CN1710985A - Enciphered consulating method for speech-sound communication in grouped network - Google Patents

Enciphered consulating method for speech-sound communication in grouped network Download PDF

Info

Publication number
CN1710985A
CN1710985A CN200510012048.5A CN200510012048A CN1710985A CN 1710985 A CN1710985 A CN 1710985A CN 200510012048 A CN200510012048 A CN 200510012048A CN 1710985 A CN1710985 A CN 1710985A
Authority
CN
China
Prior art keywords
message
calling party
callee
registrar
cryptographic algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN200510012048.5A
Other languages
Chinese (zh)
Other versions
CN100373991C (en
Inventor
孙毅
金鑫
田霖
石晶林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Dingsoft Technology Co.,Ltd.
Beijing Dongfangjianyu Institute of Concrete Science & Technology Limited Compan
Beijing Xinhang Building Material Group Co., Ltd.
Original Assignee
Institute of Computing Technology of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Computing Technology of CAS filed Critical Institute of Computing Technology of CAS
Priority to CNB2005100120485A priority Critical patent/CN100373991C/en
Publication of CN1710985A publication Critical patent/CN1710985A/en
Application granted granted Critical
Publication of CN100373991C publication Critical patent/CN100373991C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The method includes steps: each communication terminal possesses a designator and a pair of public and private keys; when logging on network, terminal registers own designator and public and private keys onto registration server on core network; in time of staring up or switching across boundary of zone, terminal registers own information of address to the registration server; when launching a call, the calling party obtains current address and public key of the called party from the server; then, the calling party designates encryption algorithm and cipher key for this call, and informs the called party; after receiving informed message, the called party checks up whether self supports the encryption algorithm designated by the calling party; if yes, the called party sends acknowledgement message to the called party; otherwise, the called party sends error message to the called party; based on error message, the calling party reselects encryption algorithm and cipher key.

