Terminal to terminal encryption method of cell phone voice and data

An encryption method and voice technology, applied in the usage of multiple keys/algorithms, secure communication, near-field transmission system using transceivers, etc., can solve problems such as insecurity, achieve good security, and reduce development and production costs , the effect of good marketing value

Inactive Publication Date: 2005-03-09
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF2 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This invention solves the insecurity problem in the mobile phone encryption method with the Chinese patent application No. 98108859.7 because the network operator knows the key informa

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal to terminal encryption method of cell phone voice and data
  • Terminal to terminal encryption method of cell phone voice and data
  • Terminal to terminal encryption method of cell phone voice and data

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0036] Example 1

[0037] The terminal security device of the present invention is composed of at least a Bluetooth interface module, an encryption / decryption module, a voice compression / decompression module, an A / D, D / A module, a data interface module and a control module, and is characterized in that: a Bluetooth interface module Complete the wireless connection between the terminal security device and the bluetooth mobile station; the encryption and decryption module is connected with the voice compression / decompression module, the Bluetooth interface module and the data interface module respectively to complete the encryption / decryption processing of the voice and data signals; A / D, D The / A module is connected with the voice compression / decompression module to complete the analog / digital, digital / analog conversion and compression / decompression processing of the voice; the data interface module completes the connection between the terminal security device and the data termi...

Example Embodiment

[0040] Example 2

[0041] The composition and function of each component of the terminal security device 5 are further described below:

[0042] The A / D and D / A modules are implemented by a single-chip integrated circuit integrating A / D, D / A conversion and voice codec functions to reduce the size of the printed board and the overall volume of the terminal security device 5 . The A / D and D / A modules complete the A / D conversion and voice encoding functions of the analog voice signal picked up by the microphone 3 at the sending end, and complete the voice decoding and D / A conversion functions at the receiving end, and convert the restored analog voice signal. Send to earphone 4.

[0043] The data interface module is realized by TTL level and RS232 level conversion integrated circuit. The data interface module completes the signal level conversion (from RS232 level to TTL level) from the data terminal 2 to the internal encryption and decryption module of the terminal security de...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention discloses a cell phone ciphering method, namely, the end-to-end ciphering method for GSM network phone and data. When said mobile station makes phone/data communication with fixed wire phone net users, the wireless users adopt outboard terminal security devices and blue tooth mobile station to realize wireless connection. The wire users adopt digital security telephones with phone and data ciphered functions, outboard terminal security device is connected with GSM mobile station supporting blue tooth data communication function by the blue tooth technology to realize end-to-end ciphering of GSM network phone and data service.

Description

Technical field: [0001] The invention relates to mobile communication security technology, in particular to an end-to-end encryption method for GSM network voice and data. Background technique: [0002] GSM (Global System for Mobile Communication) is a cellular mobile communication standard based on Time Division Multiple Access (TDMA) developed by the European Telecommunications Standards Institute (ETSI), which can provide services such as voice, data, short message and WAP Internet access. , was first applied in my country and Europe, and achieved great success. At present, my country's GSM network has covered most of the cities and towns in the country and is widely used. [0003] The mobile station is the user terminal equipment of the GSM network, which can be divided into handheld (mobile phone), portable and vehicle-mounted, etc. The mobile station accesses the GSM network through the GSM base station subsystem (BSS). In the GSM network, the wireless communication m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04B5/02H04K1/00H04L9/14
Inventor 虞忠辉梁鸿斌曾勇王剑锋
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products