Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for improving safety of voice communication of mobile terminal system based on safety micro secure digital (TF) card

A voice communication and mobile terminal technology, applied in wireless communication, transmission systems, security devices, etc., can solve the problems of illegal interception and eavesdropping of wireless channels, and achieve the effect of ensuring confidentiality and enhancing security.

Active Publication Date: 2012-04-11
ZHENGZHOU XINDA JIEAN INFORMATION TECH
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, since the voice communication function provided by the mobile terminal system is based on wireless communication, the wireless channel is more likely to be illegally intercepted and eavesdropped by a malicious third party.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for improving safety of voice communication of mobile terminal system based on safety micro secure digital (TF) card
  • Method and system for improving safety of voice communication of mobile terminal system based on safety micro secure digital (TF) card
  • Method and system for improving safety of voice communication of mobile terminal system based on safety micro secure digital (TF) card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] Embodiment 1, a method for enhancing the voice communication security of a mobile terminal system based on a secure TF card, characterized by:

[0026] Step 1: Determine the session key used for voice data encryption and decryption through out-of-band methods, and directly generate the session key when issuing a secure TF card to the user and store it in the secure TF card;

[0027] Step 2: When the voice communication is initiated, the voice communication content is sent to the voice communication server after the voice data stream is encrypted by the voice communication processing component of the mobile terminal using the session key to call the encryption component;

[0028] Step 3: After receiving the voice data stream sent by the mobile terminal, the voice communication server performs different processing according to the destination call address in the voice data stream.

Embodiment 2

[0029] Embodiment 2, a method for enhancing the voice communication security of a mobile terminal system based on a secure TF card, characterized by:

[0030] Step 1: Determine the session key used for voice data encryption and decryption through out-of-band means, and directly generate the session key when issuing a secure TF card to the user and store it in the secure TF card;

[0031] Step 2: When the voice communication is initiated, the voice communication content is sent to the voice communication server after the voice data stream is encrypted by the voice communication processing component of the mobile terminal using the session key to call the encryption component;

[0032] Step 3: After receiving the voice data stream sent by the mobile terminal, the voice communication server performs different processing according to the destination call address in the voice data stream.

[0033] Out of the need for effective management of keys, each mobile terminal system only retains the...

Embodiment 3

[0036] Embodiment 3, a method for enhancing the voice communication security of a mobile terminal system based on a secure TF card, characterized by:

[0037] Step 1: Determine the session key used for voice data encryption and decryption through out-of-band methods, and directly generate the session key when issuing a secure TF card to the user and store it in the secure TF card;

[0038] Step 2: When the voice communication is initiated, the voice communication content is sent to the voice communication server after the voice data stream is encrypted by the voice communication processing component of the mobile terminal using the session key to call the encryption component;

[0039] Step 3: After receiving the voice data stream sent by the mobile terminal, the voice communication server performs different processing according to the destination call address in the voice data stream.

[0040] Out of the need for effective management of keys, each mobile terminal system only retains t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and a system for improving the safety of the voice communication of a mobile terminal system based on a safety micro secure digital (TF) card. The method comprises the following steps of: determining session keys for encrypting and decrypting voice data in an out-of-band mode, during issuance of the safety TF card to a user, directly generating the session keys, and storing the session keys into the safety TF card; during initiation of the voice communication, processing voice communication contents through a voice communication processing component of a mobile terminal, calling an encryption component by using the session keys to encrypt a voice data stream, and then sending the voice data stream to a voice communication server; and after the voice communication server receives the voice data stream which is sent by the mobile terminal, performing different processing according to a destination calling address in the voice data stream. By the invention, the encryption and decryption operation of the voice communication can be realized, the security of information in the transmission process of the voice communication is strongly guaranteed, and even if a malicious third party in the transmission process intercepts the voice communication data stream, the real content of the voice communication data stream cannot be really obtained.

Description

Technical field [0001] The invention relates to a secure voice communication method, in particular to a method and system for enhancing the voice communication security of a mobile terminal system based on a secure TF card. Background technique [0002] Voice communication is one of the important functions that mobile terminal systems can have. Voice communication is the most frequently used function in daily life, work and study. Through it, people can exchange various information in a timely, clear, accurate and direct manner. A considerable amount of this information will involve people's various privacy or secret sensitive information. At the same time, since the voice communication function provided by the mobile terminal system is based on wireless communication, the wireless channel is more likely to be intercepted and intercepted by malicious third parties. [0003] On the basis of existing voice communication services, how to enhance the security of voice communication i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02H04W12/04H04L29/06H04L29/12H04W12/033H04W12/041
Inventor 常朝稳李平董建强何骏梁松涛石淑英刘熙胖赵国磊
Owner ZHENGZHOU XINDA JIEAN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products