Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mobile terminal capable of encrypting voice information and encryption method thereof

A voice information and mobile terminal technology, applied in the field of mobile communication, can solve the problems of leakage, poor security, and large service platform construction, and achieve the effect of decryption and security improvement.

Inactive Publication Date: 2016-06-29
深圳市创百智能科技有限公司 +1
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The voice channel has the advantages of less full-duplex delay, but in mobile communication standards such as GSM, the original voice signal itself is not encrypted, but is encrypted at the communication protocol level. If the channel is cracked and monitored, there is a risk of leakage
The data channel can encrypt the voice signal and then transmit it, but because of the different requirements of communication specifications, the real-time performance of the data channel is not as good as that of the voice channel, there will be a certain delay in the call, and the user experience is not good; and the data service is based on Internet technology. With IP as the address, while the existing network uses dynamic IP, the data must be routed through the server to provide routing support, and a service platform needs to be built, which requires a huge investment
[0003] In short, when the existing mobile phone encrypts the voice, the transmission through the voice channel has the problem of poor security; the transmission through the data channel has problems such as poor real-time performance and large service platform construction.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal capable of encrypting voice information and encryption method thereof
  • Mobile terminal capable of encrypting voice information and encryption method thereof
  • Mobile terminal capable of encrypting voice information and encryption method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The invention provides a mobile terminal capable of encrypting voice information and an encryption method thereof. In order to make the object, technical solution and effect of the present invention more clear and definite, the present invention will be further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0029] see figure 1 , the mobile terminal capable of encrypting voice information provided by the present invention includes a first mobile phone communication module 110 , a second mobile phone communication module 120 , an encryption and decryption module 130 , a microphone 140 and an electroacoustic device 150 . The mobile terminal includes devices capable of voice communication such as mobile phones, smart wearable devices, and tablet computers. In this embodiment, it is pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mobile terminal capable of encrypting voice information and an encryption method thereof. The mobile terminal comprises an encryption and decryption module, a first mobile phone communication module and a second mobile phone communication module. In the invention, voice information acquired by a microphone is encrypted through the encryption and decryption module; the encrypted voice information is transmitted to the first mobile phone communication module; the first mobile phone communication module transmits the voice information to another mobile terminal communicating with the mobile terminal; and the encryption and decryption module also transmits a secret key to another mobile terminal through the second mobile phone communication module. According to the invention, separate transmission of secrete keys of the voice information is realized; the encryption security is improved; after the secret key and the voice information output by another mobile terminal are received, the voice information is encrypted through the encryption and decryption module; therefore, decryption of the voice information is realized; even though any channel of two communicating mobile terminals is monitored, a monitor cannot obtain all information; and thus, the encryption security is improved.

Description

technical field [0001] The invention relates to the technical field of mobile communication, in particular to a mobile terminal capable of encrypting voice information and an encryption method thereof. Background technique [0002] According to the existing mobile communication standards for mobile phones, voice calls use the voice channel, while data services use the data channel. The voice channel has the advantage of less delay in full-duplex, but in mobile communication standards such as GSM, the original voice signal itself is not encrypted, but is encrypted at the communication protocol level. If the channel is cracked and monitored, there is a risk of leakage. The data channel can encrypt the voice signal and then transmit it, but because of the different requirements of communication specifications, the real-time performance of the data channel is not as good as that of the voice channel, there will be a certain delay in the call, and the user experience is not good;...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02H04W12/04H04L29/06H04W12/03
CPCH04L63/0428H04L63/068H04W12/02H04W12/04
Inventor 张家宝陈伟刘建国袁建伟祝宁华
Owner 深圳市创百智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products