CN109617689A - Call method, terminal and equipment of the core network - Google Patents
Call method, terminal and equipment of the core network Download PDFInfo
- Publication number
- CN109617689A CN109617689A CN201811563438.5A CN201811563438A CN109617689A CN 109617689 A CN109617689 A CN 109617689A CN 201811563438 A CN201811563438 A CN 201811563438A CN 109617689 A CN109617689 A CN 109617689A
- Authority
- CN
- China
- Prior art keywords
- terminal
- equipment
- encryption algorithm
- core network
- call
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/68—Circuit arrangements for preventing eavesdropping
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42136—Administration or customisation of services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/4228—Systems providing special services or facilities to subscribers in networks
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the invention discloses a kind of call method, terminal and equipments of the core network.The call method includes: that equipment of the core network receives the call request that first terminal is initiated to second terminal, and equipment of the core network forwards the call request to second terminal;Equipment of the core network receives second terminal in the feedback message for agreeing to establish call;Equipment of the core network determines the first object Encryption Algorithm that content is interactively communicated between first terminal and equipment of the core network according to the first Encryption Algorithm;First object Encryption Algorithm is fed back to first terminal by equipment of the core network, so that first terminal encrypts the dialog context interacted between first terminal and equipment of the core network according to first object Encryption Algorithm after the foundation call of first terminal and second terminal.The embodiment of the present invention avoids call-information leakage, improves call safety.
Description
Technical field
The present invention relates to fields of communication technology, and in particular to a kind of call method, terminal and equipment of the core network.
Background technique
The continuous development of the communication technology and universal, brings more and more conveniences to the work and life of people.But
At the same time, it has also brought some troubles.Event as personal information is stolen constantly occurs, some are even constituted
Serious case.The approach of information theft includes usurping for personal document data, the robber of the network information usurped with call-information
With etc..
Call is ravesdropping in order to prevent, guarantees the information security in call, and various call encryption devices generate in succession.Mesh
Before, occur on the market it is a variety of prevent eavesdropping detector, when discovery has monitoring telephone to be attempted by call issue alarm.There is language
Sound transposer, the sound of teller is changed tone, gets higher or be lower by it, is made the intermediate audio distortions intercepted and is listened not
Clearly.And have corresponding device that will become the speech adjusted in the other end of communication and restore, not hear speech can.Have and utilizes digital skill
The phonetic cryptographic coder of art, the voice signal of simulation is converted to digital signal by it, then is pressed the voice signal of digital form
Contracting and coding are to achieve the purpose that encryption.Encrypted voice signal again with certain rate modulation at audio signal, so as to
It is transmitted in simulation system;In addition there are also encryption chip is applied, the voice encryption device of frequency point coding is fixed.
But aforesaid way is the means of anti-eavesdrop, is needed using some other anti-eavesdrop means, in realization more
Complexity, part specific group are very high to the confidentiality requirement of call, and the common session services that operator provides are not able to satisfy and want
It asks, the voice messaging of transmission is without encryption, and there are still the risks intercepted and captured by third party.
Summary of the invention
The embodiment of the present invention provides a kind of call method, terminal and equipment of the core network, avoids call-information leakage, improves
Call safety.
In a first aspect, the application provides a kind of call method, which comprises
Equipment of the core network receives the call request that first terminal is initiated to second terminal, includes first in the call request
The first Encryption Algorithm that terminal is supported;
The equipment of the core network forwards the call request to the second terminal;
The equipment of the core network receives the second terminal in the feedback message for agreeing to establish call;
The equipment of the core network according to first Encryption Algorithm, determine the first terminal and the equipment of the core network it
Between interactively communicate the first object Encryption Algorithm of content;
The first object Encryption Algorithm is fed back to the first terminal by the equipment of the core network, so that described first
After the foundation call of terminal and the second terminal, according to the first object Encryption Algorithm to the first terminal and the core
The dialog context of interaction is encrypted between heart net equipment.
It further, include institute in the feedback message when the second terminal has the call Encryption Algorithm supported
State the second Encryption Algorithm of second terminal support.
Further, the first object Encryption Algorithm is conversed use between the first terminal and the second terminal
Encryption Algorithm, the equipment of the core network determines that the first terminal and the core net are set according to first Encryption Algorithm
The first object Encryption Algorithm of content is interactively communicated between standby, comprising:
The equipment of the core network determines one of first Encryption Algorithm and the second Encryption Algorithm intersection algorithm
For the first object Encryption Algorithm;
The method also includes:
The first object Encryption Algorithm is fed back to the second terminal by the equipment of the core network, so that described second
Terminal is according to the first object Encryption Algorithm to the dialog context interacted between the second terminal and the equipment of the core network
It is encrypted.
Further, the method also includes:
The equipment of the core network according to second Encryption Algorithm, determine the second terminal and the equipment of the core network it
Between interactively communicate the second target Encryption Algorithm of content;
The second target Encryption Algorithm is fed back to the second terminal by the equipment of the core network, so that described first
After the foundation call of terminal and the second terminal, the second terminal is according to the second target Encryption Algorithm to described second
The dialog context interacted between terminal and the equipment of the core network is encrypted.
Further, the equipment of the core network determines the second terminal and the core according to second Encryption Algorithm
The second target Encryption Algorithm of content is interactively communicated between heart net equipment, comprising:
The equipment of the core network randomly chooses a kind of Encryption Algorithm in second Encryption Algorithm, eventually as described second
The second target Encryption Algorithm of content is interactively communicated between end and the equipment of the core network.
Second aspect, the application provide a kind of call method, which comprises
First terminal initiates the call request to second terminal to equipment of the core network, includes first whole in the call request
The first Encryption Algorithm supported is held, so that the equipment of the core network determines that current talking is corresponding according to first Encryption Algorithm
First object Encryption Algorithm, and feed back to the first terminal;
The first terminal receives the first object Encryption Algorithm of the equipment of the core network feedback;
After the first terminal and the second terminal establish call, according to the first object Encryption Algorithm to described
The dialog context interacted between first terminal and the equipment of the core network is encrypted.
Further, when the second terminal has the call Encryption Algorithm supported, the first object Encryption Algorithm
The call Encryption Algorithm supported for the second terminal.
The third aspect, the application provide a kind of call method, which comprises
Second terminal receives the call request that the first terminal of equipment of the core network forwarding is initiated;
The second terminal is sent to the equipment of the core network agrees to establish the feedback message conversed, in the feedback message
The second Encryption Algorithm that the second terminal is supported, so that the equipment of the core network is worked as according to second Encryption Algorithm determination
Preceding corresponding second target Encryption Algorithm of conversing, and feed back to the second terminal;
The second terminal receives the second target Encryption Algorithm of the equipment of the core network feedback;
After the first terminal and the second terminal establish call, according to the second target Encryption Algorithm to described
The dialog context interacted between first terminal and the equipment of the core network is encrypted.
