CN102075321B - Mobile communication end-to-end voice encryption Bluetooth handheld device and voice encryption method - Google Patents

Mobile communication end-to-end voice encryption Bluetooth handheld device and voice encryption method Download PDF

Info

Publication number
CN102075321B
CN102075321B CN201010556715.7A CN201010556715A CN102075321B CN 102075321 B CN102075321 B CN 102075321B CN 201010556715 A CN201010556715 A CN 201010556715A CN 102075321 B CN102075321 B CN 102075321B
Authority
CN
China
Prior art keywords
module
data
signal
voice
buffer memory
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201010556715.7A
Other languages
Chinese (zh)
Other versions
CN102075321A (en
Inventor
蒋睿
胡锡利
张南
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Southeast University
Original Assignee
Southeast University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Southeast University filed Critical Southeast University
Priority to CN201010556715.7A priority Critical patent/CN102075321B/en
Publication of CN102075321A publication Critical patent/CN102075321A/en
Application granted granted Critical
Publication of CN102075321B publication Critical patent/CN102075321B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The invention relates to a mobile communication end-to-end voice encryption Bluetooth handheld device and a voice encryption method, and particularly relates to a novel end-to-end voice encryption device and a method, which are suitable for third-generation (3G) network mainstream technology Wideband Code Division Multiple Access (WCDMA) and compatible with second-generation (2G) network technology GSM. The encryption-decryption device mainly consists of a Field-Programmable Gate Array (FPGA) chip processing module (1), a voice encryption-decryption algorithm module (2), a Bluetooth receiving-transmitting module (3), a memory module (4) and a power supply module (5); the FPGA chip processing module (1) is a core hardware platform of the entire system for performing the voice encryption and decryption processing; the voice encryption-decryption algorithm module (2) is an algorithm program for realizing the voice encryption-decryption processing; the Bluetooth receiving-transmitting module (3) is wirelessly connected with a mobile phone Bluetooth and for receiving, transmitting and pre-processing a voice signal; the memory module (4) stores an initialization program of the voice encryption-decryption algorithm module (2) and the Bluetooth; and the power supply module (5) is connected with other modules and provides a given work voltage required by other modules.

