[go: up one dir, main page]

CN100372349C - Setting method and device of chaotic security phone - Google Patents

Setting method and device of chaotic security phone Download PDF

Info

Publication number
CN100372349C
CN100372349C CNB2004100145346A CN200410014534A CN100372349C CN 100372349 C CN100372349 C CN 100372349C CN B2004100145346 A CNB2004100145346 A CN B2004100145346A CN 200410014534 A CN200410014534 A CN 200410014534A CN 100372349 C CN100372349 C CN 100372349C
Authority
CN
China
Prior art keywords
circuit
data
chaotic
key
telephone
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2004100145346A
Other languages
Chinese (zh)
Other versions
CN1564564A (en
Inventor
季晓勇
史军
马赟
倪皖荪
单增罗布
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University
Original Assignee
Nanjing University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University filed Critical Nanjing University
Priority to CNB2004100145346A priority Critical patent/CN100372349C/en
Publication of CN1564564A publication Critical patent/CN1564564A/en
Application granted granted Critical
Publication of CN100372349C publication Critical patent/CN100372349C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

混沌保密电话,由普通电话机(15)、(16),和由数据流混沌编解码模块化电路(10)、电话线路调制解调器(MODEM)(11)、显示与通信口控制电路(MCU)(12)、线路切换开关(13)、话柄输入切换开关(14)、在线直流电源(17)、在线电阻(20)、双音多频接受与解调电路(18)、身份数据设置(19)等组成的底座构成,两部分连接后即成为本发明的一种混沌保密电话。本发明公布一种采用新型的混沌伪随机序列加解密算法,即快速CPRS混沌保密算法而研制的保密电话机技术。具有语音和数据保密通信功能,抗干扰和保密性能强。介绍一种采用该技术制备的保密电话机方案。

Chaos confidential telephone, by ordinary telephone set (15), (16), and by data stream chaos codec modular circuit (10), telephone line modem (MODEM) (11), display and communication port control circuit (MCU) ( 12), line switching switch (13), handle input switching switch (14), online DC power supply (17), online resistance (20), dual-tone multi-frequency receiving and demodulation circuit (18), identity data setting (19) The base that etc. are formed constitutes, and promptly becomes a kind of chaos confidential telephone of the present invention after two parts are connected. The invention discloses a security telephone technology developed by adopting a novel chaotic pseudo-random sequence encryption and decryption algorithm, that is, a fast CPRS chaotic security algorithm. It has voice and data confidential communication functions, and has strong anti-interference and confidentiality performance. A security telephone scheme prepared by this technology is introduced.

