Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A data processing system for voice calls

A data processing system and voice call technology, applied in the electronic field, can solve problems such as voice call security risks

Active Publication Date: 2017-11-10
TENDYRON CORP
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the existing technology, voice calls between users may be monitored, so the current voice calls have security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data processing system for voice calls
  • A data processing system for voice calls
  • A data processing system for voice calls

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] The data processing system for voice calls provided by Embodiment 1 of the present invention includes:

[0040] The first security chip is configured to generate first negotiation information, and send the first negotiation information to the first call terminal through the first communication interface, and receive second negotiation information sent by the first call terminal through the first communication interface; Calculate the first negotiation information and the second negotiation information to obtain the first call key; wherein, the first security chip is located in the first security device, and the first security device is connected to the first call terminal and is independent of the first call terminal , the second negotiation information is generated by the second security device of the second call terminal, and the first call key is used to encrypt and decrypt the voice call of the user of the first call terminal;

[0041] The first output module is use...

Embodiment 2

[0065] The difference between the system provided by the second embodiment of the present invention and the first embodiment above is that the receiving timing of the first confirmation instruction is different. In the first embodiment, the first security chip starts to use the first call key to pair the first If the voice call of the user of the call terminal is encrypted and decrypted, the first security chip in the second embodiment obtains the first confirmation instruction after starting to encrypt and decrypt the voice call of the user of the first call terminal, and uses the first call encryption The key continues to perform encryption and decryption operations on the voice call of the user of the first call terminal.

[0066] The system provided by Embodiment 2 of the present invention is described in detail as follows:

[0067] The voice call data processing system provided by Embodiment 2 of the present invention includes:

[0068] The first security chip is configu...

Embodiment 3

[0161] Embodiment 3 of the present invention provides a data processing system for voice calls, and the system includes:

[0162]The second security chip is configured to receive the first negotiation information sent by the second call terminal through the second communication interface, and generate second negotiation information, and send the second negotiation information to the second call terminal through the second communication interface; The first negotiation information and the second negotiation information are calculated to obtain the second call key; wherein, the second security chip is located in the second security device, and the second security device is connected to the second call terminal and is independent of the second call terminal , the first negotiation information is generated by the first security device of the first call terminal that conducts a voice call with the second call terminal, and the second call key is used to encrypt and decrypt the voice...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data processing system of voice communication. The system comprises a first safety chip, a first output module and a first prompting module, wherein the first safety chip is used for generating first negotiation information and sending the first negotiation information to a first communication terminal through a first communication interface, and the first safety chip is also used for receiving second negotiation information sent by the first communication terminal through the first communication interface; the first negotiation information and the second negotiation information are calculated so that a first communication secret key can be obtained; the first output module is used for outputting a first authorization code; the first prompting module is used for prompting reading of the first authorization code; the first safety chip is further used for acquiring the reading result, of the first authorization code, of a user of a first communication terminal so that first acoustic information can be obtained; the first voice information is encrypted through the first communication secret key so that first encrypted data can be obtained, and the first encrypted data are sent through a first communication interface; after a first confirming instruction is obtained, the voice communication of the user of the first communication terminal is encrypted and decrypted by starting the first communication secret key.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a data processing system for voice calls. Background technique [0002] In the prior art, voice calls between users may be monitored, so current voice calls have security risks. Aiming at security risks, the method adopted in the prior art is to encrypt the voice through the call key stored in the TF card on the mobile phone, so as to realize the protection of the voice call. However, in practical applications, if the call terminal is installed with malware, hackers can use the malware to steal the call key in the TF card, and then crack the encrypted voice information, resulting in the risk of voice data leakage of the call terminal. The voice encryption operation is a technical problem to be solved urgently; in addition, in the prior art, there is a possibility of being monitored in a voice call, so reducing the possibility of a voice call being monitored is also a technic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
Inventor 李东声
Owner TENDYRON CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products