Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and device for realizing secure communication

A technology for secure communication and access, applied in telephone communication, branch equipment, electrical components, etc., to avoid the risk of eavesdropping

Active Publication Date: 2019-08-30
NUBIA TECHNOLOGY CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At this stage, a large number of mobile terminals adopt the Android (Android) operating system. Due to its open source characteristics, there are many applications and functions, which is convenient for developers, but also has many disadvantages.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for realizing secure communication
  • A method and device for realizing secure communication
  • A method and device for realizing secure communication

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0083] Such as Figure 5 As shown, Example 1 of the present invention provides a method for secure communication, including the following steps:

[0084] Step S501, the user instructs to make a call through a secure call method under the Android system service environment;

[0085] Wherein, on the calling interface under the service environment of the Android system, the option of a safe calling method is provided for the user to choose;

[0086] Step S502, saving the phone number, exiting the Android system service environment, and restarting the Linux operating system;

[0087] Step S503, start the Linux operating system kernel;

[0088] Step S504, use the ALSA tool to configure the sound card (audio codec);

[0089] Wherein, run custom code in the initialization init process of Linux operating system, described custom code is used for starting audio frequency codec and opening communication channel, and starts modem and drives described modem to initiate a call according...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for realizing a safe call, wherein the method is applied on a mobile terminal. The method comprises the steps of after a user dials a telephone number in a safe communication manner, storing the telephone number, exiting an Android system service environment, and restarting a Linux operating system; after a Linux operating system kernel is started, starting an audio coder-decoder for calling and starting a calling path in an init initiating process of the Linux operating system, and starting a modem and driving the modem to initiate a call according to the previously stored telephone number; and after ending of the call which is initiated by the modem is detected, entering the Android system service environment again. The method and the device according to the invention can realize safe call of a mobile terminal which utilizes the Android system, thereby preventing a call tapping risk.

Description

technical field [0001] The present invention relates to the technical field of terminals, in particular to a method and device for realizing secure communication. Background technique [0002] At present, a large amount of mobile terminals have adopted the Android (Android) operating system. Due to its open source characteristics, there are many applications and functions, which is convenient for developers, but also has many disadvantages. [0003] For example, illegal users can easily obtain Root authority (super administrator system authority), and even silently obtain the user's Root authority without the user's awareness at all. For example, inducing a user to download a game, the attack code can be executed only by flashing a Banner (banner identification bar). Therefore, it is possible to monitor the user's voice, monitor the content of the user's call, and then upload it to the server through the network, etc., which damage the user's interests. [0004] Therefore,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04M1/725
CPCH04M1/72448H04M1/72484
Inventor 李光宇
Owner NUBIA TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products