CN106982419B - Single call end-to-end encryption method and system for broadband cluster system - Google Patents

Single call end-to-end encryption method and system for broadband cluster system Download PDF

Info

Publication number
CN106982419B
CN106982419B CN201610029158.0A CN201610029158A CN106982419B CN 106982419 B CN106982419 B CN 106982419B CN 201610029158 A CN201610029158 A CN 201610029158A CN 106982419 B CN106982419 B CN 106982419B
Authority
CN
China
Prior art keywords
user terminal
key
encrypted
public key
call
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201610029158.0A
Other languages
Chinese (zh)
Other versions
CN106982419A (en
Inventor
杨美荟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Potevio Information Technology Co Ltd
Original Assignee
Potevio Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Potevio Information Technology Co Ltd filed Critical Potevio Information Technology Co Ltd
Priority to CN201610029158.0A priority Critical patent/CN106982419B/en
Publication of CN106982419A publication Critical patent/CN106982419A/en
Application granted granted Critical
Publication of CN106982419B publication Critical patent/CN106982419B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • H04W84/08Trunked mobile radio systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Computer And Data Communications (AREA)

Abstract

The application discloses a single call end-to-end encryption method of a broadband cluster system, which comprises the following steps: a security server in the scheduling application platform generates a public key and a private key of the first user terminal and transmits the public key and the private key to the first user terminal; in the process of calling a second user terminal by a first user terminal, sending a public key of the first user terminal to the second user terminal; the second user terminal generates a session key of the call, and transmits the session key encrypted by the public key of the first user terminal to the first user terminal in the call response process; the first user terminal decrypts the encrypted session key by adopting a private key of the first user terminal to obtain a decrypted session key; the first user terminal encrypts the communication content by using the session key, and transmits the encrypted communication content to the second user terminal, and the second user terminal decrypts the received communication content by using the session key. The scheme of the application can realize one-telephone one-secret without increasing the call delay.

