CN105471876A - Encryption communication method and device - Google Patents

Encryption communication method and device Download PDF

Info

Publication number
CN105471876A
CN105471876A CN201510868181.4A CN201510868181A CN105471876A CN 105471876 A CN105471876 A CN 105471876A CN 201510868181 A CN201510868181 A CN 201510868181A CN 105471876 A CN105471876 A CN 105471876A
Authority
CN
China
Prior art keywords
encryption
secret key
voice
dynamic secret
chip
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510868181.4A
Other languages
Chinese (zh)
Inventor
王兴军
冯发润
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dongguan Jianda Information Technology Co Ltd
Original Assignee
Dongguan Jianda Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dongguan Jianda Information Technology Co Ltd filed Critical Dongguan Jianda Information Technology Co Ltd
Priority to CN201510868181.4A priority Critical patent/CN105471876A/en
Publication of CN105471876A publication Critical patent/CN105471876A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/068Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Abstract

The invention discloses an encryption communication method and device, and belongs to the technical field of communication. The method comprises the steps: carrying out the call of a safety chip to encrypt a communication content in a communication process if an opposite terminal has a function of encryption and decryption; carrying out the call of the main chip after encryption, and enabling the encrypted communication content to be transmitted to the opposite terminal. The method and device employ a safety protection system integrating a data layer, an application layer and a system layer vertically, and can achieve the more complete protection for the user data and privacy. Meanwhile, the method and device can provide an end-to-end security and secrecy function for voice communication of users through employing the technology of chip-level voice encryption.

