Method and device for end-to-end ciphering voice
A technology of voice encryption and encryption device, applied in the direction of selection device, electrical components, anti-eavesdropping circuit, etc., can solve problems such as voice encryption, and achieve the effect of simple implementation, communication security, and easy implementation.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0035] The technical solutions of the present invention will be described in further detail below with reference to the accompanying drawings and embodiments.
[0036] Such as figure 1 As shown, it is a schematic flow chart of an embodiment of the end-to-end voice encryption method of the present invention. In this embodiment, the end-to-end voice encryption process includes the following steps:
[0037] Step 101, the first mobile terminal in the call state sends the DTMF signal input through the key to the second mobile terminal at the other end of the call, and obtains the corresponding key index information according to the key interruption of the key input, and then obtains the corresponding key index information from its own The key storage area extracts the corresponding key;
[0038] Step 102, after establishing an encrypted conversation channel, the first mobile terminal conducts an encrypted conversation with the second mobile terminal according to the key.
[0039...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com