What are the services of China Telecom s encrypted communication business?

Updated on technology 2024-04-26
5 answers
  1. Anonymous users2024-02-08

    Based on the CDMA mobile communication network and security management platform with wide coverage and large capacity, China Telecom's encrypted communication service provides customers with end-to-end mobile phone call encryption, personal information protection based on terminals, and mobile phone loss security protection through specially customized special mobile phone terminals with encryption algorithms assigned by the State Cryptography Administration, and commercial cryptography technology and information security technology.

    1. Encrypted call function: The encrypted call function refers to the end-to-end encrypted call service that can be transferred from ordinary calls to encrypted calls and directly initiated with encrypted calls when both parties use encrypted communication terminals and open encrypted communication services.

    1) Conversion of ordinary to encrypted communication refers to the establishment of an ordinary (plaintext) call between two encrypted communication service users, and then through verbal negotiation, an encrypted call is established by pressing the encrypted call button or menu on the encrypted communication terminal.

    2) Direct initiation of a confidential call means that the caller selects an encrypted call when the call is initiated, initiates an encrypted call, the called party answers, and the two parties establish an encrypted call after the connection is completed.

    2. Information security protection function: The information security protection function refers to the use of encrypted communication terminals, and the opening of encrypted communication services, customers can set password protection for the access rights of encrypted call contact contacts and call records stored on the mobile phone, and through the security channel between the China Telecom Key Management Center (hereinafter referred to as KMC) platform and the encrypted communication terminal, to achieve password emptying, lost mobile phone information protection and other security enhancement services.

    There are two local usage modes for encrypted communication terminals:

    1) Normal mode: You can initiate or accept encrypted calls, but you can't read the private information stored on the terminal;

    2) Security mode: not only can you use encrypted call services, but also can read and operate the privacy information stored on the terminal, and set up encrypted contacts for ordinary contacts individually, in groups or in batches, or directly establish encrypted contacts. To enter the security mode, you need to enter the password, and the security mode entrance can be triggered by boot input, shortcut, menu switching, etc.

    The privacy information includes the records of all encrypted calls in the security mode, the encrypted contact information and the related call logs (excluding the ordinary call records established by dialing a number and the encrypted contacts in the normal mode), and can be set as encrypted contacts for individual, group, or bulk contacts through the corresponding menus. The password clearing function means that when the user forgets the password to enter the security mode or enters the wrong password for 5 consecutive times, resulting in the terminal being locked, he can apply to China Telecom for password emptying, and China Telecom's KMC platform will remotely send instructions to clear the password to the default value. The lost mobile phone information protection function means that when the user loses the encrypted communication terminal, in order to prevent the leakage of privacy information in the terminal, he can apply to China Telecom for the protection of lost mobile phone information, and the China Telecom KMC platform erases the privacy information on the terminal by sending instructions remotely.

  2. Anonymous users2024-02-07

    Telecom encryption is applicable to customers of communication services

    Industry: Party and government organs, finance, large enterprises, scientific research institutions, real estate industry, etc.;

    Job nature: discipline inspection, auditing, finance, research and development, sales and other clear ideas have obvious needs of middle-level leaders and ordinary employees.

  3. Anonymous users2024-02-06

    Industry: Party and government organs, finance, large enterprises, scientific research institutions, real estate industry, etc.;

    The above information is for reference only, Guangxi Telecom worry-free card, monthly rent is only five yuan, traffic ladder billing, the more you use, the cheaper, the details can be logged in to the Guangxi Electric Chain congratulatory letter online business hall to inquire and handle, customer service No. 127 for you to answer,

  4. Anonymous users2024-02-05

    China Telecom's encrypted communication business is based on China Telecom's CDMA mobile communication network and security management platform with wide coverage and large capacity, and through China Telecom's special mobile phone terminals specially customized for customers and built-in encryption algorithms assigned by the Commercial Cryptography Management Office of the National Cryptography Administration, China Telecom's encrypted communication business provides customers with security services such as civilian-grade end-to-end mobile phone voice communication encryption function, terminal-based personal information protection and lost mobile phone information protection through commercial cryptography technology and information security technology.

    China Telecom's encrypted communication business has the following characteristics:

    1) National commercial cryptography certification, voice encryption is more assured: the only provider of cryptography-level voice encryption business in China, and has the only certification qualification of the State Cryptography Administration.

    2) End-to-end encryption, one phone and one password is more secure: end-to-end full ciphertext transmission, random key, one key for each call.

    3) The special mobile phone has strong functions, and the data information can be hidden: hide the address book and call history and other data information of specific contacts. Lu Fengyuan.

    4) If the phone is lost, there is no need to worry, the remote command will be erased in the early state: the remote command will erase all the contacts, call logs and SMS information stored on the mobile phone and memory card in normal mode and security mode.

  5. Anonymous users2024-02-04

    1. National commercial secret level certification, voice encryption is more assured; It is the exclusive provider of classified voice encryption services in China and has the only certification qualification of the State Cryptography Administration.

    2. End-to-end encryption, one word and one password is more secure; End-to-end full ciphertext transmission, random key, one key at a time.

    3. The special mobile phone has strong functions, and the data information can be hidden; Hide profile information such as contacts and call logs for specific contacts.

    4. If the mobile phone is lost, there is no need to worry, the remote command will erase it; Remotely command to erase the contacts and call logs of specific contacts stored on the phone.

Related questions
10 answers2024-04-26

China Telecom. "Switchboard service" refers to the integrated communication and information service business that integrates the functions and services of China Telecom's integrated virtual network, enterprise switchboard, one-code business** (unified number inbound), number 100 business travel and information service, and Huiyitong around the diversified communication and information needs of government and enterprise customers, so as to realize unified business acceptance and service opening. >>>More

11 answers2024-04-26

1) One-point access to the whole network service: cross-domain operation for Anhui customers, "one-point card, one-point billing, one-stop service". (2) Powerful self-management platform: >>>More

6 answers2024-04-26

Hello. Telecom Broadband promises same-day installation, same-day repair, and slow accompanying service >>>More

9 answers2024-04-26

The 11888 recharge card can be recharged as follows:

1. Voice recharge method: >>>More

4 answers2024-04-26

Hello, the traffic of telecommunications should have the following six kinds, you can make a choice according to your personal needs, you can directly dial the 10000 number to directly apply for ordering a traffic package, or you can send a text message to open it, send ** to 10001 to open it. >>>More