CN1754366A - Secure transmission of audio signals - Google Patents
Secure transmission of audio signals Download PDFInfo
- Publication number
- CN1754366A CN1754366A CN 200380109857 CN200380109857A CN1754366A CN 1754366 A CN1754366 A CN 1754366A CN 200380109857 CN200380109857 CN 200380109857 CN 200380109857 A CN200380109857 A CN 200380109857A CN 1754366 A CN1754366 A CN 1754366A
- Authority
- CN
- China
- Prior art keywords
- signal
- equipment
- session key
- data
- data channel
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/60—Substation equipment, e.g. for use by subscribers including speech amplifiers
- H04M1/6033—Substation equipment, e.g. for use by subscribers including speech amplifiers for providing handsfree use or a loudspeaker mode in telephone sets
- H04M1/6041—Portable telephones adapted for handsfree use
- H04M1/6058—Portable telephones adapted for handsfree use involving the use of a headset accessory device connected to the portable telephone
- H04M1/6066—Portable telephones adapted for handsfree use involving the use of a headset accessory device connected to the portable telephone including a wireless connection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0056—Systems characterized by the type of code used
- H04L1/0061—Error detection codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/18—Service support devices; Network management devices
- H04W88/181—Transcoding devices; Rate adaptation devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2250/00—Details of telephonic subscriber devices
- H04M2250/02—Details of telephonic subscriber devices including a Bluetooth interface
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
Abstract
In a headset (14) audio speech signals are picked up by the microphone (25), where they are digitally sampled before being encoded by a vocoder (26). The coded speech data is then provided to a CRC module (27), where error correction data is added before the resulting data is encrypted by an encryption module (22). The resulting encrypted data is transmitting using a Bluetooth radio interface (24), by which the headset is connected wirelessly to a mobile telephone. Received data is decrypted by a decryption module (23), error corrected by an error correction module (28) and decoded by a decoder (29), with the resulting audio signals then being reproduced at a speaker (30). When a user wants to instigate a telephone call with another telephone, the headset (14) is caused to send a control signal to the mobile telephone instructing it to enter a data mode. A data call is then set up and, once established, the CPU (20) controls the setting up of a 128 bit encryption key which is subsequently used for communications between the headset (14) and a corresponding device associated with the recipient of the call. Encryption and decryption are performed only at the headset (14). This provides increased security since even if the call can be intercepted, the interceptor will need to decrypt the signals before being able to reproduce the audio signals.
Description
Technical field
The present invention relates to a kind of audio interface device, this audio interface device can be at the signal that audio signal is provided or derives from audio signal so that by data channel sampling and encrypt them before the phone transmission.The invention still further relates to a kind of audio interface device, this audio interface device can be at the signal that audio signal is provided or derives from audio signal so that by data channel sampling and encode them before the phone transmission.The invention still further relates to the operating audio interface equipment corresponding method, transmission encrypted audio signal corresponding method and comprise audio interface device and the corresponding system of phone.The invention still further relates to method, comprise sending encrypted session key, and relate to the communication equipment that comprises the device that is used for encrypted session key and transmission encrypted session key to second equipment at first and second communication between devices.
Background technology
Though common situation is that the transmission between mobile phone and the base station, is encrypted and do not used with being up to signal of base station usually so that make the eavesdropping and the telephone conversation of suitable radio receiver become difficult encrypted.If when call signal is for example transported on Public Switched Telephone Network (PSTN) and integrated services digital network (ISDN), have the people to visit them, the audio signal that so quite being apparent that regenerates form to call out and do not interrupt this calling.The objective of the invention is provides improved fail safe for the voice communication that utilizes the unsafe communication network of possibility to make.
EP-A-1026898 discloses a kind of digital broadcasting IRD, is wherein deciphered the control word of broadcast enciphering by smart card.Then before being sent to decoder, use this control word of session key, described decoder decryption control words is so that follow-up use in the decoding radio program.
Summary of the invention
According to a first aspect of the invention, a kind of audio interface device is provided, operationally be used to provide a signal, be used to control phone via data channel and network service, and audio signal is provided or from the signal of its derivation so that sampling and encrypt them before the data channel transmission.
Preferably, phone is a mobile phone.
In a preferred embodiment, this equipment comprises encoder, be arranged for audio signal is provided in case the transmission before encode they and be used to depend on the circumstances, audio signal is provided or from the signal of its derivation so that before the transmission, error correction data is added to the device of these signals.If the realization of encrypting is to use the Difie-Hellman algorithm, can realizes good fail safe so and do not require the safe transmission of encryption key on escape way.
For permission equipment as bidirectional interface, it preferably include from the phone receiving enciphered signals and before they are reproduced as audio signal their device of deciphering.In order to handle decoded signal, it can comprise the device that is used for the signal of decoding deciphering before reproducing.The restorability that disturbs on the passage between the source of the enciphered data of phone and reception is provided by the error correction decrypted signal.
According to a second aspect of the invention, the method of operating audio interface equipment is provided, this method comprises that control appliance is to provide a signal, be used to control phone, be preferably mobile phone via data channel and network service, control appliance sampling and encrypted audio signal or from the signal of its derivation, and control appliance provides coded signal so that transmit on data channel.
