CN113645613B - Cellular mobile network real-time voice encryption equipment and method - Google Patents
Cellular mobile network real-time voice encryption equipment and method Download PDFInfo
- Publication number
- CN113645613B CN113645613B CN202110772795.8A CN202110772795A CN113645613B CN 113645613 B CN113645613 B CN 113645613B CN 202110772795 A CN202110772795 A CN 202110772795A CN 113645613 B CN113645613 B CN 113645613B
- Authority
- CN
- China
- Prior art keywords
- voice
- module
- data
- encryption equipment
- cellular mobile
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L19/00—Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
- G10L19/005—Correction of errors induced by the transmission channel, if related to the coding algorithm
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L19/00—Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
- G10L19/04—Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis using predictive techniques
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0056—Systems characterized by the type of code used
- H04L1/0057—Block codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L19/00—Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
- G10L2019/0001—Codebooks
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Abstract
The invention belongs to the technical field of network information security, and particularly relates to a real-time voice encryption device and a method for a cellular mobile network, wherein the voice encryption device is divided into a receiving end voice encryption device and a transmitting end voice encryption device, bluetooth connection is respectively established with cellular mobile phones, and a cellular mobile network voice channel is established between the cellular mobile phones; the transmitting end voice encryption equipment and the receiving end voice encryption equipment comprise a voice call module, a source coding module, a sequence cipher module, a channel coding module, a voice-like modulation module and a Bluetooth connection module; and when receiving the opposite voice signals, the receiving-end voice encryption equipment processes the opposite voice signals according to the reverse sequence of the sending-end voice encryption equipment and outputs the plain voice to the user earphone. The invention can be suitable for the real-time voice encryption means of different types of cellular mobile networks to solve the safety problem of the voice channel of the current cellular mobile network.
Description
Technical Field
The invention belongs to the technical field of network information security, and particularly relates to a device and a method for encrypting cellular mobile network real-time voice.
Background
Cellular mobile networks are generally composed of mobile terminals, radio access networks and core networks in structure, and voice signal transmission includes two phases, namely over-the-air transmission between mobile terminals and base stations and core network transmission. In 2G and 3G networks, voice signals in the core network are transmitted in a plaintext manner, authentication of the access network is not supported in the air transmission stage, the used A5-series cryptographic algorithm is fragile, and part of mobile operators do not support the encryption scheme, so that a large security threat is faced. In 4G and 5G networks, although the security system is subject to enhanced reconfiguration, all-IP packet data transmission poses a security threat to conventional networks. Furthermore, in all of the 2G to 5G networks, the voice communication security architecture is controlled by the mobile operator, and the privacy of the user is difficult to guarantee. Thus, secure communication of voice channels in cellular mobile networks is accomplished by end-to-end encryption techniques.
In the voice over-the-air transmission stage of the cellular mobile network, vocoders deployed at mobile terminals and base stations perform parameter coding transmission on voice signals, and improve channel utilization by using techniques such as voice-activated detection (voice-activity detection, VAD) and discontinuous transmission (discontinuous transmission, DTX), and signals without voice features are regarded as noise drops. Thus, the voice signal is randomized after being digitally encrypted, and loses the voice characteristic, and is difficult to transmit in a cellular mobile network.
Disclosure of Invention
In order to solve the problems in the prior art, the invention provides a device and a method for encrypting the real-time voice of a cellular mobile network, which can be applied to the real-time voice encryption means of different types of cellular mobile networks so as to solve the safety problem of the voice channel of the current cellular mobile network.
In order to solve the technical problems, the invention adopts the following technical scheme:
the invention provides a real-time voice encryption device of a cellular mobile network, which is divided into a receiving end voice encryption device and a transmitting end voice encryption device, bluetooth connection is respectively established with the cellular mobile phones, and a cellular mobile network voice channel is established between the cellular mobile phones;
the transmitting end voice encryption equipment comprises a voice call module, a source coding module, a sequence cipher module, a channel coding module, a voice-like modulation module and a Bluetooth connection module which are sequentially connected according to a voice transmission direction; the voice call module is used for picking up the voice of the user and amplifying, sampling and quantizing the voice when the user speaks; the source coding module is used for compressing and coding the voice data frame into voice parameters; the sequence cipher module is used for encrypting the voice parameters into the close-language data; the channel coding module is used for carrying out forward error correction on the transmitted compact morphology data; the voice-like modulation module is used for mapping the close-language data subjected to forward error correction into voice-like signals; the Bluetooth connection module is used for establishing a voice transmission channel with the cellular mobile phone;
the receiving end voice encryption equipment comprises a Bluetooth connection module, a voice-like modulation module, a channel coding module, a sequence password module, a source coding module and a voice call module which are sequentially connected according to the voice transmission direction, and when receiving the voice signals of the opposite side, the receiving end voice encryption equipment processes according to the reverse order of the sending end voice encryption equipment and outputs plain language voice to the user earphone.
Further, the voice-like modulation module comprises a modulation codebook, a modulator, a signal recorder, a signal compensator, a demodulator and a demodulation codebook;
the modulator maps the compact morphology data subjected to forward error correction into waveform symbols in a modulation codebook which is generated in advance in an optimized way, performs filtering shaping to eliminate high-frequency harmonic waves, and transmits the waveform symbols to a voice channel of a cellular mobile network;
the signal compensator performs waveform compensation on the received transmitting-end voice-like signal according to the history voice-like data recorded by the signal recorder, and then the demodulator demodulates the compensated signal into target data by using a demodulation codebook.
Further, the modulator, the signal recorder, the signal compensator and the demodulator need to train the demodulation codebook through online learning, and the process is as follows: the modulator of the transmitting-end voice encryption equipment maps the random number sequences shared and prefabricated by the two parties into waveform symbols in a modulation codebook and transmits the waveform symbols to the opposite end through a voice channel of a cellular mobile network; the receiving end voice encryption equipment learns to generate an optimal demodulation codebook according to the prefabricated random number sequence and the modulation codebook shared by the two parties, and trains signal compensation weights.
Further, the channel coding module comprises a coding module, an interleaving module, an inverse interleaving module and a decoding module;
the coding module of the transmitting-end voice encryption equipment codes the compact-morphology data by using a multi-core polarization code, then carries out data interleaving/column data interleaving by an interleaving module, and finally carries out data interleaving/column data interleaving by a DoV link transmission;
the reverse interleaving module of the receiving end voice encryption equipment performs reverse interleaving transformation of the data of the execution/column, and then decodes the data into target data through the decoding module.
Further, the sequence cipher module comprises an authentication key negotiation module, a key synchronization module and an encryption and decryption module;
the encryption and decryption module is a sequence cipher algorithm using two parameters of a seed key and an initial vector, the seed key is kept unchanged in one session, and the initial vector is replaced periodically; the working process is as follows: the encryption and decryption module of the sending-end voice encryption equipment uses a password generation algorithm, encrypts transmission data based on a modulo two addition operation and transmits the transmission data through a DoV link; the encryption and decryption module of the receiving end voice encryption equipment decrypts the received data based on the second-mode encryption operation;
the key synchronization module is used for performing key synchronization; the process comprises the steps of synchronizing two parts of contents of initial vector synchronization and data frame sequence number synchronization, and realizing the two parts of contents by using a data checksum prediction technology;
the authentication key negotiation module is used for negotiating a seed key, and comprises the following steps: the receiving end voice encryption equipment and the transmitting end voice encryption equipment complete terminal registration through a private key generation center before conversation, and during conversation, the receiving end voice encryption equipment and the transmitting end voice encryption equipment complete seed key negotiation based on identity authentication based on a certificate-free public key cryptosystem.
Further, the source coding module adopts MELP algorithm, and the working process is as follows: the source coding module of the transmitting-end voice encryption equipment compresses and codes the voice data frames sampled and quantized by the voice communication module into voice parameters by using an MELP algorithm, and then the voice parameters are encrypted by the sequence encryption module; the source coding module of the receiving end voice encryption equipment rebuilds plain language voice based on the voice parameters decrypted by the sequence password module and outputs the plain language voice to the voice call module.
Further, the voice call module comprises a microphone voice driving module, a sampling quantization module and a voice power amplification driving module, wherein the microphone voice driving module of the sending end voice encryption equipment is used for amplifying and conveying weak voice signals of a microphone of a user to the sampling quantization module; and the voice power amplification driving module of the receiving end voice encryption equipment performs power amplification on the reconstructed plain language voice and outputs the reconstructed plain language voice to the user earphone.
Further, the receiving-end voice encryption device and the sending-end voice encryption device are earphone, watch or wearable device.
Further, the voice encryption device further comprises a control module, a display module, a battery and a power supply module.
