Embodiment
Please refer to Fig. 1, Fig. 1 is the schematic diagram of avoice communication system 10 of the embodiment of the present invention.Voice communication system 10 includes acommunication network 100 and communicator UE_1~UE_n.Invoice communication system 10, arbitrary communicator can establish a communications link with another communicator.Wherein, after a communicator UE_x and a communicator UE_y established a communications link, both can at a specific time period that does not exchange voice signal (in as connection setup first second, speech pause, the of short duration period such as quiet), start the exchange numerical data.Its function mode can be summarized as an informationexchange flow process 20, as Fig. 2.Informationexchange flow process 20 comprises following steps:
Step 200: beginning.
Step 202: communicator UE_x and communicator UE_y establish a communications link.
Step 204: at a specific time period that does not exchange voice signal, communicator UE_x and communicator UE_y exchange numerical data are to reach a specific function.
Step 206: finish.
In simple terms, after communicator UE_x and communicator UE_y established a communications link, both can utilize the period that does not exchange voice signal, the exchange numerical data, and then reach a default feature, as functions such as telephone expenses calculating, authentication, exchanges data.For instance, please refer to Fig. 3, Fig. 3 is the schematic diagram of a telephone expenses computing function of the embodiment of the present invention.After communicator UE_x and communicator UE_y establish a communications link, both utilizations do not exchange voice signal period (as in connection setup first second, speech pause, the of short duration period such as quiet), transmit a telephone expenses computing function control code to communicator UE_y by communicator UE_x, start telephone expenses computing functions (step a1).Then, communicator UE_y passback one area identity is to communicator UE_x (step a2), wherein area identity preferably comprises mobile phone country code (the Mobile Country Code of phone, MCC), mobile telephone network code (Mobile Network Code, MNC), check code and telephone expenses computing function control code etc.When communicator UE_x receives mobile phone country code and mobile telephone network code, and the calculating inspection code can transmit a confirmation code (Acknowledgement after errorless, ACK) to communicator UE_y (step a3), complete the exchange work of telephone expenses data, and recover conversation.Simultaneously, communicator UE_x can be according to the telecommunications dealer of each family conversation rate (as interior in netting, the rates such as net is outer, local telephone network, overseas call, note), the telephone expenses data are presented on its display screen, determine or automatically determine whether continue conversation according to predefined conversation rule (rules such as auto-hang up as too high in rate, air time) by the user.
Therefore, utilize the telephone expenses computing function, the user does not need the inquiry by telecommunication operator, can accurately and calculate in real time conversation rate, avoid telecommunication operator to overflow and receive cost of the phone call, and solve the user dials international roaming or specifies switching in unwitting situation conversation, effectively improve practicality and the convenience of conversation.
Please continue with reference to figure 4, Fig. 4 is the schematic diagram of an identity authentication function of the embodiment of the present invention.At first, communicator UE_x one group of exclusive key of acquiescence (Key) is worth and is shared with communicator UE_y, and communicator UE_y is stored to phone with telephone number and the key value of communicator UE_x.Then, after communicator UE_x and communicator UE_y establish a communications link, suppose that communicator UE_x wish requires the other side to do authentication, both utilizations do not exchange voice signal period (as in connection setup first second, speech pause, the of short duration period such as quiet), be worth to communicator UE_y by communicator UE_x transmission identity authentication function control code and random number seed (Seed), start identity authentication function (step b1).After communicator UE_y receives identity authentication function control code and random number seed value, after the key value that stores in advance and random number seed value are done the encryption and decryption computing, carry out hash algorithm MD5 (Message-Digest Algorithm 5 (Message-Digest Algorithm 5)) and obtain a recogniting seal value, recogniting seal value and check code composition one authentication identification code are sent to communicator UE_x (step b2).At this moment, communicator UE_x also can do its key value and random number seed value the encryption and decryption computing and do hash algorithm MD5 generation checking stamped signature value, the errorless rear transmission confirmation code of calculating inspection code, and will verify that stamped signature value and recogniting seal value compare, with checking communicator UE_y (step b3).When recogniting seal value and checking stamped signature value are compared when conforming to, communicator UE_x judgement communicator UE_y authentication success; Otherwise, when recogniting seal value and checking stamped signature value are compared when not conforming to, communicator UE_x judgement communicator UE_y authentication failure.At last, authentication result is presented on communicator UE_x, communicator UE_x can decide whether continue conversation in its sole discretion according to predefined conversation rule or user.
Further, eavesdrop verify data for avoiding unworthy personage, above-mentioned identity authentication function also can use the encryption technologies such as disposal password (One-Time Password) or RSA Algorithm to implement, and is not limited to this.Pass through identity authentication function, because each random number seed value that produces is all different, also can be different in the authentication identification code of transport process, thereby can effectively block the fraudulent call that caller ID is distorted, can prevent that also unworthy personage from eavesdropping authenticated data, guarantee the fail safe of user's communication.
Please continue with reference to figure 5, Fig. 5 is the schematic diagram of a data exchanging function of the embodiment of the present invention.At first, communicator UE_y one group of exclusive key value of acquiescence also is shared with communicator UE_x, and communicator UE_x is stored to phone with telephone number and the key value of communicator UE_y.Then, after communicator UE_x and communicator UE_y establish a communications link, suppose that communicator UE_x wish requires the particular data (as data such as personal information, gps data, notes) of communicator UE_y, both utilizations do not exchange voice signal period (as in connection setup first second, speech pause, the of short duration period such as quiet), transmit the data exchanging function control code to communicator UE_y by communicator UE_x, log-on data function of exchange (step c1).After communicator UE_y receives the data exchanging function control code, whether transmit the desired data of communicator UE_x according to the regular decision of the conversation of acquiescence.If communicator UE_y determines to communicate back the desired data of device UE_x, can be encrypted these data, but and additional correlation information (as data function of exchange control code, data length and check code etc.) be sent to simultaneously communicator UE_x (step c2).Communicator UE_x is after receiving corresponding data, the errorless rear transmission confirmation code of calculating inspection code is to communicator UE_y (step c3), and utilize the key value that stores in advance that data are correctly deciphered, be stored in phone, to complete the running of data exchanging function.
By data exchanging function, the user not only can exempt the inconvenience of input data, and can carry out exchanges data in conversation, does not affect speech quality, saves the expense of note.In addition, the data class covering scope of exchange is wide, can be the data such as personal information, gps data, note, E-mail, and utilize key value with data encryption, prevents that data are ravesdropping.
Therefore, when communicator UE_x and communicator UE_y did not exchange voice signal, both can start the exchange numerical data, and then reach the functions such as telephone expenses calculating, authentication, exchanges data.Certainly, except aforesaid function, those skilled in the art can do suitable modification or variation according to required, reaching other functions, and are not limited to this.In addition, should be noted, the method of communicator UE_x and communicator UE_y exchange numerical data is not limited to special flow process or step, for example, can utilize dual-tone multifrequency (Dual Tone Multi-Frequency, DTMF) or the technology such as frequency shift keying (Frequency-shiftkeying, FSK) implement.Wherein, the transmission speed of dual-tone multifrequency technology was about for 12.5 key sound/seconds, and frequency shift keying is about 150 bytes (Bytes)/second.If take the slower dual-tone multifrequency technology of transmission speed as example, key sound is 0~9, A~D, *, # totally 16 kinds of keyboards, can be exchanged into 16 system characters, and namely a keyboard is 0.5 byte (4), therefore approximately can transmit the data of 6 bytes in one second.Suppose that the exchange numerical data is the telephone expenses calculated data, at first, the telephone expenses computing function control code that communicator UE_x transmits is 0.5 byte; Then, the mobile phone country code (1.5 byte), mobile telephone network code (1.5 byte), check code (1 byte) and the telephone expenses computing function control code (0.5 byte) that comprise of the area identity of communicator UE_y passback is 4.5 bytes altogether; At last, the confirmation code of communicator UE_x transmission is 0.5 byte.Therefore, the exchanges data amount during the running of telephone expenses computing function is 5.5 bytes, also can complete the telephone expenses computing function in 1 second.
On the other hand, when if the exchange numerical data is identification authentication data, the identity authentication function control code (0.5 byte) that communicator UE_x transmits and random number seed value (1 byte) be totally 1.5 bytes, and the recogniting seal value (16 byte) of communicator UE_y passback and check code (1 byte) totally 17 bytes.Approximately need the time of 3.6 seconds to transmit the identification authentication data of 18.5 bytes with the dual-tone multifrequency technology, if only need the time of 0.12 second can complete identity authentication function with shift keying technique.
Moreover, when if the exchange numerical data is the exchanges data data, the data exchanging function control code that communicator UE_x transmits is 0.5 byte, and the data exchanging function control code (0.5 byte) of communicator UE_y passback, data length (2 byte), data (take the Chinese Name encrypted as 6 bytes as example) and check code (1 byte) are altogether as 9.5 bytes.Therefore, approximately need the time of 2 seconds to complete data exchanging function with the dual-tone multifrequency technology, if only need the time of 0.06 second to complete with shift keying technique.
Should be noted, above-mentioned dual-tone multifrequency or shift keying technique only are the possible embodiment of the present invention, and other audio decoding techniques also can be applicable to the present invention, and are not limited to this.In addition, the kind of communicator is except being implemented in mobile phone, also can be implemented in general PSTN (Public Switched Telephone Network, PSTN) phone, internet voice communication protocol (Voice Over Internet Protocol, VOIP) phone etc. as long as have the phone of dual-tone multifrequency and frequency shift keying or similar techniques, can be used in the present invention, therefore can effectively reduce upgrade cost, improve the convenience that uses.
In addition, due to communicator UE_x and communicator UE_y be utilize do not exchange voice signal during, therefore the exchange numerical data can further start the mute function of communicator UE_x and communicator UE_y.Thus, communicator UE_x and communicator UE_y can be during the mute function startups, and the exchange numerical data is reached the functions such as telephone expenses calculating, authentication, exchanges data.
On the other hand, the realization about communicator UE_x or communicator UE_y please refer to Fig. 6.Fig. 6 is the schematic diagram of acommunicator 60 of the embodiment of the present invention.Communicator 60 is used for realizing communicator UE_x or UE_y, and it includes amicrophone 600,loudspeaker 602, an on line and sets upunit 604, anaudio treatment unit 606, a talkingstate judging unit 608, aninformation exchange unit 610 and a quiet unit 612.On line is set upunit 604 and is used for establishing a communications link with another communicator, after communication connection is set up, the voice signal thataudio treatment unit 606 can receivemicrophone 600 is set upunit 604 by on line and is sent to another communicator, or other communicators are sent to the voice signal that on line sets upunit 604 are play by loudspeaker 602.Talkingstate judging unit 608 can be according to the processing situation ofaudio treatment unit 606, and the judgement on line is set up the exchange of speech state ofunit 604 and another communicator, to produce a judged result Dec_RST.610 of information exchange units are set upunit 604 according to judged result Dec_RST by on line, start the exchange numerical data.In addition,quiet unit 612 can be when judged result Dec_RST shows that on line is set upunit 604 and another communicator and continued a specific time period and do not exchange voice signal, mute microphone (MIC) 600.
In simple terms, incommunicator 60, set up the communication connection ofunit 604 foundation and other communicators when on line after, talkingstate judging unit 608 can be according to the processing situation ofaudio treatment unit 606, judgement exchange of speech state, and judged result Dec_RST corresponding to generation gives information exchange unit 610.If judged result Dec_RST shows that when on line is set upunit 604 and another communicator and continued specific time period and do not exchange voice signal,information exchange unit 610 can start the exchange numerical data, simultaneouslyquiet unit 612 can mute microphone (MIC) 600.Thus, by the exchange of numerical data,communicator 60 can with other communication device switches customizing messages, to reach the functions such as telephone expenses calculating, authentication, exchanges data.
Should be noted,communicator 60 shown in Figure 6 is communicator UE_x or the UE_y that realize Fig. 1, and the designer does suitably modify or change when according to required function.For example,information exchange unit 610 can utilize the audio decoding techniques such as dual-tone multifrequency or shift keying technique to carry out the running of exchanges data.In addition,communicator 60 can comprise an authentication unit, is used for check code according to the passback of other communicators, verifies, and returns confirmation code according to this.Other function modes about functions such as telephone expenses calculating, authentication, exchanges data can with reference to above stated specification, be not repeated herein.
In known technology, the user can't judge that electric person's telephone number is in net or outside net, cause the inconvenience that telephone expenses calculate and lack real-time, and identity that can't the real-time confirmation caller, cause the injection of social fraudulent call now, derivative social concern.In this case, during the present invention did not exchange voice signal when utilizing the communicator conversation, the exchange numerical data to reach the functions such as telephone expenses calculating, authentication, exchanges data, promoted practicality and the fail safe of conversation widely.
In sum, during not exchanging voice signal after the present invention utilizes conversation to set up, the exchange numerical data is reached the functions such as telephone expenses calculating, authentication, exchanges data, improve the problem that causes under communication network leak now, and then guarantee practicality and the fail safe that the user converses.
The above is only preferred embodiment of the present invention, and all equivalent variations and modifications of doing according to the present patent application the scope of the claims are within all should belonging to the scope that the present invention contains.