Description

The encrypted negotiation method of voice communication in a kind of packet network
Technical field
The invention belongs to the network security technology field, the method for voice communication encrypted negotiation in particularly a kind of packet network.
Background technology
In recent ten years, the Speech Communication technology on the Packet Based Network (Voice over IP-VoIP) is the research focus of telecommunications industry and computer industry always.Document [1] " Voice over IPFundamentals ", Cisco Press, www.cisco.com.Be accompanied by being extensive use of of voip technology, the fail safe that how to improve voice communication just becomes the problem of a key.Speech data is encrypted, can be guaranteed the confidentiality of speech transmissions.Consider that voice communication is the very strong business of a kind of real-time, should adopt symmetric key algorithm, and the prerequisite of symmetric key algorithm work is exactly to share cryptographic algorithm and session key between the both sides of Speech Communication through consultation the encryption of speech data.
Summary of the invention
The object of the present invention is to provide a kind of in packet network the encrypted negotiation method of Speech Communication.It can share information such as cryptographic algorithm, session key by introducing mechanism such as public and private key, eap-message digest between the both sides of Speech Communication, thereby improves the fail safe and the reliability of voice communication.
The present invention is based upon in the packet network environment, and network is made up of functional entitys such as voice communication terminal (IP mobile telephone, personal digital assistant, notebook computer, desktop computer etc.), access device (base station, cable access router etc.), registrar.Wherein, voice communication terminal is by wired or wireless mode access network, and registrar is arranged in core network, is used to safeguard the Speech Communication relevant information of all communication terminals.See Fig. 1.
The present invention is a kind of implementation method of voice communication encrypted negotiation in the packet network.Each communication terminal all has a communication mark symbol and a pair of public and private key, wherein each communication terminal just is registered to registrar on the core net to the communication mark of this terminal symbol and PKI when equipment networks, has preserved the legal PKI and the cryptographic algorithm index value of registrar simultaneously and tabulate in this terminal; When communication terminal start or handover, need on registrar, register the current address information of this machine; When audio call is initiated, the calling party at first obtains called current address and PKI from registrar, is specified the cryptographic algorithm and the key of this conversation then by the calling party, and notifies the callee, after the notified message of callee, check whether oneself supports the cryptographic algorithm of calling party's appointment, if support, called party to calling party sends acknowledge message, otherwise, called party to calling party sends corresponding error messages, and caller is reselected cryptographic algorithm and key according to the called error messages of sending.
The present invention is the encrypted negotiation method of voice communication in a kind of packet network, and its implementation is as follows:
Each communication terminal all has a communication mark symbol, the communication mark symbol can adopt the form of telephone number also can adopt other all legal identifiers, the communication mark symbol is used for indicating uniquely a verbal system, and all legal communication mark symbols all have uniqueness not to be repeated mutually.The IP address of corresponding with it is each communication terminal is unfixed, so the IP address can not be used for the identification communication terminal equipment.In order to improve fail safe, each communication terminal also has a pair of public and private key, wherein private key is left in device interior in confidence and can not be disclosed, PKI just has been registered to the registrar on the core net together with the communication mark symbol in the initial networking of communication equipment, in registration process, communication terminal device also obtains and has preserved the legal PKI of registrar and the index value tabulation of cryptographic algorithm simultaneously.After the registration that completes successfully communication mark symbol and PKI, communication terminal device just can have been opened the voice service on the Packet Based Network.
Because the IP address of each communication terminal device is unfixed, so starting voice service or terminal equipment each time at communication terminal is moved and switches and when causing the IP address to change, all need the up-to-date address information of terminal by ADDR_SET message informing registrar, registrar is the relative recording of this terminal equipment in the new database more.For the ease of registrar terminal is carried out authentication, ADDR_SET message need be signed with the private key of terminal, and message content comprises information such as the communication mark symbol of terminal equipment and address.
When calling party's communication terminal need be initiated audio call, it sent to registrar core net on together with calling party and callee's communication mark symbol by INFO_REQ message with timestamp.After registrar is received INFO_REQ message, the database of inquiring about oneself finds callee current IP address and PKI, constitute the plaintext of INFO_RES message then together with the timestamp in the INFO_REQ message, and message expressly calculated eap-message digest, at last INFO_RES message is signed with the private key of registrar itself and send to the calling party.The calling party is decrypted INFO_RES message with the PKI of registrar, recomputate message summary info expressly then, and whether destroyed with this integrality of judging INFO_RES message, calling party's terminal also can contrast timestamp and the own original timestamp that writes down in the INFO_RES message simultaneously, if both upcheck at identical and message integrity, then the calling party just uses the process that the callee current address that comprises in the INFO_RES message and PKI continue the voice communication encrypted negotiation, otherwise the calling party must resend the correct answer of INFO_REQ message and queued for log-on server.
After in case the calling party has obtained callee's legal address and PKI from registrar, next it will and specify corresponding session key (it is that 0 this conversation of expression need not to encrypt that the calling party also can be provided with the cryptographic algorithm index value) for the selected a kind of cryptographic algorithm of this communication, cryptographic algorithm is represented by an index value, different cryptographic algorithm index value differences, the index value tabulation of cryptographic algorithm is safeguarded by registrar is unified, terminal equipment obtains and has preserved this tabulation from registrar when networking, in addition, terminal equipment also can dynamically be downloaded this tabulation to the registrar request by LIST_REQ message.The plaintext that cryptographic algorithm index that the calling party selects and session key have constituted CIPH_SET message, before sending this message, the calling party need at first calculate message summary expressly, then CIPH_SET message is encrypted with callee's PKI, and passes to the current address of terminal called.
After terminal called is received CIPH_SET message, decipher this message with the private key of oneself, recomputate message summary expressly then, and whether destroyed with this integrality of judging CIPH_SET message, if message integrity check is not passed through, the callee will send CIPH_SET_ERROR message to the calling party, and type of error is made as " integrity checking failure ", after the calling party receives this type of error message, can transmit CIPH_SET message again; If message integrity check is passed through, terminal called will continue to detect the cryptographic algorithm whether this machine supports appointment in the CIPH_SET message, if do not support, then terminal called will send CIPH_SET_ERROR message to the calling party, type of error is made as " cryptographic algorithm is not supported ", the index value information that in such CIPH_SET_ERROR message, also can comprise all cryptographic algorithm of terminal called support simultaneously, after the calling party receives this type of error message, can reassign the cryptographic algorithm and the session key (it is that 0 this conversation of expression need not to encrypt that the calling party also can be provided with the cryptographic algorithm index value) of this voice call according to the cryptographic algorithm that the callee supports, and then send CIPH_SET message; If the callee supports the cryptographic algorithm that the calling party selectes, then the callee can send CIPH_SET_CONF message to the calling party, after the calling party finally receives the CIPH_SET_CONF message that the callee sends, the encrypted negotiation process finishes, and communicating pair just can utilize the cryptographic algorithm and the session key that consult to come the enciphoring voice telecommunication packet.
The present invention has the following advantages:
1) the encrypted negotiation process at most only need be shaken hands for 4 times, and is simple.
2) different terminals can be supported different cryptographic algorithm, and flexibility is good.
3) introduce mechanism such as timestamp, eap-message digest, can solve safety issues such as Replay Attack, content tampering.
Description of drawings
Fig. 1 is the packet network topology diagram.
Fig. 2 is the flow chart of the encrypted negotiation process that experiences of a voice call.
Embodiment
Among Fig. 2, the concrete steps of the encrypted negotiation that a voice call is experienced are as follows:
Step S2.1: the calling party sends call request;
Step S2.2: the registrar of calling party on core net sends INFO_REQ message, this message has comprised caller, called party information and timestamp, registrar is replied INFO_RES to the calling party, this message is signed with the private key of registrar, and content comprises the current IP address of timestamp, the callee of calling party's appointment, callee's PKI and eap-message digest etc.;
Step S2.3: the calling party by the validity of timestamp inspection INFO_RES message, checks the integrality of INFO_RES message with the PKI deciphering INFO_RES message of registrar by summary, if above inspection is all passed through, then enter S2.4, otherwise, S2.2 returned;
Step S2.4: the calling party selects cryptographic algorithm and session key for this voice communication, and send CIPH_SET message to the callee, this message uses callee's PKI to encrypt, and content comprises cryptographic algorithm index value, session key and the eap-message digest etc. that the calling party selectes;
Step S2.5: the callee receives CIPH_SET message, deciphers this message with private key;
Step S2.6: the callee judges the integrality of CIPH_SET message by calculating eap-message digest, if integrity checking passes through, enters S2.8, if message integrity is destroyed, enters S2.7;
Step S2.7: the callee sends CIPH_SET_ERROR message to the calling party, and type of error is the integrity checking failure, returns S2.4;
Step S2.8: the called cryptographic algorithm that judges whether to support that caller is selected if support, enters S2.10; Otherwise, enter S2.9;
Step S2.9: the callee sends CIPH_SET_ERROR message to the calling party, and type of error is that cryptographic algorithm is not supported, has comprised all cryptographic algorithm index values that the callee supports in this message simultaneously, returns S2.4;
Step S2.10: the callee sends CIPH_SET_CONF message to the calling party, and setting completed for the caller notification enciphered message;
Step S2.11: the calling party receives CIPH_SET_CONF message, and the encrypted negotiation process finishes.

