CN109617689A - Call method, terminal and equipment of the core network - Google Patents

Call method, terminal and equipment of the core network Download PDF

Info

Publication number
CN109617689A
CN109617689A CN201811563438.5A CN201811563438A CN109617689A CN 109617689 A CN109617689 A CN 109617689A CN 201811563438 A CN201811563438 A CN 201811563438A CN 109617689 A CN109617689 A CN 109617689A
Authority
CN
China
Prior art keywords
terminal
equipment
encryption algorithm
core network
call
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811563438.5A
Other languages
Chinese (zh)
Inventor
聂谋荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huizhou TCL Mobile Communication Co Ltd
Original Assignee
Huizhou TCL Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huizhou TCL Mobile Communication Co Ltd filed Critical Huizhou TCL Mobile Communication Co Ltd
Priority to CN201811563438.5A priority Critical patent/CN109617689A/en
Publication of CN109617689A publication Critical patent/CN109617689A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/68Circuit arrangements for preventing eavesdropping
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42136Administration or customisation of services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/4228Systems providing special services or facilities to subscribers in networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention discloses a kind of call method, terminal and equipments of the core network.The call method includes: that equipment of the core network receives the call request that first terminal is initiated to second terminal, and equipment of the core network forwards the call request to second terminal;Equipment of the core network receives second terminal in the feedback message for agreeing to establish call;Equipment of the core network determines the first object Encryption Algorithm that content is interactively communicated between first terminal and equipment of the core network according to the first Encryption Algorithm;First object Encryption Algorithm is fed back to first terminal by equipment of the core network, so that first terminal encrypts the dialog context interacted between first terminal and equipment of the core network according to first object Encryption Algorithm after the foundation call of first terminal and second terminal.The embodiment of the present invention avoids call-information leakage, improves call safety.