Description

Mobile communication end-to-end voice is encrypted Bluetooth handheld device and speech ciphering method
Technical field
The present invention is that mobile communication end-to-end voice is encrypted Bluetooth handheld device and speech ciphering method, is applicable to Wideband Code Division Multiple Access (WCDMA) multiplexing (WCDMA) network system, simultaneously compatible GSM network.It is mainly based on the voice encryption/decryption algorithm of anti-AMR compressed encoding and anti-RPE-LTP compressed encoding, adopting field programmable gate array (FPGA) chip xc3s500e-4ft256 is basic platform, utilizing Bluetooth chip IS1636N to be connected with the mobile communication equipment wireless, is a kind of End-to-End Security communication equipment of wireless network terminal.
Background technology
Along with GSM mobile communication technology (2G) and 3G (Third Generation) Moblie technology (3G) deep popularization in the world, mobile communication is rooted in the hearts of the people, and is subject to users' favor.At present, the GSM network is the mobile communications network that the maximum cellphone subscriber colony in the whole world uses, and its End-to-End Security communication all is subject to the cellphone subscriber all the time and pays close attention to.And Wideband Code Division Multiple Access (WCDMA) multiplexing (WCDMA) technology has become the preferred network of increasing 3G subscription as one of mature technology of 3G.Therefore, WCDMA security of system performance is also the same with its rate, communication quality etc., receives cellphone subscriber's continuous concern.Although the WCDMA system has adopted the encryption technology of wireless channel, can only guarantee voice signal in the secure communication of mobile phone to the wireless transmission process between the base station, and the relay transmission of base station and base station is still with the plaintext form and transmits, can't guarantee secure communication.In case operator's victim invasion, perhaps operator itself monitors the user, with serious threat user's communication security.Therefore, need to adopt End to End Encryption to guarantee user's communication security.
For the GSM network, End-to-End Security communication is the study hotspot of domestic and international many research institutions always.The researcher of the countries such as Germany, Israel, the U.S. released end-to-end gsm communication network encryption terminal once.Wherein, German GSMK company adopts the voice encryption technology of its exploitation in November, 2003, has issued the voice encryption mobile phone of Cryptophone by name, and this mobile phone can make between similar mobile phone and install to converse between the computer of specific software and do not eavesdropped by the third party; Israel Snapshield company has proposed a kind of voice encryption technology based on the GSM smart mobile phone in 2005, and released the voice encryption module Snapcell that links to each other with the T618 of Sony Ericsson, this module can make mobile phone that point-to-point GSM secure communication is provided; The TCC company of the U.S. has also released the encryption mobile phone that adopts the voice encryption technology in 2006.Yet the encryption technology of above research institution or group owing to do not possess anti-RPE-LTP compressed encoding ability, all can only be transmitted by the data channel of 2G network.This class technology exists obvious defective: the first, can't overcome owing to set up the latency issue that IP connects and the utilization automatic retransmission mechanism causes, and wherein connecting time-delay can reach 20-30 second, processes time-delay 0.5-1 second, therefore has a strong impact on communication effect.The second, therefore such technology exists the problem of interoperability based on the GSM data channel by different operators and international network the time, and inter-network can not interconnect.The 3rd, do not support the value-added service of existing GSM, can not use some other value-added services of existing phonecard and mobile network such as the two ends of data passage.
More domestic research and development institutions also are studied the sound end-to-end secure communication field of GSM network.Be that the GoTone handset with anti longterm prediction rule pulse excitation compression coding speech ciphering method has been described in 200710019924.6 invention such as number of patent application, the method is between the mould of Global Link mobile phone speech communication system/digital-to-analogue piece and long-term prediction Regular-Pulse Excitation coding/decoding module, access mobile phone speech enciphering/deciphering module, carry out the voice encryption/decryption computing, realize voice enciphering/deciphering function.This invention is transmitted by the voice channel of GSM network, has the ability of anti-RPE-LTP compressed encoding, and conversation delay is little, can inter-network interconnect.The invention of number of patent application 200710020992.4 has proposed anti vocoder compressed end-to-end voice encryption device and method, the ability that possesses anti-RPE-LTP compressed encoding, can transmit by the voice channel of GSM network, but it can't overcome the base station filtering problem, can not realize the inter-network intercommunication.
Yet the above-mentioned GSM network mobile phone End-to-End Security communication technology can not be applicable to the 3G mobile network well.Along with the Rapid Popularization use of 3G network mobile phone, in the urgent need to the research to the end-to-end secure communication of 3G network mobile phone.An End to End Encryption method for 3G network has been described in the invention of number of patent application 01125103.4, but the application of the method has identical defective mainly based on the 3G data channel with aforesaid GSM data channel encryption method.In addition and since the method do not illustrate encrypt institute for network and do not carry out experiment in real network environment, therefore, can't be applicable to current 3G network.An encryption method for the end-to-end secure communication of mobile phone of the WCDMA network in the 3G standard has been described in the invention of number of patent application 200910183232.4.Although the method can guarantee the fail safe of its conversation, but it is only applicable to the WCDMA network in the 3G standard, can't compatible GSM network service, do not possess anti-RPE-LTP compressed encoding ability, and it accesses with adopting wired received pronunciation input/output interface of pressing being connected of 3G network mobile phone, do not adopt Bluetooth technology and mobile phone to carry out wireless connections, make this device and mobile phone not easily separated, can't make the user conveniently, easily carry out communication.Encryption device and a method for the CDMA2000 network mobile phone sound end-to-end secure communication in the 3G standard have been described in the invention of number of patent application 201010145047.9.Although the method can guarantee the fail safe of its conversation, but should invent also only for the CDMA2000 network in the 3G standard, can not compatible GSM network service, do not possess anti-RPE-LTP compressed encoding ability, and this device and mobile phone also are to adopt wired connection, do not adopt bluetooth and mobile phone to carry out wireless connections, with aforesaid encryption method same deficiency is arranged.
Summary of the invention
Technical problem: the object of the invention is to propose a kind of " mobile communication end-to-end voice is encrypted Bluetooth handheld device and speech ciphering method " of carrying out Source Encryption and transmission at GSM network and WCDMA network, this equipment designs mainly for the characteristic of GSM network and WCDMA network, has very strong anti-RPE-LTP compressed encoding and the ability of anti-AMR compressed encoding.Adopt technology of the present invention, the end to end secure communication of GSM/WCDMA mobile phone at first can be provided; Secondly can significantly reduce conversation delay (making delay probably is 0.2 second); And because the present invention does not change the characteristic of gsm communication system and WCDMA communication system voice channel, can interconnect between inter-network; Support simultaneously GSM and all value-added services of WCDMA communication network; The present invention has the bluetooth wireless interface of standard, has widely applicability; At last, the present invention has designed power supply and the charging system of built-in microphone, receiver and cellular li-ion battery, has greatly enlarged the scope of application of invention.
Technical scheme: the mobile communication end-to-end voice that the present invention proposes is encrypted Bluetooth handheld device and speech ciphering method, the GSM/WCDMA mobile phone is linked to each other with the fpga chip processing module by the bluetooth transceiver module, mobile phone input and output voice signal is carried out encryption and decryption process, realize the function of voice encryption/decryption.Described mobile communication end-to-end voice is encrypted Bluetooth handheld device and speech ciphering method is made of fpga chip processing module, voice encryption/decryption algoritic module, bluetooth transceiver module, memory module and power module five parts.Described fpga chip processing module is one and mainly is made of fpga chip and peripheral circuit thereof based on the core processing hardware module of fpga chip, is mainly used in the encryption and decryption calculation process of voice signal.Described voice encryption/decryption algoritic module is the software module of moving at fpga chip, mainly judges that by phonetic data algoritic module, speech data mapping algorithm module, speech data enciphering and deciphering algorithm module, class speech data mapping algorithm module and energy synchronized algorithm module five parts form.Described bluetooth transceiver module is the middle link block of mobile phone and fpga chip processing module, to voice signal receive, transmission and preliminary treatment, mainly consisted of by clock module, Bluetooth chip module, A/D module, voice signal amplification module and transmitter, speaker portion; Described clock module connects Bluetooth chip module and A/D module, mainly for generation of clock signal; Described Bluetooth chip module and mobile phone carry out wireless connections, are used for encrypted speech is received and dispatched transmission; Described A/D module connects the I/O pin of fpga chip module, and the modulus, the digital-to-analogue that are mainly used in voice signal transform, and clock signal is carried out frequency division, for the fpga chip processing module provides clock control signal; Described voice signal amplification module connection A/D module and transmitter, loud speaker are used for voice signal is amplified; Described transmitter, loud speaker connect the voice signal amplification module, are used for acoustic-electric and transform, and carry out the input of raw tone and the output of the rear voice of deciphering.Described memory module is used for the store initialization configurator, by Flash PROM module and E 2The PROM module composition; Described Flash PROM module is made of Flash PROM chip and peripheral circuit thereof, receive the data configuration interface of fpga chip processing module with main string pattern, stored the voice encryption/decryption algoritic module in this module, configuration fpga chip processing module when being used for powering on; Described E 2The PROM module is by E 2PROM chip and peripheral circuit thereof form, and the program that connects the Bluetooth chip module is downloaded mouth, and this module has stored the initialize routine of Bluetooth chip, initialization Bluetooth chip module when being used for powering on.Described power module provides system required electric energy, mainly comprises charging module, lithium battery module and lifting/voltage reducing chip module; Described charging module connects lithium battery module, is used for the charging of lithium battery; Described lithium battery module connects the lifting/voltage reducing chip module, for it provides transformation required electric energy; Described lifting/voltage reducing chip module connects fpga chip module, bluetooth transceiver module and memory module, for these three modules provide specific operating voltage.
Described voice encryption/decryption algoritic module is the voice encryption/decryption method with anti-RPE-LTP compressed encoding and anti-AMR compressed encoding ability for GSM network and the design of WCDMA network characteristic, this module is stored in the Flash PROM module, be configured to the fpga chip processing module when system powers on and finish initialization to fpga chip, simultaneously initialization A/D chip.After initialization is finished, the voice encryption/decryption algoritic module can carry out encryption and decryption to speech data to be processed, and this process is mainly called phonetic data algoritic module, speech data mapping algorithm module, speech data enciphering and deciphering algorithm module, class speech data mapping algorithm module and energy and judged the synchronized algorithm module.Detailed process is as follows:
1) system initialization: after system powers on, Flash PROM module is configured to the voice encryption/decryption algoritic module under main string pattern and finishes initialization in the fpga chip, then, fpga chip sends initialization command to the A/D module, finishes the initialization to the A/D chip;
2) enciphered data: after the fpga chip processing module receives speech data from the A/D module, at first move the phonetic data algoritic module, the binary digital signal of serial input is transformed into corresponding data-signal; Then move speech data mapping algorithm module, signal decomposition is become a certain size frame; Then move speech data enciphering and deciphering algorithm module, speech data signal is encrypted by ad hoc fashion; The class of reruning speech data mapping algorithm module is synthesized the voice signal after encrypting, and forms the class voice; Move afterwards energy and judge the synchronized algorithm module, judged by energy and select and the interpolation synchronizing signal; Move at last the phonetic data algoritic module, data-signal is transformed into corresponding binary digital signal serial sends into the A/D module;
3) data decryption: after the fpga chip processing module receives the encrypted speech signal from the A/D module, at first move the phonetic data algoritic module, the binary digital signal of serial input is transformed into corresponding data-signal; Then move energy and judge the synchronized algorithm module, judge by energy and select the synchronizing signal processing that carries out related calculation, search synchronizing signal position and remove synchronizing signal; Then move class speech data mapping algorithm module, speech-like signal is decomposed; The speech data enciphering and deciphering algorithm module of reruning is decrypted by ad hoc fashion speech data signal; Move afterwards speech data mapping algorithm module, with the signal synthetic speech signal after the deciphering; Move at last the phonetic data algoritic module, data-signal is transformed into corresponding binary digital signal serial sends into the A/D module.
Reception and sending function that described phonetic data send algoritic module to be used to realize speech data, comprise that main program calls, buffer memory input, string also/parallel-serial conversion algorithm and buffer memory output totally four steps, concrete methods of realizing is:
1) main program calls: when system moved the phonetic data algoritic module, main program called this module and carries out computing;
2) receive data: when receiving the binary digital signal of serial input, then this binary digital signal of buffer memory at first goes here and there and conversion process to the signal of buffer memory, and it is become parallel output behind the data-signal buffer memory according to certain format conversion;
3) send data: when data need to send, at first then these data of buffer memory were processed this data cached parallel-serial conversion of carrying out, and this data transformation were become serial output behind the binary digital signal buffer memory of certain format.
Described speech data mapping algorithm module be used for to realize conversion and the inverse transformation computing of speech data, comprises that main program calls, buffer memory input, synthetic/decomposition data and buffer memory output five steps altogether, and concrete methods of realizing is:
1) main program calls: when system moved speech data mapping algorithm module, main program called conversion or the inverse transformation that this module is carried out speech data;
2) data transformation: at first buffer memory is inputted data, then carries out the synthetic of speech data, and the lang sound of going forward side by side strengthens, and the speech data after will synthesizing at last carries out buffer memory, and with the clock Sequential output;
3) data inverse conversion: at first buffer memory is inputted data, then carries out the decomposition of speech data, and the speech data after will decomposing at last carries out buffer memory, and with the clock Sequential output.
Described speech data enciphering and deciphering algorithm module is used for realizing the computing of voice enciphering/deciphering, comprise that main program calls, the buffer memory input, select enciphering/deciphering key, time domain enciphering/deciphering, frequency domain enciphering/deciphering and buffer memory output totally six steps form, concrete methods of realizing is:
1) main program calls: when system moved speech data enciphering and deciphering algorithm module, main program called this module and is encrypted or decrypt operation;
2) enciphered data: during encrypted speech, at first buffer memory is inputted data, and next selects time domain encryption key and frequency domain encryption key, next successively the data of buffer memory is carried out time domain encryption and frequency domain encryption, speech data and Sequential output after last buffer memory is encrypted;
3) data decryption: during decrypted voice, at first buffer memory is inputted data, and next selects Frequency Domain Solution decryption key and time solution decryption key, next successively the data of buffer memory is carried out frequency domain deciphering and time domain deciphering, speech data and Sequential output after the last buffer memory deciphering.
Described class speech data mapping algorithm module be used for to realize mapping and the inverse mapping conversion of class voice, comprises that main program calls, buffer memory input, the mapping transformation/inverse transformation of class voice and buffer memory export totally four steps, and concrete grammar is:
1) main program calls: when system moved class speech data mapping algorithm module, main program called mapping or the inverse mapping conversion that this module is carried out the class voice;
2) class voice mapping: at first the input data are carried out buffer memory, then carry out the class voice mapping transformation lang sound of going forward side by side and strengthen, the class speech data signal after the last buffer memory conversion, and export with the clock signal sequence;
3) class voice inverse mapping: at first the input data are carried out buffer memory, then this signal is carried out class voice mappings inverse transformation according to certain form, the speech data after the last buffer memory inverse transformation, and export with the clock signal sequence.
Described energy judges that the synchronized algorithm module is used for realizing the synchronized transmission of voice and the correct decryption processing of receiving terminal, comprise that main program calls, buffer memory input, energy judge select/search synchronously, embed/remove altogether five steps of synchronizing signal and buffer memory output, concrete grammar is:
1) main program calls: when system operation energy was judged the synchronized algorithm module, main program calls this module to be added or searches synchronizing signal;
2) add synchronizing signal: buffer memory input data at first, then carry out energy and judge and select synchronizing signal, then the correct position of input data embedded synchronizing signal, the data-signal after the last buffer memory conversion, and export with the clock signal sequence;
3) search synchronizing signal: at first buffer memory is inputted data, then judge by energy and select the synchronizing signal processing that carries out related calculation, and search synchronizing signal position, then remove synchronizing signal, data-signal after the last buffer memory conversion, and export with the clock signal sequence.
Beneficial effect: mobile communication end-to-end voice of the present invention is encrypted Bluetooth handheld device and speech ciphering method has good functional characteristic: realized communicating by letter with the End-to-End Security of mobile phone in the WCDMA network at the GSM network, Cipher Strength is not less than 3DES; After encryption and decryption, the intelligibility of voice signal is not suffered a loss, and tonequality reaches the requirement of GSM network and WCDMA network, and conversation intelligibility 〉=99.6% satisfies the requirement of real-time of communicating by letter, and is applied to GSM network and WCDMA network without delay, processing delay≤200ms; Support inter-network interconnect and GSM network and WCDMA network in all value-added services.
The mobile communication end-to-end voice that the present invention describes is encrypted Bluetooth handheld device and speech ciphering method, it is a kind of brand-new end-to-end speech encryption and decryption Apparatus and method for that is applicable to 3G network mainstream technology WCDMA and compatible 2G network technology GSM, its Cipher Strength is high, ability with anti-AMR compressed encoding and anti-RPE-LTP compressed encoding, the intelligibility of speech is high, voice quality is good, does not have the problem of network compatibility; The voice encryption process lag of simultaneously its realization is low; And the employing blue tooth wireless technology can be connected with any GSM/WCDMA mobile phone wireless with Bluetooth function and carry out End-to-End Security and communicate by letter, and has general adaptability, realizes with the independence of mobile phone on certain distance separable; Simultaneously built-in receiver and microphone, conversation is convenient, practical; Adopt general cellular li-ion battery power supply, so that encryption equipment can be carried, use at any time, have great convenience.
Description of drawings
Fig. 1 is the application structure figure of present device in the GSM/WCDMA network;
Fig. 2 is the systematic schematic diagram of present device;
Fig. 3 is the fpga core processor schematic diagram of present device;
Fig. 4 is each intermodule interface circuit logic schematic diagram of the present invention;
Fig. 5 is circuit theory diagrams of the present invention;
Fig. 6 is the voice encryption/decryption algoritic module flow chart of present device;
Fig. 7 is phonetic data algoritic module flow chart;
Fig. 8 is speech data mapping algorithm module flow chart;
Fig. 9 is speech data enciphering and deciphering algorithm module flow chart;
Figure 10 is class speech data mapping algorithm module flow chart;
Figure 11 is that energy is judged synchronized algorithm module flow chart.
Embodiment
Mobile communication end-to-end voice of the present invention is encrypted Bluetooth handheld device and speech ciphering method is made of fpga chip processing module 1, voice encryption/decryption algoritic module 2, bluetooth transceiver module 3, memory module 4 and power module 5 five parts.Wherein:
1. fpga chip processing module 1 of the present invention: the fpga chip take model as xc3s500e-4ft256 is core, has the edit capability of 500,000 FPGA (Field Programmable Gate Array) gate circuits, is used for the encryption and decryption computing.
2. voice encryption/decryption algoritic module 2 of the present invention comprises:
1) phonetic data algoritic module 2-1: during reception, convert the serial binary digital signal of inputting to corresponding data-signal parallel output; During transmission, convert the data-signal of inputting to corresponding binary digital signal serial output.
2) speech data mapping algorithm module 2-2: speech data to be encrypted is decomposed into the frame that is fit to encrypt by certain form also exports; The frame signal that deciphering is obtained synthesizes normal voice signal and output by certain format.
3) speech data enciphering and deciphering algorithm module 2-3: speech data is carried out enciphering/deciphering, guarantee that Cipher Strength reaches the requirement of 3DES.
4) class speech data mapping algorithm module 2-4: will treat that the decrypted voice data carry out the speech-like signal inverse mapping with certain form and resolve into the frame output that is fit to deciphering; The frame signal that encryption is obtained is mapped as speech-like signal and output by certain format.
5) energy is judged synchronized algorithm module 2-5: during transmission, the data of input are carried out energy judge the selection synchronizing signal and embed suitable position; During reception, the data communication device of input is crossed the energy judgement select synchronizing signal to do relevant treatment, search synchronizing signal and removal, be conducive to correct deciphering.
3. bluetooth transceiver module 3 of the present invention comprises:
1) clock module 3-1: utilize two crystal oscillators to produce the required clock signal of each module of system.
2) Bluetooth chip module 3-2: carry out blue teeth wireless with mobile phone and be connected, the encrypted speech signal that mobile phone is received is sent to the A/D module and processes; The encrypted speech signal of A/D module output is sent to mobile phone.
3) A/D module 3-3: voice signal is carried out digital-to-analogue, analog-to-digital conversion, and clock signal is carried out frequency division provide clock control signal for fpga chip.
4) voice signal amplification module 3-4: raw tone and decrypted voice are amplified processing.
5) transmitter, loud speaker: be used for the mutual conversion of acoustical signal and the signal of telecommunication.
4. memory module 4 of the present invention comprises:
1) Flash PROM module 4-1: storaged voice enciphering and deciphering algorithm module 2 after powering on, is downloaded to voice encryption/decryption algoritic module 2 series arrangement in the fpga chip processing module 1.
2) E 2PROM module 4-2: the initialize routine of storage Bluetooth chip module 3-2, finish the initial configuration to Bluetooth chip module 3-2 after powering on.
5. power module 5 of the present invention comprises:
1) charging module 5-1: be used for the charging to lithium battery module 5-2.
2) lithium battery module 5-2: store and provide system required electric energy.
3) lifting/voltage reducing chip module 5-3: the electric energy that lithium battery module 5-2 is provided converts the required voltage of each module of system to.
Below in conjunction with accompanying drawing, structure and the flow process of modules of the present invention is described in detail.
The specific implementation process is:
The mobile communication end-to-end voice that the present invention proposes is encrypted Bluetooth handheld device and speech ciphering method, is a kind of GSM/WCDMA of being applicable to network, has a sound end-to-end encryption and decryption Apparatus and method for of anti-RPE-LTP/AMR compressed encoding.This equipment utilization Bluetooth technology is connected with the GSM/WCDMA mobile phone wireless, sends to mobile phone radio frequency output by blue teeth wireless after raw tone is encrypted, and the encrypted speech from the Bluetooth of mobile phone wireless receiving is decrypted output, realizes the function of voice encryption/decryption.Described the present invention is made of fpga chip processing module 1, voice encryption/decryption algoritic module 2, bluetooth transceiver module 3, memory module 4 and power module 5 five parts.Described fpga chip processing module 1 is one and mainly comprises fpga chip and peripheral circuit thereof formation based on the core processing module of FPGA, is mainly used in the encryption and decryption computing of voice signal.Described enciphering and deciphering algorithm module 2 mainly judges that by phonetic data algoritic module 2-1, speech data mapping algorithm module 2-2, speech data enciphering and deciphering algorithm module 2-3, class speech data mapping algorithm module 2-4 and energy synchronized algorithm module 2-5 five parts form.Described bluetooth transceiver module 3 is intermediate modules that the GSM/WCDMA mobile phone is connected with fpga chip processing module 1, comprises that mainly clock module 3-1, Bluetooth chip module 3-2, MD module 3-3, voice signal amplification module 3-4 and transmitter and loud speaker five parts consist of; Described clock module 3-1 connects Bluetooth chip module 3-2 and A/D module 3-3, the clock signal of utilizing two crystal oscillators to produce; Described Bluetooth chip module 3-2 carries out blue teeth wireless with mobile phone and is connected, and is mainly used in reception and the transmission of encrypted speech signal; Described A/D module 3-3 connects fpga chip processing module 1, and the modulus, the digital-to-analogue that are mainly used in signal transform, and simultaneously clock signal being carried out frequency division provides clock control signal for fpga chip processing module 1; Described voice signal amplification module 3-4 connection A/D module 3-3 and transmitter, loud speaker are used for the voice signal that enciphering/deciphering is front/rear and amplify processing; Described transmitter and loud speaker are used for the conversion of acoustical signal and the signal of telecommunication, with voice output after original speech input and the deciphering.The initialize routine of described memory module 4 store voice enciphering and deciphering algorithm modules 2 and Bluetooth chip module 3-2 mainly comprises Flash PROM module 4-1 and E 2PROM module 4-2 two parts, described Flash PROM module 4-1 is made of Flash PROM chip and peripheral circuit thereof, main string pattern is received the configuration pin of fpga chip processing module 1, store voice encryption/decryption algoritic module 2 in this module, when powering on it has been write fpga chip processing module 1; Described E 2The PROM module is by E 2PROM chip and peripheral circuit thereof consist of, and this module has stored the initialize routine of Bluetooth chip module 3-2, finish the initialize routine configuration to Bluetooth chip module 3-2 after powering on.Described power module 5 is used for providing required electric energy to system, mainly comprises charging module 5-1, lithium battery module 5-2 and lifting/voltage reducing chip module 5-3; Described charging module 5-1 connects lithium battery module 5-2, is lithium cell charging; Described lithium battery module 5-2 connects lifting/voltage reducing chip module 5-3, for it provides basic electric energy; Described lifting/voltage reducing chip module 5-3 connects fpga chip processing module 1, bluetooth transceiver module 3 and memory module 4, for the three provides specific operating voltage.
The fpga chip of described fpga chip processing module 1 take model as xc3s500e-4ft256 is core, has the edit capability of 500,000 gate logics, is used for the encryption and decryption computing.Described clock signal module 3-1 utilizes two crystal oscillators respectively to produce the clock signal of 16MHz and 8.192MHz, is respectively Bluetooth chip module 3-2 and A/D module 3-3 provides required clock signal; The Bluetooth chip of described Bluetooth chip module 3-2 take model as IS1626N is core, is used for wireless receiving and the transmission of encrypted speech signal; After the described A/D module 3-3 normal initialization, operating frequency is 8KHZ, is 2.048MHZ to the clock signal frequency division simultaneously, provides clock control signal to fpga chip processing module 1; Described lithium battery module 5-2 is used for storage and the direct voltage of 3.7V is provided; Described lifting/voltage reducing chip module 5-3 be used for the 3.7V voltage transitions that lithium battery module 5-2 produces become each module of system required+5V ,-5V ,+3.3V ,+2.5V and+1.2V voltage.
Described voice encryption/decryption algoritic module 2 is the voice encryption/decryption methods with anti-RPE-LTP compressed encoding and anti-AMR compressed encoding ability for GSM network and the design of WCDMA network characteristic, this module is stored among the Flash PROM module 4-1, be configured to fpga chip processing module 1 when system powers on and finish initialization to fpga chip, simultaneously initialization A/D chip.After initialization is finished, voice encryption/decryption algoritic module 2 can carry out encryption and decryption to speech data to be processed, and this process is mainly called phonetic data algoritic module 2-1, speech data mapping algorithm module 2-2, speech data enciphering and deciphering algorithm module 2-3, class speech data mapping algorithm module 2-4 and energy and judged synchronized algorithm module 2-5.Detailed process is as follows:
1) system initialization: after system powers on, Flash PROM is configured to voice encryption/decryption algoritic module 2 under main string pattern and finishes initialization in the fpga chip, then, fpga chip sends initialization command to A/D module 3-3, finishes the initialization to the A/D chip;
2) enciphered data: after fpga chip processing module 1 receives speech data from A/D module 3-3, at first move phonetic data algoritic module 2-1, the binary digital signal of serial input is transformed into corresponding data-signal; Then move speech data mapping algorithm module 2-2, signal decomposition is become a certain size frame; Then move speech data enciphering and deciphering algorithm module 2-3, speech data signal is encrypted by ad hoc fashion; The class of reruning speech data mapping algorithm module 2-4 synthesizes the voice signal after encrypting, and forms the class voice; Move afterwards energy and judge synchronized algorithm module 2-5, judged by energy and select and the interpolation synchronizing signal; Move at last phonetic data algoritic module 2-1, data-signal is transformed into corresponding binary digital signal serial sends into A/D module 3-3;
3) data decryption: after fpga chip processing module 1 receives the encrypted speech signal from A/D module 3-2, at first move phonetic data algoritic module 2-1, the binary digital signal of serial input is transformed into corresponding data-signal; Then move energy and judge synchronized algorithm module 2-5, judge by energy and select the synchronizing signal processing that carries out related calculation, search synchronizing signal position and remove synchronizing signal; Then move class speech data mapping algorithm module 2-4, speech-like signal is decomposed; The speech data enciphering and deciphering algorithm module of reruning 2-3 is decrypted by ad hoc fashion speech data signal; Move afterwards speech data mapping algorithm module 2-3, with the signal synthetic speech signal after the deciphering; Move at last phonetic data algoritic module 2-1, data-signal is transformed into corresponding binary digital signal serial sends into the A/D module.
Reception and sending function that described phonetic data send algoritic module 2-1 be used for to realize speech data, comprise that main program calls, buffer memory input, string also/parallel-serial conversion algorithm and buffer memory output totally four steps, concrete methods of realizing is:
1) main program calls: during the operation phonetic data algoritic module 2-1 of system, main program calls this module and carries out computing;
2) receive data: when receiving the binary digital signal of serial input, then this binary digital signal of buffer memory at first goes here and there and conversion process to the signal of buffer memory, and it is become parallel output behind the data-signal buffer memory according to certain format conversion;
3) send data: when data need to send, at first then these data of buffer memory were processed this data cached parallel-serial conversion of carrying out, and this data transformation were become serial output behind the binary digital signal buffer memory of certain format.
Described speech data mapping algorithm module 2-2 be used for to realize conversion and the inverse transformation computing of speech data, comprises that main program calls, buffer memory input, synthetic/decomposition data and buffer memory output five steps altogether, and concrete methods of realizing is:
1) main program calls: during the operation speech data mapping algorithm module 2-2 of system, main program calls conversion or the inverse transformation that this module is carried out speech data;
2) data transformation: at first buffer memory is inputted data, then carries out the synthetic of speech data, and the lang sound of going forward side by side strengthens, and the speech data after will synthesizing at last carries out buffer memory, and with the clock Sequential output;
3) data inverse conversion: at first buffer memory is inputted data, then carries out the decomposition of speech data, and the speech data after will decomposing at last carries out buffer memory, and with the clock Sequential output.
Described speech data enciphering and deciphering algorithm module 2-3 is used for realizing the computing of voice enciphering/deciphering, comprise that main program calls, the buffer memory input, select enciphering/deciphering key, time domain enciphering/deciphering, frequency domain enciphering/deciphering and buffer memory output totally six steps form, concrete methods of realizing is:
1) main program calls: during the operation speech data enciphering and deciphering algorithm module 2-3 of system, main program calls this module and is encrypted or decrypt operation;
2) enciphered data: during encrypted speech, at first buffer memory is inputted data, and next selects time domain encryption key and frequency domain encryption key, next successively the data of buffer memory is carried out time domain encryption and frequency domain encryption, speech data and Sequential output after last buffer memory is encrypted;
3) data decryption: during decrypted voice, at first buffer memory is inputted data, and next selects Frequency Domain Solution decryption key and time solution decryption key, next successively the data of buffer memory is carried out frequency domain deciphering and time domain deciphering, speech data and Sequential output after the last buffer memory deciphering.
Described class speech data mapping algorithm module 2-4 be used for to realize mapping and the inverse mapping conversion of class voice, comprises that main program calls, buffer memory input, the mapping transformation/inverse transformation of class voice and buffer memory export totally four steps, and concrete grammar is:
1) main program calls: during the operation class speech data mapping algorithm module 2-4 of system, main program calls mapping or the inverse mapping conversion that this module is carried out the class voice;
2) class voice mapping: at first the input data are carried out buffer memory, then carry out the class voice mapping transformation lang sound of going forward side by side and strengthen, the class speech data signal after the last buffer memory conversion, and export with the clock signal sequence;
3) class voice inverse mapping: at first the input data are carried out buffer memory, then this signal is carried out class voice mappings inverse transformation according to certain form, the speech data after the last buffer memory inverse transformation, and export with the clock signal sequence.
Described energy judges that synchronized algorithm module 2-5 is used for realizing the synchronized transmission of voice and the correct decryption processing of receiving terminal, comprise that main program calls, buffer memory input, energy judge select/search synchronously, embed/remove altogether five steps of synchronizing signal and buffer memory output, concrete grammar is:
1) main program calls: when system operation energy was judged synchronized algorithm module 2-5, main program calls this module to be added or searches synchronizing signal;
2) add synchronizing signal: buffer memory input data at first, then carry out energy and judge and select synchronizing signal, then the correct position of input data embedded synchronizing signal, the data-signal after the last buffer memory conversion, and export with the clock signal sequence;
3) search synchronizing signal: at first buffer memory is inputted data, then judge by energy and select the synchronizing signal processing that carries out related calculation, and search synchronizing signal position, then remove synchronizing signal, data-signal after the last buffer memory conversion, and export with the clock signal sequence.
Structure as shown in Figure 1 as can be known, the Bluetooth chip module that the present invention passes through to provide is connected encrypting and deciphering system with GSM/WCDMA Bluetooth of mobile phone interface wireless, mobile phone input and output voice signal is carried out encryption and decryption process, and realizes the function of voice encryption/decryption.Use equipment primary speech signal of the present invention and enter the voice signal amplification module from transmitter, be sent in the fpga chip processing module by the A/D module again and be encrypted through the voice encryption/decryption algoritic module, then this encrypted speech signal is sent back to the A/D module, be wirelessly transmitted to the GSM/WCDMA mobile phone by the Bluetooth chip module, through GSM/WCDMA mobile phone radio frequency input GSM/WCDMA network; Similarly, encrypted speech is behind process GSM/WCDMA network, received by the GSM/WCDMA mobile phone, by the wireless Bluetooth chip module of sending into of Bluetooth of mobile phone, by the A/D module, send into the fpga chip processing module and be decrypted through the voice encryption/decryption algoritic module again, then, the speech signal of deciphering is sent to the A/D module again, via the voice signal amplification module, sends into the output of voice signal output equipment loud speaker.
Systematic schematic diagram as shown in Figure 2 as can be known, present device mainly comprises five major parts: fpga chip processing module 1, voice encryption/decryption algoritic module 2, bluetooth transceiver module 3, memory module 4 and power module 5.Described fpga chip processing module 1 comprises fpga chip and peripheral circuit thereof.Described voice encryption/decryption algoritic module 2 comprises phonetic data algoritic module 2-1, and speech data mapping algorithm module 2-2, speech data enciphering and deciphering algorithm module 2-3, class speech data mapping algorithm module 2-4 and energy judge synchronized algorithm module 2-5.Described bluetooth transceiver module 3 comprises clock module 3-1, Bluetooth chip module 3-2, A/D module 3-3, voice signal amplification module 3-4 and transmitter and loud speaker.Described power module 5 comprises charging module 5-1, lithium battery module 5-2 and lifting/voltage reducing chip module 5-3.
The course of work of whole system comprises: system initialization layoutprocedure, voice encryption process and voice decrypting process.The system initialization layoutprocedure: after system powered on, Flash PROM module 4-1 write voice encryption/decryption algoritic module 2 in the fpga chip processing module 1 with main string pattern, finishes the initial configuration to it.Simultaneously, E 2PROM module 4-2 writes Bluetooth chip module 3-2 with the bluetooth initialize routine, finishes the initial configuration to Bluetooth chip.Then, fpga chip processing module 1 sends initialization information to A/D module 3-3, finishes the initial configuration to the A/D module.The voice encryption process: after the initialization of each module was finished, system began to carry out voice encryption/decryption, and voice signal is sent into A/D module 3-3 from voice-input device transmitter MIC via voice signal amplification module 3-4.Under the control of the clock signal that clock module 3-1 produces, A/D module 3-3 is converted into digital signal with analog signal and sends into fpga chip processing module 1.Fpga chip processing module 1 is called phonetic data algoritic module 2-1 subsequently successively, speech data mapping algorithm module 2-2, speech data enciphering and deciphering algorithm module 2-3, class speech data mapping algorithm module 2-4, energy is judged synchronized algorithm module 2-5, phonetic data algoritic module 2-1 realizes the encryption to speech data signal under the guiding of clock control signal.This encrypted data signal sends it back A/D module 3-3 again and is converted to analog signal, and 3-2 is wirelessly transmitted to the GSM/WCDMA mobile phone by the Bluetooth chip module, and radio frequency input GSM/WCDMA network is finished the voice encryption process.The voice decrypting process: encrypted speech is sent to Bluetooth chip module 3-2 from GSM/WCDMA Bluetooth of mobile phone interface wireless, then be admitted to A/D module 3-3 and be converted to digital signal, then this digital signal is admitted to fpga chip processing module 1, this module is under the guiding of clock control signal, call successively phonetic data algoritic module 2-1, energy is judged synchronized algorithm module 2-5, class speech data mapping algorithm module 2-4, speech data enciphering and deciphering algorithm module 2-3, speech data mapping algorithm module 2-2, phonetic data algoritic module 2-1 realizes the decryption processing to the decrypted voice signal, and the signal after the deciphering is sent into A/D module 3-3 again, revert to analog signal, amplify through voice signal amplification module 3-4, by the output of voice-output device loud speaker, finish the voice decrypting process again.
Fpga core such as Fig. 3 is processed schematic diagram as can be known, and fpga chip processing module 1 is the system core of the present invention with the voice encryption/decryption algoritic module 2 of operation thereon.Voice encryption/decryption algoritic module 2 is stored among the Flash PROM module 4-1 in the firmware mode, after system powers on, fpga chip processing module 1 is utilized specific chip configuration pin to read 2 pairs of fpga chips of voice encryption/decryption algoritic module of preserving from Flash PROM module 4-1 and is configured, next, 1 pair of A/D module of fpga chip processing module 3-3 carries out initial configuration.Then, system begins to carry out the voice encryption/decryption processing.
Voice encryption/decryption process: at first, the clock signal that A/D module 3-3 produces clock module is carried out frequency division and is obtained clock control signal, under the guiding of this clock control signal, fpga chip processing module 1 is by the primary voice data of data I/O pin reception from A/D module 3-3, then move successively phonetic data algoritic module 2-1, speech data mapping algorithm module 2-2, speech data enciphering and deciphering algorithm module 2-3, class speech data mapping algorithm module 2-4, energy is judged synchronized algorithm module 2-5, phonetic data algoritic module 2-1 realizes the encryption to raw tone.Signal after will encrypting is again sent into A/D module 3-3, is converted into analog signal output.Decrypting process then is the inverse process of said process.At first, under the clock control signal guiding, fpga chip processing module 1 receives the encrypted speech data by data I/O pin, then call successively phonetic data algoritic module 2-1, energy is judged synchronized algorithm module 2-5, class speech data mapping algorithm module 2-4, speech data enciphering and deciphering algorithm module 2-3, speech data mapping algorithm module 2-2, phonetic data algoritic module 2-1 realizes the deciphering to encrypted speech.Signal after will deciphering is again sent into A/D module 3-3, is converted to analog signal output.
Speech data mapping algorithm module 2-2 described in the present invention has adopted speech data decomposition, the technology such as synthetic that signal is processed, and realizes the speech data conversion; Described speech data enciphering and deciphering algorithm module 2-3 has adopted the technology such as time domain encryption/decryption algorithm, frequency domain encryption/decryption algorithm to realize the enciphering/deciphering computing; Described class speech data mapping algorithm module 2-4 has adopted the technology such as class voice mapping/inverse mapping conversion that speech data is processed, and realizes the effect of anti-RPE-LTP/AMR compressed encoding; Described energy judges that synchronized algorithm module 2-5 has adopted energy to judge that technology such as selecting/search synchronizing signal processes data, has realized synchronized transmission and correct deciphering.
As shown in Figure 4 intermodule interface circuit logic schematic diagram of the present invention as can be known, after system powers on, E 2The PROM module is input to the configuration pin of Bluetooth chip with initialize routine by SDA under the control of the clock signal SCL of Bluetooth chip module output, finish the initial configuration of Bluetooth chip; Simultaneously, Flash PROM module with the configuration pin of configurator by data input fpga chip, is finished writing of program under the guiding of the clock signal clk of fpga chip output.After fpga chip is finished initial configuration, in clock signal fs (frame synchronization), under the control of sclk (clock synchronous), with Dout (data output) output signal two A/D chips the A/D module are carried out initial configuration from Dout (data output), the sample frequency that the A/D chip is set is 8KHz, the frequency of fs (frame synchronization) is 8KHz, and the frequency of sclk (clock synchronous) is 2.048MHz.The workflow of system is as follows:
The voice signal ascender: original speech is through the supreme lang tone signal of transmitter Gather and input amplification module, be admitted to again the A/D module, behind up A/D chip sample quantization, sound signal stream inputs to the data I of fpga chip processing module/O pin from Din0 (data input 0) pin under the control of sclk0 (clock synchronous 0), fs0 (frame synchronization 0).In the fpga chip processing module, carry out as described in Figure 3 voice encryption processing, export again encrypted speech.The sound signal stream of encrypting is under the control of sclk0 (clock synchronous 0), fs0 (frame synchronization 0), transport to up A/D chip and carry out digital to analog conversion from Dout0 (data output 0) pin, be wirelessly transmitted to the GSM/WCDMA mobile phone by the Bluetooth chip module at last, and send via the GSM/WCDMA mobile phone radio frequency.
Voice signal descender: after encrypted speech is received by the GSM/WCDMA mobile phone, be sent to the Bluetooth chip module through the mobile phone blue teeth wireless, then be admitted to the A/D module, behind descending A/D chip sample quantization, sound signal stream inputs to the data I of fpga chip processing module/O pin from Din1 (data input 1) pin under the effect of sclk1 (clock synchronous 1), fs1 (frame synchronization 1).In the fpga chip processing module, carry out as described in Figure 3 voice decryption processing and output.Sound signal stream after the deciphering is under the effect of sclk1 (clock synchronous 1), fs1 (frame synchronization 1), export descending A/D chip to and carry out digital to analog conversion from Dout1 (data output 1) pin, export decrypted voice by loud speaker finally by crossing after the voice signal amplification module amplifies.
Be illustrated in figure 5 as circuit theory diagrams of the present invention.Adopting cellular li-ion battery to power to whole system, when the lithium battery quantity not sufficient, is its charging by the external 5V voltage of charging chip, and the lifting/voltage reducing chip provides the 3.7V voltage transitions to be each module required voltage output lithium battery.After system powers on, Flash PROM module and E in the memory module 2The PROM module is carried out initial configuration to fpga chip and Bluetooth chip respectively, and after configuration was finished, fpga chip sent initialization command to the A/D chip and finishes the initialization setting.Subsequently, the clock signal that the A/D chip produces crystal oscillator is carried out the frequency division processing, for fpga chip provides clock control signal.In the up process of voice, primary speech signal is sent into from ascending voice signal amplification module input, entering up A/D chip sample quantization changes digital signal into and sends into fpga chip and be encrypted, after carrying out digital-to-analogue conversion by up A/D chip, from the wireless mobile phone that exports to of Bluetooth chip.In the descending process of voice, the voice signal that mobile phone receives is wirelessly transmitted to the Bluetooth chip module by Bluetooth of mobile phone, entering descending A/D chip carries out sample quantization and changes digital signal into and send into fpga chip and be decrypted again, finally by carried out the digital-to-analogue conversion by descending A/D chip after, export from the voice signal amplification module.
As shown in Figure 6, voice encryption/decryption algoritic module flow chart of the present invention as can be known, system is when powering on, initial configuration fpga chip processing module and A/D module can be carried out afterwards the encryption and decryption of voice signal and be processed.At first speech data receiving algorithm module receives the external series binary digital signal and is converted to corresponding parallel data signal, again signal is encrypted or deciphers.During encryption, at first move speech data mapping algorithm module, the parallel data signal that receives is decomposed into the frame format that is fit to voice encryption; Then call the encrypt voice data algoritic module, adopt specific mode that speech data signal is encrypted; Then call class speech data mapping algorithm module, according to the form that is fit to the speech-like signal transmission data-signal is synthesized, call again energy and judge the synchronized algorithm module, judge that by the class speech data signal being carried out energy the suitable synchronizing signal of selection embeds, and sends into this signal speech data transmission algorithm module at last.During deciphering, program is at first moved energy and is judged the synchronized algorithm module, the data-signal of sending into is carried out energy judge, searches synchronizing signal position; Then call class speech data mapping algorithm module, the synchronizing information that the class speech data signal is obtained according to search is decomposed into the form that is fit to the voice deciphering; Then call speech data decipherment algorithm module, according to specific mode speech-like signal is decrypted; Call again speech data mapping algorithm module, according to the form that is fit to the voice signal transmission signal is synthesized, send into speech data transmission algorithm module.At last, speech data transmission algorithm module is converted to the binary digital signal serial with voice/speech-like signal and sends.
Shown in Fig. 7 phonetic data algoritic module of the present invention flow chart: when main program calls this module receive data, the binary serial data that receives of buffer memory at first; Then operation string and transfer algorithm are converted to parallel data with the serial data of receiving; Last data cached and send.When main program calls this module and sends data, the parallel data that receives of buffer memory at first; Then move the parallel-serial conversion algorithm routine parallel data of receiving is converted to serial data; Last data cached and output.
Be speech data mapping algorithm module operational process of the present invention such as Fig. 8.When main program calls this module data is carried out conversion process, the data that receive of buffer memory at first; Then data-signal is decomposed into a certain size Frame, is converted into the signal format that is suitable for encrypting; Last these data of buffer memory and output.When main program calls this module data is carried out inversion process, the data that receive of buffer memory at first; Then the form according to voice signal data synthesizes data-signal, transfers it to voice signal; Last these data of buffer memory and output.
As shown in Figure 9, speech data enciphering and deciphering algorithm module operational process of the present invention as can be known, when main program calls these module encrypt data, the data received of buffer memory at first, and select required encryption key according to relevant information; Then according to selected encryption key, signal is carried out time domain encryption; Then the data behind the time domain encryption are carried out frequency domain encryption; Data after last buffer memory is encrypted and output.When main program calls these module decrypts data, the data received of buffer memory at first, and select required decruption key according to relevant information; Then according to selected key, signal is carried out the frequency domain deciphering; Then the data after the frequency domain deciphering are carried out the time domain deciphering; Data and output after the last buffer memory deciphering.
Such as Figure 10, class speech data mapping algorithm module operational process of the present invention is as follows, when main program calls this module data is carried out class voice when mapping, at first the data that receive of buffer memory; Then data are carried out the mapping transformation of class voice, be converted into speech-like signal; Last such speech data signal of buffer memory and output; When main program calls this module data is carried out the inverse mapping of class voice, the data that receive of buffer memory at first; Then signal is carried out class voice mapping inverse transformation, be converted into the signal format that is suitable for deciphering; Last these data of buffer memory and output.
Be that energy of the present invention is judged synchronized algorithm module operational flow diagram as shown in figure 11, when main program calls this module data is added synchronizing signal, the data that receive of buffer memory at first; Then move the energy evaluation algorithm and select suitable synchronizing signal; Then the correct position in data embeds selected synchronizing signal; Last these data of buffer memory and output.When main program calls this module searches synchronizing signal, the data that receive of buffer memory at first; Then move the energy evaluation algorithm and select suitable synchronizing signal; Then use selected synchronizing signal to the data processing that carries out related calculation, search the synchronizing signal position; Last these data of buffer memory and output.
Should be understood that; for those of ordinary skills; can according to the preferred embodiments of the technology of the present invention with and technical conceive various possible improvement or the replacement made, and all these changes or replace the protection range that all should belong to claims of the present invention.

Claims (10)

1. a mobile communication end-to-end voice is encrypted Bluetooth handheld device, it is characterized in that carrying out blue teeth wireless by bluetooth transceiver module (3) and GSM/WCDMA mobile phone is connected, GSM/WCDMA mobile phone input and output voice signal is sent to fpga chip processing module (1) carries out the encryption and decryption processing, realize the end-to-end speech encryption function of mobile communication; Described mobile communication end-to-end voice is encrypted Bluetooth handheld device and is made of fpga chip processing module (1), voice encryption/decryption algoritic module (2), bluetooth transceiver module (3), memory module (4) and power module (5) five parts; Described fpga chip processing module (1) is one and comprises fpga chip and peripheral circuit thereof formation based on the core processing module of FPGA, is used for the encryption and decryption computing of voice signal; Voice encryption/decryption algoritic module (2) is the software section that runs in the fpga chip processing module (1), be not stored in the Flash PROM module (4-1) in the firmware mode when system starts, voice encryption/decryption algoritic module (2) mainly judges that by phonetic data algoritic module (2-1), speech data mapping algorithm module (2-2), speech data enciphering and deciphering algorithm module (2-3), class speech data mapping algorithm module (2-4) and energy synchronized algorithm module (2-5) five parts form; Described bluetooth transceiver module (3) is the intermediate module that fpga chip processing module (1) is connected with the GSM/WCDMA mobile phone, comprises that mainly clock module (3-1), Bluetooth chip module (3-2), A/D module (3-3), voice signal amplification module (3-4) and transmitter and loud speaker five parts consist of; Described clock module (3-1) connects Bluetooth chip module (3-2) and A/D module (3-3), for generation of clock signal; Described Bluetooth chip module (3-2) connects the GSM/WCDMA mobile phone in the blue teeth wireless mode, is used for the transmitting-receiving of encrypted speech; Described A/D module (3-3) connects fpga chip processing module (1), and the frequency division that is used for modulus, digital-to-analogue conversion and the clock signal of signal is processed; Described voice signal amplification module (3-4) connects A/D module (3-3) and transmitter and loud speaker, is used for source language is conciliate cipher tone signal input/output; Described memory module (4) is used for the initial configuration program of storaged voice encryption and decryption module (2) and Bluetooth chip module (3-2), by Flash PROM module (4-1) and E 2PROM module (4-2) two parts consist of; Described Flash PROM module (4-1) is made of Flash PROM chip and peripheral circuit thereof, main string pattern is connected to the configuration pin of fpga chip processing module (1), when being used for powering on voice encryption/decryption algoritic module (2) is write fpga chip processing module (1); Described E 2PROM module (4-2) is by E 2PROM chip and peripheral circuit thereof form, and are used for powering on rear initial configuration Bluetooth chip module (3-2); Described power module (5) is used for providing system required electric energy, comprises charging module (5-1), lithium battery module (5-2) and lifting/voltage reducing chip module (5-3); Described charging module (5-1) connects lithium battery module (5-2), is used for this module is charged; Described lithium battery module (5-2) connects lifting/voltage reducing chip module (5-3), for it provides basic electric current; Described lifting/voltage reducing chip module (5-3) connects fpga chip processing module (1), bluetooth transceiver module (3) and memory module (4), is used to the three that stable voltage is provided.
2. mobile communication end-to-end voice according to claim 1 is encrypted Bluetooth handheld device, it is characterized in that the fpga chip of described fpga chip processing module (1) take model as xc3s500e-4ft256 is as encryption and decryption arithmetic core processor; It is Bluetooth chip and the Bluetooth of mobile phone wireless connections of IS1636N that described Bluetooth chip module (3-2) has adopted model, is encrypted the transmitting-receiving of voice signal; Described A/D module (3-3) has used two models to carry out respectively digital-to-analogue, analog-to-digital conversion as the A/D chip of TLC320AD50I, and this A/D chip carries out frequency division to clock signal and provides clock control signal for fpga chip.
3. mobile communication end-to-end voice according to claim 1 is encrypted Bluetooth handheld device, it is characterized in that the Flash PROM chip master string pattern of described Flash PROM module (4-1) take model as xcf04s is connected to the application configuration pin of fpga chip processing module (1), wherein store voice encryption/decryption algoritic module (2), when powering on, be loaded into fpga chip; Described E 2The E of PROM module (4-2) take model as IS24C08A 2The PROM chip-stored Bluetooth chip initialize routine, rear configuration Bluetooth chip powers on.
4. mobile communication end-to-end voice according to claim 1 is encrypted Bluetooth handheld device, it is characterized in that charging when described charging module (5-1) can be not enough to lithium battery module (5-2) electric weight, lithium battery module (5-2) can store electrical energy and the direct voltage of 3.7V is provided, and (5-3) is translated into+5V by the lifting/voltage reducing chip module,-5V, + 3.3V, + 2.5V and+voltage of 1.2V, wherein, lifting/voltage reducing chip module (5-3) provides+5V bluetooth transceiver module (3), the voltage of-5V and+3.3V, fpga chip processing module (1) is provided+3.3V ,+2.5V and+voltage of 1.2V.
5. the speech ciphering method of a mobile communication end-to-end voice encryption Bluetooth handheld device as claimed in claim 1 is characterized in that described voice encryption/decryption algoritic module (2) is comprised of voice mark data transmit-receive algoritic module (2-1), speech data mapping algorithm module (2-2), speech data enciphering and deciphering algorithm module (2-3), class speech data mapping algorithm module (2-4) and energy judgement synchronized algorithm module (2-5) five parts; When system powers on, voice encryption/decryption algoritic module (2) writes in the fpga chip processing module (1) automatically, after the system works, this voice encryption/decryption algoritic module (2) calls phonetic data algoritic module (2-1), speech data mapping algorithm module (2-2), speech data enciphering and deciphering algorithm module (2-3), class speech data mapping algorithm module (2-4) and energy and judges that synchronized algorithm module (2-5) realizes whole algorithm, and its detailed process is as follows:
1) system initialization: after system powers on, Flash PROM module (4-2) is configured to the voice encryption/decryption algoritic module in the fpga chip processing module (1) under main string pattern and finishes initialization, then, fpga chip processing module (1) sends initialization command to A/D module (3-3), finishes the initialization to A/D module (3-3);
2) enciphered data: after fpga chip processing module (1) receives speech data from A/D module (3-3), at first move phonetic data algoritic module (2-1), the binary digital signal of serial input is transformed into corresponding data-signal; Then move speech data mapping algorithm module (2-2), signal decomposition is become a certain size frame; Then move speech data enciphering and deciphering algorithm module (2-3), speech data signal is encrypted by ad hoc fashion; The class of reruning speech data mapping algorithm module (2-4) is synthesized the voice signal after encrypting, and forms the class voice; Move afterwards energy and judge synchronized algorithm module (2-5), judged by energy and select and the interpolation synchronizing signal; Move at last phonetic data algoritic module (2-1), data-signal is transformed into corresponding binary digital signal serial sends into A/D module (3-3);
3) data decryption: after fpga chip processing module (1) receives the encrypted speech signal from A/D module (3-3), at first move phonetic data algoritic module (2-1), the binary digital signal of serial input is transformed into corresponding data-signal; Then move energy and judge synchronized algorithm module (2-5), judge by energy and select the synchronizing signal processing that carries out related calculation, search synchronizing signal position and remove synchronizing signal; Then move class speech data mapping algorithm module (2-4), speech-like signal is decomposed; The speech data enciphering and deciphering algorithm module (2-3) of reruning is decrypted by ad hoc fashion speech data signal; Move afterwards speech data mapping algorithm module (2-2), with the signal synthetic speech signal after the deciphering; Move at last phonetic data algoritic module (2-1), become this data transformation corresponding binary digital signal serial to send into A/D module (3-3).
6. mobile communication end-to-end voice according to claim 5 is encrypted the speech ciphering method of Bluetooth handheld device, it is characterized in that described phonetic data send algoritic module (2-1) be used for to realize reception and the sending function of speech data, comprise that main program calls, buffer memory input, string also/parallel-serial conversion algorithm and buffer memory output totally four steps, concrete methods of realizing is:
1) main program calls: when system's operation phonetic data was sent algoritic module (2-1), main program called this module and carries out computing;
2) receive data: when receiving the binary digital signal of serial input, then this binary digital signal of buffer memory at first goes here and there and conversion process to the signal of buffer memory, and it is become parallel output behind the data-signal buffer memory according to certain format conversion;
3) send data: when data need to send, at first then these data of buffer memory were processed this data cached parallel-serial conversion of carrying out, and this data transformation were become serial output behind the binary digital signal buffer memory of certain format.
7. mobile communication end-to-end voice according to claim 5 is encrypted the speech ciphering method of Bluetooth handheld device, it is characterized in that described speech data mapping algorithm module (2-2) is used for realizing conversion and the inverse transformation computing of speech data, comprise that main program calls, buffer memory input, synthetic/decomposition data and buffer memory output five steps altogether, concrete methods of realizing is:
1) main program calls: during system's operation speech data mapping algorithm module (2-2), main program calls conversion or the inverse transformation that this module is carried out speech data;
2) data transformation: at first buffer memory is inputted data, then carries out the synthetic of speech data, and the lang sound of going forward side by side strengthens, and the speech data after will synthesizing at last carries out buffer memory, and with the clock Sequential output;
3) data inverse conversion: at first buffer memory is inputted data, then carries out the decomposition of speech data, and the speech data after will decomposing at last carries out buffer memory, and with the clock Sequential output.
8. mobile communication end-to-end voice according to claim 5 is encrypted the speech ciphering method of Bluetooth handheld device, it is characterized in that described speech data enciphering and deciphering algorithm module (2-3) is used for realizing the computing of voice enciphering/deciphering, comprise that main program calls, the buffer memory input, select enciphering/deciphering key, time domain enciphering/deciphering, frequency domain enciphering/deciphering and buffer memory output totally six steps form, concrete methods of realizing is:
1) main program calls: during system's operation speech data enciphering and deciphering algorithm module (2-3), main program calls this module and is encrypted or decrypt operation;
2) enciphered data: during encrypted speech, at first buffer memory is inputted data, and next selects time domain encryption key and frequency domain encryption key, next successively the data of buffer memory is carried out time domain encryption and frequency domain encryption, speech data and Sequential output after last buffer memory is encrypted;
3) data decryption: during decrypted voice, at first buffer memory is inputted data, and next selects Frequency Domain Solution decryption key and time solution decryption key, next successively the data of buffer memory is carried out frequency domain deciphering and time domain deciphering, speech data and Sequential output after the last buffer memory deciphering.
9. mobile communication end-to-end voice according to claim 5 is encrypted the speech ciphering method of Bluetooth handheld device, it is characterized in that described class speech data mapping algorithm module (2-4) is used for realizing mapping and the inverse mapping conversion of class voice, comprise that main program calls, buffer memory input, the mapping transformation/inverse transformation of class voice and buffer memory output totally four steps, concrete grammar is:
1) main program calls: during system's operation class speech data mapping algorithm module (2-4), main program calls mapping or the inverse mapping conversion that this module is carried out the class voice;
2) class voice mapping: at first the input data are carried out buffer memory, then carry out the class voice mapping transformation lang sound of going forward side by side and strengthen, the class speech data signal after the last buffer memory conversion, and export with the clock signal sequence;
3) class voice inverse mapping: at first the input data are carried out buffer memory, then this signal is carried out class voice mappings inverse transformation according to certain form, the speech data after the last buffer memory inverse transformation, and export with the clock signal sequence.
10. mobile communication end-to-end voice according to claim 5 is encrypted the speech ciphering method of Bluetooth handheld device, it is characterized in that described energy judgement synchronized algorithm module (2-5) is used for realizing the synchronized transmission of voice and the correct decryption processing of receiving terminal, comprise that main program calls, buffer memory input, energy judge select/search synchronously, embed/remove altogether five steps of synchronizing signal and buffer memory output, concrete grammar is:
1) main program calls: when system operation energy was judged synchronized algorithm module (2-5), main program calls this module to be added or searches synchronizing signal;
2) add synchronizing signal: buffer memory input data at first, then carry out energy and judge and select synchronizing signal, then the correct position of input data embedded synchronizing signal, the data-signal after the last buffer memory conversion, and export with the clock signal sequence;
3) search synchronizing signal: at first buffer memory is inputted data, then judge by energy and select the synchronizing signal processing that carries out related calculation, and search synchronizing signal position, then remove synchronizing signal, data-signal after the last buffer memory conversion, and export with the clock signal sequence.
CN201010556715.7A 2010-11-24 2010-11-24 Mobile communication end-to-end voice encryption Bluetooth handheld device and voice encryption method Expired - Fee Related CN102075321B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010556715.7A CN102075321B (en) 2010-11-24 2010-11-24 Mobile communication end-to-end voice encryption Bluetooth handheld device and voice encryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010556715.7A CN102075321B (en) 2010-11-24 2010-11-24 Mobile communication end-to-end voice encryption Bluetooth handheld device and voice encryption method

Publications (2)

Publication Number Publication Date
CN102075321A CN102075321A (en) 2011-05-25
CN102075321B true CN102075321B (en) 2013-01-02

Family

ID=44033677

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010556715.7A Expired - Fee Related CN102075321B (en) 2010-11-24 2010-11-24 Mobile communication end-to-end voice encryption Bluetooth handheld device and voice encryption method

Country Status (1)

Country Link
CN (1) CN102075321B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104185173A (en) * 2013-05-23 2014-12-03 东南大学常州研究院 Enhanced variable rate code resistant voice end-to-end encryption and decryption method
CN103825885A (en) * 2014-01-23 2014-05-28 广东顺德中山大学卡内基梅隆大学国际联合研究院 Internet content encryption release method and system
CN104301011B (en) * 2014-11-07 2017-01-18 绵阳市维博电子有限责任公司 Method and system for realizing voice encryption communication between bluetooth devices
CN106303913B (en) * 2015-06-01 2019-06-25 深圳市南方硅谷微电子有限公司 Bluetooth transceiver therein and its information transceiving method
CN105120457B (en) * 2015-09-22 2019-01-18 南京嘉谷初成通信科技有限公司 A kind of Mobile Communication Circuit domain audio processing apparatus and method
CN107071118A (en) * 2017-01-03 2017-08-18 中国农业大学 A kind of structure and its method of mobile phone speech encryption
CN107994928B (en) * 2018-01-10 2021-04-27 飞天诚信科技股份有限公司 Method and communication device for realizing synchronous receiving and transmitting of Bluetooth data

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1592141A (en) * 2004-01-17 2005-03-09 中国电子科技集团公司第三十研究所 Terminal to terminal encryption method of cell phone voice and data
CN101026836A (en) * 2007-04-06 2007-08-29 东南大学 Anti vocoder compressed end-to-end voice encryption device and method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7852783B2 (en) * 2006-12-07 2010-12-14 Cisco Technology, Inc. Identify a secure end-to-end voice call

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1592141A (en) * 2004-01-17 2005-03-09 中国电子科技集团公司第三十研究所 Terminal to terminal encryption method of cell phone voice and data
CN101026836A (en) * 2007-04-06 2007-08-29 东南大学 Anti vocoder compressed end-to-end voice encryption device and method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
周世健等.抗RPE-LTP 压缩编码的语音加密算法.《计算机工程》.2008,第34卷(第13期),第163-165页. *

Also Published As

Publication number Publication date
CN102075321A (en) 2011-05-25

Similar Documents

Publication Publication Date Title
CN102075321B (en) Mobile communication end-to-end voice encryption Bluetooth handheld device and voice encryption method
CN101014060B (en) Voice encryption method for GSM handset with anti longterm prediction rule pulse excitation compression coding
CN101835146A (en) Third generation mobile network mobile phone sound end-to-end encrypting device and method
CN103000181B (en) System and implement method thereof for secret communications based on public communication network voice channel
CN101631304B (en) Anti-adaptive multi-rate coding third-generation mobile communication end-to-end voice encryption method
CN102624518B (en) Voice encryption and decryption method
WO2008129546A2 (en) Voice encryption device
CN108028818A (en) The method and system that arbitrary data is transmitted with low delay is connected by bluetooth HFP audios
CN104185173A (en) Enhanced variable rate code resistant voice end-to-end encryption and decryption method
CN105681310A (en) Bluetooth based voice source real-time voice encryption method
CN103209269B (en) Zigbee-technology-based digital wireless multi-channel audio conference method and device
CN101287274B (en) Voice encryption system for mobile communication and encryption method thereof
CN103956163B (en) Common voice and encrypted voice interconversion system and method
CN203313411U (en) Plug-and-play type portable secure communication device
CN103379486A (en) Plug and play type portable communication secrecy device and communication method thereof
CN101500231A (en) Mobile terminal, audio data processing method and system
CN1564504B (en) Chaos coding/decoding method of data stream and modularized circuit
CN108429851B (en) Cross-platform information source voice encryption method and device
CN1585539A (en) Mobile phone encrypting method
CN201188646Y (en) Telephone secrecy apparatus
CN1592141A (en) Terminal to terminal encryption method of cell phone voice and data
CN206249309U (en) A kind of talkback unit for realizing real-time voice intertranslation
CN101394248A (en) Data ciphering and deciphering communication terminal
CN107566368A (en) Voice communication system and its Application way for ground control's node
RU151378U1 (en) HEADSET FOR MOBILE DEVICES WITH COMMUNICATION ENCRYPTION FUNCTION

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20130102

Termination date: 20151124

CF01 Termination of patent right due to non-payment of annual fee