Claims (3)

1. the encrypted negotiation method of voice communication in the packet network, it is characterized in that, each communication terminal all has a communication mark symbol and a pair of public and private key, wherein each communication terminal just is registered to registrar on the core net to the communication mark of this terminal symbol and PKI when equipment networks, has preserved the legal PKI and the cryptographic algorithm index value of registrar simultaneously and tabulate in this terminal; When communication terminal start or handover, need on registrar, register the current address information of this machine; When audio call is initiated, the calling party at first obtains called current address and PKI from registrar, is specified the cryptographic algorithm and the key of this conversation then by the calling party, and notifies the callee, after the notified message of callee, check whether oneself supports the cryptographic algorithm of calling party's appointment, if support, called party to calling party sends acknowledge message, otherwise, called party to calling party sends corresponding error messages, and caller is reselected cryptographic algorithm and key according to the called error messages of sending.
2. the encrypted negotiation method of voice communication in the packet network according to claim 1, it is characterized in that: each communication terminal all has a communication mark symbol (as telephone number, can indicate voice communication device uniquely) and a pair of public and private key, wherein each communication terminal just is registered to registrar on the core net to the communication mark of this terminal symbol and PKI when equipment networks, has preserved the legal PKI and the cryptographic algorithm index value of registrar simultaneously and tabulate in this terminal; When communication terminal start or handover, need register the current address of this machine private key signature at registrar; When audio call is initiated, calling party's information together with communicating pair of will stabbing the current time sends to the registrar on the core net, after registrar is received the query requests that the calling party sends, reply corresponding message to the calling party, reply the private key signature of message with registrar, content comprises the timestamp that the calling party indicates, the IP address that the callee is current, callee's PKI and eap-message digest etc., after the calling party receives the answer message that registrar sends, decipher this message with the PKI of registrar, and validity and integrality by " timestamp " and " summary " field detect-message, do not pass through if detect, the calling party needs to send request to registrar again, pass through if detect, the calling party just selects cryptographic algorithm and session key for this voice communication, and send to encrypt to the callee message is set, this message is encrypted with callee's PKI, content comprises the cryptographic algorithm that the calling party selectes, session key and eap-message digest etc., after the callee receives that encryption is provided with message, decipher this message with private key, pass through the integrality of " summary " field detect-message then, do not pass through if detect, the callee can send corresponding error messages to the calling party, caller notification retransmits this message, pass through if detect, the callee checks whether this machine supports the cryptographic algorithm that the calling party selectes, if do not support, then the callee can send corresponding error messages to the calling party, the various cryptographic algorithm information caller notification of callee's support, so that allow the calling party carry out the selection of enciphered message again, if the cryptographic algorithm that called support caller is selected, then called meeting sends corresponding acknowledge message to caller, after the calling party received acknowledge message, the encrypted negotiation process finished.
3. the encrypted negotiation method of voice communication in a kind of packet network according to claim 1, the concrete steps of its voice communication encrypted negotiation are as follows:
Step S2.1: the calling party sends call request;
Step S2.2: the registrar of calling party on core net sends INFO_REQ message, this message has comprised caller, called party information and timestamp, registrar is replied INFO_RES to the calling party, this message is signed with the private key of registrar, and content comprises the current IP address of timestamp, the callee of calling party's appointment, callee's PKI and eap-message digest; Step S2.3: the calling party by the validity of timestamp inspection INFO_RES message, checks the integrality of INFO_RES message with the PKI deciphering INFO_RES message of registrar by summary, if above inspection is all passed through, then enter S2.4, otherwise, S2.2 returned;
Step S2.4: the calling party selects cryptographic algorithm and session key for this voice communication, and send CIPH_SET message to the callee, this message uses callee's PKI to encrypt, and content comprises cryptographic algorithm index value, session key and the eap-message digest that the calling party selectes;
Step S2.5: the callee receives CIPH_SET message, deciphers this message with private key;
Step S2.6: the callee judges the integrality of CIPH_SET message by calculating eap-message digest, if integrity checking passes through, enters S2.8, if message integrity is destroyed, enters S2.7;
Step S2.7: the callee sends CIPH_SET_ERROR message to the calling party, and type of error is the integrity checking failure, returns S2.4;
Step S2.8: the called cryptographic algorithm that judges whether to support that caller is selected if support, enters S2.10; Otherwise, enter S2.9;
Step S2.9: the callee sends CIPH_SET_ERROR message to the calling party, and type of error is that cryptographic algorithm is not supported, has comprised all cryptographic algorithm index values that the callee supports in this message simultaneously, returns S2.4;
Step S2.10: the callee sends CIPH_SET_CONF message to the calling party, and setting completed for the caller notification enciphered message;
Step S2.11: the calling party receives CIPH_SET_CONF message, and the encrypted negotiation process finishes.
CNB2005100120485A 2005-06-30 2005-06-30 Enciphered consulating method for speech-sound communication in grouped network Expired - Fee Related CN100373991C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005100120485A CN100373991C (en) 2005-06-30 2005-06-30 Enciphered consulating method for speech-sound communication in grouped network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005100120485A CN100373991C (en) 2005-06-30 2005-06-30 Enciphered consulating method for speech-sound communication in grouped network

Publications (2)

Publication Number Publication Date
CN1710985A true CN1710985A (en) 2005-12-21
CN100373991C CN100373991C (en) 2008-03-05

Family

ID=35707143

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005100120485A Expired - Fee Related CN100373991C (en) 2005-06-30 2005-06-30 Enciphered consulating method for speech-sound communication in grouped network

Country Status (1)

Country Link
CN (1) CN100373991C (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101227638A (en) * 2007-12-27 2008-07-23 华为技术有限公司 Apparatus and method for implementing called terminal startup notifying
WO2010054542A1 (en) * 2008-11-13 2010-05-20 华为技术有限公司 Cga public key identification, cga public key determination method, system and device
CN101378591B (en) * 2007-08-31 2010-10-27 华为技术有限公司 Method, system and device for negotiating safety capability when terminal is moving
CN101789863B (en) * 2009-01-22 2013-01-23 深圳市文鼎创数据科技有限公司 Safe data information transmission method
CN104539433A (en) * 2014-10-30 2015-04-22 马洁韵 Voice communication encryption system and encryption method thereof
CN104955034A (en) * 2015-05-28 2015-09-30 盛耀无线通讯科技(北京)有限公司 Communication conversation method
CN104955033A (en) * 2015-05-28 2015-09-30 盛耀无线通讯科技(北京)有限公司 Voice encryption communication method
CN105282734A (en) * 2014-06-11 2016-01-27 中国移动通信集团公司 Method, terminal, wireless gateway and system for realizing cross-network confidential communication
CN105592451A (en) * 2014-10-22 2016-05-18 北京元心科技有限公司 Voice call method, voice response method, and mobile terminal
US9572027B2 (en) 2007-09-29 2017-02-14 Huawei Technologies Co., Ltd. Method, system and apparatus for negotiating security capabilities during movement of UE
CN106471792A (en) * 2015-05-25 2017-03-01 华为技术有限公司 Message treatment method, device and system
CN107786494A (en) * 2016-08-25 2018-03-09 联想移动通信科技有限公司 A kind of mode and terminal of speech data encryption and decryption
CN108322451A (en) * 2018-01-12 2018-07-24 深圳壹账通智能科技有限公司 Data processing method, device, computer equipment and storage medium
CN106464544B (en) * 2015-05-15 2019-04-19 华为技术有限公司 A kind of signal processing method, apparatus and system
CN113099444A (en) * 2021-02-23 2021-07-09 中国科学院大学 Information transmission method and system for protecting privacy
CN113411190A (en) * 2021-08-20 2021-09-17 北京数业专攻科技有限公司 Key deployment, data communication, key exchange and security reinforcement method and system
CN113746807A (en) * 2021-08-11 2021-12-03 北银金融科技有限责任公司 Block chain node point support cryptographic algorithm communication detection method
CN115022024A (en) * 2022-05-31 2022-09-06 中国电信股份有限公司 Method and device for encrypted call, storage medium and electronic equipment

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106101081B (en) * 2016-05-31 2020-02-21 宇龙计算机通信科技(深圳)有限公司 Voice encryption method, device, terminal, key management platform and system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6980651B2 (en) * 2001-06-19 2005-12-27 Thomson Licensing Method for using an access card to create a secure sub-network on a public network
EP1416665A2 (en) * 2002-10-31 2004-05-06 Matsushita Electric Industrial Co., Ltd. Communication device, communication system, and cryptographic algorithm selection method

Cited By (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9241261B2 (en) 2007-08-31 2016-01-19 Huawei Technologies Co., Ltd. Method, system and device for negotiating security capability when terminal moves
US10595198B2 (en) 2007-08-31 2020-03-17 Huawei Technologies Co., Ltd. Communication method and device
US8812848B2 (en) 2007-08-31 2014-08-19 Huawei Technologies Co., Ltd. Method, system and device for negotiating security capability when terminal moves
CN101378591B (en) * 2007-08-31 2010-10-27 华为技术有限公司 Method, system and device for negotiating safety capability when terminal is moving
US9497625B2 (en) 2007-08-31 2016-11-15 Huawei Technologies Co., Ltd. Method for negotiating security capability when terminal moves
US8656169B2 (en) 2007-08-31 2014-02-18 Huawei Technologies Co., Ltd. Method, system and device for negotiating security capability when terminal moves
US9538373B2 (en) 2007-08-31 2017-01-03 Huawei Technologies Co., Ltd. Method and device for negotiating security capability when terminal moves
US10015669B2 (en) 2007-08-31 2018-07-03 Huawei Technologies Co., Ltd. Communication method and device
US9572027B2 (en) 2007-09-29 2017-02-14 Huawei Technologies Co., Ltd. Method, system and apparatus for negotiating security capabilities during movement of UE
US10548012B2 (en) 2007-09-29 2020-01-28 Huawei Technologies Co., Ltd. Method, system and apparatus for negotiating security capabilities during movement of UE
CN101227638A (en) * 2007-12-27 2008-07-23 华为技术有限公司 Apparatus and method for implementing called terminal startup notifying
US8737616B2 (en) 2008-11-13 2014-05-27 Huawei Technologies Co., Ltd. Method and apparatus for identifying CGA public key, and method, apparatus, and system for determining CGA public key
WO2010054542A1 (en) * 2008-11-13 2010-05-20 华为技术有限公司 Cga public key identification, cga public key determination method, system and device
CN101741820A (en) * 2008-11-13 2010-06-16 华为技术有限公司 Method, system and device for recognizing and determining color graphic adapter (CGA) public key
CN101741820B (en) * 2008-11-13 2013-12-18 华为技术有限公司 Method, system and device for recognizing and determining color graphic adapter (CGA) public key
CN101789863B (en) * 2009-01-22 2013-01-23 深圳市文鼎创数据科技有限公司 Safe data information transmission method
CN105282734B (en) * 2014-06-11 2018-10-26 中国移动通信集团公司 A kind of method that realizing across a network secret telephony, terminal, radio network gateway and system
CN105282734A (en) * 2014-06-11 2016-01-27 中国移动通信集团公司 Method, terminal, wireless gateway and system for realizing cross-network confidential communication
CN105592451A (en) * 2014-10-22 2016-05-18 北京元心科技有限公司 Voice call method, voice response method, and mobile terminal
CN104539433A (en) * 2014-10-30 2015-04-22 马洁韵 Voice communication encryption system and encryption method thereof
US11095407B2 (en) 2015-05-15 2021-08-17 Huawei Technologies Co., Lid. Signal processing method, apparatus, and system
CN106464544B (en) * 2015-05-15 2019-04-19 华为技术有限公司 A kind of signal processing method, apparatus and system
CN106471792A (en) * 2015-05-25 2017-03-01 华为技术有限公司 Message treatment method, device and system
US10432580B2 (en) 2015-05-25 2019-10-01 Huawei Technologies Co., Ltd. Message processing method, apparatus, and system
CN106471792B (en) * 2015-05-25 2020-01-10 华为技术有限公司 Message processing method, server and system
CN104955033A (en) * 2015-05-28 2015-09-30 盛耀无线通讯科技(北京)有限公司 Voice encryption communication method
CN104955034A (en) * 2015-05-28 2015-09-30 盛耀无线通讯科技(北京)有限公司 Communication conversation method
CN107786494A (en) * 2016-08-25 2018-03-09 联想移动通信科技有限公司 A kind of mode and terminal of speech data encryption and decryption
CN108322451B (en) * 2018-01-12 2020-09-22 深圳壹账通智能科技有限公司 Data processing method, data processing device, computer equipment and storage medium
CN108322451A (en) * 2018-01-12 2018-07-24 深圳壹账通智能科技有限公司 Data processing method, device, computer equipment and storage medium
CN113099444A (en) * 2021-02-23 2021-07-09 中国科学院大学 Information transmission method and system for protecting privacy
CN113099444B (en) * 2021-02-23 2022-06-24 中国科学院大学 Information transmission method and system for protecting privacy
CN113746807A (en) * 2021-08-11 2021-12-03 北银金融科技有限责任公司 Block chain node point support cryptographic algorithm communication detection method
CN113411190A (en) * 2021-08-20 2021-09-17 北京数业专攻科技有限公司 Key deployment, data communication, key exchange and security reinforcement method and system
CN115022024A (en) * 2022-05-31 2022-09-06 中国电信股份有限公司 Method and device for encrypted call, storage medium and electronic equipment
CN115022024B (en) * 2022-05-31 2023-09-29 中国电信股份有限公司 Method and device for encrypting call, storage medium and electronic equipment

Also Published As

Publication number Publication date
CN100373991C (en) 2008-03-05

Similar Documents

Publication Publication Date Title
CN100373991C (en) Enciphered consulating method for speech-sound communication in grouped network
US10764043B2 (en) Identity and content authentication for phone calls
US9882723B2 (en) Method and system for authentication
US7464267B2 (en) System and method for secure transmission of RTP packets
CN100556052C (en) Telephone number change notification method and telephone number change notification system
CN100466805C (en) Method for end-to-end enciphoring voice telecommunication
CN1249588A (en) Method for updating encrypted shared data in radio communication system
US7764945B2 (en) Method and apparatus for token distribution in session for future polling or subscription
WO2009010944A2 (en) On-demand authentication of call session party information during a telephone call
CN102202299A (en) Realization method of end-to-end voice encryption system based on 3G/B3G
CN102037701A (en) Method and system for verifying the identity of a communication partner
TWI711293B (en) Method of identity authentication for voice over internet protocol call and related device
WO2010125815A1 (en) Illegal call detection apparatus, illegal call detection method, and illegal call detection program
CN112929339B (en) Message transmitting method for protecting privacy
US8085937B1 (en) System and method for securing calls between endpoints
US10893414B1 (en) Selective attestation of wireless communications
Hwang et al. On the security of an enhanced UMTS authentication and key agreement protocol
Murdoch Insecure by design: Protocols for encrypted phone calls
CN1681241A (en) Secret key distributing method of end-to-end encrypted telecommunication
CN106559402B (en) User terminal and identity authentication method and device for encrypted voice telephone service thereof
CN113132323B (en) Communication method and device
CN1604585A (en) Method for security transmission of card number information from IP terminal to soft switch
CN113099444B (en) Information transmission method and system for protecting privacy
CN110740129A (en) telephone network communication protection method based on end-to-end authentication
JP4433895B2 (en) Notification number verification system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: BEIJING DONGFANGJIANYU INSTITUTE OF CONCRETE SCIEN

Free format text: FORMER OWNER: INST. OF COMPUTING TECHNOLOGY, CHINESE ACADEMY OF SCIENCES

Effective date: 20110110

Owner name: BEIJING DINGSOFT TECHNOLOGY CO., LTD. BEIJING XINH

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 100080 NO. 6, KEXUEYUAN SOUTH ROAD, ZHONGGUANCUN, HAIDIAN DISTRICT, BEIJING TO: 100080 ROOM 1708, 17/F, YINGU BUILDING, NO. 9, N. 4TH RING WEST ROAD, HAIDIAN DISTRICT, BEIJING

TR01 Transfer of patent right

Effective date of registration: 20110110

Address after: 100080 Beijing city Haidian District North Fourth Ring Road No. 9 building 17 room 1708 Silver Valley

Co-patentee after: Beijing Dingsoft Technology Co.,Ltd.

Patentee after: Beijing Dongfangjianyu Institute of Concrete Science & Technology Limited Compan

Co-patentee after: Beijing Xinhang Building Material Group Co., Ltd.

Address before: 100080 Haidian District, Zhongguancun Academy of Sciences, South Road, No. 6, No.

Patentee before: Institute of Computing Technology, Chinese Academy of Sciences

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20080305

Termination date: 20180630