CN112866994A - Encryption communication method for LTE bearing narrowband speech coding - Google Patents

Encryption communication method for LTE bearing narrowband speech coding Download PDF

Info

Publication number
CN112866994A
CN112866994A CN201911095682.8A CN201911095682A CN112866994A CN 112866994 A CN112866994 A CN 112866994A CN 201911095682 A CN201911095682 A CN 201911095682A CN 112866994 A CN112866994 A CN 112866994A
Authority
CN
China
Prior art keywords
encryption
communication service
encryption mode
terminal
encrypted communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911095682.8A
Other languages
Chinese (zh)
Other versions
CN112866994B (en
Inventor
袁乃华
朱玉梅
赵玉霞
闫锐
范晨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu TD Tech Ltd
Original Assignee
Chengdu TD Tech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu TD Tech Ltd filed Critical Chengdu TD Tech Ltd
Priority to CN201911095682.8A priority Critical patent/CN112866994B/en
Publication of CN112866994A publication Critical patent/CN112866994A/en
Application granted granted Critical
Publication of CN112866994B publication Critical patent/CN112866994B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L19/00Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
    • G10L19/04Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis using predictive techniques
    • G10L19/16Vocoder architecture
    • G10L19/167Audio streaming, i.e. formatting and decoding of an encoded audio signal representation into a data stream for transmission or storage purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/16Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • H04W84/08Trunked mobile radio systems

Abstract

The application discloses an encryption communication method and system for LTE bearing narrowband speech coding, wherein the method comprises the following steps: the terminal informs the end-to-end encryption support capability information of the narrowband speech coding communication of the terminal to a network side in advance; the end-to-end encryption support capability information is used for indicating whether the terminal supports end-to-end encryption and supported encryption modes, wherein the encryption modes comprise an encryption mode for appropriating information bits and an encryption mode for not appropriating the information bits; when an end-to-end encrypted communication service is required to be performed, a network side determines an encryption mode adopted by the end-to-end encrypted communication service according to the type of the end-to-end encrypted communication service and the end-to-end encryption support capability information of a terminal related to the service, and triggers the determined encryption mode to perform the end-to-end encrypted communication service. By applying the technical scheme disclosed by the application, the quality of QoS of voice can be effectively improved.

