described first key is random transmission.
4. a terminal call speech ciphering method, is characterized in that, comprising:
Second terminal receives the key negotiation request of carrying described first key that described first terminal sends, and verifies the legitimacy of described key negotiation request;
If the legitimacy verification of described key negotiation request is passed through, then send the message verifying and pass through to described first terminal;
Receive the speech frame after encryption, the speech frame after described encryption is sent in the second encrypted card of described second terminal, the speech frame after deciphering is sent to the receiver of described second terminal.
5. method as claimed in claim 4, is characterized in that, also comprise:
If the legitimacy verification of described key negotiation request is not passed through, then send the unsanctioned message of verification to described first terminal, described first terminal sends unencrypted speech frame to described second terminal.
6. a voice encryption system, is characterized in that, comprising: first terminal and the second terminal, wherein,
Described first terminal is used for, the first key is obtained from the first encrypted card of described first terminal, the key negotiation request of carrying described first key is sent to the second terminal, the message that the verification receiving described second terminal transmission is passed through, speech frame is sent to described first encrypted card, use speech frame described in described first double secret key to be encrypted, the described speech frame after encryption is sent to described second terminal.
7. voice encryption system as claimed in claim 6, is characterized in that, described first terminal also for,
Described first terminal sends the key negotiation request of carrying described first key every preset time period to described second terminal, and the described default time cycle is fixed time period or on-fixed time cycle.
8. voice encryption system as claimed in claim 7, is characterized in that, described first key is random transmission.
9. voice encryption system as claimed in claim 6, it is characterized in that, described second terminal is used for,
Receive the key negotiation request of carrying described first key that described first terminal sends, the legitimacy of described key negotiation request is verified, if the legitimacy verification of described key negotiation request is passed through, the message verifying and pass through then is sent to described first terminal, receive the speech frame after encryption, speech frame after described encryption is sent in the second encrypted card of described second terminal, the speech frame after deciphering is sent to the receiver of described second terminal.
10. voice encryption system as claimed in claim 9, is characterized in that, described second terminal also for,
If the legitimacy verification of described key negotiation request is not passed through, then send the unsanctioned message of verification to described first terminal, described first terminal sends unencrypted speech frame to described second terminal.
CN201510045144.3A 2015-01-28 2015-01-28 Terminal communication voice encryption method and system Pending CN104640108A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510045144.3A CN104640108A (en) 2015-01-28 2015-01-28 Terminal communication voice encryption method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510045144.3A CN104640108A (en) 2015-01-28 2015-01-28 Terminal communication voice encryption method and system

Publications (1)

Publication Number Publication Date
CN104640108A true CN104640108A (en) 2015-05-20

Family

ID=53218314

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510045144.3A Pending CN104640108A (en) 2015-01-28 2015-01-28 Terminal communication voice encryption method and system

Country Status (1)

Country Link
CN (1) CN104640108A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105743896A (en) * 2016-02-01 2016-07-06 成都三零瑞通移动通信有限公司 Encrypted voice communication key negotiation data exchange and transmission method
CN106559393A (en) * 2015-09-29 2017-04-05 华为数字技术(苏州)有限公司 A kind of method of call encryption, apparatus and system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1542427A1 (en) * 2003-12-10 2005-06-15 Sony Corporation Secure in-vehicle communication system, method, terminal, program recording medium, and program
CN101909290A (en) * 2010-08-25 2010-12-08 中兴通讯股份有限公司 Method, system and mobile terminal for encrypting voice call
CN101917711A (en) * 2010-08-25 2010-12-15 中兴通讯股份有限公司 Mobile communication system and voice call encryption method thereof
CN102158861A (en) * 2011-03-18 2011-08-17 钱袋网(北京)信息技术有限公司 Expansion card, encryption card, mobile terminal, communication data receiving and transmitting method and equipment
CN103974241A (en) * 2013-02-05 2014-08-06 东南大学常州研究院 Voice end-to-end encryption method aiming at mobile terminal with Android system
CN103986712A (en) * 2014-05-16 2014-08-13 天地融科技股份有限公司 Data processing method for voice communication
CN104113836A (en) * 2014-07-29 2014-10-22 深圳市中兴移动通信有限公司 Conversation encryption method, communication terminal and base station
CN104284328A (en) * 2013-07-09 2015-01-14 北京鼎普科技股份有限公司 Method and device for encrypting mobile phone communication content

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1542427A1 (en) * 2003-12-10 2005-06-15 Sony Corporation Secure in-vehicle communication system, method, terminal, program recording medium, and program
CN101909290A (en) * 2010-08-25 2010-12-08 中兴通讯股份有限公司 Method, system and mobile terminal for encrypting voice call
CN101917711A (en) * 2010-08-25 2010-12-15 中兴通讯股份有限公司 Mobile communication system and voice call encryption method thereof
CN102158861A (en) * 2011-03-18 2011-08-17 钱袋网(北京)信息技术有限公司 Expansion card, encryption card, mobile terminal, communication data receiving and transmitting method and equipment
CN103974241A (en) * 2013-02-05 2014-08-06 东南大学常州研究院 Voice end-to-end encryption method aiming at mobile terminal with Android system
CN104284328A (en) * 2013-07-09 2015-01-14 北京鼎普科技股份有限公司 Method and device for encrypting mobile phone communication content
CN103986712A (en) * 2014-05-16 2014-08-13 天地融科技股份有限公司 Data processing method for voice communication
CN104113836A (en) * 2014-07-29 2014-10-22 深圳市中兴移动通信有限公司 Conversation encryption method, communication terminal and base station

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106559393A (en) * 2015-09-29 2017-04-05 华为数字技术(苏州)有限公司 A kind of method of call encryption, apparatus and system
CN106559393B (en) * 2015-09-29 2021-02-05 华为数字技术(苏州)有限公司 Method, device and system for encrypting call
CN105743896A (en) * 2016-02-01 2016-07-06 成都三零瑞通移动通信有限公司 Encrypted voice communication key negotiation data exchange and transmission method
CN105743896B (en) * 2016-02-01 2019-03-22 成都三零瑞通移动通信有限公司 A kind of transmission method of enciphoring voice telecommunication key agreement data exchange

Similar Documents

Publication Publication Date Title
CN104079581B (en) Identity identifying method and equipment
CN107358441B (en) Payment verification method and system, mobile device and security authentication device
CN103905903B (en) A kind of communication partner method of digital TV terminal, terminal and system
CN109462476B (en) Key agreement method, device, terminal and computer readable storage medium
CN108566381A (en) A kind of security upgrading method, device, server, equipment and medium
CN109150897B (en) End-to-end communication encryption method and device
CN105634737B (en) Data transmission method, terminal and system
CN104484596A (en) Method and terminal for creating password in multi-operation system
WO2016095473A1 (en) Security call method, terminal and system, and computer storage medium
CN107707562B (en) Method and device for encrypting and decrypting algorithm of asymmetric dynamic token
CN103973696B (en) A kind of data processing method of voice call
CN103458400A (en) Key management method for voice encryption communication system
CN102056077A (en) Method and device for applying smart card by key
CN105376059A (en) Method and system for performing application signature based on electronic key
CN104065648B (en) A kind of data processing method of voice call
CN111143474A (en) One-key mobile phone number binding changing method based on block chain technology
CN104243452A (en) Method and system for cloud computing access control
CN115396191A (en) Vehicle-end digital key pushing method and system, electronic equipment and readable storage medium
CN104955029A (en) Address book protection method, address book protection device and communication system
CN105279447A (en) Method and device for data encryption, and method and device for data decryption
CN105262759A (en) Method and system for encrypted communication
CN107395350B (en) Method and system for generating key and key handle and intelligent key safety equipment
CN104640108A (en) Terminal communication voice encryption method and system
CN103974243B (en) A kind of data handling system of voice call
CN111130805B (en) Secure transmission method, electronic device, and computer-readable storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150520