Method for realizing switch-over between open call/secrete call in end-to-end voice telecommunication

A technology for voice communication and encrypted call, which is applied to secure communication devices and key distribution, can solve the problems of inconvenient use of encrypted communication and inability to implement encrypted calls, and achieves the effect of ensuring confidentiality and a concise method.

Active Publication Date: 2006-08-09
HUAWEI TECH CO LTD
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] However, this method of encrypted communication requires the calling party to know that the other party supports the function of voice encryption and decryption before initiating an encrypted call. Otherwise, even if the call is successful, the normal encrypted call cannot be realized, which brings serious problems to the use of encrypted communication. great inconvenience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing switch-over between open call/secrete call in end-to-end voice telecommunication
  • Method for realizing switch-over between open call/secrete call in end-to-end voice telecommunication
  • Method for realizing switch-over between open call/secrete call in end-to-end voice telecommunication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The core idea of ​​the present invention is: using the existing end-to-end call flow, the calling party establishes a call and communicates normally. When both parties in the call need encrypted conversations, one party in the call initiates a switching request to the switch in the network control center where it is located. After receiving the switching request, the network control center judges whether the current call is clear or encrypted. After the control center applies for the key of both parties from the key distribution center and sends the applied key to the two parties in the call, the two parties in the call start the voice encryption function and enter the encrypted call; if the current call is an encrypted call, the network control center will Cancel the encrypted call and notify the two parties in the call. After receiving the notification of canceling the encrypted call, both parties will turn off the voice encryption function and enter the plain call.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The disclosed method is applicable to soft switching system composed of switchboard, cipher key distribution center, controller of base station, public telephone switching network, and encrypted gateway when a call is built for both calling party and called party, and normal communication is carried out. The method also includes following steps: receiving switching request, switchboard determines current communication mode; if the current mode is plain mode, then switchboard at the party, who initiates switching request, applies to cipher key distribution center for cipher key, and switches plain mode to cipher mode; if the current mode is cipher mode, then switchboard at the party, who initiates switching request, sends message for closing cipher mode to another party, and switches current mode to plain mode, and closes cue tone. Plain mode and cipher mode can be switched by initiating switching request by calling party without interrupting normal communication in the invention.

Description

technical field [0001] The invention relates to encryption communication technology, in particular to a method for realizing mutual switching between clear voice and encrypted voice in end-to-end voice communication. Background technique [0002] End-to-end voice encryption is a technology for voice encryption and decryption of voice communication, which can realize the encrypted transmission of voice in the air channel and core network network, but at present, this encrypted communication method requires users to It is known that the other party is also a terminal that supports voice encryption and decryption, otherwise the call may fail, which brings great inconvenience to the use of encrypted communication. [0003] Therefore, it is necessary to implement a function that can switch between ordinary voice communication and encrypted voice communication during a call, that is, without interrupting the call. In this way, the user can first establish a call by means of an or...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/22H04L9/08H04Q7/38H04L9/00
Inventor 王备
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products