WO2015192454A1 - 通话的加密处理方法及装置 - Google Patents

通话的加密处理方法及装置 Download PDF

Info

Publication number
WO2015192454A1
WO2015192454A1 PCT/CN2014/084431 CN2014084431W WO2015192454A1 WO 2015192454 A1 WO2015192454 A1 WO 2015192454A1 CN 2014084431 W CN2014084431 W CN 2014084431W WO 2015192454 A1 WO2015192454 A1 WO 2015192454A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
call
key
external device
session key
Prior art date
Application number
PCT/CN2014/084431
Other languages
English (en)
French (fr)
Inventor
张劲松
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2015192454A1 publication Critical patent/WO2015192454A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/037Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic

Definitions

  • BACKGROUND OF THE INVENTION 1 Field of the Invention The present invention relates to the field of communications, and more particularly to a method and apparatus for encrypting a call.
  • BACKGROUND OF THE INVENTION CCTV exposes the insider of mobile phone tapping software, which can monitor telephone text messages in real time.
  • mobile phone monitor or mobile phone monitoring software sold online the conversation content of the mobile phone owner may be remotely eavesdropped by the owner without the knowledge of the owner.
  • some mobile phone monitoring software is also very popular in online business. The related software already exists in the prior art, claiming to be "the most powerful mobile phone monitoring software in the world".
  • the merchant claims that in addition to the general monitoring function, it can be installed on a computer or remotely monitored on a mobile phone, even if the other party's mobile phone is in In standby mode, the ambient sound can be heard. Since its launch in 2006, the software has been updated to the third generation. According to other media reports, a number of eavesdropping software with monitoring and stealing functions are now on the Internet. The pronouns given by many software are: "listening, tracking, marriage investigation, corporate stealing, and a software all", and according to the seller, such software is not restricted by the mobile phone system. Since the profit rate of criminal activities such as selling eavesdropping software is comparable to drug trafficking, criminals are willing to take risks.
  • Embodiments of the present invention provide a method and an apparatus for encrypting a call to solve at least the above problems.
  • a method for encrypting a call including: a first terminal initiating a call request to a second terminal; and triggering, by the call request, the first terminal Negotiating with the second terminal to determine a session key for encrypting the content of the call during the call; the first terminal encrypts the call process according to the call key.
  • the first terminal negotiates with the second terminal to determine a key for performing encryption and decryption processing on the content of the call during the call, and the method includes: the first terminal and the second terminal according to the The first key provided by the terminal and the second key provided by the second terminal negotiate to determine the session key according to a preset rule.
  • the preset rule includes: performing an exclusive OR process on the first key and the second key.
  • the first terminal and the second terminal are determined to negotiate the session key according to a preset rule according to a first key provided by the first terminal and a second key provided by the second terminal.
  • the first terminal and the second terminal respectively determine, by using the first external device and the second external device, the session key, where the first key and the second key are respectively stored in the The first external device and the second external device are described.
  • the method further includes: the first terminal acquiring the first device authentication code stored by the local device, and the second device authentication code stored in the first external device;
  • the first terminal compares the first device authentication code with the second device authentication code, where, in the same case, displaying a login interface of the call, and prompting the user to input a first password password;
  • a terminal compares whether the first password password is consistent with a second password password pre-stored in the first external device, and if they are consistent, enters a telephone dialing interface of the call process.
  • the dialing interface of the call is provided with an encrypted call option and an unencrypted call option.
  • the first terminal is triggered to negotiate with the second terminal to determine the call key.
  • the first and/or second external device is a TF card installed in the terminal.
  • an encryption processing apparatus for a call is further applied to the first terminal, including: an initiating module, configured to initiate a call request to the second terminal; determining a module, setting Determining, by the second terminal, a session key for encrypting the content of the call during the call, and the encryption processing module is configured to perform the call process according to the call key. Encryption processing.
  • the determining module is configured to determine, according to a preset rule, the call density according to the first key provided by the first terminal and the second key provided by the second terminal. key.
  • the determining module is further configured to negotiate with the second terminal by using the first external device and the second external device to determine the session key, where the first key and the second key are respectively Stored in the first external device and the second external device.
  • the first terminal and the second terminal jointly negotiate a session key during the call, and then use the determined session key to encrypt the call process, thereby solving the call between the two parties in the related art.
  • the content is easily eavesdropped, which enhances the user experience and ensures the interests of enterprises and financial institutions and the value of the terminal brand.
  • FIG. 1 is a flowchart of a method for encrypting a call according to an embodiment of the present invention
  • FIG. 2 is a schematic diagram of a first terminal according to an embodiment of the present invention
  • FIG. 3 is an encryption of a call according to a preferred embodiment of the present invention.
  • 4 is a schematic diagram of a terminal according to a preferred embodiment of the present invention
  • FIG. 5 is a block diagram showing a structure of an encryption processing apparatus for a call according to an embodiment of the present invention
  • FIG. 6 is a block diagram of a terminal structure according to an embodiment of the present invention.
  • Step S102 First terminal Initiating a call request to the second terminal
  • Step S104 The first terminal negotiates with the second terminal to determine a session key for encrypting the content of the call during the call, in response to the call request.
  • Step S106 The first terminal is configured according to the call. The key encrypts the call process.
  • the executor in the embodiment of the present invention may be the first terminal and/or the second terminal. In a preferred embodiment of the present invention, it may also be an external device of the terminal, such as a T card, ie, TF.
  • the card also known as Micro SD, is a very small flash memory card.
  • the first terminal and the second terminal determine the session key according to the preset rule according to the first key provided by the first terminal and the second key provided by the second terminal.
  • the preset rule may be The XOR processing is performed on the first key and the second key.