The invention also provides a method for encrypting the cellular mobile network real-time voice, which comprises the following steps:
for the transmitting end:
when a user speaks, a voice call module of the voice encryption equipment at the transmitting end picks up the voice of the user, amplifies, samples and quantizes the voice, and then the voice data frame is transmitted to a source coding module for compression coding into voice parameters; encrypting the voice signals into dense language data through a sequence cipher module, transmitting the dense language data to a channel coding module for forward error correction, mapping the dense language data into voice signals through a voice-like modulation module, and transmitting the voice signals to a cellular mobile phone through a Bluetooth connection module;
for the receiving end:
the voice-like modulation module of the receiving end voice encryption equipment demodulates the received voice-like signal into the close-language data, and the close-language data is further transmitted to the sequence cipher module for decryption and conversion into voice parameters after error detection and error correction by the channel coding module, and finally reconstructed into the open-language voice signal by the source coding module, and the open-language voice signal is output to the user earphone after power amplification by the voice call module.
Compared with the prior art, the invention has the following advantages:
the cellular mobile network real-time voice encryption equipment adopts the DoV modulation and demodulation technology based on waveform symbol mapping, the channel coding technology based on multi-core polarization codes and the key negotiation technology of a certificate-free public key cryptosystem, can provide end-to-end voice encryption service for various cellular mobile networks such as 2G to 5G and the like under the condition that the hardware, software or protocol of a mobile phone terminal is not changed and any application is not required to be installed, has the advantages of good network adaptation, high voice restoration quality and high safety intensity, and really realizes digital voice encryption.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a block diagram of a cellular mobile network voice channel real-time encryption communication system constructed by a cellular mobile network real-time voice encryption device and a cellular mobile phone according to an embodiment of the present invention, 10 represents a receiving-side voice encryption device, 20 represents a transmitting-side voice encryption device, and 30 represents a cellular mobile phone;
fig. 2 is a block diagram of the structures of a receiving-side voice encryption device and a transmitting-side voice encryption device according to an embodiment of the present invention; 11 denotes a Bluetooth connection module, 12 denotes a voice-like modulation module, 13 denotes a channel coding module, 14 denotes a sequence coding module, 15 denotes a source coding module, and 16 denotes a voice call module;
FIG. 3 is a block diagram of a speech-like modulation module according to an embodiment of the present invention, 121 representing a modulation codebook, 122 representing a modulator, 124 representing a signal recorder, 126 representing a signal compensator, 128 representing a demodulator, 129 representing a demodulation codebook;
fig. 4 is a block diagram of a channel coding module according to an embodiment of the present invention, where 132 represents a coding module, 134 represents an interleaving module, 136 represents an inverse interleaving module, and 138 represents a decoding module;
FIG. 5 is a block diagram of a sequence cipher module according to an embodiment of the present invention, where 142 represents an authentication key negotiation module, 144 represents a key synchronization module, and 146 represents an encryption and decryption module;
fig. 6 is a block diagram of a voice call module according to an embodiment of the present invention, where 162 represents a microphone voice driving module, 164 represents a sample quantization module, and 166 represents a voice power amplifier driving module.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments, and all other embodiments obtained by those skilled in the art without making any inventive effort based on the embodiments of the present invention are within the scope of protection of the present invention.
Fig. 1 is a block diagram of a cellular mobile network voice channel real-time encryption communication system constructed by a cellular mobile network real-time voice encryption device and a cellular mobile phone, including two voice encryption devices and two cellular mobile phones integrated with a mobile phone specification (HSP) bluetooth module and having access to the network, in this example, the two cellular mobile phones should have connected to the voice phone and establish a bluetooth connection of the HSP specification with the voice encryption device.
As shown in fig. 2, this embodiment proposes a real-time voice encryption device for a cellular mobile network, where the voice encryption device is divided into a receiving-end voice encryption device and a transmitting-end voice encryption device, the receiving-end voice encryption device establishes a bluetooth connection with a cellular mobile phone of the receiving end, the transmitting-end voice encryption device establishes a bluetooth connection with a cellular mobile phone of the transmitting end, and a cellular mobile network voice channel is established between the cellular mobile phones of the two ends to implement real-time voice communication.
The transmitting end voice encryption equipment comprises a voice call module, a source coding module, a sequence cipher module, a channel coding module, a voice-like modulation module and a Bluetooth connection module which are sequentially connected according to a voice transmission direction; the voice call module is used for picking up the voice of the user and amplifying, sampling and quantizing the voice when the user speaks; the source coding module is used for compressing and coding the voice data frame into voice parameters; the sequence cipher module is used for encrypting the voice parameters into the close-language data; the channel coding module is used for carrying out forward error correction on the transmitted compact morphology data; the voice-like modulation module is used for mapping the close-language data subjected to forward error correction into voice-like signals; the Bluetooth connection module is used for establishing a voice transmission channel with the cellular mobile phone, and the encrypted voice data is finally transmitted to the cellular mobile phone to realize transparent transmission of the voice channel in the cellular mobile network.
The receiving end voice encryption equipment comprises a Bluetooth connection module, a voice-like modulation module, a channel coding module, a sequence password module, a source coding module and a voice call module which are sequentially connected according to the voice transmission direction, and when receiving the voice signals of the opposite side, the receiving end voice encryption equipment processes according to the reverse order of the sending end voice encryption equipment and outputs plain language voice to the user earphone.
As shown in fig. 3, the voice-like modulation module includes a modulation codebook, a modulator, a signal recorder, a signal compensator, a demodulator, and a demodulation codebook. The function of the voice-like modulation module is a DoV modulation and demodulation technology based on waveform symbol mapping, and a DoV link for transmitting digital data is established on a voice channel, and the specific working process is as follows: the modulator maps the compact morphology data after forward error correction into waveform symbols in a modulation codebook generated in advance in an optimized way, performs filtering shaping to eliminate high-frequency filtering, and transmits the waveform symbols to a voice channel of a cellular mobile network; the signal compensator performs waveform compensation on the received transmitting-end voice-like signal according to the history voice-like data recorded by the signal recorder, and then the demodulator demodulates the compensated signal into target data by using a demodulation codebook.
Before the working process occurs, the modulator, the signal recorder, the signal compensator and the demodulator need to train a demodulation codebook through online learning, and the working process is as follows: the modulator of the transmitting-end voice encryption equipment maps the random number sequences shared and prefabricated by the two parties into waveform symbols in a modulation codebook and transmits the waveform symbols to the opposite end through a voice channel of a cellular mobile network; the receiving end voice encryption equipment learns to generate an optimal demodulation codebook according to the prefabricated random number sequence and the modulation codebook shared by the two parties, and trains signal compensation weights.
As shown in fig. 4, the channel coding module includes a coding module, an interleaving module, an inverse interleaving module and a decoding module; the working process is as follows: the coding module of the transmitting-end voice encryption equipment codes the compact-morphology data by using a multi-core polarization code, then carries out data interleaving/column data interleaving by an interleaving module, and finally carries out data interleaving/column data interleaving by a DoV link transmission; the reverse interleaving module of the receiving end voice encryption equipment performs reverse interleaving transformation of the data of the execution/column, and then decodes the data into target data through the decoding module.
The coding module comprehensively utilizes the polarized kernel Pasteur parameter boundary and the code element distance maximization rule to implement multi-core polarized code construction irrelevant to the quality of the DoV link; the decoding module performs decoding using a successive-elimination-list (SCL) decoding algorithm based on a log-likelihood ratio (LLR) transfer formula.
As shown in fig. 5, the sequence cipher module includes an authentication key negotiation module, a key synchronization module and an encryption and decryption module. The encryption and decryption module is a sequence cipher algorithm using two parameters of a seed key and an initial vector, the seed key is kept unchanged in one session, and the initial vector is replaced periodically. The working process is as follows: the encryption and decryption module of the sending-end voice encryption equipment uses a password generation algorithm, encrypts transmission data based on 'modulo two addition' operation and transmits the transmission data through a DoV link; and the encryption and decryption module of the receiving end voice encryption equipment decrypts the received data based on the 'mode two encryption' operation.
The key synchronization module is required to perform key synchronization when the working process occurs, and the process comprises two parts of content of initial vector synchronization and data frame sequence number synchronization, and is realized by using a data checksum prediction technology.
Before the working process occurs, the authentication key negotiation module is required to negotiate a seed key, and the process is as follows: the receiving-end voice encryption equipment and the transmitting-end voice encryption equipment complete terminal registration through a private key generation center (private key generator, PKG) before conversation, and during conversation, the receiving-end voice encryption equipment and the transmitting-end voice encryption equipment complete seed key negotiation based on identity authentication based on a certificate-free public key cryptosystem.
Specifically, the source coding module adopts an MELP algorithm, and the working process is as follows: the source coding module of the transmitting-end voice encryption equipment compresses and codes the voice data frames sampled and quantized by the voice communication module into voice parameters by using an MELP algorithm, and then the voice parameters are encrypted by the sequence encryption module; the source coding module of the receiving end voice encryption equipment rebuilds plain language voice based on the voice parameters decrypted by the sequence password module and outputs the plain language voice to the voice call module.
As shown in fig. 6, the voice call module includes a microphone voice driving module, a sampling quantization module and a voice power amplifier driving module, and the working process is as follows: the microphone voice driving module of the transmitting end voice encryption equipment amplifies and transmits weak voice signals of a microphone of a user to the sampling and quantizing module, and then the source coding module carries out parameter coding; and the voice power amplification driving module of the receiving end voice encryption equipment performs power amplification on the reconstructed plain language voice and outputs the reconstructed plain language voice to the user earphone.
In addition to the above structure, the voice encryption apparatus of the present embodiment may further include a control module, a display module, a battery, and a power supply module.
The voice encryption device of the present embodiment may be a wearable device such as an earphone, a watch, or a bracelet, but is not limited thereto.
The embodiment also provides a method for encrypting the cellular mobile network real-time voice, which comprises the following steps:
for the transmitting end:
when a user speaks, a voice call module of the voice encryption equipment at the transmitting end picks up the voice of the user, amplifies, samples and quantizes the voice, and then the voice data frame is transmitted to a source coding module for compression coding into voice parameters; encrypting the voice signals into dense language data through a sequence cipher module, transmitting the dense language data to a channel coding module for forward error correction, mapping the dense language data into voice signals through a voice-like modulation module, and transmitting the voice signals to a cellular mobile phone through a Bluetooth connection module;
for the receiving end:
the voice-like modulation module of the receiving end voice encryption equipment demodulates the received voice-like signal into the close-language data, and the close-language data is further transmitted to the sequence cipher module for decryption and conversion into voice parameters after error detection and error correction by the channel coding module, and finally reconstructed into the open-language voice signal by the source coding module, and the open-language voice signal is output to the user earphone after power amplification by the voice call module.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Finally, it should be noted that: the foregoing description is only illustrative of the preferred embodiments of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention are included in the protection scope of the present invention.
Claims (5)
1. The real-time voice encryption equipment of the cellular mobile network is characterized in that the voice encryption equipment is divided into a receiving end voice encryption equipment and a transmitting end voice encryption equipment, bluetooth connection is respectively established with the cellular mobile phones, and a cellular mobile network voice channel is established between the cellular mobile phones;
the transmitting end voice encryption equipment comprises a voice call module, a source coding module, a sequence cipher module, a channel coding module, a voice-like modulation module and a Bluetooth connection module which are sequentially connected according to a voice transmission direction; the voice call module is used for picking up the voice of the user and amplifying, sampling and quantizing the voice when the user speaks; the source coding module is used for compressing and coding the voice data frame into voice parameters; the sequence cipher module is used for encrypting the voice parameters into the close-language data; the channel coding module is used for carrying out forward error correction on the transmitted compact morphology data; the voice-like modulation module is used for mapping the close-language data subjected to forward error correction into voice-like signals; the Bluetooth connection module is used for establishing a voice transmission channel with the cellular mobile phone;
the receiving end voice encryption equipment comprises a Bluetooth connection module, a voice-like modulation module, a channel coding module, a sequence password module, a source coding module and a voice call module which are sequentially connected according to the voice transmission direction, wherein the receiving end voice encryption equipment processes according to the reverse order of the sending end voice encryption equipment when receiving the voice signals of the opposite side, and outputs plain language voice to the user earphone;
the voice-like modulation module comprises a modulation codebook, a modulator, a signal recorder, a signal compensator, a demodulator and a demodulation codebook; the modulator maps the compact morphology data subjected to forward error correction into waveform symbols in a modulation codebook which is generated in advance in an optimized way, performs filtering shaping to eliminate high-frequency harmonic waves, and transmits the waveform symbols to a voice channel of a cellular mobile network; the signal compensator carries out waveform compensation on the received transmitting-end voice-like signal according to the history voice-like data recorded by the signal recorder, and then a demodulator demodulates the compensated signal into target data by using a demodulation codebook; the modulator, the signal recorder, the signal compensator and the demodulator need to train a demodulation codebook through online learning, and the process is as follows: the modulator of the transmitting-end voice encryption equipment maps the random number sequences shared and prefabricated by the two parties into waveform symbols in a modulation codebook and transmits the waveform symbols to the opposite end through a voice channel of a cellular mobile network; the receiving terminal voice encryption equipment learns to generate an optimal demodulation codebook according to the prefabricated random number sequence and the modulation codebook shared by the two parties, and trains signal compensation weights;
the channel coding module comprises a coding module, an interleaving module, an inverse interleaving module and a decoding module; the coding module of the transmitting-end voice encryption equipment codes the compact-morphology data by using a multi-core polarization code, then carries out data interleaving/column data interleaving by an interleaving module, and finally carries out data interleaving/column data interleaving by a DoV link transmission; the reverse interleaving module of the receiving end voice encryption equipment performs reverse interleaving transformation of data of an execution/column, and then decodes the data into target data through the decoding module;
the sequence cipher module comprises an authentication key negotiation module, a key synchronization module and an encryption and decryption module; the encryption and decryption module is a sequence cipher algorithm using two parameters of a seed key and an initial vector, the seed key is kept unchanged in one session, and the initial vector is replaced periodically; the working process is as follows: the encryption and decryption module of the sending-end voice encryption equipment uses a password generation algorithm, encrypts transmission data based on a modulo two addition operation and transmits the transmission data through a DoV link; the encryption and decryption module of the receiving end voice encryption equipment decrypts the received data based on the second-mode encryption operation; the key synchronization module is used for performing key synchronization; the process comprises the steps of synchronizing two parts of contents of initial vector synchronization and data frame sequence number synchronization, and realizing the two parts of contents by using a data checksum prediction technology; the authentication key negotiation module is used for negotiating a seed key, and comprises the following steps: the receiving end voice encryption equipment and the transmitting end voice encryption equipment finish terminal registration through a private key generation center before conversation, and during conversation, the receiving end voice encryption equipment and the transmitting end voice encryption equipment finish seed key negotiation based on identity authentication based on a certificate-free public key cryptosystem;
the source coding module adopts MELP algorithm, and the working process is as follows: the source coding module of the transmitting-end voice encryption equipment compresses and codes the voice data frames sampled and quantized by the voice communication module into voice parameters by using an MELP algorithm, and then the voice parameters are encrypted by the sequence encryption module; the source coding module of the receiving end voice encryption equipment rebuilds plain language voice based on the voice parameters decrypted by the sequence password module and outputs the plain language voice to the voice call module.
2. The cellular mobile network real-time voice encryption device according to claim 1, wherein the voice call module comprises a microphone voice driving module, a sampling quantization module and a voice power amplifier driving module, and the microphone voice driving module of the transmitting-end voice encryption device is used for amplifying and transmitting weak voice signals of a microphone of a user to the sampling quantization module; and the voice power amplification driving module of the receiving end voice encryption equipment performs power amplification on the reconstructed plain language voice and outputs the reconstructed plain language voice to the user earphone.
3. The cellular mobile network real-time voice encryption device according to claim 1, wherein the receiving-side voice encryption device and the transmitting-side voice encryption device are headphones, watches, or wearable devices.
4. The cellular mobile network real-time voice encryption device of claim 1, further comprising a control module, a display module, a battery, and a power module.
5. A method for encrypting cellular mobile network real-time voice, comprising the steps of:
for the transmitting end:
when a user speaks, a voice call module of the voice encryption equipment at the transmitting end picks up the voice of the user, amplifies, samples and quantizes the voice, and then the voice data frame is transmitted to a source coding module for compression coding into voice parameters; encrypting the voice signals into dense language data through a sequence cipher module, transmitting the dense language data to a channel coding module for forward error correction, mapping the dense language data into voice signals through a voice-like modulation module, and transmitting the voice signals to a cellular mobile phone through a Bluetooth connection module;
for the receiving end:
the voice-like modulation module of the receiving end voice encryption equipment demodulates the received voice-like signal into compact-form data, and the compact-form data is further subjected to error detection and error correction by the channel coding module, then is decrypted by the sequence coding module and converted into voice parameters, finally is reconstructed into a plain-form voice signal by the source coding module, and is subjected to power amplification by the voice communication module and then is output to the user earphone;
the voice-like modulation module comprises a modulation codebook, a modulator, a signal recorder, a signal compensator, a demodulator and a demodulation codebook; the modulator maps the compact morphology data subjected to forward error correction into waveform symbols in a modulation codebook which is generated in advance in an optimized way, performs filtering shaping to eliminate high-frequency harmonic waves, and transmits the waveform symbols to a voice channel of a cellular mobile network; the signal compensator carries out waveform compensation on the received transmitting-end voice-like signal according to the history voice-like data recorded by the signal recorder, and then a demodulator demodulates the compensated signal into target data by using a demodulation codebook; the modulator, the signal recorder, the signal compensator and the demodulator need to train a demodulation codebook through online learning, and the process is as follows: the modulator of the transmitting-end voice encryption equipment maps the random number sequences shared and prefabricated by the two parties into waveform symbols in a modulation codebook and transmits the waveform symbols to the opposite end through a voice channel of a cellular mobile network; the receiving terminal voice encryption equipment learns to generate an optimal demodulation codebook according to the prefabricated random number sequence and the modulation codebook shared by the two parties, and trains signal compensation weights;
the channel coding module comprises a coding module, an interleaving module, an inverse interleaving module and a decoding module; the coding module of the transmitting-end voice encryption equipment codes the compact-morphology data by using a multi-core polarization code, then carries out data interleaving/column data interleaving by an interleaving module, and finally carries out data interleaving/column data interleaving by a DoV link transmission; the reverse interleaving module of the receiving end voice encryption equipment performs reverse interleaving transformation of data of an execution/column, and then decodes the data into target data through the decoding module;
the sequence cipher module comprises an authentication key negotiation module, a key synchronization module and an encryption and decryption module; the encryption and decryption module is a sequence cipher algorithm using two parameters of a seed key and an initial vector, the seed key is kept unchanged in one session, and the initial vector is replaced periodically; the working process is as follows: the encryption and decryption module of the sending-end voice encryption equipment uses a password generation algorithm, encrypts transmission data based on a modulo two addition operation and transmits the transmission data through a DoV link; the encryption and decryption module of the receiving end voice encryption equipment decrypts the received data based on the second-mode encryption operation; the key synchronization module is used for performing key synchronization; the process comprises the steps of synchronizing two parts of contents of initial vector synchronization and data frame sequence number synchronization, and realizing the two parts of contents by using a data checksum prediction technology; the authentication key negotiation module is used for negotiating a seed key, and comprises the following steps: the receiving end voice encryption equipment and the transmitting end voice encryption equipment finish terminal registration through a private key generation center before conversation, and during conversation, the receiving end voice encryption equipment and the transmitting end voice encryption equipment finish seed key negotiation based on identity authentication based on a certificate-free public key cryptosystem;
the source coding module adopts MELP algorithm, and the working process is as follows: the source coding module of the transmitting-end voice encryption equipment compresses and codes the voice data frames sampled and quantized by the voice communication module into voice parameters by using an MELP algorithm, and then the voice parameters are encrypted by the sequence encryption module; the source coding module of the receiving end voice encryption equipment rebuilds plain language voice based on the voice parameters decrypted by the sequence password module and outputs the plain language voice to the voice call module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110772795.8A CN113645613B (en) | 2021-07-08 | 2021-07-08 | Cellular mobile network real-time voice encryption equipment and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110772795.8A CN113645613B (en) | 2021-07-08 | 2021-07-08 | Cellular mobile network real-time voice encryption equipment and method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113645613A CN113645613A (en) | 2021-11-12 |
CN113645613B true CN113645613B (en) | 2023-07-04 |
Family
ID=78416896
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110772795.8A Active CN113645613B (en) | 2021-07-08 | 2021-07-08 | Cellular mobile network real-time voice encryption equipment and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113645613B (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101026836A (en) * | 2007-04-06 | 2007-08-29 | 东南大学 | Anti vocoder compressed end-to-end voice encryption device and method |
CN101059957A (en) * | 2007-05-24 | 2007-10-24 | 华中科技大学 | An audio coding selective cryptographic method |
WO2009074711A1 (en) * | 2007-12-13 | 2009-06-18 | Nokia Corporation | Speech data encryption and decryption |
CN101764666A (en) * | 2009-12-24 | 2010-06-30 | 中国电信股份有限公司 | Speech encryption method and device and decryption method and device |
CN201655293U (en) * | 2009-11-30 | 2010-11-24 | 成都林海电子有限责任公司 | Audio codec integrated circuit of satellite mobile communication voice coder |
CN102737637A (en) * | 2011-12-31 | 2012-10-17 | 清华大学 | Method for data transmission by using voice-like modulation and demodulation |
CN103379486A (en) * | 2013-06-08 | 2013-10-30 | 山东量子科学技术研究院有限公司 | Plug and play type portable communication secrecy device and communication method thereof |
CN109428639A (en) * | 2017-08-24 | 2019-03-05 | 上海诺基亚贝尔股份有限公司 | Method and apparatus for determining channel state information |
US10361802B1 (en) * | 1999-02-01 | 2019-07-23 | Blanding Hovenweep, Llc | Adaptive pattern recognition based control system and method |
CN111818519A (en) * | 2020-07-16 | 2020-10-23 | 郑州信大捷安信息技术股份有限公司 | End-to-end voice encryption and decryption method and system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7505594B2 (en) * | 2000-12-19 | 2009-03-17 | Qualcomm Incorporated | Discontinuous transmission (DTX) controller system and method |
-
2021
- 2021-07-08 CN CN202110772795.8A patent/CN113645613B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10361802B1 (en) * | 1999-02-01 | 2019-07-23 | Blanding Hovenweep, Llc | Adaptive pattern recognition based control system and method |
CN101026836A (en) * | 2007-04-06 | 2007-08-29 | 东南大学 | Anti vocoder compressed end-to-end voice encryption device and method |
CN101059957A (en) * | 2007-05-24 | 2007-10-24 | 华中科技大学 | An audio coding selective cryptographic method |
WO2009074711A1 (en) * | 2007-12-13 | 2009-06-18 | Nokia Corporation | Speech data encryption and decryption |
CN201655293U (en) * | 2009-11-30 | 2010-11-24 | 成都林海电子有限责任公司 | Audio codec integrated circuit of satellite mobile communication voice coder |
CN101764666A (en) * | 2009-12-24 | 2010-06-30 | 中国电信股份有限公司 | Speech encryption method and device and decryption method and device |
CN102737637A (en) * | 2011-12-31 | 2012-10-17 | 清华大学 | Method for data transmission by using voice-like modulation and demodulation |
CN103379486A (en) * | 2013-06-08 | 2013-10-30 | 山东量子科学技术研究院有限公司 | Plug and play type portable communication secrecy device and communication method thereof |
CN109428639A (en) * | 2017-08-24 | 2019-03-05 | 上海诺基亚贝尔股份有限公司 | Method and apparatus for determining channel state information |
CN111818519A (en) * | 2020-07-16 | 2020-10-23 | 郑州信大捷安信息技术股份有限公司 | End-to-end voice encryption and decryption method and system |
Non-Patent Citations (2)
Title |
---|
Gaoang Wang."Shrinking Encoding with Two-Level Codebook Learning for Fine-Grained Fish Recognition".《2016 ICPR 2nd Workshop on Computer Vision for Analysis of Underwater Imagery (CVAUI)》.2017,全文. * |
加密语音在GSM话音业务信道传输的一种实现方法;杨于村;冯穗力;季新生;叶梧;;重庆邮电大学学报(自然科学版)(第05期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN113645613A (en) | 2021-11-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7804819B2 (en) | Method for implementing voice over IP through an electronic device connected to a packed switched network | |
CN103986503B (en) | Safe bluetooth earphone and voice communication method thereof | |
CN100450243C (en) | Anti vocoder compressed end-to-end voice encryption device and method | |
CN102624518B (en) | Voice encryption and decryption method | |
CN106790281A (en) | A kind of end-to-end voice encryption device and encryption method towards intercom system | |
CN207234973U (en) | Video conferencing system based on quantum cryptography | |
CN105681310A (en) | Bluetooth based voice source real-time voice encryption method | |
CN101287274B (en) | Voice encryption system for mobile communication and encryption method thereof | |
CN101765106A (en) | Method for encrypting voice based on GSM voice channel transmission | |
CN105471899A (en) | End-to-end voice encryption communication method and device for mobile terminals | |
CN109346092A (en) | The system and method for voice encryption communication is carried out between a kind of communication terminal | |
CN112614498B (en) | Method for modulating low-speed data into voice-like signal | |
CN113645613B (en) | Cellular mobile network real-time voice encryption equipment and method | |
CN106412812A (en) | Bluetooth voice communication method, Bluetooth voice communication system and Bluetooth headset | |
CN106878277B (en) | Method and device for realizing voice encryption based on DMR standard | |
CN113630426B (en) | Private encryption method and system based on simultaneous interpretation | |
CN1592141A (en) | Terminal to terminal encryption method of cell phone voice and data | |
Biancucci et al. | Secure data and voice transmission over GSM voice channel: Applications for secure communications | |
CN105120457A (en) | Mobile communication circuit domain voice processing apparatus, method and system | |
CN103200564A (en) | Global system for mobile communications (GSM) voice encryption system and encryption method based on orthogonal frequency division multiplexing (OFDM) | |
CN210693957U (en) | Quantum encryption device of PSTN telephone | |
CN1177431C (en) | Method and mobile device for end-to-end enciphere | |
CN102421093B (en) | Method for implementing end-to-end cross-base-station transmission of encryption voice of analog cluster system | |
CN205596352U (en) | A secure communication equipment and secure communication system for conversing terminal | |
Rehman et al. | Effective model for real time end to end secure communication over gsm voice channel |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |