CN105960811B - Subscriber terminal equipment and its guarded communication method - Google Patents
Subscriber terminal equipment and its guarded communication method Download PDFInfo
- Publication number
- CN105960811B CN105960811B CN201580006388.9A CN201580006388A CN105960811B CN 105960811 B CN105960811 B CN 105960811B CN 201580006388 A CN201580006388 A CN 201580006388A CN 105960811 B CN105960811 B CN 105960811B
- Authority
- CN
- China
- Prior art keywords
- voice
- bit stream
- encryption
- stream
- terminal equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000004891 communication Methods 0.000 title claims abstract description 123
- 238000000034 method Methods 0.000 title claims abstract description 77
- 230000005540 biological transmission Effects 0.000 claims abstract description 124
- 238000012546 transfer Methods 0.000 claims description 75
- 230000004044 response Effects 0.000 claims description 15
- 238000000605 extraction Methods 0.000 claims description 3
- 230000006870 function Effects 0.000 description 19
- 230000008569 process Effects 0.000 description 18
- 230000008859 change Effects 0.000 description 7
- 238000012545 processing Methods 0.000 description 7
- 239000000284 extract Substances 0.000 description 6
- 238000010586 diagram Methods 0.000 description 5
- 230000033001 locomotion Effects 0.000 description 5
- 238000006243 chemical reaction Methods 0.000 description 4
- 230000000694 effects Effects 0.000 description 3
- 230000001360 synchronised effect Effects 0.000 description 3
- 238000013478 data encryption standard Methods 0.000 description 2
- 230000005611 electricity Effects 0.000 description 2
- 238000003780 insertion Methods 0.000 description 2
- 230000037431 insertion Effects 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 239000003550 marker Substances 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 241000208340 Araliaceae Species 0.000 description 1
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 1
- 235000003140 Panax quinquefolius Nutrition 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 210000004556 brain Anatomy 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000003111 delayed effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 235000008434 ginseng Nutrition 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000013139 quantization Methods 0.000 description 1
- 230000002787 reinforcement Effects 0.000 description 1
- 230000003252 repetitive effect Effects 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/22—Arrangements for preventing the taking of data from a data transmission channel without authorisation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
Provide subscriber terminal equipment and its guarded communication method.Guarded communication method includes: the voice bit stream that encryption includes voice data corresponding with the user speech for conversing under the safe mode between subscriber terminal equipment and another subscriber terminal equipment;The voice bit stream of encryption is inserted into video transmission stream;And other user terminals equipment is sent by the video transmission stream for inserting the voice bit stream of encryption.
Description
Technical field
It is related to subscriber terminal equipment and its guarded communication method in terms of exemplary embodiment, and more specifically,
It is related to executing the subscriber terminal equipment of the guarded communication for voice data by using video transmission stream and its is protected
The communication means of shield.
Background technique
Being widely used for smart phone causes wideband code division multiple access (WCDMA) 3G and long term evolution (LTE) 4G mobile communication
User increase suddenly.Using these communications, user often pays close attention to safety and privacy.Especially since such as communication prison
It listens the social concern of (for example, eavesdropping) or monitoring and causes more and more concerns, and user is for the demand of secure communication
It is consequently increased.Therefore, there is very big growth in market relevant to guarded communication in terms of public sector and private sector.
According to the relevant technologies, when executing the guarded communication for being used for voice data, by using being mounted on modulatedemodulate
The speech coder (vocoder) in device or the agreement end by forming transmission grouping is adjusted to encrypt voice data.
If the speech coder by using modem encrypts voice data, modem can be with
Speech coder including supporting the guarded communication for voice data.However, if modem does not include supporting
The speech coder of guarded communication for voice data, then speech coder must be updated in modem.
It in this case, may if modem supply company does not provide the exploitation environment for updating modem
Guarded communication environment can not be provided.
In addition, if the protocol terminal for forming transmission grouping encrypts voice data, and system is changed (example
Such as, it is changed between 3G and 4G if network operator is changed or communicates), the system being changed is difficult to be added
Close grouping.Accordingly, it is difficult to maintain guarded communication.
Summary of the invention
Technical solution
Other disadvantages that exemplary embodiment solves at least the above problems and/or disadvantage and is not described above.In addition,
Do not require exemplary embodiment to overcome disadvantages mentioned above, and exemplary embodiment can not overcome the problems, such as it is any of above.
It provides in terms of one or more exemplary embodiments and is passed for the voice bit stream of encryption to be inserted into video
It is defeated to flow and send the voice bit stream of video transmission stream and encryption to execute the subscriber terminal equipment of guarded communication, and its
Guarded communication method.
One side accoding to exemplary embodiment provides a kind of side that guarded communication is executed by subscriber terminal equipment
Method, which comprises encryption includes and for the safe mode between subscriber terminal equipment and another subscriber terminal equipment
First voice bit stream of the corresponding voice data of user speech of lower call;First voice bit stream of encryption is inserted into
First video transmission stream;And other users are sent by the first video transmission stream for inserting the first voice bit stream of encryption
Terminal device.
Encrypting the first voice bit stream may include: coding voice data corresponding with user speech to generate the first language
Sound bit stream;Encrypt at least part data of the first voice bit stream;And the encryption information for being used to encrypt is inserted into the
One voice bit stream.
First voice bit stream may include: header area, including instruction voice data is included in the first voice bit stream
In information;And payload area, including voice data encoded.
Encryption at least part data may include encrypting the payload area of the first voice bit stream.
First voice bit stream can also include auxiliary region;And encryption information can be inserted into the first voice bit stream
At least one of header area, payload area and auxiliary region.
Encryption information may include encryption key, the first voice bit stream encryption section position and encryption algorithm type
At least one of.
Method can also include: to generate the voice transfer stream including silence data;And by voice transfer stream generated
It is sent to other user terminals equipment.
Method can also include: the voice transfer stream for the encryption information that generation includes for encryption;And it will be generated
Voice transfer stream is sent to other user terminals equipment.
Method can also include: the second language that encryption is inserted in response to receiving when executing converse in the secure mode
Second video transmission stream of sound bit stream handles the second transmission of video received by using safe mode speech coder
Stream.
Handling the second video transmission stream received may include: to extract encryption from the second video transmission stream received
Second voice bit stream;The encryption for decrypting the second voice bit stream encrypted is obtained from the second voice bit stream of extraction
Information;The second voice bit stream encrypted is decrypted based on the encryption information of acquisition;And the second voice decrypted
Bit stream is to export voice data.
Method can also include: the call in response to executing in the secure mode, close the camera mould of subscriber terminal equipment
Block and video calling output unit, and the language of the second video transmission stream received is exported using normal talking output unit
Sound data.
It, can be by using the communication modem for being different from subscriber terminal equipment for the call under safe mode
Application processor handles voice data, and the communication modem of the subscriber terminal equipment is used to handle in normal mode
The voice data conversed under formula.
One side according to another exemplary embodiment, provides subscriber terminal equipment, comprising: security module is configured
To encrypt the user's language for including and being used to converse under safe mode between subscriber terminal equipment and another subscriber terminal equipment
First voice bit stream of the corresponding voice data of sound, and the first voice bit stream of encryption is inserted into the first video and is passed
Defeated stream;And communication module, the first video transmission stream for being configured as to insert the first voice bit stream of encryption are sent to
Other user terminals equipment.
Security module may include: encoder, be configured as coding voice data corresponding with user speech to generate
First voice bit stream;Encryption equipment is configured as at least part data of the first voice bit stream of encryption;And encryption information
Inserter is configured as the encryption information for being used to encrypt being inserted into the first voice bit stream.
First voice bit stream may include: header area, including instruction voice data is included in the first voice bit stream
In information;And payload area, including voice data encoded
Encryption equipment can be configured as the payload area of the first voice bit stream of encryption.
First voice bit stream can also include auxiliary region;And encryption information inserter can be configured as and believe encryption
Breath is inserted at least one of header area, payload area and auxiliary region of the first voice bit stream.
Encryption information may include encryption key, the first voice bit stream encryption section position and encryption algorithm type
At least one of.
Security module can also include silence data generator, which is configurable to generate including silence
The voice transfer stream of data;And communication module can be configured as and send other users' ends for voice transfer stream generated
End equipment.
It will include that the voice transfer stream of encryption information for being used to encrypt is sent to other use that communication module, which can be configured as,
Family terminal device.
In response to receiving the second of the second voice bit stream for inserting encryption when executing converse in the secure mode
Video transmission stream, security module, which can be configured as, handles the second video received by using safe mode speech coder
Transport stream.
