CN108111492B - Method for protecting conversation voice for electronic terminal and electronic terminal thereof - Google Patents

Method for protecting conversation voice for electronic terminal and electronic terminal thereof Download PDF

Info

Publication number
CN108111492B
CN108111492B CN201711307396.4A CN201711307396A CN108111492B CN 108111492 B CN108111492 B CN 108111492B CN 201711307396 A CN201711307396 A CN 201711307396A CN 108111492 B CN108111492 B CN 108111492B
Authority
CN
China
Prior art keywords
modem
length
time
data frame
application processor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711307396.4A
Other languages
Chinese (zh)
Other versions
CN108111492A (en
Inventor
王钦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Samsung Guangzhou Mobile R&D Center
Samsung Electronics Co Ltd
Original Assignee
Samsung Guangzhou Mobile R&D Center
Samsung Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Samsung Guangzhou Mobile R&D Center, Samsung Electronics Co Ltd filed Critical Samsung Guangzhou Mobile R&D Center
Priority to CN201711307396.4A priority Critical patent/CN108111492B/en
Publication of CN108111492A publication Critical patent/CN108111492A/en
Application granted granted Critical
Publication of CN108111492B publication Critical patent/CN108111492B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/30Compression, e.g. Merkle-Damgard construction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/34Encoding or coding, e.g. Huffman coding or error correction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

A method for protecting call voice for an electronic terminal and the electronic terminal are provided. The electronic terminal comprises a modem and an application processor, wherein the method comprises the following steps: (A) the modem sends a data frame generated based on the collected call voice signal to the application processor; (B) the application processor encrypts the received data frame and sends the encrypted data frame to the modem; (C) the modem processes the encrypted data frame and transmits the data frame through radio frequency. According to the method and the electronic terminal thereof, the general application processor is used for encrypting the call voice data, so that the development of the encryption of the call voice data is more general and easier.

Description

Method for protecting conversation voice for electronic terminal and electronic terminal thereof
Technical Field
The present invention relates generally to the field of electronic terminals, and more particularly, to a method for protecting call voice for an electronic terminal and an electronic terminal thereof.
Background
For voice communication via circuit-switched networks such as GSM, WCDMA, CDMA, etc., voice data transmitted over the network is data of a standard encoding scheme and is easily stolen by a person, and therefore, it is necessary to encrypt the voice data. Since the processes of voice data compression, protocol encoding and the like are all executed by a modem (modem) terminal, the modem terminal usually encrypts voice data, generally encrypts the voice data after being compressed, then performs protocol encoding, correspondingly, decrypts the voice data after being decoded, and then decompresses the voice data when being transmitted to a corresponding stage of a downlink. However, since the modem employs a non-general-purpose operating system, it is inconvenient to develop a voice data encryption/decryption process on its operating system.
Disclosure of Invention
An exemplary embodiment of the present invention is to provide a method for protecting a call voice for an electronic terminal and an electronic terminal thereof, so as to solve the above problems in the prior art.
According to an exemplary embodiment of the present invention, there is provided a method for protecting call voice for an electronic terminal, wherein the electronic terminal includes a modem and an application processor, the method comprising: (A) the modem sends a data frame generated based on the collected call voice signal to the application processor; (B) the application processor encrypts the received data frame and sends the encrypted data frame to the modem; (C) the modem processes the encrypted data frame and transmits the data frame through radio frequency.
Optionally, the data frame sent by the modem to the application processor is a data frame generated after the modem performs analog-to-digital conversion and voice data compression on the acquired call voice signal in real time.
Optionally, in step (B), the application processor stores the encrypted data frame to a specific buffer of the modem to form a specific buffer queue; in step (C), after a first predetermined time period starting from a specific time point, the modem reads a data frame from the specific buffer queue every second predetermined time period for processing, wherein the modem generates a data frame every second predetermined time period.
Optionally, the specific time point is one of the following time points: the time point when the modem sends a data frame to the application processor for the first time, the time point when the application processor receives the data frame sent by the modem for the first time, and the time point when the modem receives a call voice signal for the first time.
Optionally, in step (a), the modem sends a predetermined number of data frames to the application processor together every time the modem generates the predetermined number of data frames, wherein the predetermined number is greater than or equal to 2.
Optionally, the length of the first predetermined period is greater than or equal to 15ms and less than or equal to 500 ms.
Optionally, the length of the first predetermined time period is one of 100ms, 120ms, 140ms, 160ms, 180ms, and 200 ms.
Optionally, in step (B), when the length of the sequence of the encrypted data frames that the application processor needs to store to the specific buffer at one time is greater than the length of the unused area of the specific buffer, deleting the data frames within a predetermined length before the sequence, and storing the remaining data frames of the sequence to the specific buffer.
Optionally, the predetermined length is equal to or greater than the length of the sequence minus 15ms, and equal to or less than the length of an unused area of the specific buffer.
Optionally, the predetermined length is greater than or equal to the length of the sequence minus 100ms and less than or equal to half the length of an unused area of the particular buffer.
Optionally, in step (B), the specific buffer is emptied and/or the length of the specific buffer is increased before the remaining data frames of the sequence are stored in the specific buffer.
According to another exemplary embodiment of the present invention, there is provided a method for protecting call voice for an electronic terminal, wherein the electronic terminal includes a modem and an application processor, the method comprising: (A) the modem transmits a data frame generated based on a call voice signal received through a radio frequency to the application processor; (B) the application processor decrypts the received data frame and sends the decrypted data frame to the modem; (C) the modem processes the decrypted data frame and sends the data frame to the voice playing device for playing.
Optionally, the data frame sent by the modem to the application processor is a data frame generated after the modem performs analog-to-digital conversion, demodulation, and decoding on the call voice signal received through the radio frequency in real time.
Optionally, in step (B), the application processor stores the decrypted data frame to a specific buffer of the modem to form a specific buffer queue; in step (C), after a first predetermined time period starting from a specific time point, the modem reads a data frame from the specific buffer queue every second predetermined time period for processing, wherein the modem generates a data frame every second predetermined time period.
Optionally, the specific time point is one of the following time points: the time point when the modem sends a data frame to the application processor for the first time, the time point when the application processor receives the data frame sent by the modem for the first time, and the time point when the modem receives a call voice signal for the first time.
Optionally, in step (a), the modem sends a predetermined number of data frames to the application processor together every time the modem generates the predetermined number of data frames, wherein the predetermined number is greater than or equal to 2.
Optionally, the length of the first predetermined period is greater than or equal to 15ms and less than or equal to 500 ms.
Optionally, the length of the first predetermined time period is one of 100ms, 120ms, 140ms, 160ms, 180ms, and 200 ms.
Optionally, in step (B), when the length of the sequence of decrypted data frames that the application processor needs to store to the specific buffer at one time is greater than the length of the unused area of the specific buffer, deleting the data frames within the predetermined length before the sequence, and storing the remaining data frames of the sequence to the specific buffer.
Optionally, the predetermined length is equal to or greater than the length of the sequence minus 15ms, and equal to or less than the length of an unused area of the specific buffer.
Optionally, the predetermined length is greater than or equal to the length of the sequence minus 100ms and less than or equal to half the length of an unused area of the particular buffer.
Optionally, in step (B), the specific buffer is emptied and/or the length of the specific buffer is increased before the remaining data frames of the sequence are stored to the specific buffer.
According to another exemplary embodiment of the present invention, there is provided an electronic terminal including: a modem configured to transmit a data frame generated based on the collected call voice signal to the application processor, and process and transmit an encrypted data frame received from the application processor through a radio frequency; an application processor configured to encrypt the data frame received from the modem and transmit the encrypted data frame to the modem.
Optionally, the data frame sent by the modem to the application processor is a data frame generated after the modem performs analog-to-digital conversion and voice data compression on the acquired call voice signal in real time.
Optionally, the application processor is configured to store the encrypted data frames to a specific buffer of the modem to form a specific buffer queue; the modem is configured to read one data frame from the specific buffer queue for processing every second predetermined time period after a first predetermined time period with a specific time point as a starting point, wherein the modem generates one data frame every second predetermined time period.
Optionally, the specific time point is one of the following time points: the time point when the modem sends a data frame to the application processor for the first time, the time point when the application processor receives the data frame sent by the modem for the first time, and the time point when the modem receives a call voice signal for the first time.
Optionally, the modem is configured to send a predetermined number of data frames to the application processor together every time the predetermined number of data frames is generated, wherein the predetermined number is greater than or equal to 2.
Optionally, the length of the first predetermined period is greater than or equal to 15ms and less than or equal to 500 ms.
Optionally, the length of the first predetermined time period is one of 100ms, 120ms, 140ms, 160ms, 180ms, and 200 ms.
Optionally, the application processor is configured to delete data frames within a predetermined length before the sequence and store the remaining data frames of the sequence to the specific buffer when the length of the sequence of encrypted data frames required to be stored to the specific buffer at one time is greater than the length of the unused area of the specific buffer.
Optionally, the predetermined length is equal to or greater than the length of the sequence minus 15ms, and equal to or less than the length of an unused area of the specific buffer.
Optionally, the predetermined length is greater than or equal to the length of the sequence minus 100ms and less than or equal to half the length of an unused area of the particular buffer.
Optionally, the application processor is configured to empty the particular buffer and/or increase the length of the particular buffer before storing the remaining data frames of the sequence to the particular buffer.
According to another exemplary embodiment of the present invention, there is provided an electronic terminal including: a modem configured to transmit a data frame generated based on a call voice signal received through a radio frequency to an application processor, and process and transmit a decrypted data frame received from the application processor to a voice playing device for playing; and an application processor configured to decrypt the data frame received from the modem and transmit the decrypted data frame to the modem.
Optionally, the data frame sent by the modem to the application processor is a data frame generated after the modem performs analog-to-digital conversion, demodulation, and decoding on the call voice signal received through the radio frequency in real time.
Optionally, the application processor is configured to store the decrypted data frame to a specific buffer of the modem to form a specific buffer queue; the modem is configured to read one data frame from the specific buffer queue for processing every second predetermined time period after a first predetermined time period with a specific time point as a starting point, wherein the modem generates one data frame every second predetermined time period.
Optionally, the specific time point is one of the following time points: the time point when the modem sends a data frame to the application processor for the first time, the time point when the application processor receives the data frame sent by the modem for the first time, and the time point when the modem receives a call voice signal for the first time.
Optionally, the modem is configured to send a predetermined number of data frames to the application processor together every time the predetermined number of data frames is generated, wherein the predetermined number is greater than or equal to 2.
Optionally, the length of the first predetermined period is greater than or equal to 15ms and less than or equal to 500 ms.
Optionally, the length of the first predetermined time period is one of 100ms, 120ms, 140ms, 160ms, 180ms, and 200 ms.
Optionally, the application processor is configured to delete data frames within a predetermined length before the sequence and store the remaining data frames of the sequence to the specific buffer when the length of the sequence of decrypted data frames required to be stored to the specific buffer at one time is greater than the length of the unused area of the specific buffer.
Optionally, the predetermined length is equal to or greater than the length of the sequence minus 15ms, and equal to or less than the length of an unused area of the specific buffer.
Optionally, the predetermined length is greater than or equal to the length of the sequence minus 100ms and less than or equal to half the length of an unused area of the particular buffer.
Optionally, the application processor is configured to empty the particular buffer and/or increase the length of the particular buffer before storing the remaining data frames of the sequence to the particular buffer.
In the method for protecting call voice for an electronic terminal and the electronic terminal thereof according to the exemplary embodiment of the present invention, the call voice data is encrypted and decrypted by a general application processor, so that the development of encrypting and decrypting the call voice data is more general and easy.
Additional aspects and/or advantages of the present general inventive concept will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the general inventive concept.
Drawings
The above and other objects and features of exemplary embodiments of the present invention will become more apparent from the following description taken in conjunction with the accompanying drawings which illustrate exemplary embodiments, wherein:
fig. 1 illustrates a flowchart of a method of protecting call voice for an electronic terminal according to an exemplary embodiment of the present invention;
fig. 2 illustrates a flowchart of a method of protecting call voice for an electronic terminal according to another exemplary embodiment of the present invention;
FIG. 3 illustrates a block diagram of an electronic terminal according to an exemplary embodiment of the present invention;
fig. 4 shows a block diagram of an electronic terminal according to another exemplary embodiment of the present invention.
Detailed Description
Reference will now be made in detail to the embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to the like elements throughout. The embodiments are described below in order to explain the present invention by referring to the figures.
Fig. 1 illustrates a flowchart of a method of protecting call voice for an electronic terminal according to an exemplary embodiment of the present invention. The electronic terminal includes a modem and an application processor.
By way of example, the electronic terminal may be a mobile communication terminal (e.g., a smartphone), a smart wearable device (e.g., a smartwatch), a personal computer, a tablet computer, or the like that is capable of voice calls.
Referring to fig. 1, the modem transmits a data frame generated based on a collected call voice signal to an application processor at step S101. In other words, the modem sends the call voice data frame to be encrypted to the application processor to be encrypted by the application processor.
As an example, step S101 may be performed when call voice encryption is started. For example, step S101 may be executed when it is detected that a voice call is started; and/or, the step S101 may be performed when a user operation for triggering the call voice encryption is received.
As an example, the data frame sent by the modem to the application processor may be a data frame generated by the modem performing analog-to-digital conversion and voice data compression on a call voice signal collected by the electronic terminal in real time.
The application processor encrypts the received data frame and transmits the encrypted data frame to the modem at step S102.
In step S103, the modem processes the encrypted data frame and transmits it via radio frequency. The general application processor is used for encrypting the call voice data, so that the development of the encryption of the call voice data is more general and easier.
As an example, the modem may sequentially perform protocol coding, modulation, digital-to-analog conversion on the encrypted data frame, and then transmit the data frame through radio frequency.
Since the application processor may need to run other programs while encrypting the call voice data, and various emergencies (for example, a stuck phenomenon) may occur, the time for the application processor to encrypt the received data frame to be encrypted cannot be precisely controlled, and a data frame to be encrypted can be returned to the modem to be transmitted only after being encrypted, so that once the time for the application processor to encrypt the received data frame to be encrypted is too long, a problem occurs in which the call voice cannot be timely transmitted outwards, resulting in discontinuous call voice transmitted outwards.
In view of the above, according to an exemplary embodiment of the present invention, in step S102, the application processor may store the encrypted data frame to a first buffer area of the modem to form a first buffer queue; in step S103, the modem may read one data frame from the first buffer queue for processing every second predetermined time period after the first predetermined time period starting from the first time point, wherein the modem generates one data frame every second predetermined time period. Through the mode, the modem can read the encrypted data frame from the asynchronous buffer queue to process the data frame so as to transmit the data frame through radio frequency, and the encrypted data frame can be processed without synchronously waiting for the application processor to encrypt the data frame, so that the continuity of the externally transmitted call voice can be ensured.
Here, it should be understood that the first buffer queue may be a first-in-first-out buffer queue, and in particular, the modem may read one data frame at a time from the first buffer queue in the order in which the data frames in the first buffer queue are stored, and the data frames that have been read are no longer stored in the first buffer queue, i.e., in the first buffer region.
As an example, in step S102, the application processor may transmit the encrypted data frame to the modem, and store the received encrypted data frame to the first buffer by the modem to form a first buffer queue.
Specifically, in step S103, the modem may read a first data frame from the first buffer queue for processing after a first predetermined time period starting from a first time point, and then sequentially read one data frame from the first buffer queue for processing every second predetermined time period.
Here, the modem may generate a data frame to be encrypted every second predetermined period of time, and accordingly, the modem may read an encrypted data frame from the first buffer queue every second predetermined period of time to process the data frame for transmission to other electronic terminals. For example, the second predetermined period of time may be 20ms (milliseconds).
As an example, the first point in time may be one of the following points in time: the modem sends a data frame to be encrypted to the application processor for the first time, the application processor receives the data frame to be encrypted sent by the modem for the first time, and the modem receives a call voice signal for the first time.
As an example, the length of the first predetermined period of time may be greater than or equal to 15ms (milliseconds) and less than or equal to 500ms (milliseconds). That is, 500ms ≧ the length of the first predetermined period of time ≧ 15 ms.
Preferably, the length of the first predetermined period of time may be one of 100ms, 120ms, 140ms, 160ms, 180ms, and 200 ms.
As an example, the modem may transmit a predetermined number of data frames to be encrypted to the application processor together every time the predetermined number of data frames are generated, wherein the predetermined number is greater than or equal to 2. Thereby reducing the time consumed for encryption of call voice data by the application processor.
As an example, when the length of the sequence of encrypted data frames that the application processor needs to store to the first buffer once is greater than the length of the unused area of the first buffer (e.g., the application processor is stuck longer than the length of the unused area of the first buffer), data frames within the previous predetermined length of the sequence may be deleted and the remaining data frames of the sequence may be stored to the first buffer (i.e., to the first buffer queue).
As an example, the predetermined length may be equal to or greater than the length of the sequence minus 15ms, and equal to or less than the length of an unused region of the first buffer. That is, the length of the unused area of the first buffer is ≧ the predetermined length ≧ (the length of the sequence-15 ms).
As an example, the predetermined length may be equal to or greater than the length of the sequence minus 100ms, and equal to or less than half the length of an unused region of the first buffer. That is, half of the length of the unused area of the first buffer ≧ the predetermined length ≧ the length of the sequence-100 ms.
As an example, the first buffer may be emptied and/or the length of the first buffer may be increased before storing the remaining data frames of the sequence to the first buffer.
Here, it should be understood that the length of the sequence may be measured in time (e.g., milliseconds), for example, if the sequence includes N encrypted data frames, the length of the sequence may be: multiplying N by a second predetermined time period, wherein N is an integer greater than zero.
Accordingly, the length of the first buffer may be measured in time (e.g., milliseconds), for example, if the unused area of the first buffer is capable of storing M encrypted data frames, the length of the unused area of the first buffer may be: and multiplying M by a second predetermined time period, wherein M is an integer greater than zero.
Accordingly, the length of the first buffer queue may be measured in time (e.g., milliseconds), e.g., if the first buffer queue includes J encrypted data frames, the length of the first buffer queue may be: multiplying J by a second predetermined time period, wherein J is an integer greater than zero.
Fig. 2 illustrates a flowchart of a method of protecting call voice for an electronic terminal according to another exemplary embodiment of the present invention.
Referring to fig. 2, the modem transmits a data frame generated based on a call voice signal received through a radio frequency to the application processor at step S201. In other words, the modem sends the call voice data frame to be decrypted to the application processor to be decrypted by the application processor.
As an example, step S201 may be performed when the talk voice decryption is started. For example, step S201 may be performed when it is detected that a voice call is started; and/or, step S201 may be executed when it is detected that the call voice sent by the other electronic terminal has been encrypted.
As an example, the data frame sent by the modem to the application processor may be a data frame generated after the modem sequentially performs analog-to-digital conversion, demodulation and decoding on a call voice signal received by radio frequency and sent by another electronic terminal in real time.
The application processor decrypts the received data frame and transmits the decrypted data frame to the modem at step S202.
In step S203, the modem processes the decrypted data frame and sends it to the voice playing device for playing.
As an example, the modem may sequentially decompress, perform digital-to-analog conversion on the decrypted data frames, and then send the data frames to the voice playing device for playing.
As an example, in step S202, the application processor may store the decrypted data frame to a second buffer of the modem to form a second buffer queue; in step S203, the modem may read one data frame from the second buffer queue for processing every second predetermined time period after the first predetermined time period starting from the second time point, where the modem generates one data frame every second predetermined time period. Through the mode, the modem can read the decrypted data frame from the asynchronous buffer queue to process for playing, and the decrypted data frame can be processed without synchronously waiting for the application processor to decrypt the data frame, so that the continuity of the conversation voice played to a user can be ensured.
Here, it should be understood that the second buffer queue may be a first-in-first-out buffer queue, and in particular, the modem may read one data frame at a time from the second buffer queue in the order in which the data frames in the second buffer queue are stored, and the data frames that have been read are no longer stored in the second buffer queue, i.e., in the second buffer.
As an example, in step S202, the application processor may transmit the decrypted data frame to the modem, and store the received decrypted data frame to the second buffer by the modem to form a second buffer queue.
Specifically, in step S203, the modem may read a first data frame from the second buffer queue for processing after a first predetermined time period starting from the second time point, and then sequentially read one data frame from the second buffer queue for processing every second predetermined time period.
Here, the modem may generate a data frame to be decrypted every second predetermined time period, and accordingly, the modem may read a decrypted data frame from the second buffer queue every second predetermined time period for processing to play. For example, the second predetermined period of time may be 20 ms.
As an example, the second point in time may be one of the following points in time: the first time the modem sends a data frame to be decrypted to the application processor, the first time the application processor receives the data frame to be decrypted sent by the modem, and the first time the modem receives a call voice signal.
As an example, the length of the first predetermined period of time may be greater than or equal to 15ms, and less than or equal to 500 ms.
As an example, the length of the first predetermined period of time may be one of 100ms, 120ms, 140ms, 160ms, 180ms, 200 ms.
As an example, the modem may transmit a predetermined number of data frames to be decrypted to the application processor together every time the predetermined number of data frames are generated, wherein the predetermined number is greater than or equal to 2. Thereby reducing the time consumed for the decryption of call voice data by the application processor.
As an example, when the application processor needs to store the decrypted data frames to the second buffer once with a length that is greater than the length of the unused area of the second buffer (e.g., the application processor has been stuck for a time that exceeds the length of the unused area of the second buffer), the data frames within the previous predetermined length of the sequence may be deleted and the remaining data frames of the sequence may be stored to the second buffer (i.e., to the second buffer queue).
As an example, the predetermined length may be equal to or greater than the length of the sequence minus 15ms, and equal to or less than the length of an unused region of the second buffer.
As an example, the predetermined length may be equal to or greater than the length of the sequence minus 100ms, and equal to or less than half the length of an unused region of the second buffer.
As an example, the second buffer may be emptied and/or the length of the second buffer may be increased before storing the remaining data frames of the sequence to the second buffer.
Fig. 3 illustrates a block diagram of an electronic terminal according to an exemplary embodiment of the present invention. As shown in fig. 3, an electronic terminal according to an exemplary embodiment of the present invention includes: a modem 101 and an application processor 102.
Specifically, the modem 101 is configured to transmit a data frame generated based on the collected call voice signal to the application processor 102, and process and transmit an encrypted data frame received from the application processor 102 through radio frequency.
The application processor 102 is configured to encrypt data frames received from the modem 101 and transmit the encrypted data frames to the modem 101.
As an example, the data frame sent by the modem 101 to the application processor 102 may be a data frame generated by the modem 101 performing analog-to-digital conversion and voice data compression on the collected call voice signal in real time.
