Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Terminal communication voice encryption method and system

A voice encryption and terminal call technology, applied in the field of communication, can solve the problems of easy deciphering and low security of the key, and achieve the effect of not easy deciphering and high security

Inactive Publication Date: 2015-05-20
SHENZHEN BVC SCI & TECH
View PDF8 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Most of the voice and data encryption products in the prior art use a single key for encryption and decryption, but the single key is easy to decipher and has low security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal communication voice encryption method and system
  • Terminal communication voice encryption method and system
  • Terminal communication voice encryption method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0034] See figure 1 , which is a flow chart of a method for encrypting voice in a terminal call according to the first embodiment of the present invention, the method specifically includes:

[0035] S101. The first terminal acquires a first key from its first encryption card, and sends a key agreement request carrying the first key to a second terminal.

[0036] Specifically, the size of the first encryption card in the embodiment of the present ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a terminal communication voice encryption method and system. The method comprises the following steps: obtaining a first secret key from a first encryption card of a first terminal by the first terminal and sending a secret key negotiation request carrying the first secret key to a second terminal; receiving a message which is sent by the second terminal and shows that validation is passed; sending a voice frame to the first encryption card and encrypting the voice frame by using the first secret key; sending the encrypted voice frame to the second terminal. According to the terminal communication voice encryption method disclosed by the embodiment of the invention, communication voices are encrypted by a dynamic secret key and are not easy to decode, so that the safety is higher.

Description

technical field [0001] The invention relates to the field of communications, in particular to a terminal call voice encryption method and a voice encryption system. Background technique [0002] With the vigorous development of the communication industry, communication terminals such as mobile phones have become necessities of life. At the same time, the problem of user data leakage caused by stealing the call voice information of mobile phones through eavesdropping and other means is becoming more and more serious, causing great losses to mobile phone users. Therefore, mobile phones The security of the call is becoming more and more important. When making some important calls, the user can encrypt the voice of the call. [0003] Most of the voice and data encryption products in the prior art use a single key for encryption and decryption, but the single key is easy to decipher and has low security. Contents of the invention [0004] Embodiments of the present invention p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/04H04W12/03H04W12/0431
CPCH04W12/02H04W12/04
Inventor 梁晓东
Owner SHENZHEN BVC SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products