Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Voice communication information source encryption system for mobile terminal

A mobile terminal and voice communication technology, applied in wireless communication, transmission systems, electrical components, etc., can solve the problems of easy intrusion and deciphering of system security vulnerabilities, increased operating costs, easy hijacking or tampering, etc.

Inactive Publication Date: 2018-03-09
河南芯盾网安科技发展有限公司
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Existing mobile communication encryption schemes include VOIP encryption schemes, channel encryption schemes, source scrambling schemes, etc., but these schemes have many disadvantages, such as: limited to encrypted communications between devices of the same standard or the same model; their base stations And background servers need to be modified uniformly, increasing high operating costs, long development time cycle, heavy workload, unable to adapt to multiple mobile device systems, platforms and manufacturers; the software process of mobile terminal devices needs to be changed, and the underlying interface must be opened. It is easy to be hijacked or tampered with, resulting in system security vulnerabilities of the mobile device itself being easily invaded and deciphered

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Voice communication information source encryption system for mobile terminal
  • Voice communication information source encryption system for mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention will be further described in detail below in conjunction with the accompanying drawings, so that those skilled in the art can implement it with reference to the description.

[0026] Such as figure 1 with figure 2 As shown, the present invention provides a voice communication source encryption system for a mobile terminal, the mobile terminal has a voice collector and a voice player, and the voice communication source encryption system is set on the mobile terminal, including: A digital converter, which is used to convert the audio analog signal generated by the voice collector into audio data, or is used to convert audio data encoded by a class of speech into an audio analog signal; data encryption and decryption and a class speech modem, It includes a voice digital codec module, a security kernel module and a voice-like modulation and demodulation module, wherein the voice digital codec module is used to perform digital voice compression on the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a voice communication information source encryption system for a mobile terminal, comprising an analog-digital converter and a data encryption and decryption and phonological modem, wherein the analog-digital converter is used for converting an audio analog signal generated by a voice collector into voice data, or used for converting the audio data undergoing phonological encoding into an audio analog signal; the data encryption and decryption and phonological modem comprises a voice digital coding and decoding module, a security kernel module and a phonological modulation and demodulation module, wherein the voice digital coding and decoding module is used for performing digital voice compression on the converted audio data, the security kernel module is used for performing digital hardware encryption on the audio data subjected to digital voice compression, and the phonological modulation and demodulation module is used for performing phonological encoding onthe audio data subjected to digital hardware encryption. According to the invention, under the condition of not changing the voice communication procedure of the existing mobile terminal, voice communication information source encryption of the mobile terminal is realized, the encryption security is high, and the applicability is wide.

Description

technical field [0001] The invention relates to a voice encryption method for mobile communication, in particular to a voice communication information source encryption system for a mobile terminal. Background technique [0002] Existing mobile communication encryption schemes include VOIP encryption schemes, channel encryption schemes, source scrambling schemes, etc., but these schemes have many disadvantages, such as: limited to encrypted communications between devices of the same standard or the same model; their base stations And background servers need to be modified uniformly, increasing high operating costs, long development time cycle, heavy workload, unable to adapt to multiple mobile device systems, platforms and manufacturers; the software process of mobile terminal devices needs to be changed, and the underlying interface must be opened. It is easy to be hijacked or tampered with, resulting in system security holes of the mobile device itself being easily invaded...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04W12/02
CPCH04L63/0428H04W12/02H04L65/762
Inventor 刘浩庞潼川杨成功
Owner 河南芯盾网安科技发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products