Further, the method also includes:
Second terminal initiates the call request to third terminal to equipment of the core network, includes first whole in the call request
The third Encryption Algorithm supported is held, so that the equipment of the core network determines that current talking is corresponding according to the third Encryption Algorithm
Third target Encryption Algorithm, and feed back to the first terminal;
The second terminal receives the third target Encryption Algorithm of the equipment of the core network feedback;
After the second terminal and the third terminal establish call, according to the third target Encryption Algorithm to described
The dialog context interacted between second terminal and the equipment of the core network is encrypted.
Fourth aspect, the application provide a kind of equipment of the core network, and the equipment of the core network includes:
First receiving unit, the call request initiated for receiving first terminal to second terminal, in the call request
The first Encryption Algorithm supported including first terminal;
First transmission unit, for forwarding the call request to the second terminal;
Second receiving unit, for receiving the second terminal in the feedback message for agreeing to establish call;
Determination unit, for according to first Encryption Algorithm, determine the first terminal and the equipment of the core network it
Between interactively communicate the first object Encryption Algorithm of content;
Second transmission unit, for the first object Encryption Algorithm to be fed back to the first terminal, so that described
After the foundation call of first terminal and the second terminal, according to the first object Encryption Algorithm to the first terminal and institute
The dialog context for stating interaction between equipment of the core network is encrypted.
5th aspect, the application provide a kind of terminal, and the terminal includes:
Transmission unit includes in the call request for initiating the call request to second terminal to equipment of the core network
The first Encryption Algorithm that first terminal is supported, so that the equipment of the core network determines current lead to according to first Encryption Algorithm
Corresponding first object Encryption Algorithm is talked about, and feeds back to the first terminal;
Receiving unit, for receiving the first object Encryption Algorithm of the equipment of the core network feedback;
Encryption unit is used for after the first terminal and the second terminal establish call, according to the first object
Encryption Algorithm encrypts the dialog context interacted between the first terminal and the equipment of the core network.
6th aspect, the application provide a kind of terminal, and the terminal includes:
First receiving unit, the call request that the first terminal for receiving equipment of the core network forwarding is initiated;
Transmission unit, for sending the feedback message for agreeing to establish call, the feedback message to the equipment of the core network
Described in second terminal support the second Encryption Algorithm so that the equipment of the core network according to second Encryption Algorithm determine
The corresponding second target Encryption Algorithm of current talking, and feed back to the second terminal;
Second receiving unit, for receiving the second target Encryption Algorithm of the equipment of the core network feedback;
Encryption unit is used for after the first terminal and the second terminal establish call, according to second target
Encryption Algorithm encrypts the dialog context interacted between the first terminal and the equipment of the core network.
7th aspect, the application provide a kind of storage medium, and the storage medium is stored with a plurality of instruction, and described instruction is suitable
It is loaded in processor, to execute in call method described in any one of first aspect, second aspect and third aspect
Step.
Equipment of the core network receives the call request that first terminal is initiated to second terminal in the embodiment of the present invention, and core net is set
It is standby to forward the call request to second terminal;Equipment of the core network receives second terminal in the feedback message for agreeing to establish call;
Equipment of the core network determines the first object that content is interactively communicated between first terminal and equipment of the core network according to the first Encryption Algorithm
Encryption Algorithm;First object Encryption Algorithm is fed back to first terminal by equipment of the core network, so that first terminal and second terminal
Foundation call after, call of the first terminal according to first object Encryption Algorithm to being interacted between first terminal and equipment of the core network
Content is encrypted.In the embodiment of the present invention centered on the corresponding network operator of equipment of the core network, in terminal and core net
Dialog context encryption is carried out between equipment, cryptographic capabilities is reported by terminal, equipment of the core network determines Encryption Algorithm, terminal and core
Call between net still uses common communication mode, but is set according to first object Encryption Algorithm to first terminal and core net
The dialog context of interaction is encrypted between standby, is avoided call-information leakage, is improved call safety.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for
For those skilled in the art, without creative efforts, it can also be obtained according to these attached drawings other attached
Figure.
Fig. 1 is the configuration diagram of communication system in the embodiment of the present invention;
Fig. 2 is one embodiment flow diagram of call method in the embodiment of the present invention;
Fig. 3 is another embodiment flow diagram of call method in the embodiment of the present invention;
Fig. 4 is another embodiment flow diagram of call method in the embodiment of the present invention;
Fig. 5 is one embodiment structural schematic diagram of equipment of the core network in the embodiment of the present invention;
Fig. 6 is one embodiment structural schematic diagram of terminal in the embodiment of the present invention;
Fig. 7 is another example structure schematic diagram of terminal in the embodiment of the present invention;
Fig. 8 is another example structure schematic diagram of terminal in the embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, those skilled in the art's every other implementation obtained without creative efforts
Example, shall fall within the protection scope of the present invention.
In this application, " exemplary " word is used to indicate " being used as example, illustration or explanation ".Described herein as
Any embodiment of " exemplary " is not necessarily to be construed as or more advantage more more preferable than other embodiments.In order to appoint this field
What technical staff can be realized and use the present invention, gives and is described below.In the following description, it arranges for purposes of explanation
Details is gone out.It should be appreciated that those skilled in the art will realize that the case where not using these specific details
Under the present invention also may be implemented.In other examples, well known structure and process will not be described in detail, to avoid need not
The details wanted makes description of the invention become obscure.Therefore, the present invention be not intended to be limited to shown in embodiment, but with meet
The widest scope of principle and feature disclosed in the present application is consistent.
Description and claims of this specification and term " first ", " second ", " third " " in above-mentioned attached drawing
The (if present)s such as four " are to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should manage
The data that solution uses in this way are interchangeable under appropriate circumstances, so as to the embodiment of the present invention described herein can in addition to
Here the sequence other than those of diagram or description is implemented.In addition, term " includes " and " having " and their any deformation,
Be intended to cover it is non-exclusive include, for example, containing the process, method of a series of steps or units, system, product or setting
It is standby those of to be not necessarily limited to be clearly listed step or unit, but may include be not clearly listed or for these mistakes
The intrinsic other step or units of journey, method, product or equipment.
The terms " system " and " network " are often used interchangeably herein.The terms "and/or", only
It is a kind of incidence relation for describing affiliated partner, indicates may exist three kinds of relationships, for example, A and/or B, can indicates: individually
There are A, exist simultaneously A and B, these three situations of individualism B.In addition, character "/" herein, typicallys represent forward-backward correlation pair
As if a kind of relationship of "or".
