Supercharge Your Innovation With Domain-Expert AI Agents!

A mobile terminal and its voice encryption method

A mobile terminal, voice encryption technology, applied in telephone communication, digital transmission system, electrical components, etc.

Active Publication Date: 2016-04-13
NUBIA TECHNOLOGY CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a mobile terminal and a voice encryption method thereof, so as to achieve the purpose of encrypting the voice information itself, and overcome the defect that the above-mentioned existing methods cannot fundamentally prevent the voice information of the call from being eavesdropped

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A mobile terminal and its voice encryption method
  • A mobile terminal and its voice encryption method
  • A mobile terminal and its voice encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] figure 1 It is the flowchart of the method for voice encryption according to an embodiment of the present invention, below in conjunction with figure 1 To describe the voice encryption method according to an embodiment of the present invention, the method is applied to a first mobile terminal and a second mobile terminal that conduct voice calls with each other, and the mobile terminals, such as mobile phones, tablet computers, etc., can be used for voice calls portable electronic devices such as figure 1 As shown, the method for voice encryption according to an embodiment of the present invention includes the following steps:

[0043] S10. The first mobile terminal extracts partial segment audio signals from the received audio signals according to preset rules or irregular rules;

[0044] S20. The first mobile terminal sends the character segment storing the extraction position and the extracted audio signal to the second mobile terminal through the data channel, and...

Embodiment 2

[0059] figure 2 It is the flowchart of the method for voice encryption according to another embodiment of the present invention, as figure 2 As shown, on the basis of including the above-mentioned steps S10, S20, S30, the method for this voice encryption, the above-mentioned S40 specifically includes:

[0060] S41. Recombining the received audio signals from the data channel and the voice channel according to the character field;

[0061] S42. Determine whether the human ear is listening to the phone, if yes, output the recombined audio signal, otherwise, shield the output audio signal.

[0062] Among them, whether the human ear is listening to the phone can be judged by infrared detection, or by a temperature sensor to detect whether the temperature of the contact medium is human body temperature.

[0063] The purpose of this embodiment is to limit the call to the human ear, so that other people cannot use the earphone to expose the call content, or the call content can b...

Embodiment 3

[0065] image 3 It is the flowchart of the method for voice encryption according to another embodiment of the present invention, as image 3 As shown, the method for this voice encryption is on the basis of comprising above-mentioned steps S10, S20, S30, and above-mentioned S40 is specifically:

[0066] S43. According to the character field, the received audio signals from the data channel and the voice channel are reassembled by the earphone through decryption, and then output.

[0067] According to an example of this embodiment, as an option, the method for voice encryption further includes:

[0068] The external playback function of the second mobile terminal is prohibited.

[0069] The purpose of this embodiment is to make the confidentiality of the content of the call better, and only through a specific decryption earphone can an important call be answered.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mobile terminal and a voice encryption method thereof, and belongs to the technical field of mobile terminals. The method is applied to a first mobile terminal and a second mobile terminal. The method comprises the following steps: extracting sound signals in a partial section according to a preset rule or irregularly from received sound signals by the first mobile terminal; sending a character field with stored extraction locations and the extracted sound signals to the second mobile terminal by the first mobile terminal through a data channel, and sending the rest sound signals after extraction to the second mobile terminal through a voice channel; receiving the sound signals and the character field with the stored extraction locations, which are sent by the first mobile terminal respectively through the data channel and the voice channel, by the second mobile terminal; according to the character field, recombining the sound signals received from the data channel and the voice channel and then outputting the recombined signals. The mobile terminal provided by the invention enables voice in a conversation to protect the sound signals, so that the wiretapping of voice information in the conversation is fundamentally eradicated.

Description

technical field [0001] The invention relates to the technical field of mobile terminals, in particular to a mobile terminal and a voice encryption method thereof. Background technique [0002] Due to the diversification of people's life and work, in different occasions, users have different privacy content that needs to be kept secret, especially when important calls are involved. Stealing third-party software may cause immeasurable losses. [0003] In the prior art, in order to overcome the above-mentioned defects, the method adopted is to enable the security mode for the mobile terminal or important contacts. Only when the security mode is activated, the incoming call can be answered normally. This method can protect the Privacy of user calls. [0004] However, existing methods for protecting user calls still have defects. Most of the existing methods are to limit the current environment (safety mode or non-safety mode) of the user or mobile terminal who is answering af...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04M1/725H04L9/00
Inventor 杜国伟
Owner NUBIA TECHNOLOGY CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More