Description

A kind of method of communication encryption and device
Technical field
The present invention relates to communication technique field, particularly relate to a kind of method and device of communication encryption.
Background technology
Along with the development of mechanics of communication and the universal of various terminal, widely using of smart machine inevitably brings many security threat problems.In order to improve the fail safe of smart machine, domestic and international associated mechanisms has carried out large quantifier elimination.
In prior art, realize the PSST of smart machine End-to-End Security coded communication, usually have several:
1, pure software encrypted application.With " ChatSecure ", " Xabber ", " RedPhone "
" CSipSimple " is representative.Its basic thought is, adopts the Internet connected mode to encrypt note and the call-information of user.But pure software adds secret meeting brings many problems, such as occupying system resources thus affect the performance of mobile phone, causes reducing voice quality, producing many bad experience such as time delay.Meanwhile, be also easily cracked.
2, external encryption device.The problem that external encryption device runs into is, can only solve the problem of voice encryption to a certain extent, for data encryption, prevents the invasion of bogusware from not having protective capacities.
3, built-in encryption chip form.But existing built-in encryption chip form Problems existing does not have global design and planning, function singleness, and popularity rate is not high.
4, for the security protection problem of mobile phone local file, 360 security guards, QQ mobile phone house keeper have proposed application layer solution at present.But the safeguard procedures of application layer, due to insurmountable cell phone managing rights concerns, often can not solve the safety problem caused by machine bottom leak.
Therefore, be necessary to provide a kind of to be easy to realize and the method for the higher communication encryption of the fail safe not easily cracked and device.
Summary of the invention
Main purpose of the present invention is the method and the device that propose a kind of communication encryption, is intended to solve prior art not to realize and the not high problem of fail safe.
For achieving the above object, the method for a kind of communication encryption provided by the invention, described method comprises step:
In communication process, if distant terminal has encryption and decryption ability, call safety chip and Content of communciation is encrypted;
After having encrypted, call master chip and the Content of communciation after encryption is sent to distant terminal.
A kind of as above method is provided, described in call safety chip Content of communciation be encrypted, comprising:
Secure Application Module receives voice PCM signal;
Described Secure Application Module is driven by SDIO and calls described safety chip, and described voice PCM signal is sent to described safety chip;
Described safety chip is encrypted described voice PCM signal, and generates dynamic secret key.
There is provided a kind of as above method, described dynamic secret key is by public key encryption and transmitted by voice channel.
A kind of as above method is provided, described in call master chip the Content of communciation after encryption sent to distant terminal, comprising:
Operating system module receives the voice PCM signal after encryption and described dynamic secret key;
Voice PCM signal after described encryption and described dynamic secret key by short message voice interface interchange master chip, and are sent to described master chip by described operating system module;
The Base Band Unit of described master chip carries out chnnel coding to described voice PCM signal and described dynamic secret key and generates baseband output signal, and described baseband output signal is sent to radio-frequency module, is sent to described distant terminal by described radio-frequency module.
There is provided a kind of method as above, described method also comprises:
Described master chip receives the encrypted speech signal of described distant terminal transmission and dynamic secret key;
Described encrypted speech signal and dynamic secret key encrypted speech signal and dynamic secret key are sent to described safety chip by described master chip;
Described safety chip encrypted speech signal and dynamic secret key according to described dynamic secret key pair are decrypted.
There is provided a kind of method as above, described method also comprises:
Set up communication with described distant terminal to be connected;
Encryption and decryption Capability query is initiated to described distant terminal side;
If determine, described distant terminal has voice encryption/decryption ability, then call the step that safety chip is encrypted Content of communciation described in performing.
In addition, for achieving the above object, the present invention also proposes a kind of device of communication encryption, is applicable to intelligent terminal, and described device comprises:
Secure Application Module, during for having encryption and decryption ability at distant terminal, in communication process, calls safety chip;
Safety chip, for being encrypted Content of communciation or deciphering;
Operating system module, for after encryption completes, calls master chip;
Master chip, for sending to distant terminal by the Content of communciation after described safety chip encryption.
There is provided a kind of device as above, described Secure Application Module, also for receiving voice PCM signal, and call described safety chip by SDIO driving, and described voice PCM signal is sent to described safety chip;
Described safety chip, also for being encrypted described voice PCM signal, and generates dynamic secret key.
There is provided a kind of as above device, described dynamic secret key is by public key encryption and transmitted by voice channel.
A kind of device as above is provided, described operating system module, also for receiving the voice PCM signal after encryption and described dynamic secret key, and by short message voice interface interchange master chip, and the voice PCM signal after described encryption and described dynamic secret key are sent to described master chip;
Described master chip also comprises Base Band Unit, generates baseband output signal, and described baseband output signal is sent to radio-frequency module, be sent to described distant terminal by described radio-frequency module for carrying out chnnel coding to described voice PCM signal and described dynamic secret key.
Thering is provided a kind of as above device, described master chip, also for receiving the encrypted speech signal and dynamic secret key that described distant terminal sends, and described encrypted speech signal and dynamic secret key encrypted speech signal and dynamic secret key being sent to described safety chip;
Described safety chip, is also decrypted for encrypted speech signal according to described dynamic secret key pair and dynamic secret key.
There is provided a kind of device as above, described device also comprises:
Communication module, is connected for setting up communication with described distant terminal, and initiates encryption and decryption Capability query to described distant terminal side;
Described security module, also for when determining that described distant terminal has voice encryption/decryption ability, calls the step that safety chip is encrypted Content of communciation described in execution.
The method of the communication encryption that the present invention proposes and device, adopt the security protection system covering data Layer, application layer and system layer vertically integrated, can protect more comprehensively, thoroughly for user data and privacy provide.Meanwhile, adopt the voice encryption technology of chip-scale, safe and secret ability end to end can be provided for user speech communication.
Accompanying drawing explanation
Fig. 1 is the schematic diagram of the application scenarios of the embodiment of the present invention;
The modular structure schematic diagram of the device of a kind of communication encryption that Fig. 2 provides for the embodiment of the present invention one;
The flow chart of the method for the device of a kind of communication encryption that Fig. 3 provides for the embodiment of the present invention two;
The schematic diagram of the encryption process in the method flow that Fig. 4 provides for the embodiment of the present invention two;
The method that Fig. 5 provides for the embodiment of the present invention two is at mobile terminal cross GSM(the 2nd mobile communication network) with the schematic diagram of the speech communication network scenarios of WCDMA (the 3rd generation mobile communication network);
The schematic diagram of the application of method in mobile phone speech communication that Fig. 6 provides for the embodiment of the present invention two.
The realization of the object of the invention, functional characteristics and advantage will in conjunction with the embodiments, are described further with reference to accompanying drawing.
Embodiment
Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
The mobile terminal realizing each embodiment of the present invention is described referring now to accompanying drawing.In follow-up description, use the suffix of such as " module ", " parts " or " unit " for representing element only in order to be conducive to explanation of the present invention, itself is specific meaning not.Therefore, " module " and " parts " can mixedly use.
Intelligent terminal can be implemented by various forms.Such as, the terminal described in the present invention can comprise such as mobile phone, smart phone, notebook computer, digit broadcasting receiver, PDA (personal digital assistant), PAD(panel computer), the mobile terminal of PMP (portable media player), guider etc. and the fixed terminal of such as digital TV, desktop computer etc.
As shown in Figure 1, application scenarios of the present invention realizes comprising in the simultaneous environment of 2/2.5G, 3G and 4G different networks standard, the safety of intelligent terminal voice call in identical or different identical standard network, realizes the use safety of intelligent terminal at internet, applications environment.
The embodiment of the present invention one provides a kind of device of communication encryption.Refer to Fig. 2, described device comprises:
Secure Application Module 210, during for having encryption and decryption ability at distant terminal, in communication process, calls safety chip;
Safety chip 220, for being encrypted Content of communciation or deciphering;
Operating system module 230, for after encryption completes, calls master chip;
Master chip 240, for sending to distant terminal by the Content of communciation after described safety chip encryption.
In practical application, in Secure Application Module 210, default security application can be installed in advance.Then can installing operating system (OperatingSystem in advance in operating system module 230, OS), and also can various driver be arranged in this operating system module, as short message interface driving, storing driver, secure digital input-output card (SecureDigitalInputandOutputCard, SDIO) drive.
In practical application, safety chip 220 can be made up of the CPU core of the high safety of high-performance, Timer, randomizer, FLASH, SRAM, OTP storage, RSA hardware accelerator, SM2/SM3/SM4/ECC hardware accelerator, AES hardware accelerator, SHA1/SHA256 hardware accelerator, SDIO interface, clock oscillation circuit OSC, PLL and AHBDecoder, owing to which employs multinomial secured physical safeguard procedures, ensure that data security.
In a preferred scheme, described Secure Application Module 210, also for receiving voice PCM signal, and calls described safety chip 220 by SDIO driving, and described voice pulse code modulation (PulseCodeModulation, PCM) signal is sent to described safety chip 220;
Described safety chip 220, also for being encrypted described voice PCM signal, and generates dynamic secret key.
In the present embodiment; the security application of Secure Application Module 210 is when providing safeguard protection to voice, SMS message transmission; call safety chip 220 by SDIO driving and complete note, voice encryption, and, the driving of call operation system storage can realize content-encrypt storage protection.
In practical application, this dynamic secret key can be transmitted by voice channel by public key encryption.
In a preferred scheme, operating system module 230, also for receiving the voice PCM signal after encryption and described dynamic secret key, and by short message voice interface interchange master chip 240, and the voice PCM signal after described encryption and described dynamic secret key are sent to described master chip 240;
Described master chip 240 also comprises Base Band Unit, baseband output signal is generated for carrying out chnnel coding to described voice PCM signal and described dynamic secret key, and described baseband output signal is sent to radio-frequency module, be sent to described distant terminal by described radio-frequency module.
In a preferred scheme, operating system module 230, also for receiving the voice PCM signal after encryption and described dynamic secret key, and by short message voice interface interchange master chip 240, and the voice PCM signal after described encryption and described dynamic secret key are sent to described master chip 240;
Described master chip 240 also comprises Base Band Unit, baseband output signal is generated for carrying out chnnel coding to described voice PCM signal and described dynamic secret key, and described baseband output signal is sent to radio-frequency module, be sent to described distant terminal by described radio-frequency module.
In a preferred scheme, described master chip 240, also for receiving the encrypted speech signal and dynamic secret key that described distant terminal sends, and sends to described safety chip 220 by described encrypted speech signal and dynamic secret key encrypted speech signal and dynamic secret key;
Described safety chip 220, is also decrypted for encrypted speech signal according to described dynamic secret key pair and dynamic secret key.
In a preferred scheme, described device also comprises:
Communication module, is connected for setting up communication with described distant terminal, and initiates encryption and decryption Capability query to described distant terminal side;
Described security module 210, also for when determining that described distant terminal has voice encryption/decryption ability, calls the step that safety chip 220 pairs of Content of communciations are encrypted described in execution.
It should be noted that, Content of communciation formed by the present invention is not limited to voice and note, also can comprise the data contents such as picture, file, video.
The device of the communication encryption of the present embodiment, adopts the security protection system covering data Layer, application layer and system layer vertically integrated, can protect more comprehensively, thoroughly for user data and privacy provide.Meanwhile, adopt the voice encryption technology of chip-scale, safe and secret ability end to end can be provided for user speech communication.
On the basis of above-described embodiment, the embodiment of the present invention two provides a kind of method of communication encryption, refers to Fig. 3, and method flow comprises:
S310, in communication process, if distant terminal has encryption and decryption ability, call safety chip and Content of communciation is encrypted;
S320, encrypted after, call master chip by encryption after Content of communciation send to distant terminal.
In practical application, in Secure Application Module 210, default security application can be installed in advance.Then can installing operating system OS in advance in operating system module 230, and also can various driver be arranged in this operating system module, as short message interface driving, storing driver, SDIO drive.
In a preferred scheme, step S310, calls safety chip and is encrypted Content of communciation, comprising:
Secure Application Module receives voice PCM signal;
Described Secure Application Module is driven by SDIO and calls described safety chip, and described voice PCM signal is sent to described safety chip;
Described safety chip is encrypted described voice PCM signal, and generates dynamic secret key.
In practical application, described dynamic secret key is by public key encryption and transmitted by voice channel.Dynamic key is produced by mobile phone security, through public key encryption, is carried in voice channel, is transmitted by the mode of safety in voice channel, and can dynamic mapping in real time, and outside cannot be intercepted, and only has receiving terminal just can resolve.
In practical application; the security application of Secure Application Module is when providing safeguard protection to voice, SMS message transmission; call safety chip by SDIO driving and complete note, voice encryption, and, the driving of call operation system storage can realize content-encrypt storage protection.
In a preferred scheme, step S320, described in call master chip by encryption after Content of communciation send to distant terminal, comprising:
Operating system module receives the voice PCM signal after encryption and described dynamic secret key;
Voice PCM signal after described encryption and described dynamic secret key by short message voice interface interchange master chip, and are sent to described master chip by described operating system module;
The Base Band Unit of described master chip carries out chnnel coding to described voice PCM signal and described dynamic secret key and generates baseband output signal, and described baseband output signal is sent to radio-frequency module, is sent to described distant terminal by described radio-frequency module.
Concrete, step S310 and step S320 realizes the uplink radio link that theory diagram can consult Fig. 4:
In ciphering process, the analog voice signal that terminal generates is sent to voice encryption/decryption unit (comprising Secure Application Module and safety chip) through the voice PCM digital signal that A/D converter carries out obtaining after digital sample, voice digital signal feeding Base Band Unit (being located on master chip) generating encryption through complicated voice encryption process carries out chnnel coding, baseband output signal is through radio frequency (RadioFrequency, RF) module is sent to wireless network side, by wireless network side, the voice PCM digital signal of encryption is sent to distant terminal.
In a preferred scheme, described method also comprises:
Described master chip receives the encrypted speech signal of described distant terminal transmission and dynamic secret key;
Described encrypted speech signal and dynamic secret key encrypted speech signal and dynamic secret key are sent to described safety chip by described master chip;
Described safety chip encrypted speech signal and dynamic secret key according to described dynamic secret key pair are decrypted.
Concrete, the program realize the down wireless link that theory diagram can consult Fig. 4:
The wireless signal that RF receives exports the voice digital signal of voice channel to voice encryption/decryption unit through rectification, Base-Band Processing, after deciphering and D/A converter convert the analog voice signal of telecommunication to, give loud speaker.
In a preferred scheme, described method also comprises:
Set up communication with described distant terminal to be connected;
Encryption and decryption Capability query is initiated to described distant terminal side;
If determine, described distant terminal has voice encryption/decryption ability, then call the step that safety chip is encrypted Content of communciation described in performing.
It should be noted that, communication can be divided in net and communication between net.Between net, communication is identical or communication between not identical standard network, and referring to Fig. 5, is mobile terminal cross GSM(the 2nd mobile communication network) with the speech communication network scenarios of WCDMA (the 3rd generation mobile communication network):
1, the speech communication between GSM terminal
2, the speech communication between WCDMA terminal
3, the speech communication between GSM and WCDMA terminal
The method of the communication encryption of the present embodiment processes at information source end, can solve the consistency of voice encryption between mobile phone under various traffic scene, various network formats.
Below for mobile phone speech communication, an application scenarios of the method for the communication encryption of the present embodiment is described, refers to Fig. 6, comprised for 3 stages:
1, voice call access procedure
Set up the voice link of calling and called by voice call access procedure between mobile terminal.
2, encryption and decryption negotiations process
Calling party initiates encryption and decryption Capability query to callee, and whether the results verification callee according to response has voice encryption/decryption ability.
3, voice encryption/decryption process
After both sides consult to determine have voice encryption/decryption ability, enter the voice encryption/decryption processing procedure of both sides immediately.
In practical application, in view of the diversity of user's request, the mode that the present embodiment can adopt foundation protection function and user fast to arrange, makes user can complete security protection according to the demand for security of oneself and arranges, thus improve the experience of user largely.
Be different from QQ mobile phone house keeper, 360 security guards can only solve user information security issue from application, also be different from traditional voice encryption mobile phone and be only conceived to this concrete application of voice communication, the method of the present embodiment can gather cloud service system, for user improves from data level, application layer until system-level omnibearing safety precaution, concrete safety function (can customize as required) is as follows:
On the other hand, the method for the present embodiment also tool have the following advantages:
(1) contain the security protection system of data Layer, application layer and system layer vertically integrated, can protect more comprehensively, thoroughly for user data and privacy provide.
(2) adopt the voice encryption technology of chip-scale, safe and secret ability end to end can be provided for user speech communication.Comprise following content:
1) high security characteristic
The method of the communication encryption of the present embodiment is that object carries out close mode based on voice information source, directly does the encryption process on the voice signal, make more to be difficult to detection analysis than other cipher mode.
By special encryption and decryption hardware (safety chip) process, encryption process and data flow are enclosed in special environment and passage, and compare by voice soft encryption mode, listener-in is difficult to steal data.
Voice encryption adopts the key of sophisticated signal enciphering transformation algorithm and real-time continuous change, according to Shanon information theory, can reach the highest security intensity in theory.
2) automated intelligent judgement characteristic
Voice encryption process is by inherent signaling protocol, and consult mobile phone and give orders or instructions and the voice encryption/decryption ability of callee, automated intelligent judgement ability can adapt to the scene of various complicated mobile phone terminal.
3) network penetration capacity characteristic
Through the research to various known voice encryption technology, have only and in this project, voice call can be met in the encryption of voice (information source) signal aspect pass through smoothly between 2/2.5G, 3G and 4G network, and do not need to change in wireless network side.
4) characteristic of the low loss of signal
It is different that the voice encryption mode comparing other needs under the prerequisite of low speed (code check) voice, carry out process, this project completely based on the encryption of high speed voice, can meet the standard-required of the voice call quality (MOS value) of various network formats with the loss of the minimizing voice signal of minimum level.
5) characteristic of original signal bandwidth maintenance
Different with reference to the bandwidth significantly expanding primary signal in more international Voice Encryption algorithm, the voice encryption Processing Algorithm in this project is substantially close to the bandwidth not changing primary signal.
6) security feature expanded
data encryption anti-copy
To the data of preserving in mobile phone as: the contents such as address list, file, picture, video are encrypted protection, prevent copy from stealing
aPP signature authorises
Signature authorises is carried out for the APP by certification, only has and can download through the APP of signature authorises, install and run.The APP of unsigned mandate, can not carry out installing and running, prevent hacker attacks.
machine card matches
Pairing and binding is carried out to Mobile phone card and encryption chip, accomplishes that mobile phone is special, used by other people after preventing mobile phone from losing.
(3) android system can be realized customize towards the degree of depth of security attribute, thus realize the protection of user profile and data from hardware driving layer and Framework, and APP control of authority can be realized based on this, stop illegally calling of malice APP software
(4) with the security service combine with technique based on cloud platform, loss of data can be provided to protect the function such as (such as teledata deletion), the backup of real-time cloud end data, data sharing for user.
(5) based on the secrecy provision of safety classification strategy, application layer or chip-scale/system-level encryption technology can be provided respectively to dissimilar file.
The method of the communication encryption of the present embodiment, adopts the security protection system covering data Layer, application layer and system layer vertically integrated, can protect more comprehensively, thoroughly for user data and privacy provide.Meanwhile, adopt the voice encryption technology of chip-scale, safe and secret ability end to end can be provided for user speech communication.
It should be noted that, the all or part of step realizing said method embodiment can have been come by the hardware that program command is relevant, aforesaid program can be stored in a computer read/write memory medium, and this program, when performing, performs the step comprising said method embodiment; And aforesaid storage medium comprises: ROM, RAM, magnetic disc or CD etc. various can be program code stored medium.
These are only the preferred embodiments of the present invention; not thereby the scope of the claims of the present invention is limited; every utilize specification of the present invention and accompanying drawing content to do equivalent structure or equivalent flow process conversion; or be directly or indirectly used in other relevant technical fields, be all in like manner included in scope of patent protection of the present invention.

Claims (12)

1. a method for communication encryption, is characterized in that, described method comprises step:
In communication process, if distant terminal has encryption and decryption ability, call safety chip and Content of communciation is encrypted;
After having encrypted, call master chip and the Content of communciation after encryption is sent to distant terminal.
2. method according to claim 1, is characterized in that, described in call safety chip Content of communciation be encrypted, comprising:
Secure Application Module receives voice PCM signal;
Described Secure Application Module is driven by SDIO and calls described safety chip, and described voice PCM signal is sent to described safety chip;
Described safety chip is encrypted described voice PCM signal, and generates dynamic secret key.
3. method according to claim 2, is characterized in that, described dynamic secret key is by public key encryption and transmitted by voice channel.
4. method according to claim 2, is characterized in that, described in call master chip by encryption after Content of communciation send to distant terminal, comprising:
Operating system module receives the voice PCM signal after encryption and described dynamic secret key;
Voice PCM signal after described encryption and described dynamic secret key by short message voice interface interchange master chip, and are sent to described master chip by described operating system module;
The Base Band Unit of described master chip carries out chnnel coding to described voice PCM signal and described dynamic secret key and generates baseband output signal, and described baseband output signal is sent to radio-frequency module, is sent to described distant terminal by described radio-frequency module.
5. the method according to any one of Claims 1-4, is characterized in that, described method also comprises:
Described master chip receives the encrypted speech signal of described distant terminal transmission and dynamic secret key;
Described encrypted speech signal and dynamic secret key encrypted speech signal and dynamic secret key are sent to described safety chip by described master chip;
Described safety chip encrypted speech signal and dynamic secret key according to described dynamic secret key pair are decrypted.
6. method according to claim 5, is characterized in that, described method also comprises:
Set up communication with described distant terminal to be connected;
Encryption and decryption Capability query is initiated to described distant terminal side;
If determine, described distant terminal has voice encryption/decryption ability, then call the step that safety chip is encrypted Content of communciation described in performing.
7. a device for communication encryption, is applicable to intelligent terminal, it is characterized in that, described device comprises:
Secure Application Module, during for having encryption and decryption ability at distant terminal, in communication process, calls safety chip;
Safety chip, for being encrypted Content of communciation or deciphering;
Operating system module, for after encryption completes, calls master chip;
Master chip, for sending to distant terminal by the Content of communciation after described safety chip encryption.
8. device according to claim 7, is characterized in that,
Described Secure Application Module, also for receiving voice PCM signal, and calls described safety chip by SDIO driving, and described voice PCM signal is sent to described safety chip;
Described safety chip, also for being encrypted described voice PCM signal, and generates dynamic secret key.
9. device according to claim 8, is characterized in that, described dynamic secret key is by public key encryption and transmitted by voice channel.
10. device according to claim 8, is characterized in that,
Described operating system module, also for receiving the voice PCM signal after encryption and described dynamic secret key, and by short message voice interface interchange master chip, and sends to described master chip by the voice PCM signal after described encryption and described dynamic secret key;
Described master chip also comprises Base Band Unit, generates baseband output signal, and described baseband output signal is sent to radio-frequency module, be sent to described distant terminal by described radio-frequency module for carrying out chnnel coding to described voice PCM signal and described dynamic secret key.
11. devices according to any one of claim 7 to 10, is characterized in that,
Described master chip, also for receiving the encrypted speech signal and dynamic secret key that described distant terminal sends, and sends to described safety chip by described encrypted speech signal and dynamic secret key encrypted speech signal and dynamic secret key;
Described safety chip, is also decrypted for encrypted speech signal according to described dynamic secret key pair and dynamic secret key.
12. devices according to claim 11, is characterized in that, described device also comprises:
Communication module, is connected for setting up communication with described distant terminal, and initiates encryption and decryption Capability query to described distant terminal side;
Described security module, also for when determining that described distant terminal has voice encryption/decryption ability, calls the step that safety chip is encrypted Content of communciation described in execution.
CN201510868181.4A 2015-12-02 2015-12-02 Encryption communication method and device Pending CN105471876A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510868181.4A CN105471876A (en) 2015-12-02 2015-12-02 Encryption communication method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510868181.4A CN105471876A (en) 2015-12-02 2015-12-02 Encryption communication method and device

Publications (1)

Publication Number Publication Date
CN105471876A true CN105471876A (en) 2016-04-06

Family

ID=55609146

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510868181.4A Pending CN105471876A (en) 2015-12-02 2015-12-02 Encryption communication method and device

Country Status (1)

Country Link
CN (1) CN105471876A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106326966A (en) * 2016-08-09 2017-01-11 武汉天喻信息产业股份有限公司 Safety certification method based on multiple chip cards
CN106487659A (en) * 2016-10-20 2017-03-08 宇龙计算机通信科技(深圳)有限公司 Information ciphering method and device, information decryption method and device and terminal
CN106604273A (en) * 2016-12-23 2017-04-26 成都三零嘉微电子有限公司 Mobile phone voice encrypted communication method based on secure voice SOC chip
CN107392034A (en) * 2017-06-05 2017-11-24 努比亚技术有限公司 A kind of sensitive information guard method, terminal and computer-readable recording medium
CN112737784A (en) * 2020-12-09 2021-04-30 中国电子科技集团公司第三十研究所 Method for realizing user data safe migration based on voice channel

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN200990610Y (en) * 2006-10-27 2007-12-12 上海复旦微电子股份有限公司 Communication ciphered cell phone
CN101384042A (en) * 2008-10-15 2009-03-11 东南大学 Mobile phone ciphering method based on safe digital interface ciphering card
CN101873372A (en) * 2009-04-27 2010-10-27 骆建军 Mobile phone system structure with encrypted communication function
US8661239B2 (en) * 2009-11-05 2014-02-25 Zte Corporation Encryption device and method for controlling download and access operations performed to a mobile terminal
CN104284328A (en) * 2013-07-09 2015-01-14 北京鼎普科技股份有限公司 Method and device for encrypting mobile phone communication content

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN200990610Y (en) * 2006-10-27 2007-12-12 上海复旦微电子股份有限公司 Communication ciphered cell phone
CN101384042A (en) * 2008-10-15 2009-03-11 东南大学 Mobile phone ciphering method based on safe digital interface ciphering card
CN101873372A (en) * 2009-04-27 2010-10-27 骆建军 Mobile phone system structure with encrypted communication function
US8661239B2 (en) * 2009-11-05 2014-02-25 Zte Corporation Encryption device and method for controlling download and access operations performed to a mobile terminal
CN104284328A (en) * 2013-07-09 2015-01-14 北京鼎普科技股份有限公司 Method and device for encrypting mobile phone communication content

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106326966A (en) * 2016-08-09 2017-01-11 武汉天喻信息产业股份有限公司 Safety certification method based on multiple chip cards
CN106487659A (en) * 2016-10-20 2017-03-08 宇龙计算机通信科技(深圳)有限公司 Information ciphering method and device, information decryption method and device and terminal
CN106487659B (en) * 2016-10-20 2022-12-20 宇龙计算机通信科技(深圳)有限公司 Information encryption method, information encryption device and terminal
CN106604273A (en) * 2016-12-23 2017-04-26 成都三零嘉微电子有限公司 Mobile phone voice encrypted communication method based on secure voice SOC chip
CN107392034A (en) * 2017-06-05 2017-11-24 努比亚技术有限公司 A kind of sensitive information guard method, terminal and computer-readable recording medium
CN112737784A (en) * 2020-12-09 2021-04-30 中国电子科技集团公司第三十研究所 Method for realizing user data safe migration based on voice channel

Similar Documents

Publication Publication Date Title
WO2015180691A1 (en) Key agreement method and device for verification information
US11432150B2 (en) Method and apparatus for authenticating network access of terminal
CN105471876A (en) Encryption communication method and device
CN106529308B (en) data encryption method and device and mobile terminal
EP3337088B1 (en) Data encryption method, decryption method, apparatus, and system
CN103427983A (en) Apparatus and method for content encryption and decryption based on storage device ID
CN104602364A (en) Method for connecting wireless device to wireless access point and wireless device, intelligent terminal
JP2020508619A (en) Data backup method and data backup device, storage medium, and server
WO2015180689A1 (en) Method and apparatus for acquiring verification information
CN103559453A (en) Hardware encryption protection method and system for cellphone data
CN102821439A (en) Access method and access device of wireless network
US20150071442A1 (en) Data-encrypting method and decrypting method for a mobile phone
CN105848145A (en) WIFI intelligent configuration method and device
CN106375990A (en) Encryption and decryption system and encryption and decryption method for private data of mobile phone
WO2021103772A1 (en) Data transmission method and apparatus
CN112866981B (en) Method and device for managing subscription data
CN114553590A (en) Data transmission method and related equipment
CN104092680A (en) Coding and decoding method, device and system for audio signal
US11829476B2 (en) Computing device and model parameters security protection method
CN105306200A (en) Method and device for encrypting network account password
CN106211144B (en) Communication method of mobile terminal and mobile terminal
CN104732166A (en) Data storing and reading method and device and equipment
CN106537962B (en) Wireless network configuration, access and access method, device and equipment
CN105472764A (en) Method of being accessed to LTE (Long Term Evolution) network and electronic device
CN111386513B (en) Data processing method, device and system chip

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160406

RJ01 Rejection of invention patent application after publication