Unlock instant, AI-driven research and patent intelligence for your innovation.

Conversation encryption method, device and system

A technology for encrypting calls and encrypting keys, which is applied in interconnection devices, security devices, telephone communications, etc., which can solve the problems that terminals/mobile phone cards are not compatible with each other, and achieve the effect of expanding the scope of application of terminals

Pending Publication Date: 2022-07-15
CHINA TELECOM CORP LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The embodiment of the present application provides an encrypted call method, device and system, and then at least to a certain extent can solve the problem that terminals / mobile phone cards with different encryption methods are not compatible with each other, and improve the scope of application of encrypted calls.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Conversation encryption method, device and system
  • Conversation encryption method, device and system
  • Conversation encryption method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are only a part of the embodiments of the present application, but not all of the embodiments. Based on the embodiments in the present application, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present application.

[0068] Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided in order to give a thorough understanding of the embodiments of the present application. However, those skilled in the art will appreciate that the technical solutions of the present application may be practiced without one or mor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of wireless communication, and discloses an encrypted call method, device and system. The method comprises the following steps: querying respective encryption keys of two parties of a call from authentication platforms corresponding to the two parties of the call through a security control platform; and after receiving the encrypted call data of one party, decrypting the encrypted call data through the encryption key of the party and then encrypting the encrypted call data by using the encryption key of the other party to generate the call data which can be decrypted by the other party. The two communication parties do not need to use terminals or user cards with the same encryption mode, so that compatibility of terminals with multiple encryption modes is realized, and the terminal application range of encryption communication is expanded.

Description

technical field [0001] The present application relates to the field of wireless communication technologies, and in particular, to an encrypted call method, device and system. Background technique [0002] As people pay more and more attention to the protection of personal privacy, users' demands for encrypted calls are increasing day by day. In the currently widely used 4G-based VoLTE (Voice over LTE) or 5G-based VoNR (Voice / Video over New Radio), both parties to the call need to sign an encrypted call service and hold a terminal / mobile phone card with the same authentication and encryption method. Encrypted call service is available, but terminals / mobile cards with different encryption methods are not compatible with each other, and encrypted call terminals and non-encrypted call terminals cannot communicate normally. Therefore, the current terminal applicability of encrypted calls is low. SUMMARY OF THE INVENTION [0003] The embodiments of the present application prov...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/03H04W12/06H04M7/00
CPCH04W12/03H04W12/06H04M7/0078
Inventor 黎艳张荣郭茂文卢燕青
Owner CHINA TELECOM CORP LTD