End-to-end voice encryption communication method and device for mobile terminals

A voice encryption and mobile terminal technology, applied in the field of mobile communication, can solve problems such as wiretapping of calls, information leakage, fake base station fraud, etc., and achieve the effect of increasing privacy, simple structure and reasonable design

Inactive Publication Date: 2016-04-06
ZHEJIANG TECHAIN ELECTRONICS TECH CO LTD
View PDF7 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Various backdoor incidents occur frequently in general-purpose operating

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • End-to-end voice encryption communication method and device for mobile terminals
  • End-to-end voice encryption communication method and device for mobile terminals
  • End-to-end voice encryption communication method and device for mobile terminals

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] see Figure 2 to Figure 3 , the method for the mobile terminal end-to-end voice encryption call of the present embodiment, the steps are as follows:

[0029] 1) A / D data acquisition: the input voice call signal is converted by A / D, encoded by PCM, and divided into voice frames of fixed duration according to the mobile communication standard;

[0030] 2) Encryption: the key is dynamically obtained through the operation of the access station 121 (AP), and then the key is sent to the encryption unit 122 to encrypt the voice frame;

[0031] 3) Modulation: Design the modulator according to key parameters such as voicing judgment, gain, pitch frequency, and speech synthesis filter coefficient to synthesize encrypted data into speech signals;

[0032] 4) Vocoder processing and base station transmission: the mobile communication vocoder performs encoding, encryption and other processing on the synthesized voice signal, and transmits it from the terminal to the base station aft...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an end-to-end voice encryption communication method and an end-to-end voice encryption communication device for mobile terminals. The method comprises the following steps of A/D data collection, specifically including dividing input voice communication signals into voice frames with fixed length by A/D conversion; encryption, specifically including dynamically obtaining a key through operation of an access point, and then encrypting the voice frames; modulation, specifically including synthesizing encrypted data into voice signals by a modulator; vocoder processing and base station transmission, specifically including performing coding, encryption and other treatments on the synthesized voice signals by a mobile communication vocoder, after coding, sending to a base station by a terminal through a cell channel, and then transmitting to a receiving terminal by the base station; demodulation, specifically including demodulating the voice signals into encrypted voice frames by a demodulator; and decryption, specifically including decrypting the encrypted voice frames according to the algorithm and key appointed by two parties in an end-to-end manner. The end-to-end voice encryption communication method and device for mobile terminals is simple in structure, reasonable in design, capable of implementing based on the inherent coding/decoding and encryption algorithm of the mobile communication protocol, and low in distortion rate, and can pass through the voice data authenticity detection of the base station.

Description

technical field [0001] The invention relates to a method and a device for an end-to-end voice encrypted conversation of a mobile terminal, belonging to the field of mobile communication. Background technique [0002] With the advent of the information age, more and more smart mobile terminals have the functions of the original computer, and the security problems of smart mobile terminals are becoming more and more prominent. Various backdoor incidents of general-purpose operating systems occur frequently, information leaks, calls are tapped, and fake base stations are defrauded. High-end special users have increasingly strong demands for smart mobile terminals with functions of secure calls and security systems. [0003] At present, the existing encryption scheme is based on the AMR code for encryption. After the signal is encrypted, it is no longer a voice signal. Some standard base stations will detect the authenticity of the voice signal. When a non-voice signal is detec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0457H04L63/0478
Inventor 赵建国胡俭波
Owner ZHEJIANG TECHAIN ELECTRONICS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products