Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method of realizing changing open talk to secret talk

A technology of encrypting and transciphering, which is applied in the direction of confidential communication, electrical components, network topology, etc., and can solve problems such as the inability to ensure that the dedicated terminals on both sides enter the encrypted communication process, the terminals cannot communicate normally, and the dedicated terminals cannot control each other.

Active Publication Date: 2010-07-28
HUAWEI TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] It can be seen from the above description that during the entire implementation process of switching from plain language to encrypted voice, the dedicated terminals on both sides cannot control each other. The dedicated terminal simultaneously enters the encrypted communication process
In the process of changing from plain language to encrypted voice, various unpredictable problems will occur. For example, the dedicated terminal on one side has switched to encrypted voice communication, while the dedicated terminal on the other side has not yet switched to encrypted voice communication. , the information exchanged between the two parties cannot be correctly understood between the dedicated terminals, resulting in the failure of normal communication; another example, the switching process from plain voice to encrypted voice takes a long time, making it impossible for the terminals to communicate normally

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of realizing changing open talk to secret talk
  • Method of realizing changing open talk to secret talk
  • Method of realizing changing open talk to secret talk

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0029] In the present invention, firstly, the terminals carry out the business negotiation of switching to the encrypted voice, and then establish the transparent transmission channel of the encrypted voice, so as to ensure that the realization process of converting the plain voice to the encrypted voice can be carried out smoothly. The above-mentioned terminal may be a mobile terminal or a fixed terminal. The implementation process of the present invention will be described in detail below by taking the mobile terminal as an example.

[0030] figure 2 Shows the flow chart of clear speech to encrypted speech in the present invention, such as figure 2 As shown, the implementation process of converting clear speech to encrypted speech includes the following steps...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses a method for turning talks from open to secrete including: a first terminal sends a request of turning open to secrete talk service and informs a second terminal to start the secrete talk service negotiation with the network side, at the same time, the first terminal starts the negotiation between itself and the network side to set up a secrete talk transmission channel, then, the two terminals carry out the secrete talk process. First of all, terminals negotiate on the transfer of secrete talks then a secrete transmission channel is set up to secure the transfer process smoothly. Besides, this invention also provides a method for realizing the process control of turning open talk to secrete by signaling in the band.

Description

technical field [0001] The present invention relates, in particular, to a method for converting plaintext to encrypted speech. Background technique [0002] Each industry has unique requirements for communication according to its own characteristics. In the past, the general practice was to build a dedicated network for communication according to its special needs, but this method is no longer used, mainly for the following reasons: on the one hand, the general communication network can meet the basic needs of each dedicated network; On the one hand, the construction and maintenance costs of private networks are very high, and the construction period is also very long; on the other hand, since private networks are not universal, the development of private network technology is relatively slow. Due to the above reasons, the current private network construction is usually implemented by superimposing the network, that is, superimposing special equipment that can meet the spec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04K1/00H04W84/00
Inventor 李世前
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products