A data processing system for voice calls

A data processing system and voice call technology, applied in the electronic field, can solve problems such as voice call security risks, and achieve the effect of reducing the possibility of being monitored, high security, and improving security

Active Publication Date: 2017-12-08
TENDYRON CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the existing technology, voice calls between users may be monitored, so the current voice calls have security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data processing system for voice calls
  • A data processing system for voice calls
  • A data processing system for voice calls

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] The data processing system for voice calls provided by Embodiment 1 of the present invention includes:

[0031] The first security chip is used to obtain the digital certificate of the second security device, wherein the first security chip is located in the first security device, wherein the first security device is independent of the first call terminal, and the first security device passes through the first communication interface Connected to the first call terminal, the second safety device is a safety device of the second call terminal that conducts a voice call with the first call terminal;

[0032] The first security chip is also used to use the public key of the second security device to encrypt the call key generated by the first security chip to obtain the ciphertext of the call key, and use the private key of the first security device to at least encrypt the call key Sign the text or call key to get the signature data;

[0033] The first transmission module...

Embodiment 2

[0046] The difference between the system provided by the second embodiment of the present invention and the first embodiment above is that the receiving timing of the first confirmation instruction is different. If the encryption and decryption operation is performed on the voice call of the first call terminal, the first security chip in the second embodiment obtains the first confirmation instruction after starting the encryption and decryption operation on the voice call of the first call terminal, and uses the call key to encrypt and decrypt the voice call of the first call terminal. The call continues to perform encryption and decryption operations.

[0047] Embodiment 2 of the present invention provides a data processing system for voice calls, including:

[0048] The first security chip is used to enable the call key generated by the first security chip to encrypt and decrypt the voice call of the first call terminal, wherein the first security chip is located in the fi...

Embodiment 3

[0133] The system provided in this embodiment corresponds to the system provided in Embodiment 1, wherein Embodiment 1 is the data processing system on the side of the first security device, and this embodiment is the side of the second security device corresponding to Embodiment 1 data processing system. Because the first security device can use two implementation systems when performing signature processing, that is, it can sign the ciphertext of the call key, and can also sign the call key to obtain signed data. Correspondingly, in this embodiment The following two data processing systems are also provided.

[0134] The first voice call data processing system provided by Embodiment 3 of the present invention includes:

[0135] The second security chip is used to obtain the digital certificate of the first security device, wherein the second security chip is located in the second security device, the second security device is independent of the second call terminal, and the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a data processing system for voice calls, comprising: a first security chip for obtaining a digital certificate of a second security device; encrypting a call key generated by the first security chip to obtain a ciphertext of the call key, and using The private key of the first security device at least signs the ciphertext of the call key or the call key to obtain signature data; the first transmission module is configured to send the ciphertext and signature data of the call key through the first communication interface To the first call terminal; the first security chip is also used to verify the digital certificate of the second security device by using the root certificate; the first output module is used to output the identification information of the digital certificate of the second security device; the first prompt The module is used to prompt to confirm the identification information of the digital certificate of the second security device; the first security chip is also used to start using the call key to encrypt the voice call of the first call terminal after receiving the first confirmation instruction. decryption operation.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a data processing system for voice calls. Background technique [0002] In the prior art, voice calls between users may be monitored, so current voice calls have security risks. Aiming at security risks, the method adopted in the prior art is to encrypt the voice through the call key stored in the TF card on the mobile phone, so as to realize the protection of the voice call. However, in practical applications, if the call terminal is installed with malware, hackers can use the malware to steal the call key in the TF card, and then crack the encrypted voice information, resulting in the risk of voice data leakage of the call terminal. The voice encryption operation is a technical problem to be solved urgently; in addition, in the prior art, there is a possibility of being monitored in a voice call, so reducing the possibility of a voice call being monitored is also a technic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W12/02H04W12/06
Inventor 李东声
Owner TENDYRON CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products