CN103974242B - A kind of data processing method of voice call - Google Patents
A kind of data processing method of voice call Download PDFInfo
- Publication number
- CN103974242B CN103974242B CN201410208608.3A CN201410208608A CN103974242B CN 103974242 B CN103974242 B CN 103974242B CN 201410208608 A CN201410208608 A CN 201410208608A CN 103974242 B CN103974242 B CN 103974242B
- Authority
- CN
- China
- Prior art keywords
- call
- authorization code
- user
- safety
- call terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The present invention provides a kind of data processing method of voice call, including:First safety chip of the first safety means generates the first negotiation information, and sends the first negotiation information to the first call terminal;And first safety chip receive the first call terminal send the second negotiation information;First safety chip is calculated the first negotiation information and the second negotiation information, obtains the first call key;First safety means export the first authorization code, and prompt to read aloud the first authorization code;The user that first safety chip obtains the first call terminal reads aloud result to the first authorization code, obtains the first acoustic information;The first acoustic information is encrypted using the first call key for first safety chip, obtains the first encryption data, and send the first encryption data;After the first confirmation instruction is obtained, the first safety chip starts carries out encryption and decryption operation using voice call of the first call key to the user of the first call terminal.
Description
Technical field
The present invention relates to electronic technology field, more particularly to a kind of data processing method of voice call.
Background technology
In the prior art, there is monitored possibility in the voice call between user, therefore current voice call is present
Security risk.It is the call by the TF card memory storage on mobile phone by the way of in the prior art for the security risk
Key realizes the protection to voice call to voice encryption.But in actual applications, if call terminal is mounted with that malice is soft
Part, hacker can steal the call key in TF card by the Malware, and then crack the voice messaging after encryption, cause
The risk of the speech data leakage of call terminal, therefore how the progress voice encryption operation of safety is that technology urgently to be resolved hurrily is asked
Topic;In addition, monitored possibility in voice call in the prior art be present, therefore it is same to reduce the monitored possibility of voice call
It is technical problem urgently to be resolved hurrily.
The content of the invention
The present invention provides a kind of data processing method of voice call, main purpose be to solve above-mentioned technical problem it
One.
The present invention provides a kind of data processing method of voice call, and this method includes:First peace of the first safety means
Full chip generates the first negotiation information, and sends the first negotiation information to first by the first communication interface of the first safety means
Call terminal, the first safety means are connected with the first call terminal, and independently of the first call terminal;And the first safe core
Piece receives the second negotiation information of the first call terminal transmission by the first communication interface, wherein the second negotiation information is led to by second
The second safety means generation of telephone terminal;First safety chip is calculated the first negotiation information and the second negotiation information, is obtained
To the first call key, the voice call that the first call key is used for the user of the first call terminal carries out encryption and decryption operation;
First safety means export the first authorization code, and prompt to read aloud the first authorization code, wherein the first authorization code is the first peace
Full chip generates according to the first call key;First safety chip obtains the user of the first call terminal to the first authorization code
Result is read aloud, obtains the first acoustic information;The first acoustic information is encrypted using the first call key for first safety chip
Processing, the first encryption data is obtained, and the first encryption data is sent by the first communication interface;Obtaining the first confirmation instruction
Afterwards, the first safety chip starts carries out encryption and decryption behaviour using voice call of the first call key to the user of the first call terminal
Make.
In addition, after the first confirmation instruction is obtained, the first safety chip starts to be conversed first using the first call key
The voice call of the user of terminal carries out encryption and decryption operation, including:A, the first safety chip is receiving the second call terminal hair
After second sent confirms instruction, confirm to instruct according to second, obtain the first confirmation instruction, start using the first call key to the
The voice call of the user of one call terminal carries out encryption and decryption operation;Wherein, second confirms that instruction is according to the described second safety
The instruction that second authorization code of equipment generation is confirmed to the first ciphertext data played out, and by second safety means
Generation;Wherein the first ciphertext data is decrypted to obtain by the second safety means to the first encryption data;Or B, the first peace
Full chip is carried out after the second encryption data is received by the first communication interface using the first call key to the second encryption data
Decryption, obtains the second ciphertext data;First safety means play the second ciphertext data, and prompt to awarding in the second ciphertext data
Whether weighted code is unanimously confirmed with the first authorization code, and the sound characteristic and second of authorization code is read aloud in the second ciphertext data
Whether the sound characteristic of the user of call terminal is unanimously confirmed;First safety chip obtains the first confirmation instruction, and starts
Encryption and decryption operation is carried out using voice call of the first call key to the user of the first call terminal;Wherein the second encryption data
The user of the second call terminal obtained including the second safety means reads aloud result to authorization code;Wherein, first confirms instruction
To confirm that the authorization code in the second ciphertext data is consistent with the first authorization code, and the sound of authorization code is read aloud in the second ciphertext data
The instruction consistent with the sound characteristic of the user of the second call terminal of sound feature.
The present invention provides a kind of data processing method of voice call, and this method includes:First peace of the first safety means
Full chip generates the first negotiation information, and sends the first negotiation information to first by the first communication interface of the first safety means
Call terminal, the first safety means are connected with the first call terminal, and independently of the first call terminal;And the first safe core
Piece receives the second negotiation information of the first call terminal transmission by the first communication interface, wherein the second negotiation information is led to by second
The second safety means generation of telephone terminal;First safety chip is calculated the first negotiation information and the second negotiation information, is obtained
To the first call key, the voice call that the first call key is used for the user of the first call terminal carries out encryption and decryption operation;
After the first call key is obtained, the first safety chip starts the language to the user of the first call terminal using the first call key
Sound call carries out encryption and decryption operation;Wherein, start in the first safety chip using the first call key to the first call terminal
After the voice call of user carries out encryption and decryption operation, this method also includes:First safety means are received to the second call terminal
User certification triggering command;First safety means are receiving the certification triggering command to the user of the second call terminal
Afterwards, export the first authorization code, and prompt to read aloud the first authorization code, wherein the first authorization code be the first safety chip according to
First call key generation;The user that first safety chip obtains the first call terminal reads aloud result to the first authorization code,
Obtain the first acoustic information;The first acoustic information is encrypted using the first call key for first safety chip, is obtained
First encryption data, and the first encryption data is sent by the first communication interface;After the first confirmation instruction is obtained, the first safety
Chip continues encryption and decryption operation using voice call of the first call key to the user of the first call terminal.
In addition, after the first confirmation instruction is obtained, the first safety chip is using the first call key to the first call terminal
User voice call continue encryption and decryption operation, including:A, the first safety chip is receiving the second call terminal hair
After second sent confirms instruction, confirm to instruct according to second, obtain the first confirmation instruction, it is logical to first using the first call key
The voice call of the user of telephone terminal continues encryption and decryption operation;Wherein, second confirms that instruction is according to the described second safety
The instruction that second authorization code of equipment generation is confirmed to the first ciphertext data played out, and by second safety means
Generation;Wherein the first ciphertext data is decrypted to obtain by the second safety means to the first encryption data;Or B, the first peace
Full chip is carried out after the second encryption data is received by the first communication interface using the first call key to the second encryption data
Decryption, obtains the second ciphertext data;First safety means play the second ciphertext data, and prompt to awarding in the second ciphertext data
Whether weighted code is unanimously confirmed with the first authorization code, and the sound characteristic and second of authorization code is read aloud in the second ciphertext data
Whether the sound characteristic of the user of call terminal is unanimously confirmed;First safety chip obtains the first confirmation instruction, and utilizes
Voice call of the first call key to the user of the first call terminal continues encryption and decryption operation;Wherein the second encryption data
The user of the second call terminal obtained including the second safety means reads aloud result to authorization code;Wherein, first confirms instruction
To confirm that the authorization code in the second ciphertext data is consistent with the first authorization code, and the sound of authorization code is read aloud in the second ciphertext data
The instruction consistent with the sound characteristic of the user of the second call terminal of sound feature.
In addition, the first safety means export the first authorization code, including:A, the first authorization code is converted into by the first safety means
Acoustic information, the acoustic information of the first authorization code is obtained, and play the acoustic information of the first authorization code;Or B, the first safety
Equipment shows the first authorization code.
In addition, this method also includes:If the first safety chip detects the voice call of the user of the first call terminal
Terminate, then the first safety chip deletes the first call key.
In addition, the user that the first safety chip obtains the first call terminal reads aloud result to the first authorization code, the is obtained
One acoustic information includes:A, the first safety chip obtains the first call terminal of the voice collecting unit collection of the first safety means
User result is read aloud to the first authorization code, obtain the first acoustic information;Or B, the first safety chip pass through the first communication
The user of first call terminal of the call terminal of interface first collection reads aloud result to the first authorization code, obtains the first sound
Message ceases.
In addition, the length of the first authorization code is less than the length of the first call key.
In addition, the first authorization code is used for the call key of unique mark first.
The present invention provides a kind of data processing method of voice call, and this method includes:Second peace of the second safety means
Full chip receives the first negotiation information of the second call terminal transmission by the second communication interface of the second safety means, wherein the
One negotiation information is generated by the first safety means that the first call terminal of voice call is carried out with the second call terminal, wherein the
Two safety means are connected with the second call terminal, and independently of the second call terminal;And second safety chip generation second association
Business's information, and the second negotiation information is sent to the second call terminal by the second communication interface;Second safety chip is assisted to first
Business's information and the second negotiation information are calculated, and obtain the second call key, and the second call key is used for the second call terminal
User voice call carry out encryption and decryption operation;Second safety means export the second authorization code, wherein the second authorization code is the
Two safety chips generate according to the second call key;And second safety chip receiving by the second communication interface
After one encryption data, the first encryption data is decrypted using the second call key, obtains the first ciphertext data;Second safety
The ciphertext data of device plays first;What wherein the first encryption data included that the first safety means obtain is read aloud authorization code
Read aloud result;After exporting the second authorization code and playing the first ciphertext data, the second safety means are prompted according to the second authorization code
The first ciphertext data played out is confirmed;Second safety chip starts after the second confirmation instruction is obtained and utilizes second
Voice call of the key to the user of the second call terminal of conversing carries out encryption and decryption operation.
The present invention provides a kind of data processing method of voice call, and this method includes:Second peace of the second safety means
Full chip receives the first negotiation information of the second call terminal transmission by the second communication interface of the second safety means, wherein the
One negotiation information is generated by the first safety means that the first call terminal of voice call is carried out with the second call terminal, wherein the
Two safety means are connected with the second call terminal, and independently of the second call terminal;And second safety chip generation second association
Business's information, and the second negotiation information is sent to the second call terminal by the second communication interface;Second safety chip is assisted to first
Business's information and the second negotiation information are calculated, and obtain the second call key, and the second call key is used for the second call terminal
User voice call carry out encryption and decryption operation;After the second call key is obtained, the second safety chip, which starts, utilizes second
Voice call of the key to the user of the second call terminal of conversing carries out encryption and decryption operation;Wherein, start in the second safety chip
After carrying out encryption and decryption operation using voice call of the second call key to the user of the second call terminal, this method is also wrapped
Include:Second safety means receive the certification triggering command to the user of the first call terminal;Second safety means are receiving pair
After the certification triggering command of the user of first call terminal, the second authorization code is exported, wherein the second authorization code is the second safe core
Piece generates according to the second call key;And second safety chip the first encryption number is being received by the second communication interface
According to rear, the first encryption data is decrypted using the second call key, obtains the first ciphertext data;Second safety means play
First ciphertext data;Wherein the first encryption data include the first safety means obtain authorization code is read aloud read aloud knot
Fruit;After exporting the second authorization code and playing the first ciphertext data, the prompting of the second safety means is according to the second authorization code to playing
The first ciphertext data gone out is confirmed;Second safety chip utilizes the second call key pair after the second confirmation instruction is obtained
The voice call of the user of second call terminal continues encryption and decryption operation.
In addition, the second safety means prompting is carried out according to the second authorization code to first ciphertext data played out
Confirm, including:Second safety means are prompted
It is no unanimously to be confirmed, and the sound characteristic of authorization code and first call terminal are read aloud in first ciphertext data
Whether the sound characteristic of user is unanimously confirmed;Wherein, the second confirmation instruction that second safety chip obtains is confirmation
Authorization code in first ciphertext data is consistent with second authorization code, and bright read authority in first ciphertext data
The sound characteristic instruction consistent with the sound characteristic of the user of first call terminal of code.
In addition, the second safety means export the second authorization code, including:A, the second authorization code is converted into by the second safety means
Acoustic information, the acoustic information of the second authorization code is obtained, and play the acoustic information of the second authorization code;Or B, the second safety
Equipment shows the second authorization code.
