Data processing method of voice communication
A technology for voice calls and data processing, which is applied in the electronic field and can solve problems such as voice call security risks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0039] figure 1 It is a schematic flowchart of the first type of data processing method for a voice call provided by Embodiment 1 of the present invention. figure 1 The methods shown include:
[0040] The first security chip of the first security device obtains the digital certificate of the second security device, wherein the first security device is independent of the first call terminal, and the first security device is connected to the first call terminal through the first communication interface, and the second security The device is a security device of a second call terminal that conducts a voice call with the first call terminal;
[0041] After the first security chip obtains the digital certificate of the second security device, the first security chip uses the root certificate in the first security device to verify the digital certificate of the second security device. If the digital certificate of the second security device is verified, Then the first security dev...
Embodiment 2
[0120] Figure 5 It is a schematic flowchart of the first type of data processing method for a voice call provided by Embodiment 2 of the present invention. Figure 5 The methods shown include:
[0121] The first security chip of the first security device generates a call key, and starts to use the call key to encrypt and decrypt the voice call of the first call terminal, wherein the first security device is independent of the first call terminal, and the first security device connected to the first call terminal;
[0122] The first security chip acquires a digital certificate of a second security device, where the second security device is a security device of a second call terminal that conducts a voice call with the first call terminal;
[0123] After the first security chip obtains the digital certificate of the second security device, the first security chip uses the public key of the second security device to encrypt the call key to obtain the ciphertext of the call ke...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com