CN101729641B - Machine card separated acoustic code encryption telephone set system - Google Patents

Machine card separated acoustic code encryption telephone set system Download PDF

Info

Publication number
CN101729641B
CN101729641B CN200910249865.0A CN200910249865A CN101729641B CN 101729641 B CN101729641 B CN 101729641B CN 200910249865 A CN200910249865 A CN 200910249865A CN 101729641 B CN101729641 B CN 101729641B
Authority
CN
China
Prior art keywords
card
encryption
machine
user
telephone set
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN200910249865.0A
Other languages
Chinese (zh)
Other versions
CN101729641A (en
Inventor
张丽艳
徐斗勋
王好礼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Bing Gang Technology Development Co Ltd
Original Assignee
Beijing Bing Gang Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Bing Gang Technology Development Co Ltd filed Critical Beijing Bing Gang Technology Development Co Ltd
Priority to CN200910249865.0A priority Critical patent/CN101729641B/en
Publication of CN101729641A publication Critical patent/CN101729641A/en
Application granted granted Critical
Publication of CN101729641B publication Critical patent/CN101729641B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

The invention provides a machine card separated acoustic code encryption telephone set system, comprising an encrypted ID card certificate issuing center, a U encryption card and an acoustic code encryption telephone set. The encrypted ID card certificate issuing center is an authoritative department, and is also a third-party certification department, which comprises a user data server, a key management server, a login terminal and an imprinter, is divided into a primary certificate issuing center and a secondary certificate issuing center, is in off-line working with PSTN network, and has no relation with the PSTN network. Compared with the prior art, the invention has the advantages that the system adopts precautionary measures to prevent certificates from being falsified and forged, so that certificates of both talking parties can not be forged and can not be bugged.