In addition, this method also includes:Second safety means prompt to carry out the second authorization code after the second authorization code is exported
Read aloud;The user that second safety chip obtains the second call terminal reads aloud result to the second authorization code, obtains rising tone message
Breath;Second sound information is encrypted using the second call key for second safety chip, obtains the second encryption data, and
Second encryption data is sent by the second communication interface.
In addition, this method also includes:If the second safety chip detects the voice call of the user of the second call terminal
Terminate, then the second safety chip deletes the second call key.
In addition, the user that the second safety chip obtains the second call terminal reads aloud result to the second authorization code, the is obtained
Two acoustic informations include:A, the second safety chip obtains the second call terminal of the voice collecting unit collection of the second safety means
User result is read aloud to the second authorization code, obtain second sound information;Or B, the second safety chip pass through the second communication
The user of second call terminal of the call terminal of interface second collection reads aloud result to the second authorization code, obtains the rising tone
Message ceases.
In addition, the length of the second authorization code is less than the length of the second call key.
In addition, the second authorization code is used for the call key of unique mark second.
Compared with key of conversing in the prior art is the mode generated in TF card, embodiment of the method provided by the invention is led to
Generation call key is crossed on the safety means independently of call terminal, is reduced during voice encryption by malice on call terminal
The possibility of software attacks;And generated by the safety chip in safety means, the high security based on safety chip, reduce
The possibility of call key from stealing, ensure that the security of voice encryption;In addition, in voice encryption, in safety chip
Encrypted using call key in portion so that call key is called in a security context, is ensured the safety of call key and is made
With.
In addition, in voice encryption communication process, the second safety means are by playing first from the first call terminal
Ciphertext data, prompt to confirm the first ciphertext data played out according to the second authorization code, realize to the first call terminal
Identity information confirmation so that user determine this call whether someone monitor, improve and the third party identified in voice call
The success rate of monitoring, so as to reduce the monitored possibility of voice call, and determine that this voice call has the third party in user
During monitoring, user can take the safety measure of anti-monitoring to prevent information leakage in time, improve data transfer in voice call
Safety.
Further, the first ciphertext data from the first call terminal is played on the second safety means, reduces the
The attack of Malware on two call terminals, it ensure that voice call safety.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, required use in being described below to embodiment
Accompanying drawing be briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for this
For the those of ordinary skill in field, on the premise of not paying creative work, other can also be obtained according to these accompanying drawings
Accompanying drawing.
Fig. 1 is a kind of schematic flow sheet of voice data processing method embodiment provided by the invention;
Fig. 2 is the method flow that a kind of first safety means provided by the invention realize data processing in voice call
Figure;
Fig. 3 is the method flow that another first safety means provided by the invention realize data processing in voice call
Figure;
Fig. 4 is a kind of method flow diagram of second safety means processing data in voice call provided by the invention;
Fig. 5 is the method flow diagram of another second safety means processing data in voice call provided by the invention.
Embodiment
With reference to the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Ground describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.Based on this
The embodiment of invention, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made
Example, belongs to protection scope of the present invention.
The embodiment of the present invention is described in further detail below in conjunction with accompanying drawing.
Fig. 1 is a kind of schematic flow sheet of the data processing method embodiment of voice call provided by the invention.Shown in Fig. 1
Embodiment of the method includes:
Step 01, the first safety means and the second safety means generate negotiation information and sent respectively:
Step 011, the first safety chip of the first safety means generate the first negotiation information, and pass through the first safety means
The first communication interface send the first negotiation information to the first call terminal, wherein the first negotiation information include be used for generate first
The parameter information of call key, the voice call that the first call key is used for the user of the first call terminal carry out encryption and decryption behaviour
To make, the first safety means are connected with the first call terminal, and independently of the first call terminal;
Wherein, the first safety means can be the wearable devices such as intelligent glasses, intelligent watch, ear speaker device, or, collection
Into in wearable device;Certainly, the first safety means can also be intelligent cipher key equipment USB Key, the branch for having USB interface
Holding the intelligent cipher key equipment of COBBAIF, the intelligent cipher key equipment with function of Bluetooth communication etc. can be led to call terminal
The intelligent cipher key equipment of letter, or, it is integrated in the intelligent cipher key equipment that can be communicated with call terminal.I.e. relative to first
Call terminal, the first safety means are autonomous devices, and are not integrated on the first call terminal.
Wherein, the first communication interface can be wireless connection interface or wired connection interface.If the first communication
Interface is wireless connection interface, then is built-in with wireless communication module in the first safety means, can be Wi-Fi module, Wi-Fi
Direct modules, NFC module, bluetooth module or infrared module, such as the first safety means are bluetooth earphone;If first is logical
Letter interface is wired connection interface, then the first safety means can have data line, and the interface of data line can be sound
Frequency interface or USB interface, such as the first safety means are line control earphone.Certainly, the first safety means can also have nothing simultaneously
Line connects and two kinds of functions of wired connection, i.e. the first safety means are built-in with wireless communication module, and is externally connected to data biography
Defeated line.
If being built-in with wireless communication module in the first safety means, the first safety means can by wireless connection with
First call terminal is connected;If the first communication interface is wired connection interface, the first safety means can pass through wired company
Connect and be connected with the first call terminal.
Wherein, the first call terminal is the terminal with voice call ability, can be traditional verbal system, such as fixed
Phone and cell phone or the terminal with function of network phone, such as PC, notebook computer and tablet personal computer.
Wherein, the first negotiation information is generated by the first safety chip in the first safety means, and in the prior art
Carry out key agreement in itself by the first call terminal comparing, completed using independently of the first safety means of the first call terminal
Consult, reduce key agreement operation by the possibility of malware attacks in the first call terminal, and by the first safety means
The first safety chip it is more safe and reliable to generate the first negotiation information.
Wherein, the first safety chip is sent to the first call after the first negotiation information is generated by the first communication interface
Terminal, the first call terminal are sent to the second call terminal by communication network.
Step 012, the second safety chip of the second safety means generate the second negotiation information, and pass through the second safety means
The second communication interface send the second negotiation information to the second call terminal, wherein the second negotiation information includes being used to generate second
The parameter information of call key, the voice call that the second call key is used for the user of the second call terminal carry out encryption and decryption behaviour
To make, the second safety means are connected with the second call terminal, and independently of the second call terminal;
Wherein, the second safety chip is sent to the second call after the second negotiation information is generated by the second communication interface
Terminal, the second call terminal are sent to the first call terminal by communication network.
Wherein, the second safety means can be the wearable devices such as intelligent glasses, intelligent watch, ear speaker device, or, collection
Into in wearable device;Certainly, the second safety means can also be intelligent cipher key equipment USB Key, the branch for having USB interface
Holding the intelligent cipher key equipment of COBBAIF, the intelligent cipher key equipment with function of Bluetooth communication etc. can be led to call terminal
The intelligent cipher key equipment of letter, or, it is integrated in the intelligent cipher key equipment that can be communicated with call terminal.I.e. relative to second
Call terminal, the second safety means are autonomous devices, and are not integrated on the second call terminal.
Wherein, the second communication interface can be wireless connection interface or wired connection interface.If the second communication
Interface is wireless connection interface, then is built-in with wireless communication module in the second safety means, can be Wi-Fi module, Wi-Fi
Direct modules, NFC module, bluetooth module or infrared module, such as the second safety means are bluetooth earphone;If second is logical
Letter interface is wired connection interface, then the second safety means can have data line, and the interface of data line can be sound
Frequency interface or USB interface, such as the second safety means are line control earphone.Certainly, the second safety means can also have nothing simultaneously
Line connects and two kinds of functions of wired connection, i.e. the second safety means are built-in with wireless communication module, and is externally connected to data biography
Defeated line.
If being built-in with wireless communication module in the second safety means, the second safety means can by wireless connection with
Second call terminal is connected;If the second communication interface is wired connection interface, the second safety means can pass through wired company
Connect and be connected with the second call terminal.
Wherein, the second call terminal is the terminal with voice call ability, can be traditional verbal system, such as fixed
Phone and cell phone or the terminal with function of network phone, such as PC, notebook computer and tablet personal computer.
Wherein, the second negotiation information is generated by the second safety chip in the second safety means, and in the prior art
Carry out key agreement in itself by the second call terminal comparing, completed using independently of the second safety means of the second call terminal
Consult, reduce key agreement operation by the possibility of malware attacks in the second call terminal, and by the second safety means
The second safety chip it is more safe and reliable to generate the second negotiation information.
There is no obvious sequencing between step 011 and step 012, can perform simultaneously, can also be first according to order
After perform.
Step 02:First safety chip and the second safety chip receive negotiation information and generate call key:
Step 021, the first safety chip receive the second of the transmission of the first call terminal by the first communication interface to be consulted to believe
Breath, and the first negotiation information and the second negotiation information are calculated, obtain the first call key;
Wherein, the second negotiation information is to consult letter in receive the transmission of the second call terminal second by the first call terminal
After breath, the first safety chip is sent to by the first communication interface.
Step 022, the second safety chip receive the first of the transmission of the second call terminal by the second communication interface to be consulted to believe
Breath, and the first negotiation information and the second negotiation information are calculated, obtain the second call key;
Wherein, the first negotiation information is to consult letter in receive the transmission of the first call terminal first by the second call terminal
After breath, the second safety chip is sent to by the second communication interface.
Wherein, sent in step 011 first negotiation information operation and step 021 in receive the operation of the second negotiation information
Do not have obvious precedence relationship on execution sequence, can perform simultaneously, can also successively be performed according to order.Similarly, walk
Sent in rapid 012 second negotiation information operation and step 022 in receive the operation of the first negotiation information on execution sequence simultaneously
There is no obvious precedence relationship, can perform simultaneously, can also successively be performed according to order.
Wherein, the parameter information particular content in the first negotiation information and the second negotiation information is referred in the prior art
Cipher key agreement algorithm set, for example, cipher key agreement algorithm ZRTP.
Wherein, the calculating of the first call key and the second call key can be found in cipher key agreement algorithm of the prior art
Calculation obtains, for example, ZRTP.Wherein, the first call key can be stored in the first safety chip, to ensure first
The storage safety of call key;Similarly, the second call key can be stored in the second safety chip, to ensure that the second call is close
The storage safety of key.
It is not present in the first call terminal and the second call terminal on the premise of the third party monitors, the first call key and the
Two call keys are identical.On the contrary, when the first call terminal and the second call terminal have third party's monitoring, the first call terminal
User used in the second call key used in the user of the first call key and the second call terminal it is different.Why
First call key and the second call key are different, and reason is:First call key is the first call terminal and the third party
Call terminal consults what is obtained, and the second call key is that the call terminal of the second call terminal and the third party are consulted to obtain, and
It is not that the first call terminal and the second call terminal are directly consulted to obtain.
There is no obvious sequencing between step 021 and step 022, can perform simultaneously, can also be first according to order
After perform.
Step 03:First safety means and the second safety means export authorization code and sent:
Step 031, the first safety means export the first authorization code, wherein the first authorization code is the first safety chip according to the
One call key generation, and prompt to read aloud the first authorization code;First safety chip obtains the use of the first call terminal
Result is read aloud in family to the first authorization code, obtains the first acoustic information;First safety chip is using the first call key to first
Acoustic information is encrypted, and obtains the first encryption data, and send the first encryption data by the first communication interface;
Wherein, after the first encryption data is sent by the first communication interface, the first call terminal leads to the first safety chip
Cross the first communication interface and receive the first encryption data, and the second call terminal is sent to by communication network.
Step 032, the second safety means export the second authorization code, wherein the second authorization code is the second safety chip according to the
Two call key generations;And prompt to read aloud the second authorization code;Second safety chip obtains the use of the second call terminal
Result is read aloud in family to the second authorization code, obtains second sound information;Second safety chip is using the second call key to second
Acoustic information is encrypted, and obtains the second encryption data, and send the second encryption data by the second communication interface.
Wherein, after the second encryption data is sent by the second communication interface, the second call terminal leads to the second safety chip
Cross the second communication interface and receive the second encryption data, and the first call terminal is sent to by communication network.
Herein, illustrated by taking the realization of step 031 as an example:
For the first call key, the first safety chip in the first safety means is obtaining the first call key
Afterwards, the first call key can be used to can guarantee that the safety of voice call between the first safety means and the second safety means, phase
When on the basis of voice call in the prior art, voice encryption is established between the first safety means and the second safety means
Passage.
Wherein, voice encryption passage provided by the invention is built upon between the first safety means and the second safety means
Passage, i.e., for the first safety means, voice encryption passage have passed through the first safety means, the first verbal system, successively
Two verbal systems and the second safety means.It can thus be seen that the present invention voice encryption passage be built upon safety means it
Between, therefore, in the first call terminal and the second call terminal during the entire process of call is established to end of conversation, first is logical
Telephone terminal and the second call terminal play a part of transparent data, reduce the possibility of malware attacks on call terminal, carry
The high safety of data transfer.
Wherein, the first safety means export the first authorization code, including:A, the first authorization code is converted into by the first safety means
Acoustic information, the acoustic information of the first authorization code is obtained, and play the acoustic information of the first authorization code;Or B, the first safety
Equipment shows the first authorization code.
Specifically, the way of output of the first authorization code can be played back by the broadcast unit of the first safety means,
For example, loudspeaker or loudspeaker, can also be shown by the display unit of the first safety means.Specifically:
The data signal of first authorization code is sent to the voice of the first safety means by first way, the first safety chip
The data signal of first authorization code is converted into acoustic information by converting unit, voice converting unit, obtains the sound of the first authorization code
Message is ceased, and the acoustic information of the first authorization code is sent to the broadcast unit of the first safety means, and broadcast unit plays first
The acoustic information of authorization code.
In the first way, the information of the first authorization code is changed, obtains the acoustic information of the first authorization code, led to
The acoustic information for playing the first authorization code is crossed, reaches the purpose of the first authorization code of output.
The data signal of first authorization code is sent to the display of the first safety means by the second way, the first safety chip
Unit, display unit show the first authorization code.
In the second way, by showing the first authorization code, reach the purpose of the first authorization code of output.
Wherein, for the information prompting to read aloud the information of the first authorization code can together with the first authorization code it is defeated
Go out, for example, output " authorization code XXX " please be read aloud, wherein, XXX represents the content of the first authorization code.Wherein the way of output can adopt
With broadcast mode or display mode.
Certainly, the information for prompting to read aloud the information of the first authorization code be able to can also divide with the first authorization code
Output is opened, for example, the information of " authorization code please be read aloud " is first exported, then export " authorization code XXX " information, or, first export
" authorization code XXX " information, then export the information of " authorization code please be read aloud ".The way of output of wherein above-mentioned two information can be with
Exported using broadcast mode or display mode, wherein the way of output of above-mentioned two information can be with identical, can also be different.
Wherein, the first authorization code and the information for prompting to read aloud the information of the first authorization code can also be by the
One call terminal exports, for example, exported by display mode, or, exported by broadcast mode.
Compare and the first authorization code is exported on the first call terminal and for prompting the information to the first authorization code to carry out
The mode for the information read aloud, the first authorization code is exported and for prompting to enter the information of the first authorization code by the first safety means
The mode for the information that row is read aloud, it is possible to reduce the possibility of malware attacks on the first call terminal, improve data transfer
Safety.
Wherein, when prompting is read aloud the first authorization code, because the content read aloud is the first authorization code, not first
Key converse in itself, reduces the possibility that criminal steals the first call key when user reads aloud;In addition, the first authorization code
It is to be generated according to the first call key, and the key that can be conversed with unique mark first, therefore communicating pair is authorized by comparing
Whether the content of code is consistent, to determine whether call key is consistent used in communicating pair;Due to the position of the first call key
Number is longer, by the first call key handling into the first authorization code so that length of the length of the first authorization code compared with the first call key
The content short, reduction user reads aloud is spent, it is user-friendly.
Wherein, the first safety chip obtains the user of the first call terminal and reads aloud result to the first authorization code, obtains the
One acoustic information, the following two kinds mode can be used:
Mode A, the first safety chip receive the first call terminal of the first call terminal collection by the first communication interface
User result is read aloud to the first authorization code, obtain the first acoustic information.
In mode A, the collection to reading aloud result is realized using the existing Mike of the first call terminal, it is convenient to realize, nothing
Need to be that the acquisition to reading aloud result can be achieved to the hardware modifications of the first safety means, reduce the hardware of the first safety means into
This.
Mode B, the first safety chip obtain the first call terminal of the voice collecting unit collection of the first safety means
User reads aloud result to the first authorization code, obtains the first acoustic information.
In mode B, voice collecting unit can be Mike.The first authorization code when reading aloud result, is used in collection
Voice collecting unit on first safety means is acquired, it is possible to reduce malware attacks can on the first call terminal
Energy, ensure the security of data acquisition.For example, when the first safety means are bluetooth earphone, bluetooth earphone can be directly utilized
Mike is acquired to reading aloud result.
Wherein, the sound for reading aloud user the first authorization code is acquired, and is obtained the first acoustic information, is actually gathered
Obtain two parts information, one be the output of the first safety means the first authorization code content, another is to read aloud first to award
The sound characteristic of the user of weighted code.
Sound characteristic wherein in first acoustic information is that the user of the first call terminal directly reads aloud first mandate
The user sound characteristic of itself during code, the content sources for identifying the first authorization code in first acoustic information are conversed in first
The user of terminal;It is not the sound spy that the sounding effect for the user for simulating first call terminal by speech simulation software obtains
Sign.
Because the sound characteristic obtained when the sound characteristic that speech simulation software simulates directly is read aloud with user is different, because
, when playing above-mentioned two sound characteristic, listener can be according to tone color, tone and the tone entrained by two sound characteristics for this
Deng customized information etc., the sound for the user for being real first call terminal is recognised that, is authorized so as to identify to carry
Whether the acoustic information of code comes from the first call terminal.
Wherein, the first safety means are as follows by the implementation of the first acoustic information system into the first encryption data:
The voice that first acoustic information is sent to the first safety means by the voice collecting unit of the first safety means is changed
First acoustic information system into data signal, is obtained data to be verified, and data to be verified are sent out by unit, voice converting unit
Give the first safety chip, data to be verified are encrypted using the first call key for the first safety chip, obtain the
One encryption data, and the first encryption data is sent by the first communication interface.
Wherein, the effect of voice converting unit converts analog signals into data signal so that the first acoustic information can
Carry out data transmission in voice encryption passage.Wherein, voice collecting unit and voice converting unit can in the first safety means
To integrate or different physical locations.
Certainly, if the communication network between the first call terminal and the second call terminal supports the direct biography of analog signal
It is defeated, then by the first acoustic information system into the first encryption data during without perform convert analog signals into digital letter
Number operation.
In addition, the implementation for each step that the second safety means perform and the first safety in step 031 in step 032
The implementation for each step that equipment performs is similar, will not be repeated here.
On the premise of third party's monitoring is not present in the first call terminal and the second call terminal, the first authorization code and second
Authorization code is identical.On the contrary, when the first call terminal and the second call terminal have third party's monitoring, the use of the first call terminal
The second call key is different used in the user of first call key and the second call terminal used in family, therefore, according to
First authorization code of the first call key generation and the second authorization code generated according to the second call key are also different.User passes through
Compare the content of the first authorization code and the content of the second authorization code, it can be determined that go out and monitored with the presence or absence of the third party.
There is no obvious sequencing between step 031 and step 032, can perform simultaneously, can also be first according to order
After perform.
Step 04, the first safety means and the second safety means prompt to confirm the result of reading aloud of authorization code:
Step 041, the first safety chip are logical using first after the second encryption data is received by the first communication interface
Second encryption data is decrypted words key, obtains the second ciphertext data;First safety means play the second ciphertext data, and
Prompt to confirm the second ciphertext data played out;
Wherein, the first safety means prompting confirms to the second ciphertext data played out, including:
Whether the prompting of the first safety means is unanimously carried out to the authorization code in second ciphertext data and the first authorization code
Confirm, and read aloud in the second ciphertext data the sound characteristic of authorization code and the user of the second call terminal sound characteristic whether
Unanimously confirmed.
Wherein, the second encryption data is that the first call terminal is receiving the second encryption data of the second call terminal transmission
Afterwards, the first safety chip is sent to by the first communication interface.
First safety chip, which gets the second encryption data, following two ways, including:In the use of the first call terminal
What the user of family and the second call terminal received before carrying out voice call;Or the user and second in the first call terminal
The user of call terminal carries out what is received during voice call.
There is two ways because the first safety chip gets the second encryption data, therefore, the first safety means are being prompted
Whether the authorization code in the second ciphertext data and the first authorization code are unanimously confirmed, and reads aloud and awards in the second ciphertext data
Whether the implementation unanimously confirmed is included such as the sound characteristic of the user of the sound characteristic of weighted code and the second call terminal
Lower three kinds:
The first, receives before the user of the first call terminal carries out voice call with the user of the second call terminal
After second encryption data, the first safety means carry out voice with the user of the second call terminal in the user of the first call terminal and led to
Whether prompting unanimously confirms to the authorization code in the second ciphertext data and the first authorization code before words, and the second decryption number
Read aloud whether the sound characteristic of authorization code is unanimously confirmed with the sound characteristic of the user of the second call terminal in;
Second, received before the user of the first call terminal carries out voice call with the user of the second call terminal
After second encryption data, the first safety means carry out voice with the user of the second call terminal in the user of the first call terminal and led to
Whether prompting unanimously confirms to the authorization code in the second ciphertext data and the first authorization code during words, and the second solution
Read aloud whether the sound characteristic of authorization code is unanimously confirmed with the sound characteristic of the user of the second call terminal in ciphertext data;
The third, receives during the user of the first call terminal carries out voice call with the user of the second call terminal
To after the second encryption data, the first safety means carry out voice in the user of the first call terminal and the user of the second call terminal
Whether prompting unanimously confirms to the authorization code in the second ciphertext data and the first authorization code during call, and second
Read aloud whether the sound characteristic of authorization code is unanimously confirmed with the sound characteristic of the user of the second call terminal in ciphertext data.
Step 042, the second safety chip are logical using second after the first encryption data is received by the second communication interface
First encryption data is decrypted words key, obtains the first ciphertext data;Second safety means play the first ciphertext data;The
Two safety chips export the second authorization code and play the first ciphertext data after, the second safety means prompting to play out first
Ciphertext data is confirmed;
The prompting of second safety means confirms to the first ciphertext data for playing out, including:
Second safety means prompting whether the authorization code in the first ciphertext data and the second authorization code are unanimously confirmed,
And first read aloud in ciphertext data authorization code sound characteristic it is whether consistent with the sound characteristic of the user of the first call terminal
Confirmed.
Wherein, the first encryption data is that the second call terminal is receiving the first encryption data of the first call terminal transmission
Afterwards, the second safety chip is sent to by the second communication interface.
Second safety chip, which gets the first encryption data, following two ways, including:Second encryption data can be
What the user of the first call terminal and the user of the second call terminal received before carrying out voice call;Or in the first call
What the user of terminal and the user of the second call terminal received during carrying out voice call.
There is two ways because the second safety chip gets the first encryption data, therefore, the prompting pair of the second safety means
Whether the authorization code in the first ciphertext data is unanimously confirmed with the second authorization code, and bright read authority in the first ciphertext data
The implementation whether sound characteristic of code and the sound characteristic of the user of the first call terminal are unanimously confirmed has following three
Kind:
The first, receives before the user of the first call terminal carries out voice call with the user of the second call terminal
After first encryption data, the second safety means carry out voice with the user of the second call terminal in the user of the first call terminal and led to
Whether prompting unanimously confirms to the authorization code in the first ciphertext data and the second authorization code before words, and the first decryption number
Read aloud whether the sound characteristic of authorization code is unanimously confirmed with the sound characteristic of the user of the first call terminal in;
Second, received before the user of the first call terminal carries out voice call with the user of the second call terminal
After first encryption data, the second safety means carry out voice with the user of the second call terminal in the user of the first call terminal and led to
Whether prompting unanimously confirms to the authorization code in the first ciphertext data and the second authorization code during words, and the first solution
Read aloud whether the sound characteristic of authorization code is unanimously confirmed with the sound characteristic of the user of the first call terminal in ciphertext data;
The third, connects during the user of the first call terminal carries out voice call with the user of the second call terminal
After receiving the first encryption data, the second safety means carry out language in the user of the first call terminal and the user of the second call terminal
Prompt whether unanimously to confirm the authorization code in the first ciphertext data and the second authorization code during sound call, Yi Ji
Whether the sound characteristic that the sound characteristic of authorization code and the user of the first call terminal are read aloud in one ciphertext data is unanimously carried out really
Recognize.
Herein, illustrated by taking the realization of step 041 as an example:
The second encryption data can be decrypted using the first call key for first safety chip, obtain the second decryption number
According to be due between the first call terminal and the second call terminal be not present the third party monitor when, first call key and second
Key of conversing is identical, therefore can be using the first call key to being carried out by the encrypted result after the second call key encryption
Successful decryption.
But although can be using the first call key to carrying out success by the encrypted result after the second call key encryption
Decryption, but can not judge to monitor with the presence or absence of the third party between the first call terminal and the second call terminal accordingly, reason is
Since when third party's monitoring be present in the first call terminal and the second call terminal, the call terminal of the first call terminal and the third party
The call terminal of the first call key that negotiation obtains, the second call terminal and the third party consult the second obtained call key,
First call key and the second call key are different.The data that first call terminal is sent can be utilized the first call by the third party
After secret key decryption, reuse the second call key and be encrypted, and be sent to the second call terminal, now the second call terminal is still
It can so use the second call key that the encryption data received is successfully decrypted, but now, in the first call eventually
End and the second call terminal exist the third party monitoring, therefore can not according to the encryption data to receiving whether successful decryption
To judge whether that the third party monitors.
To solve above-mentioned technological deficiency, the concept of authorization code is hereafter drawn, and by reading aloud authorization code, and obtain
After reading aloud result, and send and read aloud the mode of result to judge whether that the third party monitors, specific implementation details see below
Associated description in step 05.
Wherein, the first safety means by the second encryption data be processed into the second ciphertext data and play implementation such as
Under:
If the second encryption data is data signal, the first safety chip is using the first call key to the second encryption number
According to being decrypted, the second ciphertext data is obtained;First safety chip sends voice of second ciphertext data to the first safety means
Second ciphertext data is converted into acoustic information by converting unit, voice converting unit, obtains the transformation result of the second ciphertext data,
And the transformation result of the second ciphertext data is sent to the broadcast unit of the first safety means, broadcast unit plays the second decryption number
According to transformation result;
If the second encryption data is analog signal, the first safety chip is using the first call key to the second encryption number
According to being decrypted, the second ciphertext data is obtained, the second ciphertext data is sent to the broadcast unit of the first safety means, is played single
Member plays the second ciphertext data.
Wherein, played in step 041 second ciphertext data operation and step 031 in export the first authorization code operation it
Between there is no obvious sequencing, can perform simultaneously, can also according to order successively perform.
Wherein, the second ciphertext data can also be played by the broadcast unit of the first call terminal, for example, loudspeaker and loudspeaker
.
Compare and the mode of the second ciphertext data is played on the first call terminal, second is played by the first safety means
The mode of ciphertext data, it is possible to reduce the possibility of malware attacks on call terminal, improve the safety of data transfer.
Wherein, the first safety means display reminding information or play cuing information, to prompt in the second ciphertext data
Authorization code whether unanimously confirmed with the first authorization code, and read aloud in the second ciphertext data the sound characteristic of authorization code with
Whether the sound characteristic of the user of the second call terminal is unanimously confirmed.For example, the display of the first safety means shows and carried
Show information, the broadcast unit play cuing information of the first safety means.Certainly, can also be by the first call terminal display reminding information
Or play cuing information.
The mode for display or the play cuing information of comparing on the first call terminal, shown by the first safety means or
The mode of play cuing information, it is possible to reduce the possibility of malware attacks on call terminal, improve the safety of data transfer.
In the present embodiment, the second ciphertext data is exported to user by the way of playing, is because the second decryption
Include two parts information in data, a part is the tool of the authorization code for the second safety means generation for representing the second call terminal
Hold in vivo, another part is the sound characteristic for the user for representing the second call terminal, by playing the second ciphertext data, can be made
The user for obtaining the first call terminal is directly obtained above-mentioned two parts information, and then so that the side of user one of the first call terminal
Face can be by judging whether authorization code in the second ciphertext data and the first authorization code are unanimously confirmed in the second ciphertext data
The authenticity of the content of carrying, on the other hand can be by judging to read aloud the sound characteristic and of authorization code in the second ciphertext data
Whether the sound characteristic of the user of two call terminals unanimously confirms the legitimacy in the source of the second ciphertext data, that is, can be with
Judge to whether there is the third party.
And if the mode of the above-mentioned ciphertext data of broadcasting second to be substituted for the mode of the second ciphertext data of display, the
, only can be by judging the authorization code in the second ciphertext data and after the user of one call terminal receives the second ciphertext data
Whether one authorization code unanimously confirms the authenticity of content carried in the second ciphertext data, and can not confirm the second ciphertext data
Source legitimacy, that is, can not judge to whether there is the third party.
Due to being not present in the first call terminal and the second call terminal on the premise of the third party monitors, the first authorization code and
Second authorization code is identical, and the first authorization code can be marked uniquely with the call key of unique mark first, the second authorization code
Show the second call key, thus, when the user of the first call terminal judges the first authorization code and the second authorization code is identical, i.e.,
It can learn that the first call key and the second call key are identicals.
In addition, the implementation for each step that the second safety means perform and the first safety in step 041 in step 042
The implementation for each step that equipment performs is similar, will not be repeated here.
Wherein, there is no obvious sequencing between step 041 and step 042, can perform simultaneously, can also be according to secondary
Sequence successively performs.
Step 05:First safety chip and the second safety chip prompt to authorized in the encryption data that receives digital content and
Sound characteristic is confirmed:
Step 051:Voice call of first safety chip to the user of the first call terminal carry out encryption and decryption operation just like
Lower two ways:
A:Whether the authorization code in second ciphertext data and first authorization code are unanimously confirmed in prompting,
And the sound characteristic of authorization code and the sound characteristic of the user of second call terminal are read aloud in second ciphertext data
Whether after unanimously being confirmed, if first safety chip receives the first confirmation instruction, first safety chip opens
It is dynamic to carry out encryption and decryption operation using voice call of the described first call key to the user of first call terminal, wherein,
First confirm instruction for confirm the second ciphertext data in authorization code it is consistent with the first authorization code, and in the second ciphertext data it is bright
The instruction consistent with the sound characteristic of the user of the second call terminal of the sound characteristic of read authority code;
Wherein, encryption and decryption operation is carried out using voice call of the first call key to the user of the first call terminal, can
With the user in the user of the first call terminal and the second call terminal when voice call starts start, can also be first
The user of call terminal and the user of the second call terminal start during carrying out voice call.
B:Added starting using voice call of the described first call key to the user of first call terminal
After decryption oprerations, if first safety chip receives the first confirmation instruction, first safety chip utilizes described the
Voice call of the one call key to the user of first call terminal continues encryption and decryption operation, wherein, first confirms
Instruct to confirm that the authorization code in the second ciphertext data is consistent with the first authorization code, and authorization code is read aloud in the second ciphertext data
The sound characteristic instruction consistent with the sound characteristic of the user of the second call terminal;
Wherein Fig. 1 only shows the mode A of step 051 realization, and mode B realization is similar to realizing for mode A, distinguishes
In first confirms that the receiving time of instruction is different, is that the first safety chip is carried out plus solved to voice call starting in mode A
Received before close operation, be that the first safety chip carries out being followed by for encryption and decryption operation in startup to voice call in mode B
Receive.Wherein, the first confirmation instruction can obtain in the following way:
The first, the first safety means receive the first confirmation instruction of user's input of the first call terminal, wherein first
It is that authorization code of the user of the first call terminal in the second ciphertext data is confirmed is consistent with the first authorization code to confirm instruction, and
The sound characteristic that authorization code is read aloud in second ciphertext data with the sound characteristic of the user of the second call terminal consistent inputs afterwards
Instruction.
Wherein, the user of the first call terminal can on the first call terminal input instruction, can also first safety
Input instruction in equipment.The user of first call terminal input instruction on the first safety means, reduces the first call terminal
The attack of upper Malware, it ensure that voice call safety.
Second, after receive the transmission of the second call terminal second confirms instruction, confirm to instruct according to second, obtain
First confirms instruction;
Wherein second confirms that instruction is awarded for the user of the second call terminal in the authorization code for confirming to receive with locally generated
Weighted code is consistent, and read aloud authorization code sound characteristic it is consistent with the sound characteristic of the user of the first call terminal after, input
Instruction.
In the user of the call terminal of users to trust second of the first call terminal, if the user of the second call terminal is true
It is consistent with authorization code caused by the second safety means to recognize the authorization code received from the first call terminal, and reads aloud the sound of authorization code
Sound feature is consistent with the sound characteristic of the user of the first call terminal, then user's can of the first call terminal knows second
Authorization code in ciphertext data is consistent with the first authorization code, and the sound characteristic and of authorization code is read aloud in the second ciphertext data
The sound characteristic of the user of two call terminals is consistent, that is, having obtained the first confirmation instruction.
Step 052:Voice call of second safety chip to the user of the second call terminal carry out encryption and decryption operation just like
Lower two ways:
A:Whether the authorization code in first ciphertext data and second authorization code are unanimously confirmed in prompting,
And the sound characteristic of authorization code and the sound characteristic of the user of first call terminal are read aloud in first ciphertext data
Whether after unanimously being confirmed, if second safety chip receives the second confirmation instruction, second safety chip opens
It is dynamic to carry out encryption and decryption operation using voice call of the described second call key to the user of second call terminal, wherein,
Encryption and decryption operation is carried out using voice call of the second call key to the user of the second call terminal, can be in the first call eventually
The user at end and the user of the second call terminal start when voice call starts, can also be in the user of the first call terminal
Start during carrying out voice call with the user of the second call terminal.
B:Added starting using voice call of the described second call key to the user of second call terminal
After decryption oprerations, if second safety chip receives the second confirmation instruction, second safety chip utilizes described the
Voice call of the two call keys to the user of second call terminal continues encryption and decryption operation, wherein, second confirms
Instruct to confirm that the authorization code in the first ciphertext data is consistent with the second authorization code, and authorization code is read aloud in the first ciphertext data
The sound characteristic instruction consistent with the sound characteristic of the user of the first call terminal.
Wherein Fig. 1 only shows the mode A of step 052 realization, and mode B realization is similar to realizing for mode A, distinguishes
In second confirms that the receiving time of instruction is different, is that second safety chip is starting to voice call progress in mode A
Encryption and decryption operation receives before, is that second safety chip is starting to voice call progress encryption and decryption behaviour in mode B
Make what is received afterwards.
Wherein, the second confirmation instruction can obtain in the following way:
The first, the second safety means receive the second confirmation instruction of user's input of the second call terminal, wherein second
It is that authorization code of the user of the second call terminal in the first ciphertext data is confirmed is consistent with the second authorization code to confirm instruction, and
The sound characteristic that authorization code is read aloud in first ciphertext data with the sound characteristic of the user of the first call terminal consistent inputs afterwards
Instruction.
Wherein, the user of the second call terminal can on the second call terminal input instruction, can also second safety
Input instruction in equipment.The user of second call terminal input instruction on the second safety means, reduces the second call terminal
The attack of upper Malware, it ensure that voice call safety.
Second, after receive the transmission of the first call terminal first confirms instruction, confirm to instruct according to first, obtain
Second confirms instruction;
Wherein first confirms that instruction is awarded for the user of the first call terminal in the authorization code for confirming to receive with locally generated
Weighted code is consistent, and read aloud authorization code sound characteristic it is consistent with the sound characteristic of the user of the second call terminal after, input
Instruction.
In the user of the call terminal of users to trust first of the second call terminal, if the user of the first call terminal is true
It is consistent with authorization code caused by the first safety means to recognize the authorization code received from the second call terminal, and reads aloud the sound of authorization code
Sound feature is consistent with the sound characteristic of the user of the second call terminal, then user's can of the second call terminal knows first
Authorization code in ciphertext data is consistent with the second authorization code, and the sound characteristic and of authorization code is read aloud in the first ciphertext data
The sound characteristic of the user of one call terminal is consistent, that is, having obtained the second confirmation instruction.
Herein, illustrated by taking the realization of step 051 as an example:
With difference is encrypted using the first call key by the first call terminal in the prior art, performs and add in the present invention
The main body of close operation is the first safety chip.Voice call is encrypted by the first safety chip, it is possible to reduce the first call
The possibility of malware attacks in terminal, improve the safety of data transfer.
And first safety chip obtained voice messaging is encrypted using the first call key caused by itself, carry
High call safety.Specifically:
(1) executive agent of voice encryption is the first safety chip, because the first safety chip is in the first safety means
Portion, the first safety means reduce during voice encryption by malice on the first call terminal independently of the first call terminal
The possibility of software attacks;In addition, the processor for the earphone in the prior art of comparing, language is carried out in the first safety means in the present invention
The executive agent of sound encryption is the first safety chip, because the computing that voice is encrypted and decrypted is in the first safety chip
Portion completes, and simply exports encrypted result and decrypted result, avoids the chance that data are cracked, therefore, more in the prior art
Processor, the voice encryption intensity of the first safety chip is higher.
(2) the first call key is caused by the first safety chip used in voice encryption, and the first safety chip will
First call key is stored in inside the first safety chip, is reduced the possibility of the first call key from stealing, be ensure that voice
The security of encryption;In addition, in voice encryption, encrypted inside the first safety chip using the first call key so that
First call key is called in a security context, ensures the safe handling of the first call key.
(3) encrypted object is the voice collecting unit collection of the first safety means.The present invention utilizes the first safety means
Voice collecting is carried out, the first safety means reduce during voice collecting by the first call eventually independently of the first call terminal
The possibility of malware attacks on end.
As seen from the above, in voice encryption, whole cryptographic operation is all completed by the first safety means, without
Interacted with the equipment of outside, ensure that the security of cryptographic operation.
Certainly, the voice of the first safety means encryption can also be adopted by the voice collecting unit of the first call terminal
Collection, and the voice collected is obtained by the first communication interface.The voice collecting unit of wherein the first call terminal can be
Microphone.
In addition, the implementation for each step that the second safety means perform and the first safety in step 051 in step 052
The implementation for each step that equipment performs is similar, will not be repeated here.
Wherein, there is no obvious sequencing between step 051 and step 052, can perform simultaneously, can also be according to secondary
Sequence successively performs.
Due to there is no obvious sequencing between step 051 and step 052, therefore in actual applications, may go out
Now following different application scenarios:
C1:Authorization code of first safety means in the second ciphertext data is confirmed is consistent with the first authorization code, and second
Read aloud in ciphertext data authorization code sound characteristic it is consistent with the sound characteristic of the user of the second call terminal when, it is true to obtain first
Recognize instruction, confirm that the voice call that instruction starts to the user of the first call terminal carries out encryption and decryption operation according to first;And
Authorization code of second safety means in the first ciphertext data is confirmed is consistent with the second authorization code, and in the first ciphertext data it is bright
When the sound characteristic of read authority code is consistent with the sound characteristic of the user of the first call terminal, the second confirmation instruction is obtained, according to
Second confirms that the voice call that instruction starts to the user of the second call terminal carries out encryption and decryption operation;
C2:Authorization code of second safety means in the first ciphertext data is confirmed is consistent with the second authorization code, and first
Read aloud in ciphertext data authorization code sound characteristic it is consistent with the sound characteristic of the user of the first call terminal when, it is true to obtain second
Recognize instruction, confirm that the voice call that instruction starts to the user of the second call terminal carries out encryption and decryption operation according to second, concurrently
The second confirmation is sent to instruct to the first safety means;First safety means are after the second confirmation instruction is received, according to second
Confirm that instruction obtains the first confirmation instruction, confirm that the voice call that instruction starts to the user of the first call terminal is entered according to first
Row encryption and decryption operates;
C3:First safety means start and the voice of the user of the first call terminal are led to after the first call key is obtained
Words carry out encryption and decryption operation;After starting the voice call to the user of the first call terminal and carrying out encryption and decryption operation, prompt simultaneously
Confirm that the authorization code in the second ciphertext data is consistent with the first authorization code, and the sound of authorization code is read aloud in the second ciphertext data
When feature is consistent with the sound characteristic of the user of the second call terminal, the first confirmation instruction is obtained, confirms instruction pair according to first
The voice call of the user of first call terminal continues encryption and decryption operation;And second safety means confirm first solution
Authorization code in ciphertext data is consistent with the second authorization code, and the sound characteristic and first of authorization code is read aloud in the first ciphertext data
When the sound characteristic of the user of call terminal is consistent, the second confirmation instruction is obtained, it is logical to second to confirm that instruction starts according to second
The voice call of the user of telephone terminal carries out encryption and decryption operation;
C4:Authorization code of second safety means in the first ciphertext data is confirmed is consistent with the second authorization code, and first
Read aloud in ciphertext data authorization code sound characteristic it is consistent with the sound characteristic of the user of the first call terminal when, it is true to obtain second
Recognize instruction, confirm that the voice call that instruction starts to the user of the second call terminal carries out encryption and decryption operation according to second, concurrently
The second confirmation is sent to instruct to the first safety means;First safety means start and conversed first after the first call key is obtained
The voice call of the user of terminal carries out encryption and decryption operation;Add starting the voice call to the user of the first call terminal
After decryption oprerations, it is true that first safety means obtain first after the second confirmation instruction is received, according to the second confirmation instruction
Recognize instruction, confirm that voice call of the instruction to the user of the first call terminal continues encryption and decryption operation according to first;
C5:Authorization code of first safety means in the second ciphertext data is confirmed is consistent with the first authorization code, and second
Read aloud in ciphertext data authorization code sound characteristic it is consistent with the sound characteristic of the user of the second call terminal when, it is true to obtain first
Recognize instruction, confirm that the voice call that instruction starts to the user of the first call terminal carries out encryption and decryption operation according to first;And
Second safety means start the voice call to the user of the second call terminal and carry out encryption and decryption after the second call key is obtained
Operation;After starting the voice call to the user of the second call terminal and carrying out encryption and decryption operation, the first ciphertext data is being confirmed
In authorization code it is consistent with the second authorization code, and read aloud in the first ciphertext data authorization code sound characteristic and first call eventually
When the sound characteristic of the user at end is consistent, the second confirmation instruction is obtained, confirms use of the instruction to the second call terminal according to second
The voice call at family continues encryption and decryption operation;
C6:Second safety means after starting the voice call to the user of the second call terminal and carrying out encryption and decryption operation,
Authorization code in the first ciphertext data is confirmed is consistent with the second authorization code, and the sound of authorization code is read aloud in the first ciphertext data
When sound feature is consistent with the sound characteristic of the user of the first call terminal, the second confirmation instruction is obtained, confirms to instruct according to second
Voice call to the user of the second call terminal continues encryption and decryption operation, and sends second and confirm instruction to the first safety
Equipment;First safety means obtain the first confirmation instruction after the second confirmation instruction is received, according to the second confirmation instruction,
Confirm that the voice call that instruction starts to the user of the first call terminal carries out encryption and decryption operation according to first;
C7:First safety means start and the voice of the user of the first call terminal are led to after the first call key is obtained
Words carry out encryption and decryption operation;After starting the voice call to the user of the first call terminal and carrying out encryption and decryption operation, prompt simultaneously
Confirm that the authorization code in the second ciphertext data is consistent with the first authorization code, and the sound of authorization code is read aloud in the second ciphertext data
When feature is consistent with the sound characteristic of the user of the second call terminal, the first confirmation instruction is obtained, confirms instruction pair according to first
The voice call of the user of first call terminal continues encryption and decryption operation;And second safety means start to second
After the voice call of the user of call terminal carries out encryption and decryption operation, the authorization code in the first ciphertext data is confirmed is awarded with second
Weighted code is consistent, and the sound characteristic of authorization code and the sound characteristic of the user of the first call terminal are read aloud in the first ciphertext data
When consistent, obtain the second confirmation instruction, according to second confirm voice call of the instruction to the user of the second call terminal continue into
Row encryption and decryption operates;
C8:Second safety means after starting the voice call to the user of the second call terminal and carrying out encryption and decryption operation,
Authorization code in the first ciphertext data is confirmed is consistent with the second authorization code, and the sound of authorization code is read aloud in the first ciphertext data
When sound feature is consistent with the sound characteristic of the user of the first call terminal, the second confirmation instruction is obtained, confirms to instruct according to second
Voice call to the user of the second call terminal continues encryption and decryption operation, and sends second and confirm instruction to the first safety
Equipment;First safety means start the voice call to the user of the first call terminal and carried out after the first call key is obtained
Encryption and decryption operates;After starting the voice call to the user of the first call terminal and carrying out encryption and decryption operation, first safety
Equipment obtains the first confirmation instruction after the second confirmation instruction is received, according to the second confirmation instruction, confirms to instruct according to first
Voice call to the user of the first call terminal continues encryption and decryption operation.
The technical characteristic that above-mentioned steps 05 describe is to confirm that the content of authorization code and the sound characteristic for reading aloud authorization code are homogeneous
The encryption and decryption operation of voice call is performed after cause, certainly, the present embodiment also provides the content for confirming authorization code and reads aloud authorization code
Sound characteristic in it is at least one inconsistent when processing scheme, specifically include:
Illustrated by taking the realization of the first safety means as an example:
When the user of the first call terminal judges that authorization code in the second ciphertext data and the first authorization code are inconsistent, and/
Or, second read aloud in ciphertext data authorization code sound characteristic and the sound characteristic of the user of the second call terminal it is inconsistent, then
The user of first call terminal can terminate this voice call on the first call terminal or the first safety means.
Similarly, the realization of the second safety means is similar to realizing for the first safety means, and here is omitted.
The above method also includes:
If the first safety chip detects that the voice call of the user of the first call terminal terminates, the first safety chip
Delete the first call key;And/or
If the second safety chip detects that the voice call of the user of the second call terminal terminates, the second safety chip
Delete the second call key.
In the above-mentioned methods, after end of conversation, it is logical that the first safety chip destroys used in this voice call first
Words key can be reduced after the first call key is stolen by the possibility of irrational utilization, ensure that the operation of the first safety chip is pacified
Entirely, equally it is effectively utilized the memory space of the first safety chip.Similarly, after end of conversation, the second safety chip destroys this
The second call key can be reduced after the second call key is stolen by the possibility of irrational utilization used in secondary voice call,
Ensure the safe for operation of the second safety chip, be equally effectively utilized the memory space of the second safety chip.
Illustrated below by taking a concrete application scene as an example:
User A and user B carry out normal talking, and during in the absence of being monitored by third party, user A and user B are directly led to
The negotiation of key is talked about, obtains the key X that converses, the voice call between user A and user B is also directly carried out using call key X
Encryption and decryption.
Carry out in communication process between user A and user B, monitored if there is third party user C, user A and user B
Call key will be consulted with third party user C respectively, after the completion of negotiation, the call key that user C and user A consults to obtain is M,
The call key that user C and user B consults to obtain is N.During user A is sent to user B call voice, user C is cut
The call voice A that user A is sent to user B is received, obtains plaintext A after being decrypted using call key M to call voice A, then make
User B is sent to after plaintext A is encrypted with call key N.Because user B can utilize the key N that converses to send user C
Carry out ciphertext to be decrypted, so as to which user B can get user A voice, similarly, user A call language is sent in user B
During sound, user C intercepts the call voice B that user B is sent to user A, and call voice B is decrypted using call key N
After obtain plaintext B, reuse call key M plaintext B is encrypted after be sent to user A.Because user A can utilize call
Key M sends ciphertext to user C and is decrypted, so as to which user A can get user B voice.Due to user A and user
B can get the voice of call opposite end, therefore, voice call can be carried out between user A and user B, but actually use
Family A and user B Correspondent Node user is user C, that is, user A and user B this call voice by user C
Monitor.
It is corresponding, when the method provided using the present embodiment carries out voice call, if there is user C monitoring, that
User A safety means utilize the call key M consulted with the user C of Correspondent Node, obtain an authorization code m, and by with
Family A reads aloud authorization code m, obtains audio files m, then includes user A sound and authorization code m content in audio files m, uses
After family C decrypts to audio files m, audio files m is encrypted using the key N that converses and issues user B, when user B hears sound
After sound file m, hear be user A sound, the source that specify that audio files m is user A, but user B safety means
It can utilize and obtain an authorization code n with the user C of the Correspondent Node call password N consulted, user B compares the audio files heard
The authorization code m of the m carryings and authorization code n locally generated, it is found that authorization code m and authorization code n is differed, you can learn this call
In third party's monitoring be present.
Certainly, user C is cracked to obtain audio files m, and audio files is substituted for and (given birth to including authorization code n by call key N
Into authorization code) audio files, but because audio files is not to be read aloud by user A, the sound not including user A is special
Sign, audio files is referred to as audio files m ', i.e. audio files m ' includes authorization code n content and from the sound for not being user A
Sound feature;User B is after the audio files m ' heard, it is found that authorization code exports with the safety means of oneself in audio files m '
It is consistent, but the sound characteristic in audio files m ' is not user A sound characteristic, therefore user B just can determine that this call
In third party's monitoring be present.
It can thus be seen that audio files includes the content for the sound characteristic and authorization code for reading aloud authorization code so that uses
Family can judge whether there is third party's monitoring in communication process according to the two information, ensure that the safety of call.
Below to being described further based on ZRTP key agreement to obtain the mode of call key and authorization code, specifically
Flow is as follows:
First, the generation of call key:
F1:First safety means send Hello message to the second safety means, and Hello message includes the first safety means
Used ZRTP version number, key agreement type, key algorithm and the first call terminal user session identification
ID1;Wherein the key agreement type of ZRTP agreements includes pre-share pattern, media stream pattern and Diffie-Hellman (DH)
Pattern;
F2:Second safety means send the response message of Hello message to the first safety means;
F3:Second safety means send Hello message to the first safety means, and Hello message includes the second safety means
Used ZRTP version number, key agreement type, key algorithm and the second call terminal user session identification
ID2;Wherein the key agreement type of ZRTP agreements includes pre-share pattern, media stream pattern and Diffie-Hellman (DH)
Pattern;
F4:First safety means send the response message of Hello message to the second safety means;
F5:Second safety means send both sides after the response message of Hello message is received, to the first safety means and all propped up
The key agreement type and key algorithm held, exemplified by this sentences the key agreement type of selection as DH patterns;
F6, the first safety means send the first function information locally generated, wherein first function to the second safety means
Information is a power function, and wherein power function can be g^x, wherein x=svr mod p, and wherein svr represents the secret of respondent
Value, for mod to round algorithm, p is integer;
F7, the second safety means send the second function information locally generated, wherein second function to the first safety means
Information is also a power function, and wherein power function can be g^y, wherein y=svi mod p, and wherein svi represents that promoter's is secret
Close value, for mod to round algorithm, p is integer;
Wherein, g^x is the first negotiation information mentioned above, and g^y is the second negotiation information mentioned above.
And in this example, the first safety chip can obtain the first call key g^xy according to g^x and g^y;, the second peace
Full chip can obtain the second call key g^xy according to g^x and g^y.
F8, the first safety means send the first verification message to the second safety means, and the first check information is to following letter
Obtained after breath verification, including:It is local whether to disclose the first call key, the first call key whether is locally destroyed after call
Deng;Wherein key used in verification obtains according to the first call key, specifically, the key g^xy that converses first,
Session identification ID1, session identification ID2 and a string of character strings are handled, and obtain a key S0, and wherein character string is one section of public affairs
Open the character string for representation function;The key derivation algorithm in ZRTP agreements is recycled to use key S0 processing
In the key that verification calculates;Wherein, key derivation algorithm can be hmac algorithm;
F9, the second safety means send the second verification after having been verified to the first verification message, to the first safety means and disappeared
Breath, the second verification message be to being obtained after following information checking, including:It is local whether to disclose the second call key, be local logical
Whether second call key etc. is destroyed after words;Wherein key used in verification obtains according to the second call key, specifically
For, the second call key g^xy, session identification ID1, session identification ID2 and a string of character strings are handled, obtain one
Key S0, wherein character string are the character strings that one section of disclosure is used for representation function;The key derivation in ZRTP agreements is recycled to calculate
Method is obtained for verifying the key calculated to key S0 processing;Wherein, key derivation algorithm can be hmac algorithm;
F10, the first safety means send confirmation after the completion of being verified to the second verification message, to the second safety means and disappeared
Breath, has completed key agreement.
Two:The producing method of authorization code:
This sentences the first safety means and illustrated to generate exemplified by the first authorization code:
After key S0 is obtained, using key derivation algorithm to S0 processing, one section of character string M is obtained;
Preceding 32 bits are taken to obtain a string of character string m from character string M;
Coded treatment is carried out to character string m, character string m is encoded into visualization character, using visualization character as first
Authorization code.
Compared with key of conversing in the prior art is the mode generated in TF card, embodiment of the method provided by the invention is led to
Generation call key is crossed on the safety means independently of call terminal, is reduced during voice encryption by malice on call terminal
The possibility of software attacks;And generated by the safety chip in safety means, the high security based on safety chip, reduce
The possibility of call key from stealing, ensure that the security of voice encryption;In addition, in voice encryption, in safety chip
Encrypted using call key in portion so that call key is called in a security context, is ensured the safety of call key and is made
With.
In addition, in voice encryption communication process, the second safety means are by playing first from the first call terminal
Ciphertext data, prompt to confirm the first ciphertext data played out according to the second authorization code, realize to the first call terminal
Identity information confirmation so that user determine this call whether someone monitor, improve and the third party identified in voice call
The success rate of monitoring, so as to reduce the monitored possibility of voice call, and determine that this voice call has the third party in user
During monitoring, user can take the safety measure of anti-monitoring to prevent information leakage in time, improve data transfer in voice call
Safety.
Further, the first ciphertext data from the first call terminal is played on the second safety means, reduces the
The attack of Malware on two call terminals, it ensure that voice call safety.
It is the description carried out to the complete interaction flow between the first safety means and the second safety means above, divides below
The other operating process each performed to the first safety means and the second safety means illustrates:
Fig. 2 is the method flow that a kind of first safety means provided by the invention realize data processing in voice call
Figure.Method includes shown in Fig. 2:
Step 21, the first safety chip of the first safety means generate the first negotiation information, and pass through the first safety means
The first communication interface send the first negotiation information to the first call terminal, wherein the first negotiation information include be used for generate first
The parameter information of call key, the voice call that the first call key is used for the user of the first call terminal carry out encryption and decryption behaviour
To make, the first safety means are connected with the first call terminal, and independently of the first call terminal;
Step 22, the first safety chip receive the second of the transmission of the first call terminal by the first communication interface to be consulted to believe
Breath, wherein the second negotiation information includes being used for the parameter information for generating the first call key, and by the second of the second call terminal
Safety means generate;First safety chip is calculated the first negotiation information and the second negotiation information, and it is close to obtain the first call
Key;
Step 23, the first safety means export the first authorization code, and prompt to read aloud the first authorization code, wherein first
Authorization code is that the first safety chip generates according to the first call key, obtains the user of the first call terminal to the first authorization code
Read aloud result, obtain the first acoustic information;
The first acoustic information is encrypted using the first call key for step 24, the first safety chip, obtains the
One encryption data, and the first encryption data is sent by the first communication interface;
Step 25, after the first confirmation instruction is obtained, the first safety chip starts logical to first using the first call key
The voice call of the user of telephone terminal carries out encryption and decryption operation.
Fig. 3 is the method flow that another first safety means provided by the invention realize data processing in voice call
Figure.Method includes shown in Fig. 3:
Step 31, the first safety chip of the first safety means generate the first negotiation information, and pass through the first safety means
The first communication interface send the first negotiation information to the first call terminal, wherein the first negotiation information include be used for generate first
The parameter information of call key, the voice call that the first call key is used for the user of the first call terminal carry out encryption and decryption behaviour
To make, the first safety means are connected with the first call terminal, and independently of the first call terminal;
Step 32, the first safety chip receive the second of the transmission of the first call terminal by the first communication interface to be consulted to believe
Breath, wherein the second negotiation information includes being used for the parameter information for generating the first call key, and by the second of the second call terminal
Safety means generate;First safety chip is calculated the first negotiation information and the second negotiation information, and it is close to obtain the first call
Key;
Step 33, the first safety chip, which start, utilizes voice call of the first call key to the user of the first call terminal
Carry out encryption and decryption operation;
Wherein, start in the first safety chip and utilize voice call of the first call key to the user of the first call terminal
After carrying out encryption and decryption operation, method also includes:
Step 34, the first safety means receive the certification triggering command to the user of the second call terminal, are receiving pair
After the certification triggering command of the user of second call terminal, the first authorization code is exported, and prompts to read aloud the first authorization code,
Wherein the first authorization code is the first safety chip according to the first call key generation;The user of the first call terminal is obtained to
One authorization code reads aloud result, obtains the first acoustic information;
Wherein, start in the first safety chip and utilize voice call of the first call key to the user of the first call terminal
After carrying out encryption and decryption operation, the first safety means receive the certification triggering command to the user of the second call terminal, with triggering
Certification to the user of the second call terminal, wherein can have following two to the certification triggering command of the user of the second call terminal
Kind acquisition modes, including:
The certification that first safety means receive the user to the second call terminal that button is sent on the first safety means is touched
Send instructions;Or
The certification that first call terminal receives the user to the second call terminal that button is sent on the first call terminal is touched
Send instructions, and the first safety means are sent to by the first communications reception, the first safety means are received to the second call terminal
The certification triggering command of user.
Wherein, the user of the first call terminal can be produced logical to second by pressing the button on the first safety means
The certification triggering command of the user of telephone terminal, or, conversed by pressing the button on the first call terminal with producing second
The certification triggering command of the user of terminal.
Wherein, triggered by the certification for pressing the button on the first safety means to produce to the user of the second call terminal
Instruction, can reduce the certification triggering command to the user of the second call terminal by malware attacks on the first call terminal
May, it ensure that the safety of voice call;By pressing the button on the first call terminal to produce to the second call terminal
The certification triggering command of user, without the first safety means are carried out with the change of software or hardware, realize simple.
The first acoustic information is encrypted using the first call key for step 35, the first safety chip, obtains the
One encryption data, and the first encryption data is sent by the first communication interface;
Step 36, obtain the first confirmation instruction after, the first safety chip using first call key to first call eventually
The voice call of the user at end continues encryption and decryption operation.
Embodiment of the method is that difference is with the difference of embodiment of the method shown in Fig. 3 wherein shown in Fig. 2, and first confirms to refer to
The receiving time of order is different, and the first confirmation instruction is that the first safety chip is starting to voice in embodiment of the method shown in Fig. 2
Call carries out what encryption and decryption operation received before, and first confirms that instruction is the first safety chip in embodiment of the method shown in Fig. 3
Carry out what encryption and decryption operation received afterwards to voice call starting.
Compared with key of conversing in the prior art is the mode generated in TF card, embodiment of the method provided by the invention is led to
The call key of generation first is crossed on the safety means independently of the first call terminal, reduces and is led to by first during voice encryption
The possibility of malware attacks on telephone terminal;And generated by the first safety chip in the first safety means, based on
The high security of one safety chip, reduce the possibility of the first call key from stealing, ensure that the security of voice encryption;Separately
Outside, in voice encryption, encrypted using the first call key inside the first safety chip so that the first call key be
One security context is called, and ensures the safe handling of the first call key.
In addition, the first safety means enable to the second call terminal to by the way that the first encryption data is sent
One encryption data is verified, realizes the confirmation of the identity information to the first call terminal so that the user of the second call terminal
Determining this call, whether someone monitors, and the success rate for identifying that the third party monitors in voice call is improved, so as to reduce voice
The monitored possibility of call, and when user determines that this voice call has third party's monitoring, user can take anti-in time
The safety measure of monitoring prevents information leakage, improves the safety of data transfer in voice call.
Fig. 4 is a kind of method flow diagram of second safety means processing data in voice call provided by the invention.Fig. 4
Shown method includes:
Step 41, the second safety chip of the second safety means receive the by the second communication interface of the second safety means
The first negotiation information that two call terminals are sent, wherein the first negotiation information includes being used for the parameter letter for generating the second call key
Breath, and generated by the first safety means of the first call terminal that voice call is carried out with the second call terminal, the second call is close
The voice call that key is used for the user of the second call terminal carries out encryption and decryption operation, wherein the second safety means and the second call
Terminal is connected, and independently of the second call terminal;
Step 42, the second safety chip generate the second negotiation information, and send second by the second communication interface and consult to believe
Cease to the second call terminal, wherein the second negotiation information includes being used for the parameter information for generating the second call key;
Step 43, the second safety chip are calculated the first negotiation information and the second negotiation information, obtain the second call
Key;
Step 44, the second safety means export the second authorization code, wherein the second authorization code is the second safety chip according to the
Two call key generations;
Step 45, the second safety chip are logical using second after the first encryption data is received by the second communication interface
First encryption data is decrypted words key, obtains the first ciphertext data;Second safety means play the first ciphertext data;Its
In the first encryption data include the first safety means obtain authorization code is read aloud read aloud result;
Step 46, the second safety means are prompted to playing out after exporting the second authorization code and playing the first ciphertext data
The first ciphertext data confirmed;
Step 47, the second safety chip start logical to second using the second call key after the second confirmation instruction is obtained
The voice call of the user of telephone terminal carries out encryption and decryption operation.
Fig. 5 is the method flow diagram of another second safety means processing data in voice call provided by the invention.
Method includes shown in Fig. 5:
Step 51, the second safety chip of the second safety means receive the by the second communication interface of the first safety means
The first negotiation information that two call terminals are sent, wherein the first negotiation information includes being used for the parameter letter for generating the second call key
Breath, and generated by the first safety means of the first call terminal that voice call is carried out with the second call terminal, the second call is close
The voice call that key is used for the user of the second call terminal carries out encryption and decryption operation, wherein the second safety means and the second call
Terminal is connected, and independently of the second call terminal;
Step 52, the second safety chip generate the second negotiation information, and send second by the second communication interface and consult to believe
Cease to the second call terminal, wherein the second negotiation information includes being used for the parameter information for generating the second call key;
Step 53, the second safety chip are calculated the first negotiation information and the second negotiation information, obtain the second call
Key;
Step 54, the second safety chip, which start, utilizes voice call of the second call key to the user of the second call terminal
Carry out encryption and decryption operation;
Wherein, start in the second safety chip and utilize voice call of the second call key to the user of the second call terminal
After carrying out encryption and decryption operation, method also includes:
Step 55, the second safety means receive the certification triggering command to the user of the first call terminal, are receiving pair
After the certification triggering command of the user of first call terminal, the second authorization code is exported, wherein the second authorization code is the second safe core
Piece generates according to the second call key;
Wherein, start in the second safety chip and utilize voice call of the second call key to the user of the second call terminal
After carrying out encryption and decryption operation, the second safety means receive the certification triggering command to the user of the first call terminal, with triggering
Certification to the user of the first call terminal, wherein can have following two to the certification triggering command of the user of the first call terminal
Kind acquisition modes, including:
The certification that second safety means receive the user to the first call terminal that button is sent on the second safety means is touched
Send instructions;Or
The certification that second call terminal receives the user to the first call terminal that button is sent on the second call terminal is touched
Send instructions, and the second safety means are sent to by the second communications reception, the second safety means are received to the first call terminal
The certification triggering command of user.
Wherein, the user of the second call terminal can be produced logical to first by pressing the button on the second safety means
The certification triggering command of the user of telephone terminal, or, conversed by pressing the button on the second call terminal with producing first
The certification triggering command of the user of terminal.
Wherein, triggered by the certification for pressing the button on the second safety means to produce to the user of the first call terminal
Instruction, can reduce the certification triggering command to the user of the first call terminal by malware attacks on the second call terminal
May, it ensure that the safety of voice call;By pressing the button on the second call terminal to produce to the first call terminal
The certification triggering command of user, without the second safety means are carried out with the change of software or hardware, realize simple.
Step 56, the second safety chip are logical using second after the first encryption data is received by the second communication interface
First encryption data is decrypted words key, obtains the first ciphertext data;Second safety means play the first ciphertext data;Its
In the first encryption data include the first safety means obtain authorization code is read aloud read aloud result;
Step 57, export the second authorization code and play the first ciphertext data after, the second safety means prompt to playing out
The first ciphertext data confirmed;
Step 58, the second safety chip are whole to the second call using the second call key after the second confirmation instruction is obtained
The voice call of the user at end continues encryption and decryption operation.
Embodiment of the method is that difference is with the difference of embodiment of the method shown in Fig. 5 wherein shown in Fig. 4, and second confirms to refer to
The receiving time of order is different, is that the second safety chip is starting to voice call progress encryption and decryption in embodiment of the method shown in Fig. 4
What operation received before, be that the second safety chip is starting to voice call progress encryption and decryption behaviour in embodiment of the method shown in Fig. 5
Make what is received afterwards.
Compared with key of conversing in the prior art is the mode generated in TF card, embodiment of the method provided by the invention is led to
Generation call key is crossed on the safety means independently of call terminal, is reduced during voice encryption by malice on call terminal
The possibility of software attacks;And generated by the safety chip in safety means, the high security based on safety chip, reduce
The possibility of call key from stealing, ensure that the security of voice encryption;In addition, in voice encryption, in safety chip
Encrypted using call key in portion so that call key is called in a security context, is ensured the safety of call key and is made
With.
In addition, in voice encryption communication process, the second safety means are by playing first from the first call terminal
Ciphertext data, prompt to confirm the first ciphertext data played out according to the second authorization code, realize to the first call terminal
Identity information confirmation so that user determine this call whether someone monitor, improve and the third party identified in voice call
The success rate of monitoring, so as to reduce the monitored possibility of voice call, and determine that this voice call has the third party in user
During monitoring, user can take the safety measure of anti-monitoring to prevent information leakage in time, improve data transfer in voice call
Safety.
Further, the first ciphertext data from the first call terminal is played on the second safety means, reduces the
The attack of Malware on two call terminals, it ensure that voice call safety.
Any process or method described otherwise above description in flow chart or herein is construed as, and represents to include
Module, fragment or the portion of the code of the executable instruction of one or more the step of being used to realize specific logical function or process
Point, and the scope of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discuss suitable
Sequence, including according to involved function by it is basic simultaneously in the way of or in the opposite order, carry out perform function, this should be of the invention
Embodiment person of ordinary skill in the field understood.
It should be appreciated that each several part of the present invention can be realized with hardware, software, firmware or combinations thereof.Above-mentioned
In embodiment, software that multiple steps or method can be performed in memory and by suitable instruction execution system with storage
Or firmware is realized.If, and in another embodiment, can be with well known in the art for example, realized with hardware
Any one of row technology or their combination are realized:With the logic gates for realizing logic function to data-signal
Discrete logic, have suitable combinational logic gate circuit application specific integrated circuit, programmable gate array (PGA), scene
Programmable gate array (FPGA) etc..
Those skilled in the art are appreciated that to realize all or part of step that above-described embodiment method carries
Suddenly it is that by program the hardware of correlation can be instructed to complete, described program can be stored in a kind of computer-readable storage medium
In matter, the program upon execution, including one or a combination set of the step of embodiment of the method.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing module, can also
That unit is individually physically present, can also two or more units be integrated in a module.Above-mentioned integrated mould
Block can both be realized in the form of hardware, can also be realized in the form of software function module.The integrated module is such as
Fruit is realized in the form of software function module and as independent production marketing or in use, can also be stored in a computer
In read/write memory medium.
Storage medium mentioned above can be read-only storage, disk or CD etc..
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means specific features, structure, material or the spy for combining the embodiment or example description
Point is contained at least one embodiment or example of the present invention.In this manual, to the schematic representation of above-mentioned term not
Necessarily refer to identical embodiment or example.Moreover, specific features, structure, material or the feature of description can be any
One or more embodiments or example in combine in an appropriate manner.
Although embodiments of the invention have been shown and described above, it is to be understood that above-described embodiment is example
Property, it is impossible to limitation of the present invention is interpreted as, one of ordinary skill in the art is not departing from the principle and objective of the present invention
In the case of above-described embodiment can be changed within the scope of the invention, change, replace and modification.The scope of the present invention
By appended claims and its equivalent limit.
Claims (22)
1. a kind of data processing method of voice call, it is characterised in that methods described includes:
First safety chip of the first safety means generates the first negotiation information, and first by first safety means is logical
Believe that interface sends first negotiation information to the first call terminal, first safety means and the first call terminal phase
Even, and independently of first call terminal;And first safety chip passes through described in first communication interface reception
The second negotiation information that first call terminal is sent, wherein second negotiation information is set by the second safety of the second call terminal
Standby generation;
First safety chip is calculated first negotiation information and second negotiation information, obtains the first call
Key, the voice call that the first call key is used for the user of first call terminal carry out encryption and decryption operation;
First safety means export the first authorization code, and prompt to read aloud first authorization code, wherein described the
One authorization code is first safety chip according to the described first call key generation;
The user that first safety chip obtains first call terminal reads aloud result to first authorization code, obtains
First acoustic information;
First acoustic information is encrypted using the described first call key for first safety chip, obtains the
One encryption data, and first encryption data is sent by first communication interface;
After the first confirmation instruction is obtained, first safety chip starts logical to described first using the described first call key
The voice call of the user of telephone terminal carries out encryption and decryption operation.
2. according to the method for claim 1, it is characterised in that described after the first confirmation instruction is obtained, first peace
Full chip starts carries out encryption and decryption behaviour using voice call of the described first call key to the user of first call terminal
Make, including:
First safety chip is after the second confirmation instruction that second call terminal is sent is received, according to described second
Confirm instruction, obtain described first and confirm instruction, start the use to first call terminal using the described first call key
The voice call at family carries out encryption and decryption operation;Wherein, described second confirms that instruction is to be generated according to second safety means
The instruction that second authorization code is confirmed to the first ciphertext data played out, and by second safety means generation;Its
Described in the first ciphertext data first encryption data is decrypted to obtain by second safety means.
3. according to the method for claim 1, it is characterised in that described after the first confirmation instruction is obtained, first peace
Full chip starts carries out encryption and decryption behaviour using voice call of the described first call key to the user of first call terminal
Make, including:
First safety chip utilizes the described first call after the second encryption data is received by first communication interface
Second encryption data is decrypted key, obtains the second ciphertext data;First safety means play described second
Ciphertext data, and prompt to confirm second ciphertext data played out according to first authorization code;Described first
Safety chip obtains the first confirmation instruction, and starts the user's for utilizing the described first call key to first call terminal
Voice call carries out encryption and decryption operation;Wherein described second encryption data includes described second that second safety means obtain
The user of call terminal reads aloud result to authorization code.
4. a kind of data processing method of voice call, it is characterised in that methods described includes:
First safety chip of the first safety means generates the first negotiation information, and first by first safety means is logical
Believe that interface sends first negotiation information to the first call terminal, first safety means and the first call terminal phase
Even, and independently of first call terminal;And first safety chip passes through described in first communication interface reception
The second negotiation information that first call terminal is sent, wherein second negotiation information is set by the second safety of the second call terminal
Standby generation;
First safety chip is calculated first negotiation information and second negotiation information, obtains the first call
Key, the voice call that the first call key is used for the user of first call terminal carry out encryption and decryption operation;
After the first call key is obtained, first safety chip starts using the described first call key to described the
The voice call of the user of one call terminal carries out encryption and decryption operation;
Wherein, start in first safety chip using the described first call key to the user's of first call terminal
After voice call carries out encryption and decryption operation, methods described also includes:
First safety means receive the certification triggering command to the user of second call terminal;
First safety means are after the certification triggering command of the user to second call terminal is received, output
First authorization code, and prompt to read aloud first authorization code, wherein first authorization code is the described first safe core
Piece generates according to the described first call key;
The user that first safety chip obtains first call terminal reads aloud result to first authorization code, obtains
First acoustic information;
First acoustic information is encrypted using the described first call key for first safety chip, obtains the
One encryption data, and first encryption data is sent by first communication interface;
After the first confirmation instruction is obtained, first safety chip is whole to the described first call using the described first call key
The voice call of the user at end continues encryption and decryption operation.
5. according to the method for claim 4, it is characterised in that described after the first confirmation instruction is obtained, first peace
Full chip continues encryption and decryption behaviour using voice call of the described first call key to the user of first call terminal
Make, including:
First safety chip is after the second confirmation instruction that second call terminal is sent is received, according to described second
Confirm instruction, obtain described first and confirm instruction, using the described first call key to the user's of first call terminal
Voice call continues encryption and decryption operation;Wherein, described second confirms that instruction is to be generated according to second safety means
The instruction that second authorization code is confirmed to the first ciphertext data played out, and by second safety means generation;Institute
The first ciphertext data is stated first encryption data is decrypted to obtain by second safety means.
6. according to the method for claim 4, it is characterised in that described after the first confirmation instruction is obtained, first peace
Full chip continues encryption and decryption behaviour using voice call of the described first call key to the user of first call terminal
Make, including:
First safety chip utilizes the described first call after the second encryption data is received by first communication interface
Second encryption data is decrypted key, obtains the second ciphertext data;First safety means play described second
Ciphertext data, and prompt to confirm second ciphertext data played out according to first authorization code;Described first
Safety chip obtains the first confirmation instruction, and the voice using the described first call key to the user of first call terminal
Call continues encryption and decryption operation;Wherein described second encryption data includes described second that second safety means obtain
The user of call terminal reads aloud result to authorization code.
7. the method according to claim 3 or 6, it is characterised in that
First safety means prompting confirms according to first authorization code to second ciphertext data played out,
Including:
Whether the first safety means prompting is consistent to the authorization code in second ciphertext data and first authorization code
Confirmed, and the sound characteristic of authorization code and the user of second call terminal are read aloud in second ciphertext data
Whether sound characteristic is unanimously confirmed;
Wherein, described first confirms instruction to confirm the authorization code in second ciphertext data and first authorization code one
Cause, and the sound characteristic of authorization code and the sound spy of the user of second call terminal are read aloud in second ciphertext data
Levy consistent instruction.
8. according to the method described in any one of claim 1 to 6, it is characterised in that the first safety means output first is awarded
Weighted code, including:
A, the first authorization code is converted into acoustic information by first safety means, obtains the sound letter of first authorization code
Breath, and play the acoustic information of first authorization code;Or
B, first safety means show the first authorization code.
9. according to the method described in any one of claim 1 to 6, it is characterised in that methods described also includes:
If first safety chip detects that the voice call of the user of first call terminal terminates, described first
Safety chip deletes the first call key.
10. according to the method described in any one of claim 1 to 6, it is characterised in that first safety chip obtains described the
The user of one call terminal reads aloud result to first authorization code, and obtaining the first acoustic information includes:
A, first safety chip obtains first call of the voice collecting unit collection of first safety means eventually
The user at end reads aloud result to first authorization code, obtains the first acoustic information;Or
B, first safety chip receives described the first of the first call terminal collection by first communication interface
The user of call terminal reads aloud result to first authorization code, obtains the first acoustic information.
11. according to the method described in any one of claim 1 to 6, it is characterised in that the length of first authorization code is less than institute
State the length of the first call key.
12. according to the method described in any one of claim 1 to 6, it is characterised in that first authorization code is used for unique mark
The first call key.
13. a kind of data processing method of voice call, it is characterised in that methods described includes:
Second safety chip of the second safety means receives the second call by the second communication interface of second safety means
The first negotiation information that terminal is sent, wherein first negotiation information with second call terminal by carrying out voice call
The first safety means generation of first call terminal, wherein second safety means are connected with second call terminal, and
Independently of second call terminal;And second safety chip generates the second negotiation information, and it is logical by described second
Believe that interface sends second negotiation information to second call terminal;
Second safety chip is calculated first negotiation information and second negotiation information, obtains the second call
Key, the voice call that the second call key is used for the user of second call terminal carry out encryption and decryption operation;
Second safety means export the second authorization code, wherein second authorization code is second safety chip according to institute
State the generation of the second call key;And second safety chip by second communication interface receive first plus
After ciphertext data, first encryption data is decrypted using the described second call key, obtains the first ciphertext data;It is described
Second safety means play first ciphertext data;Wherein described first encryption data obtains including first safety means
Authorization code is read aloud read aloud result;
After exporting second authorization code and playing first ciphertext data, the second safety means prompting is according to
Second authorization code confirms to first ciphertext data played out;
Second safety chip starts logical to described second using the described second call key after the second confirmation instruction is obtained
The voice call of the user of telephone terminal carries out encryption and decryption operation.
14. a kind of data processing method of voice call, it is characterised in that methods described includes:
Second safety chip of the second safety means receives the second call by the second communication interface of second safety means
The first negotiation information that terminal is sent, wherein first negotiation information with second call terminal by carrying out voice call
The first safety means generation of first call terminal, wherein second safety means are connected with second call terminal, and
Independently of second call terminal;And second safety chip generates the second negotiation information, and it is logical by described second
Believe that interface sends second negotiation information to second call terminal;
Second safety chip is calculated first negotiation information and second negotiation information, obtains the second call
Key, the voice call that the second call key is used for the user of second call terminal carry out encryption and decryption operation;
After the second call key is obtained, second safety chip starts using the described second call key to described the
The voice call of the user of two call terminals carries out encryption and decryption operation;
Wherein, start in second safety chip using the described second call key to the user's of second call terminal
After voice call carries out encryption and decryption operation, methods described also includes:
Second safety means receive the certification triggering command to the user of first call terminal;
Second safety means are after the certification triggering command of the user to first call terminal is received, output
Second authorization code, generated wherein second authorization code is second safety chip according to the described second call key;With
It is logical using described second and second safety chip by second communication interface after the first encryption data is received
First encryption data is decrypted words key, obtains the first ciphertext data;Second safety means play described the
One ciphertext data;It is bright that wherein described first encryption data includes being read aloud authorization code for first safety means acquisition
Read result;
After exporting second authorization code and playing first ciphertext data, the second safety means prompting is according to
Second authorization code confirms to first ciphertext data played out;
Second safety chip is whole to the described second call using the described second call key after the second confirmation instruction is obtained
The voice call of the user at end continues encryption and decryption operation.
15. the method according to claim 13 or 14, it is characterised in that
Second safety means prompting confirms according to second authorization code to first ciphertext data played out,
Including:
Whether the second safety means prompting is consistent to the authorization code in first ciphertext data and second authorization code
Confirmed, and the sound characteristic of authorization code and the user of first call terminal are read aloud in first ciphertext data
Whether sound characteristic is unanimously confirmed;
Wherein, second safety chip obtain second confirm instruction for confirm the authorization code in first ciphertext data with
Second authorization code is consistent, and the sound characteristic of authorization code and described first is read aloud in first ciphertext data and is conversed eventually
The consistent instruction of the sound characteristic of the user at end.
16. the method according to claim 13 or 14, it is characterised in that the second safety means output second authorizes
Code, including:
A, the second authorization code is converted into acoustic information by second safety means, obtains the sound letter of second authorization code
Breath, and play the acoustic information of second authorization code;Or
B, second safety means show the second authorization code.
17. the method according to claim 13 or 14, it is characterised in that methods described also includes:
Second safety means prompt to read aloud second authorization code after second authorization code is exported;
The user that second safety chip obtains second call terminal reads aloud result to second authorization code, obtains
Second sound information;
The second sound information is encrypted using the described second call key for second safety chip, obtains the
Two encryption datas, and second encryption data is sent by second communication interface.
18. the method according to claim 13 or 14, it is characterised in that methods described also includes:
If second safety chip detects that the voice call of the user of second call terminal terminates, described second
Safety chip deletes the second call key.
19. according to the method for claim 17, it is characterised in that second safety chip obtains second call eventually
The user at end reads aloud result to second authorization code, and obtaining second sound information includes:
A, second safety chip obtains second call of the voice collecting unit collection of second safety means eventually
The user at end reads aloud result to second authorization code, obtains second sound information;Or
B, second safety chip receives described the second of the second call terminal collection by second communication interface
The user of call terminal reads aloud result to second authorization code, obtains second sound information.
20. according to the method for claim 18, it is characterised in that second safety chip obtains second call eventually
The user at end reads aloud result to second authorization code, and obtaining second sound information includes:
A, second safety chip obtains second call of the voice collecting unit collection of second safety means eventually
The user at end reads aloud result to second authorization code, obtains second sound information;Or
B, second safety chip receives described the second of the second call terminal collection by second communication interface
The user of call terminal reads aloud result to second authorization code, obtains second sound information.
21. the method according to claim 13 or 14, it is characterised in that the length of second authorization code is less than described the
The length of two call keys.
22. the method according to claim 13 or 14, it is characterised in that second authorization code is used for described in unique mark
Second call key.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410208608.3A CN103974242B (en) | 2014-05-16 | 2014-05-16 | A kind of data processing method of voice call |
HK15100284.8A HK1200000A1 (en) | 2014-05-16 | 2015-01-12 | Data processing method for voice communication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410208608.3A CN103974242B (en) | 2014-05-16 | 2014-05-16 | A kind of data processing method of voice call |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103974242A CN103974242A (en) | 2014-08-06 |
CN103974242B true CN103974242B (en) | 2017-11-10 |
Family
ID=51243183
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410208608.3A Active CN103974242B (en) | 2014-05-16 | 2014-05-16 | A kind of data processing method of voice call |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN103974242B (en) |
HK (1) | HK1200000A1 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106130727A (en) * | 2016-08-31 | 2016-11-16 | 深圳市金立通信设备有限公司 | A kind of call cryptographic key negotiation method and system |
CN107809759A (en) * | 2016-09-09 | 2018-03-16 | 中兴通讯股份有限公司 | A kind of data transmission method and device |
CN106789000A (en) * | 2016-12-13 | 2017-05-31 | 北京握奇智能科技有限公司 | A kind of secret phone system and method based on TEE technologies and wearable device |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1183685A (en) * | 1996-06-28 | 1998-06-03 | 株式会社东芝 | Encryption decoding method. record reproduction device and record medium |
CN101228770A (en) * | 2005-07-27 | 2008-07-23 | 国际商业机器公司 | Systems and method for secure delivery of files to authorized recipients |
CN101236581A (en) * | 2007-02-01 | 2008-08-06 | 北京华大信安科技有限公司 | Information safety apparatus and its processing method |
CN101420303A (en) * | 2008-12-12 | 2009-04-29 | 广州杰赛科技股份有限公司 | Communication method for audio data and apparatus thereof |
CN102098159A (en) * | 2010-07-28 | 2011-06-15 | 胡旭光 | Secret key device and method for mobile phone |
CN202231733U (en) * | 2011-09-06 | 2012-05-23 | 信雅达系统工程股份有限公司 | Earphone shield with earphone function |
CN102497465A (en) * | 2011-10-26 | 2012-06-13 | 潘铁军 | High-secrecy mobile information safety system and safety method for distributed secret keys |
CN102592091A (en) * | 2011-12-28 | 2012-07-18 | 潘铁军 | Digital rights management system and security method based on distributed key |
CN102609641A (en) * | 2011-12-28 | 2012-07-25 | 潘铁军 | DRM (digital rights management) system based on distributed keys |
CN102647275A (en) * | 2011-02-22 | 2012-08-22 | 深圳市文鼎创数据科技有限公司 | KEY for mobile terminal |
CN103457729A (en) * | 2012-05-31 | 2013-12-18 | 阿里巴巴集团控股有限公司 | Safety equipment, service terminal and encryption method |
-
2014
- 2014-05-16 CN CN201410208608.3A patent/CN103974242B/en active Active
-
2015
- 2015-01-12 HK HK15100284.8A patent/HK1200000A1/en unknown
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1183685A (en) * | 1996-06-28 | 1998-06-03 | 株式会社东芝 | Encryption decoding method. record reproduction device and record medium |
CN101228770A (en) * | 2005-07-27 | 2008-07-23 | 国际商业机器公司 | Systems and method for secure delivery of files to authorized recipients |
CN101236581A (en) * | 2007-02-01 | 2008-08-06 | 北京华大信安科技有限公司 | Information safety apparatus and its processing method |
CN101420303A (en) * | 2008-12-12 | 2009-04-29 | 广州杰赛科技股份有限公司 | Communication method for audio data and apparatus thereof |
CN102098159A (en) * | 2010-07-28 | 2011-06-15 | 胡旭光 | Secret key device and method for mobile phone |
CN102647275A (en) * | 2011-02-22 | 2012-08-22 | 深圳市文鼎创数据科技有限公司 | KEY for mobile terminal |
CN202231733U (en) * | 2011-09-06 | 2012-05-23 | 信雅达系统工程股份有限公司 | Earphone shield with earphone function |
CN102497465A (en) * | 2011-10-26 | 2012-06-13 | 潘铁军 | High-secrecy mobile information safety system and safety method for distributed secret keys |
CN102592091A (en) * | 2011-12-28 | 2012-07-18 | 潘铁军 | Digital rights management system and security method based on distributed key |
CN102609641A (en) * | 2011-12-28 | 2012-07-25 | 潘铁军 | DRM (digital rights management) system based on distributed keys |
CN103457729A (en) * | 2012-05-31 | 2013-12-18 | 阿里巴巴集团控股有限公司 | Safety equipment, service terminal and encryption method |
Also Published As
Publication number | Publication date |
---|---|
HK1200000A1 (en) | 2015-07-24 |
CN103974242A (en) | 2014-08-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103973696B (en) | A kind of data processing method of voice call | |
CN102547502B (en) | Headset, headset use control method and terminal | |
US20110217950A1 (en) | Apparatus & method to improve pairing security in Bluetooth™ headsets & earbuds | |
CN107277745A (en) | Blue tooth voice contrast means and method | |
CN104393994B (en) | Audio data secure transmission method, system and terminal | |
CN104065648B (en) | A kind of data processing method of voice call | |
CN103974243B (en) | A kind of data handling system of voice call | |
CN103974242B (en) | A kind of data processing method of voice call | |
CN103986711B (en) | A kind of data processing method of voice call | |
EP3139564A1 (en) | Encryption coding module | |
CN103986712B (en) | A kind of data processing method of voice call | |
CN104765538B (en) | A kind of information processing method and terminal | |
CN104080080B (en) | A kind of data handling system of voice call | |
CN104065649B (en) | A kind of data processing method of voice call | |
CN104038932B (en) | A kind of safety equipment | |
WO2020147150A1 (en) | Unlocking password generation method and password unlocking method, apparatus and unlocking system | |
WO2013012401A1 (en) | Apparatus & method to improve pairing security in bluetoothtm headsets & earbuds | |
CN106331282A (en) | Mobile phone communication anti-eavesdropping system for implementing encryption and decryption on Bluetooth earphone side | |
CN104065650B (en) | A kind of data handling system of voice call | |
CN103987036B (en) | A kind of data handling system of voice call | |
CN103986579B (en) | A kind of data handling system of voice call | |
CN103997732B (en) | A kind of data handling system of voice call | |
CN104066081B (en) | A kind of data handling system of voice call | |
CN205545497U (en) | Speech signal treatment facility | |
CN104066080B (en) | A kind of data processing method of voice call |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1200000 Country of ref document: HK |
|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: GR Ref document number: 1200000 Country of ref document: HK |