Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mobile phone scrambler and its privacy communication method

A mobile phone and secure communication technology, applied in secure communication, secure communication devices, electrical components, etc., can solve problems such as the inability to meet security and confidentiality levels, and achieve the effects of reducing costs and maintenance overhead, short connection time, and reliable calls

Inactive Publication Date: 2006-06-28
深圳市颂雅科技有限公司
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the continuous development of basic communication technologies such as mobile communication technology and public switching technology, the requirements for voice and data communication technology are also increasing. Security also puts forward higher and higher requirements. Although the mobile communication network and public switching network commonly used now can provide certain communication concealment, confidentiality and security, they only meet the basic needs of ordinary users or non-sensitive users. The use of security requirements requires higher and more reliable communication security measures for users involved in commercial-level or higher special fields, such as government, finance, military, public security, taxation, customs and other institutions or departments involved in the country. And for such users, they need to realize communication confidentiality in a wider geographical range and a wider range of various types of terminals. The current mobile communication network or public switching network voice security or confidentiality cannot meet the requirements of these users security level

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile phone scrambler and its privacy communication method
  • Mobile phone scrambler and its privacy communication method
  • Mobile phone scrambler and its privacy communication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The present invention provides a mobile phone cipher machine that supports mobile communication network and public switching network at the same time, relies on the communication channel provided by the existing network, and uses the user key IC card built in the cipher machine to realize user identity verification and one-time pad Communication password, and rely on the voice processing, encryption and decryption inside the device and the connection of the expansion interface unit to realize high-security and confidential communication that is not related to the network structure.

[0020] According to the method for realizing end-to-end confidential communication in the mobile communication network and the public switching network and the mobile phone cipher device of the present invention, relying on its built-in functional interface, realize end-to-end confidential communication that is independent of the communication network and satisfies high security , the call q...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention relates to a mobile phone crypto suitable for realizing security voice and data communication of mobile communication network and PSTN including a handheld terminal set integrating a voice IO unit, a voice code and decode unit, a voice post process unit, a primary control unit, a supply management unit, a man-machine interface unit, a connection-expansion unit, a ciphere / de-ciphere unit and a security management unit, a special connection cable and special interface fittings. When a security communication is needed, the crypto of said mobile phone can cut in the mobile communication net or the PSTN quickly in the way of wire or wireless to ensure the security voice session or data communication by end to end and ciphering every time under the internal control of the crypto.

Description

technical field [0001] The invention relates to the field of secure communication, in particular to a method and equipment for realizing end-to-end secure communication in various communication network systems. Based on the current mobile communication network and public switching network, it is a method and equipment for realizing complete end-to-end secure communication throughout the entire process, especially involving the design and implementation technology of terminal equipment applicable to various networks for voice and data communication security . Background technique [0002] With the continuous development of basic communication technologies such as mobile communication technology and public switching technology, the requirements for voice and data communication technology are also increasing. Security also puts forward higher and higher requirements. Although the mobile communication network and public switching network commonly used now can provide certain co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04M1/68H04K1/00H04L9/00H04L29/06H04Q7/32
Inventor 黄勋文李春雷张为民
Owner 深圳市颂雅科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products