CN1925681A - End-to-end encrypting method and system based on mobile communication network - Google Patents
End-to-end encrypting method and system based on mobile communication network Download PDFInfo
- Publication number
- CN1925681A CN1925681A CNA2006101132268A CN200610113226A CN1925681A CN 1925681 A CN1925681 A CN 1925681A CN A2006101132268 A CNA2006101132268 A CN A2006101132268A CN 200610113226 A CN200610113226 A CN 200610113226A CN 1925681 A CN1925681 A CN 1925681A
- Authority
- CN
- China
- Prior art keywords
- key
- terminal
- encryption
- stream
- smart card
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
This invention relates to end to end coding method and system based on mobile communication network, which comprises the following steps: adopting codes end to end coding and adopting key management center for whole codes system and adopting keys intelligent cards as terminal end to coded safety module; according to center generating codes flow and decodes flow through or formula on messages and codes to realize end to end coding communication; the said system comprises key management center and terminal interact through center to terminal end with intelligent card.
Description
Technical field
The present invention relates to a kind of End to End Encryption method, also relate to a kind of encryption system that adopts this method, belong to moving communicating field based on mobile communications network.
Background technology
In existing mobile communication system, no matter be public mobile communication system or professional mobile communication system, all there is encryption technology to exist.For example in gsm system, TETRA standard, safety functions such as authentication, air-interface encryption have all been defined, be used for resolution system in wireless access safety problem partly, in 3G standard, also defined network domain security, thereby make the node exchange of signaling data safely between the mobile communication core net, just guarantee secure data exchange between the entity of mobile communication core net.But these encryption technologies also the situation that information exists with the plaintext form can occur at the node place of the core net of communication system, its safe coefficient is low, can't satisfy the safety requirements of the high assurance user profile confidentiality of army, government and security department and some special user proposition.
For improving fail safe, realize the End to End Encryption of mobile communication, No. 98108859.7 patent application cases of China disclose a kind of End to End Encryption method, this method is to the effect that: the random number that calling party's terminal utilizes network to send generates encryption key, this encryption key sends to callee's terminal by call setup message, make two end subscribers when communication, can use identical key that call-information is carried out enciphering/deciphering, Virtual network operator is known the unsafe problems that key information causes but this invention still exists, and implement also comparatively complexity, need transform handset structure, increase the volume and the power consumption of mobile phone thus.
No. 200410021688.7 patent application cases of China disclose a kind of another kind of End to End Encryption method, wireless side user adopts external terminal security device to be connected with the bluetooth travelling carriage, described external terminal security device is connected with the GSM travelling carriage of supporting the bluetooth data communication function by Bluetooth technology, thereby realize the End to End Encryption of GSM network voice and data service, the greatest problem of this method is exactly to need to use external mobile privacy device, increase user's burden thus, and brought the inconvenience in the use.
Summary of the invention
For overcoming the above-mentioned defective of prior art, the invention provides a kind of End to End Encryption method based on mobile communications network, a kind of encryption system that adopts this method also is provided, not only fail safe is good for the End to End Encryption that this method realizes, and device therefor is simple in structure, cost is low, and is easy to use.
The present invention realizes that the technical scheme of above-mentioned purpose is: a kind of End to End Encryption method based on mobile communications network, and it adopts the stream cipher system to carry out End to End Encryption; Adopt KMC that whole secrecy system is carried out key management, comprising the authentication of encrypting user (terminal), generation, distribution, renewal and the key of key are deleted; Adopt the security module of encrypted smart card as the terminal End to End Encryption, the key that described encrypted smart card is held this terminal is stored and is managed, key according to KMC's distribution generates encryption key stream and/or decruption key stream, and the encryption and decryption key stream carried out synchronously, processing unit by terminal obtains described key stream from described encrypted smart card, carries out the operation of the encrypt/decrypt of the voice of plain/cipher text or data message.
A kind of End to End Encryption system based on mobile communications network, comprise KMC and terminal, described KMC and described terminal are mutual by mobile communications network, described KMC authenticates terminal, generate key, and be distributed to certified each terminal, described terminal is provided with the encrypted smart card as the End to End Encryption security module, deposit each key that receives in described encrypted smart card, described encrypted smart card is according to the instruction of terminal processes unit, the session key is imported its key stream generator, generate key stream, the cryptographic algorithm that described terminal processes unit adopt to be set is encrypted or decrypt operation the voice flow/data flow of described key stream and pending plain/cipher text.
Because the present invention adopts the mode of KMC and terminal encryption smart card to realize End to End Encryption, avoided prior art lower network node to have the defective of plaintext transmission, and avoided the control of Virtual network operator to key, improved the fail safe and the safe class of communication; Because the cryptographic facility of communication terminal of the present invention can adopt the encrypted smart card form, and by software encrypted smart card is provided support, and has simplified the structure of encryption system, has made things convenient for use, has reduced and has encrypted required cost; Owing to be provided with KMC, also make the office that has the right of country be able to obtain key, to carry out necessary monitoring by legal approach.
Description of drawings
Fig. 1 is based on the structural representation of the present invention of mobile communications network;
Fig. 2 is the secure communication process schematic diagram that the present invention relates to;
The composition frame chart of Fig. 3 encrypted smart card of the present invention.
Embodiment
Referring to Fig. 1-Fig. 3, the invention provides a kind of End to End Encryption method based on mobile communications network, it adopts the stream cipher system to carry out End to End Encryption; Adopt KMC that whole secrecy system is carried out key management, comprising the authentication of encrypting user (terminal), generation, distribution, renewal and the key of key are deleted; Adopt the security module of encrypted smart card as the terminal End to End Encryption, the key that described encrypted smart card is held this terminal is stored and is managed, key according to KMC's distribution generates encryption key stream and/or decruption key stream, and the encryption and decryption key stream carried out synchronously, processing unit by terminal obtains corresponding key stream from described encrypted smart card, carries out the operation of the encrypt/decrypt of the voice of plain/cipher text or data message.
For the wireless terminal that adopts smart card, function that can be by expanding smart card is with used as described encrypted smart card, the function setting that is about to described smart card at existing smart card (for example, be SIM in the GSM network) on, need not wireless terminal is carried out structural change, to save cost, the convenient use.
The key that is loaded in the terminal all generates, distributes and management by KMC.Described KMC mainly is made up of two parts, the one, be provided with the key management control unit of key management software, the one, the center cipher machine, described center cipher machine adopts the form of pci card, communicate by letter with described key management control unit by pci interface, be used to carry out the encryption and decryption computing, and be provided with database or the memory cell that is used for storage encryption algorithm and key.When needs carry out the key associative operation, the key management control unit is initiated the key management request by pci interface to the center cipher machine, the center cipher machine is handled accordingly according to the request of key management control unit, and the result is returned to the key management control unit.
The present invention can adopt the cipher key hierarchy way to manage, and used Key Tpe mainly comprises:
(1) master encryption keys (KEK, Key Encryption Key) is used for encrypting the GEK of downloading process;
(2) set of encryption keys (GEK, Group Encryption Key) is used for TEK is encrypted, and also can replace GEK with KEK;
(3) signaling encryption key (SEK, Signaling Encryption Key) is used to encrypt OTAK (Over The AirKeying) message, also can replace SEK with GEK or KEK;
(4) traffic encryption key or title session key (TEK, Traffic Encryption Key) are used for end-to-end communication and encrypt.
The present invention adopts pre-distribution and upgrades the key distribution strategy that combines automatically, provides following dual mode that the key that KMC generates is sent to portable terminal:
(1) out-band method: directly key is downloaded to portable terminal by suitable software and hardware instrument, do not take interface-free resources from KMC;
(2) automatic downloading mode: key is sent to portable terminal by short message or data channel, has taken interface-free resources;
General KEK adopts out-band method to be stored in advance in the encrypted smart card (Smart Card) of portable terminal, and other key can adopt any mode to distribute according to concrete application.If it is less to need to carry out the number of users of end-to-end encrypted communication in the system, and the limited investment of system, then all keys can adopt out-band method to distribute.
When two or more terminals are carried out coded communication, each terminal obtains identical session key by out-band method or automatic downloading mode, generate key stream by the identical algorithm that is pre-stored in the encrypted smart card, to carry out the encryption expressly and the decrypt operation of ciphertext, used cryptographic algorithm can be XOR usually.
The process that obtains session key by automatic downloading mode can be (can adopt similar fashion during MPTY): calling party (terminal A) initiates same callee's (terminal B) secure session request, after KMC carries out the status authentication to terminal A, generate this session key, this key is sent to terminal A after the GEK encryption encapsulation with terminal A and terminal B respectively, terminal A is to the session key deciphering with its GEK encapsulation, extract this session key, the session key that will encapsulate with the GEK of terminal B sends to terminal B, B is decrypted computing by terminal, extracts session key.The session key that KMC also can directly encapsulate the GEK with terminal B sends to terminal B.
