Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security device

A security device and security chip technology, applied in the electronic field, can solve problems such as voice call security risks, reduce the possibility of being monitored, prevent information leakage, and improve security

Active Publication Date: 2014-09-10
TENDYRON CORP
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the existing technology, voice calls between users may be monitored, so the current voice calls have security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security device
  • Security device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0019] figure 1 It is a schematic structural diagram of the security device provided by Embodiment 1 of the present invention. figure 1 The safety device shown is independent of the call terminal, and the safety device is connected to the call terminal through a communication interface; the safety device includes:

[0020] The security chip 101 is used to obtain the digital certificate of the target security device, and use the root certificate in the security device to verify the digital certificate of the target security device; wherein, the target security device is the security chip of the target call terminal that conducts voice calls with the call terminal. equipment;

[0021] The output module 102 is configured to output the identification information of the digital certificate of the target security device after verifying that the digital certificate of the target security device passes;

[0022] The prompt module 103 is configured to prompt for confirmation of the i...

Embodiment 2

[0081] figure 2 It is a schematic diagram of a voice call data processing system provided by Embodiment 2 of the present invention. figure 2 The system shown is a system for processing voice calls between two call terminals. The devices on one side of the system include call terminals and figure 1 As shown in the security device, the security device is connected to the call terminal through the communication interface, and the call terminal is connected to the target call terminal through the communication network, wherein the security device includes a security chip; the other side of the system includes the target call terminal and the target security device , the target call terminal is connected to the target security device through the target communication interface, wherein the target security device includes a target security chip.

[0082] combine figure 2 The system structure shown is described as follows for this complete interactive embodiment:

[0083] The s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security device which is independent of a calling terminal and is connected with the calling terminal through a communication interface. The security device comprises a security chip, an output module and a prompt module; the security chip is used for obtaining a digital certificate of a target security device and performing verification on the digital certificate of the target security device through a root certificate in the security device; the target security device is a security device of a target calling terminal, wherein a voice call is performed between the target calling terminal and the calling terminal; the output module is used for outputting the identification information of the digital certificate of the target security device after the verification of the digital certificate of the target security device passes; the prompt module is used for prompting the confirmation on the identification information of the digital certificate of the target security device.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a safety device. Background technique [0002] In the prior art, voice calls between users may be monitored, so current voice calls have security risks. Aiming at security risks, the method adopted in the prior art is to encrypt the voice through the call key stored in the TF card on the mobile phone, so as to realize the protection of the voice call. However, in practical applications, if the call terminal is installed with malware, hackers can use the malware to steal the call key in the TF card, and then crack the encrypted voice information, resulting in the risk of voice data leakage of the call terminal. The voice encryption operation is a technical problem to be solved urgently; in addition, in the prior art, there is a possibility of being monitored in a voice call, so reducing the possibility of a voice call being monitored is also a technical problem to be solved u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02H04W12/04
Inventor 李东声
Owner TENDYRON CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products