WO2016033822A1 - 信号传输方法及系统 - Google Patents

信号传输方法及系统 Download PDF

Info

Publication number
WO2016033822A1
WO2016033822A1 PCT/CN2014/086394 CN2014086394W WO2016033822A1 WO 2016033822 A1 WO2016033822 A1 WO 2016033822A1 CN 2014086394 W CN2014086394 W CN 2014086394W WO 2016033822 A1 WO2016033822 A1 WO 2016033822A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
file format
data frame
data
chip
Prior art date
Application number
PCT/CN2014/086394
Other languages
English (en)
French (fr)
Inventor
林于翔
Original Assignee
深圳市同盛绿色科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市同盛绿色科技有限公司 filed Critical 深圳市同盛绿色科技有限公司
Publication of WO2016033822A1 publication Critical patent/WO2016033822A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • H04K1/02Secret communication by adding a second signal to make the desired signal unintelligible

Definitions

  • the present invention relates to the field of wireless communications, and in particular, to a signal transmission method and system.
  • the anti-eavesdropping software for smartphones is a mobile phone anti-virus software.
  • the eavesdropping system uses hardware. Way to implant. Therefore, the use of mobile phone anti-virus software can not fundamentally ensure that voice information is not leaked.
  • the technical problem to be solved by the present invention is to provide a signal transmission method and system, which can better prevent eavesdropping.
  • the present invention provides a signal transmission system, including: an encryption chip, which is disposed in a first terminal, wherein the first terminal is installed with a first operating system;
  • the encryption chip converts the data to be transmitted having the original file format in the first terminal into a data frame having a common file format that can be recognized by both the first operating system and the second operating system, and sends the data frame to the second terminal through the channel;
  • the decryption chip is provided with a unique identification code, the encryption chip stores the unique identification code, places the unique identification code in the header of the data frame, and transmits the data frame with the unique identification code to the second terminal through the channel;
  • the common format is JPG format, Any of the PDF formats.
  • the data to be transmitted having the original file format includes an audio signal having an audio file format and a video signal having a video file format.
  • the decryption chip determines whether the unique identification code in the header of the data frame is consistent with the unique identification code of the own data, and if so, converts the data frame having the common file format into the data to be transmitted having the original file format, and if not, determines the handshake Failed to disconnect from the first terminal.
  • the present invention provides a signal transmission system, including: an encryption chip, which is disposed in a first terminal, wherein the first terminal is installed with a first operating system;
  • the encryption chip converts the data to be transmitted having the original file format in the first terminal into a data frame having a common file format that can be recognized by both the first operating system and the second operating system, and sends the data frame to the second terminal through the channel;
  • the decryption chip acquires a data frame and converts the data frame having the common file format into the data to be transmitted having the original file format.
  • the data to be transmitted having the original file format includes an audio signal having an audio file format and a video signal having a video file format.
  • the common format is any one of a JPG format and a PDF format.
  • the decryption chip is provided with a unique identification code, the encryption chip stores the unique identification code, places the unique identification code in the header of the data frame, and transmits the data frame with the unique identification code to the second terminal through the channel.
  • the decryption chip determines whether the unique identification code in the header of the data frame is consistent with the unique identification code of the own data, and if so, converts the data frame having the common file format into the data to be transmitted having the original file format, and if not, determines the handshake Failed to disconnect from the first terminal.
  • the present invention further provides a signal transmission method, which is used for transmitting data to be transmitted in a first terminal to a second terminal, where the first terminal is installed with a first operating system, and is in the first An encryption chip is disposed in the terminal, the second terminal is installed with the second operating system, and the decryption chip is disposed in the second terminal, and the method includes the following steps:
  • the encryption chip converts the data to be transmitted having the original file format in the first terminal into a data frame having a common file format that can be recognized by both the first operating system and the second operating system;
  • the encryption chip sends the data frame to the second terminal through the channel
  • the decryption chip acquires a data frame and converts the data frame having the common file format into the data to be transmitted having the original file format.
  • the data to be transmitted having the original file format includes an audio signal having an audio file format And video signals with video file format.
  • the common format is any one of a JPG format and a PDF format.
  • the decryption chip is provided with a unique identification code, and the encryption chip stores the unique identification code.
  • the step of the encryption chip transmitting the data frame to the second terminal through the channel includes:
  • the encryption chip places the unique identification code in the header of the data frame, and transmits a data frame having a unique identification code to the second terminal through the channel.
  • the step of the decryption chip acquiring the data frame and converting the data frame having the common file format into the data to be transmitted having the original file format includes:
  • the decrypting chip determines whether the unique identification code in the header of the data frame is consistent with the unique identification code of the own data. If yes, the data frame with the common file format is converted into the data to be transmitted with the original file format. If not, the handshake is determined to be failed. Disconnected from the first terminal.
  • the beneficial effect of the present invention is: converting, by the encryption chip, the data to be transmitted having the original file format in the first terminal into a data frame having a common file format that can be recognized by both the first operating system and the second operating system. And sending the data frame to the second terminal through the channel; the decrypting chip acquires the data frame, and converts the data frame having the common file format into the data to be transmitted having the original file format, wherein the encryption chip is set in the first terminal, and the An operating system; the decryption chip is disposed in the second terminal, and the second operating system is installed to better prevent eavesdropping.
  • FIG. 1 is a schematic flow chart of a voice signal transmission method according to a first embodiment of the present invention
  • Figure 2 is a schematic diagram of a speech signal and a noise signal in the present invention
  • FIG. 3 is a schematic structural diagram of a voice signal transmission system according to a first embodiment of the present invention.
  • FIG. 4 is a schematic structural diagram of a first terminal according to an embodiment of the present invention.
  • FIG. 5 is a schematic structural diagram of a second terminal according to a first embodiment of the present invention.
  • FIG. 6 is a schematic structural diagram of a second terminal according to a second embodiment of the present invention.
  • FIG. 7 is a schematic structural diagram of a signal transmission system according to a second embodiment of the present invention.
  • FIG. 8 is a flow chart showing a signal transmission method according to a second embodiment of the present invention.
  • FIG. 1 is a schematic flowchart diagram of a voice signal transmission method according to an embodiment of the present invention. As shown in FIG. 1, the voice signal transmission method includes:
  • Step S10 The first terminal performs a first amplitude transform on the voice signal to obtain an encrypted signal, wherein the first amplitude transform reduces the amplitude of the encrypted signal to 1/n of the voice signal, where n is a positive integer.
  • the voice signal is preferably a voice signal transmitted by a mobile terminal such as a mobile phone during a call.
  • Step S11 The first terminal mixes the encrypted signal with the noise signal to form a mixed signal, wherein the amplitude of the noise signal is greater than the amplitude of the encrypted signal.
  • 1 denotes a speech signal and 2 denotes a noise signal.
  • the encrypted signal obtained by performing the first amplitude conversion of the speech signal 1 is mixed with the noise signal, and the resulting mixed signal has a small amplitude and is mixed in the noise signal and cannot be recognized by the eavesdropper.
  • Step S12 The first terminal loads the mixed signal onto the preset carrier frequency to obtain the modulated signal, and sends the modulated signal to the second terminal in the channel.
  • the second terminal is used as the receiving end.
  • the first method is: the second terminal receives the modulated signal from the transmission channel; the second terminal demodulates the modulated signal according to the preset carrier frequency to obtain the mixed signal; the second terminal pair The mixed signal is filtered to filter the noise signal to obtain the encrypted signal; the second terminal performs the second amplitude transform on the encrypted signal to obtain the voice signal, wherein the second amplitude transform increases the amplitude of the encrypted signal to the original amplitude of the encrypted signal.
  • n times, n is a positive integer.
  • the second method is: the second terminal acquires the modulated signal from the transmission channel; the second terminal demodulates the modulated signal according to the preset carrier frequency to obtain the mixed signal; and the second terminal adds the encrypted signal in the mixed signal. Performing a third amplitude transform and maintaining the amplitude of the noise signal unchanged, obtaining a speech signal having an amplitude greater than the amplitude of the noise signal, wherein the third amplitude transform increases the amplitude of the encrypted signal to m times the original amplitude of the encrypted signal, and m is a positive integer. m>n. In this way, eavesdropping can be prevented without affecting the normal call situation of the mobile terminal such as a mobile phone.
  • FIG. 3 is a schematic structural diagram of a voice signal transmission system according to an embodiment of the present invention.
  • the voice signal transmission system 10 includes a first terminal 20 and a second terminal 30.
  • the first terminal 20 performs a first amplitude transform on the voice signal to obtain an encrypted signal, wherein the first amplitude transform reduces the amplitude of the encrypted signal to 1/n of the voice signal, n is a positive integer; and the encrypted signal is mixed with the noise signal.
  • a mixing signal is formed, wherein the amplitude of the noise signal is greater than the amplitude of the encrypted signal; then the mixed signal is loaded onto the preset carrier frequency to obtain the modulated signal, and the modulated signal is transmitted to the second terminal 30 in the transmission channel.
  • the first terminal 20 mixes the encrypted signal obtained by performing the first amplitude conversion on the voice signal with the noise signal, and the resulting mixed signal has a small amplitude and is mixed in the noise signal and cannot be recognized by the eavesdropper.
  • the second terminal 30 serves as a receiving end, and there are two methods for acquiring a voice signal from the received mixed signal.
  • the first method is: the second terminal 30 receives the modulated signal from the transmission channel, and demodulates the modulated signal according to the preset carrier frequency.
  • the second method is: the second terminal 30 obtains the modulated signal from the transmission channel, demodulates the modulated signal according to the preset carrier frequency, acquires the mixed signal, and then performs the third amplitude of the encrypted signal in the mixed signal.
  • FIG. 4 is a schematic structural diagram of a first terminal according to an embodiment of the present invention.
  • the first terminal 20 includes an encryption chip 21, a first radio frequency circuit 22, and a first radio frequency antenna 23.
  • the encryption chip 21 includes a divider 211 and a mixer 212.
  • the divider 211 is configured to perform a first amplitude transform on the speech signal to obtain an encrypted signal, wherein the first amplitude transform reduces the amplitude of the encrypted signal to 1/n of the speech signal, and n is a positive integer.
  • the mixer 212 is coupled to the divider 211 for mixing the encrypted signal with the noise signal to form a mixed signal, wherein the amplitude of the noise signal is greater than the amplitude of the encrypted signal.
  • the first RF circuit 22 is coupled to the mixer 212 for loading the mixing signal onto the predetermined carrier frequency to obtain the modulated signal.
  • the first RF antenna 23 is coupled to the first RF circuit 22 for transmitting the modulated signal to the second terminal in the transmission channel.
  • the encryption chip 21 mixes the encrypted signal obtained by performing the first amplitude conversion on the speech signal with the noise signal, and the resulting mixed signal has a small amplitude, is mixed in the noise signal, and cannot be recognized by the eavesdropper, and thus can be affected without affecting Mobile phones and other mobile terminals prevent eavesdropping under normal call conditions.
  • FIG. 5 is a schematic structural diagram of a second terminal according to the first embodiment of the present invention.
  • the second terminal 30 includes a second radio frequency antenna 31, a second radio frequency circuit 32, and a decryption chip 33.
  • the decryption chip 33 includes a filter 331 and a multiplier 332.
  • the second RF antenna 31 is for receiving a modulated signal from a transmission channel.
  • the second RF circuit 32 is configured to demodulate the modulated signal according to a preset carrier frequency to obtain a mixed signal.
  • a filter 331 is used to filter the mixed signal to filter the noise signal to obtain an encrypted signal.
  • the multiplier 332 is configured to perform a second amplitude transform on the encrypted signal to obtain a speech signal, wherein the second amplitude transform causes the amplitude of the encrypted signal to increase to n times the original amplitude of the encrypted signal, and n is a positive integer. This makes it possible to smoothly acquire the voice signal from the received modulated signal, thereby preventing eavesdropping without affecting the normal conversation of the mobile terminal such as the mobile phone.
  • FIG. 6 is a schematic structural diagram of a second terminal according to a first embodiment of the present invention.
  • the second terminal 40 includes a second RF antenna 41, a second RF circuit 42, and a decryption chip 43.
  • the second RF antenna 41 is used to acquire the modulated signal from the transmission channel.
  • the second RF circuit 42 is configured to be based on a preset carrier frequency pair The modulated signal is demodulated to obtain a mixed signal.
  • the decrypting chip 43 is configured to perform a third amplitude transform on the encrypted signal in the mixed signal, and keep the amplitude of the noise signal unchanged, and obtain a speech signal whose amplitude is greater than the amplitude of the noise signal, wherein the third amplitude transform increases the amplitude of the encrypted signal to
  • the original amplitude of the encrypted signal is m times, m is a positive integer, m>n.
