A data processing method for voice calls

A voice call and data technology, which is applied in the electronic field, can solve problems such as voice call security risks, reduce the possibility of being monitored, ensure safe use, and reduce the effect of being stolen

Active Publication Date: 2017-09-19
TENDYRON CORP
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the existing technology, voice calls between users may be monitored, so the current voice calls have security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data processing method for voice calls

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0020] Embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0021] figure 1 It is a schematic flowchart of an embodiment of a data processing method for a voice call provided by the present invention.figure 1 Illustrated method embodiments include:

[0022] Step 01. The first security device and the second security device respectively generate negotiation information and se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data processing method of voice communication. The method includes the steps that first negotiation information is generated by a safety chip of a safety device, second negotiation information is received, the first negotiation information and the second negotiation information are calculated, and a communication secret key is obtained; the safety device outputs an authorization code, and is prompted to read the authorization code; the safety chip obtains the reading result of the authorization code by a user of a communication terminal, and acoustic information is obtained; the safety chip performs encryption processing on the sound information through the communication secret key, and encrypted data can be obtained and sent; after the safety chip receives second encrypted data, the safety chip decrypts the second encrypted data through the communication secret key, and second decrypted data are obtained; the safety device plays the second decrypted data and is prompted to confirm the played second decrypted data according to the first authorization code.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a data processing method for voice calls. Background technique [0002] In the prior art, voice calls between users may be monitored, so current voice calls have security risks. Aiming at the security risk, the method adopted in the prior art is to encrypt the voice through the call key stored in the TF card on the mobile phone, so as to realize the protection of the voice call. However, in practical applications, if the call terminal is installed with malware, hackers can use the malware to steal the call key in the TF card, and then crack the encrypted voice information, causing the risk of voice data leakage of the call terminal. How to safely perform voice encryption operation is a technical problem to be solved urgently; in addition, in the prior art, voice calls may be monitored, so reducing the possibility of voice calls being monitored is also a technical problem to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 李东声
Owner TENDYRON CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products