Implementation method for specific security terminal system based on iOS system

A technology of a terminal system and an implementation method, which is applied in the field of information security, can solve problems such as high complexity, does not provide identity authentication function, and cannot guarantee the identity security of both parties in communication, and achieves the effect of improving encryption efficiency

Inactive Publication Date: 2017-06-27
东南大学常州研究院 +1
View PDF12 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method needs to dynamically select an encryption algorithm, which has high complexity and is likely to cause a large delay; and this method does not provide identity authentication, and cannot guarantee the identity security of both parties in communication, and this method does not involve mobile terminals and iOS systems. concrete implementation on

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation method for specific security terminal system based on iOS system
  • Implementation method for specific security terminal system based on iOS system
  • Implementation method for specific security terminal system based on iOS system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] figure 1Shown is the application scene diagram of the present invention. The encrypted client initiates a call request to the server through the 3G / 4G / WiFi network, and the server judges whether the called party is an Internet phone client. If the called party is an Internet phone client, it calls the called party through the 3G / 4G / WiFi network ; If the called party is not an Internet phone client, the call request is forwarded through the voice gateway. When the called party is an ordinary mobile phone user, the voice gateway sends the call to the called party through the 3G / 4G network. When the called party is an ordinary phone , the voice gateway sends the call to the called party through the PSTN network to establish the call.

[0047] like figure 2 Shown is the overall principle structure diagram of the present invention. The present invention comprises the following eight modules: iOS user registration module 1, iOS call module 2, client voice processing modul...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an implementation method for a specific security terminal system based on an iOS system, which is suitable for WiFi/3G/4G networks and comprises eight modules including an iOS user registration module, an iOS calling module, a client voice processing module, a request processing module, a parallel processing module, a user management module, a server side call processing module and a server side voice encryption and decryption module, wherein a client of the specific security terminal firstly registers with a server and initiates a call based on a client-server (C-S) framework, the server carries out authentication on identity of the client, and after the authentication is successful, the server carries out corresponding encryption and decryption processing on call voice through identifying whether a calling party and a called party establish different call modes for the security terminal, so that the voice encryption transmission from the specific security terminal to the server side is guaranteed. The invention provides an efficient and convenient method, and the method only encrypts one side with the security requirement, so that the call efficiency and the practicability are improved.

Description

technical field [0001] The invention relates to the fields of information security, mobile communication, and mobile phone operating systems, and particularly proposes a method for realizing a specific security terminal system based on the iOS system. Background technique [0002] With the rapid development of communication technology and the advent of the mobile Internet era, people's work and life have become increasingly inseparable from smartphones. And iOS is one of the most popular smartphone operating systems. The iOS system has attracted more and more high-quality users due to its better stability, fluency, power consumption control and background mechanism. iOS users are usually concerned about communication security. , privacy protection, etc. have higher requirements. However, with the rampant of fake base stations and the large-scale spread of eavesdropping technology, especially with the "Prism Gate" eavesdropping incident revealed by Snowden, the communication...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/04H04W12/06H04M1/725
CPCH04W12/02H04W12/04H04W12/06H04M1/72403
Inventor 蒋睿钱泽虹裴蓓尹杰
Owner 东南大学常州研究院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products