Method and device for achieving voice encryption based on DMR (Digital Mobile Radio) standard

A voice encryption and standard technology, applied in the electronic field, can solve the problem of inability to perform voice encryption, and achieve the effect of improving user experience and security performance.

Active Publication Date: 2017-06-20
AUCTUS TECH CO LTD
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The invention provides a method and device for implementing voice encryption based on the DMR stand

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for achieving voice encryption based on DMR (Digital Mobile Radio) standard
  • Method and device for achieving voice encryption based on DMR (Digital Mobile Radio) standard
  • Method and device for achieving voice encryption based on DMR (Digital Mobile Radio) standard

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0047] refer to image 3 , image 3 A flowchart of a method for implementing voice encryption based on the DMR standard provided by the first embodiment of the present invention, the method includes:

[0048] S301. Send a first key or a second key corresponding to a preset encryption type through PDU signaling, where the second key is a key generated according to a generation rule agreed with the other party according to the first key ;

[0049] S302. Send a data burst, where the data burst carries the encryption type;

[0050] S303. Send a voice burst, where the voice burst carries voice data encrypted by the second key.

[0051] Take the following two types of encryption as an example: the first type that uses a fixed call key for encryption, and the second type that updates the call key before each call and uses the updated call key to encrypt the call. The first type of value means that all calls use the same key within a period of time, and the second type means that ...

no. 2 example

[0070] In this embodiment, the first type of encryption method is used for voice encryption. refer to Figure 5 , the method for implementing voice encryption based on the DMR standard mainly includes:

[0071] S501. Acquire a first key and a second key corresponding to the first type in the following manner.

[0072] The 32-byte key input by the user is used as the first key, and the AES algorithm is performed with the preset 32-byte first character string to obtain the 32-byte second key.

[0073] S502. Send the second key generated in step S501 to the other party through PDU signaling.

[0074] If it is a single call, the second key is added to the Target address of the PDU signaling for transmission;

[0075] If it is a group call, the second key is added to the Group address of the PDU signaling for transmission.

[0076] After the second key is sent to the other party, the other party saves it. The second key can be used for all calls between the two parties within a...

no. 3 example

[0084] In this embodiment, the second type of encryption is used for voice encryption. refer to Figure 6 , the method for implementing voice encryption based on the DMR standard mainly includes:

[0085] S601. Acquire a first key and a second key corresponding to the second type in the following manner.

[0086] Cycle the preset 3-byte variable key in byte order to determine the first key for this call;

[0087] XORing the first key and the 32-byte key input by the user;

[0088] Perform the AES algorithm on the XOR result and the preset second character string of 32 bytes to obtain a 32-byte key as the second key of this call.

[0089] S602. Send the first key obtained in step S601 to the other party through PDU signaling.

[0090] If it is a single call, the first key is added to the Target address of the PDU signaling for transmission;

[0091] If it is a group call, the first key is added to the Group address of the PDU signaling for transmission.

[0092] Preferabl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a device for achieving voice encryption based on the DMR (Digital Mobile Radio) standard. The method comprises steps of sending a first secret key and a second secret key corresponding to a preset encryption type through a PDU signaling, the second secrete key being a secret key generated in accordance with the generation rule agreed by the first key with the other party; sending data burst which carries the encryption type; and sending voice burst which carries voice data encrypted by the second secret key. The invention provides at least two voice encryption methods based on the PDU signaling format in the DMR standard, one is to use the same secret key in all conversations within a period, and the other is to use a different secret key for each conversation, namely, one secret key for one conversation. Therefore, the product safety performance can be improved, and the user experience is improved.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a method and device for realizing voice encryption based on the DMR standard. Background technique [0002] DMR (Digital Mobile Radio) digital trunking communication standard is an open standard designed and formulated by ETSI (European Telecommunications Standards Institute) for the needs of mobile communication. It defines the sequence of data burst and voice burst for voice transmission, the format of PDU (Protocol Data Unit, protocol data unit), the format of data burst, the format of voice burst, and the embedded signaling (embedded signaling) format and delivery time. Send a data burst (signaling burst) before starting to send a voice burst, the Data Type of the data burst = 0x01 (Voice LC Header), and the PDU of the data burst is UU_V_Ch_Usr (single call, Unit to Unit Voice Channel User LC PDU) or Grp_V_Ch_Usr (group call, Group Voice Channel User LC PDU), figure 1 ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04W12/02
CPCH04L63/0428H04W12/02
Inventor 蔡东志
Owner AUCTUS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products