Method for implementing end-to-end cross-base-station transmission of encryption voice of analog cluster system

A technology for encrypted voice and trunking systems, applied in the usage of multiple keys/algorithms, security devices, electrical components, etc., can solve problems such as inconvenience of use and affect the quality of communication transmission, and achieve the effect of reducing bit errors

Active Publication Date: 2012-04-18
成都三零瑞通移动通信有限公司
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the technical problems existing in the prior art that all encrypted terminal keys of the system must be the same, resulting in inconvenient use and the accumulation of code errors affecting the quality of communication transmission, a method for implementing end-to-end encrypted voice cross-base station transmission in an analog trunking system is provided.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing end-to-end cross-base-station transmission of encryption voice of analog cluster system
  • Method for implementing end-to-end cross-base-station transmission of encryption voice of analog cluster system
  • Method for implementing end-to-end cross-base-station transmission of encryption voice of analog cluster system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] The specific implementation manners of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0013] The invention discloses a method for implementing end-to-end encrypted voice cross-base station transmission in an analog trunking system, which specifically includes the following steps: a sending terminal encrypts A / D sampled and voice coded data and then transmits it to a near-end base station; After digital demodulation, wireless channel decoding and decryption of the received data, the terminal base station takes out effective voice code data; the near-end base station encrypts the voice code data and selects a channel coding method suitable for the characteristics of the wired channel for wired channel coding The above-mentioned channel coded data is modulated by the cable modem and then transmitted to the remote base station through the wired link between the base stations. After receiving the signal, the remote bas...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of secret communication of a communication technology and discloses a method for implementing end-to-end cross-base-station transmission of an encryption voice of an analog cluster system. The method comprises the following steps that: a sending terminal encrypts acoustic code data and then transmits the encrypted acoustic code data to a near-end base station; the near-end base station decrypts the acoustic code data and then extracts the effective acoustic code data; the near-end base station encrypts the acoustic code data and codes the acoustic code data by selecting a channel coding mode which is matched with the characteristic of a wired channel; and a wired modem modulates the data which is subjected to channel coding, and the near-end base station transmits the data to a far-end base station. By adoption of the method, the defect of the conventional communication mode is overcome, accumulation of error codes generated in an uplink/downlink wireless channel and the wired channel can be effectively avoided, the error codes caused by transmission can be reduced as greatly as possible, influence on the safety of the system caused by out-of-control encryption terminals can be reduced within a range of base stations, and the situation that keys of all encryption terminals in a full cluster network are required to be replaced is avoided.

Description

technical field [0001] The invention relates to the category of secure communication of communication technology, specifically a method for realizing encrypted voice end-to-end transmission of encrypted terminals in a multi-base station analog cluster system. Background technique [0002] When the analog trunking system terminal calls across base stations, the voice transmission from one end to the other needs to go through two channels, namely the wireless channel between the terminal and the base station and the wired channel between the base stations, such as figure 1 The schematic diagram of the structure of the wireless channel between the terminal and the base station and the wired channel between the base station is shown. The wireless channel is a VHF / UHF analog channel, which transmits analog voice after FM modulation; the wired channel is generally an audio cable or an optical fiber link, which transmits PCM voice. Both wireless and wired channels are bandwidth-li...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04L9/14
Inventor 王驭赵建平
Owner 成都三零瑞通移动通信有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products