CN106357940B - The method and apparatus of secret telephony - Google Patents

The method and apparatus of secret telephony Download PDF

Info

Publication number
CN106357940B
CN106357940B CN201610857023.3A CN201610857023A CN106357940B CN 106357940 B CN106357940 B CN 106357940B CN 201610857023 A CN201610857023 A CN 201610857023A CN 106357940 B CN106357940 B CN 106357940B
Authority
CN
China
Prior art keywords
terminal
account
secret telephony
secret
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610857023.3A
Other languages
Chinese (zh)
Other versions
CN106357940A (en
Inventor
汪伦
康明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Anyun Century Technology Co Ltd
Original Assignee
Beijing Anyun Century Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Anyun Century Technology Co Ltd filed Critical Beijing Anyun Century Technology Co Ltd
Priority to CN201610857023.3A priority Critical patent/CN106357940B/en
Publication of CN106357940A publication Critical patent/CN106357940A/en
Application granted granted Critical
Publication of CN106357940B publication Critical patent/CN106357940B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/4228Systems providing special services or facilities to subscribers in networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/38Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
    • H04M3/382Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections using authorisation codes or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

Present invention discloses a kind of method and apparatus of secret telephony, and wherein method includes: the registration information that server receives first terminal and second terminal, establish specified secret telephony account respectively;Wherein, the secret telephony account includes account name, and logon information corresponding with the account name;It receives first terminal and dials information by what the secret telephony account was sent, be then forwarded to second terminal;Wherein, first terminal and second terminal register with the secret telephony account;The logon information for receiving the login secret telephony account of second terminal feedback, judges whether the logon information is identical as the logon information of secret telephony account of second terminal, if they are the same, then first terminal is carried out call with second terminal and connected.The method and apparatus of secret telephony of the invention need to input the logon information for logging in secret telephony account, are then verified by server, be only proved to be successful, can just received calls, improve the confidentiality of call.

Description

The method and apparatus of secret telephony
Technical field
The present invention relates to safety call field, the method and apparatus for especially relating to a kind of secret telephony.
Background technique
When carrying out voice communication by mobile phone or other terminals, often it is related to private content, does not allow other people Know, especially the crowds such as governmental personnel, business people, dialog context may include government secret, business secret etc..So protecting Not eavesdropped by other people for card dialog context, is problem to be solved.
Summary of the invention
The main object of the present invention is to provide a kind of method and apparatus for improving safe secret telephony of conversing between terminal.
In order to achieve the above-mentioned object of the invention, a kind of method that the present invention proposes secret telephony, comprising:
Server receives the registration information of first terminal and second terminal, establishes specified secret telephony account respectively;Its In, the secret telephony account includes account name, and logon information corresponding with the account name;
It receives first terminal and dials information by what the secret telephony account was sent, be then forwarded to second terminal;
Whether the logon information for receiving the login secret telephony account of second terminal feedback judges the logon information with the The logon information of the secret telephony account of two terminals is identical, if they are the same, then first terminal is carried out call with second terminal and connected.
Further, the server receives the registration information of first terminal and second terminal, establishes specified guarantor respectively The step of close call account, comprising:
Contacts list on the server traversal first terminal, searches and equally establishes the guarantor in the contacts list The contact person of close call account, establishes list of buddies by the first terminal;And in the server traversal second terminal Contacts list, search the contact person for equally establishing the secret telephony account in the contacts list, pass through described second Terminal establishes list of buddies.
Further, the reception first terminal dials information by what the secret telephony account was sent, then forwards The step of to second terminal, comprising:
Receive the first terminal dials signal;
According to the secret telephony account for dialing signal and searching corresponding second terminal, if not finding second The secret telephony account of terminal then sends skip command to first terminal, exhales first terminal by the base station of mobile operator It is the second terminal.
Further, the logon information of the login secret telephony account for receiving second terminal feedback, is stepped on described in judgement Whether land information is identical as the logon information of secret telephony account of second terminal, if they are the same, then eventually by first terminal and second End carried out after the step of call connection, comprising:
Disabling order is sent to the first terminal and second terminal, closes the first terminal and second terminal specified Application and/or hardware.
Further, the specified application includes recording application and/or hands free applications;The specified hardware includes indigo plant Tooth and/or earphone.
Further, the logon information is the terminal using lock cipher.
Further, the logon information of the login secret telephony account for receiving second terminal feedback, is stepped on described in judgement Whether land information is identical as the logon information of secret telephony account of second terminal, if they are the same, then eventually by first terminal and second End carried out after the step of call connection, comprising:
According to preset encryption rule, the voice messaging sent to the first terminal and second terminal adds server through row It is close.
Further, the logon information of the login secret telephony account for receiving second terminal feedback, is stepped on described in judgement Whether land information is identical as the logon information of secret telephony account of second terminal, if they are the same, then eventually by first terminal and second End carried out after the step of call connection, comprising:
Whether the voice messaging between detection first terminal and second terminal is intercepted, if so, sending to interception end dry Disturb sound.
Further, the logon information of the login secret telephony account for receiving second terminal feedback, is stepped on described in judgement Whether land information is identical as the logon information of secret telephony account of second terminal, if they are the same, then eventually by first terminal and second End carried out after the step of call connection, comprising:
After end of conversation, blanking order is sent to the first terminal and second terminal, it is hidden to control the first terminal Hide calling record, control the second terminal hide answer record.
Further, described after end of conversation, blanking order is sent to the first terminal and second terminal, controls institute It states first terminal and hides calling record, control after the second terminal hides the step of answering record, comprising:
The the first display request for receiving first terminal sends the first display command, control according to the first display request The first terminal shows hiding calling record;The the second display request for receiving second terminal, is asked according to second display It asks and sends the second display command, control the second terminal and show that hides answers record.
The present invention also provides a kind of devices of secret telephony, comprising:
Registering unit receives the registration information of first terminal and second terminal for server, establishes specified guarantor respectively Close call account;Wherein, the secret telephony account includes account name, and logon information corresponding with the account name;
Retransmission unit is received, dials information by what the secret telephony account was sent for receiving first terminal, then It is transmitted to second terminal;
Judge connection unit, the logon information of the login secret telephony account for receiving second terminal feedback judges institute Whether identical as the logon information of secret telephony account of second terminal logon information is stated, if they are the same, then by first terminal and Two terminals carry out call connection.
Further, the registering unit, comprising:
List block is established, for the contacts list on server traversal first terminal, searches contact person column The contact person that the secret telephony account is equally established in table establishes list of buddies by the first terminal;And the clothes The contacts list being engaged in device traversal second terminal, searches the connection that the secret telephony account is equally established in the contacts list It is people, list of buddies is established by the second terminal.
Further, the reception retransmission unit, comprising:
Receiving module dials signal for receive the first terminal;
Jump module is searched, the secret telephony account for searching corresponding second terminal according to signal is dialed Family sends skip command to first terminal, passes through first terminal if not finding the secret telephony account of second terminal Second terminal described in the base station call of mobile operator.
Further, the device of the secret telephony further include:
Forbidden cell is sent, for sending disabling order to the first terminal and second terminal, makes the first terminal Specified application and/or hardware are closed with second terminal.
Further, the specified application includes recording application and/or hands free applications;The specified hardware includes indigo plant Tooth and/or earphone.
Further, the logon information is the terminal using lock cipher.
Further, the device of the secret telephony further include:
Encryption unit is sent for server according to preset encryption rule to the first terminal and second terminal Voice messaging is encrypted through row.
Further, the device of the secret telephony further include:
Recording interference unit, for detecting whether the voice messaging between first terminal and second terminal is intercepted, if so, Then interference sound is sent to interception end.
Further, the device of the secret telephony further include:
Blanker unit is sent, for after end of conversation, sending blanking order to the first terminal and second terminal, control Make the first terminal hide calling record, control the second terminal hide answer record.
Further, the device of the secret telephony further include:
Display unit is sent, for receiving the first display request of first terminal, is sent according to the first display request First display command controls the first terminal and shows hiding calling record;Receive the second display request of second terminal, root The second display command is sent according to the second display request, the second terminal is controlled and shows that hides answers record.
The method and apparatus of secret telephony of the invention, the call between terminal need to log in secret telephony account, voice Information is transferred by corresponding server, and when the terminal to receive calls receives calls, and input is needed to log in secrecy The logon information for account of conversing, is then verified by server, is only proved to be successful, can just be received calls.The present invention is kept away The base station for opening conventional such as connection, movement operator, is conversed by specified server, can effectively improve call Confidentiality, and before call, whether the logon information for needing to verify second terminal feedback correct, if correctly, illustrating the The those who answer of two terminals is the holder of secret telephony account, prevents other people from the owner of second terminal being pretended to be to receive calls, into one Improve the confidentiality of call in step ground.
Detailed description of the invention
Fig. 1 is the flow diagram of the method for the secret telephony of one embodiment of the invention;
Fig. 2 is that the flow diagram of information is dialed in the server forwarding of one embodiment of the invention;
Fig. 3 is the structural schematic block diagram of the device of the secret telephony of one embodiment of the invention;
Fig. 4 is the structural schematic diagram of the registering unit of one embodiment of the invention;
Fig. 5 is the topology view of the reception retransmission unit of one embodiment of the invention;
Fig. 6 is the structural schematic block diagram of the device of the secret telephony of one embodiment of the invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singular " one " used herein, " one It is a ", " described " and "the" may also comprise plural form.It is to be further understood that being arranged used in specification of the invention Diction " comprising " refer to that there are the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition Other one or more features, integer, step, operation, element, component and/or their group.Wording used herein " and/ Or " it include one or more associated wholes for listing item or any cell and all combinations.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art Language and scientific term), there is meaning identical with the general understanding of those of ordinary skill in fields of the present invention.Should also Understand, those terms such as defined in the general dictionary, it should be understood that have in the context of the prior art The consistent meaning of meaning, and unless idealization or meaning too formal otherwise will not be used by specific definitions as here To explain.
Those skilled in the art of the present technique are appreciated that terminal here refers to the electronics such as smart phone, computer, tablet computer Equipment.
Referring to Fig.1, the embodiment of the present invention provides a kind of method of secret telephony, comprising steps of
S1, server receive the registration information of first terminal and second terminal, establish specified secret telephony account respectively; Wherein, the secret telephony account includes account name, and logon information corresponding with the account name;
S2, reception first terminal dial information by what the secret telephony account was sent, are then forwarded to second terminal;
Whether S3, the logon information for logging in secret telephony account for receiving second terminal feedback, judge the logon information It is identical as the logon information of secret telephony account of second terminal, if they are the same, then first terminal and second terminal are conversed Connection.
The application that will be installed secret telephony as described in above-mentioned steps S1, in terminal is logged in using needing to log in when in use Then need to establish corresponding secret telephony account.Establishing secret telephony account generally uses telephone number, qq number etc. to establish, so Afterwards, the forms such as identifying code are sent to terminal by server and gives terminal logon rights.In the present embodiment, secrecy has only been registered After account of conversing, it just can connect the server and carry out secret telephony.In the present embodiment, when first time logon account, It needs the identifying code for carrying out SMS offer to be logged in, when subsequent login, only needs application lock cipher on input terminal i.e. Can, input mode includes a variety of, for example inputs designated pin, figure and finger print identifying and iris authentication etc..It is above-mentioned to log in letter The modification logging of breath generally setting.In this implementation, logon information is that terminal applies lock cipher, when needing to dial code phone When, first terminal first is by corresponding application lock code entry secret telephony account, and second terminal, when answering, equally It needs to input application lock code entry account, will be used as using lock cipher and log in secret telephony account, it is convenient, fast.
As described in above-mentioned steps S2, above-mentioned server is also referred to as servomechanism, is to provide the equipment of the service of calculating.Due to server It needs to respond service request, and is handled, therefore in general server should have the service of undertaking and ensure the energy of service Power.Wherein, server includes Cloud Server, Cloud Server be one kind be simple and efficient, securely and reliably, processing capacity can elastic telescopic Calculating service cloud service.The connection of first terminal and second terminal and server can be thus kept away by network connection The base station for opening the operators such as movement, connection is conversed, other people not only can be effectively prevented by the approach of base station and steals first Dialog context between terminal and second terminal can also save the cost of the phone call of the operators such as movement, connection.
As described in above-mentioned steps S3, when second terminal receives calls, need to input log in secret telephony account log in letter Breath, is then verified by server, is only proved to be successful, can just be received calls.I.e. before call, need to verify second Whether the logon information of terminal feedback is correct, if correctly, illustrating that the those who answer of second terminal is holding for secret telephony account Person prevents other people from the owner of second terminal being pretended to be to receive calls, and further improves the confidentiality of call.
In the present embodiment, above-mentioned server receives the registration information of first terminal and second terminal, and foundation is specified respectively The step S1 of secret telephony account, comprising:
Contacts list on S11, server traversal first terminal, searches and equally establishes institute in the contacts list The contact person for stating secret telephony account establishes list of buddies by the first terminal;And the server traversal second is eventually Contacts list on end searches the contact person that the secret telephony account is equally established in the contacts list, by described Second terminal establishes list of buddies.
As described in above-mentioned steps S11, above-mentioned contacts list refers generally to the phone directory contact in terminal, because of registration account Family is to need to carry out mobile phone short breath verifying etc., so account is consistent with the telephone number of terminal or the mobile phone of account and terminal Number-associated.Whole telephone numbers in contacts list or the phone number with account relating are traversed, is then compared one by one, such as It is registered account that fruit, which compares to some number, then the number is added in the list of buddies of terminal, list of buddies is Can mutually secret telephony list.When needing to carry out secret telephony, searching called end number directly in close friend Li Biao is Can, when no network, then normally conversed automatically by operator base station.
Referring to Fig. 2, in the present embodiment, above-mentioned reception first terminal dials letter by what the secret telephony account was sent Breath, is then forwarded to the step S2 of second terminal, comprising:
S21, receive the first terminal dial signal;
S22, basis dial the secret telephony account that signal searches corresponding second terminal, if do not found The secret telephony account of second terminal then sends skip command to first terminal, makes base of the first terminal by mobile operator It stands and calls the second terminal.
As described in above-mentioned steps S21 and S22, server gets the signal of dialing of first terminal first, and then basis is dialled Give a signal and search the account of second terminal, that is to say, that only second terminal equally register secret telephony account, first terminal with Second terminal can just be attached call by server, otherwise can not carry out secret telephony.On second terminal is unregistered When stating secret telephony account, after server informs first terminal, first terminal is connected by the base station of the operators such as movement, connection Second terminal is conversed, at this point, can not generally carry out speech scrambling.When the above-mentioned account of second terminal registration, but first is whole There is a side that can not connect network in end or second terminal, then can not equally carry out secret telephony, first terminal and second terminal are logical Cross move, the base station of the operators such as connection connection second terminal is conversed.
In the present embodiment, the logon information of the login secret telephony account of above-mentioned reception second terminal feedback, described in judgement Whether logon information is identical as the logon information of secret telephony account of second terminal, if they are the same, then by first terminal and second Terminal carries out after the step S3 of call connection, comprising:
S31, disabling order is sent to the first terminal and second terminal, close the first terminal and second terminal Specified application and/or hardware.Wherein, above-mentioned specified application includes recording application and/or hands free applications;It is above-mentioned specified hard Part includes bluetooth and/or earphone.
As described in above-mentioned steps S31, the recording on first terminal and second terminal is answered before the call or in communication process It is closed with the application such as, hands free applications, and the hardware devices such as disabling bluetooth, earphone, user switch sound channel without trigger action Button, sound are defaulted on earpiece, forbid application switching sound channel to prevent call voice from being recorded, being eavesdropped, further Improve the safety of call.In the present embodiment, in order to further increase the safety of user itself, when can also be by double-talk Sound carry out processing of changing voice, such as the transformation of male voice, female voice, the transformation etc. of tone color, process of changing voice can be carried out by server Transformation, can also be converted at the terminal.
In the present embodiment, above-mentioned logon information is the terminal using lock cipher.After endpoint to register complete account, first It is secondary to log in or when replacement terminal is logged in, it needs to carry out just log in after SMS verified, when logging in one After secondary, then the application lock cipher that can call directly terminal setting carries out login account, convenient and safe.In a specific embodiment In, when needing to dial code phone, first by application lock code entry account, then, to be dialled by list of buddies lookup The number beaten carries out secret telephony, and second terminal also needs input application lock code entry account when answering.At it In its embodiment, when second terminal is connected to call information, the process of input application lock can be skipped over and log in corresponding account, mentioned The convenience that high second terminal is answered.
In the present embodiment, the logon information of the login secret telephony account of above-mentioned reception second terminal feedback, described in judgement Whether logon information is identical as the logon information of secret telephony account of second terminal, if they are the same, then by first terminal and second Terminal carries out after the step S3 of call connection, comprising:
According to preset encryption rule, the voice messaging sent to the first terminal and second terminal is passed through for S32, server Row encryption.
As described in above-mentioned steps S32, the voice messaging that above-mentioned server receives is encrypted, i.e., server is whole by first The voice messaging that sends out is held to be encrypted, and corresponding decryption program is arranged in second terminal, similarly, server is by second terminal The voice messaging sent out is encrypted, and corresponding decryption program is arranged in first terminal.In the ciphering process of server, not Be unalterable, and can be encrypted according to preset encryption policy, when making to communicate with each other every time between terminal, encryption rule and Its corresponding decryption rule is all different, and increases the confidentiality of call.For example, server time according to locating for first terminal, Place, environment etc. generate encryption rule, which is sent to second terminal by server, and second terminal is advised according to encryption Then call or generate corresponding decryption rule etc..
In the present embodiment, the logon information of the login secret telephony account of above-mentioned reception second terminal feedback, described in judgement Whether logon information is identical as the logon information of secret telephony account of second terminal, if they are the same, then by first terminal and second Terminal carries out after the step S3 of call connection, comprising:
Whether the voice messaging between S33, detection first terminal and second terminal is intercepted, if so, sending out to interception end Send interference sound.
As described in above-mentioned steps S33, before call or when conversing, first terminal and/or second terminal open recording Using, then preset interference sound can be transmitted to recording application by server, alternatively, will directly be preset in first terminal or Interference sound in second terminal is sent to recording application, that is, is supplied to recording application vacation recording.For example, first terminal and second When conversing between terminal, second terminal opens recording application, then second terminal by preset false recording as Tang poetry 300 is first, Song, white noise etc. are conveyed to sound pick-up outfit, and actual call audio is terminated to recording application, it is of course also possible to by white Together with noise is dubbed with call audio.Above-mentioned interception end is the one end for stealing encryption voice, when having detected interception movement When, server can save true call-information, then send interference sound to interception end, after interception, which acts, to be stopped, then The voice messaging of storage is sent to corresponding terminal again.
In the present embodiment, the logon information of the login secret telephony account of above-mentioned reception second terminal feedback, described in judgement Whether logon information is identical as the logon information of secret telephony account of second terminal, if they are the same, then by first terminal and second Terminal carries out after the step S3 of call connection, comprising:
S34, after end of conversation, send blanking order to the first terminal and second terminal, control described first eventually Hold hide calling record, control the second terminal hide answer record.
After step S34 further include:
S35, the first display request for receiving first terminal send the first display command according to the first display request, It controls the first terminal and shows hiding calling record;The second display request of second terminal is received, it is aobvious according to described second Show that request sends the second display command, controls the second terminal and show that hides answers record.
As described in above-mentioned steps S34 and S35, when message registration also needs secrecy, can by calling record and It answers record to stash, when needing to check, specified password can be inputted and show hiding message registration.In other implementations In example, while hiding talking records, relevant distracter can be shown, for example show the second whole title on first terminal For the name of ancient times poet, it will be shown as air time etc. positive and negative infinite etc..
In one embodiment, the process of secret telephony are as follows:
The secret telephony account of code phone can be dialed, be answered to registration on first terminal and second terminal;
Phone directory lists in server traversal registration secret telephony account terminal, search each phone number in phone directory lists Whether code is similarly the above-mentioned account number of registration, if so, being then added to the list of buddies in terminal;
First terminal starts secret telephony program using lock cipher when needing to dial secret telephony, through input, sends Information is dialed to server;
Server is according to dialing the corresponding second terminal of information searching;
Server receives the logon information of the login secret telephony account of second terminal feedback, judges that the logon information is It is no identical as the logon information of secret telephony account of second terminal, if they are the same, then first terminal and second terminal are led to Words connection;
In communication process, first terminal and second terminal can encrypt the voice messaging number of output, corresponding, It is decrypted when receiving voice signal, and encryption rule can generate at random according to time, place, environment etc., decryption rule is right It should generate;When either end is without network signal, the two can be conversed by operator base station;Moreover, server can also be by One terminal and second terminal can carry out second to the voice messaging number of output and encrypt, and further improve the confidentiality of call.
While first terminal is connected to second terminal, recording application on first terminal and second terminal hands-free is answered It is disabled with, bluetooth etc., alternatively, will be preset when there is recording application starting by the terminal where server or recording application Interference sound be conveyed to sound pick-up outfit, while call voice is isolated from recording application;
After having dialed phone, it can choose and hide message registration, it, can be by input eventually when needing to check information The application lock cipher at end is checked through row.
The method of the secret telephony of the embodiment of the present invention, the call between terminal need to log in secret telephony account, voice Information is transferred by corresponding server, and when the terminal to receive calls receives calls, and input is needed to log in secrecy The logon information for account of conversing, is then verified by server, is only proved to be successful, can just be received calls.The present invention is kept away The base station for opening conventional such as connection, movement operator, is conversed by specified server, can effectively improve call Confidentiality, and before call, whether the logon information for needing to verify second terminal feedback correct, if correctly, illustrating the The those who answer of two terminals is the holder of secret telephony account, prevents other people from the owner of second terminal being pretended to be to receive calls, into one Improve the confidentiality of call in step ground.
Referring to Fig. 3, the embodiment of the present invention also provides a kind of device of secret telephony, comprising:
Registering unit 10 receives the registration information of first terminal and second terminal for server, and foundation is specified respectively Secret telephony account;Wherein, the secret telephony account includes account name, and logon information corresponding with the account name;
Retransmission unit 20 is received, dials information by what the secret telephony account was sent for receiving first terminal, so After be transmitted to second terminal;
Judge connection unit 30, the logon information of the login secret telephony account for receiving second terminal feedback, judgement Whether the logon information identical as the logon information of secret telephony account of second terminal, if they are the same, then by first terminal and Second terminal carries out call connection.
Such as above-mentioned registering unit 10, the application of secret telephony will be installed in terminal, using needing to log in when in use, log in Then need to establish corresponding secret telephony account.Establishing secret telephony account generally uses telephone number, qq number etc. to establish, so Afterwards, the forms such as identifying code are sent to terminal by server and gives terminal logon rights.In the present embodiment, secrecy has only been registered After account of conversing, it just can connect the server and carry out secret telephony.In the present embodiment, when first time logon account, It needs the identifying code for carrying out SMS offer to be logged in, when subsequent login, only needs application lock cipher on input terminal i.e. Can, input mode includes a variety of, for example inputs designated pin, figure and finger print identifying and iris authentication etc..It is above-mentioned to log in letter The modification logging of breath generally setting.In this implementation, logon information is that terminal applies lock cipher, when needing to dial code phone When, first terminal first is by corresponding application lock code entry secret telephony account, and second terminal, when answering, equally It needs to input application lock code entry account, will be used as using lock cipher and log in secret telephony account, it is convenient, fast.
Such as above-mentioned reception retransmission unit 20, above-mentioned server is also referred to as servomechanism, is to provide the equipment of the service of calculating.Due to clothes Business device needs to respond service request, and is handled, therefore in general server should have the service of undertaking and ensure service Ability.Wherein, server includes Cloud Server, Cloud Server be one kind be simple and efficient, securely and reliably, processing capacity can elasticity Flexible calculating services cloud service.The connection of first terminal and second terminal and server thus may be used by network connection It is conversed with avoiding the base station of the operators such as movement, connection, other people not only can be effectively prevented and is stolen by the approach of base station Dialog context between first terminal and second terminal can also save the cost of the phone call of the operators such as movement, connection.
Such as above-mentioned judgement connection unit 30, when second terminal receives calls, input is needed to log in stepping on for secret telephony account Land information, is then verified by server, is only proved to be successful, and can just be received calls.I.e. before call, need to verify Whether the logon information of second terminal feedback is correct, if correctly, illustrating that the those who answer of second terminal is secret telephony account Holder prevents other people from the owner of second terminal being pretended to be to receive calls, and further improves the confidentiality of call.
Referring to Fig. 4, in the present embodiment, above-mentioned registering unit 10, comprising:
List block 11 is established, for the contacts list on server traversal first terminal, searches the contact person The contact person that the secret telephony account is equally established in list establishes list of buddies by the first terminal;And it is described Server traverses the contacts list in second terminal, searches and equally establishes the secret telephony account in the contacts list Contact person establishes list of buddies by the second terminal.
List block 11 is established Ru above-mentioned, above-mentioned contacts list refers generally to the phone directory contact in terminal, because of note Volume account is to need to carry out the short breath of mobile phone to verify etc., so account is consistent with the telephone number of terminal or account and terminal Phone number association.Whole telephone numbers in contacts list or the phone number with account relating are traversed, is then compared one by one It is right, if comparing to some number is registered account, which is added in the list of buddies of terminal, list of buddies As can mutually secret telephony list.When needing to carry out secret telephony, called end number is searched directly in close friend Li Biao Code, when no network, is then normally conversed automatically by operator base station.
Referring to Fig. 5, in the present embodiment, above-mentioned reception retransmission unit 20, comprising:
Receiving module 21 dials signal for receive the first terminal;
Jump module 22 is searched, the secret telephony account for searching corresponding second terminal according to signal is dialed Family sends skip command to first terminal, passes through first terminal if not finding the secret telephony account of second terminal Second terminal described in the base station call of mobile operator.
Such as above-mentioned receiving module 21 and jump module 22 is searched, what server got first terminal first dials signal, Then according to the account for dialing signal lookup second terminal, that is to say, that only second terminal equally registers secret telephony account, First terminal and second terminal can just be attached call by server, otherwise can not carry out secret telephony.When the second end When holding unregistered above-mentioned secret telephony account, after server informs first terminal, first terminal passes through the operators such as movement, connection Base station connection second terminal converse, at this point, can not generally carry out speech scrambling.When second terminal registers above-mentioned account, But have a side that can not connect network in first terminal or second terminal, then can not equally carry out secret telephony, first terminal and Second terminal connects second terminal by the base station of the operators such as movement, connection and converses.
Referring to Fig. 6, in the present embodiment, the device of above-mentioned secret telephony further include:
Forbidden cell 31 is sent, for sending disabling order to the first terminal and second terminal, is made described first eventually End and second terminal close specified application and/or hardware.
Such as above-mentioned transmission forbidden cell 31, by the recording on first terminal and second terminal before the call or in communication process It is closed using the application such as, hands free applications, and the hardware devices such as disabling bluetooth, earphone, user are logical without trigger action switching sound Road button, sound are defaulted on earpiece, forbid application switching sound channel to prevent call voice from being recorded, being eavesdropped, further Improve the safety of call in ground.It, can also be by double-talk in order to further increase the safety of user itself in the present embodiment When sound carry out processing of changing voice, such as the transformation of male voice, female voice, the transformation etc. of tone color, process of changing voice, can by server into Row transformation, can also be converted at the terminal.
In the present embodiment, above-mentioned logon information is the terminal using lock cipher.After endpoint to register complete account, first It is secondary to log in or when replacement terminal is logged in, it needs to carry out just log in after SMS verified, when logging in one After secondary, then the application lock cipher that can call directly terminal setting carries out login account, convenient and safe.In a specific embodiment In, when needing to dial code phone, first by application lock code entry account, then, to be dialled by list of buddies lookup The number beaten carries out secret telephony, and second terminal also needs input application lock code entry account when answering.At it In its embodiment, when second terminal is connected to call information, the process of input application lock can be skipped over and log in corresponding account, mentioned The convenience that high second terminal is answered.
Referring to Fig. 6, in the present embodiment, the device of above-mentioned secret telephony further include:
Encryption unit 32 is sent for server according to preset encryption rule to the first terminal and second terminal Voice messaging through row encrypt.
Such as above-mentioned encryption unit 32, the voice messaging that above-mentioned server receives is encrypted, i.e., server is whole by first The voice messaging that sends out is held to be encrypted, and corresponding decryption program is arranged in second terminal, similarly, server is by second terminal The voice messaging sent out is encrypted, and corresponding decryption program is arranged in first terminal.In the ciphering process of server, not Be unalterable, and can be encrypted according to preset encryption policy, when making to communicate with each other every time between terminal, encryption rule and Its corresponding decryption rule is all different, and increases the confidentiality of call.For example, server time according to locating for first terminal, Place, environment etc. generate encryption rule, which is sent to second terminal by server, and second terminal is advised according to encryption Then call or generate corresponding decryption rule etc..
Referring to Fig. 6, in the present embodiment, the device of above-mentioned secret telephony further include:
Recording interference unit 33, for detecting whether the voice messaging between first terminal and second terminal is intercepted, if It is then to send interference sound to interception end.
If unit 33 is interfered in above-mentioned recording, before call or when conversing, first terminal and/or second terminal open record Sound application, then preset interference sound can be transmitted to recording application by server, alternatively, will directly be preset in first terminal Or the interference sound in second terminal is sent to recording application, that is, is supplied to recording application vacation recording.For example, first terminal and When conversing between two terminals, second terminal opens recording application, then second terminal is by preset false recording such as Tang poetry 300 , song, white noise etc. be conveyed to sound pick-up outfit, and actual call audio is terminated to recording application, it is of course also possible to will Together with white noise is dubbed with call audio.Above-mentioned interception end is the one end for stealing encryption voice, is moved when having detected to intercept When making, server can be saved true call-information, then send interference sound to interception end, after interception, which acts, to be stopped, The voice messaging of storage is then sent to corresponding terminal again.
Referring to Fig. 6, in the present embodiment, the device of above-mentioned secret telephony further include:
Send blanker unit 34, for when end of conversation after, transmission blanking order to the first terminal and second terminal, Control the first terminal hide calling record, control the second terminal hide answer record.
Display unit 35 is sent, for receiving the first display request of first terminal, according to the first display request hair The first display command is sent, the first terminal is controlled and shows hiding calling record;The second display request of second terminal is received, The second display command is sent according to the second display request, the second terminal is controlled and shows that hides answers record
As above-mentioned transmission blanker unit 34 and transmission display unit 35 can when message registration also needs secrecy By calling record and to answer record and stash, when needing to check, specified password can be inputted and show the call hidden Record.In other embodiments, while hiding talking records, relevant distracter can be shown, such as will on first terminal Second whole title is shown as the name of ancient times poet, will be shown as air time etc. positive and negative infinite etc..
In one embodiment, the process of secret telephony are as follows:
The secret telephony account of code phone can be dialed, be answered to registration on first terminal and second terminal;
Phone directory lists in server traversal registration secret telephony account terminal, search each phone number in phone directory lists Whether code is similarly the above-mentioned account number of registration, if so, being then added to the list of buddies in terminal;
First terminal starts secret telephony program using lock cipher when needing to dial secret telephony, through input, sends Information is dialed to server;
Server is according to dialing the corresponding second terminal of information searching;
Server receives the logon information of the login secret telephony account of second terminal feedback, judges that the logon information is It is no identical as the logon information of secret telephony account of second terminal, if they are the same, then first terminal and second terminal are led to Words connection;
In communication process, first terminal and second terminal can encrypt the voice messaging number of output, corresponding, It is decrypted when receiving voice signal, and encryption rule can generate at random according to time, place, environment etc., decryption rule is right It should generate;When either end is without network signal, the two can be conversed by operator base station;Moreover, server can also be by One terminal and second terminal can carry out second to the voice messaging number of output and encrypt, and further improve the confidentiality of call.
While first terminal is connected to second terminal, recording application on first terminal and second terminal hands-free is answered It is disabled with, bluetooth etc., alternatively, will be preset when there is recording application starting by the terminal where server or recording application Interference sound be conveyed to sound pick-up outfit, while call voice is isolated from recording application;
After having dialed phone, it can choose and hide message registration, it, can be by input eventually when needing to check information The application lock cipher at end is checked through row.
The device of the secret telephony of the embodiment of the present invention, the call between terminal need to log in secret telephony account, voice Information is transferred by corresponding server, and when the terminal to receive calls receives calls, and input is needed to log in secrecy The logon information for account of conversing, is then verified by server, is only proved to be successful, can just be received calls.The present invention is kept away The base station for opening conventional such as connection, movement operator, is conversed by specified server, can effectively improve call Confidentiality, and before call, whether the logon information for needing to verify second terminal feedback correct, if correctly, illustrating the The those who answer of two terminals is the holder of secret telephony account, prevents other people from the owner of second terminal being pretended to be to receive calls, into one Improve the confidentiality of call in step ground.
The above description is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all utilizations Equivalent structure or equivalent flow shift made by description of the invention and accompanying drawing content is applied directly or indirectly in other correlations Technical field, be included within the scope of the present invention.

Claims (8)

1. a kind of method of secret telephony characterized by comprising
Server receives the registration information of first terminal and second terminal, establishes specified secret telephony account respectively;Wherein, institute Stating secret telephony account includes account name, and logon information corresponding with the account name;
It receives first terminal and dials information by what the secret telephony account was sent, be then forwarded to second terminal;
Receive second terminal feedback login secret telephony account logon information, judge the logon information whether with second eventually The logon information of the secret telephony account at end is identical, if they are the same, then first terminal is carried out call with second terminal and connected;
Disabling order is sent to the first terminal and second terminal, the first terminal and second terminal is made to close specified answer With and/or hardware.
2. the method for secret telephony according to claim 1, which is characterized in that the server receives first terminal and the The registration information of two terminals, the step of establishing specified secret telephony account respectively, comprising:
Contacts list on server traversal first terminal, searches that the secrecy is equally established in the contacts list is logical The contact person for talking about account, establishes list of buddies by the first terminal;And the connection in the server traversal second terminal It is list, searches the contact person for equally establishing the secret telephony account in the contacts list, pass through the second terminal Establish list of buddies.
3. the method for secret telephony according to claim 2, which is characterized in that the reception first terminal passes through the guarantor The step of dialing information, be then forwarded to second terminal of close call account transmission, comprising:
Receive the first terminal dials signal;
According to the secret telephony account for dialing signal and searching corresponding second terminal, if not finding second terminal Secret telephony account, then send skip command to first terminal, first terminal made to pass through the base station call institute of mobile operator State second terminal.
4. the method for secret telephony according to claim 1, which is characterized in that the specified application includes recording application And/or hands free applications;The specified hardware includes bluetooth and/or earphone.
5. a kind of device of secret telephony characterized by comprising
Registering unit receives the registration information of first terminal and second terminal for server, and it is logical to establish specified secrecy respectively Talk about account;Wherein, the secret telephony account includes account name, and logon information corresponding with the account name;
Retransmission unit is received, information is dialed by what the secret telephony account was sent for receiving first terminal, then forwards To second terminal;
Judge connection unit, for receiving the logon information for logging in secret telephony account of second terminal feedback, is stepped on described in judgement Whether land information is identical as the logon information of secret telephony account of second terminal, if they are the same, then eventually by first terminal and second End carries out call connection;
Forbidden cell is sent, for sending disabling order to the first terminal and second terminal, makes the first terminal and the Two terminals close specified application and/or hardware.
6. the device of secret telephony according to claim 5, which is characterized in that the registering unit, comprising:
List block is established, for the contacts list on server traversal first terminal, is searched in the contacts list The contact person for equally establishing the secret telephony account establishes list of buddies by the first terminal;And the server The contacts list in second terminal is traversed, the connection for equally establishing the secret telephony account in the contacts list is searched People establishes list of buddies by the second terminal.
7. the device of secret telephony according to claim 6, which is characterized in that the reception retransmission unit, comprising:
Receiving module dials signal for receive the first terminal;
Jump module is searched, the secret telephony account for searching corresponding second terminal according to signal is dialed, such as Fruit does not find the secret telephony account of second terminal, then sends skip command to first terminal, first terminal is made to pass through movement Second terminal described in the base station call of operator.
8. the device of secret telephony according to claim 5, which is characterized in that the specified application includes recording application And/or hands free applications;The specified hardware includes bluetooth and/or earphone.
CN201610857023.3A 2016-09-27 2016-09-27 The method and apparatus of secret telephony Active CN106357940B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610857023.3A CN106357940B (en) 2016-09-27 2016-09-27 The method and apparatus of secret telephony

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610857023.3A CN106357940B (en) 2016-09-27 2016-09-27 The method and apparatus of secret telephony

Publications (2)

Publication Number Publication Date
CN106357940A CN106357940A (en) 2017-01-25
CN106357940B true CN106357940B (en) 2019-04-30

Family

ID=57865424

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610857023.3A Active CN106357940B (en) 2016-09-27 2016-09-27 The method and apparatus of secret telephony

Country Status (1)

Country Link
CN (1) CN106357940B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108882060B (en) * 2018-06-27 2020-10-27 腾讯科技(深圳)有限公司 Mutual dialing method, device and system for public telephone and computer readable storage medium
CN111030965A (en) * 2018-10-09 2020-04-17 青岛海信移动通信技术股份有限公司 Method for transmitting and receiving encrypted data and mobile terminal
CN111131630A (en) * 2019-12-31 2020-05-08 北京金山安全软件有限公司 Incoming call processing method and device, electronic equipment and storage medium
CN117857686B (en) * 2024-02-07 2024-07-19 荣耀终端有限公司 Communication method, communication system and related device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101009886A (en) * 2006-12-25 2007-08-01 北京邮电大学 Implementation scheme for secrecy phone of the smart mobile terminal
CN102045712A (en) * 2011-01-04 2011-05-04 奇智软件(北京)有限公司 Anti-monitoring method and system for mobile terminal
CN104301308A (en) * 2014-09-22 2015-01-21 小米科技有限责任公司 Communication control method and device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8509736B2 (en) * 2002-08-08 2013-08-13 Global Tel*Link Corp. Telecommunication call management and monitoring system with voiceprint verification
CN101060567A (en) * 2007-04-30 2007-10-24 华为技术有限公司 A method, system and its device for realizing the safety answering
CN102104868B (en) * 2009-12-17 2015-04-15 深圳富泰宏精密工业有限公司 Private calling system and method
CN103974241B (en) * 2013-02-05 2018-01-16 东南大学常州研究院 A kind of sound end-to-end encryption method towards android system mobile terminal
CN103354638A (en) * 2013-08-05 2013-10-16 成都林海电子有限责任公司 Android system-based mobile phone encryption server system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101009886A (en) * 2006-12-25 2007-08-01 北京邮电大学 Implementation scheme for secrecy phone of the smart mobile terminal
CN102045712A (en) * 2011-01-04 2011-05-04 奇智软件(北京)有限公司 Anti-monitoring method and system for mobile terminal
CN104301308A (en) * 2014-09-22 2015-01-21 小米科技有限责任公司 Communication control method and device

Also Published As

Publication number Publication date
CN106357940A (en) 2017-01-25

Similar Documents

Publication Publication Date Title
CN106357940B (en) The method and apparatus of secret telephony
US8548432B2 (en) Authenticating voice calls from mobile devices
US9088645B2 (en) Intermediary device initiated caller identification
US6405030B1 (en) System for interception of digital cellular phone communication
US7197297B2 (en) Authentication method for enabling a user of a mobile station to access to private data or services
CN104935758B (en) Method of calling, apparatus and system
CN105472093B (en) Mobile terminal call answers method for authenticating and mobile terminal
KR19990077193A (en) Authentication Key Management in Mobile Communication Systems
US8175580B1 (en) End-to-end secure wireless communication for requesting a more secure channel
CN104660809A (en) Answer management method and device for incoming call of private contact person
US20100177899A1 (en) Encrypted communication system
CN107707723A (en) The hold-up interception method of harassing call
CN106303085B (en) Mobile terminal and method and device for secure call
CN110049062A (en) Verify code check method, device, electronic equipment and storage medium
CN105187672A (en) Incoming call answering method and mobile terminal
US20120289205A1 (en) Apparatus and method for anonymous calls to and from cellular telephones
WO2006007132A2 (en) User transparent registration process for secure communication
CN107466034A (en) A kind of secret communication method and communication system
CN107396348B (en) Call method and device
US20080254762A1 (en) Method and apparatus for call protection over a telephone system
CN106506450B (en) Method and system for secure call
JP2013183404A (en) Communication recording system, mobile telephone terminal, communication recording server, communication recording method and communication recording program
CN111601001A (en) Telephone number storage method, call equipment and call system
CN109561224B (en) Call processing method and call terminal
KR20020072074A (en) Locking system using wireless communication terminal of transmission signal and method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20170804

Address after: 100102, 18 floor, building 2, Wangjing street, Beijing, Chaoyang District, 1801

Applicant after: BEIJING ANYUN SHIJI SCIENCE AND TECHNOLOGY CO., LTD.

Address before: 100088 Beijing city Xicheng District xinjiekouwai Street 28, block D room 112 (Desheng Park)

Applicant before: Beijing Qihu Technology Co., Ltd.

GR01 Patent grant
GR01 Patent grant