CN203313411U - Plug-and-play type portable secure communication device - Google Patents

Plug-and-play type portable secure communication device Download PDF

Info

Publication number
CN203313411U
CN203313411U CN2013203312858U CN201320331285U CN203313411U CN 203313411 U CN203313411 U CN 203313411U CN 2013203312858 U CN2013203312858 U CN 2013203312858U CN 201320331285 U CN201320331285 U CN 201320331285U CN 203313411 U CN203313411 U CN 203313411U
Authority
CN
China
Prior art keywords
data processor
secure communication
instant
mobile terminal
audio interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CN2013203312858U
Other languages
Chinese (zh)
Inventor
赵勇
刘春华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANDONG INSTITUTE OF QUANTUM SCIENCE AND TECHNOLOGY Co Ltd
Original Assignee
SHANDONG INSTITUTE OF QUANTUM SCIENCE AND TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANDONG INSTITUTE OF QUANTUM SCIENCE AND TECHNOLOGY Co Ltd filed Critical SHANDONG INSTITUTE OF QUANTUM SCIENCE AND TECHNOLOGY Co Ltd
Priority to CN2013203312858U priority Critical patent/CN203313411U/en
Application granted granted Critical
Publication of CN203313411U publication Critical patent/CN203313411U/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The utility model discloses a plug-and-play type portable secure communication device which comprises a data processor, and an earphone with a microphone, wherein the data processor is connected with the earphone with the microphone, and the data processor can be connected to any mobile terminal with an audio interface. The data processor obtains shared secret key and business secret key from a secure communication support network to encrypt and decrypt the conversation voice of the mobile terminal. The plug-and-play type portable secure communication device is high in security and excellent in compatibility. The plug-and-play type portable secure communication device has no special requirements on the model of mobile terminals and does not require change or reconstruction of original mobile terminals. Only required is that the mobile terminal has an audio input/output interface, and a conventional mobile terminal can be fully utilized. The plug-and-play type portable secure communication device employs end-to-end encryption means, and the voice signals are under encryption during the entire transmission process.

Description

The portable conversation privacy device of a kind of instant inserted and instant using type
Technical field
The utility model belongs to the communications field, relates to a kind of speech security equipment, relates in particular to the portable conversation privacy device of a kind of instant inserted and instant using type.
Background technology
Along with the development of mobile communication technology, by mobile device, carry out voice call also more and more universal.But in traditional mobile call, the security presence of voice messaging the hidden danger of two aspects at present: one, voice messaging in mobile communication is not to adopt cipher mode end to end at present, and with encrypted form, exist when just aloft propagating, but be to propagate with clear-text way in mobile core network inside.Its two, even before aloft propagating to voice encryption, the mode that also is based on the mathematical algorithm complexity of employing, as A3, A5, A8 etc., some has been cracked these algorithms, some temporary transient safety, but, along with the raising of Computing ability, also will face safety problem in future.
There is following problem in existing mobile speech privacy equipment:
1, lack in the ability that moves freely real-time update key under state, cause key that reusable problem is often arranged, reduce security classification;
2, the secret telephony function is solidified into mobile terminal, make special-purpose secret mobile terminal rather than plug and play, such one is to have improved cost of manufacture, the 2nd, and the user need to change own original mobile terminal, comparatively inconvenience;
3, can not take full advantage of existing various mobile terminal on the market, poor compatibility.
The utility model content
The purpose of this utility model is exactly in order to address the above problem, and provides a kind of instant inserted and instant using type portable conversation privacy device.
To achieve these goals, the utility model adopts following technical scheme:
The portable conversation privacy device of a kind of instant inserted and instant using type, comprise earphone and data processor with microphone, and described data processor is connected with earphone; Described data processor is by Audio Data Line and mobile terminal two-way communication; Described data processor communicates and data interaction by wired and/or wireless mode and secure communication network enabled, realizes that key downloads.
Described data processor comprises power supply, wireless network module, USB interface, user interactive module, microprocessor, memory, codec, encryption and decryption device, data processor audio interface; Described microprocessor is connected with wireless network module, USB interface, user interactive module, memory, codec, encryption and decryption device respectively; Described codec is connected with encryption and decryption device, data processor audio interface respectively; Described data processor audio interface comprises two, and data processor the first audio interface is connected with the earphone with microphone by Audio Data Line, and data processor the second audio interface connects the audio interface of mobile terminal by Audio Data Line.
Described microprocessor is the central control unit of data processor, controls whole workflow.
Described user interactive module comprises keypad and display screen, mutual for user and data processor.
The connected mode of described data processor and earphone is plug-jack type, can to earphone, change easily.
The analog voice signal digitlization of described codec for obtaining from the data processor audio interface, and digitized voice signal is become to analog signal send to the data processor audio interface.
Described data processor by USB interface, connect the secure communication network enabled with wired mode and download the machine and the secure communication network enabled between shared key.
Described wireless network module is downloaded the required business cipher key of each conversation by wireless signal from the secure communication network enabled.
Shared key between described encryption and decryption device use and secure communication network enabled is the business cipher key deciphering downloaded to, and uses business cipher key to be encrypted and to decipher voice signal.
Described memory is for storing the shared key between the machine and secure communication network enabled, and the required business cipher key of at every turn conversing.
Described power supply is whole data processor power supply.
Operation principle of the present utility model:
Described data processor in advance with wired mode from the shared key between secure communication network enabled downloading data processor and secure communication network enabled.Before conversation, data processor is to the required business cipher key of this conversation of secure communication network enabled application, after the secure communication network enabled generates business cipher key, shared key between use and data processor is encrypted business cipher key, with wireless mode, be issued to data processor, data processor is received rear to its deciphering, obtains the required business cipher key of this conversation.During conversation, microphone captures speaker's voice, after delivering in the data processor of transmit leg it being carried out to digitized processing, using business cipher key is that digitized voice expressly are encrypted, and then it is transformed back to analog voice signal, by the data processor audio interface, be input in the mobile terminal of transmit leg.In like manner, recipient's mobile terminal is received the voice after encryption, by the audio frequency of mobile terminal interface, deliver to recipient's data processor, data processor to its digitlization, use business cipher key for after it deciphers, transfer again analog signal to and deliver to one's own side's earphone by audio interface, thereby realized end-to-end secret telephony.In this process, the model that participates in the mobile terminal of conversing is not required, can not even also mobile terminal, as long as verbal system possesses audio interface, can use the utility model to carry out secret telephony.
The beneficial effects of the utility model are:
1, the utility model is independent of mobile terminal, do not limit the model of access mobile terminal, do not require that the user changes or transform original mobile terminal yet, only require that mobile terminal possesses the audio frequency input/output interface, it is compatible good, is conducive to taking full advantage of existing mobile terminal.
2, adopt the End to End Encryption form, make voice signal all be in encrypted state in the overall process of propagating, do not stay dead angle.
When 3, the utility model was supported in encryption, every section key was only used once, did not reuse, and did not rely on the complexity of mathematical algorithm, and fail safe improves greatly.
Business cipher key required while 4, conversing just downloaded to this locality from network terminal before conversation, improve fail safe.
5, support storage and the processing of two-stage key, during conversation, required business cipher key is also to be in encrypted state when wireless transmission, has guaranteed that key is not stolen aloft.
6, the user is easy to use, during the need to be keep secret conversation, just the utility model equipment is connected to the mobile terminal of oneself by audio interface; During not need to be keep secret conversation, just only use the mobile terminal of oneself directly to converse.
The accompanying drawing explanation
Fig. 1 is the utility model each several part schematic diagram;
Fig. 2 is the theory of constitution frame diagram of the utility model data processor;
Fig. 3 is that the utility model obtains the schematic diagram with the shared key of secure communication network enabled;
Fig. 4 is the schematic diagram that the utility model carries out secret telephony;
Fig. 5 is the voice signal handling principle frame diagram of a kind of embodiment of the utility model;
Wherein, 1, data processor, 2, wireless network module, 3, microprocessor, 4, memory, 5, codec, 6, the encryption and decryption device, 7, data processor the first audio interface, 8, data processor the second audio interface, 9, USB interface, 10, microphone, 11, earphone, 12, user interactive module, 13, mobile terminal, 14, the mobile terminal call channel, 15, secure communication network enabled, 16, power supply, A1, the first data processor, B1, the second data processor, A13, the first mobile terminal, B13, the second mobile terminal.
Embodiment
Below in conjunction with accompanying drawing and embodiment, the utility model is described further.
As shown in Figure 1, the portable conversation privacy device of a kind of instant inserted and instant using type, comprise that earphone 11(is with microphone 10) and data processor 1, described data processor 1 is connected with the earphone 11 with microphone 10 by data processor the second audio interface 8; Described data processor 1 can also be connected with mobile terminal 13 by data processor the first audio interface 7.
As shown in Figure 2, described data processor 1 comprises power supply 16, wireless network module 2, USB interface 9, user interactive module 12, microprocessor 3, memory 4, codec 5, encryption and decryption device 6, data processor the first audio interface 7, data processor the second audio interface 8; Described microprocessor 3 is connected with wireless network module 2, USB interface 9, user interactive module 12, memory 4, codec 5, encryption and decryption device 6 respectively; Described codec 5 is connected with encryption and decryption device 6, data processor the first audio interface 7, data processor the second audio interface 8 respectively; Described data processor the first audio interface 7 connects mobile terminal 13 by Audio Data Line; Described data processor the second audio interface 8 be connected with the earphone 11 with microphone 10 by Audio Data Line (earphone 11 and microphone 10 are listed separately in the drawings); The wireless network module 2 of described data processor 1 can be communicated by letter and download key with secure communication network enabled 15 with wired mode by wireless mode respectively with USB interface 9.
Described wireless network module 2 is mutual by wireless signal and secure communication network enabled 15, therefrom downloads the required business cipher key of each conversation.
Described microprocessor 3 is central control units of data processor 1, controls whole workflow.
Described memory 4 is be used to storing the shared key of 15 of the machine and secure communication network enabled, and the required business cipher key of at every turn conversing.
The analog voice signal digitlization of described codec 5 for obtaining from data processor the first audio interface 7, data processor the second audio interface 8, and digitized voice signal is become to analog signal send to data processor the first audio interface 7, data processor the second audio interface 8.
The shared key that described encryption and decryption device 6 uses and secure communication network enabled are 15 is the business cipher key deciphering downloaded to, and uses business cipher key to be encrypted and to decipher digitized voice signal.
Described user interactive module 12 comprises keypad and display screen, mutual for user and data processor 1.
Described USB interface 9 is for connecting the shared key of 15 of secure communication network enabled 15 downloading data processor 1 and secure communication network enabled with wired mode.
Described power supply 16 is whole data processor power supply.
Described data processor 1 is plug-jack type with the physical connection mode of earphone 11 with microphone 10, can to earphone 11, change easily.
Described secure communication network enabled 15 is independent of outside this equipment, is to be responsible for producing key and being the network topology entity of this equipment distributed key, is this equipment the secure communication support is provided.
Described mobile terminal 13 is independent of outside this equipment, has call function and audio interface, supports external earphone with microphone 10 11.
As shown in Figure 3, data processor 1 uses USB interface 9 to connect secure communication network enabled 15, shared key key (15-1) between download and secure communication network enabled 15, be stored in memory 4 as shown in Figure 2, after download completes, disconnect and being connected with the USB of 15 of secure communication network enabled, recover the state can move freely.
Described secure communication network enabled 15 can be carried out information interaction and transfer of data by the wireless connections mode such as USB wired connection mode or WiFi, 3G and data processor 1, and possesses the abilities that generate and distribute the random number key for many group conversations.Described secure communication network enabled 15 receives the key application of data processor 1 in advance by the USB connected mode, to it, issue the shared key of the two, the shared key amount can, for supporting that repeatedly the business cipher key deciphering is required, issue the required business cipher key of this conversation by wireless mode to data processor 1 again before each secret telephony.
Both call sides, before carrying out secret telephony, is arranged the conversation ID of this secret telephony, and respectively by user interactive module 12 Input Data Process separately.As shown in Figure 4, the first data processor A1, the second data processor B1 send to secure communication network enabled 15 by conversation ID separately, to the business cipher key key (A1-B1) of secure communication network enabled 15 these conversations of application.Secure communication network enabled 15 is received application, comparison conversation ID, and what determine the first data processor A1 and the second data processor B1 application is same section key, for this conversation generates business cipher key key (A1-B1).Shared key key (15-A1) between 15 uses of secure communication network enabled and the first data processor A1 encrypts key (A1-B1), then sends to the first data processor A1; Shared key key (15-B1) between use and the second data processor B1 encrypts key (A1-B1), then sends to the second data processor B1.After the first data processor A1 receives, in conjunction with leaving shared key key (15-A1) in memory 4 and 15 of secure communication network enabled in, use 6 deciphering of encryption and decryption device, obtain the business cipher key key (A1-B1) of this communication; In like manner the second data processor B1, also in conjunction with leaving shared key key (15-B1) in memory 4 and 15 of secure communication network enabled in, is used 6 deciphering of encryption and decryption device, obtains the business cipher key key (A1-B1) of this communication.After obtaining business cipher key, the second mobile terminal B13 that the first mobile terminal A13 that the first data processor A1 connects is connected with the second data processor B1 can carry out secret telephony by mobile terminal call channel 14.
As shown in Figure 2 and Figure 5, after the content of user's speech is got by microphone 10, deliver to the codec 5 in data processor 1 by data processor the second audio interface 8, it is encoded and makes it digitlization, then deliver to encryption and decryption device 6; Encryption and decryption device 6 obtains the business cipher key of this conversation of storage in memory 4, using this key is that digitized voice are encrypted, deliver to again codec 5, voice signal after encrypting is become to analog signal again, then by data processor the first audio interface 7, deliver to mobile terminal 13, enter mobile terminal call channel 14; The analog voice signal that mobile terminal 13 receives through encrypting from mobile terminal call channel 14, and deliver to codec 5 by data processor the first audio interface 7, become the audio digital signals of encryption; Encryption and decryption device 6 obtains the business cipher key of this conversation of storage in memory 4, using this key is that digitized voice signal is decrypted processing, deliver to again codec 5, thereby obtain simulated voice expressly, these voice are delivered to earphone 11 by data processor the second audio interface 8, are heard by the user.After end of conversation, this talk business key left in memory 4 is eliminated.The work overall process of data processor is coordinated by microprocessor 3.
Embodiment supplements:
The design that is connected of codec 5 and data processor the first audio interface 7, also can be revised as codec 5 and be connected with simultaneously a plurality of audio interface (7 α, 7 β, 7 γ ...), the model difference of each audio interface, like this can compatible more mobile terminal and the non-moving verbal system of polytypic.
The above; it is only the embodiment in the utility model; but protection range of the present utility model is not limited to this; anyly be familiar with the people of this technology in the disclosed technical scope of the utility model; can understand conversion or the replacement expected, all should be encompassed in of the present utility model comprise scope within.Therefore, protection range of the present utility model should be as the criterion with the protection range of claims.

Claims (6)

1. the portable conversation privacy device of instant inserted and instant using type, is characterized in that, comprises data processor, and with the earphone of microphone, described data processor is connected with the earphone with microphone; Described data processor is by Audio Data Line and mobile terminal two-way communication; Described data processor is communicated by letter and downloads key with the secure communication network enabled by wired and/or wireless mode.
2. the portable conversation privacy device of a kind of instant inserted and instant using type as claimed in claim 1, it is characterized in that, described data processor comprises power supply, wireless network module, USB interface, user interactive module, microprocessor, memory, codec, encryption and decryption device, data processor audio interface; Described microprocessor is connected with wireless network module, USB interface, user interactive module, memory, codec, encryption and decryption device respectively; Described codec is connected with encryption and decryption device, data processor audio interface respectively; Described data processor audio interface comprises two, and data processor the first audio interface is connected with earphone by Audio Data Line, and data processor the second audio interface connects the audio interface of mobile terminal by Audio Data Line.
3. the portable conversation privacy device of a kind of instant inserted and instant using type as claimed in claim 2, is characterized in that, described user interactive module comprises keypad and display screen.
4. the portable conversation privacy device of a kind of instant inserted and instant using type as claimed in claim 1 or 2, is characterized in that, the connected mode of described data processor and earphone is plug-jack type.
5. the portable conversation privacy device of a kind of instant inserted and instant using type as claimed in claim 2, is characterized in that, described data processor connects the secure communication network enabled by described USB interface with wired mode, downloads the shared key between the machine and secure communication network enabled.
6. the portable conversation privacy device of a kind of instant inserted and instant using type as claimed in claim 2, is characterized in that, described data processor connects the secure communication network enabled by described wireless network module with wireless mode, downloads the required business cipher key of each conversation.
CN2013203312858U 2013-06-08 2013-06-08 Plug-and-play type portable secure communication device Expired - Lifetime CN203313411U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013203312858U CN203313411U (en) 2013-06-08 2013-06-08 Plug-and-play type portable secure communication device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013203312858U CN203313411U (en) 2013-06-08 2013-06-08 Plug-and-play type portable secure communication device

Publications (1)

Publication Number Publication Date
CN203313411U true CN203313411U (en) 2013-11-27

Family

ID=49619578

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013203312858U Expired - Lifetime CN203313411U (en) 2013-06-08 2013-06-08 Plug-and-play type portable secure communication device

Country Status (1)

Country Link
CN (1) CN203313411U (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103379486A (en) * 2013-06-08 2013-10-30 山东量子科学技术研究院有限公司 Plug and play type portable communication secrecy device and communication method thereof
CN103873973A (en) * 2014-02-27 2014-06-18 深圳市文鼎创数据科技有限公司 Method of realizing shield function and earphone function and Bluetooth shield
CN104053151A (en) * 2014-06-19 2014-09-17 中国科学院半导体研究所 Point-to-point data secret communication terminal device
CN104158657A (en) * 2014-07-16 2014-11-19 中兴通讯股份有限公司 Information processing method and device, as well as encryption equipment
CN106028318A (en) * 2016-04-26 2016-10-12 深圳市金天福科技有限公司 Voice signal processing method and device

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103379486A (en) * 2013-06-08 2013-10-30 山东量子科学技术研究院有限公司 Plug and play type portable communication secrecy device and communication method thereof
CN103379486B (en) * 2013-06-08 2016-12-28 山东量子科学技术研究院有限公司 A kind of instant inserted and instant using type portable call privacy device and communication means thereof
CN103873973A (en) * 2014-02-27 2014-06-18 深圳市文鼎创数据科技有限公司 Method of realizing shield function and earphone function and Bluetooth shield
CN104053151A (en) * 2014-06-19 2014-09-17 中国科学院半导体研究所 Point-to-point data secret communication terminal device
CN104053151B (en) * 2014-06-19 2017-06-16 中国科学院半导体研究所 A kind of data security communication terminal device of point-to-point
CN104158657A (en) * 2014-07-16 2014-11-19 中兴通讯股份有限公司 Information processing method and device, as well as encryption equipment
WO2015117333A1 (en) * 2014-07-16 2015-08-13 中兴通讯股份有限公司 Information processing method and apparatus, encryption device and computer storage medium
CN106028318A (en) * 2016-04-26 2016-10-12 深圳市金天福科技有限公司 Voice signal processing method and device

Similar Documents

Publication Publication Date Title
CN203313411U (en) Plug-and-play type portable secure communication device
JP5732538B2 (en) Electronic equipment that communicates with external equipment by voice method
CN103379486B (en) A kind of instant inserted and instant using type portable call privacy device and communication means thereof
CN104780040A (en) Handheld device encryption method and system based on quantum cryptography
CN102999279A (en) Method for controlling intelligent device through knocks
CN103000181A (en) System and implement method thereof for secret communications based on public communication network voice channel
CN106028257B (en) A kind of wearable communication headset and the communication means based on the communication headset
CN101917711A (en) Mobile communication system and voice call encryption method thereof
CN102075321B (en) Mobile communication end-to-end voice encryption Bluetooth handheld device and voice encryption method
CN105357226A (en) Encryption communication method based on VOIP (voice over internet phone) communication
WO2011137871A2 (en) Input method for communication terminals and communication terminals
CN105338475A (en) Bluetooth-based safety conversation system and method
CN204993763U (en) Encrypt bluetooth headset
CN102137394A (en) Encrypted mobile communication terminal system and method under network access
CN101567885A (en) Voice call device as well as system and method thereof
CN100576856C (en) The mobile phone scrambler and the secret communication method that are suitable for multiple communication network
CN205584214U (en) Smart mobile phone of external pronunciation encryption device and constitution based on smart mobile phone
CN104507055B (en) The USB digital hand platform systems and its means of communication communicated based on mobile network
CN104952467B (en) A kind of mobile terminal and its method for playing audio file
CN203219382U (en) System for connecting video display device by combining network connecting device and wireless telephone
CN203368565U (en) Encrypted headset
CN202978973U (en) Voice communication encryption system
CN202818616U (en) Voice communication device and system
CN101902734A (en) End-to-end self-synchronization voice encryption transmission implementation method for digital trunking communication system
CN202307121U (en) Communication data information broadcasting system based on voice synthesis

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CX01 Expiry of patent term
CX01 Expiry of patent term

Granted publication date: 20131127