A processing method, device and system for secure communication services
A technology of confidential communication and processing method, which is applied in the field of confidential communication services, and can solve the problems of inability to satisfy users and operators, and low security of data transmission on the media plane.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0108] Such as image 3 As shown, it is a schematic flowchart of a method for processing a secure communication service provided in Embodiment 1 of the present invention, and the method may be described as follows.
[0109] Step 101: The EAS receives a secure communication service establishment request message sent by the first terminal device.
[0110] Wherein, the secure communication service establishment request message is used to indicate that a secure communication service needs to be established between the first terminal device and the second terminal device, and the secure communication service establishment request message includes information for obtaining a session key. Parameter information.
[0111] In step 101, when the first terminal device calls the second terminal device, it sends a secure communication service establishment request message to the IMS network, and the core network of the IMS network forwards the secure communication service request message t...
Embodiment 2
[0159] Such as Figure 4 As shown, it is a schematic flowchart of a processing method for a secure communication service provided by Embodiment 2 of the present invention. Embodiment 2 of the present invention is an invention under the same inventive concept as Embodiment 1 of the present invention. Embodiment 2 of the present invention is a station A detailed description of the processing method of the confidential communication service involved in the present invention from the perspective of terminal equipment. The method can be described as follows.
[0160] Step 201: the first terminal device sends a secure communication service establishment request message to the encryption application server EAS.
[0161] Wherein, the secure communication service establishment request message is used to indicate that a secure communication service needs to be established between the first terminal device and the second terminal device, and the secure communication service establishmen...
Embodiment 3
[0202] Such as Figure 5 As shown, it is a schematic flowchart of a method for processing a secure communication service provided by Embodiment 3 of the present invention. Embodiment 3 of the present invention is an invention under the same inventive concept as Embodiment 1 to Embodiment 2 of the present invention. Embodiment 3 of the present invention is a detailed description of each step in Embodiment 1 of the present invention on the side of the key management center. The method can be described as follows.
[0203] Step 301: The key management center KMC receives the session key request message sent by the encryption application server EAS.
[0204] Wherein, the session key request message is used to indicate that the KMC is requested to generate a session key for the confidential communication service that needs to be established between the first terminal device and the second terminal device.
[0205] The session key request message includes parameter information for...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


