Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for encrypting telephone

A telephone and telephone technology, applied in the field of telephone communication security, can solve the problems of low security, easy to be decrypted, and high cost, and achieve the effects of solving low security and overcoming complex structure and high cost.

Inactive Publication Date: 2011-05-18
长春卓尔信息安全产业股份有限公司
View PDF1 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The invention discloses a method for telephone encryption, which not only solves the disadvantages of low security and easy decryption of the conventional voice modulation encryption method, but also overcomes the disadvantage of complex structure and high cost of digital encryption technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for encrypting telephone
  • Method and device for encrypting telephone
  • Method and device for encrypting telephone

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] according to figure 2 As shown, the sound signal from the microphone is sent to the TxIN pin of the MX224 in the sending state to convert the frequency of the voice, and the encrypted signal is output through TxOUT, and then sent back to the microphone terminal of the phone host. When answering, the encrypted voice comes out from the handset terminal of the main body of the telephone, and is sent to the RxIN pin of the MX224 in the receiving state. After decryption, it is output to the handset terminal on the handle through the RxOUT pin. The password selection circuit is mainly composed of a five-digit DIP switch, which is connected to two MX224s. Its function is to provide an appropriate logic level for the five-digit data lines A0 to A4, and determine the selected password scheme. The state control circuit is connected to the C / S terminals of two MX224, the high level is the encrypted state, and the low level is the unencrypted state, to realize the state transition...

Embodiment 2

[0025] according to image 3 As shown, the password selection circuit is 5 switches. A0-A4 of the MX224 have internal pull-up resistors, which are high when the switch is open and low when the switch is closed. Use the 5-bit DIP switch to realize the function of manually setting the password.

[0026] The state control circuit uses two NAND gates to connect into an R-S flip-flop, and its R input terminal is grounded through a button switch and a capacitor in parallel, and the S terminal is grounded through the other. This flip-flop is low level triggered. If the switch connected to R is pressed, the trigger output terminal Q will be sent to the C / S terminals of the two MX224s at a high level, and it will be set to an unencrypted state. The flip-flop still maintains a high level output after the switch is turned off. On the contrary, when the switch connected to S is pressed, the trigger output terminal Q will be sent to the C / S terminals of the two MX224s at a low level, a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for encrypting a telephone and provides an encrypting device realizing the method. The method comprises the steps of: respectively serially connecting a frequency phase inverter with a fission point among a microphone of the telephone, a telephone receiver and a telephone main machine, respectively carrying out frequency conversion encryption on a voice signal of the microphone and then sending the voice signal through the telephone main machine, and carrying out frequency conversion on the encrypted voice signal received by the telephone receiver to finish the decryption processing. An encryption method for carrying out frequency domain conversion on the voice signal is adopted in the invention, analog signal processing but not digital signal processing is adopted, thus no delay exits in a voice encrypting process, the defects of low safety and easiness of decryption in the traditional voice modified tone encrypting method are overcome, and the defects of complicated structure and high cost of the digital encrypting technology are overcome.

Description

technical field [0001] The invention relates to an encryption method for a telephone set, and also provides an encryption device for realizing the method, which belongs to the technical field of telephone communication security. Background technique [0002] The continuous development and popularization of communication technology has brought more and more convenience to people's work and life. But at the same time, it also brings some troubles to people. For example, incidents of personal information being stolen continue to occur, and some even constitute serious cases. Ways of information theft include misappropriation of personal documents, misappropriation of network information and misappropriation of telephone information. [0003] In order to prevent the telephone from being tapped and ensure the information security in the telephone communication, various telephone encryption devices have been produced one after another. The device designed for this purpose has a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/68
Inventor 张金毅张婉莉李忠良赵红经王喆程亚男
Owner 长春卓尔信息安全产业股份有限公司