Security device
A security device and security chip technology, applied in the electronic field, can solve problems such as voice call security risks, reduce the possibility of being monitored, prevent information leakage, and improve security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0019] figure 1 It is a schematic structural diagram of the security device provided by Embodiment 1 of the present invention. figure 1 The safety device shown is independent of the call terminal, and the safety device is connected to the call terminal through a communication interface; the safety device includes:
[0020] The security chip 101 is used to obtain the digital certificate of the target security device, and use the root certificate in the security device to verify the digital certificate of the target security device; wherein, the target security device is the security chip of the target call terminal that conducts voice calls with the call terminal. equipment;
[0021] The output module 102 is configured to output the identification information of the digital certificate of the target security device after verifying that the digital certificate of the target security device passes;
[0022] The prompt module 103 is configured to prompt for confirmation of the i...
Embodiment 2
[0081] figure 2 It is a schematic diagram of a voice call data processing system provided by Embodiment 2 of the present invention. figure 2 The system shown is a system for processing voice calls between two call terminals. The devices on one side of the system include call terminals and figure 1 As shown in the security device, the security device is connected to the call terminal through the communication interface, and the call terminal is connected to the target call terminal through the communication network, wherein the security device includes a security chip; the other side of the system includes the target call terminal and the target security device , the target call terminal is connected to the target security device through the target communication interface, wherein the target security device includes a target security chip.
[0082] combine figure 2 The system structure shown is described as follows for this complete interactive embodiment:
[0083] The s...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com