Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

End-to-end speech encryption method for low-speed narrowband wireless digital communication

A voice encryption, digital communication system technology, applied in the field of digital mobile communication systems, can solve the problems of low communication rate, voice quality degradation, affecting user experience, etc., to ensure continuity, improve synchronization efficiency, and avoid voice interruption.

Active Publication Date: 2012-04-04
THE FIRST RES INST OF MIN OF PUBLIC SECURITY +2
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Obviously, the DMR system cannot directly apply the end-to-end voice encryption synchronization mechanism in the TETRA standard
There are two reasons: (1) The communication rate of the DMR system is lower than that of the TETRA system, a CSBK signaling can only carry 80bits of information, and even a 30ms time slot cannot carry the 119bits synchronization control information in the TETRA system; (2) Misappropriating a 30ms time slot in the DMR system means that the voice is interrupted for 60ms, while in TETRA it is only interrupted for 30ms, which will significantly reduce the voice quality and affect the user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • End-to-end speech encryption method for low-speed narrowband wireless digital communication
  • End-to-end speech encryption method for low-speed narrowband wireless digital communication
  • End-to-end speech encryption method for low-speed narrowband wireless digital communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] Embodiment 1: The present invention relates to an end-to-end voice encryption method suitable for low-speed narrowband wireless communication systems, and can be applied to digital mobile communication systems of various systems. Here, the DMR digital trunking system is taken as an example for illustration.

[0045] 1) End-to-end encrypted speech coding scheme

[0046] When communicating in plain language, the DMR system uses a voice coding algorithm with a code rate of 2.4Kbps. When using end-to-end voice encryption, in order to transmit the voice frame sequence number, the present invention needs to occupy 15 bits in the 60ms voice frame. In this way, the data length after 60ms speech encoding needs to be shortened to 129bits, that is, the actual speech encoding rate is reduced to 2.15Kbps when end-to-end encryption is adopted. Speech frame structure for end-to-end encryption, such as figure 1 shown.

[0047] The 15bit voice frame sequence number can support a cal...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an end-to-end speech encryption method for a low-speed narrowband wireless digital communication system; the main idea of the method is that synchronous control information during the process of one call is divided into two parts one of which is not changed during the whole call process and the other one of which is changed constantly along with a speech frame, wherein the unchanged part is sent by a control signalling and the changed part is sent together along with speech data. Therefore, the synchronous control information required to be frequently sent is effectively decreased. A synchronous mechanism of the invention has the advantages that (1) a problem on speech interruption is avoided so as to guarantee the coherent speech, (2) as a legitimacy validation is not required to be frequently carried out on the synchronous control information during the call, the synchronous efficiency is effectively improved, (3) the situation of failing to decrypt a plurality of continuous speech frames is avoided, and (4) a problem resulted from the limited bearing capacity of the low-speed narrowband wireless digital communication system is solved.

Description

technical field [0001] The invention belongs to the communication field, and relates to an end-to-end voice encryption method for a low-speed narrowband wireless digital communication system, which can be applied to digital mobile communication systems of various systems. Background technique [0002] The main idea of ​​end-to-end voice encryption is: the voice is encrypted at the sending end and decrypted at the receiving end, so as to ensure that the voice does not exist in plain text in the device node between the calling party and the called party. [0003] The stream cipher algorithm is very suitable for end-to-end voice encryption with high real-time requirements due to its advantages of no error diffusion and pre-computation. During the use of the stream cipher algorithm, both the calling party and the called party must be synchronized to implement encryption and decryption correctly, that is, both the calling party and the called party use the same key stream to encr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04B7/26
Inventor 朱振荣周昕陈妍蒋庆生王为民钱志红
Owner THE FIRST RES INST OF MIN OF PUBLIC SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products