Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Terminal to terminal encryption method of cell phone voice and data

An encryption method and voice technology, applied in the usage of multiple keys/algorithms, secure communication, near-field transmission system using transceivers, etc., can solve problems such as insecurity, achieve good security, and reduce development and production costs , the effect of good marketing value

Inactive Publication Date: 2005-03-09
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF2 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This invention solves the insecurity problem in the mobile phone encryption method with the Chinese patent application No. 98108859.7 because the network operator knows the key information
The common feature of the above two patents is that both need to add a special security module in the mobile phone, and need to modify the structure and software of the mobile phone

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal to terminal encryption method of cell phone voice and data
  • Terminal to terminal encryption method of cell phone voice and data
  • Terminal to terminal encryption method of cell phone voice and data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] The terminal security device of the present invention is at least composed of a Bluetooth interface module, an encryption and decryption module, a voice compression / decompression module, A / D, D / A modules, a data interface module and a control module, and is characterized in that: the Bluetooth interface module Complete the wireless connection between the terminal security device and the Bluetooth mobile station; the encryption and decryption module is connected with the voice compression / decompression module, the Bluetooth interface module, and the data interface module respectively to complete the encryption / decryption processing of voice and data signals; A / D, D The / A module is connected with the voice compression / decompression module to complete voice analog / digital, digital / analog conversion and compression / decompression processing; the data interface module completes the connection between the terminal security device and the data terminal; the control module and th...

Embodiment 2

[0041] The composition and function of each component of terminal security device 5 are further described below:

[0042] The A / D and D / A modules are implemented by a single-chip integrated circuit integrating A / D, D / A conversion and voice codec functions, so as to reduce the size of the printed board and the overall volume of the terminal security device 5 . The A / D and D / A modules complete the A / D conversion and voice coding functions of the analog voice signal picked up by the microphone 3 at the sending end, and complete the voice decoding and D / A conversion functions at the receiving end, and convert the restored analog voice signal Give the headset 4.

[0043] The data interface module adopts TTL level and RS232 level conversion integrated circuit to realize. The data interface module completes the signal level conversion (from RS232 level to TTL level) from the data terminal 2 to the internal encryption and decryption module of the terminal security device 5 at the sen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses a cell phone ciphering method, namely, the end-to-end ciphering method for GSM network phone and data. When said mobile station makes phone / data communication with fixed wire phone net users, the wireless users adopt outboard terminal security devices and blue tooth mobile station to realize wireless connection. The wire users adopt digital security telephones with phone and data ciphered functions, outboard terminal security device is connected with GSM mobile station supporting blue tooth data communication function by the blue tooth technology to realize end-to-end ciphering of GSM network phone and data service.

Description

Technical field: [0001] The invention relates to mobile communication security technology, in particular to an end-to-end encryption method for GSM network voice and data. Background technique: [0002] GSM (Global System for Mobile Communication) is a cellular mobile communication standard based on Time Division Multiple Access (TDMA) developed by the European Telecommunications Standards Institute (ETSI), which can provide services such as voice, data, short message and WAP Internet access. , was first applied in my country and Europe, and achieved great success. At present, my country's GSM network has covered most of the cities and towns in the country and is widely used. [0003] The mobile station is the user terminal equipment of the GSM network, which can be divided into handheld (mobile phone), portable and vehicle-mounted, etc. The mobile station accesses the GSM network through the GSM base station subsystem (BSS). In the GSM network, the wireless communication m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04B5/02H04K1/00H04L9/14
Inventor 虞忠辉梁鸿斌曾勇王剑锋
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More