Secured communicating method and device for hiding talking voice

A confidential communication and voice technology, applied in the field of information security, can solve the problem of being easily discovered and attacked by attackers, and achieve the effect of solving the problem that voice is easily eavesdropped

Inactive Publication Date: 2007-03-28
成都世纪顶点科技有限公司
View PDF1 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method can solve the problems of replay attack, voice imitation attack and denial behavior after communication, but the voice stre

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secured communicating method and device for hiding talking voice
  • Secured communicating method and device for hiding talking voice
  • Secured communicating method and device for hiding talking voice

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] In order to further illustrate the principles and features of the present invention, the following description will be given in conjunction with the drawings.

[0013] Fig. 1 is a hardware structure diagram of the present invention.

[0014] As shown in Fig. 1, the hardware circuit of the present invention is simple, and its main calculation is completed by a microprocessor. The memory is composed of flashmemory, which stores the main control program and publicly transmitted voices. The main control program performs most of the functions of the device, including the grouping, reorganization, concealment, recovery of voices that need to be kept secret, and the selection of publicly transmitted voices; The voice is selected by the user through the input module. The encoder / decoder completes the compression and decompression of the user's voice by the phone. The microphone converts the sound signal into an analog signal, sends it to the A / D conversion module, and converts it i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The main feature of the invention includes following points: after called party responses the calling party, the both parties firstly initialize the logical connection and negotiates parameters required by security communication containing voice name, frequency domain algorithm and compression algorithm of voice in security transmission; the calling party transmits the security-transmitted voice that is hidden in the voice in public transmission; when the public-transmitted voice reaches the called party, the security-transmitted voice is restored and transmitted to the called party.

Description

Technical field [0001] The invention relates to the field of information security. More specifically, it relates to a secure communication method and device capable of hiding the voice of a call. Background technique [0002] Telephones have been widely used all over the world, and using public communication networks for voice communication has become a very common way of communication in people's daily lives. With the continuous expansion of the public communication network, more and more people are considering its security, such as the communication requirements for confidential information within the government or the military, and the requirements for confidential communication for personal privacy. [0003] The Chinese Patent Publication No. CN 1549490 is the application case. The principle of the invention is that the communication parties perform mutual identity authentication and secure key exchange before the call to realize the confidential transmission of the voice sig...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04K1/00H04L9/00
Inventor 李涛胡晓勤
Owner 成都世纪顶点科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products