Data processing method of voice communication

A voice call and data processing technology, which is applied in the electronic field, can solve the problems of voice call security risks, reduce the possibility of malware attacks, ensure safe use, and reduce the effect of being stolen

Active Publication Date: 2014-08-06
TENDYRON CORP
View PDF11 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the existing technology, voice calls between users may be monitored, so the current voice calls have security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method of voice communication
  • Data processing method of voice communication
  • Data processing method of voice communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0032] Embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0033] figure 1 It is a schematic flowchart of an embodiment of a data processing method for a voice call provided by the present invention. figure 1 Illustrated method embodiments include:

[0034] Step 01. The first security device and the second security device respectively generate negotiation information and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data processing method of voice communication. The method includes the steps that first negotiation information is generated by a first safety chip of a first safety device, and the first negotiation information is sent to a first communication terminal; the first safety chip receives second negotiation information sent by the first communication terminal; the first negotiation information and the second negotiation information are calculated by the first safety chip so that a first communication secret key can be obtained; the first safety device outputs a first authorization code and is prompted to read the first authorization code; the first safety chip acquires the reading result, of the authorization code, of a user of a first communication terminal so that first acoustic information can be obtained; the first safety chip encrypts the first voice information through the first communication secret key so that first encrypted data can be obtained, and the first encrypted data are sent; after a first confirming instruction is obtained, the first safety chip starts the first communication secret key to encrypt or decrypt voice communication of the user of the first communication terminal.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a data processing method for voice calls. Background technique [0002] In the prior art, voice calls between users may be monitored, so current voice calls have security risks. Aiming at the security risk, the method adopted in the prior art is to encrypt the voice through the call key stored in the TF card on the mobile phone, so as to realize the protection of the voice call. However, in practical applications, if the call terminal is installed with malware, hackers can use the malware to steal the call key in the TF card, and then crack the encrypted voice information, causing the risk of voice data leakage of the call terminal. How to safely perform voice encryption operation is a technical problem to be solved urgently; in addition, in the prior art, voice calls may be monitored, so reducing the possibility of voice calls being monitored is also a technical problem to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/04H04M1/68
Inventor 李东声
Owner TENDYRON CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products