[go: up one dir, main page]

HK1199989B - Data processing method for voice communication - Google Patents

Data processing method for voice communication Download PDF

Info

Publication number
HK1199989B
HK1199989B HK15100303.5A HK15100303A HK1199989B HK 1199989 B HK1199989 B HK 1199989B HK 15100303 A HK15100303 A HK 15100303A HK 1199989 B HK1199989 B HK 1199989B
Authority
HK
Hong Kong
Prior art keywords
security device
digital certificate
security
call
identification information
Prior art date
Application number
HK15100303.5A
Other languages
Chinese (zh)
Other versions
HK1199989A1 (en
Inventor
李东声
Original Assignee
天地融科技股份有限公司
Filing date
Publication date
Priority claimed from CN201410247840.8A external-priority patent/CN104065649B/en
Application filed by 天地融科技股份有限公司 filed Critical 天地融科技股份有限公司
Publication of HK1199989A1 publication Critical patent/HK1199989A1/en
Publication of HK1199989B publication Critical patent/HK1199989B/en

Links

Abstract

The present invention provides a data processing method for voice calls,Including: the first security chip of the first security device obtaining the digital certificate of the second security device;The first security chip encrypts the call key generated by the first security chip,Obtain the ciphertext of the call key,At least sign the ciphertext or call key of the call key,Obtain signature data;The first security device sends the ciphertext and signature data of the call key to the first call terminal;The first security chip verifies the digital certificate of the second security device using the root certificate,If the verification is successful,The first security device outputs the identification information of the digital certificate of the second security device,And prompt to confirm the identification information of the digital certificate of the second security device;After receiving the first confirmation instruction,The first security chip initiates encryption and decryption operations on the voice call of the first communication terminal.