  • the first terminal and the second terminal determine the session key according to the preset rule according to the first key provided by the first terminal and the second key provided by the second terminal, including: the first terminal Determining, by the first external device and the second external device, the call key by the first external device and the second external device, respectively, the first key and the second key are respectively stored in the first external device and the second external device, and the embodiment of the present invention comprehensively considers Both the first terminal and the second terminal provide a key to determine the final session key, which can effectively ensure that the call process is stolen by a third party.
  • the method further includes: the first terminal acquiring the first device authentication code stored by the local device, and the first external device The stored second device authentication code; the first terminal compares the first device authentication code and the second device authentication code, wherein, in the same case, the login interface of the call is displayed, and the user is prompted to input the first password; Comparing whether the first password password is consistent with the second password password pre-stored in the first external device. If the password is consistent, the phone dialing interface is entered into the call process.
  • This example implements the process of binding the first external device to the first terminal. It should be noted that the first device authentication code in the first external device can be subsequently changed.
  • FIG. 2 is a schematic diagram of a first terminal according to an embodiment of the present invention.
  • the method further includes: an encrypted call option and an unencrypted call option are set on a call interface of the call.
  • the encrypted call option is triggered, the first terminal is triggered to negotiate with the second terminal to determine the session key.
  • the first and/or second external device is a TF card installed in the terminal.
  • FIG. 3 is a flowchart of a method for encrypting a call according to a preferred embodiment of the present invention. As shown in FIG.
  • Step 301 The mobile phone is powered on, and the client is started. It is judged whether the TF card (that is, the T card in the above embodiment) is a dedicated TF card, and if it is a dedicated TF card, the next step is performed, otherwise the normal mobile phone process is entered.
  • Step 302 The device authentication code is saved in the card. If the device authentication code stored in the device is the same, the password input interface is displayed, and the user is required to input a password. The user password is sent to the TF card, and the TF card verifies that the password is correct. The password is correct, the TF card enters the login state; the password is incorrect, and the client prompts the user to re-enter.
  • Step 303 The user makes a call.
  • the calling terminal A communicates with the called terminal B through whether the indication dialed by the user on the interface is a normal video call or an encrypted video call.
  • Key negotiation is performed before the call is established.
  • the call key is determined by the TF card of both parties of the call, and the last used key is XORed by the keys provided by the two parties.
  • Step 304 If the incoming call identifies a normal video call, b switches to the normal video call process, and no longer sends the encryption module to perform key authentication. At this time, ringing is started, and the user is prompted to answer the call and enter a normal normal video call process.
  • Step 305 If the incoming call identifies the encrypted video call, the mobile phone B enters the key authentication phase, first starts the security module, and then starts ringing, prompting the user to answer the call.
  • Step 306 The user ends the encrypted videophone or the ordinary videophone after the call.
  • an encryption processing device for a call is also provided, which is applied to the first terminal, and is used to implement the foregoing embodiments and preferred embodiments.
  • the module is explained.
  • the term "module" may implement a combination of software and/or hardware of a predetermined function.
  • the apparatus includes: an initiating module 50, configured to initiate a call request to a second terminal; a determining module 52, connected to the initiating module 50, configured to negotiate with the second terminal to determine a pair under the trigger of the call request The content of the call during the call is encrypted.
  • the encryption processing module 54 is connected to the determining module 52 and configured to encrypt the call process according to the session key.
  • the determining module 52 is configured to determine, according to a preset rule, the session key according to the first key provided by the first terminal and the second key provided by the second terminal.
  • a further improvement of the foregoing technical solution in the embodiment of the present invention is that the determining module 52 is further configured to negotiate with the second terminal by using the first external device and the second external device to determine a session key, the first key and the The second key is stored in the first external device and the second external device, respectively.
  • the first terminal and the second terminal jointly negotiate the call key during the call, and then the technical solution of encrypting the call process through the determined call key, and the call in the related art is solved.
  • the content of the call between the two parties is easily eavesdropped, which enhances the user experience and ensures the interests of enterprises and financial institutions and the value of the terminal brand.
  • FIG. 6 is a block diagram of a terminal structure according to an embodiment of the present invention. As shown in FIG. 6, by adding a dedicated T card to an existing mobile terminal.
  • the storage area module, the login module, and the function of modifying the videophone dialing module are as follows:
  • the T card storage area module is used to store the device authentication code and provide the addition and subtraction interface.
  • the embodiments of the present invention achieve the following beneficial effects: The problem that the content of the call between the two parties in the related art is easily eavesdropped is solved, thereby improving the user experience and ensuring the interests of the enterprise and the financial institution and the value of the terminal brand.
  • software is also provided for performing the technical solutions described in the above embodiments and preferred embodiments.
  • a storage medium is provided, the software being stored, including but not limited to: an optical disk, a floppy disk, a hard disk, a rewritable memory, and the like.
  • modules or steps of the present invention can be implemented by a general-purpose computing device, which can be concentrated on a single computing device or distributed over a network composed of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device, such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein.
  • the steps shown or described are performed, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps are fabricated as a single integrated circuit module.
  • the invention is not limited to any specific combination of hardware and software.
  • the above are only the preferred embodiments of the present invention, and are not intended to limit the present invention, and various modifications and changes can be made to the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

本发明提供了一种通话的加密处理方法及装置。所述加密处理方法包括以下步骤:第一终端向第二终端发起呼叫请求(S102);在所述呼叫请求的触发下,所述第一终端与所述第二终端协商确定对通话过程中的通话内容进行加密的通话密钥(S104);所述第一终端根据所述通话密钥对所述通话过程进行加密处理(S106)。采用本发明提供的上述技术方案,解决了相关技术中通话双方通话内容容易被窃听的问题,进而提升了用户体验,保证了企业和金融机构的利益和终端品牌价值。

Description

通话的加密处理方法及装置 技术领域 本发明涉及通信领域, 更具体地说, 涉及通话的加密处理方法及装置。 背景技术 央视曝光手机窃听软件内幕, 其能够实时监听电话短信。 通过网上销售的某种手 机监听器或手机监听软件, 手机机主的谈话内容就可能会在机主不知情的情况下被别 人远程窃听。 除了手机型监听设备外, 一些手机监听软件在网上生意也十分红火。 现 有技术中已存在相关软件, 自称是"世界上最强大的手机监控软件", 商家宣称, 除了 具备一般监听功能外, 还能安装在电脑上或手机上远程监控, 哪怕是对方手机处于待 机状态, 周围的环境声也能听到。软件从 2006年上市以来, 目前已经发展更新到了第 三代。 另有媒体报道, 目前多款具有监听、窃密功能的窃听软件居然在网络上公开叫卖。 很多软件给出的宣称语是: "监听、 跟踪、 婚恋调查、 企业窃密, 一个软件统统搞定", 而据卖家表示, 这类软件不受手机系统限制。 由于销售窃听软件等犯罪活动利润率堪比贩毒, 犯罪分子不惜铤而走险; 另一方 面, 此类犯罪多在网上进行, 流动性极强, 加之网络交易记录极易销毁, 调查取证难 度很大。 目前, 手机作为人们最贴身设备, 承载个人信息越来越重要, 而这些信息一旦被 陌生人获取, 就会造成机主信息安全以及网银被盗等财产安全威胁, 重要的是, 而对 于大多数金融机构来说, 他们还需要提防来自执法机构的窃听, 并且很多公司还面临 着商业间谍活动的威胁, 企业对电话进行加密的原因不一而足。 针对相关技术中通话过程容易被窃听的问题, 目前尚未提出有效的解决方案。 发明内容 本发明实施例提供了一种通话的加密处理方法及装置, 以至少解决上述问题。 为了达到上述目的,根据本发明的一个实施例,提供了一种通话的加密处理方法, 包括: 第一终端向第二终端发起呼叫请求; 在所述呼叫请求的触发下, 所述第一终端 与所述第二终端协商确定对通话过程中的通话内容进行加密的通话密钥; 所述第一终 端根据所述通话密钥对所述通话过程进行加密处理。 优选地, 所述第一终端与所述第二终端进行协商, 确定对通话过程中的通话内容 进行加解密处理的密钥, 包括: 所述第一终端和所述第二终端根据所述第一终端提供的第一密钥和所述第二终端 提供的第二密钥按照预设规则协商确定所述通话密钥。 优选地, 所述预设规则包括: 对所述第一密钥和所述第二密钥进行异或处理。 优选地, 所示第一终端和所述第二终端通过根据所述第一终端提供的第一密钥和 所述第二终端提供的第二密钥按照预设规则协商确定所述通话密钥, 包括: 所述第一终端和所述第二终端分别通过第一外接设备和第二外接设备协商确定所 述通话密钥, 所述第一密钥和所述第二密钥分别存储于所述第一外接设备和所述第二 外接设备。 优选地, 第一终端向第二终端发起呼叫请求之前, 还包括: 所述第一终端获取本机存储的第一设备认证码, 以及所述第一外接设备中存储的 第二设备认证码; 所述第一终端比较所述第一设备认证码和所述第二设备认证码, 其中, 在相同的 情况下, 显示所述通话的登录界面, 并提示用户输入第一密码口令; 所述第一终端比较所述第一密码口令与预先存储在所述第一外接设备内的第二密 码口令是否一致, 如果一致, 则进入所述通话过程的电话拨打界面。 优选地, 所述通话的拨打界面上设置有加密通话选项和非加密通话选项, 在所述 加密通话选项被触发时, 触发所述第一终端与所述第二终端协商确定所述通话密钥。 优选地, 所述第一和 /或第二外接设备为安装于所述终端中的 TF卡。 为了达到上述目的, 根据本发明的另一个实施例, 还提供了一种通话的加密处理 装置, 应用于第一终端, 包括: 发起模块, 设置为向第二终端发起呼叫请求; 确定模 块, 设置为在所述呼叫请求的触发下, 与所述第二终端协商确定对通话过程中的通话 内容进行加密的通话密钥; 加密处理模块, 设置为根据所述通话密钥对所述通话过程 进行加密处理。 优选地, 所述确定模块, 设置为和所述第二终端根据所述第一终端提供的第一密 钥和所述第二终端提供的第二密钥按照预设规则协商确定所述通话密钥。 优选地, 所述确定模块, 还设置为和所述第二终端分别通过第一外接设备和第二 外接设备协商确定所述通话密钥, 所述第一密钥和所述第二密钥分别存储于所述第一 外接设备和所述第二外接设备。 通过本发明实施例, 采用第一终端和第二终端共同协商确定通话过程中的通话密 钥, 进而通过确定的通话密钥对通话过程进行加密处理的技术方案, 解决了相关技术 中通话双方通话内容容易被窃听的问题, 进而提升了用户体验, 保证了企业和金融机 构的利益和终端品牌价值。 附图说明 此处所说明的附图用来提供对本发明的进一步理解, 构成本申请的一部分, 本发 明的示意性实施例及其说明用于解释本发明, 并不构成对本发明的不当限定。 在附图 中: 图 1为根据本发明实施例的通话的加密处理方法的流程图; 图 2为根据本发明实施例的第一终端示意图; 图 3为根据本发明优选实施例的通话的加密处理方法的流程图; 图 4为根据本发明优选实施例的终端示意图; 图 5为根据本发明实施例的通话的加密处理装置的结构框图; 图 6为根据本发明实施例的终端结构框图。 具体实施方式 下文中将参考附图并结合实施例来详细说明本发明。 需要说明的是, 在不冲突的 情况下, 本申请中的实施例及实施例中的特征可以相互组合。 本发明的其它特征和优点将在随后的说明书中阐述, 并且, 部分地从说明书中变 得显而易见, 或者通过实施本发明而了解。 本发明的目的和其他优点可通过在所写的 说明书、 权利要求书、 以及附图中所特别指出的结构来实现和获得。 本发明实施例提供了一种通话的加密处理方法, 图 1为根据本发明实施例的通话 的加密处理方法的流程图, 如图 1所示, 该方法包括如下步骤: 步骤 S102: 第一终端向第二终端发起呼叫请求; 步骤 S104: 在呼叫请求的触发下, 第一终端与第二终端协商确定对通话过程中的 通话内容进行加密的通话密钥; 步骤 S106: 第一终端根据通话密钥对通话过程进行加密处理。 通过上述各个步骤, 采用第一终端和第二终端共同协商确定通话过程中的通话密 钥, 进而通过确定的通话密钥对通话过程进行加密处理的技术方案, 解决了相关技术 中通话双方通话内容容易被窃听的问题, 进而提升了用户体验, 保证了企业和金融机 构的利益和终端品牌价值。 需要说明的是, 本发明实施例中的执行主体可以为第一终端和 /或第二终端, 在本 发明的一个优选实施例中, 其还可以是终端的外接设备, 例如 T卡, 即 TF卡, 又称 Micro SD, 是一种极细小的快闪存储器卡。 在步骤 S104中,第一终端和第二终端根据第一终端提供的第一密钥和第二终端提 供的第二密钥按照预设规则协商确定通话密钥, 可选地, 预设规则可以为对第一密钥 和第二密钥进行异或处理。 在本发明实施例中, 第一终端和第二终端通过根据第一终端提供的第一密钥和第 二终端提供的第二密钥按照预设规则协商确定通话密钥, 包括: 第一终端和第二终端 分别通过第一外接设备和第二外接设备协商确定通话密钥, 第一密钥和第二密钥分别 存储于第一外接设备和第二外接设备, 本发明实施例综合考虑了第一终端和第二终端 两侧, 第一终端和第二终端均提供一个密钥, 进而确定最终的通话密钥, 能够有效的 保证通话过程被第三方窃取。 在步骤 S102之前, 即第一终端向第二终端发起呼叫请求之前,在另一个可选的示 例中, 还包括: 第一终端获取本机存储的第一设备认证码, 以及第一外接设备中存储 的第二设备认证码; 第一终端比较第一设备认证码和第二设备认证码, 其中, 在相同 的情况下, 显示通话的登录界面, 并提示用户输入第一密码口令; 第一终端比较第一 密码口令与预先存储在第一外接设备内的第二密码口令是否一致, 如果一致, 则进入 通话过程的电话拨打界面, 本示例实现第一外接设备和第一终端绑定的过程, 需要说 明的是, 第一外接设备中的第一设备认证码是可以后续进行更改的。 在本发明的另一个优选实施例中, 图 2为根据本发明实施例的第一终端示意图, 如图 2所示, 还包括: 通话的拨打界面上设置有加密通话选项和非加密通话选项, 在 加密通话选项被触发时, 触发第一终端与第二终端协商确定通话密钥。 在具体实施过程中, 第一和 /或第二外接设备为安装于终端中的 TF卡。 为了更好的理解上述实施例的技术方案, 以下结合一个优选实施例进行说明。 图 3为根据本发明优选实施例的通话的加密处理方法的流程图, 如图 3所示, 该 方法包括: 步骤 301 : 手机开机, 启动客户端。 判断 TF卡(即上述实施例中的 T卡)是否为 专用 TF卡, 若是专用 TF卡则执行下一步, 否则进入普通手机流程。 步骤 302: 卡内保存有设备认证码, 若和设备内已经存储的设备认证码相同则显 示口令输入界面, 要求用户输入口令。 并将用户口令送入 TF卡, 由 TF卡验证口令是 否正确。 口令正确, TF卡进入登陆状态; 口令不正确, 由客户端提示用户重新输入。 步骤 303 : 用户拨打电话。 主叫终端 A通过界面上用户拨打的标示是普通视频通 话还是加密可视通话来和被叫终端 B互通。 通话建立前先进行密钥协商, 通话密钥由通话双方 TF卡共同协商决定, 最后使 用的密钥由双方各自提供的密钥进行异或得到。
64k通道成功建立后, 参与双方分别向对方提供三次协商数据, 由对方处理, 并 返回处理状态。 三次交互完成后, 双方各自判断协商是否成功, 将协商成功与否的结 果显示给用户。 步骤 304: 如果来话标识的是普通视频通话, b切换到普通视频通话流程, 不再送 加密模块进行密钥鉴权, 此时开始振铃, 提示用户接听电话,进入正常的普通视频通话 流程。 步骤 305 : 如果来话标识的是加加密视频通话, 手机 B进入密钥鉴权阶段, 先启 动安全模块, 此时开始振铃, 提示用户接听电话。 图 4为根据本发明优选实施例的终端示意图, 如图 4所示, 可以更好的理解上述 步骤 304-305中的手机 B的选择过程。 步骤 306: 用户通话后结束加密可视电话或普通视频电话。 在本实施例中还提供了一种通话的加密处理装置, 应用于第一终端, 用于实现上 述实施例及优选实施方式, 已经进行过说明的不再赘述, 下面对该装置中涉及到的模 块进行说明。 如以下所使用的, 术语 "模块"可以实现预定功能的软件和 /或硬件的组 合。 尽管以下实施例所描述的装置较佳地以软件来实现, 但是硬件, 或者软件和硬件 的组合的实现也是可能并被构想的。 图 5为根据本发明实施例的通话的加密处理装置 的结构框图。 如图 5所示, 该装置包括: 发起模块 50, 设置为向第二终端发起呼叫请求; 确定模块 52, 与发起模块 50连接, 设置为在呼叫请求的触发下, 与第二终端协 商确定对通话过程中的通话内容进行加密的通话密钥; 加密处理模块 54, 与确定模块 52连接, 设置为根据通话密钥对通话过程进行加 密处理。 在本实施例中, 确定模块 52, 设置为和第二终端根据第一终端提供的第一密钥和 第二终端提供的第二密钥按照预设规则协商确定通话密钥。 本发明实施例对上述技术方案的进一步改进在于, 确定模块 52, 还设置为和第二 终端分别通过第一外接设备和第二外接设备协商确定通话密钥, 所述第一密钥和所述 第二密钥分别存储于所述第一外接设备和所述第二外接设备。 通过上述各个模块的综合作用, 采用第一终端和第二终端共同协商确定通话过程 中的通话密钥, 进而通过确定的通话密钥对通话过程进行加密处理的技术方案, 解决 了相关技术中通话双方通话内容容易被窃听的问题, 进而提升了用户体验, 保证了企 业和金融机构的利益和终端品牌价值。 以下结合一个示例对上述技术方案进行说明, 但不限定本发明的保护范围, 图 6 为根据本发明实施例的终端结构框图, 如图 6所示, 通过在现有移动终端中增加专用 T卡存储区模块、 登录模块, 修改可视电话拨打模块功能具体如下:
( 1 ) T卡存储区模块用来存放卡内保存有设备认证码及提供加减密接口。 (2) 修改目前可视电话模块界面, 在其中增加拨打保密可视电话按钮。 综上所述, 本发明实施例实现了以下有益效果: 解决了相关技术中通话双方通话 内容容易被窃听的问题, 进而提升了用户体验, 保证了企业和金融机构的利益和终端 品牌价值。 在另外一个实施例中, 还提供了一种软件, 该软件用于执行上述实施例及优选实 施方式中描述的技术方案。 在另外一个实施例中, 还提供了一种存储介质, 该存储介质中存储有上述软件, 该存储介质包括但不限于: 光盘、 软盘、 硬盘、 可擦写存储器等。 显然, 本领域的技术人员应该明白, 上述的本发明的各模块或各步骤可以用通用 的计算装置来实现, 它们可以集中在单个的计算装置上, 或者分布在多个计算装置所 组成的网络上, 可选地, 它们可以用计算装置可执行的程序代码来实现, 从而, 可以 将它们存储在存储装置中由计算装置来执行, 并且在某些情况下, 可以以不同于此处 的顺序执行所示出或描述的步骤, 或者将它们分别制作成各个集成电路模块, 或者将 它们中的多个模块或步骤制作成单个集成电路模块来实现。 这样, 本发明不限制于任 何特定的硬件和软件结合。 以上仅为本发明的优选实施例而已, 并不用于限制本发明, 对于本领域的技术人 员来说, 本发明可以有各种更改和变化。 凡在本发明的精神和原则之内, 所作的任何 修改、 等同替换、 改进等, 均应包含在本发明的保护范围之内。 工业实用性 本发明提供的上述技术方案, 可以应用于通话的加密处理过程中, 采用第一终端 和第二终端共同协商确定通话过程中的通话密钥, 进而通过确定的通话密钥对通话过 程进行加密处理的技术方案,解决了相关技术中通话双方通话内容容易被窃听的问题, 进而提升了用户体验, 保证了企业和金融机构的利益和终端品牌价值。

Claims

权 利 要 求 书
1. 一种通话的加密处理方法, 包括: 第一终端向第二终端发起呼叫请求;
在所述呼叫请求的触发下, 所述第一终端与所述第二终端协商确定对通话 过程中的通话内容进行加密的通话密钥; 所述第一终端根据所述通话密钥对所述通话过程进行加密处理。
2. 根据权利要求 1所述的方法, 其中, 所述第一终端与所述第二终端进行协商, 确定对通话过程中的通话内容进行加解密处理的密钥, 包括: 所述第一终端和所述第二终端根据所述第一终端提供的第一密钥和所述第 二终端提供的第二密钥按照预设规则协商确定所述通话密钥。
3. 根据权利要求 2所述的方法, 其中, 所述预设规则包括: 对所述第一密钥和所 述第二密钥进行异或处理。
4. 根据权利要求 2所述的方法, 其中, 所示第一终端和所述第二终端通过根据所 述第一终端提供的第一密钥和所述第二终端提供的第二密钥按照预设规则协商 确定所述通话密钥, 包括: 所述第一终端和所述第二终端分别通过第一外接设备和第二外接设备协商 确定所述通话密钥, 所述第一密钥和所述第二密钥分别存储于所述第一外接设 备和所述第二外接设备。
5. 根据权利要求 4所述的方法, 其中, 第一终端向第二终端发起呼叫请求之前, 还包括: 所述第一终端获取本机存储的第一设备认证码, 以及所述第一外接设备中 存储的第二设备认证码;
所述第一终端比较所述第一设备认证码和所述第二设备认证码, 其中, 在 相同的情况下, 显示所述通话的登录界面, 并提示用户输入第一密码口令; 所述第一终端比较所述第一密码口令与预先存储在所述第一外接设备内的 第二密码口令是否一致, 如果一致, 则进入所述通话过程的电话拨打界面。
6. 根据权利要求 5所述的方法, 其中, 所述通话的拨打界面上设置有加密通话选 项和非加密通话选项, 在所述加密通话选项被触发时, 触发所述第一终端与所 述第二终端协商确定所述通话密钥。
7. 根据权利要求 4-6任一项所述的方法, 其中, 所述第一和 /或第二外接设备为安 装于所述终端中的 T卡。
8. 一种通话的加密处理装置, 应用于第一终端, 包括: 发起模块, 设置为向第二终端发起呼叫请求;
确定模块, 设置为在所述呼叫请求的触发下, 与所述第二终端协商确定对 通话过程中的通话内容进行加密的通话密钥; 加密处理模块, 设置为根据所述通话密钥对所述通话过程进行加密处理。
9. 根据权利要求 8所述的装置, 其中, 所述确定模块, 设置为和所述第二终端根 据所述第一终端提供的第一密钥和所述第二终端提供的第二密钥按照预设规则 协商确定所述通话密钥。
10. 根据权利要求 9所述的装置, 其中, 所述确定模块, 还设置为和所述第二终端 分别通过第一外接设备和第二外接设备协商确定所述通话密钥, 所述第一密钥 和所述第二密钥分别存储于所述第一外接设备和所述第二外接设备。
PCT/CN2014/084431 2014-06-17 2014-08-14 通话的加密处理方法及装置 WO2015192454A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410271651.4A CN105246070A (zh) 2014-06-17 2014-06-17 通话的加密处理方法及装置
CN201410271651.4 2014-06-17

Publications (1)

Publication Number Publication Date
WO2015192454A1 true WO2015192454A1 (zh) 2015-12-23

Family

ID=54934748

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/084431 WO2015192454A1 (zh) 2014-06-17 2014-08-14 通话的加密处理方法及装置

Country Status (2)

Country Link
CN (1) CN105246070A (zh)
WO (1) WO2015192454A1 (zh)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101635823A (zh) * 2009-08-27 2010-01-27 中兴通讯股份有限公司 一种终端对视频会议数据进行加密的方法及系统
CN101931949A (zh) * 2010-08-11 2010-12-29 中兴通讯股份有限公司 一种移动终端间明话和密话通信切换的方法及系统
CN102572817A (zh) * 2010-12-21 2012-07-11 普天信息技术研究院有限公司 实现移动通信保密的方法和智能存储卡

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1115924C (zh) * 1999-09-09 2003-07-23 深圳市中兴通讯股份有限公司 手机加密的方法
US6980658B1 (en) * 1999-09-30 2005-12-27 Qualcomm Incorporated Method and apparatus for encrypting transmissions in a communication system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101635823A (zh) * 2009-08-27 2010-01-27 中兴通讯股份有限公司 一种终端对视频会议数据进行加密的方法及系统
CN101931949A (zh) * 2010-08-11 2010-12-29 中兴通讯股份有限公司 一种移动终端间明话和密话通信切换的方法及系统
CN102572817A (zh) * 2010-12-21 2012-07-11 普天信息技术研究院有限公司 实现移动通信保密的方法和智能存储卡

Also Published As

Publication number Publication date
CN105246070A (zh) 2016-01-13

Similar Documents

Publication Publication Date Title
US9767807B2 (en) Digital voice signature of transactions
CN111431713B (zh) 一种私钥存储方法、装置和相关设备
CN105634737B (zh) 一种数据传输方法、终端及其系统
US20100316219A1 (en) Systems and methods for simultaneous integrated multiencrypted rotating key communication
US9660995B2 (en) Methods, systems, and computer readable media for combating device theft with user notarization
US20140362992A1 (en) Systems and Methods for Conducting Secure Wired and Wireless Networked Telephony
US20120128154A1 (en) Establishing a secure proximity pairing between electronic devices
US9621344B2 (en) Method and system for recovering a security credential
CN109146470A (zh) 生成付款码的方法及装置
US20200259828A1 (en) Providing access control and identity verification for communications when initiating a communication to an entity to be verified
CN105719131A (zh) 服务器、客户端及电子支付的代付方法
US11743255B2 (en) Providing access control and identity verification for communications when initiating a communication from an entity to be verified
US20200259845A1 (en) Providing access control and identity verification for communications when receiving a communication from an entity to be verified
CN104202163A (zh) 一种基于移动终端的密码系统
EP3340531A1 (fr) Procédé de restauration d'un secret d'un utilisateur
US11637827B2 (en) Providing access control and identity verification for communications when receiving a communication at an entity to be verified
US10334431B2 (en) Near field communications (NFC)-based offload of NFC operation
WO2020242700A1 (en) Providing access control and identity verification for communications
US20230275996A1 (en) Receiving a reason for a call from a user device
WO2016144806A2 (en) Digital voice signature of transactions
US20130343543A1 (en) User experience and method for promoting a low-assurance call to a high-assurance call on a calling device
CN104484801A (zh) 一种网吧安全支付方法
CN112671530B (zh) 一种数据处理方法、装置和用于数据处理的装置
TWI667591B (zh) Method for safely transferring pictures
WO2015192454A1 (zh) 通话的加密处理方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14895181

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14895181

Country of ref document: EP

Kind code of ref document: A1