  • the decryption chip 43 can smoothly acquire the voice signal from the received modulated signal without filtering, and can prevent eavesdropping without affecting the normal call situation of the mobile terminal such as the mobile phone.
  • FIG. 7 is a block diagram showing the structure of a signal transmission system in accordance with a second embodiment of the present invention.
  • the signal transmission system 50 includes an encryption chip 51 and a decryption chip 52.
  • the encryption chip 51 is disposed in the first terminal, wherein the first terminal is installed with the first operating system.
  • the decryption chip 52 is disposed in the second terminal, wherein the second terminal is installed with the second operating system.
  • the encryption chip 51 converts the data to be transmitted having the original file format in the first terminal into a data frame having a common file format that can be recognized by both the first operating system and the second operating system, and transmits the data frame to the second terminal through the transmission channel.
  • the decrypting chip 52 acquires the data frame and converts the data frame having the common file format into the data to be transmitted having the original file format.
  • the data to be transmitted having the original file format includes an audio signal having an audio file format and a video signal having a video file format.
  • the common format is any one of JPG format and PDF format.
  • the first operating system is installed in the encryption chip 51, and the second operating system is also installed in the first terminal.
  • the encryption chip 51 converts the data frame to be transmitted in the original terminal format to the common file format into a data format of the common file format, and then implements the data in the common file format in the second operating system environment.
  • the frame is transmitted to the second terminal.
  • the decryption chip 52 is further provided with a unique identification code.
  • the two are in communication connection, and the second terminal sends the unique identification code provided by the decryption chip 52 to the first terminal, and the encryption chip 51 stores the unique identification code in advance.
  • the encryption chip 51 can also place the unique identification code in the data frame, in particular, can be placed at any position of the data frame, encrypt the data to be transmitted, and then send the data frame with the unique identification code to the second terminal through the transmission channel.
  • a first operating system is also installed in the second terminal, wherein the first operating system is installed in the decrypting chip 52.
  • the process of converting the data frame having the common file format into the data to be transmitted having the original file format by the decrypting chip 52 is implemented in the environment of the first operating system, and the first operating system Other terminals in the network are agnostic, so even if other terminals in the network intercept the transmitted data frames with the common file format, they cannot decrypt them to obtain the specific data transmitted, so it is good. To prevent eavesdropping. If the second terminal receives Is a data frame having a unique identification code, and the decrypting chip 52 determines whether the unique identification code in the data frame is consistent with the unique identification code that is included, and if so, converts the data frame having the common file format into the original file format.
  • the data frame encrypted by the encryption chip and transmitted by the unique identification code can only be decrypted by the second terminal block including the decryption chip, and the other user terminals obtain the data frame transmitted by the encryption chip, because there is no corresponding unique identification code. It cannot be decrypted to obtain the transmitted packet. Therefore, the method of the embodiment of the present invention can better prevent eavesdropping.
  • FIG. 8 is a flow chart showing a signal transmission method according to a second embodiment of the present invention.
  • the signal transmission method is configured to send data to be transmitted in the first terminal to the second terminal.
  • the first terminal is installed with a first operating system, and an encryption chip is disposed in the first terminal, a second operating system is installed in the second terminal, and a decryption chip is disposed in the second terminal.
  • the signal transmission method includes:
  • Step S20 The encryption chip converts the data to be transmitted having the original file format in the first terminal into a data frame having a common file format that can be recognized by both the first operating system and the second operating system.
  • the data to be transmitted in which the original file format is included includes an audio signal having an audio file format and a video signal having a video file format.
  • the common format is any one of JPG format and PDF format.
  • the encryption chip converts the data frame to be transmitted in the original terminal format to the common file format into a data format of the common file format, and then implements the data frame of the common file format in the second operating system environment. Transfer to the second terminal.
  • Step S21 The encryption chip sends the data frame to the second terminal through the channel.
  • the decryption chip is provided with a unique identification code.
  • the two are in communication connection, and the second terminal sends the unique identification code provided by the decryption chip to the first terminal, and the encryption chip stores the unique identification code in advance.
  • the encryption chip places the unique identification code in the data frame and transmits the data frame having the unique identification code to the second terminal through the transmission channel.
  • Step S22 The decryption chip acquires the data frame, and converts the data frame having the common file format into the data to be transmitted having the original file format.
  • step S22 the process of converting the data frame having the common file format into the data to be transmitted having the original file format by the decryption chip is implemented in the environment of the first operating system, and the first operating system environment is for the other in the network.
  • the terminal is invisible, so that even if other terminals in the network intercept the transmitted data frame with the common file format, it cannot decrypt it to obtain the specific data transmitted, so the eavesdropping can be well prevented.
  • the decrypting chip determines whether the unique identification code in the data frame header is consistent with the own unique identification code, and if so, converts the data frame having the common file format into The data to be transmitted has the original file format, and if not, it is judged that the handshake fails and is disconnected from the first terminal. Therefore, the data frame encrypted by the encryption chip and transmitted by the unique identification code can only be decrypted by the second terminal block including the decryption chip, and the other user terminals obtain the data frame transmitted by the encryption chip, because there is no corresponding unique identification code. It cannot be decrypted to obtain the transmitted packet. Therefore, the method of the embodiment of the present invention can better prevent eavesdropping.
  • the present invention converts data to be transmitted having the original file format in the first terminal into a data frame having a common file format that can be recognized by both the first operating system and the second operating system through the encryption chip, and transmits the data frame through the channel.
  • a data frame to the second terminal the decryption chip acquires the data frame, and converts the data frame having the common file format into the data to be transmitted having the original file format, wherein the encryption chip is disposed in the first terminal, and the first operating system is installed;
  • the decryption chip is disposed in the second terminal, and the second operating system is installed to better prevent eavesdropping.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

本发明公开了一种信号传输方法及系统,包括:加密芯片设置在第一终端内,安装有第一操作系统;解密芯片设置在第二终端内,安装有第二操作系统;加密芯片将第一终端中具有原始文件格式的待传输数据转换为具有第一操作系统和第二操作系统均能识别的公用文件格式的数据帧,并通过信道发送数据帧至第二终端;解密芯片获取数据帧,并将具有公用文件格式的数据帧转换为具有原始文件格式的待传输数据。通过上述方式,本发明能够更好地防止窃听。

Description

信号传输方法及系统 【技术领域】
本发明涉及无线通信领域,特别是涉及一种信号传输方法及系统。
【背景技术】
在当今社会,间谍活动日益加剧,高科技手段频出,随着智能手机的普及,越来越多的有针对性的木马、病毒等高科技软件不知不觉地被安装到用户的智能手机上。在用户与他人交流的过程中,秘密窃取涉密信息,造成国家秘密、企业秘密以及个人隐私的泄漏,进而造成国家、集体和个人利益的损失。针对这种情况,需要一种能够随时与手机配合使用的便携式装置既能防止涉密信息的泄漏又不影响手机正常使用。
目前针对智能手机的防窃听软件的手段均为手机杀毒软件,随着木马和病毒的不断更新,并且木马和病毒的植入越来越深层次,甚至有些间谍行为不惜成本,将窃听系统采用硬件方式植入。因此采用手机杀毒软件不能从根本上保证语音信息不被泄漏。
【发明内容】
本发明解决的技术问题是,提供一种信号传输方法及系统,能够更好地防止窃听。
为解决上述技术问题,本发明提供了一种信号传输系统,包括:加密芯片,设置在第一终端内,其中第一终端安装有第一操作系统;
解密芯片,设置在第二终端内,其中第二终端安装有第二操作系统;
加密芯片将第一终端中具有原始文件格式的待传输数据转换为具有第一操作系统和第二操作系统均能识别的公用文件格式的数据帧,并通过信道发送数据帧至第二终端;
解密芯片获取数据帧,并将具有公用文件格式的数据帧转换为具有原始文件格式的待传输数据;
其中,解密芯片设有唯一标识码,加密芯片存储唯一标识码,将唯一标识码置于数据帧的包头,并通过信道发送具有唯一标识码的数据帧至第二终端;公用格式为JPG格式、PDF格式中的任一者。
其中,具有原始文件格式的待传输数据包括具有音频文件格式的音频信号和具有视频文件格式的视频信号。
其中,解密芯片判断数据帧包头中的唯一标识码是否与自带的唯一标识码一致,如果是,将具有公用文件格式的数据帧转换为具有原始文件格式的待传输数据,如果否,判断握手失败,与第一终端断开连接。
为解决上述技术问题,本发明提供了一种信号传输系统,包括:加密芯片,设置在第一终端内,其中第一终端安装有第一操作系统;
解密芯片,设置在第二终端内,其中第二终端安装有第二操作系统;
加密芯片将第一终端中具有原始文件格式的待传输数据转换为具有第一操作系统和第二操作系统均能识别的公用文件格式的数据帧,并通过信道发送数据帧至第二终端;
解密芯片获取数据帧,并将具有公用文件格式的数据帧转换为具有原始文件格式的待传输数据。
其中,具有原始文件格式的待传输数据包括具有音频文件格式的音频信号和具有视频文件格式的视频信号。
其中,公用格式为JPG格式、PDF格式中的任一者。
其中,解密芯片设有唯一标识码,加密芯片存储唯一标识码,将唯一标识码置于数据帧的包头,并通过信道发送具有唯一标识码的数据帧至第二终端。
其中,解密芯片判断数据帧包头中的唯一标识码是否与自带的唯一标识码一致,如果是,将具有公用文件格式的数据帧转换为具有原始文件格式的待传输数据,如果否,判断握手失败,与第一终端断开连接。
为解决上述技术问题,本发明还提供了一种信号传输方法,该方法用于将第一终端中的待传输数据发送至第二终端,第一终端安装有第一操作系统,且在第一终端内设有加密芯片,第二终端安装有第二操作系统,且在第二终端内设有解密芯片,方法包括以下步骤:
加密芯片将第一终端中具有原始文件格式的待传输数据转换为具有第一操作系统和第二操作系统均能识别的公用文件格式的数据帧;
加密芯片通过信道发送数据帧至第二终端;
解密芯片获取数据帧,并将具有公用文件格式的数据帧转换为具有原始文件格式的待传输数据。
其中,具有原始文件格式的待传输数据包括具有音频文件格式的音频信号 和具有视频文件格式的视频信号。
其中,公用格式为JPG格式、PDF格式中的任一者。
其中,解密芯片设有唯一标识码,加密芯片存储唯一标识码,加密芯片通过信道发送数据帧至第二终端的步骤包括:
加密芯片将唯一标识码置于数据帧的包头,并通过信道发送具有唯一标识码的数据帧至第二终端。
其中,解密芯片获取数据帧,并将具有公用文件格式的数据帧转换为具有原始文件格式的待传输数据的步骤包括:
解密芯片判断数据帧包头中的唯一标识码是否与自带的唯一标识码一致,如果是,将具有公用文件格式的数据帧转换为具有原始文件格式的待传输数据,如果否,判断握手失败,与第一终端断开连接。
通过上述方案,本发明的有益效果是:通过加密芯片将第一终端中具有原始文件格式的待传输数据转换为具有第一操作系统和第二操作系统均能识别的公用文件格式的数据帧,并通过信道发送数据帧至第二终端;解密芯片获取数据帧,并将具有公用文件格式的数据帧转换为具有原始文件格式的待传输数据,其中加密芯片设置在第一终端内,安装有第一操作系统;解密芯片设置在第二终端内,安装有第二操作系统,能够更好地防止窃听。
【附图说明】
图1是本发明第一实施例的语音信号传输方法的流程示意图;
图2是本发明中语音信号与噪音信号的示意图;
图3是本发明第一实施例的语音信号传输系统的结构示意图;
图4是本发明实施例的第一终端的结构示意图;
图5是本发明第一实施例的第二终端的结构示意图;
图6是本发明第二实施例的第二终端的结构示意图;
图7是本发明第二实施例的信号传输系统的结构示意图;
图8是本发明第二实施例的信号传输方法的流程示意图。
【具体实施方式】
请参阅图1,图1是本发明实施例的语音信号传输方法的流程示意图。如图1所示,语音信号传输方法包括:
步骤S10:第一终端将语音信号进行第一振幅变换,获得加密信号,其中第一振幅变换使得加密信号的幅度降低为语音信号的1/n,n为正整数。其中语音信号优选为手机等移动终端在通话过程中的传送的语音信号。
步骤S11:第一终端将加密信号与噪音信号混频,形成混频信号,其中噪音信号的振幅大于加密信号的振幅。
其中如图2中所示,1表示语音信号,2表示噪音信号。将语音信号1进行第一振幅变换后得到的加密信号与噪音信号混频,最终得到的混频信号振幅很小,混在噪音信号中,不能为窃听者所识别。
步骤S12:第一终端将混频信号加载到预设载频上以获取已调信号,在信道中发送已调信号至第二终端。
在接收端,可以有两种方法从接收到的混频信号中获取语音信号。第二终端作为接收端,第一种方法是:第二终端从传输信道中接收已调信号;第二终端根据预设载频对已调信号进行解调,获取混频信号;第二终端对混频信号进行滤波,以过滤噪音信号,从而获取加密信号;第二终端将加密信号进行第二振幅变换,获得语音信号,其中第二振幅变换使得加密信号的幅度增大为加密信号原幅度的n倍,n为正整数。第二种方法是:第二终端从传输信道中获取已调信号;第二终端根据预设载频对已调信号进行解调,获取混频信号;第二终端将混频信号中的加密信号进行第三振幅变换,并保持噪音信号幅度不变,获得幅度大于噪音信号幅度的语音信号,其中第三振幅变换使得加密信号的幅度增大为加密信号原幅度的m倍,m为正整数,m>n。如此在不影响手机等移动终端的正常通话情况下,可以防止窃听。
图3是本发明实施例的语音信号传输系统的结构示意图。如图3所示,语音信号传输系统10包括:第一终端20和第二终端30。第一终端20将语音信号进行第一振幅变换,获得加密信号,其中第一振幅变换使得加密信号的幅度降低为语音信号的1/n,n为正整数;将加密信号与噪音信号混频,形成混频信号,其中噪音信号的振幅大于加密信号的振幅;然后将混频信号加载到预设载频上以获取已调信号,并在传输信道中发送已调信号至第二终端30。第一终端20将语音信号进行第一振幅变换后得到的加密信号与噪音信号混频,最终得到的混频信号振幅很小,混在噪音信号中,不能为窃听者所识别。第二终端30作为接收端,可以有两种方法从接收到的混频信号中获取语音信号。第一种方法是:第二终端30从传输信道中接收已调信号,根据预设载频对已调信号进行解调, 获取混频信号,并对混频信号进行滤波,以过滤噪音信号,从而获取加密信号,然后将加密信号进行第二振幅变换,获得语音信号,其中第二振幅变换使得加密信号的幅度增大为加密信号原幅度的n倍,n为正整数。第二种方法是:第二终端30从传输信道中获取已调信号,根据预设载频对已调信号进行解调,获取混频信号,然后将混频信号中的加密信号进行第三振幅变换,并保持噪音信号幅度不变,获得幅度大于噪音信号幅度的语音信号,其中第三振幅变换使得加密信号的幅度增大为加密信号当然幅度的m倍,m为正整数,m>n。如此在不影响手机等移动终端的正常通话情况下,可以防止窃听。
图4是本发明实施例的第一终端的结构示意图。如图4所示,第一终端20包括:加密芯片21、第一射频电路22以及第一射频天线23。其中,加密芯片21包括除法器211和混频器212。除法器211用于将语音信号进行第一振幅变换,获得加密信号,其中第一振幅变换使得加密信号的幅度降低为语音信号的1/n,n为正整数。混频器212与除法器211连接,用于将加密信号与噪音信号混频,形成混频信号,其中噪音信号的振幅大于加密信号的振幅。第一射频电路22与混频器212连接,用于将混频信号加载到预设载频上以获取已调信号。第一射频天线23与第一射频电路22连接,用于在传输信道中发送已调信号至第二终端。如此加密芯片21将语音信号进行第一振幅变换后得到的加密信号与噪音信号混频,最终得到的混频信号振幅很小,混在噪音信号中,不能为窃听者所识别,进而可以在不影响手机等移动终端的正常通话情况下防止窃听。
图5是本发明第一实施例的第二终端的结构示意图。如图5所示,第二终端30包括:第二射频天线31、第二射频电路32以及解密芯片33。解密芯片33包括滤波器331和乘法器332。第二射频天线31用于从传输信道中接收已调信号。第二射频电路32用于根据预设载频对已调信号进行解调,获取混频信号。滤波器331用于对混频信号进行滤波,以过滤噪音信号,从而获取加密信号。乘法器332用于将加密信号进行第二振幅变换,获得语音信号,其中第二振幅变换使得加密信号的幅度增大为加密信号原幅度的n倍,n为正整数。这就可以顺利地从接收的已调信号中获取语音信号,因此可以在不影响手机等移动终端的正常通话情况下防止窃听。
图6是本发明第一实施例的第二终端的结构示意图。如图6所示,第二终端40包括:第二射频天线41、第二射频电路42以及解密芯片43。第二射频天线41用于从传输信道中获取已调信号。第二射频电路42用于根据预设载频对 已调信号进行解调,获取混频信号。解密芯片43用于将混频信号中的加密信号进行第三振幅变换,并保持噪音信号幅度不变,获得幅度大于噪音信号幅度的语音信号,其中第三振幅变换使得加密信号的幅度增大为加密信号原幅度的m倍,m为正整数,m>n。在本发明实施例中,解密芯片43不需要进行滤波即可顺利地从接收的已调信号中获取语音信号,可以在不影响手机等移动终端的正常通话情况下防止窃听。
图7是本发明第二实施例的信号传输系统的结构示意图。如图7所示,信号传输系统50包括:加密芯片51和解密芯片52。加密芯片51设置在第一终端内,其中第一终端安装有第一操作系统。解密芯片52设置在第二终端内,其中第二终端安装有第二操作系统。加密芯片51将第一终端中具有原始文件格式的待传输数据转换为具有第一操作系统和第二操作系统均能识别的公用文件格式的数据帧,并通过传输信道发送数据帧至第二终端。在作为接收端的第二终端中,解密芯片52获取数据帧,并将具有公用文件格式的数据帧转换为具有原始文件格式的待传输数据。
其中,具有原始文件格式的待传输数据包括具有音频文件格式的音频信号和具有视频文件格式的视频信号。公用格式为JPG格式、PDF格式中的任一者。第一操作系统安装在加密芯片51中,而第一终端中还安装有第二操作系统。加密芯片51将第一终端中具有原始文件格式的待传输数据转换为公用文件格式的数据帧是在第一操作系统的环境下实现的,然后在第二操作系统环境下将公用文件格式的数据帧传送至第二终端。
在本发明实施例中,解密芯片52还设有唯一标识码。在第一终端向第二终端传输数据之前,两者进行通信连接,第二终端将解密芯片52设有的唯一标识码发送至第一终端,加密芯片51预先存储该唯一标识码。如此加密芯片51还可以将唯一标识码置于数据帧中,具体地可以置于数据帧的任意位置,以对待传输数据进行加密,然后通过传输信道发送具有唯一标识码的数据帧至第二终端。第二终端中还安装有第一操作系统,其中第一操作系统安装在解密芯片52中。在作为接收端的第二终端中,解密芯片52将具有公用文件格式的数据帧转换为具有原始文件格式的待传输数据的过程是在第一操作系统的环境下实现的,并且第一操作系统对于网络中的其他终端来说是不可知的,如此即使网络中的其他终端截取到所传输的具有公用文件格式的数据帧,也无法对其进行解密以获取所传输的具体数据,因此可以很好地防止窃听。如果第二终端接收的 是具有唯一标识码的数据帧,则解密芯片52判断数据帧中的唯一标识码是否与自带的唯一标识码一致,如果是,将具有公用文件格式的数据帧转换为具有原始文件格式的待传输数据,如果否,判断握手失败,与第一终端断开连接。这就使得加密芯片发送的经唯一标识码加密后的数据帧只有包括解密芯片的第二终端堵可能进行解密,其他用户终端即使获取到加密芯片传输的数据帧,由于没有对应的唯一标识码,不能对其进行解密以获得所传输的数据包。因此本发明实施例方法可以更好地防止窃听。
图8是本发明第二实施例的信号传输方法的流程示意图。该信号传输方法是用于将第一终端中的待传输数据发送至第二终端。其中第一终端安装有第一操作系统,且在第一终端内设有加密芯片,第二终端安装有第二操作系统,且在第二终端内设有解密芯片。如图8所示,信号传输方法包括:
步骤S20:加密芯片将第一终端中具有原始文件格式的待传输数据转换为具有第一操作系统和第二操作系统均能识别的公用文件格式的数据帧。
其中具有原始文件格式的待传输数据包括具有音频文件格式的音频信号和具有视频文件格式的视频信号。公用格式为JPG格式、PDF格式中的任一者。加密芯片将第一终端中具有原始文件格式的待传输数据转换为公用文件格式的数据帧是在第一操作系统的环境下实现的,然后在第二操作系统环境下将公用文件格式的数据帧传送至第二终端。
步骤S21:加密芯片通过信道发送数据帧至第二终端。
在本发明实施例中,解密芯片设有唯一标识码。在第一终端向第二终端传输数据之前,两者进行通信连接,第二终端将解密芯片设有的唯一标识码发送至第一终端,加密芯片预先存储该唯一标识码。如此在步骤S21中,加密芯片将唯一标识码置于数据帧中,并通过传输信道发送具有唯一标识码的数据帧至第二终端。
步骤S22:解密芯片获取数据帧,并将具有公用文件格式的数据帧转换为具有原始文件格式的待传输数据。
在步骤S22中,解密芯片将具有公用文件格式的数据帧转换为具有原始文件格式的待传输数据的过程是在第一操作系统的环境下实现的,并且第一操作系统环境对于网络中的其他终端来说是不可见的,如此即使网络中的其他终端截取到所传输的具有公用文件格式的数据帧,也无法对其进行解密以获取所传输的具体数据,因此可以很好地防止窃听。
如果第二终端接收的是具有唯一标识码的数据帧,则解密芯片判断数据帧包头中的唯一标识码是否与自带的唯一标识码一致,如果是,将具有公用文件格式的数据帧转换为具有原始文件格式的待传输数据,如果否,判断握手失败,与第一终端断开连接。这就使得加密芯片发送的经唯一标识码加密后的数据帧只有包括解密芯片的第二终端堵可能进行解密,其他用户终端即使获取到加密芯片传输的数据帧,由于没有对应的唯一标识码,不能对其进行解密以获得所传输的数据包。因此本发明实施例方法可以更好地防止窃听。
综上所述,本发明通过加密芯片将第一终端中具有原始文件格式的待传输数据转换为具有第一操作系统和第二操作系统均能识别的公用文件格式的数据帧,并通过信道发送数据帧至第二终端;解密芯片获取数据帧,并将具有公用文件格式的数据帧转换为具有原始文件格式的待传输数据,其中加密芯片设置在第一终端内,安装有第一操作系统;解密芯片设置在第二终端内,安装有第二操作系统,能够更好地防止窃听。
以上所述仅为本发明的实施例,并非因此限制本发明的专利范围,凡是利用本发明说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本发明的专利保护范围内。

Claims (13)

  1. 一种信号传输系统,其特征在于,包括:
    加密芯片,设置在第一终端内,其中所述第一终端安装有第一操作系统;
    解密芯片,设置在第二终端内,其中所述第二终端安装有第二操作系统;
    所述加密芯片将所述第一终端中具有原始文件格式的待传输数据转换为具有所述第一操作系统和所述第二操作系统均能识别的公用文件格式的数据帧,并通过信道发送所述数据帧至所述第二终端;
    所述解密芯片获取所述数据帧,并将具有所述公用文件格式的数据帧转换为具有所述原始文件格式的所述待传输数据;
    其中,所述解密芯片设有唯一标识码,所述加密芯片存储所述唯一标识码,将所述唯一标识码置于所述数据帧的包头,并通过所述信道发送具有所述唯一标识码的所述数据帧至所述第二终端;所述公用格式为JPG格式、PDF格式中的任一者。
  2. 根据权利要求1所述的系统,其特征在于,具有所述原始文件格式的所述待传输数据包括具有音频文件格式的音频信号和具有视频文件格式的视频信号。
  3. 根据权利要求1所述的系统,其特征在于,所述解密芯片判断所述数据帧包头中的所述唯一标识码是否与自带的唯一标识码一致,如果是,将具有所述公用文件格式的数据帧转换为具有所述原始文件格式的所述待传输数据,如果否,判断握手失败,与所述第一终端断开连接。
  4. 一种信号传输系统,其特征在于,包括:
    加密芯片,设置在第一终端内,其中所述第一终端安装有第一操作系统;
    解密芯片,设置在第二终端内,其中所述第二终端安装有第二操作系统;
    所述加密芯片将所述第一终端中具有原始文件格式的待传输数据转换为具有所述第一操作系统和所述第二操作系统均能识别的公用文件格式的数据帧,并通过信道发送所述数据帧至所述第二终端;
    所述解密芯片获取所述数据帧,并将具有所述公用文件格式的数据帧转换为具有所述原始文件格式的所述待传输数据。
  5. 根据权利要求4所述的系统,其特征在于,具有所述原始文件格式的所 述待传输数据包括具有音频文件格式的音频信号和具有视频文件格式的视频信号。
  6. 根据权利要求4所述的系统,其特征在于,所述公用格式为JPG格式、PDF格式中的任一者。
  7. 根据权利要求4所述的系统,其特征在于,所述解密芯片设有唯一标识码,所述加密芯片存储所述唯一标识码,将所述唯一标识码置于所述数据帧的包头,并通过所述信道发送具有所述唯一标识码的所述数据帧至所述第二终端。
  8. 根据权利要求7所述的系统,其特征在于,所述解密芯片判断所述数据帧包头中的所述唯一标识码是否与自带的唯一标识码一致,如果是,将具有所述公用文件格式的数据帧转换为具有所述原始文件格式的所述待传输数据,如果否,判断握手失败,与所述第一终端断开连接。
  9. 一种信号传输方法,其特征在于,所述方法用于将第一终端中的待传输数据发送至第二终端,所述第一终端安装有第一操作系统,且在所述第一终端内设有加密芯片,所述第二终端安装有第二操作系统,且在所述第二终端内设有解密芯片,所述方法包括以下步骤:
    所述加密芯片将所述第一终端中具有原始文件格式的待传输数据转换为具有所述第一操作系统和所述第二操作系统均能识别的公用文件格式的数据帧;
    所述加密芯片通过信道发送所述数据帧至所述第二终端;
    所述解密芯片获取所述数据帧,并将具有所述公用文件格式的数据帧转换为具有所述原始文件格式的所述待传输数据。
  10. 根据权利要求9所述的方法,其特征在于,具有所述原始文件格式的所述待传输数据包括具有音频文件格式的音频信号和具有视频文件格式的视频信号。
  11. 根据权利要求9所述的方法,其特征在于,所述公用格式为JPG格式、PDF格式中的任一者。
  12. 根据权利要求9所述的方法,其特征在于,所述解密芯片设有唯一标识码,所述加密芯片存储所述唯一标识码,所述加密芯片通过信道发送所述数据帧至所述第二终端的步骤包括:
    所述加密芯片将所述唯一标识码置于所述数据帧的包头,并通过所述信道发送具有所述唯一标识码的所述数据帧至所述第二终端。
  13. 根据权利要求12所述的方法,其特征在于,所述解密芯片获取所述数 据帧,并将具有所述公用文件格式的数据帧转换为具有所述原始文件格式的所述待传输数据的步骤包括:
    所述解密芯片判断所述数据帧包头中的所述唯一标识码是否与自带的唯一标识码一致,如果是,将具有所述公用文件格式的数据帧转换为具有所述原始文件格式的所述待传输数据,如果否,判断握手失败,与所述第一终端断开连接。
PCT/CN2014/086394 2014-09-05 2014-09-12 信号传输方法及系统 WO2016033822A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410453402.7 2014-09-05
CN201410453402.7A CN105471829A (zh) 2014-09-05 2014-09-05 信号传输方法及系统

Publications (1)

Publication Number Publication Date
WO2016033822A1 true WO2016033822A1 (zh) 2016-03-10

Family

ID=55439061

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/086394 WO2016033822A1 (zh) 2014-09-05 2014-09-12 信号传输方法及系统

Country Status (2)

Country Link
CN (1) CN105471829A (zh)
WO (1) WO2016033822A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106230799A (zh) * 2016-07-26 2016-12-14 深圳市金立通信设备有限公司 一种信息的发送方法、接收方法及相关终端

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102012984A (zh) * 2010-11-19 2011-04-13 中兴通讯股份有限公司 移动终端密钥的更新方法及移动终端
CN102412967A (zh) * 2011-09-29 2012-04-11 用友软件股份有限公司 数据传输系统和方法
CN103095839A (zh) * 2013-01-21 2013-05-08 中国工商银行股份有限公司 一种客户端数据展现系统及方法

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU577742B2 (en) * 1984-07-13 1988-09-29 Motorola, Inc. Cellular voice and data radiotelephone system
JP3427975B2 (ja) * 1999-07-01 2003-07-22 セイコーエプソン株式会社 プリンタ制御回路、プリンタ及びプリントシステム
JP2001256308A (ja) * 2000-03-13 2001-09-21 Nippon Telegraph & Telephone West Corp 介護情報交換方法および介護情報交換システム
AU2005277150B2 (en) * 2004-08-21 2011-05-26 Directworks, Inc. Methods, systems, and apparatuses for extended enterprise commerce
CN100365631C (zh) * 2005-11-22 2008-01-30 北京中星微电子有限公司 一种共相式多媒体集成播放系统和方法
CN1988441A (zh) * 2005-12-21 2007-06-27 中国银联股份有限公司 数据安全传输的方法
CN100507784C (zh) * 2006-06-06 2009-07-01 中国地质科学院地质研究所 一种远程控制的系统和方法
CN101661512B (zh) * 2009-09-25 2012-01-11 万斌 一种识别传统表单信息并创建对应Web表单的系统及方法
CN102289497A (zh) * 2011-08-22 2011-12-21 上海梅花信息有限公司 文档预览图生成系统及方法
CN102638468B (zh) * 2012-04-12 2015-09-09 华为技术有限公司 保护信息传输安全的方法、发送端、接收端及系统
CN103414894A (zh) * 2013-07-29 2013-11-27 上海凯统信息科技有限公司 一种无线实时传屏设备及方法
CN103942643B (zh) * 2014-04-03 2017-09-26 中企永联数据交换技术(北京)有限公司 Edi安全电子凭证交互方法、终端及实现装置
CN103986942B (zh) * 2014-06-05 2017-05-24 北京赛维安讯科技发展有限公司 基于cdn网络的数据分发系统及方法

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102012984A (zh) * 2010-11-19 2011-04-13 中兴通讯股份有限公司 移动终端密钥的更新方法及移动终端
CN102412967A (zh) * 2011-09-29 2012-04-11 用友软件股份有限公司 数据传输系统和方法
CN103095839A (zh) * 2013-01-21 2013-05-08 中国工商银行股份有限公司 一种客户端数据展现系统及方法

Also Published As

Publication number Publication date
CN105471829A (zh) 2016-04-06

Similar Documents

Publication Publication Date Title
US11777716B2 (en) Key exchange method and apparatus
KR101808146B1 (ko) 인증 크리덴셜의 보안 프로비저닝
CN104170422B (zh) 在lte接入网中集成wifi无线电接口的安全性解决方法及装置
US8787572B1 (en) Enhanced association for access points
TWI336197B (en) Systems and methods for negotiating security parameters for protecting management frames in wireless networks
US8494164B2 (en) Method for connecting wireless communications, wireless communications terminal and wireless communications system
WO2017133021A1 (zh) 一种安全处理方法及相关设备
WO2015164999A1 (zh) 虚拟卡下载方法、终端及中间设备
US20180095500A1 (en) Tap-to-dock
US9319878B2 (en) Streaming alignment of key stream to unaligned data stream
CN114026820A (zh) 数据上传方法、数据下载方法及相关设备
CN108966217B (zh) 一种保密通信方法、移动终端及保密网关
EP1942625B1 (en) Method and apparatus for performing ciphering in a wireless communications system
WO2016033821A1 (zh) 语音信号传输方法、终端及系统
CN111770588B (zh) 一种与无线路由器快速建立无线连接的方法及系统
CN107529205A (zh) 一种基于wifi热点的网络设备的上网配置方法
WO2016033822A1 (zh) 信号传输方法及系统
US9467428B2 (en) Information security attachment device for voice communication and information security method for voice communication using the same
US9960922B2 (en) Device-to-device communication security with authentication certificates
CN113412655A (zh) 一种信息传输方法及装置、网络设备、用户设备
CN105827601A (zh) 移动设备数据加密应用方法及系统
CN107277935B (zh) 蓝牙通信方法、装置及其应用系统和设备
CN105577631B (zh) 一种数据传输的方法及终端
CN104335621A (zh) 关联标识通信装置和关联标识通信方法
WO2016176902A1 (zh) 一种终端认证方法、管理终端及申请终端

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14901217

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14901217

Country of ref document: EP

Kind code of ref document: A1