CN2845368Y - Mobile terminal with public and unpublic communications - Google Patents
Mobile terminal with public and unpublic communications Download PDFInfo
- Publication number
- CN2845368Y CN2845368Y CNU2005200731037U CN200520073103U CN2845368Y CN 2845368 Y CN2845368 Y CN 2845368Y CN U2005200731037 U CNU2005200731037 U CN U2005200731037U CN 200520073103 U CN200520073103 U CN 200520073103U CN 2845368 Y CN2845368 Y CN 2845368Y
- Authority
- CN
- China
- Prior art keywords
- encrypted
- voice
- transmitter
- vocoder
- receiver
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The utility model relates to a mobile telephone terminal with the functions of open and secret communication. A general purpose input and output port (GPIO) of a mobile telephone main board and a communication serial port (UART) of a general purpose asynchronous receiving and sending device are connected with an encrypted chip in an encrypted passage, a processor, a memorizer and an external voice coder. Then, the voice coder is also connected with a receiver and a transmitter, so as to realize the secret communication function. A mobile telephone built-in voice coder is directly connected with the receiver and the transmitter to realize the open calling operation. An encrypted passage voice coder and the built-in voice coder of an open communication passage and the connection of the receiver and the transmitter are provided with switches. A user can select the common voice calling mode or the encrypted voice calling mode in the processing of the telephone calling operation by the utility model. Thus, if a user can select the encrypted voice calling mode, on the basis of the safe secret communication of the GSM digital mobile communication network, the voice is coded and encrypted again. Therefore, the utility model can ensure higher security.
Description
One, technical field
The utility model relates to a kind of use GSM/CDMA voice and data loading service is realized bright close difunctional (normal speech and encrypted word bilateral words) portable terminal.
Two, background technology
With the gsm communication is example, GSM digital cellular mobile communication systems as second generation mobile communication, simulation mobile communication than the first generation has obtained significant progress, the difference of digital mobile communication system and analog mobile communication system is as follows: digital modulation to carrier/interface ratio (C/I) require much lower, time division multiple access more can provide the flexibility in the design, needs to increase chnnel coding in the digital system, needs to adopt adaptive equalization technique, need to adopt the Way of Echo Control technology, it is quite simple to implement to maintain secrecy.The basic characteristics of GSM digital mobile communication network are: can interconnect clear and definite interface specification with various public networks.It is flexible to have good internet security networking structure, the frequency repeat utilization ratio height, and the traffic ability to take the burden is strong.Antijamming capability is strong, the high communication quality.User terminal is littler, lighter, with better function.
Passed through the development of first generation analog communication gsm communication, the standardization committee that the GSM digital mobile communication system is made up of main telecommunication operator in Europe and manufacturing firm designs, and it is to develop to form on the basis of cellular system.The GSM mobile radio communication can provide 6 type telecommunications business such as voice, short message, fax, and the compatible multiple bearer service that defines in ISDN, can satisfy in the GSM moving process needs to the data communication service.GSM also supports the supplementary service of 8 big classes simultaneously, as number identification, calling transfer and MPTY or the like.
Carrying of CDMA data in mobile phone and transfer bandwidth as code division multiple access are wideer.Voice transfer is also very characteristic.About GSM/CDMA mobile phone safety, not only to note following content, password is set, the short message of privacy is not kept in the mobile phone as mobile phone radiation, attention, do not phone with mobile telephone during driving? certainly suchlike " safety " problem has begun to spread all over the every aspect that we live.But our " secret and safe " aspect conversation also should cause concern usually, and said here safety just is meant and guarantees our the conversation safety when conversation.
High-rise user, as administrative personnel senior in the senior of government offices, government and the enterprise or the like, their message " divide minute " all might relate to important secret, in case these dialog contexts are eavesdropped, consequence is with hardly imaginable.Though there is the technology of secret telephony mobile phone open, with existing GSM mobile handset, we can say that security performance is not very unreliable, the encryption function that only has low layer, and the effective range of whole encryption just is confined to the process of mobile phone to the network cell site, because the employed encryption technology of various mobile phones all is different, so will crack the conversation of this process fast, can be said to be the comparison difficulty.
Prior art has related to mobile phone cipher.Method key step as the CN1283063 mobile phone cipher is: the calling party initiates data service calls; The either party provides and generates the key desired data, and transmits this data; Both sides generate key, and are stored in separately the memory; Voice messaging is carried out encryption, emission or/and the information that receives the other side is decrypted processing and reverts to voice.Because of information is all encrypted in the overall process of communication, the random number of encrypted secret key and generation key etc. all is that the correspondent grasps, so the fail safe of communication improves greatly.
On the other hand, by the network cell site to the process of partner mobile phone then to see the cryptographic algorithm of cell site, this process still have eavesdropped may.There has been the equipment that can carry out the GSM eavesdropping to sell in the market, so how just can have accomplished safety.Special-purpose secret telephony mobile phone no doubt may be taken precautions against stern, but during as the application of regular handset, also needs to have the unencryped word function.
Three, summary of the invention
The purpose of this invention is to provide a kind of mobile phone terminal with unencryped word (normal speech) and encrypted word bilateral words function, mobile phone has the key of generation desired data, and voice messaging is carried out encryption, emission or/and the information that receives the other side is decrypted processing and reverts to voice.Having unencryped word simultaneously is the function of regular handset conversation.
The object of the present invention is achieved like this: the mobile phone terminal with unencryped word and encrypted word bilateral words function, the general input/output port (GPIO) of cell phone mainboard is connected encryption chip and processor, memory and the external vocoder of encrypted tunnel with UART Universal Asynchronous Receiver Transmitter communication serial port (UART), vocoder connects receiver and transmitter again, realizes the secret telephony function; Built-in vocoder by mobile phone directly connects receiver and transmitter realization clear call, and the junction of encrypted tunnel vocoder and the built-in vocoder of unencryped word passage and receiver and transmitter is provided with diverter switch.
The cryptographic algorithm of encrypted tunnel and key are stored in separately the memory; Voice messaging through coding is carried out encryption.
With the phone caller is example, by on circuit, increasing analog switch (can use electronics or solid-state switch), realize the switching selection of unencryped word and encrypted word, control the switching of analog switch by a GPIO (general input and output), unencryped word is directly given the speech processes part of GSM, if the user selects to maintain secrecy and calls out, then simulated voice will be handled by vocoder, to be transferred to DEU data encryption unit behind the speech number, be transferred to the GSM part by the UART (UART Universal Asynchronous Receiver Transmitter) of GSM again through the DEU data encryption unit data encrypted, the data service bearer path by GSM transmits the data loading service that utilizes GSM and the back encrypted once more in voice uses GSM to send again.Even so just guaranteed that gsm communication is eavesdropped, thus because knowing user's cipher mode and key, the other side can't truly not reduce voice content, thus realized encryption.And, realized that MMI (man-machine interface) user can select to carry out common unencryped word or encrypted word communication is difunctional.
With GSM is example, and content of the present invention just is to use CSD (circuit switched data) mode of GSM to realize the application of particular requirements such as secret telephony, keeps former ordinary voice communications function simultaneously.
With the phone caller is example, and software mainly is divided into two parts, the firstth, and MMI (man-machine interface) part mainly provides user Ming Mi and calls out parts such as selection, secret calling and setting.The secondth, realize the core content of bright close calling, i.e. privacy engine, this engine is realized the switching of GPIO, to realize the selectivity of bright close calling, has the AT command processing module, can realize that MMI uses the AT order to communicate and control by the UART of GSM equipment; Privacy engine can be by appointment communication protocol and security module communicates and alternately.
Beneficial effect
By the present invention, make the user can when call, select normal voice calls, perhaps ciphered voice call.If the user selects ciphered voice call like this, on the safe and secret communication infrastructure that the GSM digital mobile communication network itself has, once more voice are carried out coding encrypting so, guaranteed higher fail safe.According to different encryption requirements, can use military encrypting module, perhaps commercial encryption method realizes the encryption of different security level content, guarantees the confidentiality of voice call to greatest extent.
Crypto is set the switching of UART adapter: because the compatible multiple bearer service that in ISDN, defines of the data loading service of GSM, so the GSM mobile handset product by above method design also can with the calling of maintaining secrecy of the landline telephone with same security module.The utility model utilizes normal speech and specific secret telephony to be integrated on the GSM terminal equipment, and specifically encryption aspect (algorithm and key etc.) use existing privacy engine.
Four, description of drawings
Fig. 1 is a circuit diagram of the present invention
DBB in the mainboard (digital baseband processor), ABB (analogue baseband processors) are the acp chip of GSM equipment, are mainly used in encoding and decoding, the mistake control of gsm communication and coordinate operations such as control external memory storage, LCD, keyboard.
Five, embodiment
The typical model of cell phone mainboard is the commercial crypto of PM766:
The typical model of encryption chip and processor (privacy engine) is: TMS320VC5509A (DSP of Ti), MOTOROLAMC145481/SD vocoder, the use of electronic analog swtich is integrated electronic analog swtich (SDPT analog switch) or other electronically controlled solid switch device, or adopts electronic analog swtich that UART signal and vocoder input and output audio signal are carried out the switch switching.Can design by the enforcement of this programme and realize having the bifunctional mobile phone terminal product of bright close conversation, be example with the commercial crypto of implementing of PM766, and we have used the mobile phone solution of TI.
UART (universal asynchronous receiver transmitter): the working condition of PM766 is such, before getting phone at every turn, cell phone system needs the user to select: the calling of whether maintaining secrecy, if the user selects, then initiate data call, after the successful connection, voice being given the secret back of partly encrypting and being sent by the GSM data channel by behind the vocoder compressed coding.Thereby promote the secret level of conversation content.And a side who answers also must use the mobile phone of corresponding security module or landline telephone just can answer the encryption incoming call simultaneously.
If the solution of other GSM perhaps by a gsm module, can be used the UART mouth of this module, can realize bright close difunctional mobile phone terminal by method of the present utility model equally.
The total line traffic control of I2C is recommended general input and output (GPIO) serial equipment---PCA953x.Possess the output of interruption and the input function that resets, make the I2C bus to reset fast, this is even more important for high reliability application apparatuss such as servers,
Claims (2)
1, the portable terminal that has unencryped word and encrypted word bilateral words function, the general input/output port (GPIO) of cell phone mainboard is connected encryption chip and processor, memory and the external vocoder of encrypted tunnel with UART Universal Asynchronous Receiver Transmitter communication serial port (UART), vocoder connects receiver and transmitter again, realizes the secret telephony function; Built-in vocoder by mobile phone directly connects receiver and transmitter realization clear call, it is characterized in that the junction of encrypted tunnel vocoder and the built-in vocoder of unencryped word passage and receiver and transmitter is provided with diverter switch.
2,, it is characterized in that analog switch uses electronic analog swtich or electronically controlled solid-state switch by the described portable terminal of claim 1 with unencryped word and encrypted word bilateral words function.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNU2005200731037U CN2845368Y (en) | 2005-06-28 | 2005-06-28 | Mobile terminal with public and unpublic communications |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNU2005200731037U CN2845368Y (en) | 2005-06-28 | 2005-06-28 | Mobile terminal with public and unpublic communications |
Publications (1)
Publication Number | Publication Date |
---|---|
CN2845368Y true CN2845368Y (en) | 2006-12-06 |
Family
ID=37487310
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNU2005200731037U Expired - Lifetime CN2845368Y (en) | 2005-06-28 | 2005-06-28 | Mobile terminal with public and unpublic communications |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN2845368Y (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101388766A (en) * | 2008-04-30 | 2009-03-18 | 北京大秦兴宇电子有限公司 | Data ciphering and deciphering module and use thereof |
CN104955033A (en) * | 2015-05-28 | 2015-09-30 | 盛耀无线通讯科技(北京)有限公司 | Voice encryption communication method |
CN104955034A (en) * | 2015-05-28 | 2015-09-30 | 盛耀无线通讯科技(北京)有限公司 | Communication conversation method |
-
2005
- 2005-06-28 CN CNU2005200731037U patent/CN2845368Y/en not_active Expired - Lifetime
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101388766A (en) * | 2008-04-30 | 2009-03-18 | 北京大秦兴宇电子有限公司 | Data ciphering and deciphering module and use thereof |
CN104955033A (en) * | 2015-05-28 | 2015-09-30 | 盛耀无线通讯科技(北京)有限公司 | Voice encryption communication method |
CN104955034A (en) * | 2015-05-28 | 2015-09-30 | 盛耀无线通讯科技(北京)有限公司 | Communication conversation method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4401849B2 (en) | System and method for establishing a secondary channel | |
US4920565A (en) | Method for connection of secure conference calls | |
US9363034B2 (en) | Method to encrypt information that is transferred between two communication units | |
KR20060123411A (en) | Apparatus and method for controlling connection status | |
CN101345965A (en) | Encryption call method based on speech code stream and mobile terminal | |
CN101909290A (en) | Method, system and mobile terminal for encrypting voice call | |
CN106604268A (en) | Voice encryption method and system and terminal | |
RU2420013C1 (en) | Mobile station of confidential telephone communication | |
CN2845368Y (en) | Mobile terminal with public and unpublic communications | |
CN100352302C (en) | Mobile terminal having double call functions of public call and privacy call | |
CN101159988A (en) | Method and system of implementing different security level voice encryption | |
US9106429B2 (en) | Method and system for pre-accessing conference telephone and network side device | |
CN1893474A (en) | Method and apparatus for realizing voice enciphering in communication system | |
CN103595844A (en) | Processing method and device for dual-tone multi-frequency number | |
CN1681241A (en) | Secret key distributing method of end-to-end encrypted telecommunication | |
CN1564564A (en) | Setup method and device for chaos secret telephone | |
Islam et al. | Secure end-to-end communication over GSM and PSTN networks | |
CN101193110A (en) | A realizing method of computer voice communication based on wireless communication terminal | |
CN1177431C (en) | Method and mobile device for end-to-end enciphere | |
WO2024139506A1 (en) | Method and system for establishing data communication network, and method and system for data transmission | |
CN101123637A (en) | Intelligent phone terminal, call recording device, method and system for synchronizing call record | |
CN1122559A (en) | Cellular phone interface for a simultaneous voice/data modem | |
CN105025476B (en) | A kind of mobile encrypted communication mechanism of space-time separation | |
Islam et al. | Developing and implementing encryption algorithm for addressing GSM security issues | |
CN1592185A (en) | Terminal to terminal encryption method of cell phone voice and data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
AV01 | Patent right actively abandoned |
Effective date of abandoning: 20050628 |
|
C25 | Abandonment of patent right or utility model to avoid double patenting |