End-to-end voice encryption method of mobile terminal based on iOS operating system

A mobile terminal and encryption method technology, applied in the field of information security, can solve the problems that the identity security of both parties in communication cannot be guaranteed, the identity authentication function is not provided, and the complexity is high.

Inactive Publication Date: 2016-07-20
东南大学常州研究院 +1
View PDF7 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method needs to dynamically select an encryption algorithm, which has high complexity and is likely to cause a large delay; and this method does not provi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • End-to-end voice encryption method of mobile terminal based on iOS operating system
  • End-to-end voice encryption method of mobile terminal based on iOS operating system
  • End-to-end voice encryption method of mobile terminal based on iOS operating system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] figure 1 Shown is the application scene diagram of the present invention. The invention is applicable to the iOS system mobile terminal capable of performing SIP calls through the WiFi / 3G / 4G network. When two parties need to carry out encrypted voice communication, the communication parties first establish an encrypted voice session through two-way identity authentication and key negotiation, and the voice is encrypted at the sending end and decrypted at the receiving end to realize end-to-end encrypted voice communication.

[0053] figure 2Shown is the overall principle structure diagram of the present invention. The present invention includes the following seven modules: a call processing module 1, an identity authentication module 2, a key negotiation module 3, a voice input and output module 4, a voice encryption and decryption processing module 5, a protocol analysis module 6 and a network transceiver module 7. Described call processing module 1 is used for pro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an end-to-end voice encryption method of a mobile terminal based on an iOS operating system. The method is applicable to WiFi/3G/4G networks. The method comprises seven modules of a call processing module, an identity authentication module, a secret key negotiation module, a voice input/output module, a voice encryption and decryption processing module, a protocol analyzing module and a network transmitting and receiving module. The total process of the realized end-to-end voice communication method comprises five steps of initiating a call by a calling party, authenticating identities, negotiating a secret key, responding to the incoming call by a called party, and encrypting, decrypting and communicating. The invention provides an end-to-end voice communication scheme which can be applied in an iOS system and comprises encryption and authentication functions. According to the scheme, the identities and voice data packets of two call parties are encrypted and authenticated, one call one secret key is realized by the two call parties through secret key negotiation, and end-to-end secure voice communication is realized in a convenient and efficient mode.

Description

technical field [0001] The invention relates to the fields of information security, mobile communication, and mobile phone operating systems, and particularly proposes an end-to-end encryption method for mobile terminal voice applied to an iOS operating system. Background technique [0002] With the rapid development of communication technology and the advent of the mobile Internet era, people's work and life have become increasingly inseparable from smartphones. And iOS is one of the most popular smartphone operating systems. The iOS system has attracted more and more high-quality users due to its better stability, fluency, power consumption control and background mechanism. iOS users are usually concerned about communication security. , privacy protection, etc. have higher requirements. However, with the rampant of fake base stations and the large-scale spread of eavesdropping technology, especially with the "Prism Gate" eavesdropping incident revealed by Snowden, the com...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/02H04W12/04H04W12/06H04L29/06H04W12/0431H04W12/069
CPCH04L63/0428H04W12/02H04W12/04H04W12/06H04L65/1104
Inventor 蒋睿钱泽虹孔华锋裴蓓尹杰
Owner 东南大学常州研究院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products