WO2018153011A1 - 一种面向对讲系统的端到端语音加密装置和加密方法 - Google Patents

一种面向对讲系统的端到端语音加密装置和加密方法 Download PDF

Info

Publication number
WO2018153011A1
WO2018153011A1 PCT/CN2017/093325 CN2017093325W WO2018153011A1 WO 2018153011 A1 WO2018153011 A1 WO 2018153011A1 CN 2017093325 W CN2017093325 W CN 2017093325W WO 2018153011 A1 WO2018153011 A1 WO 2018153011A1
Authority
WO
WIPO (PCT)
Prior art keywords
voice
encryption
module
processing module
data
Prior art date
Application number
PCT/CN2017/093325
Other languages
English (en)
French (fr)
Inventor
杨晓云
柳昌翱
Original Assignee
深圳市云密通讯技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市云密通讯技术有限公司 filed Critical 深圳市云密通讯技术有限公司
Publication of WO2018153011A1 publication Critical patent/WO2018153011A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L19/00Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
    • G10L19/008Multichannel audio signal coding or decoding using interchannel correlation to reduce redundancy, e.g. joint-stereo, intensity-coding or matrixing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/0071Use of interleaving
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/0078Avoidance of errors by organising the transmitted data in a format specifically designed to deal with errors, e.g. location
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q5/00Selecting arrangements wherein two or more subscriber stations are connected by the same line to the exchange
    • H04Q5/24Selecting arrangements wherein two or more subscriber stations are connected by the same line to the exchange for two-party-line systems

Definitions

  • the invention belongs to the field of information security of mobile communication, and particularly relates to an end-to-end voice encryption device and an encryption method for an intercom system.
  • the application number is 200810132259.6, and an end-to-end voice encryption method, device and system are proposed.
  • the calling party in the call state receives the key management server to send the key information by means of a short message, and implements the key information according to the key message. Encrypt the call.
  • the invention requires a key management server, which is costly and difficult to be accepted by a general user, and transmits a key by means of a short message, the key is easily intercepted, and the security strength is low.
  • the application number is 200810068567.7, and a voice encryption method, a decryption method, an encryption and decryption method, and a mobile terminal are provided.
  • the voice data frame to be sent is periodically transmitted to the encryption module, and the encryption module encrypts the received voice data frame.
  • the encrypted voice data is sent, and the received voice data is decrypted and played by the decryption module.
  • the invention encrypts only voice data frames without authentication and is vulnerable to third party attacks. And the invention performs key agreement, that is, the key is fixed. Such encryption is extremely vulnerable to brute force and is not safe.
  • the application number is 200610113226.9
  • An end-to-end encryption method and encryption system based on mobile communication network is proposed.
  • the invention adopts stream cipher system for end-to-end encryption, and uses key management center to perform key management on the entire security system, which is distributed according to the key management center.
  • the ciphertext voice data is encrypted/decrypted.
  • the invention requires a special key management center, which requires high cost; the XOR algorithm uses a low encryption strength and is vulnerable to attack.
  • the application number is 201110173832.X, a method, a terminal and a system for trunking call voice encryption are proposed. All the member terminals of the calling and called parties obtain the encrypted call to the key distribution server KDS through the base station subsystem BBS in the process of establishing the encrypted call. After entering the encrypted session, all the member terminals of the calling and called parties use the same session key to encrypt the transmitted voice frame during the call, and decrypt the received voice frame.
  • the invention encrypts only voice data frames and is vulnerable to third party attacks. And the invention adopts a method of applying a key to a key server, that is, the key is fixed. Such encryption is extremely vulnerable to brute force and is not safe.
  • the application number is 201410160782.5, and the called terminal, the calling terminal, the voice communication method and the system are proposed.
  • the invention realizes encrypting the original voice data locally at the calling terminal or the called terminal, and passes the encrypted voice data to the terminal.
  • the end transmission service channel is directly sent to the peer end, thereby realizing full encryption of the voice call between the calling terminal and the called terminal.
  • the invention directly performs encryption and scrambling processing on the original voice data, and the encryption strength is too low, which is easy to be cracked, and the security and confidentiality are insufficient.
  • the invention solves the technical problem of low encryption strength of the prior art, and provides an end-to-end speech encryption device and an encryption method for the intercom system, which is suitable for all intercom systems and meets the end-to-end secure communication of the intercom system user. Demand.
  • the present invention provides an end-to-end voice encryption device for an intercom system.
  • the specific technical solutions are as follows:
  • An end-to-end voice encryption device for an intercom system comprising:
  • the voice collection and playing module collects and plays the voices of both parties of the call
  • a voice compression coding and decoding module compressing and encoding the transmitted audio data, and decoding and restoring the received audio data
  • the encryption and decryption processing module encrypts and decrypts the transmitted voice data, and performs dynamic key replacement in each session to realize a call once key;
  • the data transmission processing module is configured to send and receive audio data, and encrypt and decrypt the audio data by calling an encryption and decryption processing module.
  • the voice collection and play module comprises a recording unit and a sounding unit, the recording unit completes the collection of the audio data and writes the buffer, and the sounding unit reads the decoded audio data for playing.
  • the voice compression coding and decoding module comprises a voice compression coding module and a voice decoding module, and the voice compression coding module uses a low-rate voice processing method to convert the audio data into a low-speed voice information, and the voice decoding module The compressed voice information is decompressed and decoded into voice information.
  • the encryption and decryption processing module includes an encryption processing module and a decryption processing module, and the encryption processing module encrypts the audio data to be transmitted; the decryption processing module decrypts the received encrypted audio data.
  • the data transmission module comprises an error correction coding code module, an interleaving deinterleaving module, a scrambling descrambling module and a modem module, wherein:
  • An error correction coding code module configured to perform error correction coding processing on the input information stream and perform error correction decoding processing on the received information stream;
  • An interleaving deinterleaving module configured to perform scrambling on the distribution of the encoded information sequence and perform distributed conversion on the received information sequence
  • the scrambling and descrambling module calls the key of the encryption processing module to perform encryption and scrambling processing on the coded interleaved information sequence; and the key of the decryption processing module is used to perform decryption and descrambling processing on the deinterleaved decoded information sequence;
  • the modem module is configured to modulate and transmit the scrambled information sequence to the wireless channel and demodulate the data packet received by the wireless channel.
  • the present invention provides an encryption method corresponding to an encryption device, and the specific technical solutions are as follows:
  • An end-to-end voice encryption method for an intercom system includes the following steps:
  • the voice collection module collects voice information and converts it into digital information.
  • the voice compression coding module compresses and encodes the collected digital information.
  • the data transmission processing module performs error correction coding processing on the compressed and encoded voice information.
  • the data transmission processing module interleaves the error-correction-coded information sequence to perform a scrambling process on the distribution;
  • the data transmission processing module invokes a key of the encryption processing module to perform encryption and scrambling processing on the coded interleaved information sequence;
  • the data transmission processing module digitally modulates the scrambled information sequence and sends the information sequence to the wireless channel.
  • the intercom terminal B user receives the data information of the wireless channel, and determines whether the voice data information is synchronously.
  • the data transmission processing module performs demodulation processing on the data packet received by the wireless channel.
  • the data transmission processing module calls the key of the decryption processing module to perform decryption and descrambling processing on the demodulated information sequence;
  • the data transmission processing module performs deinterleaving, that is, distribution conversion, on the decrypted descrambled information sequence.
  • S205 The data transmission processing module performs error correction decoding on the deinterleaved information.
  • the speech decoding module decodes and corrects the error-corrected decoded data into voice audio data.
  • the voice playing module reads the decoded audio data by the voice encoding and decoding module, and converts the converted audio data into analog voice for playing.
  • the encryption and decryption processing module calls the data encryption standard algorithm to dynamically generate a key to ensure high-intensity encryption performance at one time and one secret.
  • a repeater is provided between the intercom terminal A and the docking terminal B, and the data signal transmitted to the radio channel in step S107 is forwarded via the repeater, and then received in step S201.
  • the present invention has the following beneficial effects:
  • the present invention does not depend on the model and mode of the intercom system, and the intercom system that can be intercommunicated can use the present invention for secure voice communication, and can realize plug-and-play with any intercom system, and the application range is very Wide range and easy to achieve high-intensity encryption, in line with market demand;
  • the invention adopts the data encryption standard algorithm to encrypt, the algorithm has high security, and the user key is managed by the user, and the encryption is performed once and one secret, which can resist any eavesdropping and cracking, and can effectively avoid various security risks. High reliability;
  • the present invention can be completely independent of the communication system as an independent functional module, does not directly access the channel, greatly reduces the application limitation, and has the advantages of high security and low delay, and is suitable for large-scale popularization and application;
  • the present invention solves the communication security problem of the majority of the intercom system with a universal plug-and-play module, and has a broad application market.
  • Figure 1 is a schematic view of the working principle of the present invention
  • FIG. 2 is a schematic diagram of a workflow of an embodiment of the present invention.
  • FIG. 3 is a schematic diagram of a workflow of another embodiment of the present invention.
  • the end-to-end voice encryption method and device for the intercom system improve the confidentiality and reliability of the voice through the high-intensity digital encryption method because the plaintext in the existing intercom system communication is easily stolen and intercepted and intercepted. It can be encrypted by the data encryption standard algorithm in the process of voice communication. The security of the algorithm is high, and the user key is managed by the user. The encryption is performed once and one secret, which can resist any eavesdropping and cracking, and can effectively avoid various security. Hidden dangers.
  • the end-to-end voice encryption method and device for the intercom system includes a voice collection and playback module connected in sequence, which collects and plays the voices of both parties through the recording unit and the playback unit, and converts the voices.
  • the collected voice data is written into the buffer through the recording unit, on the one hand, the decoded data is input into the playback unit for playing; the voice encoding and decoding module is collected and played by the voice compression coding unit and the voice decoding unit.
  • the voice data of the module is compressed and decoded and decoded; the data transmission processing module encrypts and decrypts the voice data by calling the encryption and decryption processing module.
  • an end-to-end voice encryption method for an intercom system includes the following steps:
  • Step 1 The intercom terminal A user presses Ptt to initiate a call;
  • Step 2 The voice collection and playback module collects voice information and converts it into digital information
  • Step 3 The voice compression coding and decoding module compresses and encodes the collected digital information.
  • Step 4 The data transmission processing module performs error correction coding processing on the compressed and encoded voice information
  • Step 5 The data transmission processing module interleaves the error-correction-coded information sequence to perform a scrambling process on the distribution;
  • Step 6 The data transmission processing module calls the key of the encryption processing module to perform encryption and scrambling processing on the information sequence after coding and interleaving;
  • Step 7 The data transmission processing module digitally modulates the scrambled information sequence and sends the information sequence to the wireless channel.
  • Step 1 The intercom terminal B user receives the data information of the wireless channel, and determines whether it is voice data information by synchronization;
  • Step 2 The data transmission processing module performs demodulation processing on the data packet received by the wireless channel;
  • Step 3 The data transmission processing module calls the key of the decryption processing module to decrypt and descramble the demodulated information sequence;
  • Step 4 The data transmission processing module performs deinterleaving, that is, distribution conversion, on the decrypted descrambled information sequence;
  • Step 5 The data transmission processing module performs error correction decoding on the deinterleaved information
  • Step 6 The speech compression coding and decoding module decodes and corrects the error-corrected data into voice audio data.
  • Step 7 The voice collection and playback module reads the decoded audio data by the voice code decoding module, and converts the audio data into analog voice for playing.
  • the encryption and decryption module will call the data encryption standard algorithm to dynamically generate a key to ensure high-intensity encryption performance at one time.
  • FIG. 3 is a schematic diagram of the operation of another embodiment of the present invention.
  • the difference from FIG. 2 is that the data signal sent by the intercom terminal A to the wireless channel is forwarded by the relay terminal, and then received by the intercom terminal B. Improve communication quality and communication distance.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Mathematical Physics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computational Linguistics (AREA)
  • Health & Medical Sciences (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Human Computer Interaction (AREA)
  • Acoustics & Sound (AREA)
  • Multimedia (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明公开了一种面向对讲系统的端到端语音加密装置和加密方法,该加密装置包括:语音采集播放模块,采集和播放通话双方的语音;语音压缩编码解码模块,对发送的音频数据进行压缩编码以及对接收的音频数据进行解码还原;加解密处理模块,对传输的语音数据进行加密和解密处理,并在每次会话时进行动态密钥更换,实现一次通话一次密钥;数据传输处理模块,用于对音频数据进行发送和接收,并通过调用加解密处理模块实现音频数据的加解密。与现有技术相比,本发明:(1)可以实现与任意对讲系统的即插即用,应用范围十分广泛;(2)采用一次一密的方式进行加密,可以抵抗任何窃听和破解,能够高效避免各种安全隐患,可靠性较高;(3)作为一个独立的功能模块完全独立于通信系统,不直接接入信道,大大降低了应用限制,同时具有高安全性和低延迟等优点,适合大规模推广应用。

Description

一种面向对讲系统的端到端语音加密装置和加密方法
【技术领域】
本发明属于移动通讯的信息安全领域,尤其涉及面向对讲系统的端到端语音加密装置和加密方法。
【背景技术】
现今的社会飞速发展,犯罪的形式和方式越来越灵活多变,而且犯罪分子反侦察能力有所加强,这样给我们的武警边防的侦察破案提出了更高的要求。武警边防外出查案和抓犯罪嫌疑人时,指挥官只能通过对讲系统进行指挥和联络。但是对讲系统明文通话的安全保密性差,通话内容极易被人从空中截获监听,严重影响作战任务的顺利执行,故保密性和安全性是现有对讲系统需要解决的重要内容之一。
申请号为200810132259.6提出了一种端到端语音加密方法、装置及系统,该发明中处于通话状态的主叫双方接收密钥管理服务器通过短消息的方式发送密钥信息,并依据密钥消息实现加密通话。该发明需要密钥管理服务器,成本高昂,难以被一般用户所接受,而且通过短消息的方式发送密钥,密钥容易被截获,安全强度低。
申请号为200810068567.7提出了一种语音加密方法、解密方法、加解密方法及移动终端,将得到待发送的语音数据帧周期性地向加密模块传输,加密模块对接收到的语音数据帧进行加密后,发送加密的语音数据,通过解密模块对接收的语音数据进行解密后播放。该发明只对语音数据帧进行加密而没有进行身份验证,容易受到第三方攻击。且该发明进行密钥协商,即密钥是固定的。这样的加密极易遭受暴力破解,是不安全的。
申请号为200610113226.9 提出了一种基于移动通信网络的端到端加密方法和加密系统,该发明采用流密码体制进行端到端加密,采用密钥管理中心对整个保密系统进行密钥管理,根据密钥管理中心分发的密钥生成加密密钥流/ 或解密密钥流,通过异或算法对明文/ 密文的语音数据进行加密/解密。该发明需要专门的密钥管理中心,需高昂的成本;采用异或算法,加密强度较低,容易遭受攻击。
申请号为201110173832.X提出了一种集群呼叫语音加密的方法、终端和系统,主被叫所有成员终端在加密呼叫建立过程中分别通过基站子系统BBS向密钥分配服务器KDS获取本次加密通话的会话密钥,进入加密通话后,主被叫所有成员终端在通话过程中都使用同一会话密钥对发送的语音帧进行加密,对接收的语音帧进行解密。该发明只对语音数据帧进行加密,容易受到第三方攻击。且该发明采用向密钥服务器申请密钥的方式,即密钥是固定的。这样的加密极易遭受暴力破解,是不安全的。
申请号为201410160782.5提出了被叫终端、主叫终端、语音通信方法及系统,该发明是在主叫终端或被叫终端本地实现对原始语音数据进行加密,并将加密后的语音数据通过端到端传输业务通道直接发送给对端,从而实现主叫终端和被叫终端之间的语音通话全程加密。该发明是对原始语音数据直接做加密扰码处理,加密强度太低,容易被破解,安全保密性不够。
因此,现有技术存在缺陷,需要进一步改进。
【发明内容】
本发明所要解决现有技术加密强度低的技术问题,提供一种面向对讲系统的端到端语音加密装置和加密方法,其面向所有的对讲系统,满足对讲系统用户端到端安全通信的需求。
首先,本发明提供一种面向对讲系统的端到端语音加密装置,具体技术方案如下:
一种面向对讲系统的端到端语音加密装置,包括:
语音采集播放模块,采集和播放通话双方的语音;
语音压缩编码解码模块,对发送的音频数据进行压缩编码以及对接收的音频数据进行解码还原;
加解密处理模块,对传输的语音数据进行加密和解密处理,并在每次会话时进行动态密钥更换,实现一次通话一次密钥;
数据传输处理模块,用于对音频数据进行发送和接收,并通过调用加解密处理模块实现音频数据的加解密。
较佳地,所述语音采集播放模块包括录音单元和放音单元,录音单元完成音频数据的采集并写入缓存,放音单元读取解码的音频数据进行播放。
较佳地,所述语音压缩编码解码模块包括语音压缩编码模块和语音解码模块,语音压缩编码模块采用低速率语音处理方法,将音频数据进行压缩编码转换变为低速的语音信息,语音解码模块将已压缩的语音信息解压解码还原成语音信息。
较佳地,所述加解密处理模块包括加密处理模块和解密处理模块,加密处理模块对要发送的音频数据进行加密;解密处理模块对接收到的加密的音频数据进行解密。
较佳地,数据传输模块包括纠错编译码模块、交织解交织模块、加扰解扰模块和调制解调模块,其中:
纠错编译码模块,用于对输入的信息流进行纠错编码处理以及对接收的信息流进行纠错译码处理;
交织解交织模块,用于对编码后的信息序列的分布进行打乱处理以及对接收到的信息序列进行分布转换;
加扰解扰模块,调用加密处理模块的密钥对编码交织后的信息序列进行加密加扰处理;以及调用解密处理模块的密钥对解交织解码后的信息序列进行解密解扰处理;
调制解调模块,用于对加扰后的信息序列进行调制发送到无线信道以及对无线信道接收的数据包进行解调处理。
其次,本发明提供一种加密装置对应的加密方法,具体技术方案如下:
一种面向对讲系统的端到端语音加密方法,包括如下步骤:
3) 发送步骤
S101:对讲终端A发起通话;
S102:语音采集模块采集语音信息并将其转换为数字信息;
S103:语音压缩编码模块对采集的数字信息进行压缩编码;
S104:数据传输处理模块对压缩编码后的语音信息进行纠错编码处理;
S105:数据传输处理模块对纠错编码后的信息序列进行交织即对分布进行打乱处理;
S106:数据传输处理模块调用加密处理模块的密钥对编码交织后的信息序列进行加密加扰处理;
S107:数据传输处理模块对加扰后的信息序列进行数字调制并发送到无线信道;
4) 接收步骤
S201:对讲终端B用户接收无线信道的数据信息,并通过同步判断是否为语音数据信息;
S202:数据传输处理模块对无线信道接收的数据包进行解调处理;
S203:数据传输处理模块调用解密处理模块的密钥对解调后的信息序列进行解密解扰处理;
S204:数据传输处理模块对解密解扰后的信息序列进行解交织即分布转换;
S205:数据传输处理模块对解交织后的信息进行纠错译码;
S206:语音解码模块对纠错译码后的数据进行解码还原成语音音频数据;
S207:语音播放模块读取语音编码解码模块进行解码后的音频数据,并转换成模拟语音进行播放。
上述步骤中,当每次语音传输信道建立时,加解密处理模块会调用数据加密标准算法动态产生密钥,保证一次一密的高强度加密性能。
较佳地,对讲终端A与对接终端B之间设有中继器,步骤S107中发送到无线信道的数据信号经由中继器转发后,再由步骤S201接收。
与现有技术相比,本发明具有如下有益效果:
(1)本发明不依赖对讲系统的型号和模式,任意可以互通的对讲系统之间都可以采用本发明进行保密语音通信,可以实现与任意对讲系统的即插即用,应用范围十分广泛,且能够简便地实现高强度加密,符合市场需求;
(2)本发明采用数据加密标准算法加密,算法安全性较高,且用户密钥由用户管理,采用一次一密的方式进行加密,可以抵抗任何窃听和破解,能够高效避免各种安全隐患,可靠性较高;
(3)本发明能够作为一个独立的功能模块完全独立于通信系统,不直接接入信道,大大降低了应用限制,同时具有高安全性和低延迟等优点,适合大规模推广应用;
(4)本发明以一个通用型即插即用模块解决了广大对讲系统的通信安全问题,具有广阔的应用市场。
【附图说明】
图1 是本发明工作原理示意图;
图2是本发明一实施例的工作流程示意图;
图3是本发明另一实施例的工作流程示意图。
【具体实施方式】
由于现有对讲系统通信中明文极易被窃取监听和截获,本发明一种面向对讲系统的端到端语音加密方法和装置通过高强度的数字化加密方法,提高语音的保密性和可靠性,可在语音通信过程中采用数据加密标准算法加密,算法安全性较高,且用户密钥由用户管理,采用一次一密的方式进行加密,可以抵抗任何窃听和破解,能够高效避免各种安全隐患。
请参阅图1,本面向对讲系统的端到端语音加密方法和装置,其包括依次连接的语音采集播放模块,其通过录音单元和放音单元采集和播放通话双方的语音,并将其转换为数字信息,一方面通过录音单元将采集的语音数据写入缓存,一方面读取解码的数据输入放音单元进行播放;语音编码解码模块,其通过语音压缩编码单元和语音解码单元对采集播放模块的语音数据进行压缩编码和解码还原;数据传输处理模块通过调用加解密处理模块对语音数据进行加密和解密。
请一并参阅图2,本发明一种面向对讲系统的端到端语音加密方法具体包括以下步骤:
1)发送步骤
步骤一、对讲终端A用户按下Ptt,发起通话;
步骤二、语音采集播放模块采集语音信息并将其转换为数字信息;
步骤三、语音压缩编码解码模块对采集的数字信息进行压缩编码;
步骤四、数据传输处理模块对压缩编码后的语音信息进行纠错编码处理;
步骤五、数据传输处理模块对纠错编码后的信息序列进行交织即对分布进行打乱处理;
步骤六、数据传输处理模块调用加密处理模块的密钥对编码交织后的信息序列进行加密加扰处理;
步骤七、数据传输处理模块对加扰后的信息序列进行数字调制并发送到无线信道;
2)接收步骤
步骤一、对讲终端B用户接收无线信道的数据信息,并通过同步判断是否为语音数据信息;
步骤二、数据传输处理模块对无线信道接收的数据包进行解调处理;
步骤三、数据传输处理模块调用解密处理模块的密钥对解调后的信息序列进行解密解扰处理;
步骤四、数据传输处理模块对解密解扰后的信息序列进行解交织即分布转换;
步骤五、数据传输处理模块对解交织后的信息进行纠错译码;
步骤六、语音压缩编码解码模块对纠错译码后的数据进行解码还原成语音音频数据;
步骤七、语音采集播放模块读取语音编码解码模块进行解码后的音频数据,并转换成模拟语音进行播放。
当每次语音传输信道建立时,加解密模块会调用数据加密标准算法动态产生密钥,保证一次一密的高强度加密性能。
请参阅图3,是本发明的另一实施例的工作示意图,与图2的区别是,对讲终端A发送到无线信道的数据信号经由中继转发后,再由对讲终端B接收,可以提高通信质量和通信距离。
以上所述,仅为本发明较佳的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明披露的技术范围内,根据本发明的技术方案及其发明构思加以等同替换或改变,都应涵盖在本发明的保护范围之内。

Claims (7)

  1. 一种面向对讲系统的端到端语音加密装置,其特征在于,包括:
    语音采集播放模块,采集和播放通话双方的语音;
    语音压缩编码解码模块,对发送的音频数据进行压缩编码以及对接收的音频数据进行解码还原;
    加解密处理模块,对传输的语音数据进行加密和解密处理,并在每次会话时进行动态密钥更换,实现一次通话一次密钥;
    数据传输处理模块,用于对音频数据进行发送和接收,并通过调用加解密处理模块实现音频数据的加解密。
  2. 根据权利要求1所述的面向对讲系统的端到端语音加密装置,其特征在于,所述语音采集播放模块包括录音单元和放音单元,录音单元完成音频数据的采集并写入缓存,放音单元读取解码的音频数据进行播放。
  3. 根据权利要求2所述的面向对讲系统的端到端语音加密装置,其特征在于,所述语音压缩编码解码模块包括语音压缩编码模块和语音解码模块,语音压缩编码模块采用低速率语音处理方法,将音频数据进行压缩编码转换变为低速的语音信息,语音解码模块将已压缩的语音信息解压解码还原成语音信息。
  4. 根据权利要求3所述的面向对讲系统的端到端语音加密装置,其特征在于,所述加解密处理模块包括加密处理模块和解密处理模块,加密处理模块对要发送的音频数据进行加密;解密处理模块对接收到的加密的音频数据进行解密。
  5. 根据权利要求4所述的面向对讲系统的端到端语音加密装置,其特征在于,数据传输模块包括纠错编译码模块、交织解交织模块、加扰解扰模块和调制解调模块,其中:
    纠错编译码模块,用于对输入的信息流进行纠错编码处理以及对接收的信息流进行纠错译码处理;
    交织解交织模块,用于对编码后的信息序列的分布进行打乱处理以及对接收到的信息序列进行分布转换;
    加扰解扰模块,调用加密处理模块的密钥对编码交织后的信息序列进行加密加扰处理;以及调用解密处理模块的密钥对解交织解码后的信息序列进行解密解扰处理;
    调制解调模块,用于对加扰后的信息序列进行调制发送到无线信道以及对无线信道接收的数据包进行解调处理。
  6. 根据权利要求5所述的面向对讲系统的端到端语音加密装置的加密方法,包括如下步骤:
    1) 发送步骤
    S101:对讲终端A发起通话;
    S102:语音采集模块采集语音信息并将其转换为数字信息;
    S103:语音压缩编码模块对采集的数字信息进行压缩编码;
    S104:数据传输处理模块对压缩编码后的语音信息进行纠错编码处理;
    S105:数据传输处理模块对纠错编码后的信息序列进行交织即对分布进行打乱处理;
    S106:数据传输处理模块调用加密处理模块的密钥对编码交织后的信息序列进行加密加扰处理;
    S107:数据传输处理模块对加扰后的信息序列进行数字调制并发送到无线信道;
    2) 接收步骤
    S201:对讲终端B用户接收无线信道的数据信息,并通过同步判断是否为语音数据信息;
    S202:数据传输处理模块对无线信道接收的数据包进行解调处理;
    S203:数据传输处理模块调用解密处理模块的密钥对解调后的信息序列进行解密解扰处理;
    S204:数据传输处理模块对解密解扰后的信息序列进行解交织即分布转换;
    S205:数据传输处理模块对解交织后的信息进行纠错译码;
    S206:语音解码模块对纠错译码后的数据进行解码还原成语音音频数据;
    S207:语音播放模块读取语音编码解码模块进行解码后的音频数据,并转换成模拟语音进行播放。
    上述步骤中,当每次语音传输信道建立时,加解密处理模块会调用数据加密标准算法动态产生密钥,保证一次一密的高强度加密性能。
  7. 根据权利要求6所述的面向对讲系统的端到端语音加密方法,其特征在于,对讲终端A与对接终端B之间设有中继器,步骤S107中发送到无线信道的数据信号经由中继器转发后,再由步骤S201接收。
PCT/CN2017/093325 2017-02-23 2017-07-18 一种面向对讲系统的端到端语音加密装置和加密方法 WO2018153011A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710100492.5A CN106790281A (zh) 2017-02-23 2017-02-23 一种面向对讲系统的端到端语音加密装置和加密方法
CN201710100492.5 2017-02-23

Publications (1)

Publication Number Publication Date
WO2018153011A1 true WO2018153011A1 (zh) 2018-08-30

Family

ID=58960150

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/093325 WO2018153011A1 (zh) 2017-02-23 2017-07-18 一种面向对讲系统的端到端语音加密装置和加密方法

Country Status (2)

Country Link
CN (1) CN106790281A (zh)
WO (1) WO2018153011A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116032662A (zh) * 2023-03-24 2023-04-28 中瑞科技术有限公司 一种对讲机数据加密传输系统
CN116405801A (zh) * 2023-05-31 2023-07-07 中瑞科技术有限公司 一种可预警播报的对讲机系统

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106790281A (zh) * 2017-02-23 2017-05-31 深圳市沃阳精密科技有限公司 一种面向对讲系统的端到端语音加密装置和加密方法
CN108600869A (zh) * 2018-03-19 2018-09-28 深圳市宝尔爱迪科技有限公司 一种支持公网对讲、专网对讲及数字对讲的混合对讲系统及方法
CN110971967A (zh) * 2018-09-28 2020-04-07 广州灵派科技有限公司 一种使用视频信息的音频编码
CN112866994B (zh) * 2019-11-11 2023-03-31 成都鼎桥通信技术有限公司 一种lte承载窄带语音编码的加密通信方法和系统
CN112564729A (zh) * 2020-07-08 2021-03-26 北京德风新征程科技有限公司 一种人工智能语音对讲系统
CN113630426B (zh) * 2021-10-12 2022-03-08 广州市保伦电子有限公司 一种基于同声传译的私有加密方法和系统
CN116233767B (zh) * 2023-03-20 2024-04-30 中国联合网络通信集团有限公司 集群对讲通信方法、装置、设备及存储介质
CN116052669B (zh) * 2023-03-29 2023-06-09 中瑞科技术有限公司 一种对讲数据的纠正传输系统

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1283063A (zh) * 1999-09-09 2001-02-07 深圳市中兴通讯股份有限公司 手机加密的方法
US20050235147A1 (en) * 2004-04-14 2005-10-20 M/A Com, Inc. Universal microphone for secure radio communication
CN102843675A (zh) * 2011-06-24 2012-12-26 中兴通讯股份有限公司 一种集群呼叫语音加密的方法、终端和系统
CN105471899A (zh) * 2015-12-30 2016-04-06 浙江德景电子科技有限公司 一种移动终端端对端语音加密通话的方法和装置
CN106790281A (zh) * 2017-02-23 2017-05-31 深圳市沃阳精密科技有限公司 一种面向对讲系统的端到端语音加密装置和加密方法

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101287274B (zh) * 2007-04-11 2012-07-04 深圳市维信联合科技有限公司 移动通信语音加密系统及其加密方法
CN104219213A (zh) * 2013-06-03 2014-12-17 东南大学常州研究院 一种面向Android系统的端到端语音加密方法
CN103763736A (zh) * 2014-01-15 2014-04-30 中煤矿山建设集团有限责任公司 一种基于ZigBee技术的无线实时语音高品质传输装置和方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1283063A (zh) * 1999-09-09 2001-02-07 深圳市中兴通讯股份有限公司 手机加密的方法
US20050235147A1 (en) * 2004-04-14 2005-10-20 M/A Com, Inc. Universal microphone for secure radio communication
CN102843675A (zh) * 2011-06-24 2012-12-26 中兴通讯股份有限公司 一种集群呼叫语音加密的方法、终端和系统
CN105471899A (zh) * 2015-12-30 2016-04-06 浙江德景电子科技有限公司 一种移动终端端对端语音加密通话的方法和装置
CN106790281A (zh) * 2017-02-23 2017-05-31 深圳市沃阳精密科技有限公司 一种面向对讲系统的端到端语音加密装置和加密方法

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116032662A (zh) * 2023-03-24 2023-04-28 中瑞科技术有限公司 一种对讲机数据加密传输系统
CN116032662B (zh) * 2023-03-24 2023-06-16 中瑞科技术有限公司 一种对讲机数据加密传输系统
CN116405801A (zh) * 2023-05-31 2023-07-07 中瑞科技术有限公司 一种可预警播报的对讲机系统
CN116405801B (zh) * 2023-05-31 2023-09-08 中瑞科技术有限公司 一种可预警播报的对讲机系统

Also Published As

Publication number Publication date
CN106790281A (zh) 2017-05-31

Similar Documents

Publication Publication Date Title
WO2018153011A1 (zh) 一种面向对讲系统的端到端语音加密装置和加密方法
JP4464046B2 (ja) 暗号化装置及び復号化装置及び無線通信装置
CA2322404C (en) Automatic resynchronization of crypto-sync information
CN106982419B (zh) 一种宽带集群系统单呼端到端加密方法及系统
US20060198520A1 (en) Secure transmission of digital audio signals
KR100430358B1 (ko) 무선 통신 장치 및 무선 통신 방법
CN113347215B (zh) 一种移动视频会议加密方法
CN101287274B (zh) 移动通信语音加密系统及其加密方法
WO2012024903A1 (zh) 移动通讯网中加密语音通话的方法和系统、终端及网络侧
CN104219213A (zh) 一种面向Android系统的端到端语音加密方法
CN1754366A (zh) 音频信号的安全传输
CN105681310A (zh) 一种基于蓝牙的语音源实时语音加密方法
CN1633068A (zh) 一种点到点通信中的媒体流传输方法
JPH09307542A (ja) データ伝送装置とその方法
CN101567885A (zh) 一种语音通话装置、系统和方法
CN115996121B (zh) 一种基于volte网络的量子加密的可信视频通信系统和方法
EP2809045B1 (en) Information security attachment device for voice communication and information security method for voice communication using the same
CN104581711A (zh) 一种具有通话加密功能的移动终端及其加密通话的方法
CN101902734B (zh) 数字集群通信系统端到端自同步话音加密传输实现方法
CN101282250B (zh) 监听安全会话的方法、系统及网络设备
CN1177431C (zh) 实现端到端加密的方法及移动装置
RU2132597C1 (ru) Способ шифрования и передачи шифрованной речевой информации в сетях сотовой подвижной связи стандартов gsm-900, dcs-1800
CN212231667U (zh) 一种通过公网网关转换对讲的装置
KR100408516B1 (ko) 정보보호 기능을 갖는 cdma 무선통신시스템용 단말기, 암호화 전송 방법 및 해독화 수신 방법
KR20050044196A (ko) 브이오아이피 시스템에서의 음성 통화 도청 방지 장치

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17897261

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 03/01/2020)

122 Ep: pct application non-entry in european phase

Ref document number: 17897261

Country of ref document: EP

Kind code of ref document: A1