The embodiment of the present invention provides a kind of call method, terminal and equipment of the core network.It is described in detail separately below.
As shown in Figure 1, including in the communication system for the configuration diagram of the communication system provided in the embodiment of the present invention
First terminal 101, equipment of the core network 103 and second terminal 102, first terminal 101, second terminal 102 and equipment of the core network 103
Communication connection, first terminal 101 and second terminal 102 can be initiated and be established by equipment of the core network to converse.
It should be understood that the embodiment of the present application can be applied to various communication systems, and such as: global system for mobile telecommunications
(GlobalSystem forMobile communications, GSM) system, CDMA (Code Division
MultipleAccess, CDMA) system, wideband code division multiple access (Wideband Code Division Multiple Access,
WCDMA) system, General Packet Radio Service (General Packet Radio Service, GPRS), LTE, LTE frequency division are double
Work (Frequency Division Duplex, FDD) system, LTE time division duplex (Time Division Duplex, TDD) system
System, advanced long term evolution (Advanced long term evolution, LTE-A) system, Universal Mobile Communication System
(Universal Mobile Telecommunication System, UMTS) or Next-Generation Wireless Communication Systems, such as newly connect
Enter (New Radio, NR) system, the LTE (evolved LTE, eLTE) of evolution etc..
Terminal (first terminal, second terminal and third terminal as described below) described in this application is referred to as
It is user equipment (User Equipment, UE), access terminal, subscriber unit, subscriber station, movement station, mobile station, remote station, remote
Journey terminal, mobile device, user terminal, terminal, wireless telecom equipment, user agent or user apparatus.Terminal can be wirelessly
Website (STATION, ST) in local area network (Wireless Local AreaNetworks, WLAN), can be cellular phone,
Wireless phone, session initiation protocol (Session Initiation Protocol, SIP) phone, wireless local loop
(Wireless Local Loop, WLL) stand, personal digital assistant (Personal Digital Assistant, PDA) equipment,
Handheld device, trunking with wireless communication function calculate equipment or are connected to other processing of radio modem
Equipment, mobile unit, wearable device and next generation communication system, for example, the terminal device or future in 5G network are drilled
Into public land mobile network (Public Land Mobile Network, PLMN) network in terminal device etc..As
Example and it is non-limiting, in the embodiment of the present application, terminal can also be wearable device.Wearable device is referred to as dressing
Formula smart machine is to carry out intelligentized design to daily wearing using wearable technology, develop the total of the equipment that can be dressed
Claim, such as glasses, gloves, wrist-watch, dress ornament and shoes.Wearable device is directly worn, or is integrated into the clothes of user
Or a kind of portable device of accessory.Wearable device is not only a kind of hardware device, even more passes through software support and number
Powerful function is realized according to interaction, cloud interaction.Broad sense wearable intelligent equipment includes that function is complete, size is big, can not depend on
Smart phone realizes complete or partial function, such as: smartwatch or intelligent glasses etc., and be only absorbed in certain one kind and answer
It with function, needs to be used cooperatively with other equipment such as smart phone, such as the Intelligent bracelet of all kinds of carry out sign monitorings, intelligent jewellery
Deng.
In the embodiment of the present invention, equipment of the core network can be mobility management entity (Mobility Management
Entity, MME)/gateway (Serving GateWay, S-GW) can also be the equipment of the core network in future 5G system.
MME is the crucial control in third generation partner program (3GPP, 3rd Generation Partnership Project) LTE
Node processed, belongs to core network element, is mainly responsible for signaling processing part, i.e. control plane function, including access control, mobility pipe
Reason is adhered to and the functions such as attachment removal, conversation management functional and gateway selection.S-GW is the important net of core net in 3GPP LTE
Member is mainly responsible for the user plane functions of user data forwarding, i.e., the routing and forwarding of data packet are carried out under the control of MME.
As shown in Fig. 2, to provide one embodiment flow diagram of call method, the correspondent in the embodiment of the present invention
Method is applied to equipment of the core network, which includes:
201, equipment of the core network receives the call request that first terminal is initiated to second terminal.
When first terminal needs to initiate to converse to second terminal, first terminal first can be to equipment of the core network to second eventually
The call request at end.It wherein, include the first Encryption Algorithm of first terminal support in the call request.First Encryption Algorithm can be with
Encryption Algorithm including the support of one or more first terminals, such as Secure Hash Algorithm (Secure Hash Algorithm,
) or des (Data Encryption Standard) algorithm etc. sha.
In current Regular conversation scene, do not include in the call request that terminal is sent when initiating and converse to equipment of the core network
Encryption Algorithm field in the embodiment of the present invention, in original call request, is added to Encryption Algorithm field, for inserting the
The first cryptography information that one terminal is supported, further, if the encryption that terminal audio frequency call and video calling are supported is calculated
Method is identical, which can be an Encryption Algorithm field, such as voice-frequency telephony and video calling are supported equally
Encryption Algorithm can be defined with an Encryption Algorithm field, for example, Encode:sha, des, indicate that terminal supports safety
Hash algorithm (Secure Hash Algorithm, sha) or des (Data Encryption Standard) algorithm.If no
Support encryption, the value of Encode may is that none.In other embodiments of the invention, no matter terminal audio frequency call and view
The Encryption Algorithm that frequency call is supported is same or different, can be defined using multiple Encryption Algorithm fields, i.e., respectively to sound
Frequency call and video calling support Encryption Algorithm is defined, such as increase Encryption Algorithm field " Audio-Encode " and
" Video-Encode " limits the Encryption Algorithm of voice-frequency telephony and video calling support respectively, such as follows:
Audio-Encode:sha,des
Video-Encode:sha,des
Indicate that sha and des Encryption Algorithm is supported in voice-frequency telephony, video calling also supports sha and des Encryption Algorithm.
202, equipment of the core network forwards the call request to second terminal.
Equipment of the core network receive first terminal initiation change call request after, which can be transmitted to
Second terminal, second terminal can pass through the side of visual interface (such as caller identification interface) after receiving the call request
Formula shows the call request, if receiving the instruction (such as in caller identification interface connecting incoming call) that user connects call, second eventually
It holds to equipment of the core network and sends the feedback message for agreeing to establish call.
203, equipment of the core network receives second terminal in the feedback message for agreeing to establish call.
204, equipment of the core network determines in interactively communicating between first terminal and equipment of the core network according to the first Encryption Algorithm
The first object Encryption Algorithm of appearance.
Specifically, since the first Encryption Algorithm may include the Encryption Algorithm that one or more first terminals are supported, core
Net equipment can select a kind of Encryption Algorithm in the first Encryption Algorithm, logical as interaction between first terminal and equipment of the core network
Believe the first object Encryption Algorithm of content.In a kind of mode of the present invention, equipment of the core network in first Encryption Algorithm with
Machine selects a kind of Encryption Algorithm, as the first object for interactively communicating content between the first terminal and the equipment of the core network
Encryption Algorithm.It is understood that in other embodiments of the present invention, can also be that equipment of the core network determines that first object encrypts
The mode of algorithm, for example, having pre-defined the priority of Encryption Algorithm in equipment of the core network, equipment of the core network can be according to default
Encryption Algorithm priority, from the first Encryption Algorithm select highest priority a kind of Encryption Algorithm, as it is described first eventually
The first object Encryption Algorithm of content is interactively communicated between end and the equipment of the core network, this is not limited here.
It should be noted that equipment of the core network interactively communicates the of content determining between first terminal and equipment of the core network
When one target Encryption Algorithm, corresponding first encryption code key, such as 123456 etc. can also while be determined, certainly, in the present invention
In some embodiments, can also make an appointment between first terminal and second terminal encryption code key (such as operator agreement
Equipment in network is all made of default encryption code key), it is specified without equipment of the core network.
205, first object Encryption Algorithm is fed back to first terminal by equipment of the core network, so that first terminal and second is eventually
End foundation call after, according to first object Encryption Algorithm to the dialog context interacted between first terminal and equipment of the core network into
Row encryption.
When determining the first encryption code key in step 204, in this step, equipment of the core network can also encrypt code key for first
First terminal is fed back to simultaneously with first object Encryption Algorithm, at this point, after the foundation call of first terminal and second terminal, first
Terminal can be logical according to what is interacted between first object Encryption Algorithm and the first encryption secret key pair first terminal and equipment of the core network
Words content is encrypted.
In subsequent communication process, when equipment of the core network receives the speech scrambling data of first terminal transmission, all using should
First object Encryption Algorithm is decrypted, as do not used Encryption Algorithm to encrypt between second terminal and equipment of the core network, after decryption
Second terminal is forwarded again, as used Encryption Algorithm to encrypt between second terminal and equipment of the core network, then first uses the first object
Encryption Algorithm is decrypted, then after being encrypted using the Encryption Algorithm that sets between second terminal and equipment of the core network, then turns
Issue second terminal.
Equipment of the core network receives the call request that first terminal is initiated to second terminal in the embodiment of the present invention, and core net is set
It is standby to forward the call request to second terminal;Equipment of the core network receives second terminal in the feedback message for agreeing to establish call;
Equipment of the core network determines the first object that content is interactively communicated between first terminal and equipment of the core network according to the first Encryption Algorithm
Encryption Algorithm;First object Encryption Algorithm is fed back to first terminal by equipment of the core network, so that first terminal and second terminal
Foundation call after, call of the first terminal according to first object Encryption Algorithm to being interacted between first terminal and equipment of the core network
Content is encrypted.In the embodiment of the present invention centered on the corresponding network operator of equipment of the core network, in terminal and core net
Dialog context encryption is carried out between equipment, cryptographic capabilities is reported by terminal, equipment of the core network determines Encryption Algorithm, terminal and core
Call between net still uses common communication mode, but is set according to first object Encryption Algorithm to first terminal and core net
The dialog context of interaction is encrypted between standby, is avoided call-information leakage, is improved call safety.
In embodiment illustrated in fig. 2 of the present invention, first terminal supports Encryption Algorithm, can be to first terminal and equipment of the core network
Between interaction Content of Communication encrypted, and in the embodiment of the present invention second terminal can be support Encryption Algorithm terminal,
It is also possible to not support the terminal of Encryption Algorithm, when the second terminal has the call Encryption Algorithm supported, above-mentioned steps
It may include the second Encryption Algorithm that the second terminal is supported in feedback message described in 203.At this point, second terminal and core
The Content of Communication of interaction can also be encrypted between net equipment.
But to the encryption of the Content of Communication of interaction between second terminal and equipment of the core network, there are various ways again, a kind of
Mode is that the Content of Communication of interaction also uses first object Encryption Algorithm to encrypt between second terminal and equipment of the core network, such
In the case of, it also include the first object Encryption Algorithm in the second Encryption Algorithm that second terminal is supported.The i.e. described first object adds
Close algorithm is conversed the Encryption Algorithm of use between the first terminal and the second terminal, and first terminal and core net are set
It is standby, the first object Encryption Algorithm is all made of between second terminal and equipment of the core network.Equipment of the core network root in above-mentioned steps 204
According to first Encryption Algorithm, the first object that content is interactively communicated between the first terminal and the equipment of the core network is determined
Encryption Algorithm can specifically include: equipment of the core network determines in first Encryption Algorithm and the second Encryption Algorithm intersection
A kind of algorithm be the first object Encryption Algorithm.For example, the first Encryption Algorithm are as follows: model is calculated in sha and des, the second encryption are as follows:
Sha and des, then the intersection of the first Encryption Algorithm and the second Encryption Algorithm is sha and des, and a kind of add is selected from sha and des
Close algorithm is as first object Encryption Algorithm, when the intersection of the first Encryption Algorithm and the second Encryption Algorithm is there are many when algorithm, tool
Body selection mode is referred to the mode of above-mentioned random selection and priority selection, and specific details are not described herein again.
At this point, the method can also include: that the first object Encryption Algorithm is fed back to described by equipment of the core network
Two terminals, so that the second terminal sets the second terminal and the core net according to the first object Encryption Algorithm
The dialog context of interaction is encrypted between standby.
Communication in other embodiments in embodiments of the present invention, to interaction between second terminal and equipment of the core network
Content-encrypt can be encrypted using the algorithm different from first object Encryption Algorithm.First terminal and core net are set
Standby, the Content of Communication of interaction is encrypted using different Encryption Algorithm between second terminal and equipment of the core network.Further,
The method can also include: equipment of the core network according to second Encryption Algorithm, determine the second terminal and the core
The second target Encryption Algorithm of content is interactively communicated between net equipment;Equipment of the core network feeds back the second target Encryption Algorithm
To the second terminal, so that second terminal is according to after the foundation call of the first terminal and the second terminal
Second target Encryption Algorithm encrypts the dialog context interacted between the second terminal and the equipment of the core network.
Above-mentioned first object Encryption Algorithm is different with the second target Encryption Algorithm, can guarantee different terminal and core in this way
The Content of Communication of interaction uses different cipher modes between heart net equipment, further ensures the safety of communication.
Further, the equipment of the core network determines the second terminal and the core according to second Encryption Algorithm
The second target Encryption Algorithm that content is interactively communicated between heart net equipment may include: equipment of the core network in second encryption
A kind of Encryption Algorithm is randomly choosed in algorithm, interactively communicates content as between the second terminal and the equipment of the core network
Second target Encryption Algorithm.It is understood that equipment of the core network is according to the second encryption in some other embodiment of the present invention
It is above-mentioned to determine that the second target Encryption Algorithm that content is interactively communicated between second terminal and equipment of the core network is also referred to for algorithm
Determine the mode that priority when first object Encryption Algorithm selects, specific details are not described herein again.
As shown in figure 3, for another embodiment schematic diagram of the call method provided in the embodiment of the present invention, the correspondent
Method is applied to first terminal, which includes:
301, first terminal initiates the call request to second terminal to equipment of the core network.
It wherein, include the first Encryption Algorithm of first terminal support in the call request, so that the core net is set
It is standby that the corresponding first object Encryption Algorithm of current talking is determined according to first Encryption Algorithm, and feed back to described first eventually
End;
302, first terminal receives the first object Encryption Algorithm of the equipment of the core network feedback.
303, after first terminal and the second terminal establish call, according to the first object Encryption Algorithm to described
The dialog context interacted between first terminal and the equipment of the core network is encrypted.
Further, when the second terminal has the call Encryption Algorithm supported, first object Encryption Algorithm is institute
State the call Encryption Algorithm of second terminal support.
In the embodiment of the present invention centered on the corresponding network operator of equipment of the core network, terminal and equipment of the core network it
Between carry out dialog context encryption, cryptographic capabilities are reported by first terminal, equipment of the core network determines Encryption Algorithm, first terminal and core
Call between heart net still uses common communication mode, but according to first object Encryption Algorithm to first terminal and core net
The dialog context of interaction is encrypted between equipment, is avoided call-information leakage, is improved call safety.
As shown in figure 4, for another embodiment schematic diagram of the call method provided in the embodiment of the present invention, the correspondent
Method is applied to second terminal, which includes:
401, second terminal receives the call request that the first terminal of equipment of the core network forwarding is initiated.
402, second terminal sends the feedback message for agreeing to establish call to the equipment of the core network.
Wherein, the second Encryption Algorithm that second terminal described in the feedback message is supported, so that the core net is set
It is standby that the corresponding second target Encryption Algorithm of current talking is determined according to second Encryption Algorithm, and feed back to described second eventually
End.
403, second terminal receives the second target Encryption Algorithm of the equipment of the core network feedback.
404, after first terminal and the second terminal establish call, according to the second target Encryption Algorithm to first terminal
The dialog context interacted between equipment of the core network is encrypted.
In the embodiment of the present invention centered on the corresponding network operator of equipment of the core network, terminal and equipment of the core network it
Between carry out dialog context encryption, cryptographic capabilities are reported by second terminal, equipment of the core network determines Encryption Algorithm, second terminal and core
Call between heart net still uses common communication mode, but according to the second target Encryption Algorithm to second terminal and core net
The dialog context of interaction is encrypted between equipment, is avoided call-information leakage, is improved call safety.
Further, in the embodiment of the present invention, second terminal is as called end, it is to be understood that second terminal is same
It can be used as calling terminal, at this time further, the method can also include: that second terminal is initiated to equipment of the core network to third
The call request of terminal includes the third Encryption Algorithm that first terminal is supported in the call request, so that the core net
Equipment determines the corresponding third target Encryption Algorithm of current talking according to the third Encryption Algorithm, and feeds back to described first eventually
End;Second terminal receives the third target Encryption Algorithm of the equipment of the core network feedback;In the second terminal and the third
After terminal establishes call, interacted according to the third target Encryption Algorithm between the second terminal and the equipment of the core network
Dialog context encrypted.
As shown in figure 5, for a kind of equipment of the core network provided in the embodiment of the present invention, the equipment of the core network 500 includes:
First receiving unit 501, the call request initiated for receiving first terminal to second terminal, the call request
In include first terminal support the first Encryption Algorithm;
First transmission unit 502, for forwarding the call request to the second terminal;
Second receiving unit 503, for receiving the second terminal in the feedback message for agreeing to establish call;
Determination unit 504, for determining the first terminal and the equipment of the core network according to first Encryption Algorithm
Between interactively communicate the first object Encryption Algorithm of content;
Second transmission unit 505, for the first object Encryption Algorithm to be fed back to the first terminal, so that institute
After the foundation call for stating first terminal and the second terminal, according to the first object Encryption Algorithm to the first terminal with
The dialog context of interaction is encrypted between the equipment of the core network.
It further, include institute in the feedback message when the second terminal has the call Encryption Algorithm supported
State the second Encryption Algorithm of second terminal support.
Further, the first object Encryption Algorithm is conversed use between the first terminal and the second terminal
Encryption Algorithm, the determination unit 504 is specifically used for: determining first Encryption Algorithm and the second Encryption Algorithm intersection
One of algorithm be the first object Encryption Algorithm;
The equipment of the core network further include:
Third transmission unit, for the first object Encryption Algorithm to be fed back to the second terminal, so that described
Call of the second terminal according to the first object Encryption Algorithm to being interacted between the second terminal and the equipment of the core network
Content is encrypted.
Further, the determination unit 504 is also used to according to second Encryption Algorithm, determine the second terminal and
The second target Encryption Algorithm of content is interactively communicated between the equipment of the core network;
Second transmission unit 505 is also used to the second target Encryption Algorithm feeding back to the second terminal, so that
After the foundation call of the first terminal and the second terminal, the second terminal is according to the second target Encryption Algorithm pair
The dialog context interacted between the second terminal and the equipment of the core network is encrypted.
Further, the determination unit 504 is specifically used for: randomly choosing a kind of encryption in second Encryption Algorithm
Algorithm, as the second target Encryption Algorithm for interactively communicating content between the second terminal and the equipment of the core network.
As shown in fig. 6, the terminal is above-mentioned reality for one embodiment schematic diagram of the terminal provided in the embodiment of the present invention
The first terminal in example is applied, which includes:
Transmission unit 601 wraps in the call request for initiating the call request to second terminal to equipment of the core network
The first Encryption Algorithm of first terminal support is included, so that the equipment of the core network determines currently according to first Encryption Algorithm
It converses corresponding first object Encryption Algorithm, and feeds back to the first terminal;
Receiving unit 602, for receiving the first object Encryption Algorithm of the equipment of the core network feedback;
Encryption unit 603 is used for after the first terminal and the second terminal establish call, according to first mesh
Mark Encryption Algorithm encrypts the dialog context interacted between the first terminal and the equipment of the core network.
As shown in fig. 7, the terminal is above-mentioned for another embodiment schematic diagram of the terminal provided in the embodiment of the present invention
Second terminal in embodiment, the terminal 700 include:
First receiving unit 701, the call request that the first terminal for receiving equipment of the core network forwarding is initiated;
Transmission unit 702, for sending the feedback message for agreeing to establish call to the equipment of the core network, the feedback disappears
The second Encryption Algorithm that second terminal described in breath is supported, so that the equipment of the core network is true according to second Encryption Algorithm
Determine the corresponding second target Encryption Algorithm of current talking, and feeds back to the second terminal;
Second receiving unit 703, for receiving the second target Encryption Algorithm of the equipment of the core network feedback;
Encryption unit 704 is used for after the first terminal and the second terminal establish call, according to second mesh
Mark Encryption Algorithm encrypts the dialog context interacted between the first terminal and the equipment of the core network.
Correspondingly, the embodiment of the present invention also provides a kind of terminal, as shown in figure 8, the terminal may include radio frequency (RF,
Radio Frequency) circuit 801, the memory 802, defeated that includes one or more computer readable storage medium
Enter unit 803, display unit 804, sensor 805, voicefrequency circuit 806, Wireless Fidelity (WiFi, Wireless Fidelity)
The components such as module 807, the processor 808 for including one or more than one processing core and power supply 809.This field skill
Art personnel are appreciated that the restriction of the not structure paired terminal of terminal structure shown in Fig. 8, may include more or more than illustrating
Few component perhaps combines certain components or different component layouts.Wherein:
RF circuit 801 can be used for receiving and sending messages or communication process in, signal sends and receivees, particularly, by base station
After downlink information receives, one or the processing of more than one processor 808 are transferred to;In addition, the data for being related to uplink are sent to
Base station.In general, RF circuit 801 includes but is not limited to antenna, at least one amplifier, tuner, one or more oscillators, uses
Family identity module (SIM, Subscriber Identity Module) card, transceiver, coupler, low-noise amplifier
(LNA, Low Noise Amplifier), duplexer etc..In addition, RF circuit 801 can also by wireless communication with network and its
He communicates equipment.Any communication standard or agreement can be used in the wireless communication, and including but not limited to global system for mobile telecommunications is deposited
Storage media (GSM, Global System of Mobile communication), general packet radio service (GPRS,
General Packet Radio Service), it is CDMA (CDMA, Code Division Multiple Access), wide
Band CDMA (WCDMA, Wideband Code Division Multiple Access), long term evolution (LTE, Long
Term Evolution), Email, short message service (SMS, Short Messaging Service) etc..
Memory 802 can be used for storing software program and module, and processor 808 is stored in memory 802 by operation
Software program and module, thereby executing various function application and data processing.Memory 802 can mainly include storage journey
Sequence area and storage data area, wherein application program needed for storing program area can store operation storage medium, at least one function
(such as sound-playing function, image player function etc.) etc.;Storage data area, which can be stored, uses created number according to terminal
According to (such as audio data, phone directory etc.) etc..In addition, memory 802 may include high-speed random access memory, can also wrap
Include nonvolatile memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Correspondingly, memory 802 can also include Memory Controller, to provide processor 808 and input unit 803 to memory
802 access.
Input unit 803 can be used for receiving the number or character information of input, and generate and user setting and function
Control related keyboard, mouse, operating stick, optics or trackball signal input.Specifically, in a specific embodiment
In, input unit 803 may include touch sensitive surface and other input equipments.Touch sensitive surface, also referred to as touch display screen or touching
Control plate, collect user on it or nearby touch operation (such as user using any suitable object such as finger, stylus or
Operation of the attachment on touch sensitive surface or near touch sensitive surface), and corresponding connection dress is driven according to preset formula
It sets.Optionally, touch sensitive surface may include both touch detecting apparatus and touch controller.Wherein, touch detecting apparatus is examined
The touch orientation of user is surveyed, and detects touch operation bring signal, transmits a signal to touch controller;Touch controller from
Touch information is received on touch detecting apparatus, and is converted into contact coordinate, then gives processor 808, and can reception processing
Order that device 808 is sent simultaneously is executed.Furthermore, it is possible to a variety of using resistance-type, condenser type, infrared ray and surface acoustic wave etc.
Type realizes touch sensitive surface.In addition to touch sensitive surface, input unit 803 can also include other input equipments.Specifically, other are defeated
Entering equipment can include but is not limited to physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse
One of mark, operating stick etc. are a variety of.
Display unit 804 can be used for showing information input by user or be supplied to user information and terminal it is various
Graphical user interface, these graphical user interface can be made of figure, text, icon, video and any combination thereof.Display
Unit 804 may include display panel, optionally, can using liquid crystal display (LCD, Liquid Crystal Display),
The forms such as Organic Light Emitting Diode (OLED, Organic Light-Emitting Diode) configure display panel.Further
, touch sensitive surface can cover display panel, after touch sensitive surface detects touch operation on it or nearby, send processing to
Device 808 is followed by subsequent processing device 808 and is provided on a display panel accordingly according to the type of touch event to determine the type of touch event
Visual output.Although in fig. 8, touch sensitive surface and display panel are to realize input and input as two independent components
Function, but in some embodiments it is possible to touch sensitive surface and display panel are integrated and realizes and outputs and inputs function.
Terminal may also include at least one sensor 805, such as optical sensor, motion sensor and other sensors.
Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light
Light and shade adjust the brightness of display panel, proximity sensor can close display panel and/or back when terminal is moved in one's ear
Light.As a kind of motion sensor, gravity accelerometer can detect (generally three axis) acceleration in all directions
Size can detect that size and the direction of gravity when static, can be used to identify mobile phone posture application (such as horizontal/vertical screen switching,
Dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;It can also configure as terminal
The other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared sensor, details are not described herein.
Voicefrequency circuit 806, loudspeaker, microphone can provide the audio interface between user and terminal.Voicefrequency circuit 806 can
By the electric signal after the audio data received conversion, it is transferred to loudspeaker, voice signal output is converted to by loudspeaker;It is another
The voice signal of collection is converted to electric signal by aspect, microphone, is converted to audio data after being received by voicefrequency circuit 806, then
After the processing of audio data output processor 808, it is sent to such as another terminal through RF circuit 801, or by audio data
Output is further processed to memory 802.Voicefrequency circuit 806 is also possible that earphone jack, with provide peripheral hardware earphone with
The communication of terminal.
WiFi belongs to short range wireless transmission technology, and terminal can help user's transceiver electronics postal by WiFi module 807
Part, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 8 is shown
WiFi module 807, but it is understood that, and it is not belonging to must be configured into for terminal, it can according to need do not changing completely
Become in the range of the essence of invention and omits.
Processor 808 is the control centre of terminal, using the various pieces of various interfaces and connection whole mobile phone, is led to
It crosses operation or executes the software program and/or module being stored in memory 802, and call and be stored in memory 802
Data execute the various functions and processing data of terminal, to carry out integral monitoring to mobile phone.Optionally, processor 808 can wrap
Include one or more processing cores;Preferably, processor 808 can integrate application processor and modem processor, wherein answer
With the main processing operation storage medium of processor, user interface and application program etc., modem processor is mainly handled wirelessly
Communication.It is understood that above-mentioned modem processor can not also be integrated into processor 808.
Terminal further includes the power supply 809 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply pipe
Manage storage medium and processor 808 it is logically contiguous, thus by power management storage medium realize management charging, discharge and
The functions such as power managed.Power supply 809 can also include one or more direct current or AC power source, recharge storage Jie
The random components such as matter, power failure detection circuit, power adapter or inverter, power supply status indicator.
Although being not shown, terminal can also include camera, bluetooth module etc., and details are not described herein.Specifically in this implementation
In example, the processor 808 in terminal can be corresponding by the process of one or more application program according to following instruction
Executable file is loaded into memory 802, and the application program being stored in memory 802 is run by processor 808, from
And realize various functions in above-mentioned call method.
It will appreciated by the skilled person that all or part of the steps in the various methods of above-described embodiment can be with
It is completed by instructing, or relevant hardware is controlled by instruction to complete, which can store computer-readable deposits in one
In storage media, and is loaded and executed by processor.
For this purpose, the embodiment of the present invention provides a kind of storage medium, wherein being stored with a plurality of instruction, which can be processed
Device is loaded, to execute the step in any call method provided by the embodiment of the present invention.
The specific implementation of above each operation can be found in the embodiment of front, and details are not described herein.
It is provided for the embodiments of the invention a kind of call method, terminal and equipment of the core network above and has carried out detailed Jie
It continues, used herein a specific example illustrates the principle and implementation of the invention, and the explanation of above embodiments is only
It is to be used to help understand method and its core concept of the invention;Meanwhile for those skilled in the art, according to the present invention
Thought, there will be changes in the specific implementation manner and application range, in conclusion the content of the present specification should not be construed as
Limitation of the present invention.
Claims (10)
1. a kind of call method, which is characterized in that the described method includes:
Equipment of the core network receives the call request that first terminal is initiated to second terminal, includes first terminal in the call request
The first Encryption Algorithm supported;
The equipment of the core network forwards the call request to the second terminal;
The equipment of the core network receives the second terminal in the feedback message for agreeing to establish call;
The equipment of the core network is determined and is handed between the first terminal and the equipment of the core network according to first Encryption Algorithm
The first object Encryption Algorithm of mutual communication content;
The first object Encryption Algorithm is fed back to the first terminal by the equipment of the core network, so that the first terminal
After the foundation call of the second terminal, according to the first object Encryption Algorithm to the first terminal and the core net
The dialog context of interaction is encrypted between equipment.
2. call method according to claim 1, which is characterized in that have the call encryption supported in the second terminal
It include the second Encryption Algorithm that the second terminal is supported when algorithm, in the feedback message.
3. call method according to claim 2, which is characterized in that the first object Encryption Algorithm is described first whole
The Encryption Algorithm for use of conversing between the second terminal is held, the equipment of the core network is according to first Encryption Algorithm, really
The first object Encryption Algorithm of content is interactively communicated between the fixed first terminal and the equipment of the core network, comprising:
The equipment of the core network determines one of first Encryption Algorithm and the second Encryption Algorithm intersection algorithm for institute
State first object Encryption Algorithm;
The method also includes:
The first object Encryption Algorithm is fed back to the second terminal by the equipment of the core network, so that the second terminal
The dialog context interacted between the second terminal and the equipment of the core network is carried out according to the first object Encryption Algorithm
Encryption.
4. call method according to claim 2, which is characterized in that the method also includes:
The equipment of the core network is determined and is handed between the second terminal and the equipment of the core network according to second Encryption Algorithm
Second target Encryption Algorithm of mutual communication content;
The second target Encryption Algorithm is fed back to the second terminal by the equipment of the core network, so that the first terminal
After the foundation call of the second terminal, the second terminal is according to the second target Encryption Algorithm to the second terminal
The dialog context interacted between the equipment of the core network is encrypted.
5. a kind of call method, which is characterized in that the described method includes:
First terminal initiates the call request to second terminal to equipment of the core network, includes first terminal branch in the call request
The first Encryption Algorithm held, so that the equipment of the core network determines current talking corresponding according to first Encryption Algorithm
One target Encryption Algorithm, and feed back to the first terminal;
The first terminal receives the first object Encryption Algorithm of the equipment of the core network feedback;
After the first terminal and the second terminal establish call, according to the first object Encryption Algorithm to described first
The dialog context interacted between terminal and the equipment of the core network is encrypted.
6. a kind of call method, which is characterized in that the described method includes:
Second terminal receives the call request that the first terminal of equipment of the core network forwarding is initiated;
The second terminal sends the feedback message for agreeing to establish call to the equipment of the core network, described in the feedback message
The second Encryption Algorithm that second terminal is supported, so that the equipment of the core network determines current lead to according to second Encryption Algorithm
Corresponding second target Encryption Algorithm is talked about, and feeds back to the second terminal;
The second terminal receives the second target Encryption Algorithm of the equipment of the core network feedback;
After the first terminal and the second terminal establish call, according to the second target Encryption Algorithm to described first
The dialog context interacted between terminal and the equipment of the core network is encrypted.
7. a kind of equipment of the core network, which is characterized in that the equipment of the core network includes:
First receiving unit, the call request initiated for receiving first terminal to second terminal include in the call request
The first Encryption Algorithm that first terminal is supported;
First transmission unit, for forwarding the call request to the second terminal;
Second receiving unit, for receiving the second terminal in the feedback message for agreeing to establish call;
Determination unit, for determining and being handed between the first terminal and the equipment of the core network according to first Encryption Algorithm
The first object Encryption Algorithm of mutual communication content;
Second transmission unit, for the first object Encryption Algorithm to be fed back to the first terminal, so that described first
After the foundation call of terminal and the second terminal, according to the first object Encryption Algorithm to the first terminal and the core
The dialog context of interaction is encrypted between heart net equipment.
8. a kind of terminal, which is characterized in that the terminal includes:
Transmission unit includes first in the call request for initiating the call request to second terminal to equipment of the core network
The first Encryption Algorithm that terminal is supported, so that the equipment of the core network determines current talking pair according to first Encryption Algorithm
The first object Encryption Algorithm answered, and feed back to the first terminal;
Receiving unit, for receiving the first object Encryption Algorithm of the equipment of the core network feedback;
Encryption unit, for being encrypted according to the first object after the first terminal and the second terminal establish call
Algorithm encrypts the dialog context interacted between the first terminal and the equipment of the core network.
9. a kind of terminal, which is characterized in that the terminal includes:
First receiving unit, the call request that the first terminal for receiving equipment of the core network forwarding is initiated;
Transmission unit, for sending the feedback message for agreeing to establish call, institute in the feedback message to the equipment of the core network
The second Encryption Algorithm of second terminal support is stated, so that the equipment of the core network determines currently according to second Encryption Algorithm
It converses corresponding second target Encryption Algorithm, and feeds back to the second terminal;
Second receiving unit, for receiving the second target Encryption Algorithm of the equipment of the core network feedback;
Encryption unit, for being encrypted according to second target after the first terminal and the second terminal establish call
Algorithm encrypts the dialog context interacted between the first terminal and the equipment of the core network.
10. a kind of storage medium, which is characterized in that the storage medium is stored with a plurality of instruction, and described instruction is suitable for processor
It is loaded, the step in 1 to 6 described in any item call methods is required with perform claim.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811563438.5A CN109617689A (en) | 2018-12-20 | 2018-12-20 | Call method, terminal and equipment of the core network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811563438.5A CN109617689A (en) | 2018-12-20 | 2018-12-20 | Call method, terminal and equipment of the core network |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109617689A true CN109617689A (en) | 2019-04-12 |
Family
ID=66010914
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811563438.5A Pending CN109617689A (en) | 2018-12-20 | 2018-12-20 | Call method, terminal and equipment of the core network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109617689A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111600868A (en) * | 2020-05-12 | 2020-08-28 | 捷开通讯(深圳)有限公司 | Direct connection communication method, core network equipment, mobile terminal and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101997676A (en) * | 2009-08-28 | 2011-03-30 | ***通信集团公司 | VoIP voice encryption protection method, node and system |
CN102006294A (en) * | 2010-11-25 | 2011-04-06 | 中兴通讯股份有限公司 | IP multimedia subsystem (IMS) multimedia communication method and system as well as terminal and IMS core network |
CN104618089A (en) * | 2013-11-04 | 2015-05-13 | 华为技术有限公司 | Negotiation processing method for security algorithm, control network element and system |
CN105577361A (en) * | 2015-04-20 | 2016-05-11 | 宇龙计算机通信科技(深圳)有限公司 | Information processing method and device thereof |
CN106465102A (en) * | 2014-05-12 | 2017-02-22 | 诺基亚技术有限公司 | Method, network element, user equipment and system for securing device-to-device communication in a wireless network |
EP3177052A1 (en) * | 2014-07-31 | 2017-06-07 | ZTE Corporation | Method, device and system for selecting security algorithm |
-
2018
- 2018-12-20 CN CN201811563438.5A patent/CN109617689A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101997676A (en) * | 2009-08-28 | 2011-03-30 | ***通信集团公司 | VoIP voice encryption protection method, node and system |
CN102006294A (en) * | 2010-11-25 | 2011-04-06 | 中兴通讯股份有限公司 | IP multimedia subsystem (IMS) multimedia communication method and system as well as terminal and IMS core network |
CN104618089A (en) * | 2013-11-04 | 2015-05-13 | 华为技术有限公司 | Negotiation processing method for security algorithm, control network element and system |
CN106465102A (en) * | 2014-05-12 | 2017-02-22 | 诺基亚技术有限公司 | Method, network element, user equipment and system for securing device-to-device communication in a wireless network |
EP3177052A1 (en) * | 2014-07-31 | 2017-06-07 | ZTE Corporation | Method, device and system for selecting security algorithm |
CN105577361A (en) * | 2015-04-20 | 2016-05-11 | 宇龙计算机通信科技(深圳)有限公司 | Information processing method and device thereof |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111600868A (en) * | 2020-05-12 | 2020-08-28 | 捷开通讯(深圳)有限公司 | Direct connection communication method, core network equipment, mobile terminal and storage medium |
WO2021227143A1 (en) * | 2020-05-12 | 2021-11-18 | 捷开通讯(深圳)有限公司 | Direct call method, core network device, mobile terminal, and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2017197650A1 (en) | Method and device for interaction in call | |
CN108449114B (en) | Bluetooth connection method and mobile terminal | |
CN115190197B (en) | Bluetooth headset-based communication method and device and storage medium | |
CN106101776B (en) | Method, smart machine and the speaker of volume adjustment | |
CN107222629B (en) | Incoming call processing method and related product | |
CN113923612A (en) | Call method, device and system | |
CN112788783B (en) | Relay connection establishment method and device | |
CN104348943A (en) | Incoming call prompt method and incoming call prompt device | |
CN106953987A (en) | A kind of call processing method and device and mobile terminal | |
CN103647868B (en) | Reduce the method and apparatus that the tinkle of bells is bothered | |
CN104917905B (en) | Processing method, terminal and the server of Stranger Calls | |
CN106303085B (en) | Mobile terminal and method and device for secure call | |
CN105704106B (en) | A kind of visualization IVR implementation method and mobile terminal | |
CN104348944A (en) | Caller identification method and caller identification terminal | |
CN106998553B (en) | Equipment identity identification method, computer equipment and storage medium | |
CN105282155A (en) | Authority control method, device and system for interaction among terminals | |
CN109617689A (en) | Call method, terminal and equipment of the core network | |
CN106375195B (en) | resource sharing method and wristband equipment thereof | |
CN109104722A (en) | Terminal access method, apparatus and computer readable storage medium | |
EP4075771A1 (en) | Method for generating contact business card and method for displaying contact information | |
CN108880787A (en) | A kind of processing method and relevant device of information key | |
CN108966250B (en) | Weak signal communication method, mobile terminal and computer readable storage medium | |
CN105704688A (en) | Communication service processing device, method and system | |
CN105554292B (en) | Add the method and device of contact person | |
CN103369131B (en) | Incoming call processing method, device and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190412 |
|
RJ01 | Rejection of invention patent application after publication |