WO2012019443A1 - 一种移动终端间明话和密话通信切换的方法及系统 - Google Patents
一种移动终端间明话和密话通信切换的方法及系统 Download PDFInfo
- Publication number
- WO2012019443A1 WO2012019443A1 PCT/CN2011/070330 CN2011070330W WO2012019443A1 WO 2012019443 A1 WO2012019443 A1 WO 2012019443A1 CN 2011070330 W CN2011070330 W CN 2011070330W WO 2012019443 A1 WO2012019443 A1 WO 2012019443A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- secret
- terminal
- communication
- message
- request
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
Definitions
- the present invention relates to the field of mobile communication technologies, and in particular, to a method and system for switching between clear and secret communication between mobile terminals.
- End-to-end communication encryption is a technology for encrypting and decrypting voice/data, etc. It can realize the encrypted transmission of voice/data signals in the air interface and the core network, further enhancing the security of communication.
- End-to-end encrypted communication often referred to as secret messaging, is not called encrypted communication.
- secret messaging is not called encrypted communication.
- the switching technologies of clear words and secret words are mostly required to cooperate with the network equipment or to control the switching by means of end-to-end in-band signaling.
- CN200510007514 discloses a "method for realizing mutual switching between plain words and secret words in end-to-end voice communication", which is applicable to a switch, a key distribution center, a base station controller, a public switched telephone network, and the like.
- a softswitch system that encrypts the gateway.
- the method includes the following steps: After receiving the handover request, the switch determines the current call mode. If the current call mode is a clear call, the switch that initiates the handover request is located at the switch to the key.
- the current call is switched to the secret message; if the current call mode is a secret message, the switch that the party that initiated the handover request sends a close message to the switch of the other party, and the current call is switched to the clear message and closed. Prompt tone.
- the Chinese patent CN200410080036 discloses "a method for realizing a clear message to a secret message", the method comprising: the first terminal transmitting a request for transferring a secret message to the second terminal, informing the second terminal to initiate a secret message with the network side After the service is negotiated, the first terminal initiates a private message negotiation with the network side, and after the secret transmission channel is established, the first terminal and the second terminal perform a secret call process. Root According to the method, the secret telephone service negotiation is first performed between the terminals, and then the secret voice transmission channel is established to ensure that the implementation process of the clear voice transmission can be smoothly performed.
- the patent also proposes a process control that can realize the transfer of clear words into the secret message through in-band signaling, so that it does not have any influence on the existing network, and does not need the cooperation of the existing network;
- each private network can define its own signaling structure and can arbitrarily extend the signaling content, which provides great convenience for the private network and the general network.
- the above patents have some shortcomings: 1) The handover process still requires network coordination, requiring the terminals of the communication terminals to complete the secret communication with the network side, and cannot truly achieve end-to-end control; 2) the in-band signaling is used in the handover control process.
- these voice in-band signaling can carry limited information (such as only one bit of data can be transmitted at a time), and the transmission efficiency is low, resulting in a time-consuming handover process. long.
- DTMF Dual Tone Multi Frequency
- the technical problem to be solved by the present invention is to provide a method and system for switching between clear and secret communication between mobile terminals, implementing end-to-end handover control, ensuring that the handover process between the authentication and the secret is fast and smoothly, and does not Impact on existing networks.
- the present invention provides a method for switching between a clear call and a secret call communication between mobile terminals, the method comprising: the first terminal initiating a secret call control request to the second terminal, the second terminal receiving the After the secret call control request is received, the gateway switch control response is returned; and after receiving the secret switch control response returned by the second terminal, the first terminal initiates a key negotiation process with the second terminal, and then transfers to the secret call communication; Or suspending the secret communication with the second terminal; wherein the secret call handover control request includes a secret call request or a clear call request.
- the first terminal After the first terminal and the second terminal have established the clear communication, when the first terminal requests to switch the current clear communication to the secret message, the first terminal receives the response of the secret call control returned by the second terminal, and then initiates The key negotiation process of the second terminal, and then the step of transferring to the secret communication includes: after the first terminal initiates the secret call request to the second terminal, if the second terminal receives the second terminal within the specified time After the secret message requests the response, the first terminal initiates a key negotiation process with the second terminal; after the key negotiation process is completed, the first terminal initiates the transfer of the secret call request, and the second terminal receives the transferred secret call request.
- the secret message is started; the first terminal receives the secret call response and then starts the secret message, and the first terminal and the second terminal enter the secret communication.
- the step of the first terminal suspending the secret communication with the second terminal includes: After the second terminal has established the secret communication, the first terminal initiates the transfer of the clear request to the second terminal;
- the second terminal After receiving the incoming call request, the second terminal replies to the clear message response, and simultaneously cancels the secret message and starts the clear message; the first terminal stops the secret message and starts the clear message after receiving the incoming message response, first The terminal and the second terminal enter the clear communication.
- the secret message request, the secret message request response, the transfer to the secret call request, the transfer to the secret call response, the transfer to the clear call request, and the transfer of the clear call response end-to-end signaling message.
- the key negotiation process between the first terminal and the second terminal is an end-to-end key negotiation process; the first terminal and the second terminal The terminal's key negotiation uses end-to-end signaling messages.
- the end-to-end signaling message includes a user information (User Information) message, and the user-user (user-user) field carries the command type and
- the present invention further provides a system for switching between clear and secret communication between mobile terminals, the system comprising a secret exchange control module and an encryption module disposed on the mobile terminal, wherein: the secret message
- the handover control module is configured to: initiate a secret call handover control request to the communication peer end, where the secret call handover control request includes a secret call request or a clear call request, and switch the control response according to the received secret call, and initiate a secret with the communication peer end.
- the encryption module is configured to: after transferring to the secret communication, start the secret message, perform encryption operation on the transmitted voice/data according to the negotiated key and the encryption algorithm, and perform decryption operation on the received voice or data; After that, start the clear words and cancel the encryption and decryption operations on the voice or data.
- the secret call handover control module is configured to initiate a secret call handover control request to the communication peer end according to the following manner, and switch the control response according to the received secret call, initiate a key negotiation process with the communication peer end, and further transfer The secret communication with the communication peer: When it is decided to switch the current clear communication to the secret message, a secret message request is initiated to the communication peer. If the secret message request response is received within the specified time, the key negotiation with the communication peer is initiated.
