CN106357940B - The method and apparatus of secret telephony - Google Patents
The method and apparatus of secret telephony Download PDFInfo
- Publication number
- CN106357940B CN106357940B CN201610857023.3A CN201610857023A CN106357940B CN 106357940 B CN106357940 B CN 106357940B CN 201610857023 A CN201610857023 A CN 201610857023A CN 106357940 B CN106357940 B CN 106357940B
- Authority
- CN
- China
- Prior art keywords
- terminal
- account
- secret telephony
- secret
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/4228—Systems providing special services or facilities to subscribers in networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/38—Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
- H04M3/382—Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections using authorisation codes or passwords
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
Present invention discloses a kind of method and apparatus of secret telephony, and wherein method includes: the registration information that server receives first terminal and second terminal, establish specified secret telephony account respectively;Wherein, the secret telephony account includes account name, and logon information corresponding with the account name;It receives first terminal and dials information by what the secret telephony account was sent, be then forwarded to second terminal;Wherein, first terminal and second terminal register with the secret telephony account;The logon information for receiving the login secret telephony account of second terminal feedback, judges whether the logon information is identical as the logon information of secret telephony account of second terminal, if they are the same, then first terminal is carried out call with second terminal and connected.The method and apparatus of secret telephony of the invention need to input the logon information for logging in secret telephony account, are then verified by server, be only proved to be successful, can just received calls, improve the confidentiality of call.
Description
Technical field
The present invention relates to safety call field, the method and apparatus for especially relating to a kind of secret telephony.
Background technique
When carrying out voice communication by mobile phone or other terminals, often it is related to private content, does not allow other people
Know, especially the crowds such as governmental personnel, business people, dialog context may include government secret, business secret etc..So protecting
Not eavesdropped by other people for card dialog context, is problem to be solved.
Summary of the invention
The main object of the present invention is to provide a kind of method and apparatus for improving safe secret telephony of conversing between terminal.
In order to achieve the above-mentioned object of the invention, a kind of method that the present invention proposes secret telephony, comprising:
Server receives the registration information of first terminal and second terminal, establishes specified secret telephony account respectively;Its
In, the secret telephony account includes account name, and logon information corresponding with the account name;
It receives first terminal and dials information by what the secret telephony account was sent, be then forwarded to second terminal;
Whether the logon information for receiving the login secret telephony account of second terminal feedback judges the logon information with the
The logon information of the secret telephony account of two terminals is identical, if they are the same, then first terminal is carried out call with second terminal and connected.
Further, the server receives the registration information of first terminal and second terminal, establishes specified guarantor respectively
The step of close call account, comprising:
Contacts list on the server traversal first terminal, searches and equally establishes the guarantor in the contacts list
The contact person of close call account, establishes list of buddies by the first terminal;And in the server traversal second terminal
Contacts list, search the contact person for equally establishing the secret telephony account in the contacts list, pass through described second
Terminal establishes list of buddies.
Further, the reception first terminal dials information by what the secret telephony account was sent, then forwards
The step of to second terminal, comprising:
Receive the first terminal dials signal;
According to the secret telephony account for dialing signal and searching corresponding second terminal, if not finding second
The secret telephony account of terminal then sends skip command to first terminal, exhales first terminal by the base station of mobile operator
It is the second terminal.
Further, the logon information of the login secret telephony account for receiving second terminal feedback, is stepped on described in judgement
Whether land information is identical as the logon information of secret telephony account of second terminal, if they are the same, then eventually by first terminal and second
End carried out after the step of call connection, comprising:
Disabling order is sent to the first terminal and second terminal, closes the first terminal and second terminal specified
Application and/or hardware.
Further, the specified application includes recording application and/or hands free applications;The specified hardware includes indigo plant
Tooth and/or earphone.
Further, the logon information is the terminal using lock cipher.
Further, the logon information of the login secret telephony account for receiving second terminal feedback, is stepped on described in judgement
Whether land information is identical as the logon information of secret telephony account of second terminal, if they are the same, then eventually by first terminal and second
End carried out after the step of call connection, comprising:
According to preset encryption rule, the voice messaging sent to the first terminal and second terminal adds server through row
It is close.
Further, the logon information of the login secret telephony account for receiving second terminal feedback, is stepped on described in judgement
Whether land information is identical as the logon information of secret telephony account of second terminal, if they are the same, then eventually by first terminal and second
End carried out after the step of call connection, comprising:
Whether the voice messaging between detection first terminal and second terminal is intercepted, if so, sending to interception end dry
Disturb sound.
Further, the logon information of the login secret telephony account for receiving second terminal feedback, is stepped on described in judgement
Whether land information is identical as the logon information of secret telephony account of second terminal, if they are the same, then eventually by first terminal and second
End carried out after the step of call connection, comprising:
After end of conversation, blanking order is sent to the first terminal and second terminal, it is hidden to control the first terminal
Hide calling record, control the second terminal hide answer record.
Further, described after end of conversation, blanking order is sent to the first terminal and second terminal, controls institute
It states first terminal and hides calling record, control after the second terminal hides the step of answering record, comprising:
The the first display request for receiving first terminal sends the first display command, control according to the first display request
The first terminal shows hiding calling record;The the second display request for receiving second terminal, is asked according to second display
It asks and sends the second display command, control the second terminal and show that hides answers record.
The present invention also provides a kind of devices of secret telephony, comprising:
Registering unit receives the registration information of first terminal and second terminal for server, establishes specified guarantor respectively
Close call account;Wherein, the secret telephony account includes account name, and logon information corresponding with the account name;
Retransmission unit is received, dials information by what the secret telephony account was sent for receiving first terminal, then
It is transmitted to second terminal;
Judge connection unit, the logon information of the login secret telephony account for receiving second terminal feedback judges institute
Whether identical as the logon information of secret telephony account of second terminal logon information is stated, if they are the same, then by first terminal and
Two terminals carry out call connection.
Further, the registering unit, comprising:
List block is established, for the contacts list on server traversal first terminal, searches contact person column
The contact person that the secret telephony account is equally established in table establishes list of buddies by the first terminal;And the clothes
The contacts list being engaged in device traversal second terminal, searches the connection that the secret telephony account is equally established in the contacts list
It is people, list of buddies is established by the second terminal.
Further, the reception retransmission unit, comprising:
Receiving module dials signal for receive the first terminal;
Jump module is searched, the secret telephony account for searching corresponding second terminal according to signal is dialed
Family sends skip command to first terminal, passes through first terminal if not finding the secret telephony account of second terminal
Second terminal described in the base station call of mobile operator.
Further, the device of the secret telephony further include:
Forbidden cell is sent, for sending disabling order to the first terminal and second terminal, makes the first terminal
Specified application and/or hardware are closed with second terminal.
Further, the specified application includes recording application and/or hands free applications;The specified hardware includes indigo plant
Tooth and/or earphone.
Further, the logon information is the terminal using lock cipher.
Further, the device of the secret telephony further include:
Encryption unit is sent for server according to preset encryption rule to the first terminal and second terminal
Voice messaging is encrypted through row.
Further, the device of the secret telephony further include:
Recording interference unit, for detecting whether the voice messaging between first terminal and second terminal is intercepted, if so,
Then interference sound is sent to interception end.
Further, the device of the secret telephony further include:
Blanker unit is sent, for after end of conversation, sending blanking order to the first terminal and second terminal, control
Make the first terminal hide calling record, control the second terminal hide answer record.
Further, the device of the secret telephony further include:
Display unit is sent, for receiving the first display request of first terminal, is sent according to the first display request
First display command controls the first terminal and shows hiding calling record;Receive the second display request of second terminal, root
The second display command is sent according to the second display request, the second terminal is controlled and shows that hides answers record.
The method and apparatus of secret telephony of the invention, the call between terminal need to log in secret telephony account, voice
Information is transferred by corresponding server, and when the terminal to receive calls receives calls, and input is needed to log in secrecy
The logon information for account of conversing, is then verified by server, is only proved to be successful, can just be received calls.The present invention is kept away
The base station for opening conventional such as connection, movement operator, is conversed by specified server, can effectively improve call
Confidentiality, and before call, whether the logon information for needing to verify second terminal feedback correct, if correctly, illustrating the
The those who answer of two terminals is the holder of secret telephony account, prevents other people from the owner of second terminal being pretended to be to receive calls, into one
Improve the confidentiality of call in step ground.
Detailed description of the invention
Fig. 1 is the flow diagram of the method for the secret telephony of one embodiment of the invention;
Fig. 2 is that the flow diagram of information is dialed in the server forwarding of one embodiment of the invention;
Fig. 3 is the structural schematic block diagram of the device of the secret telephony of one embodiment of the invention;
Fig. 4 is the structural schematic diagram of the registering unit of one embodiment of the invention;
Fig. 5 is the topology view of the reception retransmission unit of one embodiment of the invention;
Fig. 6 is the structural schematic block diagram of the device of the secret telephony of one embodiment of the invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singular " one " used herein, " one
It is a ", " described " and "the" may also comprise plural form.It is to be further understood that being arranged used in specification of the invention
Diction " comprising " refer to that there are the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition
Other one or more features, integer, step, operation, element, component and/or their group.Wording used herein " and/
Or " it include one or more associated wholes for listing item or any cell and all combinations.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art
Language and scientific term), there is meaning identical with the general understanding of those of ordinary skill in fields of the present invention.Should also
Understand, those terms such as defined in the general dictionary, it should be understood that have in the context of the prior art
The consistent meaning of meaning, and unless idealization or meaning too formal otherwise will not be used by specific definitions as here
To explain.
Those skilled in the art of the present technique are appreciated that terminal here refers to the electronics such as smart phone, computer, tablet computer
Equipment.
Referring to Fig.1, the embodiment of the present invention provides a kind of method of secret telephony, comprising steps of
S1, server receive the registration information of first terminal and second terminal, establish specified secret telephony account respectively;
Wherein, the secret telephony account includes account name, and logon information corresponding with the account name;
S2, reception first terminal dial information by what the secret telephony account was sent, are then forwarded to second terminal;
Whether S3, the logon information for logging in secret telephony account for receiving second terminal feedback, judge the logon information
It is identical as the logon information of secret telephony account of second terminal, if they are the same, then first terminal and second terminal are conversed
Connection.
The application that will be installed secret telephony as described in above-mentioned steps S1, in terminal is logged in using needing to log in when in use
Then need to establish corresponding secret telephony account.Establishing secret telephony account generally uses telephone number, qq number etc. to establish, so
Afterwards, the forms such as identifying code are sent to terminal by server and gives terminal logon rights.In the present embodiment, secrecy has only been registered
After account of conversing, it just can connect the server and carry out secret telephony.In the present embodiment, when first time logon account,
It needs the identifying code for carrying out SMS offer to be logged in, when subsequent login, only needs application lock cipher on input terminal i.e.
Can, input mode includes a variety of, for example inputs designated pin, figure and finger print identifying and iris authentication etc..It is above-mentioned to log in letter
The modification logging of breath generally setting.In this implementation, logon information is that terminal applies lock cipher, when needing to dial code phone
When, first terminal first is by corresponding application lock code entry secret telephony account, and second terminal, when answering, equally
It needs to input application lock code entry account, will be used as using lock cipher and log in secret telephony account, it is convenient, fast.
As described in above-mentioned steps S2, above-mentioned server is also referred to as servomechanism, is to provide the equipment of the service of calculating.Due to server
It needs to respond service request, and is handled, therefore in general server should have the service of undertaking and ensure the energy of service
Power.Wherein, server includes Cloud Server, Cloud Server be one kind be simple and efficient, securely and reliably, processing capacity can elastic telescopic
Calculating service cloud service.The connection of first terminal and second terminal and server can be thus kept away by network connection
The base station for opening the operators such as movement, connection is conversed, other people not only can be effectively prevented by the approach of base station and steals first
Dialog context between terminal and second terminal can also save the cost of the phone call of the operators such as movement, connection.
As described in above-mentioned steps S3, when second terminal receives calls, need to input log in secret telephony account log in letter
Breath, is then verified by server, is only proved to be successful, can just be received calls.I.e. before call, need to verify second
Whether the logon information of terminal feedback is correct, if correctly, illustrating that the those who answer of second terminal is holding for secret telephony account
Person prevents other people from the owner of second terminal being pretended to be to receive calls, and further improves the confidentiality of call.
In the present embodiment, above-mentioned server receives the registration information of first terminal and second terminal, and foundation is specified respectively
The step S1 of secret telephony account, comprising:
Contacts list on S11, server traversal first terminal, searches and equally establishes institute in the contacts list
The contact person for stating secret telephony account establishes list of buddies by the first terminal;And the server traversal second is eventually
Contacts list on end searches the contact person that the secret telephony account is equally established in the contacts list, by described
Second terminal establishes list of buddies.
As described in above-mentioned steps S11, above-mentioned contacts list refers generally to the phone directory contact in terminal, because of registration account
Family is to need to carry out mobile phone short breath verifying etc., so account is consistent with the telephone number of terminal or the mobile phone of account and terminal
Number-associated.Whole telephone numbers in contacts list or the phone number with account relating are traversed, is then compared one by one, such as
It is registered account that fruit, which compares to some number, then the number is added in the list of buddies of terminal, list of buddies is
Can mutually secret telephony list.When needing to carry out secret telephony, searching called end number directly in close friend Li Biao is
Can, when no network, then normally conversed automatically by operator base station.
Referring to Fig. 2, in the present embodiment, above-mentioned reception first terminal dials letter by what the secret telephony account was sent
Breath, is then forwarded to the step S2 of second terminal, comprising:
S21, receive the first terminal dial signal;
S22, basis dial the secret telephony account that signal searches corresponding second terminal, if do not found
The secret telephony account of second terminal then sends skip command to first terminal, makes base of the first terminal by mobile operator
It stands and calls the second terminal.
As described in above-mentioned steps S21 and S22, server gets the signal of dialing of first terminal first, and then basis is dialled
Give a signal and search the account of second terminal, that is to say, that only second terminal equally register secret telephony account, first terminal with
Second terminal can just be attached call by server, otherwise can not carry out secret telephony.On second terminal is unregistered
When stating secret telephony account, after server informs first terminal, first terminal is connected by the base station of the operators such as movement, connection
Second terminal is conversed, at this point, can not generally carry out speech scrambling.When the above-mentioned account of second terminal registration, but first is whole
There is a side that can not connect network in end or second terminal, then can not equally carry out secret telephony, first terminal and second terminal are logical
Cross move, the base station of the operators such as connection connection second terminal is conversed.
In the present embodiment, the logon information of the login secret telephony account of above-mentioned reception second terminal feedback, described in judgement
Whether logon information is identical as the logon information of secret telephony account of second terminal, if they are the same, then by first terminal and second
Terminal carries out after the step S3 of call connection, comprising:
S31, disabling order is sent to the first terminal and second terminal, close the first terminal and second terminal
Specified application and/or hardware.Wherein, above-mentioned specified application includes recording application and/or hands free applications;It is above-mentioned specified hard
Part includes bluetooth and/or earphone.
As described in above-mentioned steps S31, the recording on first terminal and second terminal is answered before the call or in communication process
It is closed with the application such as, hands free applications, and the hardware devices such as disabling bluetooth, earphone, user switch sound channel without trigger action
Button, sound are defaulted on earpiece, forbid application switching sound channel to prevent call voice from being recorded, being eavesdropped, further
Improve the safety of call.In the present embodiment, in order to further increase the safety of user itself, when can also be by double-talk
Sound carry out processing of changing voice, such as the transformation of male voice, female voice, the transformation etc. of tone color, process of changing voice can be carried out by server
Transformation, can also be converted at the terminal.
In the present embodiment, above-mentioned logon information is the terminal using lock cipher.After endpoint to register complete account, first
It is secondary to log in or when replacement terminal is logged in, it needs to carry out just log in after SMS verified, when logging in one
After secondary, then the application lock cipher that can call directly terminal setting carries out login account, convenient and safe.In a specific embodiment
In, when needing to dial code phone, first by application lock code entry account, then, to be dialled by list of buddies lookup
The number beaten carries out secret telephony, and second terminal also needs input application lock code entry account when answering.At it
In its embodiment, when second terminal is connected to call information, the process of input application lock can be skipped over and log in corresponding account, mentioned
The convenience that high second terminal is answered.
In the present embodiment, the logon information of the login secret telephony account of above-mentioned reception second terminal feedback, described in judgement
Whether logon information is identical as the logon information of secret telephony account of second terminal, if they are the same, then by first terminal and second
Terminal carries out after the step S3 of call connection, comprising:
According to preset encryption rule, the voice messaging sent to the first terminal and second terminal is passed through for S32, server
Row encryption.
As described in above-mentioned steps S32, the voice messaging that above-mentioned server receives is encrypted, i.e., server is whole by first
The voice messaging that sends out is held to be encrypted, and corresponding decryption program is arranged in second terminal, similarly, server is by second terminal
The voice messaging sent out is encrypted, and corresponding decryption program is arranged in first terminal.In the ciphering process of server, not
Be unalterable, and can be encrypted according to preset encryption policy, when making to communicate with each other every time between terminal, encryption rule and
Its corresponding decryption rule is all different, and increases the confidentiality of call.For example, server time according to locating for first terminal,
Place, environment etc. generate encryption rule, which is sent to second terminal by server, and second terminal is advised according to encryption
Then call or generate corresponding decryption rule etc..
In the present embodiment, the logon information of the login secret telephony account of above-mentioned reception second terminal feedback, described in judgement
Whether logon information is identical as the logon information of secret telephony account of second terminal, if they are the same, then by first terminal and second
Terminal carries out after the step S3 of call connection, comprising:
Whether the voice messaging between S33, detection first terminal and second terminal is intercepted, if so, sending out to interception end
Send interference sound.
As described in above-mentioned steps S33, before call or when conversing, first terminal and/or second terminal open recording
Using, then preset interference sound can be transmitted to recording application by server, alternatively, will directly be preset in first terminal or
Interference sound in second terminal is sent to recording application, that is, is supplied to recording application vacation recording.For example, first terminal and second
When conversing between terminal, second terminal opens recording application, then second terminal by preset false recording as Tang poetry 300 is first,
Song, white noise etc. are conveyed to sound pick-up outfit, and actual call audio is terminated to recording application, it is of course also possible to by white
Together with noise is dubbed with call audio.Above-mentioned interception end is the one end for stealing encryption voice, when having detected interception movement
When, server can save true call-information, then send interference sound to interception end, after interception, which acts, to be stopped, then
The voice messaging of storage is sent to corresponding terminal again.
In the present embodiment, the logon information of the login secret telephony account of above-mentioned reception second terminal feedback, described in judgement
Whether logon information is identical as the logon information of secret telephony account of second terminal, if they are the same, then by first terminal and second
Terminal carries out after the step S3 of call connection, comprising:
S34, after end of conversation, send blanking order to the first terminal and second terminal, control described first eventually
Hold hide calling record, control the second terminal hide answer record.
After step S34 further include:
S35, the first display request for receiving first terminal send the first display command according to the first display request,
It controls the first terminal and shows hiding calling record;The second display request of second terminal is received, it is aobvious according to described second
Show that request sends the second display command, controls the second terminal and show that hides answers record.
As described in above-mentioned steps S34 and S35, when message registration also needs secrecy, can by calling record and
It answers record to stash, when needing to check, specified password can be inputted and show hiding message registration.In other implementations
In example, while hiding talking records, relevant distracter can be shown, for example show the second whole title on first terminal
For the name of ancient times poet, it will be shown as air time etc. positive and negative infinite etc..
In one embodiment, the process of secret telephony are as follows:
The secret telephony account of code phone can be dialed, be answered to registration on first terminal and second terminal;
Phone directory lists in server traversal registration secret telephony account terminal, search each phone number in phone directory lists
Whether code is similarly the above-mentioned account number of registration, if so, being then added to the list of buddies in terminal;
First terminal starts secret telephony program using lock cipher when needing to dial secret telephony, through input, sends
Information is dialed to server;
Server is according to dialing the corresponding second terminal of information searching;
Server receives the logon information of the login secret telephony account of second terminal feedback, judges that the logon information is
It is no identical as the logon information of secret telephony account of second terminal, if they are the same, then first terminal and second terminal are led to
Words connection;
In communication process, first terminal and second terminal can encrypt the voice messaging number of output, corresponding,
It is decrypted when receiving voice signal, and encryption rule can generate at random according to time, place, environment etc., decryption rule is right
It should generate;When either end is without network signal, the two can be conversed by operator base station;Moreover, server can also be by
One terminal and second terminal can carry out second to the voice messaging number of output and encrypt, and further improve the confidentiality of call.
While first terminal is connected to second terminal, recording application on first terminal and second terminal hands-free is answered
It is disabled with, bluetooth etc., alternatively, will be preset when there is recording application starting by the terminal where server or recording application
Interference sound be conveyed to sound pick-up outfit, while call voice is isolated from recording application;
After having dialed phone, it can choose and hide message registration, it, can be by input eventually when needing to check information
The application lock cipher at end is checked through row.
The method of the secret telephony of the embodiment of the present invention, the call between terminal need to log in secret telephony account, voice
Information is transferred by corresponding server, and when the terminal to receive calls receives calls, and input is needed to log in secrecy
The logon information for account of conversing, is then verified by server, is only proved to be successful, can just be received calls.The present invention is kept away
The base station for opening conventional such as connection, movement operator, is conversed by specified server, can effectively improve call
Confidentiality, and before call, whether the logon information for needing to verify second terminal feedback correct, if correctly, illustrating the
The those who answer of two terminals is the holder of secret telephony account, prevents other people from the owner of second terminal being pretended to be to receive calls, into one
Improve the confidentiality of call in step ground.
Referring to Fig. 3, the embodiment of the present invention also provides a kind of device of secret telephony, comprising:
Registering unit 10 receives the registration information of first terminal and second terminal for server, and foundation is specified respectively
Secret telephony account;Wherein, the secret telephony account includes account name, and logon information corresponding with the account name;
Retransmission unit 20 is received, dials information by what the secret telephony account was sent for receiving first terminal, so
After be transmitted to second terminal;
Judge connection unit 30, the logon information of the login secret telephony account for receiving second terminal feedback, judgement
Whether the logon information identical as the logon information of secret telephony account of second terminal, if they are the same, then by first terminal and
Second terminal carries out call connection.
Such as above-mentioned registering unit 10, the application of secret telephony will be installed in terminal, using needing to log in when in use, log in
Then need to establish corresponding secret telephony account.Establishing secret telephony account generally uses telephone number, qq number etc. to establish, so
Afterwards, the forms such as identifying code are sent to terminal by server and gives terminal logon rights.In the present embodiment, secrecy has only been registered
After account of conversing, it just can connect the server and carry out secret telephony.In the present embodiment, when first time logon account,
It needs the identifying code for carrying out SMS offer to be logged in, when subsequent login, only needs application lock cipher on input terminal i.e.
Can, input mode includes a variety of, for example inputs designated pin, figure and finger print identifying and iris authentication etc..It is above-mentioned to log in letter
The modification logging of breath generally setting.In this implementation, logon information is that terminal applies lock cipher, when needing to dial code phone
When, first terminal first is by corresponding application lock code entry secret telephony account, and second terminal, when answering, equally
It needs to input application lock code entry account, will be used as using lock cipher and log in secret telephony account, it is convenient, fast.
Such as above-mentioned reception retransmission unit 20, above-mentioned server is also referred to as servomechanism, is to provide the equipment of the service of calculating.Due to clothes
Business device needs to respond service request, and is handled, therefore in general server should have the service of undertaking and ensure service
Ability.Wherein, server includes Cloud Server, Cloud Server be one kind be simple and efficient, securely and reliably, processing capacity can elasticity
Flexible calculating services cloud service.The connection of first terminal and second terminal and server thus may be used by network connection
It is conversed with avoiding the base station of the operators such as movement, connection, other people not only can be effectively prevented and is stolen by the approach of base station
Dialog context between first terminal and second terminal can also save the cost of the phone call of the operators such as movement, connection.
Such as above-mentioned judgement connection unit 30, when second terminal receives calls, input is needed to log in stepping on for secret telephony account
Land information, is then verified by server, is only proved to be successful, and can just be received calls.I.e. before call, need to verify
Whether the logon information of second terminal feedback is correct, if correctly, illustrating that the those who answer of second terminal is secret telephony account
Holder prevents other people from the owner of second terminal being pretended to be to receive calls, and further improves the confidentiality of call.
Referring to Fig. 4, in the present embodiment, above-mentioned registering unit 10, comprising:
List block 11 is established, for the contacts list on server traversal first terminal, searches the contact person
The contact person that the secret telephony account is equally established in list establishes list of buddies by the first terminal;And it is described
Server traverses the contacts list in second terminal, searches and equally establishes the secret telephony account in the contacts list
Contact person establishes list of buddies by the second terminal.
List block 11 is established Ru above-mentioned, above-mentioned contacts list refers generally to the phone directory contact in terminal, because of note
Volume account is to need to carry out the short breath of mobile phone to verify etc., so account is consistent with the telephone number of terminal or account and terminal
Phone number association.Whole telephone numbers in contacts list or the phone number with account relating are traversed, is then compared one by one
It is right, if comparing to some number is registered account, which is added in the list of buddies of terminal, list of buddies
As can mutually secret telephony list.When needing to carry out secret telephony, called end number is searched directly in close friend Li Biao
Code, when no network, is then normally conversed automatically by operator base station.
Referring to Fig. 5, in the present embodiment, above-mentioned reception retransmission unit 20, comprising:
Receiving module 21 dials signal for receive the first terminal;
Jump module 22 is searched, the secret telephony account for searching corresponding second terminal according to signal is dialed
Family sends skip command to first terminal, passes through first terminal if not finding the secret telephony account of second terminal
Second terminal described in the base station call of mobile operator.
Such as above-mentioned receiving module 21 and jump module 22 is searched, what server got first terminal first dials signal,
Then according to the account for dialing signal lookup second terminal, that is to say, that only second terminal equally registers secret telephony account,
First terminal and second terminal can just be attached call by server, otherwise can not carry out secret telephony.When the second end
When holding unregistered above-mentioned secret telephony account, after server informs first terminal, first terminal passes through the operators such as movement, connection
Base station connection second terminal converse, at this point, can not generally carry out speech scrambling.When second terminal registers above-mentioned account,
But have a side that can not connect network in first terminal or second terminal, then can not equally carry out secret telephony, first terminal and
Second terminal connects second terminal by the base station of the operators such as movement, connection and converses.
Referring to Fig. 6, in the present embodiment, the device of above-mentioned secret telephony further include:
Forbidden cell 31 is sent, for sending disabling order to the first terminal and second terminal, is made described first eventually
End and second terminal close specified application and/or hardware.
Such as above-mentioned transmission forbidden cell 31, by the recording on first terminal and second terminal before the call or in communication process
It is closed using the application such as, hands free applications, and the hardware devices such as disabling bluetooth, earphone, user are logical without trigger action switching sound
Road button, sound are defaulted on earpiece, forbid application switching sound channel to prevent call voice from being recorded, being eavesdropped, further
Improve the safety of call in ground.It, can also be by double-talk in order to further increase the safety of user itself in the present embodiment
When sound carry out processing of changing voice, such as the transformation of male voice, female voice, the transformation etc. of tone color, process of changing voice, can by server into
Row transformation, can also be converted at the terminal.
In the present embodiment, above-mentioned logon information is the terminal using lock cipher.After endpoint to register complete account, first
It is secondary to log in or when replacement terminal is logged in, it needs to carry out just log in after SMS verified, when logging in one
After secondary, then the application lock cipher that can call directly terminal setting carries out login account, convenient and safe.In a specific embodiment
In, when needing to dial code phone, first by application lock code entry account, then, to be dialled by list of buddies lookup
The number beaten carries out secret telephony, and second terminal also needs input application lock code entry account when answering.At it
In its embodiment, when second terminal is connected to call information, the process of input application lock can be skipped over and log in corresponding account, mentioned
The convenience that high second terminal is answered.
Referring to Fig. 6, in the present embodiment, the device of above-mentioned secret telephony further include:
Encryption unit 32 is sent for server according to preset encryption rule to the first terminal and second terminal
Voice messaging through row encrypt.
Such as above-mentioned encryption unit 32, the voice messaging that above-mentioned server receives is encrypted, i.e., server is whole by first
The voice messaging that sends out is held to be encrypted, and corresponding decryption program is arranged in second terminal, similarly, server is by second terminal
The voice messaging sent out is encrypted, and corresponding decryption program is arranged in first terminal.In the ciphering process of server, not
Be unalterable, and can be encrypted according to preset encryption policy, when making to communicate with each other every time between terminal, encryption rule and
Its corresponding decryption rule is all different, and increases the confidentiality of call.For example, server time according to locating for first terminal,
Place, environment etc. generate encryption rule, which is sent to second terminal by server, and second terminal is advised according to encryption
Then call or generate corresponding decryption rule etc..
Referring to Fig. 6, in the present embodiment, the device of above-mentioned secret telephony further include:
Recording interference unit 33, for detecting whether the voice messaging between first terminal and second terminal is intercepted, if
It is then to send interference sound to interception end.
If unit 33 is interfered in above-mentioned recording, before call or when conversing, first terminal and/or second terminal open record
Sound application, then preset interference sound can be transmitted to recording application by server, alternatively, will directly be preset in first terminal
Or the interference sound in second terminal is sent to recording application, that is, is supplied to recording application vacation recording.For example, first terminal and
When conversing between two terminals, second terminal opens recording application, then second terminal is by preset false recording such as Tang poetry 300
, song, white noise etc. be conveyed to sound pick-up outfit, and actual call audio is terminated to recording application, it is of course also possible to will
Together with white noise is dubbed with call audio.Above-mentioned interception end is the one end for stealing encryption voice, is moved when having detected to intercept
When making, server can be saved true call-information, then send interference sound to interception end, after interception, which acts, to be stopped,
The voice messaging of storage is then sent to corresponding terminal again.
Referring to Fig. 6, in the present embodiment, the device of above-mentioned secret telephony further include:
Send blanker unit 34, for when end of conversation after, transmission blanking order to the first terminal and second terminal,
Control the first terminal hide calling record, control the second terminal hide answer record.
Display unit 35 is sent, for receiving the first display request of first terminal, according to the first display request hair
The first display command is sent, the first terminal is controlled and shows hiding calling record;The second display request of second terminal is received,
The second display command is sent according to the second display request, the second terminal is controlled and shows that hides answers record
As above-mentioned transmission blanker unit 34 and transmission display unit 35 can when message registration also needs secrecy
By calling record and to answer record and stash, when needing to check, specified password can be inputted and show the call hidden
Record.In other embodiments, while hiding talking records, relevant distracter can be shown, such as will on first terminal
Second whole title is shown as the name of ancient times poet, will be shown as air time etc. positive and negative infinite etc..
In one embodiment, the process of secret telephony are as follows:
The secret telephony account of code phone can be dialed, be answered to registration on first terminal and second terminal;
Phone directory lists in server traversal registration secret telephony account terminal, search each phone number in phone directory lists
Whether code is similarly the above-mentioned account number of registration, if so, being then added to the list of buddies in terminal;
First terminal starts secret telephony program using lock cipher when needing to dial secret telephony, through input, sends
Information is dialed to server;
Server is according to dialing the corresponding second terminal of information searching;
Server receives the logon information of the login secret telephony account of second terminal feedback, judges that the logon information is
It is no identical as the logon information of secret telephony account of second terminal, if they are the same, then first terminal and second terminal are led to
Words connection;
In communication process, first terminal and second terminal can encrypt the voice messaging number of output, corresponding,
It is decrypted when receiving voice signal, and encryption rule can generate at random according to time, place, environment etc., decryption rule is right
It should generate;When either end is without network signal, the two can be conversed by operator base station;Moreover, server can also be by
One terminal and second terminal can carry out second to the voice messaging number of output and encrypt, and further improve the confidentiality of call.
While first terminal is connected to second terminal, recording application on first terminal and second terminal hands-free is answered
It is disabled with, bluetooth etc., alternatively, will be preset when there is recording application starting by the terminal where server or recording application
Interference sound be conveyed to sound pick-up outfit, while call voice is isolated from recording application;
After having dialed phone, it can choose and hide message registration, it, can be by input eventually when needing to check information
The application lock cipher at end is checked through row.
The device of the secret telephony of the embodiment of the present invention, the call between terminal need to log in secret telephony account, voice
Information is transferred by corresponding server, and when the terminal to receive calls receives calls, and input is needed to log in secrecy
The logon information for account of conversing, is then verified by server, is only proved to be successful, can just be received calls.The present invention is kept away
The base station for opening conventional such as connection, movement operator, is conversed by specified server, can effectively improve call
Confidentiality, and before call, whether the logon information for needing to verify second terminal feedback correct, if correctly, illustrating the
The those who answer of two terminals is the holder of secret telephony account, prevents other people from the owner of second terminal being pretended to be to receive calls, into one
Improve the confidentiality of call in step ground.
The above description is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all utilizations
Equivalent structure or equivalent flow shift made by description of the invention and accompanying drawing content is applied directly or indirectly in other correlations
Technical field, be included within the scope of the present invention.
Claims (8)
1. a kind of method of secret telephony characterized by comprising
Server receives the registration information of first terminal and second terminal, establishes specified secret telephony account respectively;Wherein, institute
Stating secret telephony account includes account name, and logon information corresponding with the account name;
It receives first terminal and dials information by what the secret telephony account was sent, be then forwarded to second terminal;
Receive second terminal feedback login secret telephony account logon information, judge the logon information whether with second eventually
The logon information of the secret telephony account at end is identical, if they are the same, then first terminal is carried out call with second terminal and connected;
Disabling order is sent to the first terminal and second terminal, the first terminal and second terminal is made to close specified answer
With and/or hardware.
2. the method for secret telephony according to claim 1, which is characterized in that the server receives first terminal and the
The registration information of two terminals, the step of establishing specified secret telephony account respectively, comprising:
Contacts list on server traversal first terminal, searches that the secrecy is equally established in the contacts list is logical
The contact person for talking about account, establishes list of buddies by the first terminal;And the connection in the server traversal second terminal
It is list, searches the contact person for equally establishing the secret telephony account in the contacts list, pass through the second terminal
Establish list of buddies.
3. the method for secret telephony according to claim 2, which is characterized in that the reception first terminal passes through the guarantor
The step of dialing information, be then forwarded to second terminal of close call account transmission, comprising:
Receive the first terminal dials signal;
According to the secret telephony account for dialing signal and searching corresponding second terminal, if not finding second terminal
Secret telephony account, then send skip command to first terminal, first terminal made to pass through the base station call institute of mobile operator
State second terminal.
4. the method for secret telephony according to claim 1, which is characterized in that the specified application includes recording application
And/or hands free applications;The specified hardware includes bluetooth and/or earphone.
5. a kind of device of secret telephony characterized by comprising
Registering unit receives the registration information of first terminal and second terminal for server, and it is logical to establish specified secrecy respectively
Talk about account;Wherein, the secret telephony account includes account name, and logon information corresponding with the account name;
Retransmission unit is received, information is dialed by what the secret telephony account was sent for receiving first terminal, then forwards
To second terminal;
Judge connection unit, for receiving the logon information for logging in secret telephony account of second terminal feedback, is stepped on described in judgement
Whether land information is identical as the logon information of secret telephony account of second terminal, if they are the same, then eventually by first terminal and second
End carries out call connection;
Forbidden cell is sent, for sending disabling order to the first terminal and second terminal, makes the first terminal and the
Two terminals close specified application and/or hardware.
6. the device of secret telephony according to claim 5, which is characterized in that the registering unit, comprising:
List block is established, for the contacts list on server traversal first terminal, is searched in the contacts list
The contact person for equally establishing the secret telephony account establishes list of buddies by the first terminal;And the server
The contacts list in second terminal is traversed, the connection for equally establishing the secret telephony account in the contacts list is searched
People establishes list of buddies by the second terminal.
7. the device of secret telephony according to claim 6, which is characterized in that the reception retransmission unit, comprising:
Receiving module dials signal for receive the first terminal;
Jump module is searched, the secret telephony account for searching corresponding second terminal according to signal is dialed, such as
Fruit does not find the secret telephony account of second terminal, then sends skip command to first terminal, first terminal is made to pass through movement
Second terminal described in the base station call of operator.
8. the device of secret telephony according to claim 5, which is characterized in that the specified application includes recording application
And/or hands free applications;The specified hardware includes bluetooth and/or earphone.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610857023.3A CN106357940B (en) | 2016-09-27 | 2016-09-27 | The method and apparatus of secret telephony |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610857023.3A CN106357940B (en) | 2016-09-27 | 2016-09-27 | The method and apparatus of secret telephony |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106357940A CN106357940A (en) | 2017-01-25 |
CN106357940B true CN106357940B (en) | 2019-04-30 |
Family
ID=57865424
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610857023.3A Active CN106357940B (en) | 2016-09-27 | 2016-09-27 | The method and apparatus of secret telephony |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106357940B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108882060B (en) * | 2018-06-27 | 2020-10-27 | 腾讯科技(深圳)有限公司 | Mutual dialing method, device and system for public telephone and computer readable storage medium |
CN111030965A (en) * | 2018-10-09 | 2020-04-17 | 青岛海信移动通信技术股份有限公司 | Method for transmitting and receiving encrypted data and mobile terminal |
CN111131630A (en) * | 2019-12-31 | 2020-05-08 | 北京金山安全软件有限公司 | Incoming call processing method and device, electronic equipment and storage medium |
CN117857686B (en) * | 2024-02-07 | 2024-07-19 | 荣耀终端有限公司 | Communication method, communication system and related device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101009886A (en) * | 2006-12-25 | 2007-08-01 | 北京邮电大学 | Implementation scheme for secrecy phone of the smart mobile terminal |
CN102045712A (en) * | 2011-01-04 | 2011-05-04 | 奇智软件(北京)有限公司 | Anti-monitoring method and system for mobile terminal |
CN104301308A (en) * | 2014-09-22 | 2015-01-21 | 小米科技有限责任公司 | Communication control method and device |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8509736B2 (en) * | 2002-08-08 | 2013-08-13 | Global Tel*Link Corp. | Telecommunication call management and monitoring system with voiceprint verification |
CN101060567A (en) * | 2007-04-30 | 2007-10-24 | 华为技术有限公司 | A method, system and its device for realizing the safety answering |
CN102104868B (en) * | 2009-12-17 | 2015-04-15 | 深圳富泰宏精密工业有限公司 | Private calling system and method |
CN103974241B (en) * | 2013-02-05 | 2018-01-16 | 东南大学常州研究院 | A kind of sound end-to-end encryption method towards android system mobile terminal |
CN103354638A (en) * | 2013-08-05 | 2013-10-16 | 成都林海电子有限责任公司 | Android system-based mobile phone encryption server system |
-
2016
- 2016-09-27 CN CN201610857023.3A patent/CN106357940B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101009886A (en) * | 2006-12-25 | 2007-08-01 | 北京邮电大学 | Implementation scheme for secrecy phone of the smart mobile terminal |
CN102045712A (en) * | 2011-01-04 | 2011-05-04 | 奇智软件(北京)有限公司 | Anti-monitoring method and system for mobile terminal |
CN104301308A (en) * | 2014-09-22 | 2015-01-21 | 小米科技有限责任公司 | Communication control method and device |
Also Published As
Publication number | Publication date |
---|---|
CN106357940A (en) | 2017-01-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106357940B (en) | The method and apparatus of secret telephony | |
US8548432B2 (en) | Authenticating voice calls from mobile devices | |
US9088645B2 (en) | Intermediary device initiated caller identification | |
US6405030B1 (en) | System for interception of digital cellular phone communication | |
US7197297B2 (en) | Authentication method for enabling a user of a mobile station to access to private data or services | |
CN104935758B (en) | Method of calling, apparatus and system | |
CN105472093B (en) | Mobile terminal call answers method for authenticating and mobile terminal | |
KR19990077193A (en) | Authentication Key Management in Mobile Communication Systems | |
US8175580B1 (en) | End-to-end secure wireless communication for requesting a more secure channel | |
CN104660809A (en) | Answer management method and device for incoming call of private contact person | |
US20100177899A1 (en) | Encrypted communication system | |
CN107707723A (en) | The hold-up interception method of harassing call | |
CN106303085B (en) | Mobile terminal and method and device for secure call | |
CN110049062A (en) | Verify code check method, device, electronic equipment and storage medium | |
CN105187672A (en) | Incoming call answering method and mobile terminal | |
US20120289205A1 (en) | Apparatus and method for anonymous calls to and from cellular telephones | |
WO2006007132A2 (en) | User transparent registration process for secure communication | |
CN107466034A (en) | A kind of secret communication method and communication system | |
CN107396348B (en) | Call method and device | |
US20080254762A1 (en) | Method and apparatus for call protection over a telephone system | |
CN106506450B (en) | Method and system for secure call | |
JP2013183404A (en) | Communication recording system, mobile telephone terminal, communication recording server, communication recording method and communication recording program | |
CN111601001A (en) | Telephone number storage method, call equipment and call system | |
CN109561224B (en) | Call processing method and call terminal | |
KR20020072074A (en) | Locking system using wireless communication terminal of transmission signal and method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20170804 Address after: 100102, 18 floor, building 2, Wangjing street, Beijing, Chaoyang District, 1801 Applicant after: BEIJING ANYUN SHIJI SCIENCE AND TECHNOLOGY CO., LTD. Address before: 100088 Beijing city Xicheng District xinjiekouwai Street 28, block D room 112 (Desheng Park) Applicant before: Beijing Qihu Technology Co., Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |