Realization method of end-to-end voice encryption system based on 3G/B3G

A voice encryption and implementation method technology, applied in user identity/authority verification, key distribution, can solve problems such as not supporting encrypted voice communication, achieve the effect of reducing deployment cost and complexity, and ensuring communication process security

Inactive Publication Date: 2011-09-28
谢德育
View PDF0 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These terminals can only realize encrypted voice communication between similar terminals of the same network type, and do not support encrypted voice communication with other network devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Realization method of end-to-end voice encryption system based on 3G/B3G
  • Realization method of end-to-end voice encryption system based on 3G/B3G
  • Realization method of end-to-end voice encryption system based on 3G/B3G

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] Basic embodiments of the invention will be described in detail below with reference to the accompanying drawings, examples of which are shown. Wherever possible, the same reference numbers will be used throughout the drawings to refer to the same or like parts.

[0045] The invention is a realization method of an end-to-end voice encryption system based on 3G / B3G, which mainly includes processes such as user registration, call and communication, and communication cancellation, including key management functions.

[0046] After obtaining the ability to access the packet network, various terminals initiate registration with the CMS, and the CMS records the current user's IP address and port number, and registers its status. After registration, encrypted communication requests to registered users can be initiated at any time. At the same time, the registered terminal regularly sends a status message to the CMS, including the user ID, etc., so that the CMS considers the us...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a realization method of end-to-end voice encryption system based on 3G / B3G. A mobile encryption terminal is accessed into a grouping network through 3G / B3G, and launches registration to a communication management server (CMS); after the registration is finished, a terminal user can launch a calling request to the registered legal user; a calling party sends a calling request to the CMS; the CMS sends a communication working key request to a key management center (KMC); the KMC encrypts and packages the working key and sends to the CMS; the CMS can perform direct communication according to the communication capacity of two parties of the communication, or performs transit communication; no matter in which manner, the calling party and the called party perform mutual authentication, and receive the working key distributed by the KMC, thus the two-party encryption realizes end-to-end voice communication. The corresponding system for providing the encryption service comprises a mobile encryption terminal, a content management system (CMS) and the KMC. By utilizing the whole set of system, the end-to-end encryption voice communication can be realized.

Description

technical field [0001] The present invention relates to the field of communication, especially the end-to-end encryption communication method and related system between mobile terminals, between mobile terminals and computers, and between mobile terminals and fixed broadband network IP equipment in wireless communication fields such as 3G / B3G networks. Background technique [0002] With the rapid development of communication technology, the world is entering the information age. In the 3G / B3G network, in addition to traditional voice services, it also provides multimedia services, data services, e-commerce, Internet services and other information services. A large amount of information is transmitted on the communication network every day, including a large amount of sensitive information related to politics, economy, finance and people's life. At present, the transmission of traditional voice data in the mobile communication network is basically unencrypted. This is becaus...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/08H04W60/00H04L9/32H04L9/08H04W12/033H04W12/0431H04W12/0433H04W12/06
Inventor 谢德育
Owner 谢德育
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products