Data processing system for voice communication

A data processing system and voice call technology, applied in the electronic field, can solve problems such as voice call security risks

Active Publication Date: 2014-08-13
TENDYRON CORP
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the existing technology, voice calls between users may be monitored, so the current voice calls have security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing system for voice communication
  • Data processing system for voice communication
  • Data processing system for voice communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] Embodiment 1 of the present invention provides a data processing system during a voice call, and the system includes:

[0034]The first security chip is configured to generate the first negotiation information, and send the first negotiation information to the first call terminal through the first communication interface; wherein, the first security chip is located in the first security device, and the first security device and the first The call terminals are connected and independent of the first call terminal;

[0035] The second security chip is used to generate the second negotiation information, and send the second negotiation information to the second call terminal through the second communication interface; wherein, the second security chip is located in the second security device, and the second security device and the second The call terminals are connected and independent of the second call terminal;

[0036] The first security chip is also used to receive t...

Embodiment 2

[0049] In the second embodiment of the present invention and the first embodiment of the present invention, the first security chip starts to use the first call key to encrypt and decrypt the voice call of the user of the first call terminal after receiving the first confirmation instruction; the difference is that In Embodiment 1 of the present invention, after receiving the second confirmation instruction, the second security chip starts to use the second call key to encrypt and decrypt the voice call of the user of the second call terminal. In Embodiment 2 of the present invention, the second After receiving the second confirmation instruction, the security chip uses the second call key to continue to encrypt and decrypt the voice call of the user of the second call terminal.

[0050] Embodiment 2 of the present invention provides a data processing system during a voice call, and the system includes:

[0051] The first security chip is configured to generate the first negot...

Embodiment 3

[0083] The present invention provides a data processing system during a voice call, the system comprising:

[0084] The first security chip is configured to generate the first negotiation information, and send the first negotiation information to the first call terminal through the first communication interface; wherein, the first security chip is located in the first security device, and the first security device and the first The call terminals are connected and independent of the first call terminal;

[0085] The second security chip is used to generate the second negotiation information, and send the second negotiation information to the second call terminal through the second communication interface of the second security device; wherein, the second security chip is located in the second security device, and the second The security device is connected to the second communication terminal and is independent from the second communication terminal;

[0086] The first securi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data processing system for voice communication. The data processing system for voice communication comprises a first output module, a first prompt module, a first safety chip, a second output module, a second safety chip, a second play module and a second prompt module. The first output module is used for outputting a first authorization code. The first prompt module is used for prompting reading on the first authorization code. The first safety chip is used for obtaining a reading result of the first authorization code and obtaining a first voice message; the first voice message is encrypted, so that first encrypted data are obtained, and the first encrypted data are sent; after a first confirmation instruction is obtained, the encryption and decryption operation on voice communication is started. The second output module is used for outputting a second authorization code. The second safety chip is used for receiving the first encrypted data, decrypting the first encrypted data and obtaining first decrypted data. The second play module is used for playing the first encrypted data. The second prompt module is used for prompting confirmation on the first encrypted data. The second safety chip is further used for starting the encryption and decryption operation on voice communication after receiving a second confirmation instruction.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a data processing system for voice calls. Background technique [0002] In the prior art, voice calls between users may be monitored, so current voice calls have security risks. Aiming at security risks, the method adopted in the prior art is to encrypt the voice through the call key stored in the TF card on the mobile phone, so as to realize the protection of the voice call. However, in practical applications, if the call terminal is installed with malware, hackers can use the malware to steal the call key in the TF card, and then crack the encrypted voice information, resulting in the risk of voice data leakage of the call terminal. The voice encryption operation is a technical problem to be solved urgently; in addition, in the prior art, there is a possibility of being monitored in a voice call, so reducing the possibility of a voice call being monitored is also a technic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/04H04W12/06
Inventor 李东声
Owner TENDYRON CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products