A data processing system for voice calls

A data processing system and voice call technology, applied in the electronic field, can solve problems such as voice call security risks

Active Publication Date: 2017-07-25
TENDYRON CORP
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the existing technology, voice calls between users may be monitored, so the current voice calls have security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data processing system for voice calls
  • A data processing system for voice calls
  • A data processing system for voice calls

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] Embodiment 1 of the present invention provides a data processing system during a voice call, and the system includes:

[0034]The first security chip is configured to generate the first negotiation information, and send the first negotiation information to the first call terminal through the first communication interface; wherein, the first security chip is located in the first security device, and the first security device and the first The call terminals are connected and independent of the first call terminal;

[0035] The second security chip is used to generate the second negotiation information, and send the second negotiation information to the second call terminal through the second communication interface; wherein, the second security chip is located in the second security device, and the second security device and the second The call terminals are connected and independent of the second call terminal;

[0036] The first security chip is also used to receive t...

Embodiment 2

[0049] In the second embodiment of the present invention and the first embodiment of the present invention, the first security chip starts to use the first call key to encrypt and decrypt the voice call of the user of the first call terminal after receiving the first confirmation instruction; the difference is that In Embodiment 1 of the present invention, after receiving the second confirmation instruction, the second security chip starts to use the second call key to encrypt and decrypt the voice call of the user of the second call terminal. In Embodiment 2 of the present invention, the second After receiving the second confirmation instruction, the security chip uses the second call key to continue to encrypt and decrypt the voice call of the user of the second call terminal.

[0050] Embodiment 2 of the present invention provides a data processing system during a voice call, and the system includes:

[0051] The first security chip is configured to generate the first negot...

Embodiment 3

[0083] The present invention provides a data processing system during a voice call, the system comprising:

[0084] The first security chip is configured to generate the first negotiation information, and send the first negotiation information to the first call terminal through the first communication interface; wherein, the first security chip is located in the first security device, and the first security device and the first The call terminals are connected and independent of the first call terminal;

[0085] The second security chip is used to generate the second negotiation information, and send the second negotiation information to the second call terminal through the second communication interface of the second security device; wherein, the second security chip is located in the second security device, and the second The security device is connected to the second communication terminal and is independent from the second communication terminal;

[0086] The first securi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a data processing system during a voice call, comprising: a first output module for outputting a first authorization code; a first prompt module for prompting to read the first authorization code aloud; a first security chip for To obtain the reading result of the first authorization code, to obtain the first sound information; to encrypt the first sound information, to obtain the first encrypted data, and to send the first encrypted data; after obtaining the first confirmation instruction, start the voice call Perform encryption and decryption operations; the second output module is used to output the second authorization code; the second security chip is used to decrypt the first encrypted data after receiving the first encrypted data to obtain the first decrypted data; the second The playback module is used to play the first decrypted data; the second prompt module is used to prompt to confirm the first decrypted data; the second security chip is also used to start encrypting and decrypting the voice call after receiving the second confirmation instruction operate.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a data processing system for voice calls. Background technique [0002] In the prior art, voice calls between users may be monitored, so current voice calls have security risks. Aiming at security risks, the method adopted in the prior art is to encrypt the voice through the call key stored in the TF card on the mobile phone, so as to realize the protection of the voice call. However, in practical applications, if the call terminal is installed with malware, hackers can use the malware to steal the call key in the TF card, and then crack the encrypted voice information, resulting in the risk of voice data leakage of the call terminal. The voice encryption operation is a technical problem to be solved urgently; in addition, in the prior art, there is a possibility of being monitored in a voice call, so reducing the possibility of a voice call being monitored is also a technic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
Inventor 李东声
Owner TENDYRON CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products