Description

Call method, terminal and equipment of the core network
Technical field
The present invention relates to fields of communication technology, and in particular to a kind of call method, terminal and equipment of the core network.
Background technique
The continuous development of the communication technology and universal, brings more and more conveniences to the work and life of people.But At the same time, it has also brought some troubles.Event as personal information is stolen constantly occurs, some are even constituted Serious case.The approach of information theft includes usurping for personal document data, the robber of the network information usurped with call-information With etc..
Call is ravesdropping in order to prevent, guarantees the information security in call, and various call encryption devices generate in succession.Mesh Before, occur on the market it is a variety of prevent eavesdropping detector, when discovery has monitoring telephone to be attempted by call issue alarm.There is language Sound transposer, the sound of teller is changed tone, gets higher or be lower by it, is made the intermediate audio distortions intercepted and is listened not Clearly.And have corresponding device that will become the speech adjusted in the other end of communication and restore, not hear speech can.Have and utilizes digital skill The phonetic cryptographic coder of art, the voice signal of simulation is converted to digital signal by it, then is pressed the voice signal of digital form Contracting and coding are to achieve the purpose that encryption.Encrypted voice signal again with certain rate modulation at audio signal, so as to It is transmitted in simulation system;In addition there are also encryption chip is applied, the voice encryption device of frequency point coding is fixed.
But aforesaid way is the means of anti-eavesdrop, is needed using some other anti-eavesdrop means, in realization more Complexity, part specific group are very high to the confidentiality requirement of call, and the common session services that operator provides are not able to satisfy and want It asks, the voice messaging of transmission is without encryption, and there are still the risks intercepted and captured by third party.
Summary of the invention
The embodiment of the present invention provides a kind of call method, terminal and equipment of the core network, avoids call-information leakage, improves Call safety.
In a first aspect, the application provides a kind of call method, which comprises
Equipment of the core network receives the call request that first terminal is initiated to second terminal, includes first in the call request The first Encryption Algorithm that terminal is supported;
The equipment of the core network forwards the call request to the second terminal;
The equipment of the core network receives the second terminal in the feedback message for agreeing to establish call;
The equipment of the core network according to first Encryption Algorithm, determine the first terminal and the equipment of the core network it Between interactively communicate the first object Encryption Algorithm of content;
The first object Encryption Algorithm is fed back to the first terminal by the equipment of the core network, so that described first After the foundation call of terminal and the second terminal, according to the first object Encryption Algorithm to the first terminal and the core The dialog context of interaction is encrypted between heart net equipment.
It further, include institute in the feedback message when the second terminal has the call Encryption Algorithm supported State the second Encryption Algorithm of second terminal support.
Further, the first object Encryption Algorithm is conversed use between the first terminal and the second terminal Encryption Algorithm, the equipment of the core network determines that the first terminal and the core net are set according to first Encryption Algorithm The first object Encryption Algorithm of content is interactively communicated between standby, comprising:
The equipment of the core network determines one of first Encryption Algorithm and the second Encryption Algorithm intersection algorithm For the first object Encryption Algorithm;
The method also includes:
The first object Encryption Algorithm is fed back to the second terminal by the equipment of the core network, so that described second Terminal is according to the first object Encryption Algorithm to the dialog context interacted between the second terminal and the equipment of the core network It is encrypted.
Further, the method also includes:
The equipment of the core network according to second Encryption Algorithm, determine the second terminal and the equipment of the core network it Between interactively communicate the second target Encryption Algorithm of content;
The second target Encryption Algorithm is fed back to the second terminal by the equipment of the core network, so that described first After the foundation call of terminal and the second terminal, the second terminal is according to the second target Encryption Algorithm to described second The dialog context interacted between terminal and the equipment of the core network is encrypted.
Further, the equipment of the core network determines the second terminal and the core according to second Encryption Algorithm The second target Encryption Algorithm of content is interactively communicated between heart net equipment, comprising:
The equipment of the core network randomly chooses a kind of Encryption Algorithm in second Encryption Algorithm, eventually as described second The second target Encryption Algorithm of content is interactively communicated between end and the equipment of the core network.
Second aspect, the application provide a kind of call method, which comprises
First terminal initiates the call request to second terminal to equipment of the core network, includes first whole in the call request The first Encryption Algorithm supported is held, so that the equipment of the core network determines that current talking is corresponding according to first Encryption Algorithm First object Encryption Algorithm, and feed back to the first terminal;
The first terminal receives the first object Encryption Algorithm of the equipment of the core network feedback;
After the first terminal and the second terminal establish call, according to the first object Encryption Algorithm to described The dialog context interacted between first terminal and the equipment of the core network is encrypted.
Further, when the second terminal has the call Encryption Algorithm supported, the first object Encryption Algorithm The call Encryption Algorithm supported for the second terminal.
The third aspect, the application provide a kind of call method, which comprises
Second terminal receives the call request that the first terminal of equipment of the core network forwarding is initiated;
The second terminal is sent to the equipment of the core network agrees to establish the feedback message conversed, in the feedback message The second Encryption Algorithm that the second terminal is supported, so that the equipment of the core network is worked as according to second Encryption Algorithm determination Preceding corresponding second target Encryption Algorithm of conversing, and feed back to the second terminal;
The second terminal receives the second target Encryption Algorithm of the equipment of the core network feedback;
After the first terminal and the second terminal establish call, according to the second target Encryption Algorithm to described The dialog context interacted between first terminal and the equipment of the core network is encrypted.
Further, the method also includes:
Second terminal initiates the call request to third terminal to equipment of the core network, includes first whole in the call request The third Encryption Algorithm supported is held, so that the equipment of the core network determines that current talking is corresponding according to the third Encryption Algorithm Third target Encryption Algorithm, and feed back to the first terminal;
The second terminal receives the third target Encryption Algorithm of the equipment of the core network feedback;
After the second terminal and the third terminal establish call, according to the third target Encryption Algorithm to described The dialog context interacted between second terminal and the equipment of the core network is encrypted.
Fourth aspect, the application provide a kind of equipment of the core network, and the equipment of the core network includes:
First receiving unit, the call request initiated for receiving first terminal to second terminal, in the call request The first Encryption Algorithm supported including first terminal;
First transmission unit, for forwarding the call request to the second terminal;
Second receiving unit, for receiving the second terminal in the feedback message for agreeing to establish call;
Determination unit, for according to first Encryption Algorithm, determine the first terminal and the equipment of the core network it Between interactively communicate the first object Encryption Algorithm of content;
Second transmission unit, for the first object Encryption Algorithm to be fed back to the first terminal, so that described After the foundation call of first terminal and the second terminal, according to the first object Encryption Algorithm to the first terminal and institute The dialog context for stating interaction between equipment of the core network is encrypted.
5th aspect, the application provide a kind of terminal, and the terminal includes:
Transmission unit includes in the call request for initiating the call request to second terminal to equipment of the core network The first Encryption Algorithm that first terminal is supported, so that the equipment of the core network determines current lead to according to first Encryption Algorithm Corresponding first object Encryption Algorithm is talked about, and feeds back to the first terminal;
Receiving unit, for receiving the first object Encryption Algorithm of the equipment of the core network feedback;
Encryption unit is used for after the first terminal and the second terminal establish call, according to the first object Encryption Algorithm encrypts the dialog context interacted between the first terminal and the equipment of the core network.
6th aspect, the application provide a kind of terminal, and the terminal includes:
First receiving unit, the call request that the first terminal for receiving equipment of the core network forwarding is initiated;
Transmission unit, for sending the feedback message for agreeing to establish call, the feedback message to the equipment of the core network Described in second terminal support the second Encryption Algorithm so that the equipment of the core network according to second Encryption Algorithm determine The corresponding second target Encryption Algorithm of current talking, and feed back to the second terminal;
Second receiving unit, for receiving the second target Encryption Algorithm of the equipment of the core network feedback;
Encryption unit is used for after the first terminal and the second terminal establish call, according to second target Encryption Algorithm encrypts the dialog context interacted between the first terminal and the equipment of the core network.
7th aspect, the application provide a kind of storage medium, and the storage medium is stored with a plurality of instruction, and described instruction is suitable It is loaded in processor, to execute in call method described in any one of first aspect, second aspect and third aspect Step.
Equipment of the core network receives the call request that first terminal is initiated to second terminal in the embodiment of the present invention, and core net is set It is standby to forward the call request to second terminal;Equipment of the core network receives second terminal in the feedback message for agreeing to establish call; Equipment of the core network determines the first object that content is interactively communicated between first terminal and equipment of the core network according to the first Encryption Algorithm Encryption Algorithm;First object Encryption Algorithm is fed back to first terminal by equipment of the core network, so that first terminal and second terminal Foundation call after, call of the first terminal according to first object Encryption Algorithm to being interacted between first terminal and equipment of the core network Content is encrypted.In the embodiment of the present invention centered on the corresponding network operator of equipment of the core network, in terminal and core net Dialog context encryption is carried out between equipment, cryptographic capabilities is reported by terminal, equipment of the core network determines Encryption Algorithm, terminal and core Call between net still uses common communication mode, but is set according to first object Encryption Algorithm to first terminal and core net The dialog context of interaction is encrypted between standby, is avoided call-information leakage, is improved call safety.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for For those skilled in the art, without creative efforts, it can also be obtained according to these attached drawings other attached Figure.
Fig. 1 is the configuration diagram of communication system in the embodiment of the present invention;
Fig. 2 is one embodiment flow diagram of call method in the embodiment of the present invention;
Fig. 3 is another embodiment flow diagram of call method in the embodiment of the present invention;
Fig. 4 is another embodiment flow diagram of call method in the embodiment of the present invention;
Fig. 5 is one embodiment structural schematic diagram of equipment of the core network in the embodiment of the present invention;
Fig. 6 is one embodiment structural schematic diagram of terminal in the embodiment of the present invention;
Fig. 7 is another example structure schematic diagram of terminal in the embodiment of the present invention;
Fig. 8 is another example structure schematic diagram of terminal in the embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, those skilled in the art's every other implementation obtained without creative efforts Example, shall fall within the protection scope of the present invention.
In this application, " exemplary " word is used to indicate " being used as example, illustration or explanation ".Described herein as Any embodiment of " exemplary " is not necessarily to be construed as or more advantage more more preferable than other embodiments.In order to appoint this field What technical staff can be realized and use the present invention, gives and is described below.In the following description, it arranges for purposes of explanation Details is gone out.It should be appreciated that those skilled in the art will realize that the case where not using these specific details Under the present invention also may be implemented.In other examples, well known structure and process will not be described in detail, to avoid need not The details wanted makes description of the invention become obscure.Therefore, the present invention be not intended to be limited to shown in embodiment, but with meet The widest scope of principle and feature disclosed in the present application is consistent.
Description and claims of this specification and term " first ", " second ", " third " " in above-mentioned attached drawing The (if present)s such as four " are to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should manage The data that solution uses in this way are interchangeable under appropriate circumstances, so as to the embodiment of the present invention described herein can in addition to Here the sequence other than those of diagram or description is implemented.In addition, term " includes " and " having " and their any deformation, Be intended to cover it is non-exclusive include, for example, containing the process, method of a series of steps or units, system, product or setting It is standby those of to be not necessarily limited to be clearly listed step or unit, but may include be not clearly listed or for these mistakes The intrinsic other step or units of journey, method, product or equipment.
The terms " system " and " network " are often used interchangeably herein.The terms "and/or", only It is a kind of incidence relation for describing affiliated partner, indicates may exist three kinds of relationships, for example, A and/or B, can indicates: individually There are A, exist simultaneously A and B, these three situations of individualism B.In addition, character "/" herein, typicallys represent forward-backward correlation pair As if a kind of relationship of "or".
The embodiment of the present invention provides a kind of call method, terminal and equipment of the core network.It is described in detail separately below.
As shown in Figure 1, including in the communication system for the configuration diagram of the communication system provided in the embodiment of the present invention First terminal 101, equipment of the core network 103 and second terminal 102, first terminal 101, second terminal 102 and equipment of the core network 103 Communication connection, first terminal 101 and second terminal 102 can be initiated and be established by equipment of the core network to converse.
It should be understood that the embodiment of the present application can be applied to various communication systems, and such as: global system for mobile telecommunications (GlobalSystem forMobile communications, GSM) system, CDMA (Code Division MultipleAccess, CDMA) system, wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA) system, General Packet Radio Service (General Packet Radio Service, GPRS), LTE, LTE frequency division are double Work (Frequency Division Duplex, FDD) system, LTE time division duplex (Time Division Duplex, TDD) system System, advanced long term evolution (Advanced long term evolution, LTE-A) system, Universal Mobile Communication System (Universal Mobile Telecommunication System, UMTS) or Next-Generation Wireless Communication Systems, such as newly connect Enter (New Radio, NR) system, the LTE (evolved LTE, eLTE) of evolution etc..
Terminal (first terminal, second terminal and third terminal as described below) described in this application is referred to as It is user equipment (User Equipment, UE), access terminal, subscriber unit, subscriber station, movement station, mobile station, remote station, remote Journey terminal, mobile device, user terminal, terminal, wireless telecom equipment, user agent or user apparatus.Terminal can be wirelessly Website (STATION, ST) in local area network (Wireless Local AreaNetworks, WLAN), can be cellular phone, Wireless phone, session initiation protocol (Session Initiation Protocol, SIP) phone, wireless local loop (Wireless Local Loop, WLL) stand, personal digital assistant (Personal Digital Assistant, PDA) equipment, Handheld device, trunking with wireless communication function calculate equipment or are connected to other processing of radio modem Equipment, mobile unit, wearable device and next generation communication system, for example, the terminal device or future in 5G network are drilled Into public land mobile network (Public Land Mobile Network, PLMN) network in terminal device etc..As Example and it is non-limiting, in the embodiment of the present application, terminal can also be wearable device.Wearable device is referred to as dressing Formula smart machine is to carry out intelligentized design to daily wearing using wearable technology, develop the total of the equipment that can be dressed Claim, such as glasses, gloves, wrist-watch, dress ornament and shoes.Wearable device is directly worn, or is integrated into the clothes of user Or a kind of portable device of accessory.Wearable device is not only a kind of hardware device, even more passes through software support and number Powerful function is realized according to interaction, cloud interaction.Broad sense wearable intelligent equipment includes that function is complete, size is big, can not depend on Smart phone realizes complete or partial function, such as: smartwatch or intelligent glasses etc., and be only absorbed in certain one kind and answer It with function, needs to be used cooperatively with other equipment such as smart phone, such as the Intelligent bracelet of all kinds of carry out sign monitorings, intelligent jewellery Deng.
In the embodiment of the present invention, equipment of the core network can be mobility management entity (Mobility Management Entity, MME)/gateway (Serving GateWay, S-GW) can also be the equipment of the core network in future 5G system. MME is the crucial control in third generation partner program (3GPP, 3rd Generation Partnership Project) LTE Node processed, belongs to core network element, is mainly responsible for signaling processing part, i.e. control plane function, including access control, mobility pipe Reason is adhered to and the functions such as attachment removal, conversation management functional and gateway selection.S-GW is the important net of core net in 3GPP LTE Member is mainly responsible for the user plane functions of user data forwarding, i.e., the routing and forwarding of data packet are carried out under the control of MME.
As shown in Fig. 2, to provide one embodiment flow diagram of call method, the correspondent in the embodiment of the present invention Method is applied to equipment of the core network, which includes:
201, equipment of the core network receives the call request that first terminal is initiated to second terminal.
When first terminal needs to initiate to converse to second terminal, first terminal first can be to equipment of the core network to second eventually The call request at end.It wherein, include the first Encryption Algorithm of first terminal support in the call request.First Encryption Algorithm can be with Encryption Algorithm including the support of one or more first terminals, such as Secure Hash Algorithm (Secure Hash Algorithm, ) or des (Data Encryption Standard) algorithm etc. sha.
In current Regular conversation scene, do not include in the call request that terminal is sent when initiating and converse to equipment of the core network Encryption Algorithm field in the embodiment of the present invention, in original call request, is added to Encryption Algorithm field, for inserting the The first cryptography information that one terminal is supported, further, if the encryption that terminal audio frequency call and video calling are supported is calculated Method is identical, which can be an Encryption Algorithm field, such as voice-frequency telephony and video calling are supported equally Encryption Algorithm can be defined with an Encryption Algorithm field, for example, Encode:sha, des, indicate that terminal supports safety Hash algorithm (Secure Hash Algorithm, sha) or des (Data Encryption Standard) algorithm.If no Support encryption, the value of Encode may is that none.In other embodiments of the invention, no matter terminal audio frequency call and view The Encryption Algorithm that frequency call is supported is same or different, can be defined using multiple Encryption Algorithm fields, i.e., respectively to sound Frequency call and video calling support Encryption Algorithm is defined, such as increase Encryption Algorithm field " Audio-Encode " and " Video-Encode " limits the Encryption Algorithm of voice-frequency telephony and video calling support respectively, such as follows:
Audio-Encode:sha,des
Video-Encode:sha,des
Indicate that sha and des Encryption Algorithm is supported in voice-frequency telephony, video calling also supports sha and des Encryption Algorithm.
202, equipment of the core network forwards the call request to second terminal.
Equipment of the core network receive first terminal initiation change call request after, which can be transmitted to Second terminal, second terminal can pass through the side of visual interface (such as caller identification interface) after receiving the call request Formula shows the call request, if receiving the instruction (such as in caller identification interface connecting incoming call) that user connects call, second eventually It holds to equipment of the core network and sends the feedback message for agreeing to establish call.
203, equipment of the core network receives second terminal in the feedback message for agreeing to establish call.
204, equipment of the core network determines in interactively communicating between first terminal and equipment of the core network according to the first Encryption Algorithm The first object Encryption Algorithm of appearance.
Specifically, since the first Encryption Algorithm may include the Encryption Algorithm that one or more first terminals are supported, core Net equipment can select a kind of Encryption Algorithm in the first Encryption Algorithm, logical as interaction between first terminal and equipment of the core network Believe the first object Encryption Algorithm of content.In a kind of mode of the present invention, equipment of the core network in first Encryption Algorithm with Machine selects a kind of Encryption Algorithm, as the first object for interactively communicating content between the first terminal and the equipment of the core network Encryption Algorithm.It is understood that in other embodiments of the present invention, can also be that equipment of the core network determines that first object encrypts The mode of algorithm, for example, having pre-defined the priority of Encryption Algorithm in equipment of the core network, equipment of the core network can be according to default Encryption Algorithm priority, from the first Encryption Algorithm select highest priority a kind of Encryption Algorithm, as it is described first eventually The first object Encryption Algorithm of content is interactively communicated between end and the equipment of the core network, this is not limited here.
It should be noted that equipment of the core network interactively communicates the of content determining between first terminal and equipment of the core network When one target Encryption Algorithm, corresponding first encryption code key, such as 123456 etc. can also while be determined, certainly, in the present invention In some embodiments, can also make an appointment between first terminal and second terminal encryption code key (such as operator agreement Equipment in network is all made of default encryption code key), it is specified without equipment of the core network.
205, first object Encryption Algorithm is fed back to first terminal by equipment of the core network, so that first terminal and second is eventually End foundation call after, according to first object Encryption Algorithm to the dialog context interacted between first terminal and equipment of the core network into Row encryption.
When determining the first encryption code key in step 204, in this step, equipment of the core network can also encrypt code key for first First terminal is fed back to simultaneously with first object Encryption Algorithm, at this point, after the foundation call of first terminal and second terminal, first Terminal can be logical according to what is interacted between first object Encryption Algorithm and the first encryption secret key pair first terminal and equipment of the core network Words content is encrypted.
In subsequent communication process, when equipment of the core network receives the speech scrambling data of first terminal transmission, all using should First object Encryption Algorithm is decrypted, as do not used Encryption Algorithm to encrypt between second terminal and equipment of the core network, after decryption Second terminal is forwarded again, as used Encryption Algorithm to encrypt between second terminal and equipment of the core network, then first uses the first object Encryption Algorithm is decrypted, then after being encrypted using the Encryption Algorithm that sets between second terminal and equipment of the core network, then turns Issue second terminal.
Equipment of the core network receives the call request that first terminal is initiated to second terminal in the embodiment of the present invention, and core net is set It is standby to forward the call request to second terminal;Equipment of the core network receives second terminal in the feedback message for agreeing to establish call; Equipment of the core network determines the first object that content is interactively communicated between first terminal and equipment of the core network according to the first Encryption Algorithm Encryption Algorithm;First object Encryption Algorithm is fed back to first terminal by equipment of the core network, so that first terminal and second terminal Foundation call after, call of the first terminal according to first object Encryption Algorithm to being interacted between first terminal and equipment of the core network Content is encrypted.In the embodiment of the present invention centered on the corresponding network operator of equipment of the core network, in terminal and core net Dialog context encryption is carried out between equipment, cryptographic capabilities is reported by terminal, equipment of the core network determines Encryption Algorithm, terminal and core Call between net still uses common communication mode, but is set according to first object Encryption Algorithm to first terminal and core net The dialog context of interaction is encrypted between standby, is avoided call-information leakage, is improved call safety.
In embodiment illustrated in fig. 2 of the present invention, first terminal supports Encryption Algorithm, can be to first terminal and equipment of the core network Between interaction Content of Communication encrypted, and in the embodiment of the present invention second terminal can be support Encryption Algorithm terminal, It is also possible to not support the terminal of Encryption Algorithm, when the second terminal has the call Encryption Algorithm supported, above-mentioned steps It may include the second Encryption Algorithm that the second terminal is supported in feedback message described in 203.At this point, second terminal and core The Content of Communication of interaction can also be encrypted between net equipment.
But to the encryption of the Content of Communication of interaction between second terminal and equipment of the core network, there are various ways again, a kind of Mode is that the Content of Communication of interaction also uses first object Encryption Algorithm to encrypt between second terminal and equipment of the core network, such In the case of, it also include the first object Encryption Algorithm in the second Encryption Algorithm that second terminal is supported.The i.e. described first object adds Close algorithm is conversed the Encryption Algorithm of use between the first terminal and the second terminal, and first terminal and core net are set It is standby, the first object Encryption Algorithm is all made of between second terminal and equipment of the core network.Equipment of the core network root in above-mentioned steps 204 According to first Encryption Algorithm, the first object that content is interactively communicated between the first terminal and the equipment of the core network is determined Encryption Algorithm can specifically include: equipment of the core network determines in first Encryption Algorithm and the second Encryption Algorithm intersection A kind of algorithm be the first object Encryption Algorithm.For example, the first Encryption Algorithm are as follows: model is calculated in sha and des, the second encryption are as follows: Sha and des, then the intersection of the first Encryption Algorithm and the second Encryption Algorithm is sha and des, and a kind of add is selected from sha and des Close algorithm is as first object Encryption Algorithm, when the intersection of the first Encryption Algorithm and the second Encryption Algorithm is there are many when algorithm, tool Body selection mode is referred to the mode of above-mentioned random selection and priority selection, and specific details are not described herein again.
At this point, the method can also include: that the first object Encryption Algorithm is fed back to described by equipment of the core network Two terminals, so that the second terminal sets the second terminal and the core net according to the first object Encryption Algorithm The dialog context of interaction is encrypted between standby.
Communication in other embodiments in embodiments of the present invention, to interaction between second terminal and equipment of the core network Content-encrypt can be encrypted using the algorithm different from first object Encryption Algorithm.First terminal and core net are set Standby, the Content of Communication of interaction is encrypted using different Encryption Algorithm between second terminal and equipment of the core network.Further, The method can also include: equipment of the core network according to second Encryption Algorithm, determine the second terminal and the core The second target Encryption Algorithm of content is interactively communicated between net equipment;Equipment of the core network feeds back the second target Encryption Algorithm To the second terminal, so that second terminal is according to after the foundation call of the first terminal and the second terminal Second target Encryption Algorithm encrypts the dialog context interacted between the second terminal and the equipment of the core network.
Above-mentioned first object Encryption Algorithm is different with the second target Encryption Algorithm, can guarantee different terminal and core in this way The Content of Communication of interaction uses different cipher modes between heart net equipment, further ensures the safety of communication.
Further, the equipment of the core network determines the second terminal and the core according to second Encryption Algorithm The second target Encryption Algorithm that content is interactively communicated between heart net equipment may include: equipment of the core network in second encryption A kind of Encryption Algorithm is randomly choosed in algorithm, interactively communicates content as between the second terminal and the equipment of the core network Second target Encryption Algorithm.It is understood that equipment of the core network is according to the second encryption in some other embodiment of the present invention It is above-mentioned to determine that the second target Encryption Algorithm that content is interactively communicated between second terminal and equipment of the core network is also referred to for algorithm Determine the mode that priority when first object Encryption Algorithm selects, specific details are not described herein again.
As shown in figure 3, for another embodiment schematic diagram of the call method provided in the embodiment of the present invention, the correspondent Method is applied to first terminal, which includes:
301, first terminal initiates the call request to second terminal to equipment of the core network.
It wherein, include the first Encryption Algorithm of first terminal support in the call request, so that the core net is set It is standby that the corresponding first object Encryption Algorithm of current talking is determined according to first Encryption Algorithm, and feed back to described first eventually End;
302, first terminal receives the first object Encryption Algorithm of the equipment of the core network feedback.
303, after first terminal and the second terminal establish call, according to the first object Encryption Algorithm to described The dialog context interacted between first terminal and the equipment of the core network is encrypted.
Further, when the second terminal has the call Encryption Algorithm supported, first object Encryption Algorithm is institute State the call Encryption Algorithm of second terminal support.
In the embodiment of the present invention centered on the corresponding network operator of equipment of the core network, terminal and equipment of the core network it Between carry out dialog context encryption, cryptographic capabilities are reported by first terminal, equipment of the core network determines Encryption Algorithm, first terminal and core Call between heart net still uses common communication mode, but according to first object Encryption Algorithm to first terminal and core net The dialog context of interaction is encrypted between equipment, is avoided call-information leakage, is improved call safety.
As shown in figure 4, for another embodiment schematic diagram of the call method provided in the embodiment of the present invention, the correspondent Method is applied to second terminal, which includes:
401, second terminal receives the call request that the first terminal of equipment of the core network forwarding is initiated.
402, second terminal sends the feedback message for agreeing to establish call to the equipment of the core network.
Wherein, the second Encryption Algorithm that second terminal described in the feedback message is supported, so that the core net is set It is standby that the corresponding second target Encryption Algorithm of current talking is determined according to second Encryption Algorithm, and feed back to described second eventually End.
403, second terminal receives the second target Encryption Algorithm of the equipment of the core network feedback.
404, after first terminal and the second terminal establish call, according to the second target Encryption Algorithm to first terminal The dialog context interacted between equipment of the core network is encrypted.
In the embodiment of the present invention centered on the corresponding network operator of equipment of the core network, terminal and equipment of the core network it Between carry out dialog context encryption, cryptographic capabilities are reported by second terminal, equipment of the core network determines Encryption Algorithm, second terminal and core Call between heart net still uses common communication mode, but according to the second target Encryption Algorithm to second terminal and core net The dialog context of interaction is encrypted between equipment, is avoided call-information leakage, is improved call safety.
Further, in the embodiment of the present invention, second terminal is as called end, it is to be understood that second terminal is same It can be used as calling terminal, at this time further, the method can also include: that second terminal is initiated to equipment of the core network to third The call request of terminal includes the third Encryption Algorithm that first terminal is supported in the call request, so that the core net Equipment determines the corresponding third target Encryption Algorithm of current talking according to the third Encryption Algorithm, and feeds back to described first eventually End;Second terminal receives the third target Encryption Algorithm of the equipment of the core network feedback;In the second terminal and the third After terminal establishes call, interacted according to the third target Encryption Algorithm between the second terminal and the equipment of the core network Dialog context encrypted.
As shown in figure 5, for a kind of equipment of the core network provided in the embodiment of the present invention, the equipment of the core network 500 includes:
First receiving unit 501, the call request initiated for receiving first terminal to second terminal, the call request In include first terminal support the first Encryption Algorithm;
First transmission unit 502, for forwarding the call request to the second terminal;
Second receiving unit 503, for receiving the second terminal in the feedback message for agreeing to establish call;
Determination unit 504, for determining the first terminal and the equipment of the core network according to first Encryption Algorithm Between interactively communicate the first object Encryption Algorithm of content;
Second transmission unit 505, for the first object Encryption Algorithm to be fed back to the first terminal, so that institute After the foundation call for stating first terminal and the second terminal, according to the first object Encryption Algorithm to the first terminal with The dialog context of interaction is encrypted between the equipment of the core network.
It further, include institute in the feedback message when the second terminal has the call Encryption Algorithm supported State the second Encryption Algorithm of second terminal support.
Further, the first object Encryption Algorithm is conversed use between the first terminal and the second terminal Encryption Algorithm, the determination unit 504 is specifically used for: determining first Encryption Algorithm and the second Encryption Algorithm intersection One of algorithm be the first object Encryption Algorithm;
The equipment of the core network further include:
Third transmission unit, for the first object Encryption Algorithm to be fed back to the second terminal, so that described Call of the second terminal according to the first object Encryption Algorithm to being interacted between the second terminal and the equipment of the core network Content is encrypted.
Further, the determination unit 504 is also used to according to second Encryption Algorithm, determine the second terminal and The second target Encryption Algorithm of content is interactively communicated between the equipment of the core network;
Second transmission unit 505 is also used to the second target Encryption Algorithm feeding back to the second terminal, so that After the foundation call of the first terminal and the second terminal, the second terminal is according to the second target Encryption Algorithm pair The dialog context interacted between the second terminal and the equipment of the core network is encrypted.
Further, the determination unit 504 is specifically used for: randomly choosing a kind of encryption in second Encryption Algorithm Algorithm, as the second target Encryption Algorithm for interactively communicating content between the second terminal and the equipment of the core network.
As shown in fig. 6, the terminal is above-mentioned reality for one embodiment schematic diagram of the terminal provided in the embodiment of the present invention The first terminal in example is applied, which includes:
Transmission unit 601 wraps in the call request for initiating the call request to second terminal to equipment of the core network The first Encryption Algorithm of first terminal support is included, so that the equipment of the core network determines currently according to first Encryption Algorithm It converses corresponding first object Encryption Algorithm, and feeds back to the first terminal;
Receiving unit 602, for receiving the first object Encryption Algorithm of the equipment of the core network feedback;
Encryption unit 603 is used for after the first terminal and the second terminal establish call, according to first mesh Mark Encryption Algorithm encrypts the dialog context interacted between the first terminal and the equipment of the core network.
As shown in fig. 7, the terminal is above-mentioned for another embodiment schematic diagram of the terminal provided in the embodiment of the present invention Second terminal in embodiment, the terminal 700 include:
First receiving unit 701, the call request that the first terminal for receiving equipment of the core network forwarding is initiated;
Transmission unit 702, for sending the feedback message for agreeing to establish call to the equipment of the core network, the feedback disappears The second Encryption Algorithm that second terminal described in breath is supported, so that the equipment of the core network is true according to second Encryption Algorithm Determine the corresponding second target Encryption Algorithm of current talking, and feeds back to the second terminal;
Second receiving unit 703, for receiving the second target Encryption Algorithm of the equipment of the core network feedback;
Encryption unit 704 is used for after the first terminal and the second terminal establish call, according to second mesh Mark Encryption Algorithm encrypts the dialog context interacted between the first terminal and the equipment of the core network.
Correspondingly, the embodiment of the present invention also provides a kind of terminal, as shown in figure 8, the terminal may include radio frequency (RF, Radio Frequency) circuit 801, the memory 802, defeated that includes one or more computer readable storage medium Enter unit 803, display unit 804, sensor 805, voicefrequency circuit 806, Wireless Fidelity (WiFi, Wireless Fidelity) The components such as module 807, the processor 808 for including one or more than one processing core and power supply 809.This field skill Art personnel are appreciated that the restriction of the not structure paired terminal of terminal structure shown in Fig. 8, may include more or more than illustrating Few component perhaps combines certain components or different component layouts.Wherein:
RF circuit 801 can be used for receiving and sending messages or communication process in, signal sends and receivees, particularly, by base station After downlink information receives, one or the processing of more than one processor 808 are transferred to;In addition, the data for being related to uplink are sent to Base station.In general, RF circuit 801 includes but is not limited to antenna, at least one amplifier, tuner, one or more oscillators, uses Family identity module (SIM, Subscriber Identity Module) card, transceiver, coupler, low-noise amplifier (LNA, Low Noise Amplifier), duplexer etc..In addition, RF circuit 801 can also by wireless communication with network and its He communicates equipment.Any communication standard or agreement can be used in the wireless communication, and including but not limited to global system for mobile telecommunications is deposited Storage media (GSM, Global System of Mobile communication), general packet radio service (GPRS, General Packet Radio Service), it is CDMA (CDMA, Code Division Multiple Access), wide Band CDMA (WCDMA, Wideband Code Division Multiple Access), long term evolution (LTE, Long Term Evolution), Email, short message service (SMS, Short Messaging Service) etc..
Memory 802 can be used for storing software program and module, and processor 808 is stored in memory 802 by operation Software program and module, thereby executing various function application and data processing.Memory 802 can mainly include storage journey Sequence area and storage data area, wherein application program needed for storing program area can store operation storage medium, at least one function (such as sound-playing function, image player function etc.) etc.;Storage data area, which can be stored, uses created number according to terminal According to (such as audio data, phone directory etc.) etc..In addition, memory 802 may include high-speed random access memory, can also wrap Include nonvolatile memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts. Correspondingly, memory 802 can also include Memory Controller, to provide processor 808 and input unit 803 to memory 802 access.
Input unit 803 can be used for receiving the number or character information of input, and generate and user setting and function Control related keyboard, mouse, operating stick, optics or trackball signal input.Specifically, in a specific embodiment In, input unit 803 may include touch sensitive surface and other input equipments.Touch sensitive surface, also referred to as touch display screen or touching Control plate, collect user on it or nearby touch operation (such as user using any suitable object such as finger, stylus or Operation of the attachment on touch sensitive surface or near touch sensitive surface), and corresponding connection dress is driven according to preset formula It sets.Optionally, touch sensitive surface may include both touch detecting apparatus and touch controller.Wherein, touch detecting apparatus is examined The touch orientation of user is surveyed, and detects touch operation bring signal, transmits a signal to touch controller;Touch controller from Touch information is received on touch detecting apparatus, and is converted into contact coordinate, then gives processor 808, and can reception processing Order that device 808 is sent simultaneously is executed.Furthermore, it is possible to a variety of using resistance-type, condenser type, infrared ray and surface acoustic wave etc. Type realizes touch sensitive surface.In addition to touch sensitive surface, input unit 803 can also include other input equipments.Specifically, other are defeated Entering equipment can include but is not limited to physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse One of mark, operating stick etc. are a variety of.
Display unit 804 can be used for showing information input by user or be supplied to user information and terminal it is various Graphical user interface, these graphical user interface can be made of figure, text, icon, video and any combination thereof.Display Unit 804 may include display panel, optionally, can using liquid crystal display (LCD, Liquid Crystal Display), The forms such as Organic Light Emitting Diode (OLED, Organic Light-Emitting Diode) configure display panel.Further , touch sensitive surface can cover display panel, after touch sensitive surface detects touch operation on it or nearby, send processing to Device 808 is followed by subsequent processing device 808 and is provided on a display panel accordingly according to the type of touch event to determine the type of touch event Visual output.Although in fig. 8, touch sensitive surface and display panel are to realize input and input as two independent components Function, but in some embodiments it is possible to touch sensitive surface and display panel are integrated and realizes and outputs and inputs function.
Terminal may also include at least one sensor 805, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light Light and shade adjust the brightness of display panel, proximity sensor can close display panel and/or back when terminal is moved in one's ear Light.As a kind of motion sensor, gravity accelerometer can detect (generally three axis) acceleration in all directions Size can detect that size and the direction of gravity when static, can be used to identify mobile phone posture application (such as horizontal/vertical screen switching, Dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;It can also configure as terminal The other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared sensor, details are not described herein.
Voicefrequency circuit 806, loudspeaker, microphone can provide the audio interface between user and terminal.Voicefrequency circuit 806 can By the electric signal after the audio data received conversion, it is transferred to loudspeaker, voice signal output is converted to by loudspeaker;It is another The voice signal of collection is converted to electric signal by aspect, microphone, is converted to audio data after being received by voicefrequency circuit 806, then After the processing of audio data output processor 808, it is sent to such as another terminal through RF circuit 801, or by audio data Output is further processed to memory 802.Voicefrequency circuit 806 is also possible that earphone jack, with provide peripheral hardware earphone with The communication of terminal.
WiFi belongs to short range wireless transmission technology, and terminal can help user's transceiver electronics postal by WiFi module 807 Part, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 8 is shown WiFi module 807, but it is understood that, and it is not belonging to must be configured into for terminal, it can according to need do not changing completely Become in the range of the essence of invention and omits.
Processor 808 is the control centre of terminal, using the various pieces of various interfaces and connection whole mobile phone, is led to It crosses operation or executes the software program and/or module being stored in memory 802, and call and be stored in memory 802 Data execute the various functions and processing data of terminal, to carry out integral monitoring to mobile phone.Optionally, processor 808 can wrap Include one or more processing cores;Preferably, processor 808 can integrate application processor and modem processor, wherein answer With the main processing operation storage medium of processor, user interface and application program etc., modem processor is mainly handled wirelessly Communication.It is understood that above-mentioned modem processor can not also be integrated into processor 808.
Terminal further includes the power supply 809 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply pipe Manage storage medium and processor 808 it is logically contiguous, thus by power management storage medium realize management charging, discharge and The functions such as power managed.Power supply 809 can also include one or more direct current or AC power source, recharge storage Jie The random components such as matter, power failure detection circuit, power adapter or inverter, power supply status indicator.
Although being not shown, terminal can also include camera, bluetooth module etc., and details are not described herein.Specifically in this implementation In example, the processor 808 in terminal can be corresponding by the process of one or more application program according to following instruction Executable file is loaded into memory 802, and the application program being stored in memory 802 is run by processor 808, from And realize various functions in above-mentioned call method.
It will appreciated by the skilled person that all or part of the steps in the various methods of above-described embodiment can be with It is completed by instructing, or relevant hardware is controlled by instruction to complete, which can store computer-readable deposits in one In storage media, and is loaded and executed by processor.
For this purpose, the embodiment of the present invention provides a kind of storage medium, wherein being stored with a plurality of instruction, which can be processed Device is loaded, to execute the step in any call method provided by the embodiment of the present invention.
The specific implementation of above each operation can be found in the embodiment of front, and details are not described herein.
It is provided for the embodiments of the invention a kind of call method, terminal and equipment of the core network above and has carried out detailed Jie It continues, used herein a specific example illustrates the principle and implementation of the invention, and the explanation of above embodiments is only It is to be used to help understand method and its core concept of the invention;Meanwhile for those skilled in the art, according to the present invention Thought, there will be changes in the specific implementation manner and application range, in conclusion the content of the present specification should not be construed as Limitation of the present invention.

Claims (10)

1. a kind of call method, which is characterized in that the described method includes:
Equipment of the core network receives the call request that first terminal is initiated to second terminal, includes first terminal in the call request The first Encryption Algorithm supported;
The equipment of the core network forwards the call request to the second terminal;
The equipment of the core network receives the second terminal in the feedback message for agreeing to establish call;
The equipment of the core network is determined and is handed between the first terminal and the equipment of the core network according to first Encryption Algorithm The first object Encryption Algorithm of mutual communication content;
The first object Encryption Algorithm is fed back to the first terminal by the equipment of the core network, so that the first terminal After the foundation call of the second terminal, according to the first object Encryption Algorithm to the first terminal and the core net The dialog context of interaction is encrypted between equipment.
2. call method according to claim 1, which is characterized in that have the call encryption supported in the second terminal It include the second Encryption Algorithm that the second terminal is supported when algorithm, in the feedback message.
3. call method according to claim 2, which is characterized in that the first object Encryption Algorithm is described first whole The Encryption Algorithm for use of conversing between the second terminal is held, the equipment of the core network is according to first Encryption Algorithm, really The first object Encryption Algorithm of content is interactively communicated between the fixed first terminal and the equipment of the core network, comprising:
The equipment of the core network determines one of first Encryption Algorithm and the second Encryption Algorithm intersection algorithm for institute State first object Encryption Algorithm;
The method also includes:
The first object Encryption Algorithm is fed back to the second terminal by the equipment of the core network, so that the second terminal The dialog context interacted between the second terminal and the equipment of the core network is carried out according to the first object Encryption Algorithm Encryption.
4. call method according to claim 2, which is characterized in that the method also includes:
The equipment of the core network is determined and is handed between the second terminal and the equipment of the core network according to second Encryption Algorithm Second target Encryption Algorithm of mutual communication content;
The second target Encryption Algorithm is fed back to the second terminal by the equipment of the core network, so that the first terminal After the foundation call of the second terminal, the second terminal is according to the second target Encryption Algorithm to the second terminal The dialog context interacted between the equipment of the core network is encrypted.
5. a kind of call method, which is characterized in that the described method includes:
First terminal initiates the call request to second terminal to equipment of the core network, includes first terminal branch in the call request The first Encryption Algorithm held, so that the equipment of the core network determines current talking corresponding according to first Encryption Algorithm One target Encryption Algorithm, and feed back to the first terminal;
The first terminal receives the first object Encryption Algorithm of the equipment of the core network feedback;
After the first terminal and the second terminal establish call, according to the first object Encryption Algorithm to described first The dialog context interacted between terminal and the equipment of the core network is encrypted.
6. a kind of call method, which is characterized in that the described method includes:
Second terminal receives the call request that the first terminal of equipment of the core network forwarding is initiated;
The second terminal sends the feedback message for agreeing to establish call to the equipment of the core network, described in the feedback message The second Encryption Algorithm that second terminal is supported, so that the equipment of the core network determines current lead to according to second Encryption Algorithm Corresponding second target Encryption Algorithm is talked about, and feeds back to the second terminal;
The second terminal receives the second target Encryption Algorithm of the equipment of the core network feedback;
After the first terminal and the second terminal establish call, according to the second target Encryption Algorithm to described first The dialog context interacted between terminal and the equipment of the core network is encrypted.
7. a kind of equipment of the core network, which is characterized in that the equipment of the core network includes:
First receiving unit, the call request initiated for receiving first terminal to second terminal include in the call request The first Encryption Algorithm that first terminal is supported;
First transmission unit, for forwarding the call request to the second terminal;
Second receiving unit, for receiving the second terminal in the feedback message for agreeing to establish call;
Determination unit, for determining and being handed between the first terminal and the equipment of the core network according to first Encryption Algorithm The first object Encryption Algorithm of mutual communication content;
Second transmission unit, for the first object Encryption Algorithm to be fed back to the first terminal, so that described first After the foundation call of terminal and the second terminal, according to the first object Encryption Algorithm to the first terminal and the core The dialog context of interaction is encrypted between heart net equipment.
8. a kind of terminal, which is characterized in that the terminal includes:
Transmission unit includes first in the call request for initiating the call request to second terminal to equipment of the core network The first Encryption Algorithm that terminal is supported, so that the equipment of the core network determines current talking pair according to first Encryption Algorithm The first object Encryption Algorithm answered, and feed back to the first terminal;
Receiving unit, for receiving the first object Encryption Algorithm of the equipment of the core network feedback;
Encryption unit, for being encrypted according to the first object after the first terminal and the second terminal establish call Algorithm encrypts the dialog context interacted between the first terminal and the equipment of the core network.
9. a kind of terminal, which is characterized in that the terminal includes:
First receiving unit, the call request that the first terminal for receiving equipment of the core network forwarding is initiated;
Transmission unit, for sending the feedback message for agreeing to establish call, institute in the feedback message to the equipment of the core network The second Encryption Algorithm of second terminal support is stated, so that the equipment of the core network determines currently according to second Encryption Algorithm It converses corresponding second target Encryption Algorithm, and feeds back to the second terminal;
Second receiving unit, for receiving the second target Encryption Algorithm of the equipment of the core network feedback;
Encryption unit, for being encrypted according to second target after the first terminal and the second terminal establish call Algorithm encrypts the dialog context interacted between the first terminal and the equipment of the core network.
10. a kind of storage medium, which is characterized in that the storage medium is stored with a plurality of instruction, and described instruction is suitable for processor It is loaded, the step in 1 to 6 described in any item call methods is required with perform claim.
CN201811563438.5A 2018-12-20 2018-12-20 Call method, terminal and equipment of the core network Pending CN109617689A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811563438.5A CN109617689A (en) 2018-12-20 2018-12-20 Call method, terminal and equipment of the core network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811563438.5A CN109617689A (en) 2018-12-20 2018-12-20 Call method, terminal and equipment of the core network

