Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method and system for secure call and terminals

A terminal and secure technology, applied in the field of communication, which can solve the problems of unreliability, eavesdropping on the content of calls, and deceiving the called party.

Inactive Publication Date: 2016-07-20
ZTE CORP
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In daily voice calls, the terminal usually has a caller ID function, but at present, there are changes in the network to modify the calling number, control the caller ID number of the called party, and disguise the phone number as a number trusted by the called party to achieve deception. The purpose of being called, so it is unreliable to trust the other party only based on the caller ID; and in the process of voice communication, the content of the call may be eavesdropped

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for secure call and terminals
  • Method and system for secure call and terminals
  • Method and system for secure call and terminals

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0147] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention.

[0148] See figure 1 , Which shows an application scenario provided by an embodiment of the present invention. It is understandable that this application scenario is only used to illustrate the technical solution of the embodiment of the present invention, and is not intended to limit the present invention in any way. In this scenario, the main Call terminal 1, certification center 2, and called terminal 3. It is understandable that, in this embodiment, certification center 2 can be a trusted third-party certificate authority (CA, Certificate Authority), responsible for the generation and issuance of digital certificates , Download and logout. The authentication center 2 and the calling terminal 1 and the called terminal 3 can be connected by a data network 4 respectively; and the c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the invention disclose a method and a system for a secure call and terminals. The method comprises the following steps that a called terminal receives an identifier of a first digital certificate sent by a calling terminal and verifies the legality of a number of the calling terminal according to the identifier of the first digital certificate after the called terminal is connected to an incoming call of the calling terminal; the called terminal verifies the legality of the identity of the calling terminal according to the number of the calling terminal after the called terminal determines that the number of the calling terminal is legal; a signal code is negotiated by the called terminal and the calling terminal after the called terminal determines that the identity of the calling terminal is legal; and the called terminal carries out encryption communication with the calling terminal through the signal code.

Description

Technical field [0001] The present invention relates to communication technology, in particular to a method, a calling terminal, a called terminal and a system for a secure call. Background technique [0002] In daily voice calls, the terminal usually has a caller ID function, but at present, the caller number is modified in the network, the caller ID number of the called party is controlled, and the phone number is disguised as a number trusted by the called party to achieve deception. The purpose of the called party, so it is unreliable to trust the other party only based on the caller ID; and in the process of voice communication, the content of the call may be eavesdropped. Summary of the invention [0003] In order to solve the above technical problems, the embodiments of the present invention expect to provide a method, terminal and system for a secure call, which can prevent the masquerading of the calling number and the eavesdropping of the content of the call from occurri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04W12/04H04W12/06H04W12/03H04W12/041H04W12/069
CPCH04L9/32
Inventor 任斌钟安利
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products