WO2017166840A1 - 一种语音加密通信方法、主叫端、被叫端及系统 - Google Patents

一种语音加密通信方法、主叫端、被叫端及系统 Download PDF

Info

Publication number
WO2017166840A1
WO2017166840A1 PCT/CN2016/107811 CN2016107811W WO2017166840A1 WO 2017166840 A1 WO2017166840 A1 WO 2017166840A1 CN 2016107811 W CN2016107811 W CN 2016107811W WO 2017166840 A1 WO2017166840 A1 WO 2017166840A1
Authority
WO
WIPO (PCT)
Prior art keywords
encryption
called
calling
random number
subscriber identity
Prior art date
Application number
PCT/CN2016/107811
Other languages
English (en)
French (fr)
Inventor
徐杏绍
郭德英
Original Assignee
宇龙计算机通信科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 宇龙计算机通信科技(深圳)有限公司 filed Critical 宇龙计算机通信科技(深圳)有限公司
Priority to US16/090,248 priority Critical patent/US10887288B2/en
Publication of WO2017166840A1 publication Critical patent/WO2017166840A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/10Architectures or entities
    • H04L65/1016IP multimedia subsystem [IMS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data

Definitions

  • the present invention relates to the field of communications, and in particular, to a voice encrypted communication method, a calling terminal, a called terminal, and a system.
  • IMS IP Multimedia Subsystem
  • VoIP Voice over Long Term Evolution
  • IMS-based Voice service refers to the voice service architecture above the carrier network, so operators can provide a higher level of control and management for VoLTE.
  • VoLTE terminals With the use of VoLTE terminals and the low cost of VoLTE voice services, voice services based on IMS systems will be more and more widely used. However, since the voice signal is transmitted through the IP line with poor confidentiality, the IMS-based voice service is low in security.
  • the embodiment of the invention provides a voice communication method, a calling terminal, a called terminal and a system, so as to encrypt the voice signal in the process of voice communication, and improve the security of the voice service based on the IMS system.
  • a first aspect of the embodiments of the present invention provides a voice communication method, including:
  • the calling end establishes a data communication connection between the called end and the calling end;
  • a second aspect of the embodiments of the present invention provides a voice communication method, including:
  • the called end establishes a data communication connection between the calling end and the called end;
  • a third aspect of the embodiment of the present invention provides a calling terminal, including:
  • a first connection module configured to establish, by the calling end, a data communication connection between the called end and the calling end;
  • a first acquiring module configured to acquire a calling mobile terminal international mobile subscriber identity, a called international mobile subscriber identity, and a first encryption and decryption random number, and send the first encryption and decryption random number to the called terminal;
  • a first generating module configured to generate a first encryption by using a preset key generation algorithm by using the calling end international mobile subscriber identity, the called international mobile subscriber identity, and the first encryption and decryption random number Key
  • the encryption module is configured to encrypt the voice signal by using a preset encryption algorithm according to the first encryption key to obtain a first encrypted voice signal;
  • a sending module configured to send the first encrypted voice signal to the called end.
  • a fourth aspect of the embodiments of the present invention provides a called terminal, including:
  • a second connection module configured to establish, by the called end, a data communication connection between the calling end and the called end;
  • a second acquiring module configured to acquire a calling mobile terminal international mobile subscriber identity, a called terminal international mobile subscriber identity, and receive a first encryption and decryption random number sent by the calling terminal;
  • a receiving module configured to receive the first encrypted voice signal sent by the calling end
  • a second generating module configured to generate a first decryption key by using a preset key generation algorithm according to the calling end international mobile subscriber identity, the called international mobile subscriber identity, and the first encryption and decryption random number key;
  • the decryption module is configured to decrypt the first encrypted speech signal by using a preset encryption algorithm according to the first decryption key.
  • a fifth aspect of the embodiments of the present invention provides a voice communication system, including:
  • the calling end is the calling end provided by the third aspect of the embodiment of the present invention
  • the called end is the called end provided by the fourth aspect of the embodiment of the present invention.
  • the calling end establishes a data communication connection between the called end and the calling end, and the calling end acquires the IMSI of the calling end, the IMSI of the called end, and the first Encrypting the random number, and sending the first encrypted random number to the called end, and then the calling end uses the calling end IMSI, the called end IMSI, and the first encrypted random number to generate the first plus by using a preset key generation algorithm.
  • the key is used to encrypt the voice information according to the preset encryption algorithm to obtain the first encrypted voice signal, and finally the first encrypted voice signal is sent to the called end.
  • the first encryption key is generated by using the IMSI of the calling end, the IMSI of the called end, and the first encrypted random number, and the voice signal is encrypted by using a preset encryption algorithm, so that the encryption process is highly targeted, highly confidential, and improved. Voice business security.
  • IMS network-based voice communication uses an IP network for communication, communication costs are saved.
  • FIG. 1 is a schematic flow chart of a first embodiment of a voice communication method according to an embodiment of the present invention
  • FIG. 2 is a schematic flowchart diagram of a second embodiment of a voice communication method according to an embodiment of the present disclosure
  • FIG. 3 is a schematic flowchart diagram of a third embodiment of a voice communication method according to an embodiment of the present disclosure
  • FIG. 3 is a schematic structural diagram of a first embodiment of a communication terminal according to an embodiment of the present invention.
  • FIG. 4 is a schematic flowchart diagram of a fourth embodiment of a voice communication method according to an embodiment of the present invention.
  • FIG. 5-a is a schematic flowchart diagram of a fifth embodiment of a voice communication method according to an embodiment of the present disclosure
  • FIG. 5-b is a flowchart of a voice communication network according to an embodiment of the present invention.
  • FIG. 6 is a schematic structural diagram of a first embodiment of a calling end according to an embodiment of the present disclosure
  • FIG. 7 is a schematic structural diagram of a second embodiment of a calling end according to an embodiment of the present disclosure.
  • FIG. 8 is a schematic structural diagram of a first embodiment of a called end according to an embodiment of the present disclosure.
  • FIG. 9 is a schematic structural diagram of a second embodiment of a called end according to an embodiment of the present invention.
  • FIG. 10 is a schematic diagram of a voice communication system according to an embodiment of the present invention.
  • the embodiment of the invention provides a voice communication method, a calling terminal, a called terminal and a system, so as to encrypt the voice signal in the process of voice communication, and improve the security of the voice service based on the IMS system.
  • the calling or called terminal also called User Equipment (UE)
  • UE User Equipment
  • UE User Equipment
  • Common terminals include, for example, mobile phones, tablets, notebook computers, PDAs, mobile internet devices (MIDs), wearable devices such as smart watches, smart bracelets, pedometers, and the like.
  • the ciphertext is: oerwNtc uekS i yrt; here the encryption key is 526413.
  • the decryption process is just the opposite. After arranging the ciphertext in order, the data can be read by column replacement and then by row.
  • Multiple means two or more. "and/or”, describing the association relationship of the associated objects, indicating that there may be three relationships, for example, A and/or B, which may indicate that there are three cases where A exists separately, A and B exist at the same time, and B exists separately.
  • the character "/" generally indicates that the contextual object is an "or" relationship.
  • a voice communication method includes: a calling end establishes a data communication connection between a called end and the calling end; and acquires an international mobile subscriber identification code and a called party of the calling end Transmitting an international mobile subscriber identity code and a first encryption and decryption random number, and transmitting the first encryption and decryption random number to the called terminal; using the calling terminal international mobile subscriber identity, the called international mobile subscriber And the first encryption and decryption random number is generated by using a preset key generation algorithm; and the voice signal is encrypted by using a preset encryption algorithm according to the first encryption key to obtain a first encrypted voice signal. Transmitting the first encrypted speech signal to the called end.
  • FIG. 1 is a schematic flowchart diagram of a first embodiment of a voice communication method according to an embodiment of the present invention.
  • the first embodiment of the voice communication method provided by the embodiment of the present invention may include the following steps:
  • the calling end establishes a data communication connection between the called end and the calling end.
  • the calling end refers to a user equipment that actively initiates a voice call during a voice communication process
  • the called end refers to a user equipment that performs voice communication with the calling end by receiving a voice call of the calling end during the voice communication process.
  • a data communication connection is established between the calling end and the called end based on the IMS network.
  • a signaling connection is first established between the calling end and the called end to implement signaling communication between the calling end and the called end, and then a service communication connection is established between the calling end and the called end.
  • S102 Acquire a calling end international mobile subscriber identity, a called international mobile subscriber identity, and a first encryption and decryption random number, and send the first encryption and decryption random number to the called terminal.
  • the International Mobile Subscriber Identification Number is a logo that distinguishes mobile users and is stored in the SIM card and can be used to distinguish valid information of mobile users. Therefore, the calling end IMSI can be used to identify the identity of the calling end user, and the called end IMSI can be used to identify the identity of the called end user.
  • the SIMI number of the calling end and the SIMI number of the called end are obtained during the signaling communication.
  • the first encryption and decryption random number refers to a random number generated by the random number generating unit in the calling end encryption module at the first moment, and the random number generating unit generates different encryption and decryption random numbers at different times.
  • the encryption module may generate different random numbers RAND every certain period of time, so that the security of the user information may be enhanced.
  • the time period may be 64s, 128s, or the like. .
  • the first encryption and decryption random number may be sent to the called end by the established data communication connection between the calling end and the called end, preferably between the calling end and the called end.
  • the signaling route is sent.
  • S103 Generate a first encryption key by using a preset key generation algorithm by using the calling end international mobile subscriber identity, the called international mobile subscriber identity, and the first encryption and decryption random number.
  • the preset key generation algorithm is an encryption algorithm for generating an encryption key, which is preset in the calling end encryption module.
  • the preset key generation algorithm has three input parameters and one Output parameters.
  • the encryption key refers to an encryption key used when encrypting by using a preset encryption algorithm.
  • the preset key generation algorithm takes the calling end IMSI, the called end IMSI, and the first encryption and decryption random number as input parameters, and outputs a first encryption key.
  • the preset key generation algorithm may be an algorithm for encrypting global mobile communication system cellular communication, specifically, A3 and A8 algorithms, so that the calling end The first encryption key is calculated by using two different algorithms A3 and A8 with the calling end IMSI, the called end IMSI and the first encryption and decryption random number as input parameters.
  • the preset encryption algorithm refers to an algorithm for encrypting a voice signal preset in the terminal, and the encryption algorithm may be a matrix displacement encryption algorithm mentioned in the explanation of some words in the beginning of the embodiment of the present invention. There are simple displacement encryption algorithms in the technology.
  • the preset encryption algorithm is a matrix displacement encryption algorithm.
  • the complexity of the matrix displacement encryption algorithm depends on the matrix row and column M, N, and the column transformation order, and the matrix row and column M, N, and column transformation order values are determined by the key Kc generated by the complex algorithm, and Random changes.
  • a key Kc corresponds to a combination of matrix rows and columns M, N, and column transformation order.
  • the random number RAND is different, and different keys Kc can be generated, corresponding to different matrix rows and columns M, N, and column transformation order.
  • the voice signal needs to be converted into a Pulse Code Modulation (PCM) digital code stream consisting of 0 and 1 characters, so that the voice signal can be encrypted by using a matrix displacement encryption algorithm.
  • PCM Pulse Code Modulation
  • a correspondence table of the key Kc and the matrix row and column M, N, and the column transformation order is stored in the calling end, so that the correspondence table of the key Kc and the matrix row and column M, N, and column transformation order can be used.
  • the speech signal transformed into the PCM digital code stream is subjected to matrix transform encryption using the key Kc.
  • the matrix displacement encryption algorithm used is also periodically changed according to Kc.
  • the calling end first encodes, interleaves, and modulates the encrypted PCM digital stream voice signal, and then sends the encoded voice signal to the called end.
  • the calling end establishes a data communication connection between the called end and the calling end, and the calling end acquires the IMSI of the calling end, the IMSI of the called end, and the first encrypted random number. And sending the first encrypted random number to the called end, and then the calling end uses the preset IMSI, the called IMSI, and the first encrypted random number to generate a first encryption key by using a preset key generation algorithm, and The voice information is encrypted according to the matrix displacement encryption algorithm by using the encryption key to obtain a first encrypted voice signal, and finally the first encrypted voice signal is sent to the called end.
  • the first encryption key is generated by using the IMSI of the calling end, the IMSI of the called end, and the first encrypted random number, and the voice signal is encrypted by using a preset encryption algorithm, so that the encryption process is highly targeted, highly confidential, and improved. Voice business security.
  • the IMS network-based voice communication uses an IP network for communication, the section About communication costs.
  • the method further includes:
  • the calling end acquires the second encryption and decryption random number after a preset time interval in a process of performing data communication with the called end;
  • the second encryption and decryption random number is also a random number generated by the random number generating unit in the calling end encryption module at the second moment, and the random number is different from the first random number generated by the random number generating unit at the first moment. .
  • the encryption is performed by using a preset encryption algorithm by generating different encryption and decryption random numbers by the encryption module of the calling end at different times and generating different encryption keys. Therefore, since the encryption key is continuously changed during the encryption process of the voice communication, the matrix displacement mode is changed to improve the encryption security.
  • FIG. 2 is a schematic flowchart diagram of a second embodiment of a voice communication method according to an embodiment of the present invention.
  • the second embodiment of the voice communication method provided by the embodiment of the present invention may include the following steps:
  • the calling end establishes a data communication connection between the called end and the calling end.
  • the calling end inputs the called IMSI number into the encryption module of the calling end to establish a one-to-one encrypted channel with the called end.
  • the calling end first establishes signaling routing between the called end and the called end, so as to implement signaling communication between the calling end and the called end, and prepare for subsequent voice service communication.
  • S202 Acquire a calling end international mobile subscriber identity, a called international mobile subscriber identity, and a first encryption and decryption random number, and send the first encryption and decryption random number to the called terminal.
  • S203 Generate a first encryption key by using a preset key generation algorithm by using a calling end international mobile subscriber identity, a called international mobile subscriber identity, and a first encryption and decryption random number.
  • the calling end acquires a second encryption and decryption random number after a preset time interval in a process of performing data communication with the called end.
  • the second encryption and decryption random number is different from the first encryption and decryption random number.
  • S207 Generate a second encryption key by using a preset key generation algorithm by using a calling end international mobile subscriber identity, a called international mobile subscriber identity, and a second encryption and decryption random number.
  • the second encryption key is different from the first encryption key.
  • the matrix displacement manner used in the process of specifically encrypting the voice signal is different.
  • the calling end first encodes, interleaves, and modulates the second encrypted voice signal, and then passes the encoded voice signal to the antenna, and then sends the encoded voice signal to the called end through the IMS network.
  • the calling end establishes a data communication connection between the called end and the calling end, and the calling end acquires the IMSI of the calling end, the IMSI of the called end, and the first encrypted random number. And sending the first encrypted random number to the called end, and then the calling end uses the preset IMSI, the called IMSI, and the first encrypted random number to generate a first encryption key by using a preset key generation algorithm, and The voice information is encrypted according to a preset encryption algorithm by using the encryption key to obtain a first encrypted voice signal, and finally the first encrypted voice signal is sent to the called end.
  • the first encryption key is generated by using the IMSI of the calling end, the IMSI of the called end, and the first encrypted random number, and the voice signal is encrypted by using a preset encryption algorithm, so that the encryption process is highly targeted, has high confidentiality, and improves voice. Business security.
  • IMS network-based voice communication uses an IP network for communication, communication costs are saved.
  • the embodiment of the present invention further provides a voice communication method, where a voice communication method includes: a called end establishes a data communication connection between a calling end and the called end; and receives a first encryption sent by the calling end Voice signal; obtaining the international mobile subscriber identity of the calling party and the international mobile subscriber identity of the called party And receiving the first encryption and decryption random number sent by the calling end; and using the calling mobile terminal international mobile subscriber identity, the called international mobile subscriber identity, and the first encryption and decryption random number
  • the key generation algorithm generates a first decryption key; and decrypts the first encrypted speech signal according to the first decryption key by using a preset encryption algorithm.
  • FIG. 3 is a schematic flowchart diagram of a third embodiment of a voice communication method according to an embodiment of the present invention.
  • the third embodiment of the voice communication method provided by the embodiment of the present invention may include the following steps:
  • the called end establishes a data communication connection between the calling end and the called end.
  • a data communication connection is established between the calling end and the called end based on the IMS network.
  • a signaling connection is first established between the calling end and the called end to implement signaling communication between the calling end and the called end, and then a service communication connection is established between the calling end and the called end.
  • the International Mobile Subscriber Identification Number is a logo that distinguishes mobile users and is stored in the SIM card and can be used to distinguish valid information of mobile users. Therefore, the calling end IMSI can be used to identify the identity of the calling end user, and the called end IMSI can be used to identify the identity of the called end user.
  • the first encryption and decryption random number refers to the encryption and decryption random number sent by the calling end received by the called end at the first moment.
  • the called end may receive the first encryption and decryption random number sent by the calling end by using a data communication connection between the calling end and the called end, preferably, by the calling end and the called end.
  • the inter-signaling route receives the first encryption and decryption random number.
  • the called end since the calling end establishes a signaling connection with the called end to implement signaling communication, the called end can extract the IMSI number of the calling end by receiving the signaling sent by the calling end.
  • the called end receives the first encrypted voice signal through the service route between the calling end and the called end, and specifically receives the information through a Media Gateway (MGW).
  • MGW Media Gateway
  • the called end needs to deinterleave, decode, and demodulate the first encrypted speech signal, and then generate the initially decoded speech signal. Decrypt.
  • the preset key generation algorithm is an encryption algorithm for generating an encryption key, which is preset in the calling end encryption module.
  • the preset key generation algorithm has three input parameters and one Output parameters.
  • the decryption key refers to a decryption key used when encrypting by using a preset encryption algorithm, and the decryption key is a key corresponding to an encryption key used when encrypting using a preset encryption algorithm, that is, When the key is decrypted using the preset encryption algorithm, the voice signal before encryption can be restored.
  • the preset key generation algorithm takes the calling end IMSI, the called end IMSI, and the first encryption and decryption random number as input parameters, and outputs a first decryption key.
  • the preset key generation algorithm may be an algorithm for encrypting global mobile communication system cellular communication, specifically, A3 and A8 algorithms, so that the called party The terminal uses the calling end IMSI, the called end IMSI and the first encryption and decryption random number as input parameters, and uses the two different algorithms A3 and A8 to calculate the first decryption key.
  • the preset encryption algorithm refers to an algorithm for encrypting a voice signal preset in the terminal, and the encryption algorithm may be a matrix displacement encryption algorithm mentioned in the explanation of some words in the beginning of the embodiment of the present invention. There are simple displacement encryption algorithms in the technology.
  • the preset encryption algorithm is a matrix displacement encryption algorithm.
  • a correspondence table of the key Kc and the matrix row and column M, N, and column transformation order is stored in the called end, so that the correspondence table of the key Kc and the matrix row and column M, N, and column transformation order can be used.
  • the initially decoded speech signal is decrypted by the matrix transform encryption algorithm using the key Kc to obtain the same speech signal as in the calling end.
  • the matrix displacement encryption algorithm used is also periodically changed according to Kc.
  • the decryption process is the reverse process of the process of encrypting by using the preset encryption algorithm in the calling end, that is, after decrypting the first encrypted voice signal, the decryption process will be obtained before the encryption in the calling end. voice signal.
  • steps S302 and S303 is not limited, that is, the order in which the called end receives the first encrypted speech signal and the first encryption and decryption random number has no strict sequence, but the received first encrypted speech
  • the signal corresponds to the first encryption and decryption random number, that is, the first encryption and decryption random number is used to decrypt the first encrypted speech signal.
  • the called end establishes a data communication connection between the calling end and the called end, acquires the IMSI of the calling end, the IMSI of the called end, and receives the first sending sent by the calling end. Decrypting the random number and the first encrypted speech signal, and then the called end generates a first decryption key by using a preset key generation algorithm according to the calling end IMSI, the called end IMSI, and the first encryption/decryption random number, and finally reusing The first decryption key decrypts the first encrypted speech signal using a predetermined encryption algorithm.
  • IMS network-based voice communication uses an IP network for communication, communication costs are saved.
  • the method further includes:
  • the second encryption and decryption random number refers to an encryption and decryption random number sent by the calling end from the calling end, and the second encryption and decryption random number is different from the first encryption and decryption random number, and the second The encrypted and decrypted random number corresponds to the second encrypted voice signal received by the called end, so that the called end receives the new second encrypted and decrypted random number sent by the autonomous calling terminal at the second moment to utilize the second
  • the encryption and decryption random number regenerates the second decryption key, and then decrypts the second encrypted speech signal by using a preset encryption algorithm.
  • FIG. 4 is a schematic flowchart diagram of a fourth embodiment of a voice communication method according to an embodiment of the present invention.
  • the fourth embodiment of the voice communication method provided by the embodiment of the present invention may include the following steps:
  • the called end establishes a data communication connection between the calling end and the called end.
  • a data communication connection is established between the calling end and the called end based on the IMS network.
  • a signaling connection is first established between the calling end and the called end to implement signaling communication between the calling end and the called end, and then a service communication connection is established between the calling end and the called end.
  • S402. Acquire an international mobile subscriber identity code of the calling end, an international mobile subscriber identity of the called party, and receive a first encryption and decryption random number sent by the calling end.
  • step S403 and step S404 are not strictly sequential, but the first encrypted speech signal received in step S403 corresponds to the first encrypted and decrypted random number received in step S404, that is, The first encryption and decryption random number is used to decrypt the first encrypted speech signal.
  • the called end receives the second encrypted voice signal and the second encrypted and decrypted random number sent by the calling end during data communication with the calling end.
  • the second encrypted speech signal is different from the first encrypted speech signal, and the second encrypted and decrypted random number is different from the first encrypted and decrypted random number.
  • the second encryption/decryption random number corresponds to the second encrypted speech signal, that is, the second encryption/decryption random number is used to decrypt the second encrypted speech signal.
  • the encrypted random number received at the same time matches the encrypted voice signal at that moment, that is, the encrypted random number at that time is used to decrypt the currently encrypted voice signal.
  • the second decryption key is different from the first decryption key.
  • the called end establishes a data communication connection between the calling end and the called end, acquires the IMSI of the calling end, the IMSI of the called end, and receives the first sending sent by the calling end. Decrypting the random number and the first encrypted speech signal, and then the called end generates a first decryption key by using a preset key generation algorithm according to the calling end IMSI, the called end IMSI, and the first encryption/decryption random number, and finally reusing The first decryption key decrypts the first encrypted speech signal using a predetermined encryption algorithm.
  • IMS network-based voice communication uses an IP network for communication, communication costs are saved.
  • FIG. 5-a is a schematic flowchart of a fifth embodiment of a voice communication method according to an embodiment of the present invention.
  • the fifth embodiment of the voice communication method provided by the embodiment of the present invention may include the following steps:
  • FIG. 5-b is a flowchart of a voice communication network according to an embodiment of the present invention, where the calling end establishes a data communication connection between the called end and the calling end, including the following steps:
  • the calling end inputs the IMSI number of the called end into the encryption module, so as to establish a one-to-one encryption channel with the called end;
  • the calling end After the registration of the IMS system is successful, the calling end initiates a Volte service request to the called end, and the calling end establishes a PPP in the IMS system according to the Session Initiation Protocol (SIP signaling) and the called end. (Point-to-Point Protocol) connection;
  • SIP signaling Session Initiation Protocol
  • the serving gateway (Serving GateWay, SGW for short) negotiates with the calling end, and the PDN gateway (PDN GateWay, referred to as PGW) assigns an IP address to the calling end;
  • the service call session control function processes the session request, and sends a session request 200 ACK command to the called end through the IMS network;
  • the called end receives the 200ACK command sent by the calling end and returns a 200 OK command to the calling end;
  • the called end first establishes a signaling connection with the calling end, and then establishes a data communication connection.
  • the calling end acquires the calling mobile terminal international mobile subscriber identity code, the called terminal international mobile subscriber identity code, and the first encryption and decryption random number, and sends the first encryption and decryption random number to the called terminal.
  • the calling terminal performs analog-to-digital conversion on the voice signal to convert into a PCM digital code stream consisting of 0 and 1 characters.
  • the called end acquires the calling party international mobile subscriber identity, the called party international mobile subscriber identity, and receives the first encryption and decryption random number sent by the calling party.
  • the calling end generates a first encryption key by using a preset key generation algorithm by using a calling end international mobile subscriber identity, a called international mobile subscriber identity, and a first encryption and decryption random number.
  • the calling end generates a key Kc according to the IMSI number of the calling end, the IMSI number of the called end, and the first encryption and decryption random number, and Kc corresponds to a matrix row, M, N, and column transformation.
  • Kc corresponds to a matrix row, M, N, and column transformation.
  • the order is then subjected to matrix displacement method encryption of the speech digital code stream according to the matrix rank M, N, and column transformation order.
  • the calling end encrypts the voice signal by using a matrix displacement encryption algorithm according to the first encryption key to obtain a first encrypted voice signal.
  • the calling end sends the first encrypted voice signal to the called end.
  • the first encrypted voice signal is encapsulated in a SIP/UDP/IP packet, and is compressed, and then encrypted.
  • the code stream is encoded; after the coded stream is interleaved and encoded, it is sent through the antenna of the mobile phone; finally, the signal is received by the base station and then enters the mobile network, the internet network, and the MGW, and then sent to the called end.
  • the encryption module generates different encryption and decryption random numbers RAND at regular intervals, so that the calling end transformation matrix displacement mode encrypts the voice signal.
  • the called end receives the first encrypted voice signal sent by the calling end.
  • the called end after receiving the first encrypted speech signal sent by the calling end, the called end performs preliminary decoding by using a deinterleaving code modulator.
  • the called end generates a first decryption key by using a preset key generation algorithm according to the calling end international mobile subscriber identity, the called international mobile subscriber identity, and the first encryption and decryption random number.
  • the called end decrypts the first encrypted voice signal by using a matrix displacement encryption algorithm according to the first decryption key.
  • the called end generates a key Kc according to the IMSI number of the calling end, the IMSI number of the called end, and the encryption and decryption random number RAND, and the Kc corresponds to a matrix row and column M, N, and column transformation order, and then the voice digital code stream.
  • the matrix displacement method is decrypted.
  • the called end decapsulates the SIP/UDP/IP packet and restores it into a PCM digital signal stream; and then restores to a voice stream by analog-to-digital conversion (A/D conversion).
  • A/D conversion analog-to-digital conversion
  • the calling end establishes a data communication connection between the called end and the calling end, and the calling end acquires the IMSI of the calling end, the IMSI of the called end, and the first encrypted random number. And sending the first encrypted random number to the called end, and then the calling end uses the preset IMSI, the called IMSI, and the first encrypted random number to generate a first encryption key by using a preset key generation algorithm, and The encrypted information is encrypted according to a preset encryption algorithm to obtain a first encrypted voice signal, and finally the first encrypted voice signal is sent to the called end; the called end establishes a relationship between the calling end and the called end.
  • the data communication connection acquires the IMSI of the calling end and the IMSI of the called end, and receives the first encrypted and decrypted random number sent by the calling end and the first encrypted voice signal, and then the called end is further based on the IMSI and the called end of the calling end.
  • the IMSI and the first encryption/decryption random number generate a first decryption key by using a preset key generation algorithm, and finally use the first decryption key to decrypt the first encrypted speech signal using a preset encryption algorithm.
  • the first encryption key is generated by using the IMSI of the calling end, the IMSI of the called end, and the first encrypted random number, and the voice signal is encrypted by using a preset encryption algorithm, so that the encryption process is highly targeted, has high confidentiality, and improves voice. Business security.
  • IMS network-based voice communication uses an IP network for communication, communication costs are saved.
  • An embodiment of the present invention further provides a calling end, where the calling end includes:
  • a first connection module configured to establish, by the calling end, a data communication connection between the called end and the calling end;
  • a first acquiring module configured to acquire a calling mobile terminal international mobile subscriber identity, a called international mobile subscriber identity, and a first encryption and decryption random number, and send the first encryption and decryption random number to the called terminal;
  • a first generating module configured to generate a first encryption by using a preset key generation algorithm by using the calling end international mobile subscriber identity, the called international mobile subscriber identity, and the first encryption and decryption random number Key
  • the encryption module is configured to encrypt the voice signal by using a preset encryption algorithm according to the first encryption key to obtain a first encrypted voice signal;
  • a sending module configured to send the first encrypted voice signal to the called end.
  • FIG. 6 is a schematic structural diagram of a first embodiment of a calling end according to an embodiment of the present invention.
  • the calling end 600 may include:
  • the first connection module 610, the first acquisition module 620, the first generation module 630, the encryption module 640, and the transmission module 650 are configured to transmit and transmit.
  • the first connection module 610 is configured to establish a data communication connection between the called end and the calling end.
  • the calling end refers to a user equipment that actively initiates a voice call during a voice communication process
  • the called end refers to a user equipment that performs voice communication with the calling end by receiving a voice call of the calling end during the voice communication process.
  • a data communication connection is established between the calling end and the called end based on the IMS network.
  • a signaling connection is first established between the calling end and the called end to implement signaling communication between the calling end and the called end, and then a service communication connection is established between the calling end and the called end.
  • the first obtaining module 620 is configured to obtain a calling mobile terminal international mobile subscriber identity, a called international mobile subscriber identity, and a first encryption and decryption random number, and send the first encryption and decryption random number to the called terminal.
  • the International Mobile Subscriber Identification Number is a logo that distinguishes mobile users and is stored in the SIM card and can be used to distinguish valid information of mobile users. Therefore, the calling end IMSI can be used to identify the identity of the calling end user, and the called end IMSI can be used to identify the identity of the called end user.
  • the signaling communication process is performed.
  • the SIMI number of the calling end and the SIMI number of the called end will be obtained.
  • the first encryption and decryption random number refers to a random number generated by the random number generating unit in the calling end encryption module at the first moment, and the random number generating unit generates different encryption and decryption random numbers at different times.
  • the encryption module may generate different random numbers RAND every certain period of time, so that the security of the user information may be enhanced.
  • the time period may be 64s, 128s, or the like. .
  • the first encryption and decryption random number may be sent to the called end by the established data communication connection between the calling end and the called end, preferably between the calling end and the called end.
  • the signaling route is sent.
  • the first generating module 630 is configured to generate, by using the calling end international mobile subscriber identity, the called international mobile subscriber identity, and the first encryption and decryption random number, using a preset key generation algorithm to generate a first Encryption key.
  • the preset key generation algorithm is an encryption algorithm for generating an encryption key, which is preset in the calling end encryption module.
  • the preset key generation algorithm has three input parameters and one Output parameters.
  • the encryption key refers to an encryption key used when encrypting by using a preset encryption algorithm.
  • the preset key generation algorithm takes the calling end IMSI, the called end IMSI, and the first encryption and decryption random number as input parameters, and outputs a first encryption key.
  • the preset key generation algorithm may be an algorithm for encrypting global mobile communication system cellular communication, specifically, A3 and A8 algorithms, so that the calling end The first encryption key is calculated by using two different algorithms A3 and A8 with the calling end IMSI, the called end IMSI and the first encryption and decryption random number as input parameters.
  • the encryption module 640 is configured to encrypt the voice signal by using a preset encryption algorithm according to the first encryption key to obtain a first encrypted voice signal.
  • the preset encryption algorithm refers to an algorithm for encrypting a voice signal preset in the terminal, and the encryption algorithm may be a matrix displacement encryption algorithm mentioned in the explanation of some words in the beginning of the embodiment of the present invention. There are simple displacement encryption algorithms in the technology.
  • the preset encryption algorithm is a matrix displacement encryption algorithm.
  • the complexity of the matrix displacement encryption algorithm depends on the matrix ranks M, N,
  • the column transformation order, the matrix row and column M, N, and column transformation order values are determined by the key Kc generated by the complex algorithm, and may be randomly changed.
  • a key Kc corresponds to a combination of matrix rows and columns M, N, and column transformation order.
  • the random number RAND is different, and different keys Kc can be generated, corresponding to different matrix rows and columns M, N, and column transformation order.
  • the voice signal needs to be converted into a Pulse Code Modulation (PCM) digital code stream consisting of 0 and 1 characters, so that the voice signal can be encrypted by using a matrix displacement encryption algorithm.
  • PCM Pulse Code Modulation
  • a correspondence table of the key Kc and the matrix row and column M, N, and the column transformation order is stored in the calling end, so that the correspondence table of the key Kc and the matrix row and column M, N, and column transformation order can be used.
  • the speech signal transformed into the PCM digital code stream is subjected to matrix transform encryption using the key Kc.
  • the matrix displacement encryption algorithm used is also periodically changed according to Kc.
  • the sending module 650 is configured to send the first encrypted voice signal to the called end.
  • the calling end first encodes, interleaves, and modulates the encrypted PCM digital stream voice signal, and then sends the encoded voice signal to the called end.
  • IMS network-based voice communication uses an IP network for communication, communication costs are saved.
  • the first obtaining module 620 is further configured to: after the preset time is separated, the calling end is in a process of performing data communication with the called end Obtaining the second encryption and decryption random number;
  • the first generating module 630 is further configured to: generate, by using the preset key, the calling mobile terminal international mobile subscriber identity, the called international mobile subscriber identity, and the second encryption and decryption random number.
  • the algorithm generates a second encryption key
  • the encryption module 640 is further configured to: encrypt the voice signal by using a preset encryption algorithm according to the second encryption key to obtain a second encrypted voice signal;
  • the sending module 650 is further configured to: send the second encrypted voice signal to the called end.
  • the second encryption and decryption random number is also a random number generated by the random number generating unit in the calling end encryption module at the second moment, and the random number is different from the first random number generated by the random number generating unit at the first moment. .
  • the calling end 600 establishes a data communication connection between the called end and the calling end 600, and the calling end 600 acquires the IMSI of the calling end, the IMSI of the called end, and the first encryption. Random number, and the first encrypted random number is sent to the called end, and then the calling end 600 re-uses the calling end IMSI, the called end IMSI, and the first encrypted random number to generate the first plus by using a preset key generation algorithm.
  • the key is used to encrypt the voice information according to the preset encryption algorithm to obtain the first encrypted voice signal, and finally the first encrypted voice signal is sent to the called end.
  • the first encryption key is generated by using the IMSI of the calling end, the IMSI of the called end, and the first encrypted random number, and the voice signal is encrypted by using a preset encryption algorithm, so that the encryption process is highly targeted, highly confidential, and improved. Voice business security.
  • FIG. 7 is a schematic structural diagram of a second embodiment of a calling terminal according to an embodiment of the present invention.
  • the communication terminal 700 may include: at least one bus 701 and at least one connected to the bus.
  • the processor 702 is coupled to at least one memory 703 coupled to the bus.
  • the processor 702 calls the code stored in the memory 703 through the bus 701 to establish a data communication connection between the called end and the calling end, and acquires the international mobile subscriber identity of the calling party. Calling the international mobile subscriber identity code and the first encryption and decryption random number, and transmitting the first encryption and decryption random number to the called terminal; using the calling terminal international mobile subscriber identity code, the called terminal international mobile a user identification code and the first encryption and decryption random number, using a preset key generation algorithm to generate a first encryption key; and encrypting the voice signal by using a preset encryption algorithm according to the first encryption key to obtain a first encrypted voice Signaling: transmitting the first encrypted speech signal to the called end.
  • the processor 702 is further configured to:
  • the calling end acquires the second encryption and decryption random number after a preset time interval in a process of performing data communication with the called end;
  • the preset key generation algorithm is an algorithm for encrypting global mobile communication system cellular communication.
  • the calling end 700 establishes a data communication connection between the called end and the calling end 700, and the calling end 700 acquires the IMSI of the calling end, the IMSI of the called end, and the first encryption. Random number, and the first encrypted random number is sent to the called end, and then the calling end 700 reuses the calling end IMSI, the called end IMSI, and the first encrypted random number to generate the first plus by using a preset key generation algorithm.
  • the key is used to encrypt the voice information according to the preset encryption algorithm to obtain the first encrypted voice signal, and finally the first encrypted voice signal is sent to the called end.
  • the first encryption key is generated by using the IMSI of the calling end, the IMSI of the called end, and the first encrypted random number, and the voice signal is encrypted by using a preset encryption algorithm, so that the encryption process is highly targeted, highly confidential, and improved. Voice business security.
  • An embodiment of the present invention further provides a called end, where the called end includes:
  • a second connection module configured to establish, by the called end, a data communication connection between the calling end and the called end;
  • a second acquiring module configured to acquire a calling mobile terminal international mobile subscriber identity, a called terminal international mobile subscriber identity, and receive a first encryption and decryption random number sent by the calling terminal;
  • a receiving module configured to receive the first encrypted voice signal sent by the calling end
  • a second generating module configured to generate a first decryption key by using a preset key generation algorithm according to the calling end international mobile subscriber identity, the called international mobile subscriber identity, and the first encryption and decryption random number key;
  • the decryption module is configured to decrypt the first encrypted speech signal by using a preset encryption algorithm according to the first decryption key.
  • FIG. 8 is a schematic structural diagram of a first embodiment of a called end according to an embodiment of the present invention.
  • the called end 800 may include:
  • the second connection module 810, the second acquisition module 820, the receiving module 830, and the second generation module 840 And decryption module 850 are provided.
  • the second connection module 810 is configured to establish a data communication connection between the calling end and the called end.
  • a data communication connection is established between the calling end and the called end based on the IMS network.
  • a signaling connection is first established between the calling end and the called end to implement signaling communication between the calling end and the called end, and then a service communication connection is established between the calling end and the called end.
  • the second obtaining module 820 is configured to obtain a calling mobile terminal international mobile subscriber identity, a called party international mobile subscriber identity, and receive the first encryption and decryption random number sent by the calling party.
  • the International Mobile Subscriber Identification Number is a logo that distinguishes mobile users and is stored in the SIM card and can be used to distinguish valid information of mobile users. Therefore, the calling end IMSI can be used to identify the identity of the calling end user, and the called end IMSI can be used to identify the identity of the called end user.
  • the first encryption and decryption random number refers to the encryption and decryption random number sent by the calling end received by the called end at the first moment.
  • the called end may receive the first encryption and decryption random number sent by the calling end by using a data communication connection between the calling end and the called end, preferably, by the calling end and the called end.
  • the inter-signaling route receives the first encryption and decryption random number.
  • the called end since the calling end establishes a signaling connection with the called end to implement signaling communication, the called end can extract the IMSI number of the calling end by receiving the signaling sent by the calling end.
  • the receiving module 830 is configured to receive the first encrypted voice signal sent by the calling end.
  • the called end receives the first encrypted voice signal through the service route between the calling end and the called end, and specifically receives the information through a Media Gateway (MGW).
  • MGW Media Gateway
  • the called end after receiving the first encrypted voice signal sent by the calling end, the called end needs to deinterleave, decode, and demodulate the first encrypted voice signal, and then generate the first decoded voice signal before decrypting. .
  • the second generating module 840 is configured to generate a first decryption by using a preset key generation algorithm according to the calling end international mobile subscriber identity, the called international mobile subscriber identity, and the first encryption and decryption random number. Key.
  • the preset key generation algorithm refers to a preset for generating encryption in the calling end encryption module.
  • the encryption algorithm of the key in the embodiment of the present invention, the preset key generation algorithm has three input parameters and one output parameter.
  • the decryption key refers to a decryption key used when encrypting by using a preset encryption algorithm, and the decryption key is a key corresponding to an encryption key used when encrypting using a preset encryption algorithm, that is, When the key is decrypted using the preset encryption algorithm, the voice signal before encryption can be restored.
  • the preset key generation algorithm takes the calling end IMSI, the called end IMSI, and the first encryption and decryption random number as input parameters, and outputs a first decryption key.
  • the preset key generation algorithm may be an algorithm for encrypting global mobile communication system cellular communication, specifically, A3 and A8 algorithms, so that the called party The terminal uses the calling end IMSI, the called end IMSI and the first encryption and decryption random number as input parameters, and uses the two different algorithms A3 and A8 to calculate the first decryption key.
  • the decryption module 850 is configured to decrypt the first encrypted speech signal according to the first decryption key by using a preset encryption algorithm.
  • the preset encryption algorithm refers to an algorithm for encrypting a voice signal preset in the terminal, and the encryption algorithm may be a matrix displacement encryption algorithm mentioned in the explanation of some words in the beginning of the embodiment of the present invention. There are simple displacement encryption algorithms in the technology.
  • the preset encryption algorithm is a matrix displacement encryption algorithm.
  • a correspondence table of the key Kc and the matrix row and column M, N, and column transformation order is stored in the called end, so that the correspondence table of the key Kc and the matrix row and column M, N, and column transformation order can be used.
  • the initially decoded speech signal is decrypted by the matrix transform encryption algorithm using the key Kc to obtain the same speech signal as in the calling end.
  • the matrix displacement encryption algorithm used is also periodically changed according to Kc.
  • the decryption process is the reverse process of the process of encrypting by using the matrix displacement encryption algorithm in the calling end, that is, after decrypting the first encrypted voice signal, the decryption process will be obtained before the encryption in the calling end. Voice signal.
  • the receiving module 830 is further configured to: the called end receives the sending of the calling end during data communication with the calling end. a second encrypted speech signal and a second encrypted and decrypted random number;
  • the second generation module 840 is further configured to: according to the calling terminal international mobile subscriber identity, The called international mobile subscriber identity code and the second encryption and decryption random number generate a second decryption key by using a preset key generation algorithm;
  • the decryption module 850 is further configured to: decrypt the second encrypted voice signal by using a preset encryption algorithm according to the second decryption key.
  • the second encryption and decryption random number refers to an encryption and decryption random number sent by the calling end from the calling end, and the second encryption and decryption random number is different from the first encryption and decryption random number, and the second The encrypted and decrypted random number corresponds to the second encrypted voice signal received by the called end, so that the called end receives the new second encrypted and decrypted random number sent by the autonomous calling terminal at the second moment to utilize the second
  • the encryption and decryption random number regenerates the second decryption key, and then decrypts the second encrypted speech signal by using a preset encryption algorithm.
  • the called end 800 establishes a data communication connection between the calling end and the called end 800, acquires the IMSI of the calling end, the IMSI of the called end, and receives the first sent by the calling end. Decrypting the random number and the first encrypted speech signal, and then the called terminal 800 generates a first decryption key by using a preset key generation algorithm according to the calling end IMSI, the called end IMSI, and the first encryption/decryption random number. Finally, the first encrypted speech signal is decrypted using the first encryption key using a preset encryption algorithm.
  • IMS network-based voice communication uses an IP network for communication, communication costs are saved.
  • FIG. 9 is a schematic structural diagram of a second embodiment of a called terminal according to an embodiment of the present invention.
  • the called terminal 900 may include: at least one bus 901, and at least connected to the bus.
  • the processor 902 calls the code stored in the memory 903 through the bus 901 for the called party.
  • the terminal establishes a data communication connection between the calling end and the called end; acquires the calling party international mobile subscriber identity, the called international mobile subscriber identity, and receives the first encryption and decryption randomly sent by the calling party Receiving a first encrypted voice signal sent by the calling terminal; using a preset according to the calling end international mobile subscriber identity, the called international mobile subscriber identity, and the first encryption and decryption random number
  • the key generation algorithm generates a first decryption key; and decrypts the first encrypted speech signal according to the first decryption key by using a preset encryption algorithm.
  • the processor 902 is further configured to:
  • the method further includes:
  • the called end 900 establishes a data communication connection between the calling end and the called end 900, acquires the IMSI of the calling end, the IMSI of the called end, and receives the first sent by the calling end. Decrypting the random number and the first encrypted speech signal, and then the called terminal 900 generates a first decryption key by using a preset key generation algorithm according to the calling end IMSI, the called end IMSI, and the first encryption/decryption random number. Finally, the first encrypted speech signal is decrypted using the first encryption key using a preset encryption algorithm.
  • IMS network-based voice communication uses an IP network for communication, communication costs are saved.
  • FIG. 10 is a schematic diagram of a voice communication system according to an embodiment of the present invention.
  • a voice communication system 1000 according to an embodiment of the present invention may specifically include:
  • the calling end 1010 is configured to establish a data communication connection between the calling end 1020 and the calling end 1010.
  • the calling end 1010 is further configured to acquire a calling mobile terminal ID 1010, an international mobile subscriber identity code of the called party, and a first encryption and decryption random number, and send the first encryption and decryption random number to the calling party.
  • the calling terminal 1010 is further configured to generate, by using the calling terminal 1010 international mobile subscriber identity, the called international mobile subscriber identity, and the first encryption and decryption random number, using a preset key generation algorithm.
  • First encryption key First encryption key
  • the calling end 1010 is further configured to: encrypt the voice signal by using a preset encryption algorithm according to the first encryption key to obtain a first encrypted voice signal;
  • the calling end 1010 is further configured to send the first encrypted voice signal to the calling terminal 1020.
  • the calling end 1010 is further configured to acquire the second encryption and decryption after a preset time interval in a process of performing data communication with the calling terminal 1020. random number;
  • the calling end 1010 is further configured to use the calling end international mobile subscriber identity, the called international mobile subscriber identity, and the Two encryption and decryption random numbers, using a preset key generation algorithm to generate a second encryption key;
  • the calling end 1010 is further configured to: use the preset encryption algorithm to encrypt the voice signal according to the second encryption key to obtain a second encrypted voice signal;
  • the calling end 1010 is further configured to send the second encrypted voice signal to the calling end 1020.
  • the preset key generation algorithm is an algorithm for encrypting global mobile communication system cellular communication.
  • the called end 1020 is configured to establish a data communication connection between the calling end 1010 and the calling end 1020;
  • the called end 1020 is further configured to obtain a calling mobile terminal international mobile subscriber identity code, a called party international mobile subscriber identity code, and receive the first encryption and decryption random number sent by the calling terminal 1010;
  • the called end 1020 is further configured to receive the first encrypted voice signal sent by the calling terminal 1010.
  • the called end 1020 is further configured to generate a first solution by using a preset key generation algorithm according to the calling end international mobile subscriber identity, the called international mobile subscriber identity, and the first encryption and decryption random number.
  • the called end 1020 is further configured to decrypt the first encrypted voice signal by using a preset encryption algorithm according to the first decryption key.
  • the called end 1020 is further configured to receive the second encrypted voice signal sent by the calling terminal 1010 during data communication with the calling terminal 1010. And a second encryption and decryption random number;
  • the called end 1020 is further configured to: according to the calling end international mobile subscriber identity, the called international mobile subscriber identity, and the second Decrypting the random number to generate a second decryption key by using a preset key generation algorithm;
  • the called end 1020 is further configured to decrypt the second encrypted voice signal by using a preset encryption algorithm according to the second decryption key.
  • the voice communication system 1000 further includes:
  • the listening end 1030 is configured to: acquire, by the multimedia subsystem network node, the calling end international mobile subscriber identity, the called international mobile subscriber identity, the encryption and decryption random number, and the encrypted voice signal. ;
  • the listening end 1030 is further configured to: generate a decryption key by using a preset key generation algorithm according to the calling end international mobile subscriber identity, the called international mobile subscriber identity, and the encryption and decryption random number;
  • the listening end 1030 is further configured to: decrypt the encrypted voice signal by using a preset encryption algorithm according to the first decryption key.
  • the voice communication system 1000 establishes a data communication connection between the calling terminal 1020 and the calling terminal 1010, and the calling terminal 1010 acquires the IMSI of the calling terminal, the IMSI of the called terminal, and the first And encrypting the random number, and sending the first encrypted random number to the calling end 1020, and then the calling end 1010 uses the calling end IMSI, the called end IMSI, and the first encrypted random number to generate by using a preset key generation algorithm.
  • the first encryption key is used, and the voice information is encrypted according to a preset encryption algorithm to obtain a first encrypted voice signal, and finally the first encrypted voice signal is sent to the calling terminal 1020; the calling terminal 1020 establishes a master.
  • the data communication connection between the calling end 1010 and the calling end 1020 acquires the IMSI of the calling end and the IMSI of the called end, and receives the first encrypted and decrypted random number sent by the calling end 1010 and the first encrypted voice signal, and then the calling party
  • the terminal 1020 is further based on the calling end IMSI, the called end IMSI, and the first adding
  • the decrypted random number generates a first decryption key by using a preset key generation algorithm, and finally uses the first decryption key to decrypt the first encrypted voice signal using a preset encryption algorithm.
  • the first encryption key is generated by using the IMSI of the calling end, the IMSI of the called end, and the first encrypted random number, and the voice signal is encrypted by using a preset encryption algorithm, so that the encryption process is highly targeted, has high confidentiality, and improves voice. Business security.
  • IMS network-based voice communication uses an IP network for communication, communication costs are saved.
  • the communication terminal 400 establishes a network connection with the anti-theft associated device by starting the anti-theft communication card solidified in the communication terminal under the trigger of the preset anti-theft event, and the communication terminal 400 is further based on the The network connection communicates with the anti-theft association settings and ultimately sends the location information to the anti-theft associated device. Therefore, after the communication terminal is stolen, the data connection between the communication terminal and the background can be realized based on the non-removable anti-theft communication card in the communication terminal, so that the owner can locate the mobile phone.
  • the embodiment of the present invention further provides a computer storage medium, wherein the computer storage medium can store a program, and the program includes some or all of the steps of any of the voice communication methods described in the foregoing method embodiments.
  • the disclosed apparatus may be implemented in other ways.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or may be Integrate into another system, or some features can be ignored or not executed.
  • Another point, the mutual coupling or direct coupling or communication connection shown or discussed may be The indirect coupling or communication connection through some interfaces, devices or units may be in electrical or other form.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium.
  • the technical solution of the present invention which is essential or contributes to the prior art, or all or part of the technical solution, may be embodied in the form of a software product stored in a storage medium.
  • a number of instructions are included to cause a computer device (which may be a personal computer, server or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present invention.
  • the foregoing storage medium includes: a U disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic disk, or an optical disk, and the like. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Databases & Information Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

本发明实施例公开了一种语音通信方法、主叫端、被叫端及系统,一种语音通信方法,包括:主叫端建立被叫端与所述主叫端之间的数据通信连接;获取主叫端国际移动用户识别码、被叫端国际移动用户识别码以及第一加解密随机数并生成第一加密密钥;根据所述第一加密密钥利用预设加密算法对语音信号进行加密得到第一加密语音信号;将所述第一加密语音信号发送至所述被叫端。本发明实施例通过利用主叫端IMSI、被叫端IMSI以及第一加密随机数生成第一加密密钥,并使用预设加密算法对语音信号进行加密,从而使得加密过程用户针对性强,保密性高,提高语音业务安全性。

Description

一种语音加密通信方法、主叫端、被叫端及系统
本申请要求于2016年03月31日提交中国专利局,申请号为201610201062.8、发明名称为“一种语音加密通信方法、主叫端、被叫端及系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明涉及通信领域,具体涉及一种语音加密通信方法、主叫端、被叫端及系统。
背景技术
IMS(IP Multimedia Subsystem,IP多媒体子系统)是一种全新的多媒体业务形式,它能够满足现在的终端客户更新颖、更多样化多媒体业务的需求,VoLTE(Voice over Long Term Evolution,基于IMS的语音业务)指语音业务构架于运营商网络之上,从而运营商能够为VoLTE提供更高级别的控制和管理。
随着VoLTE终端的使用,以及VoLTE语音业务成本低廉的特点,基于IMS系统的语音业务将应用的越来越广泛。但是由于语音信号通过IP线路进行传输时保密性差,导致基于IMS的语音业务安全性低。
发明内容
本发明实施例提供了一种语音通信方法、主叫端、被叫端及系统,以期可以在语音通信的过程中对语音信号进行加密,提高基于IMS系统的语音业务的安全性。
本发明实施例第一方面提供一种语音通信方法,包括:
主叫端建立被叫端与所述主叫端之间的数据通信连接;
获取主叫端国际移动用户识别码、被叫端国际移动用户识别码以及第一加解密随机数,并将所述第一加解密随机数发送至被叫端;
利用所述主叫端国际移动用户识别码、所述被叫端国际移动用户识别码以及所述第一加解密随机数,使用预设密钥生成算法生成第一加密密钥;
根据所述第一加密密钥利用预设加密算法对语音信号进行加密得到第一加密语音信号;
将所述第一加密语音信号发送至所述被叫端。
本发明实施例第二方面提供一种语音通信方法,包括:
被叫端建立主叫端与所述被叫端之间的数据通信连接;
获取主叫端国际移动用户识别码、被叫端国际移动用户识别码并接收所述主叫端发送的第一加解密随机数;
接收所述主叫端发送的第一加密语音信号;
根据所述主叫端国际移动用户识别码、所述被叫端国际移动用户识别码以及所述第一加解密随机数利用预设密钥生成算法生成第一解密密钥;
根据所述第一解密密钥利用预设加密算法对所述第一加密语音信号进行解密。
本发明实施例第三方面提供一种主叫端,包括:
第一连接模块,设置为主叫端建立被叫端与所述主叫端之间的数据通信连接;
第一获取模块,设置为获取主叫端国际移动用户识别码、被叫端国际移动用户识别码以及第一加解密随机数,并将所述第一加解密随机数发送至被叫端;
第一生成模块,设置为利用所述主叫端国际移动用户识别码、所述被叫端国际移动用户识别码以及所述第一加解密随机数,使用预设密钥生成算法生成第一加密密钥;
加密模块,设置为根据所述第一加密密钥利用预设加密算法对语音信号进行加密得到第一加密语音信号;
发送模块,设置为将所述第一加密语音信号发送至所述被叫端。
本发明实施例第四方面提供一种被叫端,包括:
第二连接模块,设置为被叫端建立主叫端与所述被叫端之间的数据通信连接;
第二获取模块,设置为获取主叫端国际移动用户识别码、被叫端国际移动用户识别码并接收所述主叫端发送的第一加解密随机数;
接收模块,设置为接收所述主叫端发送的第一加密语音信号;
第二生成模块,设置为根据所述主叫端国际移动用户识别码、所述被叫端国际移动用户识别码以及所述第一加解密随机数利用预设密钥生成算法生成第一解密密钥;
解密模块,设置为根据所述第一解密密钥利用预设加密算法对所述第一加密语音信号进行解密。
本发明实施例第五方面提供一种语音通信系统,包括:
主叫端和被叫端;
其中,所述主叫端为本发明实施例第三方面提供的主叫端,所述被叫端为本发明实施例第四方面提供的被叫端。
可以看出,在本发明实施例提供的技术方案中,主叫端建立被叫端与主叫端之间的数据通信连接,主叫端再获取主叫端IMSI、被叫端IMSI以及第一加密随机数,并将该第一加密随机数发送至被叫端,然后主叫端再利用主叫端IMSI、被叫端IMSI以及第一加密随机数利用预设密钥生成算法生成第一加密钥,并利用该加密密钥根据预设加密算法对语音信息进行加密得到第一加密语音信号,最后将该第一加密语音信号发送至被叫端。通过利用主叫端IMSI、被叫端IMSI以及第一加密随机数生成第一加密密钥,并使用预设加密算法对语音信号进行加密,从而使得加密过程用户针对性强,保密性高,提高语音业务安全性。
更进一步地,由于基于IMS网络的语音通信使用的是IP网络进行通信,节约通信成本。
附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本发明实施例提供的一种语音通信方法的第一实施例流程示意图;
图2是本发明实施例提供的一种语音通信方法的第二实施例流程示意图;
图3是本发明实施例提供的一种语音通信方法的第三实施例流程示意图;
图3是本发明实施例提供的一种通信终端的第一实施例的结构示意图;
图4是本发明实施例提供的一种语音通信方法的第四实施例流程示意图;
图5-a是本发明实施例提供的一种语音通信方法的第五实施例流程示意图;
图5-b是本发明实施例提供的语音通信网络流程图;
图6是本发明实施例提供的一种主叫端的第一实施例的结构示意图;
图7是本发明实施例提供的一种主叫端的第二实施例的结构示意图;
图8是本发明实施例提供的一种被叫端的第一实施例的结构示意图;
图9是本发明实施例提供的一种被叫端的第二实施例的结构示意图;
图10是本发明实施例提供的一种语音通信系统的示意图。
具体实施方式
本发明实施例提供了一种语音通信方法、主叫端、被叫端及系统,以期可以在语音通信的过程中对语音信号进行加密,提高基于IMS系统的语音业务的安全性。
为了使本技术领域的人员更好地理解本发明方案,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分的实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都应当属于本发明保护的范围。
本发明的说明书和权利要求书及上述附图中的术语“第一”、“第二”和“第三”等是用于区别不同对象,而非用于描述特定顺序。此外,术语“包括”以及它们任何变形,意图在于覆盖不排他的包含。例如包含了一系列步骤或单元的过程、方法、系统、产品或设备没有限定于已列出的步骤或单元,而是可选地还包括没有列出的步骤或单元,或可选地还包括对于这些过程、方法、产品或设备固有的其它步骤或单元。
以下,对本申请中的部分用语进行解释说明,以便于本领域技术人员理解。
1)、主叫端或被叫端,又称之为用户设备(User Equipment,UE),是一种彼此之间可以进行数据通信的通信终端,例如,具有无线连接功能的手持式设备、车载设备等。常见的终端例如包括:手机、平板电脑、笔记本电脑、掌上电脑、移动互联网设备(mobile internet device,MID)、可穿戴设备,例如智能手表、智能手环、计步器等。
2)、矩阵变位加密算法:将明文中的字母按给定的顺序安排在一个矩阵中,然后用另一种顺序(也即加密密钥)选出矩阵的字母来产生密文。一般为按列变换次序,如原列次序为1 2 3 4 5 6,变为526413。如将明文Network Security按行排列在M×N(假定为3×6)矩阵中,如下所示:
1 2 3 4 5 6
N e t w o r
k S e c u
r i t y
给定一个置换:根据给定的次序,按5、2、6、4、1、3的列序重新排列,得到:
5 2 6 4 1 3
o e r w N t
c u e k S
i y r t
所以,密文为:oerwNtc uekS i yrt;此处加密密钥为526413。
解密过程正好相反,按序排列密文后,通过列置换再按行读取数据即可。
3)、“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。字符“/”一般表示前后关联对象是一种“或”的关系。
本发明实施例的一种语音通信方法,一种语音通信方法包括:主叫端建立被叫端与所述主叫端之间的数据通信连接;获取主叫端国际移动用户识别码、被叫端国际移动用户识别码以及第一加解密随机数,并将所述第一加解密随机数发送至被叫端;利用所述主叫端国际移动用户识别码、所述被叫端国际移动用户识别码以及所述第一加解密随机数,使用预设密钥生成算法生成第一加密密钥;根据所述第一加密密钥利用预设加密算法对语音信号进行加密得到第一加密语音信号;将所述第一加密语音信号发送至所述被叫端。
首先参见图1,图1是本发明实施例提供的一种语音通信方法的第一实施例流程示意图。如图1所示,本发明实施例提供的语音通信方法的第一实施例可以包括以下步骤:
S101、主叫端建立被叫端与所述主叫端之间的数据通信连接。
其中,主叫端是指在语音通信过程中主动发起语音呼叫的用户设备,被叫端是指在语音通信过程中通过接收到主叫端的语音呼叫而与主叫端进行语音通信的用户设备。
在本发明实施例中,主叫端与被叫端之间基于IMS网络建立数据通信连接。
具体地,主叫端和被叫端之间首先建立信令连接,实现主叫端与被叫端之间的信令通信,然后主叫端和被叫端之间再建立业务通信连接。
S102、获取主叫端国际移动用户识别码、被叫端国际移动用户识别码以及第一加解密随机数,并将所述第一加解密随机数发送至被叫端。
其中,国际移动用户识别码(International Mobile Subscriber Identification Number,简称IMSI)是区别移动用户的标志,储存在SIM卡中,可用于区别移动用户的有效信息。从而主叫端IMSI可用于标识主叫端用户身份,被叫端IMSI可用于标识被叫端用户身份。
具体的,在主叫端和被叫端之间建立信令连接后,在进行信令通信的过程中将会获取到主叫端SIMI号和被叫端SIMI号。
其中,第一加解密随机数是指主叫端加密模块中的随机数产生单元在第一时刻所产生的随机数,随机数产生单元在不同的时刻所产生的加解密随机数将不同。
可选地,在本发明的一些可能的实施方式中,加密模块每隔一定时间段可以产生不同随机数RAND,从而可以加强用户信息的安全性,具体地,该时间段可以为64s、128s等。
在本发明实施例中,第一加解密随机数可以通过主叫端与被叫端之间的所建立的数据通信连接发送至被叫端,优选地,通过主叫端与被叫端之间的信令路由进行发送。
S103、利用所述主叫端国际移动用户识别码、所述被叫端国际移动用户识别码以及所述第一加解密随机数,使用预设密钥生成算法生成第一加密密钥。
其中,预设密钥生成算法是指主叫端加密模块中预先设置的用于生成加密密钥的加密算法,在本发明实施例中,该预设密钥生成算法具有三个输入参数以及一个输出参数。
其中,加密密钥是指利用预设加密算法进行加密时所使用的加密密钥。
具体地,在本发明实施例中,该预设密钥生成算法以主叫端IMSI、被叫端IMSI以及第一加解密随机数为输入参数,并且输出第一加密密钥。
优选地,在本发明的一些可能的实施方式中,该预设密钥生成算法可以为用于对全球移动通讯系统蜂窝通信进行加密的算法,具体的,为A3和A8算法,从而主叫端以主叫端IMSI、被叫端IMSI以及第一加解密随机数为输入参数,利用两个不同的算法A3和A8计算得到第一加密密钥。
S104、根据所述第一加密密钥利用预设加密算法对语音信号进行加密得到 第一加密语音信号。
其中,预设加密算法是指终端中预设的用于对语音信号进行加密的算法,该加密算法可以为本发明实施例开头中部分用语解释说明处所提到的矩阵变位加密算法或现有技术中的简单变位加密算法。
优选地,该预设加密算法为矩阵变位加密算法。
在本发明实施例中,矩阵变位加密算法的复杂程度取决于矩阵行列M、N、列变换次序,矩阵行列M、N、列变换次序数值由通过复杂算法产生的密钥Kc决定,并且可以随机变化。一个密钥Kc对应一种矩阵行列M、N、列变换次序的组合方式,随机数RAND不同,可以产生不同的密钥Kc,对应不同的矩阵行列M、N、列变换次序。
具体的,需要将语音信号经过模数转换,转换为由0、1字符组成的脉冲编码调制(Pulse Code Modulation,简称PCM)数字码流,从而使得语音信号可以利用矩阵变位加密算法进行加密。
具体地,在主叫端中存储有密钥Kc和矩阵行列M、N、列变换次序的对应关系表,从而可以根据该密钥Kc和矩阵行列M、N、列变换次序的对应关系表,利用密钥Kc对经过变换成PCM数字码流后的语音信号进行矩阵变换加密。
具体地,由于加密密钥Kc定期改变,从而所使用的矩阵变位加密算法也根据Kc定期改变。
S105、将所述第一加密语音信号发送至所述被叫端。
具体地,主叫端首先将经过加密后的PCM数字码流语音信号进行编码、交织、调制后,再将编码后的语音信号发送至被叫端。
可以看出,本实施例的方案中,主叫端建立被叫端与主叫端之间的数据通信连接,主叫端再获取主叫端IMSI、被叫端IMSI以及第一加密随机数,并将该第一加密随机数发送至被叫端,然后主叫端再利用主叫端IMSI、被叫端IMSI以及第一加密随机数利用预设密钥生成算法生成第一加密钥,并利用该加密密钥根据矩阵变位加密算法对语音信息进行加密得到第一加密语音信号,最后将该第一加密语音信号发送至被叫端。通过利用主叫端IMSI、被叫端IMSI以及第一加密随机数生成第一加密密钥,并使用预设加密算法对语音信号进行加密,从而使得加密过程用户针对性强,保密性高,提高语音业务安全性。
更进一步地,由于基于IMS网络的语音通信使用的是IP网络进行通信,节 约通信成本。
可选地,在本发明的一些可能的实施方式中,所述方法还包括:
所述主叫端在与所述被叫端进行数据通信的过程中间隔预设时间后获取所述第二加解密随机数;
利用所述主叫端国际移动用户识别码、所述被叫端国际移动用户识别码以及所述第二加解密随机数,使用预设密钥生成算法生成第二加密密钥;
根据所述第二加密密钥利用预设加密算法对语音信号进行加密得到第二加密语音信号;
将所述第二加密语音信号发送至所述被叫端。
其中,第二加解密随机数也是指主叫端加密模块中的随机数产生单元在第二时刻所产生的随机数,该随机数与随机数产生单元在第一时刻产生的第一随机数不同。
可以理解,通过在不同的时刻由主叫端的加密模块产生不同的加解密随机数并生成不同的加密密钥,使用预设加密算法进行加密。从而由于语音通信加密过程中加密密钥不断变换,矩阵变位方式改变,提高加密安全性。
为了便于更好理解和实施本发明实施例的上述方案,下面结合一些具体的应用场景进行举例说明。
请参见图2,图2是本发明实施例提供的一种语音通信方法的第二实施例流程示意图。其中,如图2所示,本发明实施例提供的语音通信方法的第二实施例可以包括以下步骤:
S201、主叫端建立被叫端与主叫端之间的数据通信连接。
在本发明实施例中,主叫端将被叫端IMSI号输入到主叫端的加密模块中,以便建立和被叫端的一对一的加密通道。
在本发明实施例中,主叫端首先建立和被叫端之间的信令路由,从而以实现主叫端和被叫端之间的信令通信,为后续的语音业务通信做准备。
S202、获取主叫端国际移动用户识别码、被叫端国际移动用户识别码以及第一加解密随机数,并将该第一加解密随机数发送至被叫端。
S203、利用主叫端国际移动用户识别码、被叫端国际移动用户识别码以及第一加解密随机数,使用预设密钥生成算法生成第一加密密钥。
S204、根据第一加密密钥利用矩阵变位加密算法对语音信号进行加密得到 第一加密语音信号。
S205、将第一加密语音信号发送至被叫端。
S206、主叫端在与被叫端进行数据通信的过程中间隔预设时间后获取第二加解密随机数。
优选地,该第二加解密随机数和第一加解密随机数不同。
S207、利用主叫端国际移动用户识别码、被叫端国际移动用户识别码以及第二加解密随机数,使用预设密钥生成算法生成第二加密密钥。
优选地,该第二加密密钥和第一加密密钥不同。
S208、根据第二加密密钥利用矩阵变位加密算法对语音信号进行加密得到第二加密语音信号。
具体地,由于第一加密密钥和第二加密密钥不同,所以在具体对语音信号进行加密的过程中所使用的矩阵变位方式不一样。
S209、将第二加密语音信号发送至被叫端。
具体地,主叫端首先对该第二加密语音信号进行编码、交织、调制后,然后将编码后的语音信号通过天线,并经过IMS网络后送至被叫端。
需要说明,本发明实施例所提供的语音加密方法第二实施例步骤中与第一实施例步骤中相同的步骤在此不再赘述。
可以看出,本实施例的方案中,主叫端建立被叫端与主叫端之间的数据通信连接,主叫端再获取主叫端IMSI、被叫端IMSI以及第一加密随机数,并将该第一加密随机数发送至被叫端,然后主叫端再利用主叫端IMSI、被叫端IMSI以及第一加密随机数利用预设密钥生成算法生成第一加密钥,并利用该加密密钥根据预设加密算法对语音信息进行加密得到第一加密语音信号,最后将该第一加密语音信号发送至被叫端。通过利用主叫端IMSI、被叫端IMSI以及第一加密随机数生成第一加密密钥,并使用预设加密算法对语音信号进行加密,从而使得加密过程针对性强,保密性高,提高语音业务安全性。
更进一步地,由于基于IMS网络的语音通信使用的是IP网络进行通信,节约通信成本。
本发明实施例还提供一种语音通信方法,一种语音通信方法包括:被叫端建立主叫端与所述被叫端之间的数据通信连接;接收所述主叫端发送的第一加密语音信号;获取所述主叫端国际移动用户识别码、被叫端国际移动用户识别 码并接收所述主叫端发送的第一加解密随机数;根据所述主叫端国际移动用户识别码、所述被叫端国际移动用户识别码以及所述第一加解密随机数利用预设密钥生成算法生成第一解密密钥;根据所述第一解密密钥利用预设加密算法对所述第一加密语音信号进行解密。
请参见图3,图3是本发明实施例提供的一种语音通信方法的第三实施例流程示意图。如图3所示,本发明实施例提供的语音通信方法的第三实施例可以包括以下步骤:
S301、被叫端建立主叫端与被叫端之间的数据通信连接。
在本发明实施例中,主叫端与被叫端之间基于IMS网络建立数据通信连接。
具体地,主叫端和被叫端之间首先建立信令连接,实现主叫端与被叫端之间的信令通信,然后主叫端和被叫端之间再建立业务通信连接。
S302、获取主叫端国际移动用户识别码、被叫端国际移动用户识别码并接收所述主叫端发送的第一加解密随机数。
其中,国际移动用户识别码(International Mobile Subscriber Identification Number,简称IMSI)是区别移动用户的标志,储存在SIM卡中,可用于区别移动用户的有效信息。从而主叫端IMSI可用于标识主叫端用户身份,被叫端IMSI可用于标识被叫端用户身份。
其中,第一加解密随机数是指被叫端在第一时刻接收到的来自主叫端发送的加解密随机数。
在本发明实施例中,被叫端可通过主叫端和被叫端之间的数据通信连接接收主叫端发送的第一加解密随机数,优选地,通过主叫端与被叫端之间的信令路由接收该第一加解密随机数。
在本发明实施例中,由于主叫端与被叫端建立信令连接,实现信令通信,所以被叫端可通过接收到主叫端发送的信令提取出来主叫端的IMSI号。
S303、接收所述主叫端发送的第一加密语音信号。
在本发明实施例中,被叫端通过主叫端与被叫端之间的业务路由接收第一加密语音信号,具体地,通过媒体网关(Media Gateway,简称MGW)进行接收。
更进一步地,被叫端在接收到主叫端发送的第一加密语音信号后,需要对第一加密语音信号进行解交织、解码、解调后,生成初解码后的语音信号后再 进行解密。
S304、根据所述主叫端国际移动用户识别码、所述被叫端国际移动用户识别码以及所述第一加解密随机数利用预设密钥生成算法生成第一解密密钥。
其中,预设密钥生成算法是指主叫端加密模块中预先设置的用于生成加密密钥的加密算法,在本发明实施例中,该预设密钥生成算法具有三个输入参数以及一个输出参数。
其中,解密密钥是指利用预设加密算法进行加密时所使用的解密密钥,该解密密钥是与使用预设加密算法进行加密时所使用的加密密钥相对应的密钥,也即利用该密钥使用预设加密算法进行解密时,可以还原加密之前的语音信号。
具体地,在本发明实施例中,该预设密钥生成算法以主叫端IMSI、被叫端IMSI以及第一加解密随机数为输入参数,并且输出第一解密密钥。
优选地,在本发明的一些可能的实施方式中,该预设密钥生成算法可以为用于对全球移动通讯系统蜂窝通信进行加密的算法,具体的,为A3和A8算法,从而这被叫端以主叫端IMSI、被叫端IMSI以及第一加解密随机数为输入参数,利用两个不同的算法A3和A8计算得到第一解密密钥。
S305、根据所述第一解密密钥利用预设加密算法对所述第一加密语音信号进行解密。
其中,预设加密算法是指终端中预设的用于对语音信号进行加密的算法,该加密算法可以为本发明实施例开头中部分用语解释说明处所提到的矩阵变位加密算法或现有技术中的简单变位加密算法。
优选地,该预设加密算法为矩阵变位加密算法。
具体地,在被叫端中存储有密钥Kc和矩阵行列M、N、列变换次序的对应关系表,从而可以根据该密钥Kc和矩阵行列M、N、列变换次序的对应关系表,利用密钥Kc对经过初解码后的语音信号利用矩阵变换加密算法进行相应解密,以得到与主叫端中相同的语音信号。
具体地,由于解密密钥Kc定期改变,从而所使用的矩阵变位加密算法也根据Kc定期改变。
在本发明实施例中,该解密过程是与主叫端中利用预设加密算法进行加密的过程相反的过程,也即最后对第一加密语音信号进行解密后将得到主叫端中加密之前的语音信号。
需要说明,本实施中不对步骤S302和S303的顺序进行限制,也即被叫端接收第一加密语音信号与第一加解密随机数的顺序没有严格先后序列,但是该接收到的第一加密语音信号与第一加解密随机数是相对应的,也即该第一加解密随机数用于对第一加密语音信号进行解密。
可以看出,本实施例的方案中,被叫端建立主叫端与被叫端之间的数据通信连接,获取主叫端IMSI、被叫端IMSI,并接收主叫端发送的第一加解密随机数以及第一加密语音信号,然后被叫端再根据该主叫端IMSI、被叫端IMSI以及第一加解密随机数利用预设密钥生成算法生成第一解密密钥,最后再利用该第一解密密钥使用预设加密算法对第一加密语音信号进行解密。通过主叫端IMSI、被叫端IMSI以及从主叫端接收到的第一加解密随机数生成第一解密密钥,并使用预设加密算法对语音信号进行解密,从而使得语音解密过程用户针对性强,保密性高,提高语音业务安全性。
更进一步地,由于基于IMS网络的语音通信使用的是IP网络进行通信,节约通信成本。
可选地,在本发明的一些可能的实施方式中,所述方法还包括:
所述被叫端在与所述主叫端进行数据通信的过程中接收所述主叫端发送的第二加密语音信号和第二加解密随机数;
根据所述主叫端国际移动用户识别码、所述被叫端国际移动用户识别码以及所述第二加解密随机数利用预设密钥生成算法生成第二解密密钥;
根据所述第二解密密钥利用预设加密算法对所述第二加密语音信号进行解密。
其中,第二加解密随机数是指被叫端在第二时刻接收到的来自主叫端发送的加解密随机数,该第二加解密随机数与第一加解密随机数不同,该第二加解密随机数与被叫端接收到的第二加密语音信号相对应,从而被叫端在第二时刻接收到来自主叫端发送的新的第二加解密随机数后,以利用该第二加解密随机数重新生成第二解密密钥,再利用预设加密算法对第二加密语音信号进行解密。
可以理解,通过在不同的时刻接收到来自主叫端的不同的加解密随机数,并利用当前接收到的加解密随机数生成不同的解密密钥,并使用矩阵变位算法来对当前接收到的对应的语音信号进行解密。从而由于语音通信加密过程中解密密钥不断变换,矩阵变位方式改变,提高加密安全性。
为了便于更好理解和实施本发明实施例的上述方案,下面结合一些具体的应用场景进行举例说明。
参见图4,图4是本发明实施例提供的一种语音通信方法的第四实施例流程示意图。如图4所示,本发明实施例提供的语音通信方法的第四实施例可以包括以下步骤:
S401、被叫端建立主叫端与被叫端之间的数据通信连接。
在本发明实施例中,主叫端与被叫端之间基于IMS网络建立数据通信连接。
具体地,主叫端和被叫端之间首先建立信令连接,实现主叫端与被叫端之间的信令通信,然后主叫端和被叫端之间再建立业务通信连接。
S402、获取主叫端国际移动用户识别码、被叫端国际移动用户识别码并接收主叫端发送的第一加解密随机数。
S403、接收主叫端发送的第一加密语音信号。
S404、根据主叫端国际移动用户识别码、被叫端国际移动用户识别码以及第一加解密随机数利用预设密钥生成算法生成第一解密密钥。
在本发明实施例中,步骤S403和步骤S404没有严格的先后顺序,但是步骤S403中接收到的第一加密语音信号是与步骤S404中接收到的第一加解密随机数相对应的,也即该第一加解密随机数用于对第一加密语音信号进行解密。
S405、根据第一解密密钥利用矩阵变位加密算法对第一加密语音信号进行解密。
S406、被叫端在与主叫端进行数据通信的过程中接收主叫端发送的第二加密语音信号和第二加解密随机数。
其中,第二加密语音信号与第一加密语音信号不同,第二加解密随机数与第一加解密随机数不同。
在本发明实施例中,第二加解密随机数与第二加密语音信号相对应,也即第二加解密随机数用于对第二加密语音信号进行解密。
一般来说,在同一时刻接收到的加解密随机数与该时刻的加密语音信号相匹配,即该时刻的加解密随机数用于对当前加密语音信号进行解密。
S407、根据主叫端国际移动用户识别码、被叫端国际移动用户识别码以及第二加解密随机数利用预设密钥生成算法生成第二解密密钥。
在本发明第四实施例中,该第二解密密钥与第一解密密钥不同。
S408、根据第二解密密钥利用矩阵变位加密算法对第二加密语音信号进行解密。
需要说明,本发明实施例所提供的语音加密方法第二实施例步骤中与第一实施例步骤中相同的步骤在此不再赘述。
可以看出,本实施例的方案中,被叫端建立主叫端与被叫端之间的数据通信连接,获取主叫端IMSI、被叫端IMSI,并接收主叫端发送的第一加解密随机数以及第一加密语音信号,然后被叫端再根据该主叫端IMSI、被叫端IMSI以及第一加解密随机数利用预设密钥生成算法生成第一解密密钥,最后再利用该第一解密密钥使用预设加密算法对第一加密语音信号进行解密。通过主叫端IMSI、被叫端IMSI以及从主叫端接收到的第一加解密随机数生成第一解密密钥,并使用预设加密算法对语音信号进行解密,从而使得语音解密过程用户针对性强,保密性高,提高语音业务安全性。
更进一步地,由于基于IMS网络的语音通信使用的是IP网络进行通信,节约通信成本。
下面再举一个交互的实施例进行说明,参见图5-a,图5-a是本发明实施例提供的一种语音通信方法的第五实施例流程示意图。如图5-a所示,本发明实施例提供的语音通信方法的第五实施例可以包括以下步骤:
S501、建立被叫端与主叫端之间的数据通信连接。
具体地,可参见图5-b,图5-b是本发明实施例提供的语音通信网络流程图,主叫端建立被叫端与主叫端之间的数据通信连接包括以下步骤:
(1)、主叫端将被叫端IMSI号输入到加密模块中,以便和被叫端建立一对一的加密通道;
(2)、主叫端在IMS系统注册成功后,向被叫端发起Volte业务请求,主叫端根据会话初始协议(Session Initiation Protocol,简称SIP信令)和被叫端在IMS系统中建立PPP(Point-to-Point Protocol)连接;
(3)、被叫端端将主叫IMSI号输入到加密模块中,以便和主叫建立一对一的加密通道;
(4)、服务网关(Serving GateWay,简称SGW)与主叫端进行协商,PDN网关(PDN GateWay,简称PGW)给主叫端分配的IP地址;
(5)、主叫端将会话请求经LTE网络送至IMS系统的代理呼叫会话控制功 能(P-SCSF),获得被叫端的IP地址;
(6)、服务呼叫会话控制功能(S-CSCF)处理会话请求,通过IMS网络将会话请求200ACK指令送给被叫端;
(7)、被叫端收到主叫端发来的200ACK指令并返回200OK指令给主叫端;
(8)、主叫端在收到被叫端SIP信令200OK握手成功后,被叫端和主叫端成功建立数据通信连接。
在本发明实施例中,被叫端与主叫端首先建立信令连接,然后再建立数据通信连接。
S502、主叫端获取主叫端国际移动用户识别码、被叫端国际移动用户识别码以及第一加解密随机数,并将第一加解密随机数发送至被叫端。
在本发明实施例中,主叫端此时并将语音信号进行模数转换,转换成由0、1字符组成的PCM数字码流。
S503、被叫端获取主叫端国际移动用户识别码、被叫端国际移动用户识别码并接收主叫端发送的第一加解密随机数。
S504、主叫端利用主叫端国际移动用户识别码、被叫端国际移动用户识别码以及第一加解密随机数,使用预设密钥生成算法生成第一加密密钥。
具体地,在本发明实施例中,主叫端根据主叫端IMSI号、被叫端IMSI号、第一加解密随机数产生一个密钥Kc,Kc对应一种矩阵行列M、N、列变换次序,然后根据该矩阵行列M、N、列变换次序对语音数字码流进行矩阵变位方法加密。
S505、主叫端根据第一加密密钥利用矩阵变位加密算法对语音信号进行加密得到第一加密语音信号。
S506、主叫端将第一加密语音信号发送至被叫端。
具体在,在本发明实施例中,主叫端对语音进行加密得到第一加密语音信号后,将第一加密语音信号封装在SIP/UDP/IP包里,并进行压缩,然后再对加密后的码流进行编码;编码后的码流再经交织编码调制器后,通过手机天线送出;最后信号经基站接收后进入移动网络、internet网、MGW后送到被叫端。
优选地,在本发明实施例中,加密模块每隔一定时间产生不同加解密随机数RAND,从而主叫端变换矩阵变位方式对语音信号进行加密。
S507、被叫端接收主叫端发送的第一加密语音信号;
具体地,被叫端接收到主叫端发送的第一加密语音信号后,通过解交织编码调制器进行初步解码。
S508、被叫端根据主叫端国际移动用户识别码、被叫端国际移动用户识别码以及第一加解密随机数利用预设密钥生成算法生成第一解密密钥。
S509、被叫端根据第一解密密钥利用矩阵变位加密算法对第一加密语音信号进行解密。
具体地,被叫端根据主叫端IMSI号、被叫端IMSI号、加解密随机数RAND产生一个密钥Kc,Kc对应一种矩阵行列M、N、列变换次序,然后对语音数字码流进行矩阵变位方法解密。
更进一步地,解密信号后,被叫端再对SIP/UDP/IP包进行解封装,恢复成PCM数字信号码流;然后再通过模数转换(A/D转换)恢复为语音流,该语音流与主叫端加密前的语音流一致。
更进一步地,通话过程,主叫端与被叫端任何一方挂机后,拆除语音通信,结束通话。
可以看出,本实施例的方案中,主叫端建立被叫端与主叫端之间的数据通信连接,主叫端再获取主叫端IMSI、被叫端IMSI以及第一加密随机数,并将该第一加密随机数发送至被叫端,然后主叫端再利用主叫端IMSI、被叫端IMSI以及第一加密随机数利用预设密钥生成算法生成第一加密钥,并利用该加密密钥根据预设加密算法对语音信息进行加密得到第一加密语音信号,最后将该第一加密语音信号发送至被叫端;被叫端建立主叫端与被叫端之间的数据通信连接,获取主叫端IMSI、被叫端IMSI,并接收主叫端发送的第一加解密随机数以及第一加密语音信号,然后被叫端再根据该主叫端IMSI、被叫端IMSI以及第一加解密随机数利用预设密钥生成算法生成第一解密密钥,最后再利用该第一解密密钥使用预设加密算法对第一加密语音信号进行解密。通过利用主叫端IMSI、被叫端IMSI以及第一加密随机数生成第一加密密钥,并使用预设加密算法对语音信号进行加密,从而使得加密过程针对性强,保密性高,提高语音业务安全性。
更进一步地,由于基于IMS网络的语音通信使用的是IP网络进行通信,节约通信成本。
本发明实施例还提供一种主叫端,该主叫端包括:
第一连接模块,设置为主叫端建立被叫端与所述主叫端之间的数据通信连接;
第一获取模块,设置为获取主叫端国际移动用户识别码、被叫端国际移动用户识别码以及第一加解密随机数,并将所述第一加解密随机数发送至被叫端;
第一生成模块,设置为利用所述主叫端国际移动用户识别码、所述被叫端国际移动用户识别码以及所述第一加解密随机数,使用预设密钥生成算法生成第一加密密钥;
加密模块,设置为根据所述第一加密密钥利用预设加密算法对语音信号进行加密得到第一加密语音信号;
发送模块,设置为将所述第一加密语音信号发送至所述被叫端。
具体的,请参见图6,图6是本发明实施例提供的一种主叫端的第一实施例的结构示意图,其中,如图6所示,该主叫端600可以包括:
第一连接模块610、第一获取模块620、第一生成模块630、加密模块640和发送模块650。
其中,第一连接模块610,设置为主叫端建立被叫端与所述主叫端之间的数据通信连接。
其中,主叫端是指在语音通信过程中主动发起语音呼叫的用户设备,被叫端是指在语音通信过程中通过接收到主叫端的语音呼叫而与主叫端进行语音通信的用户设备。
在本发明实施例中,主叫端与被叫端之间基于IMS网络建立数据通信连接。
具体地,主叫端和被叫端之间首先建立信令连接,实现主叫端与被叫端之间的信令通信,然后主叫端和被叫端之间再建立业务通信连接。
第一获取模块620,设置为获取主叫端国际移动用户识别码、被叫端国际移动用户识别码以及第一加解密随机数,并将所述第一加解密随机数发送至被叫端。
其中,国际移动用户识别码(International Mobile Subscriber Identification Number,简称IMSI)是区别移动用户的标志,储存在SIM卡中,可用于区别移动用户的有效信息。从而主叫端IMSI可用于标识主叫端用户身份,被叫端IMSI可用于标识被叫端用户身份。
具体的,在主叫端和被叫端之间建立信令连接后,在进行信令通信的过程 中将会获取到主叫端SIMI号和被叫端SIMI号。
其中,第一加解密随机数是指主叫端加密模块中的随机数产生单元在第一时刻所产生的随机数,随机数产生单元在不同的时刻所产生的加解密随机数将不同。
可选地,在本发明的一些可能的实施方式中,加密模块每隔一定时间段可以产生不同随机数RAND,从而可以加强用户信息的安全性,具体地,该时间段可以为64s、128s等。
在本发明实施例中,第一加解密随机数可以通过主叫端与被叫端之间的所建立的数据通信连接发送至被叫端,优选地,通过主叫端与被叫端之间的信令路由进行发送。
第一生成模块630,设置为利用所述主叫端国际移动用户识别码、所述被叫端国际移动用户识别码以及所述第一加解密随机数,使用预设密钥生成算法生成第一加密密钥。
其中,预设密钥生成算法是指主叫端加密模块中预先设置的用于生成加密密钥的加密算法,在本发明实施例中,该预设密钥生成算法具有三个输入参数以及一个输出参数。
其中,加密密钥是指利用预设加密算法进行加密时所使用的加密密钥。
具体地,在本发明实施例中,该预设密钥生成算法以主叫端IMSI、被叫端IMSI以及第一加解密随机数为输入参数,并且输出第一加密密钥。
优选地,在本发明的一些可能的实施方式中,该预设密钥生成算法可以为用于对全球移动通讯系统蜂窝通信进行加密的算法,具体的,为A3和A8算法,从而主叫端以主叫端IMSI、被叫端IMSI以及第一加解密随机数为输入参数,利用两个不同的算法A3和A8计算得到第一加密密钥。
加密模块640,设置为根据所述第一加密密钥利用预设加密算法对语音信号进行加密得到第一加密语音信号。
其中,预设加密算法是指终端中预设的用于对语音信号进行加密的算法,该加密算法可以为本发明实施例开头中部分用语解释说明处所提到的矩阵变位加密算法或现有技术中的简单变位加密算法。
优选地,该预设加密算法为矩阵变位加密算法。
在本发明实施例中,矩阵变位加密算法的复杂程度取决于矩阵行列M、N、 列变换次序,矩阵行列M、N、列变换次序数值由通过复杂算法产生的密钥Kc决定,并且可以随机变化。一个密钥Kc对应一种矩阵行列M、N、列变换次序的组合方式,随机数RAND不同,可以产生不同的密钥Kc,对应不同的矩阵行列M、N、列变换次序。
具体的,需要将语音信号经过模数转换,转换为由0、1字符组成的脉冲编码调制(Pulse Code Modulation,简称PCM)数字码流,从而使得语音信号可以利用矩阵变位加密算法进行加密。
具体地,在主叫端中存储有密钥Kc和矩阵行列M、N、列变换次序的对应关系表,从而可以根据该密钥Kc和矩阵行列M、N、列变换次序的对应关系表,利用密钥Kc对经过变换成PCM数字码流后的语音信号进行矩阵变换加密。
具体地,由于加密密钥Kc定期改变,从而所使用的矩阵变位加密算法也根据Kc定期改变。
发送模块650,设置为将所述第一加密语音信号发送至所述被叫端。
具体地,主叫端首先将经过加密后的PCM数字码流语音信号进行编码、交织、调制后,再将编码后的语音信号发送至被叫端。
更进一步地,由于基于IMS网络的语音通信使用的是IP网络进行通信,节约通信成本。
可选地,在本发明的一些可能的实施方式中,所述第一获取模块620,还设置为:所述主叫端在与所述被叫端进行数据通信的过程中间隔预设时间后获取所述第二加解密随机数;
所述第一生成模块630,还设置为:利用所述主叫端国际移动用户识别码、所述被叫端国际移动用户识别码以及所述第二加解密随机数,使用预设密钥生成算法生成第二加密密钥;
所述加密模块640,还设置为:根据所述第二加密密钥利用预设加密算法对语音信号进行加密得到第二加密语音信号;
所述发送模块650,还设置为:将所述第二加密语音信号发送至所述被叫端。
其中,第二加解密随机数也是指主叫端加密模块中的随机数产生单元在第二时刻所产生的随机数,该随机数与随机数产生单元在第一时刻产生的第一随机数不同。
可以理解,通过在不同的时刻由主叫端的加密模块产生不同的加解密随机 数并生成不同的加密密钥,使用矩阵变位加密算法进行加密。从而由于语音通信加密过程中加密密钥不断变换,矩阵变位方式改变,提高加密安全性。
可以理解的是,本实施例的主叫端600的各功能模块的功能可根据上述方法实施例中的方法具体实现,其具体实现过程可以参照上述方法实施例的相关描述,此处不再赘述。
可以看出,本实施例的方案中,主叫端600建立被叫端与主叫端600之间的数据通信连接,主叫端600再获取主叫端IMSI、被叫端IMSI以及第一加密随机数,并将该第一加密随机数发送至被叫端,然后主叫端600再利用主叫端IMSI、被叫端IMSI以及第一加密随机数利用预设密钥生成算法生成第一加密钥,并利用该加密密钥根据预设加密算法对语音信息进行加密得到第一加密语音信号,最后将该第一加密语音信号发送至被叫端。通过利用主叫端IMSI、被叫端IMSI以及第一加密随机数生成第一加密密钥,并使用预设加密算法对语音信号进行加密,从而使得加密过程用户针对性强,保密性高,提高语音业务安全性。
参见图7,图7是本发明实施例提供的一种主叫端的第二实施例的结构示意图,如图7所示,该通信终端700可以包括:至少一个总线701、与总线相连的至少一个处理器702以及与总线相连的至少一个存储器703。
其中,处理器702通过总线701,调用存储器703中存储的代码以用于主叫端建立被叫端与所述主叫端之间的数据通信连接;获取主叫端国际移动用户识别码、被叫端国际移动用户识别码以及第一加解密随机数,并将所述第一加解密随机数发送至被叫端;利用所述主叫端国际移动用户识别码、所述被叫端国际移动用户识别码以及所述第一加解密随机数,使用预设密钥生成算法生成第一加密密钥;根据所述第一加密密钥利用预设加密算法对语音信号进行加密得到第一加密语音信号;将所述第一加密语音信号发送至所述被叫端。
可选地,在本发明的一些可能的实施方式中,所述处理器702还用于:
所述主叫端在与所述被叫端进行数据通信的过程中间隔预设时间后获取所述第二加解密随机数;
利用所述主叫端国际移动用户识别码、所述被叫端国际移动用户识别码以及所述第二加解密随机数,使用预设密钥生成算法生成第二加密密钥;
根据所述第二加密密钥利用预设加密算法对语音信号进行加密得到第二加 密语音信号;
将所述第二加密语音信号发送至所述被叫端。
可选地,在本发明的一些可能的实施方式中,所述预设密钥生成算法为用于对全球移动通讯系统蜂窝通信进行加密的算法。
可以理解的是,本实施例的主叫端700的各功能模块的功能可根据上述方法实施例中的方法具体实现,其具体实现过程可以参照上述方法实施例的相关描述,此处不再赘述。
可以看出,本实施例的方案中,主叫端700建立被叫端与主叫端700之间的数据通信连接,主叫端700再获取主叫端IMSI、被叫端IMSI以及第一加密随机数,并将该第一加密随机数发送至被叫端,然后主叫端700再利用主叫端IMSI、被叫端IMSI以及第一加密随机数利用预设密钥生成算法生成第一加密钥,并利用该加密密钥根据预设加密算法对语音信息进行加密得到第一加密语音信号,最后将该第一加密语音信号发送至被叫端。通过利用主叫端IMSI、被叫端IMSI以及第一加密随机数生成第一加密密钥,并使用预设加密算法对语音信号进行加密,从而使得加密过程用户针对性强,保密性高,提高语音业务安全性。
本发明实施例还提供一种被叫端,该被叫端包括:
第二连接模块,设置为被叫端建立主叫端与所述被叫端之间的数据通信连接;
第二获取模块,设置为获取主叫端国际移动用户识别码、被叫端国际移动用户识别码并接收所述主叫端发送的第一加解密随机数;
接收模块,设置为接收所述主叫端发送的第一加密语音信号;
第二生成模块,设置为根据所述主叫端国际移动用户识别码、所述被叫端国际移动用户识别码以及所述第一加解密随机数利用预设密钥生成算法生成第一解密密钥;
解密模块,设置为根据所述第一解密密钥利用预设加密算法对所述第一加密语音信号进行解密。
具体的,请参见图8,图8是本发明实施例提供的一种被叫端的第一实施例的结构示意图,其中,如图8所示,该被叫端800可以包括:
第二连接模块810、第二获取模块820、接收模块830、第二生成模块840 和解密模块850。
其中,第二连接模块810,设置为被叫端建立主叫端与所述被叫端之间的数据通信连接。
在本发明实施例中,主叫端与被叫端之间基于IMS网络建立数据通信连接。
具体地,主叫端和被叫端之间首先建立信令连接,实现主叫端与被叫端之间的信令通信,然后主叫端和被叫端之间再建立业务通信连接。
第二获取模块820,设置为获取主叫端国际移动用户识别码、被叫端国际移动用户识别码并接收所述主叫端发送的第一加解密随机数。
其中,国际移动用户识别码(International Mobile Subscriber Identification Number,简称IMSI)是区别移动用户的标志,储存在SIM卡中,可用于区别移动用户的有效信息。从而主叫端IMSI可用于标识主叫端用户身份,被叫端IMSI可用于标识被叫端用户身份。
其中,第一加解密随机数是指被叫端在第一时刻接收到的来自主叫端发送的加解密随机数。
在本发明实施例中,被叫端可通过主叫端和被叫端之间的数据通信连接接收主叫端发送的第一加解密随机数,优选地,通过主叫端与被叫端之间的信令路由接收该第一加解密随机数。
在本发明实施例中,由于主叫端与被叫端建立信令连接,实现信令通信,所以被叫端可通过接收到主叫端发送的信令提取出来主叫端的IMSI号。
接收模块830,设置为接收所述主叫端发送的第一加密语音信号。
在本发明实施例中,被叫端通过主叫端与被叫端之间的业务路由接收第一加密语音信号,具体地,通过媒体网关(Media Gateway,简称MGW)进行接收。
更进一步地,被叫端在接收到主叫端发送的第一加密语音信号后,需要对第一加密语音信号进行解交织、解码、解调后,生成初解码后的语音信号后再进行解密。
第二生成模块840,设置为根据所述主叫端国际移动用户识别码、所述被叫端国际移动用户识别码以及所述第一加解密随机数利用预设密钥生成算法生成第一解密密钥。
其中,预设密钥生成算法是指主叫端加密模块中预先设置的用于生成加密 密钥的加密算法,在本发明实施例中,该预设密钥生成算法具有三个输入参数以及一个输出参数。
其中,解密密钥是指利用预设加密算法进行加密时所使用的解密密钥,该解密密钥是与使用预设加密算法进行加密时所使用的加密密钥相对应的密钥,也即利用该密钥使用预设加密算法进行解密时,可以还原加密之前的语音信号。
具体地,在本发明实施例中,该预设密钥生成算法以主叫端IMSI、被叫端IMSI以及第一加解密随机数为输入参数,并且输出第一解密密钥。
优选地,在本发明的一些可能的实施方式中,该预设密钥生成算法可以为用于对全球移动通讯系统蜂窝通信进行加密的算法,具体的,为A3和A8算法,从而这被叫端以主叫端IMSI、被叫端IMSI以及第一加解密随机数为输入参数,利用两个不同的算法A3和A8计算得到第一解密密钥。
解密模块850,设置为根据所述第一解密密钥利用预设加密算法对所述第一加密语音信号进行解密。
其中,预设加密算法是指终端中预设的用于对语音信号进行加密的算法,该加密算法可以为本发明实施例开头中部分用语解释说明处所提到的矩阵变位加密算法或现有技术中的简单变位加密算法。
优选地,该预设加密算法为矩阵变位加密算法。
具体地,在被叫端中存储有密钥Kc和矩阵行列M、N、列变换次序的对应关系表,从而可以根据该密钥Kc和矩阵行列M、N、列变换次序的对应关系表,利用密钥Kc对经过初解码后的语音信号利用矩阵变换加密算法进行相应解密,以得到与主叫端中相同的语音信号。
具体地,由于解密密钥Kc定期改变,从而所使用的矩阵变位加密算法也根据Kc定期改变。
在本发明实施例中,该解密过程是与主叫端中利用矩阵变位加密算法进行加密的过程相反的过程,也即最后对第一加密语音信号进行解密后将得到主叫端中加密之前的语音信号。
可选地,在本发明的一些可能的实施方式中,所述接收模块830,还设置为:所述被叫端在与所述主叫端进行数据通信的过程中接收所述主叫端发送的第二加密语音信号和第二加解密随机数;
所述第二生成模块840,还设置为:根据所述主叫端国际移动用户识别码、 所述被叫端国际移动用户识别码以及所述第二加解密随机数利用预设密钥生成算法生成第二解密密钥;
所述解密模块850,还设置为:根据所述第二解密密钥利用预设加密算法对所述第二加密语音信号进行解密。
其中,第二加解密随机数是指被叫端在第二时刻接收到的来自主叫端发送的加解密随机数,该第二加解密随机数与第一加解密随机数不同,该第二加解密随机数与被叫端接收到的第二加密语音信号相对应,从而被叫端在第二时刻接收到来自主叫端发送的新的第二加解密随机数后,以利用该第二加解密随机数重新生成第二解密密钥,再利用预设加密算法对第二加密语音信号进行解密。
可以理解,通过在不同的时刻接收到来自主叫端的不同的加解密随机数,并利用当前接收到的加解密随机数生成不同的解密密钥,并使用矩阵变位算法来对当前接收到的对应的语音信号进行解密。从而由于语音通信加密过程中解密密钥不断变换,矩阵变位方式改变,提高加密安全性。
可以理解的是,本实施例的被叫端800的各功能模块的功能可根据上述方法实施例中的方法具体实现,其具体实现过程可以参照上述方法实施例的相关描述,此处不再赘述。
可以看出,本实施例的方案中,被叫端800建立主叫端与被叫端800之间的数据通信连接,获取主叫端IMSI、被叫端IMSI,并接收主叫端发送的第一加解密随机数以及第一加密语音信号,然后被叫端800再根据该主叫端IMSI、被叫端IMSI以及第一加解密随机数利用预设密钥生成算法生成第一解密密钥,最后再利用该第一解密密钥使用预设加密算法对第一加密语音信号进行解密。通过主叫端IMSI、被叫端IMSI以及从主叫端接收到的第一加解密随机数生成第一解密密钥,并使用预设加密算法对语音信号进行解密,从而使得语音解密过程用户针对性强,保密性高,提高语音业务安全性。
更进一步地,由于基于IMS网络的语音通信使用的是IP网络进行通信,节约通信成本。
参见图9,图9是本发明实施例提供的一种被叫端的第二实施例的结构示意图,如图9所示,该被叫端900可以包括:至少一个总线901、与总线相连的至少一个处理器902以及与总线相连的至少一个存储器903。
其中,处理器902通过总线901,调用存储器903中存储的代码以用于被叫 端建立主叫端与所述被叫端之间的数据通信连接;获取主叫端国际移动用户识别码、被叫端国际移动用户识别码并接收所述主叫端发送的第一加解密随机数;接收所述主叫端发送的第一加密语音信号;根据所述主叫端国际移动用户识别码、所述被叫端国际移动用户识别码以及所述第一加解密随机数利用预设密钥生成算法生成第一解密密钥;根据所述第一解密密钥利用预设加密算法对所述第一加密语音信号进行解密。
可选地,在本发明的一些可能的实施方式中,所述处理器902还用于:
所述方法还包括:
所述被叫端在与所述主叫端进行数据通信的过程中接收所述主叫端发送的第二加密语音信号和第二加解密随机数;
根据所述主叫端国际移动用户识别码、所述被叫端国际移动用户识别码以及所述第二加解密随机数利用预设密钥生成算法生成第二解密密钥;
根据所述第二解密密钥利用预设加密算法对所述第二加密语音信号进行解密。
可以理解的是,本实施例的被叫端900的各功能模块的功能可根据上述方法实施例中的方法具体实现,其具体实现过程可以参照上述方法实施例的相关描述,此处不再赘述。
可以看出,本实施例的方案中,被叫端900建立主叫端与被叫端900之间的数据通信连接,获取主叫端IMSI、被叫端IMSI,并接收主叫端发送的第一加解密随机数以及第一加密语音信号,然后被叫端900再根据该主叫端IMSI、被叫端IMSI以及第一加解密随机数利用预设密钥生成算法生成第一解密密钥,最后再利用该第一解密密钥使用预设加密算法对第一加密语音信号进行解密。通过主叫端IMSI、被叫端IMSI以及从主叫端接收到的第一加解密随机数生成第一解密密钥,并使用预设加密算法对语音信号进行解密,从而使得语音解密过程用户针对性强,保密性高,提高语音业务安全性。
更进一步地,由于基于IMS网络的语音通信使用的是IP网络进行通信,节约通信成本。
参见图10,图10是本发明实施例提供的一种语音通信系统的示意图。如图10所示,本发明实施例提供的一种语音通信系统1000具体可以包括:
主叫端1010和被叫端1020;
其中,所述主叫端1010用于建立主叫端1020与所述主叫端1010之间的数据通信连接;
所述主叫端1010还用于获取主叫端1010国际移动用户识别码、被叫端国际移动用户识别码以及第一加解密随机数,并将所述第一加解密随机数发送至主叫端1020;
所述主叫端1010还用于利用所述主叫端1010国际移动用户识别码、所述被叫端国际移动用户识别码以及所述第一加解密随机数,使用预设密钥生成算法生成第一加密密钥;
所述主叫端1010还用于根据所述第一加密密钥利用预设加密算法对语音信号进行加密得到第一加密语音信号;
所述主叫端1010还用于将所述第一加密语音信号发送至所述主叫端1020。
可选地,在本发明的一些可能的实施方式中,所述主叫端1010还用于在与所述主叫端1020进行数据通信的过程每间隔预设时间后获取所述第二加解密随机数;
可选地,在本发明的一些可能的实施方式中,所述主叫端1010还用于利用所述主叫端国际移动用户识别码、所述被叫端国际移动用户识别码以及所述第二加解密随机数,使用预设密钥生成算法生成第二加密密钥;
可选地,在本发明的一些可能的实施方式中,所述主叫端1010还用于根据所述第二加密密钥利用预设加密算法对语音信号进行加密得到第二加密语音信号;
可选地,在本发明的一些可能的实施方式中,所述主叫端1010还用于将所述第二加密语音信号发送至所述主叫端1020。
可选地,在本发明的一些可能的实施方式中,所述预设密钥生成算法为用于对全球移动通讯系统蜂窝通信进行加密的算法。
被叫端1020用于建立主叫端1010与所述主叫端1020之间的数据通信连接;
被叫端1020还用于获取主叫端国际移动用户识别码、被叫端国际移动用户识别码并接收所述主叫端1010发送的第一加解密随机数;
被叫端1020还用于接收所述主叫端1010发送的第一加密语音信号;
被叫端1020还用于根据所述主叫端国际移动用户识别码、所述被叫端国际移动用户识别码以及所述第一加解密随机数利用预设密钥生成算法生成第一解 密密钥;
被叫端1020还用于根据所述第一解密密钥利用预设加密算法对所述第一加密语音信号进行解密。
可选地,在本发明的一些可能的实施方式中,被叫端1020还用于在与所述主叫端1010进行数据通信的过程中接收所述主叫端1010发送的第二加密语音信号和第二加解密随机数;
可选地,在本发明的一些可能的实施方式中,被叫端1020还用于根据所述主叫端国际移动用户识别码、所述被叫端国际移动用户识别码以及所述第二加解密随机数利用预设密钥生成算法生成第二解密密钥;
可选地,在本发明的一些可能的实施方式中,被叫端1020还用于根据所述第二解密密钥利用预设加密算法对所述第二加密语音信号进行解密。
可选地,在本发明的一些可能的实施方式中,所述语音通信系统1000还包括:
监听端1030,所述监听端1030用于:通过多媒体子系统网络结点获取所述主叫端国际移动用户识别码、所述被叫端国际移动用户识别码、加解密随机数以及加密语音信号;
所述监听端1030还用于:根据所述主叫端国际移动用户识别码、所述被叫端国际移动用户识别码以及所述加解密随机数利用预设密钥生成算法生成解密密钥;
所述监听端1030还用于:根据所述第一解密密钥利用预设加密算法对所述加密语音信号进行解密。
可以看出,在本实施例的方案中,语音通信系统1000建立主叫端1020与主叫端1010之间的数据通信连接,主叫端1010再获取主叫端IMSI、被叫端IMSI以及第一加密随机数,并将该第一加密随机数发送至主叫端1020,然后主叫端1010再利用主叫端IMSI、被叫端IMSI以及第一加密随机数利用预设密钥生成算法生成第一加密钥,并利用该加密密钥根据预设加密算法对语音信息进行加密得到第一加密语音信号,最后将该第一加密语音信号发送至主叫端1020;主叫端1020建立主叫端1010与主叫端1020之间的数据通信连接,获取主叫端IMSI、被叫端IMSI,并接收主叫端1010发送的第一加解密随机数以及第一加密语音信号,然后主叫端1020再根据该主叫端IMSI、被叫端IMSI以及第一加 解密随机数利用预设密钥生成算法生成第一解密密钥,最后再利用该第一解密密钥使用预设加密算法对第一加密语音信号进行解密。通过利用主叫端IMSI、被叫端IMSI以及第一加密随机数生成第一加密密钥,并使用预设加密算法对语音信号进行加密,从而使得加密过程针对性强,保密性高,提高语音业务安全性。
更进一步地,由于基于IMS网络的语音通信使用的是IP网络进行通信,节约通信成本。
可以理解的是,本实施例的语音通信系统1000的各功能模块的功能可根据上述方法实施例中的方法具体实现,其具体实现过程可以参照上述方法实施例的相关描述,此处不再赘述。
可以看出,本实施例的方案中,通信终端400在预设防盗事件的触发下通过启动固化于通信终端内的防盗通信卡建立与防盗关联设备之间的网络连接,通信终端400再基于该网络连接与防盗关联设置之间进行通信并最终发送定位信息至防盗关联设备。从而实现在通信终端被盗后,能基于通信终端中不可移除的防盗通信卡实现通信终端与后台的数据连接,方便失主定位手机。
本发明实施例还提供一种计算机存储介质,其中,该计算机存储介质可存储有程序,该程序执行时包括上述方法实施例中记载的任何语音通信方法的部分或全部步骤。
需要说明的是,对于前述的各方法实施例,为了简单描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本发明并不受所描述的动作顺序的限制,因为依据本发明,某些步骤可以采用其他顺序或者同时进行。其次,本领域技术人员也应该知悉,说明书中所描述的实施例均属于优选实施例,所涉及的动作和模块并不一定是本发明所必须的。
在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见其他实施例的相关描述。
在本申请所提供的几个实施例中,应该理解到,所揭露的装置,可通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可 以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本发明的各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可为个人计算机、服务器或者网络设备等)执行本发明各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、移动硬盘、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,以上实施例仅用以说明本发明的技术方案,而非对其限制;尽管参照前述实施例对本发明进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本发明各实施例技术方案的范围。

Claims (12)

  1. 一种语音通信方法,其特征在于,所述方法包括:
    主叫端建立被叫端与所述主叫端之间的数据通信连接;
    获取主叫端国际移动用户识别码、被叫端国际移动用户识别码以及第一加解密随机数,并将所述第一加解密随机数发送至被叫端;
    利用所述主叫端国际移动用户识别码、所述被叫端国际移动用户识别码以及所述第一加解密随机数,使用预设密钥生成算法生成第一加密密钥;
    根据所述第一加密密钥利用预设加密算法对语音信号进行加密得到第一加密语音信号;
    将所述第一加密语音信号发送至所述被叫端。
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    所述主叫端在与所述被叫端进行数据通信的过程中间隔预设时间后获取所述第二加解密随机数;
    利用所述主叫端国际移动用户识别码、所述被叫端国际移动用户识别码以及所述第二加解密随机数,使用预设密钥生成算法生成第二加密密钥;
    根据所述第二加密密钥利用预设加密算法对语音信号进行加密得到第二加密语音信号;
    将所述第二加密语音信号发送至所述被叫端。
  3. 根据权利要求1或2所述的方法,其特征在于,所述预设加密算法为矩阵变位加密算法或简单变位加密算法。
  4. 一种语音通信方法,其特征在于,所述方法包括:
    被叫端建立主叫端与所述被叫端之间的数据通信连接;
    获取主叫端国际移动用户识别码、被叫端国际移动用户识别码并接收所述主叫端发送的第一加解密随机数;
    接收所述主叫端发送的第一加密语音信号;
    根据所述主叫端国际移动用户识别码、所述被叫端国际移动用户识别码以及所述第一加解密随机数利用预设密钥生成算法生成第一解密密钥;
    根据所述第一解密密钥利用预设加密算法对所述第一加密语音信号进行解密。
  5. 根据权利要求4所述的方法,其特征在于,所述方法还包括:
    所述被叫端在与所述主叫端进行数据通信的过程中接收所述主叫端发送的第二加密语音信号和第二加解密随机数;
    根据所述主叫端国际移动用户识别码、所述被叫端国际移动用户识别码以及所述第二加解密随机数利用预设密钥生成算法生成第二解密密钥;
    根据所述第二解密密钥利用预设加密算法对所述第二加密语音信号进行解密。
  6. 一种主叫端,其特征在于,所述主叫端包括:
    第一连接模块,设置为主叫端建立被叫端与所述主叫端之间的数据通信连接;
    第一获取模块,设置为获取主叫端国际移动用户识别码、被叫端国际移动用户识别码以及第一加解密随机数,并将所述第一加解密随机数发送至被叫端;
    第一生成模块,设置为利用所述主叫端国际移动用户识别码、所述被叫端国际移动用户识别码以及所述第一加解密随机数,使用预设密钥生成算法生成第一加密密钥;
    加密模块,设置为根据所述第一加密密钥利用预设加密算法对语音信号进行加密得到第一加密语音信号;
    发送模块,设置为将所述第一加密语音信号发送至所述被叫端。
  7. 根据权利要求6所述的主叫端,其特征在于,
    所述第一获取模块,还设置为:所述主叫端在与所述被叫端进行数据通信的过程中间隔预设时间后获取所述第二加解密随机数;
    所述第一生成模块,还设置为:利用所述主叫端国际移动用户识别码、所述被叫端国际移动用户识别码以及所述第二加解密随机数,使用预设密钥生成算法生成第二加密密钥;
    所述加密模块,还设置为:根据所述第二加密密钥利用预设加密算法对语音信号进行加密得到第二加密语音信号;
    所述发送模块,还设置为:将所述第二加密语音信号发送至所述被叫端。
  8. 根据权利要求6或7所述的方法,其特征在于,所述预设加密算法为矩阵变位加密算法或简单变位加密算法。
  9. 一种被叫端,其特征在于,所述被叫端包括:
    第二连接模块,设置为被叫端建立主叫端与所述被叫端之间的数据通信连接;
    第二获取模块,设置为获取主叫端国际移动用户识别码、被叫端国际移动用户识别码并接收所述主叫端发送的第一加解密随机数;
    接收模块,设置为接收所述主叫端发送的第一加密语音信号;
    第二生成模块,设置为根据所述主叫端国际移动用户识别码、所述被叫端国际移动用户识别码以及所述第一加解密随机数利用预设密钥生成算法生成第一解密密钥;
    解密模块,设置为根据所述第一解密密钥利用预设加密算法对所述第一加密语音信号进行解密。
  10. 根据权利要求9所述的被叫端,其特征在于,
    所述接收模块,还设置为:所述被叫端在与所述主叫端进行数据通信的过程中接收所述主叫端发送的第二加密语音信号和第二加解密随机数;
    所述第二生成模块,还设置为:根据所述主叫端国际移动用户识别码、所述被叫端国际移动用户识别码以及所述第二加解密随机数利用预设密钥生成算法生成第二解密密钥;
    所述解密模块,还设置为:根据所述第二解密密钥利用预设加密算法对所述第二加密语音信号进行解密。
  11. 一种语音通信系统,其特征在于,所述系统包括:
    主叫端和被叫端;
    其中,所述主叫端为权利要求6至8任一项所述的主叫端,所述被叫端为权利要求9或10所述的被叫端。
  12. 根据权利要求11所述的系统,其特征在于,所述系统还包括:
    监听端,所述监听端用于:
    通过多媒体子系统网络结点获取所述主叫端国际移动用户识别码、所述被叫端国际移动用户识别码、加解密随机数以及加密语音信号;
    根据所述主叫端国际移动用户识别码、所述被叫端国际移动用户识别码以及所述加解密随机数利用预设密钥生成算法生成解密密钥;
    根据所述第一解密密钥利用预设加密算法对所述加密语音信号进行解密。
PCT/CN2016/107811 2016-03-31 2016-11-30 一种语音加密通信方法、主叫端、被叫端及系统 WO2017166840A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US16/090,248 US10887288B2 (en) 2016-03-31 2016-11-30 Method for encrypting voice in voice communications, calling terminal and called terminal, and system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610201062.8 2016-03-31
CN201610201062.8A CN105743914B (zh) 2016-03-31 2016-03-31 一种语音加密通信方法、主叫端、被叫端及系统

Publications (1)

Publication Number Publication Date
WO2017166840A1 true WO2017166840A1 (zh) 2017-10-05

Family

ID=56252624

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/107811 WO2017166840A1 (zh) 2016-03-31 2016-11-30 一种语音加密通信方法、主叫端、被叫端及系统

Country Status (3)

Country Link
US (1) US10887288B2 (zh)
CN (1) CN105743914B (zh)
WO (1) WO2017166840A1 (zh)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105743914B (zh) * 2016-03-31 2019-03-22 宇龙计算机通信科技(深圳)有限公司 一种语音加密通信方法、主叫端、被叫端及系统
CN109788473B (zh) * 2017-11-13 2022-01-25 中国移动通信有限公司研究院 一种VoLTE通话加密方法、网络设备及终端
CN111064692B (zh) * 2018-10-16 2022-06-14 中兴通讯股份有限公司 一种数据通信方法、终端及存储介质
CN114125824A (zh) * 2020-08-31 2022-03-01 中国电信股份有限公司 语音加密处理方法、服务器、终端以及系统、存储介质
CN113472806B (zh) * 2021-07-14 2022-11-22 斑马网络技术有限公司 保护隐私的语音交互方法、装置、系统、设备及存储介质
US20230269580A1 (en) * 2022-02-18 2023-08-24 Qualcomm Incorporated Securing Media Stream Communications
CN114866234B (zh) * 2022-04-26 2023-11-07 中国电信股份有限公司 基于量子密钥加解密的语音通信方法、装置、设备及存储

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101997676A (zh) * 2009-08-28 2011-03-30 中国移动通信集团公司 VoIP语音加密保护方法、节点及系统
CN103795533A (zh) * 2012-10-31 2014-05-14 三星Sds株式会社 基于标识符的加密、解密的方法及其执行装置
CN104737570A (zh) * 2012-10-19 2015-06-24 诺基亚技术有限公司 生成用于第一用户设备和第二用户设备之间的设备对设备通信的密钥的方法和设备
CN105743914A (zh) * 2016-03-31 2016-07-06 宇龙计算机通信科技(深圳)有限公司 一种语音加密通信方法、主叫端、被叫端及系统

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5991407A (en) * 1995-10-17 1999-11-23 Nokia Telecommunications Oy Subscriber authentication in a mobile communications system
US6580906B2 (en) * 1997-12-10 2003-06-17 Intel Corporation Authentication and security in wireless communication system
US6097817A (en) * 1997-12-10 2000-08-01 Omnipoint Corporation Encryption and decryption in communication system with wireless trunk
US6510515B1 (en) * 1998-06-15 2003-01-21 Telefonaktlebolaget Lm Ericsson Broadcast service access control
CN1115924C (zh) * 1999-09-09 2003-07-23 深圳市中兴通讯股份有限公司 手机加密的方法
US6876747B1 (en) * 2000-09-29 2005-04-05 Nokia Networks Oy Method and system for security mobility between different cellular systems
EP1452000A2 (en) * 2001-12-07 2004-09-01 Telefonaktiebolaget LM Ericsson (publ) Lawful interception of end-to-end encrypted data traffic
CN1283063C (zh) * 2003-05-20 2006-11-01 华为技术有限公司 通信设备中配置数据的方法及装置
US8341700B2 (en) * 2003-10-13 2012-12-25 Nokia Corporation Authentication in heterogeneous IP networks
US20050108534A1 (en) * 2003-11-19 2005-05-19 Bajikar Sundeep M. Providing services to an open platform implementing subscriber identity module (SIM) capabilities
CN1705261A (zh) * 2004-05-28 2005-12-07 华为技术有限公司 一种端对端加密通讯系统及方法
FR2894101B1 (fr) * 2005-11-25 2008-11-21 Oberthur Card Syst Sa Entite electronique portable destinee a etablir une communication voix sur ip securisee
US7848516B2 (en) * 2006-01-20 2010-12-07 Chiou-Haun Lee Diffused symmetric encryption/decryption method with asymmetric keys
US8675863B2 (en) * 2009-12-22 2014-03-18 Trueposition, Inc. Passive system for recovering cryptography keys
CN101951601A (zh) * 2010-08-25 2011-01-19 中兴通讯股份有限公司 移动通讯网中加密语音通话的方法和系统、终端及网络侧
CN101917711B (zh) * 2010-08-25 2015-09-16 中兴通讯股份有限公司 一种移动通信系统及其语音通话加密的方法
CN101909290A (zh) * 2010-08-25 2010-12-08 中兴通讯股份有限公司 一种实现语音通话加密的方法及系统及移动终端
GB2509937A (en) * 2013-01-17 2014-07-23 Nec Corp Providing security information to a mobile device in which user plane data and control plane signalling are communicated via different base stations
US20160192194A1 (en) * 2014-12-29 2016-06-30 Gongming Yang Secure way to build internet credit system and protect private information

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101997676A (zh) * 2009-08-28 2011-03-30 中国移动通信集团公司 VoIP语音加密保护方法、节点及系统
CN104737570A (zh) * 2012-10-19 2015-06-24 诺基亚技术有限公司 生成用于第一用户设备和第二用户设备之间的设备对设备通信的密钥的方法和设备
CN103795533A (zh) * 2012-10-31 2014-05-14 三星Sds株式会社 基于标识符的加密、解密的方法及其执行装置
CN105743914A (zh) * 2016-03-31 2016-07-06 宇龙计算机通信科技(深圳)有限公司 一种语音加密通信方法、主叫端、被叫端及系统

Also Published As

Publication number Publication date
US10887288B2 (en) 2021-01-05
CN105743914A (zh) 2016-07-06
CN105743914B (zh) 2019-03-22
US20190116162A1 (en) 2019-04-18

Similar Documents

Publication Publication Date Title
WO2017166840A1 (zh) 一种语音加密通信方法、主叫端、被叫端及系统
US11025414B2 (en) Key exchange method and apparatus
CN106936570B (zh) 一种密钥配置方法及密钥管理中心、网元
US20150089220A1 (en) Technique For Bypassing an IP PBX
CN101917711B (zh) 一种移动通信系统及其语音通话加密的方法
CN102204303B (zh) 用于在电路交换网络中利用ims数据安全机制的系统和方法
CN101909290A (zh) 一种实现语音通话加密的方法及系统及移动终端
CN103987037A (zh) 一种保密通信实现方法及装置
CN105634737B (zh) 一种数据传输方法、终端及其系统
CN105025475A (zh) 面向Android系统的移动保密终端实现方法
CN101384042A (zh) 基于安全数字接口加密卡的手机加密方法
CN101951601A (zh) 移动通讯网中加密语音通话的方法和系统、终端及网络侧
CN111884802B (zh) 媒体流加密传输方法、系统、终端和电子设备
CN105208028A (zh) 一种数据传输方法和相关装置及设备
CN105792190A (zh) 通信系统中的数据加解密和传输方法
CN107517184A (zh) 报文传输方法、装置及系统
CN105049201A (zh) 基于量子密码的移动设备保密通信系统及方法
EP3132627B1 (en) Gsm a3/a8 authentication in an ims network
ES2777930T3 (es) Método y sistema de criptoanálisis GSM
CN106878277B (zh) 一种基于dmr标准实现语音加密的方法及装置
WO2017197968A1 (zh) 一种数据传输方法及装置
KR20160121828A (ko) 단말간 음성 및 데이터 통신시 도청을 방지하기 위한 분리형 비화장치 및 방법
CN104753876A (zh) 灵活可控的通话加密方法
CN104753869A (zh) 基于sip协议的通话加密方法
CN107079290B (zh) 一种加密通话方法及终端

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16896608

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 16896608

Country of ref document: EP

Kind code of ref document: A1