Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for voice communication encryption and decryption

A voice communication, encryption and decryption technology, applied in wireless communication, electrical components, safety devices, etc., can solve the problems of low security and reliability of voice communication, potential safety hazards of mobile phone users, leakage of mobile phone user information, etc., to improve speed, High security, the effect of ensuring security

Active Publication Date: 2019-02-01
PRANUS BEIJING TECH CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are certain shortcomings in voice communication in the public network, that is, the security and reliability of voice communication are relatively low
This is because the public network uses plaintext to transmit the voice communication between mobile phones. This way of plaintext transmission makes the voice communication between mobile phones easy to be eavesdropped by others, which leads to the leakage of mobile phone user information. Mobile phone users pose a great security risk
Especially for some specific groups, such as governments, agencies, scientific research and other secret-related units, the eavesdropping of voice communication may lead to the leakage of secret-related information, and the consequences are disastrous

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for voice communication encryption and decryption
  • Method and system for voice communication encryption and decryption
  • Method and system for voice communication encryption and decryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to better understand and illustrate the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0033] The invention provides a voice communication encryption and decryption method. Please refer to figure 1 , figure 1 It is a flow chart of the method for encrypting and decrypting voice communication according to the present invention. As shown, the method includes the following steps:

[0034] In step S101, the first mobile terminal initiates a call to the second mobile terminal through the first STK menu, the STK menu is provided by the first SIM card in the first mobile terminal;

[0035] In step S102, the first SIM card sends the pre-stored key corresponding to the voice communication between the first mobile terminal and the second mobile terminal to the first mobile terminal in the first mobile terminal. The communication module, the key is also pre-stored in the second SIM card ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method for voice communication encryption and decryption, the method comprising: a first mobile terminal initiates a call to a second mobile terminal through a first STK menu, and the STK menu is provided by a first SIM card in the first mobile terminal ; The first SIM card sends the pre-stored key corresponding to the voice communication between the first mobile terminal and the second mobile terminal to the first communication module in the first mobile terminal, and the key is also pre-stored at the second In the second SIM card in the second mobile terminal; the first communication module encrypts the voice frame sent by the first mobile terminal to the second mobile terminal with a key, and sends the encrypted voice frame to the second mobile terminal; The second communication module in the second mobile terminal obtains the key from the second SIM card after receiving the call from the first mobile terminal; the second communication module uses the key to decrypt the received voice frame. Correspondingly, the present invention also provides a voice communication encryption and decryption system. Implementing the invention can effectively improve the security of voice communication.

Description

technical field [0001] The invention relates to the technical field of mobile communication, in particular to a method and system for encrypting and decrypting voice communication. Background technique [0002] The emergence of mobile phones has brought great convenience to people's lives, especially the voice communication function, which enables people to communicate anytime and anywhere without being limited by space and region. In the prior art, the voice communication between mobile phones is carried out in the public network provided by the operator. There are certain disadvantages in performing voice communication in a public network, that is, the security and reliability of voice communication are relatively low. This is because the public network uses plaintext to transmit the voice communication between mobile phones. This way of plaintext transmission makes the voice communication between mobile phones easy to be eavesdropped by others, which leads to the leakage...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04W12/04H04W12/03
CPCH04W12/02H04W12/04
Inventor 王子宜李涛
Owner PRANUS BEIJING TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products