CN103974242B - A kind of data processing method of voice call - Google Patents

A kind of data processing method of voice call Download PDF

Info

Publication number
CN103974242B
CN103974242B CN201410208608.3A CN201410208608A CN103974242B CN 103974242 B CN103974242 B CN 103974242B CN 201410208608 A CN201410208608 A CN 201410208608A CN 103974242 B CN103974242 B CN 103974242B
Authority
CN
China
Prior art keywords
call
authorization code
user
safety
call terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410208608.3A
Other languages
Chinese (zh)
Other versions
CN103974242A (en
Inventor
李东声
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tendyron Technology Co Ltd
Original Assignee
Tendyron Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tendyron Technology Co Ltd filed Critical Tendyron Technology Co Ltd
Priority to CN201410208608.3A priority Critical patent/CN103974242B/en
Publication of CN103974242A publication Critical patent/CN103974242A/en
Priority to HK15100284.8A priority patent/HK1200000A1/en
Application granted granted Critical
Publication of CN103974242B publication Critical patent/CN103974242B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention provides a kind of data processing method of voice call, including:First safety chip of the first safety means generates the first negotiation information, and sends the first negotiation information to the first call terminal;And first safety chip receive the first call terminal send the second negotiation information;First safety chip is calculated the first negotiation information and the second negotiation information, obtains the first call key;First safety means export the first authorization code, and prompt to read aloud the first authorization code;The user that first safety chip obtains the first call terminal reads aloud result to the first authorization code, obtains the first acoustic information;The first acoustic information is encrypted using the first call key for first safety chip, obtains the first encryption data, and send the first encryption data;After the first confirmation instruction is obtained, the first safety chip starts carries out encryption and decryption operation using voice call of the first call key to the user of the first call terminal.

Description

A kind of data processing method of voice call
Technical field
The present invention relates to electronic technology field, more particularly to a kind of data processing method of voice call.
Background technology
In the prior art, there is monitored possibility in the voice call between user, therefore current voice call is present Security risk.It is the call by the TF card memory storage on mobile phone by the way of in the prior art for the security risk Key realizes the protection to voice call to voice encryption.But in actual applications, if call terminal is mounted with that malice is soft Part, hacker can steal the call key in TF card by the Malware, and then crack the voice messaging after encryption, cause The risk of the speech data leakage of call terminal, therefore how the progress voice encryption operation of safety is that technology urgently to be resolved hurrily is asked Topic;In addition, monitored possibility in voice call in the prior art be present, therefore it is same to reduce the monitored possibility of voice call It is technical problem urgently to be resolved hurrily.
The content of the invention
The present invention provides a kind of data processing method of voice call, main purpose be to solve above-mentioned technical problem it One.
The present invention provides a kind of data processing method of voice call, and this method includes:First peace of the first safety means Full chip generates the first negotiation information, and sends the first negotiation information to first by the first communication interface of the first safety means Call terminal, the first safety means are connected with the first call terminal, and independently of the first call terminal;And the first safe core Piece receives the second negotiation information of the first call terminal transmission by the first communication interface, wherein the second negotiation information is led to by second The second safety means generation of telephone terminal;First safety chip is calculated the first negotiation information and the second negotiation information, is obtained To the first call key, the voice call that the first call key is used for the user of the first call terminal carries out encryption and decryption operation; First safety means export the first authorization code, and prompt to read aloud the first authorization code, wherein the first authorization code is the first peace Full chip generates according to the first call key;First safety chip obtains the user of the first call terminal to the first authorization code Result is read aloud, obtains the first acoustic information;The first acoustic information is encrypted using the first call key for first safety chip Processing, the first encryption data is obtained, and the first encryption data is sent by the first communication interface;Obtaining the first confirmation instruction Afterwards, the first safety chip starts carries out encryption and decryption behaviour using voice call of the first call key to the user of the first call terminal Make.
In addition, after the first confirmation instruction is obtained, the first safety chip starts to be conversed first using the first call key The voice call of the user of terminal carries out encryption and decryption operation, including:A, the first safety chip is receiving the second call terminal hair After second sent confirms instruction, confirm to instruct according to second, obtain the first confirmation instruction, start using the first call key to the The voice call of the user of one call terminal carries out encryption and decryption operation;Wherein, second confirms that instruction is according to the described second safety The instruction that second authorization code of equipment generation is confirmed to the first ciphertext data played out, and by second safety means Generation;Wherein the first ciphertext data is decrypted to obtain by the second safety means to the first encryption data;Or B, the first peace Full chip is carried out after the second encryption data is received by the first communication interface using the first call key to the second encryption data Decryption, obtains the second ciphertext data;First safety means play the second ciphertext data, and prompt to awarding in the second ciphertext data Whether weighted code is unanimously confirmed with the first authorization code, and the sound characteristic and second of authorization code is read aloud in the second ciphertext data Whether the sound characteristic of the user of call terminal is unanimously confirmed;First safety chip obtains the first confirmation instruction, and starts Encryption and decryption operation is carried out using voice call of the first call key to the user of the first call terminal;Wherein the second encryption data The user of the second call terminal obtained including the second safety means reads aloud result to authorization code;Wherein, first confirms instruction To confirm that the authorization code in the second ciphertext data is consistent with the first authorization code, and the sound of authorization code is read aloud in the second ciphertext data The instruction consistent with the sound characteristic of the user of the second call terminal of sound feature.
The present invention provides a kind of data processing method of voice call, and this method includes:First peace of the first safety means Full chip generates the first negotiation information, and sends the first negotiation information to first by the first communication interface of the first safety means Call terminal, the first safety means are connected with the first call terminal, and independently of the first call terminal;And the first safe core Piece receives the second negotiation information of the first call terminal transmission by the first communication interface, wherein the second negotiation information is led to by second The second safety means generation of telephone terminal;First safety chip is calculated the first negotiation information and the second negotiation information, is obtained To the first call key, the voice call that the first call key is used for the user of the first call terminal carries out encryption and decryption operation; After the first call key is obtained, the first safety chip starts the language to the user of the first call terminal using the first call key Sound call carries out encryption and decryption operation;Wherein, start in the first safety chip using the first call key to the first call terminal After the voice call of user carries out encryption and decryption operation, this method also includes:First safety means are received to the second call terminal User certification triggering command;First safety means are receiving the certification triggering command to the user of the second call terminal Afterwards, export the first authorization code, and prompt to read aloud the first authorization code, wherein the first authorization code be the first safety chip according to First call key generation;The user that first safety chip obtains the first call terminal reads aloud result to the first authorization code, Obtain the first acoustic information;The first acoustic information is encrypted using the first call key for first safety chip, is obtained First encryption data, and the first encryption data is sent by the first communication interface;After the first confirmation instruction is obtained, the first safety Chip continues encryption and decryption operation using voice call of the first call key to the user of the first call terminal.
In addition, after the first confirmation instruction is obtained, the first safety chip is using the first call key to the first call terminal User voice call continue encryption and decryption operation, including:A, the first safety chip is receiving the second call terminal hair After second sent confirms instruction, confirm to instruct according to second, obtain the first confirmation instruction, it is logical to first using the first call key The voice call of the user of telephone terminal continues encryption and decryption operation;Wherein, second confirms that instruction is according to the described second safety The instruction that second authorization code of equipment generation is confirmed to the first ciphertext data played out, and by second safety means Generation;Wherein the first ciphertext data is decrypted to obtain by the second safety means to the first encryption data;Or B, the first peace Full chip is carried out after the second encryption data is received by the first communication interface using the first call key to the second encryption data Decryption, obtains the second ciphertext data;First safety means play the second ciphertext data, and prompt to awarding in the second ciphertext data Whether weighted code is unanimously confirmed with the first authorization code, and the sound characteristic and second of authorization code is read aloud in the second ciphertext data Whether the sound characteristic of the user of call terminal is unanimously confirmed;First safety chip obtains the first confirmation instruction, and utilizes Voice call of the first call key to the user of the first call terminal continues encryption and decryption operation;Wherein the second encryption data The user of the second call terminal obtained including the second safety means reads aloud result to authorization code;Wherein, first confirms instruction To confirm that the authorization code in the second ciphertext data is consistent with the first authorization code, and the sound of authorization code is read aloud in the second ciphertext data The instruction consistent with the sound characteristic of the user of the second call terminal of sound feature.
In addition, the first safety means export the first authorization code, including:A, the first authorization code is converted into by the first safety means Acoustic information, the acoustic information of the first authorization code is obtained, and play the acoustic information of the first authorization code;Or B, the first safety Equipment shows the first authorization code.
In addition, this method also includes:If the first safety chip detects the voice call of the user of the first call terminal Terminate, then the first safety chip deletes the first call key.
In addition, the user that the first safety chip obtains the first call terminal reads aloud result to the first authorization code, the is obtained One acoustic information includes:A, the first safety chip obtains the first call terminal of the voice collecting unit collection of the first safety means User result is read aloud to the first authorization code, obtain the first acoustic information;Or B, the first safety chip pass through the first communication The user of first call terminal of the call terminal of interface first collection reads aloud result to the first authorization code, obtains the first sound Message ceases.
In addition, the length of the first authorization code is less than the length of the first call key.
In addition, the first authorization code is used for the call key of unique mark first.
The present invention provides a kind of data processing method of voice call, and this method includes:Second peace of the second safety means Full chip receives the first negotiation information of the second call terminal transmission by the second communication interface of the second safety means, wherein the One negotiation information is generated by the first safety means that the first call terminal of voice call is carried out with the second call terminal, wherein the Two safety means are connected with the second call terminal, and independently of the second call terminal;And second safety chip generation second association Business's information, and the second negotiation information is sent to the second call terminal by the second communication interface;Second safety chip is assisted to first Business's information and the second negotiation information are calculated, and obtain the second call key, and the second call key is used for the second call terminal User voice call carry out encryption and decryption operation;Second safety means export the second authorization code, wherein the second authorization code is the Two safety chips generate according to the second call key;And second safety chip receiving by the second communication interface After one encryption data, the first encryption data is decrypted using the second call key, obtains the first ciphertext data;Second safety The ciphertext data of device plays first;What wherein the first encryption data included that the first safety means obtain is read aloud authorization code Read aloud result;After exporting the second authorization code and playing the first ciphertext data, the second safety means are prompted according to the second authorization code The first ciphertext data played out is confirmed;Second safety chip starts after the second confirmation instruction is obtained and utilizes second Voice call of the key to the user of the second call terminal of conversing carries out encryption and decryption operation.
The present invention provides a kind of data processing method of voice call, and this method includes:Second peace of the second safety means Full chip receives the first negotiation information of the second call terminal transmission by the second communication interface of the second safety means, wherein the One negotiation information is generated by the first safety means that the first call terminal of voice call is carried out with the second call terminal, wherein the Two safety means are connected with the second call terminal, and independently of the second call terminal;And second safety chip generation second association Business's information, and the second negotiation information is sent to the second call terminal by the second communication interface;Second safety chip is assisted to first Business's information and the second negotiation information are calculated, and obtain the second call key, and the second call key is used for the second call terminal User voice call carry out encryption and decryption operation;After the second call key is obtained, the second safety chip, which starts, utilizes second Voice call of the key to the user of the second call terminal of conversing carries out encryption and decryption operation;Wherein, start in the second safety chip After carrying out encryption and decryption operation using voice call of the second call key to the user of the second call terminal, this method is also wrapped Include:Second safety means receive the certification triggering command to the user of the first call terminal;Second safety means are receiving pair After the certification triggering command of the user of first call terminal, the second authorization code is exported, wherein the second authorization code is the second safe core Piece generates according to the second call key;And second safety chip the first encryption number is being received by the second communication interface According to rear, the first encryption data is decrypted using the second call key, obtains the first ciphertext data;Second safety means play First ciphertext data;Wherein the first encryption data include the first safety means obtain authorization code is read aloud read aloud knot Fruit;After exporting the second authorization code and playing the first ciphertext data, the prompting of the second safety means is according to the second authorization code to playing The first ciphertext data gone out is confirmed;Second safety chip utilizes the second call key pair after the second confirmation instruction is obtained The voice call of the user of second call terminal continues encryption and decryption operation.
In addition, the second safety means prompting is carried out according to the second authorization code to first ciphertext data played out Confirm, including:Second safety means are prompted It is no unanimously to be confirmed, and the sound characteristic of authorization code and first call terminal are read aloud in first ciphertext data Whether the sound characteristic of user is unanimously confirmed;Wherein, the second confirmation instruction that second safety chip obtains is confirmation Authorization code in first ciphertext data is consistent with second authorization code, and bright read authority in first ciphertext data The sound characteristic instruction consistent with the sound characteristic of the user of first call terminal of code.
In addition, the second safety means export the second authorization code, including:A, the second authorization code is converted into by the second safety means Acoustic information, the acoustic information of the second authorization code is obtained, and play the acoustic information of the second authorization code;Or B, the second safety Equipment shows the second authorization code.
In addition, this method also includes:Second safety means prompt to carry out the second authorization code after the second authorization code is exported Read aloud;The user that second safety chip obtains the second call terminal reads aloud result to the second authorization code, obtains rising tone message Breath;Second sound information is encrypted using the second call key for second safety chip, obtains the second encryption data, and Second encryption data is sent by the second communication interface.
In addition, this method also includes:If the second safety chip detects the voice call of the user of the second call terminal Terminate, then the second safety chip deletes the second call key.
In addition, the user that the second safety chip obtains the second call terminal reads aloud result to the second authorization code, the is obtained Two acoustic informations include:A, the second safety chip obtains the second call terminal of the voice collecting unit collection of the second safety means User result is read aloud to the second authorization code, obtain second sound information;Or B, the second safety chip pass through the second communication The user of second call terminal of the call terminal of interface second collection reads aloud result to the second authorization code, obtains the rising tone Message ceases.
In addition, the length of the second authorization code is less than the length of the second call key.
In addition, the second authorization code is used for the call key of unique mark second.
Compared with key of conversing in the prior art is the mode generated in TF card, embodiment of the method provided by the invention is led to Generation call key is crossed on the safety means independently of call terminal, is reduced during voice encryption by malice on call terminal The possibility of software attacks;And generated by the safety chip in safety means, the high security based on safety chip, reduce The possibility of call key from stealing, ensure that the security of voice encryption;In addition, in voice encryption, in safety chip Encrypted using call key in portion so that call key is called in a security context, is ensured the safety of call key and is made With.
In addition, in voice encryption communication process, the second safety means are by playing first from the first call terminal Ciphertext data, prompt to confirm the first ciphertext data played out according to the second authorization code, realize to the first call terminal Identity information confirmation so that user determine this call whether someone monitor, improve and the third party identified in voice call The success rate of monitoring, so as to reduce the monitored possibility of voice call, and determine that this voice call has the third party in user During monitoring, user can take the safety measure of anti-monitoring to prevent information leakage in time, improve data transfer in voice call Safety.
Further, the first ciphertext data from the first call terminal is played on the second safety means, reduces the The attack of Malware on two call terminals, it ensure that voice call safety.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, required use in being described below to embodiment Accompanying drawing be briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for this For the those of ordinary skill in field, on the premise of not paying creative work, other can also be obtained according to these accompanying drawings Accompanying drawing.
Fig. 1 is a kind of schematic flow sheet of voice data processing method embodiment provided by the invention;
Fig. 2 is the method flow that a kind of first safety means provided by the invention realize data processing in voice call Figure;
Fig. 3 is the method flow that another first safety means provided by the invention realize data processing in voice call Figure;
Fig. 4 is a kind of method flow diagram of second safety means processing data in voice call provided by the invention;
Fig. 5 is the method flow diagram of another second safety means processing data in voice call provided by the invention.
Embodiment
With reference to the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Ground describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.Based on this The embodiment of invention, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made Example, belongs to protection scope of the present invention.
The embodiment of the present invention is described in further detail below in conjunction with accompanying drawing.
Fig. 1 is a kind of schematic flow sheet of the data processing method embodiment of voice call provided by the invention.Shown in Fig. 1 Embodiment of the method includes:
Step 01, the first safety means and the second safety means generate negotiation information and sent respectively:
Step 011, the first safety chip of the first safety means generate the first negotiation information, and pass through the first safety means The first communication interface send the first negotiation information to the first call terminal, wherein the first negotiation information include be used for generate first The parameter information of call key, the voice call that the first call key is used for the user of the first call terminal carry out encryption and decryption behaviour To make, the first safety means are connected with the first call terminal, and independently of the first call terminal;
Wherein, the first safety means can be the wearable devices such as intelligent glasses, intelligent watch, ear speaker device, or, collection Into in wearable device;Certainly, the first safety means can also be intelligent cipher key equipment USB Key, the branch for having USB interface Holding the intelligent cipher key equipment of COBBAIF, the intelligent cipher key equipment with function of Bluetooth communication etc. can be led to call terminal The intelligent cipher key equipment of letter, or, it is integrated in the intelligent cipher key equipment that can be communicated with call terminal.I.e. relative to first Call terminal, the first safety means are autonomous devices, and are not integrated on the first call terminal.
Wherein, the first communication interface can be wireless connection interface or wired connection interface.If the first communication Interface is wireless connection interface, then is built-in with wireless communication module in the first safety means, can be Wi-Fi module, Wi-Fi Direct modules, NFC module, bluetooth module or infrared module, such as the first safety means are bluetooth earphone;If first is logical Letter interface is wired connection interface, then the first safety means can have data line, and the interface of data line can be sound Frequency interface or USB interface, such as the first safety means are line control earphone.Certainly, the first safety means can also have nothing simultaneously Line connects and two kinds of functions of wired connection, i.e. the first safety means are built-in with wireless communication module, and is externally connected to data biography Defeated line.
If being built-in with wireless communication module in the first safety means, the first safety means can by wireless connection with First call terminal is connected;If the first communication interface is wired connection interface, the first safety means can pass through wired company Connect and be connected with the first call terminal.
Wherein, the first call terminal is the terminal with voice call ability, can be traditional verbal system, such as fixed Phone and cell phone or the terminal with function of network phone, such as PC, notebook computer and tablet personal computer.
Wherein, the first negotiation information is generated by the first safety chip in the first safety means, and in the prior art Carry out key agreement in itself by the first call terminal comparing, completed using independently of the first safety means of the first call terminal Consult, reduce key agreement operation by the possibility of malware attacks in the first call terminal, and by the first safety means The first safety chip it is more safe and reliable to generate the first negotiation information.
Wherein, the first safety chip is sent to the first call after the first negotiation information is generated by the first communication interface Terminal, the first call terminal are sent to the second call terminal by communication network.
Step 012, the second safety chip of the second safety means generate the second negotiation information, and pass through the second safety means The second communication interface send the second negotiation information to the second call terminal, wherein the second negotiation information includes being used to generate second The parameter information of call key, the voice call that the second call key is used for the user of the second call terminal carry out encryption and decryption behaviour To make, the second safety means are connected with the second call terminal, and independently of the second call terminal;
Wherein, the second safety chip is sent to the second call after the second negotiation information is generated by the second communication interface Terminal, the second call terminal are sent to the first call terminal by communication network.
Wherein, the second safety means can be the wearable devices such as intelligent glasses, intelligent watch, ear speaker device, or, collection Into in wearable device;Certainly, the second safety means can also be intelligent cipher key equipment USB Key, the branch for having USB interface Holding the intelligent cipher key equipment of COBBAIF, the intelligent cipher key equipment with function of Bluetooth communication etc. can be led to call terminal The intelligent cipher key equipment of letter, or, it is integrated in the intelligent cipher key equipment that can be communicated with call terminal.I.e. relative to second Call terminal, the second safety means are autonomous devices, and are not integrated on the second call terminal.
Wherein, the second communication interface can be wireless connection interface or wired connection interface.If the second communication Interface is wireless connection interface, then is built-in with wireless communication module in the second safety means, can be Wi-Fi module, Wi-Fi Direct modules, NFC module, bluetooth module or infrared module, such as the second safety means are bluetooth earphone;If second is logical Letter interface is wired connection interface, then the second safety means can have data line, and the interface of data line can be sound Frequency interface or USB interface, such as the second safety means are line control earphone.Certainly, the second safety means can also have nothing simultaneously Line connects and two kinds of functions of wired connection, i.e. the second safety means are built-in with wireless communication module, and is externally connected to data biography Defeated line.
If being built-in with wireless communication module in the second safety means, the second safety means can by wireless connection with Second call terminal is connected;If the second communication interface is wired connection interface, the second safety means can pass through wired company Connect and be connected with the second call terminal.
Wherein, the second call terminal is the terminal with voice call ability, can be traditional verbal system, such as fixed Phone and cell phone or the terminal with function of network phone, such as PC, notebook computer and tablet personal computer.
Wherein, the second negotiation information is generated by the second safety chip in the second safety means, and in the prior art Carry out key agreement in itself by the second call terminal comparing, completed using independently of the second safety means of the second call terminal Consult, reduce key agreement operation by the possibility of malware attacks in the second call terminal, and by the second safety means The second safety chip it is more safe and reliable to generate the second negotiation information.
There is no obvious sequencing between step 011 and step 012, can perform simultaneously, can also be first according to order After perform.
Step 02:First safety chip and the second safety chip receive negotiation information and generate call key:
Step 021, the first safety chip receive the second of the transmission of the first call terminal by the first communication interface to be consulted to believe Breath, and the first negotiation information and the second negotiation information are calculated, obtain the first call key;
Wherein, the second negotiation information is to consult letter in receive the transmission of the second call terminal second by the first call terminal After breath, the first safety chip is sent to by the first communication interface.
Step 022, the second safety chip receive the first of the transmission of the second call terminal by the second communication interface to be consulted to believe Breath, and the first negotiation information and the second negotiation information are calculated, obtain the second call key;
Wherein, the first negotiation information is to consult letter in receive the transmission of the first call terminal first by the second call terminal After breath, the second safety chip is sent to by the second communication interface.
Wherein, sent in step 011 first negotiation information operation and step 021 in receive the operation of the second negotiation information Do not have obvious precedence relationship on execution sequence, can perform simultaneously, can also successively be performed according to order.Similarly, walk Sent in rapid 012 second negotiation information operation and step 022 in receive the operation of the first negotiation information on execution sequence simultaneously There is no obvious precedence relationship, can perform simultaneously, can also successively be performed according to order.
Wherein, the parameter information particular content in the first negotiation information and the second negotiation information is referred in the prior art Cipher key agreement algorithm set, for example, cipher key agreement algorithm ZRTP.
Wherein, the calculating of the first call key and the second call key can be found in cipher key agreement algorithm of the prior art Calculation obtains, for example, ZRTP.Wherein, the first call key can be stored in the first safety chip, to ensure first The storage safety of call key;Similarly, the second call key can be stored in the second safety chip, to ensure that the second call is close The storage safety of key.
It is not present in the first call terminal and the second call terminal on the premise of the third party monitors, the first call key and the Two call keys are identical.On the contrary, when the first call terminal and the second call terminal have third party's monitoring, the first call terminal User used in the second call key used in the user of the first call key and the second call terminal it is different.Why First call key and the second call key are different, and reason is:First call key is the first call terminal and the third party Call terminal consults what is obtained, and the second call key is that the call terminal of the second call terminal and the third party are consulted to obtain, and It is not that the first call terminal and the second call terminal are directly consulted to obtain.
There is no obvious sequencing between step 021 and step 022, can perform simultaneously, can also be first according to order After perform.
Step 03:First safety means and the second safety means export authorization code and sent:
Step 031, the first safety means export the first authorization code, wherein the first authorization code is the first safety chip according to the One call key generation, and prompt to read aloud the first authorization code;First safety chip obtains the use of the first call terminal Result is read aloud in family to the first authorization code, obtains the first acoustic information;First safety chip is using the first call key to first Acoustic information is encrypted, and obtains the first encryption data, and send the first encryption data by the first communication interface;
Wherein, after the first encryption data is sent by the first communication interface, the first call terminal leads to the first safety chip Cross the first communication interface and receive the first encryption data, and the second call terminal is sent to by communication network.
Step 032, the second safety means export the second authorization code, wherein the second authorization code is the second safety chip according to the Two call key generations;And prompt to read aloud the second authorization code;Second safety chip obtains the use of the second call terminal Result is read aloud in family to the second authorization code, obtains second sound information;Second safety chip is using the second call key to second Acoustic information is encrypted, and obtains the second encryption data, and send the second encryption data by the second communication interface.
Wherein, after the second encryption data is sent by the second communication interface, the second call terminal leads to the second safety chip Cross the second communication interface and receive the second encryption data, and the first call terminal is sent to by communication network.
Herein, illustrated by taking the realization of step 031 as an example:
For the first call key, the first safety chip in the first safety means is obtaining the first call key Afterwards, the first call key can be used to can guarantee that the safety of voice call between the first safety means and the second safety means, phase When on the basis of voice call in the prior art, voice encryption is established between the first safety means and the second safety means Passage.
Wherein, voice encryption passage provided by the invention is built upon between the first safety means and the second safety means Passage, i.e., for the first safety means, voice encryption passage have passed through the first safety means, the first verbal system, successively Two verbal systems and the second safety means.It can thus be seen that the present invention voice encryption passage be built upon safety means it Between, therefore, in the first call terminal and the second call terminal during the entire process of call is established to end of conversation, first is logical Telephone terminal and the second call terminal play a part of transparent data, reduce the possibility of malware attacks on call terminal, carry The high safety of data transfer.
Wherein, the first safety means export the first authorization code, including:A, the first authorization code is converted into by the first safety means Acoustic information, the acoustic information of the first authorization code is obtained, and play the acoustic information of the first authorization code;Or B, the first safety Equipment shows the first authorization code.
Specifically, the way of output of the first authorization code can be played back by the broadcast unit of the first safety means, For example, loudspeaker or loudspeaker, can also be shown by the display unit of the first safety means.Specifically:
The data signal of first authorization code is sent to the voice of the first safety means by first way, the first safety chip The data signal of first authorization code is converted into acoustic information by converting unit, voice converting unit, obtains the sound of the first authorization code Message is ceased, and the acoustic information of the first authorization code is sent to the broadcast unit of the first safety means, and broadcast unit plays first The acoustic information of authorization code.
In the first way, the information of the first authorization code is changed, obtains the acoustic information of the first authorization code, led to The acoustic information for playing the first authorization code is crossed, reaches the purpose of the first authorization code of output.
The data signal of first authorization code is sent to the display of the first safety means by the second way, the first safety chip Unit, display unit show the first authorization code.
In the second way, by showing the first authorization code, reach the purpose of the first authorization code of output.
Wherein, for the information prompting to read aloud the information of the first authorization code can together with the first authorization code it is defeated Go out, for example, output " authorization code XXX " please be read aloud, wherein, XXX represents the content of the first authorization code.Wherein the way of output can adopt With broadcast mode or display mode.
Certainly, the information for prompting to read aloud the information of the first authorization code be able to can also divide with the first authorization code Output is opened, for example, the information of " authorization code please be read aloud " is first exported, then export " authorization code XXX " information, or, first export " authorization code XXX " information, then export the information of " authorization code please be read aloud ".The way of output of wherein above-mentioned two information can be with Exported using broadcast mode or display mode, wherein the way of output of above-mentioned two information can be with identical, can also be different.
Wherein, the first authorization code and the information for prompting to read aloud the information of the first authorization code can also be by the One call terminal exports, for example, exported by display mode, or, exported by broadcast mode.
Compare and the first authorization code is exported on the first call terminal and for prompting the information to the first authorization code to carry out The mode for the information read aloud, the first authorization code is exported and for prompting to enter the information of the first authorization code by the first safety means The mode for the information that row is read aloud, it is possible to reduce the possibility of malware attacks on the first call terminal, improve data transfer Safety.
Wherein, when prompting is read aloud the first authorization code, because the content read aloud is the first authorization code, not first Key converse in itself, reduces the possibility that criminal steals the first call key when user reads aloud;In addition, the first authorization code It is to be generated according to the first call key, and the key that can be conversed with unique mark first, therefore communicating pair is authorized by comparing Whether the content of code is consistent, to determine whether call key is consistent used in communicating pair;Due to the position of the first call key Number is longer, by the first call key handling into the first authorization code so that length of the length of the first authorization code compared with the first call key The content short, reduction user reads aloud is spent, it is user-friendly.
Wherein, the first safety chip obtains the user of the first call terminal and reads aloud result to the first authorization code, obtains the One acoustic information, the following two kinds mode can be used:
Mode A, the first safety chip receive the first call terminal of the first call terminal collection by the first communication interface User result is read aloud to the first authorization code, obtain the first acoustic information.
In mode A, the collection to reading aloud result is realized using the existing Mike of the first call terminal, it is convenient to realize, nothing Need to be that the acquisition to reading aloud result can be achieved to the hardware modifications of the first safety means, reduce the hardware of the first safety means into This.
Mode B, the first safety chip obtain the first call terminal of the voice collecting unit collection of the first safety means User reads aloud result to the first authorization code, obtains the first acoustic information.
In mode B, voice collecting unit can be Mike.The first authorization code when reading aloud result, is used in collection Voice collecting unit on first safety means is acquired, it is possible to reduce malware attacks can on the first call terminal Energy, ensure the security of data acquisition.For example, when the first safety means are bluetooth earphone, bluetooth earphone can be directly utilized Mike is acquired to reading aloud result.
Wherein, the sound for reading aloud user the first authorization code is acquired, and is obtained the first acoustic information, is actually gathered Obtain two parts information, one be the output of the first safety means the first authorization code content, another is to read aloud first to award The sound characteristic of the user of weighted code.
Sound characteristic wherein in first acoustic information is that the user of the first call terminal directly reads aloud first mandate The user sound characteristic of itself during code, the content sources for identifying the first authorization code in first acoustic information are conversed in first The user of terminal;It is not the sound spy that the sounding effect for the user for simulating first call terminal by speech simulation software obtains Sign.
Because the sound characteristic obtained when the sound characteristic that speech simulation software simulates directly is read aloud with user is different, because , when playing above-mentioned two sound characteristic, listener can be according to tone color, tone and the tone entrained by two sound characteristics for this Deng customized information etc., the sound for the user for being real first call terminal is recognised that, is authorized so as to identify to carry Whether the acoustic information of code comes from the first call terminal.
Wherein, the first safety means are as follows by the implementation of the first acoustic information system into the first encryption data:
The voice that first acoustic information is sent to the first safety means by the voice collecting unit of the first safety means is changed First acoustic information system into data signal, is obtained data to be verified, and data to be verified are sent out by unit, voice converting unit Give the first safety chip, data to be verified are encrypted using the first call key for the first safety chip, obtain the One encryption data, and the first encryption data is sent by the first communication interface.
Wherein, the effect of voice converting unit converts analog signals into data signal so that the first acoustic information can Carry out data transmission in voice encryption passage.Wherein, voice collecting unit and voice converting unit can in the first safety means To integrate or different physical locations.
Certainly, if the communication network between the first call terminal and the second call terminal supports the direct biography of analog signal It is defeated, then by the first acoustic information system into the first encryption data during without perform convert analog signals into digital letter Number operation.
In addition, the implementation for each step that the second safety means perform and the first safety in step 031 in step 032 The implementation for each step that equipment performs is similar, will not be repeated here.
On the premise of third party's monitoring is not present in the first call terminal and the second call terminal, the first authorization code and second Authorization code is identical.On the contrary, when the first call terminal and the second call terminal have third party's monitoring, the use of the first call terminal The second call key is different used in the user of first call key and the second call terminal used in family, therefore, according to First authorization code of the first call key generation and the second authorization code generated according to the second call key are also different.User passes through Compare the content of the first authorization code and the content of the second authorization code, it can be determined that go out and monitored with the presence or absence of the third party.
There is no obvious sequencing between step 031 and step 032, can perform simultaneously, can also be first according to order After perform.
Step 04, the first safety means and the second safety means prompt to confirm the result of reading aloud of authorization code:
Step 041, the first safety chip are logical using first after the second encryption data is received by the first communication interface Second encryption data is decrypted words key, obtains the second ciphertext data;First safety means play the second ciphertext data, and Prompt to confirm the second ciphertext data played out;
Wherein, the first safety means prompting confirms to the second ciphertext data played out, including:
Whether the prompting of the first safety means is unanimously carried out to the authorization code in second ciphertext data and the first authorization code Confirm, and read aloud in the second ciphertext data the sound characteristic of authorization code and the user of the second call terminal sound characteristic whether Unanimously confirmed.
Wherein, the second encryption data is that the first call terminal is receiving the second encryption data of the second call terminal transmission Afterwards, the first safety chip is sent to by the first communication interface.
First safety chip, which gets the second encryption data, following two ways, including:In the use of the first call terminal What the user of family and the second call terminal received before carrying out voice call;Or the user and second in the first call terminal The user of call terminal carries out what is received during voice call.
There is two ways because the first safety chip gets the second encryption data, therefore, the first safety means are being prompted Whether the authorization code in the second ciphertext data and the first authorization code are unanimously confirmed, and reads aloud and awards in the second ciphertext data Whether the implementation unanimously confirmed is included such as the sound characteristic of the user of the sound characteristic of weighted code and the second call terminal Lower three kinds:
The first, receives before the user of the first call terminal carries out voice call with the user of the second call terminal After second encryption data, the first safety means carry out voice with the user of the second call terminal in the user of the first call terminal and led to Whether prompting unanimously confirms to the authorization code in the second ciphertext data and the first authorization code before words, and the second decryption number Read aloud whether the sound characteristic of authorization code is unanimously confirmed with the sound characteristic of the user of the second call terminal in;
Second, received before the user of the first call terminal carries out voice call with the user of the second call terminal After second encryption data, the first safety means carry out voice with the user of the second call terminal in the user of the first call terminal and led to Whether prompting unanimously confirms to the authorization code in the second ciphertext data and the first authorization code during words, and the second solution Read aloud whether the sound characteristic of authorization code is unanimously confirmed with the sound characteristic of the user of the second call terminal in ciphertext data;
The third, receives during the user of the first call terminal carries out voice call with the user of the second call terminal To after the second encryption data, the first safety means carry out voice in the user of the first call terminal and the user of the second call terminal Whether prompting unanimously confirms to the authorization code in the second ciphertext data and the first authorization code during call, and second Read aloud whether the sound characteristic of authorization code is unanimously confirmed with the sound characteristic of the user of the second call terminal in ciphertext data.
Step 042, the second safety chip are logical using second after the first encryption data is received by the second communication interface First encryption data is decrypted words key, obtains the first ciphertext data;Second safety means play the first ciphertext data;The Two safety chips export the second authorization code and play the first ciphertext data after, the second safety means prompting to play out first Ciphertext data is confirmed;
The prompting of second safety means confirms to the first ciphertext data for playing out, including:
Second safety means prompting whether the authorization code in the first ciphertext data and the second authorization code are unanimously confirmed, And first read aloud in ciphertext data authorization code sound characteristic it is whether consistent with the sound characteristic of the user of the first call terminal Confirmed.
Wherein, the first encryption data is that the second call terminal is receiving the first encryption data of the first call terminal transmission Afterwards, the second safety chip is sent to by the second communication interface.
Second safety chip, which gets the first encryption data, following two ways, including:Second encryption data can be What the user of the first call terminal and the user of the second call terminal received before carrying out voice call;Or in the first call What the user of terminal and the user of the second call terminal received during carrying out voice call.
There is two ways because the second safety chip gets the first encryption data, therefore, the prompting pair of the second safety means Whether the authorization code in the first ciphertext data is unanimously confirmed with the second authorization code, and bright read authority in the first ciphertext data The implementation whether sound characteristic of code and the sound characteristic of the user of the first call terminal are unanimously confirmed has following three Kind:
The first, receives before the user of the first call terminal carries out voice call with the user of the second call terminal After first encryption data, the second safety means carry out voice with the user of the second call terminal in the user of the first call terminal and led to Whether prompting unanimously confirms to the authorization code in the first ciphertext data and the second authorization code before words, and the first decryption number Read aloud whether the sound characteristic of authorization code is unanimously confirmed with the sound characteristic of the user of the first call terminal in;
Second, received before the user of the first call terminal carries out voice call with the user of the second call terminal After first encryption data, the second safety means carry out voice with the user of the second call terminal in the user of the first call terminal and led to Whether prompting unanimously confirms to the authorization code in the first ciphertext data and the second authorization code during words, and the first solution Read aloud whether the sound characteristic of authorization code is unanimously confirmed with the sound characteristic of the user of the first call terminal in ciphertext data;
The third, connects during the user of the first call terminal carries out voice call with the user of the second call terminal After receiving the first encryption data, the second safety means carry out language in the user of the first call terminal and the user of the second call terminal Prompt whether unanimously to confirm the authorization code in the first ciphertext data and the second authorization code during sound call, Yi Ji Whether the sound characteristic that the sound characteristic of authorization code and the user of the first call terminal are read aloud in one ciphertext data is unanimously carried out really Recognize.
Herein, illustrated by taking the realization of step 041 as an example:
The second encryption data can be decrypted using the first call key for first safety chip, obtain the second decryption number According to be due between the first call terminal and the second call terminal be not present the third party monitor when, first call key and second Key of conversing is identical, therefore can be using the first call key to being carried out by the encrypted result after the second call key encryption Successful decryption.
But although can be using the first call key to carrying out success by the encrypted result after the second call key encryption Decryption, but can not judge to monitor with the presence or absence of the third party between the first call terminal and the second call terminal accordingly, reason is Since when third party's monitoring be present in the first call terminal and the second call terminal, the call terminal of the first call terminal and the third party The call terminal of the first call key that negotiation obtains, the second call terminal and the third party consult the second obtained call key, First call key and the second call key are different.The data that first call terminal is sent can be utilized the first call by the third party After secret key decryption, reuse the second call key and be encrypted, and be sent to the second call terminal, now the second call terminal is still It can so use the second call key that the encryption data received is successfully decrypted, but now, in the first call eventually End and the second call terminal exist the third party monitoring, therefore can not according to the encryption data to receiving whether successful decryption To judge whether that the third party monitors.
To solve above-mentioned technological deficiency, the concept of authorization code is hereafter drawn, and by reading aloud authorization code, and obtain After reading aloud result, and send and read aloud the mode of result to judge whether that the third party monitors, specific implementation details see below Associated description in step 05.
Wherein, the first safety means by the second encryption data be processed into the second ciphertext data and play implementation such as Under:
If the second encryption data is data signal, the first safety chip is using the first call key to the second encryption number According to being decrypted, the second ciphertext data is obtained;First safety chip sends voice of second ciphertext data to the first safety means Second ciphertext data is converted into acoustic information by converting unit, voice converting unit, obtains the transformation result of the second ciphertext data, And the transformation result of the second ciphertext data is sent to the broadcast unit of the first safety means, broadcast unit plays the second decryption number According to transformation result;
If the second encryption data is analog signal, the first safety chip is using the first call key to the second encryption number According to being decrypted, the second ciphertext data is obtained, the second ciphertext data is sent to the broadcast unit of the first safety means, is played single Member plays the second ciphertext data.
Wherein, played in step 041 second ciphertext data operation and step 031 in export the first authorization code operation it Between there is no obvious sequencing, can perform simultaneously, can also according to order successively perform.
Wherein, the second ciphertext data can also be played by the broadcast unit of the first call terminal, for example, loudspeaker and loudspeaker .
Compare and the mode of the second ciphertext data is played on the first call terminal, second is played by the first safety means The mode of ciphertext data, it is possible to reduce the possibility of malware attacks on call terminal, improve the safety of data transfer.
Wherein, the first safety means display reminding information or play cuing information, to prompt in the second ciphertext data Authorization code whether unanimously confirmed with the first authorization code, and read aloud in the second ciphertext data the sound characteristic of authorization code with Whether the sound characteristic of the user of the second call terminal is unanimously confirmed.For example, the display of the first safety means shows and carried Show information, the broadcast unit play cuing information of the first safety means.Certainly, can also be by the first call terminal display reminding information Or play cuing information.
The mode for display or the play cuing information of comparing on the first call terminal, shown by the first safety means or The mode of play cuing information, it is possible to reduce the possibility of malware attacks on call terminal, improve the safety of data transfer.
In the present embodiment, the second ciphertext data is exported to user by the way of playing, is because the second decryption Include two parts information in data, a part is the tool of the authorization code for the second safety means generation for representing the second call terminal Hold in vivo, another part is the sound characteristic for the user for representing the second call terminal, by playing the second ciphertext data, can be made The user for obtaining the first call terminal is directly obtained above-mentioned two parts information, and then so that the side of user one of the first call terminal Face can be by judging whether authorization code in the second ciphertext data and the first authorization code are unanimously confirmed in the second ciphertext data The authenticity of the content of carrying, on the other hand can be by judging to read aloud the sound characteristic and of authorization code in the second ciphertext data Whether the sound characteristic of the user of two call terminals unanimously confirms the legitimacy in the source of the second ciphertext data, that is, can be with Judge to whether there is the third party.
And if the mode of the above-mentioned ciphertext data of broadcasting second to be substituted for the mode of the second ciphertext data of display, the , only can be by judging the authorization code in the second ciphertext data and after the user of one call terminal receives the second ciphertext data Whether one authorization code unanimously confirms the authenticity of content carried in the second ciphertext data, and can not confirm the second ciphertext data Source legitimacy, that is, can not judge to whether there is the third party.
Due to being not present in the first call terminal and the second call terminal on the premise of the third party monitors, the first authorization code and Second authorization code is identical, and the first authorization code can be marked uniquely with the call key of unique mark first, the second authorization code Show the second call key, thus, when the user of the first call terminal judges the first authorization code and the second authorization code is identical, i.e., It can learn that the first call key and the second call key are identicals.
In addition, the implementation for each step that the second safety means perform and the first safety in step 041 in step 042 The implementation for each step that equipment performs is similar, will not be repeated here.
Wherein, there is no obvious sequencing between step 041 and step 042, can perform simultaneously, can also be according to secondary Sequence successively performs.
Step 05:First safety chip and the second safety chip prompt to authorized in the encryption data that receives digital content and Sound characteristic is confirmed:
Step 051:Voice call of first safety chip to the user of the first call terminal carry out encryption and decryption operation just like Lower two ways:
A:Whether the authorization code in second ciphertext data and first authorization code are unanimously confirmed in prompting, And the sound characteristic of authorization code and the sound characteristic of the user of second call terminal are read aloud in second ciphertext data Whether after unanimously being confirmed, if first safety chip receives the first confirmation instruction, first safety chip opens It is dynamic to carry out encryption and decryption operation using voice call of the described first call key to the user of first call terminal, wherein, First confirm instruction for confirm the second ciphertext data in authorization code it is consistent with the first authorization code, and in the second ciphertext data it is bright The instruction consistent with the sound characteristic of the user of the second call terminal of the sound characteristic of read authority code;
Wherein, encryption and decryption operation is carried out using voice call of the first call key to the user of the first call terminal, can With the user in the user of the first call terminal and the second call terminal when voice call starts start, can also be first The user of call terminal and the user of the second call terminal start during carrying out voice call.
B:Added starting using voice call of the described first call key to the user of first call terminal After decryption oprerations, if first safety chip receives the first confirmation instruction, first safety chip utilizes described the Voice call of the one call key to the user of first call terminal continues encryption and decryption operation, wherein, first confirms Instruct to confirm that the authorization code in the second ciphertext data is consistent with the first authorization code, and authorization code is read aloud in the second ciphertext data The sound characteristic instruction consistent with the sound characteristic of the user of the second call terminal;
Wherein Fig. 1 only shows the mode A of step 051 realization, and mode B realization is similar to realizing for mode A, distinguishes In first confirms that the receiving time of instruction is different, is that the first safety chip is carried out plus solved to voice call starting in mode A Received before close operation, be that the first safety chip carries out being followed by for encryption and decryption operation in startup to voice call in mode B Receive.Wherein, the first confirmation instruction can obtain in the following way:
The first, the first safety means receive the first confirmation instruction of user's input of the first call terminal, wherein first It is that authorization code of the user of the first call terminal in the second ciphertext data is confirmed is consistent with the first authorization code to confirm instruction, and The sound characteristic that authorization code is read aloud in second ciphertext data with the sound characteristic of the user of the second call terminal consistent inputs afterwards Instruction.
Wherein, the user of the first call terminal can on the first call terminal input instruction, can also first safety Input instruction in equipment.The user of first call terminal input instruction on the first safety means, reduces the first call terminal The attack of upper Malware, it ensure that voice call safety.
Second, after receive the transmission of the second call terminal second confirms instruction, confirm to instruct according to second, obtain First confirms instruction;
Wherein second confirms that instruction is awarded for the user of the second call terminal in the authorization code for confirming to receive with locally generated Weighted code is consistent, and read aloud authorization code sound characteristic it is consistent with the sound characteristic of the user of the first call terminal after, input Instruction.
In the user of the call terminal of users to trust second of the first call terminal, if the user of the second call terminal is true It is consistent with authorization code caused by the second safety means to recognize the authorization code received from the first call terminal, and reads aloud the sound of authorization code Sound feature is consistent with the sound characteristic of the user of the first call terminal, then user's can of the first call terminal knows second Authorization code in ciphertext data is consistent with the first authorization code, and the sound characteristic and of authorization code is read aloud in the second ciphertext data The sound characteristic of the user of two call terminals is consistent, that is, having obtained the first confirmation instruction.
Step 052:Voice call of second safety chip to the user of the second call terminal carry out encryption and decryption operation just like Lower two ways:
A:Whether the authorization code in first ciphertext data and second authorization code are unanimously confirmed in prompting, And the sound characteristic of authorization code and the sound characteristic of the user of first call terminal are read aloud in first ciphertext data Whether after unanimously being confirmed, if second safety chip receives the second confirmation instruction, second safety chip opens It is dynamic to carry out encryption and decryption operation using voice call of the described second call key to the user of second call terminal, wherein, Encryption and decryption operation is carried out using voice call of the second call key to the user of the second call terminal, can be in the first call eventually The user at end and the user of the second call terminal start when voice call starts, can also be in the user of the first call terminal Start during carrying out voice call with the user of the second call terminal.
B:Added starting using voice call of the described second call key to the user of second call terminal After decryption oprerations, if second safety chip receives the second confirmation instruction, second safety chip utilizes described the Voice call of the two call keys to the user of second call terminal continues encryption and decryption operation, wherein, second confirms Instruct to confirm that the authorization code in the first ciphertext data is consistent with the second authorization code, and authorization code is read aloud in the first ciphertext data The sound characteristic instruction consistent with the sound characteristic of the user of the first call terminal.
Wherein Fig. 1 only shows the mode A of step 052 realization, and mode B realization is similar to realizing for mode A, distinguishes In second confirms that the receiving time of instruction is different, is that second safety chip is starting to voice call progress in mode A Encryption and decryption operation receives before, is that second safety chip is starting to voice call progress encryption and decryption behaviour in mode B Make what is received afterwards.
Wherein, the second confirmation instruction can obtain in the following way:
The first, the second safety means receive the second confirmation instruction of user's input of the second call terminal, wherein second It is that authorization code of the user of the second call terminal in the first ciphertext data is confirmed is consistent with the second authorization code to confirm instruction, and The sound characteristic that authorization code is read aloud in first ciphertext data with the sound characteristic of the user of the first call terminal consistent inputs afterwards Instruction.
Wherein, the user of the second call terminal can on the second call terminal input instruction, can also second safety Input instruction in equipment.The user of second call terminal input instruction on the second safety means, reduces the second call terminal The attack of upper Malware, it ensure that voice call safety.
Second, after receive the transmission of the first call terminal first confirms instruction, confirm to instruct according to first, obtain Second confirms instruction;
Wherein first confirms that instruction is awarded for the user of the first call terminal in the authorization code for confirming to receive with locally generated Weighted code is consistent, and read aloud authorization code sound characteristic it is consistent with the sound characteristic of the user of the second call terminal after, input Instruction.
In the user of the call terminal of users to trust first of the second call terminal, if the user of the first call terminal is true It is consistent with authorization code caused by the first safety means to recognize the authorization code received from the second call terminal, and reads aloud the sound of authorization code Sound feature is consistent with the sound characteristic of the user of the second call terminal, then user's can of the second call terminal knows first Authorization code in ciphertext data is consistent with the second authorization code, and the sound characteristic and of authorization code is read aloud in the first ciphertext data The sound characteristic of the user of one call terminal is consistent, that is, having obtained the second confirmation instruction.
Herein, illustrated by taking the realization of step 051 as an example:
With difference is encrypted using the first call key by the first call terminal in the prior art, performs and add in the present invention The main body of close operation is the first safety chip.Voice call is encrypted by the first safety chip, it is possible to reduce the first call The possibility of malware attacks in terminal, improve the safety of data transfer.
And first safety chip obtained voice messaging is encrypted using the first call key caused by itself, carry High call safety.Specifically:
(1) executive agent of voice encryption is the first safety chip, because the first safety chip is in the first safety means Portion, the first safety means reduce during voice encryption by malice on the first call terminal independently of the first call terminal The possibility of software attacks;In addition, the processor for the earphone in the prior art of comparing, language is carried out in the first safety means in the present invention The executive agent of sound encryption is the first safety chip, because the computing that voice is encrypted and decrypted is in the first safety chip Portion completes, and simply exports encrypted result and decrypted result, avoids the chance that data are cracked, therefore, more in the prior art Processor, the voice encryption intensity of the first safety chip is higher.
(2) the first call key is caused by the first safety chip used in voice encryption, and the first safety chip will First call key is stored in inside the first safety chip, is reduced the possibility of the first call key from stealing, be ensure that voice The security of encryption;In addition, in voice encryption, encrypted inside the first safety chip using the first call key so that First call key is called in a security context, ensures the safe handling of the first call key.
(3) encrypted object is the voice collecting unit collection of the first safety means.The present invention utilizes the first safety means Voice collecting is carried out, the first safety means reduce during voice collecting by the first call eventually independently of the first call terminal The possibility of malware attacks on end.
As seen from the above, in voice encryption, whole cryptographic operation is all completed by the first safety means, without Interacted with the equipment of outside, ensure that the security of cryptographic operation.
Certainly, the voice of the first safety means encryption can also be adopted by the voice collecting unit of the first call terminal Collection, and the voice collected is obtained by the first communication interface.The voice collecting unit of wherein the first call terminal can be Microphone.
In addition, the implementation for each step that the second safety means perform and the first safety in step 051 in step 052 The implementation for each step that equipment performs is similar, will not be repeated here.
Wherein, there is no obvious sequencing between step 051 and step 052, can perform simultaneously, can also be according to secondary Sequence successively performs.
Due to there is no obvious sequencing between step 051 and step 052, therefore in actual applications, may go out Now following different application scenarios:
C1:Authorization code of first safety means in the second ciphertext data is confirmed is consistent with the first authorization code, and second Read aloud in ciphertext data authorization code sound characteristic it is consistent with the sound characteristic of the user of the second call terminal when, it is true to obtain first Recognize instruction, confirm that the voice call that instruction starts to the user of the first call terminal carries out encryption and decryption operation according to first;And Authorization code of second safety means in the first ciphertext data is confirmed is consistent with the second authorization code, and in the first ciphertext data it is bright When the sound characteristic of read authority code is consistent with the sound characteristic of the user of the first call terminal, the second confirmation instruction is obtained, according to Second confirms that the voice call that instruction starts to the user of the second call terminal carries out encryption and decryption operation;
C2:Authorization code of second safety means in the first ciphertext data is confirmed is consistent with the second authorization code, and first Read aloud in ciphertext data authorization code sound characteristic it is consistent with the sound characteristic of the user of the first call terminal when, it is true to obtain second Recognize instruction, confirm that the voice call that instruction starts to the user of the second call terminal carries out encryption and decryption operation according to second, concurrently The second confirmation is sent to instruct to the first safety means;First safety means are after the second confirmation instruction is received, according to second Confirm that instruction obtains the first confirmation instruction, confirm that the voice call that instruction starts to the user of the first call terminal is entered according to first Row encryption and decryption operates;
C3:First safety means start and the voice of the user of the first call terminal are led to after the first call key is obtained Words carry out encryption and decryption operation;After starting the voice call to the user of the first call terminal and carrying out encryption and decryption operation, prompt simultaneously Confirm that the authorization code in the second ciphertext data is consistent with the first authorization code, and the sound of authorization code is read aloud in the second ciphertext data When feature is consistent with the sound characteristic of the user of the second call terminal, the first confirmation instruction is obtained, confirms instruction pair according to first The voice call of the user of first call terminal continues encryption and decryption operation;And second safety means confirm first solution Authorization code in ciphertext data is consistent with the second authorization code, and the sound characteristic and first of authorization code is read aloud in the first ciphertext data When the sound characteristic of the user of call terminal is consistent, the second confirmation instruction is obtained, it is logical to second to confirm that instruction starts according to second The voice call of the user of telephone terminal carries out encryption and decryption operation;
C4:Authorization code of second safety means in the first ciphertext data is confirmed is consistent with the second authorization code, and first Read aloud in ciphertext data authorization code sound characteristic it is consistent with the sound characteristic of the user of the first call terminal when, it is true to obtain second Recognize instruction, confirm that the voice call that instruction starts to the user of the second call terminal carries out encryption and decryption operation according to second, concurrently The second confirmation is sent to instruct to the first safety means;First safety means start and conversed first after the first call key is obtained The voice call of the user of terminal carries out encryption and decryption operation;Add starting the voice call to the user of the first call terminal After decryption oprerations, it is true that first safety means obtain first after the second confirmation instruction is received, according to the second confirmation instruction Recognize instruction, confirm that voice call of the instruction to the user of the first call terminal continues encryption and decryption operation according to first;
C5:Authorization code of first safety means in the second ciphertext data is confirmed is consistent with the first authorization code, and second Read aloud in ciphertext data authorization code sound characteristic it is consistent with the sound characteristic of the user of the second call terminal when, it is true to obtain first Recognize instruction, confirm that the voice call that instruction starts to the user of the first call terminal carries out encryption and decryption operation according to first;And Second safety means start the voice call to the user of the second call terminal and carry out encryption and decryption after the second call key is obtained Operation;After starting the voice call to the user of the second call terminal and carrying out encryption and decryption operation, the first ciphertext data is being confirmed In authorization code it is consistent with the second authorization code, and read aloud in the first ciphertext data authorization code sound characteristic and first call eventually When the sound characteristic of the user at end is consistent, the second confirmation instruction is obtained, confirms use of the instruction to the second call terminal according to second The voice call at family continues encryption and decryption operation;
C6:Second safety means after starting the voice call to the user of the second call terminal and carrying out encryption and decryption operation, Authorization code in the first ciphertext data is confirmed is consistent with the second authorization code, and the sound of authorization code is read aloud in the first ciphertext data When sound feature is consistent with the sound characteristic of the user of the first call terminal, the second confirmation instruction is obtained, confirms to instruct according to second Voice call to the user of the second call terminal continues encryption and decryption operation, and sends second and confirm instruction to the first safety Equipment;First safety means obtain the first confirmation instruction after the second confirmation instruction is received, according to the second confirmation instruction, Confirm that the voice call that instruction starts to the user of the first call terminal carries out encryption and decryption operation according to first;
C7:First safety means start and the voice of the user of the first call terminal are led to after the first call key is obtained Words carry out encryption and decryption operation;After starting the voice call to the user of the first call terminal and carrying out encryption and decryption operation, prompt simultaneously Confirm that the authorization code in the second ciphertext data is consistent with the first authorization code, and the sound of authorization code is read aloud in the second ciphertext data When feature is consistent with the sound characteristic of the user of the second call terminal, the first confirmation instruction is obtained, confirms instruction pair according to first The voice call of the user of first call terminal continues encryption and decryption operation;And second safety means start to second After the voice call of the user of call terminal carries out encryption and decryption operation, the authorization code in the first ciphertext data is confirmed is awarded with second Weighted code is consistent, and the sound characteristic of authorization code and the sound characteristic of the user of the first call terminal are read aloud in the first ciphertext data When consistent, obtain the second confirmation instruction, according to second confirm voice call of the instruction to the user of the second call terminal continue into Row encryption and decryption operates;
C8:Second safety means after starting the voice call to the user of the second call terminal and carrying out encryption and decryption operation, Authorization code in the first ciphertext data is confirmed is consistent with the second authorization code, and the sound of authorization code is read aloud in the first ciphertext data When sound feature is consistent with the sound characteristic of the user of the first call terminal, the second confirmation instruction is obtained, confirms to instruct according to second Voice call to the user of the second call terminal continues encryption and decryption operation, and sends second and confirm instruction to the first safety Equipment;First safety means start the voice call to the user of the first call terminal and carried out after the first call key is obtained Encryption and decryption operates;After starting the voice call to the user of the first call terminal and carrying out encryption and decryption operation, first safety Equipment obtains the first confirmation instruction after the second confirmation instruction is received, according to the second confirmation instruction, confirms to instruct according to first Voice call to the user of the first call terminal continues encryption and decryption operation.
The technical characteristic that above-mentioned steps 05 describe is to confirm that the content of authorization code and the sound characteristic for reading aloud authorization code are homogeneous The encryption and decryption operation of voice call is performed after cause, certainly, the present embodiment also provides the content for confirming authorization code and reads aloud authorization code Sound characteristic in it is at least one inconsistent when processing scheme, specifically include:
Illustrated by taking the realization of the first safety means as an example:
When the user of the first call terminal judges that authorization code in the second ciphertext data and the first authorization code are inconsistent, and/ Or, second read aloud in ciphertext data authorization code sound characteristic and the sound characteristic of the user of the second call terminal it is inconsistent, then The user of first call terminal can terminate this voice call on the first call terminal or the first safety means.
Similarly, the realization of the second safety means is similar to realizing for the first safety means, and here is omitted.
The above method also includes:
If the first safety chip detects that the voice call of the user of the first call terminal terminates, the first safety chip Delete the first call key;And/or
If the second safety chip detects that the voice call of the user of the second call terminal terminates, the second safety chip Delete the second call key.
In the above-mentioned methods, after end of conversation, it is logical that the first safety chip destroys used in this voice call first Words key can be reduced after the first call key is stolen by the possibility of irrational utilization, ensure that the operation of the first safety chip is pacified Entirely, equally it is effectively utilized the memory space of the first safety chip.Similarly, after end of conversation, the second safety chip destroys this The second call key can be reduced after the second call key is stolen by the possibility of irrational utilization used in secondary voice call, Ensure the safe for operation of the second safety chip, be equally effectively utilized the memory space of the second safety chip.
Illustrated below by taking a concrete application scene as an example:
User A and user B carry out normal talking, and during in the absence of being monitored by third party, user A and user B are directly led to The negotiation of key is talked about, obtains the key X that converses, the voice call between user A and user B is also directly carried out using call key X Encryption and decryption.
Carry out in communication process between user A and user B, monitored if there is third party user C, user A and user B Call key will be consulted with third party user C respectively, after the completion of negotiation, the call key that user C and user A consults to obtain is M, The call key that user C and user B consults to obtain is N.During user A is sent to user B call voice, user C is cut The call voice A that user A is sent to user B is received, obtains plaintext A after being decrypted using call key M to call voice A, then make User B is sent to after plaintext A is encrypted with call key N.Because user B can utilize the key N that converses to send user C Carry out ciphertext to be decrypted, so as to which user B can get user A voice, similarly, user A call language is sent in user B During sound, user C intercepts the call voice B that user B is sent to user A, and call voice B is decrypted using call key N After obtain plaintext B, reuse call key M plaintext B is encrypted after be sent to user A.Because user A can utilize call Key M sends ciphertext to user C and is decrypted, so as to which user A can get user B voice.Due to user A and user B can get the voice of call opposite end, therefore, voice call can be carried out between user A and user B, but actually use Family A and user B Correspondent Node user is user C, that is, user A and user B this call voice by user C Monitor.
It is corresponding, when the method provided using the present embodiment carries out voice call, if there is user C monitoring, that User A safety means utilize the call key M consulted with the user C of Correspondent Node, obtain an authorization code m, and by with Family A reads aloud authorization code m, obtains audio files m, then includes user A sound and authorization code m content in audio files m, uses After family C decrypts to audio files m, audio files m is encrypted using the key N that converses and issues user B, when user B hears sound After sound file m, hear be user A sound, the source that specify that audio files m is user A, but user B safety means It can utilize and obtain an authorization code n with the user C of the Correspondent Node call password N consulted, user B compares the audio files heard The authorization code m of the m carryings and authorization code n locally generated, it is found that authorization code m and authorization code n is differed, you can learn this call In third party's monitoring be present.
Certainly, user C is cracked to obtain audio files m, and audio files is substituted for and (given birth to including authorization code n by call key N Into authorization code) audio files, but because audio files is not to be read aloud by user A, the sound not including user A is special Sign, audio files is referred to as audio files m ', i.e. audio files m ' includes authorization code n content and from the sound for not being user A Sound feature;User B is after the audio files m ' heard, it is found that authorization code exports with the safety means of oneself in audio files m ' It is consistent, but the sound characteristic in audio files m ' is not user A sound characteristic, therefore user B just can determine that this call In third party's monitoring be present.
It can thus be seen that audio files includes the content for the sound characteristic and authorization code for reading aloud authorization code so that uses Family can judge whether there is third party's monitoring in communication process according to the two information, ensure that the safety of call.
Below to being described further based on ZRTP key agreement to obtain the mode of call key and authorization code, specifically Flow is as follows:
First, the generation of call key:
F1:First safety means send Hello message to the second safety means, and Hello message includes the first safety means Used ZRTP version number, key agreement type, key algorithm and the first call terminal user session identification ID1;Wherein the key agreement type of ZRTP agreements includes pre-share pattern, media stream pattern and Diffie-Hellman (DH) Pattern;
F2:Second safety means send the response message of Hello message to the first safety means;
F3:Second safety means send Hello message to the first safety means, and Hello message includes the second safety means Used ZRTP version number, key agreement type, key algorithm and the second call terminal user session identification ID2;Wherein the key agreement type of ZRTP agreements includes pre-share pattern, media stream pattern and Diffie-Hellman (DH) Pattern;
F4:First safety means send the response message of Hello message to the second safety means;
F5:Second safety means send both sides after the response message of Hello message is received, to the first safety means and all propped up The key agreement type and key algorithm held, exemplified by this sentences the key agreement type of selection as DH patterns;
F6, the first safety means send the first function information locally generated, wherein first function to the second safety means Information is a power function, and wherein power function can be g^x, wherein x=svr mod p, and wherein svr represents the secret of respondent Value, for mod to round algorithm, p is integer;
F7, the second safety means send the second function information locally generated, wherein second function to the first safety means Information is also a power function, and wherein power function can be g^y, wherein y=svi mod p, and wherein svi represents that promoter's is secret Close value, for mod to round algorithm, p is integer;
Wherein, g^x is the first negotiation information mentioned above, and g^y is the second negotiation information mentioned above.
And in this example, the first safety chip can obtain the first call key g^xy according to g^x and g^y;, the second peace Full chip can obtain the second call key g^xy according to g^x and g^y.
F8, the first safety means send the first verification message to the second safety means, and the first check information is to following letter Obtained after breath verification, including:It is local whether to disclose the first call key, the first call key whether is locally destroyed after call Deng;Wherein key used in verification obtains according to the first call key, specifically, the key g^xy that converses first, Session identification ID1, session identification ID2 and a string of character strings are handled, and obtain a key S0, and wherein character string is one section of public affairs Open the character string for representation function;The key derivation algorithm in ZRTP agreements is recycled to use key S0 processing In the key that verification calculates;Wherein, key derivation algorithm can be hmac algorithm;
F9, the second safety means send the second verification after having been verified to the first verification message, to the first safety means and disappeared Breath, the second verification message be to being obtained after following information checking, including:It is local whether to disclose the second call key, be local logical Whether second call key etc. is destroyed after words;Wherein key used in verification obtains according to the second call key, specifically For, the second call key g^xy, session identification ID1, session identification ID2 and a string of character strings are handled, obtain one Key S0, wherein character string are the character strings that one section of disclosure is used for representation function;The key derivation in ZRTP agreements is recycled to calculate Method is obtained for verifying the key calculated to key S0 processing;Wherein, key derivation algorithm can be hmac algorithm;
F10, the first safety means send confirmation after the completion of being verified to the second verification message, to the second safety means and disappeared Breath, has completed key agreement.
Two:The producing method of authorization code:
This sentences the first safety means and illustrated to generate exemplified by the first authorization code:
After key S0 is obtained, using key derivation algorithm to S0 processing, one section of character string M is obtained;
Preceding 32 bits are taken to obtain a string of character string m from character string M;
Coded treatment is carried out to character string m, character string m is encoded into visualization character, using visualization character as first Authorization code.
Compared with key of conversing in the prior art is the mode generated in TF card, embodiment of the method provided by the invention is led to Generation call key is crossed on the safety means independently of call terminal, is reduced during voice encryption by malice on call terminal The possibility of software attacks;And generated by the safety chip in safety means, the high security based on safety chip, reduce The possibility of call key from stealing, ensure that the security of voice encryption;In addition, in voice encryption, in safety chip Encrypted using call key in portion so that call key is called in a security context, is ensured the safety of call key and is made With.
In addition, in voice encryption communication process, the second safety means are by playing first from the first call terminal Ciphertext data, prompt to confirm the first ciphertext data played out according to the second authorization code, realize to the first call terminal Identity information confirmation so that user determine this call whether someone monitor, improve and the third party identified in voice call The success rate of monitoring, so as to reduce the monitored possibility of voice call, and determine that this voice call has the third party in user During monitoring, user can take the safety measure of anti-monitoring to prevent information leakage in time, improve data transfer in voice call Safety.
Further, the first ciphertext data from the first call terminal is played on the second safety means, reduces the The attack of Malware on two call terminals, it ensure that voice call safety.
It is the description carried out to the complete interaction flow between the first safety means and the second safety means above, divides below The other operating process each performed to the first safety means and the second safety means illustrates:
Fig. 2 is the method flow that a kind of first safety means provided by the invention realize data processing in voice call Figure.Method includes shown in Fig. 2:
Step 21, the first safety chip of the first safety means generate the first negotiation information, and pass through the first safety means The first communication interface send the first negotiation information to the first call terminal, wherein the first negotiation information include be used for generate first The parameter information of call key, the voice call that the first call key is used for the user of the first call terminal carry out encryption and decryption behaviour To make, the first safety means are connected with the first call terminal, and independently of the first call terminal;
Step 22, the first safety chip receive the second of the transmission of the first call terminal by the first communication interface to be consulted to believe Breath, wherein the second negotiation information includes being used for the parameter information for generating the first call key, and by the second of the second call terminal Safety means generate;First safety chip is calculated the first negotiation information and the second negotiation information, and it is close to obtain the first call Key;
Step 23, the first safety means export the first authorization code, and prompt to read aloud the first authorization code, wherein first Authorization code is that the first safety chip generates according to the first call key, obtains the user of the first call terminal to the first authorization code Read aloud result, obtain the first acoustic information;
The first acoustic information is encrypted using the first call key for step 24, the first safety chip, obtains the One encryption data, and the first encryption data is sent by the first communication interface;
Step 25, after the first confirmation instruction is obtained, the first safety chip starts logical to first using the first call key The voice call of the user of telephone terminal carries out encryption and decryption operation.
Fig. 3 is the method flow that another first safety means provided by the invention realize data processing in voice call Figure.Method includes shown in Fig. 3:
Step 31, the first safety chip of the first safety means generate the first negotiation information, and pass through the first safety means The first communication interface send the first negotiation information to the first call terminal, wherein the first negotiation information include be used for generate first The parameter information of call key, the voice call that the first call key is used for the user of the first call terminal carry out encryption and decryption behaviour To make, the first safety means are connected with the first call terminal, and independently of the first call terminal;
Step 32, the first safety chip receive the second of the transmission of the first call terminal by the first communication interface to be consulted to believe Breath, wherein the second negotiation information includes being used for the parameter information for generating the first call key, and by the second of the second call terminal Safety means generate;First safety chip is calculated the first negotiation information and the second negotiation information, and it is close to obtain the first call Key;
Step 33, the first safety chip, which start, utilizes voice call of the first call key to the user of the first call terminal Carry out encryption and decryption operation;
Wherein, start in the first safety chip and utilize voice call of the first call key to the user of the first call terminal After carrying out encryption and decryption operation, method also includes:
Step 34, the first safety means receive the certification triggering command to the user of the second call terminal, are receiving pair After the certification triggering command of the user of second call terminal, the first authorization code is exported, and prompts to read aloud the first authorization code, Wherein the first authorization code is the first safety chip according to the first call key generation;The user of the first call terminal is obtained to One authorization code reads aloud result, obtains the first acoustic information;
Wherein, start in the first safety chip and utilize voice call of the first call key to the user of the first call terminal After carrying out encryption and decryption operation, the first safety means receive the certification triggering command to the user of the second call terminal, with triggering Certification to the user of the second call terminal, wherein can have following two to the certification triggering command of the user of the second call terminal Kind acquisition modes, including:
The certification that first safety means receive the user to the second call terminal that button is sent on the first safety means is touched Send instructions;Or
The certification that first call terminal receives the user to the second call terminal that button is sent on the first call terminal is touched Send instructions, and the first safety means are sent to by the first communications reception, the first safety means are received to the second call terminal The certification triggering command of user.
Wherein, the user of the first call terminal can be produced logical to second by pressing the button on the first safety means The certification triggering command of the user of telephone terminal, or, conversed by pressing the button on the first call terminal with producing second The certification triggering command of the user of terminal.
Wherein, triggered by the certification for pressing the button on the first safety means to produce to the user of the second call terminal Instruction, can reduce the certification triggering command to the user of the second call terminal by malware attacks on the first call terminal May, it ensure that the safety of voice call;By pressing the button on the first call terminal to produce to the second call terminal The certification triggering command of user, without the first safety means are carried out with the change of software or hardware, realize simple.
The first acoustic information is encrypted using the first call key for step 35, the first safety chip, obtains the One encryption data, and the first encryption data is sent by the first communication interface;
Step 36, obtain the first confirmation instruction after, the first safety chip using first call key to first call eventually The voice call of the user at end continues encryption and decryption operation.
Embodiment of the method is that difference is with the difference of embodiment of the method shown in Fig. 3 wherein shown in Fig. 2, and first confirms to refer to The receiving time of order is different, and the first confirmation instruction is that the first safety chip is starting to voice in embodiment of the method shown in Fig. 2 Call carries out what encryption and decryption operation received before, and first confirms that instruction is the first safety chip in embodiment of the method shown in Fig. 3 Carry out what encryption and decryption operation received afterwards to voice call starting.
Compared with key of conversing in the prior art is the mode generated in TF card, embodiment of the method provided by the invention is led to The call key of generation first is crossed on the safety means independently of the first call terminal, reduces and is led to by first during voice encryption The possibility of malware attacks on telephone terminal;And generated by the first safety chip in the first safety means, based on The high security of one safety chip, reduce the possibility of the first call key from stealing, ensure that the security of voice encryption;Separately Outside, in voice encryption, encrypted using the first call key inside the first safety chip so that the first call key be One security context is called, and ensures the safe handling of the first call key.
In addition, the first safety means enable to the second call terminal to by the way that the first encryption data is sent One encryption data is verified, realizes the confirmation of the identity information to the first call terminal so that the user of the second call terminal Determining this call, whether someone monitors, and the success rate for identifying that the third party monitors in voice call is improved, so as to reduce voice The monitored possibility of call, and when user determines that this voice call has third party's monitoring, user can take anti-in time The safety measure of monitoring prevents information leakage, improves the safety of data transfer in voice call.
Fig. 4 is a kind of method flow diagram of second safety means processing data in voice call provided by the invention.Fig. 4 Shown method includes:
Step 41, the second safety chip of the second safety means receive the by the second communication interface of the second safety means The first negotiation information that two call terminals are sent, wherein the first negotiation information includes being used for the parameter letter for generating the second call key Breath, and generated by the first safety means of the first call terminal that voice call is carried out with the second call terminal, the second call is close The voice call that key is used for the user of the second call terminal carries out encryption and decryption operation, wherein the second safety means and the second call Terminal is connected, and independently of the second call terminal;
Step 42, the second safety chip generate the second negotiation information, and send second by the second communication interface and consult to believe Cease to the second call terminal, wherein the second negotiation information includes being used for the parameter information for generating the second call key;
Step 43, the second safety chip are calculated the first negotiation information and the second negotiation information, obtain the second call Key;
Step 44, the second safety means export the second authorization code, wherein the second authorization code is the second safety chip according to the Two call key generations;
Step 45, the second safety chip are logical using second after the first encryption data is received by the second communication interface First encryption data is decrypted words key, obtains the first ciphertext data;Second safety means play the first ciphertext data;Its In the first encryption data include the first safety means obtain authorization code is read aloud read aloud result;
Step 46, the second safety means are prompted to playing out after exporting the second authorization code and playing the first ciphertext data The first ciphertext data confirmed;
Step 47, the second safety chip start logical to second using the second call key after the second confirmation instruction is obtained The voice call of the user of telephone terminal carries out encryption and decryption operation.
Fig. 5 is the method flow diagram of another second safety means processing data in voice call provided by the invention. Method includes shown in Fig. 5:
Step 51, the second safety chip of the second safety means receive the by the second communication interface of the first safety means The first negotiation information that two call terminals are sent, wherein the first negotiation information includes being used for the parameter letter for generating the second call key Breath, and generated by the first safety means of the first call terminal that voice call is carried out with the second call terminal, the second call is close The voice call that key is used for the user of the second call terminal carries out encryption and decryption operation, wherein the second safety means and the second call Terminal is connected, and independently of the second call terminal;
Step 52, the second safety chip generate the second negotiation information, and send second by the second communication interface and consult to believe Cease to the second call terminal, wherein the second negotiation information includes being used for the parameter information for generating the second call key;
Step 53, the second safety chip are calculated the first negotiation information and the second negotiation information, obtain the second call Key;
Step 54, the second safety chip, which start, utilizes voice call of the second call key to the user of the second call terminal Carry out encryption and decryption operation;
Wherein, start in the second safety chip and utilize voice call of the second call key to the user of the second call terminal After carrying out encryption and decryption operation, method also includes:
Step 55, the second safety means receive the certification triggering command to the user of the first call terminal, are receiving pair After the certification triggering command of the user of first call terminal, the second authorization code is exported, wherein the second authorization code is the second safe core Piece generates according to the second call key;
Wherein, start in the second safety chip and utilize voice call of the second call key to the user of the second call terminal After carrying out encryption and decryption operation, the second safety means receive the certification triggering command to the user of the first call terminal, with triggering Certification to the user of the first call terminal, wherein can have following two to the certification triggering command of the user of the first call terminal Kind acquisition modes, including:
The certification that second safety means receive the user to the first call terminal that button is sent on the second safety means is touched Send instructions;Or
The certification that second call terminal receives the user to the first call terminal that button is sent on the second call terminal is touched Send instructions, and the second safety means are sent to by the second communications reception, the second safety means are received to the first call terminal The certification triggering command of user.
Wherein, the user of the second call terminal can be produced logical to first by pressing the button on the second safety means The certification triggering command of the user of telephone terminal, or, conversed by pressing the button on the second call terminal with producing first The certification triggering command of the user of terminal.
Wherein, triggered by the certification for pressing the button on the second safety means to produce to the user of the first call terminal Instruction, can reduce the certification triggering command to the user of the first call terminal by malware attacks on the second call terminal May, it ensure that the safety of voice call;By pressing the button on the second call terminal to produce to the first call terminal The certification triggering command of user, without the second safety means are carried out with the change of software or hardware, realize simple.
Step 56, the second safety chip are logical using second after the first encryption data is received by the second communication interface First encryption data is decrypted words key, obtains the first ciphertext data;Second safety means play the first ciphertext data;Its In the first encryption data include the first safety means obtain authorization code is read aloud read aloud result;
Step 57, export the second authorization code and play the first ciphertext data after, the second safety means prompt to playing out The first ciphertext data confirmed;
Step 58, the second safety chip are whole to the second call using the second call key after the second confirmation instruction is obtained The voice call of the user at end continues encryption and decryption operation.
Embodiment of the method is that difference is with the difference of embodiment of the method shown in Fig. 5 wherein shown in Fig. 4, and second confirms to refer to The receiving time of order is different, is that the second safety chip is starting to voice call progress encryption and decryption in embodiment of the method shown in Fig. 4 What operation received before, be that the second safety chip is starting to voice call progress encryption and decryption behaviour in embodiment of the method shown in Fig. 5 Make what is received afterwards.
Compared with key of conversing in the prior art is the mode generated in TF card, embodiment of the method provided by the invention is led to Generation call key is crossed on the safety means independently of call terminal, is reduced during voice encryption by malice on call terminal The possibility of software attacks;And generated by the safety chip in safety means, the high security based on safety chip, reduce The possibility of call key from stealing, ensure that the security of voice encryption;In addition, in voice encryption, in safety chip Encrypted using call key in portion so that call key is called in a security context, is ensured the safety of call key and is made With.
In addition, in voice encryption communication process, the second safety means are by playing first from the first call terminal Ciphertext data, prompt to confirm the first ciphertext data played out according to the second authorization code, realize to the first call terminal Identity information confirmation so that user determine this call whether someone monitor, improve and the third party identified in voice call The success rate of monitoring, so as to reduce the monitored possibility of voice call, and determine that this voice call has the third party in user During monitoring, user can take the safety measure of anti-monitoring to prevent information leakage in time, improve data transfer in voice call Safety.
Further, the first ciphertext data from the first call terminal is played on the second safety means, reduces the The attack of Malware on two call terminals, it ensure that voice call safety.
Any process or method described otherwise above description in flow chart or herein is construed as, and represents to include Module, fragment or the portion of the code of the executable instruction of one or more the step of being used to realize specific logical function or process Point, and the scope of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discuss suitable Sequence, including according to involved function by it is basic simultaneously in the way of or in the opposite order, carry out perform function, this should be of the invention Embodiment person of ordinary skill in the field understood.
It should be appreciated that each several part of the present invention can be realized with hardware, software, firmware or combinations thereof.Above-mentioned In embodiment, software that multiple steps or method can be performed in memory and by suitable instruction execution system with storage Or firmware is realized.If, and in another embodiment, can be with well known in the art for example, realized with hardware Any one of row technology or their combination are realized:With the logic gates for realizing logic function to data-signal Discrete logic, have suitable combinational logic gate circuit application specific integrated circuit, programmable gate array (PGA), scene Programmable gate array (FPGA) etc..
Those skilled in the art are appreciated that to realize all or part of step that above-described embodiment method carries Suddenly it is that by program the hardware of correlation can be instructed to complete, described program can be stored in a kind of computer-readable storage medium In matter, the program upon execution, including one or a combination set of the step of embodiment of the method.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing module, can also That unit is individually physically present, can also two or more units be integrated in a module.Above-mentioned integrated mould Block can both be realized in the form of hardware, can also be realized in the form of software function module.The integrated module is such as Fruit is realized in the form of software function module and as independent production marketing or in use, can also be stored in a computer In read/write memory medium.
Storage medium mentioned above can be read-only storage, disk or CD etc..
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or the spy for combining the embodiment or example description Point is contained at least one embodiment or example of the present invention.In this manual, to the schematic representation of above-mentioned term not Necessarily refer to identical embodiment or example.Moreover, specific features, structure, material or the feature of description can be any One or more embodiments or example in combine in an appropriate manner.
Although embodiments of the invention have been shown and described above, it is to be understood that above-described embodiment is example Property, it is impossible to limitation of the present invention is interpreted as, one of ordinary skill in the art is not departing from the principle and objective of the present invention In the case of above-described embodiment can be changed within the scope of the invention, change, replace and modification.The scope of the present invention By appended claims and its equivalent limit.

Claims (22)

1. a kind of data processing method of voice call, it is characterised in that methods described includes:
First safety chip of the first safety means generates the first negotiation information, and first by first safety means is logical Believe that interface sends first negotiation information to the first call terminal, first safety means and the first call terminal phase Even, and independently of first call terminal;And first safety chip passes through described in first communication interface reception The second negotiation information that first call terminal is sent, wherein second negotiation information is set by the second safety of the second call terminal Standby generation;
First safety chip is calculated first negotiation information and second negotiation information, obtains the first call Key, the voice call that the first call key is used for the user of first call terminal carry out encryption and decryption operation;
First safety means export the first authorization code, and prompt to read aloud first authorization code, wherein described the One authorization code is first safety chip according to the described first call key generation;
The user that first safety chip obtains first call terminal reads aloud result to first authorization code, obtains First acoustic information;
First acoustic information is encrypted using the described first call key for first safety chip, obtains the One encryption data, and first encryption data is sent by first communication interface;
After the first confirmation instruction is obtained, first safety chip starts logical to described first using the described first call key The voice call of the user of telephone terminal carries out encryption and decryption operation.
2. according to the method for claim 1, it is characterised in that described after the first confirmation instruction is obtained, first peace Full chip starts carries out encryption and decryption behaviour using voice call of the described first call key to the user of first call terminal Make, including:
First safety chip is after the second confirmation instruction that second call terminal is sent is received, according to described second Confirm instruction, obtain described first and confirm instruction, start the use to first call terminal using the described first call key The voice call at family carries out encryption and decryption operation;Wherein, described second confirms that instruction is to be generated according to second safety means The instruction that second authorization code is confirmed to the first ciphertext data played out, and by second safety means generation;Its Described in the first ciphertext data first encryption data is decrypted to obtain by second safety means.
3. according to the method for claim 1, it is characterised in that described after the first confirmation instruction is obtained, first peace Full chip starts carries out encryption and decryption behaviour using voice call of the described first call key to the user of first call terminal Make, including:
First safety chip utilizes the described first call after the second encryption data is received by first communication interface Second encryption data is decrypted key, obtains the second ciphertext data;First safety means play described second Ciphertext data, and prompt to confirm second ciphertext data played out according to first authorization code;Described first Safety chip obtains the first confirmation instruction, and starts the user's for utilizing the described first call key to first call terminal Voice call carries out encryption and decryption operation;Wherein described second encryption data includes described second that second safety means obtain The user of call terminal reads aloud result to authorization code.
4. a kind of data processing method of voice call, it is characterised in that methods described includes:
First safety chip of the first safety means generates the first negotiation information, and first by first safety means is logical Believe that interface sends first negotiation information to the first call terminal, first safety means and the first call terminal phase Even, and independently of first call terminal;And first safety chip passes through described in first communication interface reception The second negotiation information that first call terminal is sent, wherein second negotiation information is set by the second safety of the second call terminal Standby generation;
First safety chip is calculated first negotiation information and second negotiation information, obtains the first call Key, the voice call that the first call key is used for the user of first call terminal carry out encryption and decryption operation;
After the first call key is obtained, first safety chip starts using the described first call key to described the The voice call of the user of one call terminal carries out encryption and decryption operation;
Wherein, start in first safety chip using the described first call key to the user's of first call terminal After voice call carries out encryption and decryption operation, methods described also includes:
First safety means receive the certification triggering command to the user of second call terminal;
First safety means are after the certification triggering command of the user to second call terminal is received, output First authorization code, and prompt to read aloud first authorization code, wherein first authorization code is the described first safe core Piece generates according to the described first call key;
The user that first safety chip obtains first call terminal reads aloud result to first authorization code, obtains First acoustic information;
First acoustic information is encrypted using the described first call key for first safety chip, obtains the One encryption data, and first encryption data is sent by first communication interface;
After the first confirmation instruction is obtained, first safety chip is whole to the described first call using the described first call key The voice call of the user at end continues encryption and decryption operation.
5. according to the method for claim 4, it is characterised in that described after the first confirmation instruction is obtained, first peace Full chip continues encryption and decryption behaviour using voice call of the described first call key to the user of first call terminal Make, including:
First safety chip is after the second confirmation instruction that second call terminal is sent is received, according to described second Confirm instruction, obtain described first and confirm instruction, using the described first call key to the user's of first call terminal Voice call continues encryption and decryption operation;Wherein, described second confirms that instruction is to be generated according to second safety means The instruction that second authorization code is confirmed to the first ciphertext data played out, and by second safety means generation;Institute The first ciphertext data is stated first encryption data is decrypted to obtain by second safety means.
6. according to the method for claim 4, it is characterised in that described after the first confirmation instruction is obtained, first peace Full chip continues encryption and decryption behaviour using voice call of the described first call key to the user of first call terminal Make, including:
First safety chip utilizes the described first call after the second encryption data is received by first communication interface Second encryption data is decrypted key, obtains the second ciphertext data;First safety means play described second Ciphertext data, and prompt to confirm second ciphertext data played out according to first authorization code;Described first Safety chip obtains the first confirmation instruction, and the voice using the described first call key to the user of first call terminal Call continues encryption and decryption operation;Wherein described second encryption data includes described second that second safety means obtain The user of call terminal reads aloud result to authorization code.
7. the method according to claim 3 or 6, it is characterised in that
First safety means prompting confirms according to first authorization code to second ciphertext data played out, Including:
Whether the first safety means prompting is consistent to the authorization code in second ciphertext data and first authorization code Confirmed, and the sound characteristic of authorization code and the user of second call terminal are read aloud in second ciphertext data Whether sound characteristic is unanimously confirmed;
Wherein, described first confirms instruction to confirm the authorization code in second ciphertext data and first authorization code one Cause, and the sound characteristic of authorization code and the sound spy of the user of second call terminal are read aloud in second ciphertext data Levy consistent instruction.
8. according to the method described in any one of claim 1 to 6, it is characterised in that the first safety means output first is awarded Weighted code, including:
A, the first authorization code is converted into acoustic information by first safety means, obtains the sound letter of first authorization code Breath, and play the acoustic information of first authorization code;Or
B, first safety means show the first authorization code.
9. according to the method described in any one of claim 1 to 6, it is characterised in that methods described also includes:
If first safety chip detects that the voice call of the user of first call terminal terminates, described first Safety chip deletes the first call key.
10. according to the method described in any one of claim 1 to 6, it is characterised in that first safety chip obtains described the The user of one call terminal reads aloud result to first authorization code, and obtaining the first acoustic information includes:
A, first safety chip obtains first call of the voice collecting unit collection of first safety means eventually The user at end reads aloud result to first authorization code, obtains the first acoustic information;Or
B, first safety chip receives described the first of the first call terminal collection by first communication interface The user of call terminal reads aloud result to first authorization code, obtains the first acoustic information.
11. according to the method described in any one of claim 1 to 6, it is characterised in that the length of first authorization code is less than institute State the length of the first call key.
12. according to the method described in any one of claim 1 to 6, it is characterised in that first authorization code is used for unique mark The first call key.
13. a kind of data processing method of voice call, it is characterised in that methods described includes:
Second safety chip of the second safety means receives the second call by the second communication interface of second safety means The first negotiation information that terminal is sent, wherein first negotiation information with second call terminal by carrying out voice call The first safety means generation of first call terminal, wherein second safety means are connected with second call terminal, and Independently of second call terminal;And second safety chip generates the second negotiation information, and it is logical by described second Believe that interface sends second negotiation information to second call terminal;
Second safety chip is calculated first negotiation information and second negotiation information, obtains the second call Key, the voice call that the second call key is used for the user of second call terminal carry out encryption and decryption operation;
Second safety means export the second authorization code, wherein second authorization code is second safety chip according to institute State the generation of the second call key;And second safety chip by second communication interface receive first plus After ciphertext data, first encryption data is decrypted using the described second call key, obtains the first ciphertext data;It is described Second safety means play first ciphertext data;Wherein described first encryption data obtains including first safety means Authorization code is read aloud read aloud result;
After exporting second authorization code and playing first ciphertext data, the second safety means prompting is according to Second authorization code confirms to first ciphertext data played out;
Second safety chip starts logical to described second using the described second call key after the second confirmation instruction is obtained The voice call of the user of telephone terminal carries out encryption and decryption operation.
14. a kind of data processing method of voice call, it is characterised in that methods described includes:
Second safety chip of the second safety means receives the second call by the second communication interface of second safety means The first negotiation information that terminal is sent, wherein first negotiation information with second call terminal by carrying out voice call The first safety means generation of first call terminal, wherein second safety means are connected with second call terminal, and Independently of second call terminal;And second safety chip generates the second negotiation information, and it is logical by described second Believe that interface sends second negotiation information to second call terminal;
Second safety chip is calculated first negotiation information and second negotiation information, obtains the second call Key, the voice call that the second call key is used for the user of second call terminal carry out encryption and decryption operation;
After the second call key is obtained, second safety chip starts using the described second call key to described the The voice call of the user of two call terminals carries out encryption and decryption operation;
Wherein, start in second safety chip using the described second call key to the user's of second call terminal After voice call carries out encryption and decryption operation, methods described also includes:
Second safety means receive the certification triggering command to the user of first call terminal;
Second safety means are after the certification triggering command of the user to first call terminal is received, output Second authorization code, generated wherein second authorization code is second safety chip according to the described second call key;With It is logical using described second and second safety chip by second communication interface after the first encryption data is received First encryption data is decrypted words key, obtains the first ciphertext data;Second safety means play described the One ciphertext data;It is bright that wherein described first encryption data includes being read aloud authorization code for first safety means acquisition Read result;
After exporting second authorization code and playing first ciphertext data, the second safety means prompting is according to Second authorization code confirms to first ciphertext data played out;
Second safety chip is whole to the described second call using the described second call key after the second confirmation instruction is obtained The voice call of the user at end continues encryption and decryption operation.
15. the method according to claim 13 or 14, it is characterised in that
Second safety means prompting confirms according to second authorization code to first ciphertext data played out, Including:
Whether the second safety means prompting is consistent to the authorization code in first ciphertext data and second authorization code Confirmed, and the sound characteristic of authorization code and the user of first call terminal are read aloud in first ciphertext data Whether sound characteristic is unanimously confirmed;
Wherein, second safety chip obtain second confirm instruction for confirm the authorization code in first ciphertext data with Second authorization code is consistent, and the sound characteristic of authorization code and described first is read aloud in first ciphertext data and is conversed eventually The consistent instruction of the sound characteristic of the user at end.
16. the method according to claim 13 or 14, it is characterised in that the second safety means output second authorizes Code, including:
A, the second authorization code is converted into acoustic information by second safety means, obtains the sound letter of second authorization code Breath, and play the acoustic information of second authorization code;Or
B, second safety means show the second authorization code.
17. the method according to claim 13 or 14, it is characterised in that methods described also includes:
Second safety means prompt to read aloud second authorization code after second authorization code is exported;
The user that second safety chip obtains second call terminal reads aloud result to second authorization code, obtains Second sound information;
The second sound information is encrypted using the described second call key for second safety chip, obtains the Two encryption datas, and second encryption data is sent by second communication interface.
18. the method according to claim 13 or 14, it is characterised in that methods described also includes:
If second safety chip detects that the voice call of the user of second call terminal terminates, described second Safety chip deletes the second call key.
19. according to the method for claim 17, it is characterised in that second safety chip obtains second call eventually The user at end reads aloud result to second authorization code, and obtaining second sound information includes:
A, second safety chip obtains second call of the voice collecting unit collection of second safety means eventually The user at end reads aloud result to second authorization code, obtains second sound information;Or
B, second safety chip receives described the second of the second call terminal collection by second communication interface The user of call terminal reads aloud result to second authorization code, obtains second sound information.
20. according to the method for claim 18, it is characterised in that second safety chip obtains second call eventually The user at end reads aloud result to second authorization code, and obtaining second sound information includes:
A, second safety chip obtains second call of the voice collecting unit collection of second safety means eventually The user at end reads aloud result to second authorization code, obtains second sound information;Or
B, second safety chip receives described the second of the second call terminal collection by second communication interface The user of call terminal reads aloud result to second authorization code, obtains second sound information.
21. the method according to claim 13 or 14, it is characterised in that the length of second authorization code is less than described the The length of two call keys.
22. the method according to claim 13 or 14, it is characterised in that second authorization code is used for described in unique mark Second call key.
CN201410208608.3A 2014-05-16 2014-05-16 A kind of data processing method of voice call Active CN103974242B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201410208608.3A CN103974242B (en) 2014-05-16 2014-05-16 A kind of data processing method of voice call
HK15100284.8A HK1200000A1 (en) 2014-05-16 2015-01-12 Data processing method for voice communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410208608.3A CN103974242B (en) 2014-05-16 2014-05-16 A kind of data processing method of voice call

Publications (2)

Publication Number Publication Date
CN103974242A CN103974242A (en) 2014-08-06
CN103974242B true CN103974242B (en) 2017-11-10

Family

ID=51243183

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410208608.3A Active CN103974242B (en) 2014-05-16 2014-05-16 A kind of data processing method of voice call

Country Status (2)

Country Link
CN (1) CN103974242B (en)
HK (1) HK1200000A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106130727A (en) * 2016-08-31 2016-11-16 深圳市金立通信设备有限公司 A kind of call cryptographic key negotiation method and system
CN107809759A (en) * 2016-09-09 2018-03-16 中兴通讯股份有限公司 A kind of data transmission method and device
CN106789000A (en) * 2016-12-13 2017-05-31 北京握奇智能科技有限公司 A kind of secret phone system and method based on TEE technologies and wearable device

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1183685A (en) * 1996-06-28 1998-06-03 株式会社东芝 Encryption decoding method. record reproduction device and record medium
CN101228770A (en) * 2005-07-27 2008-07-23 国际商业机器公司 Systems and method for secure delivery of files to authorized recipients
CN101236581A (en) * 2007-02-01 2008-08-06 北京华大信安科技有限公司 Information safety apparatus and its processing method
CN101420303A (en) * 2008-12-12 2009-04-29 广州杰赛科技股份有限公司 Communication method for audio data and apparatus thereof
CN102098159A (en) * 2010-07-28 2011-06-15 胡旭光 Secret key device and method for mobile phone
CN202231733U (en) * 2011-09-06 2012-05-23 信雅达系统工程股份有限公司 Earphone shield with earphone function
CN102497465A (en) * 2011-10-26 2012-06-13 潘铁军 High-secrecy mobile information safety system and safety method for distributed secret keys
CN102592091A (en) * 2011-12-28 2012-07-18 潘铁军 Digital rights management system and security method based on distributed key
CN102609641A (en) * 2011-12-28 2012-07-25 潘铁军 DRM (digital rights management) system based on distributed keys
CN102647275A (en) * 2011-02-22 2012-08-22 深圳市文鼎创数据科技有限公司 KEY for mobile terminal
CN103457729A (en) * 2012-05-31 2013-12-18 阿里巴巴集团控股有限公司 Safety equipment, service terminal and encryption method

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1183685A (en) * 1996-06-28 1998-06-03 株式会社东芝 Encryption decoding method. record reproduction device and record medium
CN101228770A (en) * 2005-07-27 2008-07-23 国际商业机器公司 Systems and method for secure delivery of files to authorized recipients
CN101236581A (en) * 2007-02-01 2008-08-06 北京华大信安科技有限公司 Information safety apparatus and its processing method
CN101420303A (en) * 2008-12-12 2009-04-29 广州杰赛科技股份有限公司 Communication method for audio data and apparatus thereof
CN102098159A (en) * 2010-07-28 2011-06-15 胡旭光 Secret key device and method for mobile phone
CN102647275A (en) * 2011-02-22 2012-08-22 深圳市文鼎创数据科技有限公司 KEY for mobile terminal
CN202231733U (en) * 2011-09-06 2012-05-23 信雅达系统工程股份有限公司 Earphone shield with earphone function
CN102497465A (en) * 2011-10-26 2012-06-13 潘铁军 High-secrecy mobile information safety system and safety method for distributed secret keys
CN102592091A (en) * 2011-12-28 2012-07-18 潘铁军 Digital rights management system and security method based on distributed key
CN102609641A (en) * 2011-12-28 2012-07-25 潘铁军 DRM (digital rights management) system based on distributed keys
CN103457729A (en) * 2012-05-31 2013-12-18 阿里巴巴集团控股有限公司 Safety equipment, service terminal and encryption method

Also Published As

Publication number Publication date
HK1200000A1 (en) 2015-07-24
CN103974242A (en) 2014-08-06

Similar Documents

Publication Publication Date Title
CN103973696B (en) A kind of data processing method of voice call
CN102547502B (en) Headset, headset use control method and terminal
US20110217950A1 (en) Apparatus & method to improve pairing security in Bluetooth™ headsets & earbuds
CN107277745A (en) Blue tooth voice contrast means and method
CN104393994B (en) Audio data secure transmission method, system and terminal
CN104065648B (en) A kind of data processing method of voice call
CN103974243B (en) A kind of data handling system of voice call
CN103974242B (en) A kind of data processing method of voice call
CN103986711B (en) A kind of data processing method of voice call
EP3139564A1 (en) Encryption coding module
CN103986712B (en) A kind of data processing method of voice call
CN104765538B (en) A kind of information processing method and terminal
CN104080080B (en) A kind of data handling system of voice call
CN104065649B (en) A kind of data processing method of voice call
CN104038932B (en) A kind of safety equipment
WO2020147150A1 (en) Unlocking password generation method and password unlocking method, apparatus and unlocking system
WO2013012401A1 (en) Apparatus & method to improve pairing security in bluetoothtm headsets & earbuds
CN106331282A (en) Mobile phone communication anti-eavesdropping system for implementing encryption and decryption on Bluetooth earphone side
CN104065650B (en) A kind of data handling system of voice call
CN103987036B (en) A kind of data handling system of voice call
CN103986579B (en) A kind of data handling system of voice call
CN103997732B (en) A kind of data handling system of voice call
CN104066081B (en) A kind of data handling system of voice call
CN205545497U (en) Speech signal treatment facility
CN104066080B (en) A kind of data processing method of voice call

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1200000

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant
REG Reference to a national code

Ref country code: HK

Ref legal event code: GR

Ref document number: 1200000

Country of ref document: HK