Method for end-to-end enciphoring voice telecommunication

A technology for encrypting voice and encryption keys, applied in wireless communication, synchronous sending/receiving encryption equipment, security devices, etc., can solve problems such as technical decryption, and achieve flexible, safe and reliable voice communication, and powerful effects.

Inactive Publication Date: 2006-08-09
HUAWEI TECH CO LTD
View PDF0 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The use of standard technology can guarantee the security of communication, but in front of powerful ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for end-to-end enciphoring voice telecommunication
  • Method for end-to-end enciphoring voice telecommunication
  • Method for end-to-end enciphoring voice telecommunication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0063] Embodiment 1: Implement encrypted voice communication between mobile terminals.

[0064] figure 2 It is a flowchart of encrypted voice communication between mobile terminals in the present invention. It is assumed that both the calling MS and the called MS have passed the encryption qualification authentication at KDC, that is, KDC authentication, and each transmission branch in the voice transmission path from the calling MS to the called MS The segments are transmitted using different CODECs; the encrypted session trigger prefix is ​​preset on the softswitch server of the network switching center, for example, the encrypted session trigger prefix is ​​set to 19000, and the softswitch server of the network switching center starts using the encrypted session trigger prefix Secret communication. Encrypted voice communication between mobile terminals of the present invention comprises the following steps:

[0065] Step 200: The calling MS initiates an encrypted call re...

Embodiment 2

[0096] Embodiment 2: Encrypted voice communication is realized between the analog fixed telephone terminal and the mobile terminal, and the encrypted call request is initiated by the analog fixed telephone terminal.

[0097] image 3 It is a flow chart of encrypted voice communication between an analog fixed phone terminal and a mobile terminal in which an encrypted call request is initiated by an analog fixed phone terminal in the present invention. It is assumed that the called MS passes the encrypted call qualification authentication in KDC and is connected with the encrypted call gateway office Each transmission segment in the voice transmission path to the called MS uses a different CODEC for transmission; the encrypted voice trigger prefix is ​​preset on the softswitch server of the encrypted voice gateway office, for example, the encrypted voice trigger prefix is ​​set to 19000. In the present invention, the encrypted voice communication between the simulated fixed tele...

Embodiment 3

[0130] Embodiment 3: Encrypted voice communication is realized between the mobile terminal and the analog fixed telephone terminal, and the mobile terminal initiates an encrypted call request.

[0131] Figure 4 It is a flow chart of encrypted voice communication between the mobile terminal and the analog fixed telephone terminal in the present invention where the mobile terminal initiates an encrypted call request. It is assumed that the calling MS passes the encrypted call qualification authentication at the KDC, and the encryption gateway from the calling MS to the called POTS terminal is located. Each transmission segment in the voice transmission path uses a different CODEC for transmission; the encrypted conversation trigger prefix is ​​preset on the softswitch server, for example, the encrypted conversation trigger prefix is ​​set to 19000.

[0132] Figure 4 The process in the embodiment is composed of the mobile terminal triggering the encrypted call process in the f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The method includes steps: after receiving request for building encrypted call from calling terminal, switchboard sends request for applying encryption key to key distribution center (KDC); receiving the request, and passing through authentication of encrypting qualification, KDC generates calling and called encryption keys, which are returned back to switchboard; switchboard sends the calling and called encryption keys to calling party and called party respectively, and switchboard the mobile terminal locates on informs converter TC in bypass speech encoding format of base station controller; using the received encryption keys, the calling terminal and called terminal carry out encrypted speech communication. Based on network control being as center, the invention realizes point-to-point encrypted speech communication. Powerful function on network side provides advantages are: safety, reliable, flexible and enhanced extensibility.

Description

technical field [0001] The invention relates to a secret communication technology, in particular to an end-to-end encrypted voice communication method. Background technique [0002] At present, mobile communication technology has been widely used, but in the existing mobile communication system, most of the voice stream transmissions of ordinary civilian mobile phones have not been encrypted. Encryption is only performed in the wireless transmission part. For some special industry applications, mobile communication needs to have higher security performance, not only to prevent the call from being intercepted in the wireless transmission part, but also to prevent the call from being intercepted and monitored when it is transmitted in the land network. End-to-end encryption of mobile phone calls and communications. [0003] The information of wireless devices in the communication process is freely propagated in the air along with radio waves. As long as the corresponding rec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04Q7/38H04L9/12H04W12/03H04W12/06H04W12/08
Inventor 王备
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products