VOIP call encryption method and terminal

A technology for encrypting calls and encryption algorithms, applied in the field of communications, can solve problems such as low call security, and achieve the effects of improving security, reducing the risk of key leakage, and reducing the risk of being intercepted

Inactive Publication Date: 2018-06-01
深圳市恒达移动互联科技有限公司
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The technical problem solved by the present invention is to provide a VOIP encrypted call method and

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • VOIP call encryption method and terminal
  • VOIP call encryption method and terminal
  • VOIP call encryption method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0050] In order to have a clearer understanding of the technical features, purposes and effects of the present invention, the specific implementation manners of the present invention will now be described with reference to the accompanying drawings.

[0051] see figure 1 , figure 1 The flowchart of an embodiment of the VOIP encrypted call method provided by the present invention, as figure 1 shown, including the following steps:

[0052] Step S10, generating a trusted execution environment (Trusted Execution Environment, TEE).

[0053] In the embodiment of the present invention, the TEE may be generated on a VOIP encrypted call terminal, and the VOIP encrypted call terminal may be a smart phone. The TEE is a functional unit that integrates software and hardware inside the VOIP encrypted call terminal. Compared with the Rich Execution Environment (REE), the TEE can realize unified management and unified allocation of hardware resources, and the Different applications can be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a VOIP call encryption method. The method comprises the steps of generating a trusted execution environment (TEE); dynamically generating a secret key through a trusted application (TA) in the TEE; encrypting audio data based on the secret key and an encryption algorithm to obtain audio encrypted data; transmitting the audio encrypted data and the secret key to a receiving end through an Internet protocol (IP) path; and deleting the secret key after receiving the audio encrypted data at the receiving end. The invention also discloses a VOIP call encryption terminal. TheVOIP call encryption method and terminal provided by the invention can greatly improve the security during the call and reduce the risk of the call being intercepted.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to an Internet phone (Voice Over Internet Protocol, VOIP) encrypted call method and terminal. Background technique [0002] With the widespread popularization of the Internet, more and more people surf the Internet. The Internet has penetrated into various aspects of people's clothing, food, housing, transportation and work, and has become an important part of people's daily life. While the Internet brings convenience to the public, it also brings data security issues. For example, in recent years, there have been frequent incidents of various camera intrusions, monitoring of mobile terminal calls, and theft of personal information that threaten the safety of life and property. Aiming at the security problem of telephone monitoring, in the prior art, the sender encrypts the audio data and sends it to the receiver through the IP network, and the receiver decrypts the e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0891H04L63/062H04L65/1104
Inventor 吕洋
Owner 深圳市恒达移动互联科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products