Voice encryption system based on smartphone and realization method thereof

A technology for voice encryption and smartphones, applied in transmission systems, digital transmission systems, and key distribution, can solve problems such as increased user costs and inconvenience for users, and achieve the effects of increased additional costs, high security levels, and guaranteed useability

Inactive Publication Date: 2016-10-12
TOEC ANCHEN INFORMATION TECH
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Moreover, many encryption methods currently require replacement of smart phone terminals or addition of terminal hardware devices, which not only increases user costs, but also brings great inconvenience to users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Voice encryption system based on smartphone and realization method thereof
  • Voice encryption system based on smartphone and realization method thereof
  • Voice encryption system based on smartphone and realization method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] Embodiments of the present invention provide a smart phone-based voice encryption system, see figure 1 , the voice encryption system includes: a password module 1 and a voice communication device 2.

[0052]Wherein, the cryptographic module 1 adopts common commercial cryptographic algorithms such as SHA1, SHA-256, RSA1024, RSA2048, DES, and AES algorithms. The cryptographic module 1 provides encryption and decryption application operations for data, realizes key management, and ensures the validity and security of keys.

[0053] Voice call device 2 includes: system control module 21, user account management module 22, call record management module 23, local information management module 24, data sending and receiving module 25, voice control module 26, user interface control module 27 and user setting management module 28.

[0054] The system control module 21 realizes data communication with the password module 1; the system control module 21 realizes data communicat...

Embodiment 2

[0068] Embodiments of the present invention provide a method for implementing a voice encryption system based on smart phones, see the following description for details:

[0069] see figure 1 and image 3 , the process of binding the user account of the voice encryption system in the present invention is: the system control module 21 realizes the input of the user account by calling the user interface control module 27, calls the account binding module 221 to judge the legitimacy of the user account input, calls the account binding Fixed module 221 sends verification short message to user account by server, calls user interface control module 27 to realize the input of short message verification code, calls account binding module 221 to judge the correctness of the short message verification code of input, realizes by calling user interface module 27 User information input, call the account binding module 221 to judge the validity of the input user information, call the data ...

Embodiment 3

[0087] Embodiments of the present invention provide a method for implementing a voice encryption system based on smart phones, see the following description for details:

[0088] In actual application, the function of encrypted voice calls is realized through two sets of voice encryption systems. The voice encryption system A is used as the calling party, and the voice encryption system B is used as the called party as an example to illustrate the encrypted voice call process. The system control module 21 of the voice encryption system A is marked as the first system control module, and the system control module 21 of the voice encryption system B is marked as the second system control module. The data sending and receiving module 25 of the voice encryption system A is marked as the first data sending and receiving module, and the data sending and receiving module 25 of the voice encryption system B is marked as the second data sending and receiving module. The encryption modu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a smart phone-based voice encryption system and its implementation method. When a user account is bound, the system control module realizes the input of the user account by calling the user interface control module to judge the validity of the input user account, and the server will verify the validity of the input user account. Send the SMS to the user account; realize the input of the SMS verification code, judge the correctness of the input SMS verification code, realize the user information input, and judge the legitimacy of the input user information; call the data sending and receiving module to communicate with the server to complete the user registration , call the user interface control module to wait for the user operation, and complete the binding of the user account; Account information modification. It also includes: a password module, and the invention solves the possible problems of data loss and privacy leakage.

Description

technical field [0001] The invention belongs to the technical field of voice encryption, and in particular relates to a smart phone-based voice encryption system and an implementation method thereof. Background technique [0002] Voice is a telephone communication service originally provided by telecom operators, and users can use this service to make two-way simultaneous calls. Voice can be initiated by a mobile communication terminal (mobile phone), or by a voice platform server of a mobile network operator, or by an Internet-based voice platform server. As a basic service provided by telecom operators and Internet operators, almost all smartphone users use voice communication. Users can communicate with their family, friends and colleagues in real time through voice to realize the function of communication; it can also be used to receive the voice verification code sent by the server for payment, registration and other services. [0003] However, while voice calls provi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L65/1069H04L9/0825H04L63/0428H04L63/061H04L63/0823H04M2203/6045H04M2203/609
Inventor 吕前进梁友仁胡双喜程贝贝刘健旭张学静肖文瀚吴彤
Owner TOEC ANCHEN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products