Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method for controlling terminal to enter secret communication, secret communication method and terminal

A control method and a technology of secure communication, which is applied in the field of communication, and can solve the problems such as the indetermination of the timing of the two parties entering the secret call in the secure communication

Inactive Publication Date: 2013-01-16
LEADCORE TECH
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is to provide a control method for a terminal to enter a secret call, a secure communication method and a terminal for secure communication, so as to solve the problem that in the existing secure communication, the timing of entering a secret call between the two parties in the secret communication cannot be determined

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for controlling terminal to enter secret communication, secret communication method and terminal
  • Method for controlling terminal to enter secret communication, secret communication method and terminal
  • Method for controlling terminal to enter secret communication, secret communication method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0037] Please refer to image 3 , which is a schematic flowchart of a method for controlling a terminal entering a secret call according to an embodiment of the present invention. Such as image 3 As shown, the terminal steps as follows:

[0038] Judging whether the end handshake flag is received, if yes, the terminal enters the secret call state.

[0039] In this embodiment, the terminal is the communicating parties for secure communication, including the first terminal and the second terminal, and the key server can simultaneously send the handshake end flag to the first terminal and the second terminal.

[0040] Specifically, the key server may use a data link to send the end handshake flag to the terminal. When performing secure voice communication, the data link is a 12.2k voice link; and when performing secure video communication, the The above data link is a 64k video link. In addition, when the secure communication parties are conducting secure video communication,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for controlling a terminal to enter a secret communication, a secret communication method and a terminal for secret communication. The terminal judges whether a handshake terminating mark is received, if so, the terminal enters the secret communication. The terminal judges whether the handshake terminating mark is received to control the time when the terminal enters the secret communication, so that the secret communication parties can achieve the synchronization and the secret communication can be implemented.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a control method for a terminal to enter a secret call, a secret communication method and a terminal for secret communication. Background technique [0002] With the rapid development of modern communication technology, means of threatening the security of communication networks such as network hackers and network interception tools are also emerging. estimated loss. Therefore, how to realize the secure communication of the communication network has become a hot research topic nowadays. [0003] At present, in order to realize the secure communication of the communication network, the general practice in the industry is to encrypt the communication data and carry out confidential communication, so that even if the third party intercepts the communication data through improper means, because the communication data has been encrypted, the third party cannot easily The spec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04W12/02H04W12/04H04W12/033H04W12/041
Inventor 张烁汪文清
Owner LEADCORE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products