Description

A kind of machine card separated acoustic code encryption telephone set system
Technical field
The present invention relates to a kind of communication security equipment, relate in particular to a kind of machine card separated acoustic code encryption telephone set system.
Background technology
Telecommunications development in the world today is maked rapid progress, and the various communication technologys emerge in an endless stream, yet, no matter how the communication technology changes renewal, the mankind the most directly, the most widely used voice communication means that remain.Along with phone by fixed form to mobile form, the development by PSTN (public switch telephone network) form to various technology such as mobile phone mobile communication forms, also there is deep variation in voice communication secret and safe technology and means.In order to adapt to voice communication security needs, people have developed various types of speech security equipments.
The patent No. is 200610041168.2 patent of invention, a kind of multi-functional digital encrypting telephone is disclosed, relate to a kind of multi-functional digital encrypting telephone, its structure is to comprise filter circuit, an A/D, D/A converter, coding vocoder decoding unit, the 2nd A/D, D/A converter, power amplifier, LCD MODULE, DSP, control panel, modulator-demodulator.Advantage of the present invention: a. introduces the confidentiality that data encryption technology has strengthened telephone communication greatly; B. by one, use the data compression unit of statistical method to process again the speech data of AMBE vocoder output, make the entropy redundancy of speech data reach minimum, thus the code check while further having reduced voice communication.C. unique key authentication system.D. owing to having adopted digital modulation and demodulation, digital transmission technology, make confidential phone there is network access facility.Terminal use can utilize the speech ciphering equipments such as the network equipment and " headset " to carry out secured telephony service by dial mode.
The patent No. is 200480035107.4 patent of invention, disclose a kind of security module for scrambler phone call, related to the security module for scrambler phone call between the telecommunication terminal equipment (VolP-C) in the data network (IP-LAN) towards grouping and the telecommunication terminal equipment (TDM-C) in simulation and/or digital telephone network (TDM).In TDM net, adopt thus the agreement (MIKEY, SRTP) coming from LAN net can realize end to end security.
But although research staff's thinking, means are different, its design philosophy is exactly the same, safety means are realized all the time in communication terminal.This series products at home and abroad market occurs, but up to the present, this series products does not all have extensively to promote the use of in market because price is high, key management is complicated.
Summary of the invention
The deficiency existing in order to solve prior art, the object of the present invention is to provide a kind of machine card separated acoustic code encryption telephone set system, present device is intended to the communication security device with authentication that PSTN net provides a kind of separation between machine and card, accomplished that technically each call encrypts at every turn, the rear disappearance of key, even if take Enciphered telephone, can not decipher call once, and encrypt clear sound, realize the development to strange land cipher mode by fixed-encryption mode of human speech information security.
To achieve these goals, a kind of machine card separated acoustic code encryption telephone set system of the present invention has adopted following technical proposals: described a kind of machine card separated acoustic code encryption telephone set system is become by crypto identity card certificate issued center, U Mi Kahe acoustic code encryption telephone mechanism.
Described crypto identity card certificate issued center is authoritative department Ye Shi Third Party Authentication department, by user data server, Key Management server, operator terminal and machine for punching the card, formed, it is divided into first class certificate and provides center and secondary certificate issued center, work offline with PSTN net, with PSTN net without any relation.
Wherein, first class certificate granting center has following functions: the production of certificate and granting function, the close card authentication information of U before speech scrambling is first class certificate and provides center " printing is signed and issued ", this information can not be distorted, non-repudiation, can not be damaged, can not lose; Be responsible for the production of social user's certificate and provide function; Be responsible for the production function of the special-purpose U key of secondary center; There is the unique authentication code function of the whole network of generation; There is user data and Key Management server and associated databases; There is operator's registration terminal and operation interface thereof; There is log management and operator's entry password cryptographic function; To two kinds of close cards of high-grade intelligent type U and all energy generations of the close card of plain edition U, granting and management function.
Wherein, secondary certificate issued center has following functions: have and on one-level authentication center certificate basis, form this group user certificate function, this information can not be distorted, non-repudiation, can not be damaged, can not lose; The granting function with this group's user certificate; The maintenance function with this group's user data; There is this group's user data management server and database; There is the user operator of this group registration terminal and operation interface thereof; There is log management and operator's entry password cryptographic function; To two kinds of close cards of high-grade intelligent type U and the close card of plain edition, all can provide and management function.
Thus, by above-mentioned one-level, secondary authentication center administers and maintains closely to the close card of U.In use require certificate issued center can or not upgrade the close card Data Update of U as required.
The close card of described U, is smart machine, and without power supply, profile is just as USB flash disk, and body is small and exquisite, and energy consumption is extremely low, and user can carry; The present invention has two types of close cards of U, and a kind of is high-grade intelligent type U[1] close card, there is Presentation Function, another kind is common intelligent U[2] close card, there is no Presentation Function.No matter group user or social user, fixed line type acoustic code encryption telephone machine and pocket speech encryptor all can be general.Therefore, telephone set itself is not distinguished group/social nature of user.
Wherein, high-grade intelligent type U[1] close card is furnished with LCD display and LED light, and LCD screen can show at most 16 Chinese character/64 English alphabets (showing that number of words can increase as required or reduce), shows the other side teller's name when LCD enters encrypted word; By digital signature, reach authentication, the object of the data integrity effects such as SHA-1, wherein the data integrity effect such as SHA-1 comprises SHA-1 or HASHI algorithm; U Mi Kanei storage user's personal information information and key management information, this information bank is provided with encipherment protection mechanism and the anti-tamper measure of information, to guarantee the safe and reliable of the close card internal information of U.The close jig of U has secret key encryption and Information Encryption Algorithm as ECC, AES, DES, 3DES, SM1, SM2, SM3, SMS4 scheduling algorithm.The close card of U can be carried, and reaches strange land encryption function.The close card of U inserts telephone set can play code phone, pulls out the close card of U and can only beat unencryped word.The close card quantity of U can be greater than Enciphered telephone quantity, and several individuals can share an Enciphered telephone, and this phone is only recognized card.
Wherein, common intelligent U[2] close cartoon crosses digital signature and reaches authentication, the object of the data integrity effects such as SHA-1, wherein the data integrity effect such as SHA-1 comprises SHA-1 or HASHI algorithm; U Mi Kanei storage user's personal information information and key management information, this information bank is provided with encipherment protection mechanism and the anti-tamper measure of information, to guarantee the safe and reliable of the close card internal information of U.The close jig of U has secret key encryption and Information Encryption Algorithm as AES, DES, 3DES, SM1, SM2, SM3, SMS4 scheduling algorithm.The close card of U can be carried, and reaches strange land encryption function.The close card of U inserts telephone set can play code phone, pulls out the close card of U and can only beat unencryped word.The close card quantity of U can be greater than Enciphered telephone quantity, and several individuals can share an Enciphered telephone, and this phone is only recognized card.This card does not have Presentation Function.
Above-mentioned two kinds of close cards of U all have digital signature identification, secret, the easy to carry feature of carrier information, and therefore, this equipment can form easily speech secure communication net neatly in group user Qun He social user circle.
Described acoustic code encryption telephone machine has two types: fixed line type acoustic code encryption telephone machine and pocket speech encryptor, and be all applied to the online point-to-point voice encryption communication of PSTN, there is unencryped word/encrypted word handoff functionality.Therefore this invention has two kinds of digital telephone cipher modes: a kind of is the fixed line type digital-code encryption telephone set that digital circuit and analog telephone are integrated, another kind be can with the pocket speech encryptor of any ordinary telephone set interfaces.This two invention equipment has common telephony functions at ordinary times, inserting in close card situation, when any one party is keyed in encryption key, can enter secret telephony application state.
Wherein, pocket speech encryptor has following functions: bright close handoff functionality at any time; With any ordinary telephone set interface function; Can realize mobile strange land encryption function; There is the functions such as language data process and transmission.On described pocket speech encryptor, have encryption key, remove close key, USB interface and corresponding indicator light.
Wherein, fixed line type acoustic code encryption telephone facility have following functions: bright close handoff functionality at any time; There is the functions such as language data process and transmission; Retain original call machine all functions.On described fixed line type acoustic code encryption telephone machine, have encryption key, remove close key, USB interface and corresponding indicator light.
The present invention carries out work according to following principle: described a kind of machine card separated acoustic code encryption telephone set system is comprised of crypto identity card certificate management center, the close card of U and acoustic code encryption telephone machine.
1. crypto identity card certificate issued center
Native system has designed two-stage certificate issued center.Two-stage certificate issued center is substantially identical in configuration, all needs user data server, Password Management server, operator terminal, machine for punching the card.
By operator terminal, can complete generation and the download of certificate, this center has the database management function of key and user data simultaneously, has the password code of logging in and log management function.
The first class certificate center of providing will have all first class certificates to provide the systematic function of the close card certificate of user U at center and secondary certificate issued center, and the U card that secondary certificate issued center only can issue according to first class certificate granting center produces the close card of the user U of this group.
First class certificate granting center is " root " of the safe operation of native system, and the close card certificate of all U security mechanism all goes out since then " root ".
For social user, by this primary centre, provide certificate application management, user does not belong to group of any group, as long as the other side allows, this social user can communicate with any social user, but does not allow to communicate by letter with group user.
Secondary certificate issued center is located at group user unit information administrative center, the work such as be responsible for the download of this group's customer group certificate and the generation of system data table, download, cancel.
This center generates the user data table of this group as required, fills in the personal information (user name, unit etc.) in certificate, carries out the data input service before the close card of user U, carries out afterwards close card download.For group user, group's internal user allows to intercom mutually, and between group, user can carry out the setting of user data as required.
The close card of 2.U
The close jig of U of present device has two types: a kind of is high-grade intelligent type U[1] close card, there is Presentation Function; Another kind is common intelligent U[2] close card, there is no Presentation Function.
High-grade intelligent type U[1] close card is comprised of CPU, encryption and storage chip, LCD display driver chip and Chinese character memory chip, and wherein, CPU, in center, is connected with encryption and storage chip, Chinese character memory chip and LCD display driver chip respectively successively.This card is encryption equipment and the authentication pass, is the core key modules of present device.
Common intelligent U[2] close card is directly connected to form by sound code telephone machine USB flash disk interface and encryption and storage chip.
Described U[1] be provided with the identity code to authentication, guarantee scrambler phone user's true identity.When user uses, insert U[1 of the present invention] close card, the used time does not extract, and can carry, and relies on identity code to carry out authentication, guarantees scrambler phone user's true identity.Close card data are stored in encryption chip, are subject to the protection of encryption chip, and stranger cannot read.
In order to stop lawless people, with the like product of purchasing, pretend to be group internal personnel, native system has designed " group user " and " social user " two kinds of different shapes on application form, has special processing mechanism in the close card internal data format of U.Some data that there is no group user in social user; For social user, by first class certificate, provide centre management.The content of group user tables of data can be upgraded along with group user situation changes.
User certificate is comprised of data such as user name, identity code, area countries, and it is inner that user U card certificate content is not only stored in the close card of this U, is also stored in respectively in the Key Management server and user data server at certificate issued center.
No matter user, when buying machine card separated acoustic code encryption telephone set, is group user or social user, all should stipulate that (one-level or secondary) gets certificate to certificate issued center by " system of real name ", and certificate data is stored in user U Mi Kanei.Guaranteed thus the authoritative of the close card internal data of U and stop certificate can not distort, counterfeit.
User obtains, after the close card of U, can using telephone encryption function.In certificate, name and user data table content can be upgraded, and when the variation of group user need to be upgraded, need the close card of all U to be regained, and when upgrading the close card of U, the data of central user data server will synchronously be upgraded.Its data content of the close khaki of U can not be revised.
User U[1] close card is except encrypting, storage chip, is also provided with cpu chip, Chinese character base and LCD display.This screen can show 16 Chinese character/64 English alphabets (can increase as required/reduce demonstration number of words).
This is stuck in name and the ID that shows our owner when static, when confirming that the other side's identity enters encrypted word state, shows the other side telephone user's name and ID.
This card belongs to inactive component, and power supply is provided by phone or encryption equipment, therefore can both insert and both pull out use.The close card of U and telephone set are without corresponding relation.Several individuals can share a digital telephone set of the present invention.
Common intelligent U[2] close card just do not have Presentation Function, and other function is identical with the close card of high-grade intelligent type.
3. acoustic code encryption telephone machine
Acoustic code encryption telephone machine has two types: fixed line type acoustic code encryption telephone machine and pocket speech encryptor.
Pocket speech encryptor has the function with ordinary telephone set interfaces.Voice encryption is to be based upon on the basis of unencryped word communication, and all encrypted word controlling mechanisms are all located at U Mi Kanei.The state conversion of unencryped word and encryption is controlled by line switching.Both sides are under the support of specialized protocol, and when user presses encryption key, this device synchronization completes the conversion and control of encrypted word/unencryped word state.In encrypted word state any time, user can be transformed into unencryped word at any time.When both sides' encrypted word is communicated by letter, according to line quality at that time, this equipment, by training method, is selected different consensus standards between ITU-T-V32bis, V32, V22bis, V22.
Product comprises telephone set network subsystem, commutation circuit, and speech digital processing subsystem, speech data compression subsystem, data transmission subsystem, the close card subsystem of CPU subsystem and U forms, and also has the circuit such as LED demonstration and encryption and decryption button and power supply.The circuit of pocket speech encryptor is identical with fixed line type acoustic code encryption telephone machine digital processing part, only increased the interface section with analog telephone, pocket speech encryptor and any common analog telephone interfaces, thereby realized mobile strange land encryption function.
Analog telephone some work process is identical with general ordinary telephone set operation principle with operation principle.System is at ordinary times in simulation talking state, during on-hook, telephone set is in off position, telephone wire line voltage dialogue machine feed when off-hook, switch send dialing tone, user dials called number, while putting through, switch send ring-back tone, and called off-hook gets final product both sides and carries out unencryped word communication, and this telephone set also has caller identification, setting, inquiry up and down, the function such as hands-free.
When needs speech scrambling, insert the close card of U, either party presses encryption key, and receiving-transmitting sides will enter digitize voice encrypted state, and at this moment system forwards digital processing operating state to.Simulated voice is carried out to the compression of digitized processing, speech data, the work such as the encryption and decryption of packed data, enciphered data transmission are now described below:
In order to realize the digital encryption system of voice, first must carry out the digitized processing of voice, analog voice is become to audio digital signals.Voice signal is carried out to A/D, D/A conversion.Analog voice signal leads and carries out pcm encoder by U, becomes 64KBPS speed data, and analog voice signal becomes speech digit information without distortion, and the 64KBPS speech digit information in like manner receiving becomes can understand analog voice signal.
For transmission of digital speech data in voice band, 64KBPS speech data is compressed.3.6/4.8KBPS above rate speech clear, can understand and read with naturalness highly, compressed voice quality is good.
As Master control chip, by receiving-transmitting sides after encryption key, set up data channel; Carry out the read-write of speech data; In the presence of the close card of U, carry out the other side's authentication; Carry out key, cryptosync; Packed data is encrypted to deciphering; Control the work such as sending and receiving that MODEM is encrypted data.
A kind of machine card separated acoustic code encryption telephone set system is by MODEM sending and receiving enciphered data.The data of encrypting, are sent to circuit by MODEM by CPU, from MODEM, receive the other side's enciphered data.
The circuit of pocket speech encryptor is identical with this fixed line type acoustic code encryption telephone machine digital processing part, has just increased the interface with ordinary telephone set.This encryption equipment, because pocket encryption equipment volume is little, is easy to carry, and can with any ordinary telephone set interface, realize the function that encrypt in mobile strange land.
PSTN net is different from Internet the Internet, if set up CA safety certification center at PSTN net, will use and bring a lot of inconvenience to user.Under PSTN net environment for use, should solve authentication, take precautions against again senior hacker's attack, the easy to use of colony of social domestic consumer voice safety also will be provided, therefore, under PSTN communication environment, the comprehensive problems such as speech security, authentication, key management that solve, nature can run into many-sided technical barrier.
In order to address the above problem, according to the characteristic of network environment of pstn subscriber telephone, following four Safe Technology Tactics have been proposed in system:
1. set up crypto identity card certificate issued center, authority issues licence
For the science safety management of present device certificate in application, native system is set up one-level, secondary certificate issued center, and each user in use must be equipped with the close card of U, and this card is divided three types according to different application:
1) first class certificate is provided the close card in center;
2) the close card in secondary certificate issued center, secondary center quantity is determined as required;
3) the close card of social user, endless.
Native system is only established a first class certificate and is provided center, establishes as required N secondary certificate issued center, and generally, Yi Ge group establishes a secondary certificate issued center, and the certificate update of the user's of this group certificate issued and application change is responsible at this center.One-level, secondary certificate issued center are to the close card input of user U certificate data, and U is close to be snapped fits into after certificate, just can be encrypted call.
2. user is divided into two types
Native system is divided into user " group user " and " social user " two kinds.Group user finger Men Huo enterprises and institutions, the traffic aided user group of group system.Group user is by secondary certificate issued centre management; Social user's certificate is provided centre management by first class certificate.Two kind users' difference relies on the close card data of U and determines, irrelevant with telephone set itself.
3. separation between machine and card
In encryption handling mechanism, adopt " machine, card separation " technology." machine " is present device Enciphered telephone, and " card " is the close card of U-Key.In this card, store this user's the enciphered message such as certificate, key, subscriber's meter.
4. key discriminating, authentication
The cipher key delivery of native system adopts SHA-1/HASHI SHA, guarantee key integrality, can not tamper.Authentication adopts ECC/SM2 public-key cryptosystem, guarantees the credibility of both call sides identity.When both sides converse, except sound discriminates one's identification, can also, according to the other side's identity code, on the close card of U, show the other side's name.
The basic effect of this function is the strick precaution that the senior hacker's identity of third party is pretended to be.Some senior hackers, they also keep silence, but eavesdrop, and in PSTN system applies, suffer that the means of the senior attack of third party mainly contain following three kinds of means:
1) without the extraneous hacker Huo Youzheng of card social user, want into group user or the subscriber channel of logical encrypted word;
As extraneous hacker has present device and Mi Ka, but hacker H does not have the certificate of secondary center granting and corresponding data to form encrypted word communications and liaison relation and to enter not happy group user group with group user; While having the social hacker of card to eavesdrop both sides' encrypted word call of social user, once authentication is passed through, just cannot enter the channel of conversing, if want to enter before conscientious, because show name, be found to be disabled user.
2) with validated user in group (third party) false impersonation identity;
If the internal staff of this group is with senior attack means eavesdropping A, B both sides' dialog context, because the equipment of third party H is same group user, it is legal at aspects such as equipment, the close cards of U, to be, third party H can act as fraudulent substitute for a person successfully, due to this equipment name Display Technique, A, party B-subscriber see the Real Name that is not the other side, but the name of H.Therefore,, even if with validated user in group (third party H), false impersonation's identity also can be found.
3) with validated user in group (third party), think the two parties certificate that transformation is being conversed.
Native system has just been taked the precautionary measures when certificate issued, has prevented that the phenomenon that certificate is tampered, forges from occurring, thereby cannot distort both call sides certificate and can not eavesdrop.
Accompanying drawing explanation
Fig. 1 is crypto identity card certificate issued of the present invention center schematic block diagram;
Fig. 2 is high-grade intelligent type U[1 of the present invention] theory diagram;
Fig. 3 is common intelligent U[2 of the present invention] theory diagram;
Fig. 4 is fixed line type acoustic code encryption telephone machine theory diagram of the present invention;
Fig. 5 is pocket speech encryptor application principle block diagram of the present invention;
Fig. 6 is the encryption vocoder theory diagram of pocket speech encryptor of the present invention.
Embodiment
Below in conjunction with accompanying drawing and specific embodiment, a kind of machine card separated acoustic code encryption telephone set system of the present invention is described in further detail.
Embodiment 1
Described a kind of machine card separated acoustic code encryption telephone set system is become by crypto identity card certificate issued center, U Mi Kahe acoustic code encryption telephone mechanism.Wherein, crypto identity card certificate issued center is divided into first class certificate and provides center 100 and secondary certificate issued center 200 (not shown)s, the close card of U divides two types, high-grade intelligent type U[1] close card 300 and common intelligent U[2] close card 400 (not shown)s; Fixed line type acoustic code encryption telephone machine 500.
First class certificate of the present invention is provided center 100 and is connected to form successively by user PIN data server 101, Key Management server 102, terminal 103, machine for punching the card 104, the group of U social user 105 (not shown)s as shown in Figure 1.
Equally, secondary certificate issued center 200 is connected to form successively by Key Management server 201, No. two terminals 202, No. two machine for punching the card 203, U group user group 204 (not shown)s.
Wherein, first class certificate granting center 100 is given group user group by terminal 103 granting first class certificates to social user and secondary certificate issued center 200; Secondary certificate is provided to group user in secondary certificate issued center 200.And certificate data is stored in user U-Key Mi Kanei.
In addition, the close card of U-Key divides two types, high-grade intelligent type U[1] close card 300 and common intelligent U[2] close card 400, U[1] close card 300 and common U[2] close card 400, difference is U[1] close card 300 has Presentation Function, and U[2] close card 400 do not have Presentation Function.Referring to Fig. 2, Fig. 3, U[1] close card 300 comprises sound code telephone machine USB flash disk interface 302, encryption and storage chip 304, CPU303, Chinese character base 305 and display screen 301, wherein, CPU303, in center, is connected with USB flash disk interface 302, encryption and storage chip 304, Chinese character base 305 and display screen 301 respectively.And common intelligent U[2] close card 400 is directly connected to form by sound code telephone machine USB flash disk interface 401 and encryption and storage chip 402.Referring to Fig. 4, fixed line type acoustic code encryption telephone machine 500 is controlled A505, plain old telephone circuit 506, circuit control B507, modem 504, central processor CPU 503, digital signal compression/decompression device 502 and voice signal A/D, D/A switched circuit 501 by telephone handle 508, circuit and is connected to form successively.Wherein machine card separated acoustic code encryption telephone set 500 is controlled B507 by circuit and is connected pstn telephone office 509, high-grade intelligent type U[1] close card 300 and common U[2] one of close card 400 inserts central processor CPU 503.
Embodiment 2
The difference of the present embodiment and embodiment 1 is, described sound code telephone machine is pocket speech encryptor, the circuit of pocket speech encryptor is identical with this fixed line type acoustic code encryption telephone machine 500 digital processing parts, has just increased the interface with ordinary telephone set.As shown in Figure 5, the encryption vocoder 600 of pocket speech encryptor connects respectively ordinary telephone set 601 and pstn telephone net 602, high-grade intelligent type U[1] close card 300 and common intelligent U[2] one of close card 400 inserts and encrypts vocoder 600.
Referring to Fig. 6, encrypting vocoder 600 is connected to form successively by voice signal A/D, D/A switched circuit, CPU and MODEM, one of wherein voice signal A/D, D/A switched circuit meet high-grade intelligent type U[1] close card 300 and common intelligent U[2] close card 400, pstn telephone net 602 is connected with MODEM.

Claims (3)

1. a machine card separated acoustic code encryption telephone set system, is characterized in that: described a kind of machine card separated acoustic code encryption telephone set system comprises that crypto identity card certificate issued center, U Mi Kahe acoustic code encryption telephone mechanism become; The close card of described U comprises high-grade intelligent type U[1] Mi Ka and common intelligent U[2] close card; Described crypto identity card certificate issued center is connected to form successively by user data server, Key Management server, operator terminal and machine for punching the card; Described U[1] close card is by encrypting and storage chip, CPU, Chinese character memory chip and LCD display driver chip form, and wherein, CPU, in center, is connected with encryption and storage chip, Chinese character memory chip and LCD display driver chip respectively successively; Described U[2] close card is directly connected to form by sound code telephone machine USB flash disk interface and encryption and storage chip.
2. a kind of machine card separated acoustic code encryption telephone set system according to claim 1, is characterized in that: described U[1] be provided with authentication code, guarantee scrambler phone user's true identity.
3. a kind of machine card separated acoustic code encryption telephone set system according to claim 1, it is characterized in that: described acoustic code encryption telephone machine comprises fixed line type acoustic code encryption telephone machine and pocket speech encryptor, described pocket voice encryption function is connected with any ordinary telephone set.
CN200910249865.0A 2009-11-27 2009-11-27 Machine card separated acoustic code encryption telephone set system Expired - Fee Related CN101729641B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200910249865.0A CN101729641B (en) 2009-11-27 2009-11-27 Machine card separated acoustic code encryption telephone set system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200910249865.0A CN101729641B (en) 2009-11-27 2009-11-27 Machine card separated acoustic code encryption telephone set system

Publications (2)

Publication Number Publication Date
CN101729641A CN101729641A (en) 2010-06-09
CN101729641B true CN101729641B (en) 2014-03-26

Family

ID=42449817

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200910249865.0A Expired - Fee Related CN101729641B (en) 2009-11-27 2009-11-27 Machine card separated acoustic code encryption telephone set system

Country Status (1)

Country Link
CN (1) CN101729641B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101945177A (en) * 2010-09-29 2011-01-12 北京兵港科技发展有限公司 Telephone-card separated mail encryption telephone system
CN107302434B (en) * 2016-04-15 2021-08-24 平安科技(深圳)有限公司 Method and system for checking electronic signature

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1925681A (en) * 2006-09-20 2007-03-07 北京太极联合实验室科技有限公司 End-to-end encrypting method and system based on mobile communication network
CN101384042A (en) * 2008-10-15 2009-03-11 东南大学 Mobile phone ciphering method based on safe digital interface ciphering card

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1925681A (en) * 2006-09-20 2007-03-07 北京太极联合实验室科技有限公司 End-to-end encrypting method and system based on mobile communication network
CN101384042A (en) * 2008-10-15 2009-03-11 东南大学 Mobile phone ciphering method based on safe digital interface ciphering card

Also Published As

Publication number Publication date
CN101729641A (en) 2010-06-09

Similar Documents

Publication Publication Date Title
CN101197674B (en) Encrypted communication method, server and encrypted communication system
CN101558598B (en) Combinational combiner cryptographic method
CN101569165B (en) Method and device for secure phone banking
ES2749436T3 (en) Procedure and system for transaction security
CN104301115B (en) Mobile phone and Bluetooth key signature verification ciphertext communication method
CN103000181B (en) System and implement method thereof for secret communications based on public communication network voice channel
CN102209318A (en) Real-time mobile phone encrypted conversation method and device based on intelligent TF (Transflash) card
CN101819614A (en) System and method for enhancing network transaction safety by utilizing voice verification USBKey
CN105553669A (en) Identity authentication based information encryption transmission apparatus, method, and control method
CN101729641B (en) Machine card separated acoustic code encryption telephone set system
CN1321537C (en) Electronic paymenting service system and realizing method based on fixed telephone net short message
CN106789977A (en) A kind of method and system that handset token is realized based on Secret splitting
CN104581714A (en) Method for encrypting speech on basis of TD-SCDMA (time division-synchronization code division multiple access) circuit domains
CN102983963A (en) Encryption conversation method and conversation encryption device
CN100576856C (en) The mobile phone scrambler and the secret communication method that are suitable for multiple communication network
CN201657079U (en) Removable user identity module (R-UIM) acoustic code encrypting telephone system
CN202978979U (en) Password security keypad device and password security pad system
US12058247B2 (en) Secure communication device equipped with quantum encryption chip based quantum random number and method of providing secure communication service using the same
CN101924632A (en) Reliable transmission method for transmitting traction information by block encryption
CN102035925A (en) Novel secure telephone and secure communication method thereof
CN101867895A (en) Consumption method based on mobile terminal and messages, mobile terminal and business system
TW201608864A (en) Communication security system and method
CN105071933B (en) Quantal data terminal applied to PSTN public networks
CN214376474U (en) Desktop code scanning box with trusted digital identity verification capability
CN204967863U (en) Volume subdata terminal group network system based on PSTN public network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20140326

Termination date: 20211127

CF01 Termination of patent right due to non-payment of annual fee