CN106878277B - Method and device for realizing voice encryption based on DMR standard - Google Patents

Method and device for realizing voice encryption based on DMR standard Download PDF

Info

Publication number
CN106878277B
CN106878277B CN201710011193.4A CN201710011193A CN106878277B CN 106878277 B CN106878277 B CN 106878277B CN 201710011193 A CN201710011193 A CN 201710011193A CN 106878277 B CN106878277 B CN 106878277B
Authority
CN
China
Prior art keywords
key
call
type
voice
bytes
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710011193.4A
Other languages
Chinese (zh)
Other versions
CN106878277A (en
Inventor
蔡东志
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Auctus Technologies Co ltd
Original Assignee
Auctus Technologies Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=59164810&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=CN106878277(B) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Auctus Technologies Co ltd filed Critical Auctus Technologies Co ltd
Priority to CN201710011193.4A priority Critical patent/CN106878277B/en
Publication of CN106878277A publication Critical patent/CN106878277A/en
Application granted granted Critical
Publication of CN106878277B publication Critical patent/CN106878277B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a method and a device for realizing voice encryption based on a DMR standard, wherein the method comprises the steps of sending a first key or a second key corresponding to a preset encryption type through PDU signaling, wherein the second key is generated according to the first key and a generation rule consistent with the negotiation with the other party; sending a data burst, wherein the data burst carries the encryption type; and sending a voice burst, wherein the voice burst carries the voice data encrypted by the second secret key. The invention provides at least two voice encryption methods based on a PDU signaling format in a DMR standard, wherein one method is that all calls in a period use the same key, and the other method is that the keys of each call are different and is called one call and one secret. The product safety performance can be improved, and the user experience is improved.

Description

Method and device for realizing voice encryption based on DMR standard
Technical Field
The invention relates to the technical field of electronics, in particular to a method and a device for realizing voice encryption based on a DMR standard.
Background
Dmr (digital Mobile radio) digital trunking communication standard is an open standard designed and established by ETSI (european telecommunications standards institute) for Mobile communications. The Data burst and the sequence of the voice burst to be transmitted, the format of a PDU (Protocol Data Unit), the format of the Data burst, the format of the voice burst, and the format and the transmission time of embedded signaling (embedded signaling) are defined. Before starting to send a Voice burst, a Data Type of the Data burst is 0x01(Voice LC Header), a PDU of the Data burst is UU _ V _ Ch _ Usr (single to Unit Voice Channel User LC PDU) or Group _ V _ Ch _ Usr (Group Voice Channel User LC PDU), and fig. 1 is a structure of the UU _ V _ Ch _ Usr PDU when a single call is made; FIG. 2 is the structure of Grp _ V _ Ch _ Usr PDU during group call;
no method of voice encryption is defined in the current DMR standard.
Disclosure of Invention
The invention provides a method and a device for realizing voice encryption based on a DMR standard, which mainly solve the problem that the voice encryption cannot be carried out in the existing DMR standard.
The method for realizing voice encryption based on the DMR standard comprises the following steps:
sending a first key or a second key corresponding to a preset encryption type through PDU signaling, wherein the second key is generated according to the first key and a generation rule in accordance with the negotiation with the other party;
sending a data burst, wherein the data burst carries the encryption type;
and sending a voice burst, wherein the voice burst carries the voice data encrypted by the second secret key.
In some embodiments, the encryption types include: the system comprises a first type for encrypting by using a fixed call key, and a second type for updating the call key before each call and encrypting the call by using the updated call key.
In some embodiments, the encryption type is added in a Reserved field of Service Options of the data burst signaling, and the value of the Reserved field is different for different encryption types.
In some embodiments, an encryption identifier is added to the Privacy field of the Service Options of the data burst signaling.
In some embodiments, the above method for implementing voice encryption based on DMR standard further includes:
obtaining a first key corresponding to the first type by: acquiring a key of 32 bytes input by a user as a first key corresponding to the first type;
obtaining a second key corresponding to the first type by: and performing an AES algorithm on the first key of 32 bytes input by the user and a preset first character string of 32 bytes to obtain the second key of 32 bytes.
Obtaining a first key corresponding to the second type by:
changing a preset variable key according to a preset mode to obtain a first key of the call;
obtaining a second key corresponding to the second type by:
carrying out XOR on the first key of the call and a key of 32 bytes input by a user;
and performing an AES algorithm on the XOR result and a preset second character string of 32 bytes to obtain a key of 32 bytes, wherein the key is used as the second key of the call.
In some embodiments, transforming the preset variable key according to the preset manner to obtain the first key of the current call includes:
circulating the preset variable keys with 3 bytes according to the order of the bytes to determine the first key of the call.
In some embodiments, the transmitting the first key or the second key corresponding to the preset cipher type through PDU signaling comprises:
if the PDU is a single call, the first key or the second key is added into targetddress of the PDU signaling for transmission;
and if the PDU is a Group call, adding the first key or the second key into the Group address of the PDU signaling for transmission.
The invention provides a device for realizing voice encryption based on DMR standard, which mainly comprises:
the first processing module is used for sending a first key or a second key corresponding to a preset encryption type through PDU signaling, wherein the second key is generated according to the first key and a generation rule consistent with the negotiation with the other party;
a second processing module, configured to send a data burst, where the data burst carries the encryption type;
and the third processing module is used for sending the voice burst, and the voice burst carries the voice data encrypted by the second key.
In some embodiments, the apparatus for implementing voice encryption based on DMR standard further includes:
a first obtaining module, configured to obtain a first key corresponding to the first type by: acquiring a key of 32 bytes input by a user as a first key corresponding to the first type;
a second obtaining module, configured to obtain a second key corresponding to the first type by: performing an AES algorithm on the first key acquired by the first acquisition module and a preset first character string of 32 bytes to obtain a second key of 32 bytes;
a third obtaining module, configured to generate a first key corresponding to the second type by: changing a preset variable key according to a preset mode to obtain a first key of the call;
a fourth obtaining module, configured to generate a second key corresponding to the second type by: performing exclusive or on the first key of the call obtained by the third obtaining module and a key of 32 bytes input by a user; and performing an AES algorithm on the XOR result and a preset second character string of 32 bytes to obtain a key of 32 bytes, wherein the key is used as the second key of the call.
In some embodiments, if the PDU is a single call, the first processing module adds the first key or the second key to a Target address of the PDU signaling for transmission; and if the PDU is a Group call, the first processing module adds the first key or the second key in the Group address of the PDU signaling for transmission.
The invention provides a method and a device for realizing voice encryption based on a DMR standard, which provide at least two voice encryption methods based on a PDU signaling format in the DMR standard, wherein one voice encryption method is that all calls in a period use the same key, and the other voice encryption method is that the keys of each call are different and is called one call and one secret. The product safety performance can be improved, and the user experience is improved.
Drawings
FIG. 1 is a schematic structural diagram of UU _ V _ Ch _ Usr PDU at single call in DMR standard;
FIG. 2 is a schematic structural diagram of Grp _ V _ Ch _ Usr PDU during group calling in DMR standard;
fig. 3 is a flowchart of a method for implementing voice encryption based on DMR standard according to a first embodiment of the present invention;
fig. 4 is a diagram illustrating fields of Service Options in a PDU according to a first embodiment of the present invention;
fig. 5 is a flowchart of a method for implementing voice encryption based on DMR standard according to a second embodiment of the present invention;
fig. 6 is a flowchart of a method for implementing voice encryption based on DMR standard according to a third embodiment of the present invention;
fig. 7 is a schematic diagram of an apparatus for implementing voice encryption based on the DMR standard according to a fourth embodiment of the present invention.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The method and the device for realizing voice encryption based on the DMR standard can be arranged in a digital interphone.
The present invention will be described in further detail with reference to specific examples.
First embodiment
Referring to fig. 3, fig. 3 is a flowchart of a method for implementing voice encryption based on DMR standard according to a first embodiment of the present invention, where the method includes:
s301, sending a first key or a second key corresponding to a preset encryption type through PDU signaling, wherein the second key is generated according to the first key and a generation rule consistent with the negotiation with the opposite side;
s302, sending a data burst, wherein the data burst carries the encryption type;
s303, sending a voice burst, wherein the voice burst carries the voice data encrypted by the second secret key.
The following two types of encryption are taken as examples: the system comprises a first type for encrypting by using a fixed call key, and a second type for updating the call key before each call and encrypting the call by using the updated call key. The first type value is that all calls use the same key for a period of time, and the second type means that the keys for each call are different, and is called one-call-one-cipher.
In step S301, the two types of keys can be carried in the PDU signaling and sent to the other side without changing the existing PDU format in the DMR standard. For example, the following steps are carried out:
for a first type, a first key corresponding to the first type may be obtained by: acquiring a key of 32 bytes input by a user as a first key corresponding to a first type;
the second key corresponding to the first type may also be obtained by: and performing an AES algorithm on the 32-byte first key input by the user and a preset 32-byte first character string to obtain a 32-byte key as a second key corresponding to the first type.
After acquiring the first key or the second key, if the single call is performed, adding the first key or the second key in a Target address of a PDU signaling (UU _ V _ Ch _ Usr) for transmission, referring to a Target address field in fig. 1; if the Group call is performed, the first key or the second key is added to the Group address of the PDU signaling (Group _ V _ Ch _ Usr) for transmission, referring to the Group address field in fig. 1. The first key or the second key can be selected to be sent, if the first key is sent, the generation rule is required to be consistent with the other protocol of the opposite party, so that the opposite party can generate the second key which is the same as the sending party according to the received first key.
For the second type, the first key corresponding to the second type may be obtained by:
and transforming the preset variable secret key according to a preset mode to obtain the first secret key of the call corresponding to the second type. The preset mode can be only satisfied with the transformation of the changeable key. As an embodiment, a preset variable key of 3 bytes may be cycled in order of bytes to determine the first key of the current call.
The second key corresponding to the second type may also be obtained by:
carrying out XOR on the first key of the call and a key of 32 bytes input by a user;
and performing an AES algorithm on the XOR result and a preset second character string of 32 bytes to obtain a key of 32 bytes, wherein the key is used as the second key of the call.
After acquiring the first key or the second key, if the single call is performed, adding the first key or the second key in a Target address of a PDU signaling (UU _ V _ Ch _ Usr) for transmission, referring to a Target address field in fig. 1; if the Group call is performed, the first key or the second key is added to the Group address of the PDU signaling (Group _ V _ Ch _ Usr) for transmission, referring to the Group address field in fig. 1. The first key or the second key can be selected to be sent, if the first key is sent, the generation rule is required to be consistent with the other protocol of the opposite party, so that the opposite party can generate the second key which is the same as the sending party according to the received first key.
The above is an illustration, and the present invention may also carry the first key or the second key through other fields of PDU signaling, which is not listed here.
The way of carrying the encryption type in the data burst in step S302 includes but is not limited to:
still taking the two encryption types as an example, the encryption type may be added to a Reserved field of ServiceOptions of the data burst signaling, and the value of the Reserved field is different for different encryption types. In the DMR standard, both UU _ V _ Ch _ Usr PDU signaling during single call and Grp _ V _ Ch _ Usr PDU signaling during group call include services Options, as shown in fig. 1 and 2, the services Options occupy 8 bytes, as shown in fig. 4, the services Options include a Privacy field, a Reserved field, and the like, an encrypted type may be added to the Reserved field, identification information may be added to the Privacy field, the identification information includes encrypted identification or unencrypted identification, different identification information, and the values of the Privacy field are different. For example, the value of Privacy is 1 when encrypted voice is transmitted, and the value of Privacy is 0 (standard default value) when voice is not encrypted; a Reserved value of 0 indicates a first type, 1 indicates a second type, i.e., a one-talk one-secret function is turned on, and 2 indicates that an external encryption is used.
After the opposite side receives the data burst, it can identify whether the voice data in the next voice burst is encrypted or not and the encryption type.
In step S303, the original voice data may be encrypted by using the second key of this embodiment, by using 216 bits of the 256-bit second key provided in this embodiment, performing xor on 216-bit payload of the voice burst, so as to obtain encrypted voice data.
After the encrypted voice data is received by the other party, the other party may decrypt the encrypted voice data according to the second key received in step S301, or if the first key is sent in step S301, the other party first generates the second key according to the first key and according to the agreed generation rule, and then decrypts the encrypted data using the second key.
In the method for implementing voice encryption based on DMR standard provided in this embodiment, before sending a voice burst, first send a related PDU signaling to transmit a session key, then send a data burst PDU, and finally send a voice burst. For the second type of ciphering, the data burst PDU and the talk key PDU may be transmitted in turn in the embedded signaling of the voice burst, which is done to facilitate late entry of the called party. In addition, this embodiment proposes at least two voice encryption methods based on the PDU signaling format in the DMR standard, one is to use the same key for all calls in a period of time, and the other is to use different keys for each call, which is called one-call-one-cipher. The product safety performance can be improved, and the user experience is improved.
Second embodiment
The present embodiment applies the first type of encryption method to perform voice encryption. Referring to fig. 5, the method for implementing voice encryption based on DMR standard mainly includes:
s501, a first key and a second key corresponding to the first type are obtained in the following manner.
And taking the key of 32 bytes input by the user as a first key, and carrying out an AES algorithm on the first character string of the preset 32 bytes to obtain a second key of 32 bytes.
S502, the second key generated in the step S501 is sent to the opposite side through PDU signaling.
If the PDU is a single call, adding the second key into the Target address of the PDU signaling for transmission;
and if the Group calling is carried out, adding the second key into the Group address of the PDU signaling for transmission.
After the second key is sent to the other party, the other party saves the second key, and the second key can be used for all the calls of the two parties in a period of time, so that the subsequent calls in a period of time can omit steps S501 and 502.
S503, sending a data burst, wherein the data burst carries the first type.
Specifically, no matter single call or group call, an encryption identifier is added to a Privacy field in Service Options of PDU signaling, a first type is added to a Reserved field, for example, the value of Privacy is set to 1 to indicate encryption, and the value of Reserved is set to 0 to indicate the first type.
After the opposite side receives the data burst, it can identify whether the voice data in the next voice burst is encrypted or not and the encryption type.
S504, sending the voice burst, wherein the voice burst carries the voice data encrypted by the second secret key.
Assuming that the second key of the present embodiment is 256 bits, 216 bits of the 256-bit second key may be xored with 216-bit payloads of the voice bursts to obtain encrypted voice data.
The method for realizing voice encryption based on the DMR standard sends a fixed session key, and the fixed session key may be used for multiple times within a period of time, so that the product security performance may be improved, and the user experience may be improved. Of course, in other embodiments, the first key may also be directly sent to the other party in step S502, and the other party negotiates the generation rule with the other party, and after receiving the first key, the other party first generates the second key according to the first key and the generation rule, and then decrypts the encrypted data in step S504 by using the second key.
Third embodiment
The present embodiment applies the second type of encryption scheme to perform voice encryption. Referring to fig. 6, the method for implementing voice encryption based on DMR standard mainly includes:
s601, obtaining a first key and a second key corresponding to the second type in the following manner.
Circulating preset variable keys with 3 bytes according to the order of the bytes, and determining a first key of the call;
XOR the first key and a 32-byte key input by a user;
and performing an AES algorithm on the XOR result and a preset second character string of 32 bytes to obtain a key of 32 bytes as a second key of the call.
S602, the first key obtained in the step S601 is sent to the opposite side through PDU signaling.
If the PDU is a single call, adding the first key into a Target address of the PDU signaling for transmission;
and if the Group calling is carried out, adding the first key into the Group address of the PDU signaling for transmission.
Preferably, the data burst PDU and the first key PDU may be alternately transmitted in the embedded signaling of the voice burst, which is to facilitate late entry of the called party.
After receiving the first key, the other party first generates a second key according to the first key and a generation rule agreed in advance, and then decrypts the encrypted data in step S604 by using the second key.
S603, sending a data burst, wherein the data burst carries a second type.
Specifically, no matter single call or group call, an encryption identifier is added to a Privacy field in Service Options of PDU signaling, a second type is added to a Reserved field, for example, the value of Privacy is set to 1 to indicate encryption, and the value of Reserved is set to 1 to indicate the second type.
After the opposite side receives the data burst, it can identify whether the voice data in the next voice burst is encrypted or not and the encryption type.
S604, sending the voice burst, wherein the voice burst carries the voice data encrypted by the second secret key. Assuming that the second key of the present embodiment is 256 bits, 216 bits of the 256-bit second key may be xored with 216-bit payloads of the voice bursts to obtain encrypted voice data.
After the call is ended and before the next call, returning to step S601, converting the variable key once to obtain another first key, which is used as the first key for the next call, performing xor on the first key and a key of 32 bytes input by the user, performing AES algorithm on the xor result and a preset second character string of 32 bytes to obtain a second key of 32 bytes, and applying the second key to the next call to encrypt the voice.
In the method for implementing voice encryption based on DMR standard provided in this embodiment, before sending a voice burst, first send a related PDU signaling to transmit a session key, then send a data burst PDU, and finally send a voice burst, where keys for each session are different, which is called one session and one secret. The product safety performance can be improved, and the user experience is improved. Of course, in other embodiments, the second key may be sent to the other party in step S602, and the other party receives the second key and decrypts the encrypted data in step S604 by using the second key.
Fourth embodiment
Referring to fig. 7, fig. 7 is a schematic diagram of an apparatus for implementing voice encryption based on DMR standard according to a fourth embodiment of the present invention, where the apparatus for implementing voice encryption based on DMR standard mainly includes:
the first processing module 71 is configured to send a first key or a second key corresponding to a preset encryption type through PDU signaling, where the second key is a key generated according to the first key and a generation rule in agreement with an opposite party;
a second processing module 72, configured to send a data burst, where the data burst carries the encryption type;
and the third processing module 73 is configured to send a voice burst, where the voice burst carries the voice data encrypted by the second key.
In some embodiments, the above encryption types include: the system comprises a first type for encrypting by using a fixed call key, and a second type for updating the call key before each call and encrypting the call by using the updated call key.
In some embodiments, the above apparatus further comprises:
a first obtaining module (not shown in the figure) configured to obtain a first key corresponding to the first type by: acquiring a key of 32 bytes input by a user as a first key corresponding to the first type;
a second obtaining module (not shown in the figure) for obtaining a second key corresponding to the first type by: performing an AES algorithm on the first key acquired by the first acquisition module and a preset first character string of 32 bytes to obtain a second key of 32 bytes;
a third obtaining module (not shown in the figure) configured to generate a first key corresponding to the second type by: changing a preset variable key according to a preset mode to obtain a first key of the call;
a fourth obtaining module (not shown in the figure) configured to generate a second key corresponding to the second type by: performing exclusive or on the first key of the call obtained by the third obtaining module and a key of 32 bytes input by a user; and performing an AES algorithm on the XOR result and a preset second character string of 32 bytes to obtain a key of 32 bytes, wherein the key is used as the second key of the call.
In some embodiments, if the PDU is a single call, the first processing module 71 adds the first key or the second key to a Target address of the PDU signaling for transmission; if the Group call is performed, the first processing module 72 adds the first key or the second key to the Group address of the PDU signaling for transmission.
The device provided by the embodiment is used for realizing the methods provided by the above embodiments, and specific detailed functions refer to the above method embodiments.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments. Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (9)

1. A method for realizing voice encryption based on DMR standard is characterized by comprising the following steps:
sending a first key or a second key corresponding to a preset encryption type through PDU signaling, wherein the second key is a key generated according to the first key and a generation rule consistent with the negotiation with the other party, and the encryption type comprises: a first type for encrypting by using a fixed call key, a second type for updating the call key before each call and encrypting the call by using the updated call key; further comprising obtaining a first key corresponding to the first type by: acquiring a key of 32 bytes input by a user as a first key corresponding to the first type; further comprising obtaining a second key corresponding to the first type by: performing an AES algorithm on the first key of 32 bytes input by a user and a preset first character string of 32 bytes to obtain a second key of 32 bytes;
sending a data burst, wherein the data burst carries the encryption type;
and sending a voice burst, wherein the voice burst carries the voice data encrypted by the second secret key.
2. The method of claim 1, wherein the ciphering type is added in a Reserved field of Service Options of the data burst signaling, and wherein the Reserved field has a different value for different ciphering types.
3. The method of claim 2, wherein an encryption flag is added to a Privacy field of Service Options of the data burst signaling.
4. The method of claim 1, further comprising obtaining a first key corresponding to the second type by:
changing a preset variable key according to a preset mode to obtain a first key of the call;
further comprising obtaining a second key corresponding to the second type by:
carrying out XOR on the first key of the call and a key of 32 bytes input by a user;
and performing an AES algorithm on the XOR result and a preset second character string of 32 bytes to obtain a key of 32 bytes, wherein the key is used as the second key of the call.
5. The method according to claim 4, wherein transforming the preset variable key according to the preset manner to obtain the first key of the current call comprises:
circulating the preset variable keys with 3 bytes according to the order of the bytes to determine the first key of the call.
6. The method according to any of claims 1 to 5, wherein the sending of the first key or the second key corresponding to the preset cipher type via PDU signaling comprises:
if the PDU signaling is a single call, adding the first key or the second key into a Target address of the PDU signaling for transmission;
and if the PDU is a Group call, adding the first key or the second key into the Group address of the PDU signaling for transmission.
7. An apparatus for implementing voice encryption based on DMR standard, comprising:
the first processing module is used for sending a first key or a second key corresponding to a preset encryption type through PDU signaling, wherein the second key is generated according to the first key and a generation rule consistent with the negotiation with the other party; the encryption types include: a first type for encrypting by using a fixed call key, a second type for updating the call key before each call and encrypting the call by using the updated call key;
a first obtaining module, configured to obtain a first key corresponding to the first type by: acquiring a key of 32 bytes input by a user as a first key corresponding to the first type;
a second obtaining module, configured to obtain a second key corresponding to the first type by: performing an AES algorithm on the first key acquired by the first acquisition module and a preset first character string of 32 bytes to obtain a second key of 32 bytes;
a second processing module, configured to send a data burst, where the data burst carries the encryption type;
and the third processing module is used for sending the voice burst, and the voice burst carries the voice data encrypted by the second key.
8. The apparatus for implementing voice encryption based on DMR standard as in claim 7, wherein the apparatus for implementing voice encryption based on DMR standard further comprises:
a third obtaining module, configured to generate a first key corresponding to the second type by: changing a preset variable key according to a preset mode to obtain a first key of the call;
a fourth obtaining module, configured to generate a second key corresponding to the second type by: performing exclusive or on the first key of the call obtained by the third obtaining module and a key of 32 bytes input by a user; and performing an AES algorithm on the XOR result and a preset second character string of 32 bytes to obtain a key of 32 bytes, wherein the key is used as the second key of the call.
9. The apparatus according to claim 7 or 8, wherein if the call is a single call, the first processing module adds the first key or the second key to a Target address of the PDU signaling for transmission; and if the PDU is a Group call, the first processing module adds the first key or the second key in the Group address of the PDU signaling for transmission.
CN201710011193.4A 2017-01-06 2017-01-06 Method and device for realizing voice encryption based on DMR standard Active CN106878277B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710011193.4A CN106878277B (en) 2017-01-06 2017-01-06 Method and device for realizing voice encryption based on DMR standard

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710011193.4A CN106878277B (en) 2017-01-06 2017-01-06 Method and device for realizing voice encryption based on DMR standard

Publications (2)

Publication Number Publication Date
CN106878277A CN106878277A (en) 2017-06-20
CN106878277B true CN106878277B (en) 2020-06-12

Family

ID=59164810

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710011193.4A Active CN106878277B (en) 2017-01-06 2017-01-06 Method and device for realizing voice encryption based on DMR standard

Country Status (1)

Country Link
CN (1) CN106878277B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111083806B (en) * 2018-10-18 2022-03-22 力同科技股份有限公司 Method and device for realizing data transmission based on DMR standard
CN109447203A (en) * 2018-11-07 2019-03-08 广州凯晟信息科技有限公司 Two dimensional code encryption and decryption method, device, Cloud Server and system
US11399286B2 (en) * 2019-08-20 2022-07-26 Qualcomm Incorporated Scrambling for wireless communications

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101137123A (en) * 2007-04-09 2008-03-05 中兴通讯股份有限公司 Encrypted group calling, individual calling, and dynamic restructuring call implementing method of cluster system
CN101500231A (en) * 2008-12-26 2009-08-05 北京握奇数据系统有限公司 Mobile terminal, audio data processing method and system
CN102404729A (en) * 2010-10-29 2012-04-04 公安部第一研究所 End-to-end speech encryption method for low-speed narrowband wireless digital communication
CN103402198A (en) * 2013-07-28 2013-11-20 浙江宏睿通信技术有限公司 Encryption parameter transmitting method of wireless communication terminal equipment

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8681981B2 (en) * 2010-12-03 2014-03-25 Motorola Solutions, Inc. Method and apparatus for transmitting voice communications related to a multimedia session

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101137123A (en) * 2007-04-09 2008-03-05 中兴通讯股份有限公司 Encrypted group calling, individual calling, and dynamic restructuring call implementing method of cluster system
CN101500231A (en) * 2008-12-26 2009-08-05 北京握奇数据系统有限公司 Mobile terminal, audio data processing method and system
CN102404729A (en) * 2010-10-29 2012-04-04 公安部第一研究所 End-to-end speech encryption method for low-speed narrowband wireless digital communication
CN103402198A (en) * 2013-07-28 2013-11-20 浙江宏睿通信技术有限公司 Encryption parameter transmitting method of wireless communication terminal equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"数字集群系统端到端加密与密钥管理机制的研究";刘志国;《中国优秀硕士学位论文全文数据库-信息科技辑》;20111015;全文 *

Also Published As

Publication number Publication date
CN106878277A (en) 2017-06-20

Similar Documents

Publication Publication Date Title
US10397775B2 (en) Key exchange method and apparatus
CN106850195B (en) Group key negotiation and communication method in instant communication
US11228908B2 (en) Data transmission method and related device and system
CN101103586B (en) Apparatus and method for ciphering/deciphering a signal in a communication system
CN105376261B (en) Encryption method and system for instant messaging message
CN106982419B (en) Single call end-to-end encryption method and system for broadband cluster system
CN1925681A (en) End-to-end encrypting method and system based on mobile communication network
CN105792190B (en) Data encryption, decryption and transmission method in communication system
CN104683291B (en) Session key negotiation method based on IMS system
CN106878277B (en) Method and device for realizing voice encryption based on DMR standard
CN109194701B (en) Data processing method and device
US9179303B2 (en) Methods and apparatus for transmitting and receiving secure and non-secure data
JP2014502461A5 (en) Method and apparatus for sending and receiving secure and non-secure data
CN111884802A (en) Media stream encryption transmission method, system, terminal and electronic equipment
CN114630290A (en) Key agreement method, device, equipment and storage medium for voice encryption communication
CN112291196B (en) End-to-end encryption method and system suitable for instant messaging
WO2017197968A1 (en) Data transmission method and device
CN113132980B (en) Key management system method and device applied to Beidou navigation system
CN107529159B (en) Access layer encryption, decryption and integrity protection method and device for broadband cluster downlink shared channel and security implementation method
JP3459074B2 (en) Method and apparatus for enhanced security enhancement of a private key to a lookup table to improve security of wireless telephone messages
RU2132597C1 (en) Method for encryption and transmission of encrypted voice data in gsm-900 and dcs-1800 cellular mobile communication networks
CN1177431C (en) Method and mobile device for end-to-end enciphere
KR20050107537A (en) Method and apparatus for encrypting authorization message of user and method for generating a secure key using the same
EP1829278A1 (en) System, terminal, method, and software for communicating messages
CN112398834A (en) Voice secret communication method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant