WO2007066943A1 - The terminal equipment of speech secure communication service and method thereof - Google Patents

The terminal equipment of speech secure communication service and method thereof Download PDF

Info

Publication number
WO2007066943A1
WO2007066943A1 PCT/KR2006/005190 KR2006005190W WO2007066943A1 WO 2007066943 A1 WO2007066943 A1 WO 2007066943A1 KR 2006005190 W KR2006005190 W KR 2006005190W WO 2007066943 A1 WO2007066943 A1 WO 2007066943A1
Authority
WO
WIPO (PCT)
Prior art keywords
privacy
voice
voice information
unit
key
Prior art date
Application number
PCT/KR2006/005190
Other languages
French (fr)
Inventor
Seung Hwan Lee
Wonjae Cha
Original Assignee
Miracom Technology Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Miracom Technology Co., Ltd. filed Critical Miracom Technology Co., Ltd.
Publication of WO2007066943A1 publication Critical patent/WO2007066943A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/68Circuit arrangements for preventing eavesdropping
    • H04M1/70Lock-out or secrecy arrangements in party-line systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/68Circuit arrangements for preventing eavesdropping
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/38Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
    • H04B1/40Circuits
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these

Definitions

  • the present invention relates to a transmission and reception device for a speech secure communication service and a speech secure communication servicing method, in which a voice privacy method of sharing an encryption key used for voice privacy or ciphering using an in-band signaling scheme is applied to a transmission and reception device for performing a voice communication without any modification to a system so as to provide the speech secure communication service performed between transmission and reception devices in a mobile communication system that provides voice communication services using a mobile terminal, such as global system for mobile communications (GSM), code division multiple access (CDMA), or wideband CDMA (WCDMA), and a system that provides voice communication services through a packet communication network, such as voice over internet protocol (VoIP).
  • GSM global system for mobile communications
  • CDMA code division multiple access
  • WCDMA wideband CDMA
  • VoIP voice over internet protocol
  • a CDMA-type mobile communication system allows a code whose cross correlation value is small to be allocated to each of a plurality of user terminals sharing the same frequency, so that each user terminal spreads and then transmits a signal using the code allocated thereto at a transmitting end thereof, and generates the code used at the transmitting end to despread a received signal through synchronization to thereby restored the signal at a receiving end thereof, which makes it difficult to illegally wiretap cell phone conversation in a wireless transmission segment.
  • a terminal performing the voice communication transmits voice through both a wireless segment and a wired segment, it ultimately does not provide a voice privacy call for an end-to-end voice communication.
  • a conventional communication technology entails a problem in that it uses an additional device of a system by additionally providing a data service path besides a pure voice path and requires a ciphering device to be hardwarely connected to an analog voice path so as to encrypt and transmit digitalized voice information, resulting in a design modification to a network and the terminal.
  • a transmission and reception device for a speech secure communication service and a speech secure communication servicing method in which a voice privacy method of sharing an encryption key used for voice privacy or ciphering using an in-band signaling scheme is applied to a transmission and reception device for performing a voice communication after converting voice information into digital data without any modification to a system so as to provide the speech secure communication service.
  • a transmission and reception device for a speech secure communication service comprising: a voice interface unit for digitalizing an analog voice of a user; a voice vocoder unit for encoding the voice information digitalized by the voice interface unit or decoding encoded voice information; a user unit for allowing the user to input a control command to perform the speech secure communication service and displaying the input control command; a voice privacy unit for generating a privacy code key to convert the voice information applied thereto from the voice vocoder unit into ciphered voice information and encrypting the privacy code key to generate a share key and convert ciphered voice information applied thereto into original voice information; a privacy message processing unit for performing in-band signaling scheme to share the share key generated from the voice privacy unit with a counterpart transmission and reception device; and a physical layer unit for transmitting and receiving general or ciphered voice information.
  • the voice privacy unit may include: a privacy code part for
  • a privacy processing part for converting the voice information to be transmitted into ciphered voice information using the privacy code key and converting the ciphered voice information applied thereto from the physical layer unit into the original voice information using the privacy code key; and a privacy control part for receiving the control command from the user unit, requesting the privacy code part to generate the privacy code key in response to the control command, encrypting the generated privacy code key to produce the share key, transmitting the produced share key to the privacy message processing unit, and controlling the privacy processing part.
  • the transmission and reception device for a speech secure communication service and the speech secure communication servicing method of the present invention has an advantageous effect in that a voice privacy method is impleme nted only in the transmission and reception device without having any effect on a network, i.e., without any modification to a system to share a share key value using an in-band signaling scheme so as to provide the speech secure communication service between end-to-end terminals, so that traffics transmitting only voice information share an encrypted share key value even without passing through other signal paths to thereby perform an optimum speech secure communication service.
  • the present invention has a great economical effect since it is possible to implement the speech secure communication servicing method by simply installing a software algorithm in a transmission and reception device.
  • FIG. 1 is a block diagram showing the configuration of a transmission and reception device for performing a speech secure communication service according to a preferred embodiment of the present invention
  • FIG. 2 is a conceptual view illustrating conversion of voice information into
  • FIG. 3 is a flowchart illustrating the transmission procedure of a privacy processing part according to a preferred embodiment of the present invention
  • FIG. 4 is a flowchart illustrating the reception procedure of a privacy processing part according to a preferred embodiment of the present invention
  • FIG. 5 is a flowchart illustrating the transmission procedure of a privacy control part according to a preferred embodiment of the present invention.
  • FIG. 6 is a flowchart illustrating the reception procedure of a privacy control part according to a preferred embodiment of the present invention.
  • FIG. 1 is a block diagram showing the configuration of a transmission and reception device for performing a speech secure communication service according to a preferred embodiment of the present invention.
  • the transmission and reception device for performing a privacy function of the present invention includes a voice interface unit 10 for digitalizing an analog voice of a user, a user unit 20 for allowing the user to input a control command to perform the speech secure communication service and displaying the input control command, a voice vocoder unit 30 for encoding the voice information digitalized by the voice interface unit 10 or decoding encoded voice information, a voice privacy unit 40 for generating a privacy code key to convert the voice information applied thereto from the voice vocoder unit 30 into ciphered voice information and encrypting the privacy code key to generate a share key and convert ciphered voice information applied thereto into original voice information, a privacy message processing unit 50 for performing in-band signaling scheme to share the share key generated from the voice privacy unit 40 with a counterpart transmission and reception device, and a physical layer unit 60 for transmitting and receiving general or ciphered voice information.
  • a voice interface unit 10 for digitalizing an analog voice of a user
  • a user unit 20 for allowing the user to input a
  • the voice privacy unit 40 includes a privacy code part 42 for generating, storing and managing the privacy code key, a privacy processing part 44 for converting the voice information applied thereto from the voice vocoder unit 30 into ciphered voice information using the privacy code key and converting the ciphered voice information applied thereto from the physical layer unit 60 into the original voice information using the privacy code key, and a privacy control part 46 for receiving the control command for performing the speech secure communication service from the user unit 20, requesting the privacy code part 42 to generate the privacy code key in response to the control command, and encrypting the generated privacy code key to produce the share key to perform a function of sharing the produced share key with the counterpart transmission and reception device for performing the speech secure communication service.
  • the privacy code part 42 When the privacy code part 42 receives the request for the generation of the privacy code key from the privacy control part 46, it randomly generates a start position value (Vs) of to-be-ciphered voice information, an end position value (Ve) of to-be-ciphered voice information, and a mask data value (Vm) of to-be-ciphered voice information, i.e., the privacy code key.
  • Vs start position value
  • Ve end position value
  • Vm mask data value
  • the privacy code part 42 stores the generated Vs, Ve and Vm values and then
  • the privacy code part 42 receives a request for storage of the privacy code key from the privacy control part 46, it stores the privacy code key.
  • FIG. 2 is a conceptual view illustrating a state in which voice information is
  • a transfer unit in the CDMA Ix system is 171 bits/20msec.
  • a minimum value of Vs can be become “0”and a maximum value of Ve can become “171".
  • the bit number of Vm is a value obtained by subtracting Vs from Ve, it can become "171".
  • the privacy code part 42 randomly generates Vs and Ve values, randomly generates a Vm value based on the generated Vs and Ve values, and generates the privacy code key based on the generated Vs, Ve and Vm values.
  • the privacy control part 46 shares the produced share key with the counterpart transmission and reception device for performing the speech ciphering communication service.
  • the voice privacy function is performed by means of bit-reordering or exclusive-OR using the Vm value determined by the Vs and Ve values and obtained by generating voice information of the voice privacy region.
  • the privacy code key is generated by means of the randomly generated
  • Vs, Ve and Vm values are encrypted to produce a share key and then the produced share key is transmitted to a counterpart transmission and reception device based on a in-band signaling scheme so as to share the produced share key with the counterpart transmission and reception device.
  • FIGs. 3 and 4 are flowcharts illustrating the transmission and reception procedures of a privacy processing part 44 of the voice privacy unit for performing the speech secure communication according to a preferred embodiment of the present invention.
  • the privacy processing part 44 receives voice information from the voice vocoder unit 30, and the program proceeds to step SI lO where the privacy processing part 44 determines whether or not a voice privacy function is set. If it is determined at Sl 10 that the voice privacy function is not set, the privacy processing part 44 transmits the voice information received from the voice vocoder unit 30 to the privacy message processing unit 50. At this time, if there exists a share key for performing the speech secure communication, the privacy processing part 44 transmits the voice information which has undergone the in-band signaling scheme to the physical layer unit 60. On the other hand, if there no exists the share key to be transmitted to the counterpart transmission and reception device, the privacy processing part 44 immediately transmits the voice information to the physical layer unit 60 so as to perform a general voice communication.
  • step S 120 the privacy processing part 44 converts the voice information received from the voice vocoder unit 30 into the ciphered voice information based on the privacy code key value generated by the privacy code part 42, and then at step S 130 transmits the converted ciphered voice information to the physical layer unit 60 so as to perform the speech secure communication.
  • the privacy processing part 44 receives voice information from the physical layer unit 60, and the program proceeds to step S 160 where the privacy processing part 44 determines whether or not a voice privacy function is set. If it is determined at S 160 that the voice privacy function is set, the received voice information is ciphered voice information, and if it is determined at S 160 that the voice privacy function is not set, the received voice information is general voice information.
  • step S 160 the program proceeds to step S 180 where the privacy processing part 44 immediately transmits the received voice information to the voice vocoder unit 30 so as to perform a general voice communication.
  • step S 170 the privacy processing part 44 converts ciphered voice information into the original voice information using the privacy code key value, and then at step S 180 transmits the converted voice information to the voice vocoder unit 30 so as to perform the speech secure communication.
  • FIGs. 5 and 6 are flowcharts illustrating the transmission and reception procedures of a privacy control part according to a preferred embodiment of the present invention.
  • the privacy control part 46 receives a request for the speech secure communication from the user unit 20 at step S200, and transmits a request for generation of a privacy code key to the privacy code part 42 at step S210. At this time, the privacy code part 42 generates the privacy code key at step S220. Then, the privacy control part 46 receives the privacy code key generated from the privacy code part 42 and encrypts the received privacy code key to produce a share key at step S230, and then transmits the encrypted request information to the privacy message processing unit 50 and instructs the privacy message processing unit 50 to transmit the share key to a counterpart transmission and reception device at step S240.
  • the privacy message processing unit 50 completes the transmission of the share key to the counterpart transmission and reception device, and then waists for a response from the counterpart transmission and reception device. If there is no response from the counterpart transmission and reception device, the privacy message processing unit 50 informs the privacy control part 46 of the fact that the speech secure communication cannot be performed since based on the determination that there is no response to setting of the voice privacy function from the counterpart transmission and reception device.
  • the privacy control part 46 receives voice information from the
  • privacy control part 46 determines whether or not the received information is request information from the counterpart transmission and reception device for the information sent by the user.
  • step S310 If it is determined at step S310 that the received information is the request information from the counterpart transmission and reception device for the information sent by the user, the program proceeds to step S320 where the privacy control part 46 instructs the privacy processing part 44 to apply the privacy code key to convert the voice information. On the other hand, if it is determined at step S310 that the received information is request information for the speech secure communication transmitted from the counterpart transmission and reception device, but not the request information from the counterpart transmission and reception device for the information sent by the user, the program proceeds to step S330 where the privacy control part 46 decrypt the encrypted privacy code key using the share key to obtain the decrypted privacy code key and then transmits a privacy code storing command to the privacy code part 42 at step S340.
  • the privacy control part 46 instructs the privacy processing part 44 to apply the privacy code key to convert the ciphered voice being received into a general voice at step S350, and then instructs the privacy processing part 44 to transmit the response information to the privacy message processing unit 50. Then, the program is concluded.
  • the privacy control part 46 of the voice privacy unit 40 receives the control command from the user unit 20 and instructs the privacy code part 42 to generate a privacy code key.
  • the privacy control part 46 receives the generated privacy code key from the privacy code part 42, it encrypts the received privacy code key to produce a share key and instructs the privacy message processing unit 50 to transmit the share key to a counterpart transmission and reception device based on a in-band signaling scheme so as to share the produced share key with the counterpart transmission and reception device.
  • the counterpart transmission and reception device and receives the response information for the transmitted share key from the counterpart transmission and reception device, it transmits the received response information to the privacy control part 46 which in turn instructs the privacy processing part 44 to convert the voice information into ciphered voice information.
  • the privacy processing part 44 converts the voice information into the ciphered voice information in response to the instruction from the privacy control part 46 for application to the physical layer unit 60 so as to perform the speech secure communication with the counterpart transmission and reception device.
  • the transmission and reception device for a speech secure communication service and the speech secure communication servicing method of the present invention are useful industrially since the speech secure communication service is performed between transmission and reception devices even without any separate additional device.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The present invention relates to a transmission and reception device for a speech secure communication service and a speech secure communication servicing method, in which a voice privacy method of sharing an encryption key used for voice privacy or ciphering using an in- band signaling scheme is applied to a transmission and reception device for performing a voice communication without any modification to a system so as to provide the speech secure communication service performed between transmission and reception devices in a mobile communication system that provides voice communication services using a mobile terminal, such as global system for mobile communications (GSM), code division multiple access (CDMA), or wideband CDMA (WCDMA), and a system that provides voice communication services through a packet communication network, such as voice over internet protocol (VoIP).

Description

Description
THE TERMINAL EQUIPMENT OF SPEECH SECURE COMMUNICATION SERVICE AND METHOD THEREOF
Technical Field
[1] The present invention relates to a transmission and reception device for a speech secure communication service and a speech secure communication servicing method, in which a voice privacy method of sharing an encryption key used for voice privacy or ciphering using an in-band signaling scheme is applied to a transmission and reception device for performing a voice communication without any modification to a system so as to provide the speech secure communication service performed between transmission and reception devices in a mobile communication system that provides voice communication services using a mobile terminal, such as global system for mobile communications (GSM), code division multiple access (CDMA), or wideband CDMA (WCDMA), and a system that provides voice communication services through a packet communication network, such as voice over internet protocol (VoIP).
Background Art
[2] Conventionally, a CDMA-type mobile communication system allows a code whose cross correlation value is small to be allocated to each of a plurality of user terminals sharing the same frequency, so that each user terminal spreads and then transmits a signal using the code allocated thereto at a transmitting end thereof, and generates the code used at the transmitting end to despread a received signal through synchronization to thereby restored the signal at a receiving end thereof, which makes it difficult to illegally wiretap cell phone conversation in a wireless transmission segment.
[3] However, since a terminal performing the voice communication transmits voice through both a wireless segment and a wired segment, it ultimately does not provide a voice privacy call for an end-to-end voice communication.
[4] In addition, a conventional communication technology entails a problem in that it uses an additional device of a system by additionally providing a data service path besides a pure voice path and requires a ciphering device to be hardwarely connected to an analog voice path so as to encrypt and transmit digitalized voice information, resulting in a design modification to a network and the terminal.
Disclosure of Invention
Technical Problem
[5] Accordingly, the present invention has been made in order to solve the above
problems, and it is an object of the invention to provide a transmission and reception device for a speech secure communication service and a speech secure communication servicing method, in which a voice privacy method of sharing an encryption key used for voice privacy or ciphering using an in-band signaling scheme is applied to a transmission and reception device for performing a voice communication after converting voice information into digital data without any modification to a system so as to provide the speech secure communication service.
Technical Solution
[6] In order to accomplish the above object, according to one aspect of the invention, there is provided a transmission and reception device for a speech secure communication service, comprising: a voice interface unit for digitalizing an analog voice of a user; a voice vocoder unit for encoding the voice information digitalized by the voice interface unit or decoding encoded voice information; a user unit for allowing the user to input a control command to perform the speech secure communication service and displaying the input control command; a voice privacy unit for generating a privacy code key to convert the voice information applied thereto from the voice vocoder unit into ciphered voice information and encrypting the privacy code key to generate a share key and convert ciphered voice information applied thereto into original voice information; a privacy message processing unit for performing in-band signaling scheme to share the share key generated from the voice privacy unit with a counterpart transmission and reception device; and a physical layer unit for transmitting and receiving general or ciphered voice information.
[7] Also, preferably, the voice privacy unit may include: a privacy code part for
generating, storing and managing the privacy code key; a privacy processing part for converting the voice information to be transmitted into ciphered voice information using the privacy code key and converting the ciphered voice information applied thereto from the physical layer unit into the original voice information using the privacy code key; and a privacy control part for receiving the control command from the user unit, requesting the privacy code part to generate the privacy code key in response to the control command, encrypting the generated privacy code key to produce the share key, transmitting the produced share key to the privacy message processing unit, and controlling the privacy processing part.
[8] According to another aspect of the invention, there is also provided a speech secure communication servicing method in a system for transmitting and receiving digitalized voice information, including the steps of: randomly generating a start position value (Vs) and an end position value (Ve) of to-be-ciphered voice information for setting a voice privacy region in a voice information transfer unit; randomly generating a mask data value (Vm=Ve-Vs) of to-be-ciphered voice information used to perform bit- reordering or exclusive-OR; and encrypting a privacy code key generated by using the randomly generated values of Vs, Ve and Vm to produce a share key and then transmitting the produced share key to a counterpart transmission and reception device based on a in-band signaling scheme so as to share the produced share key with the counterpart transmission and reception device.
Advantageous Effects
[9] As described above, the transmission and reception device for a speech secure communication service and the speech secure communication servicing method of the present invention has an advantageous effect in that a voice privacy method is impleme nted only in the transmission and reception device without having any effect on a network, i.e., without any modification to a system to share a share key value using an in-band signaling scheme so as to provide the speech secure communication service between end-to-end terminals, so that traffics transmitting only voice information share an encrypted share key value even without passing through other signal paths to thereby perform an optimum speech secure communication service.
[10] Further, the present invention has a great economical effect since it is possible to implement the speech secure communication servicing method by simply installing a software algorithm in a transmission and reception device.
Brief Description of the Drawings
[11] Further objects and advantages of the invention can be more fully understood from the following detailed description taken in conjunction with the accompanying drawings in which:
[12] FIG. 1 is a block diagram showing the configuration of a transmission and reception device for performing a speech secure communication service according to a preferred embodiment of the present invention;
[13] FIG. 2 is a conceptual view illustrating conversion of voice information into
ciphered voice information on a transfer unit basis according to a preferred
embodiment of the present invention;
[14] FIG. 3 is a flowchart illustrating the transmission procedure of a privacy processing part according to a preferred embodiment of the present invention;
[15] FIG. 4 is a flowchart illustrating the reception procedure of a privacy processing part according to a preferred embodiment of the present invention;
[16] FIG. 5 is a flowchart illustrating the transmission procedure of a privacy control part according to a preferred embodiment of the present invention; and
[17] FIG. 6 is a flowchart illustrating the reception procedure of a privacy control part according to a preferred embodiment of the present invention.
Best Mode for Carrying Out the Invention
[18] Hereinafter, the preferred embodiment of the present invention will be described in detail with reference to the accompanying drawings.
[19] FIG. 1 is a block diagram showing the configuration of a transmission and reception device for performing a speech secure communication service according to a preferred embodiment of the present invention.
[20] The transmission and reception device for performing a privacy function of the present invention includes a voice interface unit 10 for digitalizing an analog voice of a user, a user unit 20 for allowing the user to input a control command to perform the speech secure communication service and displaying the input control command, a voice vocoder unit 30 for encoding the voice information digitalized by the voice interface unit 10 or decoding encoded voice information, a voice privacy unit 40 for generating a privacy code key to convert the voice information applied thereto from the voice vocoder unit 30 into ciphered voice information and encrypting the privacy code key to generate a share key and convert ciphered voice information applied thereto into original voice information, a privacy message processing unit 50 for performing in-band signaling scheme to share the share key generated from the voice privacy unit 40 with a counterpart transmission and reception device, and a physical layer unit 60 for transmitting and receiving general or ciphered voice information.
[21] The voice privacy unit 40 includes a privacy code part 42 for generating, storing and managing the privacy code key, a privacy processing part 44 for converting the voice information applied thereto from the voice vocoder unit 30 into ciphered voice information using the privacy code key and converting the ciphered voice information applied thereto from the physical layer unit 60 into the original voice information using the privacy code key, and a privacy control part 46 for receiving the control command for performing the speech secure communication service from the user unit 20, requesting the privacy code part 42 to generate the privacy code key in response to the control command, and encrypting the generated privacy code key to produce the share key to perform a function of sharing the produced share key with the counterpart transmission and reception device for performing the speech secure communication service.
[22] When the privacy code part 42 receives the request for the generation of the privacy code key from the privacy control part 46, it randomly generates a start position value (Vs) of to-be-ciphered voice information, an end position value (Ve) of to-be-ciphered voice information, and a mask data value (Vm) of to-be-ciphered voice information, i.e., the privacy code key. Here, the bit number of Vm means a value obtained by subtracting Vs from Ve.
[23] The privacy code part 42 stores the generated Vs, Ve and Vm values and then
applies them to the privacy processing part 44 through the privacy control part 46 to allow the voice information to be converted into the ciphered voice information. Also, for the operation of the transmission and reception device performing reception, when the privacy code part 42 receives a request for storage of the privacy code key from the privacy control part 46, it stores the privacy code key.
[24] FIG. 2 is a conceptual view illustrating a state in which voice information is
converted into ciphered voice information on a transfer unit basis using the privacy code key in the above method.
[25] The generation of the privacy code key and the voice privacy method will be
described hereinafter in detail with reference to an example of transferring the voice information using an 8kbps EVRC codec applied in a CDMA Ix system.
[26] A transfer unit in the CDMA Ix system is 171 bits/20msec. In FIG. 2, a minimum value of Vs can be become "0"and a maximum value of Ve can become "171". Thus, since the bit number of Vm is a value obtained by subtracting Vs from Ve, it can become "171".
[27] Each time a call is established as many as the bit number as determined above, the privacy code part 42 randomly generates Vs and Ve values, randomly generates a Vm value based on the generated Vs and Ve values, and generates the privacy code key based on the generated Vs, Ve and Vm values. After encrypting the generated privacy code key through an encryption method and then producing a share key, the privacy control part 46 shares the produced share key with the counterpart transmission and reception device for performing the speech ciphering communication service.
[28] At this time, the voice privacy function is performed by means of bit-reordering or exclusive-OR using the Vm value determined by the Vs and Ve values and obtained by generating voice information of the voice privacy region.
[29] In addition, the privacy code key is generated by means of the randomly generated
Vs, Ve and Vm values and is encrypted to produce a share key and then the produced share key is transmitted to a counterpart transmission and reception device based on a in-band signaling scheme so as to share the produced share key with the counterpart transmission and reception device.
[30] FIGs. 3 and 4 are flowcharts illustrating the transmission and reception procedures of a privacy processing part 44 of the voice privacy unit for performing the speech secure communication according to a preferred embodiment of the present invention.
[31] First, the transmission procedure of the privacy processing part 44 will be described hereinafter with reference to FIG. 3.
[32] At step SlOO, the privacy processing part 44 receives voice information from the voice vocoder unit 30, and the program proceeds to step SI lO where the privacy processing part 44 determines whether or not a voice privacy function is set. If it is determined at Sl 10 that the voice privacy function is not set, the privacy processing part 44 transmits the voice information received from the voice vocoder unit 30 to the privacy message processing unit 50. At this time, if there exists a share key for performing the speech secure communication, the privacy processing part 44 transmits the voice information which has undergone the in-band signaling scheme to the physical layer unit 60. On the other hand, if there no exists the share key to be transmitted to the counterpart transmission and reception device, the privacy processing part 44 immediately transmits the voice information to the physical layer unit 60 so as to perform a general voice communication.
[33] If, on the other hand, it is determined at Sl 10 that the voice privacy function is set, the program proceeds to step S 120 where the privacy processing part 44 converts the voice information received from the voice vocoder unit 30 into the ciphered voice information based on the privacy code key value generated by the privacy code part 42, and then at step S 130 transmits the converted ciphered voice information to the physical layer unit 60 so as to perform the speech secure communication.
[34] Next, the reception procedure of the privacy processing part 44 will be described hereinafter with reference to FIG. 4.
[35] At step S 150, the privacy processing part 44 receives voice information from the physical layer unit 60, and the program proceeds to step S 160 where the privacy processing part 44 determines whether or not a voice privacy function is set. If it is determined at S 160 that the voice privacy function is set, the received voice information is ciphered voice information, and if it is determined at S 160 that the voice privacy function is not set, the received voice information is general voice information.
[36] Accordingly, if it is determined at S 160 that the voice privacy function is not set, the program proceeds to step S 180 where the privacy processing part 44 immediately transmits the received voice information to the voice vocoder unit 30 so as to perform a general voice communication. On the other hand, if it is determined at S 160 that the voice privacy function is set, the program proceeds to step S 170 where the privacy processing part 44 converts ciphered voice information into the original voice information using the privacy code key value, and then at step S 180 transmits the converted voice information to the voice vocoder unit 30 so as to perform the speech secure communication.
[37] FIGs. 5 and 6 are flowcharts illustrating the transmission and reception procedures of a privacy control part according to a preferred embodiment of the present invention.
[38] First, the transmission procedure of the ciphered voice of the privacy control part 46 will be described hereinafter with reference to FIG. 5.
[39] The privacy control part 46 receives a request for the speech secure communication from the user unit 20 at step S200, and transmits a request for generation of a privacy code key to the privacy code part 42 at step S210. At this time, the privacy code part 42 generates the privacy code key at step S220. Then, the privacy control part 46 receives the privacy code key generated from the privacy code part 42 and encrypts the received privacy code key to produce a share key at step S230, and then transmits the encrypted request information to the privacy message processing unit 50 and instructs the privacy message processing unit 50 to transmit the share key to a counterpart transmission and reception device at step S240. At this time, the privacy message processing unit 50 completes the transmission of the share key to the counterpart transmission and reception device, and then waists for a response from the counterpart transmission and reception device. If there is no response from the counterpart transmission and reception device, the privacy message processing unit 50 informs the privacy control part 46 of the fact that the speech secure communication cannot be performed since based on the determination that there is no response to setting of the voice privacy function from the counterpart transmission and reception device.
[40] Next, the reception procedure of the ciphered voice of the privacy control part 46 will be described hereinafter with reference to FIG. 6.
[41] At step S300, the privacy control part 46 receives voice information from the
privacy message processing unit 50, and the program proceeds to step S310 where privacy control part 46 determines whether or not the received information is request information from the counterpart transmission and reception device for the information sent by the user.
[42] If it is determined at step S310 that the received information is the request information from the counterpart transmission and reception device for the information sent by the user, the program proceeds to step S320 where the privacy control part 46 instructs the privacy processing part 44 to apply the privacy code key to convert the voice information. On the other hand, if it is determined at step S310 that the received information is request information for the speech secure communication transmitted from the counterpart transmission and reception device, but not the request information from the counterpart transmission and reception device for the information sent by the user, the program proceeds to step S330 where the privacy control part 46 decrypt the encrypted privacy code key using the share key to obtain the decrypted privacy code key and then transmits a privacy code storing command to the privacy code part 42 at step S340.
[43] Thereafter, the privacy control part 46 instructs the privacy processing part 44 to apply the privacy code key to convert the ciphered voice being received into a general voice at step S350, and then instructs the privacy processing part 44 to transmit the response information to the privacy message processing unit 50. Then, the program is concluded.
[44] The speech secure communication servicing process of the present invention as constructed above will be briefly hereinafter. [45] When the user unit 20 transmits a control command for the speech secure communication to the voice privacy unit 40, the privacy control part 46 of the voice privacy unit 40 receives the control command from the user unit 20 and instructs the privacy code part 42 to generate a privacy code key. When the privacy control part 46 receives the generated privacy code key from the privacy code part 42, it encrypts the received privacy code key to produce a share key and instructs the privacy message processing unit 50 to transmit the share key to a counterpart transmission and reception device based on a in-band signaling scheme so as to share the produced share key with the counterpart transmission and reception device.
[46] When the privacy message processing unit 50 transmits the share key to the
counterpart transmission and reception device and receives the response information for the transmitted share key from the counterpart transmission and reception device, it transmits the received response information to the privacy control part 46 which in turn instructs the privacy processing part 44 to convert the voice information into ciphered voice information. At this time, the privacy processing part 44 converts the voice information into the ciphered voice information in response to the instruction from the privacy control part 46 for application to the physical layer unit 60 so as to perform the speech secure communication with the counterpart transmission and reception device. Industrial Applicability
[47] As described above, the transmission and reception device for a speech secure communication service and the speech secure communication servicing method of the present invention are useful industrially since the speech secure communication service is performed between transmission and reception devices even without any separate additional device.

Claims

Claims
[1] A transmission and reception device for a speech secure communication service, comprising:
a voice interface unit for digitalizing an analog voice of a user;
a voice vocoder unit for encoding the voice information digitalized by the voice interface unit or decoding encoded voice information;
a user unit for allowing the user to input a control command to perform the speech secure communication service and displaying the input control command; a voice privacy unit for generating a privacy code key to convert the voice information applied thereto from the voice vocoder unit into ciphered voice information and encrypting the privacy code key to generate a share key and convert ciphered voice information applied thereto into original voice information;
a privacy message processing unit for performing in-band signaling scheme to share the share key generated from the voice privacy unit with a counterpart transmission and reception device; and
a physical layer unit for transmitting and receiving general or ciphered voice information.
[2] The transmission and reception device according to claim 1, wherein the voice privacy unit comprises:
a privacy code part for generating, storing and managing the privacy code key; a privacy processing part for converting the voice information to be transmitted into ciphered voice information using the privacy code key and converting the ciphered voice information applied thereto from the physical layer unit into the original voice information using the privacy code key; and
a privacy control part for receiving the control command from the user unit, requesting the privacy code part to generate the privacy code key in response to the control command, encrypting the generated privacy code key to produce the share key, transmitting the produced share key to the privacy message processing unit, and controlling the privacy processing part.
[3] A speech secure communication servicing method in a system for transmitting and receiving digitalized voice information, comprising the steps of: randomly generating a start position value (Vs) and an end position value (Ve) of to-be-ciphered voice information for setting a voice privacy region in a voice information transfer unit;
randomly generating a mask data value (Vm=Ve- Vs) of to-be-ciphered voice information used to perform bit-reordering or exclusive-OR; and encrypting a privacy code key generated by using the randomly generated values of Vs, Ve and Vm to produce a share key and then transmitting the produced share key to a counterpart transmission and reception device based on a in-band signaling scheme so as to share the produced share key with the counterpart transmission and reception device.
PCT/KR2006/005190 2005-12-08 2006-12-05 The terminal equipment of speech secure communication service and method thereof WO2007066943A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR1020050119561A KR100748590B1 (en) 2005-12-08 2005-12-08 The terminal equipment of speech secure communication service and method thereof
KR10-2005-0119561 2005-12-08

Publications (1)

Publication Number Publication Date
WO2007066943A1 true WO2007066943A1 (en) 2007-06-14

Family

ID=38123047

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2006/005190 WO2007066943A1 (en) 2005-12-08 2006-12-05 The terminal equipment of speech secure communication service and method thereof

Country Status (2)

Country Link
KR (1) KR100748590B1 (en)
WO (1) WO2007066943A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104184873A (en) * 2013-05-27 2014-12-03 韩国电子通信研究院 Information security attachment device for voice communication and information security method

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20100030223A (en) * 2008-09-10 2010-03-18 주식회사 씨에스메소드 Voice secret communication apparatus and control method thereof

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5963621A (en) * 1993-05-24 1999-10-05 Comsat Corporation Secure communication system
KR20020057884A (en) * 2002-05-21 2002-07-12 주식회사 컴섹 Construction of telephone encryptor by the encryption key exchange
JP2003008565A (en) * 2001-04-05 2003-01-10 Lucent Technol Inc Method for providing secure communications between first wireless unit and second wireless unit

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR970019193A (en) * 1995-09-30 1997-04-30 김광호 Anti-fire cordless telephone
KR100633709B1 (en) * 2004-10-22 2006-10-16 이익수 A chaotic speech secure communication system to binary CDMA using a digital chaotic cell
KR100602851B1 (en) * 2005-01-07 2006-07-20 주식회사 드림시큐리티 Secret conversation system between mobile phones each other
KR100789668B1 (en) * 2005-01-27 2007-12-31 정명식 Mobile communications terminal having both general communication mode and secret communication service mode

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5963621A (en) * 1993-05-24 1999-10-05 Comsat Corporation Secure communication system
JP2003008565A (en) * 2001-04-05 2003-01-10 Lucent Technol Inc Method for providing secure communications between first wireless unit and second wireless unit
KR20020057884A (en) * 2002-05-21 2002-07-12 주식회사 컴섹 Construction of telephone encryptor by the encryption key exchange

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104184873A (en) * 2013-05-27 2014-12-03 韩国电子通信研究院 Information security attachment device for voice communication and information security method
EP2809045A3 (en) * 2013-05-27 2014-12-17 Electronics and Telecommunications Research Institute Information security attachment device for voice communication and information security method for voice communication using the same
US9467428B2 (en) 2013-05-27 2016-10-11 Electronics And Telecommunications Research Institute Information security attachment device for voice communication and information security method for voice communication using the same

Also Published As

Publication number Publication date
KR100748590B1 (en) 2007-08-10
KR20070060302A (en) 2007-06-13

Similar Documents

Publication Publication Date Title
KR100852146B1 (en) System and method for lawful interception using trusted third parties in voip secure communications
US7684565B2 (en) System for securely communicating information packets
WO2007063420A3 (en) Authentication in communications networks
JP2001016196A (en) Enciphering/deciphering method using multiple affine key, authenticating method and each device using the same
CN100365971C (en) Method for encoding and decoding communication data
KR101297936B1 (en) Method for security communication between mobile terminals and apparatus for thereof
US8693686B2 (en) Secure telephone devices, systems and methods
US20110135093A1 (en) Secure telephone devices, systems and methods
JPH1022994A (en) Ciphering device, deciphering device, ciphering method, deciphering method and communication system using the same
CN101707767A (en) Data transmission method and devices
MX2007011639A (en) Method for implementing a state tracking mechanism in a communications session between a server and a client system.
JP2005236490A (en) Mobile communication terminal and network connection apparatus in mobile communication network system, and update method of shared private key, and update program of shared private key
US9241066B2 (en) Secure call analysis and screening of a secure connection
WO2007066943A1 (en) The terminal equipment of speech secure communication service and method thereof
EP2809045B1 (en) Information security attachment device for voice communication and information security method for voice communication using the same
JP2002341761A (en) Method and device for security of communication information in cdma radio communication system
CN101247221B (en) Signal watermarking in the presence of encryption
JP2005501481A5 (en)
JP2008011176A (en) Radio communication method and system
JPH06152587A (en) Method and device for digital communication
CN117459325B (en) Three-party data communication method combining quantum communication and conventional communication
JP4628002B2 (en) Encryption system in communication link and communication terminal device thereof
CN110890968B (en) Instant messaging method, device, equipment and computer readable storage medium
JP2001308845A (en) Encoding/decoding method using multiple affine key, authentication method and each device using the same
CN109982317B (en) Voice encryption and decryption system and method based on CDMA network

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC

122 Ep: pct application non-entry in european phase

Ref document number: 06823897

Country of ref document: EP

Kind code of ref document: A1