CN105357226A - Encryption communication method based on VOIP (voice over internet phone) communication - Google Patents

Encryption communication method based on VOIP (voice over internet phone) communication Download PDF

Info

Publication number
CN105357226A
CN105357226A CN201510942125.0A CN201510942125A CN105357226A CN 105357226 A CN105357226 A CN 105357226A CN 201510942125 A CN201510942125 A CN 201510942125A CN 105357226 A CN105357226 A CN 105357226A
Authority
CN
China
Prior art keywords
blue tooth
voice
communication terminal
encryption device
communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510942125.0A
Other languages
Chinese (zh)
Inventor
左光磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHENGDU HUIYAN TECHNOLOGY CO., LTD.
Original Assignee
Shenzhen Jiuding Anhua Science & Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jiuding Anhua Science & Technology Co Ltd filed Critical Shenzhen Jiuding Anhua Science & Technology Co Ltd
Priority to CN201510942125.0A priority Critical patent/CN105357226A/en
Publication of CN105357226A publication Critical patent/CN105357226A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M7/00Arrangements for interconnection between switching centres
    • H04M7/006Networks other than PSTN/ISDN providing telephone service, e.g. Voice over Internet Protocol (VoIP), including next generation networks with a packet-switched transport layer
    • H04M7/0078Security; Fraud detection; Fraud prevention

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses an encryption communication method based on VOIP (voice over internet phone) communication, which mainly solves the problems in the prior art that no safety encryption method is provided for the voice communication over internet. According to the encryption communication method based on the VOIP communication, the encryption of voice data is completed on the front end of a communication terminal, so that even if the voice data is taken by a third party at the communication terminal, clear content cannot be acquired, and the safety of the conversation content can be effectively protected.

Description

A kind of encryption communication method based on VOIP communication
Technical field
The present invention relates to a kind of encryption communication method, specifically, relate to a kind of encryption communication method based on VOIP communication.
Background technology
At present, communication has been deep into the various aspects of society, and voice call remains the main contents of mobile communication.VOIP carrys out transmitting voice information by the Internet network data, and user only needs payment network expense, and need not pay communication cost, effectively can save communications cost.But, VOIP needs to install special-purpose software in computer end or intelligent terminal, and computer and intelligent terminal are open system, be easy to the malicious codes such as implanted wooden horse, virus, easily take the raw information of call away, in prior art, also effectively can not ensure the information security of communicating pair for the encryption method of network voice communication.
Summary of the invention
The object of the invention is to overcome above-mentioned defect, provide a kind of safe and reliable, realize easily based on VOIP communication encryption communication method.
To achieve these goals, the present invention is by the following technical solutions:
Based on an encryption communication method for VOIP communication, comprise the following steps:
(1) blue tooth voice encryption device is configured, blue tooth voice encryption device and communication terminal pairing and binding, the initialized step of completion system;
(2) communicating pair carries out the step of call communication:
(21) calling party communication terminal is by generating working key W1, PKI P1 and private key S1 with the blue tooth voice encryption device of its pairing, and callee's communication terminal is by generating working key W2, PKI P2 and private key S2 with the blue tooth voice encryption device of its pairing;
(22) the blue tooth voice encryption device matched with calling party communication terminal uses public-key after P2 cryptographic work key W1 and transfers to callee, and the blue tooth voice encryption device matched with callee's communication terminal uses public-key after P1 cryptographic work key W2 and transfers to calling party;
(23) the blue tooth voice encryption device matched with calling party communication terminal uses private key S1 to decipher and obtains working key W2, and the blue tooth voice encryption device matched with callee's communication terminal uses private key S2 to decipher and obtains working key W1;
(24) voice transfer
Call direction callee transferring voice: the blue tooth voice encryption device matched with calling party communication terminal uses working key W1 encrypted voice data to transfer to callee;
Callee is to calling party transferring voice: the blue tooth voice encryption device matched with callee's communication terminal uses working key W2 encrypted voice data to transfer to calling party;
(25) phonetic incepting
Callee receives voice: the blue tooth voice encryption device matched with callee's communication terminal uses working key W1 decrypted voice data, then transfers to receiver after decoding;
The blue tooth voice encryption device that calling party reception voice and calling party communication terminal match uses working key W2 decrypted voice data, then transfers to receiver after decoding.
Further, described step (1) is specific as follows:
(11) communication terminal arranges user password A;
(12) communication terminal sends index ID to the blue tooth voice encryption device with its pairing;
(13) blue tooth voice encryption device generates PKI P and private key S according to index ID, and sends PKI P to communication terminal;
(14) communication terminal storage of public keys P transfer to blue tooth voice encryption device after the P encrypting user password A that uses public-key;
(15) blue tooth voice encryption device uses private key S deciphering to obtain user password A;
(16) blue tooth voice encryption device stores index ID, PKI P, private key S and user password A.
Further, further comprising the steps of before described step (2):
A () communication terminal P that uses public-key transfers to blue tooth voice encryption device to user password A1, index ID1 after being encrypted;
B () blue tooth voice encryption device uses private key S deciphering to obtain user password A1, index ID1;
Whether (c) blue tooth voice encryption device authentication of users password A1, index ID1 mate with user password A, the index ID of storage, if coupling, then allow communication, otherwise do not allow communication.
Further, described blue tooth voice encryption device comprises: bluetooth module, for voice collecting and transfer of data; Voice encryption module, for completing the compressed encoding of voice, encryption and framing.
Further, the method for work of described blue tooth voice encryption device is as follows:
Send:
After bluetooth module receives analog voice signal, be transformed to audio digital signals after carrying out AD conversion, deliver to voice encryption module by i2s passage, after voice encryption module completes voice compression coding, encryption, by i2s channel transfer to bluetooth module, then be sent to communication terminal by bluetooth module;
Receive:
Bluetooth module receives the speech data after encryption, and through i2s channel transfer to voice encryption module, voice encryption module completes deciphering and decompress(ion), restore digital speech, through i2s channel transfer to bluetooth module, complete DA by bluetooth module and change, then deliver to communication terminal.
Compared with prior art, beneficial effect of the present invention is:
Namely the present invention completes the encryption to speech data in communication terminal front end, therefore, even if speech data is taken by third party at communication terminal, also cannot obtain clear content, thus can the fail safe of available protecting dialog context.
Embodiment
Below in conjunction with embodiment, the invention will be further described.Embodiments of the present invention include but not limited to the following example.
Embodiment
Present embodiments provide a kind of encryption communication method based on VOIP communication, the method, by configuration blue tooth voice encryption device, realizes namely being encrypted in communication terminal front end speech data, avoids the communication information to leak.Blue tooth voice encryption device is made up of bluetooth module, voice encryption module, bluetooth module is responsible for voice collecting and the transfer of data with PC or mobile terminal, voice encryption module completes the compressed encoding of voice, encryption and framing, and bluetooth module is responsible for the communication with communication terminal; Communication terminal is sent to the communication server to after the enciphered data received again framing, and the communication server is transmitted to recipient the speech data received.Wherein, communication terminal refers to the PC end, panel computer or the smart mobile phone end that are provided with VOIP software.
When realizing intercommunication, first can carry out pairing and binding to blue tooth voice encryption device with corresponding communication terminal, the initialization of completion system, its detailed process is as follows: (11) communication terminal arranges user password A; (12) communication terminal sends index ID to the blue tooth voice encryption device with its pairing; (13) blue tooth voice encryption device generates PKI P and private key S according to index ID, and sends PKI P to communication terminal; (14) communication terminal storage of public keys P transfer to blue tooth voice encryption device after the P encrypting user password A that uses public-key; (15) blue tooth voice encryption device uses private key S deciphering to obtain user password A; (16) blue tooth voice encryption device stores index ID, PKI P, private key S and user password A.The object of pairing and binding, relative to being that the encryption device of correspondence and communication terminal are mated, simultaneously, the corresponding information of storing communication terminal in blue tooth voice encryption device, when user uses communication, first can carry out legitimate verification to communication terminal, only have when the user password of communication terminal and index mate with the user password stored in blue tooth voice encryption device and index, user just can enter corresponding operation element interface, doing so avoids usurping or cracking communication terminal.
In use, the proof procedure of communication terminal is as follows: (a) communication terminal P that uses public-key transfers to blue tooth voice encryption device to user password A1, index ID1 after being encrypted; B () blue tooth voice encryption device uses private key S deciphering to obtain user password A1, index ID1; Whether (c) blue tooth voice encryption device authentication of users password A1, index ID1 mate with user password A, the index ID of storage, if coupling, then allow communication, otherwise do not allow communication.Wherein, user password A1 is inputted in VOIP communication software by user.
Communicating pair all should be equipped with above-mentioned communication terminal and blue tooth voice encryption device, and namely the terminal and the dealing voice messaging that realize communication all can be encrypted before terminal sends, and then cryptographically transmit, and recipient is decrypted enciphered message again.
In the present embodiment, be mainly reflected in two-way (communicating pair) mutual encryption, process to the encryption of communication, after communication terminal is proved to be successful, user enters operation interface, the calling party request of making a call, and enters talking state after waiting for called connection.Now, communicating pair all can generate corresponding working key and public private key pair, and calling party is not identical with public private key pair with the working key of callee, be specially: calling party communication terminal is by generating working key W1, PKI P1 and private key S1 with the blue tooth voice encryption device of its pairing, and callee's communication terminal is by generating working key W2, PKI P2 and private key S2 with the blue tooth voice encryption device of its pairing.
When communicating, the encryption of communicating pair intersection, deciphering, specific as follows: the blue tooth voice encryption device that () and calling party communication terminal match uses public-key after P2 cryptographic work key W1 and transfers to callee, the blue tooth voice encryption device matched with callee's communication terminal uses public-key after P1 cryptographic work key W2 and transfers to calling party; (2) the blue tooth voice encryption device matched with calling party communication terminal uses private key S1 to decipher and obtains working key W2, and the blue tooth voice encryption device matched with callee's communication terminal uses private key S2 to decipher and obtains working key W1; (3) voice transfer, call direction callee transferring voice: the blue tooth voice encryption device matched with calling party communication terminal uses working key W1 encrypted voice data to transfer to callee; Callee is to calling party transferring voice: the blue tooth voice encryption device matched with callee's communication terminal uses working key W2 encrypted voice data to transfer to calling party.Wherein, relate to encrypted voice data transmission, all realize transfer by the viop communication server, forwarded by the viop communication server.
When communicating, under transmission state, the course of work of blue tooth voice encryption device is as follows: after entering talking state, the analog voice signal that Mike gathers delivers to bluetooth module, bluetooth module is transformed to audio digital signals after carrying out ad conversion (ad, da transducer is all integrated in Bluetooth chip), voice encryption module is delivered to by i2s passage, voice encryption module completes voice compression coding (by 64kbps below boil down to 16kbps), encryption (sm4 or aes), after be transferred to bluetooth module by i2s, be sent to terminal.
The phonetic incepting process of communicating pair is as follows:
Callee receives voice: the blue tooth voice encryption device matched with callee's communication terminal uses working key W1 decrypted voice data, then transfers to receiver after decoding; The blue tooth voice encryption device that calling party reception voice and calling party communication terminal match uses working key W2 decrypted voice data, then transfers to receiver after decoding.Under phonetic incepting state, the course of work of blue tooth voice encryption device is as follows: bluetooth module receives the speech data after encryption, voice encryption module is transferred to through i2s, voice encryption module completes deciphering and decompresses, restore the plaintext digital speech of 64kbps, deliver to bluetooth module through i2s, complete da conversion by bluetooth module and deliver to receiver broadcasting.
According to above-described embodiment, just the present invention can be realized well.What deserves to be explained is; under prerequisite based on above-mentioned design principle; for solving same technical problem; even if some making on architecture basics disclosed in this invention are without substantial change or polishing; the essence of the technical scheme adopted is still the same with the present invention, therefore it also should in protection scope of the present invention.

Claims (5)

1., based on an encryption communication method for VOIP communication, it is characterized in that, comprise the following steps:
(1) blue tooth voice encryption device is configured, blue tooth voice encryption device and communication terminal pairing and binding, the initialized step of completion system;
(2) communicating pair carries out the step of call communication:
(21) calling party communication terminal is by generating working key W1, PKI P1 and private key S1 with the blue tooth voice encryption device of its pairing, and callee's communication terminal is by generating working key W2, PKI P2 and private key S2 with the blue tooth voice encryption device of its pairing;
(22) the blue tooth voice encryption device matched with calling party communication terminal uses public-key after P2 cryptographic work key W1 and transfers to callee, and the blue tooth voice encryption device matched with callee's communication terminal uses public-key after P1 cryptographic work key W2 and transfers to calling party;
(23) the blue tooth voice encryption device matched with calling party communication terminal uses private key S1 to decipher and obtains working key W2, and the blue tooth voice encryption device matched with callee's communication terminal uses private key S2 to decipher and obtains working key W1;
(24) voice transfer
Call direction callee transferring voice: the blue tooth voice encryption device matched with calling party communication terminal uses working key W1 encrypted voice data to transfer to callee;
Callee is to calling party transferring voice: the blue tooth voice encryption device matched with callee's communication terminal uses working key W2 encrypted voice data to transfer to calling party;
(25) phonetic incepting
Callee receives voice: the blue tooth voice encryption device matched with callee's communication terminal uses working key W1 decrypted voice data, then transfers to receiver after decoding;
The blue tooth voice encryption device that calling party reception voice and calling party communication terminal match uses working key W2 decrypted voice data, then transfers to receiver after decoding.
2. a kind of encryption communication method based on VOIP communication according to claim 1, it is characterized in that, described step (1) is specific as follows:
(11) communication terminal arranges user password A;
(12) communication terminal sends index ID to the blue tooth voice encryption device with its pairing;
(13) blue tooth voice encryption device generates PKI P and private key S according to index ID, and sends PKI P to communication terminal;
(14) communication terminal storage of public keys P transfer to blue tooth voice encryption device after the P encrypting user password A that uses public-key;
(15) blue tooth voice encryption device uses private key S deciphering to obtain user password A;
(16) blue tooth voice encryption device stores index ID, PKI P, private key S and user password A.
3. a kind of encryption communication method based on VOIP communication according to claim 2, is characterized in that, further comprising the steps of before described step (2):
A () communication terminal P that uses public-key transfers to blue tooth voice encryption device to user password A1, index ID1 after being encrypted;
B () blue tooth voice encryption device uses private key S deciphering to obtain user password A1, index ID1;
Whether (c) blue tooth voice encryption device authentication of users password A1, index ID1 mate with user password A, the index ID of storage, if coupling, then allow communication, otherwise do not allow communication.
4. a kind of encryption communication method based on VOIP communication according to claim 3, it is characterized in that, described blue tooth voice encryption device comprises: bluetooth module, for voice collecting and transfer of data; Voice encryption module, for completing the compressed encoding of voice, encryption and framing.
5. a kind of encryption communication method based on VOIP communication according to claim 4, it is characterized in that, the method for work of described blue tooth voice encryption device is as follows:
Send:
After bluetooth module receives analog voice signal, be transformed to audio digital signals after carrying out AD conversion, deliver to voice encryption module by i2s passage, after voice encryption module completes voice compression coding, encryption, by i2s channel transfer to bluetooth module, then be sent to communication terminal by bluetooth module;
Receive:
Bluetooth module receives the speech data after encryption, and through i2s channel transfer to voice encryption module, voice encryption module completes deciphering and decompress(ion), restore digital speech, through i2s channel transfer to bluetooth module, complete DA by bluetooth module and change, then deliver to communication terminal.
CN201510942125.0A 2015-12-16 2015-12-16 Encryption communication method based on VOIP (voice over internet phone) communication Pending CN105357226A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510942125.0A CN105357226A (en) 2015-12-16 2015-12-16 Encryption communication method based on VOIP (voice over internet phone) communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510942125.0A CN105357226A (en) 2015-12-16 2015-12-16 Encryption communication method based on VOIP (voice over internet phone) communication

Publications (1)

Publication Number Publication Date
CN105357226A true CN105357226A (en) 2016-02-24

Family

ID=55333090

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510942125.0A Pending CN105357226A (en) 2015-12-16 2015-12-16 Encryption communication method based on VOIP (voice over internet phone) communication

Country Status (1)

Country Link
CN (1) CN105357226A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105610580A (en) * 2016-03-25 2016-05-25 成都汇研科技有限公司 External speech encryption device based on smart phone and implementation method thereof
CN105722069A (en) * 2016-03-24 2016-06-29 深圳市创百通讯科技有限公司 Mobile terminal capable of encrypting voice information and encryption method thereof
CN107395552A (en) * 2016-05-17 2017-11-24 中兴通讯股份有限公司 A kind of data transmission method and device
CN107786953A (en) * 2016-08-29 2018-03-09 中国移动通信有限公司研究院 VoLTE call encryptions processing method, application server and terminal
CN112953964A (en) * 2021-03-15 2021-06-11 北京中联环信科技有限公司 Voice signaling encryption processing system and encryption processing method
CN114867012A (en) * 2022-05-30 2022-08-05 北京启星微电子有限公司 Encryption earphone and voice communication method thereof

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1645780A (en) * 2005-02-01 2005-07-27 四川大学 Secured communicating method and device for hiding talking voice
CN101384042A (en) * 2008-10-15 2009-03-11 东南大学 Mobile phone ciphering method based on safe digital interface ciphering card
CN101567885A (en) * 2009-05-19 2009-10-28 北京握奇数据系统有限公司 Voice call device as well as system and method thereof
CN101909290A (en) * 2010-08-25 2010-12-08 中兴通讯股份有限公司 Method, system and mobile terminal for encrypting voice call
US20110135091A1 (en) * 2008-11-26 2011-06-09 Radatti Peter V Secure telephone devices, systems and methods
CN102202299A (en) * 2010-03-26 2011-09-28 谢德育 Realization method of end-to-end voice encryption system based on 3G/B3G
CN102843675A (en) * 2011-06-24 2012-12-26 中兴通讯股份有限公司 Cluster call voice encryption method, terminal and system
CN103986503A (en) * 2014-05-16 2014-08-13 北京民芯科技有限公司 Safety Bluetooth headset and voice communication method thereof

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1645780A (en) * 2005-02-01 2005-07-27 四川大学 Secured communicating method and device for hiding talking voice
CN101384042A (en) * 2008-10-15 2009-03-11 东南大学 Mobile phone ciphering method based on safe digital interface ciphering card
US20110135091A1 (en) * 2008-11-26 2011-06-09 Radatti Peter V Secure telephone devices, systems and methods
CN101567885A (en) * 2009-05-19 2009-10-28 北京握奇数据系统有限公司 Voice call device as well as system and method thereof
CN102202299A (en) * 2010-03-26 2011-09-28 谢德育 Realization method of end-to-end voice encryption system based on 3G/B3G
CN101909290A (en) * 2010-08-25 2010-12-08 中兴通讯股份有限公司 Method, system and mobile terminal for encrypting voice call
CN102843675A (en) * 2011-06-24 2012-12-26 中兴通讯股份有限公司 Cluster call voice encryption method, terminal and system
CN103986503A (en) * 2014-05-16 2014-08-13 北京民芯科技有限公司 Safety Bluetooth headset and voice communication method thereof

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105722069A (en) * 2016-03-24 2016-06-29 深圳市创百通讯科技有限公司 Mobile terminal capable of encrypting voice information and encryption method thereof
CN105610580A (en) * 2016-03-25 2016-05-25 成都汇研科技有限公司 External speech encryption device based on smart phone and implementation method thereof
CN107395552A (en) * 2016-05-17 2017-11-24 中兴通讯股份有限公司 A kind of data transmission method and device
CN107786953A (en) * 2016-08-29 2018-03-09 中国移动通信有限公司研究院 VoLTE call encryptions processing method, application server and terminal
CN107786953B (en) * 2016-08-29 2020-02-18 中国移动通信有限公司研究院 VoLTE encryption call processing method, application server and terminal
CN112953964A (en) * 2021-03-15 2021-06-11 北京中联环信科技有限公司 Voice signaling encryption processing system and encryption processing method
CN112953964B (en) * 2021-03-15 2024-03-08 北京中联环信科技有限公司 Voice signaling encryption processing system and encryption processing method
CN114867012A (en) * 2022-05-30 2022-08-05 北京启星微电子有限公司 Encryption earphone and voice communication method thereof

Similar Documents

Publication Publication Date Title
CN105357226A (en) Encryption communication method based on VOIP (voice over internet phone) communication
CN101197674B (en) Encrypted communication method, server and encrypted communication system
CN102572817B (en) Method and intelligent memory card for realizing mobile communication confidentiality
CN203279187U (en) Voice encryption bluetooth earphone with fingerprint identification function
CN102843677A (en) Voice communication method, device and system
CN103354461A (en) Sound-based near field communication system and method thereof
CN104301011A (en) Method and system for realizing voice encryption communication between bluetooth devices
CN107517184A (en) Message transmitting method, apparatus and system
CN103458401B (en) A kind of voice encryption communication system and communication means
CN107426521A (en) A kind of video call method and terminal
CN102869009A (en) Communication encryption application method and communication system
CN101567885A (en) Voice call device as well as system and method thereof
CN1688171A (en) Apparatus and method for implementing data safety transmission of mobile communication apparatus
EP2809045B1 (en) Information security attachment device for voice communication and information security method for voice communication using the same
CN105610580A (en) External speech encryption device based on smart phone and implementation method thereof
CN108668273B (en) Satellite encryption communication device
CN203537408U (en) End-to-end voice communication privacy device with assignable secret key
CN1893474A (en) Method and apparatus for realizing voice enciphering in communication system
CN202818616U (en) Voice communication device and system
CN101902734A (en) End-to-end self-synchronization voice encryption transmission implementation method for digital trunking communication system
SK7505Y1 (en) System for secure transmission of voice communication via the communication network and method for secure transmission of voice communication
CN2794067Y (en) Enciphering device of key signal in phonetic telecommunication tool
CN210380958U (en) Telephone set with conversation encryption function
CN109905876A (en) A kind of speech ciphering method based on coprocessor
CN212231667U (en) Device for switching talkback through public network gateway

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20170913

Address after: The middle high tech Zone Yizhou road in Chengdu city of Sichuan province 610000 No. 722 Building 5 13 floor No. 1305

Applicant after: CHENGDU HUIYAN TECHNOLOGY CO., LTD.

Address before: 518000 Guangdong city of Shenzhen province Qianhai Shenzhen Hong Kong cooperation zone before Bay Road No. 1 building 201 room A (located in Shenzhen Qianhai business secretary Co. Ltd.)

Applicant before: SHENZHEN JIUDING ANHUA SCIENCE & TECHNOLOGY CO., LTD.

TA01 Transfer of patent application right
RJ01 Rejection of invention patent application after publication

Application publication date: 20160224

RJ01 Rejection of invention patent application after publication