CN105101184A - Mobile terminal communication method and system based on bluetooth encryption - Google Patents

Mobile terminal communication method and system based on bluetooth encryption Download PDF

Info

Publication number
CN105101184A
CN105101184A CN201410219746.1A CN201410219746A CN105101184A CN 105101184 A CN105101184 A CN 105101184A CN 201410219746 A CN201410219746 A CN 201410219746A CN 105101184 A CN105101184 A CN 105101184A
Authority
CN
China
Prior art keywords
mobile terminal
called
bluetooth
soft switch
encryption device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410219746.1A
Other languages
Chinese (zh)
Inventor
杨辉
甘谢超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Xinglianda Technology Co ltd
Original Assignee
Shenzhen Xinglianda Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Xinglianda Technology Co ltd filed Critical Shenzhen Xinglianda Technology Co ltd
Priority to CN201410219746.1A priority Critical patent/CN105101184A/en
Publication of CN105101184A publication Critical patent/CN105101184A/en
Pending legal-status Critical Current

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a mobile terminal communication method and system based on bluetooth encryption. The method comprises the following steps: a calling mobile terminal initiates a calling request to a called mobile terminal through a soft switch mobile network, after the soft switch mobile network receives the calling request, valid authentication of the calling mobile terminal and the called mobile terminal is carried out and a communication session path is established; a secret key management center generates working secret keys, the working secret keys are distributed to the calling mobile terminal and the called mobile terminal through the soft switch mobile network, and are transmitted to a calling bluetooth encryption device and a called bluetooth encryption device. The mobile terminal communication content can be prevented from monitoring or leakage effectively, the secrecy safety performance of mobile terminal communication is raised, application is wide, and the cost is low.

