CN113645613A - Real-time voice encryption equipment and method for cellular mobile network - Google Patents

Real-time voice encryption equipment and method for cellular mobile network Download PDF

Info

Publication number
CN113645613A
CN113645613A CN202110772795.8A CN202110772795A CN113645613A CN 113645613 A CN113645613 A CN 113645613A CN 202110772795 A CN202110772795 A CN 202110772795A CN 113645613 A CN113645613 A CN 113645613A
Authority
CN
China
Prior art keywords
voice
module
cellular mobile
data
voice encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110772795.8A
Other languages
Chinese (zh)
Other versions
CN113645613B (en
Inventor
郁滨
黄一才
张体奎
李森森
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Information Engineering University of PLA Strategic Support Force
Original Assignee
Information Engineering University of PLA Strategic Support Force
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Information Engineering University of PLA Strategic Support Force filed Critical Information Engineering University of PLA Strategic Support Force
Priority to CN202110772795.8A priority Critical patent/CN113645613B/en
Publication of CN113645613A publication Critical patent/CN113645613A/en
Application granted granted Critical
Publication of CN113645613B publication Critical patent/CN113645613B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L19/00Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
    • G10L19/005Correction of errors induced by the transmission channel, if related to the coding algorithm
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L19/00Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
    • G10L19/04Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis using predictive techniques
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/0057Block codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L19/00Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
    • G10L2019/0001Codebooks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention belongs to the technical field of network information security, and particularly relates to a real-time voice encryption device and a real-time voice encryption method for a cellular mobile network, wherein the voice encryption device is divided into a receiving end voice encryption device and a sending end voice encryption device which are respectively connected with a cellular mobile phone through Bluetooth, and a cellular mobile network voice channel is established between the cellular mobile phones; the sending end voice encryption equipment and the receiving end voice encryption equipment respectively comprise a voice communication module, an information source coding module, a sequence password module, a channel coding module, a similar voice modulation module and a Bluetooth connection module; and when receiving the voice signal of the other party, the receiving end voice encryption equipment processes the voice signal according to the reverse sequence of the sending end voice encryption equipment and outputs plain voice to the earphone of the user. The invention can be applied to real-time voice encryption means of different types of cellular mobile networks so as to solve the problem of the safety of the voice channel of the current cellular mobile network.

Description

Real-time voice encryption equipment and method for cellular mobile network
Technical Field
The invention belongs to the technical field of network information security, and particularly relates to real-time voice encryption equipment and a method for a cellular mobile network.
Background
The cellular mobile network is generally composed of a mobile terminal, a wireless access network and a core network in structure, and voice signal transmission comprises two stages of air transmission and core network transmission between the mobile terminal and a base station. In 2G and 3G networks, voice signals in a core network are transmitted in a plaintext manner, authentication on an access network is not supported in an over-the-air transmission stage, an a 5-series cryptographic algorithm used is fragile, and part of mobile operators do not support the encryption scheme, so that the networks face a large security threat. In 4G and 5G networks, although the security system is intensively reconstructed, the full IP packet data transmission faces the security threat of the traditional network. Furthermore, in all networks from 2G to 5G, the voice communication security architecture is controlled by the mobile operator, and the privacy of the user is difficult to guarantee. Therefore, the secure communication of the voice channel of the cellular mobile network needs to be realized by an end-to-end encryption technology.
In the voice over-the-air transmission stage of the cellular mobile network, vocoders deployed in the mobile terminal and the base station perform parametric coding transmission on voice signals, and techniques such as voice-activity detection (VAD) and Discontinuous Transmission (DTX) are used to improve the channel utilization, and signals without voice characteristics are regarded as noise and discarded. Therefore, the voice signal is randomized after being digitally encrypted, thereby losing the voice characteristic and being difficult to transmit in the cellular mobile network.
Disclosure of Invention
In order to solve the problems in the prior art, the invention provides a real-time voice encryption device and a real-time voice encryption method for a cellular mobile network, which can be suitable for real-time voice encryption means of different types of cellular mobile networks so as to solve the problem of the safety of the voice channel of the current cellular mobile network.
In order to solve the technical problems, the invention adopts the following technical scheme:
the invention provides a real-time voice encryption device of a cellular mobile network, which comprises a receiving end voice encryption device and a sending end voice encryption device, wherein the receiving end voice encryption device and the sending end voice encryption device are respectively connected with a cellular mobile phone through Bluetooth, and a cellular mobile network voice channel is established between the cellular mobile phones;
the voice encryption equipment at the sending end comprises a voice call module, an information source coding module, a sequence password module, a channel coding module, a voice-like modulation module and a Bluetooth connection module which are sequentially connected according to a voice transmission direction; the voice call module is used for picking up the voice of the user and amplifying, sampling and quantizing the voice when the user speaks; the source coding module is used for compressing and coding the voice data frame into voice parameters; the sequence password module is used for encrypting the voice parameters into secret language data; the channel coding module is used for carrying out forward error correction on the transmitted secret speech data; the quasi-voice modulation module is used for mapping the forward error-corrected whisper-phrase data into a quasi-voice signal; the Bluetooth connection module is used for establishing a voice transmission channel with a cellular mobile phone;
the receiving end voice encryption equipment comprises a Bluetooth connection module, a similar voice modulation module, a channel coding module, a sequence cipher module, an information source coding module and a voice communication module which are sequentially connected according to a voice transmission direction, and when receiving a similar voice signal of the other side, the receiving end voice encryption equipment processes the voice signal according to the reverse order of the transmitting end voice encryption equipment and outputs plain-language voice to a user earphone.
Furthermore, the voice-like modulation module comprises a modulation codebook, a modulator, a signal recorder, a signal compensator, a demodulator and a demodulation codebook;
the modulator maps the forward error-corrected whisper state data into waveform symbols in a modulation codebook generated by optimization in advance, and carries out filtering and shaping to eliminate high-frequency harmonic waves, and then the waveform symbols are transmitted by a voice channel of a cellular mobile network;
and the signal compensator implements waveform compensation on the received sending end voice signal according to the historical voice data recorded by the signal recorder, and then the demodulator demodulates the compensated signal into target data by using a demodulation codebook.
Further, the modulator, the signal recorder, the signal compensator and the demodulator need to train a demodulation codebook through online learning, and the process is as follows: a modulator of the voice encryption equipment at the sending end maps a random number sequence shared and prefabricated by the two parties into a waveform symbol in a modulation codebook and sends the waveform symbol to an opposite end through a voice channel of a cellular mobile network; and the receiving end voice encryption equipment learns to generate an optimal demodulation codebook according to the preset random number sequence and the modulation codebook shared by the two parties, and trains a signal compensation weight.
Furthermore, the channel coding module comprises a coding module, an interleaving module, a reverse interleaving module and a decoding module;
the encoding module of the sending end voice encryption equipment encodes the secret language data by using a multi-core polarization code, then the data is subjected to/line data interleaving by an interleaving module, and finally the data is subjected to DoV link transmission;
the reverse interleaving module of the receiving end voice encryption equipment implements/line data reverse interleaving conversion, and then the data is decoded into target data by the decoding module.
Further, the sequence cipher module comprises an authentication key negotiation module, a key synchronization module and an encryption and decryption module;
the encryption and decryption module is a sequence cipher algorithm using two parameters of a seed key and an initial vector, the seed key is kept unchanged in one session, and the initial vector is replaced periodically; the working process is as follows: an encryption and decryption module of the sending end voice encryption equipment encrypts transmission data based on a modulo two addition operation by using a password generation algorithm and delivers the transmission data to a DoV link for transmission; the encryption and decryption module of the receiving end voice encryption equipment decrypts the received data based on the modulo two encryption operation;
the key synchronization module is used for carrying out key synchronization; the process comprises two parts of content of initial vector synchronization and data frame sequence number synchronization, and is realized by using a data check and prediction technology;
the authentication key negotiation module is used for negotiating a seed key, and the process is as follows: the receiving end voice encryption equipment and the sending end voice encryption equipment complete terminal registration through a private key generation center before conversation, and during conversation, the receiving end voice encryption equipment and the sending end voice encryption equipment complete seed key negotiation based on identity authentication based on a certificateless public key cryptosystem.
Further, the source coding module adopts a MELP algorithm, and the working process thereof is as follows: the source coding module of the sending end voice encryption equipment compresses and codes the voice data frames sampled and quantized by the voice communication module into voice parameters by using a MELP algorithm, and the voice parameters are encrypted by the sequence cipher module; and the information source coding module of the receiving end voice encryption equipment reconstructs plain voice based on the voice parameters decrypted by the sequence password module and delivers the plain voice to the voice communication module for output.
Furthermore, the voice call module comprises a microphone voice driving module, a sampling quantization module and a voice power amplifier driving module, and the microphone voice driving module of the sending end voice encryption device is used for amplifying and transmitting a weak voice signal of a user microphone to the sampling quantization module; and a voice power amplifier driving module of the receiving end voice encryption equipment amplifies the power of the reconstructed plain-language voice and outputs the amplified plain-language voice to a user earphone.
Further, receiving end pronunciation encryption equipment and sending end pronunciation encryption equipment are earphone, wrist-watch or the wearable equipment of bracelet.
Further, the voice encryption device further comprises a control module, a display module, a battery and a power supply module.
The invention also provides a real-time voice encryption method for the cellular mobile network, which comprises the following steps:
for the sending end:
when a user speaks, a voice communication module of the voice encryption equipment at the sending end picks up the voice of the user, amplifies, samples and quantizes the voice, and then a voice data frame is sent to a signal source coding module to be compressed and coded into voice parameters; the data are further encrypted into secret speech state data by a sequence cipher module, and are sent to a channel coding module for forward error correction, then are mapped into a speech-like signal by a speech-like modulation module, and finally are transmitted to a cellular mobile phone by a Bluetooth connection module;
for the receiving end:
the similar voice modulation module of the receiving end voice encryption equipment demodulates the received similar voice signals into secret speech state data, the secret speech state data is further subjected to error detection and correction by the channel coding module, then the secret speech state data is decrypted and converted into voice parameters by the sequence coding module, finally the voice parameters are reconstructed into a plain speech state voice signal by the information source coding module, and the plain speech state voice signal is subjected to power amplification by the voice communication module and then is output to a user earphone.
Compared with the prior art, the invention has the following advantages:
the cellular mobile network real-time voice encryption equipment adopts a DoV modulation and demodulation technology based on waveform symbol mapping, a channel coding technology based on multi-core polarization codes and a certificateless public key cryptosystem key negotiation technology, can provide end-to-end voice encryption service for various cellular mobile networks such as 2G to 5G and the like under the condition of not changing hardware, software or protocols of a mobile phone terminal and not requiring any application, has the advantages of good network adaptation, high voice reduction quality and high safety intensity, and really realizes digital voice encryption.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a block diagram of a cellular mobile network voice channel real-time encryption communication system constructed by a cellular mobile network real-time voice encryption device and a cellular mobile phone according to an embodiment of the present invention, where 10 denotes a receiving-end voice encryption device, 20 denotes a transmitting-end voice encryption device, and 30 denotes a cellular mobile phone;
fig. 2 is a block diagram of the receiving-end voice encryption device and the transmitting-end voice encryption device according to an embodiment of the present invention; 11 represents a Bluetooth connection module, 12 represents a similar voice modulation module, 13 represents a channel coding module, 14 represents a sequence password module, 15 represents an information source coding module, and 16 represents a voice communication module;
fig. 3 is a block diagram of a structure of a speech-like modulation module according to an embodiment of the present invention, where 121 denotes a modulation codebook, 122 denotes a modulator, 124 denotes a signal recorder, 126 denotes a signal compensator, 128 denotes a demodulator, and 129 denotes a demodulation codebook;
fig. 4 is a block diagram of a channel coding module according to an embodiment of the present invention, where 132 denotes a coding module, 134 denotes an interleaving module, 136 denotes an inverse interleaving module, and 138 denotes a decoding module;
fig. 5 is a block diagram of a serial cipher module according to an embodiment of the present invention, where 142 denotes an authenticated key agreement module, 144 denotes a key synchronization module, and 146 denotes an encryption/decryption module;
fig. 6 is a block diagram of a voice call module according to an embodiment of the present invention, where 162 denotes a microphone voice driver module, 164 denotes a sampling quantization module, and 166 denotes a voice power amplifier driver module.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer and more complete, the technical solutions in the embodiments of the present invention will be described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention, and based on the embodiments of the present invention, all other embodiments obtained by a person of ordinary skill in the art without creative efforts belong to the scope of the present invention.
Fig. 1 is a structural diagram of a cellular mobile network voice channel real-time encryption communication system constructed by a cellular mobile network real-time voice encryption device and a cellular mobile phone, which includes two voice encryption devices and two cellular mobile phones which are integrated with a bluetooth module in the specification of a handset and are already connected to the network.
As shown in fig. 2, this embodiment proposes a real-time voice encryption device for cellular mobile network, which is divided into a receiving end voice encryption device and a sending end voice encryption device, where the receiving end voice encryption device establishes a bluetooth connection with a cellular mobile phone of the receiving end, the sending end voice encryption device establishes a bluetooth connection with a cellular mobile phone of the sending end, and a cellular mobile network voice channel is established between cellular mobile phones at both ends to implement real-time voice communication.
The voice encryption equipment at the sending end comprises a voice call module, an information source coding module, a sequence password module, a channel coding module, a voice-like modulation module and a Bluetooth connection module which are sequentially connected according to a voice transmission direction; the voice call module is used for picking up the voice of the user and amplifying, sampling and quantizing the voice when the user speaks; the source coding module is used for compressing and coding the voice data frame into voice parameters; the sequence password module is used for encrypting the voice parameters into secret language data; the channel coding module is used for carrying out forward error correction on the transmitted secret speech data; the quasi-voice modulation module is used for mapping the forward error-corrected whisper-phrase data into a quasi-voice signal; the Bluetooth connection module is used for establishing a voice transmission channel with the cellular mobile phone, and the encrypted voice data is finally transmitted to the cellular mobile phone to realize 'transparent' transmission in a cellular mobile network voice channel.
The receiving end voice encryption equipment comprises a Bluetooth connection module, a similar voice modulation module, a channel coding module, a sequence cipher module, an information source coding module and a voice communication module which are sequentially connected according to a voice transmission direction, and when receiving a similar voice signal of the other side, the receiving end voice encryption equipment processes the voice signal according to the reverse order of the transmitting end voice encryption equipment and outputs plain-language voice to a user earphone.
As shown in fig. 3, the voice-like modulation module includes a modulation codebook, a modulator, a signal recorder, a signal compensator, a demodulator and a demodulation codebook. The function of the voice modulation module is based on the DoV modulation and demodulation technology of waveform symbol mapping, a DoV link for transmitting digital data is established on a voice channel, and the specific working process is as follows: the modulator maps the forward error-corrected whisper-phase data into waveform symbols in a modulation codebook generated by optimization in advance, and carries out filtering, shaping and high-frequency filtering elimination, and then the waveform symbols are transmitted by a voice channel of a cellular mobile network; and the signal compensator implements waveform compensation on the received sending end voice signal according to the historical voice data recorded by the signal recorder, and then the demodulator demodulates the compensated signal into target data by using a demodulation codebook.
Before the working process occurs, the modulator, the signal recorder, the signal compensator and the demodulator need to train and demodulate the codebook through online learning, and the process is as follows: a modulator of the voice encryption equipment at the sending end maps a random number sequence shared and prefabricated by the two parties into a waveform symbol in a modulation codebook and sends the waveform symbol to an opposite end through a voice channel of a cellular mobile network; and the receiving end voice encryption equipment learns to generate an optimal demodulation codebook according to the preset random number sequence and the modulation codebook shared by the two parties, and trains a signal compensation weight.
As shown in fig. 4, the channel encoding module includes an encoding module, an interleaving module, a reverse interleaving module, and a decoding module; the working process is as follows: the encoding module of the sending end voice encryption equipment encodes the secret language data by using a multi-core polarization code, then the data is subjected to/line data interleaving by an interleaving module, and finally the data is subjected to DoV link transmission; the reverse interleaving module of the receiving end voice encryption equipment implements/line data reverse interleaving conversion, and then the data is decoded into target data by the decoding module.
The encoding module comprehensively utilizes a polarized nuclear Babbitt parameter boundary and a code element distance maximization rule to implement a multi-core polarized code structure irrelevant to the quality of a DoV link; the decoding module performs decoding by using a successive-cancellation list (SCL) decoding algorithm based on a log-likelihood ratio (LLR) transfer formula.
As shown in fig. 5, the sequence cipher module includes an authentication key agreement module, a key synchronization module, and an encryption/decryption module. The encryption and decryption module is a sequence cipher algorithm using two parameters of a seed key and an initial vector, the seed key is kept unchanged in one session, and the initial vector is replaced regularly. The working process is as follows: an encryption and decryption module of the sending end voice encryption equipment encrypts transmission data based on a 'modulo two addition' operation by using a password generation algorithm and delivers the transmission data to a DoV link for transmission; and the encryption and decryption module of the receiving end voice encryption equipment decrypts the received data based on the operation of 'modulo two encryption'.
The process comprises two parts of content of initial vector synchronization and data frame sequence number synchronization, and is realized by using a data check sum prediction technology.
Before the above working process occurs, the authenticated key agreement module is required to negotiate the seed key, and the process is as follows: the receiving end voice encryption device and the sending end voice encryption device complete terminal registration through a Private Key Generator (PKG) before a session, and during the session, the receiving end voice encryption device and the sending end voice encryption device complete seed key negotiation based on identity authentication based on a certificateless public key cryptosystem.
Specifically, the source coding module adopts a MELP algorithm, and the working process thereof is as follows: the source coding module of the sending end voice encryption equipment compresses and codes the voice data frames sampled and quantized by the voice communication module into voice parameters by using a MELP algorithm, and the voice parameters are encrypted by the sequence cipher module; and the information source coding module of the receiving end voice encryption equipment reconstructs plain voice based on the voice parameters decrypted by the sequence password module and delivers the plain voice to the voice communication module for output.
As shown in fig. 6, the voice call module includes a microphone voice driving module, a sampling quantization module and a voice power amplifier driving module, and the working process is as follows: a microphone voice driving module of the sending end voice encryption equipment amplifies and transmits a user microphone weak voice signal to a sampling quantization module, and then a signal source coding module carries out parameter coding; and a voice power amplifier driving module of the receiving end voice encryption equipment amplifies the power of the reconstructed plain-language voice and outputs the amplified plain-language voice to a user earphone.
In addition to the above structure, the voice encryption device of the present embodiment may further include a control module, a display module, a battery, and a power supply module.
The voice encryption device of the embodiment may be a wearable device such as an earphone, a watch, or a bracelet, but is not limited thereto.
The embodiment also provides a real-time voice encryption method for the cellular mobile network, which comprises the following steps:
for the sending end:
when a user speaks, a voice communication module of the voice encryption equipment at the sending end picks up the voice of the user, amplifies, samples and quantizes the voice, and then a voice data frame is sent to a signal source coding module to be compressed and coded into voice parameters; the data are further encrypted into secret speech state data by a sequence cipher module, and are sent to a channel coding module for forward error correction, then are mapped into a speech-like signal by a speech-like modulation module, and finally are transmitted to a cellular mobile phone by a Bluetooth connection module;
for the receiving end:
the similar voice modulation module of the receiving end voice encryption equipment demodulates the received similar voice signals into secret speech state data, the secret speech state data is further subjected to error detection and correction by the channel coding module, then the secret speech state data is decrypted and converted into voice parameters by the sequence coding module, finally the voice parameters are reconstructed into a plain speech state voice signal by the information source coding module, and the plain speech state voice signal is subjected to power amplification by the voice communication module and then is output to a user earphone.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Finally, it is to be noted that: the above description is only a preferred embodiment of the present invention, and is only used to illustrate the technical solutions of the present invention, and not to limit the protection scope of the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention shall fall within the protection scope of the present invention.

Claims (10)

1. A real-time voice encryption device of a cellular mobile network is characterized in that the voice encryption device is divided into a receiving end voice encryption device and a sending end voice encryption device, Bluetooth connection is respectively established between the voice encryption devices and cellular mobile phones, and a cellular mobile network voice channel is established between the cellular mobile phones;
the voice encryption equipment at the sending end comprises a voice call module, an information source coding module, a sequence password module, a channel coding module, a voice-like modulation module and a Bluetooth connection module which are sequentially connected according to a voice transmission direction; the voice call module is used for picking up the voice of the user and amplifying, sampling and quantizing the voice when the user speaks; the source coding module is used for compressing and coding the voice data frame into voice parameters; the sequence password module is used for encrypting the voice parameters into secret language data; the channel coding module is used for carrying out forward error correction on the transmitted secret speech data; the quasi-voice modulation module is used for mapping the forward error-corrected whisper-phrase data into a quasi-voice signal; the Bluetooth connection module is used for establishing a voice transmission channel with a cellular mobile phone;
the receiving end voice encryption equipment comprises a Bluetooth connection module, a similar voice modulation module, a channel coding module, a sequence cipher module, an information source coding module and a voice communication module which are sequentially connected according to a voice transmission direction, and when receiving a similar voice signal of the other side, the receiving end voice encryption equipment processes the voice signal according to the reverse order of the transmitting end voice encryption equipment and outputs plain-language voice to a user earphone.
2. The real-time voice encryption device of cellular mobile network of claim 1, wherein said voice-like modulation module comprises a modulation codebook, a modulator, a signal recorder, a signal compensator, a demodulator and a demodulation codebook;
the modulator maps the forward error-corrected whisper state data into waveform symbols in a modulation codebook generated by optimization in advance, and carries out filtering and shaping to eliminate high-frequency harmonic waves, and then the waveform symbols are transmitted by a voice channel of a cellular mobile network;
and the signal compensator implements waveform compensation on the received sending end voice signal according to the historical voice data recorded by the signal recorder, and then the demodulator demodulates the compensated signal into target data by using a demodulation codebook.
3. The real-time voice encryption device for cellular mobile network of claim 2, wherein the modulator, the signal recorder, the signal compensator and the demodulator need to train the demodulation codebook through online learning, which comprises the following steps: a modulator of the voice encryption equipment at the sending end maps a random number sequence shared and prefabricated by the two parties into a waveform symbol in a modulation codebook and sends the waveform symbol to an opposite end through a voice channel of a cellular mobile network; and the receiving end voice encryption equipment learns to generate an optimal demodulation codebook according to the preset random number sequence and the modulation codebook shared by the two parties, and trains a signal compensation weight.
4. The real-time voice encryption device for cellular mobile networks according to claim 1, wherein the channel coding module comprises a coding module, an interleaving module, a reverse interleaving module and a decoding module;
the encoding module of the sending end voice encryption equipment encodes the secret language data by using a multi-core polarization code, then the data is subjected to/line data interleaving by an interleaving module, and finally the data is subjected to DoV link transmission;
the reverse interleaving module of the receiving end voice encryption equipment implements/line data reverse interleaving conversion, and then the data is decoded into target data by the decoding module.
5. The cellular mobile network real-time voice encryption device of claim 1, wherein the sequence cipher module comprises an authentication key agreement module, a key synchronization module and an encryption and decryption module;
the encryption and decryption module is a sequence cipher algorithm using two parameters of a seed key and an initial vector, the seed key is kept unchanged in one session, and the initial vector is replaced periodically; the working process is as follows: an encryption and decryption module of the sending end voice encryption equipment encrypts transmission data based on a modulo two addition operation by using a password generation algorithm and delivers the transmission data to a DoV link for transmission; the encryption and decryption module of the receiving end voice encryption equipment decrypts the received data based on the modulo two encryption operation;
the key synchronization module is used for carrying out key synchronization; the process comprises two parts of content of initial vector synchronization and data frame sequence number synchronization, and is realized by using a data check and prediction technology;
the authentication key negotiation module is used for negotiating a seed key, and the process is as follows: the receiving end voice encryption equipment and the sending end voice encryption equipment complete terminal registration through a private key generation center before conversation, and during conversation, the receiving end voice encryption equipment and the sending end voice encryption equipment complete seed key negotiation based on identity authentication based on a certificateless public key cryptosystem.
6. The real-time voice encryption device for cellular mobile network according to claim 1, wherein said source coding module employs MELP algorithm, and its working process is: the source coding module of the sending end voice encryption equipment compresses and codes the voice data frames sampled and quantized by the voice communication module into voice parameters by using a MELP algorithm, and the voice parameters are encrypted by the sequence cipher module; and the information source coding module of the receiving end voice encryption equipment reconstructs plain voice based on the voice parameters decrypted by the sequence password module and delivers the plain voice to the voice communication module for output.
7. The real-time voice encryption device of the cellular mobile network according to claim 1, wherein the voice call module comprises a microphone voice driving module, a sampling quantization module and a voice power amplifier driving module, and the microphone voice driving module of the transmitting end voice encryption device is configured to amplify and transmit a weak voice signal of a user microphone to the sampling quantization module; and a voice power amplifier driving module of the receiving end voice encryption equipment amplifies the power of the reconstructed plain-language voice and outputs the amplified plain-language voice to a user earphone.
8. The cellular mobile network real-time voice encryption device of claim 1, wherein the receiving end voice encryption device and the sending end voice encryption device are earphones, watches, or wearable bracelet devices.
9. The cellular mobile network real-time voice encryption device of claim 1, further comprising a control module, a display module, a battery and a power supply module.
10. A real-time voice encryption method for a cellular mobile network is characterized by comprising the following steps:
for the sending end:
when a user speaks, a voice communication module of the voice encryption equipment at the sending end picks up the voice of the user, amplifies, samples and quantizes the voice, and then a voice data frame is sent to a signal source coding module to be compressed and coded into voice parameters; the data are further encrypted into secret speech state data by a sequence cipher module, and are sent to a channel coding module for forward error correction, then are mapped into a speech-like signal by a speech-like modulation module, and finally are transmitted to a cellular mobile phone by a Bluetooth connection module;
for the receiving end:
the similar voice modulation module of the receiving end voice encryption equipment demodulates the received similar voice signals into secret speech state data, the secret speech state data is further subjected to error detection and correction by the channel coding module, then the secret speech state data is decrypted and converted into voice parameters by the sequence coding module, finally the voice parameters are reconstructed into a plain speech state voice signal by the information source coding module, and the plain speech state voice signal is subjected to power amplification by the voice communication module and then is output to a user earphone.
CN202110772795.8A 2021-07-08 2021-07-08 Cellular mobile network real-time voice encryption equipment and method Active CN113645613B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110772795.8A CN113645613B (en) 2021-07-08 2021-07-08 Cellular mobile network real-time voice encryption equipment and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110772795.8A CN113645613B (en) 2021-07-08 2021-07-08 Cellular mobile network real-time voice encryption equipment and method

Publications (2)

Publication Number Publication Date
CN113645613A true CN113645613A (en) 2021-11-12
CN113645613B CN113645613B (en) 2023-07-04

Family

ID=78416896

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110772795.8A Active CN113645613B (en) 2021-07-08 2021-07-08 Cellular mobile network real-time voice encryption equipment and method

Country Status (1)

Country Link
CN (1) CN113645613B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020172364A1 (en) * 2000-12-19 2002-11-21 Anthony Mauro Discontinuous transmission (DTX) controller system and method
CN101026836A (en) * 2007-04-06 2007-08-29 东南大学 Anti vocoder compressed end-to-end voice encryption device and method
CN101059957A (en) * 2007-05-24 2007-10-24 华中科技大学 An audio coding selective cryptographic method
WO2009074711A1 (en) * 2007-12-13 2009-06-18 Nokia Corporation Speech data encryption and decryption
CN101764666A (en) * 2009-12-24 2010-06-30 中国电信股份有限公司 Speech encryption method and device and decryption method and device
CN201655293U (en) * 2009-11-30 2010-11-24 成都林海电子有限责任公司 Audio codec integrated circuit of satellite mobile communication voice coder
CN102737637A (en) * 2011-12-31 2012-10-17 清华大学 Method for data transmission by using voice-like modulation and demodulation
CN103379486A (en) * 2013-06-08 2013-10-30 山东量子科学技术研究院有限公司 Plug and play type portable communication secrecy device and communication method thereof
CN109428639A (en) * 2017-08-24 2019-03-05 上海诺基亚贝尔股份有限公司 Method and apparatus for determining channel state information
US10361802B1 (en) * 1999-02-01 2019-07-23 Blanding Hovenweep, Llc Adaptive pattern recognition based control system and method
CN111818519A (en) * 2020-07-16 2020-10-23 郑州信大捷安信息技术股份有限公司 End-to-end voice encryption and decryption method and system

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10361802B1 (en) * 1999-02-01 2019-07-23 Blanding Hovenweep, Llc Adaptive pattern recognition based control system and method
US20020172364A1 (en) * 2000-12-19 2002-11-21 Anthony Mauro Discontinuous transmission (DTX) controller system and method
CN101026836A (en) * 2007-04-06 2007-08-29 东南大学 Anti vocoder compressed end-to-end voice encryption device and method
CN101059957A (en) * 2007-05-24 2007-10-24 华中科技大学 An audio coding selective cryptographic method
WO2009074711A1 (en) * 2007-12-13 2009-06-18 Nokia Corporation Speech data encryption and decryption
CN201655293U (en) * 2009-11-30 2010-11-24 成都林海电子有限责任公司 Audio codec integrated circuit of satellite mobile communication voice coder
CN101764666A (en) * 2009-12-24 2010-06-30 中国电信股份有限公司 Speech encryption method and device and decryption method and device
CN102737637A (en) * 2011-12-31 2012-10-17 清华大学 Method for data transmission by using voice-like modulation and demodulation
CN103379486A (en) * 2013-06-08 2013-10-30 山东量子科学技术研究院有限公司 Plug and play type portable communication secrecy device and communication method thereof
CN109428639A (en) * 2017-08-24 2019-03-05 上海诺基亚贝尔股份有限公司 Method and apparatus for determining channel state information
CN111818519A (en) * 2020-07-16 2020-10-23 郑州信大捷安信息技术股份有限公司 End-to-end voice encryption and decryption method and system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
GAOANG WANG: "\"Shrinking Encoding with Two-Level Codebook Learning for Fine-Grained Fish Recognition\"", 《2016 ICPR 2ND WORKSHOP ON COMPUTER VISION FOR ANALYSIS OF UNDERWATER IMAGERY (CVAUI)》 *
杨于村;冯穗力;季新生;叶梧;: "加密语音在GSM话音业务信道传输的一种实现方法", 重庆邮电大学学报(自然科学版) *

Also Published As

Publication number Publication date
CN113645613B (en) 2023-07-04

Similar Documents

Publication Publication Date Title
EP1860851B1 (en) Method for implementing voice over IP through and electronic device connected to a packed switched network
CN108768542A (en) A kind of voice signal quantum encryption communication system based on random number
CN101384042A (en) Mobile phone ciphering method based on safe digital interface ciphering card
CN106790281A (en) A kind of end-to-end voice encryption device and encryption method towards intercom system
CN207234973U (en) Video conferencing system based on quantum cryptography
CN102624518B (en) Voice encryption and decryption method
CN105681310A (en) Bluetooth based voice source real-time voice encryption method
CN101951601A (en) Method and system for encrypting voice calls in mobile communication network, terminal and network side
CN109346092A (en) The system and method for voice encryption communication is carried out between a kind of communication terminal
CN103000181A (en) System and implement method thereof for secret communications based on public communication network voice channel
CN105471899A (en) End-to-end voice encryption communication method and device for mobile terminals
CN101287274A (en) Voice encryption system for mobile communication and encryption method thereof
CN109905367A (en) Speech ciphering method based on the air-ground call of VOIP
CN112614498B (en) Method for modulating low-speed data into voice-like signal
CN106412812A (en) Bluetooth voice communication method, Bluetooth voice communication system and Bluetooth headset
CN113645613B (en) Cellular mobile network real-time voice encryption equipment and method
CN1564504B (en) Chaos coding/decoding method of data stream and modularized circuit
CN105120457A (en) Mobile communication circuit domain voice processing apparatus, method and system
CN1592141A (en) Terminal to terminal encryption method of cell phone voice and data
CN113630426B (en) Private encryption method and system based on simultaneous interpretation
CN104581711A (en) Mobile terminal with communication encryption function as well as communication encryption method thereof
Biancucci et al. Secure data and voice transmission over GSM voice channel: Applications for secure communications
US7522730B2 (en) Universal microphone for secure radio communication
CN210693957U (en) Quantum encryption device of PSTN telephone
CN103200564A (en) Global system for mobile communications (GSM) voice encryption system and encryption method based on orthogonal frequency division multiplexing (OFDM)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant