Terminal to terminal encryption method of cell phone voice and data
An encryption method and voice technology, which can be applied to synchronously send/receive encryption equipment, use transceiver near-field transmission systems, etc., can solve problems such as insecurity, achieve good security, reduce development and production costs, and improve market promotion. effect of value
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0032] The terminal security device of the present invention is at least composed of a Bluetooth interface module, an encryption and decryption module, a voice compression / decompression module, A / D, D / A modules, a data interface module and a control module, and is characterized in that: the Bluetooth interface module Complete the wireless connection between the terminal security device and the Bluetooth mobile station; the encryption and decryption module is connected with the voice compression / decompression module, the Bluetooth interface module, and the data interface module respectively to complete the encryption / decryption processing of voice and data signals; A / D, D The / A module is connected with the voice compression / decompression module to complete voice analog / digital, digital / analog conversion and compression / decompression processing; the data interface module completes the connection between the terminal security device and the data terminal; the control module complete...
Embodiment 2
[0035] The composition and function of each component of terminal security device 5 are further described below:
[0036] The A / D and D / A modules are implemented by a single-chip integrated circuit integrating A / D, D / A conversion and voice codec functions, so as to reduce the size of the printed board and the overall volume of the terminal security device 5 . The A / D and D / A modules complete the A / D conversion and voice coding functions of the analog voice signal picked up by the microphone 3 at the sending end, and complete the voice decoding and D / A conversion functions at the receiving end, and convert the restored analog voice signal Give the headset 4.
[0037] The data interface module adopts TTL level and RS232 level conversion integrated circuit to realize. The data interface module completes the signal level conversion (from RS232 level to TTL level) from the data terminal 2 to the internal encryption and decryption module of the terminal security device 5 at the sen...
Embodiment 3
[0047] The process of end-to-end encryption of GSM network voice and data is described in detail below. The specific voice and data end-to-end encryption process includes the following steps:
[0048] A. Configure a Bluetooth mobile station 6, an external calling party terminal security device 5 and an external called party terminal security device 5 at the calling party and the called party respectively, and the terminal security device 5 and the Bluetooth mobile station 6 Wireless connection via Bluetooth data channel;
[0049] B. The calling party initiates a data service call, and establishes a data connection between the calling party and the called party;
[0050] C. At the sending end, after the voice signal is picked up by the microphone 3 of the terminal security device 5 at the sending end, A / D conversion is carried out, after encoding and compression processing by the voice compression / decompression module, it is sent to the encryption and decryption module for enc...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com