Description

Based on mobile terminal communication method and the system of Bluetooth encryption
Technical field
The present invention relates to wireless encryption communication technical field, particularly a kind of mobile terminal communication method based on Bluetooth encryption and system.
Background technology
Current, routine work, the life of public mobile communication facility and people are more and more inseparable.Especially voice, data communication are as the basic service of mobile communication, become people already and mutually get in touch with, exchange and important means that information is transmitted.But, common mobile communication network is while quick communication of providing convenience for people, due to its wave point open characteristics, and the mobility of terminal phone and manageability is poor, the more difficult segmentation of public and private business, makes public network communication secure protection problem be that people can not avoid and need in the face of solving always.Particularly for important department and the unit of Party, government and army and some public safeties, finance, business, energy field, important in work have strict restriction with transmission that is sensitive information and require, easy to use and the difficult management of cell phone may make some information be leaked in communication process or illegally intercept, and can cause immeasurable loss and impact to country, department and unit.Therefore, how to adapt to change and the future developing trend of current communications facility, take out technology rationally, can operate, can implement, continuable secure communication solution is very important.
Due to the main flow business that voice communication is mobile network always, operator can eat dishes without rice or wine safety precautions is taked in access.As existing GSM/CDMA mobile network provides encipherment protection to the wireless voice of air interface between mobile phone and base station, be that protection is encrypted to the communication between wireless device terminal and RNC in 3GPP specification.But from end-to-end communication angle, there is following potential safety hazard:
A) due to the opening of public radio network in physical access characteristic, wireless network is made still to there is fragility in safety.As existing GSM network mainly through A5 cryptographic algorithm for air interface speech provides safeguard protection; and research in recent years and engineering practice have shown that A5 algorithm only provides the Cipher Strength of 40bits, this obviously can not adapt to the requirement of modern mobile secure communication far away.
B) in network side core net, the speech content of user is all with clear-text way transmission, and this makes the Speech Communication between mobile subscriber be easy to be subject to the monitoring of Virtual network operator and other illegal invasions personnel at core network part.And have secure service to customize, the enabling or close of its encryption function is only determined by operator and non often to user.Therefore when user does not know, encipherment protection function can be evaded, utilize interception facility to be easier to illegally get speech content.
Core network has moved towards IP packetizing, and IP network is the network adopting ICP/IP protocol, and this agreement exists intrinsic shortcoming and fragility.Although the safe practice in 3G system is strengthened and has been expanded many functions on the basis of former 2G, such as at user identity confidentiality. certification. do very large improvement in data security, data integrity etc., safety problem has had and has significantly improved, but still will pay much attention to the security performance of 3G network.Network security is one " war forever do not terminated ".
C) intelligent terminal can carry out online browsing, download and mutual easily, and particularly APP application software widely uses, and hacker can initiate onslaught for the defect in the hand-held devices such as mobile phone computer and causes information to be changed by illegal leakage or hold as attacking.Telecommunication consulting firm once foretold, the worm attack degree of danger that mobile telephone network faces may exceed 5 times than computer.Early generation is had by the example of hacker's virus attack in China 2G SMS.
Common mobile communication network is all experiencing constantly change and evolution from terminal, wireless access to core net.Different from legacy network, current network opening, resource-sharing, networking are virtual, application software magnanimity and user strengthen from operability and make the security threat of mobile communication and approach source become more and more various and complicated.
Therefore, for the user belonging to a category having secure communication requirement, using the key algorithm of special designs to promote its end-to-end mobile communication confidentiality is necessary requirement.
In recent years, the user belonging to a category that some mobile communication producers are higher to BM communicating requirement, released the Custom Prosthesis cell phone using private key algorithm, and briefly introduced and prove as follows at this:
The S25 type mobile phone that the TalkSECURE mobile phone of GeneralDynamicsDecisionSystems company of U.S. development, Siemens Company release and the NSK200 type mobile phone that KongsbergDefenceandAerospace company of Norway produces, embedded in voice encryption module in mobile phone, support the end-to-end speech encryption of GSM network.This type of mobile phone is used by the military-political and important commercial department buying of North Atlantic Treaty Organization(NATO) and some country.This type of mobile phone limits by network condition, and sound effect aspect also can be subject to the impact of user's compacting depth and handset processes ability.
NSPP (NewSecurePhoneProtocol) specification that GSMK company of Germany formulates is more powerful in the standard formulation of mobile phone safe cryptographic protocol, and this agreement can be used for transmitting compressed speech message under the narrowband condition that carries out in gsm networks holding-holding and the higher channel delay (being about 500 milliseconds) of tolerable.Utilize NSPP standard, GSMK company develops oneself secret mobile phone, and this mobile phone improves on Microsoft PocketPC2002 basis, its inner installation encryption software, during call, key is activated, and after call, it is eliminated at once, and cryptographic algorithm adopts AES and Blowfish.But NSPP specification is only applicable to GSM network and does not still consider the ZT mechanism of Speech Communication.
Ye You unit releases some GSM mobile handset End to End Encryption product at home, but the speech quality of encrypted voice is not bery desirable, and can not provide rationally effective Lawful Interception function, is substantially difficult to promote.
In a cdma system, due to distinctive tupe of eating dishes without rice or wine, cannot be correctly decoded the time domain speech signal of encryption in end-to-end transmitting procedure, except non-individual networking, core network gateway node make adaptive amendment, and interactive interfacing is complicated, this is suitable for wired Local physical region, and increase network security capability module, design complexities is high, cost is large, and runner public-network can not be implemented.
Generally speaking, above there are problems in method: one is that the time domain speech signal of terminal encryption has requirement to mobile network's technical system, is not suitable for the selection of user to public network multi-modulation scheme, does not also meet the trend of e-learning quality from now on; Two be customize mobile terminal cost very high, and by its life of product of components and parts Effect of Materials unsustainable, do not catch up with mobile terminal technical development paces yet, can not be had the user of basic secure communication demand receive, can not promote; Three is that some scheme is not supported to monitor, and has only carried out standardization to the Lawful Interception of 2G, 2.5G, 3G system side in the world at present, but has not been suitable for End to End Encryption pattern; Four be in view of secrecy technology sensitiveness and application department importance, this type of external secrecy technology can not export to China, and the Chinese government, army, diplomacy and important commercial department also can not use from external private communication technology.
Summary of the invention
The present invention proposes a kind of mobile terminal communication method based on Bluetooth encryption and system, and can effectively prevent communication of mobile terminal content monitored or leak, improve the secret and safe performance of communication of mobile terminal, and be widely used, cost is lower.
For achieving the above object, the present invention adopts following technical scheme:
Based on a mobile terminal communication method for Bluetooth encryption, comprise the following steps:
One calling mobile terminal, the caller Bluetooth encryption device being connected to described calling mobile terminal by bluetooth and called mobile terminal are provided, are connected to the called Bluetooth encryption device of described called mobile terminal by bluetooth;
Described calling mobile terminal and called mobile terminal carry out authentication and certification respectively by soft switch mobile network;
Described calling mobile terminal by soft switch mobile network to the called mobile terminal request of making a call, after described soft switch mobile network receives described call request, legitimate authentication is carried out to described calling mobile terminal and called mobile terminal and sets up communication session path;
KMC generates working key, and is distributed to described calling mobile terminal and called mobile terminal by soft switch mobile network, and is transferred to caller Bluetooth encryption device and called Bluetooth encryption device;
Described caller Bluetooth encryption device is encrypted formation session ciphertext according to the public keys of soft switch mobile network and working key to the session information data that calling mobile terminal sends, and sends to called mobile terminal by soft switch mobile network; After described called mobile terminal receives session ciphertext, by called Bluetooth encryption device, this session ciphertext is decrypted to the session information data obtaining calling mobile terminal and send.
Further, above-mentioned based in the mobile terminal communication method of Bluetooth encryption, the step that described calling mobile terminal and called mobile terminal carry out authentication and certification respectively by soft switch mobile network specifically comprises:
Calling mobile terminal sends IP call request to soft switch mobile network, and sending the cell-phone number of calling mobile terminal and the corresponding bluetooth number of caller Bluetooth encryption device to soft switch mobile network after receiving soft switch mobile network response, described soft switch mobile network carries out legitimate authentication and authentication to calling mobile terminal and caller Bluetooth encryption device;
Called mobile terminal sends the cell-phone number of called mobile terminal and the corresponding bluetooth number of called Bluetooth encryption device to soft switch mobile network, and described soft switch mobile network carries out legitimate authentication and authentication to called mobile terminal and called Bluetooth Bluetooth encryption device.
Further, above-mentioned based in the mobile terminal communication method of Bluetooth encryption, described calling mobile terminal by step from soft switch mobile network to the called mobile terminal request of making a call before comprise:
Described calling mobile terminal and called mobile terminal are downloaded respectively and are installed the VoIP client of soft switch mobile network, and complete registration to soft switch mobile network.
Further, above-mentioned based in the mobile terminal communication method of Bluetooth encryption, the step that described KMC generates working key specifically comprises:
KMC produces working key separately according to this session, or, regularly for different user group produces working key in respective group.
Further, above-mentioned based in the mobile terminal communication method of Bluetooth encryption, described caller Bluetooth encryption device and/or called Bluetooth encryption device are connected to computer by USB interface.
Further, above-mentioned based in the mobile terminal communication method of Bluetooth encryption, described calling mobile terminal and called mobile terminal are mobile phone, and described caller Bluetooth encryption device and called Bluetooth encryption device are bluetooth earphone.
Separately, the present invention also provides a kind of mobile terminal communication system based on Bluetooth encryption, comprise: calling mobile terminal, the caller Bluetooth encryption device being connected to described calling mobile terminal by bluetooth, called mobile terminal, the called Bluetooth encryption device being connected to described called mobile terminal by bluetooth and soft switch mobile network and KMC, described soft switch mobile network is used for carrying out authentication and certification respectively to stating calling mobile terminal and called mobile terminal and setting up communication session path, described KMC is for generating working key, described soft switch mobile network is also for being distributed to described calling mobile terminal and called mobile terminal by public keys and working key, described caller Bluetooth encryption device is used for being encrypted the session information data that calling mobile terminal sends according to the public keys of soft switch mobile network and working key forming session ciphertext, and send to called mobile terminal by soft switch mobile network, described called Bluetooth encryption device is used for being decrypted to the session ciphertext received the session information data obtaining calling mobile terminal and send.
The mobile terminal communication method and the system that the present invention is based on Bluetooth encryption carry out superencipher by caller Bluetooth encryption device to the session information data that calling mobile terminal sends, can effectively prevent communication of mobile terminal content monitored or leak, improve the secret and safe performance of communication of mobile terminal, and be widely used, cost is lower.
Accompanying drawing explanation
Fig. 1 is the idiographic flow schematic diagram of the mobile terminal communication method that the present invention is based on Bluetooth encryption;
Fig. 2 is the network topological diagram of the mobile terminal communication method that the present invention is based on Bluetooth encryption;
Fig. 3 is the structural representation of the mobile terminal communication system that the present invention is based on Bluetooth encryption.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearly understand, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
The invention provides a kind of mobile terminal communication method based on Bluetooth encryption, comprise the following steps: a calling mobile terminal, the caller Bluetooth encryption device being connected to described calling mobile terminal by bluetooth and called mobile terminal are provided, are connected to the called Bluetooth encryption device of described called mobile terminal by bluetooth; Described calling mobile terminal and called mobile terminal carry out authentication and certification respectively by soft switch mobile network; Described calling mobile terminal by soft switch mobile network to the called mobile terminal request of making a call, after described soft switch mobile network receives described call request, legitimate authentication is carried out to described calling mobile terminal and called mobile terminal and sets up communication session path; KMC generates working key, and is distributed to described calling mobile terminal and called mobile terminal by soft switch mobile network, and is transferred to caller Bluetooth encryption device and called Bluetooth encryption device; Described caller Bluetooth encryption device is encrypted formation session ciphertext according to the public keys of soft switch mobile network and working key to the session information data that calling mobile terminal sends, and sends to called mobile terminal by soft switch mobile network; After described called mobile terminal receives session ciphertext, by called Bluetooth encryption device, this session ciphertext is decrypted to the session information data obtaining calling mobile terminal and send.Like this, by caller Bluetooth encryption device, superencipher is carried out to the session information data that calling mobile terminal sends, communication of mobile terminal content effectively can be prevented monitored or leak, improve the secret and safe performance of communication of mobile terminal, and be widely used, cost is lower.
Refer to Fig. 1 and Fig. 2, Fig. 1 is the idiographic flow schematic diagram of the mobile terminal communication method that the present invention is based on Bluetooth encryption.In the present embodiment, calling mobile terminal is caller mobile phone, and called mobile terminal is called mobile phone, and caller Bluetooth encryption device is the caller bluetooth earphone being provided with encryption chip, and called Bluetooth encryption device is the called bluetooth earphone being provided with encryption chip.Certain calling mobile terminal and called mobile terminal also can be the panel computer with Bluetooth function, and notebook computer etc., said method comprising the steps of:
Step S101: caller mobile phone sends IP call request to soft switch mobile network, and sending the cell-phone number of caller mobile phone and the corresponding bluetooth number of caller bluetooth earphone to soft switch mobile network after receiving soft switch mobile network response, described soft switch mobile network carries out legitimate authentication and authentication to caller mobile phone and caller bluetooth earphone;
Refer to Fig. 2, when specific implementation, soft switch mobile network has fixing public network IP address; Authentication and certification are carried out to the caller mobile phone and called mobile phone of initiating VoIP business, caller mobile phone and called mobile phone use respective username and password to sign in on the server of soft switch mobile network, carry out authentication and certification by HSS/AUC (mobile network's home subscriber server and AUC).
Step S102: called mobile phone sends the cell-phone number of called mobile phone and the corresponding bluetooth number of called bluetooth earphone to soft switch mobile network, and described soft switch mobile network carries out legitimate authentication and authentication to called mobile phone and called bluetooth earphone;
Step S103: described caller mobile phone and called mobile phone are downloaded respectively and installed the VoIP client of soft switch mobile network, and complete registration to soft switch mobile network (IP network server);
Described VoIP client and network telephone software, downloaded by mobile terminal and install, and support terminal initiates voip conversation; Android, iOS, WP mobile phone operating system can be supported.
Step S104: described caller mobile phone by VoIP client to the called mobile phone request of making a call;
Step S105: after described soft switch mobile network receives described call request, carries out legitimate authentication to described caller mobile phone and called mobile phone;
Described soft switch mobile network can set up voip call link and connects and control; Be responsible for user's registration and management, comprise and the behaviors such as user's login, calling are recorded and stored the speech channel media stream content of specifying; JT path is provided.This IP network server can be multiple in online deployment, are distributed in domestic zones of different, or dispose etc. by the different user group of service.
Step S106: described soft switch mobile network sets up communication session path to described caller mobile phone and called mobile phone;
Step S107: generate working key by KMC, and be distributed to described caller mobile phone and called mobile phone by soft switch mobile network;
When specific implementation, described KMC (KMC) is responsible for cipher key service and the management entity such as generation, preservation, backup, distribution, renewal, recovery, inquiry of user job key.
The working key that KMC (KMC) produces can produce separately Xinmi City based on each session (namely one will talk about a close pattern), also can regularly for different user group produce working key in respective group, and to user's distribute work key in group.
Step S108: described working key respectively by caller mobile phone and called mobile phone by Bluetooth transmission to caller bluetooth earphone and called bluetooth earphone;
Described caller mobile phone and called mobile phone support function of Bluetooth communication, provide the packet domain client of two-way multimedia communication capacity.
Described caller bluetooth earphone and called bluetooth earphone and caller mobile phone and called mobile phone realize two-way Bluetooth communication, except there is voice pickup function, can tape splicing data acquisition function, as IMAQ; Also by this equipment, voice are carried out to the information that mobile phone transmission comes, image broadcasts.
Step S109: described caller bluetooth earphone is encrypted formation session ciphertext according to the public keys of soft switch mobile network and working key to the session information data that caller mobile phone sends, and sends to called mobile phone by soft switch mobile network;
When specific implementation, described caller bluetooth earphone and called bluetooth earphone are all containing encryption chip, and it can add JieM process to voice, data-signal.Crypto module is arranged in bluetooth earphone usually, adds JieM to the voice-and-data media information in bluetooth earphone, and carries out the broadcasting after Media Stream JieM or the transmission after JM by bluetooth earphone.Also by realizing above-mentioned functions with computer or fixing IP phone.Crypto module self is injected with public keys, and can receive and store the working key that KMC issues.
Step S110: after described called mobile phone receives session ciphertext, is decrypted the session information data obtaining caller mobile phone and send to this session ciphertext by called bluetooth earphone.
Described called mobile phone carries out voice by called bluetooth earphone to the session information that the transmission of caller mobile phone comes, image broadcasts.
It should be noted that, the mobile terminal communication method that the present invention is based on Bluetooth encryption also can comprise mobile phone, Bluetooth encryption device and computer, described Bluetooth encryption device is connected to computer by USB interface, by the session information data encryption of Bluetooth encryption device by computer, and send to half-session by mobile phone; And after the mobile phone of half-session receives session ciphertext, be decrypted into session information data by Bluetooth encryption device, and undertaken showing or playing by computer.
Refer to Fig. 3, Fig. 3 is the structural representation of the mobile terminal communication system that the present invention is based on Bluetooth encryption.
A kind of mobile terminal communication system based on Bluetooth encryption of the present invention comprises: calling mobile terminal 10, the caller Bluetooth encryption device 20 being connected to described calling mobile terminal 10 by bluetooth, called mobile terminal 30, the called Bluetooth encryption device 40 being connected to described called mobile terminal 30 by bluetooth and soft switch mobile network 50 and KMC 60, and described soft switch mobile network 50 is for carrying out authentication and certification respectively to stating calling mobile terminal 10 and called mobile terminal 30 and set up communication session path, described KMC 60 is for generating working key, described soft switch mobile network 50 is also for being distributed to described calling mobile terminal 10 and called mobile terminal 30 by public keys and working key, described caller Bluetooth encryption device 20 forms session ciphertext for being encrypted the session information data that calling mobile terminal 10 sends according to the public keys of soft switch mobile network and working key, and send to called mobile terminal 30 by soft switch mobile network 50, described called Bluetooth encryption device 40 is for being decrypted the session information data obtaining calling mobile terminal 10 and send to the session ciphertext received.
Compared to prior art, the mobile terminal communication method and the system that the present invention is based on Bluetooth encryption carry out superencipher by caller Bluetooth encryption device to the session information data that calling mobile terminal sends, can effectively prevent communication of mobile terminal content monitored or leak, improve the secret and safe performance of communication of mobile terminal, and be widely used, cost is lower.
Here description of the invention and application is illustrative, not wants by scope restriction of the present invention in the above-described embodiments.Distortion and the change of embodiment disclosed are here possible, are known for the replacement of embodiment those those of ordinary skill in the art and the various parts of equivalence.Those skilled in the art are noted that when not departing from spirit of the present invention or substantive characteristics, the present invention can in other forms, structure, layout, ratio, and to realize with other assembly, material and parts.When not departing from the scope of the invention and spirit, can other distortion be carried out here to disclosed embodiment and change.

Claims (7)

1. based on a mobile terminal communication method for Bluetooth encryption, it is characterized in that, said method comprising the steps of:
One calling mobile terminal, the caller Bluetooth encryption device being connected to described calling mobile terminal by bluetooth and called mobile terminal are provided, are connected to the called Bluetooth encryption device of described called mobile terminal by bluetooth;
Described calling mobile terminal and called mobile terminal carry out authentication and certification respectively by soft switch mobile network;
Described calling mobile terminal by soft switch mobile network to the called mobile terminal request of making a call, after described soft switch mobile network receives described call request, legitimate authentication is carried out to described calling mobile terminal and called mobile terminal and sets up communication session path;
KMC generates working key, and is distributed to described calling mobile terminal and called mobile terminal by soft switch mobile network, and is transferred to caller Bluetooth encryption device and called Bluetooth encryption device;
Described caller Bluetooth encryption device is encrypted formation session ciphertext according to the public keys of soft switch mobile network and working key to the session information data that calling mobile terminal sends, and sends to called mobile terminal by soft switch mobile network; After described called mobile terminal receives session ciphertext, by called Bluetooth encryption device, this session ciphertext is decrypted to the session information data obtaining calling mobile terminal and send.
2. the mobile terminal communication method based on Bluetooth encryption according to claim 1, is characterized in that, the step that described calling mobile terminal and called mobile terminal carry out authentication and certification respectively by soft switch mobile network specifically comprises:
Calling mobile terminal sends IP call request to soft switch mobile network, and sending the cell-phone number of calling mobile terminal and the corresponding bluetooth number of caller Bluetooth encryption device to soft switch mobile network after receiving soft switch mobile network response, described soft switch mobile network carries out legitimate authentication and authentication to calling mobile terminal and caller Bluetooth encryption device;
Called mobile terminal sends the cell-phone number of called mobile terminal and the corresponding bluetooth number of called Bluetooth encryption device to soft switch mobile network, and described soft switch mobile network carries out legitimate authentication and authentication to called mobile terminal and called Bluetooth Bluetooth encryption device.
3. the mobile terminal communication method based on Bluetooth encryption according to claim 2, is characterized in that, described calling mobile terminal by soft switch mobile network to called mobile terminal make a call request step before comprise:
Described calling mobile terminal and called mobile terminal are downloaded respectively and are installed the VoIP client of soft switch mobile network, and complete registration to soft switch mobile network.
4. the mobile terminal communication method based on Bluetooth encryption according to claim 1, is characterized in that, the step that described KMC generates working key specifically comprises:
KMC produces working key separately according to this session, or, regularly for different user group produces working key in respective group.
5. the mobile terminal communication method based on Bluetooth encryption according to any one of claim 1-4, is characterized in that, described caller Bluetooth encryption device and/or called Bluetooth encryption device are connected to computer by USB interface.
6. the mobile terminal communication method based on Bluetooth encryption according to claim 5, is characterized in that, described calling mobile terminal and called mobile terminal are mobile phone, and described caller Bluetooth encryption device and called Bluetooth encryption device are bluetooth earphone.
7. the mobile terminal communication system based on Bluetooth encryption of a kind, it is characterized in that, described system comprises: calling mobile terminal, the caller Bluetooth encryption device being connected to described calling mobile terminal by bluetooth, called mobile terminal, the called Bluetooth encryption device being connected to described called mobile terminal by bluetooth and soft switch mobile network and KMC, and described soft switch mobile network is used for carrying out authentication and certification respectively to stating calling mobile terminal and called mobile terminal and setting up communication session path, described KMC is for generating working key, described soft switch mobile network is also for being distributed to described calling mobile terminal and called mobile terminal by public keys and working key, described caller Bluetooth encryption device is used for being encrypted the session information data that calling mobile terminal sends according to the public keys of soft switch mobile network and working key forming session ciphertext, and send to called mobile terminal by soft switch mobile network, described called Bluetooth encryption device is used for being decrypted to the session ciphertext received the session information data obtaining calling mobile terminal and send.
CN201410219746.1A 2014-05-23 2014-05-23 Mobile terminal communication method and system based on bluetooth encryption Pending CN105101184A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410219746.1A CN105101184A (en) 2014-05-23 2014-05-23 Mobile terminal communication method and system based on bluetooth encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410219746.1A CN105101184A (en) 2014-05-23 2014-05-23 Mobile terminal communication method and system based on bluetooth encryption

Publications (1)

Publication Number Publication Date
CN105101184A true CN105101184A (en) 2015-11-25

Family

ID=54580517

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410219746.1A Pending CN105101184A (en) 2014-05-23 2014-05-23 Mobile terminal communication method and system based on bluetooth encryption

Country Status (1)

Country Link
CN (1) CN105101184A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107426670A (en) * 2017-04-28 2017-12-01 恒宝股份有限公司 A kind of Bluetooth encryption communication system and communication means

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1681241A (en) * 2004-04-07 2005-10-12 华为技术有限公司 Secret key distributing method of end-to-end encrypted telecommunication
CN1705261A (en) * 2004-05-28 2005-12-07 华为技术有限公司 End-to-end encrypting communication system and method
CN101159907A (en) * 2007-11-20 2008-04-09 青岛海信移动通信技术股份有限公司 Method and system of encrypting multimode mobile communication terminal
CN101175074A (en) * 2006-11-01 2008-05-07 华为技术有限公司 Method and system for implementing end-to-end media stream cryptographic key negotiation
CN102137394A (en) * 2011-03-10 2011-07-27 中国科学院上海微***与信息技术研究所 Encrypted mobile communication terminal system and method under network access
CN102202299A (en) * 2010-03-26 2011-09-28 谢德育 Realization method of end-to-end voice encryption system based on 3G/B3G
CN102843677A (en) * 2012-08-14 2012-12-26 福建伊时代信息科技股份有限公司 Voice communication method, device and system
CN202713330U (en) * 2012-08-22 2013-01-30 北京子衿晨风科技有限公司 Encrypted communication system
WO2013046088A1 (en) * 2011-09-27 2013-04-04 Koninklijke Philips Electronics N.V. Management of group secrets by group members
CN203279187U (en) * 2013-05-17 2013-11-06 徐增华 Voice encryption bluetooth earphone with fingerprint identification function

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1681241A (en) * 2004-04-07 2005-10-12 华为技术有限公司 Secret key distributing method of end-to-end encrypted telecommunication
CN1705261A (en) * 2004-05-28 2005-12-07 华为技术有限公司 End-to-end encrypting communication system and method
CN101175074A (en) * 2006-11-01 2008-05-07 华为技术有限公司 Method and system for implementing end-to-end media stream cryptographic key negotiation
CN101159907A (en) * 2007-11-20 2008-04-09 青岛海信移动通信技术股份有限公司 Method and system of encrypting multimode mobile communication terminal
CN102202299A (en) * 2010-03-26 2011-09-28 谢德育 Realization method of end-to-end voice encryption system based on 3G/B3G
CN102137394A (en) * 2011-03-10 2011-07-27 中国科学院上海微***与信息技术研究所 Encrypted mobile communication terminal system and method under network access
WO2013046088A1 (en) * 2011-09-27 2013-04-04 Koninklijke Philips Electronics N.V. Management of group secrets by group members
CN102843677A (en) * 2012-08-14 2012-12-26 福建伊时代信息科技股份有限公司 Voice communication method, device and system
CN202713330U (en) * 2012-08-22 2013-01-30 北京子衿晨风科技有限公司 Encrypted communication system
CN203279187U (en) * 2013-05-17 2013-11-06 徐增华 Voice encryption bluetooth earphone with fingerprint identification function

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107426670A (en) * 2017-04-28 2017-12-01 恒宝股份有限公司 A kind of Bluetooth encryption communication system and communication means
CN107426670B (en) * 2017-04-28 2020-01-03 恒宝股份有限公司 Bluetooth encryption communication system and communication method

Similar Documents

Publication Publication Date Title
Rupprecht et al. On security research towards future mobile network generations
JP6431592B2 (en) Method and apparatus for self-configuring a base station
Rupprecht et al. Call me maybe: Eavesdropping encrypted {LTE} calls with {ReVoLTE}
JP3513054B2 (en) Method for securing airborne communications in wireless systems
CN101635924B (en) CDMA port-to-port encryption communication system and key distribution method thereof
CN102202299A (en) Realization method of end-to-end voice encryption system based on 3G/B3G
WO2012024903A1 (en) Method for encrypting voice calls in mobile communication network, and system, terminal, and network side thereof
Paik Stragglers of the herd get eaten: Security concerns for GSM mobile banking applications
CN103795966B (en) A kind of security video call implementing method and system based on digital certificate
CN101909290A (en) Method, system and mobile terminal for encrypting voice call
WO2020133543A1 (en) Communication method and related product
Cattaneo et al. Security Issues and Attacks on the GSM Standard: a Review.
CN112806041B (en) Key generation method, device and system
WO2012024905A1 (en) Method, terminal and ggsn for encrypting and decrypting data in mobile communication network
CN104168565A (en) Method for controlling safe communication of intelligent terminal under undependable wireless network environment
Ntantogian et al. A survey of voice and communication protection solutions against wiretapping
CN106856606A (en) Communication means, communication system and mobile terminal
Cattaneo et al. A review of security attacks on the GSM standard
CN108270917B (en) Encrypted smart phone
Nohl et al. Gsm sniffing
CN105101184A (en) Mobile terminal communication method and system based on bluetooth encryption
Kumar et al. Security issues in m-government
Singh et al. Security analysis of lte/sae networks with the possibilities of tampering e-utran on ns3
KR101527053B1 (en) System for supporting the mobile terminal having the protection of private life from wiretapping and hacking into network on communications terminal
Raza et al. On Key Reinstallation Attacks over 4G LTE Control-Plane: Feasibility and Negative Impact

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20151125

WD01 Invention patent application deemed withdrawn after publication