CN113645613B - Cellular mobile network real-time voice encryption equipment and method - Google Patents

Cellular mobile network real-time voice encryption equipment and method Download PDF

Info

Publication number
CN113645613B
CN113645613B CN202110772795.8A CN202110772795A CN113645613B CN 113645613 B CN113645613 B CN 113645613B CN 202110772795 A CN202110772795 A CN 202110772795A CN 113645613 B CN113645613 B CN 113645613B
Authority
CN
China
Prior art keywords
voice
module
data
encryption equipment
cellular mobile
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110772795.8A
Other languages
Chinese (zh)
Other versions
CN113645613A (en
Inventor
郁滨
黄一才
张体奎
李森森
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Information Engineering University of PLA Strategic Support Force
Original Assignee
Information Engineering University of PLA Strategic Support Force
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Information Engineering University of PLA Strategic Support Force filed Critical Information Engineering University of PLA Strategic Support Force
Priority to CN202110772795.8A priority Critical patent/CN113645613B/en
Publication of CN113645613A publication Critical patent/CN113645613A/en
Application granted granted Critical
Publication of CN113645613B publication Critical patent/CN113645613B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L19/00Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
    • G10L19/005Correction of errors induced by the transmission channel, if related to the coding algorithm
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L19/00Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
    • G10L19/04Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis using predictive techniques
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/0057Block codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L19/00Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
    • G10L2019/0001Codebooks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention belongs to the technical field of network information security, and particularly relates to a real-time voice encryption device and a method for a cellular mobile network, wherein the voice encryption device is divided into a receiving end voice encryption device and a transmitting end voice encryption device, bluetooth connection is respectively established with cellular mobile phones, and a cellular mobile network voice channel is established between the cellular mobile phones; the transmitting end voice encryption equipment and the receiving end voice encryption equipment comprise a voice call module, a source coding module, a sequence cipher module, a channel coding module, a voice-like modulation module and a Bluetooth connection module; and when receiving the opposite voice signals, the receiving-end voice encryption equipment processes the opposite voice signals according to the reverse sequence of the sending-end voice encryption equipment and outputs the plain voice to the user earphone. The invention can be suitable for the real-time voice encryption means of different types of cellular mobile networks to solve the safety problem of the voice channel of the current cellular mobile network.

Description

Cellular mobile network real-time voice encryption equipment and method
Technical Field
The invention belongs to the technical field of network information security, and particularly relates to a device and a method for encrypting cellular mobile network real-time voice.
Background
Cellular mobile networks are generally composed of mobile terminals, radio access networks and core networks in structure, and voice signal transmission includes two phases, namely over-the-air transmission between mobile terminals and base stations and core network transmission. In 2G and 3G networks, voice signals in the core network are transmitted in a plaintext manner, authentication of the access network is not supported in the air transmission stage, the used A5-series cryptographic algorithm is fragile, and part of mobile operators do not support the encryption scheme, so that a large security threat is faced. In 4G and 5G networks, although the security system is subject to enhanced reconfiguration, all-IP packet data transmission poses a security threat to conventional networks. Furthermore, in all of the 2G to 5G networks, the voice communication security architecture is controlled by the mobile operator, and the privacy of the user is difficult to guarantee. Thus, secure communication of voice channels in cellular mobile networks is accomplished by end-to-end encryption techniques.
In the voice over-the-air transmission stage of the cellular mobile network, vocoders deployed at mobile terminals and base stations perform parameter coding transmission on voice signals, and improve channel utilization by using techniques such as voice-activated detection (voice-activity detection, VAD) and discontinuous transmission (discontinuous transmission, DTX), and signals without voice features are regarded as noise drops. Thus, the voice signal is randomized after being digitally encrypted, and loses the voice characteristic, and is difficult to transmit in a cellular mobile network.
Disclosure of Invention
In order to solve the problems in the prior art, the invention provides a device and a method for encrypting the real-time voice of a cellular mobile network, which can be applied to the real-time voice encryption means of different types of cellular mobile networks so as to solve the safety problem of the voice channel of the current cellular mobile network.
In order to solve the technical problems, the invention adopts the following technical scheme:
the invention provides a real-time voice encryption device of a cellular mobile network, which is divided into a receiving end voice encryption device and a transmitting end voice encryption device, bluetooth connection is respectively established with the cellular mobile phones, and a cellular mobile network voice channel is established between the cellular mobile phones;
the transmitting end voice encryption equipment comprises a voice call module, a source coding module, a sequence cipher module, a channel coding module, a voice-like modulation module and a Bluetooth connection module which are sequentially connected according to a voice transmission direction; the voice call module is used for picking up the voice of the user and amplifying, sampling and quantizing the voice when the user speaks; the source coding module is used for compressing and coding the voice data frame into voice parameters; the sequence cipher module is used for encrypting the voice parameters into the close-language data; the channel coding module is used for carrying out forward error correction on the transmitted compact morphology data; the voice-like modulation module is used for mapping the close-language data subjected to forward error correction into voice-like signals; the Bluetooth connection module is used for establishing a voice transmission channel with the cellular mobile phone;
the receiving end voice encryption equipment comprises a Bluetooth connection module, a voice-like modulation module, a channel coding module, a sequence password module, a source coding module and a voice call module which are sequentially connected according to the voice transmission direction, and when receiving the voice signals of the opposite side, the receiving end voice encryption equipment processes according to the reverse order of the sending end voice encryption equipment and outputs plain language voice to the user earphone.
Further, the voice-like modulation module comprises a modulation codebook, a modulator, a signal recorder, a signal compensator, a demodulator and a demodulation codebook;
the modulator maps the compact morphology data subjected to forward error correction into waveform symbols in a modulation codebook which is generated in advance in an optimized way, performs filtering shaping to eliminate high-frequency harmonic waves, and transmits the waveform symbols to a voice channel of a cellular mobile network;
the signal compensator performs waveform compensation on the received transmitting-end voice-like signal according to the history voice-like data recorded by the signal recorder, and then the demodulator demodulates the compensated signal into target data by using a demodulation codebook.
Further, the modulator, the signal recorder, the signal compensator and the demodulator need to train the demodulation codebook through online learning, and the process is as follows: the modulator of the transmitting-end voice encryption equipment maps the random number sequences shared and prefabricated by the two parties into waveform symbols in a modulation codebook and transmits the waveform symbols to the opposite end through a voice channel of a cellular mobile network; the receiving end voice encryption equipment learns to generate an optimal demodulation codebook according to the prefabricated random number sequence and the modulation codebook shared by the two parties, and trains signal compensation weights.
Further, the channel coding module comprises a coding module, an interleaving module, an inverse interleaving module and a decoding module;
the coding module of the transmitting-end voice encryption equipment codes the compact-morphology data by using a multi-core polarization code, then carries out data interleaving/column data interleaving by an interleaving module, and finally carries out data interleaving/column data interleaving by a DoV link transmission;
the reverse interleaving module of the receiving end voice encryption equipment performs reverse interleaving transformation of the data of the execution/column, and then decodes the data into target data through the decoding module.
Further, the sequence cipher module comprises an authentication key negotiation module, a key synchronization module and an encryption and decryption module;
the encryption and decryption module is a sequence cipher algorithm using two parameters of a seed key and an initial vector, the seed key is kept unchanged in one session, and the initial vector is replaced periodically; the working process is as follows: the encryption and decryption module of the sending-end voice encryption equipment uses a password generation algorithm, encrypts transmission data based on a modulo two addition operation and transmits the transmission data through a DoV link; the encryption and decryption module of the receiving end voice encryption equipment decrypts the received data based on the second-mode encryption operation;
the key synchronization module is used for performing key synchronization; the process comprises the steps of synchronizing two parts of contents of initial vector synchronization and data frame sequence number synchronization, and realizing the two parts of contents by using a data checksum prediction technology;
the authentication key negotiation module is used for negotiating a seed key, and comprises the following steps: the receiving end voice encryption equipment and the transmitting end voice encryption equipment complete terminal registration through a private key generation center before conversation, and during conversation, the receiving end voice encryption equipment and the transmitting end voice encryption equipment complete seed key negotiation based on identity authentication based on a certificate-free public key cryptosystem.
