WO2012024906A1 - 一种移动通信系统及其语音通话加密的方法 - Google Patents

一种移动通信系统及其语音通话加密的方法 Download PDF

Info

Publication number
WO2012024906A1
WO2012024906A1 PCT/CN2011/070400 CN2011070400W WO2012024906A1 WO 2012024906 A1 WO2012024906 A1 WO 2012024906A1 CN 2011070400 W CN2011070400 W CN 2011070400W WO 2012024906 A1 WO2012024906 A1 WO 2012024906A1
Authority
WO
WIPO (PCT)
Prior art keywords
voice
key
mobile terminal
terminal
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2011/070400
Other languages
English (en)
French (fr)
Inventor
于松
邓方民
曹耀斌
张蓬勃
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Publication of WO2012024906A1 publication Critical patent/WO2012024906A1/zh
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/062Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys

Definitions

  • the present invention relates to the field of mobile communication technologies, and in particular, to a mobile communication system and a method for voice call strength in a mobile communication system.
  • the USIM Universal Subscriber Identity Module
  • HLR/AuC Home Location Memory/Authentication Center
  • Key Ki (128bit)
  • the mobile terminal and the network can perform mutual authentication, and the base station and the mobile terminal also use the root key Ki to encrypt and protect the wireless link.
  • this encryption method is only an encrypted wireless environment, and voice data is transmitted in the network in a clear text manner.
  • the technical problem to be solved by the present invention is to provide a mobile communication system and a method for encrypting a voice call in a mobile communication system, and a mobile terminal in the mobile communication system, which is used for solving the security of existing voice call encryption. Poor performance and low efficiency to achieve reliable encrypted voice calls.
  • the present invention provides a method for encrypting a voice call in a mobile communication system, including:
  • the calling terminal generates a voice key for voice encryption and decryption, and encrypts the voice key by using a shared key factor of the calling terminal, and then sends the voice key to the network side;
  • the network side decrypts the encrypted voice key according to the shared key factor of the shared calling terminal, and encrypts the voice key by using the shared key factor of the shared called terminal, and then sends the encrypted voice key to the called party.
  • the called terminal decrypts the encrypted voice key by using the shared key factor of the called terminal to obtain the voice key;
  • the transmitted voice data is encrypted by using a voice key, and the received voice data is decrypted, and the calling terminal and the called terminal implement an encrypted voice call.
  • the calling terminal and the network side calculate the shared key factor of the calling terminal by the random number and the calling key of the calling terminal user according to the A3 algorithm in the call verification phase;
  • the called terminal and the network side calculate the shared key factor of the called terminal from the random number and the passive terminal user's key Ki according to the A3 algorithm in the call verification phase.
  • the calling terminal randomly generates the voice key for voice encryption/decryption according to a certain algorithm every time the call is made.
  • the voice key is transmitted by a call setup message between the calling terminal and the network side and a call setup message between the network side and the called terminal after being encrypted by the shared key factor.
  • the present invention further provides a mobile communication system, comprising: a mobile terminal, a core network switching unit, wherein the mobile terminal comprises an encryption and decryption module, and the core network switching unit comprises a network encryption and decryption module, wherein:
  • the encryption and decryption module is configured to generate a voice key for voice data encryption/decryption when the mobile terminal is used as the calling mobile terminal, and encrypt the voice key by using a shared key factor of the mobile terminal, and then send the core key to the core network for exchange.
  • a unit configured to acquire, when the mobile terminal is the called mobile terminal, a voice key encrypted by the shared key factor of the mobile terminal from the core network switching unit, and utilize the sharing Decrypting the key factor to obtain a voice key generated by the calling party;
  • the network encryption and decryption module is configured to decrypt the voice key encrypted by the calling mobile terminal by using a shared key factor of the calling mobile terminal, and then use the shared key factor of the called mobile terminal to perform the voice key After being encrypted, it is sent to the called mobile terminal.
  • the encryption and decryption module of the mobile terminal and the network encryption and decryption module of the core network switching unit calculate the shared key factor of the mobile terminal by using the random number and the root key Ki of the mobile terminal user according to the A3 algorithm in the call verification phase. .
  • the encryption and decryption module of the mobile terminal randomly generates the voice key for voice encryption/decryption according to a certain algorithm when the mobile terminal acts as the calling mobile terminal for each call.
  • the mobile terminal carries the encrypted voice key in the call setup message with the core network switching unit.
  • the present invention also provides a mobile terminal, comprising an encryption and decryption module, the encryption and decryption module configured to generate a voice key for voice data encryption/decryption when the mobile terminal acts as a calling mobile terminal, using a shared key of the mobile terminal
  • the factor is encrypted by the factor and sent to the core network switching unit.
  • the voice key encrypted by the shared key factor is obtained from the core network switching unit, and the shared secret is used.
  • the key factor acquires the voice key.
  • the encryption and decryption module is further configured to calculate, according to the A3 algorithm, a shared key factor of the mobile terminal by using a random number and a root key Ki of the mobile terminal user according to the A3 algorithm; the encryption and decryption of the mobile terminal
  • the module is further configured to randomly generate the voice key for voice encryption/decryption according to a certain algorithm every time the mobile terminal acts as the calling mobile terminal.
  • the present invention completes the voice key Kr used in the final voice communication by adding corresponding hardware and software to the mobile terminal and the network, through the CK (Cipher Key Encryption Key) shared by the mobile terminal and the network. Encrypted transmission enables users to use a shared voice key Kr for more secure voice calls.
  • BRIEF abstract 1 is a schematic flowchart of a delivery process of a voice key Kr in a mobile communication system according to an embodiment of the present invention
  • FIG. 2 is a schematic diagram showing the network structure of a mobile communication system according to an embodiment of the present invention.
  • the security scheme for encrypting and protecting the voice call has the problems of poor security, low efficiency, and the like
  • the mobile communication system provided by the embodiment of the present invention and the voice call encryption method in the mobile communication system are
  • the calling terminal generates a voice key Kr for voice call encryption/decryption, and the voice secret transmitted in the call setup message between the two by the network side and the mobile terminal using the shared key factor CK (Cipher Key encryption key)
  • CK Cipher Key encryption key
  • the key Kr is encrypted and decrypted, so that a shared voice key Kr for voice call encryption/decryption is obtained between the calling terminal and the called terminal, and both parties use the voice key Kr to perform voice call encryption.
  • the shared key factor CK can be calculated by the root key Ki of the mobile communication network and the random number RAND according to a certain key algorithm. Since the root key Ki has very high confidentiality and security, the shared key is utilized. The encryption transmission of the voice key Kr by the factor CK also has high security and confidentiality, and the transmission of the voice key Kr can be completed by using the shared key factor CK in the case of network participation.
  • the shared key factor CK may be calculated by the mobile terminal and the network side in the call verification phase according to the A3 algorithm by the random number RAND and the root key Ki of the mobile terminal user.
  • the network side and each mobile terminal share a corresponding shared key factor CK.
  • the encrypted transmission and decryption reception of the voice call can be completed through the encryption and decryption module of the mobile terminal, and the process is completely independent of the network. That is, in the process of voice communication, only the dual-issue voice encryption and decryption operation needs to be sent and received, and the network side does not need to perform the encryption and decryption process.
  • a method for encrypting a voice call in a mobile communication system includes: a calling terminal generates a key Kr set to voice encryption/decryption, which is generated by using a call verification phase
  • the shared key factor CK A encrypts the key Kr, and writes the encrypted voice key Kr into the call setup message and sends it to the network side;
  • the network side decrypts the encrypted voice key Kr according to the call verification phase shared key factor CK A , and encrypts the voice key Kr by using the shared key factor CK B of the called terminal to write the call establishment.
  • the message is sent to the called terminal;
  • the called terminal decrypts the encrypted voice key Kr by using the shared key factor CK B generated in the call verification phase to obtain the voice key Kr;
  • the calling terminal and the called terminal perform encryption/decryption operations on the voice data through the voice key Kr, encrypt the transmitted voice data, and decrypt the received voice data to implement an encrypted voice call.
  • the calling terminal and the called terminal may be mobile terminals, mobile stations, or may be fixed stations, or other fixed communication terminals.
  • the shared key factor CK A of the calling terminal is calculated by the calling terminal and the network side in the call verification phase by the random number RAND and the root key Ki of the calling terminal user according to the A3 algorithm.
  • the shared key factor CK B of the called terminal is calculated by the called terminal and the network side in the call verification phase according to the A3 algorithm by the random number RAND and the passive terminal user's root key Ki.
  • the voice key Kr for voice encryption/decryption is randomly generated by a terminal as a calling party according to a certain algorithm every time a call is made.
  • the field in the call setup message for carrying the encrypted key Kr is the User-user field of the Call Setup message (SETUP) in the 3GPP Partner Program 3GPP specification.
  • a mobile communication system of the present invention includes: a mobile terminal, a core network switching unit, the mobile terminal includes an encryption and decryption module, the core network switching unit includes a network encryption and decryption module, wherein: the encryption and decryption module is configured to Generating a voice key Kr for voice data encryption/decryption when the mobile terminal is the calling party, encrypting the voice key Kr by using the shared key factor CK A of the mobile terminal, and writing the call setup message to the core network.
  • the switching unit is configured to: when the mobile terminal is used as the called end, obtain a call setup message from the core network switching unit, and decrypt the encrypted voice key Kr in the call setup message by using the shared key factor CK B of the mobile terminal, Obtain a voice key Kr;
  • the network encryption and decryption module is configured to decrypt the encrypted voice key Kr by using the shared key factor CK A of the calling mobile terminal after receiving the call setup message from the calling mobile terminal, and then using the called mobile After the shared key factor CK B of the terminal encrypts the voice key Kr, the core network switching unit writes the encrypted voice key Kr into the call setup message and sends it to the called mobile terminal.
  • the delivery process of the voice key Kr according to the embodiment of the present invention is shown, which includes the following steps:
  • the mobile terminal A selects a call mode, and can select an encrypted call or a normal call;
  • the mobile terminal A initiates an encrypted call to the mobile terminal B, and the mobile terminal A generates a voice key Kr for encrypting the voice data through its own encryption and decryption module, and adds in the call setup (SETUP) message UUS field.
  • shared key factor a mobile terminal a encrypts the CK key Kr voice; the shared key factor CK a call is generated at the authentication phase, the mobile terminal a key shared with the network side.
  • S104 After receiving the SETUP message, the network side determines whether it is an encrypted call according to the UUS field, if yes, then transfers to S105, and if not, performs the normal process of the normal call;
  • the network side uses the shared key factor CK A of the calling end to decrypt the voice key Kr, and then uses the shared key factor CK B of the mobile terminal B to encrypt the voice key Kr again, through the SETUP message.
  • the UUS field passes the encrypted voice key Kr to the mobile terminal B;
  • the mobile terminal B determines whether to encrypt the call, and if not, performs the normal process of the normal call;
  • the mobile terminal B extracts the ciphertext from the SETUP message; the encryption and decryption module decrypts the voice key Kr from the ciphertext using the shared key factor CK B of the mobile terminal B, and adds the voice data as the subsequent voice data.
  • the decrypted voice key; the shared key factor CK B of the called end is generated in the call verification phase, and is a key shared by the mobile terminal B and the network side.
  • the voice data is encrypted and decrypted by the encryption/decryption module through the voice key Kr, so that the transmitted voice data is encrypted, and the received voice data is input.
  • Decryption, encrypted voice calls, subsequent processes do not require network participation.
  • the random number RAND will be different each time a voice call is made, that is, the shared key factor CK of each voice call will change during the call setup process. Since the root key Ki is shared by the network (actually the network unit HLR/AUC) and the terminal, the random number RAND is transmitted by the network side every time the voice call is sent, so the shared key factor CK generated by the terminal is also the network and the terminal. shared.
  • the voice key Kr is randomly generated according to a certain algorithm every time the call is made, and the generation algorithm and the specific algorithm for encrypting the Kr by using the shared key factor CK as an encryption factor have many related algorithms to choose from. Make a narrative.
  • the encryption and decryption modules 201 and 202 are added to the mobile terminal, the network encryption/decryption module 203 is added to the network side, and the encryption and decryption of the mobile terminal A is performed.
  • the module 201 generates a voice key Kr for completing encryption/decryption of voice data; acquires a shared key factor CK from the USIM card; and fills in a voice key Kr encrypted by the shared key factor CK in a UUS field of the SETUP message The encryption and decryption operation of the voice data is completed using the voice key Kr.
  • the encryption and decryption module 202 of the mobile terminal B is configured to take out the CK-encrypted voice key Kr from the SETUP message UUS field; use the CK to decrypt the voice key Kr from the ciphertext; use the voice key Kr to complete the encryption and decryption of the voice data. operating.
  • the added network encryption and decryption module 203 on the network side is configured to take out the encrypted voice key Kr from the SETUP message UUS field of the originating mobile terminal A; use the shared key factor CK of the originating end to perform decryption;
  • the shared key factor CK of the terminal B is encrypted; the encrypted voice key Kr is placed in the UUS field of the SETUP message sent to the receiving end.
  • the network encryption and decryption module 203 can be added to the core network switching unit, and the core network switching unit can be a mobile switching center.
  • the mobile communication system and the method for encrypting the voice call of the present invention by configuring a hardware encryption module on the mobile terminal and the core network switching unit, encrypting the voice key of the call by using a CK (Cipher Key), the calling party
  • CK Cipher Key
  • the end completes the voice call for the voice call through the core network switching unit and the called end.
  • the negotiation of the voice key finally completes the transparent transmission of the voice encrypted data through the network.
  • the present invention provides a mobile communication system and a method for encrypting a voice call in a mobile communication system, and a mobile terminal in the mobile communication system, which solves the problem of poor security and low efficiency of existing voice call encryption. , to achieve reliable encrypted voice calls.
  • the invention completes the encrypted transmission of the voice key Kr used in the final voice communication by adding corresponding hardware and software in the mobile terminal and the network, through the CK (Cipher Key Encryption Key) shared by the mobile terminal and the network, so that the user A more secure voice call can be made between the voice keys Kr shared by both parties. Therefore, the present invention has industrial applicability.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Description

一种移动通信系统及其语音通话加密的方法
技术领域
本发明涉及移动通信技术领域, 尤其涉及一种移动通信系统以及移动通 信系统中语音通话力口密的方法。
背景技术
语音通话服务作为移动通信网的基本业务, 其安全性和保密性历来都备 受关注, 如何提高通话过程的安全性以及对隐私的保护能力, 是移动网络技 术的重要研究内容之一。 移动网络通常都具有自身的通信加密方法, 例如在
UMTS ( Universal Mobile Communication System,通用移动通信系统 )系统中, 用户的 USIM ( Universal Subscriber Identity Module, 全球用户识别卡 )卡和 归属网络的 HLR/AuC (归属位置存储器 /鉴权中心) 共享一个根密钥 Ki ( 128bit ) , 基于该根密钥 Ki, 移动终端和网络可以进行双向认证, 基站和 移动终端间也利用根密钥 Ki对无线链路进行加密和完整性保护。但这种加密 方法只是加密无线环境, 语音数据是以明文的方式在网络中进行传输的。
目前已经有很多技术和方案针对基于 CS ( Circuit Switch, 电路交换)域 的语音通话进行力。密保护。 比如, 通过 DTMF ( Dual Tone Multi Frequency, 双音多频) 来传递密钥索引, 通过移动终端上保存的固定密钥来对数据进行 加密; 利用短消息来实现密钥协商和传递, 然后利用生成的密钥进行保密通 信等等。 从技术特点上来说, 使用固定密钥, 安全性相对较差; 利用短信协 商密钥, 效率较低。 综上可知, 现有的加密保护方案都存在一些缺陷和不足。
发明内容
本发明所要解决的技术问题在于, 提供一种移动通信系统以及移动通信 系统中语音通话加密的方法, 以及所述移动通信系统中的一种移动终端, 用 于解决现有语音通话加密存在的安全性差、 效率低的问题, 实现可靠的加密 语音通话。 为了解决上述问题, 本发明提出了一种移动通信系统中语音通话加密的 方法, 包括:
主叫终端生成用于语音加密和解密的语音密钥, 利用主叫终端的共享密 钥因子对该语音密钥进行加密后发送给网络侧;
网络侧根据共享的所述主叫终端的共享密钥因子对加密后的语音密钥进 行解密, 再利用共享的被叫终端的共享密钥因子对所述语音密钥进行加密后 发送给被叫终端;
被叫终端利用被叫终端的共享密钥因子对加密后的语音密钥进行解密, 获取所述语音密钥;
所述主叫终端和被叫终端在语音通话时, 利用语音密钥对发送的语音数 据进行加密, 对接收的语音数据进行解密, 所述主叫终端和所述被叫终端实 现加密语音通话。
主叫终端和网络侧在呼叫验证阶段根据 A3 算法由随机数和主叫终端用 户的才艮密钥 Ki计算得到所述主叫终端的共享密钥因子;
被叫终端和网络侧在呼叫验证阶段根据 A3 算法由随机数和被动终端用 户的才艮密钥 Ki计算得到所述被叫终端的共享密钥因子。
主叫终端在每次通话时按照一定算法随机生成所述用于语音加密 /解密 的语音密钥。
所述语音密钥在经共享密钥因子加密后是通过主叫终端与网络侧之间的 呼叫建立消息以及网络侧与被叫终端之间的呼叫建立消息进行传输的。
本发明还提供一种移动通信系统, 包括: 移动终端, 核心网交换单元, 其特征在于, 所述移动终端包括加解密模块, 所述核心网交换单元包括网络 加解密模块, 其中:
该加解密模块, 设置成在移动终端作为主叫移动终端时生成用于语音数 据加密 /解密的语音密钥, 利用移动终端的共享密钥因子对所述语音密钥加密 后发送给核心网交换单元; 设置成在移动终端作为被叫移动终端时, 从核心 网交换单元获取利用移动终端的共享密钥因子加密的语音密钥, 并利用共享 密钥因子解密获取主叫生成的语音密钥;
该网络加解密模块, 设置成利用主叫移动终端的共享密钥因子对主叫移 动终端加密后的语音密钥进行解密, 再利用被叫移动终端的共享密钥因子对 所述语音密钥进行加密后发送至被叫移动终端。
所述移动终端的加解密模块和所述核心网交换单元的网络加解密模块, 是在呼叫验证阶段根据 A3算法由随机数和移动终端用户的根密钥 Ki计算得 到移动终端的共享密钥因子。
所述移动终端的加解密模块, 是在移动终端作为主叫移动终端的每次通 话时按照一定算法随机生成所述用于语音加密 /解密的语音密钥。
所述移动终端是利用与核心网交换单元之间的呼叫建立消息中携带加密 后的语音密钥。
本发明还提供一种移动终端, 包括加解密模块, 该加解密模块, 设置成 在移动终端作为主叫移动终端时生成用于语音数据加密 /解密的语音密钥, 利 用移动终端的共享密钥因子对所述语音密钥加密后发送给核心网交换单元; 设置成在移动终端作为被叫移动终端时, 从核心网交换单元获取共享密钥因 子加密后的语音密钥, 利用所述共享密钥因子获取语音密钥。
所述加解密模块还设置成按照与网络侧相同的方式, 根据 A3 算法由随 机数和移动终端用户的根密钥 Ki计算得到所述移动终端的共享密钥因子; 所 述移动终端的加解密模块, 还设置成在移动终端作为主叫移动终端的每次通 话时按照一定算法随机生成所述用于语音加密 /解密的语音密钥。
综上所述, 本发明通过在移动终端和网络中添加相应的硬件和软件, 通 过移动终端和网络共享的 CK ( Cipher Key加密密钥) 完成对最终语音通讯 时所使用的语音密钥 Kr的加密传输,使得用户之间可以利用双方共享的语音 密钥 Kr进行更加安全的语音通话。 附图概述 图 1是本发明的实施方式所提供的移动通信系统中语音密钥 Kr的传递流 程示意图; 以及
图 2是本发明的实施方式所提供的移动通信系统的网络结构示意图。
本发明的较佳实施方式
为使本发明的目的、 技术方案和优点更加清楚, 以下结合附图对本发明 作进一步地详细说明。
针对移动通信系统中, 对语音通话进行加密保护的技术方案所存在的安 全性差、 效率低等问题, 本发明的实施方式所提供的移动通信系统以及移动 通信系统中语音通话加密的方法中, 由主叫终端生成用于语音通话加密 /解密 的语音密钥 Kr, 由网络侧和移动终端利用共享密钥因子 CK ( Cipher Key加 密密钥)对两者之间的呼叫建立消息中传递的语音密钥 Kr进行加密和解密, 从而实现主叫终端和被叫终端之间都获得共享的用于语音通话加密 /解密的 语音密钥 Kr, 双方利用所述语音密钥 Kr进行语音通话加密。
所述共享密钥因子 CK可以由移动通信网的根密钥 Ki和随机数 RAND按 照某种密钥算法计算获得, 由于根密钥 Ki具有非常高的保密性和安全性, 使 得利用共享密钥因子 CK对语音密钥 Kr的加密传递也具有^高的安全性和保 密性, 可以在网络参与的情况下利用共享密钥因子 CK完成语音密钥 Kr的传 递工作。
所述共享密钥因子 CK可以是移动终端和网络侧在呼叫验证阶段根据 A3 算法由随机数 RAND和该移动终端用户的根密钥 Ki计算得到。 网络侧和每 一移动终端均共享有相应的共享密钥因子 CK。
在语音数据传递阶段, 由于主叫和被叫移动终端都已获得语音密钥 Kr, 可以通过移动终端的加解密模块完成对语音通话的加密发送和解密接收, 这 个过程是与网络完全无关的, 即语音通信过程中, 仅需收发双发进行语音的 加密解密操作, 而无需网络侧再进行加密解密过程。
本发明的实施方式所提供的移动通信系统中语音通话加密的方法,包括: 主叫终端生成设置成语音加密 /解密的密钥 Kr,利用呼叫验证阶段生成的 共享密钥因子 CKA对该密钥 Kr进行加密, 将加密后的语音密钥 Kr写入呼叫 建立消息中发送给网络侧;
网络侧根据所述呼叫验证阶段共享密钥因子 CKA对加密后的语音密钥 Kr进行解密, 利用被叫终端的共享密钥因子 CKB对所述语音密钥 Kr进行加 密后写入呼叫建立消息中发送给被叫终端;
被叫终端利用呼叫验证阶段生成的共享密钥因子 CKB对加密后的语音密 钥 Kr进行解密, 获取所述语音密钥 Kr;
所述主叫终端与被叫终端之间通过语音密钥 Kr对语音数据进行加密 /解 密操作, 对发送的语音数据进行加密, 对接收的语音数据进行解密, 实现加 密语音通话。
所述主叫终端和被叫终端可以是移动终端, 移动台, 或者也可以是固定 台, 或其它固定通信终端。
所述主叫终端的共享密钥因子 CKA是主叫终端和网络侧在呼叫验证阶段 根据 A3算法由随机数 RAND和主叫终端用户的根密钥 Ki计算得到。所述被 叫终端的共享密钥因子 CKB是被叫终端和网络侧在呼叫验证阶段根据 A3算 法由随机数 RAND和被动终端用户的根密钥 Ki计算得到。
所述用于语音加密 /解密的语音密钥 Kr是由作为主叫的终端在每次通话 时按照一定算法随机生成。 所述呼叫建立消息中用于携带加密后的密钥 Kr 的字段是第三代合作伙伴计划 3GPP 规范中呼叫建立消息 (SETUP ) 的 User-user字段。
本发明的一种移动通信系统, 包括: 移动终端, 核心网交换单元, 所述 移动终端包括加解密模块, 所述核心网交换单元包括网络加解密模块, 其中: 所述加解密模块, 设置成在移动终端作为主叫时生成用于语音数据加密 / 解密的语音密钥 Kr, 利用移动终端的共享密钥因子 CKA对所述语音密钥 Kr 加密后写入呼叫建立消息中发送给核心网交换单元; 设置成在移动终端作为 被叫端时, 从核心网交换单元获取呼叫建立消息, 利用移动终端的共享密钥 因子 CKB对呼叫建立消息中的加密后的语音密钥 Kr进行解密, 获取语音密 钥 Kr; 所述网络加解密模块, 设置成从主叫移动终端收到呼叫建立消息后, 利 用主叫移动终端的共享密钥因子 CKA对其中加密后的语音密钥 Kr进行解密, 再利用被叫移动终端的共享密钥因子 CKB对所述语音密钥 Kr进行加密后, 核心网交换单元将加密后的语音密钥 Kr写入呼叫建立消息中发送至被叫移 动终端。
如图 1所示, 显示了本发明实施例的语音密钥 Kr的传递流程, 包括如下 步骤:
S101 : 移动终端 A选择通话方式, 可选择加密通话或普通通话;
S102: 若选择了普通通话, 则对于普通通话则按正常流程进行;
S103: 若选择了加密通话, 移动终端 A发起加密呼叫移动终端 B, 则移 动终端 A通过自己的加解密模块生成用来加密语音数据的语音密钥 Kr,在呼 叫建立 ( SETUP ) 消息 UUS字段添加使用移动终端 A的共享密钥因子 CKA 进行加密的语音密钥 Kr; 所述共享密钥因子 CKA是在呼叫验证阶段生成, 是 移动终端 A与网络侧共享的密钥。
S104: 网络侧收到 SETUP消息后,根据 UUS字段判断是否为加密通话, 若是则转 S105, 若否, 则按普通通话的正常流程进行;
S105: 对于加密通话, 网络侧使用主叫端的共享密钥因子 CKA解密出语 音密钥 Kr, 再使用移动终端 B的共享密钥因子 CKB再次对语音密钥 Kr进行 加密,通过 SETUP消息的 UUS字段将加密后的语音密钥 Kr传递到移动终端 B;
S106: 移动终端 B判断是否加密通话, 若不是, 则按普通通话的正常流 程进行;
S107: 如果判断是加密通话, 移动终端 B从 SETUP消息中取出密文; 加解密模块使用移动终端 B 的共享密钥因子 CKB从密文中解密出语音密钥 Kr, 并作为后续语音数据的加解密的语音密钥; 所述被叫端的共享密钥因子 CKB是在呼叫验证阶段生成, 是移动终端 B与网络侧共享的密钥。
移动终端 A和移动终端 B之间通过语音密钥 Kr,在加解密模块对语音数 据进行加解密操作, 实现对发送的语音数据进行加密, 对接收的语音数据进 行解密, 进行加密语音通话, 后续流程无需网络参与。
在上述方法中, 共享密钥因子 CK ( Cipher Key加密密钥) , 它由随机 数 RAND和用户的根密钥 Ki根据 A3算法 (鉴权算法)计算出, CK= A3( RAND, Ki ) 。 随机数 RAND每次语音通话时都会不同, 也就是说在呼叫建立过程中 每次语音通话的共享密钥因子 CK都会变化。由于根密钥 Ki是网络 (实际上网 络单元 HLR/AUC)与终端共享的, 随机数 RAND是网络侧在每次语音呼叫时 发送终端的, 因此终端生成的共享密钥因子 CK也是网络和终端共享的。
所述语音密钥 Kr在每次通话时按照一定算法随机生成,其生成算法以及 将共享密钥因子 CK作为加密因子对 Kr进行加密的具体算法, 已有很多相关 算法可供选择, 在这里不做叙述。
如图 2所示, 本发明的实施方式所提供的移动通信系统的示意图中, 在 移动终端上增加了加解密模块 201和 202、网络侧增加了网络加解密模块 203 , 移动终端 A的加解密模块 201 , 生成用于完成语音数据的加密 /解密的语 音密钥 Kr; 从 USIM卡中获取共享密钥因子 CK; 在 SETUP消息 UUS字段 中填写经过共享密钥因子 CK加密后的语音密钥 Kr;使用语音密钥 Kr完成对 语音数据的加解密操作。
移动终端 B的加解密模块 202, 设置成从 SETUP消息 UUS字段取出经 过 CK加密的语音密钥 Kr; 使用 CK从密文中解密的语音密钥 Kr; 使用语音 密钥 Kr完成对语音数据的加解密操作。
网络侧增加的网络加解密模块 203 , 设置成从发起端移动终端 A 的 SETUP消息 UUS字段中取出加密后的语音密钥 Kr; 使用发起端的共享密钥 因子 CK进行解密; 用于使用接收端移动终端 B的共享密钥因子 CK进行加 密;将加密后的语音密钥 Kr放在发送给接收端的 SETUP消息中 UUS字段中。
所述网络加解密模块 203可增加在核心网交换单元, 该核心网交换单元 可以是移动交换中心。
本发明的移动通信系统及其语音通话加密的方法, 通过在移动终端和核 心网交换单元上配置硬件加密模块, 用 CK(Cipher Key 密钥)对本次通话的语 音密钥进行加密, 主叫端通过核心网交换单元和被叫端完成用于语音通话的 语音密钥的协商, 最终完成语音加密数据通过网络进行透明的传输。
以上所述仅为本发明的实施例而已, 并不用于限制本发明, 对于本领域 的技术人员来说, 本发明可以有各种更改和变化。 凡在本发明的精神和原则 之内, 所作的任何修改、 等同替换、 改进等, 均应包含在本发明的权利要求 范围之内。
工业实用性 本发明提供一种移动通信系统以及移动通信系统中语音通话加密的方 法, 以及所述移动通信系统中的一种移动终端, 解决现有语音通话加密存在 的安全性差、 效率低的问题, 实现可靠的加密语音通话。
本发明通过在移动终端和网络中添加相应的硬件和软件, 通过移动终端 和网络共享的 CK ( Cipher Key加密密钥) 完成对最终语音通讯时所使用的 语音密钥 Kr的加密传输, 使得用户之间可以利用双方共享的语音密钥 Kr进 行更加安全的语音通话。 因此, 本发明具有工业实用性。

Claims

权 利 要 求 书
1、 一种移动通信系统中语音通话加密的方法, 包括:
主叫终端生成用于语音加密和解密的语音密钥, 利用所述主叫终端的共 享密钥因子对该语音密钥进行加密后发送给网络侧;
所述网络侧根据共享的所述主叫终端的共享密钥因子对加密后的语音密 钥进行解密, 再利用共享的被叫终端的共享密钥因子对所述语音密钥进行加 密后发送给所述被叫终端;
所述被叫终端利用所述被叫终端的共享密钥因子对加密后的语音密钥进 行解密, 获取所述语音密钥;
所述主叫终端和所述被叫终端在语音通话时, 利用语音密钥对发送的语 音数据进行加密, 对接收的语音数据进行解密, 所述主叫终端和所述被叫终 端实现加密语音通话。
2、 如权利要求 1所述的方法, 其还包括:
主叫终端和网络侧在呼叫验证阶段根据 A3 算法由随机数和主叫终端用 户的才艮密钥 Ki计算得到所述主叫终端的共享密钥因子;
被叫终端和网络侧在呼叫验证阶段根据 A3 算法由随机数和被动终端用 户的才艮密钥 Ki计算得到所述被叫终端的共享密钥因子。
3、 如权利要求 1所述的方法, 其还包括:
主叫终端在每次通话时按照一定算法随机生成所述用于语音加密 /解密 的语音密钥。
4、 如权利要求 1所述的方法, 其中,
所述语音密钥在经共享密钥因子加密后是通过主叫终端与网络侧之间的 呼叫建立消息以及网络侧与被叫终端之间的呼叫建立消息进行传输的。
5、 一种移动通信系统, 包括: 移动终端, 核心网交换单元, 其中, 所述 移动终端包括加解密模块, 所述核心网交换单元包括网络加解密模块, 其中: 所述加解密模块, 设置成在所述移动终端作为主叫移动终端时生成用于 语音数据加密 /解密的语音密钥, 利用所述移动终端的共享密钥因子对所述语 音密钥加密后发送给所述核心网交换单元; 还设置成在移动终端作为被叫移 动终端时, 从所述核心网交换单元获取利用所述移动终端的共享密钥因子加 密的语音密钥, 并利用所述共享密钥因子解密获取主叫生成的语音密钥; 所述网络加解密模块, 设置成利用所述主叫移动终端的共享密钥因子对 所述主叫移动终端加密后的语音密钥进行解密, 再利用所述被叫移动终端的 共享密钥因子对所述语音密钥进行加密后发送至所述被叫移动终端。
6、 如权利要求 5所述的移动通信系统, 其中,
所述移动终端的所述加解密模块和所述核心网交换单元的所述网络加解 密模块还设置成在呼叫验证阶段根据 A3 算法由随机数和移动终端用户的根 密钥 Ki计算得到所述移动终端的共享密钥因子。
7、 如权利要求 5所述的移动通信系统, 其中,
所述移动终端的加解密模块还设置成在所述移动终端作为主叫移动终端 的每次通话时按照一定算法随机生成所述用于语音加密 /解密的语音密钥。
8、 如权利要求 5所述的移动通信系统, 其中,
所述移动终端是设置成在与核心网交换单元之间的呼叫建立消息中携带 加密后的语音密钥。
9、 一种移动终端, 包括加解密模块,
所述加解密模块, 设置成在移动终端作为主叫移动终端时生成用于语音 数据加密 /解密的语音密钥, 利用所述移动终端的共享密钥因子对所述语音密 钥加密后发送给核心网交换单元; 还设置成在所述移动终端作为被叫移动终 端时, 从所述核心网交换单元获取共享密钥因子加密后的语音密钥, 利用所 述共享密钥因子获取所述语音密钥。
10、 如权利要求 9所述的移动终端, 其中,
所述加解密模块还设置成按照与网络侧相同的方式, 根据 A3 算法由随 机数和移动终端用户的根密钥 Ki计算得到所述移动终端的共享密钥因子; 所述移动终端的加解密模块还设置成在所述移动终端作为主叫移动终端 的每次通话时按照一定算法随机生成所述用于语音加密 /解密的语音密钥。
PCT/CN2011/070400 2010-08-25 2011-01-19 一种移动通信系统及其语音通话加密的方法 Ceased WO2012024906A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201010265283.4A CN101917711B (zh) 2010-08-25 2010-08-25 一种移动通信系统及其语音通话加密的方法
CN201010265283.4 2010-08-25

Publications (1)

Publication Number Publication Date
WO2012024906A1 true WO2012024906A1 (zh) 2012-03-01

Family

ID=43325072

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/070400 Ceased WO2012024906A1 (zh) 2010-08-25 2011-01-19 一种移动通信系统及其语音通话加密的方法

Country Status (2)

Country Link
CN (1) CN101917711B (zh)
WO (1) WO2012024906A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20170077588A (ko) * 2015-12-28 2017-07-06 주식회사 케이티 비화 통화 서비스를 제공하는 서버 및 단말
CN110536289A (zh) * 2018-12-24 2019-12-03 中兴通讯股份有限公司 密钥发放方法及其装置、移动终端、通信设备和存储介质
CN114900500A (zh) * 2022-06-15 2022-08-12 中国电信股份有限公司 呼叫控制方法、应用服务器、通信系统以及存储介质

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101917711B (zh) * 2010-08-25 2015-09-16 中兴通讯股份有限公司 一种移动通信系统及其语音通话加密的方法
CN103986712B (zh) * 2014-05-16 2017-11-10 天地融科技股份有限公司 一种语音通话的数据处理方法
CN104113836B (zh) * 2014-07-29 2016-03-30 努比亚技术有限公司 一种通话加密的方法、通信终端及基站
TWI570711B (zh) * 2014-12-12 2017-02-11 魏如隆 聲頻動態頻譜加密裝置及加密方法
CN104640108A (zh) * 2015-01-28 2015-05-20 深圳市比维视创科技有限公司 一种终端通话语音加密方法及语音加密系统
CN105992203B (zh) * 2015-01-29 2019-04-30 成都三零瑞通移动通信有限公司 一种语音通信加密密钥协商方法及基于该方法的系统
CN105992199B (zh) * 2015-01-29 2019-04-30 成都三零瑞通移动通信有限公司 一种语音通信明密识别方法及系统
CN106559393B (zh) * 2015-09-29 2021-02-05 华为数字技术(苏州)有限公司 一种通话加密的方法、装置及系统
CN105743914B (zh) * 2016-03-31 2019-03-22 宇龙计算机通信科技(深圳)有限公司 一种语音加密通信方法、主叫端、被叫端及系统
CN106330438A (zh) * 2016-10-25 2017-01-11 公安部第三研究所 一种主动协商式加密模拟语音通信方法
CN113840280A (zh) * 2020-06-04 2021-12-24 中国电信股份有限公司 通话加密方法、系统、引导服务器、终端和电子设备
CN114222290B (zh) * 2020-09-04 2023-10-03 成都鼎桥通信技术有限公司 通信方法、装置、设备及存储介质
CN114630290B (zh) * 2022-04-08 2024-08-06 中国电信股份有限公司 语音加密通话的密钥协商方法、装置、设备及存储介质

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101309281A (zh) * 2008-07-22 2008-11-19 中国电信股份有限公司 端到端语音加密方法、装置及系统
CN101790160A (zh) * 2009-01-23 2010-07-28 中兴通讯股份有限公司 安全协商会话密钥的方法及装置
CN101917711A (zh) * 2010-08-25 2010-12-15 中兴通讯股份有限公司 一种移动通信系统及其语音通话加密的方法

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100550721C (zh) * 2004-03-17 2009-10-14 华为技术有限公司 一种端到端无线加密通讯的方法及系统
CN1691583B (zh) * 2004-04-26 2010-04-28 华为技术有限公司 基于端点之间的安全通信方法
CN100466805C (zh) * 2005-02-05 2009-03-04 华为技术有限公司 一种端到端加密语音通信的方法
US10237401B2 (en) * 2007-08-08 2019-03-19 Mitel Networks Corporation Secure call recording system for IP telephony

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101309281A (zh) * 2008-07-22 2008-11-19 中国电信股份有限公司 端到端语音加密方法、装置及系统
CN101790160A (zh) * 2009-01-23 2010-07-28 中兴通讯股份有限公司 安全协商会话密钥的方法及装置
CN101917711A (zh) * 2010-08-25 2010-12-15 中兴通讯股份有限公司 一种移动通信系统及其语音通话加密的方法

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20170077588A (ko) * 2015-12-28 2017-07-06 주식회사 케이티 비화 통화 서비스를 제공하는 서버 및 단말
KR102314402B1 (ko) 2015-12-28 2021-10-19 주식회사 케이티 비화 통화 서비스를 제공하는 서버 및 단말
CN110536289A (zh) * 2018-12-24 2019-12-03 中兴通讯股份有限公司 密钥发放方法及其装置、移动终端、通信设备和存储介质
CN114900500A (zh) * 2022-06-15 2022-08-12 中国电信股份有限公司 呼叫控制方法、应用服务器、通信系统以及存储介质

Also Published As

Publication number Publication date
CN101917711A (zh) 2010-12-15
CN101917711B (zh) 2015-09-16

Similar Documents

Publication Publication Date Title
CN101917711B (zh) 一种移动通信系统及其语音通话加密的方法
JP4634612B2 (ja) 改良された加入者認証プロトコル
AU2007292553B2 (en) Method and system for secure processing of authentication key material in an ad hoc wireless network
JP3581810B2 (ja) 通信チャネルを開設するための方法および移動機
JP5597676B2 (ja) 鍵マテリアルの交換
US20190068591A1 (en) Key Distribution And Authentication Method And System, And Apparatus
CN109075973B (zh) 一种使用基于id的密码术进行网络和服务统一认证的方法
JP2012110009A (ja) エンティティの認証と暗号化キー生成の機密保護されたリンクのための方法と構成
US8230218B2 (en) Mobile station authentication in tetra networks
CN102202299A (zh) 一种基于3g/b3g的端到端语音加密系统的实现方法
WO2008000165A1 (en) Method and system for distributing key in wireless network
CN101909290A (zh) 一种实现语音通话加密的方法及系统及移动终端
WO2012024903A1 (zh) 移动通讯网中加密语音通话的方法和系统、终端及网络侧
CN113872755A (zh) 一种密钥交换方法及装置
WO2012071846A1 (zh) 一种加密短消息实现的方法和系统
CN101296107B (zh) 通信网络中基于身份标识加密技术的安全通信方法及装置
WO2012024905A1 (zh) 一种移动通讯网中数据加解密方法、终端和ggsn
CN102264068A (zh) 共享密钥协商方法与系统、网络平台及终端
CN102036194B (zh) 一种加密mms的方法及系统
JP2026502357A (ja) プライベート電気通信ネットワークにおいてユーザ機器にクレデンシャルをプロビジョニングするための方法
KR100330418B1 (ko) 이동통신 환경에서의 가입자 인증 방법
CN117201052A (zh) 基于量子密码qvpn一次一密能源数据传输的方法、存储装置及智能终端
WO2010094185A1 (zh) 安全切换方法及系统
JP7674973B2 (ja) 無線通信端末装置、認証及び鍵共有方法、プログラム、認証及び鍵共有システム
CN103354638A (zh) 一种基于安卓系统的手机加密服务器系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11819281

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11819281

Country of ref document: EP

Kind code of ref document: A1