CN112218291B - Voice communication method, base station, mobile terminal and computer readable storage medium - Google Patents

Voice communication method, base station, mobile terminal and computer readable storage medium Download PDF

Info

Publication number
CN112218291B
CN112218291B CN201910631658.5A CN201910631658A CN112218291B CN 112218291 B CN112218291 B CN 112218291B CN 201910631658 A CN201910631658 A CN 201910631658A CN 112218291 B CN112218291 B CN 112218291B
Authority
CN
China
Prior art keywords
terminal
voice
superframe
frame
blank
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910631658.5A
Other languages
Chinese (zh)
Other versions
CN112218291A (en
Inventor
陈卓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hytera Communications Corp Ltd
Original Assignee
Hytera Communications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hytera Communications Corp Ltd filed Critical Hytera Communications Corp Ltd
Priority to CN201910631658.5A priority Critical patent/CN112218291B/en
Publication of CN112218291A publication Critical patent/CN112218291A/en
Application granted granted Critical
Publication of CN112218291B publication Critical patent/CN112218291B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • H04W84/08Trunked mobile radio systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application discloses a voice communication method, a base station, a mobile terminal and a computer readable storage medium. The voice communication method comprises the steps that a base station of a first terminal detects whether a normal voice superframe sent by a second terminal is received within preset time or not in the process of receiving encrypted voice data sent by the second terminal to the first terminal; and when the base station does not receive the normal voice superframe transmitted by the second terminal within the preset time, transmitting at least one blank voice superframe to the first terminal, wherein the blank voice superframe comprises frame supplementing information, and the frame supplementing information is used for providing the first terminal with decryption keys of the normal voice superframe determined from a plurality of keys. The method can ensure the effective decryption of the subsequent voice superframe by the mobile terminal when the transmission between the base stations is unstable.

Description

Voice communication method, base station, mobile terminal and computer readable storage medium
Technical Field
The present invention relates to the field of trunking communication technologies, and in particular, to a voice communication method, a base station, a mobile terminal, and a computer readable storage medium.
Background
In trunking systems such as digital trunking (Digital Mobile Radio, DMR) or police digital trunking (Police Digital Trunking, PDT), there may be an unstable transmission between base stations, so that the base stations may not be able to receive normal voice superframes in time. At this time, the base station inevitably transmits a blank voice superframe to the mobile terminal to ensure downlink continuity.
However, in the encrypted voice data transmission process, the mobile terminal sequentially rotates the decryption keys after receiving the blank voice superframes, and decrypts the normal voice superframes received subsequently by adopting the rotated decryption keys, so that the normal voice superframes received subsequently are decrypted in error, noise is played, user experience is affected, and user mistakes may be caused to miss important voice data.
Disclosure of Invention
The technical problem that this application mainly solves is to provide a voice communication method, basic station, mobile terminal and computer readable storage medium, can guarantee when transmitting unstablely between the basic station that mobile terminal is to the effective decryption of follow-up pronunciation superframe.
In order to solve the above technical problem, a first aspect of the present application provides a voice communication method, including: the base station of the first terminal detects whether a normal voice superframe sent by the second terminal is received within a preset time or not in the process of receiving the encrypted voice data sent by the second terminal to the first terminal; and when the base station does not receive the normal voice superframe transmitted by the second terminal within the preset time, transmitting at least one blank voice superframe to the first terminal, wherein the blank voice superframe comprises frame supplementing information, and the frame supplementing information is used for providing the first terminal with decryption keys of the normal voice superframe determined from a plurality of keys.
In order to solve the above technical problem, a second aspect of the present application provides a voice communication method, including: the first terminal receives at least one blank voice superframe, wherein the blank voice superframe is transmitted when a base station of the first terminal detects that a normal voice superframe transmitted by the second terminal is not normally received; acquiring frame supplementing information in a blank voice superframe; receiving a normal voice superframe transmitted by a base station; and determining a decryption key of the normal voice superframe from the plurality of keys based on the frame filling information, and decrypting the normal voice superframe by using the decryption key.
To solve the above technical problem, a third aspect of the present application provides a base station, including: a communication circuit and a processing circuit coupled to each other; the communication circuit and the processing circuit are operative to implement the voice communication method described in the first aspect.
In order to solve the above technical problem, a fourth aspect of the present application provides a mobile terminal, including: a communication circuit and a processing circuit coupled to each other; the communication circuit and the processing circuit are operable to implement the voice communication method according to the second aspect.
To solve the above technical problem, a fifth aspect of the present application provides a computer-readable storage medium storing a computer program, where the computer program when executed by a processor can implement the voice communication method described in the first aspect or implement the voice communication method described in the second aspect.
The beneficial effects of this application are: in contrast to the situation of the prior art, in the voice communication method provided by the application, if the normal voice superframe cannot be received within the preset time due to unstable transmission between the base stations in the encrypted voice data transmission process, a blank voice superframe containing the frame supplementing information is sent, so that after the blank voice superframe is received by the terminal, a decryption key of the normal voice superframe can be determined according to the frame supplementing information contained in the blank voice superframe, and further effective decryption of the subsequent voice superframe by the mobile terminal can be ensured when the transmission between the base stations is unstable.
Drawings
For a clearer description of the technical solutions in the present application, the drawings required in the description of the embodiments will be briefly described below, it being obvious that the drawings described below are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art. Wherein:
FIG. 1 is a flow chart of an embodiment of a voice communication method of the present application;
FIG. 2 is a schematic diagram of an embodiment of a TDMA dual-slot downlink burst;
FIG. 3 is a flowchart illustrating the step S13 in FIG. 1;
FIG. 4 is a flow chart of another embodiment of a voice communication method of the present application;
FIG. 5 is a flowchart illustrating the step S44 of FIG. 4;
FIG. 6 is a schematic diagram of a framework of one embodiment of a base station of the present application;
FIG. 7 is a schematic diagram of a mobile terminal according to an embodiment of the present application;
FIG. 8 is a schematic diagram of a framework of one embodiment of a computer readable storage medium of the present application.
Detailed Description
The following description of the embodiments of the present application, taken in conjunction with the accompanying drawings, will clearly and fully describe the embodiments of the present application, and it is evident that the embodiments described are only some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
The voice communication method of the present application will be exemplified in two aspects as follows.
First aspect:
referring to fig. 1, fig. 1 is a flow chart illustrating an embodiment of a voice communication method of the present application. Specifically, the method may include the steps of:
step S11: and in the process of receiving the encrypted voice data sent by the second terminal to the first terminal, the base station of the first terminal detects whether a normal voice superframe sent by the second terminal is received within a preset time, and if not, step S12 is executed.
In one implementation scenario, to enable a long-range interconnection, a IP (Internet Protocol) network interconnection is employed between a base station of a first terminal and a base station of a second terminal to enable voice communication between the first terminal and the second terminal. The IP network may be a wide area network, a local area network, or a combination of a wide area network and a local area network, which is not particularly limited herein.
The first terminal and the second terminal may be digital interphones, IP interphones, or the like. The preset time may be 60ms, 120ms, 180ms, etc., and the embodiment is not particularly limited herein.
Referring to fig. 2 in combination, in a TDMA (Time Division Multiple Access ) dual-slot trunked communication system such as DMR/PDT, a downlink burst consists of two 108-bit payloads (payload) and a 48-bit synchronization and embedded signaling (sync or embedded signaling), and each downlink burst occupies 27.5ms in the time domain. One of the two adjacent downlink bursts is a burst of time slot 1, the other is a burst of time slot 2, and a CACH (Common Announcement Channel, common broadcast channel) burst is arranged between the two adjacent downlink bursts, and each CACH burst occupies 2.5ms in the time domain. Voice transmission takes a voice superframe of 6 bursts (labeled a-F in turn) length, taking 360ms in the time domain. Each voice superframe starts with a voice synchronization flag embedded in 48 bits for burst a. Two 108 bit payloads (payload) may be used to carry voice data. The normal voice superframe is a voice superframe in which valid voice data is carried in a payload (payload), whereas the normal voice superframe is a blank voice superframe in which valid voice data is not carried in the payload (payload).
Step S12: and transmitting at least one blank voice superframe to the first terminal, wherein the blank voice superframe comprises frame filling information, and the frame filling information is used for providing the first terminal with decryption keys of the normal voice superframe from a plurality of keys.
And if the normal voice superframe transmitted by the second terminal is not received within the preset time, transmitting at least one blank voice superframe to the first terminal. Further, in an implementation scenario, when the base station does not receive the normal voice superframe sent by the second terminal within the preset time, at least one blank voice superframe may be sent to the first terminal, until the base station receives the normal voice superframe, and then the normal voice superframe is sent to the first terminal.
The blank voice superframe contains supplementary frame information for providing to the first terminal to determine a decryption key of the normal voice superframe from among a number of keys. In one implementation scenario, in order to enable the first terminal to accurately and conveniently determine the decryption key for decrypting the normal voice superframe received subsequently from the plurality of keys, the frame filling information includes a current number of blank voice superframes, the current number of blank voice superframes is used for providing the first terminal with the order of rotation of the plurality of keys when the normal voice superframes are received, and the decryption key of the normal voice superframe is selected from the plurality of keys based on the adjusted order of rotation. For example, after the base station transmits 1 normal voice superframe 01, since the normal voice superframe transmitted by the second terminal is not received within the preset time, the base station transmits the normal voice superframe 02 after transmitting the blank voice superframe 01 and the blank voice superframe 02, and if the relevant frame supplementing information is not transmitted to the first terminal, the first terminal uses the first round of decryption keys when decrypting the normal voice superframe 01, and uses the fourth round of decryption keys when decrypting the normal voice superframe 02 after sequentially rotating, and at this time, the first terminal plays the noise due to the dislocation of the decryption keys. When the related complementary frame information is sent to the first terminal, the first terminal uses the first round of decryption keys when decrypting the normal voice super frame 01, after sequentially rotating, the first terminal uses the fourth round of decryption keys when decrypting the normal voice super frame 02, the first terminal determines that 2 blank voice super frames are complementary from the complementary frame information, then adjusts the rotating sequence of the keys, and uses the second round of decryption keys, so that the normal voice super frame 02 can be correctly decrypted.
In one implementation scenario, in order to make the first terminal smoothly receive the normal voice superframe in the case of stable transmission between the base stations, in the above step S11, when the base station receives the second voice superframe sent by the second terminal within the preset time, the following steps may be further performed:
step S13: the normal voice superframe is transmitted to the first terminal.
That is, if the base station receives the normal voice superframe transmitted by the second terminal within the preset time, the normal voice superframe is transmitted to the first terminal.
According to the embodiment, in the process that the base station of the first terminal receives the encrypted voice data sent by the second terminal to the first terminal, if the normal voice superframe sent by the second terminal is not received within the preset time, at least one blank voice superframe is sent to the first terminal, and the sent blank voice superframe contains the complementary frame information so as to provide the first terminal with the decryption key for determining the normal voice superframe from a plurality of keys, so that in the process of transmitting the encrypted voice data, the terminal can determine the decryption key of the normal voice superframe according to the complementary frame information contained in the blank voice superframe after receiving the blank voice superframe, and further, effective decryption of the subsequent voice superframe by the mobile terminal can be ensured when the transmission between the base stations is unstable, and user experience is improved.
Further, after receiving the blank voice superframe, the terminal can correctly decrypt the normal voice superframe received subsequently to normally play the encrypted voice data, so that if the transmission between the base stations is unstable, the normal voice communication between the terminals is not influenced, the transmission stability between the base stations is not required to be specially maintained, and the transmission investment and maintenance cost are greatly saved.
In addition, the base station of the first terminal directly transmits the received normal voice superframe without buffering the normal voice superframe, so that extra delay is not caused to inter-base station voice communication between the terminals, and the inter-base station access speed between the terminals is improved.
In one embodiment, the complementary frame information is located in any common broadcast channel CACH burst in the blank voice superframe, so that the first terminal can make the decryption key of the normal voice superframe be selected from the plurality of keys according to the rotation sequence of the plurality of keys after the first terminal receives the normal voice superframe and the a frame in the normal voice superframe is synchronized, i.e. when the decryption key is about to be adopted to decrypt the normal voice superframe.
In another embodiment, the frame-filling information may specifically include a first frame-filling marker and a second frame-filling marker, where the first frame-filling marker is used to indicate that the current superframe is a blank voice superframe, the second frame-filling marker is used to indicate the current number of blank voice superframes, and specifically, the first frame-filling marker may be located in an SLCO (Short Link Control Opcode, short-link control operation code) information unit in a CACH burst, where the information length of the SLCO is 4 bits, for example, a value in the SLCO information unit may be set to 1111 binary to indicate the first frame-filling marker, so as to mark the current superframe as a blank voice superframe, and in an implementation scenario, the value in the SLCO information unit may also be set to other values, such as 1100, 1101, 1110 binary, and so on. Specifically to DMR, the value in the SLCO information element may be set to a reserved value, i.e., binary 1100 to 1111, or 0100 to 1011. The second frame-compensating marker may be located in the CSC information unit in the CACH burst, where the length of the CSC information is 9 bits, so that the current number of blank voice superframes may be indicated, for example, when the current number of blank voice superframes is 1, the second frame-compensating marker in the CSC information unit may be set to 6, to indicate six a-F blank voice frames contained in the current blank voice superframe, similarly, when the current number of blank voice superframes is 2, the second frame-compensating marker in the CSC information unit may be set to 12, and when the current number of blank voice superframes is 3, the second frame-compensating marker in the CSC information unit may be set to 18, and so on, which is not repeated in this embodiment.
In still another embodiment, referring to fig. 3 in combination, fig. 3 is a schematic flow chart of an example of step S13 in fig. 1, where step S13 may specifically include the following steps:
step S131: and judging whether the current condition accords with the rekeying condition. If yes, step S132 is executed, and if no, step S133 is executed.
According to a specific application scenario, the DMR/PDT system may specifically set its key resetting rule, for example, perform key resetting once every 2 normal voice superframes transmitted, or perform key resetting once every 3 normal voice superframes transmitted, which is not limited in this embodiment.
Step S132: and sending a normal voice superframe and a downlink normal frame embedded with an encryption marker to the first terminal, wherein the encryption marker is used for indicating that the rotation sequence of a plurality of keys is reset, and selecting the keys according to the reset rotation sequence to decrypt the normal voice superframe.
And if the key resetting condition is met, sending the normal voice superframe and the downlink normal frame embedded with the encryption marker to the first terminal. For example, in the DMR, in order to indicate that the current voice data is encrypted voice data, PI (Privacy indicator) signaling may be transmitted before a voice superframe or PI-related information may be embedded in 48 bits in a downlink normal burst. In addition to being used to indicate that the current voice data is encrypted voice data, PI may be used to initialize any encryption function such that the mobile terminal resets the key rotation order when receiving PI signaling, and selects a key to decrypt the normal voice superframe according to the reset rotation order. For example, after the base station transmits 1 normal voice superframe 01, since the normal voice superframe transmitted by the second terminal is not received within the preset time, the base station transmits the normal voice superframe 02 after transmitting the blank voice superframe 01 and the blank voice superframe 02, and then transmits the downlink normal frame embedded with the encrypted marker before transmitting the next normal voice superframe 03, after decrypting the normal voice superframe 02 by using the second round of decryption key, the normal voice superframe 03 is decrypted by adopting the reset rotation sequence, that is, adopting the first round of decryption key to decrypt the normal voice superframe 03, because the downlink normal frame embedded with the encrypted marker is received.
Step S133: and directly transmitting the normal voice superframe to the first terminal.
If the re-key condition is not met, the normal voice superframe is directly sent to the first terminal. At this time, the downstream regular frame embedded with the encryption marker is not transmitted, so that the key is selected again in the rotation order to decrypt the normal voice superframe. For example, after the base station transmits 1 normal voice superframe 01, since the normal voice superframe transmitted by the second terminal is not received within the preset time, the base station transmits the normal voice superframe 02 and the normal voice superframe 03 after transmitting the blank voice superframe 01 and the blank voice superframe 02, and then, after decrypting the normal voice superframe 02 with the second round of decryption keys, the keys are selected according to the rotation order, that is, the third round of decryption keys decrypt the normal voice superframe 03.
Second aspect:
referring to fig. 4, fig. 4 is a flow chart illustrating an embodiment of a voice communication method according to the present application. Specifically, it may include:
step S41: the first terminal receives at least one blank voice superframe, wherein the blank voice superframe is transmitted by a base station of the first terminal when detecting that a normal voice superframe transmitted by the second terminal is not normally received.
The blank voice superframes received by the first terminal may be 1, 2, 3, 4, etc., and specifically, the blank voice superframes are transmitted by the base station of the first terminal when detecting that the normal voice superframes transmitted by the second terminal are not normally received.
Step S42: and acquiring the frame supplementing information in the blank voice superframe.
After receiving the blank voice superframe, the first terminal analyzes the blank voice superframe, so as to obtain frame supplementing information in the blank voice superframe.
Step S43: and receiving the normal voice superframe transmitted by the base station.
The first terminal receives a normal voice superframe transmitted by the base station.
Step S44: and determining a decryption key of the normal voice superframe from the plurality of keys based on the frame filling information, and decrypting the normal voice superframe by using the decryption key.
The blank voice superframe contains supplementary frame information for providing to the first terminal to determine a decryption key of the normal voice superframe from among a number of keys. In one implementation scenario, in order to enable the first terminal to accurately and conveniently determine the decryption key for decrypting the normal voice superframe received subsequently from the plurality of keys, the frame filling information includes a current number of blank voice superframes, the current number of blank voice superframes is used for providing the first terminal with the order of rotation of the plurality of keys when the normal voice superframes are received, and the decryption key of the normal voice superframe is selected from the plurality of keys based on the adjusted order of rotation. For example, after the base station transmits 1 normal voice superframe 01, since the normal voice superframe transmitted by the second terminal is not received within the preset time, the base station transmits the normal voice superframe 02 after transmitting the blank voice superframe 01 and the blank voice superframe 02, and if the relevant frame supplementing information is not transmitted to the first terminal, the first terminal uses the first round of decryption keys when decrypting the normal voice superframe 01, and uses the fourth round of decryption keys when decrypting the normal voice superframe 02 after sequentially rotating, and at this time, the first terminal plays the noise due to the dislocation of the decryption keys. When the related complementary frame information is sent to the first terminal, the first terminal uses the first round of decryption keys when decrypting the normal voice super frame 01, after sequentially rotating, the first terminal uses the fourth round of decryption keys when decrypting the normal voice super frame 02, the first terminal already determines that the current number of blank voice super frames is 2 from the complementary frame information, then adjusts the rotating sequence of the keys, and uses the second round of decryption keys, so that the normal voice super frame 02 can be correctly decrypted.
Through the above embodiment, after receiving the blank voice superframe, the terminal determines the decryption key of the normal voice superframe according to the frame supplementing information contained in the blank voice superframe, so that effective decryption of the mobile terminal on the subsequent voice superframe can be ensured when the transmission between the base stations is unstable, and user experience is improved.
Further, after receiving the blank voice superframe, the terminal can correctly decrypt the normal voice superframe received subsequently to normally play the encrypted voice data, so that if the transmission between the base stations is unstable, the normal voice communication between the terminals is not influenced, the transmission stability between the base stations is not required to be specially maintained, and the transmission investment and maintenance cost are greatly saved.
In addition, the base station of the terminal directly transmits the received normal voice super frame without buffering the normal voice super frame, so that extra delay is not generated for inter-base station voice communication between the terminals, and the inter-base station access speed between the terminals is improved.
In one embodiment, the complementary frame information is located in any common broadcast channel CACH burst in the blank voice superframe, so that the first terminal can make the decryption key of the normal voice superframe be selected from the plurality of keys according to the rotation sequence of the plurality of keys after the first terminal receives the normal voice superframe and the a frame in the normal voice superframe is synchronized, i.e. when the decryption key is about to be adopted to decrypt the normal voice superframe.
In another embodiment, the frame-filling information may specifically include a first frame-filling marker and a second frame-filling marker, where the first frame-filling marker is used to indicate that the current superframe is a blank voice superframe, the second frame-filling marker is used to indicate the current number of blank voice superframes, and specifically, the first frame-filling marker may be located in an SLCO (Short Link Control Opcode, short-link control operation code) information unit in a CACH burst, where the information length of the SLCO is 4 bits, for example, a value in the SLCO information unit may be set to 1111 binary to indicate the first frame-filling marker, so as to mark the current superframe as a blank voice superframe, and in an implementation scenario, the value in the SLCO information unit may also be set to other values, such as 1100, 1101, 1110 binary, and so on. In particular to DMR, the value in the SLCO information element may be set in particular to a reserved value, i.e. binary 1100 to 1111, or 0100 to 1011. The second frame-compensating marker may be located in the CSC information unit in the CACH burst, where the length of the CSC information is 9 bits, so that the current number of blank voice superframes may be indicated, for example, when the current number of blank voice superframes is 1, the second frame-compensating marker in the CSC information unit may be set to 6, to indicate six a-F blank voice frames contained in the current blank voice superframe, similarly, when the current number of blank voice superframes is 2, the second frame-compensating marker in the CSC information unit may be set to 12, and when the current number of blank voice superframes is 3, the second frame-compensating marker in the CSC information unit may be set to 18, and so on, which is not repeated in this embodiment.
In still another embodiment, referring to fig. 5, the step S44 may specifically include:
step S441: and determining the total number of the received blank voice superframes based on the frame supplementing information in the last received blank voice superframes.
The last received blank voice superframe is the blank voice superframe preceding the normal voice superframe. For example, when the blank voice superframe 01 and the blank voice superframe 02 are received and then the normal voice superframe 01 is received, the blank voice superframe received last is the blank voice superframe 02; when the blank voice superframe 03 is received after the normal voice superframe 01 is received and then the normal voice superframe 02 is received, the blank voice superframe finally received at this time is the blank voice superframe 03.
And analyzing the blank voice superframes to obtain the second frame filling marker, so as to determine the total number of the received blank voice superframes. For example, when the blank voice superframe 01 and the blank voice superframe 02 are received and then the normal voice superframe 01 is received, and the value of the second frame-complementing flag obtained by parsing the blank voice superframe 02 is 12, the total number of the received blank voice superframes can be determined to be 12/6, i.e. 2. Or after receiving the normal voice superframe 01, receiving the blank voice superframe 03, and then receiving the normal voice superframe 02, wherein the value of the second frame-complementing marker obtained by analyzing the blank voice superframe 02 is 6, and the total number of the received blank voice superframes can be determined to be 6/6, namely 1.
Step S442: and determining the key sequence number which is rotated currently, and advancing the key sequence number by the total number to obtain the adjusted key sequence number.
In one implementation scenario, the key sequence number currently rotated to may be determined based on the key sequence number employed to decrypt the last voice superframe. For example, the first round of decryption key is used when a blank voice superframe 01 is received, and the second round of decryption key is used when a blank voice superframe 02 is received, and the third round of decryption key, i.e., key number 3, is determined to be used when a normal voice superframe 01 is received.
The determined key sequence number is advanced by a total number, for example, when it is determined that the third round of decryption key is adopted when the normal voice superframe 01 is received, that is, the key sequence number is 3, and since the determined total number of blank voice superframes is 2, the adjusted key sequence number 1 is obtained by advancing by 2.
Step S443: and acquiring a key corresponding to the adjusted key sequence number from the keys as a decryption key of the normal voice superframe.
And acquiring a key corresponding to the adjusted key sequence number from the keys as a decryption key of the normal voice superframe. For example, when it is determined that the adjusted key number is 1, it may be determined to use the first round key as the decryption key of the normal voice superframe 01.
Or, for example, after receiving the normal voice superframe 01 and decrypting the normal voice superframe 01 by using the first round of decryption key, receiving the blank voice superframe 03 is rotated to the second round of key at this time, and then receiving the normal voice superframe 02 is rotated to the third round of key at this time, and since the total number of the received blank voice superframes is determined to be 1 at this time, the adjusted key number 2 is obtained by moving forward 1, and the second round of key is used as the decryption key of the normal voice superframe 02.
Referring to fig. 6, fig. 6 is a schematic diagram of a frame of an embodiment of a base station of the present application. Specifically, the method may include the steps of the voice communication method in any of the above embodiments when the communication circuit 61 and the processing circuit 62 are operated, and the communication circuit 61 and the processing circuit 62 are coupled to each other. Specifically, the processing circuit 62 is used to control the communication circuit 61 and itself to implement the steps of the voice communication method in any of the embodiments of the first aspect described above.
The processing circuit 62 may also be referred to as a CPU (Central Processing Unit ). The processing circuit 62 may be an integrated circuit chip having signal processing capabilities. The processing circuit 62 may also be a general purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), a Field programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware components. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. In addition, the processing circuit 62 may be commonly implemented by a plurality of constituent circuit chips.
Specifically, the processing circuit 62 is configured to control the communication circuit 61 to receive the normal voice superframe transmitted by the second terminal, and determine whether the normal voice superframe transmitted by the second terminal is received within a preset time, and if it is determined that the normal voice superframe transmitted by the second terminal is not received within the preset time, the processing circuit 62 is further configured to control the communication circuit 61 to transmit at least one blank voice superframe to the first terminal, where the blank voice superframe includes frame-supplementing information, and the frame-supplementing information is used for providing the first terminal to determine a decryption key of the normal voice superframe from the plurality of keys. In one implementation scenario, to enable inter-base station voice communication between remote base stations, a base station of a first terminal and a base station of a second terminal are interconnected by an IP network to enable voice communication between the first terminal and the second terminal.
According to the embodiment, in the process that the base station of the first terminal receives the encrypted voice data sent by the second terminal to the first terminal, if the normal voice superframe sent by the second terminal is not received within the preset time, at least one blank voice superframe is sent to the first terminal, and the sent blank voice superframe contains the complementary frame information so as to provide the first terminal with the decryption key for determining the normal voice superframe from a plurality of keys, so that in the process of transmitting the encrypted voice data, the terminal can determine the decryption key of the normal voice superframe according to the complementary frame information contained in the blank voice superframe after receiving the blank voice superframe, and further, effective decryption of the subsequent voice superframe by the mobile terminal can be ensured when the transmission between the base stations is unstable, and user experience is improved.
Further, after receiving the blank voice superframe, the terminal can correctly decrypt the normal voice superframe received subsequently to normally play the encrypted voice data, so that if the transmission between the base stations is unstable, the normal voice communication between the terminals is not influenced, the transmission stability between the base stations is not required to be specially maintained, and the transmission investment and maintenance cost are greatly saved.
In addition, the base station of the first terminal directly transmits the received normal voice superframe without buffering the normal voice superframe, so that extra delay is not generated for inter-base station voice communication between the terminals, and the inter-base station access speed between the terminals is improved.
In one embodiment, the frame supplementing information includes the current number of blank voice superframes; the current number of blank voice superframes is used for providing the first terminal with the order of rotation of the plurality of keys when the normal voice superframes are received, and the decryption key of the normal voice superframes is selected from the plurality of keys based on the adjusted order of rotation.
In another embodiment, the complementary frame information is located in any common broadcast channel CACH burst in a blank voice superframe.
In yet another embodiment, the frame-filling information includes a first frame-filling marker and a second frame-filling marker, where the first frame-filling marker is used to indicate that the current superframe is a blank voice superframe, and the second frame-filling marker is used to indicate the current number of blank voice superframes.
Wherein in yet another embodiment, the first supplemental frame marker is located in an SLCO information unit in the CACH burst and the second supplemental frame marker is located in a CSC information unit in the CACH burst.
In yet another embodiment, the processor 62 is further configured to determine that, when the normal voice superframe transmitted by the second terminal is received within the preset time, the control communication circuit 61 transmits the normal voice superframe to the first terminal.
In yet another embodiment, the processing circuit 62 is further configured to determine whether a rekeying condition is currently met, and if the rekeying condition is determined to be currently met, the processing circuit 62 is further configured to control the communication circuit 61 to send a normal voice superframe and a downlink normal frame embedded with an encrypted flag, where the encrypted flag is used to instruct resetting of a rotation sequence of a plurality of keys, and select the keys according to the reset rotation sequence to decrypt the normal voice superframe, and if the rekeying condition is determined not to be currently met, the processing circuit 62 is further configured to control the communication circuit 61 to directly send the normal voice superframe to the first terminal.
Referring to fig. 7, fig. 7 is a schematic diagram of a frame of an embodiment of a mobile terminal according to the present application. Specifically, the communication circuit 71 and the processing circuit 72 may be coupled to each other, and the communication circuit 71 and the processing circuit 72 may be operative to implement the steps of the voice communication method in any of the embodiments of the second aspect. Specifically, the processing circuit 72 is for controlling the communication circuit 71 and itself to implement the steps of the voice communication method in any of the embodiments of the second aspect described above.
The processing circuit 72 may also be referred to as a CPU (Central Processing Unit ). The processing circuit 72 may be an integrated circuit chip having signal processing capabilities. The processing circuitry 72 may also be a general purpose processor, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit, ASIC), field programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware components. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. In addition, the processing circuit 72 may be commonly implemented by a plurality of constituent circuit chips.
Specifically, the processing circuit 72 is configured to control the communication circuit 71 to receive at least one blank voice superframe, where the blank voice superframe is sent by the base station of the first terminal when detecting that the normal voice superframe sent by the second terminal is not normally received, the processing circuit 72 is further configured to obtain frame complement information in the blank voice superframe, and control the communication circuit 71 to receive the normal voice superframe sent by the base station, and the processing circuit 72 is further configured to determine a decryption key of the normal voice superframe from the plurality of keys based on the frame complement information, and decrypt the normal voice superframe using the decryption key. In one implementation, the mobile terminal may further include a man-machine interaction circuit, and the processing circuit 72 is further configured to control the man-machine interaction circuit to play the voice information in the normal voice superframe.
Through the above embodiment, after receiving the blank voice superframe, the terminal determines the decryption key of the normal voice superframe according to the frame supplementing information contained in the blank voice superframe, so that effective decryption of the mobile terminal on the subsequent voice superframe can be ensured when the transmission between the base stations is unstable, and user experience is improved.
Further, after receiving the blank voice superframe, the terminal can correctly decrypt the normal voice superframe received subsequently to normally play the encrypted voice data, so that if the transmission between the base stations is unstable, the normal voice communication between the terminals is not influenced, the transmission stability between the base stations is not required to be specially maintained, and the transmission investment and maintenance cost are greatly saved.
In addition, the base station of the terminal directly transmits the received normal voice super frame without buffering the normal voice super frame, so that extra delay is not generated for inter-base station voice communication between the terminals, and the inter-base station access speed between the terminals is improved.
In one embodiment, the processing circuit 72 adjusts the rotation order of the plurality of keys according to the frame-filling information in the blank voice superframe received last by the control communication circuit 71, and selects the decryption key of the normal voice superframe from the plurality of keys based on the adjusted rotation order.
In another embodiment, the complementary frame information is located in any common broadcast channel CACH burst in a blank voice superframe.
In yet another embodiment, the frame filling information includes a first frame filling mark conforming to a second frame filling mark, the first frame filling mark being used for indicating that the current superframe is a blank voice superframe, the second frame filling mark being used for indicating the current number of blank voice superframes.
Wherein in yet another embodiment, the first supplemental frame marker is located in an SLCO information unit in the CACH burst and the second supplemental frame marker is located in a CSC information unit in the CACH burst.
In yet another embodiment, the processing circuit 72 is further configured to determine the total number of the received blank voice superframes based on the frame filling information in the last received blank voice superframes, the processing circuit 72 is further configured to determine the currently rotated key sequence number, forward the key sequence number by the total number to obtain the adjusted key sequence number, and the processing circuit 72 is further configured to obtain, from the plurality of keys, a key corresponding to the adjusted key sequence number as the decryption key of the normal voice superframe.
Referring to fig. 8, fig. 8 is a schematic diagram illustrating an embodiment of a computer readable storage medium 80 according to the present application. The computer-readable storage medium 80 stores a computer program 801, which when executed by a processor, performs the steps of any of the voice communication methods of the first aspect described above, or performs the steps of any of the voice communication methods of the second aspect described above.
The foregoing description is only of embodiments of the present application, and is not intended to limit the scope of the patent application, and all equivalent structures or equivalent processes using the descriptions and the contents of the present application or other related technical fields are included in the scope of the patent application.

Claims (13)

1. A method of voice communication, the method comprising:
the method comprises the steps that a base station of a first terminal detects whether a normal voice superframe sent by a second terminal is received within preset time or not in the process of receiving encrypted voice data sent by the second terminal to the first terminal;
when the base station does not receive the normal voice superframe transmitted by the second terminal within the preset time, transmitting at least one blank voice superframe to the first terminal, wherein the blank voice superframe comprises frame supplementing information, the frame supplementing information comprises the current number of the blank voice superframe, and the frame supplementing information is used for being provided for the first terminal so that the first terminal can determine the total number of the received blank voice superframes based on the frame supplementing information of the blank voice superframe received last; determining the key sequence number which is rotated currently, and moving the key sequence number forward by the total number to obtain an adjusted key sequence number; and acquiring a key corresponding to the adjusted key sequence number from the plurality of keys as a decryption key of the normal voice superframe.
2. The method of claim 1, wherein the step of determining the position of the substrate comprises,
the frame-supplementing information is located in any common broadcast channel (CACH) burst in the blank voice superframe.
3. The method of claim 2, wherein the step of determining the position of the substrate comprises,
the frame supplementing information comprises a first frame supplementing marker and a second frame supplementing marker, wherein the first frame supplementing marker is used for indicating that the current super frame is a blank voice super frame, and the second frame supplementing marker is used for indicating the current number of the blank voice super frames.
4. The method of claim 3, wherein the step of,
the first supplemental frame marker is located in an SLCO information unit in the CACH burst and the second supplemental frame marker is located in a CSC information unit in the CACH burst.
5. The method according to claim 1, wherein the method further comprises:
and when the base station receives the normal voice superframe transmitted by the second terminal within the preset time, transmitting the normal voice superframe to the first terminal.
6. The method of claim 5, wherein the transmitting the normal voice superframe to the first terminal comprises:
judging whether the current key resetting condition is met;
if yes, sending the normal voice superframe and a downlink normal frame embedded with an encryption marker to the first terminal, wherein the encryption marker is used for indicating resetting the rotation sequence of a plurality of keys, and selecting the keys according to the reset rotation sequence to decrypt the normal voice superframe;
if not, the normal voice superframe is directly sent to the first terminal;
and/or the number of the groups of groups,
the base station of the first terminal and the base station of the second terminal are interconnected through an IP network so as to realize voice communication between the first terminal and the second terminal.
7. A method of voice communication, the method comprising:
the method comprises the steps that a first terminal receives at least one blank voice superframe, wherein the blank voice superframe is sent when a base station of the first terminal detects that a normal voice superframe sent by a second terminal is not normally received in the process of receiving encrypted voice data sent by the second terminal to the first terminal;
acquiring frame supplementing information in the blank voice superframe; wherein, the frame supplementing information comprises the current number of blank voice superframes;
receiving a normal voice superframe transmitted by the base station;
based on the last received frame supplementing information of the blank voice superframes, determining the total number of the received blank voice superframes;
determining the key sequence number which is rotated currently, and moving the key sequence number forward by the total number to obtain an adjusted key sequence number;
and acquiring a key corresponding to the adjusted key sequence number from the plurality of keys as a decryption key of the normal voice superframe.
8. The method of claim 7, wherein the step of determining the position of the probe is performed,
the frame-supplementing information is located in any common broadcast channel (CACH) burst in the blank voice superframe.
9. The method of claim 8, wherein the step of determining the position of the first electrode is performed,
the frame supplementing information comprises a first frame supplementing mark which accords with a second frame supplementing mark, the first frame supplementing mark is used for indicating that the current super frame is a blank voice super frame, and the second frame supplementing mark is used for indicating the current number of the blank voice super frames.
10. The method of claim 9, wherein the step of determining the position of the substrate comprises,
the first supplemental frame marker is located in an SLCO information unit in the CACH burst and the second supplemental frame marker is located in a CSC information unit in the CACH burst.
11. A base station, the base station comprising:
a communication circuit and a processing circuit coupled to each other;
the communication circuit, the processing circuit being operative to implement the voice communication method of any one of claims 1-6.
12. A mobile terminal, the mobile terminal comprising:
a communication circuit and a processing circuit coupled to each other;
the communication circuit, the processing circuit being operative to implement the voice communication method of any one of claims 7-10.
13. A computer readable storage medium, characterized in that the computer readable storage medium has stored thereon a computer program which, when executed by a processor, implements the voice communication method of any of claims 1-6 or implements the voice communication method of any of claims 7-10.
CN201910631658.5A 2019-07-12 2019-07-12 Voice communication method, base station, mobile terminal and computer readable storage medium Active CN112218291B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910631658.5A CN112218291B (en) 2019-07-12 2019-07-12 Voice communication method, base station, mobile terminal and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910631658.5A CN112218291B (en) 2019-07-12 2019-07-12 Voice communication method, base station, mobile terminal and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN112218291A CN112218291A (en) 2021-01-12
CN112218291B true CN112218291B (en) 2023-12-19

Family

ID=74047220

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910631658.5A Active CN112218291B (en) 2019-07-12 2019-07-12 Voice communication method, base station, mobile terminal and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN112218291B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220132306A1 (en) * 2020-10-23 2022-04-28 Apple Inc. Protected High-Throughput Control Subfield
CN113630426B (en) * 2021-10-12 2022-03-08 广州市保伦电子有限公司 Private encryption method and system based on simultaneous interpretation
CN115565539B (en) * 2022-11-21 2023-02-07 中网道科技集团股份有限公司 Data processing method for realizing self-help correction terminal anti-counterfeiting identity verification

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1470136A (en) * 2000-10-17 2004-01-21 ��ʽ�����װ Forward link based rescue channel method and apparatus for telecommunication systems
US7123593B1 (en) * 1999-05-19 2006-10-17 Matra Nortel Communications Method for broadcasting radio signals from a radiocommunication base station, base stations and mobile terminals therefor
US7620014B1 (en) * 1999-05-19 2009-11-17 Eads Secure Networks Radio communication method between a base station and mobile terminals
CN102187616A (en) * 2008-10-17 2011-09-14 摩托罗拉解决方案公司 Method and device for sending encryption parameters
CN102307075A (en) * 2011-08-09 2012-01-04 深圳科立讯电子有限公司 Voice transmission encryption method of DMR (digital mobile radio) communication terminal
CN103002406A (en) * 2012-12-03 2013-03-27 科立讯通信股份有限公司 Voice encryption method applied to narrow-band wireless digital communication system
KR101280131B1 (en) * 2012-01-19 2013-06-28 한양대학교 산학협력단 Wireless sensor network system for supporting multi-user voice communication
CN103402198A (en) * 2013-07-28 2013-11-20 浙江宏睿通信技术有限公司 Encryption parameter transmitting method of wireless communication terminal equipment
CN108566681A (en) * 2018-02-02 2018-09-21 福建科立讯通信有限公司 A kind of method that call transmitting terminal is interrupted in narrowband radio digital communication system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160286532A1 (en) * 2012-01-24 2016-09-29 Odyssey Wireless, Inc. Systems/methods of preferentially using a first asset, refraining from using a second asset and providing reduced levels of interference to gps and/or satellites
WO2013006593A1 (en) * 2011-07-04 2013-01-10 Dinan Esmael Hejazi Broadcast channel in multicarrier systems

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7123593B1 (en) * 1999-05-19 2006-10-17 Matra Nortel Communications Method for broadcasting radio signals from a radiocommunication base station, base stations and mobile terminals therefor
US7620014B1 (en) * 1999-05-19 2009-11-17 Eads Secure Networks Radio communication method between a base station and mobile terminals
CN1470136A (en) * 2000-10-17 2004-01-21 ��ʽ�����װ Forward link based rescue channel method and apparatus for telecommunication systems
CN102187616A (en) * 2008-10-17 2011-09-14 摩托罗拉解决方案公司 Method and device for sending encryption parameters
CN102307075A (en) * 2011-08-09 2012-01-04 深圳科立讯电子有限公司 Voice transmission encryption method of DMR (digital mobile radio) communication terminal
KR101280131B1 (en) * 2012-01-19 2013-06-28 한양대학교 산학협력단 Wireless sensor network system for supporting multi-user voice communication
CN103002406A (en) * 2012-12-03 2013-03-27 科立讯通信股份有限公司 Voice encryption method applied to narrow-band wireless digital communication system
CN103402198A (en) * 2013-07-28 2013-11-20 浙江宏睿通信技术有限公司 Encryption parameter transmitting method of wireless communication terminal equipment
CN108566681A (en) * 2018-02-02 2018-09-21 福建科立讯通信有限公司 A kind of method that call transmitting terminal is interrupted in narrowband radio digital communication system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
基于dPMR标准的数字加密对讲机设计;吕国栋;代宪菊;宋滔;;信息安全与通信保密(第08期);全文 *
数字对讲机应用中的安全性技术研究;龚雪;张育钊;庄铭杰;;信息与电脑(理论版)(第05期);全文 *

Also Published As

Publication number Publication date
CN112218291A (en) 2021-01-12

Similar Documents

Publication Publication Date Title
CN112218291B (en) Voice communication method, base station, mobile terminal and computer readable storage medium
TWI419565B (en) Method for buffering packets of a media stream, system for buffering a media stream, device and chipset for transmitting, server and computer program product
US11483601B2 (en) Technique for transmitting and receiving system time information in broadcasting system
US8306060B2 (en) System and method for wireless communication of uncompressed video having a composite frame format
RU2528008C2 (en) Information receiving device and information transmitting device
US8824681B2 (en) Method and device for link layer decrypting and/or encrypting a voice message stream already supporting end to end encryption
KR102533481B1 (en) Transmission device, transmission method, reception device, and reception method
JPWO2016098601A1 (en) Transmission device, transmission method, reception device, and reception method
US20180324102A1 (en) Receiving apparatus and data processing method
KR20100075466A (en) Methods and systems for providing different data loss protection
KR20190092415A (en) Transmission device, transmission method, reception device, and reception method
US8102857B2 (en) System and method for processing data and control messages in a communication system
JP6811613B2 (en) Transmitter, transmitter, receiver and receiver
KR102467738B1 (en) Transmission device, transmission method, reception device, and reception method
TWI756194B (en) Data processing device and data processing method
MXPA05007451A (en) Method and apparatus for synchronizing digital video using a beacon packet.
US7400730B2 (en) Cryptographic communication method in communication system
US7855996B2 (en) Enhanced stream layer transmission for mediaFLO mobile multimedia multicast system
CN112787751B (en) Data transmission method, data receiving method and related device
WO2018170907A1 (en) Communication method, terminal and network device
KR20220133183A (en) Information processing devices, information processing methods and programs
JP2006311394A (en) Radio communication equipment
WO2004095745A1 (en) Method for synchronizing a control channel to a working channel
KR20230019987A (en) Transmission device, transmission method, receiving device, and receiving method
KR102078903B1 (en) reliable data checking method of wireless encrypted communication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant