Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for improving safety of voice communication of mobile terminal system based on safety micro secure digital (TF) card

A voice communication and mobile terminal technology, applied in wireless communication, transmission system, security device, etc., can solve the problem of illegal interception and eavesdropping of wireless channels, and achieve the effect of ensuring confidentiality and enhancing security

Active Publication Date: 2013-12-18
ZHENGZHOU XINDA JIEAN INFORMATION TECH
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, since the voice communication function provided by the mobile terminal system is based on wireless communication, the wireless channel is more likely to be illegally intercepted and eavesdropped by a malicious third party.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for improving safety of voice communication of mobile terminal system based on safety micro secure digital (TF) card
  • Method and system for improving safety of voice communication of mobile terminal system based on safety micro secure digital (TF) card
  • Method and system for improving safety of voice communication of mobile terminal system based on safety micro secure digital (TF) card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] Embodiment 1, a kind of method based on safe TF card strengthens the mobile terminal system voice communication security, it is characterized in that:

[0026] Step 1, determine the session key used for voice data encryption and decryption in an out-of-band manner, and directly generate the session key when issuing a secure TF card to the user and store it in the secure TF card;

[0027] Step 2, when the voice communication is initiated, the voice communication content is sent to the voice communication server after the voice communication processing component uses the session key to call the encryption component to encrypt the voice data stream through the voice communication processing component of the mobile terminal;

[0028] Step 3: After receiving the voice data stream from the mobile terminal, the voice communication server performs different processing according to the destination call address in the voice data stream.

Embodiment 2

[0029] Embodiment 2, a kind of method based on safe TF card strengthens the mobile terminal system voice communication security, it is characterized in that:

[0030] Step 1, determine the session key used for voice data encryption and decryption in an out-of-band manner, and directly generate the session key when issuing a secure TF card to the user and store it in the secure TF card;

[0031] Step 2, when the voice communication is initiated, the voice communication content is sent to the voice communication server after the voice communication processing component uses the session key to call the encryption component to encrypt the voice data stream through the voice communication processing component of the mobile terminal;

[0032] Step 3: After receiving the voice data stream from the mobile terminal, the voice communication server performs different processing according to the destination call address in the voice data stream.

[0033] Due to the need for effective key ...

Embodiment 3

[0036] Embodiment 3, a kind of method based on safe TF card strengthens the mobile terminal system voice communication security, it is characterized in that:

[0037] Step 1, determine the session key used for voice data encryption and decryption in an out-of-band manner, and directly generate the session key when issuing a secure TF card to the user and store it in the secure TF card;

[0038] Step 2, when the voice communication is initiated, the voice communication content is sent to the voice communication server after the voice communication processing component uses the session key to call the encryption component to encrypt the voice data stream through the voice communication processing component of the mobile terminal;

[0039] Step 3: After receiving the voice data stream from the mobile terminal, the voice communication server performs different processing according to the destination call address in the voice data stream.

[0040]Due to the need for effective key m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and a system for improving the safety of the voice communication of a mobile terminal system based on a safety micro secure digital (TF) card. The method comprises the following steps of: determining session keys for encrypting and decrypting voice data in an out-of-band mode, during issuance of the safety TF card to a user, directly generating the session keys, and storing the session keys into the safety TF card; during initiation of the voice communication, processing voice communication contents through a voice communication processing component of a mobile terminal, calling an encryption component by using the session keys to encrypt a voice data stream, and then sending the voice data stream to a voice communication server; and after the voice communication server receives the voice data stream which is sent by the mobile terminal, performing different processing according to a destination calling address in the voice data stream. By the invention, the encryption and decryption operation of the voice communication can be realized, the security of information in the transmission process of the voice communication is strongly guaranteed, and even if a malicious third party in the transmission process intercepts the voice communication data stream, the real content of the voice communication data stream cannot be really obtained.

Description

technical field [0001] The invention relates to a method for secure voice communication, in particular to a method and system for enhancing the security of voice communication in a mobile terminal system based on a secure TF card. Background technique [0002] Voice communication is one of the important functions that the mobile terminal system can have. Voice communication is the most frequently contacted and used function in daily life, work and study. Through it, people can exchange all kinds of information timely, clearly, accurately and directly. A considerable amount of these information will involve people's various private or secret sensitive information. At the same time, since the voice communication function provided by the mobile terminal system is based on wireless communication, the wireless channel is more likely to be illegally intercepted and eavesdropped by a malicious third party. [0003] How to enhance the security of voice communication of mobile term...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04W12/04H04L29/06H04L29/12H04W12/033H04W12/041
Inventor 常朝稳李平董建强何骏梁松涛石淑英刘熙胖赵国磊
Owner ZHENGZHOU XINDA JIEAN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products