UMTS mobile terminal circuit domain voice encryption communication technology realization method

A technology of voice encryption and implementation method, which is applied in telephone communication and key distribution, which can solve problems such as inability to guarantee end-to-end security of communication, failure to meet the requirements of secure communication, etc., and achieve a controllable effect of the system

Active Publication Date: 2017-01-18
HANGZHOU BYTE INFORMATION TECH CO LTD
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In a mobile communication network, signal transmission passes through multiple links such as mobile terminals, air interfaces, wireless base stations, relay transmission, and mobile switching infrastructure. Currently, the security architecture of mobile communication networks only supports air interface encryption (wireless channel encryption). Guarantee the communication security of voice signals between mobile terminals and base stations. The relay transmission between base stations is in plain text, so that the end-to-end security of communication (that is, the security of the information source) cannot be guaranteed, and it cannot meet the special needs of the government, police, and military. Departmental Secure Communications Needs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • UMTS mobile terminal circuit domain voice encryption communication technology realization method
  • UMTS mobile terminal circuit domain voice encryption communication technology realization method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with specific embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0027] A UMTS mobile terminal circuit domain voice encryption communication technology implementation method, comprising the following steps:

[0028] S1. System hardware architecture design: The hardware architecture of the terminal system used adopts the structure of AP+CP (application processor + communication processor). Since the CP (communication processor) runs an independent mobile TEE (trusted execution environment) operating system, The system is controllable, credible, and safe. In order to ensure the credible and safe storage and processing of voice sources, TPM (Trusted Platform Module) is used as the peri...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a UMTS mobile terminal circuit domain voice encryption communication technology realization method. The UMTS mobile terminal circuit domain voice encryption communication technology realization method comprises the following steps of S1, a system hardware configuration design; S2, a system software configuration design; S3, protocol signaling level realization; S4, network mode control realization; S5, voice encryption communication flow realization; S6, terminal encrypted conversation calling flow; and S7, a terminal called flow. In the design, a control level and a data level are borne in a voice channel band; secret key negotiation and voice frame encryption and decryption logic is completed in a TPM hardware unit and a TEE execution environment so that safety of a secret key, an algorithm and a system execution environment is ensured and safety of voice communication during source storage, processing and transmission is ensured too; and a voice flow is ensured not to carry out any voice coding and decoding conversion during air interface relay transmission and voice tone quality is guaranteed.

Description

technical field [0001] The present invention relates to the technical field of UMTS mobile terminals, in particular to a method for implementing the circuit domain voice encryption communication technology of UMTS mobile terminals. Background technique [0002] In a mobile communication network, signal transmission passes through multiple links such as mobile terminals, air interfaces, wireless base stations, relay transmission, and mobile switching infrastructure. Currently, the security architecture of mobile communication networks only supports air interface encryption (wireless channel encryption). Guarantee the communication security of voice signals between mobile terminals and base stations. The relay transmission between base stations is in plain text, so that the end-to-end security of communication (that is, the security of the information source) cannot be guaranteed, and it cannot meet the special needs of the government, police, and military. Department's secure...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L29/06H04M7/00H04W12/02
CPCH04L9/0877H04L63/0428H04M7/006H04W12/02
Inventor 毛伟信
Owner HANGZHOU BYTE INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products