A data processing method for voice calls

A voice call and data processing technology, which is applied in the electronic field, can solve problems such as voice call security risks, reduce the possibility of being monitored, ensure safety, and improve the success rate.

Active Publication Date: 2017-09-19
TENDYRON CORP
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the existing technology, voice calls between users may be monitored, so the current voice calls have security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data processing method for voice calls
  • A data processing method for voice calls
  • A data processing method for voice calls

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] figure 1 It is a schematic flow chart of the voice call data processing method provided by Embodiment 1 of the present invention. figure 1 The methods shown include:

[0032] Step 101, the first security chip of the first security device obtains the digital certificate of the second security device, wherein the first security device is independent of the first call terminal, and the first security device is connected to the first call terminal through the first communication interface, The second security device is a security device of a second call terminal that conducts a voice call with the first call terminal;

[0033] Step 102: After the first security chip obtains the digital certificate of the second security device, the first security chip uses the public key of the second security device to encrypt the call key generated by the first security chip to obtain the ciphertext of the call key, and use The private key of the first security device at least signs the...

Embodiment 2

[0043] The difference between the method provided by the second embodiment of the present invention and the first embodiment above is that the receiving timing of the first confirmation instruction is different. If the encryption and decryption operation is performed on the voice call of the first call terminal, the first security chip in the second embodiment obtains the first confirmation instruction after starting the encryption and decryption operation on the voice call of the first call terminal, and uses the call key to encrypt and decrypt the voice call of the first call terminal. The call continues to perform encryption and decryption operations.

[0044] figure 2 It is a schematic flow chart of the voice call data processing method provided by Embodiment 2 of the present invention. figure 2 The methods shown include:

[0045] Step 201, the first security chip of the first security device starts to use the call key generated by the first security chip to encrypt an...

Embodiment 3

[0123]The method provided in this embodiment corresponds to the method provided in Embodiment 1, wherein Embodiment 1 is the data processing method on the side of the first security device, and this embodiment is the method on the side of the second security device corresponding to Embodiment 1 data processing method. Since the first security device can use two implementation methods when performing signature processing, that is, it can sign the ciphertext of the call key, or sign the call key to obtain signed data. Correspondingly, in this embodiment The following two data processing methods are also provided.

[0124] Figure 3A It is a schematic flow chart of the voice call data processing method provided by Embodiment 3 of the present invention. Figure 3A The methods shown include:

[0125] Step 3A1, the second security chip of the second security device obtains the digital certificate of the first security device, wherein the second security device is independent of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a voice call data processing method, comprising: a first security chip of a first security device acquires a digital certificate of a second security device; the first security chip encrypts a call key generated by the first security chip to obtain a call key The ciphertext of the key, at least sign the ciphertext of the call key or the call key to obtain the signature data; the first security device sends the ciphertext and signature data of the call key to the first call terminal; the first security chip Use the root certificate to verify the digital certificate of the second security device, if the verification is passed, the first security device outputs the identification information of the digital certificate of the second security device, and prompts for confirmation of the identification information of the digital certificate of the second security device ; After receiving the first confirmation instruction, the first security chip starts to encrypt and decrypt the voice call of the first call terminal.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a data processing method for voice calls. Background technique [0002] In the prior art, voice calls between users may be monitored, so current voice calls have security risks. Aiming at security risks, the method adopted in the prior art is to encrypt the voice through the call key stored in the TF card on the mobile phone, so as to realize the protection of the voice call. However, in practical applications, if the call terminal is installed with malware, hackers can use the malware to steal the call key in the TF card, and then crack the encrypted voice information, resulting in the risk of voice data leakage of the call terminal. The voice encryption operation is a technical problem to be solved urgently; in addition, in the prior art, there is a possibility of being monitored in a voice call, so reducing the possibility of a voice call being monitored is also a technic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W12/02H04W12/06
Inventor 李东声
Owner TENDYRON CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products