WO2012024904A1 - 一种会议电话预接入的方法、系统及网络侧设备 - Google Patents

一种会议电话预接入的方法、系统及网络侧设备 Download PDF

Info

Publication number
WO2012024904A1
WO2012024904A1 PCT/CN2011/070270 CN2011070270W WO2012024904A1 WO 2012024904 A1 WO2012024904 A1 WO 2012024904A1 CN 2011070270 W CN2011070270 W CN 2011070270W WO 2012024904 A1 WO2012024904 A1 WO 2012024904A1
Authority
WO
WIPO (PCT)
Prior art keywords
call
encrypted
voice data
network side
terminal
Prior art date
Application number
PCT/CN2011/070270
Other languages
English (en)
French (fr)
Inventor
张保华
邓方民
于松
薛涛
曹耀斌
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Priority to US13/640,357 priority Critical patent/US9106429B2/en
Priority to EP11819279.8A priority patent/EP2547037B1/en
Publication of WO2012024904A1 publication Critical patent/WO2012024904A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/1813Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
    • H04L12/1822Conducting the conference, e.g. admission, detection, selection or grouping of participants, correlating users to one or more conference sessions, prioritising transmission
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/1813Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
    • H04L12/1827Network arrangements for conference optimisation or adaptation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/56Arrangements for connecting several subscribers to a common circuit, i.e. affording conference facilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/50Aspects of automatic or semi-automatic exchanges related to audio conference
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/50Aspects of automatic or semi-automatic exchanges related to audio conference
    • H04M2203/5009Adding a party to an existing conference
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/50Aspects of automatic or semi-automatic exchanges related to audio conference
    • H04M2203/5027Dropping a party from a conference
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/50Aspects of automatic or semi-automatic exchanges related to audio conference
    • H04M2203/5054Meet-me conference, i.e. participants dial-in
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/60Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Definitions

  • the present invention relates to the field of mobile communications technologies, and in particular, to a method, system, and network side device for conference call pre-access.
  • Voice call is the most basic service of mobile communication network, and it is also the most important service. It is also the most concerned by users and operators. Its confidentiality and security are also one of the important contents of mobile network technology. At present, mobile phones with encrypted calling functions are receiving more and more attention, especially for sensitive organizations such as government agencies and intelligence agencies, and organizations and individuals who attach great importance to security and confidentiality.
  • the mobile conference call function has been widely used by people because of its simple assembly and good mobility.
  • the conference call is mainly used for three or more users to make a call at the same time. For the initiator, the service of the three-party call must be registered on the network side before it can be used.
  • the mobile phone with the encrypted call function is basically based on end-to-end voice encryption and decryption, does not require network participation, and therefore cannot utilize the security key encryption factor (Ki) in the network or Other keys generated by Ki, such as a cryptographic key (Cipher Key, abbreviated as CK), perform encryption and decryption operations.
  • Ki security key encryption factor
  • CK cryptographic key
  • the technical problem to be solved by the present invention is to provide a method, system, and network side device for pre-access of a conference call, which improves the security of the conference telephone service.
  • the present invention provides a method for pre-accessing a conference call, the method comprising: after the master controller initiates an encrypted conference call, the network side calls the received target as the master party The detection is performed, if the call is a non-encrypted call, the call is not accessed; if the call is an encrypted call, access to the call is allowed.
  • the step of the network side detecting the received call of the master party includes: if the call setup message of the call includes a call type, and the call type is encrypted, the network side determines that the call is Encrypt the call; otherwise, the call is determined to be an unencrypted call.
  • the call type is implemented by a User-User Information Element (UUIE) field in the call setup message, and when the content of the UUIE field is "Encrypted Voice (ENCRYPTION VOICE)", the call type is encrypted.
  • UUIE User-User Information Element
  • the method further includes: after the encrypted conference call enters a call state, the terminal and the network side of the encrypted conference call perform encryption and decryption processing on the voice data of the call according to the call type.
  • the step of encrypting and decrypting the voice data of the call includes: the calling terminal encrypts the uplink voice data by using the sender cipher key (CK) as an operation factor, and uploads the encrypted voice data to the network side; And after receiving the encrypted voice data, the network side decrypts the voice using the sender CK as an operation factor, and then uses the receiver CK as an operation factor to encrypt the voice data, and sends the encrypted voice data to the called terminal; The called terminal decrypts the received downlink voice data using the receiver CK as an operation factor.
  • the method further includes: after the network side allows access to the call, the master controller determines whether to answer and add the encrypted conference call.
  • the present invention further provides a system for pre-accessing a conference call, where the system includes a pre-access processing unit and a call type detecting unit on the network side, where
  • the call type detecting unit is configured to: after receiving the conference call initiated by the master, detecting the received call of the master, and transmitting the detection result to the pre-access processing unit;
  • the pre-access processing unit is configured to: according to the detection result transmitted by the call type detecting unit, if the call is a non-encrypted call, the call is not accessed; if the call is an encrypted call, the access is allowed call.
  • the call type detecting unit is configured to detect the call according to the following manner: if the call setup message of the call includes a call type, and the call type is encrypted, determining that the call is an encrypted call; And determining that the call is a non-encrypted call.
  • the system also includes a call type adding module in the terminal,
  • the call type adding module is configured to: when the call is initiated, add a call type through a User-User Information Element (UUIE) field in the call setup message, and when the content of the UUIE field is "Encrypted Voice (ENCRYPTION VOICE)" , indicates that the call type is encrypted.
  • UUIE User-User Information Element
  • the system further includes a network side hardware encryption module on the network side and a terminal hardware encryption module of the terminal, where:
  • the terminal hardware encryption module is configured to: when the terminal is a sender terminal, encrypt the uplink voice data by using a sender cipher key (CK) as an operation factor, and upload the encrypted voice data to the network side; And, when the terminal is a receiver terminal, after receiving the downlink voice data, decrypting the received downlink voice data by using the receiver CK as an operation factor; the network side hardware encryption module is configured to: receive the sender After the encrypted voice data is uploaded, the sender CK is used as an operation factor for decryption, and then the receiver CK is used as an operation factor to encrypt the voice data, and the encrypted voice data is transmitted to the receiver.
  • the present invention further provides a network side device, where the device includes a pre-access processing unit and a call type detecting unit, where
  • the call type detecting unit is configured to: after receiving the conference call initiated by the master, detecting the received call of the master, and transmitting the detection result to the pre-access processing unit;
  • the pre-access processing unit is configured to: according to the detection result transmitted by the call type detecting unit, if the call is a non-encrypted call, the call is not accessed; if the call is an encrypted call, Then the call is allowed to be accessed.
  • the call type detecting unit is configured to detect the call as follows:
  • the call type detecting unit detects the call by using a call type added by a User-User Information Element (UUIE) field in a call setup message, and when the content of the UUIE field is "Encrypted Voice (ENCRYPTION VOICE)" When the call type is encrypted.
  • UUIE User-User Information Element
  • the device further includes a network side hardware encryption module, where: the network side hardware encryption module is configured to:: the receiving terminal uses the sender cipher key (CK) as an operation factor to encrypt the uplink voice data, and After the encrypted voice data is uploaded to the encrypted voice data of the network side device, the sender CK is used as an operation factor for decryption, and then the receiver CK is used as an operation factor to encrypt the voice data, and the encrypted voice data is sent to the voice data. receiver.
  • CK sender cipher key
  • the invention provides a method, a system and a network side device for pre-access of a conference call, thereby realizing pre-access of the encrypted conference call, which not only improves the security of the encrypted call, but also avoids frequent users when performing encrypted conference call.
  • the technical solution of the invention has strong versatility and practicability, and the function is mainly implemented by the network side, and the terminal does not need to make more changes except to increase the type of encrypted call.
  • FIG. 1 is a flow chart of voice encryption and decryption in the present invention
  • FIG. 2 is a schematic flowchart of implementing pre-access of an encrypted conference call according to an embodiment of the present invention.
  • the basic idea of the present invention is to provide a pre-access scheme for encrypting multi-party calls.
  • the terminal and the core network simultaneously use CK to perform hardware encryption on the voice to implement pre-access of the encrypted conference call to ensure the security of the conference call.
  • the present invention provides a method for implementing pre-access of an encrypted conference call, and specifically adopts the following technical solution: After the main control party initiates an encrypted conference call, the network side receives the target as the master control party. The call is detected. If the call is a non-encrypted call, the call is not accessed; if the call is an encrypted call, the call is allowed to be accessed.
  • the master party may be the calling terminal or the called terminal.
  • the network side detects the call according to the following manner: if the call setup message of the call includes a call type (Call type), and the call type is encrypted, determining that the call is an encrypted call; And determining that the call is a non-encrypted call.
  • the call type is implemented by a UUIE field, and when the content of the UUIE field is "ENCRYPTION VOICE", it indicates that the call type is encrypted.
  • the method further includes: after the network side allows access to the call, the master controller determines whether to answer and join the encrypted conference call.
  • the calling terminal provides the call type according to the agreement (the calling party defines when the call is initiated), and the network judges the call type (Call type) and performs pre-access processing.
  • the encrypted call type can be represented by a User-User Information Element (UUIE) field, for example, "ENCRYPTION VOICE".
  • UUIE User-User Information Element
  • the terminal uses the UUIE field to indicate the encrypted call type, and can be transmitted as a bearer by setting (SETUP) signaling. Both the network and the called terminal can obtain the content of the field to query the call type.
  • the conference initiator first registers the service of the three-party call on the network side.
  • the network side When the conference call is initiated, all the callers of the call master are pre-processed by the network side. If it is determined that the call type of the incoming call is non-encrypted, the network does not access the call, prompting the user to be called. If the call type of the incoming call is encrypted, that is, the content of the UUIE field is "ENCRYPTION VOICE", then the incoming call is received and notified to the master, and then the master decides whether to answer the call. And join it to the conference call.
  • the terminal and the network side of the encrypted conference call need to encrypt and decrypt the uplink and downlink voice data of the voice call, specifically including: the calling terminal uses the sender CK as the The operation factor encrypts the uplink voice data, and uploads the encrypted voice data to the network side; and after receiving the encrypted voice data, the network side uses the sender CK as an operation factor to decrypt, and then uses the receiver.
  • the CK encrypts the voice data as an operation factor, and transmits the encrypted voice data to the called terminal; the called terminal uses the receiver CK as an operation factor to decrypt the received downlink voice data.
  • the voice call encryption and decryption process of the encrypted conference phone used in the embodiment of the present invention is as shown in FIG. 1 . Since Ki is the root key of the mobile communication network, it has a very high confidentiality and security. Therefore, in the embodiment of the present invention, the voice data is encrypted and decrypted by the operation factor CK. Referring to FIG. 1 . Since Ki is the root key of the mobile communication network, it has a very high confidentiality and security. Therefore, in the embodiment of the present invention, the voice data is encrypted and decrypted by the operation factor CK. Referring to FIG.
  • the calling terminal encrypts the original data of the set using the operation factor of the calling side, and encrypts the adaptive multi-rate (Adaptive Multi Rate). , AMR )
  • the voice data is uploaded to the network.
  • the network side decrypts the voice data using the same operation factor 0 ⁇ , and then encrypts the voice data using the operation factor CK 2 on the called side, and sends the data to the Called the terminal, the called end decrypts the received AMR voice data using the same operation factor CK 2 .
  • the CK 3 and CIQ in the figure are used for a reverse process with the function of CK ⁇ .
  • CK 2 has the same function.
  • Step 201 The master controller registers a three-party call service on the network side, and initiates a conference call; 202: The network side receives the incoming call, and the called user is the master of the conference call; Step 203: The network detects the call type of the current call, and in this embodiment, specifically detects whether the UUIE field is a customized encryption type.
  • Step 204 If the call type is normal call, the caller is prompted to be called, it is not convenient to answer, and then the call is terminated; 205: If the call type is an encrypted call, the incoming call is notified and the master of the conference call is notified; Step 206: The master decides whether to access the new call according to the actual situation, for example, discussing with other members of the conference call Accepted; Step 207: The master listens to the call and joins it to the conference call; Step 208: The host is inconvenient Listen to this call, reject the call directly. According to the above steps, the method and process of the present invention can be implemented.
  • the system for implementing pre-access of the encrypted conference call is that the hardware encryption module is configured on both the terminal and the core network switching unit to encrypt and decrypt the uplink and downlink voice data.
  • the sender terminal sends the AMR voice to the terminal hardware encryption module for X-encryption operation, and the encryption operation factor uses the sender CK to obtain the encrypted AMR voice frame, and uploads the encrypted AMR voice frame to the network side;
  • the frame and the sender CK are sent to the network side hardware encryption module, the network hardware encryption module uses the X algorithm, the sender CK is used as the operation factor to decrypt the voice data, and then the X algorithm is used, and the receiver CK is used as the operation factor to the voice data.
  • the network device sends the encrypted voice frame to the receiver terminal.
  • the receiver After receiving the downlink voice data, the receiver sends the encrypted voice data and the receiver CK to the terminal hardware encryption module for decryption, thereby obtaining normal voice.
  • Frame the next processing is the same as ordinary voice call processing, and the decrypted AMR voice data is sent to a DSP (Digital Signal Processor) to obtain PCM (Pulse Code Modulation) data.
  • the PCM data is sent to the vocoder to sound.
  • the call type detecting unit is configured to: after receiving the conference call initiated by the master, detecting the received call of the master, and transmitting the detection result to the pre-access processing unit;
  • the pre-access processing unit is configured to: according to the detection result transmitted by the call type detecting unit, if the call is a non-encrypted call, the call is not accessed; if the call is an encrypted call, the access is allowed call.
  • the call type detecting unit is configured to detect the call according to the following manner: if the call setup message of the call includes a call type, and the call type is encrypted, determining that the call is an encrypted call; And determining that the call is a non-encrypted call.
  • the system further includes a call type adding module in the terminal,
  • the call type adding module is set to: when the call is initiated, by the call setup message
  • the UUIE field adds the call type, and when the UUIE field content is "ENCRYPTION
  • the system further includes a network side hardware encryption module and a terminal hardware encryption module, wherein: the terminal hardware encryption module is set to: use the sender CK as an operation factor to uplink voice data. Encryption and upload the encrypted voice data to the network side; and, receive the downlink After the voice data is used, the received downlink CK is used as an operation factor to decrypt the received downlink voice data.
  • the network side hardware encryption module is configured to: after receiving the encrypted voice data uploaded by the sender, using the sender CK as an operation. After the factor is decrypted, the receiver CK is used as an operation factor to encrypt the voice data, and the encrypted voice data is transmitted to the receiver.
  • the embodiment further provides a network side device, where the device includes a pre-access processing unit and a call type detecting unit, where
  • the call type detecting unit is configured to: after receiving the conference call initiated by the master, detecting the received call of the master, and transmitting the detection result to the pre-access processing unit;
  • the pre-access processing unit is configured to: according to the detection result transmitted by the call type detecting unit, if the call is a non-encrypted call, the call is not accessed; if the call is an encrypted call, the access is allowed call.
  • the call type detecting unit is configured to detect the call according to the following manner: if the call setup message of the call includes a call type, and the call type is encrypted, determining that the call is an encrypted call; otherwise, determining The call is a non-encrypted call.
  • the call type detecting unit detects the call by a call type added by a User-User Information Element (UUIE) field in a call setup message, and when the content of the UUIE field is "Encrypted Voice (ENCRYPTION VOICE)", Indicates that the call type is encrypted.
  • UUIE User-User Information Element
  • the device further includes a network side hardware encryption module, where: the network side hardware encryption module is configured to:: the receiving terminal uses the sender cipher key (CK) as an operation factor to encrypt the uplink voice data, and After the encrypted voice data is uploaded to the encrypted voice data of the network side device, the sender CK is used as an operation factor for decryption, and then the receiver CK is used as an operation factor to encrypt the voice data, and the encrypted voice data is sent to the voice data. receiver.
  • CK sender cipher key
  • the present invention realizes pre-access of encrypted conference calls, which not only improves the security of encrypted calls, but also avoids the problem that users are frequently interfered when performing encrypted conference calls.
  • the technical solution of the present invention has strong versatility and practicability.
  • the function is mainly implemented by the network side, and the terminal does not need to make more changes except to increase the type of encrypted call.

