Processing method and apparatus of encrypted call, terminal, and KMC

A technology for encrypting calls and processing methods, which is applied in the field of communication, and can solve the problems of leakage of the owner's privacy and the inability to prevent malicious use of the owner's phone.

Active Publication Date: 2017-01-04
ZTE CORP
View PDF4 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to provide a processing method, device, terminal and KMC for an encrypted call, so as to solve the problem that the existing encrypted call technology cannot prevent malicious use of the owner's phone and imitate the owner's voice for encrypted calls, thereby causing the privacy of the owner to leak

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Processing method and apparatus of encrypted call, terminal, and KMC
  • Processing method and apparatus of encrypted call, terminal, and KMC
  • Processing method and apparatus of encrypted call, terminal, and KMC

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] In order to make the technical problems, technical solutions and advantages to be solved by the present invention clearer, the following will describe in detail with reference to specific embodiments and accompanying drawings.

[0066] The embodiment of the present invention provides an encrypted call processing method, device, terminal and KMC, which solves the problem that the existing encrypted call technology cannot prevent malicious use of the owner's phone and imitate the owner's voice for encrypted calls, thereby causing the owner's privacy to leak question.

[0067] The processing method of the encrypted conversation of the embodiment of the present invention, such as figure 1 shown, including:

[0068] Step S11: When the first terminal detects that the user initiates an encrypted call request through the first terminal, collects biometric information for identifying the user and encrypts it to obtain encrypted biometric information.

[0069] Step S12: sending...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a processing method and apparatus of an encrypted call, a terminal, and a KMC. The problems that in the conventional encryption call technology, malicious usage of the telephone of an owner cannot be prevented, and the voice of the owner is imitated for an encrypted call so that the privacy of the owner is leaked are solved. The method includes steps: acquiring biological feature information used for identifying the identity of a user and encrypting the biological feature information when a first terminal detects an encrypted call request initiated by the user, and obtaining encrypted biological feature information; sending a first key negotiation signaling carrying the encrypted biological feature information to the key management center (KMC); receiving a first negotiation success response message returned by the KMC after successful comparison of the decrypted encryption biological feature information and prestored biological feature information corresponding to the first terminal, wherein the first negotiation success response message carries a session key distributed for the session between the first terminal and a second terminal by the KMC; and performing an encrypted call according to the session key carried in the first negotiation success response message.

Description

technical field [0001] The present invention relates to the technical field of communication, in particular to a processing method, device, terminal and KMC for an encrypted call. Background technique [0002] When the mobile terminal needs to make an encrypted call, it usually uses an encrypted call button (hard key or screen soft key) to initiate a key negotiation with the Key Management Center (KMC). After the key negotiation is completed, both the calling party and the called party enter the Voice encrypted call process, but this process cannot prevent malicious use of the owner's phone to imitate the owner's voice for encrypted calls, resulting in the leakage of the owner's privacy. Contents of the invention [0003] The purpose of the present invention is to provide a processing method, device, terminal and KMC for an encrypted call, so as to solve the problem that the existing encrypted call technology cannot prevent malicious use of the owner's phone and imitate th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0838H04L63/0428H04L63/0861H04L9/08H04L9/40
Inventor 闫海清薛涛
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products