WCDMA 3G VOICE COMMUNICATION PROTECTION METHOD AND TERMINAL USING THE SAME
First Claim
1. A Wideband Code Division Multiple Access 3rd Generation (WCDMA 3G) voice communication protection method, the method being performed by a terminal operating in conjunction with a Secure-Universal Subscriber Identity Module (S-USIM) for voice communication protection and configured to protect WCDMA 3G voice communication, comprising:
- when a calling terminal connects a voice communication channel to a called terminal, preparing for secure voice communication by collecting information about relevant voice communication;
at the calling terminal, setting synchronous data by exchanging the voice communication information with the called terminal, and performing a secure synchronization procedure based on the set synchronous data;
at each of S-USIMs that operate in conjunction with the calling and called terminals, generating a session key for secure voice communication based on the synchronous data; and
performing secure communication by encrypting and transmitting voice-coded data to be transmitted based on the session key, and decrypting and reproducing received voice-coded data based on the session key.
1 Assignment
0 Petitions
Accused Products
Abstract
A WCDMA 3G voice communication protection method and a terminal using the method are provided. The method is performed by a terminal operating in conjunction with an S-USIM for voice communication protection. When a calling terminal connects a voice communication channel to a called terminal, secure voice communication is prepared for by collecting information about relevant voice communication. At the calling terminal, synchronous data is set by exchanging the voice communication information with the called terminal, and a secure synchronization procedure is performed based on the set synchronous data. At each of S-USIMs that operate in conjunction with the calling and called terminals, a session key for secure voice communication is generated based on the synchronous data. Secure communication is performed by encrypting and transmitting voice-coded data to be transmitted based on the session key, and decrypting and reproducing received voice-coded data based on the session key.
-
Citations
11 Claims
-
1. A Wideband Code Division Multiple Access 3rd Generation (WCDMA 3G) voice communication protection method, the method being performed by a terminal operating in conjunction with a Secure-Universal Subscriber Identity Module (S-USIM) for voice communication protection and configured to protect WCDMA 3G voice communication, comprising:
-
when a calling terminal connects a voice communication channel to a called terminal, preparing for secure voice communication by collecting information about relevant voice communication; at the calling terminal, setting synchronous data by exchanging the voice communication information with the called terminal, and performing a secure synchronization procedure based on the set synchronous data; at each of S-USIMs that operate in conjunction with the calling and called terminals, generating a session key for secure voice communication based on the synchronous data; and performing secure communication by encrypting and transmitting voice-coded data to be transmitted based on the session key, and decrypting and reproducing received voice-coded data based on the session key. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A terminal using a Wideband Code Division Multiple Access 3rd Generation (WCDMA 3G) voice communication protection method, comprising:
-
a Radio Frequency (RF) communication unit for allowing the terminal to transmit or receive synchronous data and voice data to or from another party terminal via RF communication; an audio processing unit for converting a voice corresponding to a user of the terminal into voice-coded data or converting voice-coded data corresponding to the other party terminal into a voice; an encryption/decryption processing unit for encrypting voice-coded data to be transmitted based on a session key generated by a relevant Secure-Universal Subscriber Identity Module (S-USIM), and decrypting received voice-coded data based on the session key; and a control unit for performing a secure synchronization procedure with the other party terminal using voice communication information, and performing secure communication by transmitting encrypted data and reproducing decrypted data. - View Dependent Claims (7, 8, 9, 10, 11)
-
Specification