According to a third aspect of the invention we, provide a kind of method that is used to transmit the audio signal of encryption, this method comprises: the control audio interface equipment is used to control mobile phone via data channel and network service so that a signal to be provided; Sampled audio signal; The data of encrypting sample or deriving from sample; With provide enciphered data so that on data channel, transmit.
According to a forth aspect of the invention, a kind of system is provided, comprise audio interface device and phone, audio interface device operationally provides a control signal, be used to control phone via data channel communication, and provide audio signal or from the signal of its derivation to phone before sampling and encrypt them, call response is in receiving control signal, this control signal is used for via data channel and network service and is used for the audio signal of transmission encryption on data channel.
According to a fifth aspect of the invention, a kind of audio interface device is provided, a signal operationally is provided, is used to control phone via data channel and network service, and audio signal is provided or from the signal of its derivation so that sampling and encode them before the data channel transmission.
According to a sixth aspect of the invention, a kind of method of operating audio interface equipment is provided, this method comprises that control appliance is to provide a signal, be used to control phone, be preferably mobile phone via data channel and network service, control appliance sampling and coding audio signal or from the signal of its derivation, and control appliance provides code signal so that transmit on data channel.
According to a seventh aspect of the invention, provide a kind of method of audio signal of transfer encoding, this method comprises: the control audio interface equipment is used to control mobile phone via data channel and network service so that a signal to be provided; Sampled audio signal; Coded samples or the data that derive from sample; With provide coded data so that on data channel, transmit.
According to an eighth aspect of the invention, a kind of system is provided, comprise audio interface device and phone, audio interface device operationally provides a control signal, be used to control phone via data channel communication, and provide audio signal or from the signal of its derivation to phone before sampling and encode them, call response is in receiving control signal, this control signal is used for via data channel and network service and is used for the audio signal of transfer encoding on data channel.
Preferably, carry out coding by lossy compressor reducer.Can claim that it is a compressor reducer.
According to a ninth aspect of the invention, provide a kind of method at first and second communication between devices, this method comprises: in first equipment, use the encryption keys session key; Send encrypted session key to second equipment; In second equipment, the session key of enabling decryption of encrypted; And use session key to be encrypted in the data of transmitting on the both direction between first and second equipment.
Preferably, this method comprises that with other encrypted session key slave unit one of them is transferred to another equipment, and then uses other session key to be encrypted in the data of transmitting at least one direction between first and second equipment.Encrypted session key can only be transmitted on a direction between the equipment, or they can be generated and be sent by two equipment on the basis of sharing.
In order to improve fail safe, this method comprises periodically new encrypted session key from first device transmission to second equipment.
According to the tenth aspect of the invention, provide a kind of communication equipment, comprising: be used for encrypted session key and be used for sending the device of encrypted session key to another communication equipment via passage; Be used for the session key data and be used to send the device of enciphered data; Use session key to decipher the device of the data of reception with being used to.
This evaluation method selecting optimal equipment ground comprises and is used to send other encrypted session key, and is used for then using other session key to come the device of enciphered data before sending enciphered data.
Further preferably, in order further to improve fail safe, this equipment comprises and is used for the device from first device transmission to second equipment with new encrypted session key periodically.This is also strengthened by the device that comprises the catalogue that is used to make up session key, and this catalogue comprises session key and at least one untapped session key of current use.Here, equipment may comprise that being used for abandoning periodically the session key that is used for enciphered data also then used new session key to come the device of enciphered data before sending enciphered data.
The accompanying drawing summary
With reference now to accompanying drawing, embodiments of the invention is described.
In the accompanying drawings:
Fig. 1 has shown and has comprised various systems according to parts of the present invention, and wherein carried out the method according to this invention; With
Fig. 2 is the schematic diagram with the audio interface device of formation Fig. 1 system part of earphone forms.
Embodiment
With reference to figure 1, be that the center shows telecommunication system with telephone network 1.Telephone network 1 can for example be Public Switched Telephone Network (PSTN) or integrated services digital network (ISDN), although also may instead be other any forms.Network 1 can comprise a plurality of different network that links together in any suitable manner.Being connected on the network 1 is first and second mobile switching centres (MSC) 2,3, and they can or cannot be by identical telco service provider's operation.What be connected to a MSC 2 is first and second base stations (BS) 4 and 5.The one MSC 2 and first and second base stations 4 and 5 can for example be operated according to gsm (GSM).Second mobile radio station 9 is communicated by letter with the 2nd BS 5, and the phone that allows and be connected to network 1 is called out mutually.The 2nd MSC 3 and third and fourth base station 6 with 7 each be connected.The 2nd MSC 3 forms telephone system partly with third and fourth base station 6 and 7, and this part is for example operated according to universal mobile telephone system (UMTS) standard.First mobile radio station 8 is communicated by letter with the 3rd base station 6, and other phones that allow and be connected to network 1 are called out mutually.What also be connected to network 1 is first and second Local Exchanges 10,11, its each be connected with many landline telephones, be connected although have only first phone 12 to be shown as, and second phone 13 is shown as with second Local Exchange and is connected with first Local Exchange.This system comprises various other parts, they is presented among Fig. 1 for succinct.First and second landline telephones 12 and 13 each have data communication port, allow circuit between phone and respective local exchange to be used in and transmit data and data are sent to network 1 from network 1.First mobile phone 8 has input, relies on this input can connect hands-free headsets, allows mobile phone to use in hands-free mode.Second mobile phone 9 has Bluetooth transceiving, allows wirelessly and the devices communicating with Bluetooth function.Described so far system is traditional.
According to the present invention, first earphone 14 is connected with second mobile phone by Bluetooth link.Show earphone 14 in Fig. 2 in greater detail, this will be described below.Audio interface device 15 is related with second landline telephone 13, and infrared transceiver in the dependence accessory 15 and the corresponding infrared transceiver in second landline telephone 13, and these two equipment can be connected by Radio Link.What be connected to first mobile phone 8 is earphone 16, and it comprises the wired connection in the hands-free connector that is inserted into mobile phone.Similarly, the audio interface device 17 with the accessory form is connected by the FPDP of wire link with first landline telephone 12.
With reference now to Fig. 2,, earphone 14 is shown and generally includes CPU (CPU) 20, and it is connected with each of data transceiver or modulator-demodulator 21, encrypting module 22 and deciphering module 23.Data transceiver unit or modulator-demodulator 21 are connected with bluetooth radio interface 24, can communicate with second mobile phone 9 thus.Earphone 14 comprises microphone 25, and it is arranged for converting audio signal to digital electric signal, then digital electric signal is offered vocoder 26.Vocoder 26 is legacy equipments, and it is arranged for digitally being compressed in its input and goes up the sample of reception and provide data-signal in its output with fixing data transfer rate.Vocoder 26 can use any suitable algorithm, and for example those are known to GSM, G729 or Speex algorithm.What be connected to vocoder 26 outputs is the input that CRC (CRC) is added module 27.Module 27 is supplied to the data that provided by vocoder 26 with the CRC bit, though data in that to arrive forward part ground destroyed, it allows in the remote location vocoder dateout of suitably decoding.The output of CRC module 27 is connected to the input of encrypting module 22, and it is operated in mode as described below.Microphone 25, vocoder 26, CRC module 27 and encrypting module 22 form the phonetic entry path together, and the signal that obtains from this phonetic entry path can be transferred to second mobile phone 9 under the control of CPU20.Similarly, constitute the phonetic entry path by deciphering module 23, error correction module 28, decoder 29 and loud speaker 30.Error correction module 28 is connected with the input of deciphering module 23, and operationally is used to provide to receiving from second mobile phone 9 and carrying out error correction by the deciphering module decrypted data.Then, decode by decoder module 29 by the error correction data that error correction module 28 provides, to form audio samples.Then these sample conversion are being become analog form as before the voice signal that provides by loud speaker 30.Earphone 14 constitutes audio reception device.Though each parts is described individually, they can also be realized by any traditional approach, and for example can utilize special ASIC (application-specific IC) or general processor and single physical memory.Replacedly, the memory of separation can be used for vocoder 26 and encrypting module 22.The processor of these separation also can be used for realizing respectively decoder 29 and deciphering module 23, or alternatively can use other separation processor.
Operate as follows.When the user of second mobile phone 9 wanted to initiate and be connected to the call of another phone of network 1, the user initially switched to earphone 14 " opening " state.This is to be detected by second mobile phone 9.For the initialization secure communication, the volume that therefore user presses on the earphone 14 simultaneously increases and volume down P cock (not shown).This makes earphone 14 send control signals to second mobile phone 9, orders it to enter 9.6 or the data pattern of 14.4kbps (kilobits per second).Control signal can be generated by special-purpose ASIC equipment, or is integrated among the ASIC that forms blue tooth interface.Be that response receives control signal, CPU20 prepares a data-signal, is used for order second mobile phone 9 and opens data call with base station 5 and network 1, rather than open traditional speech channel.This is and telephone communication as the recipient who calls out, for example second landline telephone 13.Then on the data channel between mobile phone 9 and the landline telephone 13, set up data call in a conventional manner.In case set up this calling, earphone 14 especially its CPU20 is controlled the foundation of 128 bit encryption, is used to communication between earphone 14 and accessory 15 subsequently.This can occur by any traditional approach, but preferably relates to the use of Diffie-Hellman algorithm.This algorithm is known in the prior art and for example summarizing on the www.apocalypse.org/pub/u/seven/diffie.html.
When the user of second mobile phone 9 speaks, pick up audio speech signal by microphone 25, in microphone 25, voice signal was digitally sampled before by vocoder 26 codings.The speech data of coding then is provided for CRC module 27,, adds error correction data here before encrypting module 22 uses 128 bit encryption encryption gained data.The mode of encrypting is traditional all, and carries out under the control of CPU20.Then ciphered data is transferred to second mobile phone 9, wherein uses ongoing data call on network, to transmit by data transceiver or modulator-demodulator 21 and Bluetooth transceiving 24.On accessory 15, on its infrared transceiver (not shown), receive enciphered data, after this, use to share key with its deciphering, application error proofread and correct, the data of decoding error correction and realize voice more in the end.Similarly, when the user of landline telephone 13 spoke, voice signal was converted into digital signal, then was encoded to reduce data volume, to replenish and use the encryption of 128 bit encryption with the CRC data.Then use the data call that exists that enciphered data is sent to second mobile phone 9 by network 1 from landline telephone 13.Then by Bluetooth transceiving 24 and receiver or modulator-demodulator 21 receptions, here they are by deciphering module 23 deciphering for the ciphered data signal.Then error correction module 28 removes data error before the gained signals of being decoded by decoder 29, and in the end reproduces voice signal on loud speaker 30.
Will find out that encryption and decryption are only carried out on earphone 14 and accessory 15, and use 128 bit encryption to encrypt all communication therebetween.Thus, provide the fail safe that increases, even because any point of calling out between mobile phone 9 and landline telephone 13 is intercepted, the interceptor must be able to decipher this signal before the reproducing audio signal.Will be further understood that also required particular device has only earphone 14 and accessory 15.
Refer again to Fig. 1 and 2 now and describe an interchangeable embodiment.This embodiment and the above embodiments have much in common, but existence is different when considering the encryption of audio signal sampling and that encode.This further embodiment uses the session (stream) of simple form to encrypt.The encryption of the type has short key length, for example 2999 bits.The voice data of coding only can be exchanged after setting up first session key.
The exchange of voice data of coding and other data relate to and including the data in the frame, and this normally needs, so that provide synchronous at the two ends of link.For simplicity, the earphone (or audio interface device of other types) of being responsible for setting up session key is called as the key transmitting apparatus, and the earphone (or audio interface device of other types) that receives key is called as the key receiving equipment.Substitute an equipment as the key transmitting apparatus during calling out, these equipment can be transferred exchange one or many responsibility during the length of calling out.
In a preferred embodiment, produce the initial data that provides by vocoder, and the expense that is used for framing procedure approximately is 1000 bits per seconds with 8000 bits per seconds.In this example, the data channel that is used to communicate by letter has the capacity of 9600 bits per seconds, although can use other data transfer rate to replace.Use the passage of 9600 bits per seconds, remaining 600 bits per seconds are used to exchange new session key.This comprises sizable signalling expense-requirement probably is that 5000 bits exchange the individual session key that length is 2999 bits usually.Use is used for the identical rsa encryption of original session cipher key change and encrypts new session key.The result is the general per 9 seconds new session keys of exchange.
Rsa encryption provides the fail safe of good degree, although exist a large amount of the requirement to decipher by the processing of RAS ciphered data.If rsa encryption is used for the encrypted speech data, deciphers needed this processing and cause delay and significant current drain in the voice reproduction.It is favourable using rsa encryption with the session cipher key delivery, because this does not have the delay in the voice reproduction that processor resource requirement is partly only arranged for data provide other fail safe of RSA level.
By creating session key in a conventional manner from the key transmitting apparatus of Zener (Zener) noise source, the Zener noise source is real stochastic source.
Session key is sent out as the section with index.Each section comprises CRC (CRC), and is detected with permissible error.Abandon section with error.The equipment receiver section is confirmed the section with effective CRC that each successfully receives.The equipment of delivery section resends any section that also is not identified.When having received all sections of session key, by deciphering module 23 data decryptions, and the embedding CRC that is used for whole key is by error correction module 28 verifications.Be considered to correct if embed CRC, key is added to the catalogue of key and sends the acknowledgment to the key transmitting apparatus.If the CRC that embeds is considered to defective, abandons the whole session key so and do not use it.After success or failed transmission session key, send next key in the same way.
Each earphone is safeguarded the catalogue of a session key.In a preferred exemplary, other key of employed key in catalogue three is stored.Use any possible idle bandwidth exchange session key constantly.When session key transmitting apparatus reception key had been added to the affirmation of the catalogue on the receiving equipment, it also was added to the catalogue on the transmitting apparatus.The exchange of session key only stops when catalogue becomes full, and this in most of the cases can not take place.Even the purpose of catalogue is to keep safety when allowing communication port to have a few errors in passage, can the slow down transmission of session key of these mistakes, because this will require to transmit more section again, and more may cause key on the basis of the CRC check that runs through whole key, to be rejected.
When abandoning key, on its position, use the next key in the catalogue.The key transmitting apparatus initiate to require to be used for to realize to be used for the signalling of variation of the key of enciphered data.The purpose of system is to stop using key behind a fixed time period, for example ten seconds.But this can dynamically change according to a plurality of keys that are stored in the catalogue.For example, under good transmission conditions, might after the short time cycle, abandon each key.Under bad condition, in catalogue, there is not the also situation of untapped key when using key can cause key to be about to be dropped under one the speed at per ten seconds.In order to manage to avoid this situation, optimum system choosing ground can detect the average time of successfully transmitting new key, and key can be set suitably abandon at interval.Certainly, usually advantageously, has interval between bigger key in subsequently some times of set up calling out, so that fill up catalogue at least in part and a buffer memory is provided thus.
The CPU20 of Fig. 2 is used to realize the rsa encryption of session key and the encryption and decryption of using the data of session key.Catalogue is stored in the memory (not shown), and memory can be RAM or any suitable type of memory.Can provide the rsa encryption key in any suitable manner, as the Zener noise source that is used to generate session key of key transmitting apparatus use.
Can allow Conference Calling in the additional embodiments of using, this will be described below with reference to Fig. 1 and 2.In this example, mobile phone 8 intercoms mutually with landline telephone 13, and voice communication therebetween is by the suitable parts encryption and decryption of the fittings equipment 15 and the earphone 16 of association.The user who then supposes mobile phone 8 wants to make it to begin to call out first landline telephone 12.Then set up Conference Calling in a conventional manner, although the passage between first landline telephone 12 and network and first mobile phone 8 and the landline telephone 13 is data call rather than voice call.In case the passage between mobile phone 8 and the landline telephone 12 is opened, earphone 16 is communicated by letter with the accessory 17 related with landline telephone 12 and is thought that it provides 128 bit keys, and this 128 bit keys is used to encrypt the communication between these equipment.Used encryption in case fittings equipment 17 is recognized, the encryption and decryption signal audio signal that makes user by one of phone generate is suitably reproduced on each other phones in such a manner for it.
Will be understood that to have only earphone related or fittings equipment that the signal of controlling its phone need be provided, so that communicate by letter with network 1 via data channel with the phone that makes a call by above content.All phones of being called out or connecting existing call are automatically provided data channel.
Similarly, be that earphone related with the phone that makes a call or fittings equipment are responsible for setting up and are used to carry out phone and by the encryption key of secure communication between the called telephone.But, thereby when providing Conference Calling in other phone call entries, be that the phone of introducing other phones is required to provide encryption key for initiate phone.
In a further embodiment, in conference call context, use the rsa encryption of the session key that on an equipment, generates.Here, be that the phone of set up calling out is responsible for setting up session key so that rsa encryption they and they are sent to other phones.In this case, correctly to receive key be necessary to each phone.For the ease of so, wish to use interval between bigger key, shorter session key or higher data rate channels.
It will be understood that the present invention allows the communication between the user of two remote phones to be encrypted safely, even only Special Equipment is earphone or the fittings equipment that constitutes audio interface at each end of link.Be connected to that all phones between these phones all are traditional fully in the phone of audio interface device and the network.
Though above embodiment has utilized the audio samples coding, if suitable high data rate data passage can be used, this is dispensable.
In an interchangeable embodiment, video pictures also can be encrypted before transmission.Here, the camera of combination and display device (not shown) can be connected to mobile phone 8 via blue tooth interface.Camera apparatus is included in the error correction bits of contacting between digital picture generation module and the Bluetooth transceiving and adds module and encrypting module.In this way, before being transferred to mobile phone, use the safe key encrypted image, subsequently they are transferred to network 1.Camera apparatus can use with earphone 14, but preferably combination with it.Under the condition of combination, this equipment is arranged for controlling mobile phone 8 so that participate in and the communicating by letter of the network 1 of use General Packet Radio Service (GPRS) data passage.And single blue tooth interface is used to transport encrypted audio and video data to mobile phone 8, and the Voice ﹠ Video data are transported to network by the GPRS data channel.
In order to reproduce the video data of encryption, the camera of combination and display device (not shown) can be deciphered the encrypted video signal of reception, so that application error is proofreaied and correct and preferably gone up display result in LCD (LCD).This allows complete audio-visual two-way between the camera of combination and display device 14 and network 1 to communicate by letter, and so-called video conference.Video conference can utilize the terminal of three or more call establishments.
In the narration in front, term " data channel " and " data call " should be understood that to relate to the equipment that is used to transmit data rather than simulated voice passage or is specifically designed to the passage that transmits voice signal.In GSM, voice call is classified as " telecommunication service ", and data call is classified as " bearer service ".Telecommunication service comprises following audio call type: phone, urgent call and voice mail, and some data call type, for example Fax Messaging 3.Bearer service comprises asynchronous and synchrodata, 300-9600bps, voice-and-data alternately, 300-9600bps, asynchronous PAD (packet switching, grouping assembler and disassembler) visit, 300-9600bps and the visit of synchronization dedicated grouped data, 2400-9600bps is appreciated that abovely can be classified as " data call "." data channel " can be considered to not assign the passage that is used for voice-over communication or other audio signals (no matter whether being encoded), and " data call " can be considered to be in the calling of making on the data channel.Passage can GSM, 3G, CDMA-2000 or any other fix or the telephone network that moves on.In fixed telephone network, data channel can for example be ISDN, ADSL or " broadband " data channel or subchannel.
Claims (30)
1. an audio interface device operationally is used to provide a signal, is used to control phone via data channel and network service, and audio signal is provided or from the signal of its derivation so that sampling and encrypt them before the data channel transmission.
2. as claim 1 or the described equipment of claim 2, comprise decoder, be arranged for providing audio signal so that encode them before the transmission.
3. an audio interface device operationally is used to provide a signal, is used to control phone via data channel and network service, and audio signal is provided or from the signal of its derivation so that sampling and encode them before the data channel transmission.
4. equipment as claimed in claim 3 comprises encryption equipment, and being arranged for is providing audio signal so that encrypt them before the transmission.
5. the described equipment of any one claim as described above, phone is a mobile phone.
6. the described equipment of any one claim as described above comprises depending on the circumstances, audio signal is provided or from the signal of its derivation so that before the transmission, error correction data is added to the device of these signals.
7. the described equipment of any one claim as described above wherein uses the Diffie-Hellman algorithm to realize encrypting.
8. the described equipment of any one claim as described above, comprise from the phone receiving enciphered signals and before they are reproduced as audio signal their device of deciphering.
9. equipment as claimed in claim 8 comprises the device that is used for the signal of decoding deciphering before reproducing.
10. as claim 8 or the described equipment of claim 9, comprise the device of the error correction that is used to provide decrypted signal.
11. the described equipment of any one claim comprises the device that is used for encrypted session key and sends encrypted session key as described above.
12. the described equipment of any one claim as described above, comprise be used for vision signal is provided or from the signal of its derivation so that sampling and encrypt them before the data channel transmission.
13. the method for an operating audio interface equipment, this method comprises that control appliance is to provide a signal, be used to control phone, be preferably mobile phone via data channel and network service, control appliance sampling and encrypted audio signal or from the signal of its derivation, and control appliance provides coded signal so that transmit on data channel.
14. the method for an operating audio interface equipment, this method comprises that control appliance is to provide a signal, be used to control phone, be preferably mobile phone via data channel and network service, control appliance sampling and coding audio signal or from the signal of its derivation, and control appliance provides code signal so that transmit on data channel.
15. a method that is used to transmit the audio signal of encryption, this method comprises:
The control audio interface equipment is used to control mobile phone via data channel and network service so that a signal to be provided;
Sampled audio signal;
The data of encrypting sample or deriving from sample; With
Provide enciphered data so that on data channel, transmit.
16. the method for the audio signal of a transfer encoding, this method comprises:
The control audio interface equipment is used to control mobile phone via data channel and network service so that a signal to be provided;
Sampled audio signal;
Coded samples or the data that derive from sample; With
Provide coded data so that on data channel, transmit.
17. system, comprise audio interface device and phone, audio interface device operationally provides a control signal, be used to control phone via data channel communication, and provide audio signal or from the signal of its derivation to phone before sampling and encrypt them, call response is in receiving control signal, and this control signal is used for via data channel and network service and is used for the audio signal that transmission is encrypted on data channel.
18. system, comprise audio interface device and phone, audio interface device operationally provides a control signal, be used to control phone via data channel communication, and provide audio signal or from the signal of its derivation to phone before sampling and encode them, call response is in receiving control signal, and this control signal is used for via data channel and network service and is used for the audio signal of transfer encoding on data channel.
19. the method at first and second communication between devices, this method comprises:
In first equipment, use the encryption keys session key;
Send encrypted session key to second equipment;
In second equipment, the session key of enabling decryption of encrypted; With
Use session key to be encrypted in the data of transmitting on the both direction between first and second equipment.
20. method as claimed in claim 19, comprise that with other encrypted session key slave unit one of them is transferred to another equipment, and then use other session key to be encrypted in the data of transmitting at least one direction between first and second equipment.
21., comprise periodically new encrypted session key from first device transmission to second equipment as claim 19 or the described method of claim 20.
22. as claim 19 or the described method of claim 20, comprise that with first and second equipment each makes up the catalogue of session key, each catalogue comprises session key and at least one untapped session key of current use.
23. method as claimed in claim 22 comprises abandoning the session key that is used for enciphered data periodically, and then uses new session key to be encrypted in the data of transmitting at least one direction.
24., comprise generating this session key or this a plurality of session keys at random as any one described method in the claim 19 to 23.
25., comprise and use rsa encryption to encrypt this session key or this a plurality of session keys as any one described method in the claim 19 to 24.
26. a communication equipment comprises:
Be used for encrypted session key and be used for sending the device of encrypted session key to another communication equipment via passage;
Be used for the session key data and be used to send the device of enciphered data; With
Be used to use session key to decipher the device of the data of reception.
27. as equipment as described in the claim 26, comprise being used to send other encrypted session key, and be used for then before sending enciphered data, using other session key to come the device of enciphered data.
28., comprise being used for the device with new encrypted session key periodically from first device transmission to second equipment as equipment as described in claim 26 or the claim 27.
29. as equipment as described in claim 27 or the claim 28, comprise the device of the catalogue that is used to make up session key, this catalogue comprises session key and at least one untapped session key of current use.
