CN106506450B - Method and system for secure call - Google Patents

Method and system for secure call Download PDF

Info

Publication number
CN106506450B
CN106506450B CN201610857603.2A CN201610857603A CN106506450B CN 106506450 B CN106506450 B CN 106506450B CN 201610857603 A CN201610857603 A CN 201610857603A CN 106506450 B CN106506450 B CN 106506450B
Authority
CN
China
Prior art keywords
terminal
call
server
called
calling
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610857603.2A
Other languages
Chinese (zh)
Other versions
CN106506450A (en
Inventor
汪伦
康明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Anyun Century Technology Co Ltd
Original Assignee
Beijing Anyun Century Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Anyun Century Technology Co Ltd filed Critical Beijing Anyun Century Technology Co Ltd
Priority to CN201610857603.2A priority Critical patent/CN106506450B/en
Publication of CN106506450A publication Critical patent/CN106506450A/en
Application granted granted Critical
Publication of CN106506450B publication Critical patent/CN106506450B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method and a system for keeping a secret for communication, wherein the method comprises the following steps: the method comprises the steps that a server receives registration information sent by a terminal and establishes an account corresponding to the terminal, wherein the terminal comprises a calling terminal or a called terminal; traversing a contact list on the terminal, searching contacts which also establish the account in the contact list, establishing a buddy list and sending the buddy list to the terminal; during communication, receiving a communication request sent by a calling terminal for logging in the account and selecting a contact in the buddy list; after receiving the call request, sending the call request to a called terminal corresponding to the contact person, and establishing call connection between the calling terminal and the called terminal; and receiving the encrypted voice information sent by the calling terminal and the called terminal, and forwarding the encrypted voice information to the other party. The method and the system for keeping the call secret improve the call security between the terminals and effectively prevent other people from intercepting the call content between the called terminal and the calling terminal.

Description

Method and system for secure call
Technical Field
The invention relates to the field of secure communication, in particular to a method and a system for secure communication.
Background
When a voice call is carried out through a mobile phone or other terminals, private contents are often involved, and are not allowed to be known by others, especially people such as government personnel and business personnel, and the call contents may include government secrets, business secrets and the like. Therefore, the problem to be solved is to ensure that the content of the call is not intercepted by others.
Disclosure of Invention
The invention mainly aims to provide a method and a system for improving the security of the conversation between terminals.
In order to achieve the above object, the present invention provides a method for securing a call, comprising:
a terminal sends registration information to a server and establishes an account appointed by the server, wherein the terminal comprises a calling terminal or a called terminal;
the server traverses a contact list on the terminal, searches contacts which also establish the account in the contact list, establishes a buddy list and sends the buddy list to the terminal;
when in call, the calling terminal logs in the account to select the contact in the buddy list and sends a call request;
after receiving the call request, the server sends the call request to a called terminal corresponding to the contact person; after the called end receives the request, the calling end and the called end establish a call connection through the server;
and the calling terminal and the called terminal respectively send the encrypted voice information to the server and forward the encrypted voice information to the other party through the server, wherein the calling terminal and the called terminal which are in mutual communication respectively decrypt the received encrypted voice information.
Further, after receiving the call request, the server sends the call request to a called terminal corresponding to the contact; after the called terminal receives the request, the step of establishing the call connection between the calling terminal and the called terminal through the server includes:
after receiving the call request, the server sends the call request to a called terminal corresponding to the contact person;
if the server receives the feedback information of the called terminal, the calling terminal and the called terminal are connected in a call;
and if the feedback information of the called terminal is not received, sending a skip command to the calling terminal, so that the calling terminal calls the called terminal through a base station of a mobile operator.
Further, after receiving the call request, the server sends the call request to a called terminal corresponding to the contact; after the called terminal receives the request, the step of establishing a call connection between the calling terminal and the called terminal through the server includes:
and the calling terminal and the called terminal both automatically close the appointed application and/or hardware.
Further, the specified application includes a recording application and/or a hands-free application; the designated hardware includes bluetooth and/or a headset.
Further, the method for the terminal to log in the account includes:
associating the application lock password of the terminal with the login password of the account;
and logging in the account corresponding to the terminal by inputting the application lock password.
Further, after receiving the call request, the server sends the call request to a called terminal corresponding to the contact; after the called terminal receives the request, the step of establishing a call connection between the calling terminal and the called terminal through the server includes:
when any one of the calling terminal or the called terminal starts the recording application, inputting preset interference sound into the recording application.
Further, after receiving the call request, the server sends the call request to a called terminal corresponding to the contact; after the called terminal receives the request, the step of establishing a call connection between the calling terminal and the called terminal through the server includes:
and when the server detects that the encrypted voice information is intercepted, the server sends interference sound to the intercepting end.
Further, after the steps that the calling terminal and the called terminal respectively send the encrypted voice information to the server and forward the encrypted voice information to the other party through the server, the method comprises the following steps:
and after the call is finished, the terminal hides the call record.
Further, after the step of hiding the call record by the terminal after the call is ended, the method includes:
and the terminal inputs a specified password to display the hidden call record.
The invention provides a system for securing a call, comprising:
the registration device is used for receiving registration information sent by a terminal by a server and establishing an account corresponding to the terminal, wherein the terminal comprises a calling terminal or a called terminal;
the establishing device is used for traversing a contact list on the terminal, searching contacts which establish the account in the contact list, establishing a buddy list and sending the buddy list to the terminal;
the request device is used for receiving a call request sent by the calling terminal for logging in the account and selecting the contact in the buddy list;
the forwarding device is used for sending the call request to a called terminal corresponding to the contact person after receiving the call request, and establishing the call connection between the calling terminal and the called terminal;
and the secrecy device is used for receiving the encrypted voice information sent by the calling end and the called end and forwarding the encrypted voice information to the other side, wherein the calling end and the called end which are communicated with each other respectively decrypt the received encrypted voice information.
Further, the forwarding apparatus includes:
the selective calling unit is used for sending the call request to a called terminal corresponding to the contact person and waiting for feedback information of the called terminal; if receiving the feedback information of the called terminal, connecting the calling terminal and the called terminal in a call; and if the feedback information of the called terminal is not received, sending a skip command to the calling terminal, so that the calling terminal calls the called terminal through a base station of a mobile operator.
Further, the system for securing the call further comprises:
and the disabling device is used for closing the specified application and/or hardware through the calling terminal and the called terminal.
Further, the specified application includes a recording application and/or a hands-free application; the designated hardware includes bluetooth and/or a headset.
Further, the system for securing the call further comprises:
the login device is used for associating the application lock password of the terminal with the login password of the account; and logging in the account corresponding to the terminal by inputting the application lock password.
Further, the system for securing the call further comprises:
the first interference device is used for inputting preset interference sound to the recording application when any one terminal of the calling terminal or the called terminal starts the recording application.
Further, the system for securing the call further comprises:
and the second interference device is used for sending interference sound to the interception end when detecting that the encrypted voice information is intercepted.
Further, the system for securing the call further comprises:
and the hiding device is used for hiding the call record through the terminal after the call is finished.
Further, the system for securing the call further comprises:
and the display device is used for displaying the hidden call records by inputting the specified password through the terminal.
The invention relates to a method and a system for keeping a secret communication, wherein a plurality of communication terminals send encrypted voice information to a server and then respectively transmit the encrypted voice information to corresponding terminals through the server, thereby greatly improving the communication safety between the terminals and effectively preventing other people from intercepting the communication content between a called terminal and a calling terminal. On the basis, the conversation safety is further improved by closing the relevant application and hardware of the terminal. When the related application such as the recording application is opened, interference sound can be provided, and the safety of the call is further improved.
Drawings
FIG. 1 is a flow chart illustrating a method for securing a call according to an embodiment of the present invention;
fig. 2 is a schematic flow chart illustrating a process of establishing a call connection between a calling terminal and a called terminal according to an embodiment of the present invention;
FIG. 3 is a block diagram illustrating a secure session system according to an embodiment of the present invention;
fig. 4 is a schematic block diagram of a forwarding device according to an embodiment of the present invention;
FIG. 5 is a block diagram of a system for securing a call according to an embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. As used herein, the term "and/or" includes all or any element and all combinations of one or more of the associated listed items.
It will be understood by those skilled in the art that, unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the prior art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
As will be understood by those skilled in the art, the terminal herein refers to an electronic device such as a smart phone, a computer, a tablet computer, etc.
Referring to fig. 1, an embodiment of the present invention provides a method for securing a call, including:
s1, the server receives the registration information sent by the terminal and establishes the account corresponding to the terminal, wherein the terminal comprises a calling terminal or a called terminal;
s2, traversing the contact list on the terminal, searching the contacts which also establish the account in the contact list, establishing a buddy list and sending the buddy list to the terminal;
s3, receiving a call request sent by the calling terminal to log in the account to select the contact in the buddy list during the call;
s4, after receiving the call request, sending the call request to a called terminal corresponding to the contact person, and establishing the call connection between the calling terminal and the called terminal;
and S5, receiving the encrypted voice information sent by the calling terminal and the called terminal, and forwarding the encrypted voice information to the other terminal, wherein the calling terminal and the called terminal which are in mutual communication respectively decrypt the received encrypted voice information.
As described in the above steps S1 to S5, the terminals refer to two or more terminals, the terminal initiating the call is the calling terminal, and the terminal called is the called terminal. The server is also called a server, and is a device that provides computing services. Since the server needs to respond to and process the service request, the server generally has the capability of assuming and securing the service. The server comprises a cloud server, and the cloud server is a computing service cloud service which is simple, efficient, safe and reliable and has elastically-stretchable processing capacity.
The terminal is provided with an application for secret communication, the application needs to log in when in use, and an account needs to be established when logging in. The account is generally established by using a telephone number, a qq number and the like, and then, a verification code and the like are sent to the terminal through the server to carry out terminal login authority. In this embodiment, the terminal may connect to the server for secure communication only after the account is registered, and it is noted that generally only the calling terminal needs to log in, but the called terminal does not need to input a password for logging in, and the secure communication application may be directly started, and of course, the called terminal may also input a login password first to make a call. In this embodiment, when logging in to the account for the first time, the terminal needs to log in by using the verification code provided by the mobile phone short message, and when logging in subsequently, only the application lock password on the terminal needs to be input, and the input modes include various input modes, such as inputting a specified password, a pattern, fingerprint authentication, iris authentication and the like.
The contact list generally refers to a phone book contact on the terminal, and because the registered account needs to be subjected to mobile phone short message verification and the like, the account is consistent with the phone number of the terminal, or the account number is associated with the phone number of the terminal. Traversing all telephone numbers in the contact list or mobile phone numbers associated with the account, comparing one by one, and if a certain number is a registered account, adding the number into a buddy list of the terminal, wherein the buddy list is a list capable of making a secret call with each other. When a secret communication is needed, the called terminal number is directly searched in the buddy list.
The voice information received by the server is encrypted, namely the calling end and the called end encrypt the sent voice information, and a decryption program for decrypting the voice information sent by other terminals is set. In the encryption and decryption processes of each terminal, the terminal is not invariable, encryption and decryption can be carried out according to preset encryption and decryption strategies, so that the encryption rules and the decryption rules corresponding to the encryption rules are different when the terminals are communicated with each other every time, and the confidentiality of the communication is improved. For example, the terminal includes a calling terminal or a called terminal, the calling terminal may generate an encryption rule according to time, location, environment, and the like, the encryption rule is sent to the called terminal through the server, the called terminal generates a corresponding decryption rule according to the encryption rule, and simultaneously generates an encryption rule of the called terminal according to the time, the location, the environment, and the like, and then informs the calling terminal through the server, and the calling terminal generates a corresponding decryption rule. After the calling terminal or the called terminal generates the corresponding encryption and decryption rules, the call is started, and the call information is transferred through the server.
Referring to fig. 2, in this embodiment, the step S4 of sending the call request to the called end corresponding to the contact after receiving the call request, and establishing a call connection between the calling end and the called end includes:
s41, sending the call request to a called terminal corresponding to the contact person, and waiting for feedback information of the called terminal;
s42, if the feedback information of the called terminal is received, the calling terminal and the called terminal are connected in a communication way;
and S43, if the feedback information of the called terminal is not received, sending a skip command to the calling terminal, so that the calling terminal calls the called terminal through the base station of the mobile operator.
As described in the above steps S41 to S43, the calling end first sends a call request to the server, and then sends the call request to the called end through the server, and when the called end is in the network, the call request may be received, and then sends feedback information to the server, so that the server knows that the calling end and the called end are both in the network, and normal call can be performed, and if the called end is not in the network, it indicates that the calling end cannot connect to the called end through the server, i.e. a confidential call cannot be performed between the calling end and the called end. At this time, when the calling terminal needs to contact the called terminal, the server sends a skip command to the calling terminal, so that the calling terminal skips to a common telephone mode from the application of the secret communication, and is connected with the called terminal for communication through a base station of an operator such as mobile and internet. In other embodiments, when one of the calling terminal and the called terminal cannot connect to the network, the secure call cannot be performed, and the calling terminal and the called terminal are connected to the called terminal through the base station of the mobile, internet, or other operators to perform the call.
In this embodiment, after the step S4 of sending the call request to the called end corresponding to the contact after receiving the call request, and establishing a call connection between the calling end and the called end, the method includes:
s401, closing designated applications and/or hardwares through the calling terminal and the called terminal, wherein the designated applications comprise a recording application and/or a hands-free application; the designated hardware includes bluetooth and/or a headset.
As described in step S401, before or during a call, applications such as a recording application and a handsfree application on the calling end or the called end are turned off, and hardware devices such as bluetooth and an earphone are disabled, a user does not trigger an operation button for switching a voice channel, and the voice is defaulted on the receiver, and the application of switching the voice channel is disabled to prevent a call voice from being recorded and eavesdropped, so as to further improve the security of the call. In this embodiment, in order to further improve the security of the user, the voice of the two parties during the call may be subjected to a sound change process, such as a change of male voice and female voice, a change of tone color, etc., and the sound change process may be changed by the server or may be changed on the terminal.
In this embodiment, after the step S4 of sending the call request to the called end corresponding to the contact after receiving the call request, and establishing a call connection between the calling end and the called end, the method includes:
s402, when any one terminal of a calling terminal or a called terminal starts a recording application, inputting a preset interference sound into the recording application;
and S403, when the encrypted voice information is intercepted, sending interference sound to the intercepting end.
As described in the above steps S402 and S403, when the recording application is started by any one of the calling terminal and the called terminal before or during the call, the server may transmit the preset interference sound to the recording application, or directly transmit the interference sound preset in the corresponding terminal to the recording application, that is, provide the recording application with a false recording. For example, when the calling terminal or the called terminal makes a call, the called terminal starts the recording application, and then the called terminal transmits preset false recordings such as three hundred poems, songs, white noise and the like to the recording device, while the actual call audio is isolated from the recording application, and certainly, the white noise and the call audio can also be mixed and recorded together. The intercepting end is the end which steals the encrypted voice, when the server detects that the intercepting action exists, real call information is stored through the server, interference sound is sent to the intercepting end, and after the intercepting action stops, the stored voice information is sent to the corresponding terminal again through the server.
In this embodiment, the method for the terminal to log in the account includes the steps of:
s31, associating the application lock password of the terminal with the login password of the account;
s32, logging in the account corresponding to the terminal by inputting the application lock password
As described in the above steps S31 and S32, after the terminal has registered an account, when logging in or the terminal is replaced for the first time, the terminal can log in only after being authenticated by a short message, and after logging in once, the terminal can directly call an application lock password set by the terminal to log in the account, which is convenient and safe. In a specific embodiment, when a secure call needs to be dialed, an account is logged in by applying a lock password, then a number to be dialed is searched through a buddy list, a secure call is carried out, and a called terminal also needs to input the account number logged in by applying the lock password when answering. In other embodiments, when the called terminal receives the call information, the process of inputting the application lock can be skipped to log in the corresponding account, so that the convenience of answering the call by the called terminal is improved.
In this embodiment, after the step S5 of receiving the encrypted voice information sent by the calling end and the called end and forwarding the encrypted voice information to the other party, the method includes:
and S6, hiding the call record through the terminal after the call is finished.
After S6, the step of hiding the call record by the terminal after the call is ended includes:
and S7, the terminal inputs a designated password to display the hidden call record.
As mentioned above in steps S6 and S7, the call log can be hidden under the same condition that the call log needs to be kept secret, and when the call log needs to be checked, a designated password can be input to display the hidden call log. In other embodiments, while hiding the call record, the related interference items may be displayed, such as displaying the name of the called end as the name of an ancient poetry on the calling end, displaying the call time and the like as positive, negative and infinite.
In one embodiment, the process of secure calling is:
registering an account capable of dialing a secret telephone on the terminal;
the server traverses the phone book list on the user terminal, searches whether each phone number in the phone book list is the same registered account number, and if yes, adds the phone number to the buddy list on the terminal;
when the secret communication needs to be dialed, starting a secret communication program by inputting an application lock password, and sending dialing information to a server;
the server searches a called terminal corresponding to the dialing information according to the dialing information, and the calling terminal and the called terminal are communicated with each other for conversation, wherein the calling terminal or the called terminal encrypts an output voice information number and correspondingly decrypts the output voice information number when receiving a voice signal, an encryption rule is randomly generated according to time, place, environment and the like, and a decryption rule is correspondingly generated; when any end has no network signal, the two ends can communicate through the operator base station;
when the two are communicated, the recording application, the hands-free application, the Bluetooth and the like on the calling end or the called end are forbidden, or when the recording application is started, a preset interference sound is transmitted to the recording equipment through a server or a terminal where the recording application is located, and meanwhile, the conversation voice is isolated from the recording application; when the server detects that the encrypted voice information is intercepted, sending interference sound to an intercepting end through the server;
after the call is dialed, the call record can be hidden, and when the information needs to be checked, the application lock password of the input terminal can be checked.
The method for keeping the call secret of the invention has the advantages that the calling terminal or the called terminal sends the encrypted voice information to the server and then respectively forwards the encrypted voice information to the corresponding called terminal and the calling terminal through the server, thereby greatly improving the call security between the calling terminal and the called terminal and effectively preventing other people from intercepting the call content between the called terminal and the calling terminal. On the basis, the conversation safety is further improved by closing the relevant application and hardware of the terminal. When the related application such as the recording application is opened, interference sound can be provided, and the safety of the call is further improved.
Referring to fig. 3, an embodiment of the present invention further provides a system for securing a call, including:
the system comprises a registration device 10, a server and a server, wherein the registration device is used for sending registration information to the server through a terminal and establishing an account appointed by the server, and the terminal comprises a calling terminal or a called terminal;
the establishing device 20 is configured to traverse a contact list on the terminal through the server, search for a contact in the contact list that also establishes the account, establish a buddy list, and send the buddy list to the terminal;
a requesting device 30, configured to log in the account through the calling terminal to select a contact in the buddy list and send a call request;
the forwarding device 40 is configured to send the call request to a called end corresponding to the contact after receiving the call request through the server; after the called end receives the request, the calling end and the called end establish a call connection through the server;
and the security device 50 is used for respectively sending the encrypted voice information to the server through the calling terminal and the called terminal and forwarding the encrypted voice information to the opposite side through the server, wherein the calling terminal and the called terminal which are in mutual communication respectively decrypt the received encrypted voice information.
In this embodiment, the terminals refer to two or more terminals, where the terminal initiating the call is a calling terminal and the terminal called is a called terminal. The server is also called a server, and is a device that provides computing services. Since the server needs to respond to and process the service request, the server generally has the capability of assuming and securing the service. The server comprises a cloud server, and the cloud server is a computing service cloud service which is simple, efficient, safe and reliable and has elastically-stretchable processing capacity.
The terminal is provided with an application for secret communication, the application needs to log in when in use, and an account needs to be established when logging in. The account is generally established by using a telephone number, a qq number and the like, and then, a verification code and the like are sent to the terminal through the server to carry out terminal login authority. In this embodiment, the terminal may connect to the server for secure communication only after the account is registered, and it is noted that generally only the calling terminal needs to log in, but the called terminal does not need to input a password for logging in, and the secure communication application may be directly started, and of course, the called terminal may also input a login password first to make a call. In this embodiment, when logging in to the account for the first time, the terminal needs to log in by using the verification code provided by the mobile phone short message, and when logging in subsequently, only the application lock password on the terminal needs to be input, and the input modes include various input modes, such as inputting a specified password, a pattern, fingerprint authentication, iris authentication and the like.
The contact list generally refers to a phone book contact on the terminal, and because the registered account needs to be subjected to mobile phone short message verification and the like, the account is consistent with the phone number of the terminal, or the account number is associated with the phone number of the terminal. Traversing all telephone numbers in the contact list or mobile phone numbers associated with the account, comparing one by one, and if a certain number is a registered account, adding the number into a buddy list of the terminal, wherein the buddy list is a list capable of making a secret call with each other. When a secret communication is needed, the called terminal number is directly searched in the buddy list.
The voice information received by the server is encrypted, namely the calling end and the called end encrypt the sent voice information, and a decryption program for decrypting the voice information sent by other terminals is set. In the encryption and decryption processes of each terminal, the terminal is not invariable, encryption and decryption can be carried out according to preset encryption and decryption strategies, so that the encryption rules and the decryption rules corresponding to the encryption rules are different when the terminals are communicated with each other every time, and the confidentiality of the communication is improved. For example, the terminal includes a calling terminal or a called terminal, the calling terminal may generate an encryption rule according to time, location, environment, and the like, the encryption rule is sent to the called terminal through the server, the called terminal generates a corresponding decryption rule according to the encryption rule, and simultaneously generates an encryption rule of the called terminal according to the time, the location, the environment, and the like, and then informs the calling terminal through the server, and the calling terminal generates a corresponding decryption rule. After the calling terminal or the called terminal generates the corresponding encryption and decryption rules, the call is started, and the call information is transferred through the server.
Referring to fig. 4, in this embodiment, the forwarding device includes:
the selective call unit 41 is configured to send the call request to a called end corresponding to the contact, and wait for feedback information of the called end; if receiving the feedback information of the called terminal, connecting the calling terminal and the called terminal in a call; and if the feedback information of the called terminal is not received, sending a skip command to the calling terminal, so that the calling terminal calls the called terminal through a base station of a mobile operator.
As the selective call device 41, the calling terminal first sends a call request to the server, and then sends the call request to the called terminal through the server, when the called terminal is in the network, the call request may be received, and then sends feedback information to the server, so that the server knows that the calling terminal and the called terminal are both in the network, and can perform normal call, and if the called terminal is not in the network, it indicates that the calling terminal cannot connect to the called terminal through the server, i.e. the secret call cannot be performed between the calling terminal and the called terminal. At this time, when the calling terminal needs to contact the called terminal, the server sends a skip command to the calling terminal, so that the calling terminal skips to a common telephone mode from the application of the secret communication, and is connected with the called terminal for communication through a base station of an operator such as mobile and internet. In other embodiments, when one of the calling terminal and the called terminal cannot connect to the network, the secure call cannot be performed, and the calling terminal and the called terminal are connected to the called terminal through the base station of the mobile, internet, or other operators to perform the call.
Referring to fig. 5, in this embodiment, the system for securing a call further includes:
disabling means 401 for closing the designated application and/or hardware by the calling terminal and the called terminal; wherein the designated application comprises a recording application and/or a hands-free application; the designated hardware includes bluetooth and/or a headset.
As the disabling device 401, before or during a call, applications such as a recording application and a handsfree application on a calling end or a called end are turned off, and hardware devices such as bluetooth and an earphone are disabled, a user does not trigger an operation button for switching a voice channel, and the voice is defaulted on an earphone, and the application is prohibited to switch the voice channel to prevent a call voice from being recorded and eavesdropped, so that the security of the call is further improved. In this embodiment, in order to further improve the security of the user, the voice of the two parties during the call may be subjected to a sound change process, such as a change of male voice and female voice, a change of tone color, etc., and the sound change process may be changed by the server or may be changed on the terminal.
Referring to fig. 5, in this embodiment, the system for securing a call further includes:
a first interference device 402, configured to input a preset interference sound to a recording application when any one of the calling terminal and the called terminal starts the recording application;
and a second interference device 403, configured to send an interference sound to the interception terminal when detecting that the encrypted voice information is intercepted.
As described above, when the first interfering device 402 and the second interfering device 403 are in a call or before the call, and any one of the calling terminal and the called terminal opens the recording application, a preset interfering sound may be transmitted to the recording application through the server, or the interfering sound preset in the corresponding terminal may be directly transmitted to the recording application, that is, the recording application is provided with a pseudo recording. For example, when the calling terminal or the called terminal makes a call, the called terminal starts the recording application, and then the called terminal transmits preset false recordings such as three hundred poems, songs, white noise and the like to the recording device, while the actual call audio is isolated from the recording application, and certainly, the white noise and the call audio can also be mixed and recorded together. The intercepting end is the end which steals the encrypted voice, when the server detects that the intercepting action exists, real call information is stored through the server, interference sound is sent to the intercepting end, and after the intercepting action stops, the stored voice information is sent to the corresponding terminal again through the server.
Referring to fig. 5, in this embodiment, the system for securing a call further includes:
the login device 31 is used for associating the application lock password of the terminal with the login password of the account; and logging in the account corresponding to the terminal by inputting the application lock password.
According to the login device 31, after the terminal registers the account, the user can log in the account only after the user needs to verify the mobile phone short message when logging in or replacing the terminal for the first time, and after logging in once, the user can directly call the application lock password set by the terminal to log in the account, so that the user is convenient and safe. In a specific embodiment, when a secure call needs to be dialed, an account is logged in by applying a lock password, then a number to be dialed is searched through a buddy list, a secure call is carried out, and a called terminal also needs to input the account number logged in by applying the lock password when answering. In other embodiments, when the called terminal receives the call information, the process of inputting the application lock can be skipped to log in the corresponding account, so that the convenience of answering the call by the called terminal is improved.
Referring to fig. 5, in this embodiment, the system for securing a call further includes:
a hiding device 60, configured to hide the call record through the terminal after the call is ended;
and a display device 70 for displaying the hidden call record by inputting a designated password through the terminal.
As mentioned above, the hiding device 60 and the displaying device 70 can hide the dialing record and the answering record under the condition that the call records also need to be kept secret, and can input a designated password to display the hidden call records when needing to be checked. In other embodiments, while hiding the call record, the related interference items may be displayed, such as displaying the name of the called end as the name of an ancient poetry on the calling end, displaying the call time and the like as positive, negative and infinite.
In one embodiment, the process of secure calling is:
registering an account capable of dialing a secret telephone on the terminal;
the server traverses the phone book list on the user terminal, searches whether each phone number in the phone book list is the same registered account number, and if yes, adds the phone number to the buddy list on the terminal;
when the secret communication needs to be dialed, starting a secret communication program by inputting an application lock password, and sending dialing information to a server;
the server searches a called terminal corresponding to the dialing information according to the dialing information, and the calling terminal and the called terminal are communicated with each other for conversation, wherein the calling terminal or the called terminal encrypts an output voice information number and correspondingly decrypts the output voice information number when receiving a voice signal, an encryption rule is randomly generated according to time, place, environment and the like, and a decryption rule is correspondingly generated; when any end has no network signal, the two ends can communicate through the operator base station;
when the two are communicated, the recording application, the hands-free application, the Bluetooth and the like on the calling end or the called end are forbidden, or when the recording application is started, a preset interference sound is transmitted to the recording equipment through a server or a terminal where the recording application is located, and meanwhile, the conversation voice is isolated from the recording application; when the server detects that the encrypted voice information is intercepted, sending interference sound to an intercepting end through the server;
after the call is dialed, the call record can be hidden, and when the information needs to be checked, the application lock password of the input terminal can be checked.
The system for keeping the call secret of the invention has the advantages that the calling terminal or the called terminal sends the encrypted voice information to the server and then respectively forwards the encrypted voice information to the corresponding called terminal and the calling terminal through the server, thereby greatly improving the call security between the calling terminal and the called terminal and effectively preventing other people from intercepting the call content between the called terminal and the calling terminal. On the basis, the conversation safety is further improved by closing the relevant application and hardware of the terminal. When the related application such as the recording application is opened, interference sound can be provided, and the safety of the call is further improved.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (6)

1. A method for securing a call, comprising:
the method comprises the steps that a server receives registration information sent by a terminal and establishes an account corresponding to the terminal, wherein the terminal comprises a calling terminal or a called terminal;
the server traverses the contact list on the terminal, searches for the contact who also establishes the account in the contact list, establishes a buddy list and sends the buddy list to the terminal;
during communication, the server receives a communication request sent by a contact person in the buddy list selected by the calling party logging in the account;
after receiving the call request, the server sends the call request to a called terminal corresponding to the contact person, and establishes call connection between the calling terminal and the called terminal;
closing the appointed application and/or hardware through the calling terminal and the called terminal;
the specified application comprises a recording application and/or a hands-free application; the designated hardware comprises Bluetooth and/or a headset;
the server receives the encrypted voice information sent by the calling terminal and the called terminal and forwards the encrypted voice information to the other side, wherein the calling terminal and the called terminal which are in mutual communication respectively decrypt the received encrypted voice information;
when the terminal starts the recording application, the terminal inputs preset interference sound to the recording application; when the server detects that the encrypted voice information is intercepted, the server stores the real call information and sends interference sound to an intercepting end;
and after the interception action is stopped, the server sends the stored voice information to the corresponding terminal again.
2. The method for securing the call as claimed in claim 1, wherein the step of sending the call request to the called end corresponding to the contact after receiving the call request, and establishing the call connection between the calling end and the called end comprises:
sending the call request to a called terminal corresponding to the contact person, and waiting for feedback information of the called terminal;
if receiving the feedback information of the called terminal, connecting the calling terminal and the called terminal in a call;
and if the feedback information of the called terminal is not received, sending a skip command to the calling terminal, so that the calling terminal calls the called terminal through a base station of a mobile operator.
3. A method of securing a call as claimed in claim 1, wherein the method of the terminal logging into the account comprises:
associating the application lock password of the terminal with the login password of the account;
and logging in the account corresponding to the terminal by inputting the application lock password.
4. A system for securing a call, comprising:
the system comprises a registration device, a server and a server, wherein the registration device is used for sending registration information to the server through a terminal and establishing an account appointed by the server, and the terminal comprises a calling terminal or a called terminal;
the establishing device is used for traversing a contact list on the terminal through the server, searching contacts which also establish the account in the contact list, establishing a buddy list and sending the buddy list to the terminal;
the request device is used for logging in the account through the calling terminal to select the contact in the buddy list and sending a call request when a call is made;
the forwarding device is used for sending the call request to a called terminal corresponding to the contact person after receiving the call request through the server; after the called end receives the request, the calling end and the called end establish a call connection through the server;
the disabling device is used for automatically closing the appointed application and/or hardware through the calling terminal or the called terminal;
the specified application comprises a recording application and/or a hands-free application; the designated hardware comprises Bluetooth and/or a headset;
the secrecy device is used for respectively sending encrypted voice information to the server through the calling end and the called end and forwarding the encrypted voice information to the opposite side through the server, wherein the calling end and the called end which are in mutual communication respectively decrypt the received encrypted voice information;
the first interference device is used for inputting preset interference sound to the recording application by the terminal when the recording application is started by the terminal;
the second interference device is used for storing real call information through the server and sending interference sound to the interception end when the server detects that the encrypted voice information is intercepted; and after the interception action is stopped, the server sends the stored voice information to the corresponding terminal again.
5. The system for securing a call as claimed in claim 4, wherein said forwarding means comprises:
the selective calling unit is used for sending the call request to a called terminal corresponding to the contact person after receiving the call request through the server; if the server receives the feedback information of the called terminal, the calling terminal or the called terminal is connected in a call; and if the feedback information of the called terminal is not received, sending a skip command to the calling terminal, so that the calling terminal calls the called terminal through a base station of a mobile operator.
6. The system for securing a call as claimed in claim 4, further comprising:
the login device is used for associating the application lock password of the terminal with the login password of the account; and logging in the account corresponding to the terminal by inputting the application lock password.
CN201610857603.2A 2016-09-27 2016-09-27 Method and system for secure call Active CN106506450B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610857603.2A CN106506450B (en) 2016-09-27 2016-09-27 Method and system for secure call

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610857603.2A CN106506450B (en) 2016-09-27 2016-09-27 Method and system for secure call

Publications (2)

Publication Number Publication Date
CN106506450A CN106506450A (en) 2017-03-15
CN106506450B true CN106506450B (en) 2020-01-21

Family

ID=58291247

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610857603.2A Active CN106506450B (en) 2016-09-27 2016-09-27 Method and system for secure call

Country Status (1)

Country Link
CN (1) CN106506450B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106453316B (en) * 2016-10-14 2019-05-07 北京小米移动软件有限公司 A kind of audio communication method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100407863C (en) * 2004-12-23 2008-07-30 华为技术有限公司 Method for implementing function of keeping secret of scene
CN102045712A (en) * 2011-01-04 2011-05-04 奇智软件(北京)有限公司 Anti-monitoring method and system for mobile terminal
CN102955904A (en) * 2011-08-18 2013-03-06 网秦无限(北京)科技有限公司 Method and system for preventing secret divulgation of mobile communication equipment
CN103974241A (en) * 2013-02-05 2014-08-06 东南大学常州研究院 Voice end-to-end encryption method aiming at mobile terminal with Android system
CN104301308A (en) * 2014-09-22 2015-01-21 小米科技有限责任公司 Communication control method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8509736B2 (en) * 2002-08-08 2013-08-13 Global Tel*Link Corp. Telecommunication call management and monitoring system with voiceprint verification

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100407863C (en) * 2004-12-23 2008-07-30 华为技术有限公司 Method for implementing function of keeping secret of scene
CN102045712A (en) * 2011-01-04 2011-05-04 奇智软件(北京)有限公司 Anti-monitoring method and system for mobile terminal
CN102955904A (en) * 2011-08-18 2013-03-06 网秦无限(北京)科技有限公司 Method and system for preventing secret divulgation of mobile communication equipment
CN103974241A (en) * 2013-02-05 2014-08-06 东南大学常州研究院 Voice end-to-end encryption method aiming at mobile terminal with Android system
CN104301308A (en) * 2014-09-22 2015-01-21 小米科技有限责任公司 Communication control method and device

Also Published As

Publication number Publication date
CN106506450A (en) 2017-03-15

Similar Documents

Publication Publication Date Title
CN106164922B (en) Self-organizing one-time pairing of remote devices using online audio fingerprinting
US8548432B2 (en) Authenticating voice calls from mobile devices
US8824684B2 (en) Dynamic, selective obfuscation of information for multi-party transmission
CN103401949B (en) A kind of system and method shared for the personal data safety of mobile phone
CN104935758A (en) Calling method, calling device and system
CN104935432A (en) Multiparty communication calling method, multiparty communication calling device, server and system
CN102202299A (en) Realization method of end-to-end voice encryption system based on 3G/B3G
US20100177899A1 (en) Encrypted communication system
CN106357940B (en) The method and apparatus of secret telephony
JP2006217446A (en) Remote conference system
CN106303085B (en) Mobile terminal and method and device for secure call
CN107294968B (en) Audio and video data monitoring method and system
CN103166962A (en) Method for safely calling session initiation protocol (SIP) terminal based on bound number authentication mechanism
CN104735651B (en) A kind of method, system and device of securely communicating data
CN108540591B (en) Address book management method, address book management device and electronic equipment
CN106506450B (en) Method and system for secure call
CN102113301B (en) Access management for connection-accompanying data of telecommunication connections
CN102811430A (en) Realization method and system of call forwarding
CN105792203A (en) Method and system for distinguishing authenticity through data channel and authenticating data through voice channel
CN106332011B (en) Short message encryption communication method and terminal
CN105430150B (en) Method and device for realizing safe call
US20060003737A1 (en) User transparent registration process for secure communication
SK500542015U1 (en) System for secure transmission of voice communication via the communication network and method for secure transmission of voice communication
CN110933016B (en) Login authentication method and device for call center system
CN114760625B (en) Encryption call method, device and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20170801

Address after: 100102, 18 floor, building 2, Wangjing street, Beijing, Chaoyang District, 1801

Applicant after: BEIJING ANYUN SHIJI SCIENCE AND TECHNOLOGY CO., LTD.

Address before: 100088 Beijing city Xicheng District xinjiekouwai Street 28, block D room 112 (Desheng Park)

Applicant before: Beijing Qihu Technology Co., Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant