End-to-end voice encryption method of mobile terminal based on iOS operating system
A mobile terminal and encryption method technology, applied in the field of information security, can solve the problems that the identity security of both parties in communication cannot be guaranteed, the identity authentication function is not provided, and the complexity is high.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0052] figure 1 Shown is the application scene diagram of the present invention. The invention is applicable to the iOS system mobile terminal capable of performing SIP calls through the WiFi / 3G / 4G network. When two parties need to carry out encrypted voice communication, the communication parties first establish an encrypted voice session through two-way identity authentication and key negotiation, and the voice is encrypted at the sending end and decrypted at the receiving end to realize end-to-end encrypted voice communication.
[0053] figure 2Shown is the overall principle structure diagram of the present invention. The present invention includes the following seven modules: a call processing module 1, an identity authentication module 2, a key negotiation module 3, a voice input and output module 4, a voice encryption and decryption processing module 5, a protocol analysis module 6 and a network transceiver module 7. Described call processing module 1 is used for pro...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com