Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A voice encryption method and voice sending terminal

A sending terminal and voice encryption technology, applied in the field of communication, to reduce the burden of decryption and improve security

Active Publication Date: 2020-04-07
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] But for computer experts, it is not difficult to easily decipher encrypted signals when only a piece of noise or noise can be eavesdropped, so the security of voice communication is still a very difficult problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A voice encryption method and voice sending terminal
  • A voice encryption method and voice sending terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0026] see figure 1 , the embodiment of the present invention discloses a voice encryption method, which is applied to a voice sending terminal to improve the security of voice communication. The method includes:

[0027] Step 101: determine whether the user will start dictating character string information during the call; when it is judged that the user will start dictating character string information, enter step 102; otherwise, directly input the character...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a voice encryption method and a voice sending terminal. The method is applied to the voice sending terminal. The method includes: judging whether the user wants to start dictating character string information during a call; if so, start an encryption algorithm The character string information dictated by the user is encrypted into another character string information; the encrypted character string information is input into the mobile communication network, thereby improving the security of the voice communication.

Description

technical field [0001] The invention relates to the technical field of communication, and more specifically, to a voice encryption method and a voice sending terminal. Background technique [0002] While enjoying the various conveniences brought by voice communication, the public also suffers from security issues that cannot be ignored in voice communication. Among them, eavesdropping on bank card numbers and passwords is the most common. Therefore, it is necessary to encrypt the content of voice calls, specifically: Encrypt the voice signal before it enters the mobile communication network, the voice receiving terminal can decrypt the original voice signal after receiving the encrypted signal, and the eavesdropper can only hear the noise or noise caused by the wrong voice decryption. [0003] But for computer experts, it is not difficult to easily decipher encrypted signals when only a piece of noise or noise can be eavesdropped, so the security of voice communication is st...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W12/02H04W12/04H04W12/033
CPCH04L63/0428H04L63/062H04W12/02H04W12/033H04L9/40
Inventor 陈涌
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products