Description

Single call end-to-end encryption method and system for broadband cluster system
Technical Field
The present application relates to the field of mobile communications technologies, and in particular, to a broadband trunking communication technology, and in particular, to a single-call end-to-end encryption method and system for a broadband trunking system.
Background
The broadband cluster (B-trunC) air interface standard is oriented to the broadband requirements of dispatching command and production operation in the industries of public safety, city management and emergency, energy transportation and the like, enhances the broadband cluster functions of voice cluster, multimedia dispatching and the like on the basis of being compatible with LTE R9 broadband data service, and supports flexible bandwidth from 20MHz to 1.4 MHz. The broadband trunking (B-trunk) air interface adopts an innovative downlink shared channel technology, the spectrum efficiency of the group communication service is greatly improved, the trunking function performance index reaches or exceeds the technical level of a professional digital trunking, and the broadband trunking communication standard internationally supports point-to-multipoint voice call, point-to-multipoint multimedia trunking dispatching and other public safety and disaster reduction applications.
In the prior art, the B-TrunC standard has defined a trunking single call service flow, but has not defined a trunking single call end-to-end encryption implementation scheme. For end-to-end encryption of single call service, if the requirement of one-to-one encryption is to be met, a key negotiation process is generally performed in the call process, which needs to increase call delay.
Disclosure of Invention
The application provides a single-call end-to-end encryption method and a single-call end-to-end encryption system for a broadband cluster system, which can realize one-call one-secret without increasing call delay.
The single call end-to-end encryption method for the broadband cluster system, provided by the embodiment of the application, comprises the following steps:
A. a security server in the scheduling application platform generates a public key and a private key of the first user terminal and transmits the public key and the private key to the first user terminal;
B. in the process of calling a second user terminal by a first user terminal, sending a public key of the first user terminal to the second user terminal;
C. the second user terminal generates a session key of the call, and transmits the session key encrypted by the public key of the first user terminal to the first user terminal in the call response process;
D. the first user terminal decrypts the encrypted session key by adopting a private key of the first user terminal to obtain a decrypted session key;
E. the first user terminal encrypts the communication content by using the session key, and transmits the encrypted communication content to the second user terminal, and the second user terminal decrypts the received communication content by using the session key.
Optionally, the method further comprises: the security server updates the public key and the private key of the user terminal periodically.
Optionally, the method further comprises: the security server remotely destroys the public key and the private key of the user terminal.
Optionally, step a comprises:
a1, registering the first user terminal and the security server in the cluster system;
a2, the first user terminal and the security server carry out mutual authentication process, establish secure connection and share secret key;
a3, the security server generates a public key and a private key of the first user terminal, and transmits the encrypted public key and private key to the first user terminal through the security encryption of the shared key;
a4, the first user terminal decrypts the received public key and private key by the shared secret key to obtain the plaintext public key and private key.
Optionally, the shared key is a root key of the first user terminal.
Optionally, in step B, the clear text of the public key of the first user terminal is carried in the call establishment request sent by the first user terminal to the second user terminal.
Optionally, in step C, the encrypted session key is carried in a call confirmation message sent by the second user terminal to the first user terminal.
Optionally, the call confirmation message has an end-to-end encrypted session key selectable message body for carrying the encrypted session key.
The embodiment of the application also provides a broadband cluster system, which comprises a scheduling application platform, a cluster core network and a user terminal, wherein the scheduling application platform comprises a security server, and is used for mutually authenticating with an encryption and decryption module of the user terminal, receiving a shared key of the user terminal after establishing security connection, generating a public key and a private key of the user terminal, encrypting the public key and the private key by using the shared key, and transmitting the encrypted public key and the encrypted private key to the user terminal;
the user terminal includes:
the encryption and decryption module is used for obtaining a root key of the user terminal as a shared key after authentication between the user terminal and the encryption and decryption module; decrypting the public key and the private key received by the security service interface module by using the shared secret key to obtain a public key and a private key of a plaintext; decrypting the encrypted session key received by the calling module by using a private key to obtain a decrypted session key; encrypting the communication content using the session key; the encryption and decryption module is also used for generating a session key of the call when the call module receives plaintext public keys from other terminals, and encrypting the session key by using the received public key; and decrypting the encrypted communication content received by the call module using the session key;
