WO2006081712A1 - A method for switching the level of the plaintext and cyphertext during the conversation - Google Patents

A method for switching the level of the plaintext and cyphertext during the conversation Download PDF

Info

Publication number
WO2006081712A1
WO2006081712A1 PCT/CN2005/000183 CN2005000183W WO2006081712A1 WO 2006081712 A1 WO2006081712 A1 WO 2006081712A1 CN 2005000183 W CN2005000183 W CN 2005000183W WO 2006081712 A1 WO2006081712 A1 WO 2006081712A1
Authority
WO
WIPO (PCT)
Prior art keywords
call
control device
core control
level
terminal user
Prior art date
Application number
PCT/CN2005/000183
Other languages
French (fr)
Chinese (zh)
Inventor
Dengjun Su
Xianli Hu
Jiwen Lu
Original Assignee
Zte Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zte Corporation filed Critical Zte Corporation
Priority to PCT/CN2005/000183 priority Critical patent/WO2006081712A1/en
Publication of WO2006081712A1 publication Critical patent/WO2006081712A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/104Grouping of entities

Definitions

  • the present invention relates to the field of communications, and more particularly to a method for switching the level of confidentiality of a call in an IP-based communication network. Background technique
  • VOIP technology is a very important technology in today's communications field.
  • media transmission technologies based on IP networks have been increasingly used in enterprise networks and public networks.
  • VOIP technology has some security issues, such as voice data IP packets being sniffed and monitored; user accounts and device spoofing. Therefore, the confidentiality of the unencrypted media stream when transmitted over IP is relatively poor, and it cannot meet the needs of users such as the military and government departments who have higher confidentiality requirements.
  • encrypted communication that encrypts signaling and voice is particularly important to prevent unauthorized users from stealing information from legitimate users.
  • Encrypted communication is a special feature in VOIP technology.
  • the general method is that the user terminal and the system device perform encryption and authentication according to the established authentication algorithm, authentication parameter and service encryption mode; the encryption function of the terminal includes encrypting the user account and the password.
  • the server is authenticated and the media stream is encrypted and decrypted.
  • the present invention has been made in view of the above technical problems in the prior art, and an object thereof is to provide a method for switching the confidentiality level of a call during a call, so as to allow the user to clear different secret levels according to different occasions. Call, and make different secrets without interrupting the call Level switching, so that users can flexibly adopt various encryption methods to communicate according to their needs.
  • a method for switching the confidentiality level of a call during a call comprising: registering, at a core control device of the communication network, a security parameter set by the terminal user; and establishing a certain relationship between the terminal users requiring the call A call of a secret level; if any one of the call terminal users needs to change the secret level of the call, the core control device switches the display level according to the security parameter of the new secret level.
  • the method further comprises: establishing a call with a certain level of confidentiality between the third party terminal user and any one of the end users who are talking.
  • the method further includes: if a terminal user has multiple calls with a clear level, when the switching terminal user switches between the multiple calls, the core control device is configured according to the switched call.
  • the level of confidentiality controls the call.
  • the step of the core control device registering the security parameter of the secret level set by the terminal user further comprises: the terminal user setting a secret level of the call and a security parameter thereof; and sending the security parameter to the core Control device; the core control device stores the security parameter.
  • the security parameter is sent to the core control device by using a registration message; wherein the step of sending the security parameter to the core control device further comprises: the terminal user initiating to the core control device a registration request; the core control device authenticates the terminal user and returns an authentication result; if the authentication is successful, the terminal user authenticates the core control device; if the authentication is successful, the The terminal user sends the authentication result and the security parameter of the secret level to the core control device; the core control device stores the security parameter.
  • the security parameter is sent to the core control device by using another predetermined message (such as a call setup message or a user extension message, etc.), wherein the step of sending the security parameter to the core control device further includes: The security parameters are added to the predetermined message according to a predetermined protocol and message format; the predetermined message is sent to the core control device; and the core control device processes the message.
  • another predetermined message such as a call setup message or a user extension message, etc.
  • the step of establishing a call with a certain level of confidentiality between the terminal users requiring a call further comprises: the terminal user initiating a call request to the core control device; the core control device according to the calling terminal
  • the security parameter set by the user in the call request message and the security parameter of the secret level registered by the called terminal user in the core control device are established with corresponding secrets between the calling and called terminal users.
  • Level of call the terminal user initiating a call request to the core control device.
  • the step of the core control device establishing a call with a corresponding secret level between the calling and called terminal users further comprises: the core control device performing a confidential parameter according to the security parameter of the primary called terminal user Negotiating; the core control device controls the encryption of the encryption parameter between the calling and the called terminal users; if the negotiation is successful, when the call belongs to the secret message, the core control device allocates the called terminal user a key for encrypting and decrypting a media stream; the core control device establishes a call between the calling and called terminal users; when the call belongs to a clear call, the core control device directly at the calling and called terminal A call is established between users; if the negotiation is unsuccessful, the call fails.
  • the step of the core control device switching the clearness level according to the security parameter of the new security level further comprises: any one of the call terminal users initiating a secret level for changing the call to the core control device a media switching request of the parameter, the media switching request carries a new security parameter of a secret level; the core control device forwards the media switching request to another call terminal user; and the control device of the core control device
  • the call terminal user re-negotiates the encryption parameter; if the negotiation is successful, when the call belongs to the secret message, the core control device re-distributes the key to the call terminal user, and the call terminal user performs the new key Call;
  • the call terminal user directly makes a call.
  • the step of the core control device controlling the current call according to the brightness level of the switched call further includes: the core control device controls the handover The terminal user suspends the call before the handover, and saves the information of the switched terminal user in the handover terminal user.
  • the control handover terminal user and the new call terminal user use the key of the switched call to encrypt and decrypt the media stream.
  • the terminal device can register a set of security parameters that set different brightness levels to the core control device;
  • the terminal user can set the terminal state of the terminal device according to the needs, including the clear words, the secret message, and the encryption level.
  • the user can adjust his or her own encryption mode according to the needs, that is, switch between different clear-level call states.
  • the terminal encryption mode is arbitrarily selected by the user according to the needs at that time.
  • FIG. 1 is a flow chart of a method of switching a clear level of a call during a call, in accordance with one embodiment of the present invention
  • FIG. 2 is a flow chart of a security parameter of a terminal user registering a secret level by a registration message in the method of FIG. 1 according to an embodiment of the present invention
  • FIG. 3 is a flow chart showing a process of switching the confidentiality level of a call by a terminal user in a single call in the method of FIG. 1 according to an embodiment of the present invention
  • FIG. 4 is a flow diagram of a terminal user forming a plurality of calls having a clear level in the method of FIG. 1 in accordance with an embodiment of the present invention. detailed description
  • the present invention has been proposed in an IP communication network that is implemented by softswitch technology, in which a call between two end users is established by a core control device. If the media stream of the call between the two end users is encrypted, the call is called a secret message, otherwise it is called a clear message.
  • a terminal with an encryption function it can change a single communication method in the past, and establish a clear message with another terminal according to different occasions, or a secret message of a different secret level; In the case of the terminal, it is also possible to switch between the clear call, the secret message and the secret level in the current call or between the multiple calls according to different situations.
  • “clear level” 00183 refers to the way the call is taken, that is, whether the call is a plain or a secret message. If it is a secret, what is its secret level?
  • the secret level is set by a set of security parameters, and at least the encrypted communication mode used by the terminal device is set in the set of security parameters.
  • FIG. 1 is a flow diagram of a method of switching the level of privacy of a call during a call, in accordance with one embodiment of the present invention.
  • the IP communication network using the softswitch technology includes at least one core control device, two or more user terminal devices, and the terminal device has the capability of locally encrypting and decrypting the communication content.
  • the security parameters of the secret level set by the terminal user are registered in the core control device of the communication network.
  • the terminal user can set multiple levels of security, and each terminal user can add the security parameter of the secret level to the established message at any time when the user needs to register or add a new level of confidentiality.
  • This message is sent to the core control device for registration.
  • the given message can be either a registered message or another message.
  • the registration message is carried in the registration message, and may include a service encryption mode, a security parameter, and the like corresponding to the user-defined brightness level.
  • the format and message content are related to the specific softswitch control device and the protocol supported by the terminal device.
  • the registration process of the security parameter of the terminal user's level of confidentiality is described by taking the registration of the security parameter to the core control device as an example.
  • FIG. 2 is a flow diagram of a security parameter of a terminal user registering a secret level by a registration message in the method of FIG. 1 in accordance with an embodiment of the present invention.
  • the terminal user carries the security parameter of the secret level in the registration message, and registers the security parameter with the core control device while the terminal performs registration authentication.
  • the registration authentication process of the terminal is a two-way authentication and authentication process between the terminal and the core control device, that is, the softswitch needs to authenticate the terminal, and the terminal also authenticates and authenticates the softswitch.
  • the registration process of the security parameters of the level of confidentiality in Fig. 1 will now be described in detail with reference to Fig. 2.
  • the terminal user sets the level of confidentiality that the terminal user complies with in a subsequent call through a user interface such as an interface.
  • each level of confidentiality is determined by a set of security parameters.
  • Set When the user initiates a registration request to the core control device, the user The security parameters of the selected secret level are included in the established registration message to form a message packet.
  • the security parameters include information such as media encryption mode, authentication algorithm, and authentication parameters.
  • the format of the registration message is not specified, because the embodiment is merely an exemplary description, and the message format and message content of the predetermined message used by the terminal device to perform security parameter registration are specific to The requirements of the core control device are related to the protocol supported by the terminal device user.
  • the terminal user initiates a registration authentication request to the core control device, where the request includes a secret level and a user identifier. .
  • the core control device authenticates the end user.
  • the core control device obtains the user identifier from the registration message, thereby searching for the corresponding user subscription information, and authenticating the user terminal.
  • the core control device sends a response message to the terminal, where the response message includes the signature information of the core control device and the authentication result, such as the success or failure of the authentication and the reason for the failure.
  • the authentication message interaction is only schematically represented, and the actual authentication message interaction process needs to be determined according to the actual authentication algorithm.
  • step 203 the terminal user performs authentication processing on the core control device according to the response message sent back by the core control device in step 202, and transmits the authentication result and the security parameter of the secret level to the core control device.
  • the core control device stores the security parameters carried in the registration message and authenticates the legitimacy of the terminal user.
  • the core control device returns a registration success response message to the terminal device.
  • the terminal successfully registers with the core control device and registers its own security parameters.
  • the security parameters set by the user may also be sent to the core control device by other established messages, such as a call setup message or a user extension message.
  • Security parameters are added to the intended message in accordance with the established protocol and message format, and the intended message is sent to the core control device.
  • the core control device processes these messages and stores the security parameters therein.
  • the user can start to initiate services such as calls.
  • the confidentiality status and the secret level of a call are determined by the master, the called terminal user and the core control device. Since the security parameters set by the terminal user can be inconsistent with the security parameters registered on the core control device, Call during call The switching of the confidentiality level not only needs to consider the service information and the secret level attribute of the calling user, but also considers the service information and the secret level attribute of the called user and the security level of the confidentiality level registered on the core control device. Information such as parameters.
  • the terminal user specifies the secret level of the call, and establishes a call with a certain level of confidentiality between the end users who need to call.
  • the end user can specify the desired level of confidentiality when making a call request, and the security parameter of the secret level is automatically sent as a parameter of the call request message along with the call request.
  • security parameters it may include a secret mode to initiate a call, when the called terminal device does not support the secret call, whether to adopt a call failure mode, or a clear call mode.
  • the specific parameter form is related to the specific media gateway controller device and the call protocol of the terminal. When the user dials, a call request with security parameters is sent to the core control device.
  • step 115 if any one of the call terminal users needs to change the secret level of the call, the core control device switches the clearness level according to the security parameter of the new secret level.
  • FIG. 3 is a flow diagram of a process for a terminal user to switch the secret level of a call during a one-way call in the method of FIG. 1 in accordance with an embodiment of the present invention.
  • Figure 3 illustrates the process by which end users A and B switch from establishing a call to making a call.
  • the call parameters are set, including the security parameters of the current call, and then the called number is dialed to initiate a call.
  • the users A and B can not hang up. Freely change the level of confidentiality of the call.
  • step 301 the terminal A initiates a call request to the core control device, and the call message carries a call parameter including a security parameter, where the core control device establishes a clear call, and the core control device according to the parameter and The attribute parameter of the called user determines the encryption attribute of the call, that is, the secret level of the secret or secret message and the secret message.
  • step 302 after receiving the call request, the core control device analyzes the security parameters and other information of the called user, and after performing the confidentiality parameter negotiation, transmits the call request message of the terminal A to the called terminal.
  • step 303 under the control of the core control device, the terminals B and A perform the negotiation of the encryption level parameter, thereby determining whether to accept the call request and the confidentiality level of the call and the corresponding security parameter. If the calling and called terminal user fails to negotiate, the called terminal B sends back a call failure response message to the core control device. Otherwise, if the established call is a secret, the core control device assigns a key to the two terminals A and B, and the role of the key is to encrypt and decrypt the media stream. If the call to be established is clear, the core control device does not assign a key. This process is not necessarily independent and can be done simultaneously with call signaling.
  • step 304 when the encryption level parameters of the two terminals A and B are successfully negotiated, the calling party terminals A and B establish a call.
  • step 305 if the established call belongs to a secret message, the terminals A and B perform encryption and decryption processing on the media stream according to the negotiated secret level and the obtained key. If the established call is clear, the media stream is not encrypted or decrypted.
  • step 306 during the call, if the call environment or occasion changes or for other reasons, terminal A (which may also be terminal B) wishes to change the secret level of the call, including switching between clear and secret messages or changing the secret message.
  • the level can directly initiate a media switch request to the core control device, and the request message includes the desired new security level of the secret level.
  • step 307 the core control device forwards the media switch request message received from the terminal A to the terminal B.
  • step 308 the terminal B and the terminal A re-enforce the encryption level parameter negotiation under the control of the core control device, and after the negotiation succeeds, the core control device re-allocates the key for the secret message.
  • step 309 after the negotiation of the encryption level parameters of the two terminals A and B is successful, the switching of the secret level of the call is successful.
  • terminals A and B talk at a new level of privacy.
  • a clear call or an end call may be established between the terminals A and B. Can be selected by the end user.
  • multiple calls can exist simultaneously on one end user, but at the same time, only One call is in a call state, that is, only one media stream, for example, a clear call is established between terminal A and terminal B, and terminal A establishes a secret call with terminal C, so that call hold, call waiting, etc. are implemented.
  • a clear call is established between terminal A and terminal B, and terminal A establishes a secret call with terminal C, so that call hold, call waiting, etc. are implemented.
  • it involves the switching of clear media streams.
  • a process in which a terminal user A forms a plurality of calls with a clear level is described in conjunction with FIG. 4, that is, the terminal user A first establishes a call with a certain level of confidentiality (such as a clear voice) with the terminal user B during the call. In the end, the end user C establishes another (such as a secret) call with the terminal user A.
  • a certain level of confidentiality such as a clear voice
  • the end user C establishes another (such as a secret) call with the terminal user A.
  • step 401 the terminal A initiates a call request to the core control device, where the call request message carries basic call parameter information, and the called number is the terminal ⁇
  • step 402 the core control device passes the call request to the called terminal B, and the message body carries the basic call parameter information of the terminal A.
  • step 403 after the basic call parameters of the terminals A and B are successfully negotiated, a clear call is established.
  • step 404 the terminals A and B enter a call state, and the media stream is an unencrypted clear media stream.
  • step 405 during the conversation between the terminals A and B, the terminal C sends a secret call to the core control device, the called number is terminal A, and the call request message carries information such as the security parameter of the terminal C.
  • step 406 after the core control device processes the call request of the terminal C, the call request is forwarded to the terminal A.
  • step 407 the terminal C and the terminal A perform the negotiation of the encryption parameters. After the negotiation succeeds, the core control device allocates the key for the terminal C and the terminal A.
  • step 408 terminal A suspends terminal B and saves the data area information of terminal B to talk with terminal C.
  • step 409 the terminal A switches the media stream to the call channel with the terminal C, and establishes a call with the terminal C.
  • step 410 the terminal A and the terminal C make a call, and the media stream of the call is a media stream encrypted by the key allocated by the core control device.
  • terminal A there is a clear call with terminal B and a secret message with terminal C. Call.
  • the core control device When the terminal user A switches between the two calls, for example, when switching from a clear call with the terminal B to a secret call with the terminal C, the core control device first switches the terminal user (terminal A). Switching the request, controlling the switching terminal user (terminal A) to suspend the call before the handover (talking with the terminal B), and storing the information of the switched terminal user (terminal B) in the switching terminal user (terminal A), Then, the switching terminal user (terminal A) and the new calling terminal user (terminal C) are used to encrypt and decrypt the media stream using the key of the switched call.
  • the core control device controls the terminal user A to suspend the secret call with the terminal C, and saves the information of the terminal user C, and then controls the terminal user A and the terminal.
  • User B makes a clear call (no key is required to encrypt and decrypt the media stream).
  • the security parameter of the terminal user's level of confidentiality may be transmitted by the terminal to the core control device through a message, or may be set in advance in the core control device;
  • the security parameters required for the second call may be transmitted in the message of the call setup, or may be separately transmitted through other messages;
  • the call parameters of the call initiated by the terminal refer to user setting parameters related to the call, including security parameters, media types, etc.
  • the call message is sent to the called user as a parameter.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A method for switching the level of the plaintext and cyphertext during the conversation includes: registering the security parameter the terminal user preset in the core control device of the communication network, establishing a conversation which has some level of the plaintext and cyphertext between the terminal users that need to make a conversation; if anyone of the terminal users needs to change the level of the plaintext and cyphertext in this conversation, the core control device switches the level of the plaintext and cyphertext according to the security parameter of the new level of the plaintext and cyphertext The invention allows users to set the level of the plaintext and cyphertext in conversation and adjust the level of the plaintext and cyphertext in conversation according to the requirement.

Description

在通话过程中切换通话的明密级别的方法 技术领域  Method for switching the secret level of a call during a call
本发明涉及通信领域,尤其涉及在基于 IP的通信网络中,对通话的明 密级别进行切换的方法。 背景技术  The present invention relates to the field of communications, and more particularly to a method for switching the level of confidentiality of a call in an IP-based communication network. Background technique
VOIP技术是当今通信领域中非常重要的一项技术。 随着互联网和宽 带技术的发展,基于 IP网络的媒体传输技术在企业网和公共网络中得到了 越来越多的应用。 但由于 IP网络的开放性, VOIP技术存在一些安全性问 题, 如语音数据 IP包被嗅探监听; 用户账号和设备欺骗等等。 所以未经加 密的媒体流在 IP上传输时的保密性比较差,不能满足诸如军队、政府部门 等对保密性要求比较高的用户的需求。 在这种情况下, 对信令、 语音进行 加密的加密通信就显得尤为重要, 可以防止非法用户对合法用户的信息窃 取。  VOIP technology is a very important technology in today's communications field. With the development of the Internet and broadband technology, media transmission technologies based on IP networks have been increasingly used in enterprise networks and public networks. However, due to the openness of IP networks, VOIP technology has some security issues, such as voice data IP packets being sniffed and monitored; user accounts and device spoofing. Therefore, the confidentiality of the unencrypted media stream when transmitted over IP is relatively poor, and it cannot meet the needs of users such as the military and government departments who have higher confidentiality requirements. In this case, encrypted communication that encrypts signaling and voice is particularly important to prevent unauthorized users from stealing information from legitimate users.
加密通信是 VOIP技术中比较特殊的功能。在目前的通信安全体系中, 通用的方法是用户终端与系统设备按照既定的鉴权算法、 鉴权参数和业务 加密方式进行加密、 鉴权; 终端的加密功能包括对用户账号、 密码进行加 密, 对服务器进行鉴权认证, 以及对媒体流进行加解密。 这些鉴权算法、 鉴权参数和业务加密方式一旦设置后, 用户就不能自行改变通信方式; 如 果用户需要改变通信的安全方式, 则必须通过网络系统设备的网管操作, 重新约定用户终端与系统设备的相应参数。 发明内容  Encrypted communication is a special feature in VOIP technology. In the current communication security system, the general method is that the user terminal and the system device perform encryption and authentication according to the established authentication algorithm, authentication parameter and service encryption mode; the encryption function of the terminal includes encrypting the user account and the password. The server is authenticated and the media stream is encrypted and decrypted. Once these authentication algorithms, authentication parameters, and service encryption methods are set, the user cannot change the communication mode by themselves. If the user needs to change the security mode of the communication, the user terminal and the system device must be re-agreed through the network management operation of the network system device. The corresponding parameters. Summary of the invention
本发明正是鉴于现有技术中的上述技术问题而提出的, 其目的在于提 供一种在通话过程中切换通话的明密级别的方法, 以允许用户能够根据不 同场合清求不同明密级别的呼叫, 并在不中断通话的情况下进行不同明密 级别的切换, 从而使用户根据需要灵活采取各种加密方式进行通信。 The present invention has been made in view of the above technical problems in the prior art, and an object thereof is to provide a method for switching the confidentiality level of a call during a call, so as to allow the user to clear different secret levels according to different occasions. Call, and make different secrets without interrupting the call Level switching, so that users can flexibly adopt various encryption methods to communicate according to their needs.
为实现以上目的, 本发明所采取的技术方案为:  In order to achieve the above object, the technical solution adopted by the present invention is:
一种在通话过程中切换通话的明密级别的方法, 包括: 在通信网络的 核心控制设备中登记终端用户设定的明密级别的安全参数; 在需要通话的 终端用户之间建立具有某一明密级别的通话; 如果所述通话终端用户中的 任意一个需要改变此次通话的明密级别, 则所述核心控制设备按照新的明 密级别的安全参数对明密级别进行切换。  A method for switching the confidentiality level of a call during a call, comprising: registering, at a core control device of the communication network, a security parameter set by the terminal user; and establishing a certain relationship between the terminal users requiring the call A call of a secret level; if any one of the call terminal users needs to change the secret level of the call, the core control device switches the display level according to the security parameter of the new secret level.
优选地, 所述方法还包括: 在第三方终端用户与正在通话的终端用户 中的任意一个之间建立具有某一明密级别的通话。  Preferably, the method further comprises: establishing a call with a certain level of confidentiality between the third party terminal user and any one of the end users who are talking.
优选地, 所述方法还包括: 如果某一终端用户存在多路具有明密级别 的通话, 则切换终端用户在所述多路通话之间进行切换时, 所述核心控制 设备根据切换后的通话的明密级别, 控制本次通话。  Preferably, the method further includes: if a terminal user has multiple calls with a clear level, when the switching terminal user switches between the multiple calls, the core control device is configured according to the switched call. The level of confidentiality controls the call.
优选地, 所述核心控制设备登记终端用户设定的明密级别的安全参数 的步骤进一步包括: 所述终端用户设置通话的明密级别及其安全参数; 将 所述安全参数发送到所述核心控制设备; 所述核心控制设备存储所述安全 参数。  Preferably, the step of the core control device registering the security parameter of the secret level set by the terminal user further comprises: the terminal user setting a secret level of the call and a security parameter thereof; and sending the security parameter to the core Control device; the core control device stores the security parameter.
优选地,所述安全参数通过注册消息发送到所述核心控制设备; 其中, 所述将所述安全参数发送到所述核心控制设备的步骤进一步包括: 所述终 端用户向所述核心控制设备发起注册请求; 所述核心控制设备对所述终端 用户进行鉴权并返回鉴权结果; 如果鉴权成功, 则所述终端用户对所述核 心控制设备进行鉴权; 如果鉴权成功, 则所述终端用户将鉴权结果及所述 明密级别的安全参数发送给所迷核心控制设备; 所述核心控制设备存储所 述安全参数。  Preferably, the security parameter is sent to the core control device by using a registration message; wherein the step of sending the security parameter to the core control device further comprises: the terminal user initiating to the core control device a registration request; the core control device authenticates the terminal user and returns an authentication result; if the authentication is successful, the terminal user authenticates the core control device; if the authentication is successful, the The terminal user sends the authentication result and the security parameter of the secret level to the core control device; the core control device stores the security parameter.
优选地, 所述安全参数通过其它既定消息(如呼叫建立消息或用户扩 展消息等)发送到所述核心控制设备; 其中, 所述将安全参数发送到所述 核心控制设备的步骤进一步包括: 所述安全参数按照既定的协议和消息格 式添加到既定消息中; 将所述既定消息发送到所述核心控制设备; 所述核 心控制设备对所述消息进行处理。 优选地, 所述在需要通话的终端用户之间建立具有某一明密级别的通 话的步驟进一步包括: 所述终端用户向所述核心控制设备发起呼叫请求; 所述核心控制设备根据主叫终端用户在呼叫请求消息中设置的明密级别的 安全参数和被叫终端用户在所述核心控制设备中登记的明密级别的安全参 数, 在所述主被叫终端用户之间建立具有相应明密级别的通话。 Preferably, the security parameter is sent to the core control device by using another predetermined message (such as a call setup message or a user extension message, etc.), wherein the step of sending the security parameter to the core control device further includes: The security parameters are added to the predetermined message according to a predetermined protocol and message format; the predetermined message is sent to the core control device; and the core control device processes the message. Preferably, the step of establishing a call with a certain level of confidentiality between the terminal users requiring a call further comprises: the terminal user initiating a call request to the core control device; the core control device according to the calling terminal The security parameter set by the user in the call request message and the security parameter of the secret level registered by the called terminal user in the core control device are established with corresponding secrets between the calling and called terminal users. Level of call.
优选地, 所述核心控制设备在所述主被叫终端用户之间建立具有相应 明密级别的通话的步骤进一步包括: 所述核心控制设备根据所述主被叫终 端用户的安全参数进行密级参数协商; 所述核心控制设备控制所述主被叫 终端用户之间进行加密参数协商; 如果协商成功, 则当此次通话属于密话 时 , 所迷核心控制设备为所述主被叫终端用户分配对媒体流进行加解密的 密钥; 所述核心控制设备在所述主被叫终端用户之间建立通话; 当此次通 话属于明话时, 所述核心控制设备直接在所述主被叫终端用户之间建立通 话; 如果协商不成功, 则呼叫失败。  Preferably, the step of the core control device establishing a call with a corresponding secret level between the calling and called terminal users further comprises: the core control device performing a confidential parameter according to the security parameter of the primary called terminal user Negotiating; the core control device controls the encryption of the encryption parameter between the calling and the called terminal users; if the negotiation is successful, when the call belongs to the secret message, the core control device allocates the called terminal user a key for encrypting and decrypting a media stream; the core control device establishes a call between the calling and called terminal users; when the call belongs to a clear call, the core control device directly at the calling and called terminal A call is established between users; if the negotiation is unsuccessful, the call fails.
优选地, 所述核心控制设备按照新的明密级别的安全参数对明密级别 进行切换的步骤进一步包括: 所述通话终端用户中的任意一个向所述核心 控制设备发起用于改变通话的密级参数的媒体切换请求, 所述媒体切换请 求中带有新的明密级别的安全参数; 所述核心控制设备将所述媒体切换请 求转发给另一通话终端用户; 所述核心控制设备的控制所述通话终端用户 重新进行加密参数的协商; 如果协商成功, 则当通话属于密话时, 所述核 心控制设备向所述通话终端用户重新分配密钥 , 所述通话终端用户利用新 的密钥进行通话; 当通话属于明话时, 所述通话终端用户直接进行通话。  Preferably, the step of the core control device switching the clearness level according to the security parameter of the new security level further comprises: any one of the call terminal users initiating a secret level for changing the call to the core control device a media switching request of the parameter, the media switching request carries a new security parameter of a secret level; the core control device forwards the media switching request to another call terminal user; and the control device of the core control device The call terminal user re-negotiates the encryption parameter; if the negotiation is successful, when the call belongs to the secret message, the core control device re-distributes the key to the call terminal user, and the call terminal user performs the new key Call; When the call belongs to a clear call, the call terminal user directly makes a call.
优选地, 当所述终端用户在所述多路通话之间进行切换时, 所述核心 控制设备根据切换后的通话的明密级别控制本次通话的步骤进一步包括: 所述核心控制设备控制切换终端用户挂起切换前的通话, 并将被切换终端 用户的信息保存在切换终端用户内; 控制切换终端用户和新的通话终端用 户采用切换后的通话的密钥进行媒体流的加解密。  Preferably, when the terminal user performs the handover between the multiple calls, the step of the core control device controlling the current call according to the brightness level of the switched call further includes: the core control device controls the handover The terminal user suspends the call before the handover, and saves the information of the switched terminal user in the handover terminal user. The control handover terminal user and the new call terminal user use the key of the switched call to encrypt and decrypt the media stream.
采用本发明,用户可以根据需要灵活采取各种加密方式(包括不加密) 进行通信, 具体来说, 本发明有如下的优点: 1.终端设备可以向核心控制设备登记一组以上的设定不同明密级别的 安全参数; By adopting the invention, the user can flexibly adopt various encryption methods (including no encryption) to perform communication according to requirements, and specifically, the invention has the following advantages: 1. The terminal device can register a set of security parameters that set different brightness levels to the core control device;
2.终端用户可以在发起呼叫时根据需要自行设置终端设备的明密状 态, 包括明话、 密话以及加密的密级等参数设置;  2. The terminal user can set the terminal state of the terminal device according to the needs, including the clear words, the secret message, and the encryption level.
3.在通话过程中, 用户可以根据需要调整自己的加密方式, 即进行不 同明密级别通话状态的切换, 其中的终端加密方式是用户根据当时的需要 来任意选取的。 附图说明  3. During the call, the user can adjust his or her own encryption mode according to the needs, that is, switch between different clear-level call states. The terminal encryption mode is arbitrarily selected by the user according to the needs at that time. DRAWINGS
图 1是根据本发明一个实施例的在通话过程中切换通话的明密级别的 方法的流程图;  1 is a flow chart of a method of switching a clear level of a call during a call, in accordance with one embodiment of the present invention;
图 2是根据本发明一个实施例的图 1方法中终端用户通过注册消息登 记明密级别的安全参数的流程图;  2 is a flow chart of a security parameter of a terminal user registering a secret level by a registration message in the method of FIG. 1 according to an embodiment of the present invention;
图 3是根据本发明一个实施例的图 1方法中终端用户在单路通话中切 换通话的明密级别的过程的流程图;  3 is a flow chart showing a process of switching the confidentiality level of a call by a terminal user in a single call in the method of FIG. 1 according to an embodiment of the present invention;
图 4是根据本发明一个实施例的图 1方法中终端用户形成多路具有明 密级别的通话的流程图。 具体实施方式  4 is a flow diagram of a terminal user forming a plurality of calls having a clear level in the method of FIG. 1 in accordance with an embodiment of the present invention. detailed description
相信通过下面结合附图对本发明的优选实施例的详细说明, 可以更清 楚地了解本发明的上述和其它目的、 特征和优点。  The above and other objects, features and advantages of the present invention will become apparent from the <RTIgt
本发明是在以软交换技术为 ^出的 IP通信网络中提出的,其中, 两个 终端用户之间的通话是通过核心控制设备建立的。 如果两个终端用户之间 通话的媒体流是经过加密的, 则称本次通话为密话, 否则称为明话。 在本 发明中,对于带有加密功能的终端来说,它可以改变过去单一的通信方式, 而根据不同场合与另一个终端建立明话, 或是不同密级的密话; 而对于已 建立了通话的终端来说, 又可以根据不同情况, 在当前的通话中或在多路 通话之间进行明话、 密话以及密级之间的切换。 在本发明中, "明密级别" 00183 是指通话所采取的方式, 即通话是明话还是密话, 如果是密话, 其密级是 什么。 明密级别是由一组安全参数来设定的, 该组安全参数中至少设定了 终端设备所使用的加密通信方式。 The present invention has been proposed in an IP communication network that is implemented by softswitch technology, in which a call between two end users is established by a core control device. If the media stream of the call between the two end users is encrypted, the call is called a secret message, otherwise it is called a clear message. In the present invention, for a terminal with an encryption function, it can change a single communication method in the past, and establish a clear message with another terminal according to different occasions, or a secret message of a different secret level; In the case of the terminal, it is also possible to switch between the clear call, the secret message and the secret level in the current call or between the multiple calls according to different situations. In the present invention, "clear level" 00183 refers to the way the call is taken, that is, whether the call is a plain or a secret message. If it is a secret, what is its secret level? The secret level is set by a set of security parameters, and at least the encrypted communication mode used by the terminal device is set in the set of security parameters.
图 1是根据本发明一个实施例的在通话过程中切换通话的明密级别的 方法的流程图。  1 is a flow diagram of a method of switching the level of privacy of a call during a call, in accordance with one embodiment of the present invention.
在本实施例中,以软交换技术为^出的 IP通信网络包括至少一个核心 控制设备, 两个以上的用户终端设备, 并且终端设备具备本地加密和解密 通信内容的能力。 如图 1所示, 在步骤 105, 在通信网络的核心控制设备 中登记终端用户设定的明密级别的安全参数。  In the present embodiment, the IP communication network using the softswitch technology includes at least one core control device, two or more user terminal devices, and the terminal device has the capability of locally encrypting and decrypting the communication content. As shown in FIG. 1, in step 105, the security parameters of the secret level set by the terminal user are registered in the core control device of the communication network.
本实施例中, 终端用户可设定多个明密级别, 各终端用户在需要登记 或添加新的明密级别时, 可以随时将该明密级别的安全参数添加到既定的 消息中, 并将该消息发送给核心控制设备进行登记。 既定的消息可以是注 册消息, 也可以是其它消息。  In this embodiment, the terminal user can set multiple levels of security, and each terminal user can add the security parameter of the secret level to the established message at any time when the user needs to register or add a new level of confidentiality. This message is sent to the core control device for registration. The given message can be either a registered message or another message.
一般情况下, 当终端用户向核心控制设备注册时, 在注册消息中都会 携带用户设定的注册参数, 可以包括与用户设定的明密级别对应的业务加 密方式、 安全参数等, 其具体消息格式和消息内容同具体的软交换控制设 备和终端设备支持的协议有关。 下面本实施例以安全参数通过注册消息向 核心控制设备登记为例来说明终端用户的明密级别的安全参数的登记过 程。  Generally, when the terminal user registers with the core control device, the registration message is carried in the registration message, and may include a service encryption mode, a security parameter, and the like corresponding to the user-defined brightness level. The format and message content are related to the specific softswitch control device and the protocol supported by the terminal device. In the following embodiment, the registration process of the security parameter of the terminal user's level of confidentiality is described by taking the registration of the security parameter to the core control device as an example.
图 2是根据本发明一个实施例的图 1方法中终端用户通过注册消息登 记明密级别的安全参数的流程图。 其中, 终端用户在注册消息中携带明密 级别的安全参数, 在终端进行注册鉴权的同时, 向核心控制设备登记安全 参数。 终端的注册鉴权过程是终端与核心控制设备之间的双向鉴权认证过 程, 即软交换要对终端进行鉴权, 同时终端也要对软交换进行认证鉴权。 现在参照图 2详细说明图 1中的明密级别的安全参数的登记过程。  2 is a flow diagram of a security parameter of a terminal user registering a secret level by a registration message in the method of FIG. 1 in accordance with an embodiment of the present invention. The terminal user carries the security parameter of the secret level in the registration message, and registers the security parameter with the core control device while the terminal performs registration authentication. The registration authentication process of the terminal is a two-way authentication and authentication process between the terminal and the core control device, that is, the softswitch needs to authenticate the terminal, and the terminal also authenticates and authenticates the softswitch. The registration process of the security parameters of the level of confidentiality in Fig. 1 will now be described in detail with reference to Fig. 2.
如图 2所示, 首先, 终端用户在终端设备上通过诸如界面等用户接口 设置其在以后的通话中所遵从的明密级别, 实际上, 每一个明密级别都是 由一组安全参数来设定的。 在用户向核心控制设备发起注册请求时, 用户 选定的明密级别的安全参数便被包括在既定的注册消息中组建成消息包。 其中, 这些安全参数包括媒体加密方式、 鉴权算法和鉴权参数等信息。 需 要说明的是, 本实施例中未对注册消息的格式进行规定, 因为本实施例只 是示例性的说明, 而且终端设备进行安全参数登记所使用的既定消息的消 息格式和消息内容是与具体的核心控制设备的要求和终端设备用户支持的 协议有关的。 在步骤 201 , 终端用户向核心控制设备发起注册鉴权请求, 在该请求中包含了明密级别和用户标识。 。 As shown in FIG. 2, first, the terminal user sets the level of confidentiality that the terminal user complies with in a subsequent call through a user interface such as an interface. In fact, each level of confidentiality is determined by a set of security parameters. Set. When the user initiates a registration request to the core control device, the user The security parameters of the selected secret level are included in the established registration message to form a message packet. The security parameters include information such as media encryption mode, authentication algorithm, and authentication parameters. It should be noted that, in this embodiment, the format of the registration message is not specified, because the embodiment is merely an exemplary description, and the message format and message content of the predetermined message used by the terminal device to perform security parameter registration are specific to The requirements of the core control device are related to the protocol supported by the terminal device user. In step 201, the terminal user initiates a registration authentication request to the core control device, where the request includes a secret level and a user identifier. .
在步驟 202, 核心控制设备对终端用户进行鉴权。 在这一步驟中, 核 心控制设备从注册消息中获取用户标识, 从而查找对应的用户签约信息, 并对该用户终端进行鉴权。 在鉴权之后, 核心控制设备向终端回送响应消 息, 该响应消息中包含核心控制设备的签名信息和鉴权结果, 如鉴权成功 或失败以及失败的原因等。 需要说明的是, 在图 2中对鉴权消息交互仅进 行了示意性表示, 真正的鉴权消息交互流程需要视实际鉴权算法而定。  At step 202, the core control device authenticates the end user. In this step, the core control device obtains the user identifier from the registration message, thereby searching for the corresponding user subscription information, and authenticating the user terminal. After the authentication, the core control device sends a response message to the terminal, where the response message includes the signature information of the core control device and the authentication result, such as the success or failure of the authentication and the reason for the failure. It should be noted that, in FIG. 2, the authentication message interaction is only schematically represented, and the actual authentication message interaction process needs to be determined according to the actual authentication algorithm.
在步骤 203, 终端用户根据核心控制设备在步骤 202回送的响应消息, 对核心控制设备进行鉴权处理, 并将鉴权结果和明密级别的安全参数传递 给核心控制设备。 当双方的鉴权成功时, 核心控制设备存储注册消息中携 带的安全参数, 并对终端用户的合法性进行认证。  In step 203, the terminal user performs authentication processing on the core control device according to the response message sent back by the core control device in step 202, and transmits the authentication result and the security parameter of the secret level to the core control device. When the authentication of both parties is successful, the core control device stores the security parameters carried in the registration message and authenticates the legitimacy of the terminal user.
在步骤 204, 核心控制设备向终端设备回送注册登记成功响应消息。 这样终端就成功地在核心控制设备进行了注册, 并登记了自己的明密级别 的安全参数。  At step 204, the core control device returns a registration success response message to the terminal device. In this way, the terminal successfully registers with the core control device and registers its own security parameters.
此外, 用户设定的明密级别的安全参数还可通过其它既定消息, 如呼 叫建立消息或用户扩展消息等, 发送到所述核心控制设备。 安全参数按照 既定的协议和消息格式添加到既定消息中, 既定消息被发送到核心控制设 备中。 核心控制设备对这些消息进行处理, 并存储其中的安全参数。  In addition, the security parameters set by the user may also be sent to the core control device by other established messages, such as a call setup message or a user extension message. Security parameters are added to the intended message in accordance with the established protocol and message format, and the intended message is sent to the core control device. The core control device processes these messages and stores the security parameters therein.
终端设备在核心控制设备上登记了安全参数后, 用户就可以开始发起 呼叫等业务了。 一次呼叫的明密状态以及密级等是由主、 被叫终端用户和 核心控制设备共同协商决定的, 由于终端用户呼叫时设置的安全参数可以 与其在核心控制设备上登记的安全参数不一致, 所以在通话过程中对通话 的明密级别的切换不仅需要考虑主叫用户的业务信息和明密级别属性, 还 要考虑到被叫用户的业务信息和明密级别属性以及它们在核心控制设备上 登记的明密级别的安全参数等信息。 After the terminal device registers the security parameters on the core control device, the user can start to initiate services such as calls. The confidentiality status and the secret level of a call are determined by the master, the called terminal user and the core control device. Since the security parameters set by the terminal user can be inconsistent with the security parameters registered on the core control device, Call during call The switching of the confidentiality level not only needs to consider the service information and the secret level attribute of the calling user, but also considers the service information and the secret level attribute of the called user and the security level of the confidentiality level registered on the core control device. Information such as parameters.
回到图 1, 在步驟 110, 终端用户指定通话的明密级别, 在需要通话的 终端用户之间建立具有某一明密级别的通话。 在本步驟中, 终端用户在发 起呼叫请求时可以指定所期望的明密级別, 而该明密级别的安全参数便自 动作为呼叫请求消息的参数随呼叫请求一起发送。 在这些安全参数中, 可 以包括采用何种密级方式发起呼叫、当被叫终端设备不支持该密级呼叫时, 是采取呼叫失败方式, 还是采用明话呼叫方式等等。 具体的参数形式与具 体的媒体网关控制器设备和终端的呼叫协议有关。 用户拨号时, 带有安全 参数的呼叫请求被发送到核心控制设备。  Returning to Figure 1, in step 110, the terminal user specifies the secret level of the call, and establishes a call with a certain level of confidentiality between the end users who need to call. In this step, the end user can specify the desired level of confidentiality when making a call request, and the security parameter of the secret level is automatically sent as a parameter of the call request message along with the call request. Among these security parameters, it may include a secret mode to initiate a call, when the called terminal device does not support the secret call, whether to adopt a call failure mode, or a clear call mode. The specific parameter form is related to the specific media gateway controller device and the call protocol of the terminal. When the user dials, a call request with security parameters is sent to the core control device.
在步驟 115, 如果所述通话终端用户中的任意一个需要改变此次通话 的明密级别, 则所述核心控制设备按照新的明密级别的安全参数对明密级 別进行切换。  In step 115, if any one of the call terminal users needs to change the secret level of the call, the core control device switches the clearness level according to the security parameter of the new secret level.
下面将步骤 110和步骤 115结合起来进行描述。 图 3是根据本发明一 个实施例的图 1方法中终端用户在单路通话中切换通话的明密级别的过程 的流程图。图 3示出了终端用户 A和 B从建立呼叫到进行通话的明密级别 的切换的过程。  Steps 110 and 115 are combined below for description. 3 is a flow diagram of a process for a terminal user to switch the secret level of a call during a one-way call in the method of FIG. 1 in accordance with an embodiment of the present invention. Figure 3 illustrates the process by which end users A and B switch from establishing a call to making a call.
首先, 用户终端 A在向用户终端 B发起呼叫前, 设置呼叫参数, 包括 本次呼叫的安全参数等, 然后拨打被叫号码发起呼叫, 在通话过程中用户 A和 B可以在不挂机的情况下自由改变通话的明密级别。  First, before the user terminal A initiates a call to the user terminal B, the call parameters are set, including the security parameters of the current call, and then the called number is dialed to initiate a call. During the call, the users A and B can not hang up. Freely change the level of confidentiality of the call.
在步驟 301, 终端 A向核心控制设备发起呼叫请求, 在呼叫消息中带 有包括安全参数在内的呼叫参数, 这些参数是核心控制设备建立明密呼叫 的依据, 核心控制设备会根据这些参数和被叫用户的属性参数来决定本次 呼叫的加密属性, 即建立明话还是密话以及密话的密级等。  In step 301, the terminal A initiates a call request to the core control device, and the call message carries a call parameter including a security parameter, where the core control device establishes a clear call, and the core control device according to the parameter and The attribute parameter of the called user determines the encryption attribute of the call, that is, the secret level of the secret or secret message and the secret message.
在步骤 302, 核心控制设备收到呼叫请求后, 分析被叫用户的安全参 数等信息, 进行密级参数协商后, 将终端 A的呼叫请求消息传递给被叫终 在步骤 303, 在核心控制设备的控制下, 终端 B和 A进行加密等级参 数的协商, 以此确定是否接受此次呼叫请求以及通话的明密级别和对应的 安全参数。 如果主被叫终端用户协商失败, 则被叫终端 B向核心控制设备 回送呼叫失败响应消息。 否则, 如果将建立的通话属于密话, 则核心控制 设备为两个终端 A和 B分配密钥,密钥的作用是对媒体流进行加密和解密。 如果将建立的通话属于明话, 则核心控制设备不分配密钥。 这个过程并不 一定是独立的, 可以与呼叫信令同时进行。 In step 302, after receiving the call request, the core control device analyzes the security parameters and other information of the called user, and after performing the confidentiality parameter negotiation, transmits the call request message of the terminal A to the called terminal. In step 303, under the control of the core control device, the terminals B and A perform the negotiation of the encryption level parameter, thereby determining whether to accept the call request and the confidentiality level of the call and the corresponding security parameter. If the calling and called terminal user fails to negotiate, the called terminal B sends back a call failure response message to the core control device. Otherwise, if the established call is a secret, the core control device assigns a key to the two terminals A and B, and the role of the key is to encrypt and decrypt the media stream. If the call to be established is clear, the core control device does not assign a key. This process is not necessarily independent and can be done simultaneously with call signaling.
在步糠 304, 当两个终端 A和 B的加密等级参数协商成功后, 主被叫 终端用户 A和 B建立通话。  In step 304, when the encryption level parameters of the two terminals A and B are successfully negotiated, the calling party terminals A and B establish a call.
在步驟 305, 如果所建立的通话属于密话, 则终端 A和 B按协商的密 级和得到的密钥对媒体流进行加解密处理。 如果所建立的通话属于明话, 则不对媒体流进行加解密。  In step 305, if the established call belongs to a secret message, the terminals A and B perform encryption and decryption processing on the media stream according to the negotiated secret level and the obtained key. If the established call is clear, the media stream is not encrypted or decrypted.
在步骤 306, 在通话过程中, 如果因通话环境或场合改变或由于其他 原因, 终端 A (也可以是终端 B )希望改变通话的明密级别, 包括明话与 密话的切换或改变密话的等级, 则可以直接向核心控制设备发起媒体切换 请求, 在该请求消息中包含希望的新的明密级别的安全参数。  In step 306, during the call, if the call environment or occasion changes or for other reasons, terminal A (which may also be terminal B) wishes to change the secret level of the call, including switching between clear and secret messages or changing the secret message. The level can directly initiate a media switch request to the core control device, and the request message includes the desired new security level of the secret level.
在步骤 307, 核心控制设备将从终端 A接收的媒体切换请求消息转发 给终端 B。  In step 307, the core control device forwards the media switch request message received from the terminal A to the terminal B.
在步骤 308, 终端 B和终端 A在核心控制设备控制下重新进行加密等 级参数的协商, 并在协商成功后, 对于密话, 由核心控制设备重新分配密 钥。  In step 308, the terminal B and the terminal A re-enforce the encryption level parameter negotiation under the control of the core control device, and after the negotiation succeeds, the core control device re-allocates the key for the secret message.
在步驟 309, 当两个终端 A和 B的加密等级参数协商成功后, 通话的 明密级别的切换成功。  In step 309, after the negotiation of the encryption level parameters of the two terminals A and B is successful, the switching of the secret level of the call is successful.
在步骤 310, 终端 A和 B以新的明密级别进行通话。  At step 310, terminals A and B talk at a new level of privacy.
在上述通话的建立过程中, 如果加密等级参数协商过程的结果是终端 A和 B的加密方式、明密级别不兼容,则可以采用在终端 A和 B之间建立 明话通话或结束呼叫, 这可以由终端用户来选择。  In the process of establishing the above-mentioned call, if the result of the encryption level parameter negotiation process is that the encryption mode and the secret level of the terminals A and B are incompatible, a clear call or an end call may be established between the terminals A and B. Can be selected by the end user.
此外, 在一个终端用户上可以同时存在多路通话, 但同一时刻, 只有 一路呼叫处于通话状态, 也就说只有一路媒体流, 例如终端 A与终端 B之 间建立了明话通话, 同时终端 A又与终端 C建立了密话通话, 那么在实现 呼叫保持、 呼叫等待等业务时, 就涉及到了明密媒体流的切换问题。 In addition, multiple calls can exist simultaneously on one end user, but at the same time, only One call is in a call state, that is, only one media stream, for example, a clear call is established between terminal A and terminal B, and terminal A establishes a secret call with terminal C, so that call hold, call waiting, etc. are implemented. In business, it involves the switching of clear media streams.
下面先结合图 4说明一个终端用户 A形成多路具有明密级别的通话的 过程, 即终端用户 A先与终端用户 B建立具有某一明密级别(如明话)的 通话, 在该通话过程中, 终端用户 C又与终端用户 A建立具有另一明密级 别的 (如密话)通话。  In the following, a process in which a terminal user A forms a plurality of calls with a clear level is described in conjunction with FIG. 4, that is, the terminal user A first establishes a call with a certain level of confidentiality (such as a clear voice) with the terminal user B during the call. In the end, the end user C establishes another (such as a secret) call with the terminal user A.
在步骤 401, 终端 A向核心控制设备发起呼叫请求, 在呼叫请求消息 中携带有基本呼叫参数信息, 被叫号码为终端^  In step 401, the terminal A initiates a call request to the core control device, where the call request message carries basic call parameter information, and the called number is the terminal ^
在步骤 402, 核心控制设备把呼叫请求传递给被叫终端 B, 消息体中 带有终端 A的基本呼叫参数信息。  In step 402, the core control device passes the call request to the called terminal B, and the message body carries the basic call parameter information of the terminal A.
在步骤 403, 终端 A、 B的基本呼叫参数协商成功后, 建立明话通话。 在步骤 404, 终端 A、 B进入通话状态, 媒体流为未经加密的明话媒 体流。  In step 403, after the basic call parameters of the terminals A and B are successfully negotiated, a clear call is established. In step 404, the terminals A and B enter a call state, and the media stream is an unencrypted clear media stream.
在步骤 405, 在终端 A、 B的通话过程中, 终端 C向核心控制设备发 起密话呼叫, 被叫号码为终端 A, 呼叫请求消息中带有终端 C的安全参数 等信息。  In step 405, during the conversation between the terminals A and B, the terminal C sends a secret call to the core control device, the called number is terminal A, and the call request message carries information such as the security parameter of the terminal C.
在步骤 406, 核心控制设备将终端 C的呼叫请求进行相应处理后, 将 该呼叫请求转发给终端 A。  In step 406, after the core control device processes the call request of the terminal C, the call request is forwarded to the terminal A.
在步骤 407, 终端 C和终端 A进行加密参数的协商, 协商成功后, 由 核心控制设备为终端 C和终端 A分配密钥。  In step 407, the terminal C and the terminal A perform the negotiation of the encryption parameters. After the negotiation succeeds, the core control device allocates the key for the terminal C and the terminal A.
在步骤 408, 终端 A将终端 B挂起, 并保存终端 B的数据区信息, 以 便与终端 C通话。  In step 408, terminal A suspends terminal B and saves the data area information of terminal B to talk with terminal C.
在步驟 409, 终端 A将媒体流切换到与终端 C的通话通道上, 与终端 C建立通话。  In step 409, the terminal A switches the media stream to the call channel with the terminal C, and establishes a call with the terminal C.
在步骤 410, 终端 A和终端 C进行通话, 通话的媒体流为经核心控制 设备所分配的密钥加密后的媒体流。  In step 410, the terminal A and the terminal C make a call, and the media stream of the call is a media stream encrypted by the key allocated by the core control device.
这样,对于终端 A, 就存在与终端 B的明话通话以及与终端 C的密话 通话。 Thus, for terminal A, there is a clear call with terminal B and a secret message with terminal C. Call.
当终端用户 A在这两路通话之间进行切换时,如从与终端 B的明话通 话切换到与终端 C的密话通话时, 核心控制设备先才艮据切换终端用户 (终 端 A )的切换请求, 控制切换终端用户 (终端 A )挂起切换前的通话(与 终端 B的明话通话) , 并将被切换终端用户 (终端 B ) 的信息保存在切换 终端用户 (终端 A ) 内, 然后控制切换终端用户 (终端 A )和新的通话终 端用户 (终端 C )采用切换后的通话的密钥进行媒体流的加解密。  When the terminal user A switches between the two calls, for example, when switching from a clear call with the terminal B to a secret call with the terminal C, the core control device first switches the terminal user (terminal A). Switching the request, controlling the switching terminal user (terminal A) to suspend the call before the handover (talking with the terminal B), and storing the information of the switched terminal user (terminal B) in the switching terminal user (terminal A), Then, the switching terminal user (terminal A) and the new calling terminal user (terminal C) are used to encrypt and decrypt the media stream using the key of the switched call.
同样, 当终端用户 A请求切换到与终端 B的明话通话时,核心控制设 备控制终端用户 A挂起与终端 C的密话通话, 并保存终端用户 C的信息, 然后控制终端用户 A与终端用户 B进行明话通话(不需要密钥对媒体流进 行加解密 ) 。  Similarly, when the terminal user A requests to switch to the clear call with the terminal B, the core control device controls the terminal user A to suspend the secret call with the terminal C, and saves the information of the terminal user C, and then controls the terminal user A and the terminal. User B makes a clear call (no key is required to encrypt and decrypt the media stream).
以上对本发明的优选实施例进行了详细描述, 需要说明的是, 终端用 户的明密级别的安全参数可以由终端通过消息传递给核心控制设备, 也可 以在核心控制设备中事先设置; 终端用户此次通话所需的安全参数可以在 呼叫建立的消息中传递, 也可以通过其它消息单独传递; 终端发起呼叫的 呼叫参数是指与呼叫相关的用户设置参数, 包括安全参数、 媒体类型等, 其在呼叫消息中以参数的形式发送给被叫用户。  The preferred embodiment of the present invention has been described in detail above. It should be noted that the security parameter of the terminal user's level of confidentiality may be transmitted by the terminal to the core control device through a message, or may be set in advance in the core control device; The security parameters required for the second call may be transmitted in the message of the call setup, or may be separately transmitted through other messages; the call parameters of the call initiated by the terminal refer to user setting parameters related to the call, including security parameters, media types, etc. The call message is sent to the called user as a parameter.

Claims

权利要求 Rights request
1. 一种在通话过程中切换通话的明密级别的方法,其特征在于,包括: 在通信网络的核心控制设备中登记终端用户设定的明密级别的安全参 数; A method for switching the secret level of a call during a call, comprising: registering, at a core control device of the communication network, a security parameter of a secret level set by the terminal user;
在需要通话的终端用户之间建立具有某一明密级别的通话;  Establish a call with a certain level of confidentiality between end users who need to talk;
如果所述通话终端用户中的任意一个需要改变此次通话的明密级别, 则所述核心控制设备按照新的明密级别的安全参数对明密级别进行切换。  If any one of the call terminal users needs to change the secret level of the call, the core control device switches the display level according to the security parameter of the new secret level.
2. 如权利要求 1所述的方法, 其特征在于, 所述方法还包括: 在第三 方终端用户与正在通话的终端用户中的任意一个之间建立具有某一明密级 别的通话。  The method according to claim 1, wherein the method further comprises: establishing a call with a certain level of confidentiality between the third party terminal user and any one of the terminal users who are talking.
3. 如权利要求 2所述的方法, 其特征在于, 所述方法还包括: 如果某 一终端用户存在多路具有明密级别的通话, 则切换终端用户在所述多路通 话之间进行切换时, 所述核心控制设备根据切换后的通话的明密级别, 控 制本次通话。  The method according to claim 2, wherein the method further comprises: if a certain terminal user has multiple calls with a clear level, the switching terminal user switches between the multiple calls The core control device controls the current call according to the confidentiality level of the switched call.
4. 如权利要求 1至 3任一所述的方法, 其特征在于, 所述核心控制设 备登记终端用户设定的明密级别的安全参数的步骤进一步包括: 所述终端 用户设置通话的明密级别及其安全参数; 将所述安全参数发送到所述核心 控制设备; 所述核心控制设备存储所述安全参数。  The method according to any one of claims 1 to 3, wherein the step of the core control device registering the security parameter of the secret level set by the terminal user further comprises: setting the secret of the call by the terminal user a level and its security parameter; transmitting the security parameter to the core control device; the core control device storing the security parameter.
5. 如权利要求 4所述的方法, 其特征在于, 所述安全参数通过注册消 息发送到所述核心控制设备; 其中,  The method according to claim 4, wherein the security parameter is sent to the core control device by using a registration message;
所述将安全参数发送到所述核心控制设备的步驟进一步包括: 所述终 端用户向所述核心控制设备发起注册请求; 所述核心控制设备对所述终端 用户进行鉴权并返回鉴权结果; 如果鉴权成功, 则所述终端用户对所述核 心控制设备进行鉴权; 如果鉴权成功, 则所述终端用户将鉴权结果及所述 明密级别的安全参数发送给所述核心控制设备。  The step of transmitting the security parameter to the core control device further includes: the terminal user initiating a registration request to the core control device; the core control device authenticating the terminal user and returning an authentication result; If the authentication succeeds, the terminal user authenticates the core control device; if the authentication is successful, the terminal user sends the authentication result and the security parameter of the confidentiality level to the core control device. .
6. 如权利要求 4所述的方法, 其特征在于, 所述安全参数通过其它既 定消息发送到所述核心控制设备; 其中, 所述将安全参数发送到所述核心控制设备的步骤进一步包括: 所述安 全参数按照既定的协议和消息格式添加到既定消息中; 将所述既定消息发 送到所述核心控制设备; 所述核心控制设备对所述消息进行处理, 并存储 所述安全参数。 The method of claim 4, wherein the security parameter is sent to the core control device by using another predetermined message; The step of transmitting the security parameter to the core control device further includes: adding the security parameter to a predetermined message according to a predetermined protocol and a message format; transmitting the predetermined message to the core control device; The control device processes the message and stores the security parameter.
7. 如权利要求 1至 3任一所述的方法, 其特征在于, 所述在需要通话 的终端用户之间建立具有某一明密级别的通话的步骤进一步包括: 所述终 端用户向所述核心控制设备发起呼叫请求; 所述核心控制设备根据主叫终 端用户在呼叫请求消息中设置的明密级别的安全参数和被叫终端用户在所 述核心控制设备中登记的明密级别的安全参数, 在所述主被叫终端用户之 间建立具有相应明密级别的通话。  The method according to any one of claims 1 to 3, wherein the step of establishing a call with a certain level of confidentiality between end users requiring a call further comprises: said end user to said The core control device initiates a call request; the core control device according to the security parameter set by the calling terminal user in the call request message and the security parameter of the sealed terminal user registered in the core control device Establishing a call with a corresponding secret level between the calling and called end users.
8. 如权利要求 7所述的 ^法, 其特征在于, 所述核心控制设备在所述 主被叫终端用户之间建立具有相应明密级别的通话的步骤进一步包括: 所述核心控制设备根据所述主被叫终端用户的安全参数进行初步协 商;  8. The method according to claim 7, wherein the step of the core control device establishing a call with a corresponding secret level between the calling and called terminal users further comprises: the core control device according to The security parameters of the calling and called terminal users are initially negotiated;
所述核心控制设备控制所述主被叫终端用户之间进行加密参数协商; 如果协商成功, 则当此次通话属于密话时, 所述核心控制设备为所述 主被叫终端用户分配对媒体流进行加解密的密钥; 所述核心控制设备在所 述主被叫终端用户之间建立通话; 当此次通话属于明话时, 所述核心控制 设备直接在所述主被叫终端用户之间建立通话; 如果协商不成功, 则呼叫 失败。  The core control device controls the encryption parameter negotiation between the calling and the called terminal users; if the negotiation is successful, when the call belongs to the secret message, the core control device allocates the media to the calling and called terminal users. a key for encrypting and decrypting the stream; the core control device establishes a call between the calling and called terminal users; when the call belongs to a clear call, the core control device is directly at the calling and called terminal user The call is established; if the negotiation is unsuccessful, the call fails.
9.如权利要求 1至 3任一所述的方法, 其特征在于, 所述核心控制设 备按照新的明密级别的安全参数对明密级别进行切换的步骤进一步包括: 所述通话终端用户中的任意一个向所述核心控制设备发起用于改变通 话的密级参数的媒体切换请求, 所述媒体切换请求中带有新的明密級别的 安全参数;  The method according to any one of claims 1 to 3, wherein the step of the core control device switching the display level according to the security parameter of the new security level further comprises: Any one of the media switching request for changing the confidentiality parameter of the call to the core control device, where the media switching request carries a new security parameter of a secret level;
所述核心控制设备将所述媒体切换请求转发给另一通话终端用户; 所述核心控制设备的控制所述通话终端用户重新进行加密参数的协 商; 如果协商成功, 则当通话属于密话时, 所述核心控制设备向所述通话 终端用户重新分配密钥, 所述通话终端用户利用新的密钥进行通话; 当通 话属于明话时, 所述通话终端用户直接进行通话。 The core control device forwards the media switch request to another call terminal user; the core control device controls the call terminal user to re-negotiate the encryption parameter; if the negotiation is successful, when the call belongs to the secret message, The core control device to the call The terminal user reassigns the key, and the call terminal user uses the new key to make a call; when the call belongs to the clear call, the call terminal user directly makes a call.
10.如权利要求 3所述的方法, 其特征在于, 当所述终端用户在所述 多路通话之间进行切换时, 所述核心控制设备根据切换后的通话的明密级 别控制本次通话的步驟进一步包括:  The method according to claim 3, wherein, when the terminal user switches between the multiple calls, the core control device controls the current call according to the brightness level of the switched call. The steps further include:
所述核心控制设备控制切换终端用户挂起切换前的通话, 并将被切换 终端用户的信息保存在切换终端用户内;  The core control device controls the switching terminal user to suspend the call before the handover, and saves the information of the switched terminal user in the handover terminal user;
控制切换终端用户和新的通话终端用户采用切换后的通话的密钥进行 媒体流的加解密。  The switching terminal user and the new calling terminal user are used to encrypt and decrypt the media stream by using the key of the switched call.
11.如权利要求 4所述的方法, 其特征在于, 在所述核心控制设备登 记终端用户设定的明密级别的安全参数步糠中, 所述终端用户可以向所述 核心控制设备登记多于一组的明密级别的安全参数。  The method according to claim 4, wherein in the security parameter step of registering the user-set secret level of the core control device, the terminal user may register with the core control device. A set of security parameters for the level of confidentiality.
12. 如权利要求 7所述的方法, 其特征在于, 所述终端用户在呼叫请 求中设定的明密级别的安全参数可以不同于该终端用户在所述核心控制设 备中登记的明密级别的安全参数。  The method according to claim 7, wherein the security parameter set by the terminal user in the call request may be different from the security level registered by the terminal user in the core control device. Security parameters.
PCT/CN2005/000183 2005-02-07 2005-02-07 A method for switching the level of the plaintext and cyphertext during the conversation WO2006081712A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2005/000183 WO2006081712A1 (en) 2005-02-07 2005-02-07 A method for switching the level of the plaintext and cyphertext during the conversation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2005/000183 WO2006081712A1 (en) 2005-02-07 2005-02-07 A method for switching the level of the plaintext and cyphertext during the conversation

Publications (1)

Publication Number Publication Date
WO2006081712A1 true WO2006081712A1 (en) 2006-08-10

Family

ID=36776936

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2005/000183 WO2006081712A1 (en) 2005-02-07 2005-02-07 A method for switching the level of the plaintext and cyphertext during the conversation

Country Status (1)

Country Link
WO (1) WO2006081712A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6070245A (en) * 1997-11-25 2000-05-30 International Business Machines Corporation Application interface method and system for encryption control
US6363150B1 (en) * 1999-12-30 2002-03-26 At&T Corporation Billing method for customers having IP telephony service with multiple levels of security
WO2004098144A1 (en) * 2003-04-25 2004-11-11 Telefonaktiebolaget L M Ericsson (Publ) An arrangement and a method relating to secure communication

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6070245A (en) * 1997-11-25 2000-05-30 International Business Machines Corporation Application interface method and system for encryption control
US6363150B1 (en) * 1999-12-30 2002-03-26 At&T Corporation Billing method for customers having IP telephony service with multiple levels of security
WO2004098144A1 (en) * 2003-04-25 2004-11-11 Telefonaktiebolaget L M Ericsson (Publ) An arrangement and a method relating to secure communication

Similar Documents

Publication Publication Date Title
US9537837B2 (en) Method for ensuring media stream security in IP multimedia sub-system
EP2677788B1 (en) Method and system for data aggregation for communication tasks common to multiple devices
EP1717986B1 (en) Key distribution method
US6996716B1 (en) Dual-tier security architecture for inter-domain environments
KR101438243B1 (en) Sim based authentication
EP1374533B1 (en) Facilitating legal interception of ip connections
US20140109213A1 (en) Method and Apparatus for Data Transmission
WO2011041962A1 (en) Method and system for end-to-end session key negotiation which support lawful interception
US20070074022A1 (en) Method for providing message transmission in H.323 communication system
WO2007048301A1 (en) A encryption method for ngn service
WO2005104423A1 (en) The method of secret communication between the endpoints
WO2007093079A1 (en) Implementation method of crossdomain multi-gatekeeper packet network key negotiation security policy
WO2008074226A1 (en) A method for negotiating the session secret key between the endpoints across multiple gatekeeper zones
WO2009094813A1 (en) Security parameters negotiation method and apparatus for realizing the security of the media flow
WO2006081712A1 (en) A method for switching the level of the plaintext and cyphertext during the conversation
JP2009135577A (en) Information relay system, information relay apparatus and method thereof, and program
WO2012174843A1 (en) Key negotiation method and system for achieving end-to-end security
US20070133808A1 (en) Method for allocating session key across gatekeeper zones in a direct-routing mode
WO2009094814A1 (en) A security parameter generating method for implementing media stream security and the apparatus thereof
WO2006066455A1 (en) A method for achieving session with different plain and security level in the communication network
KR101811668B1 (en) A driving system for voice encryption by Based Security Chip and that of driving method
CN1491002A (en) IP video frequency terminal apparatus and interaction of signalling network
JP6554851B2 (en) IP phone encryption apparatus and encryption method
JP2003229955A (en) Call method and call system
WO2011017851A1 (en) Method for accessing message storage server securely by client and related devices

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 05706620

Country of ref document: EP

Kind code of ref document: A1

WWW Wipo information: withdrawn in national office

Ref document number: 5706620

Country of ref document: EP