Further, the source coding module adopts MELP algorithm, and the working process is as follows: the source coding module of the transmitting-end voice encryption equipment compresses and codes the voice data frames sampled and quantized by the voice communication module into voice parameters by using an MELP algorithm, and then the voice parameters are encrypted by the sequence encryption module; the source coding module of the receiving end voice encryption equipment rebuilds plain language voice based on the voice parameters decrypted by the sequence password module and outputs the plain language voice to the voice call module.
Further, the voice call module comprises a microphone voice driving module, a sampling quantization module and a voice power amplification driving module, wherein the microphone voice driving module of the sending end voice encryption equipment is used for amplifying and conveying weak voice signals of a microphone of a user to the sampling quantization module; and the voice power amplification driving module of the receiving end voice encryption equipment performs power amplification on the reconstructed plain language voice and outputs the reconstructed plain language voice to the user earphone.
Further, the receiving-end voice encryption device and the sending-end voice encryption device are earphone, watch or wearable device.
Further, the voice encryption device further comprises a control module, a display module, a battery and a power supply module.
The invention also provides a method for encrypting the cellular mobile network real-time voice, which comprises the following steps:
for the transmitting end:
when a user speaks, a voice call module of the voice encryption equipment at the transmitting end picks up the voice of the user, amplifies, samples and quantizes the voice, and then the voice data frame is transmitted to a source coding module for compression coding into voice parameters; encrypting the voice signals into dense language data through a sequence cipher module, transmitting the dense language data to a channel coding module for forward error correction, mapping the dense language data into voice signals through a voice-like modulation module, and transmitting the voice signals to a cellular mobile phone through a Bluetooth connection module;
for the receiving end:
the voice-like modulation module of the receiving end voice encryption equipment demodulates the received voice-like signal into the close-language data, and the close-language data is further transmitted to the sequence cipher module for decryption and conversion into voice parameters after error detection and error correction by the channel coding module, and finally reconstructed into the open-language voice signal by the source coding module, and the open-language voice signal is output to the user earphone after power amplification by the voice call module.
Compared with the prior art, the invention has the following advantages:
the cellular mobile network real-time voice encryption equipment adopts the DoV modulation and demodulation technology based on waveform symbol mapping, the channel coding technology based on multi-core polarization codes and the key negotiation technology of a certificate-free public key cryptosystem, can provide end-to-end voice encryption service for various cellular mobile networks such as 2G to 5G and the like under the condition that the hardware, software or protocol of a mobile phone terminal is not changed and any application is not required to be installed, has the advantages of good network adaptation, high voice restoration quality and high safety intensity, and really realizes digital voice encryption.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a block diagram of a cellular mobile network voice channel real-time encryption communication system constructed by a cellular mobile network real-time voice encryption device and a cellular mobile phone according to an embodiment of the present invention, 10 represents a receiving-side voice encryption device, 20 represents a transmitting-side voice encryption device, and 30 represents a cellular mobile phone;
fig. 2 is a block diagram of the structures of a receiving-side voice encryption device and a transmitting-side voice encryption device according to an embodiment of the present invention; 11 denotes a Bluetooth connection module, 12 denotes a voice-like modulation module, 13 denotes a channel coding module, 14 denotes a sequence coding module, 15 denotes a source coding module, and 16 denotes a voice call module;
FIG. 3 is a block diagram of a speech-like modulation module according to an embodiment of the present invention, 121 representing a modulation codebook, 122 representing a modulator, 124 representing a signal recorder, 126 representing a signal compensator, 128 representing a demodulator, 129 representing a demodulation codebook;
fig. 4 is a block diagram of a channel coding module according to an embodiment of the present invention, where 132 represents a coding module, 134 represents an interleaving module, 136 represents an inverse interleaving module, and 138 represents a decoding module;
FIG. 5 is a block diagram of a sequence cipher module according to an embodiment of the present invention, where 142 represents an authentication key negotiation module, 144 represents a key synchronization module, and 146 represents an encryption and decryption module;
fig. 6 is a block diagram of a voice call module according to an embodiment of the present invention, where 162 represents a microphone voice driving module, 164 represents a sample quantization module, and 166 represents a voice power amplifier driving module.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments, and all other embodiments obtained by those skilled in the art without making any inventive effort based on the embodiments of the present invention are within the scope of protection of the present invention.
Fig. 1 is a block diagram of a cellular mobile network voice channel real-time encryption communication system constructed by a cellular mobile network real-time voice encryption device and a cellular mobile phone, including two voice encryption devices and two cellular mobile phones integrated with a mobile phone specification (HSP) bluetooth module and having access to the network, in this example, the two cellular mobile phones should have connected to the voice phone and establish a bluetooth connection of the HSP specification with the voice encryption device.
As shown in fig. 2, this embodiment proposes a real-time voice encryption device for a cellular mobile network, where the voice encryption device is divided into a receiving-end voice encryption device and a transmitting-end voice encryption device, the receiving-end voice encryption device establishes a bluetooth connection with a cellular mobile phone of the receiving end, the transmitting-end voice encryption device establishes a bluetooth connection with a cellular mobile phone of the transmitting end, and a cellular mobile network voice channel is established between the cellular mobile phones of the two ends to implement real-time voice communication.
The transmitting end voice encryption equipment comprises a voice call module, a source coding module, a sequence cipher module, a channel coding module, a voice-like modulation module and a Bluetooth connection module which are sequentially connected according to a voice transmission direction; the voice call module is used for picking up the voice of the user and amplifying, sampling and quantizing the voice when the user speaks; the source coding module is used for compressing and coding the voice data frame into voice parameters; the sequence cipher module is used for encrypting the voice parameters into the close-language data; the channel coding module is used for carrying out forward error correction on the transmitted compact morphology data; the voice-like modulation module is used for mapping the close-language data subjected to forward error correction into voice-like signals; the Bluetooth connection module is used for establishing a voice transmission channel with the cellular mobile phone, and the encrypted voice data is finally transmitted to the cellular mobile phone to realize transparent transmission of the voice channel in the cellular mobile network.
The receiving end voice encryption equipment comprises a Bluetooth connection module, a voice-like modulation module, a channel coding module, a sequence password module, a source coding module and a voice call module which are sequentially connected according to the voice transmission direction, and when receiving the voice signals of the opposite side, the receiving end voice encryption equipment processes according to the reverse order of the sending end voice encryption equipment and outputs plain language voice to the user earphone.
As shown in fig. 3, the voice-like modulation module includes a modulation codebook, a modulator, a signal recorder, a signal compensator, a demodulator, and a demodulation codebook. The function of the voice-like modulation module is a DoV modulation and demodulation technology based on waveform symbol mapping, and a DoV link for transmitting digital data is established on a voice channel, and the specific working process is as follows: the modulator maps the compact morphology data after forward error correction into waveform symbols in a modulation codebook generated in advance in an optimized way, performs filtering shaping to eliminate high-frequency filtering, and transmits the waveform symbols to a voice channel of a cellular mobile network; the signal compensator performs waveform compensation on the received transmitting-end voice-like signal according to the history voice-like data recorded by the signal recorder, and then the demodulator demodulates the compensated signal into target data by using a demodulation codebook.
Before the working process occurs, the modulator, the signal recorder, the signal compensator and the demodulator need to train a demodulation codebook through online learning, and the working process is as follows: the modulator of the transmitting-end voice encryption equipment maps the random number sequences shared and prefabricated by the two parties into waveform symbols in a modulation codebook and transmits the waveform symbols to the opposite end through a voice channel of a cellular mobile network; the receiving end voice encryption equipment learns to generate an optimal demodulation codebook according to the prefabricated random number sequence and the modulation codebook shared by the two parties, and trains signal compensation weights.
As shown in fig. 4, the channel coding module includes a coding module, an interleaving module, an inverse interleaving module and a decoding module; the working process is as follows: the coding module of the transmitting-end voice encryption equipment codes the compact-morphology data by using a multi-core polarization code, then carries out data interleaving/column data interleaving by an interleaving module, and finally carries out data interleaving/column data interleaving by a DoV link transmission; the reverse interleaving module of the receiving end voice encryption equipment performs reverse interleaving transformation of the data of the execution/column, and then decodes the data into target data through the decoding module.
The coding module comprehensively utilizes the polarized kernel Pasteur parameter boundary and the code element distance maximization rule to implement multi-core polarized code construction irrelevant to the quality of the DoV link; the decoding module performs decoding using a successive-elimination-list (SCL) decoding algorithm based on a log-likelihood ratio (LLR) transfer formula.
As shown in fig. 5, the sequence cipher module includes an authentication key negotiation module, a key synchronization module and an encryption and decryption module. The encryption and decryption module is a sequence cipher algorithm using two parameters of a seed key and an initial vector, the seed key is kept unchanged in one session, and the initial vector is replaced periodically. The working process is as follows: the encryption and decryption module of the sending-end voice encryption equipment uses a password generation algorithm, encrypts transmission data based on 'modulo two addition' operation and transmits the transmission data through a DoV link; and the encryption and decryption module of the receiving end voice encryption equipment decrypts the received data based on the 'mode two encryption' operation.
The key synchronization module is required to perform key synchronization when the working process occurs, and the process comprises two parts of content of initial vector synchronization and data frame sequence number synchronization, and is realized by using a data checksum prediction technology.
Before the working process occurs, the authentication key negotiation module is required to negotiate a seed key, and the process is as follows: the receiving-end voice encryption equipment and the transmitting-end voice encryption equipment complete terminal registration through a private key generation center (private key generator, PKG) before conversation, and during conversation, the receiving-end voice encryption equipment and the transmitting-end voice encryption equipment complete seed key negotiation based on identity authentication based on a certificate-free public key cryptosystem.
Specifically, the source coding module adopts an MELP algorithm, and the working process is as follows: the source coding module of the transmitting-end voice encryption equipment compresses and codes the voice data frames sampled and quantized by the voice communication module into voice parameters by using an MELP algorithm, and then the voice parameters are encrypted by the sequence encryption module; the source coding module of the receiving end voice encryption equipment rebuilds plain language voice based on the voice parameters decrypted by the sequence password module and outputs the plain language voice to the voice call module.
As shown in fig. 6, the voice call module includes a microphone voice driving module, a sampling quantization module and a voice power amplifier driving module, and the working process is as follows: the microphone voice driving module of the transmitting end voice encryption equipment amplifies and transmits weak voice signals of a microphone of a user to the sampling and quantizing module, and then the source coding module carries out parameter coding; and the voice power amplification driving module of the receiving end voice encryption equipment performs power amplification on the reconstructed plain language voice and outputs the reconstructed plain language voice to the user earphone.
In addition to the above structure, the voice encryption apparatus of the present embodiment may further include a control module, a display module, a battery, and a power supply module.
The voice encryption device of the present embodiment may be a wearable device such as an earphone, a watch, or a bracelet, but is not limited thereto.
The embodiment also provides a method for encrypting the cellular mobile network real-time voice, which comprises the following steps:
for the transmitting end:
when a user speaks, a voice call module of the voice encryption equipment at the transmitting end picks up the voice of the user, amplifies, samples and quantizes the voice, and then the voice data frame is transmitted to a source coding module for compression coding into voice parameters; encrypting the voice signals into dense language data through a sequence cipher module, transmitting the dense language data to a channel coding module for forward error correction, mapping the dense language data into voice signals through a voice-like modulation module, and transmitting the voice signals to a cellular mobile phone through a Bluetooth connection module;
for the receiving end:
the voice-like modulation module of the receiving end voice encryption equipment demodulates the received voice-like signal into the close-language data, and the close-language data is further transmitted to the sequence cipher module for decryption and conversion into voice parameters after error detection and error correction by the channel coding module, and finally reconstructed into the open-language voice signal by the source coding module, and the open-language voice signal is output to the user earphone after power amplification by the voice call module.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Finally, it should be noted that: the foregoing description is only illustrative of the preferred embodiments of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention are included in the protection scope of the present invention.

Claims (5)

1. The real-time voice encryption equipment of the cellular mobile network is characterized in that the voice encryption equipment is divided into a receiving end voice encryption equipment and a transmitting end voice encryption equipment, bluetooth connection is respectively established with the cellular mobile phones, and a cellular mobile network voice channel is established between the cellular mobile phones;
the transmitting end voice encryption equipment comprises a voice call module, a source coding module, a sequence cipher module, a channel coding module, a voice-like modulation module and a Bluetooth connection module which are sequentially connected according to a voice transmission direction; the voice call module is used for picking up the voice of the user and amplifying, sampling and quantizing the voice when the user speaks; the source coding module is used for compressing and coding the voice data frame into voice parameters; the sequence cipher module is used for encrypting the voice parameters into the close-language data; the channel coding module is used for carrying out forward error correction on the transmitted compact morphology data; the voice-like modulation module is used for mapping the close-language data subjected to forward error correction into voice-like signals; the Bluetooth connection module is used for establishing a voice transmission channel with the cellular mobile phone;
the receiving end voice encryption equipment comprises a Bluetooth connection module, a voice-like modulation module, a channel coding module, a sequence password module, a source coding module and a voice call module which are sequentially connected according to the voice transmission direction, wherein the receiving end voice encryption equipment processes according to the reverse order of the sending end voice encryption equipment when receiving the voice signals of the opposite side, and outputs plain language voice to the user earphone;
the voice-like modulation module comprises a modulation codebook, a modulator, a signal recorder, a signal compensator, a demodulator and a demodulation codebook; the modulator maps the compact morphology data subjected to forward error correction into waveform symbols in a modulation codebook which is generated in advance in an optimized way, performs filtering shaping to eliminate high-frequency harmonic waves, and transmits the waveform symbols to a voice channel of a cellular mobile network; the signal compensator carries out waveform compensation on the received transmitting-end voice-like signal according to the history voice-like data recorded by the signal recorder, and then a demodulator demodulates the compensated signal into target data by using a demodulation codebook; the modulator, the signal recorder, the signal compensator and the demodulator need to train a demodulation codebook through online learning, and the process is as follows: the modulator of the transmitting-end voice encryption equipment maps the random number sequences shared and prefabricated by the two parties into waveform symbols in a modulation codebook and transmits the waveform symbols to the opposite end through a voice channel of a cellular mobile network; the receiving terminal voice encryption equipment learns to generate an optimal demodulation codebook according to the prefabricated random number sequence and the modulation codebook shared by the two parties, and trains signal compensation weights;
the channel coding module comprises a coding module, an interleaving module, an inverse interleaving module and a decoding module; the coding module of the transmitting-end voice encryption equipment codes the compact-morphology data by using a multi-core polarization code, then carries out data interleaving/column data interleaving by an interleaving module, and finally carries out data interleaving/column data interleaving by a DoV link transmission; the reverse interleaving module of the receiving end voice encryption equipment performs reverse interleaving transformation of data of an execution/column, and then decodes the data into target data through the decoding module;
the sequence cipher module comprises an authentication key negotiation module, a key synchronization module and an encryption and decryption module; the encryption and decryption module is a sequence cipher algorithm using two parameters of a seed key and an initial vector, the seed key is kept unchanged in one session, and the initial vector is replaced periodically; the working process is as follows: the encryption and decryption module of the sending-end voice encryption equipment uses a password generation algorithm, encrypts transmission data based on a modulo two addition operation and transmits the transmission data through a DoV link; the encryption and decryption module of the receiving end voice encryption equipment decrypts the received data based on the second-mode encryption operation; the key synchronization module is used for performing key synchronization; the process comprises the steps of synchronizing two parts of contents of initial vector synchronization and data frame sequence number synchronization, and realizing the two parts of contents by using a data checksum prediction technology; the authentication key negotiation module is used for negotiating a seed key, and comprises the following steps: the receiving end voice encryption equipment and the transmitting end voice encryption equipment finish terminal registration through a private key generation center before conversation, and during conversation, the receiving end voice encryption equipment and the transmitting end voice encryption equipment finish seed key negotiation based on identity authentication based on a certificate-free public key cryptosystem;
the source coding module adopts MELP algorithm, and the working process is as follows: the source coding module of the transmitting-end voice encryption equipment compresses and codes the voice data frames sampled and quantized by the voice communication module into voice parameters by using an MELP algorithm, and then the voice parameters are encrypted by the sequence encryption module; the source coding module of the receiving end voice encryption equipment rebuilds plain language voice based on the voice parameters decrypted by the sequence password module and outputs the plain language voice to the voice call module.
2. The cellular mobile network real-time voice encryption device according to claim 1, wherein the voice call module comprises a microphone voice driving module, a sampling quantization module and a voice power amplifier driving module, and the microphone voice driving module of the transmitting-end voice encryption device is used for amplifying and transmitting weak voice signals of a microphone of a user to the sampling quantization module; and the voice power amplification driving module of the receiving end voice encryption equipment performs power amplification on the reconstructed plain language voice and outputs the reconstructed plain language voice to the user earphone.
3. The cellular mobile network real-time voice encryption device according to claim 1, wherein the receiving-side voice encryption device and the transmitting-side voice encryption device are headphones, watches, or wearable devices.
4. The cellular mobile network real-time voice encryption device of claim 1, further comprising a control module, a display module, a battery, and a power module.
5. A method for encrypting cellular mobile network real-time voice, comprising the steps of:
for the transmitting end:
when a user speaks, a voice call module of the voice encryption equipment at the transmitting end picks up the voice of the user, amplifies, samples and quantizes the voice, and then the voice data frame is transmitted to a source coding module for compression coding into voice parameters; encrypting the voice signals into dense language data through a sequence cipher module, transmitting the dense language data to a channel coding module for forward error correction, mapping the dense language data into voice signals through a voice-like modulation module, and transmitting the voice signals to a cellular mobile phone through a Bluetooth connection module;
for the receiving end:
the voice-like modulation module of the receiving end voice encryption equipment demodulates the received voice-like signal into compact-form data, and the compact-form data is further subjected to error detection and error correction by the channel coding module, then is decrypted by the sequence coding module and converted into voice parameters, finally is reconstructed into a plain-form voice signal by the source coding module, and is subjected to power amplification by the voice communication module and then is output to the user earphone;
the voice-like modulation module comprises a modulation codebook, a modulator, a signal recorder, a signal compensator, a demodulator and a demodulation codebook; the modulator maps the compact morphology data subjected to forward error correction into waveform symbols in a modulation codebook which is generated in advance in an optimized way, performs filtering shaping to eliminate high-frequency harmonic waves, and transmits the waveform symbols to a voice channel of a cellular mobile network; the signal compensator carries out waveform compensation on the received transmitting-end voice-like signal according to the history voice-like data recorded by the signal recorder, and then a demodulator demodulates the compensated signal into target data by using a demodulation codebook; the modulator, the signal recorder, the signal compensator and the demodulator need to train a demodulation codebook through online learning, and the process is as follows: the modulator of the transmitting-end voice encryption equipment maps the random number sequences shared and prefabricated by the two parties into waveform symbols in a modulation codebook and transmits the waveform symbols to the opposite end through a voice channel of a cellular mobile network; the receiving terminal voice encryption equipment learns to generate an optimal demodulation codebook according to the prefabricated random number sequence and the modulation codebook shared by the two parties, and trains signal compensation weights;
the channel coding module comprises a coding module, an interleaving module, an inverse interleaving module and a decoding module; the coding module of the transmitting-end voice encryption equipment codes the compact-morphology data by using a multi-core polarization code, then carries out data interleaving/column data interleaving by an interleaving module, and finally carries out data interleaving/column data interleaving by a DoV link transmission; the reverse interleaving module of the receiving end voice encryption equipment performs reverse interleaving transformation of data of an execution/column, and then decodes the data into target data through the decoding module;
the sequence cipher module comprises an authentication key negotiation module, a key synchronization module and an encryption and decryption module; the encryption and decryption module is a sequence cipher algorithm using two parameters of a seed key and an initial vector, the seed key is kept unchanged in one session, and the initial vector is replaced periodically; the working process is as follows: the encryption and decryption module of the sending-end voice encryption equipment uses a password generation algorithm, encrypts transmission data based on a modulo two addition operation and transmits the transmission data through a DoV link; the encryption and decryption module of the receiving end voice encryption equipment decrypts the received data based on the second-mode encryption operation; the key synchronization module is used for performing key synchronization; the process comprises the steps of synchronizing two parts of contents of initial vector synchronization and data frame sequence number synchronization, and realizing the two parts of contents by using a data checksum prediction technology; the authentication key negotiation module is used for negotiating a seed key, and comprises the following steps: the receiving end voice encryption equipment and the transmitting end voice encryption equipment finish terminal registration through a private key generation center before conversation, and during conversation, the receiving end voice encryption equipment and the transmitting end voice encryption equipment finish seed key negotiation based on identity authentication based on a certificate-free public key cryptosystem;
the source coding module adopts MELP algorithm, and the working process is as follows: the source coding module of the transmitting-end voice encryption equipment compresses and codes the voice data frames sampled and quantized by the voice communication module into voice parameters by using an MELP algorithm, and then the voice parameters are encrypted by the sequence encryption module; the source coding module of the receiving end voice encryption equipment rebuilds plain language voice based on the voice parameters decrypted by the sequence password module and outputs the plain language voice to the voice call module.
CN202110772795.8A 2021-07-08 2021-07-08 Cellular mobile network real-time voice encryption equipment and method Active CN113645613B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110772795.8A CN113645613B (en) 2021-07-08 2021-07-08 Cellular mobile network real-time voice encryption equipment and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110772795.8A CN113645613B (en) 2021-07-08 2021-07-08 Cellular mobile network real-time voice encryption equipment and method

Publications (2)

Publication Number Publication Date
CN113645613A CN113645613A (en) 2021-11-12
CN113645613B true CN113645613B (en) 2023-07-04

Family

ID=78416896

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110772795.8A Active CN113645613B (en) 2021-07-08 2021-07-08 Cellular mobile network real-time voice encryption equipment and method

Country Status (1)

Country Link
CN (1) CN113645613B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101026836A (en) * 2007-04-06 2007-08-29 东南大学 Anti vocoder compressed end-to-end voice encryption device and method
CN101059957A (en) * 2007-05-24 2007-10-24 华中科技大学 An audio coding selective cryptographic method
WO2009074711A1 (en) * 2007-12-13 2009-06-18 Nokia Corporation Speech data encryption and decryption
CN101764666A (en) * 2009-12-24 2010-06-30 中国电信股份有限公司 Speech encryption method and device and decryption method and device
CN201655293U (en) * 2009-11-30 2010-11-24 成都林海电子有限责任公司 Audio codec integrated circuit of satellite mobile communication voice coder
CN102737637A (en) * 2011-12-31 2012-10-17 清华大学 Method for data transmission by using voice-like modulation and demodulation
CN103379486A (en) * 2013-06-08 2013-10-30 山东量子科学技术研究院有限公司 Plug and play type portable communication secrecy device and communication method thereof
CN109428639A (en) * 2017-08-24 2019-03-05 上海诺基亚贝尔股份有限公司 Method and apparatus for determining channel state information
US10361802B1 (en) * 1999-02-01 2019-07-23 Blanding Hovenweep, Llc Adaptive pattern recognition based control system and method
CN111818519A (en) * 2020-07-16 2020-10-23 郑州信大捷安信息技术股份有限公司 End-to-end voice encryption and decryption method and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7505594B2 (en) * 2000-12-19 2009-03-17 Qualcomm Incorporated Discontinuous transmission (DTX) controller system and method

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10361802B1 (en) * 1999-02-01 2019-07-23 Blanding Hovenweep, Llc Adaptive pattern recognition based control system and method
CN101026836A (en) * 2007-04-06 2007-08-29 东南大学 Anti vocoder compressed end-to-end voice encryption device and method
CN101059957A (en) * 2007-05-24 2007-10-24 华中科技大学 An audio coding selective cryptographic method
WO2009074711A1 (en) * 2007-12-13 2009-06-18 Nokia Corporation Speech data encryption and decryption
CN201655293U (en) * 2009-11-30 2010-11-24 成都林海电子有限责任公司 Audio codec integrated circuit of satellite mobile communication voice coder
CN101764666A (en) * 2009-12-24 2010-06-30 中国电信股份有限公司 Speech encryption method and device and decryption method and device
CN102737637A (en) * 2011-12-31 2012-10-17 清华大学 Method for data transmission by using voice-like modulation and demodulation
CN103379486A (en) * 2013-06-08 2013-10-30 山东量子科学技术研究院有限公司 Plug and play type portable communication secrecy device and communication method thereof
CN109428639A (en) * 2017-08-24 2019-03-05 上海诺基亚贝尔股份有限公司 Method and apparatus for determining channel state information
CN111818519A (en) * 2020-07-16 2020-10-23 郑州信大捷安信息技术股份有限公司 End-to-end voice encryption and decryption method and system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Gaoang Wang."Shrinking Encoding with Two-Level Codebook Learning for Fine-Grained Fish Recognition".《2016 ICPR 2nd Workshop on Computer Vision for Analysis of Underwater Imagery (CVAUI)》.2017,全文. *
加密语音在GSM话音业务信道传输的一种实现方法;杨于村;冯穗力;季新生;叶梧;;重庆邮电大学学报(自然科学版)(第05期);全文 *

Also Published As

Publication number Publication date
CN113645613A (en) 2021-11-12

Similar Documents

Publication Publication Date Title
US7804819B2 (en) Method for implementing voice over IP through an electronic device connected to a packed switched network
CN103986503B (en) Safe bluetooth earphone and voice communication method thereof
CN100450243C (en) Anti vocoder compressed end-to-end voice encryption device and method
CN102624518B (en) Voice encryption and decryption method
CN106790281A (en) A kind of end-to-end voice encryption device and encryption method towards intercom system
CN207234973U (en) Video conferencing system based on quantum cryptography
CN105681310A (en) Bluetooth based voice source real-time voice encryption method
CN101287274B (en) Voice encryption system for mobile communication and encryption method thereof
CN101765106A (en) Method for encrypting voice based on GSM voice channel transmission
CN105471899A (en) End-to-end voice encryption communication method and device for mobile terminals
CN109346092A (en) The system and method for voice encryption communication is carried out between a kind of communication terminal
CN112614498B (en) Method for modulating low-speed data into voice-like signal
CN113645613B (en) Cellular mobile network real-time voice encryption equipment and method
CN106412812A (en) Bluetooth voice communication method, Bluetooth voice communication system and Bluetooth headset
CN106878277B (en) Method and device for realizing voice encryption based on DMR standard
CN113630426B (en) Private encryption method and system based on simultaneous interpretation
CN1592141A (en) Terminal to terminal encryption method of cell phone voice and data
Biancucci et al. Secure data and voice transmission over GSM voice channel: Applications for secure communications
CN105120457A (en) Mobile communication circuit domain voice processing apparatus, method and system
CN103200564A (en) Global system for mobile communications (GSM) voice encryption system and encryption method based on orthogonal frequency division multiplexing (OFDM)
CN210693957U (en) Quantum encryption device of PSTN telephone
CN1177431C (en) Method and mobile device for end-to-end enciphere
CN102421093B (en) Method for implementing end-to-end cross-base-station transmission of encryption voice of analog cluster system
CN205596352U (en) A secure communication equipment and secure communication system for conversing terminal
Rehman et al. Effective model for real time end to end secure communication over gsm voice channel

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant