Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption parameter transmitting method of wireless communication terminal equipment

An encryption parameter and wireless terminal technology, applied in the field of wireless communication, can solve the problems of occupying encryption parameters, affecting voice restoration, unable to restore voice data, etc., to achieve the effect of improving security performance and high confidentiality

Active Publication Date: 2013-11-20
ZHEJIANG HUATU MICROCHIP TECH CO LTD
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the process of voice encryption by communication terminals using the DMR standard or other similar double-slot TDMA standards, a part of the effective voice load is needed when transmitting encryption and decryption algorithm parameters end-to-end
There are two weaknesses in this processing: 1, because these encryption parameters occupy a certain effective voice load, that is, occupy such as Figure 5 , the bit information transmission encryption parameter in the voice ciphertext (108) shown in 6, therefore needs to cover certain voice data, can influence voice quality to a certain extent; 2, also owing to needing to cover certain voice data, to needing The bit width of the transmitted encryption parameters has a certain limit, otherwise it will seriously affect the restoration of the voice, and even the voice data cannot be restored in severe cases. Therefore, this transmission method limits the transmission bit width of the encryption parameters, which cannot be used for the transmission of complex encryption parameters. accomplish

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption parameter transmitting method of wireless communication terminal equipment
  • Encryption parameter transmitting method of wireless communication terminal equipment
  • Encryption parameter transmitting method of wireless communication terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Compared with a large number of analog point-to-point or trunked intercom communications currently in use, digital communication equipment supports high-security voice and data encryption in addition to high language clarity, high spectrum utilization, and convenient data service functions. Functionality is one of the more prominent and valuable features out there. Utilizes various encryption algorithms recognized as the safest, such as AES, ARC4 and DES, etc., to make the communication process more confidential. However, in the voice encryption process of the communication terminal adopting the DMR standard or other similar double-slot TDMA standards, a part of the effective voice load is required to transmit the encryption and decryption algorithm parameters end-to-end. There are two weaknesses in this processing: 1. Since these encryption parameters occupy a certain amount of effective voice load, a certain amount of voice data needs to be covered, which affects the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encryption parameter transmitting method of wireless communication terminal equipment. The method comprises a process that a wireless digital mobile terminal initiates encrypted voice communication during a certain independent time slot among TDMA (Time Division Multiple Address) time slots and a process that a double time slot wireless mobile terminal receives the encrypted voice communication during a certain independent time slot among the TDMA time slots. By adopting the method, the existing voice load channels are not occupied, restrictions on encryption parameter bit width are also reduced, so that an encryption method with better voice quality and higher security can be provided, and further the safety performance of the double time slot terminal equipment is improved.

Description

technical field [0001] The patent of the present invention relates to the field of wireless communication, in particular to a method for solving the problem of DMR communication system realizing voice dynamic addition. Background technique [0002] DMR is a European private network wireless communication standard promulgated by the European Telecommunications Standards Institute (ETSI), which adopts a frame structure of double-slot time-division multiple access. This standard is a new all-digital professional wireless communication standard with advanced technology. Compared with a large number of analog point-to-point or cluster intercom communications currently in use, the wireless digital communication terminal equipment adopting this standard not only has the characteristics of high language clarity, high spectrum utilization rate and convenient data service functions, but also supports high security. The voice and data encryption feature is one of the more prominent an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02H04W12/04H04L1/00H04W12/03H04W12/041H04W12/0433
Inventor 蔡锦恩谢国军王志雄
Owner ZHEJIANG HUATU MICROCHIP TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products