30., comprise being used for abandoning periodically the session key that is used for enciphered data and then before sending enciphered data, using new session key to come the device of enciphered data as equipment as described in the claim 29.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0229781A GB0229781D0 (en) | 2002-12-20 | 2002-12-20 | Secure transmission of audio signals |
GB0229781.0 | 2002-12-20 | ||
GB0313658.7 | 2003-06-12 |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1754366A true CN1754366A (en) | 2006-03-29 |
Family
ID=9950138
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 200380109857 Pending CN1754366A (en) | 2002-12-20 | 2003-12-18 | Secure transmission of audio signals |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN1754366A (en) |
GB (2) | GB0229781D0 (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101605185B (en) * | 2009-06-25 | 2012-07-04 | 华为技术有限公司 | Method, device and system for processing voice signals |
CN104184873A (en) * | 2013-05-27 | 2014-12-03 | 韩国电子通信研究院 | Information security attachment device for voice communication and information security method |
CN104954951A (en) * | 2015-07-01 | 2015-09-30 | 深圳市百特连通科技有限公司 | Bluetooth headset with voice encryption function and voice encryption method of Bluetooth headset |
CN105025038A (en) * | 2015-08-17 | 2015-11-04 | 南京京昱达信息科技有限公司 | Encrypting device of voice communication equipment |
CN105188018A (en) * | 2015-08-17 | 2015-12-23 | 飞天诚信科技股份有限公司 | Safety device and working method thereof |
CN106330856A (en) * | 2015-07-02 | 2017-01-11 | Gn瑞声达 A/S | Hearing device and method of hearing device communication |
CN107667553A (en) * | 2015-05-29 | 2018-02-06 | 耐瑞唯信有限公司 | For the method and system for the audio session for establishing encryption |
CN107690790A (en) * | 2015-06-04 | 2018-02-13 | 耐瑞唯信有限公司 | The method and system that communication session for representing crypto endpoint is arranged |
CN109346092A (en) * | 2018-10-29 | 2019-02-15 | 王秉玉 | The system and method for voice encryption communication is carried out between a kind of communication terminal |
CN117354797A (en) * | 2023-12-04 | 2024-01-05 | 深圳市华粤世通软件科技有限公司 | Mobile communication system and terminal based on information encryption |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7522730B2 (en) | 2004-04-14 | 2009-04-21 | M/A-Com, Inc. | Universal microphone for secure radio communication |
DE102004040654A1 (en) * | 2004-08-20 | 2006-02-23 | Global Scaling Technologies Ag | Device and method for encryption |
US8644396B2 (en) | 2006-04-18 | 2014-02-04 | Qualcomm Incorporated | Waveform encoding for wireless applications |
AR060670A1 (en) | 2006-04-26 | 2008-07-02 | Qualcomm Inc | DYNAMIC DISTRIBUTION OF FUNCTIONALITY AND ADMINISTRATION OF RESOURCES IN A DEVICE |
US8289159B2 (en) | 2006-04-26 | 2012-10-16 | Qualcomm Incorporated | Wireless localization apparatus and method |
US8406794B2 (en) | 2006-04-26 | 2013-03-26 | Qualcomm Incorporated | Methods and apparatuses of initiating communication in wireless networks |
DE202007012486U1 (en) * | 2007-09-05 | 2009-01-22 | Rohde & Schwarz Sit Gmbh | Device for encrypted communication |
ITMI20091006A1 (en) * | 2009-06-09 | 2010-12-10 | Claudio Petronici | "VOCAL COMMUNICATIONS SYSTEM" |
CN106162502A (en) * | 2015-03-20 | 2016-11-23 | 北京虎符科技有限公司 | Safe bluetooth communication equipment |
US10122767B2 (en) | 2015-05-29 | 2018-11-06 | Nagravision S.A. | Systems and methods for conducting secure VOIP multi-party calls |
US9891882B2 (en) | 2015-06-01 | 2018-02-13 | Nagravision S.A. | Methods and systems for conveying encrypted data to a communication device |
CN116866909A (en) * | 2023-05-11 | 2023-10-10 | 长江量子(武汉)科技有限公司 | Method for synchronizing keys of two-ear earphone and two-ear encryption earphone |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6081724A (en) * | 1996-01-31 | 2000-06-27 | Qualcomm Incorporated | Portable communication device and accessory system |
US5825776A (en) * | 1996-02-27 | 1998-10-20 | Ericsson Inc. | Circuitry and method for transmitting voice and data signals upon a wireless communication channel |
JP3703203B2 (en) * | 1996-03-25 | 2005-10-05 | キヤノン株式会社 | Wireless communication system and wireless communication method |
JPH10336128A (en) * | 1997-05-29 | 1998-12-18 | Mitsubishi Electric Corp | Scrabble system for digital broadcast |
US6222829B1 (en) * | 1997-12-23 | 2001-04-24 | Telefonaktieblaget L M Ericsson | Internet protocol telephony for a mobile station on a packet data channel |
EP1026898A1 (en) * | 1999-02-04 | 2000-08-09 | CANAL+ Société Anonyme | Method and apparatus for encrypted transmission |
GB9909995D0 (en) * | 1999-04-30 | 1999-06-30 | Central Research Lab Ltd | Accessory for a mobile telephone |
KR100339076B1 (en) * | 1999-08-11 | 2002-05-31 | 이계안 | A device for reducing vibration of outside mirror for automobile |
JP2002262345A (en) * | 2001-02-27 | 2002-09-13 | Casio Comput Co Ltd | Mobile communication system and communication control method |
US6885735B2 (en) * | 2001-03-29 | 2005-04-26 | Intellisist, Llc | System and method for transmitting voice input from a remote location over a wireless data channel |
GB2379120B (en) * | 2001-06-22 | 2005-03-30 | Christopher Portelli | Cordless / Wireless hands free set for use with celular mobile telephones |
-
2002
- 2002-12-20 GB GB0229781A patent/GB0229781D0/en not_active Ceased
-
2003
- 2003-06-12 GB GB0313658A patent/GB2388279B/en not_active Expired - Fee Related
- 2003-12-18 CN CN 200380109857 patent/CN1754366A/en active Pending
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101605185B (en) * | 2009-06-25 | 2012-07-04 | 华为技术有限公司 | Method, device and system for processing voice signals |
CN104184873A (en) * | 2013-05-27 | 2014-12-03 | 韩国电子通信研究院 | Information security attachment device for voice communication and information security method |
US9467428B2 (en) | 2013-05-27 | 2016-10-11 | Electronics And Telecommunications Research Institute | Information security attachment device for voice communication and information security method for voice communication using the same |
CN107667553A (en) * | 2015-05-29 | 2018-02-06 | 耐瑞唯信有限公司 | For the method and system for the audio session for establishing encryption |
CN107690790A (en) * | 2015-06-04 | 2018-02-13 | 耐瑞唯信有限公司 | The method and system that communication session for representing crypto endpoint is arranged |
CN104954951B (en) * | 2015-07-01 | 2017-12-29 | 深圳北斗通信科技有限公司 | A kind of bluetooth earphone and its speech ciphering method with voice encryption function |
CN104954951A (en) * | 2015-07-01 | 2015-09-30 | 深圳市百特连通科技有限公司 | Bluetooth headset with voice encryption function and voice encryption method of Bluetooth headset |
CN106330856A (en) * | 2015-07-02 | 2017-01-11 | Gn瑞声达 A/S | Hearing device and method of hearing device communication |
CN105188018A (en) * | 2015-08-17 | 2015-12-23 | 飞天诚信科技股份有限公司 | Safety device and working method thereof |
CN105025038A (en) * | 2015-08-17 | 2015-11-04 | 南京京昱达信息科技有限公司 | Encrypting device of voice communication equipment |
CN105025038B (en) * | 2015-08-17 | 2018-03-16 | 南京京昱达信息科技有限公司 | A kind of voice communication apparatus encryption equipment |
CN105188018B (en) * | 2015-08-17 | 2018-08-28 | 飞天诚信科技股份有限公司 | A kind of safety device and its working method |
CN109346092A (en) * | 2018-10-29 | 2019-02-15 | 王秉玉 | The system and method for voice encryption communication is carried out between a kind of communication terminal |
CN117354797A (en) * | 2023-12-04 | 2024-01-05 | 深圳市华粤世通软件科技有限公司 | Mobile communication system and terminal based on information encryption |
Also Published As
Publication number | Publication date |
---|---|
GB0229781D0 (en) | 2003-01-29 |
GB2388279B (en) | 2004-03-17 |
GB2388279A (en) | 2003-11-05 |
GB0313658D0 (en) | 2003-07-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1754366A (en) | Secure transmission of audio signals | |
US20060198520A1 (en) | Secure transmission of digital audio signals | |
US7369662B2 (en) | Maintaining end-to-end synchronization on a telecommunications connection | |
CN101268644B (en) | Method and apparatus for transporting encrypted media streams over a wide area network | |
US7885187B2 (en) | System and method for providing unified messaging system service using voice over internet protocol | |
EP1209844B1 (en) | maintaining end-to-end synchronization on telecommunications connection | |
EP1860851A1 (en) | Method for implementing voice over IP through and electronic device connected to a packed switched network | |
AU6409100A (en) | Automatic resynchronization of crypto-sync information | |
CN101287274B (en) | Voice encryption system for mobile communication and encryption method thereof | |
CN1115924C (en) | Encryption method for mobile telephone | |
JP4832959B2 (en) | Voice communication terminal device, voice communication control method, and voice communication terminal program | |
JP5211736B2 (en) | VoIP communication device | |
EP2809045B1 (en) | Information security attachment device for voice communication and information security method for voice communication using the same | |
US20150180663A1 (en) | Method and apparatus for performing secure voice call | |
CN101902734B (en) | End-to-end self-synchronization voice encryption transmission implementation method for digital trunking communication system | |
JP5163187B2 (en) | Call center system | |
CN101494644B (en) | Transmission method for session initiation protocol message | |
CN1247041C (en) | Method of encrypting mobile terminals | |
US7460671B1 (en) | Encryption processing apparatus and method for voice over packet networks | |
CN1177431C (en) | Method and mobile device for end-to-end enciphere | |
CN100463438C (en) | IP video terminal device for public security uniform communication network | |
CN109982317B (en) | Voice encryption and decryption system and method based on CDMA network | |
CN1592185A (en) | Terminal to terminal encryption method of cell phone voice and data | |
KR20050044196A (en) | Wiretapping preventer for voice communication in voip system | |
CN114979901A (en) | Audio sharing method of wireless earphone and wireless earphone |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |