Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device supporting encryption communication

An encrypted communication and communication network technology, applied in the field of encrypted communication, can solve the problems of centralized eavesdropping of terminal voice packets, failure to achieve end-to-end encryption, inability to shield encrypted and non-encrypted voice packets, etc., and achieve the effect of preventing centralized eavesdropping

Inactive Publication Date: 2012-06-20
HUAWEI TECH CO LTD
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The inventors found that when encrypted communication is carried out in the A-interface IP-based networking mode, the terminal voice packets are easily eavesdropped on the core network side, and the MSS (Mobile Soft Switch, Mobile Soft Switch) cannot shield encrypted and non-encrypted voice packets. Does not meet end-to-end encryption requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device supporting encryption communication
  • Method and device supporting encryption communication
  • Method and device supporting encryption communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to express the object, technical solution and advantages of the present invention more clearly, the technical solution provided by the present invention will be described in detail below in conjunction with specific embodiments and drawings.

[0026] In the CDMA communication system, in the IP networking mode of the A interface, the system transmits RTP (Real-time Transport Protocol, real-time transfer protocol) frames on the A interface. Since TC (Transcode, voice codec equipment) is deployed on the core network On the MSS (Mobile Soft Switch) side, the core network side can identify the encrypted communication of the service plane and the voice packet of ordinary communication according to the X field of the RTP frame. end encryption requirements.

[0027] Embodiments of the present invention provide a method and device for supporting encrypted communication in an A-interface IP-based networking mode, such as figure 1 As shown, it is a network structure diag...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method and device supporting encryption communication in IP-based communication network, being able to prevent the terminal voice packet from centralized wiretapping and to realize the aim for terminal to terminal encryption communication. A first base station controller BSC corresponding to the calling terminal and a second BSC corresponding to the called terminal respectively determine that the communication between the calling terminal and the called terminal is switched to the encryption communication from common communication,the first BSC and the second BSC respectively send the hard switching reqiring infomation to the mobile soft switching MSS and require to switch respectively the first BSC and the second BSC from the signalling point corresponding to the IP-based A interface to signalling point corresponding to the A interface in a time division multiplex TDM mode,the first BSC and the second BSC are switched to the signalling point corresonding to the A interface in the TDM mode and starts the voice coding and decoding device TC,and the first BSC and the second BSC respectively notifies the calling terminal and the called terminal to use the encryption communication.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a method and device for supporting encrypted communication. Background technique [0002] Each node in a wireless communication system, such as a terminal, an air interface, a BSS (Base Station System, base station system), and a core network, may be intercepted and cause communication information leakage. The end-to-end encrypted communication method is to let the packets sent by both parties in the call be encrypted first with a suitable encryption algorithm. The encryption algorithm must be consistent at both ends of the sending and receiving ends. The receiving end decrypts it through the corresponding algorithm and then hand it over to the voice decoder for processing. No further processing of voice packets is performed in , nor is it expected to be recognized by any device. During the call establishment process, the calling and called terminals of the call are issued...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): A99Z99/00
CPCH04W12/04H04W12/02H04W12/033
Inventor 黎步松
Owner HUAWEI TECH CO LTD