CN114978485B - Voice data transmission method, system, electronic equipment and storage medium - Google Patents
Voice data transmission method, system, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN114978485B CN114978485B CN202210425522.0A CN202210425522A CN114978485B CN 114978485 B CN114978485 B CN 114978485B CN 202210425522 A CN202210425522 A CN 202210425522A CN 114978485 B CN114978485 B CN 114978485B
- Authority
- CN
- China
- Prior art keywords
- voice
- sip message
- voice data
- quantum
- communication processor
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W80/00—Wireless network protocols or protocol adaptations to wireless operation
- H04W80/08—Upper layer protocols
- H04W80/10—Upper layer protocols adapted for application session management, e.g. SIP [Session Initiation Protocol]
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Theoretical Computer Science (AREA)
- Telephonic Communication Services (AREA)
Abstract
The disclosure provides a voice data transmission method, a voice data transmission system, electronic equipment and a storage medium, and relates to the technical field of mobile communication. The method comprises the following steps: the first application processor of the voice sending terminal obtains the quantum session key from the quantum key server and transmits the quantum session key to the first communication processor of the voice sending terminal; the first communication processor encrypts voice data using the quantum session key from the first application processor and transmits the encrypted voice data to the second communication processor of the voice receiving terminal. Another method comprises the following steps: the second application processor of the voice receiving terminal acquires the quantum session key from the quantum key server and transmits the quantum session key to the second communication processor; the second communication processor decrypts the received voice data using the quantum session key from the second application processor. The method and the device reduce the requirements on terminal hardware, reduce time delay caused by encryption and decryption, and improve the voice data transmission efficiency.
Description
Technical Field
The disclosure relates to the technical field of mobile communication, and in particular relates to a voice data transmission method, a voice data transmission system, electronic equipment and a storage medium.
Background
VoLTE (Voice over Long Term Evolution, long term evolution voice bearer) is a high-speed wireless communication standard. It may enable voice data to be transmitted in an LTE data bearer network based on an IMS (Internet Protocol Multimedia Subsystem ) network. While the VoLTE provides voice data transmission service, how to ensure the security of VoLTE voice data transmission is an urgent problem to be solved.
In the related art, voice data to be transmitted can be encrypted through a TF card, so that the safety of voice data transmission is ensured. Firstly, the method needs to add a TF (Transflash) card into the terminal. The CP (communication processor ) of the terminal may perform an encryption operation on the voice data through the TF card. The CP of the terminal may then transmit the encrypted voice data to another terminal. Correspondingly, the TF card can also decrypt the received voice data.
The method provided by the related art requires the configuration of the TF card in the terminal, so that the method has higher requirements on terminal hardware. In addition, encryption and decryption operations in the method are required to be executed by the TF card, voice data are required to be transmitted between the CP and the TF card of the terminal, so that time delay brought by encryption and decryption is large, and voice data transmission efficiency is low.
It should be noted that the information disclosed in the above background section is only for enhancing understanding of the background of the present disclosure and thus may include information that does not constitute prior art known to those of ordinary skill in the art.
Disclosure of Invention
The disclosure provides a voice data transmission method, a voice data transmission system, an electronic device and a storage medium, which at least overcome the problems of larger time delay and low voice data transmission efficiency caused by encryption and decryption in the related technology to a certain extent.
Other features and advantages of the present disclosure will be apparent from the following detailed description, or may be learned in part by the practice of the disclosure.
According to one aspect of the present disclosure, there is provided a voice data transmission comprising: a first application processor of a voice sending terminal acquires a quantum session key from a quantum key server and transmits the quantum session key to a first communication processor of the voice sending terminal; and in response to the voice data sending request, the first communication processor of the voice sending terminal encrypts voice data to be transmitted by utilizing the quantum session key from the first application processor, and transmits the encrypted voice data to the second communication processor of the voice receiving terminal.
In some embodiments of the present disclosure, the voice transmission terminal is a calling terminal, and before the first application processor of the voice transmission terminal obtains the quantum session key from the quantum key server, the method further includes: the first communication processor sends a first SIP (Session Initiation Protocol ) message to a voice receiving terminal, the first SIP message being used to establish a session channel between the voice sending terminal and the voice receiving terminal; the first communication processor receives a second SIP message returned by the voice receiving terminal, wherein the second SIP message is a message of the voice receiving terminal responding to the first SIP message.
In some embodiments of the present disclosure, the first SIP message includes a first encryption indication identifier and a session identifier that are added by an application server, where the first encryption indication identifier is used to instruct the voice receiving terminal to obtain a quantum session key that decrypts voice data, and the session identifier is used to instruct the quantum key server to match the quantum session key.
In some embodiments of the present disclosure, the second SIP message includes a second encryption indication identifier and a session identifier added by an application server, where the second encryption indication identifier is used to instruct the voice sending terminal to obtain a quantum session key for encrypting voice data;
The first application processor of the voice sending terminal obtains a quantum session key from a quantum key server, and the method comprises the following steps: the first communication processor identifies the second SIP message, and the first application processor sends a request carrying the session identifier to the quantum key server in response to the second encryption indication identifier carried in the second SIP message; the first application processor receives the quantum session key.
In some embodiments of the present disclosure, after the first communication processor receives the second SIP message returned by the voice receiving terminal, the voice data transmission method further includes: and the first communication processor receives a third SIP message returned by the voice receiving terminal, wherein the third SIP message is used for indicating that the voice receiving terminal responds successfully to the first SIP message.
In some embodiments of the present disclosure, the second communication processor for transmitting encrypted voice data to a voice receiving terminal includes: encapsulating the encrypted voice data based on the first communication processor to obtain an RTP (Real-time Transport Protocol ) message; and transmitting the RTP message to a second communication processor of the voice receiving terminal.
According to another aspect of the present disclosure, there is provided another voice data transmission method, including: the second application processor of the voice receiving terminal acquires a quantum session key from the quantum key server and transmits the quantum session key to the second communication processor of the voice receiving terminal; in response to a voice data reception request, a second communication processor of the voice reception terminal decrypts the received voice data using a quantum session key from the second application processor.
In some embodiments of the present disclosure, the voice receiving terminal is a called terminal, and before the second application processor of the voice receiving terminal obtains the quantum session key from the quantum key server, the voice data transmission method further includes: the second communication processor receives a first SIP message sent by a voice sending terminal, wherein the first SIP message is used for establishing a session channel between the voice sending terminal and the voice receiving terminal; the second communication processor returns a second SIP message based on the first SIP message, wherein the second SIP message is a message for the voice receiving terminal to respond to the first SIP message.
In some embodiments of the present disclosure, the first SIP message includes a first encryption indication identifier and a session identifier that are added by an application server, where the first encryption indication identifier is used to instruct the voice receiving terminal to obtain a quantum session key that decrypts voice data, and the session identifier is used to instruct the quantum key server to match the quantum session key;
The second application processor of the voice receiving terminal obtains a quantum session key from a quantum key server, including: the second communication processor identifies the first SIP message, and responds to the first SIP message carrying the first encryption indication identifier, and the second application processor sends a request carrying the session identifier to the quantum key server; the second application processor receives the quantum session key.
In some embodiments of the present disclosure, the second SIP message includes a second encryption indication identifier and a session identifier that are added by an application server, where the second encryption indication identifier is used to instruct the voice sending terminal to obtain a quantum session key that performs encryption processing on voice data.
In some embodiments of the present disclosure, after the second communication processor returns a second SIP message based on the first SIP message, the voice data transmission method further includes: and the second communication processor returns a third SIP message to the voice sending terminal, wherein the third SIP message is used for indicating that the voice receiving terminal responds successfully to the first SIP message.
In some embodiments of the present disclosure, the second communication processor of the voice receiving terminal decrypts the received voice data using the quantum session key from the second application processor, comprising: analyzing the RTP message based on the second communication processor to obtain the voice data; the second communication processor decrypts the voice data using the quantum session key.
In some embodiments of the present disclosure, after the second communication processor of the voice receiving terminal decrypts the received voice data using the quantum session key from the second application processor, the voice data transmission method further includes: the second communication processor decodes the obtained decryption result to obtain decoded voice data; and playing the decoded voice data.
According to yet another aspect of the present disclosure, there is provided a voice data transmission system, the system including: the system comprises a voice sending terminal, a voice receiving terminal and a quantum key server, wherein the voice sending terminal comprises a first application processor and a first communication processor, and the voice receiving terminal comprises a second application processor and a second communication processor;
the first application processor is used for acquiring a quantum session key from a quantum key server and transmitting the quantum session key to the first communication processor of the voice sending terminal;
the second application processor is configured to obtain the quantum session key from the quantum key server and transmit the quantum session key to the second communication processor;
The quantum key server is used for respectively sending the quantum session key to the first application processor and the second application processor;
the first communication processor is used for responding to a voice data sending request, encrypting voice data to be transmitted by utilizing a quantum session key from the first application processor, and transmitting the encrypted voice data to the second communication processor of the voice receiving terminal;
the second communication processor is used for decrypting the received voice data by utilizing the quantum session key from the second application processor in response to the voice data receiving request.
In some embodiments of the present disclosure, the voice transmitting terminal is a calling terminal, and the voice receiving terminal is a called terminal;
the first communication processor is further configured to send a first SIP message to the voice receiving terminal, where the first SIP message is used to establish a session channel between the voice sending terminal and the voice receiving terminal;
the second communication processor is further configured to receive a first SIP message sent by the voice sending terminal, where the first SIP message is used to establish a session channel between the voice sending terminal and the voice receiving terminal; returning a second SIP message based on the first SIP message, wherein the second SIP message is a message for responding to the first SIP message by the voice receiving terminal;
The first communication processor is further configured to receive a second SIP message returned by the voice receiving terminal, where the second SIP message is a message that the voice receiving terminal responds to the first SIP message.
In some embodiments of the present disclosure, the voice data transmission system further comprises: an application server;
the first communication processor is configured to send the first SIP message to an application server;
the application server is configured to add a first encryption indication identifier and a session identifier to the first SIP message, and forward the first SIP message carrying the first encryption indication identifier and the session identifier to the voice receiving terminal;
the second communication processor is used for receiving the first SIP message sent by the voice sending terminal; identifying the first SIP message, and sending a first instruction to the second application processor in response to the first SIP message carrying the first encryption indication identifier; returning a second SIP message based on the first SIP message, wherein the second SIP message is a message for responding to the first SIP message by the voice receiving terminal;
the application server is further configured to add a second encryption indication identifier and a session identifier to the second SIP message, and forward the second SIP message carrying the second encryption indication identifier and the session identifier to the voice sending terminal;
The first communication processor is configured to identify a second encryption indication identifier in the second SIP message; responding to the second encryption indication identifier carried in the second SIP message, and sending a second instruction to the first application processor;
the first application processor is configured to send a request carrying the session identifier to the quantum key server based on the second instruction;
the second application processor is used for sending a request carrying the session identifier to the quantum key server based on the first instruction;
the quantum key server is used for determining the quantum session key based on the session identifier and respectively sending the quantum session key to the first application processor and the second application processor.
According to still another aspect of the present disclosure, there is provided a voice data transmission apparatus including:
the first quantum session key acquisition module is used for acquiring a quantum session key from a quantum key server by a first application processor of the voice transmission terminal and transmitting the quantum session key to a first communication processor of the voice transmission terminal;
and the voice data encryption module is used for responding to a voice data sending request, the first communication processor of the voice sending terminal encrypts voice data to be transmitted by utilizing the quantum session key from the first application processor, and the encrypted voice data is transmitted to the second communication processor of the voice receiving terminal.
In some embodiments of the present disclosure, the voice data transmission module further includes:
a first sending module, configured to send a first SIP message to a voice receiving terminal by using the first communication processor, where the first SIP message is used to establish a session channel between the voice sending terminal and the voice receiving terminal;
and the second receiving module is used for receiving a second SIP message returned by the voice receiving terminal by the first communication processor, wherein the second SIP message is a message for responding to the first SIP message by the voice receiving terminal.
In some embodiments of the present disclosure, the first SIP message includes a first encryption indication identifier and a session identifier that are added by an application server, where the first encryption indication identifier is used to instruct the voice receiving terminal to obtain a quantum session key that decrypts voice data, and the session identifier is used to instruct the quantum key server to match the quantum session key.
In some embodiments of the present disclosure, the second SIP message includes a second encryption indication identifier and a session identifier added by an application server, where the second encryption indication identifier is used to instruct the voice sending terminal to obtain a quantum session key for encrypting voice data;
The first quantum session key acquisition module is used for identifying the second SIP message by the first communication processor, and responding to the second encryption indication identifier carried in the second SIP message, the first application processor sends a request carrying the session identifier to the quantum key server; the first application processor receives the quantum session key.
In some embodiments of the present disclosure, the voice data transmission apparatus further includes:
and the third receiving module is used for receiving a third SIP message returned by the voice receiving terminal by the first communication processor, and the third SIP message is used for indicating that the voice receiving terminal responds successfully to the first SIP message.
In some embodiments of the present disclosure, a voice data encryption module is configured to encapsulate the encrypted voice data based on the first communication processor to obtain an RTP packet; and transmitting the RTP message to a second communication processor of the voice receiving terminal.
According to still another aspect of the present disclosure, there is provided another voice data transmission apparatus including:
the second quantum session key acquisition module is used for acquiring a quantum session key from the quantum key server by a second application processor of the voice receiving terminal and transmitting the quantum session key to a second communication processor of the voice receiving terminal;
And the voice data decryption module is used for responding to the voice data receiving request, and the second communication processor of the voice receiving terminal decrypts the received voice data by utilizing the quantum session key from the second application processor.
In some embodiments of the present disclosure, the voice data transmission apparatus further includes:
the first receiving module is used for receiving a first SIP message sent by the voice sending terminal by the second communication processor, and the first SIP message is used for establishing a session channel between the voice sending terminal and the voice receiving terminal;
and the second sending module is used for returning a second SIP message based on the first SIP message by the second communication processor, wherein the second SIP message is a message for responding to the first SIP message by the voice receiving terminal.
In some embodiments of the present disclosure, the first SIP message includes a first encryption indication identifier and a session identifier that are added by an application server, where the first encryption indication identifier is used to instruct the voice receiving terminal to obtain a quantum session key that decrypts voice data, and the session identifier is used to instruct the quantum key server to match the quantum session key;
The second quantum session key acquisition module is used for identifying the first SIP message by the second communication processor, and responding to the first encryption indication identifier carried in the first SIP message, the second application processor sends a request carrying the session identifier to the quantum key server; the second application processor receives the quantum session key.
In some embodiments of the present disclosure, the second SIP message includes a second encryption indication identifier and a session identifier that are added by an application server, where the second encryption indication identifier is used to instruct the voice sending terminal to obtain a quantum session key that performs encryption processing on voice data.
In some embodiments of the present disclosure, the voice data transmission apparatus further includes:
and the third sending module is used for returning a third SIP message to the voice sending terminal by the second communication processor, wherein the third SIP message is used for indicating that the voice receiving terminal responds to the first SIP message successfully.
In some embodiments of the disclosure, the voice data decryption module is configured to parse an RTP packet based on the second communication processor to obtain the voice data; the second communication processor decrypts the voice data using the quantum session key.
In some embodiments of the present disclosure, the voice data transmission apparatus further includes:
the decoding module is used for decoding the obtained decryption result by the second communication processor to obtain decoded voice data;
and the playing module is used for playing the decoded voice data.
According to still another aspect of the present disclosure, there is provided an electronic apparatus including: a processor; and a memory for storing executable instructions of the processor; wherein the processor is configured to perform the above-described voice data transmission method via execution of the executable instructions.
According to yet another aspect of the present disclosure, there is provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the above-described voice data transmission method.
According to the technical scheme provided by the embodiment of the disclosure, the voice data to be transmitted can be subjected to quantum encryption through the first application processor of the voice sending terminal, and the voice data to be transmitted is sent to the voice receiving terminal. The second application processor of the voice receiving terminal may receive and decrypt the voice data to be transmitted. The voice data encryption and decryption method and device can directly encrypt and decrypt voice data through the application processor, reduce requirements on terminal hardware, further reduce time delay caused by encryption and decryption, and improve voice data transmission efficiency.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure. It will be apparent to those of ordinary skill in the art that the drawings in the following description are merely examples of the disclosure and that other drawings may be derived from them without undue effort.
FIG. 1 is a schematic diagram of a system architecture in an embodiment of the present disclosure;
FIG. 2 shows a schematic diagram of another system architecture in an embodiment of the present disclosure;
FIG. 3 illustrates a flow chart of a method of voice data transmission in an embodiment of the present disclosure;
fig. 4 shows a terminal schematic diagram of a voice transmission terminal or a voice reception terminal in an embodiment of the present disclosure;
fig. 5 is a process diagram of a voice data transmission method according to an embodiment of the disclosure;
fig. 6 is a schematic diagram of a voice data transmission device according to an embodiment of the disclosure;
FIG. 7 is a schematic diagram of another voice data transmission device according to an embodiment of the disclosure; and
Fig. 8 shows a block diagram of an electronic device in an embodiment of the disclosure.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. However, the exemplary embodiments may be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus a repetitive description thereof will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities may be implemented in software or in one or more hardware modules or integrated circuits or in different networks and/or processor devices and/or microcontroller devices.
Fig. 1 shows a schematic diagram of an exemplary system architecture of a voice data transmission method or a voice data transmission apparatus that may be applied to an embodiment of the present disclosure.
As shown in fig. 1, the system architecture may include a voice transmission terminal 101, a voice reception terminal 102, and a quantum key server 103.
The voice transmitting terminal 101, the voice receiving terminal 102 and the quantum key server 103 may be connected by a network, which may be a wired network or a wireless network. Wherein the voice transmitting terminal 101 may include a first application processor and a first communication processor, and the voice receiving terminal 102 may include a second application processor and a second communication processor.
Illustratively, a first application processor for acquiring the quantum session key from the quantum key server 103, and transmitting the quantum session key to a first communication processor of the voice transmission terminal 101; a second application processor for acquiring the quantum session key from the quantum key server 103 and transmitting to a second communication processor; a quantum key server 103 for respectively transmitting quantum session keys to the first application processor and the second application processor; a first communication processor, configured to encrypt voice data to be transmitted using a quantum session key from a first application processor in response to a voice data transmission request, and transmit the encrypted voice data to a second communication processor of the voice receiving terminal 102; and a second communication processor for decrypting the received voice data using the quantum session key from the second application processor in response to the voice data reception request.
In some embodiments, the voice transmitting terminal 101 is a calling terminal and the voice receiving terminal 102 is a called terminal. In this case, the first communication processor is further configured to send a first session initiation protocol SIP message to the voice receiving terminal 102, where the first SIP message is used to establish a session channel between the voice sending terminal 101 and the voice receiving terminal 102; the second communication processor is further configured to receive a first SIP message sent by the voice sending terminal 101, where the first SIP message is used to establish a session channel between the voice sending terminal 101 and the voice receiving terminal 102; returning a second SIP message based on the first SIP message, where the second SIP message is a message that the voice receiving terminal 102 responds to the first SIP message; the first communication processor is further configured to receive a second SIP message returned by the voice receiving terminal 102, where the second SIP message is a message that the voice receiving terminal 102 responds to the first SIP message.
Alternatively, the wireless network or wired network described above uses standard communication techniques and/or protocols. The network is typically the Internet, but may be any network including, but not limited to, a local area network (Local Area Network, LAN), metropolitan area network (Metropolitan Area Network, MAN), wide area network (Wide Area Network, WAN), mobile, wired or wireless network, private network, or any combination of virtual private networks. In some embodiments, data exchanged over a network is represented using techniques and/or formats including HyperText Mark-up Language (HTML), extensible markup Language (Extensible MarkupLanguage, XML), and the like. All or some of the links may also be encrypted using conventional encryption techniques such as secure sockets layer (Secure Socket Layer, SSL), transport layer security (Transport Layer Security, TLS), virtual private network (Virtual Private Network, VPN), internet protocol security (Internet ProtocolSecurity, IPsec), etc. In other embodiments, custom and/or dedicated data communication techniques may also be used in place of or in addition to the data communication techniques described above.
The voice transmitting terminal 101, the voice receiving terminal 102 may be various electronic devices including, but not limited to, smart phones, tablet computers, laptop portable computers, desktop computers, wearable devices, augmented reality devices, virtual reality devices, etc.
In some embodiments, as shown in fig. 2, an application server 104 may also be included in an exemplary system architecture of the voice data transmission method or the voice data transmission apparatus of the embodiments of the present disclosure.
Illustratively, a first communication processor for sending a first SIP message to the application server 104; the application server 104 is configured to add a first encryption indication identifier and a session identifier to the first SIP message, and forward the first SIP message carrying the first encryption indication identifier and the session identifier to the voice receiving terminal 102.
Illustratively, the second communication processor is configured to receive the first SIP message sent by the voice sending terminal 101; identifying the first SIP message, and sending a first instruction to the second application processor in response to the first SIP message carrying a first encryption indication identifier; returning a second SIP message based on the first SIP message, where the second SIP message is a message that the voice receiving terminal 102 responds to the first SIP message; the application server 104 is further configured to add a second encryption indication identifier and a session identifier to the second SIP message, and forward the second SIP message carrying the second encryption indication identifier and the session identifier to the voice sending terminal 101.
Illustratively, the first communication processor is configured to identify a second encryption indication identifier in the second SIP message; responding to the second encryption indication identifier carried in the second SIP message, and sending a second instruction to the first application processor; a first application processor, configured to send a request carrying a session identifier to the quantum key server 103 based on the second instruction; the second application processor is configured to send a request carrying a session identifier to the subkey server 103 based on the first instruction vector.
Illustratively, the quantum key server 103 is configured to determine a quantum session key based on the session identifier, and send the quantum session key to the first application processor and the second application processor, respectively.
Alternatively, the quantum key server 103 and the application server 104 may be independent physical servers, or may be a server cluster or a distributed system formed by a plurality of physical servers, or may be a cloud server that provides cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, CDN (Content Delivery Network ), and basic cloud computing services such as big data and artificial intelligence platform.
Those skilled in the art will appreciate that the numbers of the voice transmission terminal 101, the voice reception terminal 102, the quantum key server 103, and the application server 104 in fig. 1 and 2 are merely illustrative, and any number of the voice transmission terminal 101, the voice reception terminal 102, the quantum key server 103, and the application server 104 may be provided according to actual needs. The embodiments of the present disclosure are not limited in this regard.
The present exemplary embodiment will be described in detail below with reference to the accompanying drawings and examples.
First, in the embodiments of the present disclosure, a voice data transmission method is provided, and the method may be performed by any electronic device having computing processing capability.
Fig. 3 shows a flowchart of a voice data transmission method according to an embodiment of the present disclosure, and as shown in fig. 3, the voice data transmission method provided in the embodiment of the present disclosure includes the following steps.
S302, a first application processor of the voice sending terminal acquires a quantum session key from a quantum key server and transmits the quantum session key to a first communication processor of the voice sending terminal.
The voice transmission terminal is a terminal for transmitting voice data, for example. The voice sending terminal can be a calling terminal or a called terminal. The first application processor is an application processor deployed on the voice transmission terminal. The first communication processor is a communication processor disposed on the voice transmission terminal. It should be noted that the application processor may be a very large scale integrated circuit that is deployed with a function of acquiring a quantum session key and an interface for connecting to a quantum key server. The communication processor may be a very large scale integrated circuit with voice data transceiving functions and voice data encryption functions deployed.
The method of obtaining the quantum session key by the first application processor is not limited by the embodiments of the present disclosure, and illustratively, the first application processor may include a quantum user card, and the quantum user card may be connected with the quantum key server. When the first application processor receives an instruction to acquire the quantum session key, a request for acquiring the quantum session key may be sent to the quantum key server through the quantum user card. And can receive the returned quantum session key through the quantum user card.
In some embodiments, the voice sending terminal is a calling terminal, and before the first application processor of the voice sending terminal obtains the quantum session key from the quantum key server, the voice data transmission method provided by the embodiment of the disclosure may further include: the first communication processor sends a first Session Initiation Protocol (SIP) message to the voice receiving terminal, wherein the first SIP message is used for establishing a session channel between the voice sending terminal and the voice receiving terminal; the first communication processor receives a second SIP message returned by the voice receiving terminal, wherein the second SIP message is a message of the voice receiving terminal responding to the first SIP message.
In some embodiments, when the voice transmitting terminal needs to initiate a voice call to the voice receiving terminal, the first communication processor of the voice transmitting terminal may send a first SIP message to the voice receiving terminal, and a request line method format in the first SIP message may be Invite. The voice receiving terminal may return a second SIP message to the voice transmitting terminal after receiving the first SIP message, and the status line status code in the second SIP message may be 180 (ringing).
The operations of receiving the first SIP message and transmitting the second SIP message may be performed by a second communication processor of the voice receiving terminal, for example. Thus, before the second application processor of the voice receiving terminal obtains the quantum session key from the quantum key server, the voice data transmission method provided by the embodiment of the disclosure may further include: the second communication processor receives a first Session Initiation Protocol (SIP) message sent by the voice sending terminal; the second communication processor returns a second SIP message based on the first SIP message.
The voice receiving terminal is a terminal for receiving voice data. The voice receiving terminal can be a calling terminal or a called terminal. Here, a voice receiving terminal is taken as an example of a called terminal. The second communication processor is a communication processor disposed on the voice receiving terminal. The second application processor is an application processor deployed on the voice receiving terminal.
In some embodiments, the first SIP message includes a first encryption indication identifier and a session identifier added by the application server, where the first encryption indication identifier is used to instruct the voice receiving terminal to obtain a quantum session key for decrypting the voice data, and the session identifier is used to instruct the quantum key server to match the quantum session key.
In an exemplary embodiment, the voice transmission terminal may transmit the first SIP message to the application server and forward through the application server. The application server is configured to add a first encryption indication identifier and a session identifier to the first SIP message. In one possible implementation manner, the application server may further identify whether the voice receiving terminal can perform the voice encryption and decryption service based on the first SIP message. When the voice receiving terminal can execute voice encryption and decryption service, adding a first encryption indication identifier into a first SIP message; if the voice receiving terminal can not execute the voice encryption and decryption service, the first encryption indication mark is not added.
The embodiment of the disclosure does not limit the format of the first encryption indication identifier and the format of the session identifier, and the format of the first encryption indication identifier and the format of the session identifier can be set based on application scenes or experiences. In addition, the session identifier generated by the current session is not repeated with the session identifiers generated by other secondary sessions.
In some embodiments, the second SIP message includes a second encryption indication identifier and a session identifier added by the application server, where the second encryption indication identifier is used to instruct the voice sending terminal to obtain a quantum session key for encrypting the voice data. In this case, the first application processor of the voice transmission terminal acquires the quantum session key from the quantum key server, including: the first communication processor identifies the second SIP message, and responds to the second encryption indication identifier carried in the second SIP message, and the first application processor transmits a request carrying the session identifier to the vector subkey server; the first application processor receives a quantum session key.
In some embodiments, the voice receiving terminal may send the second SIP message to the application server after receiving the first SIP message, and forward the second SIP message to the voice transmitting terminal through the application server. The application server is configured to add a second encryption indication identifier and a session identifier to the second SIP message. In one possible implementation manner, the application server may further determine whether to add the second encryption indication identifier to the second SIP message based on the voice receiving terminal that sends the second SIP message. The determining method may refer to the above-described method of determining whether to add the first encryption indication flag to the first SIP message.
Note that the second encryption indication identifier may be the same as or different from the first encryption indication identifier, which is not limited by the embodiment of the present disclosure. The session identifier in the second SIP message is required to be the same as or corresponding to the session identifier in the first SIP message, and the quantum key server may return the same quantum session key to the voice sending terminal and the voice receiving terminal based on the same or corresponding session identifier sent by the voice sending terminal and the voice receiving terminal.
In one possible implementation, after the voice mode terminal receives the second SIP message, the first communication processor may identify the second SIP message and determine whether the second encryption indication identifier and the session identifier are included therein. When the second encryption indication identifier is included, the first communication processor may send an instruction to the first application processor to obtain the quantum session key, where the instruction may include the session identifier. The first application processor may then send a request to the vector subkey server to obtain the quantum session key based on the instruction, the request including the session identification. The quantum key server may comprise at least one quantum key store. After the quantum key server receives the request, a quantum session key may be matched in a quantum key store based on the session identification and sent to a first application processor in the voice transmission terminal. The embodiments of the present disclosure are not limited to a method of matching quantum session keys based on session identification, which may be set based on experience or implementation scenarios.
In some embodiments, after the second communication processor returns the second SIP message based on the first SIP message, the voice data transmission method provided by the embodiments of the present disclosure may further include: the second communication processor returns a third SIP message to the voice sending terminal, wherein the third SIP message is used for indicating that the voice receiving terminal responds successfully to the first SIP message. In this case, after the first communication processor receives the second SIP message returned by the voice receiving terminal, the voice data transmission method provided by the embodiment of the present disclosure may further include: the first communication processor receives a third SIP message returned by the voice receiving terminal. Illustratively, the status line status code in the third SIP message may be 200 (successful response).
S304, in response to the voice data sending request, the first communication processor of the voice sending terminal encrypts the voice data to be transmitted by using the quantum session key from the first application processor, and transmits the encrypted voice data to the second communication processor of the voice receiving terminal.
The embodiment of the disclosure does not limit the transmission method of the encrypted voice data to the second communication processor of the voice receiving terminal, for example, the encrypted voice data may be transmitted through VoLTE technology.
In one possible implementation, after the voice transmitting terminal obtains the voice data, the first communication processor obtains a voice data request for transmitting the voice data. The first communication processor may then encrypt the voice data based on the obtained quantum session key, and transmit the encrypted voice data to the second communication processor of the voice receiving terminal.
In an exemplary embodiment, the first communication processor may include a voice encoder, where when the user corresponding to the voice transmitting terminal inputs voice to the voice transmitting terminal, the voice encoder may encode the voice to obtain corresponding voice data. The first communication processor may then encrypt the voice data based on the quantum session key and transmit the encrypted voice data to the second communication processor of the voice receiving terminal.
In some embodiments, transmitting the encrypted voice data to a second communication processor of the voice receiving terminal comprises: packaging the encrypted voice data based on the first communication processor to obtain an RTP message; and transmitting the RTP message to a second communication processor of the voice receiving terminal. The present disclosure is not limited to this encapsulation method, which may be set based on experience or application scenarios. Illustratively, in the first communication processor, a modem may be included, and thus the second communication processor for transmitting the RTP packet to the voice receiving terminal may include: modulating the RTP message; and transmitting the modulated RTP message to a second communication processor.
S306, the second application processor of the voice receiving terminal acquires the quantum session key from the quantum key server and transmits the quantum session key to the second communication processor of the voice receiving terminal.
In some embodiments, the first SIP message includes a first encryption indication identifier and a session identifier that are added by the application server. In this case, the second application processor of the voice receiving terminal acquires the quantum session key from the quantum key server, including: the second communication processor identifies the first SIP message, and responds to the first encryption indication mark carried in the first SIP message, and the second application processor transmits a request carrying the session mark to the vector subkey server; the second application processor receives the quantum session key. For example, the second application processor may send a request to obtain the quantum session key to the quantum key server, the request including the session identification. After receiving the request, the quantum key server may return a quantum session key to the voice receiving terminal based on the session identification. The quantum key server can ensure that the quantum session key transmitted to the voice receiving terminal is the same as the quantum session key of the voice transmitting terminal by identifying the session identifier. The second application processor may then receive the quantum session key returned by the quantum key server and may send the quantum session key to the second communication processor.
S308, in response to the voice data receiving request, the second communication processor of the voice receiving terminal decrypts the received voice data by using the quantum session key from the second application processor.
In some embodiments, the second communication processor of the voice receiving terminal decrypts the received voice data using the quantum session key from the second application processor, comprising: analyzing the RTP message based on the second communication processor to obtain voice data; the second communication processor decrypts the voice data using the quantum session key. Illustratively, the RTP message may be parsed by an RTP protocol. In a possible implementation manner, the second communication processor may include a modem, so that the parsing the RTP packet based on the second communication processor to obtain the voice data may include: demodulating the RTP message to obtain a demodulated RTP message; and analyzing the demodulated RTP message to obtain voice data. In some embodiments, after the second communication processor of the voice receiving terminal decrypts the received voice data using the quantum session key from the second application processor, the voice data transmission method provided by the embodiment of the present disclosure may further include: the second communication processor decodes the obtained decryption result to obtain decoded voice data; and playing the decoded voice data. Illustratively, a speech encoder is included in the second communication processor, which may decode speech data.
In some embodiments, the voice receiving terminal may receive voice data of a user corresponding to the voice receiving terminal after playing the decoded voice. The voice receiving terminal can encrypt the voice data of the user corresponding to the voice receiving terminal and then send the encrypted voice data to the voice sending terminal. The process is the same as the method that the voice sending terminal encrypts and sends the voice data received by the voice sending terminal to the voice receiving terminal, and will not be described here again.
According to the method provided by the embodiment of the disclosure, the first application processor of the voice sending terminal can perform quantum encryption on voice data to be transmitted, and the voice data to be transmitted is sent to the voice receiving terminal. The second application processor of the voice receiving terminal may receive and decrypt the voice data to be transmitted. The voice data encryption and decryption method and device can directly encrypt and decrypt voice data through the application processor, reduce requirements on terminal hardware, further reduce time delay caused by encryption and decryption, and improve voice data transmission efficiency.
A terminal schematic diagram of a voice transmitting terminal or a voice receiving terminal is shown in fig. 4. In fig. 4, the terminal has an application processor and a communication processor. The terminal may further comprise an interface for connecting to an IMS network and an interface for connecting to a quantum key server.
The communication processor is provided with a SIP/SDP (Session Description Protocal, session description protocol) module, a voice encryption and decryption control function module, a voice encryption and decryption function module, an RTP/RTCP (Real-time Control Protocol, real-time transport control protocol) module and a modem.
Wherein the SIP/SDP module is used to establish the session. The voice encryption and decryption control function module is used for identifying the first encryption indication identifier or the second encryption indication identifier, sending an instruction for obtaining the quantum session key to the voice encryption and decryption service logic processing function module in the application processor, and receiving the quantum session key returned by the voice encryption and decryption service logic processing function module. The voice encryption and decryption function module is used for encrypting and decrypting voice data by using the quantum session key. The RTP/RTCP module voice is used for packaging the encrypted voice data and/or analyzing the voice data to be decrypted. The modem is used for modulating and/or demodulating the RTP message.
In a possible implementation manner, the communication processor may further include other functional modules, which are not limited by the embodiment of the present disclosure, and may further include an HTTP/XCAP (HyperText Transfer Protocol/XML Configuration Access Protocol, hypertext transfer protocol/extensible markup language configuration access protocol) module and a TCP/IP (Transmission Control Protocol/Internet Protocol, transmission control protocol/network protocol) module. The HTTP/XCAP module is used for network transmission with the server. The TCP/IP module is used for computer network interconnection and communication.
The application processor is provided with a VoLTE functional module, a voice encryption and decryption service logic processing functional module, a quantum key functional module and a quantum bank card. The VoLTE functional module is used for transmitting voice data based on the IMS network. The voice encryption and decryption service logic processing function module is used for receiving the instruction sent by the voice encryption and decryption control function module in the communication processor, determining a request for obtaining the quantum session key based on the instruction, and transmitting the request to the quantum key function module. The voice encryption and decryption service logic processing function module is also used for receiving the quantum session key returned by the quantum key function module and sending the quantum session key to the voice encryption and decryption control function module. The quantum key function module is used for calling the quantum user card, acquiring a quantum session key based on the quantum key card, and sending the quantum session key to the voice encryption and decryption service logic processing function module. The quantum key card is used for connecting with the quantum key server, sending a request for acquiring the quantum session key and receiving the quantum session key returned by the quantum key server.
In a possible implementation manner, the application processor may further include other functional modules, which are not limited by the embodiment of the present disclosure, for example, the application processor may further include an SMS (Short Message Service ) functional module and a video functional module. The SMS module is used for receiving and transmitting short messages. The video function module is used for receiving and playing videos.
A process diagram of a voice data transmission method is shown in fig. 5. Illustratively, in this embodiment, the voice data may be transmitted in the form of a voice data stream. First communication processor of voice transmission terminal the voice transmission terminal transmits Invite message (first SIP message). The application server adds a first encryption indication identifier and a session identifier to the Invite message. The second communication processor of the voice receiving terminal receives the Invite message and recognizes the first encryption indication identification information. Wherein the Invite message is used to establish a session channel between the voice transmitting terminal and the voice receiving terminal.
Thereafter, the second communication processor transmits a ringing message (second SIP message). The application server adds a second encryption indication identifier and a session identifier to the ringing message. The first communication processor of the voice transmission terminal receives the ringing message and recognizes the second encryption indication identification information. The ringing message is a message that the voice receiving terminal responds to the Invite message.
Then, the voice transmitting terminal and the voice receiving terminal may respectively transmit a request for acquiring the quantum session key to the quantum key server. The quantum key server may match a quantum session key for the voice transmitting terminal and the voice receiving terminal. And the quantum session key is distributed to the first application server and the second application server. The first application processor sends the quantum session key to the first communication processor. The second application processor sends the quantum key to the second communication processor.
After the voice receiving terminal acquires the quantum session key, a 200OK message (third SIP message) may be transmitted to the voice transmitting terminal, the 200OK message indicating that the voice receiving terminal has successfully responded to the Invite message. Illustratively, the transmission of Invite messages, ringing messages, and 200OK messages may be implemented through the IMS network. The voice sending terminal receives the 200OK message, and enters a voice encryption communication stage. The first communication processor obtains a voice data stream to be encrypted. The first communication processor encrypts the voice data stream to be encrypted with the quantum session key. And the first communication processor encapsulates the encrypted voice data stream to obtain an RTP message. The first communication processor may transmit the RTP message to the second communication processor of the voice receiving terminal. The second communication processor receives the demodulated RTP message. And the second communication processor analyzes the RTP message to obtain a voice data stream to be decrypted. The second communication processor decrypts the voice data stream to be decrypted by the quantum session key. The second communication processor sends the decrypted voice data stream to the voice decoder.
It should be noted that, in the embodiment of each step shown in fig. 5, reference may be made to S302 to S308, and detailed description thereof will not be repeated here.
Based on the same inventive concept, the embodiments of the present disclosure also provide a voice data transmission device, as described in the following embodiments. Since the principle of solving the problem of the embodiment of the device is similar to that of the embodiment of the method, the implementation of the embodiment of the device can be referred to the implementation of the embodiment of the method, and the repetition is omitted.
Fig. 6 is a schematic diagram of a voice data transmission apparatus according to an embodiment of the disclosure, as shown in fig. 6, where the apparatus includes:
a first quantum session key acquisition module 601, configured to acquire a quantum session key from a quantum key server by a first application processor of a voice transmission terminal, and transmit the quantum session key to a first communication processor of the voice transmission terminal;
the voice data encryption module 602 is configured to encrypt, by using a quantum session key from the first application processor, voice data to be transmitted by using the first communication processor of the voice transmission terminal in response to a voice data transmission request, and transmit the encrypted voice data to the second communication processor of the voice reception terminal.
In some embodiments of the present disclosure, the voice data transmission module may further include:
the first sending module is used for sending a first SIP message to the voice receiving terminal by the first communication processor, wherein the first SIP message is used for establishing a session channel between the voice sending terminal and the voice receiving terminal;
The second receiving module is used for receiving a second SIP message returned by the voice receiving terminal by the first communication processor, wherein the second SIP message is a message of the voice receiving terminal responding to the first SIP message.
In some embodiments of the present disclosure, the first SIP message includes a first encryption indication identifier and a session identifier added by the application server, where the first encryption indication identifier is used to instruct the voice receiving terminal to obtain a quantum session key for decrypting the voice data, and the session identifier is used to instruct the quantum key server to match the quantum session key.
In some embodiments of the present disclosure, the second SIP message includes a second encryption indication identifier and a session identifier added by the application server, where the second encryption indication identifier is used to instruct the voice sending terminal to obtain a quantum session key for encrypting the voice data;
a first quantum session key acquisition module 601, configured to identify a second SIP message by using a first communication processor, and send a request carrying a session identifier to a sub-key server by using a first application processor in response to carrying a second encryption indication identifier in the second SIP message; the first application processor receives a quantum session key.
In some embodiments of the present disclosure, the voice data transmission apparatus provided in the embodiments of the present disclosure may further include:
and the third receiving module is used for receiving a third SIP message returned by the voice receiving terminal by the first communication processor, and the third SIP message is used for indicating that the voice receiving terminal responds successfully to the first SIP message.
In some embodiments of the present disclosure, the voice data encryption module 602 is configured to encapsulate encrypted voice data based on the first communication processor to obtain an RTP packet; and transmitting the RTP message to a second communication processor of the voice receiving terminal.
As shown in fig. 7, fig. 7 shows a schematic diagram of another voice data transmission apparatus according to an embodiment of the disclosure, where the apparatus includes:
a second quantum session key acquisition module 701, configured to acquire a quantum session key from a quantum key server by using a second application processor of the voice receiving terminal, and transmit the quantum session key to a second communication processor of the voice receiving terminal;
the voice data decryption module 702 is configured to decrypt received voice data by using the quantum session key from the second application processor by the second communication processor of the voice receiving terminal in response to the voice data receiving request.
In some embodiments of the present disclosure, the voice data transmission apparatus provided in the embodiments of the present disclosure may further include:
the first receiving module is used for receiving a first SIP message sent by the voice sending terminal by the second communication processor, and the first SIP message is used for establishing a session channel between the voice sending terminal and the voice receiving terminal;
the second sending module is used for returning a second SIP message based on the first SIP message by the second communication processor, wherein the second SIP message is a message for responding to the first SIP message by the voice receiving terminal.
In some embodiments of the present disclosure, the first SIP message includes a first encryption indication identifier and a session identifier added by the application server, where the first encryption indication identifier is used to instruct the voice receiving terminal to obtain a quantum session key for decrypting the voice data, and the session identifier is used to instruct the quantum key server to match the quantum session key;
a second quantum session key obtaining module 701, configured to identify the first SIP message by using a second communication processor, and send a request carrying a session identifier to a vector subkey server by using the second application processor in response to carrying a first encryption indication identifier in the first SIP message; the second application processor receives the quantum session key.
In some embodiments of the present disclosure, the second SIP message includes a second encryption indication identifier and a session identifier added by the application server, where the second encryption indication identifier is used to instruct the voice sending terminal to obtain a quantum session key for encrypting the voice data.
In some embodiments of the present disclosure, the voice data transmission apparatus provided in the embodiments of the present disclosure may further include:
and the third sending module is used for returning a third SIP message to the voice sending terminal by the second communication processor, wherein the third SIP message is used for indicating that the voice receiving terminal responds to the first SIP message successfully.
In some embodiments of the present disclosure, the voice data decryption module 702 is configured to parse the RTP packet based on the second communication processor to obtain voice data; the second communication processor decrypts the voice data using the quantum session key.
In some embodiments of the present disclosure, the voice data transmission apparatus provided in the embodiments of the present disclosure may further include:
the decoding module is used for decoding the obtained decryption result by the second communication processor to obtain decoded voice data;
and the playing module is used for playing the decoded voice data.
According to the device provided by the embodiment of the disclosure, the first application processor of the voice sending terminal can perform quantum encryption on voice data to be transmitted, and the voice data to be transmitted is sent to the voice receiving terminal. The second application processor of the voice receiving terminal may receive and decrypt the voice data to be transmitted. The voice data encryption and decryption method and device can directly encrypt and decrypt voice data through the application processor, reduce requirements on terminal hardware, further reduce time delay caused by encryption and decryption, and improve voice data transmission efficiency.
Those skilled in the art will appreciate that the various aspects of the present disclosure may be implemented as a system, method, or program product. Accordingly, various aspects of the disclosure may be embodied in the following forms, namely: an entirely hardware embodiment, an entirely software embodiment (including firmware, micro-code, etc.) or an embodiment combining hardware and software aspects may be referred to herein as a "circuit," module "or" system.
An electronic device 800 according to such an embodiment of the present disclosure is described below with reference to fig. 8. The electronic device 800 shown in fig. 8 is merely an example and should not be construed to limit the functionality and scope of use of embodiments of the present disclosure in any way.
As shown in fig. 8, the electronic device 800 is embodied in the form of a general purpose computing device. Components of electronic device 800 may include, but are not limited to: the at least one processing unit 810, the at least one memory unit 820, and a bus 830 connecting the various system components, including the memory unit 820 and the processing unit 810.
Wherein the storage unit stores program code that is executable by the processing unit 810 such that the processing unit 810 performs steps according to various exemplary embodiments of the present disclosure described in the section "detailed description of the invention" above.
The storage unit 820 may include readable media in the form of volatile storage units, such as Random Access Memory (RAM) 8201 and/or cache memory 8202, and may further include Read Only Memory (ROM) 8203.
Storage unit 820 may also include a program/utility 8204 having a set (at least one) of program modules 8205, such program modules 8205 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each or some combination of which may include an implementation of a network environment.
Bus 830 may be one or more of several types of bus structures including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 800 may also communicate with one or more external devices 840 (e.g., keyboard, pointing device, bluetooth device, etc.), one or more devices that enable a user to interact with the electronic device 800, and/or any device (e.g., router, modem, etc.) that enables the electronic device 800 to communicate with one or more other computing devices. Such communication may occur through an input/output (I/O) interface 850. Also, electronic device 800 may communicate with one or more networks such as a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the Internet, through network adapter 860. As shown, network adapter 860 communicates with other modules of electronic device 800 over bus 830. It should be appreciated that although not shown, other hardware and/or software modules may be used in connection with electronic device 800, including, but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, data backup storage systems, and the like.
From the above description of embodiments, those skilled in the art will readily appreciate that the example embodiments described herein may be implemented in software, or may be implemented in software in combination with the necessary hardware. Thus, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (may be a CD-ROM, a U-disk, a mobile hard disk, etc.) or on a network, including several instructions to cause a computing device (may be a personal computer, a server, a terminal device, or a network device, etc.) to perform the method according to the embodiments of the present disclosure.
In an exemplary embodiment of the present disclosure, a computer-readable storage medium, which may be a readable signal medium or a readable storage medium, is also provided. On which a program product is stored which enables the implementation of the method described above of the present disclosure. In some possible implementations, various aspects of the disclosure may also be implemented in the form of a program product comprising program code for causing a terminal device to carry out the steps according to the various exemplary embodiments of the disclosure as described in the section "detailed description" above of the disclosure, when the program product is run on the terminal device.
More specific examples of the computer readable storage medium in the present disclosure may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
In this disclosure, a computer readable storage medium may include a data signal propagated in baseband or as part of a carrier wave, with readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Alternatively, the program code embodied on a computer readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
In particular implementations, the program code for carrying out operations of the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
It should be noted that although in the above detailed description several modules or units of a device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit in accordance with embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into a plurality of modules or units to be embodied.
Furthermore, although the steps of the methods in the present disclosure are depicted in a particular order in the drawings, this does not require or imply that the steps must be performed in that particular order or that all illustrated steps be performed in order to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step to perform, and/or one step decomposed into multiple steps to perform, etc.
From the description of the above embodiments, those skilled in the art will readily appreciate that the example embodiments described herein may be implemented in software, or may be implemented in software in combination with the necessary hardware. Thus, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (may be a CD-ROM, a U-disk, a mobile hard disk, etc.) or on a network, including several instructions to cause a computing device (may be a personal computer, a server, a mobile terminal, or a network device, etc.) to perform the method according to the embodiments of the present disclosure.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This disclosure is intended to cover any adaptations, uses, or adaptations of the disclosure following the general principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
Claims (18)
1. A method for transmitting voice data, comprising:
the first communication processor receives a second SIP message returned by the voice receiving terminal based on the first SIP message, wherein the second SIP message comprises a second encryption indication identifier and a session identifier added by an application server, and the second encryption indication identifier is used for indicating the voice sending terminal to acquire a quantum session key for encrypting voice data;
the first communication processor identifies the second SIP message, and responds to the second SIP message carrying the second encryption indication identifier, and the first application processor transmits a request carrying the session identifier to the vector subkey server;
the first application processor receives the quantum session key and transmits the quantum session key to a first communication processor of the voice transmission terminal;
and in response to the voice data sending request, the first communication processor of the voice sending terminal encrypts voice data to be transmitted by utilizing the quantum session key from the first application processor, and transmits the encrypted voice data to the second communication processor of the voice receiving terminal.
2. The voice data transmission method according to claim 1, wherein after the first communication processor receives the second SIP message returned by the voice receiving terminal based on the first SIP message, the method further comprises:
the first communication processor sends the first SIP message to the voice receiving terminal, the first SIP message is used for establishing a session channel between the voice sending terminal and the voice receiving terminal, and the second SIP message is a message that the voice receiving terminal responds to the first SIP message.
3. The voice data transmission method according to claim 2, wherein the first SIP message includes a first encryption indication identifier and a session identifier added by an application server, where the first encryption indication identifier is used to instruct the voice receiving terminal to obtain a quantum session key for decrypting voice data, and the session identifier is used to instruct the quantum key server to match the quantum session key.
4. A voice data transmission method according to claim 2 or 3, wherein after the first communication processor receives the second SIP message returned by the voice receiving terminal, the method further comprises:
And the first communication processor receives a third SIP message returned by the voice receiving terminal, wherein the third SIP message is used for indicating that the voice receiving terminal responds successfully to the first SIP message.
5. A voice data transmission method according to any one of claims 1 to 3, wherein the second communication processor for transmitting the encrypted voice data to the voice receiving terminal comprises:
based on the first communication processor, encapsulating the encrypted voice data to obtain a real-time transmission protocol RTP message;
and transmitting the RTP message to a second communication processor of the voice receiving terminal.
6. A method for transmitting voice data, comprising:
the second communication processor receives a first SIP message sent by the voice sending terminal, wherein the first SIP message comprises a first encryption indication identifier and a session identifier added by an application server, the first encryption indication identifier is used for indicating the voice receiving terminal to acquire a quantum session key for decrypting voice data, and the session identifier is used for indicating a quantum key server to match the quantum session key;
the second communication processor identifies the first SIP message, and responds to the first SIP message carrying the first encryption indication identifier, and the second application processor sends a request carrying the session identifier to the quantum key server;
The second application processor receives the quantum session key and transmits the quantum session key to a second communication processor of the voice receiving terminal;
in response to a voice data reception request, a second communication processor of the voice reception terminal decrypts the received voice data using a quantum session key from the second application processor.
7. The voice data transmission method according to claim 6, wherein the voice receiving terminal is a called terminal, the first SIP message is used to establish a session channel between the voice transmitting terminal and the voice receiving terminal, and the second communication processor receives the first SIP message sent by the voice transmitting terminal, and the method further comprises:
the second communication processor returns a second SIP message based on the first SIP message, wherein the second SIP message is a message for the voice receiving terminal to respond to the first SIP message.
8. The voice data transmission method according to claim 7, wherein the second SIP message includes a second encryption indication identifier and a session identifier added by an application server, where the second encryption indication identifier is used to instruct the voice sending terminal to obtain a quantum session key for encrypting voice data.
9. The voice data transmission method of claim 7, wherein after the second communication processor returns a second SIP message based on the first SIP message, the method further comprises:
and the second communication processor returns a third SIP message to the voice sending terminal, wherein the third SIP message is used for indicating that the voice receiving terminal responds successfully to the first SIP message.
10. The voice data transmission method according to claim 6 or 7, wherein the second communication processor of the voice receiving terminal decrypts the received voice data using the quantum session key from the second application processor, comprising:
analyzing a real-time transmission protocol RTP message based on the second communication processor to obtain the voice data;
the second communication processor decrypts the voice data using the quantum session key.
11. The voice data transmission method according to claim 6 or 7, wherein after the second communication processor of the voice receiving terminal decrypts the received voice data using the quantum session key from the second application processor, the method further comprises:
The second communication processor decodes the obtained decryption result to obtain decoded voice data;
and playing the decoded voice data.
12. A voice data transmission system, the system comprising: the system comprises a voice sending terminal, a voice receiving terminal and a quantum key server, wherein the voice sending terminal comprises a first application processor and a first communication processor, and the voice receiving terminal comprises a second application processor and a second communication processor;
the second communication processor receives a first SIP message sent by the voice sending terminal, wherein the first SIP message comprises a first encryption indication identifier and a session identifier added by an application server, the first encryption indication identifier is used for indicating the voice receiving terminal to acquire a quantum session key for decrypting voice data, and the session identifier is used for indicating the quantum key server to match the quantum session key;
the first communication processor is configured to receive a second SIP message returned by the voice receiving terminal based on the first SIP message, where the second SIP message includes a second encryption indication identifier and a session identifier that are added by the application server, where the second encryption indication identifier is used to instruct the voice sending terminal to obtain a quantum session key that performs encryption processing on voice data;
The first communication processor is configured to identify the second SIP message;
the first application processor is configured to respond to the second SIP message carrying the second encryption indication identifier, and send a request carrying the session identifier to a vector subkey server; the quantum session key is received, and the quantum session key is transmitted to a first communication processor of the voice sending terminal;
the second communication processor is configured to identify the first SIP message;
the second application processor is configured to send a request carrying the session identifier to the quantum key server in response to the first SIP message carrying the first encryption indication identifier; receiving the quantum session key and transmitting to the second communication processor;
the quantum key server is used for respectively sending the quantum session key to the first application processor and the second application processor;
the first communication processor is used for responding to a voice data sending request, encrypting voice data to be transmitted by utilizing a quantum session key from the first application processor, and transmitting the encrypted voice data to the second communication processor of the voice receiving terminal;
The second communication processor is used for decrypting the received voice data by utilizing the quantum session key from the second application processor in response to the voice data receiving request.
13. The voice data transmission system according to claim 12, wherein the voice transmitting terminal is a calling terminal and the voice receiving terminal is a called terminal;
the first communication processor is further configured to send a first session initiation protocol SIP message to the voice receiving terminal, where the first SIP message is used to establish a session channel between the voice sending terminal and the voice receiving terminal;
the second communication processor is further configured to receive a first SIP message sent by the voice sending terminal, where the first SIP message is used to establish a session channel between the voice sending terminal and the voice receiving terminal; returning a second SIP message based on the first SIP message, wherein the second SIP message is a message for responding to the first SIP message by the voice receiving terminal;
the first communication processor is further configured to receive a second SIP message returned by the voice receiving terminal, where the second SIP message is a message that the voice receiving terminal responds to the first SIP message.
14. The voice data transmission system of claim 13, wherein the system further comprises: an application server;
the first communication processor is configured to send the first SIP message to an application server;
the application server is configured to add a first encryption indication identifier and a session identifier to the first SIP message, and forward the first SIP message carrying the first encryption indication identifier and the session identifier to the voice receiving terminal;
the second communication processor is used for receiving the first SIP message sent by the voice sending terminal; identifying the first SIP message, and sending a first instruction to the second application processor in response to the first SIP message carrying the first encryption indication identifier; returning a second SIP message based on the first SIP message, wherein the second SIP message is a message for responding to the first SIP message by the voice receiving terminal;
the application server is further configured to add a second encryption indication identifier and a session identifier to the second SIP message, and forward the second SIP message carrying the second encryption indication identifier and the session identifier to the voice sending terminal;
The first communication processor is configured to identify a second encryption indication identifier in the second SIP message; responding to the second encryption indication identifier carried in the second SIP message, and sending a second instruction to the first application processor;
the first application processor is configured to send a request carrying the session identifier to the quantum key server based on the second instruction;
the second application processor is used for sending a request carrying the session identifier to the quantum key server based on the first instruction;
the quantum key server is used for determining the quantum session key based on the session identifier and respectively sending the quantum session key to the first application processor and the second application processor.
15. A voice data transmission apparatus, comprising:
the second receiving module is used for receiving a second SIP message returned by the voice receiving terminal based on the first SIP message, wherein the second SIP message comprises a second encryption indication identifier and a session identifier added by the application server, and the second encryption indication identifier is used for indicating the voice sending terminal to acquire a quantum session key for encrypting voice data;
The first quantum session key acquisition module is used for identifying the second SIP message by the first communication processor, responding to the second encryption indication identifier carried in the second SIP message, and sending a request carrying the session identifier to a sub-key server by the first application processor; the first application processor receives the quantum session key and transmits the quantum session key to a first communication processor of the voice transmission terminal;
and the voice data encryption module is used for responding to a voice data sending request, the first communication processor of the voice sending terminal encrypts voice data to be transmitted by utilizing the quantum session key from the first application processor, and the encrypted voice data is transmitted to the second communication processor of the voice receiving terminal.
16. A voice data transmission apparatus, comprising:
the first receiving module is used for receiving a first SIP message sent by the voice sending terminal by the second communication processor, wherein the first SIP message comprises a first encryption indication identifier and a session identifier added by the application server, the first encryption indication identifier is used for indicating the voice receiving terminal to acquire a quantum session key for decrypting voice data, and the session identifier is used for indicating the quantum key server to match the quantum session key;
The second quantum session key acquisition module is used for identifying the first SIP message by the second communication processor, responding to the first encryption indication identifier carried in the first SIP message, and sending a request carrying the session identifier to the quantum key server by the second application processor; the second application processor receives the quantum session key and transmits the quantum session key to a second communication processor of the voice receiving terminal;
and the voice data decryption module is used for responding to the voice data receiving request, and the second communication processor of the voice receiving terminal decrypts the received voice data by utilizing the quantum session key from the second application processor.
17. An electronic device, comprising:
a processor; and
a memory for storing executable instructions of the processor;
wherein the processor is configured to perform the method of voice data transmission of any one of claims 1 to 5 or to perform the method of voice data transmission of any one of claims 6 to 11 via execution of the executable instructions.
18. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the method of speech data transmission according to any one of claims 1 to 5 or the method of speech data transmission according to any one of claims 6 to 11.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210425522.0A CN114978485B (en) | 2022-04-21 | 2022-04-21 | Voice data transmission method, system, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210425522.0A CN114978485B (en) | 2022-04-21 | 2022-04-21 | Voice data transmission method, system, electronic equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114978485A CN114978485A (en) | 2022-08-30 |
CN114978485B true CN114978485B (en) | 2023-09-08 |
Family
ID=82979181
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210425522.0A Active CN114978485B (en) | 2022-04-21 | 2022-04-21 | Voice data transmission method, system, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114978485B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115567209B (en) * | 2022-09-29 | 2023-09-22 | 中电信量子科技有限公司 | VoIP encryption and decryption method by adopting transparent proxy and quantum key pre-filling |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007109950A1 (en) * | 2006-03-27 | 2007-10-04 | Huawei Technologies Co., Ltd. | A method and system for realizing speech interaction |
CN104618387A (en) * | 2015-02-14 | 2015-05-13 | 安徽量子通信技术有限公司 | Method applying SIP signaling to quantum secure communication system, integrated access quantum gateway and system |
CN104753869A (en) * | 2013-12-30 | 2015-07-01 | 北京大唐高鸿软件技术有限公司 | SIP protocol based session encryption method |
CN106936788A (en) * | 2015-12-31 | 2017-07-07 | 北京大唐高鸿软件技术有限公司 | A kind of cryptographic key distribution method suitable for VOIP voice encryptions |
CN108337676A (en) * | 2018-03-08 | 2018-07-27 | 广州三星通信技术研究有限公司 | encryption communication method and mobile terminal for mobile terminal |
CN114125824A (en) * | 2020-08-31 | 2022-03-01 | 中国电信股份有限公司 | Voice encryption processing method, server, terminal, system and storage medium |
CN114338618A (en) * | 2020-10-10 | 2022-04-12 | 中国电信股份有限公司 | Multi-party call method, system, conference server and electronic equipment |
-
2022
- 2022-04-21 CN CN202210425522.0A patent/CN114978485B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007109950A1 (en) * | 2006-03-27 | 2007-10-04 | Huawei Technologies Co., Ltd. | A method and system for realizing speech interaction |
CN104753869A (en) * | 2013-12-30 | 2015-07-01 | 北京大唐高鸿软件技术有限公司 | SIP protocol based session encryption method |
CN104618387A (en) * | 2015-02-14 | 2015-05-13 | 安徽量子通信技术有限公司 | Method applying SIP signaling to quantum secure communication system, integrated access quantum gateway and system |
CN106936788A (en) * | 2015-12-31 | 2017-07-07 | 北京大唐高鸿软件技术有限公司 | A kind of cryptographic key distribution method suitable for VOIP voice encryptions |
CN108337676A (en) * | 2018-03-08 | 2018-07-27 | 广州三星通信技术研究有限公司 | encryption communication method and mobile terminal for mobile terminal |
CN114125824A (en) * | 2020-08-31 | 2022-03-01 | 中国电信股份有限公司 | Voice encryption processing method, server, terminal, system and storage medium |
CN114338618A (en) * | 2020-10-10 | 2022-04-12 | 中国电信股份有限公司 | Multi-party call method, system, conference server and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN114978485A (en) | 2022-08-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2015158114A1 (en) | Intelligent communication method, terminal and system | |
CN114866234B (en) | Voice communication method, device, equipment and storage based on quantum key encryption and decryption | |
CN112689014B (en) | Double-full-work communication method, device, computer equipment and storage medium | |
US8266422B2 (en) | Network security processing method and system for selecting one of software and hardware cryptographic modules by means of multimedia session information | |
CN114828140B (en) | Service flow message forwarding method and device, storage medium and electronic equipment | |
CN113132394B (en) | Request processing system, method and device, storage medium and electronic equipment | |
CN115567209B (en) | VoIP encryption and decryption method by adopting transparent proxy and quantum key pre-filling | |
CN108234511B (en) | Method, system, equipment, storage medium and gateway for multimedia data transmission | |
CN108881801B (en) | Code stream transmission method, system, electronic equipment and storage medium for video conference | |
CN114978485B (en) | Voice data transmission method, system, electronic equipment and storage medium | |
WO2021073155A1 (en) | Video conference method, apparatus and device, and storage medium | |
CN114630290B (en) | Key negotiation method, device, equipment and storage medium for voice encryption call | |
CN112613933A (en) | Invoice data processing method and device, storage medium and electronic equipment | |
CN112398718A (en) | Network transmission method and device, electronic equipment and storage medium | |
CN111212044A (en) | Data transmission method, device and storage medium | |
CN117319516B (en) | Multi-protocol conversion protocol processing method and device, electronic equipment and medium | |
CN114448652B (en) | Method, apparatus, device and storage medium for conducting encrypted communication | |
CN115580449B (en) | Holographic communication method, device, system, electronic equipment and storage medium | |
CN115514509B (en) | Information transmission method, apparatus, electronic device, and readable storage medium | |
CN112953937B (en) | Communication end-to-end safety communication system of electric power trusted computing platform | |
CN118316608A (en) | Data encryption method, data decryption method and related equipment | |
CN117170907A (en) | Android and Web bidirectional interaction implementation method and system for hybrid development | |
CN117176893A (en) | Video call method, device, electronic equipment and storage medium | |
CN115022024A (en) | Method and device for encrypted call, storage medium and electronic equipment | |
CN117062255A (en) | Proximity service information issuing method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |