CN103997732B - A kind of data handling system of voice call - Google Patents

A kind of data handling system of voice call Download PDF

Info

Publication number
CN103997732B
CN103997732B CN201410208943.3A CN201410208943A CN103997732B CN 103997732 B CN103997732 B CN 103997732B CN 201410208943 A CN201410208943 A CN 201410208943A CN 103997732 B CN103997732 B CN 103997732B
Authority
CN
China
Prior art keywords
call
authorization code
call terminal
key
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410208943.3A
Other languages
Chinese (zh)
Other versions
CN103997732A (en
Inventor
李东声
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tendyron Technology Co Ltd
Original Assignee
Tendyron Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tendyron Technology Co Ltd filed Critical Tendyron Technology Co Ltd
Priority to CN201410208943.3A priority Critical patent/CN103997732B/en
Publication of CN103997732A publication Critical patent/CN103997732A/en
Application granted granted Critical
Publication of CN103997732B publication Critical patent/CN103997732B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention provides data handling system in a kind of voice call, including:First safety chip, for generating the first negotiation information, the first negotiation information to the first call terminal is sent by the first communication interface;And, the second negotiation information that the first call terminal is sent is received by the first communication interface;First negotiation information and the second negotiation information are calculated, the first call key is obtained;First output module, for exporting the first authorization code;First safety chip, it is additionally operable to after the second encryption data is received by the first communication interface, the second encryption data is decrypted using the first call key, the second ciphertext data is obtained, the user that the second encryption data includes the second call terminal that the second safety means are obtained reads aloud result to authorization code;First playing module, for playing the second ciphertext data;First reminding module, for pointing out to confirm the second ciphertext data played out according to the first authorization code.

Description

A kind of data handling system of voice call
Technical field
The present invention relates to electronic technology field, more particularly to a kind of data handling system of voice call.
Background technology
In the prior art, there is monitored possibility in the voice call between user, therefore current voice call is present Security risk.It is the call key by the TF card memory storages on mobile phone by the way of in the prior art for security risk To voice encryption, the protection to voice call is realized.But it is black in actual applications, if call terminal is mounted with Malware Visitor can steal the call key in TF cards by Malware, and then crack the voice messaging after encryption, cause call terminal Speech data leakage risk, therefore how safety progresss voice encryption operate be technical problem urgently to be resolved hurrily;In addition, There is monitored possibility in voice call in the prior art, therefore the monitored possibility of reduction voice call is equally urgently to solve Technical problem certainly.
The content of the invention
The present invention provides a kind of data handling system of voice call, main purpose be to solve above-mentioned technical problem it One.
The present invention provides data handling system in a kind of voice call, and the system includes:First safety chip, for generating First negotiation information, first negotiation information to the first call terminal is sent by the first communication interface;And, by described First communication interface receives the second negotiation information that first call terminal is sent;To first negotiation information and described Two negotiation informations are calculated, and obtain the first call key;Wherein, first safety chip is located in the first safety means, First safety means are connected with first call terminal, and consult independently of first call terminal, described second Information is generated by the second safety means of second call terminal, and the first call key is used for the described first call eventually The voice call of the user at end carries out encryption and decryption operation;First output module, for exporting the first authorization code, wherein described first Authorization code is first safety chip according to the described first call key generation;Wherein, first output module is located at In first safety means, or, in first call terminal;First safety chip, is additionally operable to passing through First communication interface is received after the second encryption data, and second encryption data is entered using the described first call key Row decryption, obtains the second ciphertext data, and second encryption data includes the second call of second safety means acquisition eventually The user at end reads aloud result to authorization code;First playing module, for playing second ciphertext data;Wherein, described One playing module is located in first safety means, or, in first call terminal;First reminding module, is used Second ciphertext data played out is confirmed according to first authorization code in prompting;Wherein, first prompting Module is located in first safety means, or, in first call terminal.
In addition, first reminding module, specifically for point out to the authorization code in second ciphertext data with it is described Whether the first authorization code unanimously confirmed, and the sound characteristic of authorization code and described the are read aloud in second ciphertext data Whether the sound characteristic of the user of two call terminals is unanimously confirmed.
In addition, first output module, specifically for first authorization code is converted into acoustic information, obtains described The acoustic information of first authorization code, and play the acoustic information of first authorization code;Or, show first authorization code.
In addition, first reminding module, is additionally operable to prompting and first authorization code is read aloud;First safety Chip, the user for being additionally operable to obtain first call terminal reads aloud result to first authorization code, obtains the first sound Information, and first acoustic information is encrypted using the described first call key, the first encryption data is obtained, and First encryption data is sent by first communication interface.
In addition, first safety chip, is additionally operable to detect first call terminal in first safety chip User voice call terminate after, delete it is described first call key.
In addition, the system also includes:First voice acquisition module, for gathering the user of first call terminal to institute That states the first authorization code reads aloud result, obtains the first acoustic information, and send first acoustic information;Wherein, described first Voice acquisition module is located in first safety means, or, in first call terminal;The first safe core Piece, specifically for obtaining first acoustic information that first voice acquisition module is sent.
In addition, the length of first authorization code is less than the length of the described first call key.
In addition, first authorization code is used for the first call key described in unique mark.
Compared with call key is the mode generated on TF cards in the prior art, the system embodiment that the present invention is provided is led to Cross on the first safety means independently of the first call terminal generation first to converse key, reduce during voice encryption by the The possibility of malware attacks on one call terminal;And be the first safety chip generation in the first safety means, based on the The high security of one safety chip, reduces the possibility of the first call key from stealing, it is ensured that the security of voice encryption.
In voice encryption communication process, the first safety means are by playing the second decryption number from the second call terminal According to prompting confirms according to the first authorization code to the second ciphertext data played out, realizes the identity to the second call terminal The confirmation of information so that user determines this call, and whether someone monitors, and improves and recognizes what the third party monitored in voice call Success rate, so that the monitored possibility of voice call is reduced, and when user determines that this voice call has third party's monitoring, User can take the safety measure of anti-monitoring to prevent information leakage in time, improve the safety of data transfer in voice call.
Further, the second ciphertext data from the second call terminal is played on the first safety means, is reduced The attack of Malware on one call terminal, it is ensured that voice call safety.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, being used required in being described below to embodiment Accompanying drawing be briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for this For the those of ordinary skill in field, on the premise of not paying creative work, other can also be obtained according to these accompanying drawings Accompanying drawing.
A kind of structural representation of the data handling system for voice call that Fig. 1 provides for the present invention;
A kind of another structural representation of the data handling system for voice call that Fig. 2 provides for the present invention;
A kind of another structural representation of the data handling system for voice call that Fig. 3 provides for the present invention.
Embodiment
With reference to the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Ground is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.Based on this The embodiment of invention, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made Example, belongs to protection scope of the present invention.
The embodiment of the present invention is described in further detail below in conjunction with accompanying drawing.
A kind of structural representation of the data handling system embodiment for voice call that Fig. 1 provides for the present invention.Shown in Fig. 1 System embodiment includes:
First safety chip, for generating the first negotiation information;And, receive described first by the first communication interface and lead to The second negotiation information that telephone terminal is sent;First negotiation information and second negotiation information are calculated, is obtained One call key;Wherein, first safety chip is located in the first safety means, first safety means and described first Call terminal is connected, and independently of first call terminal, and second negotiation information is by the of second call terminal Two safety means are generated, and the first call key, which is used for the voice call to the user of first call terminal, to be carried out plus solution Close operation;
First output module, for exporting the first authorization code, wherein first authorization code is first safety chip Generated according to the described first call key;Wherein, first output module is located in first safety means, or, In first call terminal;
First safety chip, is additionally operable to after the second encryption data is received by first communication interface, profit Second encryption data is decrypted with the described first call key, the second ciphertext data, the second encryption number is obtained Result is read aloud to authorization code according to the user of the second call terminal obtained including second safety means;
First playing module, for playing second ciphertext data;Wherein, first playing module is located at described the In one safety means, or, in first call terminal;
First reminding module, for pointing out to carry out second ciphertext data played out according to first authorization code Confirm;Wherein, first reminding module is located in first safety means, or, in first call terminal.
Wherein, first reminding module, specifically for point out to the authorization code in second ciphertext data with it is described Whether the first authorization code unanimously confirmed, and the sound characteristic of authorization code and described the are read aloud in second ciphertext data Whether the sound characteristic of the user of two call terminals is unanimously confirmed.
Compared with call key is the mode generated on TF cards in the prior art, the system embodiment that the present invention is provided is led to Cross on the first safety means independently of the first call terminal generation first to converse key, reduce during voice encryption by the The possibility of malware attacks on one call terminal;And be the first safety chip generation in the first safety means, based on the The high security of one safety chip, reduces the possibility of the first call key from stealing, it is ensured that the security of voice encryption;Separately Outside, in voice encryption, encrypted using the first call key inside the first safety chip so that the first call key be One security context is called, it is ensured that the safe handling of the first call key.
In voice encryption communication process, the first safety means are by playing the second decryption number from the second call terminal According to prompting confirms according to the first authorization code to the second ciphertext data played out, realizes the identity to the second call terminal The confirmation of information so that user determines this call, and whether someone monitors, and improves and recognizes what the third party monitored in voice call Success rate, so that the monitored possibility of voice call is reduced, and when user determines that this voice call has third party's monitoring, User can take the safety measure of anti-monitoring to prevent information leakage in time, improve the safety of data transfer in voice call.
The modules included by the system in the embodiment of the present invention are illustrated below:
First, the first safety means and the first call terminal are illustrated:
First safety means can be the wearable devices such as intelligent glasses, intelligent watch, ear speaker device, or, it is integrated in In wearable device;Certainly, the first safety means can also be the intelligent cipher key equipment USB Key with USB interface, support sound What the intelligent cipher key equipment of frequency interface, intelligent cipher key equipment with function of Bluetooth communication etc. can be communicated with call terminal Intelligent cipher key equipment, or, it is integrated in the intelligent cipher key equipment that can be communicated with call terminal.I.e. relative to the first call Terminal, the first safety means are autonomous devices, and are not integrated on the first call terminal.
First communication interface can be wireless connection interface or wired connection interface.If the first communication interface For wireless connection interface, then wireless communication module is built-in with the first safety means, can be Wi-Fi module, Wi-Fi Direct modules, NFC module, bluetooth module or infrared module, such as the first safety means are bluetooth earphone;If first leads to Letter interface is wired connection interface, then the first safety means can have data line, and the interface of data line can be sound Frequency interface or USB interface, such as the first safety means are line control earphone.Certainly, the first safety means can also have nothing simultaneously Line is connected and two kinds of functions of wired connection, i.e. the first safety means are built-in with wireless communication module, and are externally connected to data biography Defeated line.
If being built-in with wireless communication module in the first safety means, the first safety means can by wireless connection with First call terminal is connected;If the first communication interface is wired connection interface, the first safety means can pass through wired company Connect and be connected with the first call terminal.
Wherein, the first call terminal is the terminal with voice call ability, can be traditional verbal system, such as fixed Phone and cell phone or the terminal with function of network phone, such as PC, notebook computer and tablet personal computer.
2nd, the first negotiation information and the second negotiation information are illustrated:
First negotiation information is generated by the first safety chip in the first safety means, and in the prior art by first Call terminal carries out key agreement and compared in itself, using independently of the first safety means of the first call terminal come complete consult, Key agreement operation is reduced by the possibility of malware attacks in the first call terminal, and by first in the first safety means Safety chip is more safe and reliable to generate the first negotiation information.
First safety chip is sent to the first call terminal after the first negotiation information is generated by the first communication interface, First call terminal is sent to the second call terminal by communication network.
Second negotiation information be by the first call terminal receive the second call terminal transmission the second negotiation information after, First safety chip is sent to by the first communication interface.
First safety chip sends the operation of the first negotiation information and receives the operation of the second negotiation information in execution sequence Upper not obvious precedence relationship, can be performed simultaneously, can also successively be performed according to order.Wherein, the first negotiation information It is referred to cipher key agreement algorithm of the prior art to set with the parameter information particular content in the second negotiation information, example Such as, cipher key agreement algorithm ZRTP.
3rd, the first call key is illustrated:
First call cipher key calculation can be found in the calculation of cipher key agreement algorithm of the prior art to obtain, for example, ZRTP.Wherein, the first call key can be stored in the first safety chip, to ensure the storage safety of the first call key;
For the first call key, the first safety chip in the first safety means is obtaining the first call key Afterwards, the first call key can be used to ensure the safety of voice call between the first safety means and the second safety means, quite On the basis of voice call in the prior art, voice encryption is set up between the first safety means and the second safety means and is led to Road.
Wherein, the voice encryption passage that the present invention is provided is built upon between the first safety means and the second safety means Passage, i.e., for the first safety means, voice encryption passage has sequentially passed through the first safety means, the first verbal system, Two verbal systems and the second safety means, see below the explanation of the system architecture shown in Fig. 3.It can thus be seen that of the invention Voice encryption passage be built upon between safety means, therefore, in the first call terminal and the second call terminal in call Set up to end of conversation, the first call terminal and the second call terminal play a part of transparent data, reduce The possibility of malware attacks, improves the safety of data transfer on call terminal.
First safety chip, is additionally operable to detecting after the voice call of user of the first call terminal terminates, and deletes the One call key.
After end of conversation, the first safety chip is destroyed the first call key used in this voice call and can reduced First call key be stolen after by the possibility of irrational utilization, it is ensured that the operation of the first safety chip safety, same effectively profit With the memory space of the first safety chip.
4th, the first output module and the first reminding module are illustrated:
1st, the first authorization code is exported to the first output module and the prompting of the first reminding module is read aloud the first authorization code Illustrate:
First output module, specifically for the first authorization code is converted into acoustic information, obtains the sound of the first authorization code Information, and play the acoustic information of the first authorization code;Or, show the first authorization code.
Wherein, the first output module can be the module with playing function, for example, loudspeaker or loudspeaker.
The data signal of first authorization code is sent to the first voice conversion module, the conversion of the first voice by the first safety chip The data signal of first authorization code is converted into acoustic information by module, obtains the acoustic information of the first authorization code, and first is awarded The acoustic information of weighted code is sent to the first output module, and the first output module plays the acoustic information of the first authorization code.Wherein, One voice conversion module is located in the first safety means, or, in the first call terminal.
By the way that the first authorization code is changed, the acoustic information of the first authorization code is obtained, by playing the first authorization code Acoustic information, reach output the first authorization code purpose.
Certainly, the first output module can also be the module with display function, such as display screen.
The data signal of first authorization code is sent to the first output module by the first safety chip, and the first output module is shown First authorization code.
By showing the first authorization code, the purpose of the first authorization code of output is reached.
Wherein, the first reminding module can be the module with playing function, for example, loudspeaker or loudspeaker;It can also be Module with display function, such as display screen.First reminding module and the first output module are same modules physically, Can be two independent modules, and when the first reminding module and the first output module are two independent modules, Ke Yijun In the first safety means, or in the first call terminal;Can also one of them be located at the first safety means in, another In the first call terminal.
Wherein, the prompting of the first reminding module to the first authorization code read aloud and can awarded with the first output module output first Weighted code is carried out simultaneously, for example, output " authorization code XXX " please be read aloud, wherein, XXX represents the content of the first authorization code.Wherein export Mode can use broadcast mode or display mode.
Certainly, the prompting of the first reminding module to the first authorization code read aloud and can awarded with the first output module output first Weighted code is separately carried out, for example, the information of " authorization code please be read aloud " is first exported, then export " information that authorization code is XXX ", or, First output " information that authorization code is XXX ", then export the information of " authorization code please be read aloud ".The output side of wherein above-mentioned two information Formula can be exported using broadcast mode or display mode, wherein the way of output of above-mentioned two information can be with identical, can also It is different.
The first output module on the first call terminal that compares exports the first authorization code and/or the prompting of the first reminding module The information read aloud the first authorization code, on the first safety means, the first output module exports the first authorization code and/or the The information that the prompting of one reminding module is read aloud the first authorization code, it is possible to reduce malware attacks on the first call terminal May, improve the safety of data transfer.
Wherein, the length of the first authorization code is less than the length of the first call key, and converses close for unique mark first Key.
When the prompting of the first reminding module is read aloud the first authorization code, because the content read aloud is the first authorization code, Not the first call key in itself, reduces the possibility that criminal steals the first call key when user reads aloud;In addition, the One authorization code is generated according to the first call key, and the key that can be conversed with unique mark first, therefore communicating pair passes through Whether the content for comparing authorization code is consistent, to determine whether call key is consistent used in communicating pair;Due to the first call The digit of key is longer, by the first call key handling into the first authorization code so that the length of the first authorization code is compared with the first call The length of key is short, reduces the content that user reads aloud, user-friendly.
2nd, the step that according to first authorization code to second ciphertext data that plays out is confirmed is pointed out the first reminding module Rapid explanation:
The realization side that the prompting of first reminding module is confirmed according to the first authorization code to the second ciphertext data played out Formula is similar to the implementation that the prompting of the first reminding module is read aloud the first authorization code, and here is omitted.
5th, the first acoustic information is obtained to the first safety chip to illustrate:
First safety chip, which obtains the first acoustic information, following two ways:
Mode A:System also includes:First voice acquisition module, the user for gathering the first call terminal awards to first Weighted code reads aloud result, obtains the first acoustic information, and send first acoustic information;Wherein, the first voice acquisition module is located at In first safety means;
First safety chip, specifically for obtaining the first sound that the first voice acquisition module is sent on the first safety means Information.
In mode A, the first voice acquisition module can be Mike, gather to the first authorization code when reading aloud result, It is acquired using the first voice acquisition module on the first safety means, it is possible to reduce Malware is attacked on the first call terminal The possibility hit, it is ensured that the security of data acquisition.For example, when the first safety means are bluetooth earphone, can directly utilize bluetooth The Mike of earphone is acquired to reading aloud result.
Mode B:System also includes:First voice acquisition module, the user for gathering the first call terminal awards to first Weighted code reads aloud result, obtains the first acoustic information, and send first acoustic information;Wherein, the first voice acquisition module is located at In first call terminal;
First safety chip, specifically for receiving the first voice collecting mould on the first call terminal by the first communication interface The first acoustic information that block is sent.
The collection to reading aloud result is realized using the existing Mike of the first call terminal, it is convenient to realize, without pacifying to first The hardware modification of full equipment is that the acquisition to reading aloud result can be achieved, and reduces the hardware cost of the first safety means.
Wherein, the sound for reading aloud user the first authorization code is acquired, and is obtained the first acoustic information, is actually gathered Obtain two parts information, one be the output of the first safety means the first authorization code content, another is to read aloud first to award The sound characteristic of the user of weighted code.
Sound characteristic wherein in first acoustic information is that the user of the first call terminal directly reads aloud first mandate The user sound characteristic of itself during code, the content sources for identifying the first authorization code in first acoustic information are conversed in first The user of terminal;It is not the sound spy that the sounding effect for the user for simulating first call terminal by speech simulation software is obtained Levy.
Because the sound characteristic obtained when the sound characteristic that speech simulation software is simulated directly is read aloud with user is different, because This is when playing above-mentioned two sound characteristic, and listener can be according to tone color, tone and the tone entrained by two sound characteristics Deng customized information etc., the sound for the user for being real first call terminal is recognised that, so as to identify that carrying is authorized Whether the acoustic information of code comes from the first call terminal.
6th, the operation of the first safety chip encryption and decryption is illustrated:
1st, the implementation that the first acoustic information is encrypted to the first encryption data by the first safety chip is as follows:
First acoustic information is sent to the first voice conversion module, the first voice conversion module by the first voice acquisition module By the first acoustic information system into data signal, data to be verified are obtained, and data to be verified are sent to the first safety chip, Data to be verified are encrypted using the first call key for first safety chip, obtain the first encryption data, and pass through First communication interface sends the first encryption data.
Wherein, the effect of the first voice conversion module converts analog signals into data signal so that the first acoustic information It can carry out data transmission in voice encryption passage.Wherein, the first voice acquisition module and the first voice conversion module are physics On same module or two independent modules, and be in the first voice acquisition module and the first voice conversion module During independent two modules, it can be respectively positioned in the first safety means, or in the first call terminal;Can also one of position In the first safety means, another is located in the first call terminal.
Certainly, if the communication network between the first call terminal and the second call terminal supports the direct biography of analog signal It is defeated, then by the first acoustic information system into the first encryption data during, the system not include the first voice conversion module.
Wherein, the first safety chip by the first communication interface after the first encryption data is sent, and the first call terminal leads to Cross the first communication interface and receive the first encryption data, and the second call terminal is sent to by communication network.
2nd, the implementation that the second encryption data is processed into the second ciphertext data and played by the first safety means is as follows:
If the second encryption data is data signal, the first safety chip is using the first call key to the second encryption number According to being decrypted, the second ciphertext data is obtained;First safety chip sends the second ciphertext data to the first voice conversion module, the Second ciphertext data is converted into acoustic information by one voice conversion module, obtains the transformation result of the second ciphertext data, and by The transformation result of two ciphertext datas is sent to the first playing module, and the first playing module plays the Change-over knot of the second ciphertext data Really;
If the second encryption data is analog signal, the first safety chip is using the first call key to the second encryption number According to being decrypted, the second ciphertext data is obtained, the second ciphertext data is sent to the first playing module, the first playing module is played Second ciphertext data.
Wherein, the second encryption data is by communication network to be sent to the first call terminal by the second call terminal, and by First call terminal is sent to the first safety chip by the first communication interface.
Wherein, the first playing module is played does not have between the second ciphertext data and the first output module the first authorization code of output Obvious sequencing, can be performed simultaneously, can also successively be performed according to order.
It in summary it can be seen, the system of the embodiment of the present invention at least includes following module:First safety chip, the first output Module, the first reminding module and the first playing module.Optionally, the system of the embodiment of the present invention can also be adopted including the first voice Collect module.
First output module can be with play or display function module, the first reminding module can also be with broadcasting Put or display function module, the first playing module be the module with playing function.
If the first output module and the first reminding module use playing function, the first output module and the first prompting The function of module can be completed by the first playing module, therefore the first output module and the first reminding module are implemented in the present invention It is not necessary module in the system of example, is that the system of optional module, the i.e. embodiment of the present invention at least includes following module: First safety chip, the first playing module and the first voice acquisition module.Wherein, the first voice acquisition module is implemented in the present invention It is optional in the system of example.The corresponding hardware of wherein the first playing module can be loudspeaker or loudspeaker, the first voice collecting Module can be Mike.When the system of the embodiment of the present invention includes the first voice acquisition module, due to the first playing module and First voice acquisition module can be located in the first safety means, or, the first playing module and the first voice acquisition module It is respectively positioned in the first call terminal, can be located at one of module in the first safety means, another module is located at the In one call terminal, therefore the structure of the system of the embodiment of the present invention can have following several realizations:
S1:First safety means include the first safety chip;First call terminal includes the first playing module and the first language Sound acquisition module;Referring specifically to the system architecture shown in Fig. 1.A kind of data processing for voice call that Fig. 1 provides for the present invention The structural representation of system.Dotted line frame module is optional module wherein shown in Fig. 1, and the system shown in Figure 1 can be straight when realizing Connect and completed using the Mike of the first call terminal and loudspeaker, appointed without the hardware to the first safety means and the first call terminal What is changed, and hardware cost is relatively low, is realized simple.
S2:First safety means include the first safety chip, the first playing module and the first voice acquisition module;Specific ginseng System architecture as shown in Figure 2.Another structural representation of the data handling system for the voice call that Fig. 2 provides for the present invention Figure.Dotted line frame module is optional module wherein shown in Fig. 2, and the system shown in Figure 2 is when realizing, due to gathering the first call terminal User voice and play the second ciphertext data be on the first safety means independently of the first call terminal perform, subtract Lack the attack of Malware on the first call terminal, improve the security of data;
S3:First safety means include the first safety chip and the first playing module;First call terminal includes the first language Sound acquisition module;;
S4:First safety means include the first safety chip and the first voice acquisition module;First call terminal includes the One playing module;Wherein, first voice acquisition module is optional.
If at least one in the first output module and the first reminding module uses display function, display function is used Module is essential in the system of the embodiment of the present invention, and being in the system of the embodiment of the present invention without using the module of display function can Choosing.For example, when the system of the embodiment of the present invention includes the first voice acquisition module, if the first reminding module uses display Function, then at least include the first safety chip, the first reminding module, the first playing module and the in the system of the embodiment of the present invention One voice acquisition module;The system that first output module and the first reminding module use display function, the then embodiment of the present invention In at least include the first safety chip, the first output module, the first reminding module, the first playing module and the first voice collecting mould Block.
Compared with call key is the mode generated on TF cards in the prior art, system provided in an embodiment of the present invention is led to Cross on the safety means independently of the first call terminal generation first to converse key, reduce and led to by first during voice encryption The possibility of malware attacks on telephone terminal;And be the first safety chip in the first safety means to generate, based on The high security of one safety chip, reduces the possibility of the first call key from stealing, it is ensured that the security of voice encryption.
In addition, in voice encryption communication process, the first safety means are by playing second from the second call terminal Ciphertext data, points out to confirm the second ciphertext data played out according to the first authorization code, realizes to the second call terminal Identity information confirmation so that user determine this call whether someone monitor, improve and the third party recognized in voice call The success rate of monitoring, so as to reduce the monitored possibility of voice call, and determines that this voice call has the third party in user During monitoring, user can take the safety measure of anti-monitoring to prevent information leakage in time, improve data transfer in voice call Safety.
Further, the second ciphertext data from the second call terminal is played on the first safety means, is reduced The attack of Malware on one call terminal, it is ensured that voice call safety.
A kind of another structural representation of the data handling system for voice call that Fig. 3 provides for the present invention.Shown in Fig. 3 In system, the first safety means are connected by the first communication interface with the first call terminal, and the first call terminal passes through communication network Network is connected with the second call terminal, and the second call terminal is connected by the second communication interface with the second safety means.Wherein, first Safety chip is located in the first safety means, and the second safety chip is located in the second safety means.
Structure based on system shown in Figure 3, after the first safety chip sends the first negotiation information, the first call terminal leads to Cross the first communication interface and receive the first negotiation information, and the first negotiation information of reception is sent to the second call terminal, second Call terminal sends the first negotiation information to the second safety chip by the second communication interface.Second safety chip receives second and led to The first negotiation information that telephone terminal is sent, and, the second negotiation information is generated, and send described by second communication interface Second negotiation information gives second call terminal;First negotiation information and second negotiation information are calculated, Obtain the second call key;Second output module exports the second authorization code;Wherein, second authorization code is second safety Chip is generated according to the described second call key, and second output module is located in second safety means, or, position In second call terminal;Second safety chip is receiving the first encryption data by second communication interface Afterwards, first encryption data is decrypted using the described second call key, obtains the first ciphertext data;Wherein, it is described First encryption data include first safety means obtain authorization code is read aloud read aloud result;Second playing module Play first ciphertext data;Wherein, second playing module is located in second safety means, or, positioned at institute State in the second call terminal;Second reminding module exports second authorization code and described second in second output module and broadcast Amplification module is played after first ciphertext data, is pointed out according to second authorization code to first ciphertext data that plays out Confirmed;Wherein, second reminding module is located in second safety means, or, positioned at the described second call eventually In end.
Compared with call key is the mode generated on TF cards in the prior art, the second subsystem in the embodiment of the present invention System is reduced during voice encryption by call eventually by generating call key on the safety means independently of the second call terminal The possibility of malware attacks on end;And be the second safety chip in the second safety means to generate, based on safe core The high security of piece, reduces the possibility of call key from stealing, it is ensured that the security of voice encryption.
In addition, in voice encryption communication process, the second safety means are by playing first from the first call terminal Ciphertext data, points out to confirm the first ciphertext data played out according to the second authorization code, realizes to the first call terminal Identity information confirmation so that user determine this call whether someone monitor, improve and the third party recognized in voice call The success rate of monitoring, so as to reduce the monitored possibility of voice call, and determines that this voice call has the third party in user During monitoring, user can take the safety measure of anti-monitoring to prevent information leakage in time, improve data transfer in voice call Safety.
Further, the first ciphertext data from the first call terminal is played on the second safety means, is reduced The attack of Malware on two call terminals, it is ensured that voice call safety.
First call key described above, the second call key, the first authorization code and the second authorization code are carried out Supplementary notes, it is specific as follows:
It is not present in the first call terminal and the second call terminal on the premise of the third party monitors, the first call key and the Two call keys are identical.On the contrary, when the first call terminal and the second call terminal have third party's monitoring, the first call terminal User used in the first call key and the second call terminal user used in the second call key it is different.Why First call key and the second call key are different, and reason is:First call key is the first call terminal and the third party Call terminal consults what is obtained, and the second call key is that the call terminal negotiation of the second call terminal and the third party is obtained, and It is not that the first call terminal and the second call terminal are directly consulted to obtain.
On the premise of third party's monitoring is not present in the first call terminal and the second call terminal, the first authorization code and second Authorization code is identical.On the contrary, when the first call terminal and the second call terminal have third party's monitoring, the use of the first call terminal The second call key is different used in the user of first call key and the second call terminal used in family, therefore, according to First authorization code of the first call key generation and the second authorization code generated according to the second call key are also different.User passes through Compare the content of the first authorization code and the content of the second authorization code, it can be determined that go out and monitored with the presence or absence of the third party.
The second encryption data can be decrypted using the first call key for first safety chip, obtain the second decryption number According to be due between the first call terminal and the second call terminal be not present the third party monitor when, first call key and second Key of conversing is identical, therefore can be using the first call key to being carried out by the encrypted result after the second call key encryption Successful decryption.
But, although can be using the first call key to being succeeded by the encrypted result after the second call key encryption Decryption, but can not judge that, with the presence or absence of third party's monitoring between the first call terminal and the second call terminal, reason is accordingly Since when there is third party's monitoring in the first call terminal and the second call terminal, the call terminal of the first call terminal and the third party The call terminal of the first call key that negotiation is obtained, the second call terminal and the third party consult the second obtained call key, First call key and the second call key are different.The data that the third party can send the first call terminal utilize the first call After secret key decryption, reuse the second call key and be encrypted, and be sent to the second call terminal, now the second call terminal is still It can so use the second call key that the encryption data received is successfully decrypted, but now, in the first call eventually End and the second call terminal exist the third party monitoring, therefore can not according to the encryption data to receiving whether successful decryption To judge whether that the third party monitors.
To solve the concept that authorization code is introduced in above-mentioned technological deficiency, the embodiment that the present invention is provided, and by awarding Weighted code is read aloud, and acquisition is read aloud after result, and transmission reads aloud the mode of result to judge whether that the third party monitors, tool The associated description that body implementation detail is seen above, is explained further below explanation herein.
In the present embodiment, the second ciphertext data is exported to user by the way of playing, is because the second decryption Include two parts information in data, a part is the tool of the authorization code for the second safety means generation for representing the second call terminal Hold in vivo, another part is the sound characteristic for the user for representing the second call terminal, by playing the second ciphertext data, can be made The user for obtaining the first call terminal is directly obtained above-mentioned two parts information, and then so that the side of user one of the first call terminal Whether face can be unanimously confirmed in the second ciphertext data by the authorization code and the first authorization code judged in the second ciphertext data The authenticity of the content of carrying, on the other hand can be by judging to read aloud the sound characteristic and of authorization code in the second ciphertext data The sound characteristic of the user of two call terminals whether unanimously come the legitimacy in the source that confirms the second ciphertext data, that is, can be with Judge to whether there is the third party.
And, if the mode of the above-mentioned ciphertext data of broadcasting second to be substituted for the mode of the second ciphertext data of display, the The user of one call terminal is received after the second ciphertext data, only can be by judging the authorization code in the second ciphertext data and Whether one authorization code unanimously confirms the authenticity of content carried in the second ciphertext data, and can not confirm the second ciphertext data Source legitimacy, that is, can not judge to whether there is the third party.
Due to being not present in the first call terminal and the second call terminal on the premise of the third party monitors, the first authorization code and Second authorization code is identical, and the first authorization code can be marked uniquely with the call key of unique mark first, the second authorization code Show the second call key, thus, when the user of the first call terminal judges the first authorization code and the second authorization code is identical, i.e., It can learn that the first call key and the second call key are identicals.
Illustrated below by taking a concrete application scene as an example:
User A and user B carries out normal talking, and during in the absence of being monitored by third party, user A and user B are directly led to The negotiation of key is talked about, the key X that converses is obtained, the voice call between user A and user B is also directly carried out using call key X Encryption and decryption.
Carry out in communication process, monitored if there is third party user C between user A and user B, user A and user B Call key will be consulted with third party user C respectively, after the completion of negotiation, the call key that user C and user A consults to obtain is M, The call key that user C and user B consults to obtain is N.During user A is sent to user B call voice, user C is cut The call voice A that user A is sent to user B is received, plaintext A is obtained after being decrypted using call key M to call voice A, then make User B is sent to after plaintext A is encrypted with call key N.Because user B can be sent using the key N that converses to user C Carry out ciphertext to be decrypted, so that user B can get user A voice, similarly, user A call language is sent in user B During sound, user C intercepts the call voice B that user B is sent to user A, and call voice B is decrypted using call key N After obtain plaintext B, reuse call key M plaintext B is encrypted after be sent to user A.Because user A can utilize call Key M sends ciphertext to user C and is decrypted, so that user A can get user B voice.Due to user A and user B can get the voice of call opposite end, therefore, voice call can be carried out between user A and user B, but actually use Family A and user B Correspondent Node user is user C, that is, user A and user B this call voice by user C Monitor.
Corresponding, when carrying out voice call using system provided in an embodiment of the present invention, if there is user C prison Listen, then user A safety means utilize the call key M that the user C with Correspondent Node consults, and obtain an authorization code m, and Authorization code m is read aloud by user A, audio files m is obtained, then include in audio files m user A sound and authorization code m it is interior Hold, after user C is decrypted to audio files m, audio files m is encrypted using the key N that converses and issues user B, when user B listens To after audio files m, hear be user A sound, the source that specify that audio files m is user A, but user B safety is set Standby also to utilize the call password N with the user C negotiations of Correspondent Node to obtain an authorization code n, user B compares the sound heard The authorization code m of the file m carryings and authorization code n locally generated, it is found that authorization code m and authorization code n is differed, you can learn this There is third party's monitoring in call.
Certainly, user C, which is cracked, obtains audio files m, and audio files is substituted for and (given birth to including authorization code n by call key N Into authorization code) audio files, but be due to that audio files is not to be read aloud by user A, the sound not including user A is special Levy, audio files is referred to as into audio files m ', i.e. audio files m ' includes authorization code n content and from the sound for not being user A Sound feature;User B is after the audio files m ' heard, it is found that authorization code is exported with the safety means of oneself in audio files m ' It is consistent, but sound characteristic in audio files m ' is not user A sound characteristic, therefore user B just can determine that this is conversed In there is third party's monitoring.
It can thus be seen that audio files includes the content for the sound characteristic and authorization code for reading aloud authorization code so that use Family can judge whether there is third party's monitoring in communication process according to the two information, it is ensured that the safety of call.
The mode for obtaining call key and authorization code to the key agreement based on ZRTP below is described further, specifically Flow is as follows:
First, the generation of call key:
F1:First safety means send Hello message to the second safety means, and Hello message includes the first safety means Used ZRTP version number, key agreement type, the session identification of the user of key algorithm and the first call terminal ID1;Wherein the key agreement type of ZRTP agreements includes pre-share pattern, media stream pattern and Diffie-Hellman (DH) Pattern;
F2:Second safety means send the response message of Hello message to the first safety means;
F3:Second safety means send Hello message to the first safety means, and Hello message includes the second safety means Used ZRTP version number, key agreement type, the session identification of the user of key algorithm and the second call terminal ID2;Wherein the key agreement type of ZRTP agreements includes pre-share pattern, media stream pattern and Diffie-Hellman (DH) Pattern;
F4:First safety means send the response message of Hello message to the second safety means;
F5:Second safety means send both sides after the response message of Hello message is received, to the first safety means and all propped up The key agreement type and key algorithm held, this sentences key agreement type of selection for exemplified by DH patterns;
F6, the first safety means send the first function information locally generated, wherein first function to the second safety means Information is a power function, and wherein power function can be g^x, and wherein x=svrmodp, wherein svr represent that the secret of respondent takes Value, mod is rounds algorithm, and p is integer;
F7, the second safety means send the second function information locally generated, wherein second function to the first safety means Information is also a power function, and wherein power function can be g^y, and wherein y=svimodp, wherein svi represent the secret of promoter Value, mod is rounds algorithm, and p is integer;
Wherein, g^x is the first negotiation information mentioned above, and g^y is the second negotiation information mentioned above.
And in this example, the first safety chip can obtain the first call key g^xy according to g^x and g^y;, the second peace Full chip can obtain the second call key g^xy according to g^x and g^y.
F8, the first safety means send the first verification message to the second safety means, and the first check information is to following letter Obtained after breath verification, including:Locally whether disclose the first call key, the first call key whether is locally destroyed after call Deng;Key used in wherein verifying is obtained according to the first call key, specifically, the key g^xy that converses first, Session identification ID1, session identification ID2 and a string of character strings are handled, and obtain a key S0, wherein character string is one section of public affairs Open the character string for representation function;Recycle the key derivation algorithm in ZRTP agreements to key S0 processing, used The key calculated in verification;Wherein, key derivation algorithm can be hmac algorithm;
F9, the second safety means send the second verification after having been verified to the first verification message, to the first safety means and disappeared Breath, the second verification message be to being obtained after following information checking, including:It is local whether to disclose the second call key, locally logical Whether second call key etc. is destroyed after words;Key used in wherein verifying is obtained according to the second call key, specifically For, the second call key g^xy, session identification ID1, session identification ID2 and a string of character strings are handled, one is obtained Key S0, wherein character string are that one section of disclosure is used for the character string of representation function;The key derivation in ZRTP agreements is recycled to calculate Method is obtained for verifying the key calculated to key S0 processing;Wherein, key derivation algorithm can be hmac algorithm;
F10, the first safety means send confirmation after the completion of being verified to the second verification message, to the second safety means and disappeared Breath, has completed key agreement.
Two:The producing method of authorization code:
This sentences the first safety means and illustrated to generate exemplified by the first authorization code:
After key S0 is obtained, using key derivation algorithm to S0 processing, one section of character string M is obtained;
Preceding 32 bits are taken to obtain a string of character string m from character string M;
Coded treatment is carried out to character string m, character string m is encoded into visualization character, visualization character is regard as first Authorization code.
Compared with call key is the mode generated on TF cards in the prior art, the system embodiment that the present invention is provided is led to Generation call key is crossed on the safety means independently of call terminal, is reduced during voice encryption by malice on call terminal The possibility of software attacks;And be the safety chip in safety means to generate, the high security based on safety chip, reduce The possibility of call key from stealing, it is ensured that the security of voice encryption;In addition, in voice encryption, in safety chip Encrypted using call key in portion so that call key is called in a security context, it is ensured that the safety of call key makes With.
In voice encryption communication process, safety means point out basis by playing the ciphertext data from call opposite end Authorization code confirms to the ciphertext data played out, realizes the confirmation of the identity information to opposite end of conversing so that user determines Whether someone monitors for this call, improves and the success rate that the third party monitors is recognized in voice call, so as to reduce voice call Monitored possibility, and when user determines that this voice call has third party's monitoring, user can take anti-monitoring in time Safety measure prevent information leakage, improve the safety of data transfer in voice call.
Further, the ciphertext data from call opposite end is played on a security device, reduces malice on call terminal The attack of software, it is ensured that voice call safety.
Any process described otherwise above or method description are construed as in flow chart or herein, represent to include Module, fragment or the portion of the code of one or more executable instructions for the step of realizing specific logical function or process Point, and the scope of the preferred embodiment of the present invention includes other realization, wherein can not be by shown or discussion suitable Sequence, including according to involved function by it is basic simultaneously in the way of or in the opposite order, carry out perform function, this should be of the invention Embodiment person of ordinary skill in the field understood.
It should be appreciated that each several part of the present invention can be realized with hardware, software, firmware or combinations thereof.Above-mentioned In embodiment, the software that multiple steps or method can in memory and by suitable instruction execution system be performed with storage Or firmware is realized.If, and in another embodiment, can be with well known in the art for example, realized with hardware Any one of row technology or their combination are realized:With the logic gates for realizing logic function to data-signal Discrete logic, the application specific integrated circuit with suitable combinational logic gate circuit, programmable gate array (PGA), scene Programmable gate array (FPGA) etc..
Those skilled in the art are appreciated that to realize all or part of step that above-described embodiment method is carried Rapid to can be by program to instruct the hardware of correlation to complete, described program can be stored in a kind of computer-readable storage medium In matter, the program upon execution, including one or a combination set of the step of embodiment of the method.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing module, can also That unit is individually physically present, can also two or more units be integrated in a module.Above-mentioned integrated mould Block can both be realized in the form of hardware, it would however also be possible to employ the form of software function module is realized.The integrated module is such as Fruit is realized using in the form of software function module and as independent production marketing or in use, can also be stored in a computer In read/write memory medium.
Storage medium mentioned above can be read-only storage, disk or CD etc..
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means to combine specific features, structure, material or the spy that the embodiment or example are described Point is contained at least one embodiment of the present invention or example.In this manual, to the schematic representation of above-mentioned term not Necessarily refer to identical embodiment or example.Moreover, specific features, structure, material or the feature of description can be any One or more embodiments or example in combine in an appropriate manner.
Although embodiments of the invention have been shown and described above, it is to be understood that above-described embodiment is example Property, it is impossible to limitation of the present invention is interpreted as, one of ordinary skill in the art is not departing from the principle and objective of the present invention In the case of above-described embodiment can be changed within the scope of the invention, change, replace and modification.The scope of the present invention By appended claims and its equivalent limit.

Claims (9)

1. data handling system in a kind of voice call, it is characterised in that the system includes:
First safety chip, for generating the first negotiation information, first negotiation information is sent extremely by the first communication interface First call terminal;And, the second negotiation information that first call terminal is sent is received by first communication interface; First negotiation information and second negotiation information are calculated, the first call key is obtained;Wherein, first peace Full chip is located in the first safety means, and first safety means are connected with first call terminal, and independently of described First call terminal, second negotiation information is generated by the second safety means of the second call terminal, and first call is close Key is used for the voice call to the user of first call terminal and carries out encryption and decryption operation;
First output module, for exporting the first authorization code, wherein first authorization code be first safety chip according to The first call key generation;Wherein, first output module is located in first safety means, or, it is located at In first call terminal;
First safety chip, is additionally operable to after the second encryption data is received by first communication interface, utilizes institute State the first call key second encryption data is decrypted, obtain the second ciphertext data, the second encryption data bag The user for including the second call terminal that second safety means are obtained reads aloud result to authorization code;
First playing module, for playing second ciphertext data;Wherein, first playing module is located at the described first peace In full equipment, or, in first call terminal;
First reminding module, for pointing out to carry out really second ciphertext data played out according to first authorization code Recognize;Wherein, first reminding module is located in first safety means, or, in first call terminal.
2. system according to claim 1, it is characterised in that
First reminding module, specifically for pointing out to the authorization code in second ciphertext data and first authorization code Whether unanimously confirmed, and the sound characteristic and second call terminal of authorization code are read aloud in second ciphertext data The sound characteristic of user whether unanimously confirmed.
3. system according to claim 1 or 2, it is characterised in that
First output module, specifically for first authorization code is converted into acoustic information, obtains described first and authorizes The acoustic information of code, and play the acoustic information of first authorization code;Or, show first authorization code.
4. system according to claim 1 or 2, it is characterised in that
First reminding module, is additionally operable to prompting and first authorization code is read aloud;
First safety chip, the user for being additionally operable to obtain first call terminal reads aloud knot to first authorization code Really, the first acoustic information is obtained, and first acoustic information is encrypted using the described first call key, is obtained First encryption data, and first encryption data is sent by first communication interface.
5. system according to claim 1 or 2, it is characterised in that
First safety chip, is additionally operable to detect the language of the user of first call terminal in first safety chip After sound end of conversation, the first call key is deleted.
6. system according to claim 4, it is characterised in that
The system also includes:
First voice acquisition module, the user for gathering first call terminal reads aloud knot to first authorization code Really, the first acoustic information is obtained, and sends first acoustic information;Wherein, first voice acquisition module is located at described In first safety means, or, in first call terminal;
First safety chip, specifically for obtaining first acoustic information that first voice acquisition module is sent.
7. system according to claim 5, it is characterised in that
The system also includes:
First voice acquisition module, the user for gathering first call terminal reads aloud knot to first authorization code Really, the first acoustic information is obtained, and sends first acoustic information;Wherein, first voice acquisition module is located at described In first safety means, or, in first call terminal;
First safety chip, specifically for obtaining first acoustic information that first voice acquisition module is sent.
8. system according to claim 1 or 2, it is characterised in that the length of first authorization code is less than described first The length of call key.
9. system according to claim 1 or 2, it is characterised in that first authorization code is used for described in unique mark the One call key.
CN201410208943.3A 2014-05-16 2014-05-16 A kind of data handling system of voice call Active CN103997732B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410208943.3A CN103997732B (en) 2014-05-16 2014-05-16 A kind of data handling system of voice call

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410208943.3A CN103997732B (en) 2014-05-16 2014-05-16 A kind of data handling system of voice call

Publications (2)

Publication Number Publication Date
CN103997732A CN103997732A (en) 2014-08-20
CN103997732B true CN103997732B (en) 2017-09-19

Family

ID=51311709

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410208943.3A Active CN103997732B (en) 2014-05-16 2014-05-16 A kind of data handling system of voice call

Country Status (1)

Country Link
CN (1) CN103997732B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1183685A (en) * 1996-06-28 1998-06-03 株式会社东芝 Encryption decoding method. record reproduction device and record medium
CN101228770A (en) * 2005-07-27 2008-07-23 国际商业机器公司 Systems and method for secure delivery of files to authorized recipients
CN101236581A (en) * 2007-02-01 2008-08-06 北京华大信安科技有限公司 Information safety apparatus and its processing method
CN101420303A (en) * 2008-12-12 2009-04-29 广州杰赛科技股份有限公司 Communication method for audio data and apparatus thereof
CN102098159A (en) * 2010-07-28 2011-06-15 胡旭光 Secret key device and method for mobile phone
CN202231733U (en) * 2011-09-06 2012-05-23 信雅达系统工程股份有限公司 Earphone shield with earphone function
CN102497465A (en) * 2011-10-26 2012-06-13 潘铁军 High-secrecy mobile information safety system and safety method for distributed secret keys
CN102592091A (en) * 2011-12-28 2012-07-18 潘铁军 Digital rights management system and security method based on distributed key
CN102609641A (en) * 2011-12-28 2012-07-25 潘铁军 DRM (digital rights management) system based on distributed keys
CN102647275A (en) * 2011-02-22 2012-08-22 深圳市文鼎创数据科技有限公司 KEY for mobile terminal
CN103457729A (en) * 2012-05-31 2013-12-18 阿里巴巴集团控股有限公司 Safety equipment, service terminal and encryption method

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1183685A (en) * 1996-06-28 1998-06-03 株式会社东芝 Encryption decoding method. record reproduction device and record medium
CN101228770A (en) * 2005-07-27 2008-07-23 国际商业机器公司 Systems and method for secure delivery of files to authorized recipients
CN101236581A (en) * 2007-02-01 2008-08-06 北京华大信安科技有限公司 Information safety apparatus and its processing method
CN101420303A (en) * 2008-12-12 2009-04-29 广州杰赛科技股份有限公司 Communication method for audio data and apparatus thereof
CN102098159A (en) * 2010-07-28 2011-06-15 胡旭光 Secret key device and method for mobile phone
CN102647275A (en) * 2011-02-22 2012-08-22 深圳市文鼎创数据科技有限公司 KEY for mobile terminal
CN202231733U (en) * 2011-09-06 2012-05-23 信雅达系统工程股份有限公司 Earphone shield with earphone function
CN102497465A (en) * 2011-10-26 2012-06-13 潘铁军 High-secrecy mobile information safety system and safety method for distributed secret keys
CN102592091A (en) * 2011-12-28 2012-07-18 潘铁军 Digital rights management system and security method based on distributed key
CN102609641A (en) * 2011-12-28 2012-07-25 潘铁军 DRM (digital rights management) system based on distributed keys
CN103457729A (en) * 2012-05-31 2013-12-18 阿里巴巴集团控股有限公司 Safety equipment, service terminal and encryption method

Also Published As

Publication number Publication date
CN103997732A (en) 2014-08-20

Similar Documents

Publication Publication Date Title
CN103973696B (en) A kind of data processing method of voice call
CN102547502B (en) Headset, headset use control method and terminal
CN104065648B (en) A kind of data processing method of voice call
US20110217950A1 (en) Apparatus & method to improve pairing security in Bluetooth™ headsets & earbuds
CN103905188B (en) Utilize the method and intelligent cipher key equipment of intelligent cipher key equipment generation dynamic password
CN101345965A (en) Encryption call method based on speech code stream and mobile terminal
CN107277745A (en) Blue tooth voice contrast means and method
CN101809955A (en) Flash pairing between bluetooth devices
CN103974243B (en) A kind of data handling system of voice call
CN103986711B (en) A kind of data processing method of voice call
CN103974242B (en) A kind of data processing method of voice call
CN106506828A (en) Limit the way of recording, device and portable mobile termianl
WO2015032255A1 (en) Intelligent key device, mobile terminal and dynamic password output method and system
CN104468979A (en) Number password input method resistant to peeping and attacking based on voice prompt
CN104065649B (en) A kind of data processing method of voice call
CN103986712B (en) A kind of data processing method of voice call
CN103997732B (en) A kind of data handling system of voice call
CN104080080B (en) A kind of data handling system of voice call
CN202150861U (en) Digital certificate safety lock apparatus and digital certificate authentication system
CN103986579B (en) A kind of data handling system of voice call
CN104065650B (en) A kind of data handling system of voice call
CN104765538B (en) A kind of information processing method and terminal
CN103987036B (en) A kind of data handling system of voice call
CN104038932B (en) A kind of safety equipment
CN106331379A (en) Communication security method and device and portable mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant