CN101631304B - Anti-adaptive multi-rate coding third-generation mobile communication end-to-end voice encryption method - Google Patents

Anti-adaptive multi-rate coding third-generation mobile communication end-to-end voice encryption method Download PDF

Info

Publication number
CN101631304B
CN101631304B CN2009101832324A CN200910183232A CN101631304B CN 101631304 B CN101631304 B CN 101631304B CN 2009101832324 A CN2009101832324 A CN 2009101832324A CN 200910183232 A CN200910183232 A CN 200910183232A CN 101631304 B CN101631304 B CN 101631304B
Authority
CN
China
Prior art keywords
module
voice
data
signal
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2009101832324A
Other languages
Chinese (zh)
Other versions
CN101631304A (en
Inventor
蒋睿
张卓立
方颉翔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Southeast University
Original Assignee
Southeast University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Southeast University filed Critical Southeast University
Priority to CN2009101832324A priority Critical patent/CN101631304B/en
Publication of CN101631304A publication Critical patent/CN101631304A/en
Application granted granted Critical
Publication of CN101631304B publication Critical patent/CN101631304B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to an anti-adaptive multi-rate coding third-generation (3G) mobile communication end-to-end voice encryption method which belongs to a bran-new end-to-end voice encryption method aiming at 3G network mainstream technology wideband code division multiple access (WCDMA). In the method, a standard voice input and output interface module is connected with a WCDMA mobile phone, and voice signals of the WCDMA mobile phone are accessed into a voice encryption/decryption software module and a voice encryption/decryption hardware module to carry out voice encryption and decryption operation and realize the voice encryption/decryption function. The voice encryption/decryption hardware module (1) is a smallest hardware system module based on a field programmable gate array (FPGA) processing platform; the voice encryption/decryption software module (2) is a software module running in an FPGA chip and is used for encrypting and decrypting voice data; and the standard voice input and output interface module (3) is in charge of providing interfaces for a pair of standard earphones and the WCDMA mobile phone.

Description

The anti-adaptive multi-rate coding third-generation mobile communication end-to-end speech ciphering method
Technical field
The present invention is a kind of anti-adaptive multi-rate coding (AMR) 3G (Third Generation) Moblie end-to-end speech ciphering method.It mainly is applicable to the 3G (Third Generation) Moblie mainstream technology---WCDMA multiplexing (WCDMA) network system; Based on anti-AMR compressed encoding voice encryption algorithm; Adopting field programmable gate array (FPGA) chip XC3S500E is basic platform, is a kind of End-to-End Security communication means of wireless network terminal.
Background technology
Along with the tremendous development of 3G (Third Generation) Moblie technology (3G), WCDMA multiplexing (WCDMA) receives the increasing concern of user as one of mainstream technology of 3G.The user more pays close attention to its communication security when paying close attention to technology such as WCDMA post and telecommunication tariff, communication speed.Though; The security performance of WCDMA has been far superior to Global Link system (2G); But the whole security system of WCDMA has only adopted the encryption technology of wireless channel; Can only guarantee the coded communication of voice signal in the wireless transmission process between mobile phone to base station, be still with the plaintext form in the relay transmission process of voice signal between the base station and transmit.Therefore the security system of WCDMA can't guarantee user's communication security end to end.
Abroad, successively have the research institution and the group of countries such as Germany, Israel, the U.S. that the End-to-End Security communications field of mobile phone in the 2G network is studied, and the end-to-end 2G communication network that released one after another is encrypted the terminal.Wherein German GSMK company adopts the voice encryption technology of its exploitation in November, 2003, has issued the voice encryption mobile phone of Cryptophone by name, and this mobile phone can make between similar mobile phone and install to converse between the computer of specific software and do not eavesdropped by the third party; Israel Snapshield company has proposed a kind of voice encryption technology based on the GSM smart mobile phone in 2005; And released the voice encryption module Snapcell that links to each other with the T618 of Sony Ericsson, this module can make mobile phone that point-to-point GSM secure communication is provided; The TCC company of the U.S. has also released the encryption mobile phone that adopts the voice encryption technology in 2006.Yet the encryption technology of above research institution or group is not owing to possess anti-RPE-LTP compressed encoding ability; All can only transmit through the data channel of 2G network; This type technology exists obvious defects: the first, can't overcome owing to set up the latency issue that IP connects and the utilization automatic retransmission mechanism causes, and the time-delay that wherein connects can reach 20-30 second; Handle time-delay 0.5-1 second, therefore have a strong impact on communication effect.The second, therefore such technology exists the problem of interoperability based on the GSM data channel through different operators and international network the time, and inter-network can not interconnect.The 3rd, do not support the value-added service of existing GSM, can not use some other value-added services of existing phonecard and mobile network like the two ends of data passage.
At home, also there are some research and development institutions that the End-to-End Security communications field of 2G mobile phone is studied.Like number of patent application is that the GoTone handset with anti longterm prediction rule pulse excitation compression coding speech ciphering method has been described in 200710019924.6 invention; This method is between the mould of Global Link mobile phone speech communication system/digital-to-analogue piece and long-term prediction Regular-Pulse Excitation coding/decoding module; Insert mobile phone speech enciphering/deciphering module; Carry out the voice encryption computing, realize voice enciphering/deciphering function.This invention is transmitted through the voice channel of GSM network, has the ability of anti-RPE-LTP compressed encoding, and conversation delay is little, can inter-network interconnect, yet should invention only realize End-to-End Security communication to the 2G network, can't directly apply to 3G network.The invention of number of patent application 200710020992.4 has proposed anti vocoder compressed end-to-end voice encryption device and method; The ability that possesses anti-RPE-LTP compressed encoding; Can transmit through the voice channel of GSM network, but it can't overcome the base station filtering problem, can not realize the inter-network intercommunication; And should invention only be directed against the RPE-LTP compressed encoding, can't be applied among the 3G network.
At present, also be not reported to the technology of mobile phone speech End-to-End Security communication among the 3G mobile network, more existing researchs all only are that the End-to-End Security that is directed against mobile phone in the 2G network is communicated by letter with patent.The 3G (Third Generation) Moblie end-to-end speech ciphering method of a kind of anti-adaptive multi-rate coding that the present invention describes; It is a kind of brand-new end-to-end speech encryption and decryption communication technology to 3G network mainstream technology WCDMA; Its Cipher Strength is high, has the ability of anti-AMR compressed encoding, and the intelligibility of speech is high; Voice quality is good, does not have the problem of network compatibility; The voice encryption process lag of its realization simultaneously is low; And because the received pronunciation input/output interface is provided, received pronunciation input, the output interface that can insert any WCDMA mobile phone carry out End-to-End Security communication, have general adaptability.
Summary of the invention
Technical problem: the objective of the invention is to propose a kind of " anti-adaptive multi-rate coding (AMR) 3G (Third Generation) Moblie end-to-end speech ciphering method " of directly encrypting and transmit in the enterprising lang message of WCDMA multiplexing (WCDMA) network source, this method has the ability of anti-AMR compressed encoding.Adopt technology of the present invention, the secure communication end to end of WCDMA mobile phone at first can be provided; Secondly can significantly reduce conversation delay (making delay probably is 0.2 second); And, can interconnect between inter-network because the present invention does not change the characteristic of WCDMA communication system voice channel; Support the value-added service that the WCDMA communication network is all simultaneously; In addition because phonetic entry, output interface with standard make applicability of the present invention and versatility stronger.
Technical scheme: anti-adaptive multi-rate coding of the present invention (AMR) 3G (Third Generation) Moblie end-to-end speech ciphering method; Through providing received pronunciation input, output interface module multiplexing with WCDMA (WCDMA) mobile phone to be connected; Insert soft, the hardware module of voice encryption to WCDMA mobile phone speech signal; Carry out the voice encryption computing, realize the voice encryption function.Wherein, described voice encryption hardware module is a minimal hardware system module based on the FPGA processing platform, mainly comprises: FPGA processor module, PROM module, power module, A/D module and clock module five parts; Described FPGA processor module is based on the hardware system of fpga chip, is the core of whole voice encryption hardware module, the encryption and decryption computing of processes voice signals; Described PROM module connects the data download interface of FPGA processor module, and after powering on, the PROM module downloads to the FPGA processor module with the series arrangement data, accomplishes the initial configuration to the FPGA processor module; Described power module connects the power interface of FPGA processor module and A/D module, is responsible for power supply; Described A/D module connects the IO pin of FPGA processor module, is responsible for the D/A switch of voice signal, controls FPGA processor module receiving and transmitting voice signal simultaneously; Described clock module connects the clock interface of A/D module, for the A/D module provides the impulse hunting ripple.Described voice encryption software module; Be the software module that runs on the fpga chip, form by token sound reception/transmission algorithm module, voice encryption/decipherment algorithm module, type phonetic synthesis/decomposition algorithm module and voice signal synchronized algorithm module four parts.Described received pronunciation input, output interface module mainly comprise the standard microphone input interface, standard earphone output interface, WCDMA mobile phone received pronunciation input/output interface; Described standard microphone input interface connects the voice microphone, and the input of microphone voice signal is provided; Described standard earphone output interface connects earphone, and last decrypted voice is exported through earphone; Described WCDMA mobile phone received pronunciation input/output interface is used to connect the WCDMA mobile phone, is responsible for encrypted speech is given mobile phone radio frequency output and received encrypted speech from mobile phone.
The voice encryption software module is stored in the PROM module, and after system powered on, the FPGA module received the voice encryption software module from outside PROM under main string pattern, accomplishes the initialization of FPGA processor module and A/D module.When mobile phone speech carries out enciphering/deciphering communication; The voice encryption software module is moved token sound reception/transmission algorithm module, voice encryption/decipherment algorithm module, type phonetic synthesis/decomposition algorithm module and voice signal synchronized algorithm module respectively; Thereby realize the enciphering/deciphering communication of mobile phone speech, the detailed process of encryption and decryption software piece module operation is:
1) system initialization: after system powered on, FPGA received the series arrangement data from outside PROM under main string pattern, accomplished the initial configuration of FPGA, and then FPGA orders to peripheral hardware A/D module transmitter register through its IO pin, initialization A/D module.
2) enciphered data: after core FPGA processor module receives voice signal from the A/D module, at first move token sound reception/transmission algorithm module, be transformed into corresponding data-signal to the binary digital signal of serial input; Then move voice encryption/decryption algorithm module, speech data signal is encrypted by ad hoc fashion; Phonetic synthesis/decomposition algorithm the module of operation class then is to class voice type of the carrying out voice mapping transformation after encrypting; The voice signal synchronized algorithm module of reruning adds specific synchronizing signal to the speech-like signal after encrypting; Move token sound transmission/receiving algorithm module at last, be transformed into corresponding binary digital signal serial output to data-signal.
3) data decryption: when core FPGA processor module when the A/D module receives the voice signal of encryption, at first move token sound transmission/receiving algorithm module, be transformed into corresponding data-signal to the binary digital signal of serial input; Next moves voice signal synchronized algorithm module, judges whether to find synchronizing signal, if not, then still be as the criterion with former synchronizing signal position, and the operation of operation subsequent module, if, then at first upgrade synchronizing signal position, move subsequent module then; Then operation type phonetic synthesis/decomposition algorithm module is shone upon inverse transformation to the speech-like signal synchronously; Move voice encryption/decryption algorithm module then, signal is deciphered with ad hoc fashion; Move token sound transmission/receiving algorithm module at last, be transformed into corresponding binary digital signal serial output to data-signal.
Described token sound reception/transmission algorithm module comprise main program call, receive the input of data, buffer memory, string also/and go here and there several steps such as transfer algorithm and output, realize the reception and the transmission of voice, concrete grammar is:
1) main program calls: when system moved token sound reception/transmission algorithm module, main program called this module and carries out computing,
2) send data: when data need be sent, at first data are carried out the buffer memory input, adopt and go here and there conversion algorithm module then, be transformed into corresponding binary digital signal serial output to data-signal;
3) receive data: when receiving the serial binary digital signal, at first serial digital signal is carried out the buffer memory input, adopt string and conversion algorithm module then, become corresponding data-signal and line output to the serial binary digital signal conversion of input.
Several steps such as described voice encryption/decryption algorithm module comprises that main program calls, receives that the input of data, buffer memory, enciphering/deciphering parameter are confirmed, phase place encryption/decryption algorithm, frequency encryption/decryption algorithm, frame scramble encryption/decryption algorithm and output; Realize the encryption and decryption computing of voice, concrete grammar is:
1) main program calls: when system moved voice encryption/decryption algorithm module, main program called this module and carries out the enciphering/deciphering computing,
2) enciphered data: during encrypted speech; At first buffer memory is imported data; Secondly confirm the encryption parameter of phase place AES, frequency AES, frame scrambling encryption algorithm; Then adopt phase place AES, frequency AES, frame scrambling encryption algorithm that former speech data is encrypted successively, the speech data after output is encrypted at last;
3) data decryption: during decrypted voice; At first buffer memory is imported data; Secondly confirm the deciphering parameter of phase place decipherment algorithm, frequency decipherment algorithm, frame scramble decipherment algorithm; Then adopt frame scramble decipherment algorithm, frequency decipherment algorithm, phase place decipherment algorithm that the speech data of encrypting is deciphered successively, the speech data after the output deciphering at last.
Described type of phonetic synthesis/decomposition algorithm module comprises main program and calls, receives several steps such as data, buffer memory input, type voice mapping transformation/inverse transformation, voice enhancing and output, realizes the synthetic and decomposition operation of type voice, and concrete grammar is:
1) main program calls: during a system operation type phonetic synthesis/decomposition algorithm module, main program calls this module type of carrying out phonetic synthesis/decomposition,
2) generated data: when data need be synthesized, at first data are carried out the buffer memory input, then type of carrying out voice mapping transformation is carried out voice again and is strengthened, the class speech data after output at last is synthetic;
3) decomposition data: when data need be decomposed, at first data are carried out the buffer memory input, then type of carrying out voice mapping inverse transformation is carried out voice again and is strengthened, the speech data after output is decomposed at last.
Described voice signal synchronized algorithm module comprises main program to be called, receives the input of data, buffer memory, sync waveform parameter and confirm/the sync correlation computing, add/remove several steps such as synchronizing signal and output; Realize the synchronized transmission of signal and the decryption restoration of receiving terminal, concrete grammar is:
1) main program calls: when system moved voice signal synchronized algorithm module, main program called this module and realizes the synchronized transmission of voice signal and the decryption restoration of receiving terminal,
2) enciphered data: at first data are carried out the buffer memory input, then confirm the parameter of sync waveform, add synchronizing signal then, output at last has the data of synchronizing signal;
3) data decryption: at first data are carried out the buffer memory input, then carry out the sync correlation computing and confirm the sync waveform position, remove synchronizing signal then, export the pure signal data at last.
Beneficial effect: a kind of anti-adaptive multi-rate coding of the present invention (AMR) 3G (Third Generation) Moblie end-to-end speech ciphering method has good functional characteristics: realized the secure communication end to end of WCDMA multiplexing (WCDMA) mobile phone, Cipher Strength is not less than 3DES; After encryption and decryption, the intelligibility of voice signal is not suffered a loss, and tonequality reaches the requirement of WCDMA network, and conversation intelligibility>=99% satisfies the real-time requirement of communication, and being applied to the WCDMA network does not have delay, processing delay≤200ms; Support inter-network interconnect and the WCDMA network in all value-added services.
Description of drawings
Fig. 1 is the application structure figure of the inventive method in the WCDMA network;
Fig. 2 is the systematic schematic diagram of the inventive method;
Fig. 3 is the systems soft ware and the combination of hardware sketch map of the inventive method;
Fig. 4 is a circuit theory system diagram of the present invention;
Fig. 5 is FPGA processor module and A/D module cascade circuit theory diagrams () among the present invention
Fig. 6 is FPGA processor module and A/D module cascade circuit theory diagrams (two) among the present invention
Fig. 7 is the systems soft ware flow chart of the inventive method;
Fig. 8 is a token sound reception/transmission algorithm module flow chart;
Fig. 9 is a voice encryption/decryption algorithm module flow chart;
Figure 10 type of being phonetic synthesis/decomposition algorithm module flow chart;
Figure 11 is a voice signal synchronization module flow chart.
Embodiment
The 3G (Third Generation) Moblie end-to-end speech ciphering method of anti-adaptive multi-rate coding of the present invention (AMR) is connected through received pronunciation input, output interface module multiplexing with WCDMA (WCDMA) mobile phone are provided; Insert soft, the hardware module of voice encryption to WCDMA mobile phone speech signal; Carry out the voice encryption computing, realize the voice encryption function.Wherein:
1. voice encryption hardware module 1 of the present invention mainly comprises following submodule:
1) the FPGA processor module 4: the fpga chip with the XC3S500E model is a core, has 500,000 programmable logic blocks, is used for the encryption and decryption computing.
2) the PROM module 5: storaged voice encryption and decryption software piece module 2 after powering on, is downloaded to voice encryption software module 2 series arrangement in the FPGA processor module 4.
3) power module 6: 1.2V, 2.5V, 3.3V and 5V voltage are provided, are peripheral hardware power supply on FPGA processor module 4, A/D module 7 and other sheets.
4) the A/D module 7: the D/A switch that is used for voice signal.
5) clock module 8: to A/D module 7 the impulse hunting ripple is provided.
2. voice encryption software module 2 of the present invention comprises:
1) token sound reception/transmission algorithm module 9: during reception, convert the serial binary digital signal of importing to corresponding data-signal and line output; During transmission, convert the data-signal of importing to corresponding binary digital signal serial output.
2) voice encryption/decryption algorithm module 10: data-signal is carried out enciphering/deciphering, guarantee that Cipher Strength reaches the requirement of 3DES.
3) type phonetic synthesis/decomposition algorithm module 11: the synthetic signal that meets the AMR coding requirement of the signal after will encrypting, be convenient to effectively decode at receiving terminal.
4) the voice signal synchronization module 12: the signal after will encrypting adds synchronizing signal output, is convenient to synchronous reception and decryption restoration at receiving end signal.
3. received pronunciation input provided by the invention, output interface module 3 comprise following standard interface:
1) standard microphone input interface: the input of microphone voice signal is provided.
2) standard earphone output interface: connect earphone, last decrypted voice is exported through earphone.
3) WCDMA mobile phone received pronunciation input/output interface: be used to connect the WCDMA mobile phone, be responsible for encrypted speech is given mobile phone radio frequency output and received encrypted speech from mobile phone.
Below in conjunction with accompanying drawing, the structure and the flow process of each module of the inventive method are carried out detailed explanation.
Concrete grammar is:
Received pronunciation input, output interface module multiplexing with WCDMA (WCDMA) mobile phone that the inventive method is passed through to be provided is connected; Insert soft, the hardware module of voice encryption to WCDMA mobile phone speech signal; Carry out the voice encryption computing, realize the voice encryption function.Wherein, described voice encryption hardware module 1 is a minimal hardware system module based on the FPGA processing platform, mainly comprises: FPGA processor module 4, PROM module 5, power module 6, A/D module 7 and clock module 8; Described FPGA processor module 4 is as the core of hardware system, the encryption and decryption computing of processes voice signals; Described PROM module 5 connects the data download interface of FPGA processor module 4, and after powering on, PROM module 5 downloads to the series arrangement data in the FPGA processor module 4, accomplishes the initial configuration to FPGA processor module 4; Described power module 6 connects the power interface of FPGA processor module 4 and A/D module 7, is responsible for power supply; Described A/D module 7 connects the IO pin of FPGA processor module 4, is responsible for the D/A switch of voice signal, controls FPGA processor module 4 receiving and transmitting voice signals simultaneously; Described clock module 8 connects the clock interface of A/D module 7, for A/D module 7 provides the impulse hunting ripple.Described voice encryption software module 2; Be the software module that runs on the fpga chip, form by token sound reception/transmission algorithm module 9, voice encryption/decipherment algorithm module 10, type phonetic synthesis/decomposition algorithm module 11 and voice signal synchronized algorithm module 12 4 parts.Described received pronunciation input, output interface module 3 mainly comprise the standard microphone input interface, standard earphone output interface, WCDMA mobile phone received pronunciation input/output interface; Described standard microphone input interface connects the voice microphone, and the input of microphone voice signal is provided; Described standard earphone output interface connects earphone, and last decrypted voice is exported through earphone.Described WCDMA mobile phone received pronunciation input/output interface is used to connect the WCDMA mobile phone, is responsible for encrypted speech is given mobile phone radio frequency output and received encrypted speech from mobile phone.
The detailed process of described voice encryption software module 2 operations is:
1) system initialization: after system powered on, FPGA received the series arrangement data from outside PROM under main string pattern, accomplished the initial configuration of FPGA, and then FPGA orders to peripheral hardware A/D module transmitter register through its IO pin, initialization A/D module.
2) enciphered data: core FPGA processor module at first moves token sound reception/transmission algorithm module 9 after receiving voice signal from the A/D module, is transformed into corresponding data-signal to the binary digital signal of serial input; Then move voice encryption/decryption algorithm module 10, speech data signal is encrypted by ad hoc fashion; Phonetic synthesis/decomposition algorithm the module 11 of operation class then is to class voice type of the carrying out voice mapping transformation after encrypting; The voice signal synchronized algorithm module 12 of reruning adds specific synchronizing signal to the speech-like signal after encrypting; Move token sound transmission/receiving algorithm module 6 at last, be transformed into corresponding binary digital signal serial output to data-signal.
3) data decryption: when core FPGA processor module receives the voice signal of encryption from the A/D module, at first move token sound transmission/receiving algorithm module 6, be transformed into corresponding data-signal to the binary digital signal of serial input; Next moves voice signal synchronized algorithm module 12, judges whether to find synchronizing signal, if not, then still be as the criterion with former synchronizing signal position, and the operation of operation subsequent module, if, then at first upgrade synch bit postpone, move subsequent module then; Then operation type phonetic synthesis/decomposition algorithm module 11 is shone upon inverse transformation to the speech-like signal synchronously; Move voice encryption/decryption algorithm module 10 then, signal is deciphered with ad hoc fashion; Move token sound transmission/receiving algorithm module 6 at last, be transformed into corresponding binary digital signal serial output to data-signal.
The model of the fpga chip in the described FPGA processor module 4 is XC3S500E, has 500,000 programmable logic blocks, is used for the encryption and decryption computing.Described power module 6 input voltages are 5V, output voltage 3.3V, 2.5V and 1.2V; Described A/D module 7, after the normal initialization, operating frequency is 8KHZ, and A/D module 7 is controlled FPGA processor modules 4 receiving and transmitting voice signals simultaneously, and the receiving and transmitting voice signal frequency that makes FPGA processor module 4 is 2.048MHZ; Described clock module 8 provides the clock of 16.384MHZ to A/D module 7.
Described token sound reception/transmission algorithm module 9 comprise main program call, receive the input of data, buffer memory, string also/and go here and there several steps such as transfer algorithm and output, realize the reception and the transmission of voice, concrete grammar is:
1) main program calls: when system moved token sound reception/transmission algorithm module, main program called this module and carries out computing,
2) send data: when data need be sent, at first data are carried out the buffer memory input, adopt and go here and there conversion algorithm module then, be transformed into corresponding binary digital signal serial output to data-signal;
3) receive data: when receiving the serial binary digital signal, at first digital signal is carried out the buffer memory input, sampling string and conversion algorithm module become corresponding data-signal and line output to the serial binary digital signal conversion of input then.
Several steps such as described voice encryption/decryption algorithm module 10 comprises that main program calls, receives that the input of data, buffer memory, enciphering/deciphering parameter are confirmed, phase place encryption/decryption algorithm, frequency encryption/decryption algorithm, frame scramble encryption/decryption algorithm and output; Realize the encryption and decryption of voice, concrete grammar is:
1) main program calls: when system moved voice encryption/decryption algorithm module, main program called this module and carries out the enciphering/deciphering computing,
2) enciphered data: when data need be encrypted; At first buffer memory is imported data; Secondly confirm the encryption parameter of phase place AES, frequency AES, frame scrambling encryption algorithm; Then adopt phase place AES, frequency AES, frame scrambling encryption algorithm that former data are encrypted successively, export data encrypted at last;
3) data decryption: when data need be deciphered; At first buffer memory is imported data; Secondly confirm the deciphering parameter of phase place decipherment algorithm, frequency decipherment algorithm, frame scramble decipherment algorithm; Then adopt frame scramble decipherment algorithm, frequency decipherment algorithm, phase place decipherment algorithm that ciphered data is deciphered successively, the data after the output deciphering at last.
Described type of phonetic synthesis/decomposition algorithm module 11 comprises main program and calls, receives several steps such as data, buffer memory input, the mapping transformation/inverse transformation of class voice, voice enhancing and output, realizes the synthetic and decomposition of type voice, and concrete grammar is:
1) main program calls: during a system operation type phonetic synthesis/decomposition algorithm module, main program calls this module type of carrying out phonetic synthesis/decomposition,
2) generated data: when data need be synthesized, at first data are carried out the buffer memory input,, carry out voice again and strengthen, the class speech data after output at last is synthetic then to the mapping transformation of data type of carrying out voice;
3) decomposition data: when data need be decomposed, at first data are carried out the buffer memory input, then, carry out voice again and strengthen, the speech data after output is decomposed at last to data type of carrying out voice mapping inverse transformation.
Described voice signal synchronized algorithm module 12 comprises main program to be called, receives the input of data, buffer memory, sync waveform parameter and confirm/the sync correlation computing, add/remove several steps such as synchronizing signal and output; Realize the synchronized transmission of signal and the decryption restoration of receiving terminal, concrete grammar is:
1) main program calls: when system moved voice signal synchronized algorithm module, main program called this module and carries out the synchronized transmission of signal and the decryption restoration of receiving terminal,
2) enciphered data: at first data are carried out the buffer memory input, then confirm the parameter of sync waveform, add synchronizing signal then, output at last has the data of synchronizing signal;
3) data decryption: at first data are carried out the buffer memory input, then carry out the sync correlation computing, confirm the sync waveform position, remove synchronizing signal then, export pure data at last.
System configuration as shown in Figure 1 can be known; The inventive method is connected through received pronunciation input, output interface module multiplexing with WCDMA (WCDMA) mobile phone are provided; Insert soft, the hardware module of voice encryption to WCDMA mobile phone speech signal; Carry out the voice encryption computing, realize the voice encryption function.Use patented method of the present invention, voice are from standard microphone input interface input, after, the hardware module encryption soft through voice encryption, are sent to the output of WCDMA mobile phone radio frequency through WCDMA mobile phone received pronunciation input/output interface; Similar, encrypted speech, is exported from the standard earphone output interface after, hardware module soft through voice encryption deciphered at first from the input of WCDMA mobile phone received pronunciation input/output interface.Wherein said voice encryption hardware module is to realize the carrying platform of the inventive method; Described voice encryption software module is the software module that runs on the voice encryption hardware module.
Shown in Fig. 2 systematic schematic diagram of the present invention; The inventive method is connected with the WCDMA mobile phone through received pronunciation input, output interface module are provided; Insert soft, the hardware module of voice encryption to WCDMA mobile phone speech signal, carry out the voice encryption computing, realize the voice encryption function.Wherein said voice encryption hardware module 1 comprises FPGA processor module 4, PROM module 5, and power module 6, A/D module 7 and clock module 8; 2 of voice encryption software modules are made up of token sound reception/transmission algorithm module 9, voice encryption/decryption algorithm module 10, type phonetic synthesis/decomposition algorithm module 11 and voice signal synchronized algorithm module 12; Described received pronunciation input, output interface module 3 mainly comprise the standard microphone input interface, standard earphone output interface and WCDMA mobile phone received pronunciation input/output interface.
Initialization procedure: after system powers on; FPGA processor module 4 receives the series arrangement data of outside PROM module 5 under main string pattern; Accomplish its initial configuration, then FPGA processor module 4 is to the order of peripheral hardware A/D module 7 transmitter registers, initialization A/D module 7.Initialization procedure carries out voice encryption communication after finishing.Ciphering process: voice are input to FPGA processor module 4 and handle from the input of standard microphone input interface after 7 conversion of A/D module.FPGA processor module 4 receives speech data in the control downward modulation of the clock signal of A/D module 7 with token sound reception/transmission algorithm module 9; Call voice encryption/decryption algorithm module 10, type phonetic synthesis/decomposition algorithm module 11 and voice signal synchronized algorithm module 12 more successively; Voice signal is encrypted, moved token sound reception/transmission algorithm module 9 at last and send encrypted speech to A/D module 7.After A/D module 7 received encrypted speech, first D/A switch was exported encrypted speech through WCDMA mobile phone received pronunciation input/output interface again through the WCDMA mobile phone radio frequency.The voice decrypting process: encrypted speech is imported from WCDMA mobile phone received pronunciation input/output interface; After A/D module 7 is handled; Under the control of the clock signal of A/D module 7; FPGA processor module 4 calls token sound reception/transmission algorithm module 9 and receives speech data; Call voice signal synchronized algorithm module 12, type phonetic synthesis/decomposition algorithm module 11 and voice encryption/decryption algorithm module 10 more successively, encrypted speech is deciphered, move token sound reception/transmission algorithm module 9 at last and send decrypted voice to A/D module 7.A/D module 7 is after receiving decrypted voice, and advanced row D/A switch is again through the output of standard earphone output interface.
As shown in Figure 3, FPGA processor module 4 of the present invention is the encryption and decryption arithmetic core of whole system, is stored in the PROM module 5 and the last way of realization of voice encryption software module 2 is modes as firmware.After system powers on; FPGA processor module 4 receives the voice encryption software module 2 that is stored in the PROM module 5 under main string pattern; Accomplish its initial configuration, then FPGA processor module 4 is to the order of peripheral hardware A/D module 7 transmitter registers, initialization A/D module 7.At this moment, initialization finishes, and voice encryption software module 2 runs on the FPGA processor module 4, will carry out the encryption and decryption communication process through the IO interface and peripheral hardware A/D module 7 interaction datas of FPGA processor module 4.
The voice encryption process: at first, FPGA processor module 4 is called in token sound reception/transmission algorithm module 9 and under 7 SECO of A/D module, is received speech data from the I/O interface, and carries out the string and the conversion of speech data; Then, operation voice encryption/decryption algorithm module 10 is encrypted speech data; Then, operation type phonetic synthesis/decomposition algorithm module 11 is carried out mapping transformation to the class voice after encrypting, and once more, operation voice signal synchronization module 12 adds synchronizing signal to the speech data after encrypting; At last, the token sound reception/transmission algorithm module 9 of reruning, with speech data carry out and go here and there the conversion after, under the clock control of A/D module, send to the A/D module to speech data through the I/O interface.
Voice decrypting process: at first; FPGA processor module 4 is called in token sound reception/transmission algorithm module 9 and under the clock control of A/D module 7, is received the speech data of encrypting from the I/O interface; Then, move voice signal synchronization module 12, type phonetic synthesis/decomposition algorithm module 11, voice encryption/decryption algorithm module 10 respectively successively, the speech data after encrypting is carried out decryption processing; At last; Token sound reception/transmission algorithm the module 9 of reruning, with the speech data after the deciphering carry out and go here and there change after, export decrypted voice to A/D module 7 through the I/O interface.
Voice encryption/decryption algorithm module 10 described in the inventive method adopts phase place encryption/decryption algorithm, frequency domain encryption/decryption algorithm, frame scramble encryption/decryption algorithm that speech data is handled respectively; Described type of phonetic synthesis/decomposition algorithm module 11 adopts technology such as a type voice mapping transformation, voice enhancing, realizes the voice encryption of anti-AMR; Described voice signal synchronized algorithm module 12, the voice that are used to after the encryption provide synchronously, and through choosing the sine wave of a definite form, frequency makes receiving terminal can receive signal synchronously between 100-4000HZ.
Shown in Fig. 4 way circuit schematic diagram of the present invention, after system powered on, the PROM module was downloaded mouth through TDO (data output), TMS (model selection), TCK (clock) with the program that system program downloads to the FPGA processor module.After the FPGA processor module receives system program, accomplish its initial configuration, then under the effect of SCLK (clock synchronization), FS (frame synchronization), order two A/D chips of initialization peripheral hardware to A/D module transmitter register from Dout (data output) pin.Wherein, after the A/D module initialization, operating frequency is 8KHZ.The A/D module not only is responsible for speech data is carried out the conversion of digital-to-analogue, to the FPGA processor module SCLK (clock synchronization), FS (frame synchronization) signal is provided simultaneously, thereby control FPGA processor module receives and send speech data.The voice encryption implementation procedure is following:
The voice signal ascender: voice input to up A/D module from the standard microphone input interface; After up A/D module samples quantizes; Sound signal stream inputs to the I/O pin of FPGA processor module from Din (data input) pin under the effect of SCLK (clock synchronization), FS (frame synchronization).In the FPGA processor module, carry out as described in Figure 3 after token sound receives, encrypt, type phonetic synthesis, add synchronizing signal, last token sound output.The sound signal stream of encrypting is transported to up A/D module from Dout (data output) pin and is carried out steering D/A conversion under the effect of SCLK (clock synchronization), FS (frame synchronization), exports from WCDMA mobile phone received pronunciation input/output interface at last.
The voice signal descender: encrypted speech inputs to descending A/D module from WCDMA mobile phone received pronunciation input/output interface; After descending A/D module samples quantizes; Sound signal stream inputs to the I/O pin of FPGA processor module from Din (data input) pin under the effect of SCLK (clock synchronization), FS (frame synchronization).After in the FPGA processor module, carrying out token sound reception as described in Figure 3, carry out synchronized algorithm computing, type voice decomposition, decrypt operation, last token sound output.Sound signal stream after the deciphering exports descending A/D module to from Dout (data output) pin and carries out steering D/A conversion under the effect of SCLK (clock synchronization), FS (frame synchronization), exports from the standard earphone output interface at last.
Like Fig. 5 and Fig. 6, be the circuit theory diagrams of FPGA processor module of the present invention and the cascade of A/D module.The voice signal ascender: voice signal receives through the voice receiving circuit earlier from the input of standard microphone input interface, after the amplifying circuit signal amplifies, inputs to up A/D chip through the mixing and filtering circuit again.After the transformation of variables of up A/D dies, voice signal is input to the FPGA processor module again and carries out encryption.Then, the encrypted speech signal amplifies through amplifying circuit after the A/D chip is handled again, exports through the WCDMA mobile phone radio frequency through WCDMA mobile phone received pronunciation input/output interface.The voice signal descender: encrypted speech at first from the input of WCDMA mobile phone received pronunciation input/output interface, amplifies after the mixing and filtering circuit inputs to descending A/D chip through the amplifying circuit signal then.After the conversion of descending A/D chip, the encrypted speech signal is input to the FPGA processor module and carries out decryption processing.Voice signal after the deciphering amplifies through the amplifying circuit signal after the conversion of A/D chip again, at last through the output of standard earphone output interface.
Like Fig. 7, the systems soft ware operational process of the present invention's technology is following, and system carries out initialize routine in the back that powers on, and at first accomplishes the initial configuration of FPGA processor module and peripheral hardware A/D module, begins normal encryption and decryption communication then.During the voice encryption process, at first move token sound reception/transmission algorithm module 9, receive the binary digital signal of input, convert corresponding data-signal and line output to; Then move voice encryption/decryption algorithm module 10, voice signal is encrypted by ad hoc fashion; Operation type phonetic synthesis/decomposition algorithm module 11 is carried out mapping transformation to the class voice after encrypting then; Next moves voice signal synchronization module 9, and the encrypted speech signal is added specific synchronizing signal; Move token sound reception/transmission algorithm module 9 at last, convert data-signal to corresponding binary digital signal serial output.During the voice decrypted voice, at first move token sound reception/transmission algorithm module 9, receive the binary digital signal of input, convert corresponding data-signal and line output to; Then move voice signal synchronization module 9, judge whether that picked up signal is synchronous, if not, then do not upgrade synchronizing signal position, proceed the computing of subsequent module, if, at first upgrade synchronizing signal position, move subsequent module then; Then operation class phonetic synthesis/decomposition algorithm module 11 is to signal type of the carrying out voice inverse mapping conversion after synchronous; The voice encryption/decryption algorithm of reruning module 10 is deciphered signal with ad hoc fashion; Move token sound reception/transmission algorithm module 9 at last, be transformed into corresponding binary digital signal serial output to data-signal.
Like Fig. 8; Shown in the token sound reception/transmission algorithm module flow process of the present invention's technology: when module receives data; At first serial data receives, buffer memory input then, then sampling string and conversion algorithm module; Become corresponding data-signal to the serial binary digital signal conversion of input, last parallel data output; When module was sent data, at first parallel data received, buffer memory input then, and then sampling string and conversion algorithm module become corresponding data-signal to the serial binary digital signal conversion of input, last and line output.
Like Fig. 9; Shown in the voice encryption/decipherment algorithm module flow process of the present invention's technology: during enciphered data; At first buffer memory is imported data; Secondly confirm the encryption parameter of phase place AES, frequency AES, frame scrambling encryption algorithm, then adopt phase place AES, frequency AES, frame scrambling encryption algorithm that former data are encrypted successively, export data encrypted at last; During data decryption; At first buffer memory is imported data; Secondly confirm the deciphering parameter of phase place decipherment algorithm, frequency decipherment algorithm, frame scramble decipherment algorithm; Then adopt frame scramble decipherment algorithm, frequency decipherment algorithm, phase place decipherment algorithm that ciphered data is deciphered successively, the data after the output deciphering at last.
Like Figure 10, shown in the class phonetic synthesis/decomposition algorithm module flow process of the present invention's technology: during generated data, at first data are carried out the buffer memory input,, carry out voice again and strengthen, the class speech data after output at last is synthetic then to the mapping transformation of data type of carrying out voice; During decomposition data, at first data are carried out the buffer memory input, then, carry out voice again and strengthen, the speech data after output is decomposed at last data type of carrying out voice mapping inverse transformation.
Like Figure 11, shown in the voice signal synchronized algorithm module flow process of the present invention's technology: during enciphered data, at first data are carried out the buffer memory input, then confirm the parameter of sync waveform, add synchronizing signal then, output at last has the data of synchronizing signal; During data decryption, at first data are carried out the buffer memory input, then carry out the sync correlation computing, confirm the sync waveform position, remove synchronizing signal then, export pure data at last.
Should be understood that; Concerning those of ordinary skills; Can be according to the present invention technology preferred embodiment with and technical conceive various possible improvement or the replacement made, and all these changes or replacement all should belong to the protection range of accompanying claims of the present invention.

Claims (8)

1. anti-adaptive multi-rate coding third-generation mobile communication end-to-end speech ciphering method; It is characterized in that through providing received pronunciation input, output interface module to be connected with the multiplexing mobile phone of WCDMA; The multiplexing mobile phone speech signal of WCDMA is inserted voice encryption software module and voice encryption hardware module; Carry out the voice encryption computing, realize the voice encryption function; Wherein, described voice encryption hardware module (1) is a minimal hardware system module based on the FPGA processing platform, mainly comprises: FPGA processor module (4), PROM module (5), power module (6), A/D module (7) and clock module (8); Described FPGA processor module (4) is as the core of hardware system, the encryption and decryption computing of processes voice signals; Described PROM module (5) connects the data download interface of FPGA processor module (4), and after powering on, PROM module (5) downloads to FPGA processor module (4) with the series arrangement data; Described power module (6) connects the power interface of FPGA processor module (4) and A/D module (7), is responsible for power supply; Described A/D module (7) connects the IO pin of FPGA processor module (4), is responsible for the D/A switch of voice signal, controls FPGA processor module (4) receiving and transmitting voice signal simultaneously; Described clock module (8) connects the clock interface of A/D module (7), for A/D module (7) provides the pulse oscillating ripple; Described voice encryption software module (2); Be the software module that runs on the fpga chip, form by token sound reception/transmission algorithm module (9), voice encryption/decipherment algorithm module (10), type phonetic synthesis/decomposition algorithm module (11) and voice signal synchronized algorithm module (12) four parts; Described received pronunciation input, output interface module (3) comprising: standard microphone input interface, standard earphone output interface and WCDMA mobile phone received pronunciation input/output interface; Described standard microphone input interface connects the voice microphone, and the input of microphone voice signal is provided; The standard earphone output interface connects earphone, and last decrypted voice is exported through earphone; WCDMA mobile phone received pronunciation input/output interface is used to connect the WCDMA mobile phone, is responsible for encrypted speech is given mobile phone radio frequency output and received encrypted speech from mobile phone.
2. anti-adaptive multi-rate coding third-generation mobile communication end-to-end speech ciphering method according to claim 1; When it is characterized in that voice encryption software module (2) inserts voice; Voice encryption software module (2) is moved token sound reception/transmission algorithm module (9), voice encryption/decipherment algorithm module (10), type phonetic synthesis/decomposition algorithm module (11) and voice signal synchronized algorithm module (12) respectively; Realize the encryption and decryption communication of WCDMA mobile phone speech, concrete grammar is:
7) system initialization: after system powered on, FPGA received the series arrangement data from outside PROM under main string pattern, accomplished the initial configuration of FPGA, and then FPGA orders to peripheral hardware A/D module transmitter register through its IO pin, initialization A/D module,
8) enciphered data: core FPGA processor module at first moves token sound reception/transmission algorithm module (9) after receiving voice signal from the A/D module, is transformed into corresponding data-signal to the binary digital signal of serial input; Then move voice encryption/decipherment algorithm module (10), speech data signal is encrypted by ad hoc fashion; Phonetic synthesis/decomposition algorithm the module (11) of operation class then is to class voice type of the carrying out voice mapping transformation after encrypting; The voice signal synchronized algorithm module (12) of reruning adds specific synchronizing signal to the speech-like signal after encrypting; Move token sound transmission/receiving algorithm module (9) at last, be transformed into corresponding binary digital signal serial output to data-signal,
9) data decryption: when core FPGA processor module receives the voice signal of encryption from the A/D module, at first move token sound transmission/receiving algorithm module (9), be transformed into corresponding data-signal to the binary digital signal of serial input; Next moves voice signal synchronized algorithm module (12), judges whether to find synchronizing signal, if not, then still be as the criterion with former synchronizing signal position, and the operation of operation subsequent module, if, then at first upgrade synchronizing signal position, move subsequent module then; Then operation type phonetic synthesis/decomposition algorithm module (11) is shone upon inverse transformation to the speech-like signal synchronously; Move voice encryption/decipherment algorithm module (10) then, signal is deciphered with ad hoc fashion; Move token sound transmission/receiving algorithm module (9) at last, be transformed into corresponding binary digital signal serial output to data-signal.
3. anti-adaptive multi-rate coding third-generation mobile communication end-to-end speech ciphering method according to claim 1 is characterized in that described FPGA processor module (4) is the encryption and decryption arithmetic core with the fpga chip of XC3S500E model; The voltage of described power module (6) input is 5V; Conversion output voltage through this power supply chip: 3.3V, 2.5V and 1.2V; Power module (6) provides the voltage of 3.3V, 2.5V and 1.2V to FPGA processor module (4), simultaneously A/D module (7) is provided the voltage of 5V and 3.3V; The clock frequency that described clock module (8) provides to A/D module (7) is 16.384MHZ.
4. anti-adaptive multi-rate coding third-generation mobile communication end-to-end speech ciphering method according to claim 1 is characterized in that described received pronunciation input, output interface module (3) and standard earphone output interface all adopt standard 3.5mm stereo audio connector; Described WCDMA mobile phone received pronunciation input/output interface adopts standard 2.5mm stereo audio connector.
5. anti-adaptive multi-rate coding third-generation mobile communication end-to-end speech ciphering method according to claim 1; It is characterized in that in the voice encryption software module (2); Described token sound reception/transmission algorithm module (9) comprise main program call, receive the input of data, buffer memory, string also/and go here and there transfer algorithm and output several steps; Realize the reception and the transmission of voice, concrete grammar is:
7) main program calls: when system moved token sound reception/transmission algorithm module, main program called this module and carries out computing,
8) send data: when data need be sent, at first data are carried out the buffer memory input, adopt and go here and there conversion algorithm module then, be transformed into corresponding binary digital signal serial output to data-signal;
9) receive data: after receiving data-signal, at first data are carried out the buffer memory input, sampling string and conversion algorithm module become corresponding data-signal and line output to the serial binary digital signal conversion of input then.
6. anti-adaptive multi-rate coding third-generation mobile communication end-to-end speech ciphering method according to claim 1; It is characterized in that in the voice encryption software module (2); Described voice encryption/decipherment algorithm module (10) comprises that main program calls, receives that the input of data, buffer memory, enciphering/deciphering parameter are confirmed, phase place encryption/decryption algorithm, frequency encryption/decryption algorithm, frame scramble encryption/decryption algorithm and output several steps; Realize the encryption and decryption of voice, concrete grammar is:
7) main program calls: during system operation voice encryption/decipherment algorithm module, main program calls this module and carries out the enciphering/deciphering computing,
8) enciphered data: at first buffer memory is imported data; Secondly confirm the encryption parameter of phase place AES, frequency AES, frame scrambling encryption algorithm; Then adopt phase place AES, frequency AES, frame scrambling encryption algorithm that former data are encrypted successively, export data encrypted at last;
9) data decryption: at first buffer memory is imported data; Secondly confirm the deciphering parameter of phase place decipherment algorithm, frequency decipherment algorithm, frame scramble decipherment algorithm; Then adopt frame scramble decipherment algorithm, frequency decipherment algorithm, phase place decipherment algorithm that ciphered data is deciphered successively, the data after the output deciphering at last.
7. anti-adaptive multi-rate coding third-generation mobile communication end-to-end speech ciphering method according to claim 1; It is characterized in that in the voice encryption software module (2); Described type of phonetic synthesis/decomposition algorithm module (11) comprises main program and calls, receives data, buffer memory input, type voice mapping transformation/inverse transformation, voice enhancing and output several steps; Realize the synthetic and decomposition of type voice, concrete grammar is:
7) main program calls: during a system operation type phonetic synthesis/decomposition algorithm module, main program calls this module type of carrying out phonetic synthesis/decomposition,
8) generated data: when data need be synthesized, at first data are carried out the buffer memory input,, carry out voice again and strengthen, the class speech data after output at last is synthetic then to the mapping transformation of data type of carrying out voice;
9) decomposition data: when data need be decomposed, at first data are carried out the buffer memory input, then, carry out voice again and strengthen, the speech data after output is decomposed at last to data type of carrying out voice mapping inverse transformation.
8. anti-adaptive multi-rate coding third-generation mobile communication end-to-end speech ciphering method according to claim 1; It is characterized in that in the voice encryption software module (2); Described voice signal synchronized algorithm module (12) comprises that main program calls, receives that the input of data, buffer memory, sync waveform parameter are confirmed, the sync correlation computing, add/removes synchronizing signal and export several steps; Realize the synchronized transmission of signal and the decryption restoration of receiving terminal, concrete grammar is:
7) main program calls: when system moved voice signal synchronized algorithm module, main program called this module and carries out the synchronized transmission of signal and the decryption restoration of receiving terminal,
8) enciphered data: when needing enciphered data, at first data are carried out the buffer memory input, then confirm the parameter of sync waveform, add synchronizing signal then, output at last has the data of synchronizing signal;
9) data decryption: during deciphering, at first data are carried out the buffer memory input, then carry out the sync correlation computing, confirm the sync waveform position, remove synchronizing signal then, export pure data at last.
CN2009101832324A 2009-07-23 2009-07-23 Anti-adaptive multi-rate coding third-generation mobile communication end-to-end voice encryption method Expired - Fee Related CN101631304B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009101832324A CN101631304B (en) 2009-07-23 2009-07-23 Anti-adaptive multi-rate coding third-generation mobile communication end-to-end voice encryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009101832324A CN101631304B (en) 2009-07-23 2009-07-23 Anti-adaptive multi-rate coding third-generation mobile communication end-to-end voice encryption method

Publications (2)

Publication Number Publication Date
CN101631304A CN101631304A (en) 2010-01-20
CN101631304B true CN101631304B (en) 2012-05-23

Family

ID=41576201

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009101832324A Expired - Fee Related CN101631304B (en) 2009-07-23 2009-07-23 Anti-adaptive multi-rate coding third-generation mobile communication end-to-end voice encryption method

Country Status (1)

Country Link
CN (1) CN101631304B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101835146A (en) * 2010-04-12 2010-09-15 东南大学 Third generation mobile network mobile phone sound end-to-end encrypting device and method
CN104185173A (en) * 2013-05-23 2014-12-03 东南大学常州研究院 Enhanced variable rate code resistant voice end-to-end encryption and decryption method
CN105045368B (en) * 2015-06-17 2017-09-15 四川长虹通信科技有限公司 Mobile terminal and its secure communication device
CN105407480B (en) * 2015-08-27 2018-10-30 电子科技大学 A kind of encryption method of encryption headset
CN105743912B (en) * 2016-03-31 2020-04-07 宇龙计算机通信科技(深圳)有限公司 Voice encryption method and voice sending terminal
CN112601220A (en) * 2021-03-04 2021-04-02 广州志胜游艺设备有限公司 Selector signal transmission method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101345615A (en) * 2008-08-05 2009-01-14 广东工业大学 Design method for chaos digital secret communication system based on FPGA
CN101577619A (en) * 2008-05-08 2009-11-11 吴志军 Real-time speech secret communication system based on information hiding

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101577619A (en) * 2008-05-08 2009-11-11 吴志军 Real-time speech secret communication system based on information hiding
CN101345615A (en) * 2008-08-05 2009-01-14 广东工业大学 Design method for chaos digital secret communication system based on FPGA

Also Published As

Publication number Publication date
CN101631304A (en) 2010-01-20

Similar Documents

Publication Publication Date Title
CN101014060B (en) Voice encryption method for GSM handset with anti longterm prediction rule pulse excitation compression coding
CN101631304B (en) Anti-adaptive multi-rate coding third-generation mobile communication end-to-end voice encryption method
KR100871578B1 (en) Multiple format secure voice apparatus for communication handsets
CN102075321B (en) Mobile communication end-to-end voice encryption Bluetooth handheld device and voice encryption method
CN1203629C (en) Double-encrypted algorithm used in satellite channel with time delay
EP3348030B1 (en) Methods and systems for transmission of arbitrary data via bluetooth hfp audio connections with low latency
WO2008129546A2 (en) Voice encryption device
CN101835146A (en) Third generation mobile network mobile phone sound end-to-end encrypting device and method
CN106888310A (en) Ciphering and deciphering device and method and communication terminal device
CN104185173A (en) Enhanced variable rate code resistant voice end-to-end encryption and decryption method
CN103956163B (en) Common voice and encrypted voice interconversion system and method
CN104954951B (en) A kind of bluetooth earphone and its speech ciphering method with voice encryption function
CN102307346B (en) Method for security of mobile phone communication and security mobile phone
CN1564504B (en) Chaos coding/decoding method of data stream and modularized circuit
CN202050421U (en) End-to-end encrypted speech processing device
CN104581714A (en) Method for encrypting speech on basis of TD-SCDMA (time division-synchronization code division multiple access) circuit domains
CN102970133A (en) Voice transmission method of quantum network and voice terminal
CN1893474A (en) Method and apparatus for realizing voice enciphering in communication system
CN101902734B (en) End-to-end self-synchronization voice encryption transmission implementation method for digital trunking communication system
CN204836595U (en) Cell -phone with pronunciation encryption function
RU2433547C1 (en) Method, apparatus and system for end-to-end encryption of voice data and transmission thereof over public communication networks
CN108429851A (en) A kind of method and device of cross-platform information source voice encryption
CN204707258U (en) A kind of bluetooth earphone with voice encryption function
JP4229830B2 (en) Mobile phone system
CN202003675U (en) Independent end-to-end special voice treatment communication device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120523

Termination date: 20150723

EXPY Termination of patent right or utility model