Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mobile terminal voice end-to-end encryption method based on ios operating system

A mobile terminal and encryption method technology, applied in the field of information security, can solve the problems of inability to guarantee the identity security of both parties in communication, high complexity, and no identity authentication function provided.

Inactive Publication Date: 2019-02-26
东南大学常州研究院 +1
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method needs to dynamically select an encryption algorithm, which has high complexity and is likely to cause a large delay; and this method does not provide identity authentication, and cannot guarantee the identity security of both parties in communication, and this method does not involve the iOS system. Implementation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal voice end-to-end encryption method based on ios operating system
  • Mobile terminal voice end-to-end encryption method based on ios operating system
  • Mobile terminal voice end-to-end encryption method based on ios operating system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] figure 1 Shown is the application scene diagram of the present invention. The invention is applicable to the iOS system mobile terminal capable of performing SIP calls through the WiFi / 3G / 4G network. When two parties need to carry out encrypted voice communication, the communication parties first establish an encrypted voice session through two-way identity authentication and key negotiation, and the voice is encrypted at the sending end and decrypted at the receiving end to realize end-to-end encrypted voice communication.

[0053] figure 2Shown is the overall principle structure diagram of the present invention. The present invention includes the following seven modules: a call processing module 1, an identity authentication module 2, a key negotiation module 3, a voice input and output module 4, a voice encryption and decryption processing module 5, a protocol analysis module 6 and a network transceiver module 7. Described call processing module 1 is used for pro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an end-to-end encryption method for voice of a mobile terminal based on an iOS operating system, which is suitable for WiFi / 3G / 4G networks, and includes a call processing module, an identity authentication module, a key negotiation module, a voice input and output module, and voice encryption and decryption There are seven modules in total including processing module, protocol analysis module and network transceiver module. The overall flow of the implemented end-to-end voice communication method includes five steps: the calling party initiates a call, identity authentication, key agreement, the called party responds to the call, and encryption and decryption communication steps. The invention provides an end-to-end voice communication scheme applicable to the iOS system, including encryption and authentication functions, which encrypts and authenticates the identities and voice data packets of both parties in the call, and the two parties in the call realize a voice call through key negotiation. Yimi realizes end-to-end secure voice communication in a convenient and efficient way.

Description

technical field [0001] The invention relates to the fields of information security, mobile communication, and mobile phone operating systems, and particularly proposes an end-to-end encryption method for mobile terminal voice applied to an iOS operating system. Background technique [0002] With the rapid development of communication technology and the advent of the mobile Internet era, people's work and life have become increasingly inseparable from smartphones. And iOS is one of the most popular smartphone operating systems. The iOS system has attracted more and more high-quality users due to its better stability, fluency, power consumption control and background mechanism. iOS users are usually concerned about communication security. , privacy protection, etc. have higher requirements. However, with the rampant of fake base stations and the large-scale spread of eavesdropping technology, especially with the "Prism Gate" eavesdropping incident revealed by Snowden, the com...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04W12/04H04W12/06H04L29/06H04W12/0431H04W12/069
CPCH04L63/0428H04W12/02H04W12/04H04W12/06H04L65/1104
Inventor 蒋睿钱泽虹孔华锋裴蓓尹杰
Owner 东南大学常州研究院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products