Conversation encryption method, device and system
A technology for encrypting calls and encrypting keys, which is applied in interconnection devices, security devices, telephone communications, etc., which can solve the problems that terminals/mobile phone cards are not compatible with each other, and achieve the effect of expanding the scope of application of terminals
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0067] The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are only a part of the embodiments of the present application, but not all of the embodiments. Based on the embodiments in the present application, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present application.
[0068] Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided in order to give a thorough understanding of the embodiments of the present application. However, those skilled in the art will appreciate that the technical solutions of the present application may be practiced without one or mor...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


