CN1925681A - End-to-end encrypting method and system based on mobile communication network - Google Patents

End-to-end encrypting method and system based on mobile communication network Download PDF

Info

Publication number
CN1925681A
CN1925681A CNA2006101132268A CN200610113226A CN1925681A CN 1925681 A CN1925681 A CN 1925681A CN A2006101132268 A CNA2006101132268 A CN A2006101132268A CN 200610113226 A CN200610113226 A CN 200610113226A CN 1925681 A CN1925681 A CN 1925681A
Authority
CN
China
Prior art keywords
key
terminal
encryption
stream
smart card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2006101132268A
Other languages
Chinese (zh)
Inventor
张文斌
李晖
王健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING TAIJI UNITED LABORATORY TECHNOLOGY Co Ltd
Original Assignee
BEIJING TAIJI UNITED LABORATORY TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING TAIJI UNITED LABORATORY TECHNOLOGY Co Ltd filed Critical BEIJING TAIJI UNITED LABORATORY TECHNOLOGY Co Ltd
Priority to CNA2006101132268A priority Critical patent/CN1925681A/en
Publication of CN1925681A publication Critical patent/CN1925681A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

This invention relates to end to end coding method and system based on mobile communication network, which comprises the following steps: adopting codes end to end coding and adopting key management center for whole codes system and adopting keys intelligent cards as terminal end to coded safety module; according to center generating codes flow and decodes flow through or formula on messages and codes to realize end to end coding communication; the said system comprises key management center and terminal interact through center to terminal end with intelligent card.

