Method and device for end-to-end ciphering voice

A technology of voice encryption and encryption device, applied in the direction of selection device, electrical components, anti-eavesdropping circuit, etc., can solve problems such as voice encryption, and achieve the effect of simple implementation, communication security, and easy implementation.

Active Publication Date: 2008-12-24
CHINA TELECOM CORP LTD
View PDF0 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the mobile network only provides voice encryption processing in the wireless transmission pa

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for end-to-end ciphering voice
  • Method and device for end-to-end ciphering voice
  • Method and device for end-to-end ciphering voice

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The technical solutions of the present invention will be described in further detail below with reference to the accompanying drawings and embodiments.

[0036] Such as figure 1 As shown, it is a schematic flow chart of an embodiment of the end-to-end voice encryption method of the present invention. In this embodiment, the end-to-end voice encryption process includes the following steps:

[0037] Step 101, the first mobile terminal in the call state sends the DTMF signal input through the key to the second mobile terminal at the other end of the call, and obtains the corresponding key index information according to the key interruption of the key input, and then obtains the corresponding key index information from its own The key storage area extracts the corresponding key;

[0038] Step 102, after establishing an encrypted conversation channel, the first mobile terminal conducts an encrypted conversation with the second mobile terminal according to the key.

[0039...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an end-to-end voice encryption method. The method comprises the following steps: a first mobile terminal in a connected status sends a dual tone multi-frequency signal input by a key to a second mobile terminal at the other end of communication, obtains corresponding key index information according to key interruption input by the key, and then extracts the corresponding key from a key storage area of the first mobile terminal; after a secret communication channel is established, the first mobile terminal performed encrypted communication with the second mobile terminal according to the key. The invention also relates to an end-to-end voice encryption device. The corresponding key can be extracted so as to provide the voice encryption service in the mobile network through the key index method of DTMF transmission and based on the specific mobile terminal. Therefore, the security of the voice communication can be provided for users.

Description

technical field [0001] The invention relates to the field of mobile communication security, in particular to an end-to-end voice encryption method and device. Background technique [0002] With the wide application of mobile communication technology, the flexibility and convenience brought by mobile network are changing our life. The application of mobile communication network involves huge economic interests of individuals and society, so communication security is a key factor in the development of mobile network application. [0003] In existing mobile communication systems, voice streams of civilian mobile terminals are mostly not encrypted. Such as: GSM, WCDMA, CDMA2000, etc., their circuit switching networks are all designed for non-encrypted telephones, and the mobile switching center in the mobile network is only responsible for communication control and voice switching. At present, the mobile network only provides voice encryption processing in the wireless transmi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04M1/68H04Q7/32H04B1/38
Inventor 龙彪李宝荣杨维忠孙宇张琳峰林奕琳林衡华肖海
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products