Description

Data processing method for voice call
Technical Field
The invention relates to the technical field of electronics, in particular to a data processing method for voice communication.
Background
In the prior art, the voice call between users has the possibility of being monitored, so that the current voice call has a safety risk. Aiming at the security risk, the mode adopted in the prior art is to encrypt the voice through a call key stored in a TF card on the mobile phone, so as to realize the protection of the voice call. However, in practical application, if malicious software is installed in the call terminal, a hacker can steal the call key in the TF card by means of the malicious software, and further crack the encrypted voice information, which causes a risk of voice data leakage of the call terminal, so how to safely perform voice encryption operation is an urgent technical problem to be solved; in addition, in the prior art, there is a possibility that a voice call is intercepted, so that it is also an urgent technical problem to reduce the possibility that a voice call is intercepted.
Disclosure of Invention
The present invention provides a data processing method for voice communication, and mainly aims to solve one of the above technical problems.
The invention provides a data processing method of voice call, which comprises the following steps: a first security chip of first security equipment acquires a digital certificate of second security equipment, wherein the first security equipment is independent of a first call terminal, the first security equipment is connected with the first call terminal through a first communication interface, and the second security equipment is security equipment of a second call terminal which performs voice call with the first call terminal; after the first security chip acquires the digital certificate of the second security device, the first security chip encrypts the call key generated by the first security chip by using the public key of the second security device to obtain the ciphertext of the call key, and at least signs the ciphertext of the call key or the call key by using the private key of the first security device to obtain signature data; the first safety equipment sends the ciphertext and the signature data of the call key to a first call terminal through a first communication interface; after the first security chip acquires the digital certificate of the second security device, the first security chip verifies the digital certificate of the second security device by using the root certificate, if the verification is passed, the first security device outputs the identification information of the digital certificate of the second security device and prompts to confirm the identification information of the digital certificate of the second security device; and after the first confirmation instruction is obtained, the first security chip starts the encryption and decryption operation of the voice call of the first call terminal by using the call key.
The invention provides a data processing method of voice call, which comprises the following steps: a first security chip of first security equipment starts encryption and decryption operations on voice calls of a first call terminal by using a call key generated by the first security chip; the method comprises the steps that a first safety chip obtains a digital certificate of second safety equipment, wherein the first safety equipment is independent of a first call terminal and is connected with the first call terminal through a first communication interface, and the second safety equipment is the safety equipment of the second call terminal which carries out voice call with the first call terminal; after the first security chip acquires the digital certificate of the second security device, the first security chip encrypts the call key by using the public key of the second security device to obtain the ciphertext of the call key, and at least signs the ciphertext of the call key or the call key by using the private key of the first security device to obtain signature data; the first safety equipment sends the ciphertext and the signature data of the call key to a first call terminal through a first communication interface; after the first security chip acquires the digital certificate of the second security device, the first security chip verifies the digital certificate of the second security device by using the root certificate, if the verification is passed, the first security device outputs the identification information of the digital certificate of the second security device and prompts to confirm the identification information of the digital certificate of the second security device; and after the first confirmation instruction is obtained, the first security chip continuously performs encryption and decryption operations on the voice call of the first call terminal by using the call key.
In addition, the first security device prompting confirmation of identification information of a digital certificate of a second security device includes: the first safety equipment prompts whether the identification information of the digital certificate of the second safety equipment is consistent with the identity of the user of the second communication terminal to be confirmed; the first confirmation instruction is an instruction for confirming that the identification information of the digital certificate of the second safety device is consistent with the identity of the user of the second communication terminal.
In addition, the first security chip acquires a digital certificate of the second security device, including: the first security chip acquires a digital certificate of the second security device from pre-stored digital certificates; or, the first security chip receives the digital certificate of the second security device sent by the first call terminal through the first communication interface.
Further, the first security device outputting identification information of a digital certificate of the second security device includes: the first safety equipment converts the identification information of the digital certificate of the second safety equipment into sound information to obtain the sound information of the identification information of the digital certificate of the second safety equipment, and plays the sound information of the identification information of the digital certificate of the second safety equipment; alternatively, the first security device displays identification information of the digital certificate of the second security device.
In addition, the method further comprises: and if the first security chip detects that the voice call of the first call terminal is ended, the first security chip deletes the call key.
Furthermore, the private key of the first secure device is generated by the first secure chip internally to the first secure chip.
The invention provides a data processing method of voice call, which comprises the following steps: a second security chip of a second security device acquires a digital certificate of a first security device, wherein the second security device is independent of a second communication terminal and is connected with the second communication terminal through a second communication interface, and the first security device is a security device of a first communication terminal which performs voice communication with the second communication terminal; the second security chip receives the cipher text and the signature data of the call key sent by the second call terminal through the second communication interface; the signature data is obtained by carrying out signature processing on a ciphertext of the call key; after the second security chip acquires the digital certificate of the first security device, the second security chip verifies the signature data by using the public key of the first security device, and if the signature data passes the verification, the cipher text of the call key is decrypted by using the private key of the second security device to obtain the call key; after the second security chip acquires the digital certificate of the first security device, the second security chip verifies the digital certificate of the first security device by using the root certificate, and if the digital certificate of the first security device is verified to pass, the second security device outputs the identification information of the digital certificate of the first security device and prompts to confirm the identification information of the digital certificate of the first security device; and after the second confirmation instruction is obtained, the second security chip starts the encryption and decryption operation of the voice call of the second call terminal by using the call key.
The invention provides a data processing method of voice call, which comprises the following steps: a second security chip of a second security device acquires a digital certificate of a first security device, wherein the second security device is independent of a second communication terminal and is connected with the second communication terminal through a second communication interface, and the first security device is a security device of a first communication terminal which performs voice communication with the second communication terminal; the second security chip receives the cipher text and the signature data of the call key sent by the second call terminal through the second communication interface; the signature data is obtained by carrying out signature processing on the call key; after the second security chip acquires the digital certificate of the first security device, the second security chip decrypts the ciphertext of the call key by using the private key of the second security device to obtain the call key; verifying the signature data by using a public key of the first safety device; after the second security chip acquires the digital certificate of the first security device, the second security chip verifies the digital certificate of the first security device by using the root certificate, and if the digital certificate of the first security device is verified to pass, the second security device outputs the identification information of the digital certificate of the first security device and prompts to confirm the identification information of the digital certificate of the first security device; and after the signature data passes the verification and a second confirmation instruction is obtained, the second security chip starts the encryption and decryption operation of the voice call of the second call terminal by using the call key.
The invention provides a data processing method of voice call, which comprises the following steps: a second security chip of a second security device acquires a digital certificate of a first security device, wherein the second security device is independent of a second communication terminal and is connected with the second communication terminal through a second communication interface, and the first security device is a security device of a first communication terminal which performs voice communication with the second communication terminal; the second security chip receives the cipher text and the signature data of the call key sent by the second call terminal through the second communication interface; the signature data is obtained by carrying out signature processing on a ciphertext of the call key; after the second security chip acquires the digital certificate of the first security device, the second security chip verifies the signature data by using the public key of the first security device, and if the signature data passes the verification, the cipher text of the call key is decrypted by using the private key of the second security device to obtain the call key; and starting the encryption and decryption operation of the voice call of the second call terminal by using the call key; after the second security chip acquires the digital certificate of the first security device, the second security chip verifies the digital certificate of the first security device by using the root certificate, and if the digital certificate of the first security device is verified to pass, the second security device outputs the identification information of the digital certificate of the first security device and prompts to confirm the identification information of the digital certificate of the first security device; and after the second confirmation instruction is obtained, the second security chip continuously performs encryption and decryption operations on the voice call of the second call terminal by using the call key.
The invention provides a data processing method of voice call, which comprises the following steps: a second security chip of a second security device acquires a digital certificate of a first security device, wherein the second security device is independent of a second communication terminal and is connected with the second communication terminal through a second communication interface, and the first security device is a security device of a first communication terminal which performs voice communication with the second communication terminal; the second security chip receives the cipher text and the signature data of the call key sent by the second call terminal through the second communication interface; the signature data is obtained by carrying out signature processing on the call key; after the second security chip acquires the digital certificate of the first security device, the second security chip decrypts the ciphertext of the call key by using the private key of the second security device to obtain the call key; verifying the signature data by using a public key of the first safety equipment, and if the signature data passes the verification, starting encryption and decryption operations on the voice call of the second call terminal by using a call key; after the second security chip acquires the digital certificate of the first security device, the second security chip verifies the digital certificate of the first security device by using the root certificate, and if the digital certificate of the first security device is verified to pass, the second security device outputs the identification information of the digital certificate of the first security device and prompts to confirm the identification information of the digital certificate of the first security device; and after the second confirmation instruction is obtained, the second security chip continuously performs encryption and decryption operations on the voice call of the second call terminal by using the call key.
In addition, the prompting, by the second security device, of the confirmation of the identification information of the digital certificate of the first security device includes: the second safety equipment prompts whether the identification information of the digital certificate of the first safety equipment is consistent with the identity of the user of the first communication terminal or not to be confirmed; the second confirmation instruction is an instruction for confirming that the identification information of the digital certificate of the first safety device is consistent with the identity of the user of the first communication terminal.
In addition, the second security chip acquires the digital certificate of the first security device, and the method comprises the following steps: the second security chip acquires the digital certificate of the first security device from the prestored digital certificate; or the second security chip receives the digital certificate of the first security device sent by the second communication terminal through the second communication interface.
Further, the second security device outputting the identification information of the digital certificate of the first security device includes: the second safety equipment converts the identification information of the digital certificate of the first safety equipment into sound information to obtain the sound information of the identification information of the digital certificate of the first safety equipment, and plays the sound information of the identification information of the digital certificate of the first safety equipment; alternatively, the second security device displays identification information of the digital certificate of the first security device.
In addition, the method further comprises: and if the second security chip detects that the voice call of the second call terminal is ended, the second security chip deletes the call key.
Furthermore, the private key of the second secure device is generated by the second secure chip internally to the second secure chip.
Compared with the mode that the call key is generated on the TF card in the prior art, the method provided by the embodiment of the invention reduces the possibility of being attacked by malicious software on the call terminal in the voice encryption process by generating the call key on the first safety equipment independent of the first call terminal; the voice encryption device is generated by a first security chip in first security equipment, and based on the high security of the first security chip, the possibility that a call key is stolen is reduced, and the security of voice encryption is ensured; in addition, the conversation key is used for encryption in the first security chip, so that the conversation key is called in a security environment, and the security use of the conversation key is ensured. In addition, the first safety device verifies the digital certificate of the second safety device, after the digital certificate of the second safety device is verified to pass, the identification information of the digital certificate of the second safety device is output, whether the holder of the digital certificate of the second safety device is the user of the second communication terminal can be identified, whether the call is monitored or not can be determined by the user of the first communication terminal, the success rate of identifying the monitoring of the third person in the voice call is improved, the possibility of monitoring the voice call is reduced, when the user determines that the call is monitored by the third person, the user can take the monitoring-prevention safety measures in time to prevent information leakage, and the safety of data transmission in the voice call is improved.
The cipher text of the call key received by the second safety equipment is encrypted by using the public key of the second safety equipment, so that the cipher text of the call key can only be decrypted by the private key of the second safety equipment, and the safety of the call key is ensured; the signature data received by the second safety device is obtained by performing signature processing on the call key or the ciphertext of the call key, and the second safety device verifies the signature data to ensure whether the source of the signature data is the first safety device. In addition, the second security device verifies the digital certificate of the first security device, after the digital certificate of the first security device is verified to pass, the identification information of the digital certificate of the first security device is output, whether the holder of the digital certificate of the first security device is the user of the first call terminal can be identified, whether the call is monitored or not can be determined by the user of the second call terminal, the success rate of identifying the monitoring of the third person in the voice call is improved, the possibility of monitoring the voice call is reduced, when the user determines that the call is monitored by the third person, the user can take the monitoring-prevention security measures in time to prevent information leakage, and the safety of data transmission in the voice call is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on the drawings without creative efforts.
Fig. 1 is a schematic flowchart of a data processing method for voice call according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a data processing method for voice call according to a second embodiment of the present invention;
fig. 3A is a schematic flowchart of a data processing method for voice call according to a third embodiment of the present invention;
fig. 3B is another schematic flow chart of a data processing method for voice call according to a third embodiment of the present invention;
fig. 4A is a schematic flowchart of a data processing method for voice call according to a fourth embodiment of the present invention;
fig. 4B is another schematic flow chart of a data processing method for voice call according to a fourth embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention are clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
Example one
Fig. 1 is a flowchart illustrating a data processing method for a voice call according to an embodiment of the present invention. The method shown in fig. 1 comprises:
step 101, a first security chip of a first security device acquires a digital certificate of a second security device, wherein the first security device is independent of a first call terminal, the first security device is connected with the first call terminal through a first communication interface, and the second security device is a security device of a second call terminal which performs voice call with the first call terminal;
102, after the first security chip acquires the digital certificate of the second security device, the first security chip encrypts the call key generated by the first security chip by using the public key of the second security device to obtain a ciphertext of the call key, and at least signs the ciphertext of the call key or the call key by using the private key of the first security device to obtain signature data; the first safety equipment sends the ciphertext and the signature data of the call key to a first call terminal through a first communication interface;
after receiving the ciphertext and the signature data of the call key, the first call terminal sends the ciphertext and the signature data to the second call terminal through a communication network;
103, after the first security chip acquires the digital certificate of the second security device, the first security chip verifies the digital certificate of the second security device by using the root certificate, and if the verification is passed, the first security device outputs the identification information of the digital certificate of the second security device and prompts to confirm the identification information of the digital certificate of the second security device;
wherein, the first security device prompts to confirm the identification information of the digital certificate of the second security device, including: the first safety equipment prompts whether the identification information of the digital certificate of the second safety equipment is consistent with the identity of the user of the second communication terminal to be confirmed;
and 104, after the first confirmation instruction is obtained, the first security chip starts the encryption and decryption operation of the voice call of the first call terminal by using the call key.
The first confirmation instruction is an instruction for confirming that the identification information of the digital certificate of the second safety equipment is consistent with the identity of the user of the second communication terminal;
the user of the first call terminal may input the first confirmation instruction on the first call terminal, or may input the first confirmation instruction on the first security device. The user of the first call terminal inputs the first confirmation instruction on the first safety device, attack of malicious software on the first call terminal is reduced, and voice call safety is guaranteed.
The operations in step 102 and step 103 do not have an obvious precedence relationship in the execution sequence, and may be executed simultaneously, for example, if the first security device supports a multithread processing function, the first security device may complete the operations in step 102 and step 103 at the same time; of course, the operations of step 102 and step 103 may also be performed sequentially in order, for example, step 102 is performed first, and then step 103 is performed; alternatively, step 103 is performed first, and then step 102 is performed.
Wherein the public key of the second security device is obtained from the digital certificate of the second security device.
Example two
The method provided by the second embodiment of the present invention is different from the first embodiment in the receiving timing of the first confirmation instruction, the first security chip in the first embodiment starts the encryption and decryption operation for the voice call of the first call terminal by using the call key after obtaining the first confirmation instruction, the first security chip in the second embodiment obtains the first confirmation instruction after starting the encryption and decryption operation for the voice call of the first call terminal, and the voice call of the first call terminal continues the encryption and decryption operation by using the call key.
Fig. 2 is a flowchart illustrating a data processing method for voice call according to a second embodiment of the present invention. The method shown in fig. 2 comprises:
step 201, a first security chip of a first security device starts a voice call of a first call terminal to be encrypted and decrypted by using a call key generated by the first security chip;
step 202, the first security chip obtains a digital certificate of a second security device, wherein the first security device is independent of the first call terminal, the first security device is connected with the first call terminal through a first communication interface, and the second security device is a security device of the second call terminal which performs voice call with the first call terminal;
step 203, after the first security chip obtains the digital certificate of the second security device, the first security chip encrypts the call key by using the public key of the second security device to obtain the ciphertext of the call key, and at least performs signature processing on the ciphertext of the call key or the call key by using the private key of the first security device to obtain signature data; the first safety equipment sends the ciphertext and the signature data of the call key to a first call terminal through a first communication interface;
after receiving the ciphertext and the signature data of the call key, the first call terminal sends the ciphertext and the signature data to the second call terminal through a communication network;
step 204, after the first security chip obtains the digital certificate of the second security device, the first security chip verifies the digital certificate of the second security device by using the root certificate, if the verification is passed, the first security device outputs the identification information of the digital certificate of the second security device, and prompts to confirm the identification information of the digital certificate of the second security device;
wherein, the first security device prompts to confirm the identification information of the digital certificate of the second security device, including: the first safety equipment prompts whether the identification information of the digital certificate of the second safety equipment is consistent with the identity of the user of the second communication terminal to be confirmed;
step 205, after the first confirmation instruction is obtained, the first security chip continues to perform encryption and decryption operations on the voice call of the first call terminal by using the call key;
the first confirmation instruction is an instruction for confirming that the identification information of the digital certificate of the second safety device is consistent with the identity of the user of the second communication terminal.
The user of the first call terminal may input the first confirmation instruction on the first call terminal, or may input the first confirmation instruction on the first security device. The user of the first call terminal inputs the first confirmation instruction on the first safety device, attack of malicious software on the first call terminal is reduced, and voice call safety is guaranteed.
The operations in step 203 and step 204 do not have an obvious precedence relationship in the execution sequence, and may be executed simultaneously, for example, if the first security device supports a multithread processing function, the first security device may complete the operations in step 203 and step 204 simultaneously; or may be performed sequentially in order, for example, step 203 is performed first, and then step 204 is performed; alternatively, step 204 is performed first, and then step 203 is performed.
Wherein the public key of the second security device is obtained from the digital certificate of the second security device.
In the first and second embodiments, after prompting to confirm the identification information of the digital certificate of the second security device, if the user confirms that the identification information of the digital certificate of the second security device is consistent with the identity of the second communication terminal, the user inputs a first confirmation instruction on the first security device or the first communication terminal.
The method for the first security chip to obtain the first confirmation instruction includes: the first safety chip receives a first confirmation instruction sent by the first call terminal through the first communication interface; or the first security chip receives a first confirmation instruction sent by a confirmation key on the first security device.
The first security chip receives a first confirmation instruction sent by the confirmation key on the first security device, attack of malicious software on the first call terminal can be reduced, and voice call security is guaranteed.
The above description has been made on the method of the first embodiment and the second embodiment, each having different characteristics from each other, and the following description is made on the same characteristics as the method of the first embodiment and the second embodiment, i.e., the following characteristics are applied to the method of the first embodiment and the second embodiment:
firstly, explaining a first safety device and a first call terminal:
the first security device may be a wearable device such as smart glasses, a smart watch, an earphone device, or integrated in the wearable device. Of course, the first security device may also be an intelligent Key device capable of communicating with the call terminal, such as an intelligent Key device USB Key with a USB interface, an intelligent Key device supporting an audio interface, an intelligent Key device with a bluetooth communication function, or integrated in an intelligent Key device capable of communicating with the call terminal; that is, the first security device is a separate device from the first telephony terminal and is not integrated with the first telephony terminal.
The first communication interface may be a wireless connection interface or a wired connection interface. If the first communication interface is a wireless connection interface, a wireless communication module, which can be a Wi-Fi module, a Wi-FiDirect module, an NFC module, a Bluetooth module or an infrared module, is arranged in the first safety device, for example, the first safety device is a Bluetooth headset; if the first communication interface is a wired connection interface, the first safety device may have a data transmission line, and an interface of the data transmission line may be an audio interface or a USB interface, for example, the first safety device is a line control earphone. Of course, the first safety device may also have two functions of wireless connection and wired connection, that is, the first safety device has a wireless communication module inside and a data transmission line outside.
If the first safety equipment is internally provided with the wireless communication module, the first safety equipment can be connected with the first call terminal through wireless connection; if the first communication interface is a wired connection interface, the first safety device can be connected with the first call terminal through wired connection.
The first communication terminal is a terminal with voice communication capability, and may be a traditional communication device, such as a fixed phone and a mobile phone, or a terminal with a network telephone function, such as a PC, a notebook computer, a tablet computer, and the like.
Secondly, explaining the call key:
the session key may be generated using a key generation algorithm internal to the first secure chip, where the key generation algorithm may be a random number generation algorithm. Because the call key is generated by the first security chip in the first security device, compared with the key negotiation performed by the first call terminal in the prior art, the negotiation is completed by the first security device independent of the first call terminal, so that the possibility that the call key is attacked by malicious software in the first call terminal is reduced, and the call key generated by the first security chip in the first security device is safer and more reliable. In addition, the call key can be stored in the first security chip to ensure the storage security of the call key.
For the session key used by the first security device, after the first security chip in the first security device obtains the session key, the session key can be used to ensure the security of the voice call between the first security device and the second security device, which is equivalent to establishing a voice encryption channel between the first security device and the second security device based on the voice call in the prior art.
The voice encryption channel provided by the invention is a channel established between the first security device and the second security device, namely for the first security device, the voice encryption channel sequentially passes through the first security device, the first communication device, the second communication device and the second security device. Therefore, the voice encryption channel is established between the safety devices, so that the first communication terminal and the second communication terminal play a role in data transmission in the whole process from the establishment of the communication to the termination of the communication, the possibility of malicious software attack on the communication terminals is reduced, and the safety of data transmission is improved.
And after detecting that the voice call of the user of the first call terminal is finished, the first security chip deletes the call key.
After the call is finished, the first safety chip destroys the call key used by the voice call, so that the possibility that the call key is unreasonably utilized after being stolen can be reduced, the operation safety of the first safety chip is ensured, and the storage space of the first safety chip is effectively utilized.
The encryption and decryption operation of the voice call of the first call terminal is started by using the call key, and the encryption and decryption operation can be started when the user of the first call terminal and the user of the second call terminal start the voice call, and also can be started in the process of the voice call between the user of the first call terminal and the user of the second call terminal.
Thirdly, explaining a mode of acquiring the digital certificate of the second security device:
in the first mode, the first security chip acquires a digital certificate of the second security device from a pre-stored digital certificate;
the first security device may store digital certificates of one or more security devices in advance, and may search the digital certificate of the second security device according to the identifier of the second security device; and because the digital certificate is pre-stored in the first security device and is not directly acquired from the outside, the possibility of tampering the digital certificate is reduced.
In the second mode, the first security chip receives the digital certificate of the second security device sent by the first call terminal through the first communication interface.
When the first secure chip obtains the digital certificate of the second secure device from the outside, the following method may be further implemented, including:
b1, the first call terminal acquires the digital certificate of the second security device from the digital certificate center and sends the acquired digital certificate of the second security device to the first security device through the first communication interface;
and B2, the second security device sends the digital certificate of the second security device to the second call terminal, the second call terminal sends the digital certificate of the second security device to the first call terminal, and the first call terminal sends the digital certificate of the second security device to the first security device through the first communication interface after receiving the digital certificate of the second security device.
In the method B2, the triggering condition for the second security device to send the digital certificate of the second security device to the second communication terminal may be initiated by the second security device actively, or initiated by the second security device after receiving the certificate acquisition request sent by the first security device.
In the method B1 and the method B2, the digital certificate of the second security device can be obtained in two ways, but in comparison, the digital certificate of the second security device is obtained from the digital certificate center by the first session terminal in the method B1, because the source of the digital certificate is reliable, and the possibility that an attacker who monitors the session modifies the digital certificate is low, the possibility that the digital certificate is tampered is reduced, and the security that the first session terminal obtains the digital certificate of the second security device from the outside is ensured.
Fourthly, the identification information of the digital certificate of the second safety equipment is output and the confirmation of the identification information of the digital certificate of the second safety equipment is prompted, and the following steps are carried out:
the first safety device outputs the identification information of the digital certificate of the second safety device, and the method comprises the following steps:
in the first mode, the first security device converts the identification information of the digital certificate of the second security device into sound information to obtain the sound information of the identification information of the digital certificate of the second security device, and plays the sound information of the identification information of the digital certificate of the second security device;
the sound information of the identification information of the digital certificate of the second security device can be played through the module with the playing function of the first security device, for example, the module with the playing function can be a speaker or a loudspeaker; and playing can be carried out through a module with a playing function of the first call terminal.
In a second manner, the first security device displays identification information of the digital certificate of the second security device.
The identification information of the digital certificate of the second security device may be displayed by the module with the display function of the first security device, for example, the module with the display function may be a display screen; the display can also be performed through a module with a display function of the first call terminal.
Compared with the mode of outputting the identification information of the digital certificate of the second safety equipment on the first call terminal, the mode of outputting the identification information of the digital certificate of the second safety equipment by the first safety equipment can reduce the possibility of malicious software attack on the first call terminal and improve the safety of data transmission.
The first safety device prompts confirmation of the identification information of the digital certificate of the second safety device, the prompt information can be played through a module with a playing function on the first safety device to realize the function of prompting confirmation of the identification information of the digital certificate of the second safety device, and the prompt information can also be displayed through a module with a display function on the first safety device to realize the function of prompting confirmation of the identification information of the digital certificate of the second safety device.
In addition, the prompt information can be played through a module with a playing function on the first call terminal, or the prompt information can be displayed through a module with a displaying function on the first call terminal, so that the function of confirming the identification information of the digital certificate of the second safety device is prompted.
Compared with the mode of prompting the first call terminal to confirm the identification information of the digital certificate of the second safety equipment, the mode of prompting the first safety equipment to confirm the identification information of the digital certificate of the second safety equipment can reduce the possibility of malicious software attack on the first call terminal and improve the safety of data transmission.
Here, the prompt information for confirming the identification information of the digital certificate of the second security device and the identification information of the digital certificate of the second security device may be output together, for example, to output "please confirm the identification information XXX of the digital certificate of the second security device", where XXX represents the content of the identification information of the digital certificate of the second security device. The output mode can adopt a playing mode or a display mode.
Of course, the prompt information for confirming the identification information of the digital certificate of the second security device may be output separately from the identification information of the digital certificate of the second security device, for example, first output information "please confirm the identification information of the digital certificate of the second security device" and then output information "the identification information of the digital certificate of the second security device is XXX", or first output information "the identification information of the digital certificate of the second security device is XXX" and then output information "please confirm the identification information of the digital certificate of the second security device". The output modes of the two pieces of information can be output in a playing mode or a display mode, and the output modes of the two pieces of information can be the same or different.
Fifthly, explaining the private key of the first safety device and the identification information of the digital certificate of the second safety device:
the private key of the first secure device is generated by the first secure chip internally to the first secure chip.
For the private key in the first secure device, the management mode of the private key in the prior art is generated from the outside and then imported into the first secure device, which is called a "ground mode", and the above mode is easy for hackers to intercept the private key before the private key is imported into the first secure device, so the management mode of the private key in the prior art has a certain security risk, and therefore, the private key used in the present invention is generated inside the first secure chip in the first secure device, that is, the generation environment of the private key is in the first secure device, that is, the generation program of the public-private key pair is directly burned in the first secure chip by a developer, and the public key cryptographic algorithm program is also burned in the first secure chip. After the public and private keys are generated, the private key is stored in a key area in the first security chip and is not allowed to be accessed externally. And when a public and private key pair in the key area is used for carrying out digital signature and asymmetric decryption operation, the private key is called inside the first security chip to execute operation. Since the use of the private key is called by the first security chip, the private key does not leave the first security device in the whole process of generating and using the private key, which is called as a mode of 'no landing', so a hacker has no opportunity to intercept the private key, thereby ensuring the security of the private key.
The identification information of the digital certificate of the second safety equipment is at least one of name information, contact information and identity information of a digital certificate holder of the second safety equipment; the name information can be name, network name, pen name, etc., the contact mode can be mobile phone number, electronic mail box, and the identity information can be ID card number, employee's card number, passport number.
Sixth, the digital certificate for verifying the second security device using the root certificate is explained:
the root certificate is a certificate issued by the CA certificate authority to itself and is the starting point of the chain of trust. The digital certificate of the security device is issued by the CA certificate authority, and the root certificate of the CA certificate authority is stored in the security device. For example, the digital certificates of the first security device and the second security device are issued by the CA certificate authority, and the root certificate of the CA certificate authority is stored in each of the first security device and the second security device.
The root certificate of the CA certification center is used for authenticating the digital certificate issued by the CA certification center for the safety equipment so as to judge whether a certain digital certificate is a legal certificate issued by the CA certification center; for example, when the first security device obtains the digital certificate of the second security device, the digital certificate of the second security device is verified by using the root certificate issued by the CA certificate authority, and if the verification is passed, it indicates that the digital certificate of the second security device is a legal certificate issued by the CA certificate authority; otherwise, the digital certificate indicating the second secure device is not a legal certificate issued by the CA certificate authority.
The digital certificate issued by the CA at least comprises three parts of information, namely the information of the user, the public key of the user and the signature of the CA certification center on the information in the digital certificate. The authenticity of the digital certificate can be verified by verifying the signature of the CA authentication center in the digital certificate on the information in the digital certificate. When the signature of the information in the digital certificate is verified by the CA certificate authority, the verification is completed by using the public key of the CA certificate authority, and the public key of the CA certificate authority is stored in the root certificate of the CA certificate authority, so that the root certificate needs to be stored in the security equipment in advance to realize the authentication of the digital certificate issued by the CA certificate authority to the security equipment.
For example, in the first and second embodiments, in order to verify whether the digital certificate of the second security device is legal, the first security device needs to store in advance a root certificate of a CA certificate authority that issues digital certificates for the first security device and the second security device.
In addition, the first and second embodiments of the present invention describe a processing flow when the digital certificate of the second security device is verified to pass and the first confirmation instruction is obtained, and of course, the first and second embodiments of the present invention further provide a processing manner in the following scenario:
if the digital certificate of the second safety equipment is verified to be not passed, the first safety equipment outputs prompt information that the verification is not passed so that a user of the first call terminal can finish the voice call on the first call terminal or the first safety equipment;
after the prompt of confirming the identification information of the digital certificate of the second safety equipment, if the identification information of the digital certificate of the second safety equipment is inconsistent with the identity of the user of the second communication terminal, the first communication terminal or the first safety equipment receives an instruction of ending the voice communication.
The first and second embodiments of the present invention are further described below with an application scenario as an example:
the first embodiment and the second embodiment of the present invention are distinguished in that the signature objects are different, and the description is given by taking the ciphertext of which the signature object is the session key in the first embodiment as an example:
when the call terminal A and the call terminal B carry out voice call, the call terminal A is connected with the safety equipment A through the first communication interface, and the call terminal B is connected with the safety equipment B through the second communication interface. The method comprises the steps that a security device A generates a call key, the public key of the security device B is used for encrypting the call key to obtain a ciphertext AB of the call key, the private key of the security device A is used for signing the ciphertext AB of the call key to obtain signature data AB, and the security device A sends the ciphertext AB of the call key and the signature data AB to the security device B; and after the security device B receives the ciphertext AB and the signature data AB of the call key, verifying the signature data AB by using the public key of the security device A, and if the verification is passed, decrypting the ciphertext AB of the call key by using the private key of the security device B to obtain the call key, thereby realizing the operation of encrypting and decrypting the voice call of the security device A and the security device B by using the call key.
When a third person exists in the call process of the call terminal a and the call terminal B, wherein the call terminal of the third person is a call terminal C, and the security device of the call terminal C is a security device C, the voice call process is as follows:
the method comprises the steps that a security device A generates a call key, the public key of the security device C is used for encrypting the call key to obtain a ciphertext AC of the call key, the private key of the security device A is used for signing the ciphertext AC of the call key to obtain signature data AC, and the security device A sends the ciphertext AC of the call key and the signature data AC to the security device C; and after receiving the ciphertext AC and the signature data AC of the call key, the security device C verifies the signature data AC by using the public key of the security device A, and if the verification is passed, the security device C decrypts the ciphertext AC of the call key by using the private key of the security device C to obtain the call key.
The safety device C encrypts the call key by using the public key of the safety device B to obtain a ciphertext CB of the call key, signs the ciphertext CB of the call key by using the private key of the safety device C to obtain signature data CB, and sends the ciphertext CB of the call key and the signature data CB to the safety device B; and after the security device B receives the ciphertext CB of the call key and the signature data CB, the public key of the security device C is used for verifying the signature data CB, and if the verification is passed, the private key of the security device B is used for decrypting the ciphertext CB of the call key to obtain the call key.
Therefore, when a third person exists in the conversation process of the conversation terminal a and the conversation terminal B, the security device a and the security device B can still perform encryption and decryption operations on respective voice conversations by using the conversation key, but at the moment, the conversation of the conversation terminal a and the conversation terminal B is monitored by the third person.
Based on the above problems, the methods provided in the first and second embodiments of the present invention introduce the technical features of "verifying a digital certificate by using a root certificate" and "outputting identification information of the digital certificate", so that the methods provided in the first and second embodiments of the present invention can solve the above problems, which are specifically described as follows:
the first safety device verifies the digital certificate of the second safety device by using the root certificate;
if the verification is not passed, the digital certificate of the second safety equipment can be confirmed not to be a legal certificate issued by a CA certificate authority; at this moment, the first safety device sends out alarm prompt information to prompt the user in order to ensure the transmission safety of the call key, so that the user can take safety measures in time.
If the verification is passed, the digital certificate of the second security device can be confirmed to be a legal certificate issued by a CA (certificate authority); however, the first security device still cannot determine whether the holder of the certificate passing the verification is the user of the second communication terminal, so that the identification information of the digital certificate of the second security device needs to be output, and the identification information of the digital certificate of the second security device needs to be prompted to be confirmed; otherwise, the holder of the digital certificate of the second safety device is not the user of the second communication terminal, that is, the holder of the digital certificate of the second safety device is the third person, so that the purpose of identifying whether the third person exists in the voice call is achieved.
The method comprising the above technical features is further explained by taking the above listed application scenarios as examples:
before the security device A encrypts the call key and signs the encrypted call key, the security device A verifies the digital certificate of the security device C by using the root certificate, if the verification is passed, the identification information of the digital certificate of the security device C is output, and the identification information of the digital certificate of the security device C is prompted to be confirmed, the user of the first call terminal can judge that the holder of the digital certificate of the security device C is not the user of the second call terminal according to the identification information of the digital certificate of the security device C, and therefore the situation that third person monitoring exists in the call of the call terminal A and the call terminal B can be judged.
Similarly, before the security device B decrypts the received cipher text of the session key and verifies the signature data, the security device B verifies the digital certificate of the security device C by using the root certificate, if the verification is passed, the identification information of the digital certificate of the security device C is output, and the identification information of the digital certificate of the security device C is prompted to be confirmed, and the user of the second session terminal can judge that the holder of the digital certificate of the security device C is not the user of the first session terminal according to the identification information of the digital certificate of the security device C, so that the situation that a third person monitors the session between the session terminal a and the session terminal B can be judged.
The method of the second embodiment is similar to the method of the first embodiment, and the technical effects of the method of the first embodiment can be achieved, and are not described herein again.
Compared with the mode that the call key is generated on the TF card in the prior art, the method provided by the first embodiment and the second embodiment of the invention reduces the possibility of being attacked by malicious software on the first call terminal in the voice encryption process by generating the call key on the first safety equipment independent of the first call terminal; the first security chip in the first security device generates the first security chip, and based on the high security of the security chip, the possibility that a call key is stolen is reduced, and the security of voice encryption is ensured; in addition, when voice encryption is performed, the session key is used for encryption in the first security chip, so that the session key is called in a secure environment, and the secure use of the session key is ensured.
In addition, the first safety device verifies the digital certificate of the second safety device, after the verification is passed, the identification information of the digital certificate of the second safety device is output, the identification of the holder of the digital certificate of the second safety device is realized, the user of the first call terminal can determine whether the call is monitored by a person, the success rate of identifying the monitoring of a third person in the voice call is improved, the possibility of monitoring the voice call is reduced, and when the user determines that the third person is monitored in the voice call, the user can take a monitoring-prevention safety measure in time to prevent information leakage, and the safety of data transmission in the voice call is improved.
EXAMPLE III
The method provided by the present embodiment corresponds to the method provided by the first embodiment, wherein the embodiment is a data processing method on the first security device side, and the present embodiment is a data processing method on the second security device side corresponding to the first embodiment. When the first security device performs signature processing, two implementation methods may be adopted, that is, the ciphertext of the session key may be signed, and the session key may also be signed to obtain signature data.
Fig. 3A is a flowchart illustrating a data processing method for a voice call according to a third embodiment of the present invention. The method shown in fig. 3A includes:
step 3a1, a second security chip of a second security device obtains a digital certificate of a first security device, wherein the second security device is independent of the second communication terminal, the second security device is connected with the second communication terminal through a second communication interface, and the first security device is a security device of a first communication terminal performing voice communication with the second communication terminal;
step 3A2, the second security chip receives the cipher text and the signature data of the call key sent by the second call terminal through the second communication interface; the signature data is obtained by carrying out signature processing on a ciphertext of the call key;
the cryptograph and the signature data of the call key are received by the second call terminal from the first call terminal through the communication network, and the cryptograph and the signature data of the call key received by the first call terminal are obtained from the first safety device through the first communication interface.
Step 3A3, after the second security chip obtains the digital certificate of the first security device, the second security chip verifies the signature data by using the public key of the first security device, and if the signature data passes the verification, the second security chip decrypts the ciphertext of the call key by using the private key of the second security device to obtain the call key;
step 3A4, after the second security chip obtains the digital certificate of the first security device, the second security chip verifies the digital certificate of the first security device by using the root certificate, if the digital certificate of the first security device is verified to pass, the second security device outputs the identification information of the digital certificate of the first security device and prompts to confirm the identification information of the digital certificate of the first security device;
wherein the prompting of the second security device to confirm the identification information of the digital certificate of the first security device comprises: the second safety equipment prompts whether the identification information of the digital certificate of the first safety equipment is consistent with the identity of the user of the first communication terminal or not to be confirmed;
and 3A5, after the second confirmation instruction is obtained, the second security chip starts the encryption and decryption operation of the voice call of the second call terminal by using the call key.
The second confirmation instruction is an instruction for confirming that the identification information of the digital certificate of the first safety device is consistent with the identity of the user of the first communication terminal.
The operations in step 3A3 and step 3a4 have no obvious precedence in the execution sequence, and can be executed simultaneously, for example, if the second security device supports a multithread processing function, the second security device can complete the operations in step 3A3 and step 3a4 simultaneously; of course, it is also possible to perform the steps sequentially, for example, performing step 3A3 first, and then performing step 3a 4; alternatively, step 3a4 is performed first, followed by step 3 A3.
Wherein the public key of the first security device is obtained from the digital certificate of the first security device.
Fig. 3B is another schematic flow chart of a data processing method for a voice call according to a third embodiment of the present invention. The method shown in fig. 3B includes:
step 3B1, a second security chip of a second security device acquires a digital certificate of a first security device, wherein the second security device is independent of the second communication terminal, the second security device is connected to the second communication terminal through a second communication interface, and the first security device is a security device of a first communication terminal performing voice communication with the second communication terminal;
step 3B2, the second security chip receives the cipher text and the signature data of the call key sent by the second call terminal through the second communication interface; the signature data is obtained by carrying out signature processing on the call key;
the cryptograph and the signature data of the call key are received by the second call terminal from the first call terminal through the communication network, and the cryptograph and the signature data of the call key received by the first call terminal are obtained from the first safety device through the first communication interface.
Step 3B3, after the second security chip obtains the digital certificate of the first security device, the second security chip decrypts the ciphertext of the call key by using the private key of the second security device to obtain the call key; verifying the signature data by using a public key of the first safety device;
step 3B4, after the second security chip obtains the digital certificate of the first security device, the second security chip verifies the digital certificate of the first security device by using the root certificate, and if the digital certificate of the first security device is verified to pass, the second security device outputs the identification information of the digital certificate of the first security device and prompts to confirm the identification information of the digital certificate of the first security device;
wherein the prompting of the second security device to confirm the identification information of the digital certificate of the first security device comprises: the second safety equipment prompts whether the identification information of the digital certificate of the first safety equipment is consistent with the identity of the user of the first communication terminal or not to be confirmed;
step 3B5, after the signature data passes the verification and a second confirmation instruction is obtained, the second security chip starts the encryption and decryption operation of the voice call of the second call terminal by using the call key;
the second confirmation instruction is an instruction for confirming that the identification information of the digital certificate of the first safety device is consistent with the identity of the user of the first communication terminal.
The operations in step 3B3 and step 3B4 have no obvious precedence in the execution sequence, and can be executed simultaneously, for example, if the second security device supports a multithread processing function, the second security device can complete the operations in step 3B3 and step 3B4 simultaneously; or may be performed sequentially, e.g., first performing step 3B3, then performing step 3B 4; alternatively, step 3B4 is performed first, followed by step 3B 3.
The method shown in fig. 3A is different from the method shown in fig. 3B in that the processing flow of the signature data is different, in the method shown in fig. 3A, the second security device performs corresponding processing on the signature data obtained by signing the ciphertext of the session key based on the first security device, and in the method shown in fig. 3B, the second security device performs corresponding processing on the signature data obtained by signing the session key based on the first security device.
Wherein the public key of the first security device is obtained from the digital certificate of the first security device.
Example four
The method provided in this embodiment corresponds to the method provided in the second embodiment, where the second embodiment is a data processing method on the first security device side, and the present embodiment is a data processing method on the second security device side corresponding to the second embodiment. When the first security device performs signature processing, two implementation methods may be adopted, that is, the ciphertext of the session key may be signed, and the session key may also be signed to obtain signature data.
Fig. 4A is a flowchart illustrating a data processing method for voice call according to a fourth embodiment of the present invention. The method shown in fig. 4A includes:
step 4A1, a second security chip of a second security device acquires a digital certificate of a first security device, wherein the second security device is independent of the second communication terminal, the second security device is connected with the second communication terminal through a second communication interface, and the first security device is a security device of a first communication terminal which performs voice communication with the second communication terminal;
step 4A2, the second security chip receives the cipher text and the signature data of the call key sent by the second call terminal through the second communication interface; the signature data is obtained by carrying out signature processing on a ciphertext of the call key;
the cryptograph and the signature data of the call key are received by the second call terminal from the first call terminal through the communication network, and the cryptograph and the signature data of the call key received by the first call terminal are obtained from the first safety device through the first communication interface.
Step 4A3, after the second security chip obtains the digital certificate of the first security device, the second security chip verifies the signature data by using the public key of the first security device, and if the signature data passes the verification, the second security chip decrypts the ciphertext of the call key by using the private key of the second security device to obtain the call key; and starting the encryption and decryption operation of the voice call of the second call terminal by using the call key;
step 4A4, after the second security chip obtains the digital certificate of the first security device, the second security chip verifies the digital certificate of the first security device by using the root certificate, if the digital certificate of the first security device is verified to pass, the second security device outputs the identification information of the digital certificate of the first security device and prompts to confirm the identification information of the digital certificate of the first security device;
wherein the prompting of the second security device to confirm the identification information of the digital certificate of the first security device comprises: the second safety equipment prompts whether the identification information of the digital certificate of the first safety equipment is consistent with the identity of the user of the first communication terminal or not to be confirmed;
and 4A5, after the second confirmation instruction is obtained, the second security chip continuously performs encryption and decryption operations on the voice call of the second call terminal by using the call key.
The second confirmation instruction is an instruction for confirming that the identification information of the digital certificate of the first safety device is consistent with the identity of the user of the first communication terminal.
The user of the second communication terminal can input a second confirmation instruction on the second communication terminal, and can also input the second confirmation instruction on the second safety device. And the user of the second communication terminal inputs a second confirmation instruction on the second safety device, so that the attack of malicious software on the second communication terminal is reduced, and the voice communication safety is ensured.
The operations of step 4A3 and step 4a4 have no obvious precedence in the execution sequence, and can be executed simultaneously, for example, if the second security device supports a multithreading function, the second security device can complete the operations of step 4A3 and step 4a4 simultaneously; or may be performed sequentially, e.g., first performing step 4A3, then performing step 4a 4; alternatively, step 4a4 is performed first, followed by step 4 A3.
Wherein the public key of the first security device is obtained from the digital certificate of the first security device.
Fig. 4B is another schematic flow chart of a data processing method for voice call according to a fourth embodiment of the present invention. The method shown in fig. 4B includes:
step 4B1, a second security chip of a second security device acquires a digital certificate of a first security device, wherein the second security device is independent of the second communication terminal, the second security device is connected with the second communication terminal through a second communication interface, and the first security device is a security device of a first communication terminal performing voice communication with the second communication terminal;
step 4B2, the second security chip receives the cipher text and the signature data of the call key sent by the second call terminal through the second communication interface; the signature data is obtained by carrying out signature processing on the call key;
the cryptograph and the signature data of the call key are received by the second call terminal from the first call terminal through the communication network, and the cryptograph and the signature data of the call key received by the first call terminal are obtained from the first safety device through the first communication interface.
Step 4B3, after the second security chip acquires the digital certificate of the first security device, the second security chip decrypts the ciphertext of the call key by using the private key of the second security device to obtain the call key; verifying the signature data by using a public key of the first safety equipment, and if the signature data passes the verification, starting encryption and decryption operations on the voice call of the second call terminal by using a call key;
step 4B4, after the second security chip obtains the digital certificate of the first security device, the second security chip verifies the digital certificate of the first security device by using the root certificate, and if the digital certificate of the first security device is verified to pass, the second security device outputs the identification information of the digital certificate of the first security device and prompts to confirm the identification information of the digital certificate of the first security device;
wherein the prompting of the second security device to confirm the identification information of the digital certificate of the first security device comprises: the second safety equipment prompts whether the identification information of the digital certificate of the first safety equipment is consistent with the identity of the user of the first communication terminal or not to be confirmed;
and 4B5, after the second confirmation instruction is obtained, the second security chip continues to perform encryption and decryption operations on the voice call of the second call terminal by using the call key.
The second confirmation instruction is an instruction for confirming that the identification information of the digital certificate of the first safety device is consistent with the identity of the user of the first communication terminal.
The user of the second communication terminal can input a second confirmation instruction on the second communication terminal, and can also input the second confirmation instruction on the second safety device. And the user of the second communication terminal inputs a second confirmation instruction on the second safety device, so that the attack of malicious software on the second communication terminal is reduced, and the voice communication safety is ensured.
The operations in step 4B3 and step 4B4 are not in obvious precedence in execution sequence, and may be executed simultaneously, for example, if the second security device supports a multithread processing function, the second security device may complete the operations in step 4B3 and step 4B4 simultaneously; or may be performed sequentially, e.g., first performing step 4B3, then performing step 4B 4; alternatively, step 4B4 is performed first, followed by step 4B 3.
Wherein the public key of the first security device is obtained from the digital certificate of the first security device.
The method shown in fig. 4A is different from the method shown in fig. 4B in that the processing flow of the signature data is different, in the method shown in fig. 4A, the second secure device performs corresponding processing on the signature data obtained by signing the ciphertext of the session key based on the first secure device, and in the method shown in fig. 4B, the second secure device performs corresponding processing on the signature data obtained by signing the session key based on the first secure device.
In the third and fourth embodiments, after prompting to confirm the identification information of the digital certificate of the first security device, if the user confirms that the identification information of the digital certificate of the first security device is consistent with the identity of the first communication terminal, the user inputs a second confirmation instruction on the second security device or the second communication terminal.
The mode for the second secure chip to obtain the second confirmation instruction includes: the second security chip receives a second confirmation instruction sent by the second communication terminal through the second communication interface; or the second security chip receives a second confirmation instruction sent by a confirmation key on the second security device.
The second security chip receives a second confirmation instruction sent by the confirmation key on the second security device, attack of malicious software on the second communication terminal can be reduced, and voice communication security is guaranteed.
The above description has been made on the methods of the third embodiment and the fourth embodiment each having different characteristics from each other, and the following description is made on the same characteristics as the methods of the third embodiment and the fourth embodiment, i.e., the following characteristics are applied to the methods of the third embodiment and the fourth embodiment:
firstly, a second safety device and a second communication terminal are explained:
the second security device may be a wearable device such as smart glasses, smart watches, an earphone device, or integrated in the wearable device. Of course, the second security device may also be an intelligent Key device capable of communicating with the call terminal, such as an intelligent Key device USB Key with a USB interface, an intelligent Key device supporting an audio interface, an intelligent Key device with a bluetooth communication function, or integrated in an intelligent Key device capable of communicating with the call terminal; i.e. the second security device is a separate device from the second telephony terminal and is not integrated in the second telephony terminal.
The second communication interface may be a wireless connection interface or a wired connection interface. If the second communication interface is a wireless connection interface, a wireless communication module, which can be a Wi-Fi module, a Wi-FiDirect module, an NFC module, a Bluetooth module or an infrared module, is arranged in the second safety device, for example, the second safety device is a Bluetooth headset; if the second communication interface is a wired connection interface, the second safety device may have a data transmission line, and an interface of the data transmission line may be an audio interface or a USB interface, for example, the second safety device is a line control earphone. Of course, the second safety device may also have two functions of wireless connection and wired connection, that is, the second safety device has a wireless communication module therein and is externally connected with a data transmission line.
If the second safety equipment is internally provided with a wireless communication module, the second safety equipment can be connected with a second communication terminal through wireless connection; if the second communication interface is a wired connection interface, the second security device may be connected to the second communication terminal through a wired connection.
The second communication terminal is a terminal with voice communication capability, and may be a traditional communication device, such as a fixed phone and a mobile phone, or a terminal with a network telephone function, such as a PC, a notebook computer, a tablet computer, and the like.
Secondly, explaining the call key:
the cipher text of the call key received by the second safety device is encrypted by using the public key of the second safety device, so that the cipher text of the call key can only be decrypted by the private key of the second safety device, and the safety of the call key is ensured. The signature data received by the second safety device is obtained by performing signature processing on the call key or the ciphertext of the call key, and the second safety device verifies the signature data to ensure whether the source of the signature data is the first safety device.
For the session key used by the second security device, after the second security chip in the second security device obtains the session key, the session key can be used to ensure the security of the voice call between the first security device and the second security device, which is equivalent to establishing a voice encryption channel between the first security device and the second security device based on the voice call in the prior art.
The voice encryption channel provided by the invention is a channel established between the first security device and the second security device, namely for the first security device, the voice encryption channel sequentially passes through the second security device, the second communication device, the first communication device and the first security device. Therefore, the voice encryption channel is established between the safety devices, so that the first communication terminal and the second communication terminal play a role in data transmission in the whole process from the establishment of the communication to the termination of the communication, the possibility of malicious software attack on the communication terminals is reduced, and the safety of data transmission is improved.
And after detecting that the voice call of the user of the second call terminal is finished, the second security chip deletes the call key.
After the call is finished, the second security chip destroys the call key used by the voice call, so that the possibility that the call key is unreasonably utilized after being stolen can be reduced, the operation security of the second security chip is ensured, and the storage space of the second security chip is effectively utilized.
The encryption and decryption operation of the voice call of the second call terminal is started by using the call key, and the encryption and decryption operation can be started when the user of the first call terminal and the user of the second call terminal start the voice call, and also can be started in the process of the voice call between the user of the first call terminal and the user of the second call terminal.
Thirdly, explaining a mode of acquiring the digital certificate of the first security device:
in the first mode, the second security chip acquires the digital certificate of the first security device from the pre-stored digital certificate;
the second security device may store digital certificates of one or more security devices in advance, and may search the digital certificate of the first security device according to the identifier of the first security device; and because the digital certificate is pre-stored in the second security device and is not directly acquired from the outside, the possibility of tampering the digital certificate is reduced.
In the second mode, the second security chip receives the digital certificate of the first security device sent by the second communication terminal through the second communication interface.
When the second secure chip obtains the digital certificate of the first secure device from the outside, the following method may be further implemented, including:
b1, the second communication terminal acquires the digital certificate of the first safety equipment from the digital certificate center and sends the acquired digital certificate of the first safety equipment to the second safety equipment through the second communication interface;
and B2, the first security device sends the digital certificate of the first security device to the first call terminal, the first call terminal sends the digital certificate of the first security device to the second call terminal, and the second call terminal sends the digital certificate of the first security device to the second security device through the second communication interface after receiving the digital certificate of the first security device.
In the mode B2, the trigger condition for the first security device to send the digital certificate of the first security device to the first call terminal may be initiated by the first security device actively, or initiated by the first security device after receiving the certificate acquisition request sent by the second security device.
In the method B1 and the method B2, the digital certificate of the first security device can be obtained in two ways, but in comparison, the digital certificate of the first security device is obtained from the digital certificate center by the second session terminal in the method B1, because the source of the digital certificate is reliable, and the possibility that an attacker who monitors the session modifies the digital certificate is low, the possibility that the digital certificate is tampered is reduced, and the security that the second session terminal obtains the digital certificate of the first security device from the outside is ensured.
Fourthly, the identification information of the digital certificate of the first safety equipment is output and the confirmation of the identification information of the digital certificate of the first safety equipment is prompted, and the following steps are carried out:
the second security device outputting the identification information of the digital certificate of the first security device includes:
in the first mode, the second security device converts the identification information of the digital certificate of the first security device into sound information to obtain the sound information of the identification information of the digital certificate of the first security device, and plays the sound information of the identification information of the digital certificate of the first security device;
the sound information of the identification information of the digital certificate of the first security device can be played through a module with a playing function of the second security device, for example, the module with the playing function can be a speaker or a loudspeaker; and playing can be carried out through a module with a playing function of the second communication terminal.
In a second manner, the second security device displays the identification information of the digital certificate of the first security device.
The identification information of the digital certificate of the first security device may be displayed by a module with a display function of the second security device, for example, the module with the display function may be a display screen; and the display can be carried out through a module with a display function of the second communication terminal.
Compared with the mode of outputting the identification information of the digital certificate of the first safety equipment on the second communication terminal, the mode of outputting the identification information of the digital certificate of the first safety equipment through the second safety equipment can reduce the possibility of malicious software attack on the second communication terminal and improve the safety of data transmission.
The second security device prompts confirmation of the identification information of the digital certificate of the first security device, the prompt information can be played through a module with a playing function on the second security device to prompt confirmation of the identification information of the digital certificate of the first security device, and the prompt information can also be displayed through a module with a display function on the second security device to prompt confirmation of the identification information of the digital certificate of the first security device.
In addition, the prompt information can be played through a module with a playing function on the second communication terminal, or the prompt information can be displayed through a module with a displaying function on the second communication terminal, so that the function of confirming the identification information of the digital certificate of the first safety device is prompted.
Compared with the mode of prompting the second communication terminal to confirm the identification information of the digital certificate of the first safety equipment, the mode of prompting the second safety equipment to confirm the identification information of the digital certificate of the first safety equipment can reduce the possibility of malicious software attack on the second communication terminal and improve the safety of data transmission.
Here, the prompt information for confirming the identification information of the digital certificate of the first secure device and the identification information of the digital certificate of the first secure device may be output together, for example, to output "please confirm the identification information XXX of the digital certificate of the first secure device", where XXX represents the content of the identification information of the digital certificate of the first secure device. The output mode can adopt a playing mode or a display mode.
Of course, the prompt information for confirming the identification information of the digital certificate of the first security device may be output separately from the identification information of the digital certificate of the first security device, for example, first output information "please confirm the identification information of the digital certificate of the first security device" and then output information "the identification information of the digital certificate of the first security device is XXX", or first output information "the identification information of the digital certificate of the first security device is XXX" and then output information "please confirm the identification information of the digital certificate of the first security device". The output modes of the two pieces of information can be output in a playing mode or a display mode, and the output modes of the two pieces of information can be the same or different.
Fifthly, explaining the private key of the second security device and the identification information of the digital certificate of the first security device:
the private key of the second secure device is generated by the second secure chip internally to the second secure chip.
For the private key in the second secure device, the management mode of the private key in the prior art is generated from the outside and then imported into the second secure device, which is called a "ground mode", and the above mode is easy for hackers to intercept the private key before the private key is imported into the second secure device, so the management mode of the private key in the prior art has a certain security risk, and therefore, the private key used in the present invention is generated inside the second secure chip in the second secure device, that is, the generation environment of the private key is in the second secure device, that is, the generation program of the public-private key pair is directly burned in the second secure chip by developers, and the public key cryptographic algorithm program is also burned in the second secure chip. After the public and private keys are generated, the private key is stored in a key area in the second security chip and is not allowed to be accessed externally. And when the public and private key pair in the key area is used for carrying out digital signature and asymmetric decryption operation, the private key is called inside the second security chip to execute operation. Since the use of the private key is called by the second security chip, the private key does not leave the second security device in the whole process of generating and using the private key, which is called as a mode of 'no landing', so a hacker has no opportunity to intercept the private key, thereby ensuring the security of the private key.
The identification information of the digital certificate of the first safety equipment is at least one of name information, contact information and identity information of a digital certificate holder of the first safety equipment; the name information can be name, network name, pen name, etc., the contact mode can be mobile phone number, electronic mail box, and the identity information can be ID card number, employee's card number, passport number.
Sixth, the digital certificate for verifying the first security device using the root certificate is explained:
the root certificate is a certificate issued by the CA certificate authority to itself and is the starting point of the chain of trust. The digital certificate of the security device is issued by the CA certificate authority, and the root certificate of the CA certificate authority is stored in the security device. For example, the digital certificates of the first security device and the second security device are issued by the CA certificate authority, and the root certificate of the CA certificate authority is stored in each of the first security device and the second security device.
The root certificate of the CA certification center is used for authenticating the digital certificate issued by the CA certification center for the safety equipment so as to judge whether a certain digital certificate is a legal certificate issued by the CA certification center; for example, when the second security device obtains the digital certificate of the first security device, the digital certificate of the first security device is verified by using the root certificate issued by the CA certificate authority, and if the digital certificate of the first security device is verified to pass, it indicates that the digital certificate of the first security device is a legal certificate issued by the CA certificate authority; otherwise, the digital certificate indicating the first secure device is not a legal certificate issued by the CA certificate authority.
The digital certificate issued by the CA at least comprises three parts of information, namely the information of the user, the public key of the user and the signature of the CA certification center on the information in the digital certificate. The authenticity of the digital certificate can be verified by verifying the signature of the CA authentication center in the digital certificate on the information in the digital certificate. When the signature of the information in the digital certificate is verified by the CA certificate authority, the verification is completed by using the public key of the CA certificate authority, and the public key of the CA certificate authority is stored in the root certificate of the CA certificate authority, so that the root certificate needs to be stored in the security equipment in advance to realize the authentication of the digital certificate issued by the CA certificate authority to the security equipment.
For example, in the third and fourth embodiments, in order to verify whether the digital certificate of the first security device is legal, the second security device needs to store in advance a root certificate of a CA certificate authority that issues digital certificates for the first security device and the second security device.
In addition, the third and fourth embodiments of the present invention describe a processing flow when the digital certificate of the first security device is verified to pass and the second confirmation instruction is obtained, and of course, the third and fourth embodiments of the present invention further provide a processing manner in the following scenario:
if the digital certificate of the first safety equipment is verified to be not passed, the second safety equipment outputs prompt information that the verification is not passed so that a user of the second communication terminal can finish the voice call on the second communication terminal or the second safety equipment;
after the prompt is made to confirm the identification information of the digital certificate of the first safety device, if the identification information of the digital certificate of the first safety device is inconsistent with the identity of the user of the first call terminal, the second call terminal or the second safety device receives an instruction for ending the voice call.
The third embodiment and the fourth embodiment of the present invention are further described below by taking an application scenario as an example:
the third embodiment of the present invention and the fourth embodiment of the present invention are different in signature object, and the description is given by taking the ciphertext of the signature object as the session key in the third embodiment as an example:
when the call terminal A and the call terminal B carry out voice call, the call terminal A is connected with the safety equipment A through the first communication interface, and the call terminal B is connected with the safety equipment B through the second communication interface. The method comprises the steps that a security device A generates a call key, the public key of the security device B is used for encrypting the call key to obtain a ciphertext AB of the call key, the private key of the security device A is used for signing the ciphertext AB of the call key to obtain signature data AB, and the security device A sends the ciphertext AB of the call key and the signature data AB to the security device B; and after the security device B receives the ciphertext AB and the signature data AB of the call key, verifying the signature data AB by using the public key of the security device A, and if the verification is passed, decrypting the ciphertext AB of the call key by using the private key of the security device B to obtain the call key, thereby realizing the operation of encrypting and decrypting the voice call of the security device A and the security device B by using the call key.
When a third person exists in the call process of the call terminal a and the call terminal B, wherein the call terminal of the third person is a call terminal C, and the security device of the call terminal C is a security device C, the voice call process is as follows:
the method comprises the steps that a security device A generates a call key, the public key of the security device C is used for encrypting the call key to obtain a ciphertext AC of the call key, the private key of the security device A is used for signing the ciphertext AC of the call key to obtain signature data AC, and the security device A sends the ciphertext AC of the call key and the signature data AC to the security device C; and after receiving the ciphertext AC and the signature data AC of the call key, the security device C verifies the signature data AC by using the public key of the security device A, and if the verification is passed, the security device C decrypts the ciphertext AC of the call key by using the private key of the security device C to obtain the call key.
The safety device C encrypts the call key by using the public key of the safety device B to obtain a ciphertext CB of the call key, signs the ciphertext CB of the call key by using the private key of the safety device C to obtain signature data CB, and sends the ciphertext CB of the call key and the signature data CB to the safety device B; and after the security device B receives the ciphertext CB of the call key and the signature data CB, the public key of the security device C is used for verifying the signature data CB, and if the verification is passed, the private key of the security device B is used for decrypting the ciphertext CB of the call key to obtain the call key.
Therefore, when a third person exists in the conversation process of the conversation terminal a and the conversation terminal B, the security device a and the security device B can still perform encryption and decryption operations on respective voice conversations by using the conversation key, but at the moment, the conversation of the conversation terminal a and the conversation terminal B is monitored by the third person.
Based on the above problems, the methods provided in the third and fourth embodiments of the present invention introduce the technical features of "verifying the digital certificate by using the root certificate" and "outputting the identification information of the digital certificate", so that the methods provided in the third and fourth embodiments of the present invention can solve the above problems, which are specifically described as follows:
the second safety device verifies the digital certificate of the first safety device by using the root certificate;
if the verification is not passed, the digital certificate of the first safety equipment can be confirmed not to be a legal certificate issued by a CA certificate authority; at this moment, the second safety device sends out alarm prompt information to prompt the user in order to ensure the transmission safety of the call key, so that the user can take safety measures in time.
If the verification is passed, the digital certificate of the first security device can be confirmed to be a legal certificate issued by a CA (certificate authority); however, the second security device still cannot determine whether the holder of the certificate passing the verification is the user of the first call terminal, so that the identification information of the digital certificate of the first security device needs to be output, and the identification information of the digital certificate of the first security device needs to be prompted to be confirmed; otherwise, the holder of the digital certificate of the first safety device is not the user of the first call terminal, that is, the holder of the digital certificate of the first safety device is the third person, so that the purpose of identifying whether the third person exists in the voice call is achieved.
The method comprising the above technical features is further explained by taking the above listed application scenarios as examples:
before the security device A encrypts the call key and signs the encrypted call key, the security device A verifies the digital certificate of the security device C by using the root certificate, if the verification is passed, the identification information of the digital certificate of the security device C is output, and the identification information of the digital certificate of the security device C is prompted to be confirmed, the user of the first call terminal can judge that the holder of the digital certificate of the security device C is not the user of the second call terminal according to the identification information of the digital certificate of the security device C, and therefore the situation that third person monitoring exists in the call of the call terminal A and the call terminal B can be judged.
Similarly, before the security device B decrypts the received cipher text of the session key and verifies the signature data, the security device B verifies the digital certificate of the security device C by using the root certificate, if the verification is passed, the identification information of the digital certificate of the security device C is output, and the identification information of the digital certificate of the security device C is prompted to be confirmed, and the user of the second session terminal can judge that the holder of the digital certificate of the security device C is not the user of the first session terminal according to the identification information of the digital certificate of the security device C, so that the situation that a third person monitors the session between the session terminal a and the session terminal B can be judged.
The method of the fourth embodiment is similar to the method of the third embodiment, and the technical effects of the method of the third embodiment can be achieved, and are not described herein again.
In the methods provided in the third and fourth embodiments of the present invention, the ciphertext of the session key received by the second security device is encrypted by using the public key of the second security device, and thus, the ciphertext of the session key can only be decrypted by the private key of the second security device, so that the ciphertext of the session key can only be decrypted by the second security device, thereby ensuring the security of the session key; the signature data received by the second safety device is obtained by performing signature processing on the call key or the ciphertext of the call key, and the second safety device verifies the signature data to ensure whether the source of the signature data is the first safety device. In addition, the second safety equipment verifies the digital certificate of the first safety equipment, after the verification is passed, the identification information of the digital certificate of the first safety equipment is output, the identification of the holder of the digital certificate of the first safety equipment is realized, so that a user of the second communication terminal can determine whether the call is monitored by a person, the success rate of identifying the monitoring of a third person in the voice call is improved, the possibility of monitoring the voice call is reduced, and when the user determines that the third person is monitored in the voice call, the user can take a monitoring-prevention safety measure in time to prevent information leakage, and the safety of data transmission in the voice call is improved.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and alternate implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made in the above embodiments by those of ordinary skill in the art without departing from the principle and spirit of the present invention. The scope of the invention is defined by the appended claims and equivalents thereof.

Claims (22)

1. A data processing method for voice call is characterized in that the method comprises the following steps:
a first security chip of first security equipment acquires a digital certificate of second security equipment, wherein the first security equipment is independent of a first call terminal and is connected with the first call terminal through a first communication interface, and the second security equipment is security equipment of a second call terminal which performs voice call with the first call terminal;
after the first security chip acquires the digital certificate of the second security device, the first security chip encrypts the call key generated by the first security chip by using the public key of the second security device to obtain a ciphertext of the call key, and performs signature processing on the ciphertext of the call key or the call key by using the private key of the first security device to obtain signature data, wherein the public key of the second security device is acquired from the digital certificate of the second security device; the first safety equipment sends the ciphertext of the call key and the signature data to the first call terminal through the first communication interface;
after the first security chip acquires the digital certificate of the second security device, the first security chip verifies the digital certificate of the second security device by using a root certificate, if the verification is passed, the first security device outputs the identification information of the digital certificate of the second security device and prompts to confirm the identification information of the digital certificate of the second security device;
and after the first confirmation instruction is obtained, the first security chip starts the encryption and decryption operation of the voice call of the first call terminal by using the call key.
2. A data processing method for voice call is characterized in that the method comprises the following steps:
a first security chip of first security equipment starts encryption and decryption operations on voice calls of a first call terminal by using a call key generated by the first security chip;
the first security chip acquires a digital certificate of second security equipment, wherein the first security equipment is independent of the first call terminal, the first security equipment is connected with the first call terminal through a first communication interface, and the second security equipment is the security equipment of the second call terminal which performs voice call with the first call terminal;
after the first security chip acquires the digital certificate of the second security device, the first security chip encrypts the call key by using the public key of the second security device to obtain a ciphertext of the call key, and performs signature processing on the ciphertext of the call key or the call key by using the private key of the first security device to obtain signature data, wherein the public key of the second security device is acquired from the digital certificate of the second security device; the first safety equipment sends the ciphertext of the call key and the signature data to the first call terminal through the first communication interface;
after the first security chip acquires the digital certificate of the second security device, the first security chip verifies the digital certificate of the second security device by using a root certificate, if the verification is passed, the first security device outputs the identification information of the digital certificate of the second security device and prompts to confirm the identification information of the digital certificate of the second security device;
and after the first confirmation instruction is obtained, the first security chip utilizes the call key to continue encryption and decryption operations on the voice call of the first call terminal.
3. The method of claim 1 or 2, wherein the first security device prompting confirmation of identification information of the digital certificate of the second security device comprises:
the first safety equipment prompts whether the identification information of the digital certificate of the second safety equipment is consistent with the identity of the user of the second communication terminal or not to be confirmed;
the first confirmation instruction is an instruction for confirming that the identification information of the digital certificate of the second safety equipment is consistent with the identity of the user of the second communication terminal.
4. The method according to claim 1 or 2, wherein the first secure chip obtains the digital certificate of the second secure device, including:
the first security chip acquires the digital certificate of the second security device from the pre-stored digital certificate; alternatively, the first and second electrodes may be,
and the first security chip receives the digital certificate of the second security device sent by the first call terminal through the first communication interface.
5. The method of claim 3, wherein the first security chip obtaining the digital certificate of the second security device comprises:
the first security chip acquires the digital certificate of the second security device from the pre-stored digital certificate; alternatively, the first and second electrodes may be,
and the first security chip receives the digital certificate of the second security device sent by the first call terminal through the first communication interface.
6. The method of claim 1, 2 or 5, wherein the first security device outputting the identification information of the digital certificate of the second security device comprises:
the first safety equipment converts the identification information of the digital certificate of the second safety equipment into sound information to obtain the sound information of the identification information of the digital certificate of the second safety equipment, and plays the sound information of the identification information of the digital certificate of the second safety equipment; alternatively, the first and second electrodes may be,
the first security device displays identification information of a digital certificate of the second security device.
7. The method of claim 3, wherein the first security device outputting the identification information of the digital certificate of the second security device comprises:
the first safety equipment converts the identification information of the digital certificate of the second safety equipment into sound information to obtain the sound information of the identification information of the digital certificate of the second safety equipment, and plays the sound information of the identification information of the digital certificate of the second safety equipment; alternatively, the first and second electrodes may be,
the first security device displays identification information of a digital certificate of the second security device.
8. The method of claim 4, wherein the first security device outputting the identification information of the digital certificate of the second security device comprises:
the first safety equipment converts the identification information of the digital certificate of the second safety equipment into sound information to obtain the sound information of the identification information of the digital certificate of the second safety equipment, and plays the sound information of the identification information of the digital certificate of the second safety equipment; alternatively, the first and second electrodes may be,
the first security device displays identification information of a digital certificate of the second security device.
9. The method of claim 1, 2, 5, 7 or 8, further comprising:
and if the first security chip detects that the voice call of the first call terminal is ended, the first security chip deletes the call key.
10. The method of claim 1, 2, 5, 7 or 8, wherein the private key of the first secure device is generated by the first secure chip internally to the first secure chip.
11. A data processing method for voice call is characterized in that the method comprises the following steps:
a second security chip of a second security device acquires a digital certificate of a first security device, wherein the second security device is independent of a second communication terminal and is connected with the second communication terminal through a second communication interface, and the first security device is a security device of a first communication terminal which performs voice communication with the second communication terminal;
the second security chip receives the cipher text and the signature data of the call key sent by the second call terminal through the second communication interface; the signature data is obtained by performing signature processing on the ciphertext of the call key;
after the second security chip acquires the digital certificate of the first security device, the second security chip verifies the signature data by using the public key of the first security device, and if the signature data is verified, the cipher text of the call key is decrypted by using the private key of the second security device to obtain the call key, wherein the public key of the first security device is acquired from the digital certificate of the first security device;
after the second security chip acquires the digital certificate of the first security device, the second security chip verifies the digital certificate of the first security device by using a root certificate, and if the digital certificate of the first security device passes the verification, the second security device outputs the identification information of the digital certificate of the first security device and prompts the identification information of the digital certificate of the first security device to be confirmed;
and after a second confirmation instruction is obtained, the second security chip starts the encryption and decryption operation of the voice call of the second call terminal by using the call key.
12. A data processing method for voice call is characterized in that the method comprises the following steps:
a second security chip of a second security device acquires a digital certificate of a first security device, wherein the second security device is independent of a second communication terminal and is connected with the second communication terminal through a second communication interface, and the first security device is a security device of a first communication terminal which performs voice communication with the second communication terminal;
the second security chip receives the cipher text and the signature data of the call key sent by the second call terminal through the second communication interface; the signature data is obtained by performing signature processing on the call key;
after the second security chip acquires the digital certificate of the first security device, the second security chip decrypts the ciphertext of the call key by using the private key of the second security device to obtain the call key; verifying the signature data by using a public key of the first security device, wherein the public key of the first security device is obtained from a digital certificate of the first security device;
after the second security chip acquires the digital certificate of the first security device, the second security chip verifies the digital certificate of the first security device by using a root certificate, and if the digital certificate of the first security device passes the verification, the second security device outputs the identification information of the digital certificate of the first security device and prompts the identification information of the digital certificate of the first security device to be confirmed;
and after the signature data is verified to pass and a second confirmation instruction is obtained, the second security chip starts the encryption and decryption operation of the voice call of the second call terminal by using the call key.
13. A data processing method for voice call is characterized in that the method comprises the following steps:
a second security chip of a second security device acquires a digital certificate of a first security device, wherein the second security device is independent of a second communication terminal and is connected with the second communication terminal through a second communication interface, and the first security device is a security device of a first communication terminal which performs voice communication with the second communication terminal;
the second security chip receives the cipher text and the signature data of the call key sent by the second call terminal through the second communication interface; the signature data is obtained by performing signature processing on the ciphertext of the call key;
after the second security chip acquires the digital certificate of the first security device, the second security chip verifies the signature data by using the public key of the first security device, and if the signature data is verified, the cipher text of the call key is decrypted by using the private key of the second security device to obtain the call key, wherein the public key of the first security device is acquired from the digital certificate of the first security device; and starting the encryption and decryption operation of the voice call of the second call terminal by using the call key;
after the second security chip acquires the digital certificate of the first security device, the second security chip verifies the digital certificate of the first security device by using a root certificate, and if the digital certificate of the first security device passes the verification, the second security device outputs the identification information of the digital certificate of the first security device and prompts the identification information of the digital certificate of the first security device to be confirmed;
and after a second confirmation instruction is obtained, the second security chip utilizes the call key to continue to carry out encryption and decryption operations on the voice call of the second call terminal.
14. A data processing method for voice call is characterized in that the method comprises the following steps:
a second security chip of a second security device acquires a digital certificate of a first security device, wherein the second security device is independent of a second communication terminal and is connected with the second communication terminal through a second communication interface, and the first security device is a security device of a first communication terminal which performs voice communication with the second communication terminal;
the second security chip receives the cipher text and the signature data of the call key sent by the second call terminal through the second communication interface; the signature data is obtained by performing signature processing on the call key;
after the second security chip acquires the digital certificate of the first security device, the second security chip decrypts the ciphertext of the call key by using the private key of the second security device to obtain the call key; verifying the signature data by using the public key of the first safety equipment, and if the signature data passes the verification, starting encryption and decryption operations on the voice call of the second communication terminal by using the call key, wherein the public key of the first safety equipment is obtained from the digital certificate of the first safety equipment;
after the second security chip acquires the digital certificate of the first security device, the second security chip verifies the digital certificate of the first security device by using a root certificate, and if the digital certificate of the first security device passes the verification, the second security device outputs the identification information of the digital certificate of the first security device and prompts to confirm the identification information of the digital certificate of the first security device;
and after a second confirmation instruction is obtained, the second security chip utilizes the call key to continue to carry out encryption and decryption operations on the voice call of the second call terminal.
15. The method of any of claims 11 to 14, wherein the prompting by the second security device to confirm identification information of the digital certificate of the first security device comprises:
the second safety equipment prompts to confirm whether the identification information of the digital certificate of the first safety equipment is consistent with the identity of the user of the first call terminal;
the second confirmation instruction is an instruction for confirming that the identification information of the digital certificate of the first safety device is consistent with the identity of the user of the first communication terminal.
16. The method according to any one of claims 11 to 14, wherein the second secure chip obtaining the digital certificate of the first secure device comprises:
the second security chip acquires the digital certificate of the first security device from the pre-stored digital certificate; alternatively, the first and second electrodes may be,
and the second security chip receives the digital certificate of the first security device sent by the second communication terminal through a second communication interface.
17. The method of claim 15, wherein the second security chip obtaining the digital certificate of the first security device comprises:
the second security chip acquires the digital certificate of the first security device from the pre-stored digital certificate; alternatively, the first and second electrodes may be,
and the second security chip receives the digital certificate of the first security device sent by the second communication terminal through a second communication interface.
18. The method according to any one of claims 11 to 14 and 17, wherein the second security device outputting the identification information of the digital certificate of the first security device comprises:
the second security device converts the identification information of the digital certificate of the first security device into sound information to obtain the sound information of the identification information of the digital certificate of the first security device, and plays the sound information of the identification information of the digital certificate of the first security device; alternatively, the first and second electrodes may be,
the second security device displays identification information of the digital certificate of the first security device.
19. The method of claim 15, wherein the second security device outputting the identification information of the digital certificate of the first security device comprises:
the second security device converts the identification information of the digital certificate of the first security device into sound information to obtain the sound information of the identification information of the digital certificate of the first security device, and plays the sound information of the identification information of the digital certificate of the first security device; alternatively, the first and second electrodes may be,
the second security device displays identification information of the digital certificate of the first security device.
20. The method of claim 16, wherein the second security device outputting the identification information of the digital certificate of the first security device comprises:
the second security device converts the identification information of the digital certificate of the first security device into sound information to obtain the sound information of the identification information of the digital certificate of the first security device, and plays the sound information of the identification information of the digital certificate of the first security device; alternatively, the first and second electrodes may be,
the second security device displays identification information of the digital certificate of the first security device.
21. The method of any of claims 11 to 14, 17, 19, 20, further comprising:
and if the second security chip detects that the voice call of the second call terminal is ended, the second security chip deletes the call key.
22. The method according to any one of claims 11 to 14, 17, 19, 20, wherein the private key of the second secure device is generated by the second secure chip internally to the second secure chip.
HK15100303.5A 2015-01-12 Data processing method for voice communication HK1199989B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410247840.8A CN104065649B (en) 2014-06-05 2014-06-05 A kind of data processing method of voice call

Publications (2)

Publication Number Publication Date
HK1199989A1 HK1199989A1 (en) 2015-07-24
HK1199989B true HK1199989B (en) 2018-05-11

Family

ID=

Similar Documents

Publication Publication Date Title
US10038676B2 (en) Call encryption systems and methods
CN110365484B (en) Data processing method, device and system for equipment authentication
CN106533687A (en) An identity authentication method and device
CN104065648B (en) A kind of data processing method of voice call
CN103973696B (en) A kind of data processing method of voice call
CN103974243B (en) A kind of data handling system of voice call
CN104065649B (en) A kind of data processing method of voice call
CN111064577A (en) Security authentication method and device and electronic equipment
CN104065650B (en) A kind of data handling system of voice call
CN104038932B (en) A kind of safety equipment
CN104080080B (en) A kind of data handling system of voice call
CN103974242B (en) A kind of data processing method of voice call
CN103986711B (en) A kind of data processing method of voice call
WO2015124798A2 (en) Method & system for enabling authenticated operation of a data processing device
CN104066080B (en) A kind of data processing method of voice call
CN104066081B (en) A kind of data handling system of voice call
HK1199989B (en) Data processing method for voice communication
CN103986712B (en) A kind of data processing method of voice call
TWI705347B (en) Identity authentication method and equipment
HK1200001B (en) Data processing method for voice communication
HK1199990B (en) Data processing method for voice communication
HK1200000B (en) Data processing method for voice communication
HK1199988B (en) Data processing method for voice communication
HK1199985B (en) Data processing method for voice communication
HK1199986B (en) Data processing method for voice communication