Two terminal security communication process are (the multiple terminals conversation can be adopted similar fashion):
(1) after terminal A successfully sets up secure communication with terminal B, on terminal A, its encrypted smart card can obtain carrying out with terminal B the session key of secure communication, if carry out Speech Communication, produce by encrypted smart card operation key stream generating algorithm and to be used for the encryption key stream of encrypting plaintext stream of voice information, speech is after the microphone on the terminal picks up simultaneously, at first carry out the A/D conversion, send into voice compression/decompression module then and compress processing, at this moment we are referred to as expressly voice flow information, expressly the simple encryption computing (for example, step-by-step XOR) of voice flow and encryption key stream, voice flow after obtaining encrypting is called the ciphertext voice flow; When carrying out data communication, after the expressly same and encryption key stream of data among the terminal A carries out cryptographic calculation, the generation ciphertext data stream;
(2) terminal A is sent to the radio frequency processing module of terminal again with ciphertext voice flow or ciphertext data stream, and the transparent transmission channel by mobile communications network is transferred to terminal B.Different mobile communications networks can adopt different transparent transmission channels, and for example, in the TETRA system, the ciphertext voice flow can adopt voice channel to transmit, and the ciphertext voice flow of GSM network can adopt the data channel of GSM;
(3) terminal B is setting up after coded communication is connected with terminal A, can extract the session key of this conversation according to calling party's terminal A cause encrypted smart card, and by the encrypted smart card of terminal B operation key stream generating algorithm, producing the decruption key identical with encryption key stream among the terminal A flows, the encrypted speech that terminal B receives, data-signal is through the radio frequency processing resume module, obtain ciphertext voice flow or data flow, (for example carry out simple decrypt operation with decruption key stream, the step-by-step XOR) after, obtain expressly voice flow or data flow, if voice communication, then expressly voice flow is admitted to the speech compression/decompression module again and carries out decompression, after be reduced to analog voice signal after the D/A conversion; And in data communication, the clear data stream that obtains can directly be handled by terminal.
For realizing said method, the present invention also provides a kind of End to End Encryption system based on mobile communications network, comprise KMC and terminal, described KMC and described terminal are mutual by mobile communications network, described KMC authenticates terminal, generate key, and be distributed to certified each terminal, described terminal is provided with the encrypted smart card as the End to End Encryption security module, deposit each key that receives in described encrypted smart card, described encrypted smart card is according to the instruction of terminal processes unit, the session key is imported its key stream generator, generate key stream, described terminal processes unit adopts the cryptographic algorithm of setting, and the voice flow/data flow of described key stream and pending plain/cipher text is encrypted or decrypt operation.
For wireless terminal, can be on the basis of existing smart card, its function is increased, to be used as described encrypted smart card of the present invention, smart card after the amplification is except the related algorithm that will finish basic system's authentication and air-interface encryption, also be responsible for the generation that encryption key flows and decruption key flows in the stream cipher system, the storage and the management of the key that this terminal is held, synchronous etc. to the encryption and decryption key stream, and the processing unit of wireless terminal adopts prior art to obtain the voice or the data message of plain/cipher text by the input unit (for example microphone or radio frequency processing module) of terminal, key stream from the smart card acquisition, both are encrypted or decryption oprerations (be generally step-by-step and carry out xor operation), form ciphertext or plaintext, send into corresponding output unit (for example radio frequency processing module or loud speaker).
For catv terminal, the dispatching desk of TETRA system for example, described encrypted smart card can adopt the modular form that adapts with it, and its function is similar to the encrypted smart card of wireless terminal with working method, repeats no more.
Described terminal can adopt prior art to write corresponding software described encrypted smart card is provided support, and describedly is used to support that the software of encrypted smart card also can adopt prior art to write.
Described KMC mainly is made up of two parts, a part is the key management control unit that is provided with key management software, another part is the center cipher machine, described center cipher machine adopts the form of pci card, be used to carry out the encryption and decryption computing, and being provided with database or the memory cell that is used for storage encryption algorithm and key, described pci card is communicated by letter with described key management control unit by pci interface.When needs carry out the key associative operation, the key management control unit is initiated the key management request by pci interface to the pci card as the center cipher machine, the center cipher machine is handled accordingly according to the request of key management control unit, and the result is returned described key management control unit.
