Method used in key consultation of USB KEY audio ciphering and deciphering device

A key negotiation, encryption and decryption technology, which is applied in the field of key negotiation of USBKEY audio encryption and decryption devices, can solve problems such as adverse effects, network call monitoring, and encryption security cannot be guaranteed, so as to improve anti-destructive capabilities and ensure encryption strength Effect

Active Publication Date: 2010-12-29
FEITIAN TECHNOLOGIES
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, while the general public and enterprises enjoy the convenience brought by network communication, its security issues have gradually surfaced
Like other applications in the network, the security risks in network audio signal communication are worrisome. Network audio signal communication has become the target of network attackers. In addition, the generation of bad network software has led to network calls being monitored, or using Bad programs such as Trojan horse programs intercept data information, etc., frequently causing security crises in network calls
Network private information and corporate confidential information are leaked or monitored, which brings immeasurable losses to individuals and enterprises
Therefore, in the actual application of network communication, serious consequences and adverse effects may be caused by information leakage and leakage at any time.
[0004] With the increasing requirement for the security of audio communication, some instant chat software itself also has some encryption functions, but as public software for communication on the network, it becomes quite easy to crack the encryption, so its Safety cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method used in key consultation of USB KEY audio ciphering and deciphering device
  • Method used in key consultation of USB KEY audio ciphering and deciphering device
  • Method used in key consultation of USB KEY audio ciphering and deciphering device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0025] The USB KEY audio device of the present invention is connected with the host computer.

[0026] In the solution provided by the present invention, the existing USB KEY audio device is improved, and three modes can be manually set on the device: mandatory encryption, optional encryption and no encryption. A key and algorithm for encrypting and decrypting data during negotiation, a random number generation algorithm and various algorithms for encrypting and decrypting audio signals are provided in the device. In particular, the algorithm used in the negotiation can be a symmetric algorithm or an asymmetric algorithm, that is to say, the strength is higher, and the algorithm for encrypting and decrypting the audio signal should be a symmetric algorithm, and each algorithm has an identification ID.

[0027] figure 1 Among them, when preparing to c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method used for the key agreement of a USB KEY audio encryption / decryption device, which comprises the following two courses: one course is that the USB KEY audio encryption / decryption device carries out encryption processing on a collected audio signal according to set state, and the other is that the USB KEY audio encryption / decryption device carries out decryption processing on a received digital audio signal according to the type of the digital audio signal data. Through a key agreement carried out in the USB KEY audio encryption / decryption device between a sender and a receiver, the method of the invention realizes dynamic change of the encryption / decryption key and the encryption / decryption algorithm, then overcomes the defect that the encryption / decryptionkey and algorithm of the USB KEY audio encryption / decryption device in the prior art is single and fixed, improves the safety and reliability of the audio communication and transmission, strengthens the anti-destroy ability of the encrypted audio data and ensures the encryption intensity of the audio data which is impossibly stolen in a computer or a communication link.

Description

technical field [0001] The invention belongs to the field of key negotiation of USBKEY audio encryption and decryption devices, in particular, it is used for USBKEY audio encryption by dynamically changing the encryption and decryption keys and algorithms in the USBKEY audio encryption and decryption device, thereby improving the security and reliability of audio communication transmission. The method for decrypting the device key agreement. Background technique [0002] With the rapid development of computer technology, information network has become an important guarantee for social development. Nowadays, there are more and more network communication applications, and various chat software (such as QQ, MSN, Skype, etc.) are more and more widely used. With the increase of network bandwidth and the deepening of network applications, network audio signal communication has become the most Potential network application field. Network audio signal communication can convert aud...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/28H04L29/06
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products