Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encrypted communication method for LTE (Long Term Evolution) bearing narrowband voice coding

A technology of encrypted communication and voice coding, which is applied in the field of communication, can solve the problems of reducing the quality of voice QoS, destroying the integrity of voice data, affecting the anti-error ability and QoS quality of voice data, and achieving the effect of improving QoS quality

Active Publication Date: 2021-05-28
CHENGDU TD TECH LTD
View PDF14 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this encryption method, since the useful information bit of the voice frame needs to be diverted, the integrity of the voice data is destroyed, so that the voice data corresponding to the useful information bit is missing for the receiving end, that is, the receiving end cannot receive this part of the useful information. The voice data corresponding to the information bit, thus affecting the anti-error capability and QoS quality of the voice data
[0011] In the voice service scenario, the LTE trunking system can support the narrowband speech coding format and the end-to-end encrypted communication of the narrowband speech coding, and the air interface capability is not limited similarly to the narrowband system; the LTE terminal supports the end-to-end narrowband speech coding When encrypting, if the voice frame sequence number of the end-to-end encryption is also carried by embezzling the information bits of the voice frame, the QoS quality of the voice will still be reduced in the case of excess air interface resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypted communication method for LTE (Long Term Evolution) bearing narrowband voice coding
  • Encrypted communication method for LTE (Long Term Evolution) bearing narrowband voice coding
  • Encrypted communication method for LTE (Long Term Evolution) bearing narrowband voice coding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to make the purpose, technical solutions and advantages of the present application clearer, the present application will be further described in detail below with reference to the accompanying drawings and examples.

[0046] Figure 4 It is a schematic flow diagram of the method of the embodiment of the present invention, such as Figure 4 As shown, the encrypted communication method of the LTE bearer narrowband speech coding realized by this embodiment mainly includes the following steps:

[0047] Step 401, the terminal notifies the network side of the end-to-end encryption support capability information of its own narrowband speech coding communication in advance; the end-to-end encryption support capability information is used to indicate whether the terminal supports end-to-end encryption and the supported An encryption method, the encryption method includes an encryption method that embezzles information bits and an encryption method that does not embezzl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encryption communication method and system for LTE bearing narrowband voice coding. The method comprises the steps: a terminal notifies a network side of the end-to-end encryption support capability information of the narrowband voice coding communication of the terminal in advance; the end-to-end encryption support capability information is used for indicating whether the terminal supports end-to-end encryption or not and a supported encryption mode, and the encryption mode comprises an encryption mode of migrating information bits and an encryption mode of not migrating information bits; when an end-to-end encryption communication service needs to be carried out, the network side determines an encryption mode adopted by the end-to-end encryption communication service according to the type of the end-to-end encryption communication service and the end-to-end encryption support capability information of the terminal related to the service; and the determined encryption mode is triggered and adopted to carry out the end-to-end encryption communication service. By applying the technical scheme disclosed by the invention, the QoS quality of the voice can be effectively improved.

Description

technical field [0001] The present application relates to the field of communication technologies, and in particular to an encrypted communication method for carrying narrowband voice coding over LTE. Background technique [0002] With the continuous development of wireless communication technology, trunking communication technology has developed from analog system to narrowband digital trunking system. At the same time, with the increasing demand for wireless broadband from industry users, it has developed from simple voice services to 3GPP based on LTE technology. MCPTT, B-TrunC digital trunking communication system. [0003] Narrowband digital trunking (PDT) adopts narrowband voice coding (NVOC), and TETRA adopts AMBE encoding format to support language. The LTE broadband trunking system in 3GPP eMBMS adopts VoIP technology to support voice services, and uses MBSFN IP multicast to support language clustering for the cluster, and also supports IP unicast voice. VoIP or AM...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/03H04W12/041H04W28/16G10L19/16H04W84/08
CPCH04W28/16G10L19/167H04W84/08
Inventor 袁乃华朱玉梅赵玉霞闫锐范晨
Owner CHENGDU TD TECH LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products