Publications (1)

Publication Number Publication Date
CN109617689A true CN109617689A (en) 2019-04-12

Family

ID=66010914

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811563438.5A Pending CN109617689A (en) 2018-12-20 2018-12-20 Call method, terminal and equipment of the core network

Country Status (1)

Country Link
CN (1) CN109617689A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111600868A (en) * 2020-05-12 2020-08-28 捷开通讯(深圳)有限公司 Direct connection communication method, core network equipment, mobile terminal and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101997676A (en) * 2009-08-28 2011-03-30 ***通信集团公司 VoIP voice encryption protection method, node and system
CN102006294A (en) * 2010-11-25 2011-04-06 中兴通讯股份有限公司 IP multimedia subsystem (IMS) multimedia communication method and system as well as terminal and IMS core network
CN104618089A (en) * 2013-11-04 2015-05-13 华为技术有限公司 Negotiation processing method for security algorithm, control network element and system
CN105577361A (en) * 2015-04-20 2016-05-11 宇龙计算机通信科技(深圳)有限公司 Information processing method and device thereof
CN106465102A (en) * 2014-05-12 2017-02-22 诺基亚技术有限公司 Method, network element, user equipment and system for securing device-to-device communication in a wireless network
EP3177052A1 (en) * 2014-07-31 2017-06-07 ZTE Corporation Method, device and system for selecting security algorithm

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101997676A (en) * 2009-08-28 2011-03-30 ***通信集团公司 VoIP voice encryption protection method, node and system
CN102006294A (en) * 2010-11-25 2011-04-06 中兴通讯股份有限公司 IP multimedia subsystem (IMS) multimedia communication method and system as well as terminal and IMS core network
CN104618089A (en) * 2013-11-04 2015-05-13 华为技术有限公司 Negotiation processing method for security algorithm, control network element and system
CN106465102A (en) * 2014-05-12 2017-02-22 诺基亚技术有限公司 Method, network element, user equipment and system for securing device-to-device communication in a wireless network
EP3177052A1 (en) * 2014-07-31 2017-06-07 ZTE Corporation Method, device and system for selecting security algorithm
CN105577361A (en) * 2015-04-20 2016-05-11 宇龙计算机通信科技(深圳)有限公司 Information processing method and device thereof

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111600868A (en) * 2020-05-12 2020-08-28 捷开通讯(深圳)有限公司 Direct connection communication method, core network equipment, mobile terminal and storage medium
WO2021227143A1 (en) * 2020-05-12 2021-11-18 捷开通讯(深圳)有限公司 Direct call method, core network device, mobile terminal, and storage medium

Similar Documents

Publication Publication Date Title
WO2017197650A1 (en) Method and device for interaction in call
CN108449114B (en) Bluetooth connection method and mobile terminal
CN115190197B (en) Bluetooth headset-based communication method and device and storage medium
CN106101776B (en) Method, smart machine and the speaker of volume adjustment
CN107222629B (en) Incoming call processing method and related product
CN113923612A (en) Call method, device and system
CN112788783B (en) Relay connection establishment method and device
CN104348943A (en) Incoming call prompt method and incoming call prompt device
CN106953987A (en) A kind of call processing method and device and mobile terminal
CN103647868B (en) Reduce the method and apparatus that the tinkle of bells is bothered
CN104917905B (en) Processing method, terminal and the server of Stranger Calls
CN106303085B (en) Mobile terminal and method and device for secure call
CN105704106B (en) A kind of visualization IVR implementation method and mobile terminal
CN104348944A (en) Caller identification method and caller identification terminal
CN106998553B (en) Equipment identity identification method, computer equipment and storage medium
CN105282155A (en) Authority control method, device and system for interaction among terminals
CN109617689A (en) Call method, terminal and equipment of the core network
CN106375195B (en) resource sharing method and wristband equipment thereof
CN109104722A (en) Terminal access method, apparatus and computer readable storage medium
EP4075771A1 (en) Method for generating contact business card and method for displaying contact information
CN108880787A (en) A kind of processing method and relevant device of information key
CN108966250B (en) Weak signal communication method, mobile terminal and computer readable storage medium
CN105704688A (en) Communication service processing device, method and system
CN105554292B (en) Add the method and device of contact person
CN103369131B (en) Incoming call processing method, device and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190412

RJ01 Rejection of invention patent application after publication