A method and device for implementing secure communication

A security, call function technology, applied in the field of information security, can solve problems such as easy loss, leakage, hidden dangers of enterprise data security, etc., to meet the needs of confidentiality and ensure the effect of security

Active Publication Date: 2019-12-17
BEIJING QIHOO TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Compared with the traditional informatization model, there are three major security risks in the BYOD environment: first, it is connected through a mobile network link, which is naturally in an open network, while traditional important information systems are connected through the enterprise intranet. secondly, the usage environment is different from the traditional informatization model, most of the traditional time is in a fixed office, and the possibility of device loss is very small, while BYOD usually uses mobile terminals, which are more likely to be lost; thirdly, BYOD uses Many personal APPs are often installed on personal devices at the same time, and there are a lot of malware in the personal APP market, which puts corporate data at risk of security
[0003] Therefore, in the process of enterprise employees using mobile terminals to make calls, the content of the call may be monitored, resulting in the problem of leaking

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for implementing secure communication
  • A method and device for implementing secure communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0044] figure 1 shows a flow chart of a method for implementing a secure call according to an embodiment of the present invention, as shown in figure 1 As shown, the method includes:

[0045] Step S110, when a call operation on the mobile terminal is detected, it is judged whether the secure call function is enabled.

[0046] That is to say, the secure call function is optional, for example, it is also possible for the user to us...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a device for realizing safe communication. Wherein said method comprises: when detecting the phone call operation on the mobile terminal, judge whether the safe call function is opened; out, and decrypt the received voice data of the other party according to the encryption and decryption algorithm in the designated storage module. In this way, the voice data transmitted during the call is encrypted, which ensures the security of the call and can meet the confidentiality requirements of the enterprise.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a method and device for realizing secure communication. Background technique [0002] With the maturity and popularization of mobile terminals, personal mobile terminals represented by mobile phones and tablet computers have gradually entered the enterprise field. This phenomenon is called Bring Your Own Device (BYOD). Compared with the traditional informatization model, there are three major security risks in the BYOD environment: first, it is connected through a mobile network link, which is naturally in an open network, while traditional important information systems are connected through the enterprise intranet. secondly, the usage environment is different from the traditional informatization model, most of the traditional time is in a fixed office, and the possibility of device loss is very small, while BYOD usually uses mobile terminals, which are more likely to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04M1/70H04W12/02H04W12/04H04W12/0471
CPCH04M1/70H04W12/02H04W12/04
Inventor 张凡郭雪奇杨智勇
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products