CN1753348B - Method of realizing changing open talk to secret talk - Google Patents
Method of realizing changing open talk to secret talk Download PDFInfo
- Publication number
- CN1753348B CN1753348B CN 200410080036 CN200410080036A CN1753348B CN 1753348 B CN1753348 B CN 1753348B CN 200410080036 CN200410080036 CN 200410080036 CN 200410080036 A CN200410080036 A CN 200410080036A CN 1753348 B CN1753348 B CN 1753348B
- Authority
- CN
- China
- Prior art keywords
- terminal
- encrypted word
- professional ability
- encrypted
- talk
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
This invention discloses a method for turning talks from open to secrete including: a first terminal sends a request of turning open to secrete talk service and informs a second terminal to start the secrete talk service negotiation with the network side, at the same time, the first terminal starts the negotiation between itself and the network side to set up a secrete talk transmission channel, then, the two terminals carry out the secrete talk process. First of all, terminals negotiate on the transfer of secrete talks then a secrete transmission channel is set up to secure the transfer process smoothly. Besides, this invention also provides a method for realizing the process control of turning open talk to secrete by signaling in the band.
Description
Technical field
The present invention relates to, be meant a kind of method that realizes changing open talk to secret talk especially.
Background technology
Each industry all can have unique demand to communication according to himself characteristic.General in the past way is the dedicated network that is used to communicate by letter according to its specific demand construction, but has no longer adopted this mode at present, mainly considers following reason: on the one hand, all purpose communication network can satisfy the primary demand of each dedicated network; On the other hand, the construction cost of dedicated network, maintenance cost are all very high, and the construction period is also very long; In addition, because dedicated network does not have versatility, like this, the dedicated network technical development is slower.Under above various reasons, the construction of dedicated network at present adopts the mode of stacking network to realize usually, promptly superposes on all purpose communication network and can satisfy the special installation of specialized requirement, to realize the function of dedicated network.
Below on code division multiple access (CDMA) communication network basis, be that example illustrates its some special applications with the construction of army dedicated network, below abbreviate army's dedicated network as the army net.
It is exactly fail safe that topmost demand is netted by army, military information is perfectly safe in the assurance communication process, therefore, require whole communication process to realize the speech scrambling of special-purpose terminal to special-purpose terminal, the all purpose communication network provides the passage of transparent transmission, and promptly special-purpose terminal is encrypted the information that sends, and the information that receives is decrypted, information encrypted transmits by the transparent transmission channel that all purpose communication network provides, and realizes the speech scrambling of special-purpose terminal to special-purpose terminal.
Special-purpose terminal is speech scrambling end to end to the speech scrambling of special-purpose terminal, is called encrypted word; Correspondingly, non-encrypted end to end conversation is called unencryped word.The mode of initiating the encrypted word business roughly has dual mode, and a kind of is that mode with encrypted word makes a call; Another kind is that the mode with unencryped word makes a call, and the conversation back is by switching command, presses as the user and is exclusively used in the button that switches between unencryped word, the encrypted word on the special-purpose terminal, transfers unencryped word to encrypted word, adopts a kind of mode in back in the practical application usually.
In changing the process of encrypted word over to, regulation by two end subscribers through consultation at present, agreement is sent switching command to special-purpose terminal simultaneously, press simultaneously as two end subscribers and to be exclusively used in the button that switches between unencryped word, the encrypted word on the special-purpose terminal, the both sides special-purpose terminal carries out the encrypted word service negotiation with the base station sub-system (BSS) at its place respectively then, finally enters the encrypted word communication process.
Fig. 1 shows changing open talk to secret talk flow chart in the prior art, and as shown in Figure 1, the implementation procedure of changing open talk to secret talk may further comprise the steps:
Step 101: carry out the unencryped word communication process between portable terminal (MS) 1 and the MS2.
Step 102: when both call sides need change encrypted word communication over to, send switching command to MS simultaneously, press simultaneously as both call sides and to be exclusively used in the button that switches between unencryped word, the encrypted word on the MS, both sides MS initiates the encrypted word service request to the BSS at place separately respectively, and portability is useful on the service identification of identification service in this encrypted word service request.
After step 103~step 104:BSS receives the encrypted word service request, return the encrypted word service response to MS, notice MS has received the encrypted word service request of its initiation, the professional connection of MS notice BSS encrypted word finishes then, show between MS and the BSS and reach an agreement, to be converted into real-time data service with speech business, be that BSS stops the coding/decoding of vocoder to the packet received, the packet of receiving is handled according to the packet in the real-time data service, only transparent transmission VoP, and BSS stops the echo inhibit feature simultaneously.
Carry out the encrypted word communication process between step 105:MS1 and the MS2, BSS only carries out transparent transmission to packet.
As seen from the above description, change over to by unencryped word in the whole implement process of encrypted word, the special-purpose terminal of both sides can't be controlled mutually, can not guarantee that at all the both sides special-purpose terminal can both enter the encrypted word communication process, let alone the both sides special-purpose terminal enters the encrypted word communication process simultaneously.Changing over to by unencryped word in the process of encrypted word, various problem that is difficult to expect can appear, as, one side special-purpose terminal has changed encrypted word communication over to, and the opposite side special-purpose terminal does not change encrypted word communication as yet over to, like this, at all can't the mutual information of correct understanding both sides between the special-purpose terminal, cause communication normally to carry out; And for example, the used time of the handoff procedure of changing open talk to secret talk is longer, and making can't normal talking between the terminal.
Summary of the invention
In view of this, the object of the present invention is to provide a kind of method that realizes changing open talk to secret talk, guarantee that the implementation procedure of changing open talk to secret talk is carried out smoothly; And the present invention has further proposed to realize the changing open talk to secret talk process that the present invention proposes by in-band signalling, can not produce any influence to existing network.
In order to achieve the above object, the invention provides a kind of method that realizes changing open talk to secret talk, this method comprises:
A, first terminal send to second terminal and change the encrypted word service request over to, notify the encrypted word service negotiation of second starting terminal and network side, the encrypted word service negotiation of while first starting terminal self and network side, when first terminal is finished encrypted word service negotiation with network side, and when second terminal is finished encrypted word service negotiation with network side, after then having set up the encrypted word transmission channel, carry out the encrypted word communication process between first terminal and second terminal.
Further comprise before the described steps A: first terminal is received the switching command that is used to initiate the encrypted word business.
Further comprise before the described steps A:
Carry out the encrypted word service capability negotiation between A0, first terminal and second terminal, if consult successfully, execution in step A then; Otherwise, finish current flow process.
Described steps A 0 is: the encrypted word professional ability request that second terminal sends according to first terminal of receiving, provide the encrypted word professional ability information to first terminal, whether encrypted word professional ability information that first terminal judges is received and the encrypted word professional ability information of self are complementary, if, execution in step A then; Otherwise, finish current flow process.
Described steps A 0 is: first terminal provides the encrypted word professional ability information to second terminal, whether encrypted word professional ability information that second terminal judges is received and the encrypted word professional ability information of self are complementary, if, then return the response of encrypted word service capability negotiation, execution in step A then to first terminal; Otherwise, finish current flow process.
Described professional ability information is the sign that whether has professional ability.
If described professional ability information is the sign with professional ability, then described professional ability information further comprises: protocol version information, or coder/decoder type, or above the two combination.
Change over to described in the steps A and carry the encrypted word service identification in the encrypted word service request, or coded format, or first terminal and the second terminal compatible protocols version, or above combination arbitrarily.
Process described in the steps A mutual information: be to transmit by the in-band signalling that in speech channel, transmits.
According to the proposed method,, and then set up the encrypted word pass-through channel, can carry out smoothly with the implementation procedure that guarantees changing open talk to secret talk at first by changing the encrypted word service negotiation between the terminal over to.In addition, also propose among the present invention and can realize that unencryped word changes the process control of encrypted word over to, like this, can not produce any influence, and need not the cooperation of existing network existing network by in-band signalling; If there is dedicated network to be superimposed on the universal network, then each dedicated network can define signaling structure voluntarily, and expanded signalling content arbitrarily, for dedicated network and universal network provide very big facility.
Description of drawings
Fig. 1 shows changing open talk to secret talk flow chart in the prior art;
Fig. 2 shows changing open talk to secret talk flow chart among the present invention.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, the present invention is described in further detail below in conjunction with accompanying drawing.
Among the present invention,, and then set up the encrypted word pass-through channel, can carry out smoothly with the implementation procedure that guarantees changing open talk to secret talk at first by changing the encrypted word service negotiation between the terminal over to.The above terminal can be portable terminal, also can be fixed terminal, below only is that example is elaborated to implementation procedure of the present invention with the portable terminal.
Fig. 2 shows changing open talk to secret talk flow chart among the present invention, and as shown in Figure 2, the implementation procedure of changing open talk to secret talk may further comprise the steps:
Carry out the unencryped word communication process between step 201:MS1 and the MS2, the user of MS1 sends the switching command that is changed over to encrypted word by unencryped word to MS1, press as the user of MS1 and to be exclusively used in the button that switches between unencryped word, the encrypted word on the MS1, can continue execution in step 202 then, also direct execution in step 203.
Step 202:, before changing the encrypted word service negotiation over to, can at first carry out the encrypted word service capability negotiation between MS1 and the MS2 for guaranteeing to change over to the success rate of encrypted word by unencryped word.
The process of carrying out the encrypted word service capability negotiation between MS1 and the MS2 can be: MS1 sends the request of encrypted word professional ability to MS2, and request MS2 provide relevant encrypted word professional ability information; After MS2 receives the request of encrypted word professional ability, return the response of encrypted word professional ability to MS1, carry the encrypted word professional ability information in this encrypted word professional ability response, as whether having the sign of the professional cryptographic capabilities of encrypted word, if have, can further carry information such as protocol version, coder/decoder type; After MS1 receives the response of encrypted word professional ability, judge that whether the encrypted word professional ability information receive is complementary with self encrypted word professional ability information, if, then continue execution in step 203, otherwise, prompting sent to the user, as " changing the encrypted word service fail over to ", select whether proceed the unencryped word communication process by the user,, then still carry out the unencryped word communication process if the user selects to proceed the unencryped word communication process; If the user selects to stop the current unencryped word communication process that carries out, can finish current unencryped word communication process.
Can further carry the encrypted word service identification in the request of encrypted word professional ability, in order to the related service of sign current request ability information; Can further carry the encrypted word service identification in the response of encrypted word professional ability, in order to the pairing related service of the current ability information that provides to be provided.
The process of carrying out the encrypted word service capability negotiation between MS1 and the MS2 also can be: MS1 sends the request of encrypted word service capability negotiation to MS2, carry the encrypted word professional ability information in this encrypted word service capability negotiation request, as whether having the sign of the professional cryptographic capabilities of encrypted word, if have, can further carry information such as protocol version, coder/decoder type, request is held consultation to the encrypted word professional ability with MS2; After MS2 receives the request of encrypted word service capability negotiation, judge that whether the encrypted word professional ability information receive is complementary with self encrypted word professional ability information, if, then sending the response of encrypted word service capability negotiation to MS1, execution in step 203 then, otherwise, send prompting to the user,, select whether to proceed the unencryped word communication process by the user as " changing the encrypted word service fail over to ", if the user selects to proceed the unencryped word communication process, then still carry out the unencryped word communication process; If the user selects to stop the current unencryped word communication process that carries out, can finish current unencryped word communication process.
Can further carry the encrypted word service identification in the request of encrypted word service capability negotiation, in order to the related service of sign current request ability information; Can further carry the encrypted word service identification in the response of encrypted word service capability negotiation, in order to the pairing related service of the current ability information that provides to be provided.
Step 203~step 204:MS1 sends to MS2 and changes the encrypted word service request over to, and this changes relevant parameters such as carrying coded format, compatible protocols version in the encrypted word service request over to.After MS2 receives and changes the encrypted word service request over to, return to MS1 and to change the encrypted word service response over to, MS2 also starts the encrypted word service negotiation of self and BSS2 simultaneously; After MS1 received and changes the encrypted word service response over to, also the encrypted word service negotiation of startup and BSS1 was promptly set up the encrypted word transmission channel between MS1 and the MS2.
The encrypted word service request that changes over to that MS1 sends to MS2 in the step 203 can be under the situation of omitting step 202, directly sends to MS2 after receiving switching command by MS1.
Step 205~step 207 is identical with step 102~step 104.
After step 208~step 209:MS2 finishes encrypted word service negotiation with BSS2, send to MS1 and to change the encrypted word service response over to, notice MS1 has finished the encrypted word service negotiation with BSS2.After MS1 receives and changes the encrypted word service response over to and finish encrypted word service negotiation with BSS1, successfully set up the encrypted word transmission channel between MS1 and the MS2, carry out the encrypted word communication process between MS1 and the MS2, as the information that sends being encoded according to the coded system of consulting, the information that receives is decoded, and BSS only carries out transparent transmission to VoP.
Process described above with MS1 as initiating the terminal that unencryped word changes encrypted word over to, yet in actual applications, MS2 also can be used as and initiates the terminal that unencryped word changes encrypted word over to, does not have any restriction.
In addition, the present invention also considers if use out-of-band signalling, i.e. signaling by signaling network transmission, then need the existing communication network is changed, change the relevant signaling of encrypted word over to support the unencryped word that proposes with the present invention, therefore, the present invention can realize that unencryped word changes the process of encrypted word over to by in-band signalling, like this, can not produce any influence, and need not the cooperation of existing network existing network; If there is dedicated network to be superimposed on the universal network, then each dedicated network can define signaling structure voluntarily, and expanded signalling content arbitrarily, for dedicated network and universal network provide very big facility.In-band signalling comprises Dual Tone Multifrequency signaling, frequency shift keying (FSK) signaling etc.
In a word, the above is preferred embodiment of the present invention only, is not to be used to limit protection scope of the present invention.
Claims (9)
1. a method that realizes changing open talk to secret talk is characterized in that, this method comprises:
A, first terminal send to second terminal and change the encrypted word service request over to, notify the encrypted word service negotiation of second starting terminal and network side, the encrypted word service negotiation of while first starting terminal self and network side, when first terminal is finished encrypted word service negotiation with network side, and when second terminal is finished encrypted word service negotiation with network side, then set up the encrypted word transmission channel, carried out the encrypted word communication process between first terminal and second terminal.
2. method according to claim 1 is characterized in that, further comprise before the described steps A: first terminal is received the switching command that is used to initiate the encrypted word business.
3. method according to claim 1 is characterized in that, further comprises before the described steps A:
Carry out the encrypted word service capability negotiation between A0, first terminal and second terminal, if consult successfully, execution in step A then; Otherwise, finish current flow process.
4. method according to claim 3, it is characterized in that, described steps A 0 is: the encrypted word professional ability request that second terminal sends according to first terminal of receiving, provide the encrypted word professional ability information to first terminal, whether encrypted word professional ability information that first terminal judges is received and the encrypted word professional ability information of self are complementary, if, execution in step A then; Otherwise, finish current flow process.
5. method according to claim 3, it is characterized in that, described steps A 0 is: first terminal provides the encrypted word professional ability information to second terminal, whether encrypted word professional ability information that second terminal judges is received and the encrypted word professional ability information of self are complementary, if, then return the response of encrypted word service capability negotiation, execution in step A then to first terminal; Otherwise, finish current flow process.
6. according to claim 4 or 5 described methods, it is characterized in that described professional ability information is the sign that whether has professional ability.
7. method according to claim 6 is characterized in that, if described professional ability information is the sign with professional ability, then described professional ability information further comprises: protocol version information, or coder/decoder type, or above the two combination.
8. method according to claim 1 is characterized in that, changes over to described in the steps A to carry the encrypted word service identification in the encrypted word service request, or coded format, or first terminal and the second terminal compatible protocols version, or above combination arbitrarily.
9. method according to claim 1 is characterized in that, process described in the steps A mutual information: be to transmit by the in-band signalling that in speech channel, transmits.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200410080036 CN1753348B (en) | 2004-09-22 | 2004-09-22 | Method of realizing changing open talk to secret talk |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200410080036 CN1753348B (en) | 2004-09-22 | 2004-09-22 | Method of realizing changing open talk to secret talk |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1753348A CN1753348A (en) | 2006-03-29 |
CN1753348B true CN1753348B (en) | 2010-07-28 |
Family
ID=36680045
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 200410080036 Expired - Fee Related CN1753348B (en) | 2004-09-22 | 2004-09-22 | Method of realizing changing open talk to secret talk |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1753348B (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100556162C (en) * | 2007-09-13 | 2009-10-28 | 中兴通讯股份有限公司 | A kind of lossless transmission method and system that realizes bright media stream after public/secret call switching |
CN101931949B (en) * | 2010-08-11 | 2014-11-05 | 中兴通讯股份有限公司 | Method and system for switching clear text communication and cipher text communication between mobile terminals |
CN104394266B (en) * | 2014-11-12 | 2016-08-24 | 努比亚技术有限公司 | Terminal operating status changing method and system |
CN104363583B (en) * | 2014-11-14 | 2018-10-02 | 努比亚技术有限公司 | Terminal communicating method and system |
CN105577634B (en) * | 2015-07-31 | 2019-11-12 | 宇龙计算机通信科技(深圳)有限公司 | A kind of processing method and user terminal of the failure of encrypted word connection setup |
CN107454587A (en) * | 2016-05-31 | 2017-12-08 | 宇龙计算机通信科技(深圳)有限公司 | A kind of method and device for switching secret telephony |
CN109286634A (en) * | 2018-11-08 | 2019-01-29 | 成都卫士通信息产业股份有限公司 | A kind of data transmission method, device, electronic equipment and readable storage medium storing program for executing |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1351789A (en) * | 1999-05-21 | 2002-05-29 | 国际商业机器公司 | Method and apparatus for initializing secure communications among and for exclusively pairing wireless devices |
CN1406005A (en) * | 2001-09-17 | 2003-03-26 | 华为技术有限公司 | Safety-alliance (SA) generation method for safety communication between nodes of network area |
EP1216538B1 (en) * | 1999-10-01 | 2008-07-16 | Telefonaktiebolaget LM Ericsson (publ) | Method and apparatus for executing secure data transfer in a wireless network |
-
2004
- 2004-09-22 CN CN 200410080036 patent/CN1753348B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1351789A (en) * | 1999-05-21 | 2002-05-29 | 国际商业机器公司 | Method and apparatus for initializing secure communications among and for exclusively pairing wireless devices |
EP1216538B1 (en) * | 1999-10-01 | 2008-07-16 | Telefonaktiebolaget LM Ericsson (publ) | Method and apparatus for executing secure data transfer in a wireless network |
CN1406005A (en) * | 2001-09-17 | 2003-03-26 | 华为技术有限公司 | Safety-alliance (SA) generation method for safety communication between nodes of network area |
Also Published As
Publication number | Publication date |
---|---|
CN1753348A (en) | 2006-03-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4500803B2 (en) | System and method for seamless roaming between a wireless wide area network and a wireless local area network | |
CA2244929C (en) | Method and apparatus for providing a private communication system in a public switched telephone network | |
CN100466718C (en) | Mixed-media telecommunication call set-up | |
EP0608405B1 (en) | Facsimile transmission in a digital cellular radio network | |
RU2107402C1 (en) | Method to start and stop servicing using voice signals or data signals from mobile set | |
JP3015417B2 (en) | Mobile radio communication system and radio mobile station device | |
CN100466805C (en) | Method for end-to-end enciphoring voice telecommunication | |
US20080096565A1 (en) | Methods and circuits for roaming between different networks | |
CN101438525A (en) | Method and apparatus for end-to-end clear transport protocol | |
WO2002009448A3 (en) | Method for establish packet-based connections in a wireless network | |
CN100415005C (en) | Method for realizing switch-over between open call/secrete call in end-to-end voice telecommunication | |
CN1328918C (en) | Method of communicating using a push to talk scheme in a mobile communication system | |
CN1753348B (en) | Method of realizing changing open talk to secret talk | |
CN100426720C (en) | Method of implementing business ability negotiation | |
KR100690786B1 (en) | Communication mode switching method for mobile phone | |
CN107454587A (en) | A kind of method and device for switching secret telephony | |
CN101662845A (en) | Method for switching speaking right in mobile terminal talkback communication | |
KR100398346B1 (en) | CDMA Systems and Service Methods based on a Cellular Phone with Multiple Baseband Receivers | |
KR100255818B1 (en) | A directly communicating method between city phones | |
CN100428765C (en) | Method for mobile terminal dialing Ip telephone to appeal channel | |
CA2475870C (en) | Method and apparatus for providing a private communication system in a public switched telephone network | |
CN1753358A (en) | Method of implementing secret key distribution | |
RU2304844C2 (en) | Method and device for simultaneous processing of multiple calls in communication system using extended-spectrum signal | |
KR100241913B1 (en) | Apparatus for communicatiing packet in second generation of cordless telephone | |
JPH08140147A (en) | Digital cordless telephone terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20100728 |