CN104955033A - Voice encryption communication method - Google Patents
Voice encryption communication method Download PDFInfo
- Publication number
- CN104955033A CN104955033A CN201510284711.0A CN201510284711A CN104955033A CN 104955033 A CN104955033 A CN 104955033A CN 201510284711 A CN201510284711 A CN 201510284711A CN 104955033 A CN104955033 A CN 104955033A
- Authority
- CN
- China
- Prior art keywords
- voice
- rpc
- terminal
- module
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/141—Setup of application sessions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Multimedia (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses a communication session initiation method which includes the steps: building an RPC (remote procedure call) passage and an encryption module and establishing voice communication; acquiring session voice data from an ADSP (advanced digital signal processor) of a calling party terminal by a BP (baseband processor); transmitting encrypted session voice data to a called party terminal by the aid of a session key protocol. A voice encryption communication receiving method includes the steps: building the RPC passage; processing the key protocol; establishing voice communication to finish voice data transmission between the calling party terminal and the called party terminal. The method has the advantages that original voice data are transmitted and customized between an application processor and the baseband processor, the encryption module can generate a plurality of examples, each example can serve one BP, and multi-mode terminals are encrypted.
Description
Technical field
The present invention relates to a kind of voice encryption call method.
Background technology
Current cdma voice encryption ensures air interface voice ciphering mainly through privately owned Long Code Mask, but use in core network process be but deciphering after speech data, have security risk.User also cannot customized cipher mode, and user in additional information in enciphered data of eating dishes without rice or wine, otherwise cannot be able to not be transmitted after core net deciphering.And along with the development of terminal technology, terminal has entered the intelligence epoch, and original unintelligent terminal encrypting module also cannot adapt to the demand of intelligent terminal.
For the problem in correlation technique, at present effective solution is not yet proposed.
Summary of the invention
The object of this invention is to provide a kind of voice encryption call method, to overcome currently available technology above shortcomings.
The object of the invention is to be achieved through the following technical solutions:
An initiating method for voice encryption call, comprising:
Before voice encryption call, calling party end sets up the RPC path for realizing the data processing between application processor AP and baseband processor BP;
After RPC path completes, AP sets up encrypting module, when setting up EVRC voice calling service after encrypting module establishes between AP and BP;
Described calling party end utilizes described AP to initiate key request, and described key request impels described BP to send out key protocol to callee's terminal by described RPC passage;
After carrying out key agreement success with described callee's terminal, utilize BP to obtain session voice data from the ADSP of calling party end, and utilize described session key agreement to send the session voice data after encryption to callee's terminal.
Further, described encrypting module comprises key management module and encryption processing module.
Further, described RPC passage comprises the RPC node be arranged in described AP and the RPC thread be arranged in described BP.
An apparatus for initiating for voice encryption call, comprises
Path setting module, for before conversing at voice encryption, calling party end sets up the RPC path for realizing the data processing between application processor AP and baseband processor BP;
Key Establishing module, for after RPC path completes, AP sets up encrypting module, when setting up EVRC voice calling service after encrypting module establishes between AP and BP;
Key negotiation module, for utilizing described AP to initiate key request, described key request impels described BP to send out key protocol to callee's terminal by described RPC passage;
Data transmission blocks, for after carrying out key agreement success with described callee's terminal, utilizes BP from ADSP, obtain session voice data, and utilizes described session key agreement to send the session voice data after encryption to callee's terminal.
Further, described encrypting module comprises key management module and encryption processing module.
Further, described RPC passage comprises the RPC node be arranged in described AP and the RPC thread be arranged in described BP.
A method of reseptance for voice encryption call, comprising:
Described terminal called is set up the RPC path for realizing the data processing between application processor AP and baseband processor BP
The AP of described terminal called sets up the encrypting module of the key protocol sent for the treatment of described calling terminal;
After encrypting module is handled well, between described AP and described BP, set up voice call;
Receive the key protocol that described calling terminal sends, the speech data impelling the BP of described terminal called to receive described calling terminal to send, and realize speech data by RPC path and transmit between the AP and described BP of described terminal called;
Reach the voice encryption call of described calling terminal and described called end.
Further, described encrypting module comprises key management module and decryption processing module.
A receiving system for voice encryption call, comprising:
Path setting module, for the AP on terminal called and the transmission of data between described BP;
Decrypt communication module, is decrypted for the key protocol sent by described calling terminal;
Voice communications module, deciphers the call later between calling terminal and terminal called for realizing.
