Method and device for detecting errors in speech encryption

A detection method and detection device technology, applied in speech analysis, wireless communication, instruments, etc., can solve problems such as loss of function, and achieve the effect of improving the method system and expanding the scope of application

Active Publication Date: 2020-07-10
ZTE CORP
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the prior art, the detection of the sound of running water mainly relies on the detection of some parameters of the speech frame, and when most of the speech data are silent frames, this detection method will lose its effect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for detecting errors in speech encryption
  • Method and device for detecting errors in speech encryption
  • Method and device for detecting errors in speech encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] For the specific implementation of step S1:

[0051] The voice frame data received by the radio network controller RNC can judge the coding rate of the voice frame through its corresponding TFCI (Transport Format Combination Indicator) and the initial parameters of the voice service establishment, and then can determine the voice frame correspondingly. Encoding rate number.

[0052] The value of the measured parameter of the silent frame can be obtained by obtaining the coded data of the silent frame from the voice data stream. The coded data of the mute frame includes multiple fields, such as MI (Mode Indication) field, MR (Mode Request) field, FT (Frame Type) field and so on. Each field corresponds to a 3-bit or 4-bit bitcode, and different bitcodes correspond to different field values. Therefore, the above field can be used as the measured parameter of the silence frame, and the MI field is specifically used as the measured parameter of the silence frame below.

...

Embodiment 2

[0067] For the specific implementation of step S1:

[0068] The voice frame data received by the radio network controller RNC can judge the coding rate of the voice frame through its corresponding TFCI (Transport Format Combination Indicator) and the initial parameters of the voice service establishment, and then can determine the voice frame correspondingly. Encoding rate number.

[0069] The value of the measured parameter of the silent frame can be obtained by obtaining the coded data of the silent frame from the voice data stream. The coded data of the mute frame includes multiple fields, such as MI (Mode Indication) field, MR (Mode Request) field, FT (Frame Type) field and so on. Each field corresponds to a 3-bit or 4-bit bitcode, and different bitcodes correspond to different field values. Therefore, the above field can be used as the measured parameter of the silence frame, and the MI field is specifically used as the measured parameter of the silence frame below.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Disclosed is a voice encryption error detection method, comprising: according to the value of a detected parameter of a silent frame in an acquired voice data stream and the code rate of the previous voice frame adjacent to the silent frame, judging whether the value of the detected parameter of the silent frame is legitimate; by setting a threshold in a detection window, judging whether the cumulative quantity of illegitimate values of the detected parameter of the silent frame exceeds the set threshold; and when the cumulative quantity of illegitimate values exceeds the set threshold, determining there is a voice encryption error. Also provided is a voice encryption error detection apparatus. The present invention achieves detection of a hissing sound attributable to a voice encryption error by determining there is a voice encryption error, and remedies the shortcoming in the art that the detection of hissing cannot be achieved by relying on methods for detecting certain parameters of a voice frame when most of the voice data are silent frames. The present invention thereby improves the system of methods for detection of hissing and further broadens the application range for the detection of hissing.

Description

technical field [0001] The invention relates to the field of voice communication, in particular to a method and device for detecting voice encryption errors. Background technique [0002] The voice service coding of the Universal Mobile Telecommunications System (UMTS for short) adopts the Adaptive Multi-rate (AMR for short) technology compatible with the Global System for Mobile Communications (GSM for short). The security mechanism of the UMTS system inherits the security mechanism of GSM, which is mainly reflected in the encryption. In UMTS, the encryption function is activated by the core network, and the encryption parameters are sent to the radio network controller (Radio Network Controller, referred to as RNC) and user equipment (User Equipment, referred to as UE), and the RNC and UE jointly complete the encryption between each other. process. [0003] If the encrypted voice data is decrypted with wrong parameters, the recovered voice data will be the sound of runni...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G10L25/78H04W24/00
CPCG10L19/012H04W24/00
Inventor 孔小玲霍燚
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products