Subscriber terminal equipment can also include: output module, and wherein security module can also include: extractor, be configured
For the second voice bit stream for extracting encryption from the second video transmission stream received;Encryption information getter is configured as obtaining
The encryption information of the second voice bit stream encrypted must be used to decrypt;And decryption unit, it is configured as adding based on acquisition
Confidential information decrypts the second voice bit stream encrypted, wherein output module can be configured as second decrypted
Voice bit stream is to export voice data.
Subscriber terminal equipment can also include: camera model, be configured to respond to the video calling being carrying out and catch
Obtain the image of user, wherein output module includes video calling output unit and normal talking output unit, and is wherein responded
In the call just executed in the secure mode, subscriber terminal equipment closes camera model and video calling output unit, and leads to
It crosses using normal talking output unit and exports the voice data of the second video transmission stream received.
One side according to another exemplary embodiment provides the side for executing the guarded communication of subscriber terminal equipment
Method, this method comprises: receiving the first voice bit stream of encryption from external user terminal device by the first voice transfer stream;Really
Fixed the first voice bit stream for whether being possible to identify the encryption received from external user terminal device;In response to according to
It determines the first voice bit stream that can recognize encryption, the second voice bit stream of encryption is being sent by the second voice transfer stream
It converses under first safe mode with external user terminal device;And in response to not can recognize encryption according to the determination
First voice bit stream, by video transmission stream send encryption the second voice bit stream the second safe mode under with outside
Subscriber terminal equipment is conversed.
Carrying out call in the second safe mode may include: the first language in response to not can recognize encryption according to the determination
Sound bit stream exports the user interface (UI) for conversing under the second safe mode;And it is defeated in response to passing through
UI inputting user command out, converses under the second safe mode with external user terminal device.
It may include opening speech capturing function and closing video capturing function that call is carried out under the second safe mode.
It may include: encryption the second voice corresponding with the user speech of input that call is carried out under the second safe mode
Bit stream;Video port is changed into the port for being used to export the second voice bit stream of encryption;By the second voice ratio of encryption
Special stream is inserted into video transmission stream;And external user terminal device is sent by video transmission stream.
It can also include: to be inserted at least one of space division group and encryption information that call is carried out under the second safe mode
To third voice transfer stream;And external user terminal device is sent by third voice transfer stream.
The transmission of video transmission stream can reach the preset time relative to third voice transfer flow delay.
Insertion may include that will indicate the encrypted information of the second voice bit stream as encryption information to be inserted into.
Insertion may include in the position of the encrypted area by encryption key, the second voice bit stream and the type of Encryption Algorithm
At least one be inserted into as encryption information.
One side according to another exemplary embodiment provides a kind of subscriber terminal equipment, comprising: communication module, quilt
It is configured to receive the first voice bit stream of encryption from external user terminal device by the first voice transfer stream;And control mould
Block is configured to determine whether to be possible to the first voice bit stream of identification encryption, in response to can recognize according to the determination
First voice bit stream of encryption, in the first safe mould of the second voice bit stream for sending encryption by the second voice transfer stream
It converses under formula with external user terminal device, and in response to the first voice that not can recognize encryption according to the determination
Bit stream, by video transmission stream send encryption the second voice bit stream the second safe mode under with external user terminal
Equipment is conversed.
Subscriber terminal equipment can also include mode setting module, wherein control module can be configured as control model
Setup module, in response to the first voice bit stream that not can recognize encryption according to the determination, output is in the second safety
The UI to converse under mode, and in response to passing through output UI inputting user command, under the second safe mode
It converses with external user terminal device.
In response to conversing under the second safe mode, control module can be configured as open speech capturing function and
Close video capturing function.
Subscriber terminal equipment can also include: security module, be configured to respond under the second safe mode and outside
Terminal device is conversed, and encrypts the second voice bit stream corresponding with the user speech of input, will be used to export encryption
Video port is changed into the port of second voice bit stream, and the second voice bit stream of encryption is inserted into transmission of video
Stream, wherein communication module, which can be configured as, sends external user terminal device for video transmission stream.
Security module, which can be configured as, will be inserted at least one of space division group and encryption information third voice biography
Defeated stream;And communication module can be configured as and send external user terminal device for third voice transfer stream.
Communication module can be configured as the transmission of transmission of video relative to third voice transfer flow delay up to preset
Time.
Security module, which can be configured as, will indicate the encrypted information of the second voice bit stream as encryption information to insert
Enter.
Security module can be configured as position and the Encryption Algorithm of the encrypted area by encryption key, the second voice bit stream
At least one of type be inserted into as encryption information.
One side according to another exemplary embodiment provides the side that guarded communication is executed by subscriber terminal equipment
Method, this method comprises: receiving the transmission of video of the voice bit stream including encryption when executing voice communication in the secure mode
Stream;With in response to receiving video transmission stream, the video transmission stream received is handled to export voice data.
Method can also include that the voice transfer for being different from video transmission stream is received when executing call in the secure mode
Stream.
Voice transfer stream may include at least one of silence data and encryption information.
Voice transfer stream may include the encrypted information of instruction voice bit stream as encryption information.
Voice transfer stream may include encryption key, voice bit stream encrypted area position and encryption algorithm type in
At least one is as encryption information.
Handling the video transmission stream that receives may include that the video transmission stream that will be received is input to and is used for speech processes
Speech coder, rather than be used to handle the video processing of the subscriber terminal equipment of video transmission stream for video calling
Device.
Handling the second video transmission stream received may include: the voice that encryption is extracted from the video transmission stream received
Bit stream;Obtain the encryption information for decrypting the second voice bit stream encrypted;It is decrypted based on the encryption information of acquisition
The voice bit stream encrypted;And the voice bit stream decrypted, to export voice data.
Acquisition may include obtaining encryption information from the voice bit stream of extraction.
Acquisition may include obtaining encryption information from the voice transfer stream for being different from video transmission stream.
Method can also include, when executing voice communication in the secure mode, closing the camera mould of subscriber terminal equipment
Block and video calling output unit, and the voice number of the video transmission stream received using the output of normal talking output unit
According to.
Method can also include: when executing call in the normal mode, to receive the language of the voice bit stream including unencryption
Sound transport stream.
When method can also be included in execution call under another safe mode, receiving includes the voice bit stream encrypted
Voice transfer stream.
One side according to another exemplary embodiment, providing a kind of record thereon and having can be run by computer to be used for
Execute the non-transitory computer readable recording medium of the program of any of above method.
Technical effect
According to various exemplary embodiments as described above, can be included in subscriber terminal equipment not changing or updating
Communication modem in the case where send and receive the voice data of encryption.
Detailed description of the invention
Certain exemplary embodiments are described by referring to accompanying drawing, above-mentioned and/or other aspects will be apparent from, in attached drawing
In:
Fig. 1 is the figure for showing guarded communication method accoding to exemplary embodiment;
Fig. 2 is the block diagram for showing the structure of subscriber terminal equipment accoding to exemplary embodiment;
Fig. 3 is the block diagram for showing the structure of security module of Fig. 2 accoding to exemplary embodiment;
Fig. 4 is the figure for showing voice bit stream accoding to exemplary embodiment;
Fig. 5 is the block diagram for showing the structure of stream generator of Fig. 3 accoding to exemplary embodiment;
Fig. 6 A to Fig. 6 C is the figure for showing the output module of Fig. 2 accoding to exemplary embodiment;
Fig. 7 is the stream for showing the guarded communication method of the subscriber terminal equipment of sender accoding to exemplary embodiment
Cheng Tu;
Fig. 8 is the flow chart for showing the method for encryption voice bit stream accoding to exemplary embodiment;
Fig. 9 is the stream for showing the guarded communication method of the subscriber terminal equipment of recipient accoding to exemplary embodiment
Cheng Tu;
Figure 10 is the sequence chart for showing guarded communication method accoding to exemplary embodiment;
Figure 11 is the process for showing the guarded communication method of subscriber terminal equipment according to another exemplary embodiment
Figure;
Figure 12 is the side that guarded communication is executed under the second safe mode shown according to another exemplary embodiment
The flow chart of method;
Figure 13 is that the setting that is used for shown accoding to exemplary embodiment executes guarded communication under the second safe mode
User interface (UI) figure;
Figure 14 A and Figure 14 B, Figure 15 A and Figure 15 B and Figure 16 A and Figure 16 B are the transmissions shown accoding to exemplary embodiment
The figure of the method for voice transfer stream and video transmission stream;
Figure 17 A and Figure 17 B be show accoding to exemplary embodiment be inserted into normal talking voice transfer stream and
The data of video transmission stream and be inserted into when executing shielded call under the second safe mode voice transfer stream and
The figure of the data of video transmission stream;And
Figure 18 A and Figure 18 B be show according to another exemplary embodiment be inserted into voice transfer stream and transmission of video
The figure of data in stream.
Specific embodiment
Exemplary embodiment is described in detail with reference to the attached drawings.
In the following description, even if in different drawings, the reference marker of identical figure is used for identical element.It retouches
Defined in stating, the item of such as detailed construction and element is provided for facilitating comprehensive understanding exemplary embodiment.Therefore,
It will be apparent that exemplary embodiment can be implemented in the case where the item being specifically defined without these.In addition, without detailed
It is thin to describe well known function or structure, because they can obscure exemplary embodiment with unnecessary details.
Although various elements can be described with term first, second used herein etc., these elements should not be by
The limitation of these terms.These terms are only used to distinguish an element with another element.
Terms used herein are not intended to limit exemplary implementation just for the sake of description certain exemplary embodiments
Example.As used herein, singular "one", " one " and "the" be also intended to include plural form, unless context is clearly
It refers else.It will also be understood that showing to exist described when using term " includes " and/or "comprising" in the present specification
Feature, entirety, step, operation, element and/or component, but do not preclude the presence or addition of one or more of the other feature, entirety,
Step, operation, element, component and/or their combination.When the statement of such as " at least one " appear in element list it
When afterwards, the entire list of its modified elements, rather than modify the discrete component of the list.
In the exemplary embodiment, " module " or " unit " can execute at least one functions or operations, and can be by
It is embodied as the combination of hardware or software or hardware and software.In addition, unless " module " or " unit " can be typically embodied as
For specific hardware, otherwise multiple " modules " or multiple " units " at least one module can be integrated into be embodied as to
A few processor.
Accoding to exemplary embodiment, subscriber terminal equipment can be referred to as mobile or fixed subscriber terminal equipment, such as
User equipment (UE), movement station (MS), advanced mobile station (AMS), equipment etc..
Hereinafter, exemplary embodiment will be described in detail with reference to the accompanying drawings.In the accompanying drawings, identical reference marker indicates identical
Element.
Fig. 1 is the figure for showing the guarded communication method of guarded communication system accoding to exemplary embodiment.Ginseng
According in Fig. 1, guarded communication system includes the first subscriber terminal equipment 100-1 and second user terminal device 100-2.
When executing normal video call, the first subscriber terminal equipment 100-1 is by using being included in communication processor
Communication modem (for example, long term evolution (LTE) modem, CDMA (CDMA) modem or broadband
CDMA multiple access (WCDMA) modem) handle voice data to generate voice transfer stream, and by language generated
Sound transport stream is sent to second user terminal device 100-2.First subscriber terminal equipment 100-1 is also by using application processor
To handle video data to generate video transmission stream, and video transmission stream generated is sent to second user terminal device
100-2。
Specifically, the first subscriber terminal equipment 100-1 and second user terminal device 100-2 can be by using institute as above
The process (for example, operating process) of the video calling stated executes under guarded communication mode (hereinafter referred to as safe mode)
Voice communication.That is, can be passed by being used to generate video by application processor processes voice data under the second communication pattern
Defeated stream sends voice data and via the port for exporting video transmission stream (that is, rather than being used in video transmission stream
Export the port of voice transfer stream) voice communication is executed to export at least one of voice data.In detail, if safety
Mode is arranged on as first subscriber terminal equipment 100-1 of transmitter and as the second user terminal device of receiver
Between 100-2, then the first subscriber terminal equipment 100-1 generates and encrypts the voice bit stream including voice data, by encryption
Voice bit stream is inserted into video transmission stream, and passes through the video transmission stream that communication channel will insert the voice bit stream of encryption
It is sent to second user terminal device 100-2.In addition, the first subscriber terminal equipment 100-1 generate include silence data (for example,
Empty data) voice transfer stream, and second user terminal device 100-2 is sent for voice transfer stream by communication channel.
According to another exemplary embodiment, the first subscriber terminal equipment 100-1 can be generated including silence data, indicate safe mode
Information is (for example, encryption information or instruction voice bit stream are included in video transmission stream and/or the speech bits of instruction encryption
The encryption indicator that stream is included) and for encrypt or the encryption information of decrypted voice bit stream (for example, encryption key) in
The voice transfer stream of at least one.In addition, according to another exemplary embodiment, the transmission of video transmission stream can be passed with voice
The transmission of defeated stream is relatively delayed by.
Second user terminal device 100-2 can extract the voice bit stream of encryption from video transmission stream, and handle and add
Voice data to be supplied to the user of second user terminal device 100-2 by close voice bit stream.If the first user is whole
End equipment 100-1 executes call in the secure mode, then video transmission stream can be input to by second user terminal device 100-2
For the structure (for example, speech coder) of speech processes, rather than the structure for video processing is to handle video transmission stream.
Second user terminal device 100-2 can also bypass the voice transfer that (for example, abandon, ignore or ignore) includes silence data
Stream.
In the secure mode, another programmable processor (for example, application processor, digital signal processor etc.), and
It is not the communication processor of communication modem or communication modem, decoding can be executed to realize that safe voice is logical
Letter.
Accoding to exemplary embodiment, when executing call in the secure mode, voice bit stream is inserted into transmission of video
Stream.Therefore, the voice data of encryption can be sent and received in the case where not changing or updating communication modem, and
It can prevent from losing due to the encryption information caused by the code conversion in various communication environments.Furthermore it is possible to not updating
In the case where communication system, the guarded communication for being used for voice data is provided between subscriber terminal equipment.
The end of user accoding to exemplary embodiment is described more fully now with reference to Fig. 2 to Fig. 5 and Fig. 6 A to Fig. 6 C
End equipment 100.Referring to Fig. 2, subscriber terminal equipment 100 includes security module 110, communication module 120, camera model 130, mode
Setup module 140, output module 150 and control module 160.
Fig. 2 shows the subscriber terminal equipment 100 with various functions (that is, operation), such as video call functions, safety
Communication function etc., as various types of elements in figure are illustratively implemented.It is understood that according to it is one or more its
Its exemplary embodiment, some elements in Fig. 2 can be omitted or change, or can also add other types of element.
In the secure mode, security module 110 can encrypt the number of composition voice bit stream corresponding with user speech
According at least part, and voice bit stream will be inserted into related information is encrypted, to generate the voice bit stream of encryption.
The voice bit stream of encryption can also be inserted into video transmission stream by security module 110, and will be inserted by communication module 120
The voice bit stream for entering the encryption into video transmission stream is sent to external user terminal device or server.In detail, safety
Module 110 can encrypt the voice number at least one of the payload area for being included in voice bit stream and header area
According to, and encryption information is inserted into auxiliary region.Here, encryption information can be inserted into auxiliary region by security module 110, but
It is it should be understood that one or more of the other exemplary embodiment is not limited to this.That is, in various exemplary embodiments, safety
Encryption information can be inserted at least one of payload area, header area and auxiliary region by module 110.Encryption information can be with
Including at least one of encryption key, the position of encrypted area and encryption algorithm type.Encryption key can be key data, close
The index of key data or the pointer value of key data.If encryption key is divided and is inserted into bit stream, divide
Information can be included.
In the secure mode, silence data can be generated in security module 110, and by using silence data generated
To generate voice transport stream.Voice transfer stream generated can be supplied to communication module 120 by security module 110.
If by the received video transmission stream of communication module 120 including the voice bit stream of encryption, security module 110
The voice bit stream of encryption can be extracted from video transmission stream, and obtains encryption information from the voice bit stream of encryption to decode
Or the voice bit stream of decryption encryption.Here, video transmission stream can be inserted into the peace for being used for speech processes by security module 110
Syntype speech coder, rather than handled for video to handle the structure of video transmission stream.
In the normal mode, security module 110 can be in the case where not encrypting input signal by using input voice
Voice bit stream generated is supplied to communication module 120 to generate voice bit stream by data.If passing through communication mould
The grouping that block 120 receives does not include the voice bit stream of encryption, then security module 110 can not decoded or decrypted bitstream
In the case where from bit stream decoding original signal.
Security module 110 can generate voice bit stream by using encoding and decoding algorithm, and the encoding and decoding algorithm is pacified
In subscriber terminal equipment 100, it is stored in and can be downloaded from the hardware that subscriber terminal equipment 100 removes or from network.
Security module 110 can be by using being mounted in subscriber terminal equipment 100, be stored in and can remove from subscriber terminal equipment 100
Hardware in or execute encryption or decoding from the Encryption Algorithm that network is downloaded.Here, Encryption Algorithm may include by making
With the substitution or various operations of the data of encryption key.
Communication module 120 may include at least one antenna or communication terminal, by using what is provided from security module 110
Video transmission stream or voice transfer stream generate grouping corresponding with preset communication protocol, and by wired or wireless
Communication channel is grouped to send.Communication module 120 can be passed from the packet parsing video received by wired or wireless communication
Defeated stream or voice transfer stream, and video transmission stream and voice transfer stream are supplied to security module 110.
Here, communication channel can be 2G network, 3G network, 4G network, super 4G (B4G) network, 5G network, Wi-Fi net
Network, Internet Protocol (IP) network, direct communication network, other next generation networks or heterogeneous network between terminal device etc..
Communication channel can be referred to as speech network, data network, circuit-switched network, packet switching network or IP multimedia subsystem
System (IMS) network.
When executing video calling, camera model 130 is turned on to capture the image of user.However, if by using
The process (for example, operating process) of video calling executes voice communication in the secure mode, then is supplied to the electricity of camera model 130
Power is disconnected, to not allow the image of the capture user of camera model 130.
Operation mode relevant to guarded communication can be set in mode setting module 140.Mode setting module 140 can
To include at least one button, user interface (UI), graphic user interface (GUI) or terminal device are mounted or are included in
In.Operation mode may include at least one of safe mode setting, encryption intensity and guarded communication object, but can
To understand, one or more of the other exemplary embodiment is not limited to this.However, if you do not need to related to guarded communication
User input, then mode setting module 140 can be not included in subscriber terminal equipment 100.
Output module 150 exports user speech.Here, as shown in Figure 6A, output module 150 may include that normal talking is defeated
Unit 151 (for example, normal talking follower) and video calling output unit 153 (for example, video calling follower) out.This
In, if subscriber terminal equipment 100 is smart phone, normal talking output unit 151 can be to be mounted as shown in Figure 6B
Or provide on the loudspeaker of the front surface of smart phone, so as on executing the ear for being placed to user when telephone relation simultaneously
And output voice data.Video calling output unit 153 can be as shown in Figure 6 C be mounted or provided smart phone after
The loudspeaker on surface, to export voice data when executing video calling.Here, video calling output unit 153 is mounted
Or it is only exemplary embodiment that the rear surface of smart phone, which is arranged in, and it is to be understood that one or more of the other exemplary
Embodiment is not limited to this.For example, video calling output unit 153 can be mounted or be placed on any corner of smart phone
Or marginal zone.
If executing normal video call, output module 150 can export language by video calling output unit 153
Sound data.However, output module 150 passes through if executing call in the secure mode by using the process of video calling
Normal talking output unit 151 exports voice data.In this case, it is defeated can to disconnect video calling for output module 150
The electric power of unit 153 out.
Control module 160 (for example, controller) can control the integrated operation of subscriber terminal equipment 100.Control module 160
The element of subscriber terminal equipment 100 be can control to operate under mode set by the user, or can control user terminal
The element of equipment 100 is operated in a manner of preset.
Control module 160 can be determined by the subscriber terminal equipment of receiver communication in the secure mode whether be can
Can.In detail, control module 160 can obtain the information of the subscriber terminal equipment of receiver in communications connection procedure, with
Determine that communication in the secure mode whether may by the subscriber terminal equipment of receiver.
Safe mode can carry out quilt by asking whether setting safe mode from user before or after receiver is conversed
Setting.Accoding to exemplary embodiment, the setting of safe mode may include that guarded communication starts and/or the end time sets
It sets.The beginning of guarded communication or end time can be equal to call beginning or end time, or can execute call
When be set.The safe mode being mainly arranged can be automatically dismissed or reset according to Network status.
Encryption intensity can be changeably arranged according to the group of receiver or receiver or according to Network status, and
It may include single encryption mode, double-encryption mode and triple encryption modes.If terminal device includes multiple Encryption Algorithm
Or multiple key generation methods, then encryption intensity can be changeably arranged according to Encryption Algorithm or key generation method.Encryption
The length of key can be adjusted so that encryption intensity is changeably arranged.
Guarded communication object can request user and checked according to receiver safe mode setting or safe mould
Formula can be automatically set in addition specified receiver group.Alternatively, safe mode can be set automatically and be used for
The receiver of guarded communication has been executed, or the setting that user checks safe mode can be re-requested.Here, it encrypts
Intensity can be relative to each other with guarded communication object or link each other.For example, corresponding with higher encryption intensity add
Key can be assigned to specific receiver or receiver group.
Accoding to exemplary embodiment, the movement of user, gesture or voice can be identified, safe mode is arranged.User
The example of movement may include specific activity on terminal device, the multi-hit input, terminal device on such as terminal device
Friction (rubbing) on privileged site etc..The example of the gesture of user may include being performed when holding terminal device
Specific movement of user etc..According to another exemplary embodiment, the life of the instruction content including user related with safe mode
Object information can be identified, safe mode is arranged.For example, biological information can by Brain Computer Interface (BCI) or
Brain-machine interface (BMI) is identified.The content of safe mode and identification activity can be mapped to each other and be previously stored
In terminal device.
Fig. 3 is the block diagram for showing the structure of security module 110 accoding to exemplary embodiment.Referring to Fig. 3, security module
110 include encoder 111, encryption equipment 112, encryption information inserter 113, stream generator 114, voice bit stream extractor 115,
Encryption information extractor 116 decodes unit 117 (for example, decipher) and decoder 118.
Encoder 111 carrys out the voice data of coding input by using preset algorithm, to generate voice bit stream.This
In, encoding and decoding algorithm may include various types of encoding and decoding algorithms, such as by standardizing (ISO)/International Electrotechnical Commission
Standard encoding and decoding algorithm that international organization (IEC) is proposed (for example, Motion Picture Experts Group (MPEG) audio etc., such as
G.722 equal G series standard encoding and decoding algorithm, independent or proprietary encoding and decoding algorithm etc..Voice bit stream may include being used for
The parameter of coding and coded data, and their long form can change according to encoding and decoding algorithm.
As shown in figure 4, voice bit stream may include header area 410, payload area 420 and auxiliary region 430.Here,
The specific position of header area 410 and payload area 420 can be assigned to corresponding to the area of auxiliary region 430.Header area 410 can
With include relevant to payload area 420 information (for example, the data that are included in payload area 420 of instruction whether be
The information of voice data, the information for indicating encoding and decoding algorithm types etc.).Payload area 420 may include arranging to compile wherein
The voice data of code and the field for the parameter being decoded for the voice data to coding, and auxiliary region 430 may include
The field retained is used for future.The auxiliary region for being arranged in header area 410 or the specific position in payload area 420 can be with
Including the field for future using reservation.The arrangement of each of header area 410, payload area 420 and auxiliary region 430 is suitable
Sequence can be restricted or can be not limited.In addition, multiple header areas, multiple payload areas and multiple auxiliary regions can be with
Included and other areas be introduced into voice bit stream or the structure of voice bit stream can be according to latest edition
Encoding and decoding algorithm and be changed.
Encryption equipment 112 encrypts at least part data for the voice bit stream for being generated or being encrypted by encoder 111.
It can be encrypted including at least part data in the header area of voice bit stream 410 or payload area 420, or first
At least part data in mark area and Payload area can be encrypted together.According to another exemplary embodiment, it is included in auxiliary
At least part data helped in area can be encrypted.
Encryption equipment 112 can also generate or provide the encryption key for encryption.Here, encryption key may include basis
Key and reinforcement key.Foundation key can be symmetric key, unsymmetrical key or hybrid cryptographic key, and reinforces key and can be
To the key of foundation key encryption, to the key of the area's re-encrypted encrypted by foundation key, or enable in specific receiver
Subscriber terminal equipment in decode or decryption key.
Encryption Algorithm based on key can be used to encrypt.The example of Encryption Algorithm may include using symmetric key or
The algorithm of private cipher key is mixed using unsymmetrical key or the algorithm of public keys and is used symmetric key and unsymmetrical key
Algorithm and quantum cryptography algorithm, it should be appreciated that one or more of the other exemplary embodiment is not limited to this.It uses
Stream encryption key, such as Rivest Cipher 4 (RC4) or block can be used in the algorithm of symmetric key or unsymmetrical key
Encryption key, such as Rivest Cipher 5 (RC5), international data encryption algorithm (IDEA), data encryption standards (DES) are high
Grade encryption standard (AES), ARIA, SEED, triple des (3DES) etc., it should be appreciated that, one or more of the other exemplary reality
Example is applied to be not limited to this.Rivest, Shamir, Adleman can be used using the algorithm of unsymmetrical key or public keys
(RSA) public keys, it will be appreciated that one or more of the other exemplary embodiment is not limited to this.
Encryption information relevant to the encryption executed by encryption equipment 112 is inserted into voice ratio by encryption information inserter 113
Spy's stream, to generate the voice bit stream of encryption.The voice bit stream of the encryption generated by encryption information inserter 113 can be mentioned
Supply stream generator 114.Encryption information can be included in the auxiliary region of bit stream.According to another exemplary embodiment, add
Confidential information can be included in another area of bit stream, for example, influencing lesser area to the quality for restoring signal.Encryption information
It may include encryption key.If encryption key is divided and is inserted into bit stream, the division information of encryption key can
In being further included.Encryption information can also include the encryption indicator whether indication bit stream is encrypted.Encryption indicator
Certain synchronization bit can be used.Encryption indicator can be inserted into the starting position in encrypted area.Encryption information can be with
Location information including encrypted area.Location information may include starting position and the end position of encrypted area.In addition, certain synchronization
Bit can be inserted into starting position and the end position of code area.If transmitters and receivers terminal device passes through safety
The setting of mode and recognize encryption in advance and start, then can not need or do not include additional encryption indicator.If transmitter
The frame of preset quantity is recognized in advance after detecting encryption indicator with receiver terminal equipment by selective encryption or is preset
Area be encrypted, then can not need or do not include additional location information.Encryption information can be included in bit stream
Qu Zhong for example, can be included in auxiliary region, or can be distributed and be inserted into multiple areas.
When executing communication in the secure mode, stream generator 114 generates voice transfer stream and video transmission stream.Especially
It is that the voice bit stream of encryption can be inserted into video transmission stream by stream generator 114.In further detail now with reference to Fig. 5
Description stream generator 114.As shown in figure 5, stream generator 114 may include silence data generator 114-1, the life of voice transfer stream
Grow up to be a useful person 114-2, video transmission stream generator 114-3 and voice bit stream inserter 114-4.Silence data generator 114-1 is raw
At the silence data in voice transfer stream to be inserted into.Voice transfer stream generator 114-2 can be by using by silent number
Voice transfer stream is supplied to communication module to generate voice transport stream by the silence data generated according to generator 114-1
120.Video transmission stream can be generated in video transmission stream generator 114-3, and voice bit stream inserter 114-4 can will add
Close voice bit stream is inserted into video transmission stream, and the voice bit stream for being inserted into encryption is provided to communication module 120
Video transmission stream.Voice bit stream inserter 114-4 can be added and be sent the voice bit stream that instruction encrypts and be included in
Index information in video transmission stream.
Here, stream generator 114 can send voice transfer stream and video transmission stream to communication module 120, but should
Understand, this is exemplary embodiment.Stream generator 114 can be multiplexed (MUX) voice transfer stream and video transmission stream, with to logical
Believe that module 120 sends integrated stream.
Referring again to Fig. 3, voice bit stream extractor 115 can be mentioned from the video transmission stream provided by communication module 120
Take the voice bit stream of encryption.Here, voice bit stream extractor 115 by using index information or can be included in header area
Information in 410 extracts the voice bit stream of encryption.
Encryption information extractor 116 is extracted from the voice bit stream for the encryption extracted by voice bit stream extractor 115
Encryption information.
It decodes unit 117 and encryption is decoded or decrypted by using the encryption information extracted by encryption information extractor 116
Voice bit stream.Here, decoding unit 117 can be executed brokenly by using including the encryption key in encryption information
It translates.Decoding unit 117 can operate according to Encryption Algorithm identical with the Encryption Algorithm used in encryption equipment 112.
Decoder 118 can decode the bit stream decoded by decoding unit 117.Decoder 118 can according to by encoding
Encoding and decoding algorithm used in device 111 identical encoding and decoding algorithm operates.
The voice data of encryption can be sent and received by using security module 110 as described above, without changing
Or updating includes the communication modem in subscriber terminal equipment.Furthermore, it is possible to prevent due in various communication environments
Code conversion caused by encryption information lose.
In the above exemplary embodiments, voice bit stream is encrypted after being encoded, but this is only exemplary reality
Example is applied, and it is to be understood that one or more of the other exemplary embodiment is not limited to this.According to another exemplary embodiment,
Voice bit stream can be encrypted in the operation of preset coded treatment.For example, coding can be operated or be measured with Linear Estimation
Change operation to execute.Here, encryption information can be inserted into the auxiliary region 430 of voice bit stream, header area reserved field,
Or not used field.
In addition, in the above exemplary embodiments, voice bit stream is decoded after being decrypted, but this is only example
Property embodiment, and it is to be understood that one or more of the other exemplary embodiment is not limited to this.Implemented according to another exemplary
Example, the decoding and decoding of voice bit stream may be performed simultaneously.For example, the decoding of voice bit stream can be decoded with Linear Estimation
The quantization operation of operation or decoding process executes.
In addition, in the above exemplary embodiments, encryption information can be inserted into voice bit stream and then be sent, but
It is this is only exemplary embodiment, and it is to be understood that one or more of the other exemplary embodiment is not limited to this.According to another
One exemplary embodiment, encryption information can be sent via additional grouping or other transport streams.
Now with reference to Fig. 7 to Figure 13 description according to the guarded communication method of various exemplary embodiments.
Fig. 7 is the stream for showing the guarded communication method of the subscriber terminal equipment of transmitter accoding to exemplary embodiment
Cheng Tu.
In operation S710, subscriber terminal equipment 100 determines whether call is possible in the secure mode.Here, user
Terminal device 100 can be logical to determine by using the information of another subscriber terminal equipment (that is, receiver user terminal device)
Whether words are possible in the secure mode, which is received during being communicatively connected to other user terminals equipment.
If determining that call can not or will not execute in the secure mode in operation S710, in operation S760
In, subscriber terminal equipment 100 executes under normal mode (that is, not to speech bits stream encryption) with other user terminals equipment logical
Words.If determining that call may or will execute in the secure mode in operation S710, in operation S720, user terminal
Equipment 100 receives by using microphone or captures the voice of user.
In operation S730, subscriber terminal equipment 100 is generated and is encrypted including voice data corresponding with user speech
Voice bit stream.Now with reference to the method for the encryption voice bit stream of Fig. 8 description accoding to exemplary embodiment.
In operation S810,100 coded voice data of subscriber terminal equipment is to generate voice bit stream.Here, user is whole
End equipment 100 can carry out coded voice data by using preset algorithm to generate voice bit stream.For example, user terminal is set
Standby 100 can carry out coded voice data by using various types of encoding and decoding algorithms, and various types of encoding and decoding algorithms are such as
Standard encoding and decoding algorithm (for example, the mpeg audio etc. recommended by ISO/IEC), G series standard encoding and decoding algorithm (for example, by
ITU-T recommend G.722 etc.), independent or proprietary encoding and decoding algorithm etc..
In operation S820, subscriber terminal equipment 100 encrypts at least part voice bit stream.Here, it is included in voice
The header area of bit stream or at least part data in payload area can be encrypted, and header area and Payload area
At least part data can be encrypted together.According to another exemplary embodiment, including at least one in auxiliary region
Divided data can be encrypted.Subscriber terminal equipment 100 can also generate or provide the encryption information for encryption (for example, encryption
Key).
In operation S830, encryption information is inserted into voice bit stream by subscriber terminal equipment 100.Here, user terminal
Encryption information can be inserted at least one area of voice bit stream (for example, header area, payload area and auxiliary by equipment 100
Help a part in area).Subscriber terminal equipment 100 can encrypt voice bit stream according to the method as described in referring to Fig. 8.
Referring again to Fig. 7, in operation S740, the voice bit stream of encryption is inserted into video by subscriber terminal equipment 100
Transport stream.Here, silence data can also be inserted into voice transfer stream by subscriber terminal equipment 100.Subscriber terminal equipment 100 is also
Instruction encryption voice bit stream can be inserted into the index information in video transmission stream includes the (example in video transmission stream
Such as, in voice bit stream).
In operation S750, video transmission stream is sent to another user's end by communication channel by subscriber terminal equipment 100
End equipment.
Fig. 9 is the stream for showing the guarded communication method of the subscriber terminal equipment of receiver accoding to exemplary embodiment
Cheng Tu.
In operation S910, subscriber terminal equipment 100 determines whether call will execute in the secure mode.Here, user
Terminal device 100 can be logical to determine by using the information of another subscriber terminal equipment (that is, recipient subscriber terminal equipment)
Whether words are possible in the secure mode, which is received during being communicatively connected to other user terminals equipment.
If determining that call does not execute in the secure mode in operation S910, in operation S970, user terminal is set
Standby 100 execute call with other user terminals equipment in the normal mode (that is, not to speech bits stream encryption).If operating
Determine that call will execute in the secure mode in S910, then in operation S920, it includes encryption that subscriber terminal equipment 100, which receives,
The video transmission stream of voice bit stream.
In operation S930, subscriber terminal equipment 100 extracts the voice bit stream of encryption from video transmission stream.Here, it uses
Family terminal device 100 can be by using index information or include in video transmission stream (for example, the header area of voice bit stream
In) information extract the voice bit stream of encryption.Subscriber terminal equipment 100 can be by the encryption extracted from video transmission stream
Voice bit stream is output to the structure (for example, speech coder) for speech processes, rather than is used for the structure of video processing.
In operation S940, subscriber terminal equipment 100 is decoded or the voice bit stream of decryption encryption.Here, user terminal
Equipment 100 can carry out decrypted voice bit stream by using decoding algorithm identical with Encryption Algorithm.
In operation S950, subscriber terminal equipment 100 decodes the voice bit stream being decrypted.Here, subscriber terminal equipment
100 can carry out decoded speech bit stream by using encoding and decoding algorithm identical with the encoding and decoding algorithm for coding.
In operation S960, subscriber terminal equipment 100 exports voice data.Here, although subscriber terminal equipment 100 passes through
Using process (for example, operating process) Lai Zhihang guarded communication of video calling, but subscriber terminal equipment 100 can lead to
It crosses using normal talking output unit 151, rather than video calling output unit 153, to export voice data.
Figure 10 is the precedence diagram for showing guarded communication method accoding to exemplary embodiment.
In operation S1005, the first subscriber terminal equipment 100-1 and second user terminal device 100-2 are in safe mode
It is lower to execute communication connection.Here, the first subscriber terminal equipment 100-1 and second user terminal device 100-2 can be in communication links
Check whether call is possible in the secure mode, then correspondingly execute communication connection in the secure mode in termination process.
In operation S1010, the first subscriber terminal equipment 100-1 receives voice data.Here, voice data can be logical
Microphone input is crossed, but this is only exemplary embodiment, and it is to be understood that one or more of the other exemplary embodiment
It is not limited to this.For example, voice data can be stored in storage medium, it is then fed into.
In operation S1015, the first subscriber terminal equipment 100-1 coded voice data is to generate voice bit stream.
In operation S1020, the first subscriber terminal equipment 100-1 encrypts voice bit stream.In detail, the first user terminal
Equipment 100-1 can be encrypted including at least part data in voice bit stream generated, generate encryption information, and
Encryption information is inserted into encrypt voice bit stream.
In operation S1025, voice bit stream is inserted into video transmission stream by the first subscriber terminal equipment 100-1.
In operation S1030, video transmission stream is sent second user terminal device by the first subscriber terminal equipment 100-1
100-2。
In operation S1035, second user terminal device 100-2 extracts the voice bit stream of encryption from video transmission stream.
In operation S1040, second user terminal device 100-2 is decoded or the voice bit stream of decryption encryption.In detail,
Second user terminal device 100-2 can extract encryption information from the voice bit stream of encryption, and by using extracted
Encryption information decodes voice bit stream.
In operation S1045, second user terminal device 100-2 decoded speech bit stream is to obtain voice data.
In operation S1050, the acquired voice data of second user terminal device 100-2 output.Here, although pacifying
Process (for example, operating process) under syntype when execution call using video calling, but second user terminal device 100-2
Acquired voice data can be output to normal talking output unit 151, rather than video calling output unit 153.
According to various example embodiments as described above, the voice data of encryption can be sent and received, without changing
Or updating includes the communication modem in subscriber terminal equipment.In various communication environments, it can prevent due to code
Encryption information caused by conversion is lost, and can be mentioned between subscriber terminal equipment in the case where not more new communication system
For the guarded communication for voice data.
In the above exemplary embodiments, if including that speech coder in communication modem does not support safety
Mode, then other structures (for example, application processor etc.) can encrypt voice bit stream, and by the speech bits of encryption
Stream is inserted into video transmission stream.However, this is only an exemplary embodiment, and it is to be understood that one or more of the other
Exemplary embodiment is not limited to this.If including the speech coder support safe mode in communication modem,
The voice bit stream of encryption can be inserted into voice transfer stream, be then communicated to another subscriber terminal equipment.
The guarded communication of subscriber terminal equipment according to another exemplary embodiment is described now with reference to Figure 11
Method.
Referring to Fig.1 1, in operation S1110, the first subscriber terminal equipment 100-1 connects from second user terminal device 100-2
Receive the voice bit stream of encryption, wherein voice bit stream is encrypted by voice transfer stream.Here, voice transfer stream can wrap
Include the encrypted flag information of instruction voice bit stream.
In operation S1120, the first subscriber terminal equipment 100-1 determines whether it is likely that the speech bits of identification encryption
Stream.Here, if the flag information that instruction voice bit stream is encrypted is identified or code conversion is supported on network
Identify the voice bit stream of encryption, then the first subscriber terminal equipment 100-1 can determine the speech bits for being possible to identification encryption
Stream.
If determining the voice bit stream for being possible to identification encryption in operation S1120, in operation S1130, first
Subscriber terminal equipment 100-1 converses under the first safe mode with second user terminal device 100-2.If operating
Determination can not identify the voice bit stream of encryption in S1120, then in operation S1140, the first subscriber terminal equipment 100-1 exists
It converses under second safe mode with second user terminal device 100-2.Here, the first safe mode refers to and encrypts wherein
Voice bit stream pass through the safe mode that is sent of voice transfer stream, and the second safe mode refers in the language wherein encrypted
The safe mode that signal to noise ratio spy stream is sent by video transmission stream.
It is used under the second safe mode with second as described in the operation S1140 of Figure 11 now with reference to Figure 12 description
The method that family terminal device 100-2 converses.
If determination can not identify the language for being inserted into and receiving from second user terminal 100-2 in operation S1120
The voice bit stream of encryption in sound transport stream, then operation S1210 in, the first subscriber terminal equipment 100-1 show for
The user interface (UI) that second safe mode is conversed, and received by UI for selecting the user of the second safe mode to order
It enables.For example, the first subscriber terminal equipment 100-1, which can receive, will select for executing shielded lead under the second safe mode
The user command of the icon 1310 of the UI of letter, as shown in figure 13.Here, the first subscriber terminal equipment can be shown including indicating not
It may identify the UI of the message of the voice bit stream of encryption.
In operation S1220, the first subscriber terminal equipment 100-1 is switched to the second safe mode.Here, the second safe mould
Formula, which refers to, is inserted into video transmission stream in the voice bit stream wherein encrypted to carry out the mode of shielded call.
In operation S1230, the first subscriber terminal equipment 100-1 opens speech capturing function and closes video capture function
Energy.In other words, although the first subscriber terminal equipment 100-1 uses video transmission stream, capture video is not needed.Therefore,
First subscriber terminal equipment 100-1 can close camera model 130 to close video capturing function.
In operation S1240, the first subscriber terminal equipment 100-1 is compressed defeated by using safe mode speech coder
The user speech entered.This has been described above is described in detail referring to Fig. 3, therefore its repetitive description is omitted below.
In operation S1250, the first subscriber terminal equipment 100-1 changes the port of the voice bit stream of output encryption.In detail
Carefully, the first subscriber terminal equipment 100-1 can change the port of the voice bit stream of output encryption to view from voice port
Frequency port.
In operation S1260, the voice bit stream of encryption is inserted into transmission of video by the first subscriber terminal equipment 100-1
Stream.
In operation S1270, video transmission stream is sent second user terminal device by the first subscriber terminal equipment 100-1
100-2。
Therefore, if the voice bit stream of encryption is since the change of system is (for example, the change of network, changes from 3G to 4G
Deng) and can not be identified, then the voice bit stream encrypted is sent by video transmission stream, so as not to guard system change and after
It is continuous to execute guarded communication.
It describes to send voice transfer stream now with reference to Figure 14 A and Figure 14 B, Figure 15 A and Figure 15 B and Figure 16 A and Figure 16 B
With the method for video transmission stream.
In general, as shown in Figure 14 A, subscriber terminal equipment 100 can send five voices within the 100ms period and pass
Defeated stream s1 to s5 and three video transmission stream Bt1 to Bt3.However, accoding to exemplary embodiment, as shown in Figure 14B, user terminal
One section of preset time can be set (for example, for the buffer space of 13.33ms), to be cast relative to voice transfer in equipment 100
Late and video transmission stream is sent up to preset time.
In detail, as shown in fig. 15, if the subscriber terminal equipment of transmitter sends voice transfer stream and transmission of video
Stream, then initial buffer can be set to 100ms by the subscriber terminal equipment of receiver, with simultaneous voice transport stream and video
Transport stream.
However, accoding to exemplary embodiment, as shown in fig. 15b, if the subscriber terminal equipment of transmitter is in voice transfer
Postpone after stream and send video transmission stream up to preset time (for example, up to 13.33ms), then the subscriber terminal equipment of receiver can be with
The shorter than 46.66ms of 100ms is set by buffer space, with simultaneous voice transport stream and video transmission stream.
In other words, as described above, the subscriber terminal equipment of transmitter can postpone after voice transfer stream and send view
Frequency transport stream reaches preset time.Therefore, the subscriber terminal equipment of receiver can reduce for simultaneous voice transport stream and video
The initial buffer interval of transport stream.
In more detail, the subscriber terminal equipment of transmitter can postpone and send video transmission stream to reach after voice transfer stream
13.33ms.Here, voice transfer stream s1 and s2 is synchronous with video transmission stream Bt1, voice transfer stream s3 and s4 and video transmission stream
Bt2 is synchronous, and voice transfer stream s5 is synchronous with video transmission stream Bt3.
In addition, the subscriber terminal equipment of receiver can postpone and receive video transmission stream and voice transfer stream reaches
46.66ms, so as to synchronization video transport stream and voice transfer stream.Here, when receiving video transmission stream Br1, voice transfer stream
A part (that is, part of 6.66ms) of s2 can retain.When receiving video transmission stream Br2, one of voice transfer stream s4
Divide (for example, part of 13.33ms) can retain.However, can receive voice transfer stream when receiving video transmission stream Br3
The entire part of s5.In other words, the subscriber terminal equipment of transmitter can postpone concurrent sending voice transport stream and transmission of video
Up to 13.33, and therefore, the subscriber terminal equipment of receiver can have minimum initial buffer interval 46.66ms to stream.
Figure 17 A be show accoding to exemplary embodiment be inserted into voice transfer stream and video when carrying out normal talking
The figure of the data of transport stream.As shown in Figure 17 A, when carrying out normal talking, voice bit stream can be inserted into voice transfer
Stream, and video bit stream can be inserted into video transmission stream.It in other words, does not include instruction when carrying out normal talking
The encrypted flag information of voice bit stream.
Figure 17 B be show accoding to exemplary embodiment be inserted into voice when being conversed under the second safe mode
The figure of transport stream and the data of video transmission stream.As seen in this fig. 17b, instruction voice bit stream is encrypted and/or is included in view
Flag information in frequency transport stream can be inserted into voice transfer stream, and encrypted voice bit stream can be inserted into
Video transmission stream.In other words, receiver terminal equipment can sense, detect or obtain the mark being inserted into voice transfer stream
Will information, to execute the communication with another subscriber terminal equipment under the second safe mode.
Figure 18 A be show according to another exemplary embodiment high quality audio data are inserted into video transmission stream to send out
Send the figure of the method for high quality audio data.As shown in Figure 18 A, voice bit stream can be inserted into voice transfer stream, and
Video bit stream and audio bitstream can be inserted into video transmission stream.In other words, such as in related art method, user
Voice can be sent by using voice transfer stream, and video data and high quality audio data are (for example, background music
Deng) can be sent together by using video transmission stream to enable high quality session services.
Figure 18 B is that the information that will control shown according to another exemplary embodiment is inserted into voice transfer stream to send control
The figure of the method for information.As shown in figure 18b, the control information (for example, encryption information) of the voice bit stream of encryption can be inserted
The voice bit stream for entering to voice transfer stream (individually or there are also other data, such as silence data), and encrypting can be with
It is inserted into video transmission stream.In other words, when being conversed under the second safe mode, various types of information can be by
It is inserted into empty video transmission stream to be sent.It is understood, however, that according to another exemplary embodiment, encryption information
(for example, in voice bit stream) can be included in video transmission stream.In this case, silence data or empty data can
To be included in voice transfer information flow.
Equipment accoding to exemplary embodiment may include the UI equipment of such as processor, stores and executes program data
Memory, the permanent storage of such as disk drive, the communication port with external device communication, touch panel, key, button
Deng.The method for being implemented as software module or algorithm etc. can be stored as in computer readable recording medium can be by processor
The computer-readable code or program instruction of execution.Here, the example of computer readable recording medium includes magnetic storage medium (example
Such as, read-only memory (ROM), random access memory (RAM), floppy disk, hard disk etc.) and optical recording medium (optical
Reading medium) (such as CD-ROM, digital versatile disc (DVD) etc.) etc..Computer readable recording medium can store
With execute be distributed in a distributed fashion it is in the computer system being connected to each other by network, by computer read computer can
Read code.Medium can be read by computer, and storage in memory, and is run by processor.
Exemplary embodiment can be embodied as function block structure and various processing operations.Functional block can be by specific real
It applies to run the software and/or software configuration of the various numbers of specific function.For example, integrated electricity can be used in exemplary embodiment
Road (IC) structure is such as run each under the control of one or more microprocessors or through other types of control equipment
Memory, processing element, logic element, the look-up table etc. of kind function.Similar element can be run as software programming or soft
Part element, exemplary embodiment may include various types of algorithms, utilize data structure, process, routine and other programmings
The combination of structure and realize, to be specifically implemented as the programming or scripting language of C, C++, Java, assembler etc..Function
Energy aspect can be typically embodied as the algorithm to be run by one or more processors.Existing skill can be used in exemplary embodiment
Art is for electronic environment setting, signal processing and/or data processing etc..Such as " mechanism ", " element, " " equipment " and " structure "
Term can be widely used, and be not limited to mechanical and physical structure.Term can be linked to processor etc., with packet
Include a series of meaning of software routines.
The specific run described in the exemplary embodiment is exemplary, and does not limit technical scope.For this theory
The convenience of bright book, for existing electronic structure, control system, software and system other functions in terms of explanation can be saved
Slightly.In addition, the line or connecting elements between element shown in figure illustratively indicate function connects and/or physically or electrically
Road connection.Therefore, in actual equipment, line or connecting elements can indicate that alternatively or additionally various functions connect
It connects, physical connection or circuit connection.
The instruction term of term " described " etc. used in this specification (especially in claim) can correspond to list
Several or plural number.In addition, if describing range, then range includes individual value (if without illustrating on the contrary).Therefore, range
Each value is effectively illustrated in detailed description.The sequence of the operation of method can be explicitly described, or if not retouched
It states, then operation can execute in the proper sequence.However, the sequence of these operations is not limited to this.All examples or example
The use of property term (for example, grade) is technical concept for illustration only, and therefore, the range of claims is not by these
The limitation of example or exemplary term, but be defined by the claims.
Foregoing example embodiment and advantage are only exemplary, and are not necessarily to be construed as limiting.This introduction can be easy
Ground is applied to other types of device.In addition, the description of exemplary embodiment be intended to it is illustrative, rather than limit right want
The range asked, and many replacements, modifications and variations will be apparent to those skilled in the art.
Claims (15)
1. a kind of method for executing guarded communication by subscriber terminal equipment, which comprises
Mark and the communication pattern of the call of other user terminals equipment are normal mode or safe mode;
It is normal mode based on communication pattern, sends the transport stream including user voice data to other user terminals equipment;
Communication pattern based on call is safe mode,
Encryption includes the first voice bit stream of user voice data;
The first video that first voice bit stream of the encryption including user voice data is inserted into not video bit stream is passed
Defeated stream;And
Other user terminals equipment is sent by the first video transmission stream for inserting the first voice bit stream of encryption.
2. the method for claim 1, wherein encrypting the first voice bit stream includes:
Voice data corresponding with user speech is encoded to generate the first voice bit stream;
Encrypt at least part data of the first voice bit stream;And
The encryption information for being used to encrypt is inserted into the first voice bit stream.
3. method according to claim 2, wherein the first voice bit stream includes:
Header area is included in the information in the first voice bit stream including instruction voice data;And
Payload area, including voice data encoded.
4. method as claimed in claim 3, wherein encryption at least part data include encrypting having for the first voice bit stream
Imitate load region.
5. method as claimed in claim 3, in which:
First voice bit stream further includes auxiliary region;And
Encryption information is inserted at least one of the header area of the first voice bit stream, payload area and auxiliary region.
6. method according to claim 2, wherein the encryption information include encryption key, the first voice bit stream plus
At least one of the position in close region and encryption algorithm type.
7. the method as described in claim 1, further includes:
Generate the voice transfer stream including silence data;And
Other user terminals equipment is sent by voice transfer stream generated.
8. the method as described in claim 1, further includes:
Generation includes the voice transfer stream of the encryption information for encryption;And
Other user terminals equipment is sent by voice transfer stream generated.
9. the method as described in claim 1, further includes:
The second video of the second voice bit stream of encryption is inserted in response to receiving when executing converse in the secure mode
Transport stream handles the second video transmission stream received by using safe mode speech coder.
10. method as claimed in claim 9, wherein handling the second video transmission stream received includes:
The second voice bit stream of encryption is extracted from the second video transmission stream received;
The encryption information for decrypting the second voice bit stream encrypted is obtained from the second voice bit stream of extraction;
The second voice bit stream encrypted is decrypted based on the encryption information of acquisition;And
The second voice bit stream decrypted is to export voice data.
11. method as claimed in claim 10, further includes, in response to the call executed in the secure mode, it is whole to close user
The camera model and video calling output unit of end equipment, and second received is exported using normal talking output unit
The voice data of video transmission stream.
12. the method for claim 1, wherein for the call under safe mode, by using different from user terminal
The application processor of the communication modem of equipment handles voice data, the communication modulation demodulation of the subscriber terminal equipment
Device is used to handle the voice data for the call under normal mode.
13. a kind of subscriber terminal equipment, comprising:
Security module, being configured as mark and the communication pattern of the call of other user terminals equipment is normal mode or safety
Mode is normal mode based on communication pattern, sends the transport stream including user voice data, base to other user terminals equipment
It is safe mode in the communication pattern of call, encryption includes the first voice bit stream of user voice data, and will include using
First voice bit stream of the encryption of family voice data is inserted into the first video transmission stream of not video bit stream;And
Communication module, the first video transmission stream for being configured as to insert the first voice bit stream of encryption are sent to other use
Family terminal device.
14. subscriber terminal equipment as claimed in claim 13, wherein the security module includes:
Encoder is configured as coding voice data corresponding with user speech to generate the first voice bit stream;
Encryption equipment is configured as at least part data of the first voice bit stream of encryption;And
Encryption information inserter is configured as the encryption information for being used to encrypt being inserted into the first voice bit stream.
15. subscriber terminal equipment as claimed in claim 14, wherein the first voice bit stream includes:
Header area is included in the information in the first voice bit stream including instruction voice data;And
Payload area, including voice data encoded.
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR10-2014-0011479 | 2014-01-29 | ||
KR20140011479 | 2014-01-29 | ||
KR1020140138570A KR102092756B1 (en) | 2014-01-29 | 2014-10-14 | User terminal Device and Method for secured communication therof |
KR10-2014-0138570 | 2014-10-14 | ||
PCT/KR2015/000912 WO2015115798A1 (en) | 2014-01-29 | 2015-01-28 | User terminal device and secured communication method thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105960811A CN105960811A (en) | 2016-09-21 |
CN105960811B true CN105960811B (en) | 2019-12-03 |
Family
ID=53885448
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201580006388.9A Expired - Fee Related CN105960811B (en) | 2014-01-29 | 2015-01-28 | Subscriber terminal equipment and its guarded communication method |
Country Status (3)
Country | Link |
---|---|
KR (1) | KR102092756B1 (en) |
CN (1) | CN105960811B (en) |
GB (1) | GB2545529A (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106412312A (en) * | 2016-10-19 | 2017-02-15 | 北京奇虎科技有限公司 | Method and system for automatically awakening camera shooting function of intelligent terminal, and intelligent terminal |
CN107659400B (en) * | 2017-09-29 | 2020-08-28 | 科华恒盛股份有限公司 | Quantum secret communication method and device based on identification recognition |
KR101909700B1 (en) * | 2017-10-11 | 2018-10-18 | 한국전자통신연구원 | VoLTE TERMINAL AND VOICE COMMUNICATION PROTECTION METHOD USING THE SAME |
KR102525077B1 (en) * | 2020-11-06 | 2023-04-24 | 카페24 주식회사 | Method, Apparatus and System for Voice Processing Based on Setting |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6256491B1 (en) * | 1997-12-31 | 2001-07-03 | Transcript International, Inc. | Voice security between a composite channel telephone communications link and a telephone |
CN201197180Y (en) * | 2008-02-21 | 2009-02-18 | 上海迅特电子科技有限公司 | Network video processing apparatus |
CN102857341A (en) * | 2011-06-28 | 2013-01-02 | 联芯科技有限公司 | Communication method for encrypted call |
CN102882831A (en) * | 2011-07-11 | 2013-01-16 | 联芯科技有限公司 | Method for controlling terminal to enter secret communication, secret communication method and terminal |
CN202818616U (en) * | 2012-08-14 | 2013-03-20 | 福建伊时代信息科技股份有限公司 | Voice communication device and system |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100417125B1 (en) * | 2002-08-07 | 2004-02-05 | 주식회사 팬택앤큐리텔 | Method for Automatically Entering Secured Voice Communication Mode of Wireless Communication Terminal |
FR2862835B1 (en) * | 2003-11-24 | 2006-04-14 | Medialive | SECURED AND CUSTOMIZED DIFFUSION OF AUDIOVISUAL FLOWS BY A UNICAST / MULTICAST HYBRID SYSTEM |
KR100763464B1 (en) * | 2003-12-16 | 2007-10-04 | 김기호 | Method of exchanging secret key for secured communication |
US9172493B2 (en) * | 2006-12-18 | 2015-10-27 | International Business Machines Corporation | Caller-identity based security |
US8438016B2 (en) * | 2008-04-10 | 2013-05-07 | City University Of Hong Kong | Silence-based adaptive real-time voice and video transmission methods and system |
KR20100007738A (en) * | 2008-07-14 | 2010-01-22 | 한국전자통신연구원 | Apparatus for encoding and decoding of integrated voice and music |
US20110293021A1 (en) * | 2010-05-28 | 2011-12-01 | Jayant Kotalwar | Prevent audio loss in the spliced content generated by the packet level video splicer |
KR101297936B1 (en) * | 2012-06-08 | 2013-08-19 | 가톨릭대학교 산학협력단 | Method for security communication between mobile terminals and apparatus for thereof |
-
2014
- 2014-10-14 KR KR1020140138570A patent/KR102092756B1/en active IP Right Grant
-
2015
- 2015-01-28 GB GB1613388.6A patent/GB2545529A/en not_active Withdrawn
- 2015-01-28 CN CN201580006388.9A patent/CN105960811B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6256491B1 (en) * | 1997-12-31 | 2001-07-03 | Transcript International, Inc. | Voice security between a composite channel telephone communications link and a telephone |
CN201197180Y (en) * | 2008-02-21 | 2009-02-18 | 上海迅特电子科技有限公司 | Network video processing apparatus |
CN102857341A (en) * | 2011-06-28 | 2013-01-02 | 联芯科技有限公司 | Communication method for encrypted call |
CN102882831A (en) * | 2011-07-11 | 2013-01-16 | 联芯科技有限公司 | Method for controlling terminal to enter secret communication, secret communication method and terminal |
CN202818616U (en) * | 2012-08-14 | 2013-03-20 | 福建伊时代信息科技股份有限公司 | Voice communication device and system |
Also Published As
Publication number | Publication date |
---|---|
KR102092756B1 (en) | 2020-03-24 |
CN105960811A (en) | 2016-09-21 |
GB2545529A (en) | 2017-06-21 |
KR20150090817A (en) | 2015-08-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105981327B (en) | Safety communicating method and equipment and the multimedia device for using this method and equipment | |
CN105960811B (en) | Subscriber terminal equipment and its guarded communication method | |
US20150215112A1 (en) | User terminal device and secured communication method thereof | |
EP3178190B1 (en) | Encoder, decoder and method | |
EP3195519B1 (en) | Encoder, decoder and methods employing partial data encryption | |
EP3082291B1 (en) | Secure communication method and apparatus and multimedia device employing same | |
CN1633068B (en) | A method of media stream transmission in point-to-point communication | |
CN105471899A (en) | End-to-end voice encryption communication method and device for mobile terminals | |
CN113727058A (en) | Multimedia conference data processing method, system, equipment and storage medium | |
KR20130089663A (en) | Methods and apparatus for transmitting and receiving secure and non-secure data | |
EP2175580A1 (en) | Encryption method for a wireless headset, and wireless headset | |
CN104581714A (en) | Method for encrypting speech on basis of TD-SCDMA (time division-synchronization code division multiple access) circuit domains | |
CN105871842B (en) | Voice encryption and decryption method, encryption and decryption device and terminal | |
CN105120457B (en) | A kind of Mobile Communication Circuit domain audio processing apparatus and method | |
CN101242453B (en) | A transmission method and system for dual-audio multi-frequency signal | |
KR20150071958A (en) | Method and apparatus for secure voice call | |
CN103986711A (en) | Data processing method for voice communication | |
CN106533686A (en) | Encryption communication method and system, communication unit and client | |
Dodeja | BaatCheet: Android chat application coupling End-to-End encryption and LSB substitution | |
CN104618599B (en) | Information processing method and electronic equipment | |
CN111246470B (en) | Intelligent sound box system and method based on hybrid cloud encryption | |
CN109492408A (en) | A kind of method and device of encryption data | |
CN108632215B (en) | Digital communication encryption and decryption method and device | |
TWI287767B (en) | Encryption device and method, decryption device and method, integrity authentication code generation device and method, integrity authentication code auxiliary device, integrity recognition device, and wireless communication device | |
CN118784347A (en) | Power grid information encryption and authentication method, system, device and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20191203 |