Description

The method to set up of chaotic secret phone and device thereof
One, technical field
The invention belongs to the chaotic secret communication technical field, relate to the secure communication and the code phone equipment of cable voice and data.
Two, background technology
The speech security method has multiple method, the simplest is Voice Conversion Techniques, another kind of secrecy technology is that voice are divided into a plurality of time periods, and transmit the phonetic element of these time periods with several different inversion frequencies, the length of used time period and the order of inversion frequency can decide by the prearranged coding card that inserts simultaneously in encoder and the decoder.The voice of each time period may be partitioned into a series of frequency range again, and to each section with a different audio conversion frequency, frequency division and audio tone inversion frequency can change at random.A kind of distributor of five frequency bands can and be transformed into 3840 kinds of forms with voice-scrambling, but wherein has only several forms that sufficient disguise can be provided, and is available.As treating frequency, the time period also can be upset.These encryption methods are called the frequency hopping coding.In addition, the upset table of sound frequency composition can change continuously according to the pseudo random sequence that produces synchronously in the transmitter and receiver, and the method is called rolling coding.But these are based on the processing method of analog signal, will inevitably bring the deficiencies such as poor signal quality that encryption strength is low, signal to noise ratio is low, recovery is come out.
What the speech security effect was best at present is digital-scrambling techniques.Earlier voice digitization is gone to encrypt with the high speed password machine again, what transmit in telephone line is the digital signal of encrypting, and the conversation of using tapping device to receive is a slice noise, is difficult to solve original voice.
Three, summary of the invention
The objective of the invention is to realize a kind of can the use, have simultaneously the confidential phone of the chaos speech secure communication function of digitized, high reliability, high encryption strength, high-speed encryption and decryption, hi-fi effect again as plain old telephone.The operator can assemble easily and use as plain old telephone.
Chaotic secret telephone set (as Fig. 1), when circuit diverter switch 13, when subject for ridicule input diverter switch 14 is on off state A, the external call link tester is crossed the line input mouth that circuit diverter switch 13 inserts ordinary telephone set support 15.Simultaneously, the subject for ridicule on the ordinary telephone set support 15 is imported/is gone out signal and is connected with ordinary telephone set subject for ridicule 16 through subject for ridicule input diverter switch 14.At this moment this chaotic secret telephone set works in the normal talking pattern, and duplex transmission is simulated audio signal on the outside line.
Under the normal talking pattern, the signal that transmits on telephone line modulator-demodulator (MODEM) 11, dual-tone multifrequency acceptance and demodulator circuit 18 and 10 pairs of outside lines of data flow chaos coding/decoding module circuit and the actuation of keys of ordinary telephone set support 15 are monitored in real time.
When circuit diverter switch 13, when microphone input diverter switch 14 is on off state B, the external call link tester is crossed telephone line modulator-demodulator (MODEM) 11 and is connected with the RS232 level shifting circuit 105 of data flow chaos coding/decoding module circuit 10 inside, and ordinary telephone set subject for ridicule 16 is connected with filter circuit 103 with filter circuit 101, audio frequency output power amplifier through the audio frequency input amplification of subject for ridicule input diverter switch 14 and data flow chaos coding/decoding module circuit 10 inside.At this moment this chaotic secret telephone set works in the secret telephony pattern, and duplex transmission is chaos encryption audio data stream signal on the outside line.
Under the secret telephony pattern, on-line direct current power supply 17 enters ordinary telephone set support 15 by online resistance 20, circuit diverter switch 13 and keeps its in-line power.
The conversion of normal and two kinds of patterns of secret telephony can be made up and realizes by pressing specific keys on the ordinary telephone set.Under the off-hook condition after keying in a specific key combination that enters secure communication on the ordinary telephone set support 15, dual-tone multifrequency is accepted with demodulator circuit 18 touch-tone signal of button to be demodulated to corresponding key assignments data and is sent into logical AND sequential control circuit 107 in the data flow chaos coding/decoding module circuit 10, send digital signal processor 108 again.Handle the control command that the back forms secure communication, control command one tunnel is sent logical sequence control circuit 107, and control circuit diverter switch 13 switches to state B with subject for ridicule input diverter switch 14, makes the calling party on-hook.Simultaneously telephone line modulator-demodulator (MODEM) 11 is sent into through serial ports control circuit 109, RS232 level shifting circuit 105 in another road of control command, makes it begin the opposing party's dial-up in secure communication and begins to set up data communication channel.At this moment this chaotic secret telephone set enters the secret telephony pattern.
Secure communication the opposing party's chaotic secret telephone set is receiving after specific keys that the other side transmits makes up pairing touch-tone signal, correspondingly with the above-mentioned action of calling party carries out corresponding switch change action, makes it enter the secret telephony pattern.The handshake procedure that its telephone line modulator-demodulator (MODEM) 11 responds the other side's calling and enters communication.
At this moment, the both sides in the communication all enter the data confidentiality talking state.LCDs in demonstration and the port control circuit (MCU) 12 demonstrates the information that enters secure communication mode.The either party of both call sides is after keying in a specific key combination that withdraws from secure communication on the ordinary telephone set support 15, dual-tone multifrequency is accepted with demodulator circuit 18 touch-tone signal of button to be demodulated to corresponding key assignments data and is sent into logical AND sequential control circuit 107 in the data flow chaos coding/decoding module circuit 10, send digital signal processor 108 again, handle back formation and withdraw from the control command that secure communication enters proper communication.Control command one tunnel is sent logical sequence control circuit 107, and switches to state A by logical sequence control circuit 107 control circuit diverter switches 13 and subject for ridicule input diverter switch 14, makes ordinary telephone set support 15 recover online; Another road control command is sent into telephone line modulator-demodulator (MODEM) 11 through serial ports control circuit 109, RS232 level shifting circuit 105, makes it finish work at present state and hanging wire.At this moment this chaotic secret telephone set returns to normal call mode.
No matter the opposing party in the conversation withdraws from after keying in the key combination that withdraws from secure communication on the ordinary telephone set support 15, still all can withdraw from the secure communication state after its telephone line modulator-demodulator (MODEM) 11 receives the other side's hanging wire signal and reenter normal call mode, ordinary telephone set support 15 recovers online.
The first step after entering secure communication mode will be carried out the authentication of both call sides identity information.After entering secure communication mode, LCDs in both sides' demonstration and the port control circuit (MCU) 12 demonstrates the prompting that requires input the other side identity information, in the receiver of ordinary telephone set subject for ridicule 16, play out the signal language of " please import 12 identity datas of the other side, finish behind the key entry pound sign " simultaneously.After keying in the key combination of 12 identity datas of the other side on the ordinary telephone set support 15, dual-tone multifrequency is accepted with demodulator circuit 18 touch-tone signal of button to be demodulated to corresponding key assignments data and is sent into logical AND sequential control circuit 107 in the data flow chaos coding/decoding module circuit 10, send digital signal processor 108 again, with the key of these data, and then be processed into parameters value in the quick chaos pseudo random sequence secret algorithm as when authentication chaos system.
The secret telephony both sides are when authentication, separately as a token of with one group of data of arranging, utilization chaos pseudo random sequence secret algorithm is encrypted the back and is sent some groups mutually to the other side, after both sides receive the data that the other side sends, the identity data that digital signal processor 108 separately reads oneself is provided with the identity data value in 19, and it is decrypted some groups of data that receive as decruption key, if some groups of data after the deciphering are all identical, and it is errorless with the data of agreement, then the authentication of both sides' identity information is passed through, and can carry out next step operation.If there are some groups of data after the side deciphering inequality, or it is wrong with the data of agreement, then the LCDs in the demonstration of chaotic secret telephone set and the port control circuit (MCU) 12 demonstrates the information of authentication error, in the receiver of ordinary telephone set subject for ridicule 16, play out the signal language of " the other side's identity information is wrong, and authentication is not passed through " simultaneously.The chaotic secret telephone set requires to authenticate again or withdraw from secure communication.Take such authentication measures can prevent effectively that the third party from intercepting the initialization code data of both call sides, and then decode out the call-information that both sides encrypt, thus the fail safe that improves chaotic secret telephone set (as Fig. 1).
After the authentication of finishing under the secure communication mode, chaotic secret telephone set display reminding information and play out the signal language of " please import 12 bit digital, key in pound sign then finish " subsequently as the initialization key.After keying in the key combination of initialization key data on the ordinary telephone set support 15, these data are accepted by digital signal processor 108.When 12 of the initialization key less thaies of input and when keying in pound sign, digital signal processor 108 will be on the rearmost position of key data automatically zero padding become 12.Subsequently, to use the chaos pseudo random sequence secret algorithm, send to the other side mutually after the initialization key data encryption separately to secret telephony both sides input, both sides receive the initialization key data that the other side sends, the identity data that digital signal processor 108 separately reads oneself is provided with the identity data value in 19, and it is decrypted the initialization key data that receives as key, both sides obtain the other side and send the initialization key of secure voice data, so that can be decrypted to the other side's speech scrambling data that receive subsequently.
For achieving the above object, adopted in the technical scheme of the present invention to comprise that a kind of data flow chaos coding/decoding module circuit 10, telephone line modulator-demodulator (MODEM) 11, demonstration and port control circuit (MCU) 12, circuit diverter switch 13, subject for ridicule input diverter switch 14, ordinary telephone set support 15, ordinary telephone set subject for ridicule 16, dual-tone multifrequency acceptance are provided with 19 modules with demodulator circuit 18, identity data and constitute.Data flow chaos coding/decoding module circuit 10, comprise digital signal processor (DSP) 108, memory under program 106, logical AND sequential control circuit 107, the audio frequency input is amplified and filter circuit 101, the D/A change-over circuit 102 of the A/D of input analog signal and output analog signal, audio frequency output power amplifier and filter circuit 103, RS232 level shifting circuit 105, serial ports control chip 109 formations such as grade, memory under program 106, logical AND sequential control circuit 107 is peripheral connecting circuits of digital signal processor DSP 108, audio frequency input amplification is connected A/D change-over circuit 102 with filter circuit 101, and realizes seamless link with digital signal processor DSP 108 by synchronous serial interface MCBSP.Digital signal processor DSP 108 is realized seamless link by synchronous serial interface MCBSP with D/A change-over circuit 102, audio frequency output power amplifier and the filter circuit 103 of output analog signal; (DSP108 is connected RS232 level shifting circuit 105, realizes the direct communication of serial I/O data flow and DSP108 with digital signal processor by serial ports control chip 109; Digital signal processor DSP 108 in the data flow chaos coding/decoding module circuit 10 connects and shows and port control circuit MCU12, serial ports RS232 in the data flow chaos coding/decoding module circuit 10 connects telephone line modem 11 and is connected with digital signal processor DSP 108 by serial ports control chip 109, identity data is provided with 19 modules and connects logical AND sequential control circuit 107, data flow chaos coding/decoding module circuit 10 sound intermediate frequencies input amplification is held with audio frequency output power amplifier is connected subject for ridicule input diverter switch 14 with the output of filter circuit 103 B with the input of filter circuit 101, circuit input/the outbound port of ordinary telephone set support 15 connects the A end of subject for ridicule input diverter switch 14, and ordinary telephone set subject for ridicule 16 is connected with the common port of subject for ridicule input diverter switch 14.
Have the strong digital signal processor DSP of numerical operation ability 108 in the modularized circuit and move a kind of quick CPRS chaos (pseudo random sequence) secret algorithm.Because the CPRS chaos system has self-synchronization and synchronizing speed is fast, its state parameter is many, the chaotic behavior complexity, thereby this algorithm to have a key many, security performance is good, and reliability height, antidecoding capability be strong, and can produce encryption and decryption chaos pseudo random sequence (CPRS), the undistorted characteristics of decrypting ciphertext fast.This invention technology also provides ITUG.723.1 compress speech software simultaneously, code check after the compress speech only is 5.3k/6.3kbps, make that the data rate of this invention actual transmissions when secure communication mode is lower, thereby the quality requirement of wire message way is greatly reduced.
" chaotic secret telephone set " of the present invention has normal talking pattern and secret telephony pattern, but between simply switches, when entering the secret telephony pattern, duplex transmission is chaos encryption audio data stream signal on its outside line, but not analog signal has the authentication function of both call sides identity information.
The touch-tone signal that the back occurs on the line output terminal under dual-tone multifrequency acceptance and the demodulator circuit 18 demodulation ordinary telephone set supports 15 upper keyboard keys is adopted in the information input outside ordinary telephone set support 15, obtain its corresponding key assignments, draw relevant signal internally and need not to take apart ordinary telephone set support 15 structures.Circuit diverter switch 13, subject for ridicule input diverter switch 14 can adopt the relay of dpdt double-pole double-throw (DPDT) or the analog switch of dpdt double-pole double-throw (DPDT).
" chaotic secret telephone set " of the present invention has and sends and accept dual key, and during 12 of input key less thaies, on the rearmost position automatically zero padding become 12.
" chaotic secret telephone set " of the present invention has LCDs display reminding information, simultaneously play cuing language function in the receiver of ordinary telephone set subject for ridicule 16.
" chaotic secret telephone set " of the present invention its identity data is provided with 19 circuit, and the value that is provided with has uniqueness, can be used to differentiate user's identity.
" chaotic secret telephone set " of the present invention its circuit diverter switch 13, subject for ridicule input diverter switch 14 can adopt the relay of dpdt double-pole double-throw (DPDT) or the analog switch of dpdt double-pole double-throw (DPDT).
The data flow chaos coding/decoding module circuit 10 that adopts in " chaotic secret telephone set " of the present invention, it is characterized in that adopting model is the integrated circuit formation audio frequency input amplification and filter circuit 101 of TLC2272ACD, adopt model be the integrated circuit of TLC320AD50C as A/D and D/A converter 102, external logic and sequential control circuit 107 employing programmable chip ISP_M4A5.
" chaotic secret telephone set " of the present invention formed as Fig. 2 after it is characterized in that can simply being connected by two parts on the structure.A part is an ordinary telephone set 15,16, and its internal structure need not to change, and model does not also have specific (special) requirements.Another part by a kind of data flow chaos coding/decoding module circuit 10, telephone line modem 11, demonstration and port control circuit MCU12, circuit diverter switch 13, subject for ridicule input diverter switch 14, on-line direct current power supply 17, online resistance 20, dual-tone multifrequency is accepted and demodulator circuit 18, identity data are provided with the bases of forming such as 19.Promptly become a kind of chaotic secret telephone set of the present invention such as Fig. 1 after the simple connection of two parts.
Four, description of drawings
Fig. 1 is " chaotic secret telephone set " of the present invention system block diagram;
Fig. 2 is a concrete enforcement circuit block diagram of the present invention
Fig. 3 is a circuit diagram of the present invention
Fig. 4 is the program flow diagram of work of the present invention
Five, embodiment
The chaotic secret telephone set
Be example with a kind of " the chaotic secret telephone set " that adopts this invention fabrication techniques below, the embodiment of this technology is described.
1, circuit structure design is with reference to figure 3
Adopted a kind of data flow chaos coding/decoding module circuit 10 in the chaotic secret telephone set that this invention realized, be used for real-Time Speech Signals is compressed and the computing of CPRS chaos encryption and decryption, utilize telephone line modem 11 to realize the duplex transmission of chaos encryption audio data stream signal, utilize monolithic processor controlled demonstration and port control circuit MCU12 to realize the demonstration of information, utilize button on the ordinary telephone set support 15 and dual-tone multifrequency to accept to realize the input of key informations with demodulator circuit 18, utilize ordinary telephone set subject for ridicule 16 to realize picking up and resetting of voice messaging, utilize circuit diverter switch 13, the switching that subject for ridicule input diverter switch 14 realizes operating state utilizes identity data that the identity that 19 modules are confirmed receiving-transmitting sides is set.Form as Fig. 1 after can simply connecting by two parts on the structure, the ordinary telephone set that adopts 15,16, its internal structure need not to change, model does not also have specific (special) requirements.
The voice signal of input is the audio output signal of telephone set subject for ridicule 16 outputs in this device, therefore adopting model is amplification and the filter circuit 101 that the integrated circuit of TLC2272ACD constitutes the audio frequency input, and the employing model is that the integrated circuit of TLC320AD50C is as the A/D converter of audio input signal and the D/A converter 102 of audio output signal.The secure voice signal of deciphering will output in the earphone, so output employing model is the power amplifier and the filter circuit 103 of the operational amplifier formation audio output signal of LM386.
Code check behind the digitization of speech signals to be sent is that 128kbps annotates: owing to employing in this programme is the A/D converter of 16bits, directly transmission need be than higher channel width, therefore must adopt voice compression algorithm to compress before sending, adopt same algorithm to carry out decompress(ion) when accepting again.Adopt G.723.1 compression algorithm of ITU in this programme, this compression algorithm has that code check after the compression is low, to recover voice quality better, but algorithm is realized difficult characteristics.G.723.1, ITU is 5.3k/63kbps only to the code check after the compress speech, and code check is lower.Because this algorithm, compress speech can be brought the time-delay of 30ms at least.
For the voice signal that sends is compressed the chaos encryption with CPRS, the voice signal that receives is carried out CPRS chaos decode and decompression operation, the model of selecting TI company to produce in this programme is the digital signal processor (DSP) 108 of the fixed-point calculation of TMS320VC5409_100, and the supporting employing model memory under program 106 that is SST39VF400A, power conversion and the filtering chip that model is TPS767D301.According to Theoretical Calculation and with reference to experimental result, such selection can be guaranteed enough operational capabilities, and voice signal is being carried out compression and decompression, and when carrying out CPRS chaos encryption and decryption simultaneously, total amount of delay that system brings is about 32ms, satisfies the requirement of real-time speech communicating fully.
In order to realize wire communication, this programme is selected the ordinary telephone wiring modem 11 duplex transmission chaos encryption audio data stream signals of Hayes company production for use, and digital signal processor (DSP) 108 controls its working method by serial ports.
Outside logical AND sequential control circuit 107 adopts programmable chip ISP_M4A5_32 in this programme, it is the integrated circuit of MAX3241 and TL16C550 that RS232 level conversion data 105 and serial ports control chip 109 adopts models, shows that adopting models with port control 12 is the liquid crystal display screen that shows of the two row information of CM1610 and the singlechip chip of AT89C51.
It is relay, ordinary telephone set support 15 and the 16 no characteristic requirements of ordinary telephone set subject for ridicule of DS2Y-S-DC5V that circuit diverter switch 13, subject for ridicule are imported diverter switch 14 employing models, and dual-tone multifrequency acceptance and demodulator circuit 18 employing models are the DIP switch that chip, the identity data of MT8870 is provided with 16 of 19 employings.
Required power supply when on-line direct current power supply 17 is used to provide 15 work of ordinary telephone set support with on-line direct current resistance 20 is selected the resistance of 7812 voltage stabilizing chips and 600 ohm respectively for use.
2, operation principle description references Fig. 3, Fig. 4
Chaotic secret telephone set such as Fig. 3 that the present invention realized, start back circuit diverter switch 13, subject for ridicule input diverter switch 14 all are on off state A place, and the external call link tester is crossed the line input mouth that circuit diverter switch 13 inserts ordinary telephone set support 15.Simultaneously, the subject for ridicule on the ordinary telephone set support 15 is imported/is gone out signal and is connected with ordinary telephone set subject for ridicule 16 through subject for ridicule input diverter switch 14.At this moment this chaotic secret telephone set works in the normal talking pattern, and duplex transmission is simulated audio signal on the outside line;
Communication mode and ordinary telephone set under the normal talking pattern are identical.At this moment the signal that transmits on telephone line modem 11, dual-tone multifrequency acceptance and demodulator circuit 18 and 10 pairs of outside lines of data flow chaos coding/decoding module circuit and the actuation of keys of ordinary telephone set support 15 are monitored in real time.
Under the off-hook condition, but after keying in a specific key combination that enters secure communication on the ordinary telephone set support 15 software setting, as ( *1#), dual-tone multifrequency is accepted with demodulator circuit 18 touch-tone signal of button to be demodulated to corresponding key assignments data and is sent into logical AND sequential control circuit 107 in the data flow chaos coding/decoding module circuit 10, send digital signal processor 108 again.Handle the control command that the back forms secure communication, control command one tunnel is sent logical sequence control circuit 107, and control circuit diverter switch 13 switches to state B with subject for ridicule input diverter switch 14, makes the calling party on-hook.Simultaneously telephone line modem 11 is sent into through serial ports control circuit 109, RS232 level shifting circuit 105 in another road of control command, makes it begin the opposing party's dial-up in secure communication and begins to set up data communication channel.At this moment this chaotic secret telephone set enters the secret telephony pattern.
Secure communication the opposing party's chaotic secret telephone set is receiving after specific keys that the other side transmits makes up pairing touch-tone signal, and the corresponding switch change action that carries out with the above-mentioned action of calling party makes it enter the secret telephony pattern.Its telephone line modem 11 response the other side's calling also begins to enter the communication handshake program.
At this moment, the both sides in the communication all enter the data confidentiality talking state.LCDs among demonstration and the port control circuit MCU12 demonstrates the information that enters secure communication mode.
Under the secure communication mode, the either party of both call sides after keying in a specific key combination that withdraws from secure communication on the ordinary telephone set support 15 ( *0#), dual-tone multifrequency is accepted with demodulator circuit 18 touch-tone signal of button to be demodulated to corresponding key assignments data and is sent into logical AND sequential control circuit 107 in the data flow chaos coding/decoding module circuit 10, send digital signal processor 108 again, handle back formation and withdraw from the control command that secure communication enters proper communication.Control command one tunnel is sent logical sequence control circuit 107, and switches to state A by logical sequence control circuit 107 control circuit diverter switches 13 and subject for ridicule input diverter switch 14, makes ordinary telephone set support 15 recover online; Another road control command is sent into telephone line modem 11 through serial ports control circuit 109, RS232 level shifting circuit 105, makes it finish work at present state and hanging wire.At this moment this chaotic secret telephone set returns to normal call mode.
No matter the opposing party in the conversation withdraws from after keying in the key combination that withdraws from secure communication on the ordinary telephone set support 15, still all can withdraw from the secure communication state and reenter normal call mode after its telephone line modem 11 receives the other side's hanging wire signal, ordinary telephone set support 15 recovers online.
Under the secret telephony pattern, on-line direct current power supply 17 enters ordinary telephone set support 15 by online resistance 20, circuit diverter switch 13 and keeps its in-line power.
After entering secure communication mode, LCDs among both sides' demonstration and the port control circuit MCU12 demonstrates the prompting that requires input the other side identity information, in the receiver of ordinary telephone set subject for ridicule 16, play out the signal language of " please import 12 identity datas of the other side, finish behind the key entry pound sign " simultaneously.After keying in the key combination of 12 identity datas of the other side on the ordinary telephone set support 15, dual-tone multifrequency is accepted with demodulator circuit 18 touch-tone signal of button to be demodulated to corresponding key assignments data and is sent into logical AND sequential control circuit 107 in the data flow chaos coding/decoding module circuit 10, send digital signal processor 108 again, with the key of these data, and then be processed into parameters value in the quick chaos pseudo random sequence secret algorithm as when authentication chaos system.
The secret telephony both sides are in when authentication, separately with the data of one group of agreement as a token of as (0123456789 *#), utilization chaos pseudo random sequence secret algorithm is encrypted the back and is sent some groups mutually to the other side, after both sides receive the data that the other side sends, the identity data that digital signal processor 108 separately reads oneself is provided with the identity data value in 19, and it is decrypted some groups of data that receive as decruption key, if some groups of data after the deciphering are all identical, and errorless in the data of agreement, then the authentication of both sides' identity information is passed through, and can carry out next step operation.
If there are some groups of data after the side deciphering inequality, or it is wrong in the data of agreement, then the LCDs among the demonstration of chaotic secret telephone set and the port control circuit MCU12 demonstrates the information of authentication error, in the receiver of ordinary telephone set subject for ridicule 16, play out the signal language of " the other side's identity information is wrong, and authentication is not passed through " simultaneously.The chaotic secret telephone set requires to authenticate again or withdraw from secure communication.
Take such authentication measures can prevent effectively that the third party from intercepting the initialization code data of both call sides, and then decode out the call-information that both sides encrypt, thus the fail safe that improves chaotic secret telephone set (as Fig. 1).
After the authentication of finishing under the secure communication mode, chaotic secret telephone set display reminding information and play out the signal language of " please import 12 bit digital, key in pound sign then finish " subsequently as the initialization key.After keying in the key combination of initialization key data on the ordinary telephone set support 15, these data are accepted by digital signal processor 108.When importing 12 of key less thaies and keying in pound sign, digital signal processor 108 will automatic zero padding become 12 on the rearmost position of key data.
Subsequently, to use the chaos pseudo random sequence secret algorithm, send to the other side mutually after the initialization key data encryption separately to secret telephony both sides input, both sides receive the initialization key data that the other side sends, the identity data that digital signal processor 108 separately reads oneself is provided with the identity data value in 19, and it is decrypted the initialization key data that receives as key, both sides obtain the other side and send the initialization key of secure voice data, so that can be decrypted to the other side's speech scrambling data that receive subsequently.After finishing the exchange of mutual authentication and initialization key data, in secure voice communication subsequently, a side initialization key data will be used to one's own side's's (transmit leg) encryption key and the opposing party's (the other side) decruption key.
When carrying out secure communication, dsp chip 108 in the intercommunication device automatically with the quick CPRS chaotic secret algorithm in the program storage 106, ITU pack into program storage area in the dsp chip 108 of compress speech decompression algorithm, system management, voice suggestion file supervisor G.723.1, and begins to carry out this program in start energising back automatically.Enter the secure communication stage, both sides' telephone line modulator-demodulator (MODEM) 11 will be set up the duplex data communication channel by telephone wire.
During the communicator operate as normal, the A/D conversion chip (TLC320AD50C) 102 of communicating pair is gathered the voice signal after audio frequency input amplification and the filtering 101 respectively simultaneously, and the data flow of the signal after the collection through becoming 128kbps after the digitlization is deposited in the buffering area of dsp chip 108 through synchronous serial interface.A/D chip 102 every 30ms send an interrupt request DSP108 these data are handled.
Both sides' dsp chip 108 regularly to the speech data gathered by ITU G.723.1 voice compression compress, data after the compression need be carried out CPRS chaos encryption coding to guarantee safety of data, send the data buffer zone of telephone line modem 11 to send by serial ports control chip 109, RS232 level conversion 105 then.
The data that both sides' telephone line modem 11 is accepted also send dsp chip 108 to carry out the CPRS chaos decode by RS232 level conversion 105, serial ports control chip 109 after error correction and data decompression is handled.Data behind the decompress(ion) are delivered to D/A conversion chip 102 simultaneously, restore the other side's sound after digital-to-analogue conversion and amplification of audio frequency output work and filtering 103, thereby realize speech secure communication.
3, main performance of Shi Xianing and technical indicator
In this application example, the acquisition rate of voice is 8KHz, 16 quantifications, employing high speed TMS320VC5409_100DSP device and ITU G723.1 agreement are handled in real time voice and are compressed, data bit rate after the compression is 5.3/6.3Kbps, the speech bandwidth that can transmit reaches 100-3400Hz, and transmission delay is not more than 32ms.These technical merits and index all are not less than the requirement of ordinary numbers communication equipment.
4, application prospect
This chaotic secret phone can be widely used in the place of various need to be keep secret communications, prevents autotelic eavesdropping, ensures information security, and is suitable for having as government offices, enterprises and institutions, commercial department etc. the entity and individual of data communication, secure communication needs.The data confidentiality phone that does not also have specialty in the market; and along with the development of information technology; state secret, trade secret even individual privacy just constantly are subjected to increasing illegal infringement; entity and individual press for a kind of means of communication that can protect own interests; therefore, the present invention has good application and market prospects.

Claims (8)

1.混沌保密电话的设置方法,其特征是电话线路的进线端连接调制解调器(MODEM)(11),在线直流电源(17)、在线电阻(20)通过线路切换开关B端(13)与双音多频接收与解调电路(18)、普通电话机机座(15)连接,维持普通电话机机座(15)的供电,外部电话线路通过电话线路调制解调器(MODEM)(11)与数据流混沌编解码模块化电路(10)内部的RS232电平转换电路(105)连接,普通电话机话柄(16)经话柄输入切换开关(14)B端与数据流混沌编解码模块化电路(10)内部的音频输入放大与滤波电路(101)、音频输出功放与滤波电路(103)连接;这时该混沌保密电话机工作于保密通话模式,外部线路上双工传输的是混沌加密语音数据流信号;正常与保密通话两种模式的转换通过按动普通电话上的特定按键组合来实现;正常通话模式下,电话线路调制解调器(MODEM)(11)、双音多频接收与解调电路(18)与数据流混沌编解码模块化电路(10)对外部线路上传输的信号和普通电话机机座(15)的按键动作进行实时监控;设有自动进入保密通信的按键操作流程,摘机情况下在普通电话机机座(15)上键入一个特定的进入保密通信的按键组合后,双音多频接收与解调电路(18)将按键的双音多频信号解调成相应的键值数据送入数据流混沌编解码模块化电路(10)中的逻辑与时序控制电路(107),再送数据流混沌编解码模块化电路(10)中的数字信号处理器(108),处理后形成保密通信的控制命令,控制命令一路送逻辑与时序控制电路(107),控制线路切换开关(13)与话柄输入切换开关(14)切换到保密通信状态B,使得呼叫方挂机;同时控制命令另一路经数据流混沌编解码模块化电路(10)中的串口控制电路(109)、RS232电平转换电路(105)送入电话线路调制解调器(MODEM)(11),使其开始向保密通信中的另一方拨号呼叫并建立数据通信信道,这时该混沌保密电话机进入保密通话模式;保密通信另一方的混沌保密电话在接收到对方传来的特定按键组合所对应的双音多频信号后,与呼叫方上述动作对应进行相应的开关切换动作,使其进入保密通话模式,其电话线路调制解调器(MODEM)(11)响应对方的呼叫并进入通信的握手流程。1. the setting method of chaos confidential telephone, it is characterized in that the incoming line end of telephone line connects modem (MODEM) (11), and on-line DC power supply (17), on-line resistance (20) are connected to double by line switching switch B terminal (13) Audio multi-frequency receiving and demodulation circuit (18), common telephone base (15) are connected, maintain the power supply of common telephone base (15), and external telephone line is connected with data flow through telephone line modem (MODEM) (11) The internal RS232 level conversion circuit (105) of the chaotic coding and decoding modular circuit (10) is connected, and the handle (16) of the ordinary telephone is input to the switching switch (14) B terminal and the data stream chaotic coding and decoding modular circuit (10) Internal audio input amplification and filter circuit (101), audio output power amplifier and filter circuit (103) are connected; at this moment, the chaotic security phone works in the confidential call mode, and the duplex transmission on the external line is the chaotic encrypted voice data stream signal The conversion of two modes of normal and confidential conversation is realized by pressing the specific button combination on the ordinary telephone; The chaotic encoding and decoding modular circuit (10) of the data stream carries out real-time monitoring on the signal transmitted on the external line and the button action of the ordinary telephone base (15); After keying in a specific button combination for entering secure communication on the ordinary telephone base (15), the DTMF receiving and demodulating circuit (18) demodulates the DTMF signal of the button into corresponding key-value data Send the data stream to the logic and timing control circuit (107) in the chaotic codec modular circuit (10), and then send the data stream to the digital signal processor (108) in the chaotic codec modular circuit (10), and form a secret code after processing. Communication control command, the control command is sent to the logic and timing control circuit (107) one way, and the control line switch (13) and the handset input switch (14) are switched to the confidential communication state B, so that the calling party hangs up; Send into the telephone line modem (MODEM) (11) through the serial port control circuit (109) and the RS232 level conversion circuit (105) in the data flow chaotic codec modular circuit (10), so that it starts to send to another party in the secure communication. One party dials a number and establishes a data communication channel. At this time, the chaos security phone enters the security call mode; the chaos security phone of the other party in the security communication receives the dual-tone multi-frequency signal corresponding to the specific key combination from the other party. The caller's above-mentioned actions correspond to the corresponding switching actions to make it enter the confidential call mode, and its telephone line modem (MODEM) (11) responds to the call of the other party and enters the handshake process of communication. 2.按权利要求1所述的混沌保密电话的设置方法,其特征是设有自动退出保密通信的流程,通话双方的任一方在普通电话机机座(15)上键入一个特定的退出保密通信的按键组合后,双音多频接收与解调电路(18)将按键的双音多频信号解调成相应的键值数据送入数据流混沌编解码模块化电路(10)中的逻辑与时序控制电路(107),再送数字信号处理器(108),处理后形成退出保密通信进入正常通信的控制命令;控制命令一路送逻辑与时序控制电路(107),并通过逻辑与时序控制电路(107)控制线路切换开关(13)与话柄输入切换开关(14)切换到状态A,使普通电话机机座(15)恢复在线;另一路控制命令经串口控制电路(109)、RS232电平转换电路(105)送入电话线路调制解调器(MODEM)(11),使其结束当前工作状态并挂线。这时该混沌保密电话机恢复到正常的通话模式。2. by the setting method of the described chaos security phone of claim 1, it is characterized in that being provided with the flow process of withdrawing from security communication automatically, any party of both talking parties key in a specific exit security communication on the ordinary telephone base (15) After the combination of keys, DTMF receiving and demodulation circuit (18) demodulates the DTMF signal of the button into corresponding key-value data and sends it to the logic AND in the data stream chaos encoding and decoding modular circuit (10). Sequence control circuit (107), sends digital signal processor (108) again, after processing, forms the control command that withdraws from secure communication and enters normal communication; 107) Control the line switching switch (13) and the handle input switching switch (14) to switch to state A, so that the ordinary telephone base (15) is back online; the other control command is converted through the serial port control circuit (109) and RS232 level Circuit (105) is sent into telephone line modem (MODEM) (11), makes it end current working state and hangs up. At this time, the chaos security phone returns to the normal conversation mode. 3.按权利要求1所述的混沌保密电话的设置方法,其特征是设有通话双方身份信息的认证流程,在进入保密通信模式后的第一步将进行通话双方身份信息的认证:在进入保密通信模式后,双方的显示与通信口控制电路(MCU)(12)中的液晶显示屏显示出要求输入对方身份信息的提示,同时在普通电话机话柄(16)的听筒中播放出“请输入对方12位身份数据,键入井号后结束”的提示语;在普通电话机机座(15)上键入对方若干位身份数据的按键组合后,双音多频接收与解调电路(18)将按键的双音多频信号解调成相应的键值数据送入数据流混沌编解码模块化电路(10)中的逻辑与时序控制电路(107),再送数字信号处理器(108),将该数据作为认证时混沌系统的密钥,进而被处理成快速混沌伪随机序列保密算法中的各项参数值;保密通话双方在认证时,各自将一组约定的数据作为标志,运用混沌伪随机序列保密算法加密后互相发送若干组到对方,双方收到对方发送的数据后,各自的数字信号处理器(108)读取自己的身份数据设置模块(19)中的身份数据值,并将其作为解密密钥对接收到的若干组数据进行解密,若解密后的若干组数据均相同,且与约定的数据无误,则双方身份信息的认证通过,可进行下一步的操作;即下一步操作将获得对方发送保密语音数据的初始发送密钥,以便使双方能对随后接收到的对方加密通话数据进行解密;若有一方解密后的若干组数据不相同,或与约定的数据有误,则混沌保密电话机的显示与通信口控制电路(MCU)(12)中的液晶显示屏显示出认证错误的信息,同时在普通电话机话柄(16)的听筒中播放出“对方身份信息有误,认证未通过”的提示语;混沌保密电话机要求重新认证或退出保密通信。3. by the setting method of the described chaotic confidential telephone of claim 1, it is characterized in that the authentication process that is provided with the identity information of both parties of the conversation, the first step after entering the confidential communication mode will carry out the authentication of the identity information of the two parties of the conversation: after entering After the secure communication mode, the liquid crystal display screen in the display and communication port control circuit (MCU) (12) of both sides shows the prompting that requires to input the other party's identity information, and simultaneously plays "please Input the other party's 12-digit identity data, type in the prompt words after the pound sign; after keying in the key combinations of the other party's several digits of identity data on the ordinary telephone base (15), the dual-tone multi-frequency receiving and demodulation circuit (18) The dual-tone multi-frequency signal demodulation of button is sent into corresponding key-value data and is sent to the logic and timing control circuit (107) in the data stream chaos codec modular circuit (10), sends digital signal processor (108) again, will This data is used as the key of the chaotic system during authentication, and then processed into various parameter values in the fast chaotic pseudo-random sequence security algorithm; when the two parties in the confidential call are authenticated, they each use a set of agreed data as signs, and use chaotic pseudo-random After the serial security algorithm is encrypted, several groups are sent to the other side. After the two parties receive the data sent by the other side, their respective digital signal processors (108) read the identity data value in their own identity data setting module (19) and convert it to the other side. As the decryption key, several sets of received data are decrypted. If the decrypted sets of data are the same and are correct with the agreed data, the authentication of the identity information of both parties is passed, and the next step can be performed; that is, the next step The initial sending key for the confidential voice data sent by the other party will be obtained, so that both parties can decrypt the encrypted call data received by the other party; The liquid crystal display screen in the display and communication port control circuit (MCU) (12) of the chaos security telephone shows the information of authentication error, and simultaneously plays "the other party's identity information is wrong, "Authentication failed" prompt; the chaotic confidential phone requires re-authentication or withdrawal from the confidential communication. 4.按权利要求3所述的混沌保密电话的设置方法,其特征是在完成保密通信模式下的认证后,随后混沌保密电话机显示提示信息和播放出“请输入12位数字作为初始发送密钥,键入井号后结束”的提示语,在普通电话机机座(15)上键入初始发送密钥数据的按键组合后,该数据被数字信号处理器(108)接收;当输入初始发送密钥不足12位并键入井号时,数字信号处理器(108)将在初始发送密钥数据的最后位置上自动补零成12位。4. by the setting method of the described chaos security phone of claim 3, it is characterized in that after completing the authentication under the security communication mode, then the chaos security phone displays prompt information and plays "please input 12 digits as the initial transmission password" key, end after keying in the pound sign", after typing the key combination of the initial sending key data on the ordinary telephone base (15), the data is received by the digital signal processor (108); when inputting the initial sending key When the key is less than 12 digits and the pound sign is typed in, the digital signal processor (108) will automatically fill in 12 digits at the last position of the initially sent key data. 5.按权利要求3所述的混沌保密电话的设置方法,其特征是在完成双方认证和初始发送密钥数据交换后,在随后的保密语音通信中,一方的初始发送密钥数据将被用于发送方的加密密钥和对方的解密密钥。5. by the setting method of the described chaos security phone of claim 3, it is characterized in that after completing both authentication and the initial transmission key data exchange, in the subsequent secure voice communication, the initial transmission key data of one side will be used The encryption key of the sender and the decryption key of the other party. 6.按权利要求3所述的混沌保密电话的设置方法,其特征是其身份数据设置模块(19)设置的值具有唯一性,用来判别使用者的身份。6. by the setting method of the described chaos security phone of claim 3, it is characterized in that the value that its identity data setting module (19) sets has uniqueness, is used for distinguishing the identity of user. 7.一种混沌保密电话装置,其特征是电路中包括一种数据流混沌编解码模块化电路(10)、电话线路调制解调器(MODEM)(11)、显示与通信口控制电路(MCU)(12)、线路切换开关(13)、话柄输入切换开关(14)、普通电话机机座(15)、普通电话机话柄(16)、在线直流电源(17)、在线电阻(20)、双音多频接收与解调电路(18)、身份数据设置模块(19);数据流混沌编解码模块化电路(10),包括数字信号处理器(DSP)(108)、程序存贮器(106)、逻辑与时序控制电路(107)、音频输入放大与滤波电路(101)、输入模拟信号的A/D和输出模拟信号的D/A转换电路(102)、音频输出功放与滤波电路(103)、RS232电平转换电路(105)、串口控制芯片(109)构成,程序存贮器(106)、逻辑与时序控制电路(107)是数字信号处理器(DSP)(108)的外围连接电路,音频输入放大与滤波电路(101)连接A/D转换电路(102),并与数字信号处理器(DSP)(108)通过同步串口(MCBSP)实现无缝连接;数字信号处理器(DSP)(108)通过同步串口(MCBSP)与输出模拟信号的D/A转换电路(102)、音频输出功放与滤波电路(103)实现无缝连接;RS232电平转换电路(105)通过串口控制芯片(109)与数字信号处理器(DSP)(108)连接,实现串行输入/输出数据流与数字信号处理器(DSP)(108)的直接通信;数据流混沌编解码模块化电路(10)中的数字信号处理器(DSP)(108)连接显示与通信口控制电路(MCU)(12),数据流混沌编解码模块化电路(10)中的串口(RS232)连接电话线路调制解调器(MODEM)(11)并通过串口控制芯片(109)与数字信号处理器(DSP)(108)连接,身份数据设置模块(19)连接逻辑与时序控制电路(107),数据流混沌编解码模块化电路(10)中音频输入放大与滤波电路(101)的输入端和音频输出功放与滤波电路(103)的输出端连接话柄输入切换开关(14)的B端,输入切换开关(14)B端与数据流混沌编解码模块化电路(10)内部的音频输入放大与滤波电路(101)、音频输出功放与滤波电路(103)连接,这时该混沌保密电话机工作于保密通话模式,外部线路上双工传输的是混沌加密语音数据流信号;普通电话机机座(15)的线路输入/出端口连接话柄输入切换开关(14)的A端,而普通电话机话柄(16)与话柄输入切换开关(14)的公共端连接;装置结构由普通电话机(15)、(16)和由数据流混沌编解码模块化电路(10)、电话线路调制解调器(MODEM)(11)、显示与通信口控制电路(MCU)(12)、线路切换开关(13)、话柄输入切换开关(14)、在线直流电源(17)、在线电阻(20)、双音多频接收与解调电路(18)、身份数据设置模块(19)组成的一体化底座构成,两部分连接后即成为混沌保密电话机,线路切换开关(13)、话柄输入切换开关(14)采用双刀双掷的继电器或双刀双掷的模拟开关。7. A kind of chaos secure telephone device, it is characterized in that comprising a kind of data stream chaos codec modular circuit (10), telephone line modem (MODEM) (11), display and communication port control circuit (MCU) (12) in the circuit ), line switch (13), handle input switch (14), ordinary telephone base (15), ordinary telephone handle (16), online DC power supply (17), online resistance (20), dual-tone multi- Frequency receiving and demodulation circuit (18), identity data setting module (19); Data flow chaotic coding and decoding modular circuit (10), including digital signal processor (DSP) (108), program memory (106), Logic and timing control circuit (107), audio input amplifier and filter circuit (101), A/D input analog signal and D/A conversion circuit (102) output analog signal, audio output power amplifier and filter circuit (103), RS232 level conversion circuit (105), serial port control chip (109) constitute, program memory (106), logic and timing control circuit (107) are the peripheral connection circuit of digital signal processor (DSP) (108), audio frequency The input amplification and filtering circuit (101) is connected with the A/D conversion circuit (102), and realizes seamless connection with the digital signal processor (DSP) (108) through a synchronous serial port (MCBSP); the digital signal processor (DSP) (108) ) through a synchronous serial port (MCBSP) and a D/A conversion circuit (102) that outputs analog signals, an audio output power amplifier and a filter circuit (103) to realize seamless connection; the RS232 level conversion circuit (105) controls the chip (109) through the serial port Connect with digital signal processor (DSP) (108), realize the direct communication of serial input/output data stream and digital signal processor (DSP) (108); The number in data stream chaotic codec modular circuit (10) The signal processor (DSP) (108) is connected to the display and communication port control circuit (MCU) (12), and the serial port (RS232) in the data flow chaotic codec modular circuit (10) is connected to the telephone line modem (MODEM) (11) And connect with digital signal processor (DSP) (108) through serial port control chip (109), identity data setting module (19) connects logic and timing control circuit (107), in the data flow chaotic codec modular circuit (10) The input end of the audio input amplification and filter circuit (101) and the output end of the audio output power amplifier and filter circuit (103) are connected to the B end of the handle input switch (14), and the B end of the input switch (14) is connected to the chaotic coder of the data stream. The audio input amplifier inside the decoding modular circuit (10) is connected with the filter circuit (101), and the audio output power amplifier is connected with the filter circuit (103). It is a chaotic encrypted voice data stream signal; the line input/output port of the ordinary telephone base (15) is connected to the A end of the handle input switch (14), and the handle (16) of the ordinary telephone is connected to the handle input switch (14) The common terminal connection; device structure is made up of ordinary telephone set (15), (16) and by data flow chaotic codec modular circuit (10), telephone line modem (MODEM) (11), display and communication port control circuit (MCU ) (12), line switching switch (13), handle input switching switch (14), online DC power supply (17), online resistance (20), dual-tone multi-frequency receiving and demodulation circuit (18), identity data setting module (19) is composed of an integrated base, and after the two parts are connected, it becomes a chaotic confidential telephone, and the line changeover switch (13), the handle input changeover switch (14) adopts a double-pole double-throw relay or a double-pole double-throw analog switch . 8.按权利要求7所述的混沌保密电话装置,其特征是信息输入采用双音多频接收与解调电路(18),解调普通电话机机座(15)上键盘键下后在普通电话机机座(15)外线输出端上出现的双音多频信号,获取其相应键值。8, by the described chaos security telephone device of claim 7, it is characterized in that information input adopts dual-tone multi-frequency receiving and demodulation circuit (18), demodulates common telephone base (15) after the keyboard key is pressed down in common Obtain its corresponding key value for the DTMF signal that appears on the outside line output terminal of the telephone base (15).
CNB2004100145346A 2004-04-02 2004-04-02 Setting method and device of chaotic security phone Expired - Fee Related CN100372349C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2004100145346A CN100372349C (en) 2004-04-02 2004-04-02 Setting method and device of chaotic security phone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2004100145346A CN100372349C (en) 2004-04-02 2004-04-02 Setting method and device of chaotic security phone

Publications (2)

Publication Number Publication Date
CN1564564A CN1564564A (en) 2005-01-12
CN100372349C true CN100372349C (en) 2008-02-27

Family

ID=34478423

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2004100145346A Expired - Fee Related CN100372349C (en) 2004-04-02 2004-04-02 Setting method and device of chaotic security phone

Country Status (1)

Country Link
CN (1) CN100372349C (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8571188B2 (en) * 2006-12-15 2013-10-29 Qualcomm Incorporated Method and device for secure phone banking
TW201342873A (en) * 2012-04-11 2013-10-16 Blucrypt Technologies Inc Speech scrambling method, encryption/decryption method and scrambling equipment
CN103024733B (en) * 2012-11-28 2018-06-01 沈阳工业大学 Mobile phone secret signalling based on chaos faults-tolerant control
CN104052855B (en) * 2013-03-11 2016-06-01 联想(北京)有限公司 A kind of method and electronics that button sound is set
CN104125561A (en) * 2014-07-07 2014-10-29 东北大学 Switching type wireless voice secret communication device and method based on Lorenz chaotic circuit
CN105915329A (en) * 2016-02-29 2016-08-31 南京理工大学 Digital-analog hybrid chaotic circuit including logic device, and operation method thereof
CN111654370B (en) * 2020-06-04 2022-08-23 青岛通产智能科技股份有限公司 Chip-based audio hardware encryption and decryption method and device
CN112671981B (en) * 2020-12-17 2022-11-25 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) A method and device for anti-monitoring of telephone sets

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0276358A (en) * 1988-09-13 1990-03-15 Kokusai Electric Co Ltd Telephone set
JPH0481039A (en) * 1990-07-20 1992-03-13 Nippon Telegr & Teleph Corp <Ntt> Voice ciphering device
CN1289194A (en) * 2000-08-09 2001-03-28 王正峰 Secret communicator using danamic cipher

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0276358A (en) * 1988-09-13 1990-03-15 Kokusai Electric Co Ltd Telephone set
JPH0481039A (en) * 1990-07-20 1992-03-13 Nippon Telegr & Teleph Corp <Ntt> Voice ciphering device
CN1289194A (en) * 2000-08-09 2001-03-28 王正峰 Secret communicator using danamic cipher

Also Published As

Publication number Publication date
CN1564564A (en) 2005-01-12

Similar Documents

Publication Publication Date Title
JPH01503507A (en) Gateway system and method for interconnecting telephone calls with a digital voice protected wireless network
CN106790281A (en) A kind of end-to-end voice encryption device and encryption method towards intercom system
CN106935242A (en) A kind of voice communication encryption system and method
US5696880A (en) Communication system user authentication method
CN101026636A (en) Dual-channel communication terminal and its system, communication method using said terminal and long distance control method
CN100372349C (en) Setting method and device of chaotic security phone
CN104954951B (en) A kind of bluetooth earphone and its speech ciphering method with voice encryption function
CN210693957U (en) Quantum encryption device of PSTN telephone
CN104581711A (en) Mobile terminal with communication encryption function as well as communication encryption method thereof
CN102035925A (en) Novel secure telephone and secure communication method thereof
CN101902734B (en) End-to-end self-synchronization voice encryption transmission implementation method for digital trunking communication system
CN202121659U (en) PSTN wired secret telephone device based on coding waveform encrypted transmission
CN2138862Y (en) Enciphered telephone
CN101729641B (en) Machine card separated acoustic code encryption telephone set system
Bagwe et al. Voice encryption and decryption in telecommunication
CN210380958U (en) Telephone set with conversation encryption function
KR20020057884A (en) Construction of telephone encryptor by the encryption key exchange
CN2794067Y (en) Enciphering device of key signal in phonetic telecommunication tool
CN202003675U (en) Independent end-to-end special voice treatment communication device
CN100388728C (en) Apparatus and method for implementing end-to-end encrypted communication between line telephone and GSM handset
CN102065169A (en) Method and device for encrypting telephone
CN201191874Y (en) Data ciphering and deciphering communication terminal
CN100352302C (en) Mobile terminal having double call functions of public call and privacy call
CN105262583A (en) Quantum data terminal networking system and multi-party session implementation method based on PSTN (Public Switched Telephone Network) public network
KR20020026992A (en) Non-interference and secure phone system said controlling methods

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20080227

Termination date: 20110402