Unlock instant, AI-driven research and patent intelligence for your innovation.

A data processing method for voice calls

A voice call and data processing technology, applied in the electronic field, can solve problems such as voice call security risks, and achieve the effects of reducing the possibility of being monitored, improving the success rate, and preventing information leakage

Active Publication Date: 2017-12-08
TENDYRON CORP
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the existing technology, voice calls between users may be monitored, so the current voice calls have security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data processing method for voice calls
  • A data processing method for voice calls

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0013] figure 1 It is a schematic flowchart of the voice call data processing method provided by the present invention. figure 1 The methods shown include:

[0014] Step 101, the first security chip of the first security device obtains the digital certificate of the second security device, wherein the first security device is independent of the first call terminal, and the first security device communicates with the The first call terminal is con...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data processing method of voice communication. The method comprises the steps that a first safety chip of first safety equipment acquires a DC (Digital Certificate) of second safety equipment, wherein the first safety equipment is independent of a first talking terminal, and the first safety equipment is connected with the first talking terminal through a first communication interface, and the second safety equipment is safety equipment of a second talking terminal which is conducted for voice communication with the first talking terminal; the first safety chip uses a root certificate in the first safety equipment to verify the digital certificate of the second safety equipment; after the DC of the second safety equipment is verified, the first safety equipment outputs the identification information of the DC of the second safety equipment; and the first safety equipment prompts and confirms the identification information of the DC of the second safety equipment.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a data processing method for voice calls. Background technique [0002] In the prior art, voice calls between users may be monitored, so current voice calls have security risks. Aiming at the security risk, the method adopted in the prior art is to encrypt the voice through the call key stored in the TF card on the mobile phone, so as to realize the protection of the voice call. However, in practical applications, if the call terminal is installed with malware, hackers can use the malware to steal the call key in the TF card, and then crack the encrypted voice information, causing the risk of voice data leakage of the call terminal. How to safely perform voice encryption operation is a technical problem to be solved urgently; in addition, in the prior art, voice calls may be monitored, so reducing the possibility of voice calls being monitored is also a technical problem to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/00H04W12/02
Inventor 李东声
Owner TENDYRON CORP