Description

End to End Encryption method and encryption system based on mobile communications network
Technical field
The present invention relates to a kind of End to End Encryption method, also relate to a kind of encryption system that adopts this method, belong to moving communicating field based on mobile communications network.
Background technology
In existing mobile communication system, no matter be public mobile communication system or professional mobile communication system, all there is encryption technology to exist.For example in gsm system, TETRA standard, safety functions such as authentication, air-interface encryption have all been defined, be used for resolution system in wireless access safety problem partly, in 3G standard, also defined network domain security, thereby make the node exchange of signaling data safely between the mobile communication core net, just guarantee secure data exchange between the entity of mobile communication core net.But these encryption technologies also the situation that information exists with the plaintext form can occur at the node place of the core net of communication system, its safe coefficient is low, can't satisfy the safety requirements of the high assurance user profile confidentiality of army, government and security department and some special user proposition.
For improving fail safe, realize the End to End Encryption of mobile communication, No. 98108859.7 patent application cases of China disclose a kind of End to End Encryption method, this method is to the effect that: the random number that calling party's terminal utilizes network to send generates encryption key, this encryption key sends to callee's terminal by call setup message, make two end subscribers when communication, can use identical key that call-information is carried out enciphering/deciphering, Virtual network operator is known the unsafe problems that key information causes but this invention still exists, and implement also comparatively complexity, need transform handset structure, increase the volume and the power consumption of mobile phone thus.
No. 200410021688.7 patent application cases of China disclose a kind of another kind of End to End Encryption method, wireless side user adopts external terminal security device to be connected with the bluetooth travelling carriage, described external terminal security device is connected with the GSM travelling carriage of supporting the bluetooth data communication function by Bluetooth technology, thereby realize the End to End Encryption of GSM network voice and data service, the greatest problem of this method is exactly to need to use external mobile privacy device, increase user's burden thus, and brought the inconvenience in the use.
Summary of the invention
For overcoming the above-mentioned defective of prior art, the invention provides a kind of End to End Encryption method based on mobile communications network, a kind of encryption system that adopts this method also is provided, not only fail safe is good for the End to End Encryption that this method realizes, and device therefor is simple in structure, cost is low, and is easy to use.
The present invention realizes that the technical scheme of above-mentioned purpose is: a kind of End to End Encryption method based on mobile communications network, and it adopts the stream cipher system to carry out End to End Encryption; Adopt KMC that whole secrecy system is carried out key management, comprising the authentication of encrypting user (terminal), generation, distribution, renewal and the key of key are deleted; Adopt the security module of encrypted smart card as the terminal End to End Encryption, the key that described encrypted smart card is held this terminal is stored and is managed, key according to KMC's distribution generates encryption key stream and/or decruption key stream, and the encryption and decryption key stream carried out synchronously, processing unit by terminal obtains described key stream from described encrypted smart card, carries out the operation of the encrypt/decrypt of the voice of plain/cipher text or data message.
A kind of End to End Encryption system based on mobile communications network, comprise KMC and terminal, described KMC and described terminal are mutual by mobile communications network, described KMC authenticates terminal, generate key, and be distributed to certified each terminal, described terminal is provided with the encrypted smart card as the End to End Encryption security module, deposit each key that receives in described encrypted smart card, described encrypted smart card is according to the instruction of terminal processes unit, the session key is imported its key stream generator, generate key stream, the cryptographic algorithm that described terminal processes unit adopt to be set is encrypted or decrypt operation the voice flow/data flow of described key stream and pending plain/cipher text.
Because the present invention adopts the mode of KMC and terminal encryption smart card to realize End to End Encryption, avoided prior art lower network node to have the defective of plaintext transmission, and avoided the control of Virtual network operator to key, improved the fail safe and the safe class of communication; Because the cryptographic facility of communication terminal of the present invention can adopt the encrypted smart card form, and by software encrypted smart card is provided support, and has simplified the structure of encryption system, has made things convenient for use, has reduced and has encrypted required cost; Owing to be provided with KMC, also make the office that has the right of country be able to obtain key, to carry out necessary monitoring by legal approach.
Description of drawings
Fig. 1 is based on the structural representation of the present invention of mobile communications network;
Fig. 2 is the secure communication process schematic diagram that the present invention relates to;
The composition frame chart of Fig. 3 encrypted smart card of the present invention.
Embodiment
Referring to Fig. 1-Fig. 3, the invention provides a kind of End to End Encryption method based on mobile communications network, it adopts the stream cipher system to carry out End to End Encryption; Adopt KMC that whole secrecy system is carried out key management, comprising the authentication of encrypting user (terminal), generation, distribution, renewal and the key of key are deleted; Adopt the security module of encrypted smart card as the terminal End to End Encryption, the key that described encrypted smart card is held this terminal is stored and is managed, key according to KMC's distribution generates encryption key stream and/or decruption key stream, and the encryption and decryption key stream carried out synchronously, processing unit by terminal obtains corresponding key stream from described encrypted smart card, carries out the operation of the encrypt/decrypt of the voice of plain/cipher text or data message.
For the wireless terminal that adopts smart card, function that can be by expanding smart card is with used as described encrypted smart card, the function setting that is about to described smart card at existing smart card (for example, be SIM in the GSM network) on, need not wireless terminal is carried out structural change, to save cost, the convenient use.
The key that is loaded in the terminal all generates, distributes and management by KMC.Described KMC mainly is made up of two parts, the one, be provided with the key management control unit of key management software, the one, the center cipher machine, described center cipher machine adopts the form of pci card, communicate by letter with described key management control unit by pci interface, be used to carry out the encryption and decryption computing, and be provided with database or the memory cell that is used for storage encryption algorithm and key.When needs carry out the key associative operation, the key management control unit is initiated the key management request by pci interface to the center cipher machine, the center cipher machine is handled accordingly according to the request of key management control unit, and the result is returned to the key management control unit.
The present invention can adopt the cipher key hierarchy way to manage, and used Key Tpe mainly comprises:
(1) master encryption keys (KEK, Key Encryption Key) is used for encrypting the GEK of downloading process;
(2) set of encryption keys (GEK, Group Encryption Key) is used for TEK is encrypted, and also can replace GEK with KEK;
(3) signaling encryption key (SEK, Signaling Encryption Key) is used to encrypt OTAK (Over The AirKeying) message, also can replace SEK with GEK or KEK;
(4) traffic encryption key or title session key (TEK, Traffic Encryption Key) are used for end-to-end communication and encrypt.
The present invention adopts pre-distribution and upgrades the key distribution strategy that combines automatically, provides following dual mode that the key that KMC generates is sent to portable terminal:
(1) out-band method: directly key is downloaded to portable terminal by suitable software and hardware instrument, do not take interface-free resources from KMC;
(2) automatic downloading mode: key is sent to portable terminal by short message or data channel, has taken interface-free resources;
General KEK adopts out-band method to be stored in advance in the encrypted smart card (Smart Card) of portable terminal, and other key can adopt any mode to distribute according to concrete application.If it is less to need to carry out the number of users of end-to-end encrypted communication in the system, and the limited investment of system, then all keys can adopt out-band method to distribute.
When two or more terminals are carried out coded communication, each terminal obtains identical session key by out-band method or automatic downloading mode, generate key stream by the identical algorithm that is pre-stored in the encrypted smart card, to carry out the encryption expressly and the decrypt operation of ciphertext, used cryptographic algorithm can be XOR usually.
The process that obtains session key by automatic downloading mode can be (can adopt similar fashion during MPTY): calling party (terminal A) initiates same callee's (terminal B) secure session request, after KMC carries out the status authentication to terminal A, generate this session key, this key is sent to terminal A after the GEK encryption encapsulation with terminal A and terminal B respectively, terminal A is to the session key deciphering with its GEK encapsulation, extract this session key, the session key that will encapsulate with the GEK of terminal B sends to terminal B, B is decrypted computing by terminal, extracts session key.The session key that KMC also can directly encapsulate the GEK with terminal B sends to terminal B.
Two terminal security communication process are (the multiple terminals conversation can be adopted similar fashion):
(1) after terminal A successfully sets up secure communication with terminal B, on terminal A, its encrypted smart card can obtain carrying out with terminal B the session key of secure communication, if carry out Speech Communication, produce by encrypted smart card operation key stream generating algorithm and to be used for the encryption key stream of encrypting plaintext stream of voice information, speech is after the microphone on the terminal picks up simultaneously, at first carry out the A/D conversion, send into voice compression/decompression module then and compress processing, at this moment we are referred to as expressly voice flow information, expressly the simple encryption computing (for example, step-by-step XOR) of voice flow and encryption key stream, voice flow after obtaining encrypting is called the ciphertext voice flow; When carrying out data communication, after the expressly same and encryption key stream of data among the terminal A carries out cryptographic calculation, the generation ciphertext data stream;
(2) terminal A is sent to the radio frequency processing module of terminal again with ciphertext voice flow or ciphertext data stream, and the transparent transmission channel by mobile communications network is transferred to terminal B.Different mobile communications networks can adopt different transparent transmission channels, and for example, in the TETRA system, the ciphertext voice flow can adopt voice channel to transmit, and the ciphertext voice flow of GSM network can adopt the data channel of GSM;
(3) terminal B is setting up after coded communication is connected with terminal A, can extract the session key of this conversation according to calling party's terminal A cause encrypted smart card, and by the encrypted smart card of terminal B operation key stream generating algorithm, producing the decruption key identical with encryption key stream among the terminal A flows, the encrypted speech that terminal B receives, data-signal is through the radio frequency processing resume module, obtain ciphertext voice flow or data flow, (for example carry out simple decrypt operation with decruption key stream, the step-by-step XOR) after, obtain expressly voice flow or data flow, if voice communication, then expressly voice flow is admitted to the speech compression/decompression module again and carries out decompression, after be reduced to analog voice signal after the D/A conversion; And in data communication, the clear data stream that obtains can directly be handled by terminal.
For realizing said method, the present invention also provides a kind of End to End Encryption system based on mobile communications network, comprise KMC and terminal, described KMC and described terminal are mutual by mobile communications network, described KMC authenticates terminal, generate key, and be distributed to certified each terminal, described terminal is provided with the encrypted smart card as the End to End Encryption security module, deposit each key that receives in described encrypted smart card, described encrypted smart card is according to the instruction of terminal processes unit, the session key is imported its key stream generator, generate key stream, described terminal processes unit adopts the cryptographic algorithm of setting, and the voice flow/data flow of described key stream and pending plain/cipher text is encrypted or decrypt operation.
For wireless terminal, can be on the basis of existing smart card, its function is increased, to be used as described encrypted smart card of the present invention, smart card after the amplification is except the related algorithm that will finish basic system's authentication and air-interface encryption, also be responsible for the generation that encryption key flows and decruption key flows in the stream cipher system, the storage and the management of the key that this terminal is held, synchronous etc. to the encryption and decryption key stream, and the processing unit of wireless terminal adopts prior art to obtain the voice or the data message of plain/cipher text by the input unit (for example microphone or radio frequency processing module) of terminal, key stream from the smart card acquisition, both are encrypted or decryption oprerations (be generally step-by-step and carry out xor operation), form ciphertext or plaintext, send into corresponding output unit (for example radio frequency processing module or loud speaker).
For catv terminal, the dispatching desk of TETRA system for example, described encrypted smart card can adopt the modular form that adapts with it, and its function is similar to the encrypted smart card of wireless terminal with working method, repeats no more.
Described terminal can adopt prior art to write corresponding software described encrypted smart card is provided support, and describedly is used to support that the software of encrypted smart card also can adopt prior art to write.
Described KMC mainly is made up of two parts, a part is the key management control unit that is provided with key management software, another part is the center cipher machine, described center cipher machine adopts the form of pci card, be used to carry out the encryption and decryption computing, and being provided with database or the memory cell that is used for storage encryption algorithm and key, described pci card is communicated by letter with described key management control unit by pci interface.When needs carry out the key associative operation, the key management control unit is initiated the key management request by pci interface to the pci card as the center cipher machine, the center cipher machine is handled accordingly according to the request of key management control unit, and the result is returned described key management control unit.
Described encrypted smart card is a key point of finishing secure communication, it mainly is to have increased the End to End Encryption module on basic intelligent card function (mainly comprising management, KI management of personal information etc.) basis, this module comprises key stream generator and key management unit two parts, described key stream generator mainly is to produce corresponding key stream sequence according to key and the synchronizing information used in the communication, and described key management unit is used to receive, store and manage the various keys of being distributed by KMC that belong to the use of this terminal.
Used various algorithm can adopt prior art, and it is synchronous to carry out corresponding communication in the present invention according to prior art, described can the employing synchronously defined the method that transmits synchronous vector by half Frame stealing voice in the TETRA standard, this processing mode produces small influence to the speech quality of receiving terminal, also can adopt " interleave " technology to carry out synchronously, promptly in transmitting data stream, insert synchronization frame, this synchronization mechanism can not lose the transmission data, can not reduce service quality.
Because the stream cipher system that the present invention adopts has characteristics such as the low time delay of signal encryption, inerrancy diffusion, the communication quality after helping guaranteeing to encrypt.Can be according to reality, apply the present invention to various mobile communication platforms, for example public mobile network network (as 2G network, 3G network), Digital Clustering mobile communications network etc., described terminal can be mobile radio terminal, wireless vehicle mounted terminal or be directly connected to catv terminal in the system (for example transfer platform or have the terminal of call function).On existing mobile platform basis, build key management mechanism, do not change the network side equipment of mobile communication, by in portable terminal, increasing the End-to-End Security function, simultaneously by suitable key management mechanism, make and to carry out coded communication end to end between two portable terminals, unit easy to use utilizes original communication network to implement, particularly in the TETRE digital mobile communication system, can also on dispatching desk, increase the secure communication module, make between dispatching desk and the portable terminal, the voice communications versus data communications that can maintain secrecy between dispatching desk and the dispatching desk, thus can satisfy the requirement of special user to end-to-end secure communication.

Claims (10)

1. End to End Encryption method based on mobile communications network is characterized in that:
Adopt the stream cipher system to carry out End to End Encryption;
Adopt KMC that whole secrecy system is carried out key management, comprising the authentication of encrypting user (terminal), generation, distribution, renewal and the key of key are deleted;
Adopt the security module of encrypted smart card as the terminal End to End Encryption, the key that described encrypted smart card is held this terminal is stored and is managed, key according to KMC's distribution generates encryption key stream and/or decruption key stream, and the encryption and decryption key stream carried out synchronously, processing unit by terminal obtains corresponding key stream from described encrypted smart card, carries out the operation of the encrypt/decrypt of the voice of plain/cipher text or data message.
2. the End to End Encryption method based on mobile communications network as claimed in claim 1 is characterized in that: for the wireless terminal that adopts SIM card, with the function setting of described smart card on existing SIM card.
3. the End to End Encryption method based on mobile communications network as claimed in claim 1, it is characterized in that: the key that is loaded in the terminal is all generated by KMC, distribution and management, described KMC mainly is made up of two parts, the one, be provided with the key management control unit of key management software, the one, the center cipher machine, described center cipher machine adopts the form of pci card, communicate by letter with described key management control unit by pci interface, be used to carry out the encryption and decryption computing, and be provided with database or the memory cell that is used for storage encryption algorithm and key, when needs carry out the key associative operation, the key management control unit is initiated the key management request by pci interface to the center cipher machine, the center cipher machine is handled accordingly according to the request of key management control unit, and the result is returned to the key management control unit.
4. the End to End Encryption method based on mobile communications network as claimed in claim 3 is characterized in that: adopt the cipher key hierarchy management, used Key Tpe mainly comprises:
(1) master encryption keys (KEK, Key Encryption Key) is used for encrypting the GEK of downloading process;
(2) set of encryption keys (GEK, Group Encryption Key) is used for TEK is encrypted, and also can replace GEK with KEK;
(3) signaling encryption key (SEK, Signaling Encryption Key) is used to encrypt OTAK (Over The AirKeying) message, also can replace SEK with GEK or KEK;
(4) traffic encryption key or title session key (TEK, Traffic Encryption Key) are used for end-to-end communication and encrypt.
5. the End to End Encryption method based on mobile communications network as claimed in claim 1 is characterized in that: the key that KMC generates adopts following any one mode to send to portable terminal:
(1) out-band method: directly key is downloaded to portable terminal from KMC by suitable software and hardware instrument;
(2) automatic downloading mode: key is sent to portable terminal by short message or data channel;
Wherein KEK adopts out-band method to be stored in the encrypted smart card of portable terminal in advance.
6. the End to End Encryption method based on mobile communications network as claimed in claim 5, it is characterized in that: when using automatic downloading mode, the TEK that is distributed to terminal adopts KEK or GEK to encrypt through cryptographic algorithm, the TEK that encrypts encapsulation also comprises an additional verification territory, carries out integrity verification during for deciphering.
7. as claim 1,2,3,4,5 or 6 described End to End Encryption methods, it is characterized in that based on mobile communications network:
When two or more terminals are carried out coded communication, each terminal obtains identical session key by out-band method or automatic downloading mode, generate key stream by the identical key stream generating algorithm that is pre-stored in the encrypted smart card, to carry out the encryption expressly and the decrypt operation of ciphertext, used cryptographic algorithm is generally XOR, and the secret telephony process of terminal room is:
(1) after terminal A successfully sets up secure communication with terminal B, on terminal A, its encrypted smart card can obtain carrying out with terminal B the session key of secure communication, if carry out Speech Communication, produce by encrypted smart card operation key stream generating algorithm and to be used for the encryption key stream of encrypting plaintext stream of voice information, speech is after the microphone on the terminal picks up simultaneously, at first carry out the A/D conversion, send into voice compression/decompression module then and compress processing, form expressly voice flow, expressly voice flow and encryption key stream carry out the simple encryption computing, the ciphertext voice flow after obtaining encrypting; When carrying out data communication, after the expressly same and encryption key stream of data among the terminal A carries out cryptographic calculation, the generation ciphertext data stream;
(2) terminal A is sent to ciphertext voice flow or ciphertext data stream the radio frequency processing module of terminal again, transparent transmission channel by mobile communications network is transferred to terminal B, for example, the ciphertext voice flow adopts voice channel to transmit in the TETRA system, and the ciphertext voice flow of GSM network adopts the data channel of GSM;
(3) terminal B is setting up after coded communication is connected with terminal A, extract the session key of this conversation according to calling party's terminal A cause encrypted smart card, and by the encrypted smart card of terminal B operation key stream generating algorithm, producing the decruption key identical with encryption key stream among the terminal A flows, the encrypted speech that terminal B receives, data-signal is through the radio frequency processing resume module, obtain ciphertext voice flow or data flow, after carrying out simple decrypt operation with decruption key stream, obtain expressly voice flow or data flow, if voice communication, then expressly voice flow is admitted to the speech compression/decompression module again and carries out decompression, after be reduced to analog voice signal after the D/A conversion; And in data communication, the clear data stream that obtains is directly handled by terminal.
8. End to End Encryption system based on mobile communications network, comprise terminal, it is characterized in that also comprising KMC, described KMC and described terminal are mutual by mobile communications network, described KMC authenticates terminal, generate key, and be distributed to certified each terminal, described terminal is provided with the encrypted smart card as the End to End Encryption security module, deposit each key that receives in described encrypted smart card, described encrypted smart card is according to the encrypted instruction of terminal processes unit, the session key is imported its key stream generator, generate key stream, described terminal processes unit adopts the cryptographic algorithm of setting, and the voice flow/data flow of described key stream and pending plain/cipher text is encrypted or decrypt operation.
9. the End to End Encryption system based on mobile communications network as claimed in claim 8, it is characterized in that described KMC mainly is made up of two parts, a part is the key management control unit that is provided with key management software, another part is the center cipher machine, described center cipher machine adopts the form of pci card, be used to carry out the encryption and decryption computing, and being provided with database or the memory cell that is used for storage encryption algorithm and key, described pci card is communicated by letter with described key management control unit by pci interface.
10. the End to End Encryption system based on mobile communications network as claimed in claim 8, it is characterized in that described encrypting module adopts encrypted smart card to realize, described encrypting module comprises key stream generator and key management unit two parts, described key stream generator mainly is to produce corresponding key stream sequence according to key and the synchronizing information used in the communication, and described key management unit is used to receive, store and manage the various keys of being distributed by KMC that belong to the use of this terminal.
CNA2006101132268A 2006-09-20 2006-09-20 End-to-end encrypting method and system based on mobile communication network Pending CN1925681A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2006101132268A CN1925681A (en) 2006-09-20 2006-09-20 End-to-end encrypting method and system based on mobile communication network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2006101132268A CN1925681A (en) 2006-09-20 2006-09-20 End-to-end encrypting method and system based on mobile communication network

Publications (1)

Publication Number Publication Date
CN1925681A true CN1925681A (en) 2007-03-07

Family

ID=37818075

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2006101132268A Pending CN1925681A (en) 2006-09-20 2006-09-20 End-to-end encrypting method and system based on mobile communication network

Country Status (1)

Country Link
CN (1) CN1925681A (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101729641A (en) * 2009-11-27 2010-06-09 北京兵港科技发展有限公司 Machine card separated acoustic code encryption telephone set system
CN101848078A (en) * 2010-04-30 2010-09-29 中国科学院软件研究所 Perturbation method and encryption method for key stream sequence
CN101873588A (en) * 2010-05-27 2010-10-27 大唐微电子技术有限公司 Method and system for realizing service application safety
CN102110233A (en) * 2009-12-24 2011-06-29 上海华虹集成电路有限责任公司 Implementation method of non-contact IC card reader
CN102398868A (en) * 2011-11-21 2012-04-04 江麓机电科技有限公司 Intelligent tower crane monitoring system
CN103988465A (en) * 2011-12-12 2014-08-13 诺基亚公司 Method and apparatus for implementing key stream hierarchy
CN104270380A (en) * 2014-10-15 2015-01-07 叶涛 End-to-end encryption method and system based on mobile network and communication client side
CN104539433A (en) * 2014-10-30 2015-04-22 马洁韵 Voice communication encryption system and encryption method thereof
CN105337726A (en) * 2015-04-06 2016-02-17 安徽问天量子科技股份有限公司 End-to-end hand-held device encryption method based on quantum cryptography and system
CN105635096A (en) * 2015-06-26 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Data module access method, system and terminal
WO2016179923A1 (en) * 2015-05-13 2016-11-17 中兴通讯股份有限公司 Method and apparatus for processing encrypted call, terminal, and kmc
CN106209356A (en) * 2016-07-07 2016-12-07 上海交通大学 The privacy control method remotely controlled for Internet of Things and system
CN106411715A (en) * 2016-11-02 2017-02-15 中国人民公安大学 Cloud-based secure instant messaging method and system
CN106936767A (en) * 2015-12-29 2017-07-07 北京大唐高鸿数据网络技术有限公司 Secure communication terminal and its communication means
US9798695B2 (en) 2012-08-07 2017-10-24 Nokia Technologies Oy Access control for wireless memory
CN107317622A (en) * 2017-06-30 2017-11-03 广东电网有限责任公司电力科学研究院 A kind of onboard satellite communication modem for unmanned plane power-line patrolling
CN114501435A (en) * 2021-12-28 2022-05-13 中国航天空气动力技术研究院 Communication link encryption system and method suitable for unmanned aerial vehicle

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101729641A (en) * 2009-11-27 2010-06-09 北京兵港科技发展有限公司 Machine card separated acoustic code encryption telephone set system
CN101729641B (en) * 2009-11-27 2014-03-26 北京兵港科技发展有限公司 Machine card separated acoustic code encryption telephone set system
CN102110233A (en) * 2009-12-24 2011-06-29 上海华虹集成电路有限责任公司 Implementation method of non-contact IC card reader
CN101848078A (en) * 2010-04-30 2010-09-29 中国科学院软件研究所 Perturbation method and encryption method for key stream sequence
CN101873588A (en) * 2010-05-27 2010-10-27 大唐微电子技术有限公司 Method and system for realizing service application safety
CN102398868A (en) * 2011-11-21 2012-04-04 江麓机电科技有限公司 Intelligent tower crane monitoring system
CN103988465B (en) * 2011-12-12 2017-05-10 诺基亚技术有限公司 Method and apparatus for implementing key stream hierarchy
CN103988465A (en) * 2011-12-12 2014-08-13 诺基亚公司 Method and apparatus for implementing key stream hierarchy
US9798695B2 (en) 2012-08-07 2017-10-24 Nokia Technologies Oy Access control for wireless memory
CN104270380A (en) * 2014-10-15 2015-01-07 叶涛 End-to-end encryption method and system based on mobile network and communication client side
CN104539433A (en) * 2014-10-30 2015-04-22 马洁韵 Voice communication encryption system and encryption method thereof
CN105337726A (en) * 2015-04-06 2016-02-17 安徽问天量子科技股份有限公司 End-to-end hand-held device encryption method based on quantum cryptography and system
WO2016179923A1 (en) * 2015-05-13 2016-11-17 中兴通讯股份有限公司 Method and apparatus for processing encrypted call, terminal, and kmc
CN106301767A (en) * 2015-05-13 2017-01-04 中兴通讯股份有限公司 The processing method of a kind of speech scrambling, device, terminal and KMC
CN105635096A (en) * 2015-06-26 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Data module access method, system and terminal
CN105635096B (en) * 2015-06-26 2018-09-14 宇龙计算机通信科技(深圳)有限公司 Access method, system and the terminal of data module
CN106936767A (en) * 2015-12-29 2017-07-07 北京大唐高鸿数据网络技术有限公司 Secure communication terminal and its communication means
CN106209356A (en) * 2016-07-07 2016-12-07 上海交通大学 The privacy control method remotely controlled for Internet of Things and system
CN106411715A (en) * 2016-11-02 2017-02-15 中国人民公安大学 Cloud-based secure instant messaging method and system
CN107317622A (en) * 2017-06-30 2017-11-03 广东电网有限责任公司电力科学研究院 A kind of onboard satellite communication modem for unmanned plane power-line patrolling
CN114501435A (en) * 2021-12-28 2022-05-13 中国航天空气动力技术研究院 Communication link encryption system and method suitable for unmanned aerial vehicle

Similar Documents

Publication Publication Date Title
CN1925681A (en) End-to-end encrypting method and system based on mobile communication network
CN1123159C (en) Method and apparatus for encryption radio traffic in a telecommunications network
EP2215795B1 (en) End-to-end encrypted communication
CN104333455A (en) Secrete communication system and method for smart phone
CN106982419B (en) Single call end-to-end encryption method and system for broadband cluster system
CN101384042A (en) Mobile phone ciphering method based on safe digital interface ciphering card
JPH06188877A (en) Encoding system
CN112153641B (en) Secondary authentication enhancement and end-to-end encryption method and system based on edge UPF
CN101951601A (en) Method and system for encrypting voice calls in mobile communication network, terminal and network side
CN101917711A (en) Mobile communication system and voice call encryption method thereof
CN113347215B (en) Encryption method for mobile video conference
CN106790281A (en) A kind of end-to-end voice encryption device and encryption method towards intercom system
CN102137393B (en) Method and device for encrypting end-to-end
CN1115924C (en) Encryption method for mobile telephone
US10601586B2 (en) Method and apparatus for key management of end encrypted transmission
CN1688171A (en) Apparatus and method for implementing data safety transmission of mobile communication apparatus
CN106878277B (en) Method and device for realizing voice encryption based on DMR standard
CN100576856C (en) The mobile phone scrambler and the secret communication method that are suitable for multiple communication network
WO2012165901A2 (en) Method for inter-terminal security channelization
CN1592141A (en) Terminal to terminal encryption method of cell phone voice and data
CN108123951B (en) Cluster communication off-line direct-communication voice group call transmission encryption method and device
RU2132597C1 (en) Method for encryption and transmission of encrypted voice data in gsm-900 and dcs-1800 cellular mobile communication networks
CN1177431C (en) Method and mobile device for end-to-end enciphere
CN107046464A (en) Secrecy intercom system and method based on quantum cryptography
CA2371811A1 (en) Method and apparatus for enhanced security in a broadband telephony network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication