Terminal to terminal encryption method of cell phone voice and data

An encryption method and voice technology, which can be applied to synchronously send/receive encryption equipment, use transceiver near-field transmission systems, etc., can solve problems such as insecurity, achieve good security, reduce development and production costs, and improve market promotion. effect of value

Inactive Publication Date: 2005-03-09
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF2 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This invention solves the insecurity problem in the mobile phone encryption method with the Chinese patent application No. 98108859.7 because the network operator knows the key information
The common feature of the above two patents is that both need to add a special security module in the mobile phone, and need to modify the structure and software of the mobile phone

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal to terminal encryption method of cell phone voice and data
  • Terminal to terminal encryption method of cell phone voice and data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] The terminal security device of the present invention is at least composed of a Bluetooth interface module, an encryption and decryption module, a voice compression / decompression module, A / D, D / A modules, a data interface module and a control module, and is characterized in that: the Bluetooth interface module Complete the wireless connection between the terminal security device and the Bluetooth mobile station; the encryption and decryption module is connected with the voice compression / decompression module, the Bluetooth interface module, and the data interface module respectively to complete the encryption / decryption processing of voice and data signals; A / D, D The / A module is connected with the voice compression / decompression module to complete voice analog / digital, digital / analog conversion and compression / decompression processing; the data interface module completes the connection between the terminal security device and the data terminal; the control module complete...

Embodiment 2

[0035] The composition and function of each component of terminal security device 5 are further described below:

[0036] The A / D and D / A modules are implemented by a single-chip integrated circuit integrating A / D, D / A conversion and voice codec functions, so as to reduce the size of the printed board and the overall volume of the terminal security device 5 . The A / D and D / A modules complete the A / D conversion and voice coding functions of the analog voice signal picked up by the microphone 3 at the sending end, and complete the voice decoding and D / A conversion functions at the receiving end, and convert the restored analog voice signal Give the headset 4.

[0037] The data interface module adopts TTL level and RS232 level conversion integrated circuit to realize. The data interface module completes the signal level conversion (from RS232 level to TTL level) from the data terminal 2 to the internal encryption and decryption module of the terminal security device 5 at the sen...

Embodiment 3

[0047] The process of end-to-end encryption of GSM network voice and data is described in detail below. The specific voice and data end-to-end encryption process includes the following steps:

[0048] A. Configure a Bluetooth mobile station 6, an external calling party terminal security device 5 and an external called party terminal security device 5 at the calling party and the called party respectively, and the terminal security device 5 and the Bluetooth mobile station 6 Wireless connection via Bluetooth data channel;

[0049] B. The calling party initiates a data service call, and establishes a data connection between the calling party and the called party;

[0050] C. At the sending end, after the voice signal is picked up by the microphone 3 of the terminal security device 5 at the sending end, A / D conversion is carried out, after encoding and compression processing by the voice compression / decompression module, it is sent to the encryption and decryption module for enc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention discloses an end-to-end ciphering method for GSM network voice and data when mobile stations carry out voice/data communication between them, voice/data information sent by the delivery end are coded and ciphered by an outboard terminal security device to be delivered to the blue tooth mobile station of the delivery end by its channel, the out board device is connected with GSM mobile station supporting the blue tooth data communication function to realize the end-to-end ciphering of GSM network voice and data service.

Description

Technical field: [0001] The invention relates to mobile communication security technology, in particular to an end-to-end encryption method for GSM network voice and data. Background technique: [0002] GSM (Global System for Mobile Communication) is a cellular mobile communication standard based on Time Division Multiple Access (TDMA) developed by the European Telecommunications Standards Institute (ETSI), which can provide services such as voice, data, short message and WAP Internet access. , was first applied in my country and Europe, and achieved great success. At present, my country's GSM network has covered most of the cities and towns in the country and is widely used. [0003] The mobile station is the user terminal equipment of the GSM network, which can be divided into handheld (mobile phone), portable and vehicle-mounted, etc. The mobile station accesses the GSM network through the GSM base station subsystem (BSS). In the GSM network, the wireless communication m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04B5/02H04L9/12
Inventor 虞忠辉肖红英曾勇张智车笛
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products