CN107872792A - A kind of method, equipment and the system of encryption of conversing - Google Patents

A kind of method, equipment and the system of encryption of conversing Download PDF

Info

Publication number
CN107872792A
CN107872792A CN201610848797.XA CN201610848797A CN107872792A CN 107872792 A CN107872792 A CN 107872792A CN 201610848797 A CN201610848797 A CN 201610848797A CN 107872792 A CN107872792 A CN 107872792A
Authority
CN
China
Prior art keywords
key
terminal
sent
encryption
call
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201610848797.XA
Other languages
Chinese (zh)
Inventor
徐强华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201610848797.XA priority Critical patent/CN107872792A/en
Publication of CN107872792A publication Critical patent/CN107872792A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]

Abstract

The embodiment of the invention discloses a kind of method, equipment and the system of encryption of conversing, this method mainly includes:Key distribution center receives the encryption key distribution request message sent from calling terminal;Wherein, the first identification code of calling terminal and the second identification code of terminal called are carried in the encryption key distribution request message;The key distribution center obtains call key, and first key and the second key according to corresponding to first identification code and the second identification code of reception obtain respectively;The key distribution center call key is encrypted the 3rd key corresponding to acquisition using the first key, and the 4th key corresponding to acquisition is encrypted to the call key using second key;The 3rd key of acquisition is sent to the calling terminal by the key distribution center, and the 4th key of acquisition is sent into the terminal called.

Description

A kind of method, equipment and the system of encryption of conversing
Technical field
The present invention relates to the communications field, more particularly to a kind of method, equipment and the system of encryption of conversing.
Background technology
The fast development of the communication technology so that the communication of the terminal such as mobile phone turns into one essential in work and life Point;But while terminal communication brings many convenient, the potential danger that Content of Communication is ravesdropping also is brought therewith Danger.Especially after Snowdon " prism door " event, all more pay attention to the security of terminal communication from government organs to commercial field.
Existing terminal communication encryption technology is mainly based upon what the terminal being in communication with each other was carried out, i.e.,:Terminal A produces random Number, that is, key of conversing, and the negotiation request for carrying call key is sent to terminal B;Terminal A is receiving terminal B hairs After the verification sent is by message, terminal B is sent to after speech frame is encrypted by the call key.
It is readily apparent that by the analysis to prior art:Terminal A and terminal B shares same key, meanwhile, terminal B possesses Multiple separate keys corresponding with terminal A;Therefore, problems with actual applications at least be present:Firstth, when third party is right When the dialog context of communicating pair is implemented to monitor, once third party intercepts the negotiation request message for carrying call key, and the 3rd Side will relatively easily crack dialog context using the call key of intercepting and capturing;Secondth, because communicating pair each possesses and other side couple The multiple separate keys answered, it is possible to understand that ground, each terminal are stored with multiple separate keys corresponding with multiple terminals, because This, the technology adds the complexity and limitation of terminal storage key.
The content of the invention
In order to solve the above technical problems, the embodiment of the present invention it is expected to provide a kind of method, equipment and the system of encryption of conversing, By being randomly assigned key of conversing independently of the key distribution center of both call sides, so as to greatly enhance the safety of phone system Property;Further, since call key is distributed by key distribution center, terminal, which need to only preserve, itself to be used to call key be decrypted Key, therefore, this method reduces the complexity and limitation of terminal storage to a certain extent.
The technical proposal of the invention is realized in this way:
In a first aspect, the embodiments of the invention provide a kind of method for encryption of conversing, methods described includes:
Key distribution center receives the encryption key distribution request message sent from calling terminal;Wherein, the encryption key distribution The first identification code of calling terminal and the second identification code of terminal called are carried in request message;
The key distribution center obtains call key, and according to first identification code of reception and the second mark code division Not Huo Qu corresponding to first key and the second key;
The call key is encrypted the 3rd corresponding to acquisition using the first key for the key distribution center Key, and the 4th key corresponding to acquisition is encrypted to the call key using second key;
The 3rd key of acquisition is sent to the calling terminal by the key distribution center, and by described in acquisition 4th key is sent to the terminal called.
In such scheme, the 3rd key of acquisition is sent to the calling terminal by the key distribution center, And the 4th key of acquisition is sent to the terminal called, specifically include:
The 3rd key and the 4th key of acquisition are sent to short message service center by the key distribution center;Wherein, The short message service center is used to the 3rd key and the 4th key of reception being packaged into the first short message and second short respectively After message, then the first short message and the second short message be correspondingly sent to calling terminal and terminal called.
Second aspect, the embodiments of the invention provide the method for another call encryption, methods described includes:
Calling terminal is switched to encryption mode;
The calling terminal sends encryption key distribution request message to key distribution center;Wherein, the encryption key distribution request The first identification code of calling terminal and the second identification code of terminal called are carried in message;
The calling terminal receives the 3rd key sent from the key distribution center;
The calling terminal is decrypted to the 3rd key using the first key that itself is preserved and obtains the call Key;
The calling terminal is encrypted using the call cipher key pair communication content after decryption, is obtained in the communication after encryption Hold;
Content of Communication after encryption is sent to terminal called by the calling terminal.
In such scheme, the calling terminal is switched to encryption mode, specifically includes:
The calling terminal sends the request of encrypted word service negotiation to the first base station;
The calling terminal receives the encrypted word service connection message that the first base station is sent;
The calling terminal sends encrypted word service connection completion message to the first base station.
The third aspect, the embodiments of the invention provide the method for another call encryption, methods described includes:
Terminal called is switched to encryption mode;
The terminal called receives the 4th key sent from key distribution center;
The second key that the terminal called is preserved using itself is decrypted to the 4th key and obtains the call Key;
The terminal called receives the coded communication content sent from calling terminal;
The content of coded communication of reception is decrypted using the call key after decryption for the terminal called, obtains solution Content of Communication after close.
In such scheme, the terminal called is switched to encryption mode, specifically includes:
The terminal called initiates the request of encrypted word service negotiation to second base station;
The terminal called receives the encrypted word service connection message that second base station is sent;
The terminal called sends encrypted word service connection completion message to the second base station.
Fourth aspect, the embodiments of the invention provide the method for another call encryption, methods described includes:
Calling terminal and terminal called synchronism switching to encryption mode;
The calling terminal sends encryption key distribution request message to key distribution center;Wherein, the encryption key distribution request The first identification code of the calling terminal and the second identification code of the terminal called are carried in message;
The key distribution center receives the encryption key distribution request message that the calling terminal is sent, and it is close to obtain call Key;
The key distribution center obtains corresponding first key respectively according to first identification code and the second identification code With the second key;
The call key is encrypted using the first key for the key distribution center, the 3rd corresponding to acquisition Key, and the call key is encrypted using second key, the 4th key corresponding to acquisition;
The 3rd key of acquisition is sent to the calling terminal by the key distribution center;
The 4th key of acquisition is sent to the terminal called by the key distribution center;
The calling terminal receives the 3rd key, and the first key preserved using itself is entered to the 3rd key Row decryption obtains the call key;
The terminal called receives the 4th key, and the second key preserved using itself is entered to the 4th key Row decryption obtains the call key;
The calling terminal is encrypted using the call cipher key pair communication content after decryption, and by the communication after encryption Appearance is sent to terminal called;
The terminal called receives the Content of Communication after encryption, and utilizes the communication after the call key pair encryption after decryption Content is decrypted, and obtains the Content of Communication after decryption.
5th aspect, the embodiments of the invention provide a kind of key distribution center, the key distribution center includes:First Receiving module, acquisition module, the first encrypting module and the first sending module;Wherein,
First receiving module, for receiving the encryption key distribution request message sent from first terminal;Wherein, it is described The first identification code of first terminal and the second identification code of second terminal are carried in encryption key distribution request message;
The acquisition module, for obtaining key of conversing, and according to first identification code and the second identification code of reception First key and the second key corresponding to obtaining respectively;
First encrypting module, for the call key to be encrypted corresponding to acquisition using the first key 3rd key, and the 4th key corresponding to acquisition is encrypted to the call key using second key;
First sending module, for the 3rd key of acquisition to be sent into the first terminal, and it will obtain The 4th key be sent to the second terminal.
In such scheme, first sending module, it is specifically used for:By the 3rd key and the 4th key of acquisition It is sent to short message service center;Wherein, the short message service center, is specifically used for:
The 3rd key and the 4th key of reception are packaged into the first short message and the second short message respectively;
The first short message for carrying the 3rd key is sent to the first terminal, and the 4th key will be carried The second short message be sent to the second terminal.
6th aspect, the embodiments of the invention provide a kind of first terminal, the first terminal includes:First switching mould Block, the second sending module, the second receiving module, the first deciphering module and the second encrypting module;Wherein,
First handover module, for the first terminal to be switched into encryption mode;
Second sending module, for sending encryption key distribution request message to key distribution center;Wherein, the key The first identification code of first terminal and the second identification code of second terminal are carried in allocation request message;
Second receiving module, for receiving the 3rd key sent from the key distribution center;
First deciphering module, for acquisition to be decrypted to the 3rd key using the first key that itself is preserved The call key;
Second encrypting module, for being encrypted using the call cipher key pair communication content after decryption, obtain encryption Content of Communication afterwards;
Second sending module, it is additionally operable to the Content of Communication after encryption being sent to second terminal.
In such scheme, first handover module, it is specifically used for:
The request of encrypted word service negotiation is sent to the first base station;
Receive the encrypted word service connection message that the first base station is sent;
Encrypted word service connection completion message is sent to the first base station.
7th aspect, the embodiments of the invention provide a kind of second terminal, the second terminal includes:Second switching mould Block, the 3rd receiving module and the second deciphering module;Wherein,
Second handover module, for being switched to encryption mode;
3rd receiving module, for receiving the 4th key sent from key distribution center;
Acquisition is decrypted to the 4th key in second deciphering module, the second key for being preserved using itself The call key;
3rd receiving module, it is additionally operable to receive the coded communication content sent from first terminal;
Second deciphering module, it is additionally operable to carry out the content of coded communication of reception using the call key after decryption Decryption, obtain the Content of Communication after decryption.
In such scheme, second handover module, it is specifically used for:
The request of encrypted word service negotiation is initiated to second base station;
Receive the encrypted word service connection message that second base station is sent;
Encrypted word service connection completion message is sent to the second base station.
7th aspect, the embodiments of the invention provide one kind call encryption system, the system includes:In encryption key distribution The heart, first terminal and second terminal;Wherein,
The key distribution center, for receiving the encryption key distribution request message sent from first terminal;Wherein, it is described The first identification code of first terminal and the second identification code of second terminal are carried in encryption key distribution request message;
And for obtaining key of conversing, and obtained respectively according to first identification code and the second identification code of reception Corresponding first key and the second key;
And for the 3rd key corresponding to acquisition to be encrypted to the call key using the first key, and The 4th key corresponding to acquisition is encrypted to the call key using second key;
And for the 3rd key of acquisition to be sent into the first terminal, and it is close by the described 4th of acquisition the Key is sent to the second terminal;
The first terminal, for being switched to encryption mode;
And for sending encryption key distribution request message to key distribution center;Wherein, the encryption key distribution request message In carry the first identification code of first terminal and the second identification code of second terminal;
And for receiving the 3rd key sent from the key distribution center;
It is and close for the 3rd key being decrypted using the first key that itself is preserved the acquisition call Key;
And for being encrypted using the call cipher key pair communication content after decryption, obtain the Content of Communication after encryption;
And for the Content of Communication after encryption to be sent into second terminal;
The second terminal, for being switched to encryption mode;
And for receiving the 4th key sent from key distribution center;
And the second key for being preserved using itself to the 4th key be decrypted obtain it is described call it is close Key;
And for receiving the coded communication content sent from first terminal;
And for the content of coded communication of reception to be decrypted using the call key after decryption, obtain decryption Content of Communication afterwards.
The embodiments of the invention provide it is a kind of converse encryption method, equipment and system, this method mainly by independently of The key distribution center of both call sides randomly generates call key, and call key is encrypted the both sides for being sent to call; The call key encrypted is decrypted using the counterpart keys that itself is preserved by both sides;Finally, it is close using the call decrypted Key completes the encryption and decryption of dialog context.Compared to prior art, this method greatly strengthen the security of system;Meanwhile Because terminal need to only store key corresponding to itself, therefore the complexity and limitation of terminal storage are also reduced to a certain extent Property.
Brief description of the drawings
Fig. 1 is a kind of method flow schematic diagram of encryption of conversing provided in an embodiment of the present invention;
Fig. 2 is that the detailed process of a kind of calling and called terminal synchronism switching provided in an embodiment of the present invention to encryption mode is illustrated Figure;
Fig. 3 is that the 3rd key is sent to the specific of calling terminal by a kind of key distribution center provided in an embodiment of the present invention Process schematic;
Fig. 4 is that the 4th key is sent to the specific of terminal called by a kind of key distribution center provided in an embodiment of the present invention Process schematic;
Fig. 5 is the method flow schematic diagram of another call encryption provided in an embodiment of the present invention;
Fig. 6 is that the 3rd key and the 4th key are sent to correspondingly by a kind of key distribution center provided in an embodiment of the present invention The detailed process schematic diagram of terminal;
Fig. 7 is the method flow schematic diagram of another call encryption provided in an embodiment of the present invention;
Fig. 8 is the detailed process schematic diagram that a kind of calling terminal provided in an embodiment of the present invention is switched to encryption mode;
Fig. 9 is the method flow schematic diagram of another call encryption provided in an embodiment of the present invention;
Figure 10 is the detailed process schematic diagram that a kind of terminal called provided in an embodiment of the present invention is switched to encryption mode;
Figure 11 is a kind of structural representation of key distribution center provided in an embodiment of the present invention;
Figure 12 is a kind of structural representation of first terminal provided in an embodiment of the present invention;
Figure 13 is a kind of structural representation of second terminal provided in an embodiment of the present invention;
Figure 14 is a kind of structural representation of encryption system of conversing provided in an embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes.
Embodiment one
Referring to Fig. 1, it gives a kind of method for encryption of conversing provided in an embodiment of the present invention, methods described specifically may be used With including:
S101, calling terminal and terminal called synchronism switching are to encryption mode;
It should be noted that before calling terminal with terminal called synchronism switching to encryption mode, calling terminal and quilt Terminal is made to have been set up call connection, simply dialog context now is not encrypted, i.e., what both sides were carried out is that unencryped word leads to Words.
S102, the calling terminal send encryption key distribution request message to key distribution center;Wherein, the encryption key distribution The first identification code of the calling terminal and the second identification code of the terminal called are carried in request message;
It is to be appreciated that first identification code is used for calling terminal described in unique mark;Similarly, second mark Code is used for terminal called described in unique mark.For example, if terminal is mobile phone, mobile subscriber number (Mobile can be used Directory Number, MDN) come mobile phone corresponding to unique mark, that is, phone number, it is stored in SIM card.
S103, the key distribution center receive the encryption key distribution request message that the calling terminal is sent, and obtain logical Talk about key;
Under normal circumstances, call key randomly generates according to default AES, and will not in communication process Periodically changed.It is to be appreciated that the call key is used to the dialog context of both call sides be encrypted.
S104, the key distribution center are first according to corresponding to first identification code and the second identification code obtain respectively Key and the second key;
Under normal circumstances, key distribution center is stored with the key corresponding to each user identification code, therefore, key point Each self-corresponding key of both sides can be obtained according to the identification code of the both call sides carried in encryption key distribution request message with center. In order to strengthen the confidentiality of terminal call, the first key and second key can be carried out the cycle in non-talking state Update to property, and notify to corresponding terminal.That is, first key and institute described in key distribution center and the terminal-pair The renewal for stating the second key is synchronous.
The call key is encrypted using the first key for S105, the key distribution center, is obtained corresponding The 3rd key, and using second key to it is described call key be encrypted, the 4th key corresponding to acquisition;
The 3rd key of acquisition is sent to the calling terminal by S106, the key distribution center;
The 4th key of acquisition is sent to the terminal called by S107, the key distribution center;
It should be noted that the key distribution center can be connected with short message service center, and it is close by the 3rd of acquisition the Key and the 4th key are sent respectively to corresponding terminal in the form of short message.
S108, the calling terminal receive the 3rd key, and the first key preserved using itself is to the described 3rd Key, which is decrypted, obtains the call key;
S109, the terminal called receive the 4th key, and the second key preserved using itself is to the described 4th Key, which is decrypted, obtains the call key;
It should be noted that because the first key that calling terminal is preserved using itself can be entered to the 3rd key of reception Row decryption obtains the call key, and therefore, calling terminal only needs to preserve the first key of itself;Similarly, terminal called Only need to preserve the second key of itself.Therefore, the method that the embodiment of the present invention is provided reduces to a certain extent The complexity and limitation of terminal storage.
S110, the calling terminal are encrypted using the call cipher key pair communication content after decryption, and by after encryption Content of Communication is sent to terminal called;
S111, the terminal called receive the Content of Communication after encryption, and after the call key pair encryption after utilization decryption Content of Communication be decrypted, obtain decryption after Content of Communication.
Exemplarily, the calling terminal and terminal called synchronism switching are to encryption mode, as shown in Fig. 2 methods described It can specifically include:
S210, calling terminal initiate the request of encrypted word service negotiation to first base station;Meanwhile terminal called is sent out to the second base station Play encrypted word service request;
It should be noted that the first base station refers to the serving BS of calling terminal, second base station refers to The serving BS of terminal called.
S220, the first base station receive the encrypted word service negotiation request message that calling terminal is sent, and send encrypted word industry Connection message be engaged in calling terminal;Meanwhile second base station receives the encrypted word service negotiation request message that terminal called is sent, And encrypted word service connection message is sent to terminal called;
S230, the calling terminal receive the encrypted word service connection message that the first base station is sent, and send encrypted word industry Business connection completion message is to first base station;Meanwhile the terminal called receives the encrypted word service connection that second base station is sent Message, and encrypted word service connection completion message is sent to the second base station.
It should be noted that under normal circumstances, the purpose of service negotiation is to make the calling terminal and the terminal called Can synchronism switching to encryption mode, that is to say, that when the first base station receives the encrypted word industry that the calling terminal sends Business connection message, meanwhile, after second base station receives the encrypted word service connection message that the terminal called is sent, the master Terminal and the terminal called are by synchronism switching to encryption mode.
Exemplarily, the 3rd key of acquisition is sent to the calling terminal, such as Fig. 3 by the key distribution center Shown, methods described can specifically include:
The 3rd key of acquisition is sent to short message service center by S310, the key distribution center;
S320, short message service center are by the 3rd key encapsulation of reception into the first short message;
The first short message for carrying the 3rd key is sent to the calling terminal by S330, short message service center.
Exemplarily, the 4th key of acquisition is sent to the terminal called, such as Fig. 4 by the key distribution center Shown, methods described can specifically include:
The 4th key of acquisition is sent to short message service center by S410, the key distribution center;
S420, short message service center are by the 4th key encapsulation of reception into the second short message;
The second short message for carrying the 4th key is sent to the terminal called by S430, short message service center.
By above-described embodiment, a kind of method for encryption of conversing provided in an embodiment of the present invention, this method is mainly led to Cross key distribution center and randomly generate call key, and call key is encrypted the both sides for being sent to call;Then, both sides The call key encrypted is decrypted the counterpart keys preserved using itself;Finally, it is complete using the call key decrypted Into the encryption and decryption of dialog context, so as to greatly strengthen the security of system;Simultaneously as need to only to store itself right for terminal The key answered, therefore the complexity and limitation of terminal storage are also reduced to a certain extent.
Embodiment two
As shown in figure 5, the figure gives a kind of call encryption provided in an embodiment of the present invention by taking key distribution center as an example Method, methods described can specifically include:
S510, the key distribution center receive the encryption key distribution request message sent from calling terminal;Wherein, it is described The first identification code of calling terminal and the second identification code of terminal called are carried in encryption key distribution request message;
S520, the key distribution center obtain call key, and according to first identification code and the second mark code division Not Huo Qu corresponding to first key and the second key;
It should be noted that because key distribution center is stored with key corresponding to each terminal, therefore, the key Distributing center can according to the first identification code of the calling terminal obtain corresponding to first key, according to the terminal called Second key corresponding to the acquisition of second identification code.
The call key is encrypted corresponding to acquisition using the first key for S530, the key distribution center 3rd key, and the 4th key corresponding to acquisition is encrypted to the call key using second key;
The 3rd key of acquisition is sent to the calling terminal, and will obtained by S540, the key distribution center The 4th key be sent to the terminal called.
Exemplarily, the 3rd key of acquisition is sent to the calling terminal by the key distribution center, and will The 4th key obtained is sent to the terminal called, as shown in fig. 6, methods described can specifically include:
The 3rd key and the 4th key of acquisition are sent to short message service center by S610, the key distribution center;
The 3rd key and the 4th key of reception are packaged into the first short message and by S620, short message service center respectively Two short messages;
The first short message for carrying the 3rd key is sent to the calling terminal by S630, short message service center, and will The second short message for carrying the 4th key is sent to the terminal called.
It should be noted that the key distribution center can be connected with the short message service center of communication system.Due to end End can receive short message during voice call is carried out, so key distribution center can be close by the described 3rd of acquisition the Key and the 4th key are sent to corresponding terminal in the form of short message.
The embodiment of the present invention is by taking key distribution center as an example, there is provided a kind of method for encryption of conversing, passes through encryption key distribution Center randomly generates call key, and call key is encrypted, and is then sent to the call key encrypted corresponding Terminal, so as to greatly strengthen the security of communication process;Meanwhile the call key that terminal need to be only preserved to encryption is decrypted Key, therefore, reduce the complexity and limitation of terminal storage to a certain extent.
Embodiment three
As shown in fig. 7, the figure gives a kind of side of encryption of conversing provided in an embodiment of the present invention by taking calling terminal as an example Method, methods described can specifically include:
S710, calling terminal are switched to encryption mode;
It should be noted that after the calling terminal and the first base station complete the foundation of encrypted word service connection, institute State calling terminal and be switched to encryption mode, i.e., the communication process of follow-up calling terminal and terminal called is encrypted word communication process.
S720, the calling terminal send encryption key distribution request message to key distribution center;Wherein, the encryption key distribution The first identification code of calling terminal and the second identification code of terminal called are carried in request message;
S730, the calling terminal receive the 3rd key sent from the key distribution center;
The 3rd key is decrypted described in acquisition using the first key that itself is preserved for S740, the calling terminal Call key;
S750, the calling terminal are encrypted using the call cipher key pair communication content after decryption, after obtaining encryption Content of Communication;
Content of Communication after encryption is sent to terminal called by S760, the calling terminal.
Exemplarily, the calling terminal is switched to encryption mode, as shown in figure 8, methods described can specifically include:
S810, calling terminal send the request of encrypted word service negotiation to first base station;
S820, the calling terminal receive the encrypted word service connection message that the first base station is sent;
S830, the calling terminal send encrypted word service connection completion message to the first base station.
The embodiment of the present invention is by taking calling terminal as an example, there is provided a kind of method for encryption of conversing, calling terminal are received and come from The call key encrypted that key distribution center is sent, and using the first key that itself is preserved to the call key encrypted It is decrypted, so as to obtain the call key after decryption, further dialog context is carried out using the call key after decryption Encryption, realize the encrypted word call of both call sides.As the above analysis, this method greatly strengthen the security of system;Meanwhile Because terminal need to only preserve the key that the call key to encryption is decrypted, so reducing terminal to a certain extent The complexity and limitation of storage.
Example IV
As shown in figure 9, the figure gives a kind of side of encryption of conversing provided in an embodiment of the present invention by taking terminal called as an example Method, methods described can specifically include:
S910, terminal called are switched to encryption mode;
It should be noted that the terminal called is and calling terminal synchronism switching to encryption mode.
S920, the terminal called receive the 4th key sent from key distribution center;
4th key is decrypted described in acquisition the second key that S930, the terminal called are preserved using itself Call key;
S940, the terminal called receive the coded communication content sent from calling terminal;
The content of coded communication of reception is decrypted using the call key after decryption for S950, the terminal called, Obtain the Content of Communication after decryption.
Exemplarily, the terminal called is switched to encryption mode, and as shown in Figure 10, methods described can specifically include:
S1010, terminal called initiate the request of encrypted word service negotiation to the second base station;
S1020, the terminal called receive the encrypted word service connection message that second base station is sent;
S1030, the terminal called send encrypted word service connection completion message to the second base station.
It should be noted that after the terminal called receives the encrypted word service connection message that second base station is sent, Complete and established with the encrypted word service connection of base station, and send encrypted word service connection completion message to the second base station, now institute State terminal called and be switched to encryption mode.In order to ensure that the synchronous of both sides' encrypted word call is carried out, the terminal called and the master Terminal is made to need synchronism switching to encryption mode.
The embodiment of the present invention is by taking terminal called as an example, there is provided a kind of method for encryption of conversing, terminal called are received and come from The call key encrypted that key distribution center is sent, and using the second key that itself is preserved to the call key encrypted It is decrypted, so as to obtain the call key after decryption, further utilizes encryption of the call key after decryption to reception Dialog context is decrypted, so as to realize that the encrypted word of both call sides is conversed.Due to terminal called receive be encryption after call Key, therefore greatly strengthen the security of system;Simultaneously as the call key that terminal need to only preserve to encryption is decrypted Key, so reducing the complexity and limitation of terminal storage to a certain extent.
Embodiment five
Based on previous embodiment identical technical concept, as shown in figure 11, it gives provided in an embodiment of the present invention A kind of key distribution center 110, it can be seen that the key distribution center 110 can include:First receiving module 1110th, acquisition module 1120, the first encrypting module 1130 and the first sending module 1140;Wherein,
First receiving module 1110, for receiving the encryption key distribution request message sent from first terminal;Wherein, The first identification code of first terminal and the second identification code of second terminal are carried in the encryption key distribution request message;
The acquisition module 1120, marked for obtaining key of conversing, and according to first identification code of reception and second Know code division and do not obtain corresponding first key and the second key;
First encrypting module 1130, for acquisition pair to be encrypted to the call key using the first key The 3rd key answered, and the 4th key corresponding to acquisition is encrypted to the call key using second key;
First sending module 1140, for the 3rd key of acquisition to be sent into the first terminal, and will The 4th key obtained is sent to the second terminal.
It should be noted that the first terminal is exactly the calling terminal described in above-described embodiment, the second terminal It is exactly the terminal called described in above-described embodiment.
In such scheme, first sending module 1140, it is specifically used for:By the 3rd key of acquisition and the 4th Key is sent to short message service center;Wherein, the short message service center, is specifically used for:
The 3rd key and the 4th key of reception are packaged into the first short message and the second short message respectively;
The first short message for carrying the 3rd key is sent to the first terminal, and the 4th key will be carried The second short message be sent to the second terminal.
Embodiment six
Based on previous embodiment identical technical concept, as shown in figure 12, it gives provided in an embodiment of the present invention A kind of first terminal 120, it can be seen that the first terminal 120 can include:First handover module 1210, second Sending module 1220, the second receiving module 1230, the first deciphering module 1240 and the second encrypting module 1250;Wherein,
First handover module 1210, for the first terminal 120 to be switched into encryption mode;
Second sending module 1220, for sending encryption key distribution request message to key distribution center;Wherein, it is described The first identification code of first terminal and the second identification code of second terminal are carried in encryption key distribution request message;
Second receiving module 1230, for receiving the 3rd key sent from the key distribution center;
First deciphering module 1240, for the 3rd key to be decrypted using the first key that itself is preserved Obtain the call key;
Second encrypting module 1250, for being encrypted using the call cipher key pair communication content after decryption, obtain Content of Communication after encryption;
Second sending module 1220, it is additionally operable to the Content of Communication after encryption being sent to second terminal.
It should be noted that first deciphering module and the second encrypting module can pass through the physical connections such as serial ports and institute State first terminal to be connected, be an entirety during actual use similar to the SIM card of terminal insertion.
In such scheme, first handover module 1210, it is specifically used for:
The request of encrypted word service negotiation is sent to the first base station;
Receive the encrypted word service connection message that the first base station is sent;
Encrypted word service connection completion message is sent to the first base station.
Embodiment seven
Based on previous embodiment identical technical concept, as shown in figure 13, it gives provided in an embodiment of the present invention A kind of second terminal 130, it can be seen that the second terminal 130 can include:Second handover module the 1310, the 3rd The deciphering module 1330 of receiving module 1320 and second;Wherein,
Second handover module 1310, for being switched to encryption mode;
3rd receiving module 1320, for receiving the 4th key sent from key distribution center;
The 4th key is decrypted for second deciphering module 1330, the second key for being preserved using itself Obtain the call key;
3rd receiving module 1320, it is additionally operable to receive the coded communication content sent from first terminal;
Second deciphering module 1330, it is additionally operable to the coded communication content to reception using the call key after decryption It is decrypted, obtains the Content of Communication after decryption.
It should be noted that second deciphering module as first deciphering module, can pass through the things such as serial ports Reason connection is connected with the second terminal, the SIM card inserted similar to terminal, is an entirety during actual use.
In such scheme, second handover module 1310, it is specifically used for:
The request of encrypted word service negotiation is initiated to second base station;
Receive the encrypted word service connection message that second base station is sent;
Encrypted word service connection completion message is sent to the second base station.
Embodiment eight
Based on previous embodiment identical technical concept, as shown in figure 14, it gives provided in an embodiment of the present invention One kind call encryption system 140, the call encryption system include:Key distribution center 110, first terminal 120 and second are eventually End 130;Wherein,
The key distribution center 110, for receiving the encryption key distribution request message sent from first terminal;Wherein, The first identification code of first terminal and the second identification code of second terminal are carried in the encryption key distribution request message;
And for obtaining key of conversing, and obtained respectively according to first identification code and the second identification code of reception Corresponding first key and the second key;
And for the 3rd key corresponding to acquisition to be encrypted to the call key using the first key, and The 4th key corresponding to acquisition is encrypted to the call key using second key;
And for the 3rd key of acquisition to be sent into the first terminal, and it is close by the described 4th of acquisition the Key is sent to the second terminal;
The first terminal 120, for being switched to encryption mode;
And for sending encryption key distribution request message to key distribution center;Wherein, the encryption key distribution request message In carry the first identification code of first terminal and the second identification code of second terminal;
And for receiving the 3rd key sent from the key distribution center;
It is and close for the 3rd key being decrypted using the first key that itself is preserved the acquisition call Key;
And for being encrypted using the call cipher key pair communication content after decryption, obtain the Content of Communication after encryption;
And for the Content of Communication after encryption to be sent into second terminal;
The second terminal 130, for being switched to encryption mode;
And for receiving the 4th key sent from key distribution center;
And the second key for being preserved using itself to the 4th key be decrypted obtain it is described call it is close Key;
And for receiving the coded communication content sent from first terminal;
And for the content of coded communication of reception to be decrypted using the call key after decryption, obtain decryption Content of Communication afterwards.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program Product.Therefore, the shape of the embodiment in terms of the present invention can use hardware embodiment, software implementation or combination software and hardware Formula.Moreover, the present invention can use the computer for wherein including computer usable program code in one or more to use storage The form for the computer program product that medium is implemented on (including but is not limited to magnetic disk storage and optical memory etc.).
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided The processors of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer or The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in individual square frame or multiple square frames.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the scope of the present invention.

Claims (14)

  1. A kind of 1. method for encryption of conversing, it is characterised in that methods described includes:
    Key distribution center receives the encryption key distribution request message sent from calling terminal;Wherein, the encryption key distribution request The first identification code of calling terminal and the second identification code of terminal called are carried in message;
    The key distribution center obtains call key, and is obtained respectively according to first identification code and the second identification code of reception First key and the second key corresponding to taking;
    The 3rd key corresponding to acquisition is encrypted to the call key using the first key in the key distribution center, And the 4th key corresponding to acquisition is encrypted to the call key using second key;
    The 3rd key of acquisition is sent to the calling terminal by the key distribution center, and by the described 4th of acquisition the Key is sent to the terminal called.
  2. 2. according to the method for claim 1, it is characterised in that the key distribution center is by the 3rd key of acquisition The calling terminal is sent to, and the 4th key of acquisition is sent to the terminal called, is specifically included:
    The 3rd key and the 4th key of acquisition are sent to short message service center by the key distribution center;Wherein, it is described Short message service center is used to the 3rd key and the 4th key of reception being packaged into the first short message and the second short message respectively Afterwards, then by the first short message and the second short message calling terminal and terminal called are correspondingly sent to.
  3. A kind of 3. method for encryption of conversing, it is characterised in that methods described includes:
    Calling terminal is switched to encryption mode;
    The calling terminal sends encryption key distribution request message to key distribution center;Wherein, the encryption key distribution request message In carry the first identification code of calling terminal and the second identification code of terminal called;
    The calling terminal receives the 3rd key sent from the key distribution center;
    The calling terminal is decrypted to the 3rd key using the first key that itself is preserved and obtains the call key;
    The calling terminal is encrypted using the call cipher key pair communication content after decryption, obtains the Content of Communication after encryption;
    Content of Communication after encryption is sent to terminal called by the calling terminal.
  4. 4. according to the method for claim 3, it is characterised in that the calling terminal is switched to encryption mode, specifically includes:
    The calling terminal sends the request of encrypted word service negotiation to the first base station;
    The calling terminal receives the encrypted word service connection message that the first base station is sent;
    The calling terminal sends encrypted word service connection completion message to the first base station.
  5. A kind of 5. method for encryption of conversing, it is characterised in that methods described includes:
    Terminal called is switched to encryption mode;
    The terminal called receives the 4th key sent from key distribution center;
    The second key that the terminal called is preserved using itself is decrypted to the 4th key and obtains the call key;
    The terminal called receives the coded communication content sent from calling terminal;
    The content of coded communication of reception is decrypted using the call key after decryption for the terminal called, after obtaining decryption Content of Communication.
  6. 6. according to the method for claim 5, it is characterised in that the terminal called is switched to encryption mode, specifically includes:
    The terminal called initiates the request of encrypted word service negotiation to second base station;
    The terminal called receives the encrypted word service connection message that second base station is sent;
    The terminal called sends encrypted word service connection completion message to the second base station.
  7. A kind of 7. method for encryption of conversing, it is characterised in that methods described includes:
    Calling terminal and terminal called synchronism switching to encryption mode;
    The calling terminal sends encryption key distribution request message to key distribution center;Wherein, the encryption key distribution request message In carry the first identification code of the calling terminal and the second identification code of the terminal called;
    The key distribution center receives the encryption key distribution request message that the calling terminal is sent, and obtains call key;
    Key distribution center first key and according to corresponding to first identification code and the second identification code obtain respectively Two keys;
    The call key is encrypted using the first key for the key distribution center, and the 3rd is close corresponding to acquisition Key, and the call key is encrypted using second key, the 4th key corresponding to acquisition;
    The 3rd key of acquisition is sent to the calling terminal by the key distribution center;
    The 4th key of acquisition is sent to the terminal called by the key distribution center;
    The calling terminal receives the 3rd key, and the first key preserved using itself is solved to the 3rd key It is close to obtain the call key;
    The terminal called receives the 4th key, and the second key preserved using itself is solved to the 4th key It is close to obtain the call key;
    The calling terminal is encrypted using the call cipher key pair communication content after decryption, and the Content of Communication after encryption is sent out Give terminal called;
    The terminal called receives the Content of Communication after encryption, and utilizes the Content of Communication after the call key pair encryption after decryption It is decrypted, obtains the Content of Communication after decryption.
  8. 8. a kind of key distribution center, it is characterised in that the key distribution center includes:First receiving module, acquisition module, First encrypting module and the first sending module;Wherein,
    First receiving module, for receiving the encryption key distribution request message sent from first terminal;Wherein, the key The first identification code of first terminal and the second identification code of second terminal are carried in allocation request message;
    The acquisition module, distinguish for obtaining key of conversing, and according to first identification code and the second identification code of reception First key corresponding to acquisition and the second key;
    First encrypting module, for the call key to be encrypted the 3rd corresponding to acquisition using the first key Key, and the 4th key corresponding to acquisition is encrypted to the call key using second key;
    First sending module, for the 3rd key of acquisition to be sent into the first terminal, and by the institute of acquisition State the 4th key and be sent to the second terminal.
  9. 9. key distribution center according to claim 8, it is characterised in that first sending module, be specifically used for:Will The 3rd key and the 4th key obtained is sent to short message service center;Wherein, the short message service center, is specifically used for:
    The 3rd key and the 4th key of reception are packaged into the first short message and the second short message respectively;
    The first short message for carrying the 3rd key is sent to the first terminal, and the of the 4th key will be carried Two short messages are sent to the second terminal.
  10. 10. a kind of first terminal, it is characterised in that the first terminal includes:First handover module, the second sending module, Two receiving modules, the first deciphering module and the second encrypting module;Wherein,
    First handover module, for the first terminal to be switched into encryption mode;
    Second sending module, for sending encryption key distribution request message to key distribution center;Wherein, the encryption key distribution The first identification code of first terminal and the second identification code of second terminal are carried in request message;
    Second receiving module, for receiving the 3rd key sent from the key distribution center;
    First deciphering module, for the 3rd key to be decrypted described in acquisition using the first key that itself is preserved Call key;
    Second encrypting module, for being encrypted using the call cipher key pair communication content after decryption, after obtaining encryption Content of Communication;
    Second sending module, it is additionally operable to the Content of Communication after encryption being sent to second terminal.
  11. 11. first terminal according to claim 10, it is characterised in that first handover module, be specifically used for:
    The request of encrypted word service negotiation is sent to the first base station;
    Receive the encrypted word service connection message that the first base station is sent;
    Encrypted word service connection completion message is sent to the first base station.
  12. 12. a kind of second terminal, it is characterised in that the second terminal includes:Second handover module, the 3rd receiving module and Two deciphering modules;Wherein,
    Second handover module, for being switched to encryption mode;
    3rd receiving module, for receiving the 4th key sent from key distribution center;
    The 4th key is decrypted described in acquisition for second deciphering module, the second key for being preserved using itself Call key;
    3rd receiving module, it is additionally operable to receive the coded communication content sent from first terminal;
    Second deciphering module, it is additionally operable to solve the content of coded communication of reception using the call key after decryption It is close, obtain the Content of Communication after decryption.
  13. 13. second terminal according to claim 12, it is characterised in that second handover module, be specifically used for:
    The request of encrypted word service negotiation is initiated to second base station;
    Receive the encrypted word service connection message that second base station is sent;
    Encrypted word service connection completion message is sent to the second base station.
  14. 14. one kind call encryption system, it is characterised in that the system includes:Key distribution center, first terminal and second are eventually End;Wherein,
    The key distribution center, for receiving the encryption key distribution request message sent from first terminal;Wherein, the key The first identification code of first terminal and the second identification code of second terminal are carried in allocation request message;
    And obtained respectively correspondingly for obtaining key of conversing, and according to first identification code and the second identification code of reception First key and the second key;
    And for the 3rd key corresponding to acquisition to be encrypted to the call key using the first key, and utilize The 4th key corresponding to acquisition is encrypted to the call key in second key;
    And for the 3rd key of acquisition to be sent into the first terminal, and the 4th key of acquisition is sent out Give the second terminal;
    The first terminal, for being switched to encryption mode;
    And for sending encryption key distribution request message to key distribution center;Wherein, taken in the encryption key distribution request message Second identification code of the first identification code and second terminal with first terminal;
    And for receiving the 3rd key sent from the key distribution center;
    And obtain the call key for the 3rd key to be decrypted using the first key that itself is preserved;
    And for being encrypted using the call cipher key pair communication content after decryption, obtain the Content of Communication after encryption;
    And for the Content of Communication after encryption to be sent into second terminal;
    The second terminal, for being switched to encryption mode;
    And for receiving the 4th key sent from key distribution center;
    And the second key for being preserved using itself is decrypted to the 4th key and obtains the call key;
    And for receiving the coded communication content sent from first terminal;
    And for the content of coded communication of reception to be decrypted using the call key after decryption, after obtaining decryption Content of Communication.
CN201610848797.XA 2016-09-23 2016-09-23 A kind of method, equipment and the system of encryption of conversing Withdrawn CN107872792A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610848797.XA CN107872792A (en) 2016-09-23 2016-09-23 A kind of method, equipment and the system of encryption of conversing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610848797.XA CN107872792A (en) 2016-09-23 2016-09-23 A kind of method, equipment and the system of encryption of conversing

Publications (1)

Publication Number Publication Date
CN107872792A true CN107872792A (en) 2018-04-03

Family

ID=61751695

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610848797.XA Withdrawn CN107872792A (en) 2016-09-23 2016-09-23 A kind of method, equipment and the system of encryption of conversing

Country Status (1)

Country Link
CN (1) CN107872792A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109088900A (en) * 2018-10-31 2018-12-25 北京元安物联技术有限公司 A kind of communication means and communication device for sender and recipient
CN114125824A (en) * 2020-08-31 2022-03-01 中国电信股份有限公司 Voice encryption processing method, server, terminal, system and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101309281A (en) * 2008-07-22 2008-11-19 中国电信股份有限公司 End-to-end speech ciphering method, apparatus and system
CN101867898A (en) * 2010-07-02 2010-10-20 中国电信股份有限公司 Short message encrypting communication system, method and secret key center
CN102123361A (en) * 2010-12-31 2011-07-13 华为技术有限公司 Method and device for realizing encrypted message communication
CN105577634A (en) * 2015-07-31 2016-05-11 宇龙计算机通信科技(深圳)有限公司 Encrypted conversation communication establishing failure processing method and user terminals

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101309281A (en) * 2008-07-22 2008-11-19 中国电信股份有限公司 End-to-end speech ciphering method, apparatus and system
CN101867898A (en) * 2010-07-02 2010-10-20 中国电信股份有限公司 Short message encrypting communication system, method and secret key center
CN102123361A (en) * 2010-12-31 2011-07-13 华为技术有限公司 Method and device for realizing encrypted message communication
CN105577634A (en) * 2015-07-31 2016-05-11 宇龙计算机通信科技(深圳)有限公司 Encrypted conversation communication establishing failure processing method and user terminals

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109088900A (en) * 2018-10-31 2018-12-25 北京元安物联技术有限公司 A kind of communication means and communication device for sender and recipient
CN114125824A (en) * 2020-08-31 2022-03-01 中国电信股份有限公司 Voice encryption processing method, server, terminal, system and storage medium

Similar Documents

Publication Publication Date Title
CN107006049A (en) A kind of smart machine and its set up the method for equipment room bluetooth connection, device
CN101926151B (en) Method and communication network system for establishing security conjunction
CN101917711B (en) A kind of method of mobile communication system and voice call encryption thereof
CN111669276A (en) Network verification method, device and system
EP3337088B1 (en) Data encryption method, decryption method, apparatus, and system
CN104780040A (en) Handheld device encryption method and system based on quantum cryptography
CN110169102B (en) Privacy protection method and device
US10341305B2 (en) Encrypted communications method and communications terminal, and computer storage medium
CN105814859B (en) A kind of network collocating method, relevant apparatus and system
CN103458400A (en) Key management method for voice encryption communication system
CN102546172A (en) Access control method of intelligent card, intelligent card, terminal and system
CN107666395A (en) One population file management method, user terminal, group chat system
CN111788836B (en) Data transmission method and BLE equipment
CN106685897A (en) Safe input method, device and system
CN107872792A (en) A kind of method, equipment and the system of encryption of conversing
CN101895538A (en) Method and system for establishing data exchange channels, smart card and server
CN103546873B (en) Services through one key pushed processing method and processing device
CN101938743B (en) Generation method and device of safe keys
CN104735626A (en) Achieving method and device for trunking group communication public security
CN103763697A (en) Wireless access point multi-secret key support system and method
CN105812384A (en) Communication method and system
CN105611528B (en) Multi-system intelligent terminal and encrypted telephone communication method thereof
CN106487761A (en) A kind of method for message transmission and the network equipment
CN103987032A (en) Mobile communication terminal voice encryption method
CN106372557B (en) Certificate card information acquisition method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20180403

WW01 Invention patent application withdrawn after publication