- the secret call control module is configured to suspend the secret communication with the communication peer as follows: When it is decided to switch the current secret communication to the clear voice, the remote communication request is initiated to the communication peer, and is received.
- the secret call switching control module is configured to: use the end-to-end signaling message to perform the following signaling interaction with the communication peer: a secret message request, a secret message request response, a transfer to a secret message request, and a transfer to a secret message Response, transfer to the clear request and transfer to the clear response; and use the end-to-end signaling message to negotiate with the communication peer.
- the invention realizes fast switching between clear and secret words between mobile terminals, and effectively protects end-to-end security in the communication process of the mobile terminal; further, the present invention also proposes through user information (User information) A method for transmitting a handover control command, which ensures that the control signaling of the handover between the two parties can be quickly and effectively transmitted, does not affect the communication process of the user, and ensures the smooth handover of the authentication/secret call.
- user information User information
- the User information is an end-to-end direct transmission message
- the secret/smart handover initiator indicates the type and parameter of the request command in the user-user field of the message ( As dense Key)
- the switch receiver carries the type and parameters of the response command (such as the failure cause value) in this field.
- FIG. 1 is a schematic flow chart of a clear voice transfer between mobile terminals according to an embodiment of the present invention
- FIG. 2 is a schematic flow chart of a secret call between mobile terminals according to an embodiment of the present invention.
- the object of the present invention is to provide a method for switching between clear and secret communication between mobile terminals, which can implement end-to-end handover control without intervention or coordination on the network side, and effectively protect End-to-end security during mobile terminal communication.
- the present invention provides a method for switching between clear and secret communication between mobile terminals, and specifically adopts the following technical solution:
- the first terminal initiates a secret call control request to the second terminal, and the second terminal receives the After the secret call handover control request, returning a secret call control response to the first terminal; and after receiving the secret call control response returned by the second terminal, the first terminal initiates a key negotiation process with the second terminal, and further transfers
- the secret communication is interrupted; or the secret call control request includes a secret call request or a clear call request.
- the first terminal is an initiator of a secret handover control request, which may be a calling terminal or a called terminal; and the second terminal is a recipient of a secret handover control request.
- the method specifically includes: the first terminal initiates a secret call request to the second terminal, If the secret request response of the second terminal is received within the specified time, the first terminal initiates a key negotiation process with the second terminal; and after the key negotiation process is completed, the first terminal initiates the transfer of the secret call request.
- Second terminal receiving After the transfer to the secret call request, the reply is sent to the secret call response, and the secret call is started; the first terminal receives the secret call response and then starts the secret call, and the first terminal and the second terminal enter the secret call process.
- the method specifically includes: the first terminal and the second terminal have established the secret communication Afterwards, the first terminal initiates a transfer request to the second terminal;
- the second terminal After receiving the incoming call request, the second terminal replies to the clear message response, and simultaneously cancels the secret message and starts the clear message; the first terminal stops the secret message and starts the clear message after receiving the incoming message response, first The terminal and the second terminal enter the clear process.
- the secret message request, the secret message request response, the transfer to the secret message request, the transfer to the secret call response, the transfer of the clear call request and the transfer of the clear call response, and the key agreement use end-to-end signaling Message.
- the key negotiation process of the first terminal and the second terminal is an end-to-end key negotiation process; the first terminal and the second terminal negotiate an end-to-end signaling message.
- the end-to-end signaling message includes a User Information message, and the command type and/or parameter is carried by a user-user field of the User Information message.
- FIG. 1 is a flow chart of a clear message transfer between a mobile terminal (Mobile Station, MS) according to an embodiment of the present invention, wherein an information transmission channel between the MSI and the MS2 is built by a Mobile Switching Center (MSC).
- MS Mobile Station
- MSC Mobile Switching Center
- the control signaling interaction between all MS1 and MS2 is transparent to the MSC, that is, the end-to-end, the MSC does not interfere.
- Step 101 Perform clear communication between the mobile terminal MS1 and the MS2;
- Step 102 The MS1 sends a secret call request to the MS2.
- the abnormal conditions include: MS2 does not support the secret call function, or cannot respond to the secret call request response.
- Step 104 MS1 and MS2 perform encryption key and algorithm negotiation.
- the key negotiation process of the prior art requires different participation of a third party (such as a switch and/or a key distribution center), and the secret of the present invention is different.
- the key negotiation process is an end-to-end key negotiation process.
- the negotiation process may include multiple interactions, depending on the key negotiation method between MS1 and MS2.
- the key negotiation method may be a private key plus a public key, or a shared key. According to different encryption methods, MS1 and The negotiation interaction and the number of times between MS2s may be different.
- the entire negotiation process is completed through the User information message, which is an end-to-end interaction.
- the negotiation process may be: MS1 sends a negotiation request to the MS2, and indicates a key and an encryption algorithm in the request message; after receiving the request, the MS2 processes and returns a response to the MSI according to its own capability, and the MS1 receives the completed key negotiation. process.
- Step 105 After the MS1 and the MS2 complete the key negotiation, the MS1 sends a secret message request to the MS2.
- Step 106 the MS2 receives the incoming secret request of the MS1, starts the encryption operation of the MS2 according to the key and algorithm negotiated in step 104 (encryption of voice/data), and simultaneously sends a secret message response to the MS1; if the MS1 receives The incoming secret message response is a secret message confirmation instruction, and the encryption operation of the MS1 is initiated according to the key and algorithm negotiated in step 104, thereby starting the secret message; in step 107, the MS1 and the MS2 respectively encrypt the data sent by the local end, The received data is decrypted and the two parties enter the secret communication process.
- All the interactive commands transmitted between MS1 and MS2 in the above steps are all through the User information message, which is an end-to-end signaling message, and the network is only transparent.
- the specific switch control command is included in the user-user field of the message, and the present invention gives basic command examples, such as: Command type + parameter 1 + parameter 2, where the parameters carried are optional, but the specific command and parameter format are not limited to this.
- the command type included in the user-user field is in addition to the secret call request, the secret call request acknowledgement, the secret call request rejection, the transfer to the secret call request, or the transfer to the clear call request, and the transfer to the secret call confirmation mentioned in the above process.
- transfer to the clear message confirmation, and transfer to the secret call request rejection or transfer to the clear request rejection may also include a key agreement command in the key agreement signaling, and pass through the user-user field of the User information message Key parameters, such as encryption algorithms and key information.
- the flow of the secret call between the mobile terminals implemented by the present invention includes the following steps: In the following steps, all the interactive commands transmitted between the mobile terminals MS1 and MS2 are passed.
- Step 201 The mobile terminal MS1 and the MS2 perform a secret communication; in step 202, the MS1 sends a clear-message request command to the MS2; Step 203: The MS2 receives the incoming and outgoing request sent by the MS1, and stops the local encryption and decryption operation. And simultaneously send a clear message response command to the MS1; the MS1 receives the clear message confirmation instruction, and stops the local end encryption and decryption operation. Step 204, MS1 and MS2 return to the clear communication process.
- the embodiment of the present invention further provides a system (not shown) for switching between clear and secret communication between mobile terminals, the system comprising a secret switch control module and an encryption module disposed in the mobile terminal, wherein
- the secret call handover control module is configured to: initiate a secret call handover control request to the communication peer end, where the secret call handover control request includes a secret call request or a clear call request, and initiates a control response according to the received secret call, and initiates The key negotiation process with the communication peer, and then the secret communication with the communication peer; or the suspension of the secret communication with the communication peer; and receiving the secret call control initiated by the communication peer After the request, returning the secret call control response;
- the encryption module is set to: after transferring to the secret communication, starting the secret message, encrypting the transmitted voice/data according to the negotiated key and the encryption algorithm, and receiving the voice /Data to decrypt the operation; After the secret communication is aborted, the clear message is activated, and the encryption and decryption operations of the voice/data
- the secret call switching control module is further configured to: when determining to switch the current clear communication to a secret message, initiate a secret message request to the communication peer end, and if the secret message request response is received within a predetermined time, start and communicate The key negotiation process of the peer end; after the key negotiation process is completed, initiates a transfer of the secret call request to the communication peer end, and notifies the encryption module to transfer to the secret communication after receiving the transfer of the secret message response; After receiving the incoming secret request initiated by the communication peer, the reply is transferred to the secret message response, and the encryption module is notified to transfer to the secret communication.
- the secret call control module is further configured to: when determining to switch the current secret communication to the plain voice, initiate a transfer request to the communication peer, and notify the The encryption module suspends the secret communication; or, after receiving the incoming and outgoing request initiated by the communication peer, the response is forwarded to the clear message response, and the encryption module is notified to stop the secret communication.
- the secret call control module is further configured to: use the end-to-end signaling message to perform the following signaling interaction with the communication peer: a secret message request, a secret message request response, a transfer to a secret message request, and a transfer to a secret message Response, transfer to the clear request and transfer to the clear response; and use the end-to-end signaling message to negotiate with the communication peer.
- the present invention realizes fast switching between clear and secret words between mobile terminals, and effectively protects the end-to-end security of the mobile terminal during communication; further, the present invention also proposes to transmit a handover control command through a User information message.
- the method can ensure that the control signaling of the handover between the two parties is quickly and effectively transmitted, does not affect the communication process of the user, and ensures the smooth handover of the certificate/secret call.
- end-to-end switching control is truly implemented, without the involvement of network devices, and it does not have any impact on existing network devices.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
本发明公开了一种移动终端间明话和密话通信切换的方法,所述方法包括:第一终端向第二终端发起密话切换控制请求,第二终端接收到该密话切换控制请求后,返回密话切换控制响应;以及第一终端接收到第二终端返回的密话切换控制响应后,发起与第二终端的密钥协商过程,进而转入密话通信;或者中止与第二终端的密话通信;其中,所述密话切换控制请求包括密话请求或明话请求。本发明还公开了一种移动终端间明话和密话通信切换的系统,所述系统包括设置于移动终端的密话切换控制模块和加密模块。本发明有效地保护了移动终端通信过程中端到端的安全性。
Description
一种移动终端间明话和密话通信切换的方法及系统
技术领域 本发明涉及移动通信技术领域, 更具体地, 涉及一种移动终端间明话和 密话通信切换的方法及系统。
背景技术
端到端通信加密是一种对语音 /数据等进行加密和解密的技术,可以实现 语音 /数据信号在空中接口和核心网网络中的加密传输,进一步增强通信的安 全性。 端到端的加密通信, 通常称之为密话, 而非加密通信称之为明话。 随 着安全通信技术的发展, 在明话和密话间能自由切换, 已成为通信双方用户 的需要。 目前已知的明话和密话的切换技术, 大多需要终端与网络设备的配 合, 或者通过端到端带内信令的方式控制切换。 如中国专利 CN200510007514公开了一种 "在端到端语音通信中实现明 话 /密话间相互切换的方法" , 该方法适用于包括交换机、 密钥分发中心、 基 站控制器、 公共电话交换网和加密网关的软交换系统。 在主被叫双方建立呼 叫并进行正常通话时, 该方法包括以下步骤: 交换机收到切换请求后, 确定 当前通话方式, 若当前通话方式为明话, 则发起切换请求的一方所在交换机 向密钥分发中心申请密钥后将当前通话切换至密话;若当前通话方式是密话, 则发起切换请求的一方所在交换机向另一方所在交换机发送关闭密话消息, 将当前通话切换至明话并关闭提示音。 该专利存在的不足之处为: 其实施过程比较复杂, 明话和密话的切换需 要交换机、 密钥分发中心、 以及基站控制器等协同配合, 对网络设备的要求 高、 而且实现成本高, 而且无法实现真正的端到端控制。 又如中国专利 CN200410080036 公开了 "一种实现明话转密话的方法", 该方法包括: 第一终端向第二终端发送转入密话业务请求, 通知第二终端启 动与网络侧的密话业务协商, 同时第一终端启动自身与网络侧的密话业务协 商, 建立密话传输通道后, 第一终端与第二终端之间进行密话通话过程。 根
据该方法, 首先由终端之间进行转入密话业务协商, 然后再建立密话透传通 道, 以保证明话转密话的实现过程能够顺利进行。 另外, 该专利还提出可通 过带内信令实现明话转入密话的过程控制, 这样, 不会对现有网络产生任何 影响, 并且无需现有网络的配合; 如果有专用网络叠加于通用网络之上, 则 各专用网络可自行定义信令结构, 并可任意扩展信令内容, 为专用网络和通 用网络提供了极大便利。 但上述专利存在一些不足: 1 )切换过程仍需要网络配合,要求通信双方 终端分别完成与网络侧的密话协商, 无法真正实现端到端的控制; 2 )切换控 制过程釆用带内信令, 如双音多频(Dual Tone Multi Frequency, DTMF )等 信令, 这些语音带内信令可携带的信息有限(如每次只能发送一位数据) , 传输效率低, 从而导致切换过程费时较长。
发明内容 本发明解决的技术问题是提供一种移动终端间明话和密话通信切换的方 法及系统, 实现端到端的切换控制, 保证明话和密话间切换过程快速顺利进 行, 且不会对现有网络产生影响。 为解决上述技术问题, 本发明提供了一种移动终端间明话和密话通信切 换的方法, 所述方法包括: 第一终端向第二终端发起密话切换控制请求, 第二终端接收到该密话切 换控制请求后, 返回密话切换控制响应; 以及 第一终端接收到第二终端返回的密话切换控制响应后, 发起与第二终端 的密钥协商过程, 进而转入密话通信; 或者中止与第二终端的密话通信; 其中, 所述密话切换控制请求包括密话请求或明话请求。 其中, 第一终端和第二终端已建立明话通信后, 第一终端请求将当前明 话通信切换为密话时,第一终端接收到第二终端返回的密话切换控制响应后, 发起与第二终端的密钥协商过程, 进而转入密话通信的步骤包括: 第一终端向第二终端发起密话请求后, 若在规定时间内收到第二终端的
密话请求响应, 则第一终端启动与第二终端的密钥协商过程; 所述密钥协商过程完成后, 第一终端发起转入密话请求, 第二终端接收 到该转入密话请求后回复转入密话响应, 同时启动密话; 第一终端接收到该 转入密话响应后启动密话, 第一终端和第二终端进入密话通信。 其中, 第一终端和第二终端已建立密话通信后, 第一终端请求将当前密 话通信切换为明话时, 第一终端中止与第二终端的密话通信的步骤包括: 第一终端和第二终端已建立密话通信后, 第一终端向第二终端发起转入 明话请求; 以及
第二终端接收到该转入明话请求后回复转入明话响应, 同时中止密话并 启动明话; 第一终端接收到该转入明话响应后中止密话并启动明话, 第一终 端和第二终端进入明话通信。 其中, 所述密话请求、 密话请求响应、 转入密话请求、 转入密话响应、 转入明话请求和转入明话响应釆用端到端的信令消息。 其中, 第一终端启动与第二终端的密钥协商过程的步骤中, 所述第一终端与第二终端的密钥协商过程为端到端的密钥协商过程; 所述第一终端与第二终端的密钥协商釆用端到端的信令消息。 其中, 所述端到端的信令消息包括用户信息 ( User Information ) 消息, 通过所述 User Information消息的用户 -用户( user-user )字段携带命令类型和
/或参数。 为解决上述技术问题, 本发明还提供了一种移动终端间明话和密话通信 切换的系统,所述系统包括设置于移动终端的密话切换控制模块和加密模块, 其中: 所述密话切换控制模块设置为: 向通信对端发起密话切换控制请求, 所 述密话切换控制请求包括密话请求或明话请求, 并根据收到的密话切换控制 响应, 发起与通信对端的密钥协商过程、 进而转入与通信对端的密话通信; 或者中止与通信对端的密话通信; 以及, 收到通信对端发起的密话切换控制 请求后, 返回密话切换控制响应;
所述加密模块设置为: 转入密话通信后, 启动密话, 根据协商的密钥及 加密算法对发送的语音 /数据进行加密操作,对接收的语音或数据进行解密操 作; 中止密话通信后, 启动明话, 取消对语音或数据的加密和解密操作。 其中, 所述密话切换控制模块是设置为按如下方式向通信对端发起密话 切换控制请求, 并根据收到的密话切换控制响应, 发起与通信对端的密钥协 商过程、 进而转入与通信对端的密话通信: 决定将当前明话通信切换为密话 时, 向通信对端发起密话请求, 若在规定时间内收到密话请求响应, 则启动 与通信对端的密钥协商过程; 在所述密钥协商过程完成后, 向通信对端发起 转入密话请求, 并在收到转入密话响应后通知所述加密模块转入密话通信; 或者, 收到通信对端发起的转入密话请求后, 回复转入密话响应, 同时通知 所述加密模块转入密话通信。 其中, 所述密话切换控制模块是设置为按如下方式中止与通信对端的密 话通信: 决定将当前密话通信切换为明话时,向通信对端发起转入明话请求, 并在收到转入明话响应后, 通知所述加密模块中止密话通信; 或者, 收到通 信对端发起的转入明话请求后, 回复转入明话响应, 同时通知所述加密模块 中止密话通信。 其中, 所述密话切换控制模块是设置为: 釆用端到端的信令消息进行如 下与通信对端的信令交互: 密话请求、 密话请求响应、 转入密话请求、 转入 密话响应、 转入明话请求和转入明话响应; 并釆用端到端的信令消息进行与 通信对端的密钥协商。
通过上述技术方案, 本发明实现了移动终端间明话和密话的快速切换, 有效地保护了移动终端通信过程中端到端的安全性; 此外, 本发明还提出了通过用户信息 ( User information ) 消息来传递切 换控制命令的方法,该方法可以保证双方切换相关的控制信令快速有效传递, 不影响用户的通信过程, 保证明话 /密话切换的顺利进行。 在通信双方已建立 通信的情况下, User information属端到端的直传消息, 密话 /明话切换发起方 在该消息的用户 -用户 ( user-user )字段中指示请求命令的类型和参数 (如密
钥), 切换接收方在该字段中携带响应命令的类型和参数(如失败原因值)。 通过 User information消息的使用, 真正实现了端到端的切换控制, 不需要网 络设备的参与, 不会对现有网络设备产生任何影响。
附图概述 图 1是本发明实施例的移动终端间明话转密话的流程示意图; 图 2是本发明实施例的移动终端间密话转明话的流程示意图。
本发明的较佳实施方式 本发明的目的在于, 提供一种在移动终端间进行明话和密话通信切换方 法, 能够实现端到端的切换控制, 而不需要网络侧的干预或配合, 有效保护 移动终端通信过程中端到端的安全性。 为实现上述目的, 本发明提供一种移动终端间明话和密话通信切换的方 法, 具体釆用如下技术方案: 第一终端向第二终端发起密话切换控制请求, 第二终端接收到该密话切 换控制请求后, 向第一终端返回密话切换控制响应; 以及 第一终端接收到第二终端返回的密话切换控制响应后, 发起与第二终端 的密钥协商过程、 进而转入密话通信; 或者中止与第二终端的密话通信; 其中, 所述密话切换控制请求包括密话请求或明话请求。 其中, 所述第一终端为密话切换控制请求的发起方, 其可以是主叫终端 或被叫终端; 第二终端为密话切换控制请求的接受方。 进一步地, 第一终端和第二终端已建立明话通信后, 第一终端请求将当 前明话通信切换为密话时, 所述方法具体包括: 第一终端向第二终端发起密话请求, 若在规定时间内收到第二终端的密 话请求响应, 则第一终端启动与第二终端的密钥协商过程; 以及 所述密钥协商过程完成后, 第一终端发起转入密话请求, 第二终端接收
到该转入密话请求后回复转入密话响应, 同时启动密话; 第一终端接收到该 转入密话响应后启动密话, 第一终端和第二终端进入密话过程。 进一步地, 第一终端和第二终端已建立密话通信后, 第一终端请求将当 前密话通信切换为明话时, 所述方法具体包括: 第一终端和第二终端已建立密话通信后, 第一终端向第二终端发起转入 明话请求; 以及
第二终端接收到该转入明话请求后回复转入明话响应, 同时中止密话并 启动明话; 第一终端接收到该转入明话响应后中止密话并启动明话, 第一终 端和第二终端进入明话过程。 进一步地, 所述密话请求、 密话请求响应、 转入密话请求、 转入密话响 应、转入明话请求和转入明话响应, 以及密钥协商均釆用端到端的信令消息。 进一步地, 所述第一终端与第二终端的密钥协商过程为端到端的密钥协 商过程; 所述第一终端与第二终端的密钥协商釆用端到端的信令消息。 进一步地, 所述端到端的信令消息包括用户信息 ( User Information ) 消 息, 通过所述 User Information消息的用户 -用户 ( user-user )字段携带命令类 型和 /或参数。
以下将结合附图及具体实施例对本发明技术方案的实施作进一步详细说 明。 需要说明的是, 在不冲突的情况下, 本申请中的实施例及实施例中的特 征可以相互任意组合。 图 1所示为本发明实施例的移动终端(Mobile Station, MS )间明话转密 话流程,其中, MSI与 MS2之间的信息传送通道是通过移动交换中心(Mobile Switching Center, MSC )搭建的, 此明话转密话切换过程中, 所有 MS1与 MS2间控制信令交互对 MSC而言是透明的, 即端到端的, MSC不干预。 参 见图 1 , 本实施例流程具体包括以下步骤: 步骤 101 , 移动终端 MS1和 MS2之间进行明话通信; 步骤 102, MS1向 MS2发送密话请求;
步骤 103 , MS2接收到 MSI发送的密话请求后, 可以根据情况选择是否 接受邀请,如接受则向 MS1发送密话请求响应命令,且在原因值中指明密话 请求确认, 进入步骤 104; 如不接受, MS2在密话请求响应命令的原因值中 指明密话请求拒绝, 此时流程结束, 返回 101明话通信状态。 其中,异常情况包括: MS2不支持密话功能,或无法响应密话请求响应,
MS1在一定时间内无法得到 MS2的响应消息时, 该流程结束,返回步骤 101 明话通信状态。 步骤 104, MS1与 MS2进行加密密钥及算法协商; 需要说明的是, 与现有技术的密钥协商过程需要第三方 (如交换机和 / 或密钥分发中心) 的参与不同, 本发明的密钥协商过程为端到端的密钥协商 过程。 此协商过程可能包括多次交互, 具体依赖于 MS1与 MS2间的密钥协 商方法, 密钥协商方法可以为私钥加公钥、 或共享密钥等方法, 根据具体加 密方法的不同, MS1与 MS2间的协商交互和次数可能会有差异, 但整个协 商过程都是通过 User information消息完成的, 是端到端的交互。 例如, 该协 商过程可以是: MS1发送协商请求给 MS2, 并在请求消息中指示密钥及加密 算法; MS2接收请求后, 依据自身能力处理并回送响应给 MSI , MS1接收 到后完成密钥协商过程。 步骤 105, MS1与 MS2完成密钥协商后, MS1向 MS2发送转入密话请 求。
步骤 106, MS2接收到 MS1的转入密话请求,根据步骤 104协商的密钥 及算法启动 MS2的加密操作 (对语音 /数据加密) , 并同时向 MS1发送转入 密话响应; 如果 MS1 接收到的转入密话响应为密话确认指示, 按步骤 104 协商的密钥及算法启动 MS1的加密操作, 从而启动密话; 步骤 107, MS1和 MS2分别对本端发送的数据进行加密操作,对接收的 数据进行解密操作, 双方进入密话通信过程。 其中, 上述步骤中 MS1和 MS2之间传递的所有交互命令都是通过 User information消息, 该消息为端到端的信令消息, 网络只是透传。 在该消息的 user-user字段中包含具体的切换控制命令,本发明给出基本的命令示例,如:
命令类型 +参数 1+参数 2, 其中携带的参数为可选项, 但具体命令及参数格 式可不限于此。 具体地, user-user字段中包含的命令类型除上述流程中提到 的密话请求、 密话请求确认、 密话请求拒绝、转入密话请求或转入明话请求、 转入密话确认或转入明话确认、 以及转入密话请求拒绝或转入明话请求拒绝 夕卜, 还可以包括密钥协商信令中的密钥协商命令, 并且通过 User information 消息的 user-user字段传递密钥参数, 如加密算法及密钥信息等。
如图 2 所示本发明实施的移动终端间密话转明话流程包括以下几个步 骤: 以下步骤中移动终端 MS1 和 MS2 之间传递的所有交互命令都是通过
User information消息, 该消息为端到端的信令消息, 网络只是透传。 在该消 息的 user-user字段中包含具体的切换控制命令,本发明给出基本的命令示例, 具体命令及参数格式可不限于此。 步骤 201 , 移动终端 MS1和 MS2之间进行密话通信; 步骤 202, MS1向 MS2发送转入明话请求命令; 步骤 203 , MS2接收到 MS1发送的转入明话请求,停止本端加解密操作, 并同时向 MS1发送转入明话响应命令; MS1接收到转入明话确认指示, 停 止本端加解密操作。 步骤 204, MS1和 MS2返回明话通信过程。
相应地, 本发明实施例中还提供了一种移动终端间明话和密话通信切换 的系统(未图示) , 该系统包括设置于移动终端中的密话切换控制模块和加 密模块, 其中: 所述密话切换控制模块设置为: 向通信对端发起密话切换控制请求, 所 述密话切换控制请求包括密话请求或明话请求, 并根据收到的密话切换控制 响应, 发起与通信对端的密钥协商过程、 进而转入与通信对端的密话通信; 或者中止与通信对端的密话通信; 以及, 收到通信对端发起的密话切换控制
请求后, 返回密话切换控制响应; 所述加密模块设置为: 转入密话通信后, 启动密话, 根据协商的密钥及 加密算法对发送的语音 /数据进行加密操作, 对接收的语音 /数据进行解密操 作; 中止密话通信后, 启动明话, 取消对语音 /数据的加密和解密操作。 其中, 所述密话切换控制模块还设置为: 决定将当前明话通信切换为密 话时, 向通信对端发起密话请求, 若在规定时间内收到密话请求响应, 则启 动与通信对端的密钥协商过程; 在所述密钥协商过程完成后, 向通信对端发 起转入密话请求,并在收到转入密话响应后通知所述加密模块转入密话通信; 或者, 收到通信对端发起的转入密话请求后, 回复转入密话响应, 同时通知 所述加密模块转入密话通信。 其中, 所述密话切换控制模块还设置为: 决定将当前密话通信切换为明 话时, 向通信对端发起转入明话请求, 并在收到转入明话响应后, 通知所述 加密模块中止密话通信; 或者, 收到通信对端发起的转入明话请求后, 回复 转入明话响应, 同时通知所述加密模块中止密话通信。 其中, 所述密话切换控制模块还设置为: 釆用端到端的信令消息进行如 下与通信对端的信令交互: 密话请求、 密话请求响应、 转入密话请求、 转入 密话响应、 转入明话请求和转入明话响应; 并釆用端到端的信令消息进行与 通信对端的密钥协商。
以上仅为本发明的优选实施案例而已, 并不用于限制本发明, 本发明还 可有其他多种实施例, 在不背离本发明精神及其实质的情况下, 熟悉本领域 的技术人员可根据本发明做出各种相应的改变和变形, 但这些相应的改变和 变形都应属于本发明所附的权利要求的保护范围。 本领域普通技术人员可以理解上述方法中的全部或部分步骤可通过程序 来指令相关硬件完成, 所述程序可以存储于计算机可读存储介质中, 如只读 存储器、 磁盘或光盘等。 可选地, 上述实施例的全部或部分步骤也可以使用 一个或多个集成电路来实现。 相应地, 上述实施例中的各模块 /单元可以釆用 硬件的形式实现, 也可以釆用软件功能模块的形式实现。 本发明不限制于任
何特定形式的硬件和软件的结合。
工业实用性 本发明实现了移动终端间明话和密话的快速切换, 有效地保护了移动终 端通信过程中端到端的安全性; 此外, 本发明还提出了通过 User information 消息来传递切换控制命令的方法, 从而可以保证双方切换相关的控制信令快 速有效传递, 不影响用户的通信过程, 保证明话 /密话切换的顺利进行。 通过 User information消息的使用, 真正实现了端到端的切换控制, 不需要网络设 备的参与, 不会对现有网络设备产生任何影响。
Claims
1、 一种移动终端间明话和密话通信切换的方法, 所述方法包括: 第一终端向第二终端发起密话切换控制请求, 第二终端接收到该密话切 换控制请求后, 返回密话切换控制响应; 以及 第一终端接收到第二终端返回的密话切换控制响应后, 发起与第二终端 的密钥协商过程, 进而转入密话通信; 或者中止与第二终端的密话通信; 其中, 所述密话切换控制请求包括密话请求或明话请求。
2、 如权利要求 1所述的方法, 其中, 第一终端和第二终端已建立明话通信后, 第一终端请求将当前明话通信 切换为密话时, 第一终端接收到第二终端返回的密话切换控制响应后, 发起 与第二终端的密钥协商过程, 进而转入密话通信的步骤包括: 第一终端向第二终端发起密话请求后, 若在规定时间内收到第二终端的 密话请求响应, 则第一终端启动与第二终端的密钥协商过程; 所述密钥协商过程完成后, 第一终端发起转入密话请求, 第二终端接收 到该转入密话请求后回复转入密话响应, 同时启动密话; 第一终端接收到该 转入密话响应后启动密话, 第一终端和第二终端进入密话通信。
3、 如权利要求 2所述的方法, 其中, 第一终端和第二终端已建立密话通信后, 第一终端请求将当前密话通信 切换为明话时, 第一终端中止与第二终端的密话通信的步骤包括: 第一终端和第二终端已建立密话通信后, 第一终端向第二终端发起转入 明话请求; 以及
第二终端接收到该转入明话请求后回复转入明话响应, 同时中止密话并 启动明话; 第一终端接收到该转入明话响应后中止密话并启动明话, 第一终 端和第二终端进入明话通信。
4、 如权利要求 3所述的方法, 其中, 所述密话请求、 密话请求响应、 转 入密话请求、 转入密话响应、 转入明话请求和转入明话响应釆用端到端的信 令消息。
5、如权利要求 2所述的方法, 其中, 第一终端启动与第二终端的密钥协 商过程的步骤中, 所述第一终端与第二终端的密钥协商过程为端到端的密钥协商过程; 所述第一终端与第二终端的密钥协商釆用端到端的信令消息。
6、 如权利要求 4或 5所述的方法, 其中, 所述端到端的信令消息包括用户信息 ( User Information ) 消息, 通过所 述 User Information消息的用户 -用户 ( user-user )字段携带命令类型和 /或参 数。
7、一种移动终端间明话和密话通信切换的系统,所述系统包括设置于移 动终端的密话切换控制模块和加密模块, 其中: 所述密话切换控制模块设置为: 向通信对端发起密话切换控制请求, 所 述密话切换控制请求包括密话请求或明话请求, 并根据收到的密话切换控制 响应, 发起与通信对端的密钥协商过程、 进而转入与通信对端的密话通信; 或者中止与通信对端的密话通信; 以及, 收到通信对端发起的密话切换控制 请求后, 返回密话切换控制响应; 所述加密模块设置为: 转入密话通信后, 启动密话, 根据协商的密钥及 加密算法对发送的语音 /数据进行加密操作,对接收的语音或数据进行解密操 作; 中止密话通信后, 启动明话, 取消对语音或数据的加密和解密操作。
8、 如权利要求 7所述的系统, 其中, 所述密话切换控制模块是设置为按如下方式向通信对端发起密话切换控 制请求,并根据收到的密话切换控制响应,发起与通信对端的密钥协商过程、 进而转入与通信对端的密话通信: 决定将当前明话通信切换为密话时, 向通 信对端发起密话请求, 若在规定时间内收到密话请求响应, 则启动与通信对 端的密钥协商过程; 在所述密钥协商过程完成后, 向通信对端发起转入密话 请求, 并在收到转入密话响应后通知所述加密模块转入密话通信; 或者, 收 到通信对端发起的转入密话请求后, 回复转入密话响应, 同时通知所述加密 模块转入密话通信。
9、 如权利要求 7所述的系统, 其中, 所述密话切换控制模块是设置为按如下方式中止与通信对端的密话通 信: 决定将当前密话通信切换为明话时, 向通信对端发起转入明话请求, 并 在收到转入明话响应后, 通知所述加密模块中止密话通信; 或者, 收到通信 对端发起的转入明话请求后, 回复转入明话响应, 同时通知所述加密模块中 止密话通信。
10、 如权利要求 7、 8或 9所述的系统, 其中, 所述密话切换控制模块是设置为: 釆用端到端的信令消息进行如下与通 信对端的信令交互: 密话请求、 密话请求响应、 转入密话请求、 转入密话响 应、 转入明话请求和转入明话响应; 并釆用端到端的信令消息进行与通信对 端的密钥协商。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/640,358 US8804961B2 (en) | 2010-08-11 | 2011-01-17 | Method and system for mobile terminals handing over between clear session and encrypted session communications |
EP11816002.7A EP2547132B1 (en) | 2010-08-11 | 2011-01-17 | Method and system for mobile terminals handing over between clear session and encrypted session communications |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010254330.5 | 2010-08-11 | ||
CN201010254330.5A CN101931949B (zh) | 2010-08-11 | 2010-08-11 | 一种移动终端间明话和密话通信切换的方法及系统 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2012019443A1 true WO2012019443A1 (zh) | 2012-02-16 |
Family
ID=43370804
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2011/070330 WO2012019443A1 (zh) | 2010-08-11 | 2011-01-17 | 一种移动终端间明话和密话通信切换的方法及系统 |
Country Status (5)
Country | Link |
---|---|
US (1) | US8804961B2 (zh) |
EP (1) | EP2547132B1 (zh) |
CN (1) | CN101931949B (zh) |
TR (1) | TR201908159T4 (zh) |
WO (1) | WO2012019443A1 (zh) |
Families Citing this family (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101931949B (zh) * | 2010-08-11 | 2014-11-05 | 中兴通讯股份有限公司 | 一种移动终端间明话和密话通信切换的方法及系统 |
CN103354639A (zh) * | 2013-08-05 | 2013-10-16 | 成都林海电子有限责任公司 | 一种基于安卓系统的手机加密系统 |
CN104753889A (zh) * | 2013-12-31 | 2015-07-01 | 北京大唐高鸿软件技术有限公司 | 利用sip协议实现加密切换的方法 |
CN105246070A (zh) * | 2014-06-17 | 2016-01-13 | 中兴通讯股份有限公司 | 通话的加密处理方法及装置 |
CN105554711A (zh) * | 2014-10-29 | 2016-05-04 | 宇龙计算机通信科技(深圳)有限公司 | 一种短信保护方法、装置及终端 |
CN104361287B (zh) * | 2014-11-12 | 2018-08-14 | 努比亚技术有限公司 | 终端工作状态切换处理方法及装置 |
CN104394266B (zh) * | 2014-11-12 | 2016-08-24 | 努比亚技术有限公司 | 终端工作状态切换方法和系统 |
CN105992199B (zh) * | 2015-01-29 | 2019-04-30 | 成都三零瑞通移动通信有限公司 | 一种语音通信明密识别方法及系统 |
CN105992203B (zh) * | 2015-01-29 | 2019-04-30 | 成都三零瑞通移动通信有限公司 | 一种语音通信加密密钥协商方法及基于该方法的系统 |
US20160277570A1 (en) * | 2015-03-17 | 2016-09-22 | Dots Communication, Inc. | Facilitating controlled electronic communication |
CN106304045A (zh) * | 2015-05-28 | 2017-01-04 | 宇龙计算机通信科技(深圳)有限公司 | 加密通话方法及系统 |
CN106326783A (zh) * | 2015-07-10 | 2017-01-11 | 阿里巴巴集团控股有限公司 | 信息输入方法和系统、用户设备和终端 |
CN105577634B (zh) * | 2015-07-31 | 2019-11-12 | 宇龙计算机通信科技(深圳)有限公司 | 一种密话通信建立失败的处理方法及用户终端 |
CN107454587A (zh) * | 2016-05-31 | 2017-12-08 | 宇龙计算机通信科技(深圳)有限公司 | 一种切换保密通话的方法及装置 |
CN106101081B (zh) * | 2016-05-31 | 2020-02-21 | 宇龙计算机通信科技(深圳)有限公司 | 语音加密方法、装置、终端、密钥管理平台和系统 |
CN106059755A (zh) * | 2016-06-28 | 2016-10-26 | 努比亚技术有限公司 | 加密通信方法和装置 |
CN106302402A (zh) * | 2016-07-29 | 2017-01-04 | 深圳市金立通信设备有限公司 | 一种通信方式切换方法及终端 |
CN106341225B (zh) * | 2016-09-19 | 2019-07-23 | 杭州字节信息技术有限公司 | 一种umts移动终端电路域语音加密通信技术实现方法 |
CN107920349A (zh) * | 2016-10-10 | 2018-04-17 | 中国移动通信有限公司研究院 | 一种应用于电路域的通话加密方法及装置 |
US10771453B2 (en) * | 2017-01-04 | 2020-09-08 | Cisco Technology, Inc. | User-to-user information (UUI) carrying security token in pre-call authentication |
CN108270917B (zh) * | 2017-12-01 | 2021-01-15 | 南京嘉谷初成通信科技有限公司 | 一种加密智能手机 |
WO2023113636A1 (en) * | 2021-12-14 | 2023-06-22 | Ringcentral, Inc., (A Delaware Corporation) | Enabling and disabling end-to-end encryption in multiparty conference |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1753348A (zh) * | 2004-09-22 | 2006-03-29 | 华为技术有限公司 | 一种实现明话转密话的方法 |
CN101056176A (zh) * | 2007-05-31 | 2007-10-17 | 北京网秦天下科技有限公司 | 对手机传送的消息进行端到端加密的方法和控制装置 |
CN101442742A (zh) * | 2008-12-12 | 2009-05-27 | 华为技术有限公司 | 一种实现移动集群组呼端到端加密的方法、系统及设备 |
CN101931949A (zh) * | 2010-08-11 | 2010-12-29 | 中兴通讯股份有限公司 | 一种移动终端间明话和密话通信切换的方法及系统 |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW242206B (zh) * | 1993-08-27 | 1995-03-01 | At & T Corp | |
FI115372B (fi) * | 1998-09-18 | 2005-04-15 | Nokia Corp | Menetelmä matkaviestimen tunnistamiseksi, viestintäjärjestelmä ja matkaviestin |
US6574213B1 (en) * | 1999-08-10 | 2003-06-03 | Texas Instruments Incorporated | Wireless base station systems for packet communications |
TW494691B (en) * | 2000-11-21 | 2002-07-11 | Koninkl Philips Electronics Nv | Mobile device, auxiliary rendering device and arrangement |
KR100417125B1 (ko) * | 2002-08-07 | 2004-02-05 | 주식회사 팬택앤큐리텔 | 무선통신 단말의 비화통신모드 자동 진입 방법 |
US7747017B2 (en) * | 2004-12-01 | 2010-06-29 | Motorola, Inc. | Method and apparatus for end-to-end clear transport protocol |
CN100556162C (zh) * | 2007-09-13 | 2009-10-28 | 中兴通讯股份有限公司 | 一种实现明密话切换后媒体流的无损传输方法及系统 |
JP2011155589A (ja) * | 2010-01-28 | 2011-08-11 | Hitachi Ltd | ハイブリッド通信端末およびプログラム |
-
2010
- 2010-08-11 CN CN201010254330.5A patent/CN101931949B/zh active Active
-
2011
- 2011-01-17 WO PCT/CN2011/070330 patent/WO2012019443A1/zh active Application Filing
- 2011-01-17 US US13/640,358 patent/US8804961B2/en active Active
- 2011-01-17 EP EP11816002.7A patent/EP2547132B1/en active Active
- 2011-01-17 TR TR2019/08159T patent/TR201908159T4/tr unknown
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1753348A (zh) * | 2004-09-22 | 2006-03-29 | 华为技术有限公司 | 一种实现明话转密话的方法 |
CN101056176A (zh) * | 2007-05-31 | 2007-10-17 | 北京网秦天下科技有限公司 | 对手机传送的消息进行端到端加密的方法和控制装置 |
CN101442742A (zh) * | 2008-12-12 | 2009-05-27 | 华为技术有限公司 | 一种实现移动集群组呼端到端加密的方法、系统及设备 |
CN101931949A (zh) * | 2010-08-11 | 2010-12-29 | 中兴通讯股份有限公司 | 一种移动终端间明话和密话通信切换的方法及系统 |
Non-Patent Citations (2)
Title |
---|
See also references of EP2547132A4 |
SHAO LIN ET AL.: "Identity-based end-to-end authentication and key agreement protocol in mobile communication", APPLICATION RESEARCH OF COMPUTERS, vol. 25, no. 8, August 2008 (2008-08-01), pages 2457 - 2459, XP008166908 * |
Also Published As
Publication number | Publication date |
---|---|
EP2547132B1 (en) | 2019-03-13 |
TR201908159T4 (tr) | 2019-06-21 |
EP2547132A4 (en) | 2013-12-18 |
CN101931949A (zh) | 2010-12-29 |
CN101931949B (zh) | 2014-11-05 |
US20130136261A1 (en) | 2013-05-30 |
US8804961B2 (en) | 2014-08-12 |
EP2547132A1 (en) | 2013-01-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2012019443A1 (zh) | 一种移动终端间明话和密话通信切换的方法及系统 | |
JP5597676B2 (ja) | 鍵マテリアルの交換 | |
CN101583083B (zh) | 一种实时数据业务的实现方法和实时数据业务系统 | |
JP2015525018A (ja) | コール確立時間を短縮させるシステムおよび方法 | |
WO2013185735A2 (zh) | 一种加密实现方法及系统 | |
CN106982419B (zh) | 一种宽带集群系统单呼端到端加密方法及系统 | |
WO2012083828A1 (zh) | 本地路由业务的实现方法、基站及系统 | |
US20110002272A1 (en) | Communication apparatus and communication method | |
WO2007048301A1 (fr) | Procede de cryptage pour service mgn | |
CN105848140B (zh) | 一种5g网络中能够实现通信监管的端到端安全建立方法 | |
US20150038184A1 (en) | Wireless communication method and apparatus | |
EP1422864B2 (en) | Method of activating/deactivating encryption of data/voice in a mobile communication system | |
WO2016107583A1 (zh) | 呼叫方法及系统、固定电话机 | |
WO2008074226A1 (fr) | Procédé pour négocier la clé secrète de session entre les points d'extrémité à travers des zones à multiples contrôleurs d'accès | |
WO2014153908A1 (zh) | 通信装置和无线通信方法 | |
CN100366105C (zh) | 一种加密通话业务的网络侧放音方法 | |
WO2017054525A1 (zh) | 一种通话加密方法及装置 | |
CN105763571A (zh) | 基于sip的非对称语音加密 | |
GB2476088A (en) | Wireless communication system | |
JP2008011176A (ja) | 無線通信方法および無線通信システム | |
WO2013091198A1 (zh) | 一种支持加密通信的方法和装置 | |
JP2009088959A (ja) | 傍受システム | |
CN108616494A (zh) | 基于多pdn连接的安全通话方法、装置及终端 | |
KR101811668B1 (ko) | 보안 칩 기반의 음성 암호화 구동시스템 및 이를 이용한 구동방법 | |
JP6554851B2 (ja) | Ip電話暗号化装置および暗号化方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11816002 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 13640358 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2011816002 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |