Bidirectional authentication multichannel voice encryption communication method, device and system

A voice encryption and two-way authentication technology, applied in the field of communication security, can solve problems such as inability to carry out confidential communication, inability to decrypt, session conflicts, etc., to prevent malicious attacks and the possibility of stealing secrets, resist malicious eavesdropping and cracking, and avoid session failures Effect

Inactive Publication Date: 2021-02-23
合肥诺卡物联网科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] On the one hand, in the prior art, when multiple confidential calls are required, key coverage or session conflicts may occur, resulting in the inability to decrypt, leading to the problem that confidential communication cannot be carried out;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The technical solutions in the embodiments of the present invention will be clearly and completely described below. Obviously, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0054] It should be noted that certain names are used in the specification and claims to refer to specific components. It should be understood that those skilled in the art may use different names to refer to the same component. The specification and claims of the present application do not use the difference in name as a way to distinguish components, but use the substantial difference in function of components as a criterion for distinguishing components. As used in the specification and claims of this application, "comprising" o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of communication security, and discloses a bidirectional authentication multichannel voice encryption communication method, device and system, and the method comprises the steps: carrying out the grading of a client, employing an identity key to read an identifier, obtaining a transmission key through the identifier, carrying out the transmission of a session key through the transmission key, and establishing encryption session through a session key. The device comprises a client, a server and a background database, and the system comprises one or more processors, a storage device and a bidirectional authentication multi-channel voice encryption communication device. Conflict processing of multi-voice communication requests can be realized, voice communication can be conveniently and reliably kept secret, and the method, device and system achieve the effective unification of the recognition of two sides of voice data and the secret transmission of data, prevent the secret data from being maliciously eavesdropped or counterfeited, and are better in practical value.

Description

technical field [0001] The invention relates to the technical field of communication security, in particular to a two-way authentication multi-channel voice encryption communication method, device and system. Background technique [0002] With the continuous development of technology, mobile or wireless communication has been widely used by people as a convenient way of communication. With the increasing popularity of wireless or mobile communication technology, the issue of communication security has become increasingly prominent and has become an important issue that people pay attention to. [0003] On the one hand, in the prior art, when multiple confidential calls are required, key coverage or session conflicts may occur, resulting in the inability to decrypt, leading to the problem that confidential communication cannot be carried out; [0004] On the other hand, in existing communication, in order to realize secure communication, confidential conversations are often p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/08H04L9/06
CPCH04L9/0631H04L9/0866H04L9/0869H04L63/0428H04L63/0869H04L67/14
Inventor 王玉龙解正来孙正明
Owner 合肥诺卡物联网科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products