the security service interface module is used for mutually authenticating with the security server, sending the shared secret key to the security server after establishing security connection, and receiving the encrypted public key and the encrypted private key from the security server;
the calling module is used for sending the public key to the called terminal and receiving the encrypted session key from the called terminal in the process that the user terminal serves as a calling terminal to call the called terminal; transmitting the encrypted communication content to the called terminal; and the encryption and decryption module is also used for receiving the plaintext public key from the calling terminal, sending the encrypted session key obtained by the encryption and decryption module to the calling terminal and receiving the encrypted communication content from the calling terminal in the process that the user terminal serves as a called terminal to answer the call.
Optionally, the secure server updates the public key and the private key of the user terminal periodically.
Optionally, the security server remotely destroys the public key and the private key of the user terminal.
Optionally, the scheduling application platform further includes a sound and video recording server, where the sound and video recording server includes an encryption card, and is used to implement sound and video recording of the end-to-end encryption service.
According to the technical scheme, the security server on the network side distributes the key, the user terminal which obtains the key is used as the calling terminal to initiate the single call, the called terminal generates the session key and returns the session key to the calling terminal after being encrypted by the public key of the calling terminal, and the session content is encrypted by the session key. The scheme is suitable for end-to-end encryption of broadband cluster single call service, one session can be encrypted, the key distribution process is combined in the call establishment flow, the call process does not need to be additionally increased, and the call establishment delay is not changed.
Drawings
Fig. 1 is a schematic diagram of an end-to-end encrypted network device architecture according to an embodiment of the present application;
fig. 2 is a schematic diagram of a key distribution process provided in an embodiment of the present application;
fig. 3 is a schematic diagram of a single call flow for implementing end-to-end encryption according to an embodiment of the present application.
Detailed Description
The single-call end-to-end encryption method for the broadband trunking system requires that a calling terminal has a public key and a private key, and the basic flow comprises the following steps:
a security server in the scheduling application platform generates a public key and a private key of the first user terminal and transmits the public key and the private key to the first user terminal;
in the process of calling a second user terminal by a first user terminal, sending a public key of the first user terminal to the second user terminal;
the second user terminal generates a session key of the call, and transmits the session key encrypted by the public key of the first user terminal to the first user terminal in the call response process;
the first user terminal decrypts the encrypted session key by adopting a private key of the first user terminal to obtain a decrypted session key;
the first user terminal encrypts the communication content by using the session key, and transmits the encrypted communication content to the second user terminal, and the second user terminal decrypts the received communication content by using the session key. In the subsequent call, the second user terminal may also encrypt the communication content with the session key, send the encrypted communication content to the first user terminal, and the first user terminal decrypts the received communication content with the session key.
In order to make the technical principle, characteristics and technical effects of the technical scheme of the present application clearer, the technical scheme of the present application is explained in detail with reference to specific embodiments below.
The network device architecture of end-to-end encryption provided by the embodiment of the application is shown in fig. 1. The scheduling application platform 101 includes a plurality of entities: the system comprises a multimedia dispatching Desk (DC), a security server (SeS), a recording/recording server (ReS) and an application server (ApS), wherein the main functions comprise multimedia dispatching command, a unified security mechanism, recording/recording and playback and system expansion application. Each entity has a hardware device or a logic entity: and the encryption card 102 is used for realizing end-to-end encryption service.
The security server is used for realizing key generation and key distribution. Specifically, the security server performs mutual authentication with the encryption and decryption module 105 of the user terminal 104, establishes a secure connection, receives a shared secret key of the user terminal 104, generates a public key and a private key of the user terminal, encrypts the public key and the private key using the shared secret key, and transmits the encrypted public key and the encrypted private key to the user terminal.
The user terminal 104 has therein hardware devices or logical entities: an encryption and decryption module 105. The encryption and decryption module 105 and the user terminal 104 have a communication interface therebetween, and the encryption and decryption module 105 is used for performing authentication between the user terminal 104 and the encryption and decryption module 105 and an authentication process between the encryption and decryption module 105 and a network side, thereby realizing an encryption and decryption function of service data.
Another embodiment of the present application provides a single-call end-to-end encryption method for a broadband cluster system, where a single-call key uses a public key system scheme, and a security server performs periodic key update, and may perform key update on line or perform remote key destruction. The key update procedure may be performed periodically, and the same procedure as the first key distribution may be employed.
The encryption scheme at least comprises a key distribution process and a single call flow for realizing end-to-end encryption by using the key. The key distribution process is incorporated in the call setup procedure, as shown in fig. 2, and includes the following steps:
step 201: and the encryption and decryption module of the user terminal and the security server are registered in the cluster system.
Step 202: the encryption and decryption module of the user terminal and the security server perform mutual authentication process, establish secure connection and perform key sharing. The shared key Ks is the root key of the user terminal.
Step 203: the security server generates a public Key (KPU) and a private Key (KPR) of the user terminal. And the encrypted public key and the encrypted private key are transmitted to the user terminal through the secure encryption of the shared secret key Ks.
Step 204: and the encryption and decryption module of the user terminal decrypts the received public key and the private key by using the shared key to obtain the public key and the private key of the plaintext.
The user terminal registers in the cluster system, and after the network distributes the public key or the private key to the terminal with the end-to-end encryption capability, the terminal can participate in the encrypted single call.
Fig. 3 shows a single call flow for implementing end-to-end encryption according to an embodiment of the present application, which includes the following steps:
step 301: a calling terminal (UE-O) initiates a single call and sends a call establishment request to a Trunking Core Network (TCN). The clear text in the call setup request carries the public key of the UE-O.
Initiating a call at a user terminal, providing an end-to-end encryption option on a call interface, and carrying public key information of UE-O in a call establishment request message and subsequently performing encryption single call if a user selects to initiate the end-to-end encryption call; if the user chooses not to encrypt, the call establishment request does not carry the public key information, and then the common single call is carried out.
Step 302: the cluster core network sends the public key information to a called terminal (UE-T) through a call establishment request of a called side.
Step 303: the called terminal locally generates a session key (e2eSK) for the call.
Step 304: the called terminal sends a call confirmation message to the cluster core network, wherein the call confirmation message carries a session key encrypted by the public key of the calling terminal. The call confirmation message has an end-to-end encryption session key selectable message body used for carrying the encrypted session key.
Step 305: and the cluster core network sends the call confirmation message carrying the session key encrypted by the public key of the calling terminal to the calling terminal.
Step 306: after receiving the call confirmation message of the call, the calling terminal decrypts the message by using the private key of the calling terminal to obtain the session key of the call.
Steps 307 to 309: the called terminal plays the ringing tone, the called terminal answers, and the calling terminal sends an answer response message.
Step 310: the calling terminal encrypts the communication content with the session key and transmits the encrypted communication content to the called terminal. The communication content may be a media stream or a speech encoded stream.
Step 311: the called terminal decrypts the received communication content with the session key.
Similarly, during the session, the called terminal may encrypt the communication content with the session key and send the encrypted communication content to the calling terminal, and the calling terminal decrypts the received communication content with the session key.
It should be understood that although the present description has been described in terms of various embodiments, not every embodiment includes only a single embodiment, and such description is for clarity purposes only, and those skilled in the art will recognize that the embodiments described herein can be combined as a whole to form other embodiments as would be understood by those skilled in the art.
The above description is only a preferred embodiment of the present application and should not be taken as limiting the scope of the present application, and any modifications, equivalents, improvements, etc. made within the spirit and principle of the technical solution of the present application should be included in the scope of the present application.

Claims (10)

1. A single call end-to-end encryption method of a broadband cluster system is characterized by comprising the following steps:
A. a security server in the scheduling application platform generates a public key and a private key of the first user terminal and transmits the public key and the private key to the first user terminal;
B. in the process of calling a second user terminal by a first user terminal, sending a public key of the first user terminal to the second user terminal;
C. the second user terminal generates a session key of the call, and transmits the session key encrypted by the public key of the first user terminal to the first user terminal in the call response process;
D. the first user terminal decrypts the encrypted session key by adopting a private key of the first user terminal to obtain a decrypted session key;
E. the first user terminal encrypts the communication content by using the session key, and sends the encrypted communication content to the second user terminal, and the second user terminal decrypts the received communication content by using the session key;
in the step B, the clear text of the public key of the first user terminal is carried in a call establishment request sent by the first user terminal to the second user terminal;
in step C, the encrypted session key is carried in a call confirmation message sent by the second user terminal to the first user terminal.
2. The method of claim 1, further comprising: the security server updates the public key and the private key of the user terminal periodically.
3. The method of claim 1, further comprising: the security server remotely destroys the public key and the private key of the user terminal.
4. The method of claim 1, wherein step a comprises:
a1, registering the first user terminal and the security server in the cluster system;
a2, the first user terminal and the security server carry out mutual authentication process, establish secure connection and share secret key;
a3, the security server generates a public key and a private key of the first user terminal, and transmits the encrypted public key and private key to the first user terminal through the security encryption of the shared key;
a4, the first user terminal decrypts the received public key and private key by the shared secret key to obtain the plaintext public key and private key.
5. The method of claim 4, wherein the shared key is a root key of the first user terminal.
6. The method of claim 1, wherein the call confirmation message has an end-to-end encrypted session key optional message body for carrying the encrypted session key.
7. A broadband cluster system comprises a scheduling application platform, a cluster core network and a user terminal, and is characterized in that the scheduling application platform comprises a security server, and the security server is used for mutually authenticating with an encryption and decryption module of the user terminal, receiving a shared key of the user terminal after establishing security connection, generating a public key and a private key of the user terminal, encrypting the public key and the private key by using the shared key, and transmitting the encrypted public key and the encrypted private key to the user terminal;
the user terminal includes:
the encryption and decryption module is used for obtaining a root key of the user terminal as a shared key after authentication between the user terminal and the encryption and decryption module; decrypting the public key and the private key received by the security service interface module by using the shared secret key to obtain a public key and a private key of a plaintext; decrypting the encrypted session key received by the calling module by using a private key to obtain a decrypted session key; encrypting the communication content using the session key; the encryption and decryption module is also used for generating a session key of the call when the call module receives plaintext public keys from other terminals, and encrypting the session key by using the received public key; and decrypting the encrypted communication content received by the call module using the session key;
the security service interface module is used for mutually authenticating with the security server, sending the shared secret key to the security server after establishing security connection, and receiving the encrypted public key and the encrypted private key from the security server;
the calling module is used for sending the public key to the called terminal and receiving the encrypted session key from the called terminal in the process that the user terminal serves as a calling terminal to call the called terminal; transmitting the encrypted communication content to the called terminal; and the encryption and decryption module is also used for receiving the plaintext public key from the calling terminal, sending the encrypted session key obtained by the encryption and decryption module to the calling terminal and receiving the encrypted communication content from the calling terminal in the process that the user terminal serves as a called terminal to answer the call.
8. The system of claim 7, wherein the security server periodically updates a public key and a private key of the user terminal.
9. The system of claim 7, wherein the security server remotely destroys the public key and the private key of the user terminal.
10. The system of claim 7, wherein the scheduling application platform further comprises a video recording server, and the video recording server comprises an encryption card for implementing video recording of end-to-end encryption service.
CN201610029158.0A 2016-01-18 2016-01-18 Single call end-to-end encryption method and system for broadband cluster system Expired - Fee Related CN106982419B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610029158.0A CN106982419B (en) 2016-01-18 2016-01-18 Single call end-to-end encryption method and system for broadband cluster system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610029158.0A CN106982419B (en) 2016-01-18 2016-01-18 Single call end-to-end encryption method and system for broadband cluster system

Publications (2)

Publication Number Publication Date
CN106982419A CN106982419A (en) 2017-07-25
CN106982419B true CN106982419B (en) 2020-05-08

Family

ID=59340513

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610029158.0A Expired - Fee Related CN106982419B (en) 2016-01-18 2016-01-18 Single call end-to-end encryption method and system for broadband cluster system

Country Status (1)

Country Link
CN (1) CN106982419B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107547570B (en) * 2017-09-30 2023-12-05 国信优易数据股份有限公司 Data security service platform and data security transmission method
CN108174344B (en) * 2017-12-25 2020-05-08 成都三零瑞通移动通信有限公司 GIS position information transmission encryption method and device in trunking communication
CN109120641B (en) * 2018-09-28 2022-09-09 中国平安财产保险股份有限公司 Report automatic uploading method and device, computer equipment and storage medium
CN111211889A (en) * 2019-12-27 2020-05-29 深圳市普天宜通技术股份有限公司 Safety talkback method, equipment, system and storage medium
CN111245564B (en) * 2020-01-06 2021-04-13 电子科技大学 Triple security coding method based on hardware secret circuit
WO2023039871A1 (en) * 2021-09-18 2023-03-23 海能达通信股份有限公司 Data monitoring method, apparatus, device and system
CN114630290A (en) * 2022-04-08 2022-06-14 中国电信股份有限公司 Key agreement method, device, equipment and storage medium for voice encryption communication
CN117119449B (en) * 2023-10-20 2024-01-19 长江量子(武汉)科技有限公司 Vehicle cloud safety communication method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101005359A (en) * 2006-01-18 2007-07-25 华为技术有限公司 Method and device for realizing safety communication between terminal devices
CN101197674A (en) * 2007-12-10 2008-06-11 华为技术有限公司 Encrypted communication method, server and encrypted communication system
CN102143487A (en) * 2010-02-03 2011-08-03 中兴通讯股份有限公司 Negotiation method and negotiation system for end-to-end session key
CN104243409A (en) * 2013-06-14 2014-12-24 中国普天信息产业股份有限公司 Terminal-to-terminal data transmission method

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002094499A (en) * 2000-09-18 2002-03-29 Sanyo Electric Co Ltd Data terminal device and headphone device
US7409061B2 (en) * 2000-11-29 2008-08-05 Noatak Software Llc Method and system for secure distribution of subscription-based game software
US20060089999A1 (en) * 2004-10-22 2006-04-27 Zeng-Jun Xiang Method for providing IMS-based wireless download services
US8577041B2 (en) * 2005-02-07 2013-11-05 Arris Enterprises, Inc. Method for securely distributing configuration information to a device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101005359A (en) * 2006-01-18 2007-07-25 华为技术有限公司 Method and device for realizing safety communication between terminal devices
CN101197674A (en) * 2007-12-10 2008-06-11 华为技术有限公司 Encrypted communication method, server and encrypted communication system
CN102143487A (en) * 2010-02-03 2011-08-03 中兴通讯股份有限公司 Negotiation method and negotiation system for end-to-end session key
CN104243409A (en) * 2013-06-14 2014-12-24 中国普天信息产业股份有限公司 Terminal-to-terminal data transmission method

Also Published As

Publication number Publication date
CN106982419A (en) 2017-07-25

Similar Documents

Publication Publication Date Title
CN106982419B (en) Single call end-to-end encryption method and system for broadband cluster system
CN102291680B (en) Encrypted group calling method based on long term evolution (TD-LTE) trunking communication system
CN101232368B (en) Method for distributing media stream cryptographic key and multimedia subsystem
CN101420303B (en) Communication method for audio data and apparatus thereof
CN101442742B (en) Method, system and equipment for implementing end-to-end encipher of mobile cluster set call
CN106936788B (en) A kind of cryptographic key distribution method suitable for VOIP voice encryption
JP6800169B2 (en) Systems and methods for making secure VOIP multi-party calls
CN105792190B (en) Data encryption, decryption and transmission method in communication system
CN104683291B (en) Session key negotiation method based on IMS system
EP2426852A1 (en) Method and system for implementing secure forking calling session in ip multi-media subsystem
CN1925681A (en) End-to-end encrypting method and system based on mobile communication network
CN101909290A (en) Method, system and mobile terminal for encrypting voice call
CN113347215B (en) Encryption method for mobile video conference
WO2014131356A1 (en) Method, system, and terminal for hierarchical management of group keys of broadband cluster system
CN103167494B (en) Method for sending information and system
CN104618387A (en) Method applying SIP signaling to quantum secure communication system, integrated access quantum gateway and system
CN107517184A (en) Message transmitting method, apparatus and system
CN104243146A (en) Encryption communication method and device and terminal
CN106878277B (en) Method and device for realizing voice encryption based on DMR standard
WO2024041498A1 (en) Secret communication processing method, first terminal, and storage medium
WO2014026626A1 (en) Method, system, and terminal for communication between cluster system encryption terminal and encryption module
WO2017197968A1 (en) Data transmission method and device
CN105025471A (en) Called terminal, calling terminal, voice communication method and system
CN108123951B (en) Cluster communication off-line direct-communication voice group call transmission encryption method and device
CN101222612A (en) Method and system for safely transmitting media stream

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200508

Termination date: 20220118