Described encrypted smart card is a key point of finishing secure communication, it mainly is to have increased the End to End Encryption module on basic intelligent card function (mainly comprising management, KI management of personal information etc.) basis, this module comprises key stream generator and key management unit two parts, described key stream generator mainly is to produce corresponding key stream sequence according to key and the synchronizing information used in the communication, and described key management unit is used to receive, store and manage the various keys of being distributed by KMC that belong to the use of this terminal.
Used various algorithm can adopt prior art, and it is synchronous to carry out corresponding communication in the present invention according to prior art, described can the employing synchronously defined the method that transmits synchronous vector by half Frame stealing voice in the TETRA standard, this processing mode produces small influence to the speech quality of receiving terminal, also can adopt " interleave " technology to carry out synchronously, promptly in transmitting data stream, insert synchronization frame, this synchronization mechanism can not lose the transmission data, can not reduce service quality.
Because the stream cipher system that the present invention adopts has characteristics such as the low time delay of signal encryption, inerrancy diffusion, the communication quality after helping guaranteeing to encrypt.Can be according to reality, apply the present invention to various mobile communication platforms, for example public mobile network network (as 2G network, 3G network), Digital Clustering mobile communications network etc., described terminal can be mobile radio terminal, wireless vehicle mounted terminal or be directly connected to catv terminal in the system (for example transfer platform or have the terminal of call function).On existing mobile platform basis, build key management mechanism, do not change the network side equipment of mobile communication, by in portable terminal, increasing the End-to-End Security function, simultaneously by suitable key management mechanism, make and to carry out coded communication end to end between two portable terminals, unit easy to use utilizes original communication network to implement, particularly in the TETRE digital mobile communication system, can also on dispatching desk, increase the secure communication module, make between dispatching desk and the portable terminal, the voice communications versus data communications that can maintain secrecy between dispatching desk and the dispatching desk, thus can satisfy the requirement of special user to end-to-end secure communication.
Claims (10)
1. End to End Encryption method based on mobile communications network is characterized in that:
Adopt the stream cipher system to carry out End to End Encryption;
Adopt KMC that whole secrecy system is carried out key management, comprising the authentication of encrypting user (terminal), generation, distribution, renewal and the key of key are deleted;
Adopt the security module of encrypted smart card as the terminal End to End Encryption, the key that described encrypted smart card is held this terminal is stored and is managed, key according to KMC's distribution generates encryption key stream and/or decruption key stream, and the encryption and decryption key stream carried out synchronously, processing unit by terminal obtains corresponding key stream from described encrypted smart card, carries out the operation of the encrypt/decrypt of the voice of plain/cipher text or data message.
2. the End to End Encryption method based on mobile communications network as claimed in claim 1 is characterized in that: for the wireless terminal that adopts SIM card, with the function setting of described smart card on existing SIM card.
3. the End to End Encryption method based on mobile communications network as claimed in claim 1, it is characterized in that: the key that is loaded in the terminal is all generated by KMC, distribution and management, described KMC mainly is made up of two parts, the one, be provided with the key management control unit of key management software, the one, the center cipher machine, described center cipher machine adopts the form of pci card, communicate by letter with described key management control unit by pci interface, be used to carry out the encryption and decryption computing, and be provided with database or the memory cell that is used for storage encryption algorithm and key, when needs carry out the key associative operation, the key management control unit is initiated the key management request by pci interface to the center cipher machine, the center cipher machine is handled accordingly according to the request of key management control unit, and the result is returned to the key management control unit.
4. the End to End Encryption method based on mobile communications network as claimed in claim 3 is characterized in that: adopt the cipher key hierarchy management, used Key Tpe mainly comprises:
(1) master encryption keys (KEK, Key Encryption Key) is used for encrypting the GEK of downloading process;
(2) set of encryption keys (GEK, Group Encryption Key) is used for TEK is encrypted, and also can replace GEK with KEK;
(3) signaling encryption key (SEK, Signaling Encryption Key) is used to encrypt OTAK (Over The AirKeying) message, also can replace SEK with GEK or KEK;
(4) traffic encryption key or title session key (TEK, Traffic Encryption Key) are used for end-to-end communication and encrypt.
5. the End to End Encryption method based on mobile communications network as claimed in claim 1 is characterized in that: the key that KMC generates adopts following any one mode to send to portable terminal:
(1) out-band method: directly key is downloaded to portable terminal from KMC by suitable software and hardware instrument;
(2) automatic downloading mode: key is sent to portable terminal by short message or data channel;
Wherein KEK adopts out-band method to be stored in the encrypted smart card of portable terminal in advance.
6. the End to End Encryption method based on mobile communications network as claimed in claim 5, it is characterized in that: when using automatic downloading mode, the TEK that is distributed to terminal adopts KEK or GEK to encrypt through cryptographic algorithm, the TEK that encrypts encapsulation also comprises an additional verification territory, carries out integrity verification during for deciphering.
7. as claim 1,2,3,4,5 or 6 described End to End Encryption methods, it is characterized in that based on mobile communications network:
When two or more terminals are carried out coded communication, each terminal obtains identical session key by out-band method or automatic downloading mode, generate key stream by the identical key stream generating algorithm that is pre-stored in the encrypted smart card, to carry out the encryption expressly and the decrypt operation of ciphertext, used cryptographic algorithm is generally XOR, and the secret telephony process of terminal room is:
(1) after terminal A successfully sets up secure communication with terminal B, on terminal A, its encrypted smart card can obtain carrying out with terminal B the session key of secure communication, if carry out Speech Communication, produce by encrypted smart card operation key stream generating algorithm and to be used for the encryption key stream of encrypting plaintext stream of voice information, speech is after the microphone on the terminal picks up simultaneously, at first carry out the A/D conversion, send into voice compression/decompression module then and compress processing, form expressly voice flow, expressly voice flow and encryption key stream carry out the simple encryption computing, the ciphertext voice flow after obtaining encrypting; When carrying out data communication, after the expressly same and encryption key stream of data among the terminal A carries out cryptographic calculation, the generation ciphertext data stream;
(2) terminal A is sent to ciphertext voice flow or ciphertext data stream the radio frequency processing module of terminal again, transparent transmission channel by mobile communications network is transferred to terminal B, for example, the ciphertext voice flow adopts voice channel to transmit in the TETRA system, and the ciphertext voice flow of GSM network adopts the data channel of GSM;
(3) terminal B is setting up after coded communication is connected with terminal A, extract the session key of this conversation according to calling party's terminal A cause encrypted smart card, and by the encrypted smart card of terminal B operation key stream generating algorithm, producing the decruption key identical with encryption key stream among the terminal A flows, the encrypted speech that terminal B receives, data-signal is through the radio frequency processing resume module, obtain ciphertext voice flow or data flow, after carrying out simple decrypt operation with decruption key stream, obtain expressly voice flow or data flow, if voice communication, then expressly voice flow is admitted to the speech compression/decompression module again and carries out decompression, after be reduced to analog voice signal after the D/A conversion; And in data communication, the clear data stream that obtains is directly handled by terminal.
8. End to End Encryption system based on mobile communications network, comprise terminal, it is characterized in that also comprising KMC, described KMC and described terminal are mutual by mobile communications network, described KMC authenticates terminal, generate key, and be distributed to certified each terminal, described terminal is provided with the encrypted smart card as the End to End Encryption security module, deposit each key that receives in described encrypted smart card, described encrypted smart card is according to the encrypted instruction of terminal processes unit, the session key is imported its key stream generator, generate key stream, described terminal processes unit adopts the cryptographic algorithm of setting, and the voice flow/data flow of described key stream and pending plain/cipher text is encrypted or decrypt operation.
9. the End to End Encryption system based on mobile communications network as claimed in claim 8, it is characterized in that described KMC mainly is made up of two parts, a part is the key management control unit that is provided with key management software, another part is the center cipher machine, described center cipher machine adopts the form of pci card, be used to carry out the encryption and decryption computing, and being provided with database or the memory cell that is used for storage encryption algorithm and key, described pci card is communicated by letter with described key management control unit by pci interface.
10. the End to End Encryption system based on mobile communications network as claimed in claim 8, it is characterized in that described encrypting module adopts encrypted smart card to realize, described encrypting module comprises key stream generator and key management unit two parts, described key stream generator mainly is to produce corresponding key stream sequence according to key and the synchronizing information used in the communication, and described key management unit is used to receive, store and manage the various keys of being distributed by KMC that belong to the use of this terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2006101132268A CN1925681A (en) | 2006-09-20 | 2006-09-20 | End-to-end encrypting method and system based on mobile communication network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2006101132268A CN1925681A (en) | 2006-09-20 | 2006-09-20 | End-to-end encrypting method and system based on mobile communication network |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1925681A true CN1925681A (en) | 2007-03-07 |
Family
ID=37818075
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA2006101132268A Pending CN1925681A (en) | 2006-09-20 | 2006-09-20 | End-to-end encrypting method and system based on mobile communication network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1925681A (en) |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101729641A (en) * | 2009-11-27 | 2010-06-09 | 北京兵港科技发展有限公司 | Machine card separated acoustic code encryption telephone set system |
CN101848078A (en) * | 2010-04-30 | 2010-09-29 | 中国科学院软件研究所 | Perturbation method and encryption method for key stream sequence |
CN101873588A (en) * | 2010-05-27 | 2010-10-27 | 大唐微电子技术有限公司 | Method and system for realizing service application safety |
CN102110233A (en) * | 2009-12-24 | 2011-06-29 | 上海华虹集成电路有限责任公司 | Implementation method of non-contact IC card reader |
CN102398868A (en) * | 2011-11-21 | 2012-04-04 | 江麓机电科技有限公司 | Intelligent tower crane monitoring system |
CN103988465A (en) * | 2011-12-12 | 2014-08-13 | 诺基亚公司 | Method and apparatus for implementing key stream hierarchy |
CN104270380A (en) * | 2014-10-15 | 2015-01-07 | 叶涛 | End-to-end encryption method and system based on mobile network and communication client side |
CN104539433A (en) * | 2014-10-30 | 2015-04-22 | 马洁韵 | Voice communication encryption system and encryption method thereof |
CN105337726A (en) * | 2015-04-06 | 2016-02-17 | 安徽问天量子科技股份有限公司 | End-to-end hand-held device encryption method based on quantum cryptography and system |
CN105635096A (en) * | 2015-06-26 | 2016-06-01 | 宇龙计算机通信科技(深圳)有限公司 | Data module access method, system and terminal |
WO2016179923A1 (en) * | 2015-05-13 | 2016-11-17 | 中兴通讯股份有限公司 | Method and apparatus for processing encrypted call, terminal, and kmc |
CN106209356A (en) * | 2016-07-07 | 2016-12-07 | 上海交通大学 | The privacy control method remotely controlled for Internet of Things and system |
CN106411715A (en) * | 2016-11-02 | 2017-02-15 | 中国人民公安大学 | Cloud-based secure instant messaging method and system |
CN106936767A (en) * | 2015-12-29 | 2017-07-07 | 北京大唐高鸿数据网络技术有限公司 | Secure communication terminal and its communication means |
US9798695B2 (en) | 2012-08-07 | 2017-10-24 | Nokia Technologies Oy | Access control for wireless memory |
CN107317622A (en) * | 2017-06-30 | 2017-11-03 | 广东电网有限责任公司电力科学研究院 | A kind of onboard satellite communication modem for unmanned plane power-line patrolling |
CN114501435A (en) * | 2021-12-28 | 2022-05-13 | 中国航天空气动力技术研究院 | Communication link encryption system and method suitable for unmanned aerial vehicle |
-
2006
- 2006-09-20 CN CNA2006101132268A patent/CN1925681A/en active Pending
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101729641A (en) * | 2009-11-27 | 2010-06-09 | 北京兵港科技发展有限公司 | Machine card separated acoustic code encryption telephone set system |
CN101729641B (en) * | 2009-11-27 | 2014-03-26 | 北京兵港科技发展有限公司 | Machine card separated acoustic code encryption telephone set system |
CN102110233A (en) * | 2009-12-24 | 2011-06-29 | 上海华虹集成电路有限责任公司 | Implementation method of non-contact IC card reader |
CN101848078A (en) * | 2010-04-30 | 2010-09-29 | 中国科学院软件研究所 | Perturbation method and encryption method for key stream sequence |
CN101873588A (en) * | 2010-05-27 | 2010-10-27 | 大唐微电子技术有限公司 | Method and system for realizing service application safety |
CN102398868A (en) * | 2011-11-21 | 2012-04-04 | 江麓机电科技有限公司 | Intelligent tower crane monitoring system |
CN103988465B (en) * | 2011-12-12 | 2017-05-10 | 诺基亚技术有限公司 | Method and apparatus for implementing key stream hierarchy |
CN103988465A (en) * | 2011-12-12 | 2014-08-13 | 诺基亚公司 | Method and apparatus for implementing key stream hierarchy |
US9798695B2 (en) | 2012-08-07 | 2017-10-24 | Nokia Technologies Oy | Access control for wireless memory |
CN104270380A (en) * | 2014-10-15 | 2015-01-07 | 叶涛 | End-to-end encryption method and system based on mobile network and communication client side |
CN104539433A (en) * | 2014-10-30 | 2015-04-22 | 马洁韵 | Voice communication encryption system and encryption method thereof |
CN105337726A (en) * | 2015-04-06 | 2016-02-17 | 安徽问天量子科技股份有限公司 | End-to-end hand-held device encryption method based on quantum cryptography and system |
WO2016179923A1 (en) * | 2015-05-13 | 2016-11-17 | 中兴通讯股份有限公司 | Method and apparatus for processing encrypted call, terminal, and kmc |
CN106301767A (en) * | 2015-05-13 | 2017-01-04 | 中兴通讯股份有限公司 | The processing method of a kind of speech scrambling, device, terminal and KMC |
CN105635096A (en) * | 2015-06-26 | 2016-06-01 | 宇龙计算机通信科技(深圳)有限公司 | Data module access method, system and terminal |
CN105635096B (en) * | 2015-06-26 | 2018-09-14 | 宇龙计算机通信科技(深圳)有限公司 | Access method, system and the terminal of data module |
CN106936767A (en) * | 2015-12-29 | 2017-07-07 | 北京大唐高鸿数据网络技术有限公司 | Secure communication terminal and its communication means |
CN106209356A (en) * | 2016-07-07 | 2016-12-07 | 上海交通大学 | The privacy control method remotely controlled for Internet of Things and system |
CN106411715A (en) * | 2016-11-02 | 2017-02-15 | 中国人民公安大学 | Cloud-based secure instant messaging method and system |
CN107317622A (en) * | 2017-06-30 | 2017-11-03 | 广东电网有限责任公司电力科学研究院 | A kind of onboard satellite communication modem for unmanned plane power-line patrolling |
CN114501435A (en) * | 2021-12-28 | 2022-05-13 | 中国航天空气动力技术研究院 | Communication link encryption system and method suitable for unmanned aerial vehicle |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1925681A (en) | End-to-end encrypting method and system based on mobile communication network | |
CN1123159C (en) | Method and apparatus for encryption radio traffic in a telecommunications network | |
EP2215795B1 (en) | End-to-end encrypted communication | |
CN104333455A (en) | Secrete communication system and method for smart phone | |
CN106982419B (en) | Single call end-to-end encryption method and system for broadband cluster system | |
CN101384042A (en) | Mobile phone ciphering method based on safe digital interface ciphering card | |
JPH06188877A (en) | Encoding system | |
CN112153641B (en) | Secondary authentication enhancement and end-to-end encryption method and system based on edge UPF | |
CN101951601A (en) | Method and system for encrypting voice calls in mobile communication network, terminal and network side | |
CN101917711A (en) | Mobile communication system and voice call encryption method thereof | |
CN113347215B (en) | Encryption method for mobile video conference | |
CN106790281A (en) | A kind of end-to-end voice encryption device and encryption method towards intercom system | |
CN102137393B (en) | Method and device for encrypting end-to-end | |
CN1115924C (en) | Encryption method for mobile telephone | |
US10601586B2 (en) | Method and apparatus for key management of end encrypted transmission | |
CN1688171A (en) | Apparatus and method for implementing data safety transmission of mobile communication apparatus | |
CN106878277B (en) | Method and device for realizing voice encryption based on DMR standard | |
CN100576856C (en) | The mobile phone scrambler and the secret communication method that are suitable for multiple communication network | |
WO2012165901A2 (en) | Method for inter-terminal security channelization | |
CN1592141A (en) | Terminal to terminal encryption method of cell phone voice and data | |
CN108123951B (en) | Cluster communication off-line direct-communication voice group call transmission encryption method and device | |
RU2132597C1 (en) | Method for encryption and transmission of encrypted voice data in gsm-900 and dcs-1800 cellular mobile communication networks | |
CN1177431C (en) | Method and mobile device for end-to-end enciphere | |
CN107046464A (en) | Secrecy intercom system and method based on quantum cryptography | |
CA2371811A1 (en) | Method and apparatus for enhanced security in a broadband telephony network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |