-
公开(公告)号:JP2002044716A
公开(公告)日:2002-02-08
申请号:JP2001153735
申请日:2001-05-23
Applicant: LUCENT TECHNOLOGIES INC
Inventor: BENEDICT RUSSELL BERNARD , MATUSEVICH ALEX , PEKRUL WINSTON EDWARD , TOBIAS JONATHAN M , TSAMUTALIS CHRIS CONSTANTINE
Abstract: PROBLEM TO BE SOLVED: To provide a method of dynamic decision for interference and the ratio of carrier to interference waves in a wireless system of time division multiple access. SOLUTION: In the method of dynamic decision for interference and the ratio of carrier to interference waves, the interferences are measured during an active TDMA time slot. In an embodiment, while a mobile station is transmitting in a discontinued transmission mode, a base station decides the level of the interference at the active time slot by using a power level measurement processed in a DTX OFF period. In another embodiment, the base station instructs to the mobile station to stop transmission between SACCH parts of the time slot, and decides measured value of the interference level 1 by using the power level measurement processed for non-active SACCH field. Furthermore in another embodiment, the interference level 1 is decided by using the power level measurement processed for a guard and a ramp field.
-
公开(公告)号:JP2000031941A
公开(公告)日:2000-01-28
申请号:JP16759799
申请日:1999-06-15
Applicant: LUCENT TECHNOLOGIES INC
Inventor: BERENZWEIG ADAM L , FALCO STEVEN ANTHONY , MIZIKOVSKY SEMYON B , PEKRUL WINSTON EDWARD , RANCE ROBERT JOHN , YOUTKUS DONALD JOSEPH
IPC: G10L19/00 , H04K1/00 , H04L9/06 , H04L9/12 , H04L9/20 , H04L9/26 , H04Q7/38 , H04K1/02 , G09C1/00
Abstract: PROBLEM TO BE SOLVED: To obtain a voice processor architecture which does not have to use an external cipher synchronous input, has minimum voice deterioration and also accomplishes improved confidentiality by including a block eneryptor (enciphering device) and a key (key) stream generator in a transmitter side and enciphering a voice bit that is encoded by it. SOLUTION: A class 1A bit (1st block) is supplied as an input to a block encryptor (enciphering device) 34 from a voice coder (encoder) 32 included in a transmitter 30, a class 1B bit (2nd block) is supplied as an input to an XOR operator 38 and a class 2B bit (3rd block) is supplied as an input to an XOR operator 40. The encryptor (enciphering device) 34 enciphers (encrypts) a plaintext of a block into a cipher text by using an inversely transformable encryption algorithm having a key (key) related to an intended receiver.
-
公开(公告)号:DE69916931D1
公开(公告)日:2004-06-09
申请号:DE69916931
申请日:1999-06-08
Applicant: LUCENT TECHNOLOGIES INC
Inventor: BERENZWEIG ADAM L , FALCO STEVEN ANTHONY , MIZIKOVSKY SEMYON B , PEKRUL WINSTON EDWARD , RANCE ROBERT JOHN , YOUTKUS DONALD JOSEPH
Abstract: The present invention is an encrypting speech processor architecture that provides enhanced security without the use of external cryptosync and with minimal speech degradation. This is accomplished by incorporating a block encryptor (34) and a keystream generator (36) (instead of a fixed secret mask encryption scheme, such as those implemented in voice ciphers) for encrypting blocks of encoded speech bits at a transmitter side. The block encryptor (34) employs an invertible cryptographic algorithm and internal cryptosync to convert a first block of encoded speech bits into a first ciphertext block (output 34). The first ciphertext block (output 34) is used to generate a keystream (output 36), which is then used to encrypt a second ciphertext block.
-
公开(公告)号:DE69916931T2
公开(公告)日:2005-04-28
申请号:DE69916931
申请日:1999-06-08
Applicant: LUCENT TECHNOLOGIES INC
Inventor: BERENZWEIG ADAM L , FALCO STEVEN ANTHONY , MIZIKOVSKY SEMYON B , PEKRUL WINSTON EDWARD , RANCE ROBERT JOHN , YOUTKUS DONALD JOSEPH
Abstract: The present invention is an encrypting speech processor architecture that provides enhanced security without the use of external cryptosync and with minimal speech degradation. This is accomplished by incorporating a block encryptor (34) and a keystream generator (36) (instead of a fixed secret mask encryption scheme, such as those implemented in voice ciphers) for encrypting blocks of encoded speech bits at a transmitter side. The block encryptor (34) employs an invertible cryptographic algorithm and internal cryptosync to convert a first block of encoded speech bits into a first ciphertext block (output 34). The first ciphertext block (output 34) is used to generate a keystream (output 36), which is then used to encrypt a second ciphertext block.
-
公开(公告)号:CA2270081C
公开(公告)日:2002-12-17
申请号:CA2270081
申请日:1999-04-22
Applicant: LUCENT TECHNOLOGIES INC
Inventor: YOUTKUS DONALD JOSEPH , RANCE ROBERT JOHN , MIZIKOVSKY SEMYON B , PEKRUL WINSTON EDWARD , BERENZWEIG ADAM L , FALCO STEVEN ANTHONY
IPC: G10L19/00 , H04K1/00 , H04L9/06 , H04L9/12 , H04L9/20 , H04L9/26 , H04Q7/38 , H04L9/18 , G10L3/00 , H04L1/00
Abstract: The present invention is an encrypting speech processor architecture th at provides enhanced security without the use of external cryptosync and with minimal speech degradation. This is accomplished by incorporating a black encryptor (34) an d a keystream generator (36) (instead of a fixed secret mask encryption scheme, such as those implemented in voice ciphers) for encrypting blocks of encoded speech bits at a transmitter side. The block encryptor (34) employs an invertible cryptographic algorithm and internal cryptosync to convert a first block of encoded speech bits into a first ciphertext block (output 34) . The first ciphertext block (output 34) is used to generate a keystream (output 36), which is then used to encrypt a second ciphertext block (FIG. 2).
-
公开(公告)号:BR9914229A
公开(公告)日:2001-07-31
申请号:BR9914229
申请日:1999-06-09
Applicant: LUCENT TECHNOLOGIES INC
Inventor: BERENZWEIG ADAM L , MIZIKOVSKY SEMYON B , RANCE ROBERT JOHN , FALCO STEVEN ANTHONY , PEKRUL WINSTON EDWARD , YOUTKUS DONALD JOSEPH
Abstract: The present invention is an encrypting speech processor architecture that provides enhanced security without the use of external cryptosync and with minimal speech degradation. This is accomplished by incorporating a block encryptor (34) and a keystream generator (36) (instead of a fixed secret mask encryption scheme, such as those implemented in voice ciphers) for encrypting blocks of encoded speech bits at a transmitter side. The block encryptor (34) employs an invertible cryptographic algorithm and internal cryptosync to convert a first block of encoded speech bits into a first ciphertext block (output 34). The first ciphertext block (output 34) is used to generate a keystream (output 36), which is then used to encrypt a second ciphertext block.
-
公开(公告)号:CA2270081A1
公开(公告)日:1999-12-15
申请号:CA2270081
申请日:1999-04-22
Applicant: LUCENT TECHNOLOGIES INC
Inventor: YOUTKUS DONALD JOSEPH , FALCO STEVEN ANTHONY , MIZIKOVSKY SEMYON B , PEKRUL WINSTON EDWARD , RANCE ROBERT JOHN , BERENZWEIG ADAM L
IPC: G10L19/00 , H04K1/00 , H04L9/06 , H04L9/12 , H04L9/20 , H04L9/26 , H04Q7/38 , H04L9/18 , G10L3/00 , H04L1/00
Abstract: The present invention is an encrypting speech processor architecture that provides enhanced security without the use of external cryptosync and with minimal speech degradation. This is accomplished by incorporating a black encryptor (34) and a keystream generator (36) (instead of a fixed secret mask encryption scheme, such as those implemented in voice ciphers) for encrypting blocks of encoded speech bits at a transmitter side. The block encryptor (34) employs an invertible cryptographic algorithm and internal cryptosync to convert a first block of encoded speech bits into a first ciphertext block (output 34). The first ciphertext block (output 34) is used to generate a keystream (output 36), which is then used to encrypt a second ciphertext block (FIG. 2).
-
-
-
-
-
-