Method for realizing end-to-end phonetic encryption

A voice encryption and voice technology, applied in the field of encrypted transmission, can solve the problems of affecting the transmission efficiency of the system, the reduction of single-frame coding efficiency, and the increase of redundant data, so as to improve transmission efficiency, reduce coding overhead, and reduce redundant data. Effect

Inactive Publication Date: 2009-01-28
HUAWEI TECH CO LTD
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be seen that when the speech coding rate is low, there are too many padding bits, which will reduce the coding efficiency of a single frame and increase redundant data, which greatly wastes system resources and affects the transmission efficiency of the system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing end-to-end phonetic encryption
  • Method for realizing end-to-end phonetic encryption
  • Method for realizing end-to-end phonetic encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The core idea of ​​the present invention is: before encoding, multiple single frames are combined, and then the encrypted frames are sent to the encoder for speech encoding and encryption. When realizing the combination of multiple single frames, multiple single frames of fixed length can be combined together, and filling bits can be supplemented in each single frame; multiple single frames of different lengths can also be combined together, Filling bits are added after the frame.

[0027] The method for realizing end-to-end voice encryption in the present invention is as follows: figure 2 shown, including the following steps:

[0028] Step 201: When performing voice transmission between two mobile terminals, before encoding and encrypting the voice data, the sending end first determines the reference encryption length according to the encrypted data length required by the current communication system;

[0029] Step 202: Then, combine all the single frames to be sent...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for realizing voice enciphering from end to end includes confirming reference enciphering length before encipher is carried out for voice data at sending end, then integrating all single frame to be sent by current I P pack in sending sequence to be one frame; carrying out voice coding for integrated frame data and using confirmed enciphering length as unit to encipher integrated frame data; finally sending coded - enciphered data to the opposite end.

Description

technical field [0001] The invention relates to encrypted transmission technology, in particular to a method for realizing end-to-end voice encryption in a mobile communication system. Background technique [0002] As we all know, in the process of communication transmission, it is very important to save resource occupation and ensure security. In order to realize VOIP service on the current Code Division Multiple Access / General Packet Radio Service (CDMA / GPRS) network, the speech coding bandwidth is required to be as low as possible; During voice encryption, it is required that the data length of each voice frame must be greater than a certain encoding length. For example, the data length of a voice frame requiring block encryption algorithm must be greater than 128 bits to ensure security. In order to simplify the encryption processing of the mobile terminal, the length of the encrypted data is generally kept fixed, for example, the length of a single frame is fixed as P ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G10L19/00H04L29/06H04L9/00
Inventor 赵建国谢国军漆宝剑
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products