Abstract

本发明公开了一种会议电话预接入的方法,所述方法包括:主控方发起加密会议电话后,网络侧对收到的目标为所述主控方的呼叫进行检测,如果该呼叫为非加密通话,则不予接入该呼叫;如果该呼叫为加密通话,则允许接入该呼叫。本发明还公开了一种会议电话预接入的系统,所述系统包括网络侧的预接入处理单元和呼叫类型检测单元。本发明还公开了一种网络侧设备。本发明实现了加密会议电话预接入,既提高了加密通话的安全性,同时也避免了用户在进行加密会议电话时频繁受到干扰的问题。

Description

一种会议电话预接入的方法、 系统及网络侧设备
技术领域 本发明涉及移动通信技术领域, 更具体地, 涉及一种会议电话预接入的 方法、 系统及网络侧设备。
背景技术
语音通话是移动通讯网的最基本的业务, 也是最重要的业务, 也最受用 户和运营商的关注, 其保密性和安全性也是移动网络技术的重要内容之一。 目前,具有加密通话功能的手机受到越来越多的关注,尤其是政府敏感部门, 以及情报机关等非常重视安全和保密的组织和个人。 手机会议电话功能, 以其组建简单且移动性好的优点, 越来越被人们广 泛使用。会议电话主要用于三个或更多用户同时进行通话。对于发起方来说, 必须首先在网络侧登记三方通话的业务才能使用。 本发明申请的发明人发现: 目前具有加密通话功能的手机基本上都是基 于端到端的语音加解密, 不需要网络参与, 因此, 也就无法利用网络中的安 全密钥加密因子 (Ki )或者其他由 Ki产生的密钥如密码密钥 (Cipher Key, 简称为 CK )等进行加解密运算。 综上所述, 现有手机会议电话业务的安全性不高, 有可能被其他未知的 非加密通话干 ·ί尤。
发明内容 本发明解决的技术问题是提供一种会议电话预接入的方法、 系统及网络 侧设备, 提高会议电话业务的安全性。 为解决上述技术问题, 本发明提供了一种会议电话预接入的方法, 所述 方法包括: 主控方发起加密会议电话后, 网络侧对收到的目标为所述主控方的呼叫 进行检测, 如果该呼叫为非加密通话, 则不予接入该呼叫; 如果该呼叫为加 密通话, 则允许接入该呼叫。
其中, 网络侧对收到的目标为所述主控方的呼叫进行检测的步骤包括: 若所述呼叫的呼叫建立消息中包含呼叫类型、 且呼叫类型为加密, 则网 络侧判定所述呼叫为加密通话; 否则, 判定所述呼叫为非加密通话。 其中, 所述呼叫类型通过所述呼叫建立消息中的用户-用户信息元素 ( UUIE )字段实现, 且当所述 UUIE字段内容为 "加密语音( ENCRYPTION VOICE ) " 时, 表示呼叫类型为加密。 所述方法还包括: 所述加密会议电话进入通话状态后, 所述加密会议电话的终端和网络侧 根据所述呼叫类型, 对通话的语音数据进行加密和解密处理。 其中, 对通话的语音数据的加密和解密处理的步骤包括: 主叫终端使用发送方密码密钥( CK )作为运算因子对上行语音数据进行 加密, 并将加密后的语音数据上传到网络侧; 以及 网络侧收到所述加密后的语音数据后, 使用发送方 CK作为运算因子进 行解密后, 再使用接收方 CK作为运算因子加密语音数据, 并将加密后的语 音数据发送给被叫终端; 被叫终端使用接收方 CK作为运算因子解密收到的 下行语音数据。 所述方法还包括: 所述网络侧允许接入所述呼叫后, 由所述主控方决定是否接听并将其加 入本次加密会议电话。 为解决上述技术问题, 本发明还提供了一种会议电话预接入的系统, 所 述系统包括网络侧的预接入处理单元和呼叫类型检测单元, 其中,
所述呼叫类型检测单元设置为: 接收到主控方发起的会议电话后, 对收 到的目标为所述主控方的呼叫进行检测, 并将检测结果传送给所述预接入处 理单元; 所述预接入处理单元设置为: 根据所述呼叫类型检测单元传送的检测结 果, 如果该呼叫为非加密通话, 则不予接入该呼叫; 如果该呼叫为加密通话, 则允许接入该呼叫。 其中, 所述呼叫类型检测单元是设置为按照如下方式对所述呼叫进行检 测: 若所述呼叫的呼叫建立消息中包含呼叫类型、 且呼叫类型为加密, 则判 定所述呼叫为加密通话; 否则, 判定所述呼叫为非加密通话。 所述系统还包括终端中的呼叫类型添加模块,
所述呼叫类型添加模块设置为: 在发起呼叫时, 通过呼叫建立消息中的 用户-用户信息元素 (UUIE )字段添加呼叫类型, 且当所述 UUIE字段内容 为 "加密语音( ENCRYPTION VOICE ) " 时, 表示呼叫类型为加密。 所述系统还包括网络侧的网络侧硬件加密模块和终端的终端硬件加密模 块, 其中:
所述终端硬件加密模块设置为: 当所述终端为发送方终端时, 使用发送 方密码密钥(CK )作为运算因子对上行语音数据进行加密, 并将加密后的语 音数据上传到网络侧; 以及, 当所述终端为接收方终端时, 接收到下行语音 数据后, 使用接收方 CK作为运算因子对收到的下行语音数据进行解密; 所述网络侧硬件加密模块设置为: 收到发送方上传的加密后的语音数据 后, 使用发送方 CK作为运算因子进行解密后, 再使用接收方 CK作为运算 因子加密语音数据, 并将加密后的语音数据发送给接收方。 为解决上述技术问题, 本发明还提供了一种网络侧设备, 所述设备包括 预接入处理单元和呼叫类型检测单元, 其中,
所述呼叫类型检测单元设置为: 接收到主控方发起的会议电话后, 对收 到的目标为所述主控方的呼叫进行检测, 并将检测结果传送给所述预接入处 理单元; 所述预接入处理单元设置为: 根据所述呼叫类型检测单元传送的检测结 果, 如果该呼叫为非加密通话, 则不予接入该呼叫; 如果该呼叫为加密通话, 则允许接入该呼叫。 其中, 所述呼叫类型检测单元是设置为按照如下方式对所述呼叫进行检 测:
若所述呼叫的呼叫建立消息中包含呼叫类型、 且呼叫类型为加密, 则判 定所述呼叫为加密通话; 否则, 判定所述呼叫为非加密通话。 其中,所述呼叫类型检测单元通过呼叫建立消息中的用户 -用户信息元素 ( UUIE )字段添加的呼叫类型对所述呼叫进行检测, 且当所述 UUIE字段内 容为 "加密语音( ENCRYPTION VOICE ) " 时, 表示呼叫类型为加密。 所述设备还包括网络侧硬件加密模块, 其中: 所述网络侧硬件加密模块设置为: 收到发送方的终端使用发送方密码密 钥(CK )作为运算因子对上行语音数据进行加密, 并将加密后的语音数据上 传到网络侧设备的加密后的语音数据后, 使用发送方 CK作为运算因子进行 解密后, 再使用接收方 CK作为运算因子加密语音数据, 并将加密后的语音 数据发送给接收方。
本发明提供了一种会议电话预接入的方法、 系统和网络侧设备, 从而实 现加密会议电话预接入, 既提高了加密通话的安全性, 同时也避免了用户在 进行加密会议电话时频繁受到干扰的问题。 本发明技术方案具有较强的通用 性和实用性, 另外该功能主要由网络侧实现, 终端除了增加加密通话类型之 夕卜, 几乎不需要做更多的改动。
附图概述 图 1为本发明中的语音加解密流程图; 图 2为本发明实施例的实现加密会议电话预接入的流程示意图。
本发明的较佳实施方式 本发明的基本思想在于, 提供一种加密多方通话的预接入方案, 基于终 端和核心网同时使用 CK对语音进行硬件加密,实现加密会议电话的预接入, 以保证会议电话的安全性。 基于上述思想, 本发明提供的一种实现加密会议电话预接入的方法, 具 体釆用如下技术方案: 主控方发起加密会议电话后, 网络侧对收到的目标为所述主控方的呼叫 进行检测, 如果该呼叫为非加密通话, 则不予接入该呼叫; 如果该呼叫为加 密通话, 则允许接入该呼叫。 其中, 主控方可以是主叫终端, 也可以是被叫终端。 进一步地, 所述网络侧按照如下方式对所述呼叫进行检测: 若所述呼叫的呼叫建立消息中包含呼叫类型 (Call type ) , 且呼叫类型 为加密, 则判定所述呼叫为加密通话; 否则, 判定所述呼叫为非加密通话。 进一步地, 所述呼叫类型通过 UUIE字段实现, 且当所述 UUIE字段内 容为 "ENCRYPTION VOICE" 时, 表示呼叫类型为加密。 进一步地, 所述方法还包括: 所述网络侧允许接入所述呼叫后, 由所述主控方决定是否接听并将其加 入本次加密会议电话。
根据以上描述的加密会议电话的预接入的方法, 主叫终端按照约定提供 呼叫类型 (主叫在发起呼叫时定义) , 网络对呼叫类型 (Call type )进行判 断并进行预接入处理。 其中, 加密通话类型可釆用用户-用户信息元素 ( User-User Information Element, UUIE )字段表示, 例如自定义为 "力口密语 音(ENCRYPTION VOICE ) " 。 终端使用 UUIE字段表示加密通话类型, 并可通过设置(SETUP )信令作为载体传输, 网络和被叫终端都可以获取该 字段的内容以便查询呼叫类型。 会议发起方首先在网络侧注册登记三方通话 的业务, 当会议电话发起后, 所有呼叫主控方的来电都由网络侧预处理。 如 果判断来电的呼叫类型是非加密的, 则网络不接入此次通话, 提示用户被叫 用户正在通话中, 不方便接听; 如果判断来电的呼叫类型是加密的, 即 UUIE 字段内容为 "ENCRYPTION VOICE" , 则接入此次来电并通知到主控方, 然后由主控方决定是否接听并将其加入会议电话。 此外, 本发明中, 在进入通话 (Conversion )状态之后, 加密会议电话 的终端和网络侧需要对语音通话的上下行语音数据进行加密、 和解密处理, 具体包括: 主叫终端使用发送方 CK作为运算因子对上行语音数据进行加密, 并将 加密后的语音数据上传到网络侧; 以及 网络侧收到所述加密后的语音数据后, 使用发送方 CK作为运算因子进 行解密后, 再使用接收方 CK作为运算因子加密语音数据, 并将加密后的语 音数据发送给被叫终端; 被叫终端使用接收方 CK作为运算因子解密收到的 下行语音数据。
为了使本发明的目的、 技术方案及优点更加清楚明白, 以下结合附图及 实施例, 对本发明进行进一步详细说明。 应当理解, 此处所描述的具体实施 例仅仅用以解释本发明, 并不用于限定本发明。 需要说明的是, 在不冲突的 情况下 , 本申请中的实施例及实施例中的特征可以相互任意组合。 本发明实施例所使用的加密会议电话的语音通话加解密流程如图 1 所 示。由于 Ki作为移动通讯网的根密钥,具有非常高的保密性和安全性,因此, 本发明实施例中釆用运算因子 CK对语音数据进行加密和解密处理。 参见图 1 , 本实施例的会议电话的加、 解密流程描述如下: 主叫终端使用主叫侧的运算因子〇 对釆集的原始数据进行加密, 并将 加密的自适应多速率( Adaptive Multi Rate , AMR )语音数据上传到网络, 网 络侧收到 AMR语音数据后, 使用相同的运算因子 0^解密语音数据, 然后 再使用被叫侧的运算因子 CK2加密语音数据, 并将数据发送到被叫终端, 被 叫端使用同样的运算因子 CK2解密收到的 AMR语音数据。图中的 CK3和 CIQ 则用于一个反向的过程, 其功能与 CK^。CK2功能相同。 其中 CK在每次通 话建立的过程中是可变的。 图 2为本发明实施例的实现加密会议电话的预接入流程示意图, 结合图 2, 该流程具体步骤描述如下: 步骤 201 : 主控方在网络侧登记三方通话业务, 并发起会议电话; 步骤 202: 网络侧收到来电, 被叫用户是本次会议电话的主控方; 步骤 203: 网络检测本次来电的通话类型, 本实施例中具体是检测 UUIE 字段是否为自定义的加密类型 "ENCRYPTION VOICE" , 如果是, 执行步 骤 205, 如果不是, 执行步骤 204; 步骤 204: 如果此次通话类型为普通呼叫, 则提示主叫用户被叫正在通 话中, 不方便接听, 然后结束来电; 步骤 205: 如果此次通话类型为加密呼叫, 则接入来电并通知会议电话 的主控方; 步骤 206: 主控方根据实际情况决策是否要接入新的来电, 比如和会议 电话的其他成员商量是否接受; 步骤 207: 主控方接听本次来电, 并将其加入会议电话; 步骤 208: 主控方不方便接听本次来电, 直接拒绝来电。 按照以上步骤, 可实现本发明所述方法及过程。
本发明实施例提供的实现加密会议电话预接入的系统是在终端和核心网 交换单元都配置硬件加密模块, 对上下行语音数据进行加解密。 发送方终端将 AMR语音送入终端硬件加密模块进行 X加密运算, 加密 运算因子釆用发送方 CK, 从而得到加密 AMR语音帧, 并将加密 AMR语音 帧上传到网络侧; 网络侧将此加密语音帧及发送方 CK送入网络侧硬件加密模块, 网络硬 件加密模块使用 X算法, 以发送方 CK为运算因子对语音数据进行解密, 然 后再使用 X算法, 以接收方 CK为运算因子对语音数据进行加密, 并返回给 网络设备运算结果, 然后网络设备将此加密语音帧发送给接收方终端; 接收方在得到下行语音数据后, 将此加密语音数据和接收方 CK送入终 端硬件加密模块进行解密, 从而得到普通语音帧, 接下来的处理则与普通语 音呼叫处理相同, 将解密后的 AMR 语音数据送入 DSP ( Digital Signal Processor, 数字信号处理器) 中得到 PCM ( Pulse Code Modulation, 脉冲编 码调制录音)数据, 将 PCM数据送入声码器发声即可。 釆用这种加密电话方式, 在网络侧无法监听, 而且在无线环境传输是也 是相当于双加密的, 更加保密和安全。 具体地, 本发明实施例的实现加密会议电话预接入的系统包括网络侧的 预接入处理单元和呼叫类型检测单元, 其中:
所述呼叫类型检测单元设置为: 收到主控方发起的会议电话后, 对收到 的目标为所述主控方的呼叫进行检测, 并将检测结果传送给所述预接入处理 单元;
所述预接入处理单元设置为: 根据所述呼叫类型检测单元传送的检测结 果, 如果该呼叫为非加密通话, 则不予接入该呼叫; 如果该呼叫为加密通话, 则允许接入该呼叫。 此外, 所述呼叫类型检测单元是设置为按照如下方式对所述呼叫进行检 测: 若所述呼叫的呼叫建立消息中包含呼叫类型、 且呼叫类型为加密, 则判 定所述呼叫为加密通话; 否则, 判定所述呼叫为非加密通话。 此外, 所述系统还包括终端中的呼叫类型添加模块,
所述呼叫类型添加模块设置为: 在发起呼叫时, 通过呼叫建立消息中的
UUIE 字段添加呼叫类型, 且当所述 UUIE 字段内容为 "ENCRYPTION
VOICE" 时, 表示呼叫类型为加密。 此外,所述系统还包括网络侧硬件加密模块和终端硬件加密模块,其中: 所述终端硬件加密模块设置为: 使用发送方 CK作为运算因子对上行语 音数据进行加密, 并将加密后的语音数据上传到网络侧; 以及, 接收到下行 语音数据后,使用接收方 CK作为运算因子对收到的下行语音数据进行解密; 所述网络侧硬件加密模块设置为: 收到发送方上传的加密后的语音数据 后, 使用发送方 CK作为运算因子进行解密后, 再使用接收方 CK作为运算 因子加密语音数据, 并将加密后的语音数据发送给接收方。
本实施例还提供了一种网络侧设备, 所述设备包括预接入处理单元和呼 叫类型检测单元, 其中,
所述呼叫类型检测单元设置为: 接收到主控方发起的会议电话后, 对收 到的目标为所述主控方的呼叫进行检测, 并将检测结果传送给所述预接入处 理单元; 所述预接入处理单元设置为: 根据所述呼叫类型检测单元传送的检测结 果, 如果该呼叫为非加密通话, 则不予接入该呼叫; 如果该呼叫为加密通话, 则允许接入该呼叫。
所述呼叫类型检测单元是设置为按照如下方式对所述呼叫进行检测: 若所述呼叫的呼叫建立消息中包含呼叫类型、 且呼叫类型为加密, 则判 定所述呼叫为加密通话; 否则, 判定所述呼叫为非加密通话。 所述呼叫类型检测单元通过呼叫建立消息中的用户-用户信息元素 ( UUIE )字段添加的呼叫类型对所述呼叫进行检测, 且当所述 UUIE字段内 容为 "加密语音( ENCRYPTION VOICE ) " 时, 表示呼叫类型为加密。 所述设备还包括网络侧硬件加密模块, 其中: 所述网络侧硬件加密模块设置为: 收到发送方的终端使用发送方密码密 钥(CK )作为运算因子对上行语音数据进行加密, 并将加密后的语音数据上 传到网络侧设备的加密后的语音数据后, 使用发送方 CK作为运算因子进行 解密后, 再使用接收方 CK作为运算因子加密语音数据, 并将加密后的语音 数据发送给接收方。 以上仅为本发明的优选实施案例而已, 并不用于限制本发明, 本发明还 可有其他多种实施例, 在不背离本发明精神及其实质的情况下, 熟悉本领域 的技术人员可根据本发明做出各种相应的改变和变形, 但这些相应的改变和 变形都应属于本发明所附的权利要求的保护范围。 本领域普通技术人员可以理解上述方法中的全部或部分步骤可通过程序 来指令相关硬件完成, 所述程序可以存储于计算机可读存储介质中, 如只读 存储器、 磁盘或光盘等。 可选地, 上述实施例的全部或部分步骤也可以使用 一个或多个集成电路来实现。 相应地, 上述实施例中的各模块 /单元可以釆用 硬件的形式实现, 也可以釆用软件功能模块的形式实现。 本发明不限制于任 何特定形式的硬件和软件的结合。
工业实用性 本发明实现加密会议电话预接入, 既提高了加密通话的安全性, 同时也 避免了用户在进行加密会议电话时频繁受到干扰的问题。 本发明技术方案具 有较强的通用性和实用性, 另外该功能主要由网络侧实现, 终端除了增加加 密通话类型之外, 几乎不需要做更多的改动。

Claims

权 利 要 求 书
1、 一种会议电话预接入的方法, 所述方法包括: 主控方发起加密会议电话后, 网络侧对收到的目标为所述主控方的呼叫 进行检测, 如果该呼叫为非加密通话, 则不予接入该呼叫; 如果该呼叫为加 密通话, 则允许接入该呼叫。
2、 如权利要求 1所述的方法, 其中, 网络侧对收到的目标为所述主控方的呼叫进行检测的步骤包括: 若所述呼叫的呼叫建立消息中包含呼叫类型、 且呼叫类型为加密, 则网 络侧判定所述呼叫为加密通话; 否则, 判定所述呼叫为非加密通话。
3、 如权利要求 2所述的方法, 其中, 所述呼叫类型通过所述呼叫建立消息中的用户 -用户信息元素 ( UUIE ) 字段实现,且当所述 UUIE字段内容为 "加密语音( ENCRYPTION VOICE ) " 时, 表示呼叫类型为加密。
4、 如权利要求 1、 2或 3所述的方法, 所述方法还包括: 所述加密会议电话进入通话状态后, 所述加密会议电话的终端和网络侧 根据所述呼叫类型, 对通话的语音数据进行加密和解密处理。
5、 如权利要求 4所述的方法, 其中, 对通话的语音数据的加密和解密处理的步骤包括: 主叫终端使用发送方密码密钥( CK )作为运算因子对上行语音数据进行 加密, 并将加密后的语音数据上传到网络侧; 以及 网络侧收到所述加密后的语音数据后, 使用发送方 CK作为运算因子进 行解密后, 再使用接收方 CK作为运算因子加密语音数据, 并将加密后的语 音数据发送给被叫终端; 被叫终端使用接收方 CK作为运算因子解密收到的 下行语音数据。
6、 如权利要求 1、 2或 3所述的方法, 所述方法还包括: 所述网络侧允许接入所述呼叫后, 由所述主控方决定是否接听并将其加 入本次加密会议电话。
7、 一种会议电话预接入的系统,所述系统包括网络侧的预接入处理单元 和呼叫类型检测单元, 其中,
所述呼叫类型检测单元设置为: 接收到主控方发起的会议电话后, 对收 到的目标为所述主控方的呼叫进行检测, 并将检测结果传送给所述预接入处 理单元; 所述预接入处理单元设置为: 根据所述呼叫类型检测单元传送的检测结 果, 如果该呼叫为非加密通话, 则不予接入该呼叫; 如果该呼叫为加密通话, 则允许接入该呼叫。
8、 如权利要求 7所述的系统, 其中, 所述呼叫类型检测单元是设置为按照如下方式对所述呼叫进行检测: 若所述呼叫的呼叫建立消息中包含呼叫类型、 且呼叫类型为加密, 则判 定所述呼叫为加密通话; 否则, 判定所述呼叫为非加密通话。
9、如权利要求 8所述的系统,所述系统还包括终端中的呼叫类型添加模 块,
所述呼叫类型添加模块设置为: 在发起呼叫时, 通过呼叫建立消息中的 用户-用户信息元素 (UUIE )字段添加呼叫类型, 且当所述 UUIE字段内容 为 "加密语音( ENCRYPTION VOICE ) " 时, 表示呼叫类型为加密。
10、如权利要求 7、 8或 9所述的系统, 所述系统还包括网络侧的网络侧 硬件加密模块和终端的终端硬件加密模块, 其中: 所述终端硬件加密模块设置为: 当所述终端为发送方终端时, 使用发送 方密码密钥(CK )作为运算因子对上行语音数据进行加密, 并将加密后的语 音数据上传到网络侧; 以及, 当所述终端为接收方终端时, 接收到下行语音 数据后, 使用接收方 CK作为运算因子对收到的下行语音数据进行解密; 所述网络侧硬件加密模块设置为: 收到发送方上传的加密后的语音数据 后, 使用发送方 CK作为运算因子进行解密后, 再使用接收方 CK作为运算 因子加密语音数据, 并将加密后的语音数据发送给接收方。
11、 一种网络侧设备, 所述设备包括预接入处理单元和呼叫类型检测单 元, 其中,
所述呼叫类型检测单元设置为: 接收到主控方发起的会议电话后, 对收 到的目标为所述主控方的呼叫进行检测, 并将检测结果传送给所述预接入处 理单元; 所述预接入处理单元设置为: 根据所述呼叫类型检测单元传送的检测结 果, 如果该呼叫为非加密通话, 则不予接入该呼叫; 如果该呼叫为加密通话, 则允许接入该呼叫。
12、 如权利要求 11所述的设备, 其中, 所述呼叫类型检测单元是设置为按照如下方式对所述呼叫进行检测: 若所述呼叫的呼叫建立消息中包含呼叫类型、 且呼叫类型为加密, 则判 定所述呼叫为加密通话; 否则, 判定所述呼叫为非加密通话。
13、 如权利要求 12所述的设备, 其中, 所述呼叫类型检测单元通过呼叫建立消息中的用户-用户信息元素
( UUIE )字段添加的呼叫类型对所述呼叫进行检测, 且当所述 UUIE字段内 容为 "加密语音( ENCRYPTION VOICE ) " 时, 表示呼叫类型为加密。
14、 如权利要求 11、 12或 13所述的设备, 所述设备还包括网络侧硬件 加密模块, 其中: 所述网络侧硬件加密模块设置为: 收到发送方的终端使用发送方密码密 钥(CK )作为运算因子对上行语音数据进行加密, 并将加密后的语音数据上 传到网络侧设备的加密后的语音数据后, 使用发送方 CK作为运算因子进行 解密后, 再使用接收方 CK作为运算因子加密语音数据, 并将加密后的语音 数据发送给接收方。
PCT/CN2011/070270 2010-08-25 2011-01-14 一种会议电话预接入的方法、系统及网络侧设备 WO2012024904A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US13/640,357 US9106429B2 (en) 2010-08-25 2011-01-14 Method and system for pre-accessing conference telephone and network side device
EP11819279.8A EP2547037B1 (en) 2010-08-25 2011-01-14 Method for pre-accessing conference telephone and network side device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2010102653343A CN101951554A (zh) 2010-08-25 2010-08-25 一种实现加密会议电话预接入的方法及系统
CN201010265334.3 2010-08-25

Publications (1)

Publication Number Publication Date
WO2012024904A1 true WO2012024904A1 (zh) 2012-03-01

Family

ID=43454887

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/070270 WO2012024904A1 (zh) 2010-08-25 2011-01-14 一种会议电话预接入的方法、系统及网络侧设备

Country Status (4)

Country Link
US (1) US9106429B2 (zh)
EP (1) EP2547037B1 (zh)
CN (1) CN101951554A (zh)
WO (1) WO2012024904A1 (zh)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108270904A (zh) * 2016-12-30 2018-07-10 展讯通信(上海)有限公司 多方通话中实现安全通话的方法、装置及多通终端
CN109429192B (zh) * 2017-08-29 2021-07-16 中国移动通信有限公司研究院 一种通话呼叫处理方法、收发设备及计算机可读存储介质
CN111416717B (zh) * 2019-01-07 2023-01-03 中安网脉(北京)技术股份有限公司 一种sm2算法并行多路硬件实现方法
CN110138807A (zh) * 2019-06-12 2019-08-16 北京塞宾科技有限公司 一种高安全性会议系统

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1889767A (zh) * 2005-06-30 2007-01-03 华为技术有限公司 实现媒体流安全的方法及通信系统
CN101370251A (zh) * 2007-08-17 2009-02-18 华为技术有限公司 私有业务接入点的接入控制方法及其网络设备和系统
CN101500229A (zh) * 2008-01-30 2009-08-05 华为技术有限公司 建立安全关联的方法和通信网络系统

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4958153A (en) * 1987-04-08 1990-09-18 Nec Corporation Method and apparatus for priority control of incoming calls at ISDN terminals
US5033079A (en) * 1989-05-30 1991-07-16 At&T Bell Laboratories Establishment of facsimile calls
US5161154A (en) * 1991-02-12 1992-11-03 Motorola, Inc. Communication system having a varied communication resource grant channel usage requirement
US5353351A (en) 1992-06-09 1994-10-04 At&T Bell Laboratories Secure teleconferencing
JP3446482B2 (ja) * 1996-06-28 2003-09-16 三菱電機株式会社 暗号化装置
US6084969A (en) * 1997-12-31 2000-07-04 V-One Corporation Key encryption system and method, pager unit, and pager proxy for a two-way alphanumeric pager network
FI115372B (fi) * 1998-09-18 2005-04-15 Nokia Corp Menetelmä matkaviestimen tunnistamiseksi, viestintäjärjestelmä ja matkaviestin
US6760420B2 (en) * 2000-06-14 2004-07-06 Securelogix Corporation Telephony security system
US6757823B1 (en) * 1999-07-27 2004-06-29 Nortel Networks Limited System and method for enabling secure connections for H.323 VoIP calls
CA2323900A1 (en) * 2000-10-19 2002-04-19 Michael Stumm Telecommunication architecture
US7577837B1 (en) * 2003-04-17 2009-08-18 Cisco Technology, Inc. Method and apparatus for encrypted unicast group communication
US20050108534A1 (en) * 2003-11-19 2005-05-19 Bajikar Sundeep M. Providing services to an open platform implementing subscriber identity module (SIM) capabilities
US20080151873A1 (en) * 2006-12-21 2008-06-26 Mike Borsetti Virtual internet protocol interconnection service
CN101022483B (zh) * 2007-03-26 2011-04-20 华为技术有限公司 实现特殊呼叫类业务的系统、装置和方法
US8555068B2 (en) * 2007-11-13 2013-10-08 Koolspan, Inc. Secure mobile telephony
CN101605240B (zh) * 2009-07-28 2011-06-08 杭州华三通信技术有限公司 基于gps信息进行会议数据加密的方法和设备

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1889767A (zh) * 2005-06-30 2007-01-03 华为技术有限公司 实现媒体流安全的方法及通信系统
CN101370251A (zh) * 2007-08-17 2009-02-18 华为技术有限公司 私有业务接入点的接入控制方法及其网络设备和系统
CN101500229A (zh) * 2008-01-30 2009-08-05 华为技术有限公司 建立安全关联的方法和通信网络系统

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2547037A4 *

Also Published As

Publication number Publication date
US20130142334A1 (en) 2013-06-06
US9106429B2 (en) 2015-08-11
EP2547037A4 (en) 2013-10-30
CN101951554A (zh) 2011-01-19
EP2547037B1 (en) 2015-02-25
EP2547037A1 (en) 2013-01-16

Similar Documents

Publication Publication Date Title
KR101033750B1 (ko) 하프-듀플렉스 음성 네트워크 채널에서의 고속 보안 세션
KR100978987B1 (ko) 하프-듀플렉스 ad-hoc 그룹 음성 셀룰라 네트워크채널에서의 고속 보안 세션 성립 방법 및 장치
US10038676B2 (en) Call encryption systems and methods
KR100862050B1 (ko) VoIP 보안 통신을 제공하는 사용자 에이전트 및 이를이용한 보안 통신 제공 방법
US7764945B2 (en) Method and apparatus for token distribution in session for future polling or subscription
CN100466805C (zh) 一种端到端加密语音通信的方法
US9363034B2 (en) Method to encrypt information that is transferred between two communication units
WO2012024903A1 (zh) 移动通讯网中加密语音通话的方法和系统、终端及网络侧
CN101909290A (zh) 一种实现语音通话加密的方法及系统及移动终端
CN103096304A (zh) Ip网络通讯终端保密语音动态加解密方法
WO2012024904A1 (zh) 一种会议电话预接入的方法、系统及网络侧设备
US9819651B2 (en) Secure voice and text communication
WO2017197968A1 (zh) 一种数据传输方法及装置
EP2809045B1 (en) Information security attachment device for voice communication and information security method for voice communication using the same
JP5163187B2 (ja) コールセンタシステム
WO2012163127A1 (zh) 语音处理方法及系统
WO2011157005A1 (zh) 一种移动终端的控制方法、系统及移动终端
US20080096506A1 (en) Method and apparatus for secure voice communication
CN105763571A (zh) 基于sip的非对称语音加密
US20050228997A1 (en) Methods and devices for providing secure communication sessions
KR101527053B1 (ko) 사생활 보호 통신 모드가 가능한 통신 시스템
WO2012174843A1 (zh) 一种实现端到端安全的密钥协商方法及系统
KR20100100170A (ko) 보안기능을 구비한 핸즈프리 및 그 제어 방법
CN105743847A (zh) 基于WebSocket实现SIP信令安全传输的方法
CN105101184A (zh) 基于蓝牙加密的移动终端通信方法及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11819279

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 13640357

Country of ref document: US

Ref document number: 2011819279

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE