Method and system for improving safety of voice communication of mobile terminal system based on safety micro secure digital (TF) card
A voice communication and mobile terminal technology, applied in wireless communication, transmission system, security device, etc., can solve the problem of illegal interception and eavesdropping of wireless channels, and achieve the effect of ensuring confidentiality and enhancing security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0025] Embodiment 1, a kind of method based on safe TF card strengthens the mobile terminal system voice communication security, it is characterized in that:
[0026] Step 1, determine the session key used for voice data encryption and decryption in an out-of-band manner, and directly generate the session key when issuing a secure TF card to the user and store it in the secure TF card;
[0027] Step 2, when the voice communication is initiated, the voice communication content is sent to the voice communication server after the voice communication processing component uses the session key to call the encryption component to encrypt the voice data stream through the voice communication processing component of the mobile terminal;
[0028] Step 3: After receiving the voice data stream from the mobile terminal, the voice communication server performs different processing according to the destination call address in the voice data stream.
Embodiment 2
[0029] Embodiment 2, a kind of method based on safe TF card strengthens the mobile terminal system voice communication security, it is characterized in that:
[0030] Step 1, determine the session key used for voice data encryption and decryption in an out-of-band manner, and directly generate the session key when issuing a secure TF card to the user and store it in the secure TF card;
[0031] Step 2, when the voice communication is initiated, the voice communication content is sent to the voice communication server after the voice communication processing component uses the session key to call the encryption component to encrypt the voice data stream through the voice communication processing component of the mobile terminal;
[0032] Step 3: After receiving the voice data stream from the mobile terminal, the voice communication server performs different processing according to the destination call address in the voice data stream.
[0033] Due to the need for effective key ...
Embodiment 3
[0036] Embodiment 3, a kind of method based on safe TF card strengthens the mobile terminal system voice communication security, it is characterized in that:
[0037] Step 1, determine the session key used for voice data encryption and decryption in an out-of-band manner, and directly generate the session key when issuing a secure TF card to the user and store it in the secure TF card;
[0038] Step 2, when the voice communication is initiated, the voice communication content is sent to the voice communication server after the voice communication processing component uses the session key to call the encryption component to encrypt the voice data stream through the voice communication processing component of the mobile terminal;
[0039] Step 3: After receiving the voice data stream from the mobile terminal, the voice communication server performs different processing according to the destination call address in the voice data stream.
[0040]Due to the need for effective key m...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com