A data processing method for voice calls

A voice call and data processing technology, applied in the electronic field, can solve problems such as voice call security risks, and achieve the effect of reducing the possibility of malware attacks, ensuring security, and high security.

Active Publication Date: 2017-11-10
TENDYRON CORP
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the existing technology, voice calls between users may be monitored, so the current voice calls have security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data processing method for voice calls
  • A data processing method for voice calls
  • A data processing method for voice calls

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0032] Embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0033] figure 1 It is a schematic flowchart of an embodiment of a data processing method for a voice call provided by the present invention. figure 1 Illustrated method embodiments include:

[0034] Step 01. The first security device and the second security device respectively generate negotiation information and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a voice call data processing method, comprising: a first security chip of a first security device generates first negotiation information, and sends the first negotiation information to a first call terminal; and, the first security chip receives the first The second negotiation information sent by the call terminal; the first security chip calculates the first negotiation information and the second negotiation information to obtain the first call key; the first security device outputs the first authorization code, and prompts for the first authorization code Read aloud; the first security chip obtains the reading result of the first authorization code by the user of the first communication terminal, and obtains the first sound information; the first security chip uses the first call key to encrypt the first sound information, and obtains the second Encrypt data, and send the first encrypted data; after receiving the first confirmation instruction, the first security chip starts to use the first call key to encrypt and decrypt the voice call of the user of the first call terminal.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a data processing method for voice calls. Background technique [0002] In the prior art, voice calls between users may be monitored, so current voice calls have security risks. Aiming at the security risk, the method adopted in the prior art is to encrypt the voice through the call key stored in the TF card on the mobile phone, so as to realize the protection of the voice call. However, in practical applications, if the call terminal is installed with malware, hackers can use the malware to steal the call key in the TF card, and then crack the encrypted voice information, causing the risk of voice data leakage of the call terminal. How to safely perform voice encryption operation is a technical problem to be solved urgently; in addition, in the prior art, voice calls may be monitored, so reducing the possibility of voice calls being monitored is also a technical problem to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
Inventor 李东声
Owner TENDYRON CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products