Data processing method of voice communication

A technology for voice calls and data processing, which is applied in the electronic field and can solve problems such as voice call security risks

Active Publication Date: 2014-09-24
TENDYRON CORP
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the existing technology, voice calls between users may be monitored, so the current voice calls have security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method of voice communication
  • Data processing method of voice communication
  • Data processing method of voice communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] figure 1 It is a schematic flowchart of the first type of data processing method for a voice call provided by Embodiment 1 of the present invention. figure 1 The methods shown include:

[0040] The first security chip of the first security device obtains the digital certificate of the second security device, wherein the first security device is independent of the first call terminal, and the first security device is connected to the first call terminal through the first communication interface, and the second security The device is a security device of a second call terminal that conducts a voice call with the first call terminal;

[0041] After the first security chip obtains the digital certificate of the second security device, the first security chip uses the root certificate in the first security device to verify the digital certificate of the second security device. If the digital certificate of the second security device is verified, Then the first security dev...

Embodiment 2

[0120] Figure 5 It is a schematic flowchart of the first type of data processing method for a voice call provided by Embodiment 2 of the present invention. Figure 5 The methods shown include:

[0121] The first security chip of the first security device generates a call key, and starts to use the call key to encrypt and decrypt the voice call of the first call terminal, wherein the first security device is independent of the first call terminal, and the first security device connected to the first call terminal;

[0122] The first security chip acquires a digital certificate of a second security device, where the second security device is a security device of a second call terminal that conducts a voice call with the first call terminal;

[0123] After the first security chip obtains the digital certificate of the second security device, the first security chip uses the public key of the second security device to encrypt the call key to obtain the ciphertext of the call ke...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data processing method of voice communication. The method comprises the steps that a first safety chip acquires a DC (Digital Certificate) of second safety equipment; the first safety chip verifies the DC of the second safety equipment, if the DC for verifying the second safety equipment is passed, the first safety equipment outputs and prompts the identification information of the DC of the second safety equipment for confirmation; after a first confirmation instruction is obtained, the first safety chip starts the voice communication and performs encryption and decryption; the first safety chip encrypts a communication secret key to obtain a ciphertext of the communication secret key, and the ciphertext of the communication secret key is signed at least to obtain signature data, and the first safety equipment sends the ciphertext of the communication secret key and the signature data; a second safety chip verifies the signature data, if the verification of the signature data is passed, the ciphertext of the communication secret key is decrypted to obtain a communication secret key; after the verification of the signature data is passed, the second safety chip encrypts and decrypts the voice communication.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a data processing method for voice calls. Background technique [0002] In the prior art, voice calls between users may be monitored, so current voice calls have security risks. Aiming at security risks, the method adopted in the prior art is to encrypt the voice through the call key stored in the TF card on the mobile phone, so as to realize the protection of the voice call. However, in practical applications, if the call terminal is installed with malware, hackers can use the malware to steal the call key in the TF card, and then crack the encrypted voice information, resulting in the risk of voice data leakage of the call terminal. The voice encryption operation is a technical problem to be solved urgently; in addition, in the prior art, there is a possibility of being monitored in a voice call, so reducing the possibility of a voice call being monitored is also a technic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/02H04W12/06
Inventor 李东声
Owner TENDYRON CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products