Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Linux operation system based voice communication method with CPK authentication

An operating system and voice communication technology, applied in the field of information security, can solve problems such as hidden dangers that are easily deciphered and cannot be changed, and achieve the effect of huge authentication capacity, ensuring security, and eliminating traces of operation.

Inactive Publication Date: 2011-06-22
SICHUAN YIHENG TECH DEV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, "A Method for Realizing End-to-End Voice Encryption" disclosed in Chinese Patent Publication No. CN 1681003A, this encryption method adopts a customized key method for encryption. Hidden danger of being deciphered

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Linux operation system based voice communication method with CPK authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] figure 1 Is the flow schematic block diagram of this method

[0023] see figure 1 , in this embodiment, a mobile phone is taken as an example. In the figure, 1 is a microphone, 2 is an analog-digital converter (A / D), 3 and 6 are ARM9 microprocessors, 4 and 5 are communication modules, 7 is a digital-analog converter (D / A), 8 for the receiver. Both are existing components of mobile phones. The method embeds a Linux operating system and a CPK trusted authentication system in a microprocessor.

[0024] The voice sending process is as follows:

[0025] 1. The microphone 1 at the sending end converts the sound signal into an analog electrical signal, and the voice analog electrical signal is continuously sampled at a rate of 44.1KHz and passed to the analog-to-digital converter 2 in the microprocessor 3, which is converted by analog-to-digital Device 2 continuously digitizes the analog voice to form a data stream, and the Linux operating system packs the data stream in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The speech communication method with CPK certification based on Linux comprises: 1. using an ADC to obtain data flow from speech, dividing serial data block as CPK certification standard, and compressing data; 2. generating key in Linux OS to encipher the compressed data block, coding the key by CPK to form a mark head; 3. writing the mark head into the enciphered data to form new speech data block; 4.transmitting data to network; 5. decoding the CPK certification to extract key on terminal; 6. deciphering the speech data with the key; 7. decompressing the deciphered data to recover into transparent speech data; and 8. transmitting data to a DAC for conversion, and sending to terminal. This invention is fit to different file.

Description

technical field [0001] The invention relates to information security technology, in particular to the security authentication technology of voice communication under the network environment. Background technique [0002] With the rapid development of electronic communication products in recent years, especially the rapid development of Internet technology, various voice communication electronic products (such as: fixed phones, mobile phones, PDAs, walkie-talkies and various network communication terminals) continue to emerge to people's work. And life has brought great convenience. However, people's requirements for such products are also constantly improving, especially making the security of voice communication more and more valued by the majority of users. In order to improve the security of voice communication, some existing voice communication products also adopt some security measures. A more common method is to use a custom key based on the Windows operating system....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/18H04L9/32
Inventor 南相浩赵广宇彭旭赵建国林容生
Owner SICHUAN YIHENG TECH DEV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products