Beneficial effect of the present invention is: transmitted between application processor and baseband processor by voice initial data and customize, and encrypting module can produce Multi-instance simultaneously, and each example for a BP service, can realize the encryption of multimode terminal.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is according to one of voice encryption call method flow chart of the embodiment of the present invention;
Fig. 2 is the voice encryption call method flow chart two according to the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, the every other embodiment that those of ordinary skill in the art obtain, all belongs to the scope of protection of the invention.
As shown in Figure 1-2, the initiating method of a kind of voice encryption call according to embodiments of the invention, comprising:
Before voice encryption call, calling party end sets up the RPC path for realizing the data processing between application processor AP and baseband processor BP;
After RPC path completes, AP sets up encrypting module, when setting up EVRC voice calling service after encrypting module establishes between AP and BP;
Described calling party end utilizes described AP to initiate key request, and described key request impels described BP to send out key protocol to callee's terminal by described RPC passage;
After carrying out key agreement success with described callee's terminal, utilize BP to obtain session voice data from the ADSP of calling party end, and utilize described session key agreement to send the session voice data after encryption to callee's terminal.
Further, described encrypting module comprises key management module and encryption processing module.
Further, described RPC passage comprises the RPC node be arranged in described AP and the RPC thread be arranged in described BP.
An apparatus for initiating for voice encryption call, comprises
Path setting module, for before conversing at voice encryption, calling party end sets up the RPC path for realizing the data processing between application processor AP and baseband processor BP;
Key Establishing module, for after RPC path completes, AP sets up encrypting module, when setting up EVRC voice calling service after encrypting module establishes between AP and BP;
Key negotiation module, for utilizing described AP to initiate key request, described key request impels described BP to send out key protocol to callee's terminal by described RPC passage;
Data transmission blocks, for after carrying out key agreement success with described callee's terminal, utilizes BP from ADSP, obtain session voice data, and utilizes described session key agreement to send the session voice data after encryption to callee's terminal.
Further, described encrypting module comprises key management module and encryption processing module.
Further, described RPC passage comprises the RPC node be arranged in described AP and the RPC thread be arranged in described BP.
A method of reseptance for voice encryption call, comprising:
Described terminal called is set up the RPC path for realizing the data processing between application processor AP and baseband processor BP
The AP of described terminal called sets up the encrypting module of the key protocol sent for the treatment of described calling terminal;
After encrypting module is handled well, between described AP and described BP, set up voice call;
Receive the key protocol that described calling terminal sends, the speech data impelling the BP of described terminal called to receive described calling terminal to send, and realize speech data by RPC path and transmit between the AP and described BP of described terminal called;
Reach the voice encryption call of described calling terminal and described called end.
Further, described encrypting module comprises key management module and decryption processing module.
A receiving system for voice encryption call, comprising:
Path setting module, for the AP on terminal called and the transmission of data between described BP;
Decrypt communication module, is decrypted for the key protocol sent by described calling terminal;
Voice communications module, deciphers the call later between calling terminal and terminal called for realizing.
Wherein, the present invention proposes mainly for the problem of CDMA voice encryption, achieves a kind of general intelligent terminal voice encryption module, the module instance of flexible expansion AP can support the voice encryption of multiple BP.
Compared with common cdma android terminal, increase a road RPC passage newly, added the collection encryption function of key management functions and primary voice data.
Voice encryption of the present invention can only be bound with EVRC voice service, namely user can only do voice encryption in use EVRC voice service situation, system flow as shown in Figure 2, starting up of terminal initiates registration request to key server, after being registered to key server, set up new RPC path, for command and transfer of data.Concrete methods of realizing is: BP sets up a thread, and registration RPC process function, AP sets up node at linux kernel layer, is employed layer and calls.The data format of RPC transmission is TLV(tag-length-value) form, as follows: Tag, length, [tag, length, value, tag, length, value ... ]
First character joint is 0 be designated as transfer instruction, is 1 to be designated as transmission data.Afterwards immediately following the length of two bytes, the length of all data after mark, then start to be have tag respectively, length, value form whole datagram.
Check whether before caller initiating speech conversation and need voice encryption, if need voice encryption, usage data business initiates request cipher key service to key server, and key server returns encryption key after receiving request.The key received is saved in AP memory headroom by terminal encryption module, needed for encryption.
Between calling and called user, set up common EVRC voice conversation, business option is 0x3.
The collection doing speech data is needed after speech business is successfully established, primary voice data is obtained by increasing call back function in the interrupt function of ADSP, every 20 milliseconds of this call back function calls once, after getting primary voice data, user can be sent to AP preservation key by the RPC path set up is encrypted.The transmission time of RPC path is less than 2 milliseconds, the requirement of data processing within meeting 20 milliseconds completely.Data after encryption import ADSP into again by call back function, are sent to the terminal of the opposing party with the form of transparent transmission by network.After the terminal of the opposing party receives the data of eating dishes without rice or wine, be sent to AP by the RPC path set up and carry out Data Analysis, key-parsing according to cryptographic protocol and preservation goes out correct speech data, be sent to BP, send into ADSP to play back from audio path, need equally within 20 milliseconds, complete this operation.
In sum, by means of technique scheme of the present invention, transmitted and customize by voice initial data between application processor and baseband processor, encrypting module can produce Multi-instance simultaneously, each example for a BP service, can realize the encryption of multimode terminal.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (9)
1. an initiating method for voice encryption call, is characterized in that, comprising:
Before voice encryption call, calling party end sets up the RPC path for realizing the data processing between application processor AP and baseband processor BP;
After RPC path completes, AP sets up encrypting module, when setting up EVRC voice calling service after encrypting module establishes between AP and BP;
Described calling party end utilizes described AP to initiate key request, and described key request impels described BP to send out key protocol to callee's terminal by described RPC passage;
After carrying out key agreement success with described callee's terminal, utilize BP to obtain session voice data from the ADSP of calling party end, and utilize described session key agreement to send the session voice data after encryption to callee's terminal.
2. the initiating method of voice encryption call according to claim 1, it is characterized in that, described encrypting module comprises key management module and encryption processing module.
3. the initiating method of voice encryption call according to claim 1, is characterized in that, described RPC passage comprises the RPC node be arranged in described AP and the RPC thread be arranged in described BP.
4. an apparatus for initiating for voice encryption call, is characterized in that, comprise
Path setting module, for before conversing at voice encryption, calling party end sets up the RPC path for realizing the data processing between application processor AP and baseband processor BP;
Key Establishing module, for after RPC path completes, AP sets up encrypting module, when setting up EVRC voice calling service after encrypting module establishes between AP and BP;
Key negotiation module, for utilizing described AP to initiate key request, described key request impels described BP to send out key protocol to callee's terminal by described RPC passage;
Data transmission blocks, for after carrying out key agreement success with described callee's terminal, utilizes BP from ADSP, obtain session voice data, and utilizes described session key agreement to send the session voice data after encryption to callee's terminal.
5. the apparatus for initiating of voice encryption call according to claim 4, it is characterized in that, described encrypting module comprises key management module and encryption processing module.
6. the apparatus for initiating of voice encryption call according to claim 4, is characterized in that, described RPC passage comprises the RPC node be arranged in described AP and the RPC thread be arranged in described BP.
7. a method of reseptance for voice encryption call, is characterized in that, comprising:
Described terminal called is set up the RPC path for realizing the data processing between application processor AP and baseband processor BP
The AP of described terminal called sets up the encrypting module of the key protocol sent for the treatment of described calling terminal;
After encrypting module is handled well, between described AP and described BP, set up voice call;
Receive the key protocol that described calling terminal sends, the speech data impelling the BP of described terminal called to receive described calling terminal to send, and realize speech data by RPC path and transmit between the AP and described BP of described terminal called;
Reach the voice encryption call of described calling terminal and described called end.
8. the method for reseptance of voice encryption call according to claim 7, it is characterized in that, described encrypting module comprises key management module and decryption processing module.
9. a receiving system for voice encryption call, is characterized in that, comprising:
Path setting module, for the AP on terminal called and the transmission of data between described BP;
Decrypt communication module, is decrypted for the key protocol sent by described calling terminal;
Voice communications module, deciphers the call later between calling terminal and terminal called for realizing.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510284711.0A CN104955033A (en) | 2015-05-28 | 2015-05-28 | Voice encryption communication method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510284711.0A CN104955033A (en) | 2015-05-28 | 2015-05-28 | Voice encryption communication method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104955033A true CN104955033A (en) | 2015-09-30 |
Family
ID=54169308
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510284711.0A Pending CN104955033A (en) | 2015-05-28 | 2015-05-28 | Voice encryption communication method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104955033A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105578459A (en) * | 2015-12-30 | 2016-05-11 | 努比亚技术有限公司 | Data encryption apparatus and data encryption method under cellular network |
CN105743896A (en) * | 2016-02-01 | 2016-07-06 | 成都三零瑞通移动通信有限公司 | Encrypted voice communication key negotiation data exchange and transmission method |
CN106850210A (en) * | 2017-02-28 | 2017-06-13 | 努比亚技术有限公司 | Mobile terminal sound call handling method and mobile terminal |
CN106919847A (en) * | 2017-03-02 | 2017-07-04 | 成都三零瑞通移动通信有限公司 | A kind of anti-by-pass method of coded communication based on android intelligent terminals |
WO2018076671A1 (en) * | 2016-10-27 | 2018-05-03 | 中兴通讯股份有限公司 | Voice data processing device, method and terminal |
CN108092964A (en) * | 2017-12-11 | 2018-05-29 | 广州三星通信技术研究有限公司 | For the method and its electric terminal of the protection call voice of electric terminal |
CN108337676A (en) * | 2018-03-08 | 2018-07-27 | 广州三星通信技术研究有限公司 | encryption communication method and mobile terminal for mobile terminal |
CN112261057A (en) * | 2020-10-28 | 2021-01-22 | 湖南天琛信息科技有限公司 | Encryption processing system for audio and video call |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050136992A1 (en) * | 2003-12-23 | 2005-06-23 | Mueller Peter D. | Providing access to auxiliary hardware in multiprocessor devices |
CN1710985A (en) * | 2005-06-30 | 2005-12-21 | 中国科学院计算技术研究所 | Enciphered consulating method for speech-sound communication in grouped network |
CN2845368Y (en) * | 2005-06-28 | 2006-12-06 | 熊猫电子集团有限公司 | Mobile terminal with public and unpublic communications |
CN101282197A (en) * | 2007-04-03 | 2008-10-08 | 通用汽车公司 | Method for data communication via a voice channel of a wireless communication network using continuous signal modulation |
CN101345965A (en) * | 2008-08-29 | 2009-01-14 | 中国电信股份有限公司 | Encryption call method based on speech code stream and mobile terminal |
JP4239704B2 (en) * | 2003-06-24 | 2009-03-18 | 日本電気株式会社 | Cryptographic communication system and cryptographic communication method |
CN101835146A (en) * | 2010-04-12 | 2010-09-15 | 东南大学 | Third generation mobile network mobile phone sound end-to-end encrypting device and method |
CN101420689B (en) * | 2008-11-17 | 2011-02-16 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal and method for implementing encoding and decoding process of audio code stream |
CN102695170A (en) * | 2011-03-25 | 2012-09-26 | 国民技术股份有限公司 | Mobile platform possessing identity authentication function and identity authentication method |
CN102830984A (en) * | 2011-06-14 | 2012-12-19 | 联想(北京)有限公司 | Method for updating firmware, chip and communication terminal |
CN102945192A (en) * | 2012-10-19 | 2013-02-27 | 广东欧珀移动通信有限公司 | Data backup and recovery method and intelligent mobile terminal |
-
2015
- 2015-05-28 CN CN201510284711.0A patent/CN104955033A/en active Pending
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4239704B2 (en) * | 2003-06-24 | 2009-03-18 | 日本電気株式会社 | Cryptographic communication system and cryptographic communication method |
US20050136992A1 (en) * | 2003-12-23 | 2005-06-23 | Mueller Peter D. | Providing access to auxiliary hardware in multiprocessor devices |
CN2845368Y (en) * | 2005-06-28 | 2006-12-06 | 熊猫电子集团有限公司 | Mobile terminal with public and unpublic communications |
CN1710985A (en) * | 2005-06-30 | 2005-12-21 | 中国科学院计算技术研究所 | Enciphered consulating method for speech-sound communication in grouped network |
CN101282197A (en) * | 2007-04-03 | 2008-10-08 | 通用汽车公司 | Method for data communication via a voice channel of a wireless communication network using continuous signal modulation |
CN101345965A (en) * | 2008-08-29 | 2009-01-14 | 中国电信股份有限公司 | Encryption call method based on speech code stream and mobile terminal |
CN101420689B (en) * | 2008-11-17 | 2011-02-16 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal and method for implementing encoding and decoding process of audio code stream |
CN101835146A (en) * | 2010-04-12 | 2010-09-15 | 东南大学 | Third generation mobile network mobile phone sound end-to-end encrypting device and method |
CN102695170A (en) * | 2011-03-25 | 2012-09-26 | 国民技术股份有限公司 | Mobile platform possessing identity authentication function and identity authentication method |
CN102830984A (en) * | 2011-06-14 | 2012-12-19 | 联想(北京)有限公司 | Method for updating firmware, chip and communication terminal |
CN102945192A (en) * | 2012-10-19 | 2013-02-27 | 广东欧珀移动通信有限公司 | Data backup and recovery method and intelligent mobile terminal |
Non-Patent Citations (1)
Title |
---|
胡倩;杨子华;曹燚: "智能手机软件平台的研究与开发", 《通信技术》 * |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105578459A (en) * | 2015-12-30 | 2016-05-11 | 努比亚技术有限公司 | Data encryption apparatus and data encryption method under cellular network |
CN105578459B (en) * | 2015-12-30 | 2019-04-16 | 努比亚技术有限公司 | Data encryption device and method under cellular network |
WO2017113961A1 (en) * | 2015-12-30 | 2017-07-06 | 努比亚技术有限公司 | Data encryption apparatus and method, and storage medium |
CN105743896A (en) * | 2016-02-01 | 2016-07-06 | 成都三零瑞通移动通信有限公司 | Encrypted voice communication key negotiation data exchange and transmission method |
CN105743896B (en) * | 2016-02-01 | 2019-03-22 | 成都三零瑞通移动通信有限公司 | A kind of transmission method of enciphoring voice telecommunication key agreement data exchange |
CN107995673A (en) * | 2016-10-27 | 2018-05-04 | 中兴通讯股份有限公司 | A kind of voice data processing apparatus, method and terminal |
WO2018076671A1 (en) * | 2016-10-27 | 2018-05-03 | 中兴通讯股份有限公司 | Voice data processing device, method and terminal |
CN106850210A (en) * | 2017-02-28 | 2017-06-13 | 努比亚技术有限公司 | Mobile terminal sound call handling method and mobile terminal |
CN106919847A (en) * | 2017-03-02 | 2017-07-04 | 成都三零瑞通移动通信有限公司 | A kind of anti-by-pass method of coded communication based on android intelligent terminals |
CN106919847B (en) * | 2017-03-02 | 2020-02-07 | 成都三零瑞通移动通信有限公司 | Encrypted communication bypass prevention method based on android intelligent terminal |
CN108092964A (en) * | 2017-12-11 | 2018-05-29 | 广州三星通信技术研究有限公司 | For the method and its electric terminal of the protection call voice of electric terminal |
CN108337676A (en) * | 2018-03-08 | 2018-07-27 | 广州三星通信技术研究有限公司 | encryption communication method and mobile terminal for mobile terminal |
CN112261057A (en) * | 2020-10-28 | 2021-01-22 | 湖南天琛信息科技有限公司 | Encryption processing system for audio and video call |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104955033A (en) | Voice encryption communication method | |
CN100466805C (en) | Method for end-to-end enciphoring voice telecommunication | |
US8804961B2 (en) | Method and system for mobile terminals handing over between clear session and encrypted session communications | |
MX2019011218A (en) | Communication method and device. | |
US20170034149A1 (en) | Intelligent Communications Method, Terminal, and System | |
CN108848491B (en) | Virtual SIM card creates system | |
CN105142136B (en) | A kind of method of anti-pseudo-base station attack | |
CN102843675A (en) | Cluster call voice encryption method, terminal and system | |
CN102137393B (en) | Method and device for encrypting end-to-end | |
CN103139769B (en) | A kind of wireless communications method and network subsystem | |
CN108156604B (en) | Group calling encryption transmission method and device of cluster system, cluster terminal and system | |
CN107276884A (en) | A kind of autonomous encrypting and deciphering system of social software based on intelligent terminal | |
CN106888310A (en) | Ciphering and deciphering device and method and communication terminal device | |
CN102123361B (en) | Method and device for realizing encrypted message communication | |
WO2012067967A1 (en) | Methods and apparatus for transmitting and receiving secure and non-secure data | |
CN115362692A (en) | Communication method, device and system | |
CN103002439A (en) | Confidential call communication method and user terminal | |
US9819651B2 (en) | Secure voice and text communication | |
KR101332389B1 (en) | WCDMA 3G voice communication protection method and terminal thereof | |
CN103634744A (en) | Cluster group call end-to-end encryption realization method | |
CN105262759A (en) | Method and system for encrypted communication | |
JP6614730B2 (en) | Receiving end determination method, related device, and communication system | |
ATE358370T1 (en) | METHOD FOR VOICE/DATA ENCRYPTION ACTIVATION-DEACTIVATION IN A MOBILE COMMUNICATIONS SYSTEM | |
CN104955034A (en) | Communication conversation method | |
CN105025471A (en) | Called terminal, calling terminal, voice communication method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20181018 Address after: 300000 Tianjin city free trade pilot area (Airport Economic Zone) west three road 158 financial center 4 Building 1 unit 602-3 Applicant after: DATANG TERMINAL TECHNOLOGY CO., LTD. Address before: 100191 No. eight, No. eight Huayuan Road, Haidian District, Beijing 816 Applicant before: Sheng Yao wireless communication technology (Beijing) Co., Ltd. |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20150930 |