As an example, the application processor 102 may be configured to store the encrypted data frames to a first buffer of the modem 101 to form a first buffer queue; the modem 101 may be configured to read one data frame from the first buffer queue for processing every second predetermined period after the first predetermined period starting at the first point in time, wherein the modem 101 generates one data frame every second predetermined period.
As an example, the first point in time may be one of the following points in time: a point of time when the modem 101 first transmits a data frame to the application processor 102, a point of time when the application processor 102 first receives a data frame transmitted by the modem 101, and a point of time when the modem 101 first receives a call voice signal.
As an example, the length of the first predetermined period of time may be greater than or equal to 15ms, and less than or equal to 500 ms.
As an example, the length of the first predetermined period of time may be one of 100ms, 120ms, 140ms, 160ms, 180ms, 200 ms.
As an example, the modem 101 may be configured to transmit a predetermined number of data frames to the application processor 102 together every time the predetermined number of data frames is generated, wherein the predetermined number is greater than or equal to 2.
As an example, the application processor 102 may be configured to delete data frames within a predetermined length before a sequence of encrypted data frames that need to be stored once to the first buffer when the length of the sequence is greater than the length of an unused area of the first buffer, and store the remaining data frames of the sequence to the first buffer.
As an example, the predetermined length may be equal to or greater than the length of the sequence minus 15ms, and equal to or less than the length of an unused region of the first buffer.
As an example, the predetermined length may be equal to or greater than the length of the sequence minus 100ms, and equal to or less than half the length of an unused region of the first buffer.
As an example, the application processor 102 may be configured to empty the first buffer and/or increase the length of the first buffer before storing the remaining data frames of the sequence to the first buffer.
Fig. 4 illustrates a block diagram of an electronic terminal according to an exemplary embodiment of the present invention. As shown in fig. 4, an electronic terminal according to an exemplary embodiment of the present invention includes: a modem 201 and an application processor 202.
Specifically, the modem 201 is configured to transmit a data frame generated based on a call voice signal received through a radio frequency to the application processor 202, and process a decrypted data frame received from the application processor 202 and transmit to the voice playback device for playback.
The application processor 202 is configured to decrypt data frames received from the modem 201 and transmit the decrypted data frames to the modem 201.
As an example, the data frame transmitted by the modem 201 to the application processor 202 may be a data frame generated by the modem 201 performing analog-to-digital conversion, demodulation, and decoding on a call voice signal received through a radio frequency in real time.
As an example, the application processor 202 may be configured to store the decrypted data frame to a second buffer of the modem 201 to form a second buffer queue; the modem 201 may be configured to read one data frame from the second buffer queue for processing every second predetermined period after the first predetermined period starting from the second point in time, wherein the modem 201 generates one data frame every second predetermined period.
As an example, the second point in time may be one of the following points in time: a point of time when the modem 201 first transmits a data frame to the application processor 202, a point of time when the application processor 202 first receives a data frame transmitted by the modem 201, and a point of time when the modem 201 first receives a call voice signal.
As an example, the length of the first predetermined period of time may be greater than or equal to 15ms, and less than or equal to 500 ms.
As an example, the length of the first predetermined period of time may be one of 100ms, 120ms, 140ms, 160ms, 180ms, 200 ms.
As an example, the modem 201 may be configured to transmit a predetermined number of data frames to the application processor 202 together every time the predetermined number of data frames is generated, wherein the predetermined number is greater than or equal to 2.
As an example, the application processor 202 may be configured to delete data frames within a predetermined length before the sequence and store the remaining data frames of the sequence to the second buffer when the length of the sequence of decrypted data frames required to be stored to the second buffer at one time is greater than the length of the unused area of the second buffer.
As an example, the predetermined length may be equal to or greater than the length of the sequence minus 15ms, and equal to or less than the length of an unused region of the second buffer.
As an example, the predetermined length may be equal to or greater than the length of the sequence minus 100ms, and equal to or less than half the length of an unused region of the second buffer.
As an example, the application processor 202 may be configured to empty the second buffer and/or increase the length of the second buffer before storing the remaining data frames of the sequence to the second buffer.
It should be understood that the specific implementation of the electronic terminal according to the exemplary embodiment of the present invention may be implemented with reference to the related specific implementation described in conjunction with fig. 1 and fig. 2, and will not be described in detail herein.
According to the method for protecting the call voice of the electronic terminal and the electronic terminal thereof, the call voice data is encrypted and decrypted by the general application processor, so that the development of encrypting and decrypting the call voice data is more general and easier. In addition, the real-time performance and integrity of the encrypted and decrypted call voice data can be further ensured, so that the normal voice call function is not influenced.
Further, it should be understood that various devices in the electronic terminal according to exemplary embodiments of the present invention may be implemented as hardware components and/or software components. Those skilled in the art can implement the respective devices, for example, using Field Programmable Gate Arrays (FPGAs) or Application Specific Integrated Circuits (ASICs), according to the processes performed by the respective devices as defined.
Also, a method of protecting call voice for an electronic terminal according to an exemplary embodiment of the present invention may be implemented as computer code in a computer-readable recording medium. The computer code can be implemented by those skilled in the art from the description of the method above. The computer code when executed in a computer implements the above-described method of the present invention.
Although a few exemplary embodiments of the present invention have been shown and described, it would be appreciated by those skilled in the art that changes may be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the claims and their equivalents.

Claims (40)

1. A method for protecting voice over ip for an electronic terminal, wherein the electronic terminal comprises a modem and an application processor, the method comprising:
(A) the modem sends a data frame generated based on the collected call voice signal to the application processor;
(B) the application processor encrypts the received data frame and sends the encrypted data frame to the modem;
(C) the modem processes the encrypted data frame and transmits it over radio frequency,
wherein, in the step (B), the application processor stores the encrypted data frame to a specific buffer of the modem to form a specific buffer queue;
in step (C), the modem reads a data frame from the specific buffer queue for processing every second predetermined period after a first predetermined period starting from a specific point in time,
wherein the modem generates a data frame every second predetermined period of time.
2. The method of claim 1, wherein the data frame transmitted by the modem to the application processor is a data frame generated by the modem performing analog-to-digital conversion and voice data compression on the collected call voice signal in real time.
3. The method of claim 1, wherein the specific point in time is one of:
the time point when the modem sends a data frame to the application processor for the first time, the time point when the application processor receives the data frame sent by the modem for the first time, and the time point when the modem receives a call voice signal for the first time.
4. The method of claim 1, wherein, in step (A),
the modem sends a predetermined number of data frames to the application processor together every time the modem generates the predetermined number of data frames, wherein the predetermined number is greater than or equal to 2.
5. The method of claim 1, wherein the first predetermined period of time is greater than or equal to 15ms in length and less than or equal to 500ms in length.
6. The method of claim 5, wherein the first predetermined period of time is one of 100ms, 120ms, 140ms, 160ms, 180ms, 200ms in length.
7. The method of claim 1, wherein, in step (B),
when the length of the sequence of the encrypted data frames which are required to be stored to the specific buffer area at one time by the application processor is larger than the length of the unused area of the specific buffer area, deleting the data frames in the previous preset length of the sequence, and storing the rest data frames of the sequence to the specific buffer area.
8. The method of claim 7, wherein the predetermined length is equal to or greater than a length of the sequence minus 15ms and equal to or less than a length of an unused area of the particular buffer.
9. The method of claim 8, wherein the predetermined length is equal to or greater than the length of the sequence minus 100ms and equal to or less than half the length of an unused area of the particular buffer.
10. The method of claim 7, wherein, in step (B),
emptying the specific buffer and/or increasing the length of the specific buffer before storing the remaining data frames of the sequence to the specific buffer.
11. A method for protecting voice over ip for an electronic terminal, wherein the electronic terminal comprises a modem and an application processor, the method comprising:
(A) the modem transmits a data frame generated based on a call voice signal received through a radio frequency to the application processor;
(B) the application processor decrypts the received data frame and sends the decrypted data frame to the modem;
(C) the modem processes the decrypted data frame and sends the data frame to the voice playing device for playing,
wherein, in the step (B), the application processor stores the decrypted data frame to a specific buffer area of the modem to form a specific buffer queue;
in step (C), the modem reads a data frame from the specific buffer queue for processing every second predetermined period after a first predetermined period starting from a specific point in time,
wherein the modem generates a data frame every second predetermined period of time.
12. The method of claim 11, wherein the data frame transmitted from the modem to the application processor is a data frame generated by the modem performing analog-to-digital conversion, demodulation and decoding on the call voice signal received through the radio frequency in real time.
13. The method of claim 11, wherein the specific point in time is one of:
the time point when the modem sends a data frame to the application processor for the first time, the time point when the application processor receives the data frame sent by the modem for the first time, and the time point when the modem receives a call voice signal for the first time.
14. The method of claim 11, wherein, in step (A),
the modem sends a predetermined number of data frames to the application processor together every time the modem generates the predetermined number of data frames, wherein the predetermined number is greater than or equal to 2.
15. The method of claim 11, wherein the first predetermined period of time is greater than or equal to 15ms in length and less than or equal to 500ms in length.
16. The method of claim 15, wherein the first predetermined period of time is one of 100ms, 120ms, 140ms, 160ms, 180ms, and 200ms in length.
17. The method of claim 11, wherein, in step (B),
when the length of the sequence of the decrypted data frames which needs to be stored to the specific buffer area once by the application processor is larger than the length of the unused area of the specific buffer area, deleting the data frames in the front preset length of the sequence, and storing the rest data frames of the sequence to the specific buffer area.
18. The method of claim 17, wherein the predetermined length is equal to or greater than a length of the sequence minus 15ms and equal to or less than a length of an unused area of the particular buffer.
19. The method of claim 18, wherein the predetermined length is equal to or greater than the length of the sequence minus 100ms and equal to or less than half the length of an unused area of the particular buffer.
20. The method of claim 17, wherein, in step (B),
emptying and/or increasing the length of the particular buffer before storing the remaining data frames of the sequence to the particular buffer.
21. An electronic terminal, comprising:
a modem configured to transmit a data frame generated based on the collected call voice signal to the application processor, and process and transmit an encrypted data frame received from the application processor through a radio frequency;
an application processor configured to encrypt a data frame received from the modem and transmit the encrypted data frame to the modem,
wherein the application processor is configured to store the encrypted data frames to a specific buffer of the modem to form a specific buffer queue;
the modem is configured to read one data frame from the specific buffer queue for processing every second predetermined period after a first predetermined period starting from a specific point in time,
wherein the modem generates a data frame every second predetermined period of time.
22. The electronic terminal of claim 21, wherein the data frame transmitted by the modem to the application processor is a data frame generated by the modem performing analog-to-digital conversion and voice data compression on the collected call voice signal in real time.
23. The electronic terminal of claim 21, wherein the specific point in time is one of:
the time point when the modem sends a data frame to the application processor for the first time, the time point when the application processor receives the data frame sent by the modem for the first time, and the time point when the modem receives a call voice signal for the first time.
24. The electronic terminal of claim 21,
the modem is configured to send a predetermined number of data frames to the application processor together every time the predetermined number of data frames is generated, wherein the predetermined number is greater than or equal to 2.
25. The electronic terminal according to claim 21, wherein the length of the first predetermined period of time is greater than or equal to 15ms and less than or equal to 500 ms.
26. The electronic terminal of claim 25, wherein the first predetermined period of time is one of 100ms, 120ms, 140ms, 160ms, 180ms, and 200ms in length.
27. The electronic terminal of claim 21,
the application processor is configured to delete data frames within a predetermined length before a sequence of encrypted data frames that need to be stored once to the particular buffer when the length of the sequence is greater than the length of an unused area of the particular buffer, and store the remaining data frames of the sequence to the particular buffer.
28. The electronic terminal of claim 27, wherein the predetermined length is equal to or greater than a length of the sequence minus 15ms and equal to or less than a length of an unused area of the particular buffer.
29. The electronic terminal of claim 28, wherein the predetermined length is equal to or greater than the length of the sequence minus 100ms and equal to or less than half the length of an unused area of the particular buffer.
30. The electronic terminal of claim 27,
the application processor is configured to empty the particular buffer and/or increase the length of the particular buffer before storing remaining data frames of the sequence to the particular buffer.
31. An electronic terminal, comprising:
a modem configured to transmit a data frame generated based on a call voice signal received through a radio frequency to an application processor, and process and transmit a decrypted data frame received from the application processor to a voice playing device for playing;
an application processor configured to decrypt the data frame received from the modem and transmit the decrypted data frame to the modem,
wherein the application processor is configured to store the decrypted data frames to a specific buffer of the modem to form a specific buffer queue;
the modem is configured to read one data frame from the specific buffer queue for processing every second predetermined period after a first predetermined period starting from a specific point in time,
wherein the modem generates a data frame every second predetermined period of time.
32. The electronic terminal of claim 31, wherein the data frame transmitted by the modem to the application processor is a data frame generated by the modem performing analog-to-digital conversion, demodulation and decoding on the call voice signal received via the radio frequency in real time.
33. The electronic terminal of claim 31, wherein the specific point in time is one of:
the time point when the modem sends a data frame to the application processor for the first time, the time point when the application processor receives the data frame sent by the modem for the first time, and the time point when the modem receives a call voice signal for the first time.
34. The electronic terminal of claim 31,
the modem is configured to send a predetermined number of data frames to the application processor together every time the predetermined number of data frames is generated, wherein the predetermined number is greater than or equal to 2.
35. The electronic terminal of claim 31, wherein the length of the first predetermined period of time is greater than or equal to 15ms and less than or equal to 500 ms.
36. The electronic terminal of claim 35, wherein the first predetermined period of time is one of 100ms, 120ms, 140ms, 160ms, 180ms, 200ms in length.
37. The electronic terminal of claim 31,
the application processor is configured to delete data frames within a predetermined length before a sequence of decrypted data frames that need to be stored once to the particular buffer when the length of the sequence is greater than the length of an unused area of the particular buffer, and store the remaining data frames of the sequence to the particular buffer.
38. The electronic terminal of claim 37, wherein the predetermined length is equal to or greater than a length of the sequence minus 15ms and equal to or less than a length of an unused area of the particular buffer.
39. The electronic terminal of claim 38, wherein the predetermined length is equal to or greater than the length of the sequence minus 100ms and equal to or less than half the length of an unused area of the particular buffer.
40. The electronic terminal according to claim 37, wherein the application processor is configured to empty the specific buffer and/or increase the length of the specific buffer before storing the remaining data frames of the sequence to the specific buffer.
CN201711307396.4A 2017-12-11 2017-12-11 Method for protecting conversation voice for electronic terminal and electronic terminal thereof Active CN108111492B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711307396.4A CN108111492B (en) 2017-12-11 2017-12-11 Method for protecting conversation voice for electronic terminal and electronic terminal thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711307396.4A CN108111492B (en) 2017-12-11 2017-12-11 Method for protecting conversation voice for electronic terminal and electronic terminal thereof

Publications (2)

Publication Number Publication Date
CN108111492A CN108111492A (en) 2018-06-01
CN108111492B true CN108111492B (en) 2021-03-19

Family

ID=62208397

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711307396.4A Active CN108111492B (en) 2017-12-11 2017-12-11 Method for protecting conversation voice for electronic terminal and electronic terminal thereof

Country Status (1)

Country Link
CN (1) CN108111492B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101330691A (en) * 2008-07-28 2008-12-24 青岛海信移动通信技术股份有限公司 Multimode mobile terminal and method for implementing VoIP business
CN103986711A (en) * 2014-05-16 2014-08-13 天地融科技股份有限公司 Data processing method for voice communication
CN105471899A (en) * 2015-12-30 2016-04-06 浙江德景电子科技有限公司 End-to-end voice encryption communication method and device for mobile terminals
CN105981327A (en) * 2013-12-15 2016-09-28 三星电子株式会社 Method and apparatus for secured communication and multimedia device adopting the same
CN106657703A (en) * 2016-12-19 2017-05-10 广东欧珀移动通信有限公司 NV (nonvolatile) parameter import method, modem and mobile terminal
CN106888310A (en) * 2015-12-16 2017-06-23 展讯通信(上海)有限公司 Ciphering and deciphering device and method and communication terminal device
CN107231660A (en) * 2017-05-27 2017-10-03 努比亚技术有限公司 Data packet transmission system and method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4167688B2 (en) * 2006-01-12 2008-10-15 松下電器産業株式会社 Mobile terminal, encrypted content playback method, and plaintext data generation method used therefor

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101330691A (en) * 2008-07-28 2008-12-24 青岛海信移动通信技术股份有限公司 Multimode mobile terminal and method for implementing VoIP business
CN105981327A (en) * 2013-12-15 2016-09-28 三星电子株式会社 Method and apparatus for secured communication and multimedia device adopting the same
CN103986711A (en) * 2014-05-16 2014-08-13 天地融科技股份有限公司 Data processing method for voice communication
CN106888310A (en) * 2015-12-16 2017-06-23 展讯通信(上海)有限公司 Ciphering and deciphering device and method and communication terminal device
CN105471899A (en) * 2015-12-30 2016-04-06 浙江德景电子科技有限公司 End-to-end voice encryption communication method and device for mobile terminals
CN106657703A (en) * 2016-12-19 2017-05-10 广东欧珀移动通信有限公司 NV (nonvolatile) parameter import method, modem and mobile terminal
CN107231660A (en) * 2017-05-27 2017-10-03 努比亚技术有限公司 Data packet transmission system and method

Also Published As

Publication number Publication date
CN108111492A (en) 2018-06-01

Similar Documents

Publication Publication Date Title
CN108965302B (en) Media data transmission system, method, device and storage medium
EP1741224B1 (en) System and method for generating reproducible session keys
US8645713B2 (en) Encrypting method, recording medium of encrypting program, decrypting method, and recording medium of decrypting program
CN107786331B (en) Data processing method, device, system and computer readable storage medium
US20140086412A1 (en) Encryption device, encryption method, and encryption program
CN110401527B (en) Data encryption and decryption method and device and storage medium
TW200705944A (en) Protect method thereof
CN106569910B (en) Data backup and transmission method and mobile terminal
CN115146285A (en) File encryption and decryption method and device
CN112272254A (en) Terminal device positioning method, terminal device, system and server
CN106331379B (en) secret communication method and device and portable mobile terminal
CN108028754B (en) Encryption and decryption method, device and terminal
KR20070103113A (en) Encryption /decryption method for voice signal and apparatus for the same
CN108111492B (en) Method for protecting conversation voice for electronic terminal and electronic terminal thereof
CN110190947B (en) Information encryption and decryption method, terminal and computer readable storage medium
CN106161021B (en) Private data sending method and device and private data receiving method and device
CN108650264B (en) Data transmission method, device, equipment and computer readable storage medium
US9467428B2 (en) Information security attachment device for voice communication and information security method for voice communication using the same
CN112333699B (en) Internet of things communication protocol encryption method, equipment and storage medium
US9003180B2 (en) Data encryption and decryption
EP3683706B1 (en) Method and apparatus for encrypting data
KR101156930B1 (en) System and method for outputting data of handheld terminal to external device using image receiver
WO2020044085A1 (en) File processing method and apparatus in near field transmission
CN108984315B (en) Application data processing method and device, terminal and readable medium
CN112953963B (en) System and method for encrypting media stream content

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant