CN107872792A - A kind of method, equipment and the system of encryption of conversing - Google Patents
A kind of method, equipment and the system of encryption of conversing Download PDFInfo
- Publication number
- CN107872792A CN107872792A CN201610848797.XA CN201610848797A CN107872792A CN 107872792 A CN107872792 A CN 107872792A CN 201610848797 A CN201610848797 A CN 201610848797A CN 107872792 A CN107872792 A CN 107872792A
- Authority
- CN
- China
- Prior art keywords
- key
- terminal
- sent
- encryption
- call
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
- H04W4/14—Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
Abstract
The embodiment of the invention discloses a kind of method, equipment and the system of encryption of conversing, this method mainly includes:Key distribution center receives the encryption key distribution request message sent from calling terminal;Wherein, the first identification code of calling terminal and the second identification code of terminal called are carried in the encryption key distribution request message;The key distribution center obtains call key, and first key and the second key according to corresponding to first identification code and the second identification code of reception obtain respectively;The key distribution center call key is encrypted the 3rd key corresponding to acquisition using the first key, and the 4th key corresponding to acquisition is encrypted to the call key using second key;The 3rd key of acquisition is sent to the calling terminal by the key distribution center, and the 4th key of acquisition is sent into the terminal called.
Description
Technical field
The present invention relates to the communications field, more particularly to a kind of method, equipment and the system of encryption of conversing.
Background technology
The fast development of the communication technology so that the communication of the terminal such as mobile phone turns into one essential in work and life
Point;But while terminal communication brings many convenient, the potential danger that Content of Communication is ravesdropping also is brought therewith
Danger.Especially after Snowdon " prism door " event, all more pay attention to the security of terminal communication from government organs to commercial field.
Existing terminal communication encryption technology is mainly based upon what the terminal being in communication with each other was carried out, i.e.,:Terminal A produces random
Number, that is, key of conversing, and the negotiation request for carrying call key is sent to terminal B;Terminal A is receiving terminal B hairs
After the verification sent is by message, terminal B is sent to after speech frame is encrypted by the call key.
It is readily apparent that by the analysis to prior art:Terminal A and terminal B shares same key, meanwhile, terminal B possesses
Multiple separate keys corresponding with terminal A;Therefore, problems with actual applications at least be present:Firstth, when third party is right
When the dialog context of communicating pair is implemented to monitor, once third party intercepts the negotiation request message for carrying call key, and the 3rd
Side will relatively easily crack dialog context using the call key of intercepting and capturing;Secondth, because communicating pair each possesses and other side couple
The multiple separate keys answered, it is possible to understand that ground, each terminal are stored with multiple separate keys corresponding with multiple terminals, because
This, the technology adds the complexity and limitation of terminal storage key.
The content of the invention
In order to solve the above technical problems, the embodiment of the present invention it is expected to provide a kind of method, equipment and the system of encryption of conversing,
By being randomly assigned key of conversing independently of the key distribution center of both call sides, so as to greatly enhance the safety of phone system
Property;Further, since call key is distributed by key distribution center, terminal, which need to only preserve, itself to be used to call key be decrypted
Key, therefore, this method reduces the complexity and limitation of terminal storage to a certain extent.
The technical proposal of the invention is realized in this way:
In a first aspect, the embodiments of the invention provide a kind of method for encryption of conversing, methods described includes:
Key distribution center receives the encryption key distribution request message sent from calling terminal;Wherein, the encryption key distribution
The first identification code of calling terminal and the second identification code of terminal called are carried in request message;
The key distribution center obtains call key, and according to first identification code of reception and the second mark code division
Not Huo Qu corresponding to first key and the second key;
The call key is encrypted the 3rd corresponding to acquisition using the first key for the key distribution center
Key, and the 4th key corresponding to acquisition is encrypted to the call key using second key;
The 3rd key of acquisition is sent to the calling terminal by the key distribution center, and by described in acquisition
4th key is sent to the terminal called.
In such scheme, the 3rd key of acquisition is sent to the calling terminal by the key distribution center,
And the 4th key of acquisition is sent to the terminal called, specifically include:
The 3rd key and the 4th key of acquisition are sent to short message service center by the key distribution center;Wherein,
The short message service center is used to the 3rd key and the 4th key of reception being packaged into the first short message and second short respectively
After message, then the first short message and the second short message be correspondingly sent to calling terminal and terminal called.
Second aspect, the embodiments of the invention provide the method for another call encryption, methods described includes:
Calling terminal is switched to encryption mode;
The calling terminal sends encryption key distribution request message to key distribution center;Wherein, the encryption key distribution request
The first identification code of calling terminal and the second identification code of terminal called are carried in message;
The calling terminal receives the 3rd key sent from the key distribution center;
The calling terminal is decrypted to the 3rd key using the first key that itself is preserved and obtains the call
Key;
The calling terminal is encrypted using the call cipher key pair communication content after decryption, is obtained in the communication after encryption
Hold;
Content of Communication after encryption is sent to terminal called by the calling terminal.
In such scheme, the calling terminal is switched to encryption mode, specifically includes:
The calling terminal sends the request of encrypted word service negotiation to the first base station;
The calling terminal receives the encrypted word service connection message that the first base station is sent;
The calling terminal sends encrypted word service connection completion message to the first base station.
The third aspect, the embodiments of the invention provide the method for another call encryption, methods described includes:
Terminal called is switched to encryption mode;
The terminal called receives the 4th key sent from key distribution center;
The second key that the terminal called is preserved using itself is decrypted to the 4th key and obtains the call
Key;
The terminal called receives the coded communication content sent from calling terminal;
The content of coded communication of reception is decrypted using the call key after decryption for the terminal called, obtains solution
Content of Communication after close.
In such scheme, the terminal called is switched to encryption mode, specifically includes:
The terminal called initiates the request of encrypted word service negotiation to second base station;
The terminal called receives the encrypted word service connection message that second base station is sent;
The terminal called sends encrypted word service connection completion message to the second base station.
Fourth aspect, the embodiments of the invention provide the method for another call encryption, methods described includes:
Calling terminal and terminal called synchronism switching to encryption mode;
The calling terminal sends encryption key distribution request message to key distribution center;Wherein, the encryption key distribution request
The first identification code of the calling terminal and the second identification code of the terminal called are carried in message;
The key distribution center receives the encryption key distribution request message that the calling terminal is sent, and it is close to obtain call
Key;
The key distribution center obtains corresponding first key respectively according to first identification code and the second identification code
With the second key;
The call key is encrypted using the first key for the key distribution center, the 3rd corresponding to acquisition
Key, and the call key is encrypted using second key, the 4th key corresponding to acquisition;
The 3rd key of acquisition is sent to the calling terminal by the key distribution center;
The 4th key of acquisition is sent to the terminal called by the key distribution center;
The calling terminal receives the 3rd key, and the first key preserved using itself is entered to the 3rd key
Row decryption obtains the call key;
The terminal called receives the 4th key, and the second key preserved using itself is entered to the 4th key
Row decryption obtains the call key;
The calling terminal is encrypted using the call cipher key pair communication content after decryption, and by the communication after encryption
Appearance is sent to terminal called;
The terminal called receives the Content of Communication after encryption, and utilizes the communication after the call key pair encryption after decryption
Content is decrypted, and obtains the Content of Communication after decryption.
5th aspect, the embodiments of the invention provide a kind of key distribution center, the key distribution center includes:First
Receiving module, acquisition module, the first encrypting module and the first sending module;Wherein,
First receiving module, for receiving the encryption key distribution request message sent from first terminal;Wherein, it is described
The first identification code of first terminal and the second identification code of second terminal are carried in encryption key distribution request message;
The acquisition module, for obtaining key of conversing, and according to first identification code and the second identification code of reception
First key and the second key corresponding to obtaining respectively;
First encrypting module, for the call key to be encrypted corresponding to acquisition using the first key
3rd key, and the 4th key corresponding to acquisition is encrypted to the call key using second key;
First sending module, for the 3rd key of acquisition to be sent into the first terminal, and it will obtain
The 4th key be sent to the second terminal.
In such scheme, first sending module, it is specifically used for:By the 3rd key and the 4th key of acquisition
It is sent to short message service center;Wherein, the short message service center, is specifically used for:
The 3rd key and the 4th key of reception are packaged into the first short message and the second short message respectively;
The first short message for carrying the 3rd key is sent to the first terminal, and the 4th key will be carried
The second short message be sent to the second terminal.
6th aspect, the embodiments of the invention provide a kind of first terminal, the first terminal includes:First switching mould
Block, the second sending module, the second receiving module, the first deciphering module and the second encrypting module;Wherein,
First handover module, for the first terminal to be switched into encryption mode;
Second sending module, for sending encryption key distribution request message to key distribution center;Wherein, the key
The first identification code of first terminal and the second identification code of second terminal are carried in allocation request message;
Second receiving module, for receiving the 3rd key sent from the key distribution center;
First deciphering module, for acquisition to be decrypted to the 3rd key using the first key that itself is preserved
The call key;
Second encrypting module, for being encrypted using the call cipher key pair communication content after decryption, obtain encryption
Content of Communication afterwards;
Second sending module, it is additionally operable to the Content of Communication after encryption being sent to second terminal.
In such scheme, first handover module, it is specifically used for:
The request of encrypted word service negotiation is sent to the first base station;
Receive the encrypted word service connection message that the first base station is sent;
Encrypted word service connection completion message is sent to the first base station.
7th aspect, the embodiments of the invention provide a kind of second terminal, the second terminal includes:Second switching mould
Block, the 3rd receiving module and the second deciphering module;Wherein,
Second handover module, for being switched to encryption mode;
3rd receiving module, for receiving the 4th key sent from key distribution center;
Acquisition is decrypted to the 4th key in second deciphering module, the second key for being preserved using itself
The call key;
3rd receiving module, it is additionally operable to receive the coded communication content sent from first terminal;
Second deciphering module, it is additionally operable to carry out the content of coded communication of reception using the call key after decryption
Decryption, obtain the Content of Communication after decryption.
In such scheme, second handover module, it is specifically used for:
The request of encrypted word service negotiation is initiated to second base station;
Receive the encrypted word service connection message that second base station is sent;
Encrypted word service connection completion message is sent to the second base station.
7th aspect, the embodiments of the invention provide one kind call encryption system, the system includes:In encryption key distribution
The heart, first terminal and second terminal;Wherein,
The key distribution center, for receiving the encryption key distribution request message sent from first terminal;Wherein, it is described
The first identification code of first terminal and the second identification code of second terminal are carried in encryption key distribution request message;
And for obtaining key of conversing, and obtained respectively according to first identification code and the second identification code of reception
Corresponding first key and the second key;
And for the 3rd key corresponding to acquisition to be encrypted to the call key using the first key, and
The 4th key corresponding to acquisition is encrypted to the call key using second key;
And for the 3rd key of acquisition to be sent into the first terminal, and it is close by the described 4th of acquisition the
Key is sent to the second terminal;
The first terminal, for being switched to encryption mode;
And for sending encryption key distribution request message to key distribution center;Wherein, the encryption key distribution request message
In carry the first identification code of first terminal and the second identification code of second terminal;
And for receiving the 3rd key sent from the key distribution center;
It is and close for the 3rd key being decrypted using the first key that itself is preserved the acquisition call
Key;
And for being encrypted using the call cipher key pair communication content after decryption, obtain the Content of Communication after encryption;
And for the Content of Communication after encryption to be sent into second terminal;
The second terminal, for being switched to encryption mode;
And for receiving the 4th key sent from key distribution center;
And the second key for being preserved using itself to the 4th key be decrypted obtain it is described call it is close
Key;
And for receiving the coded communication content sent from first terminal;
And for the content of coded communication of reception to be decrypted using the call key after decryption, obtain decryption
Content of Communication afterwards.
The embodiments of the invention provide it is a kind of converse encryption method, equipment and system, this method mainly by independently of
The key distribution center of both call sides randomly generates call key, and call key is encrypted the both sides for being sent to call;
The call key encrypted is decrypted using the counterpart keys that itself is preserved by both sides;Finally, it is close using the call decrypted
Key completes the encryption and decryption of dialog context.Compared to prior art, this method greatly strengthen the security of system;Meanwhile
Because terminal need to only store key corresponding to itself, therefore the complexity and limitation of terminal storage are also reduced to a certain extent
Property.
Brief description of the drawings
Fig. 1 is a kind of method flow schematic diagram of encryption of conversing provided in an embodiment of the present invention;
Fig. 2 is that the detailed process of a kind of calling and called terminal synchronism switching provided in an embodiment of the present invention to encryption mode is illustrated
Figure;
Fig. 3 is that the 3rd key is sent to the specific of calling terminal by a kind of key distribution center provided in an embodiment of the present invention
Process schematic;
Fig. 4 is that the 4th key is sent to the specific of terminal called by a kind of key distribution center provided in an embodiment of the present invention
Process schematic;
Fig. 5 is the method flow schematic diagram of another call encryption provided in an embodiment of the present invention;
Fig. 6 is that the 3rd key and the 4th key are sent to correspondingly by a kind of key distribution center provided in an embodiment of the present invention
The detailed process schematic diagram of terminal;
Fig. 7 is the method flow schematic diagram of another call encryption provided in an embodiment of the present invention;
Fig. 8 is the detailed process schematic diagram that a kind of calling terminal provided in an embodiment of the present invention is switched to encryption mode;
Fig. 9 is the method flow schematic diagram of another call encryption provided in an embodiment of the present invention;
Figure 10 is the detailed process schematic diagram that a kind of terminal called provided in an embodiment of the present invention is switched to encryption mode;
Figure 11 is a kind of structural representation of key distribution center provided in an embodiment of the present invention;
Figure 12 is a kind of structural representation of first terminal provided in an embodiment of the present invention;
Figure 13 is a kind of structural representation of second terminal provided in an embodiment of the present invention;
Figure 14 is a kind of structural representation of encryption system of conversing provided in an embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation describes.
Embodiment one
Referring to Fig. 1, it gives a kind of method for encryption of conversing provided in an embodiment of the present invention, methods described specifically may be used
With including:
S101, calling terminal and terminal called synchronism switching are to encryption mode;
It should be noted that before calling terminal with terminal called synchronism switching to encryption mode, calling terminal and quilt
Terminal is made to have been set up call connection, simply dialog context now is not encrypted, i.e., what both sides were carried out is that unencryped word leads to
Words.
S102, the calling terminal send encryption key distribution request message to key distribution center;Wherein, the encryption key distribution
The first identification code of the calling terminal and the second identification code of the terminal called are carried in request message;
It is to be appreciated that first identification code is used for calling terminal described in unique mark;Similarly, second mark
Code is used for terminal called described in unique mark.For example, if terminal is mobile phone, mobile subscriber number (Mobile can be used
Directory Number, MDN) come mobile phone corresponding to unique mark, that is, phone number, it is stored in SIM card.
S103, the key distribution center receive the encryption key distribution request message that the calling terminal is sent, and obtain logical
Talk about key;
Under normal circumstances, call key randomly generates according to default AES, and will not in communication process
Periodically changed.It is to be appreciated that the call key is used to the dialog context of both call sides be encrypted.
S104, the key distribution center are first according to corresponding to first identification code and the second identification code obtain respectively
Key and the second key;
Under normal circumstances, key distribution center is stored with the key corresponding to each user identification code, therefore, key point
Each self-corresponding key of both sides can be obtained according to the identification code of the both call sides carried in encryption key distribution request message with center.
In order to strengthen the confidentiality of terminal call, the first key and second key can be carried out the cycle in non-talking state
Update to property, and notify to corresponding terminal.That is, first key and institute described in key distribution center and the terminal-pair
The renewal for stating the second key is synchronous.
The call key is encrypted using the first key for S105, the key distribution center, is obtained corresponding
The 3rd key, and using second key to it is described call key be encrypted, the 4th key corresponding to acquisition;
The 3rd key of acquisition is sent to the calling terminal by S106, the key distribution center;
The 4th key of acquisition is sent to the terminal called by S107, the key distribution center;
It should be noted that the key distribution center can be connected with short message service center, and it is close by the 3rd of acquisition the
Key and the 4th key are sent respectively to corresponding terminal in the form of short message.
S108, the calling terminal receive the 3rd key, and the first key preserved using itself is to the described 3rd
Key, which is decrypted, obtains the call key;
S109, the terminal called receive the 4th key, and the second key preserved using itself is to the described 4th
Key, which is decrypted, obtains the call key;
It should be noted that because the first key that calling terminal is preserved using itself can be entered to the 3rd key of reception
Row decryption obtains the call key, and therefore, calling terminal only needs to preserve the first key of itself;Similarly, terminal called
Only need to preserve the second key of itself.Therefore, the method that the embodiment of the present invention is provided reduces to a certain extent
The complexity and limitation of terminal storage.
S110, the calling terminal are encrypted using the call cipher key pair communication content after decryption, and by after encryption
Content of Communication is sent to terminal called;
S111, the terminal called receive the Content of Communication after encryption, and after the call key pair encryption after utilization decryption
Content of Communication be decrypted, obtain decryption after Content of Communication.
Exemplarily, the calling terminal and terminal called synchronism switching are to encryption mode, as shown in Fig. 2 methods described
It can specifically include:
S210, calling terminal initiate the request of encrypted word service negotiation to first base station;Meanwhile terminal called is sent out to the second base station
Play encrypted word service request;
It should be noted that the first base station refers to the serving BS of calling terminal, second base station refers to
The serving BS of terminal called.
S220, the first base station receive the encrypted word service negotiation request message that calling terminal is sent, and send encrypted word industry
Connection message be engaged in calling terminal;Meanwhile second base station receives the encrypted word service negotiation request message that terminal called is sent,
And encrypted word service connection message is sent to terminal called;
S230, the calling terminal receive the encrypted word service connection message that the first base station is sent, and send encrypted word industry
Business connection completion message is to first base station;Meanwhile the terminal called receives the encrypted word service connection that second base station is sent
Message, and encrypted word service connection completion message is sent to the second base station.
It should be noted that under normal circumstances, the purpose of service negotiation is to make the calling terminal and the terminal called
Can synchronism switching to encryption mode, that is to say, that when the first base station receives the encrypted word industry that the calling terminal sends
Business connection message, meanwhile, after second base station receives the encrypted word service connection message that the terminal called is sent, the master
Terminal and the terminal called are by synchronism switching to encryption mode.
Exemplarily, the 3rd key of acquisition is sent to the calling terminal, such as Fig. 3 by the key distribution center
Shown, methods described can specifically include:
The 3rd key of acquisition is sent to short message service center by S310, the key distribution center;
S320, short message service center are by the 3rd key encapsulation of reception into the first short message;
The first short message for carrying the 3rd key is sent to the calling terminal by S330, short message service center.
Exemplarily, the 4th key of acquisition is sent to the terminal called, such as Fig. 4 by the key distribution center
Shown, methods described can specifically include:
The 4th key of acquisition is sent to short message service center by S410, the key distribution center;
S420, short message service center are by the 4th key encapsulation of reception into the second short message;
The second short message for carrying the 4th key is sent to the terminal called by S430, short message service center.
By above-described embodiment, a kind of method for encryption of conversing provided in an embodiment of the present invention, this method is mainly led to
Cross key distribution center and randomly generate call key, and call key is encrypted the both sides for being sent to call;Then, both sides
The call key encrypted is decrypted the counterpart keys preserved using itself;Finally, it is complete using the call key decrypted
Into the encryption and decryption of dialog context, so as to greatly strengthen the security of system;Simultaneously as need to only to store itself right for terminal
The key answered, therefore the complexity and limitation of terminal storage are also reduced to a certain extent.
Embodiment two
As shown in figure 5, the figure gives a kind of call encryption provided in an embodiment of the present invention by taking key distribution center as an example
Method, methods described can specifically include:
S510, the key distribution center receive the encryption key distribution request message sent from calling terminal;Wherein, it is described
The first identification code of calling terminal and the second identification code of terminal called are carried in encryption key distribution request message;
S520, the key distribution center obtain call key, and according to first identification code and the second mark code division
Not Huo Qu corresponding to first key and the second key;
It should be noted that because key distribution center is stored with key corresponding to each terminal, therefore, the key
Distributing center can according to the first identification code of the calling terminal obtain corresponding to first key, according to the terminal called
Second key corresponding to the acquisition of second identification code.
The call key is encrypted corresponding to acquisition using the first key for S530, the key distribution center
3rd key, and the 4th key corresponding to acquisition is encrypted to the call key using second key;
The 3rd key of acquisition is sent to the calling terminal, and will obtained by S540, the key distribution center
The 4th key be sent to the terminal called.
Exemplarily, the 3rd key of acquisition is sent to the calling terminal by the key distribution center, and will
The 4th key obtained is sent to the terminal called, as shown in fig. 6, methods described can specifically include:
The 3rd key and the 4th key of acquisition are sent to short message service center by S610, the key distribution center;
The 3rd key and the 4th key of reception are packaged into the first short message and by S620, short message service center respectively
Two short messages;
The first short message for carrying the 3rd key is sent to the calling terminal by S630, short message service center, and will
The second short message for carrying the 4th key is sent to the terminal called.
It should be noted that the key distribution center can be connected with the short message service center of communication system.Due to end
End can receive short message during voice call is carried out, so key distribution center can be close by the described 3rd of acquisition the
Key and the 4th key are sent to corresponding terminal in the form of short message.
The embodiment of the present invention is by taking key distribution center as an example, there is provided a kind of method for encryption of conversing, passes through encryption key distribution
Center randomly generates call key, and call key is encrypted, and is then sent to the call key encrypted corresponding
Terminal, so as to greatly strengthen the security of communication process;Meanwhile the call key that terminal need to be only preserved to encryption is decrypted
Key, therefore, reduce the complexity and limitation of terminal storage to a certain extent.
Embodiment three
As shown in fig. 7, the figure gives a kind of side of encryption of conversing provided in an embodiment of the present invention by taking calling terminal as an example
Method, methods described can specifically include:
S710, calling terminal are switched to encryption mode;
It should be noted that after the calling terminal and the first base station complete the foundation of encrypted word service connection, institute
State calling terminal and be switched to encryption mode, i.e., the communication process of follow-up calling terminal and terminal called is encrypted word communication process.
S720, the calling terminal send encryption key distribution request message to key distribution center;Wherein, the encryption key distribution
The first identification code of calling terminal and the second identification code of terminal called are carried in request message;
S730, the calling terminal receive the 3rd key sent from the key distribution center;
The 3rd key is decrypted described in acquisition using the first key that itself is preserved for S740, the calling terminal
Call key;
S750, the calling terminal are encrypted using the call cipher key pair communication content after decryption, after obtaining encryption
Content of Communication;
Content of Communication after encryption is sent to terminal called by S760, the calling terminal.
Exemplarily, the calling terminal is switched to encryption mode, as shown in figure 8, methods described can specifically include:
S810, calling terminal send the request of encrypted word service negotiation to first base station;
S820, the calling terminal receive the encrypted word service connection message that the first base station is sent;
S830, the calling terminal send encrypted word service connection completion message to the first base station.
The embodiment of the present invention is by taking calling terminal as an example, there is provided a kind of method for encryption of conversing, calling terminal are received and come from
The call key encrypted that key distribution center is sent, and using the first key that itself is preserved to the call key encrypted
It is decrypted, so as to obtain the call key after decryption, further dialog context is carried out using the call key after decryption
Encryption, realize the encrypted word call of both call sides.As the above analysis, this method greatly strengthen the security of system;Meanwhile
Because terminal need to only preserve the key that the call key to encryption is decrypted, so reducing terminal to a certain extent
The complexity and limitation of storage.
Example IV
As shown in figure 9, the figure gives a kind of side of encryption of conversing provided in an embodiment of the present invention by taking terminal called as an example
Method, methods described can specifically include:
S910, terminal called are switched to encryption mode;
It should be noted that the terminal called is and calling terminal synchronism switching to encryption mode.
S920, the terminal called receive the 4th key sent from key distribution center;
4th key is decrypted described in acquisition the second key that S930, the terminal called are preserved using itself
Call key;
S940, the terminal called receive the coded communication content sent from calling terminal;
The content of coded communication of reception is decrypted using the call key after decryption for S950, the terminal called,
Obtain the Content of Communication after decryption.
Exemplarily, the terminal called is switched to encryption mode, and as shown in Figure 10, methods described can specifically include:
S1010, terminal called initiate the request of encrypted word service negotiation to the second base station;
S1020, the terminal called receive the encrypted word service connection message that second base station is sent;
S1030, the terminal called send encrypted word service connection completion message to the second base station.
It should be noted that after the terminal called receives the encrypted word service connection message that second base station is sent,
Complete and established with the encrypted word service connection of base station, and send encrypted word service connection completion message to the second base station, now institute
State terminal called and be switched to encryption mode.In order to ensure that the synchronous of both sides' encrypted word call is carried out, the terminal called and the master
Terminal is made to need synchronism switching to encryption mode.
The embodiment of the present invention is by taking terminal called as an example, there is provided a kind of method for encryption of conversing, terminal called are received and come from
The call key encrypted that key distribution center is sent, and using the second key that itself is preserved to the call key encrypted
It is decrypted, so as to obtain the call key after decryption, further utilizes encryption of the call key after decryption to reception
Dialog context is decrypted, so as to realize that the encrypted word of both call sides is conversed.Due to terminal called receive be encryption after call
Key, therefore greatly strengthen the security of system;Simultaneously as the call key that terminal need to only preserve to encryption is decrypted
Key, so reducing the complexity and limitation of terminal storage to a certain extent.
Embodiment five
Based on previous embodiment identical technical concept, as shown in figure 11, it gives provided in an embodiment of the present invention
A kind of key distribution center 110, it can be seen that the key distribution center 110 can include:First receiving module
1110th, acquisition module 1120, the first encrypting module 1130 and the first sending module 1140;Wherein,
First receiving module 1110, for receiving the encryption key distribution request message sent from first terminal;Wherein,
The first identification code of first terminal and the second identification code of second terminal are carried in the encryption key distribution request message;
The acquisition module 1120, marked for obtaining key of conversing, and according to first identification code of reception and second
Know code division and do not obtain corresponding first key and the second key;
First encrypting module 1130, for acquisition pair to be encrypted to the call key using the first key
The 3rd key answered, and the 4th key corresponding to acquisition is encrypted to the call key using second key;
First sending module 1140, for the 3rd key of acquisition to be sent into the first terminal, and will
The 4th key obtained is sent to the second terminal.
It should be noted that the first terminal is exactly the calling terminal described in above-described embodiment, the second terminal
It is exactly the terminal called described in above-described embodiment.
In such scheme, first sending module 1140, it is specifically used for:By the 3rd key of acquisition and the 4th
Key is sent to short message service center;Wherein, the short message service center, is specifically used for:
The 3rd key and the 4th key of reception are packaged into the first short message and the second short message respectively;
The first short message for carrying the 3rd key is sent to the first terminal, and the 4th key will be carried
The second short message be sent to the second terminal.
Embodiment six
Based on previous embodiment identical technical concept, as shown in figure 12, it gives provided in an embodiment of the present invention
A kind of first terminal 120, it can be seen that the first terminal 120 can include:First handover module 1210, second
Sending module 1220, the second receiving module 1230, the first deciphering module 1240 and the second encrypting module 1250;Wherein,
First handover module 1210, for the first terminal 120 to be switched into encryption mode;
Second sending module 1220, for sending encryption key distribution request message to key distribution center;Wherein, it is described
The first identification code of first terminal and the second identification code of second terminal are carried in encryption key distribution request message;
Second receiving module 1230, for receiving the 3rd key sent from the key distribution center;
First deciphering module 1240, for the 3rd key to be decrypted using the first key that itself is preserved
Obtain the call key;
Second encrypting module 1250, for being encrypted using the call cipher key pair communication content after decryption, obtain
Content of Communication after encryption;
Second sending module 1220, it is additionally operable to the Content of Communication after encryption being sent to second terminal.
It should be noted that first deciphering module and the second encrypting module can pass through the physical connections such as serial ports and institute
State first terminal to be connected, be an entirety during actual use similar to the SIM card of terminal insertion.
In such scheme, first handover module 1210, it is specifically used for:
The request of encrypted word service negotiation is sent to the first base station;
Receive the encrypted word service connection message that the first base station is sent;
Encrypted word service connection completion message is sent to the first base station.
Embodiment seven
Based on previous embodiment identical technical concept, as shown in figure 13, it gives provided in an embodiment of the present invention
A kind of second terminal 130, it can be seen that the second terminal 130 can include:Second handover module the 1310, the 3rd
The deciphering module 1330 of receiving module 1320 and second;Wherein,
Second handover module 1310, for being switched to encryption mode;
3rd receiving module 1320, for receiving the 4th key sent from key distribution center;
The 4th key is decrypted for second deciphering module 1330, the second key for being preserved using itself
Obtain the call key;
3rd receiving module 1320, it is additionally operable to receive the coded communication content sent from first terminal;
Second deciphering module 1330, it is additionally operable to the coded communication content to reception using the call key after decryption
It is decrypted, obtains the Content of Communication after decryption.
It should be noted that second deciphering module as first deciphering module, can pass through the things such as serial ports
Reason connection is connected with the second terminal, the SIM card inserted similar to terminal, is an entirety during actual use.
In such scheme, second handover module 1310, it is specifically used for:
The request of encrypted word service negotiation is initiated to second base station;
Receive the encrypted word service connection message that second base station is sent;
Encrypted word service connection completion message is sent to the second base station.
Embodiment eight
Based on previous embodiment identical technical concept, as shown in figure 14, it gives provided in an embodiment of the present invention
One kind call encryption system 140, the call encryption system include:Key distribution center 110, first terminal 120 and second are eventually
End 130;Wherein,
The key distribution center 110, for receiving the encryption key distribution request message sent from first terminal;Wherein,
The first identification code of first terminal and the second identification code of second terminal are carried in the encryption key distribution request message;
And for obtaining key of conversing, and obtained respectively according to first identification code and the second identification code of reception
Corresponding first key and the second key;
And for the 3rd key corresponding to acquisition to be encrypted to the call key using the first key, and
The 4th key corresponding to acquisition is encrypted to the call key using second key;
And for the 3rd key of acquisition to be sent into the first terminal, and it is close by the described 4th of acquisition the
Key is sent to the second terminal;
The first terminal 120, for being switched to encryption mode;
And for sending encryption key distribution request message to key distribution center;Wherein, the encryption key distribution request message
In carry the first identification code of first terminal and the second identification code of second terminal;
And for receiving the 3rd key sent from the key distribution center;
It is and close for the 3rd key being decrypted using the first key that itself is preserved the acquisition call
Key;
And for being encrypted using the call cipher key pair communication content after decryption, obtain the Content of Communication after encryption;
And for the Content of Communication after encryption to be sent into second terminal;
The second terminal 130, for being switched to encryption mode;
And for receiving the 4th key sent from key distribution center;
And the second key for being preserved using itself to the 4th key be decrypted obtain it is described call it is close
Key;
And for receiving the coded communication content sent from first terminal;
And for the content of coded communication of reception to be decrypted using the call key after decryption, obtain decryption
Content of Communication afterwards.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program
Product.Therefore, the shape of the embodiment in terms of the present invention can use hardware embodiment, software implementation or combination software and hardware
Formula.Moreover, the present invention can use the computer for wherein including computer usable program code in one or more to use storage
The form for the computer program product that medium is implemented on (including but is not limited to magnetic disk storage and optical memory etc.).
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram
Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided
The processors of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce
A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real
The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to
Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or
The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted
Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer or
The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in individual square frame or multiple square frames.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the scope of the present invention.
Claims (14)
- A kind of 1. method for encryption of conversing, it is characterised in that methods described includes:Key distribution center receives the encryption key distribution request message sent from calling terminal;Wherein, the encryption key distribution request The first identification code of calling terminal and the second identification code of terminal called are carried in message;The key distribution center obtains call key, and is obtained respectively according to first identification code and the second identification code of reception First key and the second key corresponding to taking;The 3rd key corresponding to acquisition is encrypted to the call key using the first key in the key distribution center, And the 4th key corresponding to acquisition is encrypted to the call key using second key;The 3rd key of acquisition is sent to the calling terminal by the key distribution center, and by the described 4th of acquisition the Key is sent to the terminal called.
- 2. according to the method for claim 1, it is characterised in that the key distribution center is by the 3rd key of acquisition The calling terminal is sent to, and the 4th key of acquisition is sent to the terminal called, is specifically included:The 3rd key and the 4th key of acquisition are sent to short message service center by the key distribution center;Wherein, it is described Short message service center is used to the 3rd key and the 4th key of reception being packaged into the first short message and the second short message respectively Afterwards, then by the first short message and the second short message calling terminal and terminal called are correspondingly sent to.
- A kind of 3. method for encryption of conversing, it is characterised in that methods described includes:Calling terminal is switched to encryption mode;The calling terminal sends encryption key distribution request message to key distribution center;Wherein, the encryption key distribution request message In carry the first identification code of calling terminal and the second identification code of terminal called;The calling terminal receives the 3rd key sent from the key distribution center;The calling terminal is decrypted to the 3rd key using the first key that itself is preserved and obtains the call key;The calling terminal is encrypted using the call cipher key pair communication content after decryption, obtains the Content of Communication after encryption;Content of Communication after encryption is sent to terminal called by the calling terminal.
- 4. according to the method for claim 3, it is characterised in that the calling terminal is switched to encryption mode, specifically includes:The calling terminal sends the request of encrypted word service negotiation to the first base station;The calling terminal receives the encrypted word service connection message that the first base station is sent;The calling terminal sends encrypted word service connection completion message to the first base station.
- A kind of 5. method for encryption of conversing, it is characterised in that methods described includes:Terminal called is switched to encryption mode;The terminal called receives the 4th key sent from key distribution center;The second key that the terminal called is preserved using itself is decrypted to the 4th key and obtains the call key;The terminal called receives the coded communication content sent from calling terminal;The content of coded communication of reception is decrypted using the call key after decryption for the terminal called, after obtaining decryption Content of Communication.
- 6. according to the method for claim 5, it is characterised in that the terminal called is switched to encryption mode, specifically includes:The terminal called initiates the request of encrypted word service negotiation to second base station;The terminal called receives the encrypted word service connection message that second base station is sent;The terminal called sends encrypted word service connection completion message to the second base station.
- A kind of 7. method for encryption of conversing, it is characterised in that methods described includes:Calling terminal and terminal called synchronism switching to encryption mode;The calling terminal sends encryption key distribution request message to key distribution center;Wherein, the encryption key distribution request message In carry the first identification code of the calling terminal and the second identification code of the terminal called;The key distribution center receives the encryption key distribution request message that the calling terminal is sent, and obtains call key;Key distribution center first key and according to corresponding to first identification code and the second identification code obtain respectively Two keys;The call key is encrypted using the first key for the key distribution center, and the 3rd is close corresponding to acquisition Key, and the call key is encrypted using second key, the 4th key corresponding to acquisition;The 3rd key of acquisition is sent to the calling terminal by the key distribution center;The 4th key of acquisition is sent to the terminal called by the key distribution center;The calling terminal receives the 3rd key, and the first key preserved using itself is solved to the 3rd key It is close to obtain the call key;The terminal called receives the 4th key, and the second key preserved using itself is solved to the 4th key It is close to obtain the call key;The calling terminal is encrypted using the call cipher key pair communication content after decryption, and the Content of Communication after encryption is sent out Give terminal called;The terminal called receives the Content of Communication after encryption, and utilizes the Content of Communication after the call key pair encryption after decryption It is decrypted, obtains the Content of Communication after decryption.
- 8. a kind of key distribution center, it is characterised in that the key distribution center includes:First receiving module, acquisition module, First encrypting module and the first sending module;Wherein,First receiving module, for receiving the encryption key distribution request message sent from first terminal;Wherein, the key The first identification code of first terminal and the second identification code of second terminal are carried in allocation request message;The acquisition module, distinguish for obtaining key of conversing, and according to first identification code and the second identification code of reception First key corresponding to acquisition and the second key;First encrypting module, for the call key to be encrypted the 3rd corresponding to acquisition using the first key Key, and the 4th key corresponding to acquisition is encrypted to the call key using second key;First sending module, for the 3rd key of acquisition to be sent into the first terminal, and by the institute of acquisition State the 4th key and be sent to the second terminal.
- 9. key distribution center according to claim 8, it is characterised in that first sending module, be specifically used for:Will The 3rd key and the 4th key obtained is sent to short message service center;Wherein, the short message service center, is specifically used for:The 3rd key and the 4th key of reception are packaged into the first short message and the second short message respectively;The first short message for carrying the 3rd key is sent to the first terminal, and the of the 4th key will be carried Two short messages are sent to the second terminal.
- 10. a kind of first terminal, it is characterised in that the first terminal includes:First handover module, the second sending module, Two receiving modules, the first deciphering module and the second encrypting module;Wherein,First handover module, for the first terminal to be switched into encryption mode;Second sending module, for sending encryption key distribution request message to key distribution center;Wherein, the encryption key distribution The first identification code of first terminal and the second identification code of second terminal are carried in request message;Second receiving module, for receiving the 3rd key sent from the key distribution center;First deciphering module, for the 3rd key to be decrypted described in acquisition using the first key that itself is preserved Call key;Second encrypting module, for being encrypted using the call cipher key pair communication content after decryption, after obtaining encryption Content of Communication;Second sending module, it is additionally operable to the Content of Communication after encryption being sent to second terminal.
- 11. first terminal according to claim 10, it is characterised in that first handover module, be specifically used for:The request of encrypted word service negotiation is sent to the first base station;Receive the encrypted word service connection message that the first base station is sent;Encrypted word service connection completion message is sent to the first base station.
- 12. a kind of second terminal, it is characterised in that the second terminal includes:Second handover module, the 3rd receiving module and Two deciphering modules;Wherein,Second handover module, for being switched to encryption mode;3rd receiving module, for receiving the 4th key sent from key distribution center;The 4th key is decrypted described in acquisition for second deciphering module, the second key for being preserved using itself Call key;3rd receiving module, it is additionally operable to receive the coded communication content sent from first terminal;Second deciphering module, it is additionally operable to solve the content of coded communication of reception using the call key after decryption It is close, obtain the Content of Communication after decryption.
- 13. second terminal according to claim 12, it is characterised in that second handover module, be specifically used for:The request of encrypted word service negotiation is initiated to second base station;Receive the encrypted word service connection message that second base station is sent;Encrypted word service connection completion message is sent to the second base station.
- 14. one kind call encryption system, it is characterised in that the system includes:Key distribution center, first terminal and second are eventually End;Wherein,The key distribution center, for receiving the encryption key distribution request message sent from first terminal;Wherein, the key The first identification code of first terminal and the second identification code of second terminal are carried in allocation request message;And obtained respectively correspondingly for obtaining key of conversing, and according to first identification code and the second identification code of reception First key and the second key;And for the 3rd key corresponding to acquisition to be encrypted to the call key using the first key, and utilize The 4th key corresponding to acquisition is encrypted to the call key in second key;And for the 3rd key of acquisition to be sent into the first terminal, and the 4th key of acquisition is sent out Give the second terminal;The first terminal, for being switched to encryption mode;And for sending encryption key distribution request message to key distribution center;Wherein, taken in the encryption key distribution request message Second identification code of the first identification code and second terminal with first terminal;And for receiving the 3rd key sent from the key distribution center;And obtain the call key for the 3rd key to be decrypted using the first key that itself is preserved;And for being encrypted using the call cipher key pair communication content after decryption, obtain the Content of Communication after encryption;And for the Content of Communication after encryption to be sent into second terminal;The second terminal, for being switched to encryption mode;And for receiving the 4th key sent from key distribution center;And the second key for being preserved using itself is decrypted to the 4th key and obtains the call key;And for receiving the coded communication content sent from first terminal;And for the content of coded communication of reception to be decrypted using the call key after decryption, after obtaining decryption Content of Communication.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610848797.XA CN107872792A (en) | 2016-09-23 | 2016-09-23 | A kind of method, equipment and the system of encryption of conversing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610848797.XA CN107872792A (en) | 2016-09-23 | 2016-09-23 | A kind of method, equipment and the system of encryption of conversing |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107872792A true CN107872792A (en) | 2018-04-03 |
Family
ID=61751695
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610848797.XA Withdrawn CN107872792A (en) | 2016-09-23 | 2016-09-23 | A kind of method, equipment and the system of encryption of conversing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107872792A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109088900A (en) * | 2018-10-31 | 2018-12-25 | 北京元安物联技术有限公司 | A kind of communication means and communication device for sender and recipient |
CN114125824A (en) * | 2020-08-31 | 2022-03-01 | 中国电信股份有限公司 | Voice encryption processing method, server, terminal, system and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101309281A (en) * | 2008-07-22 | 2008-11-19 | 中国电信股份有限公司 | End-to-end speech ciphering method, apparatus and system |
CN101867898A (en) * | 2010-07-02 | 2010-10-20 | 中国电信股份有限公司 | Short message encrypting communication system, method and secret key center |
CN102123361A (en) * | 2010-12-31 | 2011-07-13 | 华为技术有限公司 | Method and device for realizing encrypted message communication |
CN105577634A (en) * | 2015-07-31 | 2016-05-11 | 宇龙计算机通信科技(深圳)有限公司 | Encrypted conversation communication establishing failure processing method and user terminals |
-
2016
- 2016-09-23 CN CN201610848797.XA patent/CN107872792A/en not_active Withdrawn
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101309281A (en) * | 2008-07-22 | 2008-11-19 | 中国电信股份有限公司 | End-to-end speech ciphering method, apparatus and system |
CN101867898A (en) * | 2010-07-02 | 2010-10-20 | 中国电信股份有限公司 | Short message encrypting communication system, method and secret key center |
CN102123361A (en) * | 2010-12-31 | 2011-07-13 | 华为技术有限公司 | Method and device for realizing encrypted message communication |
CN105577634A (en) * | 2015-07-31 | 2016-05-11 | 宇龙计算机通信科技(深圳)有限公司 | Encrypted conversation communication establishing failure processing method and user terminals |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109088900A (en) * | 2018-10-31 | 2018-12-25 | 北京元安物联技术有限公司 | A kind of communication means and communication device for sender and recipient |
CN114125824A (en) * | 2020-08-31 | 2022-03-01 | 中国电信股份有限公司 | Voice encryption processing method, server, terminal, system and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107006049A (en) | A kind of smart machine and its set up the method for equipment room bluetooth connection, device | |
CN101926151B (en) | Method and communication network system for establishing security conjunction | |
CN101917711B (en) | A kind of method of mobile communication system and voice call encryption thereof | |
CN111669276A (en) | Network verification method, device and system | |
EP3337088B1 (en) | Data encryption method, decryption method, apparatus, and system | |
CN104780040A (en) | Handheld device encryption method and system based on quantum cryptography | |
CN110169102B (en) | Privacy protection method and device | |
US10341305B2 (en) | Encrypted communications method and communications terminal, and computer storage medium | |
CN105814859B (en) | A kind of network collocating method, relevant apparatus and system | |
CN103458400A (en) | Key management method for voice encryption communication system | |
CN102546172A (en) | Access control method of intelligent card, intelligent card, terminal and system | |
CN107666395A (en) | One population file management method, user terminal, group chat system | |
CN111788836B (en) | Data transmission method and BLE equipment | |
CN106685897A (en) | Safe input method, device and system | |
CN107872792A (en) | A kind of method, equipment and the system of encryption of conversing | |
CN101895538A (en) | Method and system for establishing data exchange channels, smart card and server | |
CN103546873B (en) | Services through one key pushed processing method and processing device | |
CN101938743B (en) | Generation method and device of safe keys | |
CN104735626A (en) | Achieving method and device for trunking group communication public security | |
CN103763697A (en) | Wireless access point multi-secret key support system and method | |
CN105812384A (en) | Communication method and system | |
CN105611528B (en) | Multi-system intelligent terminal and encrypted telephone communication method thereof | |
CN106487761A (en) | A kind of method for message transmission and the network equipment | |
CN103987032A (en) | Mobile communication terminal voice encryption method | |
CN106372557B (en) | Certificate card information acquisition method, device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20180403 |
|
WW01 | Invention patent application withdrawn after publication |