Description

Encryption communication method for LTE bearing narrowband speech coding
Technical Field
The application relates to the technical field of communication, in particular to an encryption communication method for carrying narrowband speech coding by LTE.
Background
With the continuous development of wireless communication technology, the trunking communication technology is developed from an analog system to a narrowband digital trunking system, and meanwhile, with the gradual increase of the requirement of industrial users on wireless broadband, the trunking communication technology is developed from the previous simple voice service to a 3GPP MCPTT and B-Trunc digital trunking communication system in an LTE technology system.
Narrowband digital trunking (PDT) employs narrowband speech coding (NVOC), and TETRA employs AMBE coding format to support languages. An LTE broadband cluster system in 3GPP eMBMS adopts VoIP technology to support voice service, an IP multicast of MBSFN is adopted for a cluster to support a language cluster, IP unicast voice is also supported, VoIP or AMR Over PDCP is adopted in B-Trunc to support the language service, and the language coding adopts an AMR coding format. Since voice is a basic service requirement, the radius of a voice service outdoor coverage cell of a narrowband voice cluster, such as a 350MHz PDT NVOC-encoded voice service is about 11.5Km, while the radius of an AMR-encoded voice coverage cell of a 350MHz FDD LTE is about 8Km, and the radius of a LTE voice coverage cell of 1.4GHz is about 2-5 Km, there is an obvious rate coverage disadvantage when the LTE is adopted to carry AMR voice. The narrowband speech coding technology can also be borne on an LTE broadband trunking system, and the group capacity of the LTE broadband trunking system can be greatly improved.
The narrowband voice trunking system supports end-to-end encryption during voice communication. Because the bearing capacity of the air interface of the narrow-band system is limited and the voice bearing capacity of the air interface is determined, the end-to-end encryption of the narrow-band system, such as a PDT system, is realized by adopting a mode of extracting bits of part of voice frames from user plane data and transmitting encryption control information.
As shown in fig. 1, the PDT system carries 2-way voice over one carrier. The 2 TDMA bursts of 30ms of the air gap form a 60ms TDMA frame, and each path of voice is carried by 1 TDMA frame of 30 ms.
As shown in fig. 2, each 30ms burst carries a 216-bit payload, which can carry 3 NVOC speech frames (72 bits x 3).
To implement end-to-end encryption, the PDT system needs to steal some information bits in the voice frame when the end-to-end encryption function is enabled, so as to carry the voice frame sequence number, which is used for the generation and synchronization of the key stream.
As shown in fig. 3, the vocoder at the transmitting side preferentially encodes 60ms plaintext voice into one voice frame; and carrying out XOR on the voice frame data stream and the key stream, and then outputting a ciphertext voice frame after carrying the voice frame serial number with 12 bits by using the information bit in the voice frame.
Correspondingly, after receiving the cipher text voice frame, the vocoder of the receiving party firstly puts forward a 12-bit voice frame serial number from the cipher text data stream; then, the encrypted voice is subjected to exclusive OR with the key stream, and the decrypted voice is restored to be plaintext voice.
In the end-to-end encryption of the voice service of the narrowband system, due to the limitation of the bearing capacity of an air interface, the end-to-end encryption must adopt useful information bits of a stealing voice frame so as to carry a voice frame sequence number for the generation and synchronization of key streams of two communication parties. In the encryption mode, the useful information bits of the voice frames need to be stolen, so that the integrity of the voice data is damaged, the voice data corresponding to the useful information bits are missing for a receiving end, namely, the receiving end cannot receive the voice data corresponding to the useful information bits, and the error code resistance and the QoS quality of the voice data are influenced.
In a voice service scene, the LTE cluster system can support a narrowband voice coding format and end-to-end encryption communication of narrowband voice coding, and the air interface capability is not limited by a similar narrowband system; when the LTE terminal supports end-to-end encryption of narrowband speech coding, if the end-to-end encrypted speech frame number is carried in a manner of stealing information bits of speech frames, the QoS quality of speech is still reduced under the condition of air interface resource surplus.
Disclosure of Invention
In view of this, the main objective of the present invention is to provide an encrypted communication method and system for carrying narrowband speech coding by LTE, which can effectively improve the QoS quality of speech.
In order to achieve the purpose, the technical scheme provided by the invention is as follows:
an encryption communication method for LTE bearing narrowband speech coding comprises the following steps:
the terminal informs the end-to-end encryption support capability information of the narrowband speech coding communication of the terminal to a network side in advance; the end-to-end encryption support capability information is used for indicating whether the terminal supports end-to-end encryption and supported encryption modes, wherein the encryption modes comprise an encryption mode for appropriating information bits and an encryption mode for not appropriating the information bits;
when an end-to-end encrypted communication service is required to be performed, a network side determines an encryption mode adopted by the end-to-end encrypted communication service according to the type of the end-to-end encrypted communication service and the end-to-end encryption support capability information of a terminal related to the service, and triggers the determined encryption mode to perform the end-to-end encrypted communication service.
Preferably, the notifying, by the terminal, the end-to-end encryption support capability information of the terminal to the network side in advance includes:
and the terminal carries the end-to-end encryption support capability information of the terminal when registering a resident network and/or an LTE cluster system.
Preferably, when the end-to-end encrypted communication service is a terminal point-to-point end-to-end encrypted communication service, the determining an encryption mode adopted by the end-to-end encrypted communication service includes:
if the calling party and the called party in the end-to-end encryption communication service both support the encryption mode of the information bit, determining to adopt the end-to-end encryption mode of the information bit;
and if the calling party and the called party in the end-to-end encryption communication service both support end-to-end encryption communication and at least one party does not support an encryption mode not appropriating the information bit, determining to adopt the end-to-end encryption mode appropriating the information bit.
Preferably, when the end-to-end encrypted communication service is an end-to-end encrypted communication service of a trunked voice, the determining an encryption mode adopted by the end-to-end encrypted communication service includes:
if all group terminals in the end-to-end encryption communication service support the encryption mode of not appropriating the information bit, determining to adopt the end-to-end encryption mode of not appropriating the information bit;
and if all the group terminals in the end-to-end encryption communication service support end-to-end encryption communication and at least one group terminal does not support an encryption mode not appropriating the information bit, determining to adopt the end-to-end encryption mode appropriating the information bit.
Preferably, the method further comprises:
when an encryption mode that information bit positions are not stolen is adopted, the network side schedules sending and receiving of ciphertext voice frame data according to the length of a ciphertext voice frame output by end-to-end encryption; the cipher text voice frame is the combination of the cipher text information flow and the voice frame number corresponding to the voice frame data.
An encrypted communication system for LTE bearing narrowband speech coding, comprising:
the terminal informs the end-to-end encryption support capability information of the narrowband speech coding communication of the terminal to a network side server in advance; the end-to-end encryption support capability information is used for indicating whether the terminal supports end-to-end encryption and supported encryption modes, wherein the encryption modes comprise an encryption mode for appropriating information bits and an encryption mode for not appropriating the information bits;
and the server determines the encryption mode adopted by the end-to-end encrypted communication service according to the type of the end-to-end encrypted communication service and the end-to-end encryption support capability information of the terminal related to the service when the end-to-end encrypted communication service is required to be carried out, and triggers the end-to-end encrypted communication service to be carried out by adopting the determined encryption mode.
Preferably, the terminal is specifically configured to carry the end-to-end encryption support capability information of the terminal when registering in a residential network and/or an LTE trunking system.
Preferably, the server is specifically configured to determine, when the end-to-end encrypted communication service is a terminal point-to-point end-to-end encrypted communication service, an encryption manner used by the end-to-end encrypted communication service, and includes:
if the calling party and the called party in the end-to-end encryption communication service both support the encryption mode of the information bit, determining to adopt the end-to-end encryption mode of the information bit;
and if the calling party and the called party in the end-to-end encryption communication service both support end-to-end encryption communication and at least one party does not support an encryption mode not appropriating the information bit, determining to adopt the end-to-end encryption mode appropriating the information bit.
Preferably, the server is specifically configured to determine, when the end-to-end encrypted communication service is an end-to-end encrypted communication service of a trunking voice, an encryption manner used by the end-to-end encrypted communication service, and includes:
if all group terminals in the end-to-end encryption communication service support the encryption mode of not appropriating the information bit, determining to adopt the end-to-end encryption mode of not appropriating the information bit;
and if all the group terminals in the end-to-end encryption communication service support end-to-end encryption communication and at least one group terminal does not support an encryption mode not appropriating the information bit, determining to adopt the end-to-end encryption mode appropriating the information bit.
Preferably, the system further comprises:
the base station schedules and transmits and receives ciphertext voice frame data according to the length of a ciphertext voice frame output by end-to-end encryption when an encryption mode of not stealing information bits is adopted; the cipher text voice frame is the combination of the cipher text information flow and the voice frame number corresponding to the voice frame data.
According to the technical scheme, when end-to-end encryption communication service is required, the encryption communication method and the encryption communication system for the LTE bearing narrow-band voice coding adopt the strategy of preferentially selecting the encryption mode not appropriating the information bit according to the end-to-end encryption support capability information of the narrow-band voice coding communication of the related terminal, and determine the adopted encryption mode for the end-to-end encryption communication service, so that the QoS quality of voice can be ensured by fully utilizing the advantages of the encryption mode not appropriating the information bit, and the QoS quality of voice can be effectively improved.
Drawings
Fig. 1 is a schematic diagram of multiplexing of an air interface 2 timeslot in a conventional PDT system;
FIG. 2 is a schematic diagram of a general burst structure of a conventional PDT system;
FIG. 3 is a diagram illustrating encryption of conventional stealing information bits;
FIG. 4 is a schematic flow chart of a method according to an embodiment of the present invention;
fig. 5 is a schematic diagram of encryption of a misappropriated information bit according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is further described in detail below by referring to the accompanying drawings and examples.
Fig. 4 is a schematic method flow diagram of an embodiment of the present invention, and as shown in fig. 4, the encrypted communication method for LTE-bearing narrowband speech coding implemented in the embodiment mainly includes the following steps:
step 401, the terminal notifies the end-to-end encryption support capability information of the narrowband speech coding communication of the terminal to the network side in advance; the end-to-end encryption support capability information is used for indicating whether the terminal supports end-to-end encryption and supported encryption modes, wherein the encryption modes comprise an encryption mode for appropriating information bits and an encryption mode for not appropriating the information bits.
In this step, in order to configure a suitable encryption mode for the end-to-end encrypted communication service by the network side to improve transmission quality, the terminal needs to notify the network side of the end-to-end encryption support capability information of the narrowband speech coding communication of the terminal.
Preferably, the terminal may notify the network side of its end-to-end encryption support capability information in advance by using the following method:
and the terminal carries the end-to-end encryption support capability information of the terminal when registering a resident network and/or an LTE cluster system.
Step 402, when an end-to-end encrypted communication service needs to be performed, a network side determines an encryption mode adopted by the end-to-end encrypted communication service according to the type of the end-to-end encrypted communication service and the end-to-end encryption support capability information of a terminal involved in the service, and triggers the determined encryption mode to perform the end-to-end encrypted communication service.
In this step, in order to avoid the problem of voice QoS degradation caused by using an encryption method that steals the information bit of the voice frame even when the air interface resources are abundant, the encryption method used is determined according to the end-to-end encryption support capability of each terminal involved in the service.
In practical application, when the present application is applied to an LTE broadband trunking system, the trunking server may specifically determine an encryption manner used by the end-to-end encrypted communication service in this step, and trigger the determined encryption manner to perform the end-to-end encrypted communication service.
Preferably, when the end-to-end encrypted communication service is a terminal point-to-point end-to-end encrypted communication service, the following method may be used to determine the encryption mode used by the end-to-end encrypted communication service:
if the calling party and the called party in the end-to-end encryption communication service both support the encryption mode of the information bit, determining to adopt the end-to-end encryption mode of the information bit;
and if the calling party and the called party in the end-to-end encryption communication service both support end-to-end encryption communication and at least one party does not support an encryption mode not appropriating the information bit, determining to adopt the end-to-end encryption mode appropriating the information bit.
Preferably, when the end-to-end encrypted communication service is an end-to-end encrypted communication service of trunking voice, the following method may be adopted to determine the encryption mode adopted by the end-to-end encrypted communication service:
if all group terminals in the end-to-end encryption communication service support the encryption mode of not appropriating the information bit, determining to adopt the end-to-end encryption mode of not appropriating the information bit;
and if all the group terminals in the end-to-end encryption communication service support end-to-end encryption communication and at least one group terminal does not support an encryption mode not appropriating the information bit, determining to adopt the end-to-end encryption mode appropriating the information bit.
In practical application, in the interworking of the LTE broadband cluster and the PDT cluster, considering the need of a compatible narrowband system, the above method allows the end-to-end encryption mechanism for stealing information bits. For other narrowband speech coding, such as AMBE, end-to-end encryption can also be performed in a similar manner, not stealing user plane information bits.
The method for determining the encryption mode can be seen as follows: by determining whether the encryption and decryption mode of stealing information bits or the encryption and decryption mode of not stealing information bits is adopted during voice encryption communication for the terminals participating in voice communication according to the end-to-end encryption capability of the terminals, the encryption modes of the narrowband terminal and the broadband terminal are compatible, and therefore, the intercommunication requirement between the terminals can be met under the condition that a large number of wideband cluster systems and narrowband cluster voice scenes exist in the transition period from a narrowband cluster to a wideband cluster.
In practical applications, as shown in fig. 5, when the encryption method that does not steal information bits is adopted, the corresponding encryption communication process can be implemented by the following method:
in each frame generated by voice stream, a vocoder of a data sending party firstly encodes 60ms plaintext voice into a voice frame, and inputs the data stream of the voice frame into an encryption security chip, the encryption security chip adopts an encryption mode of not stealing information bits to output a voice key stream and a voice frame sequence number (FN), the voice key stream is generated according to the voice frame sequence number and a preset key, the voice data stream and the voice key stream are subjected to XOR to generate a ciphertext information stream, and then the ciphertext information stream and the voice frame sequence number are assembled to obtain corresponding ciphertext voice frame output.
After receiving the cipher text voice frame, the vocoder of the data receiver provides the serial number of the voice frame and the cipher text information flow from the corresponding cipher text data flow; and generating a voice key stream according to the voice frame serial number and a preset key, and carrying out XOR on the extracted ciphertext information stream and the locally generated voice key stream to obtain corresponding plaintext voice.
Preferably, when an encryption mode that does not steal information bits is adopted, in order to adapt to the encryption mode, the network side schedules sending and receiving of ciphertext voice frame data according to the length of a ciphertext voice frame output by end-to-end encryption at the moment; the ciphertext voice frame is a combination of a ciphertext information stream and a voice frame number corresponding to the voice frame data, the data length is the ciphertext information stream length plus the voice frame serial number length, if the voice frame in the PDT system adopts a 2.4K/3.6K coding rate, 216-bit voice data is generated every 60ms, end-to-end encryption without stealing information bit is adopted, and the 60ms ciphertext voice frame can increase the length of 12 bits; if the coding time interval is 20ms, every 20ms frame needs to increase the FSN of 4 bits, and 3 20ms frames increase the speech frame number of 12 bits. And the LTE base station in the broadband trunking system schedules to send and receive the ciphertext voice frame data according to the increased length.
In practical applications, the end-to-end encryption method for stealing information bits is the same as the existing narrowband speech encryption method, and is not described herein again.
By the embodiment of the method, when the terminal resides in the network and initiates the registration of the LTE cluster system, the cluster communication system carries the end-to-end encryption support capability information of the narrowband speech coding communication of the terminal, so that the network side can obtain the encryption support capability and the encryption support mode of the terminal: stealing encryption of information bits or not stealing encryption of information bits.
In a cluster system, when a terminal initiates point-to-point end-to-end communication and cluster end-to-end encryption communication, if a calling party/a called party of two communication parties in a point call and a cluster terminal in a group support an encryption mode of not stealing information bits, a working mode of a security chip can be set to be encryption of the not stealing information bits; carrying out a mode of combining key stream encryption and voice frame number on the voice code stream to generate a ciphertext voice frame; the receiver analyzes and decomposes the ciphertext voice frame into a ciphertext information stream and a voice frame number to decrypt the voice code stream according to the encryption mode of not stealing the information bit. Therefore, the method can adopt the nonappropriation voice information bit in the LTE cluster communication system, support the end-to-end voice encryption function and improve the quality of the anti-interference capability QoS of voice communication.
Meanwhile, the utilization of a narrow-band system and a security chip in a transition stage is considered, and an end-to-end encryption mode is set according to the encryption capacity of a terminal in communication, so that the encryption mode of stealing information bits or not stealing information bits can be supported, and the original encryption mode of stealing information bits is adopted for the encrypted wide-band terminal and the narrow-band terminal which do not support not stealing information bits, so that the end-to-end encrypted voice communication of a narrow-band system and the terminal is compatible.
Corresponding to the above method embodiment, the present application further provides an encrypted communication system for carrying narrowband speech coding by LTE, including:
the terminal informs the end-to-end encryption support capability information of the narrowband speech coding communication of the terminal to a network side server in advance; the end-to-end encryption support capability information is used for indicating whether the terminal supports end-to-end encryption and supported encryption modes, wherein the encryption modes comprise an encryption mode for appropriating information bits and an encryption mode for not appropriating the information bits;
and the server determines the encryption mode adopted by the end-to-end encrypted communication service according to the type of the end-to-end encrypted communication service and the end-to-end encryption support capability information of the terminal related to the service when the end-to-end encrypted communication service is required to be carried out, and triggers the end-to-end encrypted communication service to be carried out by adopting the determined encryption mode.
Preferably, the terminal is specifically configured to carry the end-to-end encryption support capability information of the terminal when registering in a residential network and/or an LTE trunking system.
Preferably, the server is specifically configured to determine, when the end-to-end encrypted communication service is a terminal point-to-point end-to-end encrypted communication service, an encryption manner used by the end-to-end encrypted communication service, and includes:
if the calling party and the called party in the end-to-end encryption communication service both support the encryption mode of the information bit, determining to adopt the end-to-end encryption mode of the information bit;
and if the calling party and the called party in the end-to-end encryption communication service both support end-to-end encryption communication and at least one party does not support an encryption mode not appropriating the information bit, determining to adopt the end-to-end encryption mode appropriating the information bit.
Preferably, the server is specifically configured to determine, when the end-to-end encrypted communication service is an end-to-end encrypted communication service of a trunking voice, an encryption manner used by the end-to-end encrypted communication service, and includes:
if all group terminals in the end-to-end encryption communication service support the encryption mode of not appropriating the information bit, determining to adopt the end-to-end encryption mode of not appropriating the information bit;
and if all the group terminals in the end-to-end encryption communication service support end-to-end encryption communication and at least one group terminal does not support an encryption mode not appropriating the information bit, determining to adopt the end-to-end encryption mode appropriating the information bit.
Preferably, the system further comprises:
the base station schedules and transmits and receives ciphertext voice frame data according to the length of a ciphertext voice frame output by end-to-end encryption when an encryption mode of not stealing information bits is adopted; the cipher text voice frame is the combination of the cipher text information flow and the voice frame number corresponding to the voice frame data.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the scope of protection of the present application.

Claims (10)

1. An encryption communication method for carrying narrowband speech coding by LTE (Long term evolution), comprising the following steps:
the terminal informs the end-to-end encryption support capability information of the narrowband speech coding communication of the terminal to a network side in advance; the end-to-end encryption support capability information is used for indicating whether the terminal supports end-to-end encryption and supported encryption modes, wherein the encryption modes comprise an encryption mode for appropriating information bits and an encryption mode for not appropriating the information bits;
when an end-to-end encrypted communication service is required to be performed, a network side determines an encryption mode adopted by the end-to-end encrypted communication service according to the type of the end-to-end encrypted communication service and the end-to-end encryption support capability information of a terminal related to the service, and triggers the determined encryption mode to perform the end-to-end encrypted communication service.
2. The method of claim 1, wherein: the terminal informs the network side of the self end-to-end encryption support capability information in advance, and the method comprises the following steps:
and the terminal carries the end-to-end encryption support capability information of the terminal when registering a resident network and/or an LTE cluster system.
3. The method of claim 1, wherein: when the end-to-end encrypted communication service is a terminal point-to-point end-to-end encrypted communication service, the determining an encryption mode adopted by the end-to-end encrypted communication service includes:
if the calling party and the called party in the end-to-end encryption communication service both support the encryption mode of the information bit, determining to adopt the end-to-end encryption mode of the information bit;
and if the calling party and the called party in the end-to-end encryption communication service both support end-to-end encryption communication and at least one party does not support an encryption mode not appropriating the information bit, determining to adopt the end-to-end encryption mode appropriating the information bit.
4. The method of claim 1, wherein: when the end-to-end encrypted communication service is an end-to-end encrypted communication service of the trunking voice, the determining an encryption mode adopted by the end-to-end encrypted communication service includes:
if all group terminals in the end-to-end encryption communication service support the encryption mode of not appropriating the information bit, determining to adopt the end-to-end encryption mode of not appropriating the information bit;
and if all the group terminals in the end-to-end encryption communication service support end-to-end encryption communication and at least one group terminal does not support an encryption mode not appropriating the information bit, determining to adopt the end-to-end encryption mode appropriating the information bit.
5. The method of claim 1, wherein: the method further comprises:
when an encryption mode that information bit positions are not stolen is adopted, the network side schedules sending and receiving of ciphertext voice frame data according to the length of a ciphertext voice frame output by end-to-end encryption; the cipher text voice frame is the combination of the cipher text information flow and the voice frame number corresponding to the voice frame data.
6. An encrypted communication system for carrying narrowband speech coding in LTE (Long term evolution), comprising:
the terminal informs the end-to-end encryption support capability information of the narrowband speech coding communication of the terminal to a network side server in advance; the end-to-end encryption support capability information is used for indicating whether the terminal supports end-to-end encryption and supported encryption modes, wherein the encryption modes comprise an encryption mode for appropriating information bits and an encryption mode for not appropriating the information bits;
and the server determines the encryption mode adopted by the end-to-end encrypted communication service according to the type of the end-to-end encrypted communication service and the end-to-end encryption support capability information of the terminal related to the service when the end-to-end encrypted communication service is required to be carried out, and triggers the end-to-end encrypted communication service to be carried out by adopting the determined encryption mode.
7. The system of claim 6, wherein:
the terminal is specifically configured to carry the end-to-end encryption support capability information of the terminal when registering a resident network and/or an LTE trunking system.
8. The system of claim 6, wherein:
the server is specifically configured to determine, when the end-to-end encrypted communication service is a terminal point-to-point end-to-end encrypted communication service, an encryption mode used by the end-to-end encrypted communication service, and includes:
if the calling party and the called party in the end-to-end encryption communication service both support the encryption mode of the information bit, determining to adopt the end-to-end encryption mode of the information bit;
and if the calling party and the called party in the end-to-end encryption communication service both support end-to-end encryption communication and at least one party does not support an encryption mode not appropriating the information bit, determining to adopt the end-to-end encryption mode appropriating the information bit.
9. The system of claim 6, wherein:
the server is specifically configured to determine, when the end-to-end encrypted communication service is an end-to-end encrypted communication service of a trunking voice, an encryption mode used by the end-to-end encrypted communication service, and includes:
if all group terminals in the end-to-end encryption communication service support the encryption mode of not appropriating the information bit, determining to adopt the end-to-end encryption mode of not appropriating the information bit;
and if all the group terminals in the end-to-end encryption communication service support end-to-end encryption communication and at least one group terminal does not support an encryption mode not appropriating the information bit, determining to adopt the end-to-end encryption mode appropriating the information bit.
10. The system of claim 6, wherein: the system further comprises:
the base station schedules and transmits and receives ciphertext voice frame data according to the length of a ciphertext voice frame output by end-to-end encryption when an encryption mode of not stealing information bits is adopted; the cipher text voice frame is the combination of the cipher text information flow and the voice frame number corresponding to the voice frame data.
CN201911095682.8A 2019-11-11 2019-11-11 Encryption communication method and system for carrying narrowband speech coding by LTE (Long term evolution) Active CN112866994B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911095682.8A CN112866994B (en) 2019-11-11 2019-11-11 Encryption communication method and system for carrying narrowband speech coding by LTE (Long term evolution)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911095682.8A CN112866994B (en) 2019-11-11 2019-11-11 Encryption communication method and system for carrying narrowband speech coding by LTE (Long term evolution)

Publications (2)

Publication Number Publication Date
CN112866994A true CN112866994A (en) 2021-05-28
CN112866994B CN112866994B (en) 2023-03-31

Family

ID=75984129

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911095682.8A Active CN112866994B (en) 2019-11-11 2019-11-11 Encryption communication method and system for carrying narrowband speech coding by LTE (Long term evolution)

Country Status (1)

Country Link
CN (1) CN112866994B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113438609A (en) * 2021-08-27 2021-09-24 深圳市晨讯物联科技有限公司 Method, system, device and storage medium for scheduling communication with integration of width and width

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102404729A (en) * 2010-10-29 2012-04-04 公安部第一研究所 End-to-end speech encryption method for low-speed narrowband wireless digital communication
EP2852200A1 (en) * 2013-09-19 2015-03-25 Airbus Defence and Space Oy Communication in a system having different user data qualities
CN105045368A (en) * 2015-06-17 2015-11-11 四川长虹通信科技有限公司 Mobile terminal and secure communication device thereof
US20160029211A1 (en) * 2013-05-16 2016-01-28 Fujitsu Limited Terminal device, communication system, and terminal device readable storage medium
CN103402198B (en) * 2013-07-28 2016-05-18 浙江宏睿通信技术有限公司 A kind of method that radio communication terminal encryption parameter transmits
CN106790281A (en) * 2017-02-23 2017-05-31 深圳市沃阳精密科技有限公司 A kind of end-to-end voice encryption device and encryption method towards intercom system
CN104602200B (en) * 2015-01-26 2017-11-28 清华大学 A kind of fusion method of arrowband group service for timesharing long term evolution base station
US20170347307A1 (en) * 2016-05-26 2017-11-30 Parallel Wireless, Inc. End-to-End Prioritization for Mobile Base Station
CN108597529A (en) * 2018-01-22 2018-09-28 北京交通大学 A kind of police digital cluster system air interface speech monitoring system and method
CN109714295A (en) * 2017-10-25 2019-05-03 普天信息技术有限公司 A kind of voice encryption/decryption synchronization processing method and device
CN109728884A (en) * 2017-10-27 2019-05-07 成都鼎桥通信技术有限公司 Company-data transmission method and equipment
CN109729552A (en) * 2017-10-27 2019-05-07 成都鼎桥通信技术有限公司 Voice transmission method and device
CN109729499A (en) * 2017-10-30 2019-05-07 成都鼎桥通信技术有限公司 The voice group call service processing method and system of LTE trunked communication system
CN109729553A (en) * 2017-10-30 2019-05-07 成都鼎桥通信技术有限公司 The voice service processing method and equipment of LTE trunked communication system

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102404729A (en) * 2010-10-29 2012-04-04 公安部第一研究所 End-to-end speech encryption method for low-speed narrowband wireless digital communication
US20160029211A1 (en) * 2013-05-16 2016-01-28 Fujitsu Limited Terminal device, communication system, and terminal device readable storage medium
CN103402198B (en) * 2013-07-28 2016-05-18 浙江宏睿通信技术有限公司 A kind of method that radio communication terminal encryption parameter transmits
EP2852200A1 (en) * 2013-09-19 2015-03-25 Airbus Defence and Space Oy Communication in a system having different user data qualities
CN104602200B (en) * 2015-01-26 2017-11-28 清华大学 A kind of fusion method of arrowband group service for timesharing long term evolution base station
CN105045368A (en) * 2015-06-17 2015-11-11 四川长虹通信科技有限公司 Mobile terminal and secure communication device thereof
US20170347307A1 (en) * 2016-05-26 2017-11-30 Parallel Wireless, Inc. End-to-End Prioritization for Mobile Base Station
CN106790281A (en) * 2017-02-23 2017-05-31 深圳市沃阳精密科技有限公司 A kind of end-to-end voice encryption device and encryption method towards intercom system
CN109714295A (en) * 2017-10-25 2019-05-03 普天信息技术有限公司 A kind of voice encryption/decryption synchronization processing method and device
CN109728884A (en) * 2017-10-27 2019-05-07 成都鼎桥通信技术有限公司 Company-data transmission method and equipment
CN109729552A (en) * 2017-10-27 2019-05-07 成都鼎桥通信技术有限公司 Voice transmission method and device
CN109729499A (en) * 2017-10-30 2019-05-07 成都鼎桥通信技术有限公司 The voice group call service processing method and system of LTE trunked communication system
CN109729553A (en) * 2017-10-30 2019-05-07 成都鼎桥通信技术有限公司 The voice service processing method and equipment of LTE trunked communication system
CN108597529A (en) * 2018-01-22 2018-09-28 北京交通大学 A kind of police digital cluster system air interface speech monitoring system and method

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
GÉZA HORVÁTH ECT.: "End-to-end QoS Management Across LTE Networks", 《2013 21ST INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS - (SOFTCOM 2013)》 *
付志: "窄带语音数据加密通信技术的研究与仿真实现", 《信息通信》 *
周超河: "浅析数字集群通信系统的加密机制", 《信息通信》 *
朱振荣等: "PDT系统端到端语音加密方案研究", 《警察技术》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113438609A (en) * 2021-08-27 2021-09-24 深圳市晨讯物联科技有限公司 Method, system, device and storage medium for scheduling communication with integration of width and width
CN113438609B (en) * 2021-08-27 2021-11-19 深圳市晨讯物联科技有限公司 Method, system, device and storage medium for scheduling communication with integration of width and width

Also Published As

Publication number Publication date
CN112866994B (en) 2023-03-31

Similar Documents

Publication Publication Date Title
EP1878285B1 (en) Fast user plane establishment in a telecommunications network
CN101300885B (en) Traffic generation during inactive user plane
US7657036B2 (en) Determining a session encryption key during a broadcast/multicast service session using secure real-time transport protocol
USRE39990E1 (en) Increasing channel capacity in fixed cellular networks
KR20030088046A (en) Method and apparatus for data transport in a wireless communication system
CN106982419B (en) Single call end-to-end encryption method and system for broadband cluster system
JP2005507572A5 (en)
KR20050056915A (en) Selecting a packet data serving node for multi-cast/broadcast services
CN106790281A (en) A kind of end-to-end voice encryption device and encryption method towards intercom system
KR20100087023A (en) End-to-end encrypted communication
EP3504933B1 (en) Interworking between tetra and mcptt systems during end-to-end encrypted speech calls.
CN115348579B (en) Voice encryption method applied to wireless earphone and encryption type wireless earphone
CN105828351A (en) Method and system for carrying out monitoring on terminal or group
CN1283063A (en) Encryption method for mobile telephone
CN109714295B (en) Voice encryption and decryption synchronous processing method and device
CN112866994B (en) Encryption communication method and system for carrying narrowband speech coding by LTE (Long term evolution)
CN103634744A (en) Cluster group call end-to-end encryption realization method
CN104135370A (en) Communication method, communication system and communication terminals
CN101155328A (en) Method for deleting/amending multicast broadcasting service in communication system
CN100550729C (en) A kind of method for authenticating when in code division multiple access system, using for digital clustering operation
CN101902734B (en) End-to-end self-synchronization voice encryption transmission implementation method for digital trunking communication system
CN101127596B (en) A method and system for program stream secret key encryption in broadcast mobile TV service
CN103596136A (en) Cluster group call end-to-end encryption method under single base station mode
CN101355720A (en) Network bearing architecture, method and adapter for implementing broadcast/multicast service
CN101562582B (en) New VOIP framework in wireless access system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant