Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
SYSTEM FOR SECURE TRANSMISSION OF VOICE COMMUNICATION VIA COMMUNICATION NETWORK AND METHOD OF SECURE TRANSMISSION OF VOICE COMMUNICATION
Document Type and Number:
WIPO Patent Application WO/2016/204700
Kind Code:
A1
Abstract:
A system for secure transmission of voice communication via communication network comprising at least one wireless communication device (Al) of a calling participant, at least one network communication device (Bl) of the calling participant, a central control unit (C), at least one network communication device (B2) of a called participant and at least one wireless communication device (A2) of the called participant using private encryption key of the calling participant, public encryption key of the calling participant, private encryption key of the called participant, and public encryption key of the called participant which can be changed and a method of secure transmission of voice communication using this system.

Inventors:
STRÉMY MAXIMILIÁN (SK)
ELIÁŠ ANDREJ (SK)
JEDLIČKA MARTIN (SK)
Application Number:
PCT/SK2016/050007
Publication Date:
December 22, 2016
Filing Date:
June 14, 2016
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
QINTEC A S (SK)
International Classes:
H04L29/06
Foreign References:
US20100166178A12010-07-01
US20060236088A12006-10-19
Attorney, Agent or Firm:
LITVÁKOVÁ, Lenka (s. r. o.Pluhová 78, Bratislava, SK)
Download PDF:
Claims:
Claims

1. A system for secure transmission of voice communication via; communication network comprising at least one wireless communication device (Al) of a calling participant, at least one network communication device (Bl) of the calling participant, a central control unit (C), at least one network communication device (B2) of a called participant and at least one wireless communication device (A2) of the called participant, characterized in that

- the wireless communication device (Al) of the calling participant and wireless communication device (A2) of the called participant are equipped with an encryption key and/or a decryption key which is able to encrypt and/or decrypt communication;

- at least three memory registers (106, 107, 108) are in the wireless communication device (Al) of the calling participant and at least three memory registers (206, 207, 208) are in the wireless communication device (A2) of the called participant;

- the wireless communication device (Al) of the calling participant is equipped with a public encryption key of the called participant by means of which it is able to encrypt voice communication intended for the called participant;

- the wireless communication device (A2) of the called participant is equipped with a private encryption key of the called participant by means of which it is able to decrypt voice communication;

- the wireless communication device (Al) of the calling participant is connected via the communication network (S2) with the network communication device (Bl) of the calling participant;

- the wireless communication device (A2) of the called participant is connected via the communication network (S2) with the network communication device (B2) of the called participant;

- the network communication device (Bl) of the calling participant and the network communication device (B2) of the called participant are connected via a communication network (SI) with the central control unit (C);

- the network communication device (Bl) of the calling participant and the network communication device (B2) of the called participant contain a software for verifying the identity of the participant of communication when connection with the central control unit (C) via the communication network (SI) is created; - the private encryption key of the calling participant is stored in the memory register (108) of the wireless communication device (Al) of the calling participant;

- the private encryption key of the called participant is stored in the memory register (208) of the wireless communication device (A2) of the called participant;

- the public encryption key of the calling participant is stored in the memory register ( 107) of the wireless communication device (Al) of the calling participant;

- the public encryption key of the calling participant is at the same time stored in the memory register (206) of the wireless communication device (A2) of the called participant;

- the public encryption key of the called participant is stored in the memory register (207) of the wireless communication device (A2) of the called participant;

- the public encryption key of the called participant is at the same time stored in the memory register (106) of the wireless communication device (Al) of the calling participant;

- the private encryption key of the calling participant, the public encryption key of the calling participant, the private encryption key of the called participant and the public encryption key of the called participant can be changed.

2. The system for secure transmission of voice communication according to claim 1, characterized in that the wireless communication device (Al) of the calling participant comprises a central processing unit (101), a microphone (102), an ADC/DAC converter (103), a loud-speaker (104), a wireless module (105), the memory register (106) for the public encryption key of the called participant, the memory register (107) for the public encryption key of the calling participant, and the memory register (108) for the private encryption key of the calling participant; and the wireless communication device (A2) of the called participant comprises a central processing unit (201), a microphone (202), an ADC/DAC converter (203), a loud-speaker (204), a wireless module (205), the memory register (206) for the public encryption key of the calling participant, the memory register (207) for the public encryption key of the called participant, and the memory register (208) for the private encryption key of the called participant.

3. The system for secure transmission of voice communication according to claim 1 or 2, characterized in that the wireless communication device (Al) of the calling participant has its own authentication code of the calling participant, which is stored in the memory register (109) for the authentication code of the calling participant, and the wireless communication device (A2) of the called participant has its own authentication code of the called participant, which is stored in the memory register (209) for the authentication code of the called participant.

4. The system for secure transmission of voice communication according to claim 3, characterized in that the authentication code of the calling participant can be also used to block the wireless communication device (Al) of the calling participant when accessing the communication network (SI) via the network communication device (Bl) of the calling participant and the authentication code of the called participant can be also used to block the wireless communication device (A2) of the called participant when accessing the communication network (SI) via the network communication device (B2) of the called participant.

5. The system for secure transmission of voice communication according to any of claims 1 to 4, characterized in that the communication network (SI) is any internet network, which can also be wireless, and the communication network (S2) is any communication network which can also be a wireless and/or internet communication network.

6. The system for secure transmission of voice communication according to claim 5, characterized in that the communication network (SI) can be technologically different from the communication network (S2).

7. A method of secure transmission of voice communication in the system according to claims 1 to 6, characterized in that it comprises the following steps:

- authentication of the participant when accessing the communication network (SI), whether authentication data entered by the participant are identical to the authentication data stored on the central control unit (C);

- verification by the central control unit (C) whether the wireless communication device (Al) of the calling participant is connected to the network communication device (Bl) of the calling participant via the communication network (S2) and verification whether the authentication code stored on the wireless communication device (Al) of the calling participant is identical to the authentication code assigned to the login data of the user stored on the central control unit (C);

- connection of the participant to the communication network (S 1 ) if the authentication of the participant is successful, the wireless communication device (Al) of the calling participant is connected to the network communication device (Bl) of the calling participant, and the authentication codes are identical; or not connecting the participant to the communication network (SI) if the authentication of the participant is not successful, the wireless communication device (Al) of the calling participant is not connected to the network communication device (Bl) of the calling participant, or the authentication codes are not identical;

- after sending a request of the calling participant for creation of the transmission of voice communication to the called participant via the central control unit (C), verification of availability of the network communication device (B2) of the called participant in the communication network (SI) and of connection of the wireless communication device (A2) of the called participant to the network communication device (B2) of the called participant via the communication network (S2) by the central control unit (C);

- sending a request for generation of a new pair of encryption keys by the central control unit (C) via the network communication device (Bl) of the calling participant to the wireless communication device (Al) of the calling participant;

- sending a request for generation of a new pair of encryption keys by the central control unit (C) via the network communication device (B2) of the called participant to the wireless communication device (A2) of the called participant;

- after successful generation of the new pair of encryption keys and successful exchange of the public encryption keys and their saving to the wireless communication devices (Al , A2) of the calling participant and the called participant, creation of the secure connection between the network communication device (Bl) of the calling participant and the network communication device (B2) of the called participant.

8. The method of secure transmission of voice communication according to claim 7, characterized in that encrypted digital signal from the network communication device (Bl) of the calling participant is further transmitted to the network communication device (B2) of the called participant.

9. The method of secure transmission of voice communication according to claim 8, characterized in that when a connection is created between the network communication device (B2) of the called participant and the wireless communication device (A2) of the called participant via the communication network (S2), the encrypted signal is transmitted via the communication network (S2) to the wireless communication device (A2) of the called participant, where it is processed by the central control unit (C), which decrypts it by means of the private encryption key of the called participant and then the decrypted digital signal is transferred to the ADC/DAC converter (103) on the wireless communication device (A2) of the called participant where it is converted to audio signal.

10. The method of secure transmission of voice communication according to any of claims 7 to 9, characterized in that the transmission is realized in the opposite direction as well.

11. The method of secure transmission of voice communication according to any of claims 7 to 10, characterized in that the wireless communication device (Al) of the calling participant or the wireless communication device (A2) of the called participant can be blocked by means of the authentication code when accessing the communication network (SI).

Description:
SYSTEM FOR SECURE TRANSMISSION OF VOICE COMMUNICATION VIA COMMUNICATION NETWORK AND METHOD OF SECURE TRANSMISSION OF VOICE COMMUNICATION

Technical Field

The invention falls within the field of telecommunications and specifically relates to a system for secure transmission of voice communication via a communication network and method for secure transmission of voice communication.

Background of the Invention

For users of communication devices, securing the content of voice communication represents an important safety requirement. Not only the safety of transmission of the communication content itself is important, but also the safety of participants of the communication process, i.e. their clear identification.

Transmission of voice via communication devices is currently performed mostly in a manner having insufficient securing. The known methods of securing the communication include International Patent Publication no. WO/99/62222, which discloses a solution relating to encryption of telephone communication in such manner that individual participants of communication have to, at first, enter a password every time they enter a communication network, and thus they are clearly identified. The second aspect of the invention is encryption of communication which is performed by a control unit. However, the main disadvantage of this solution is that the participants of communication can communicate in encrypted manner only for a certain specified time, allotted them in advance by the central unit. Another disadvantage is that when logging into the communication network, the participant of communication enter the password that is transmitted to the central unit by the communication network, wherein during transmission of such password, it can be infiltrated by unwanted entity, and this can lead to security breach of communication content.

Another methods of secure transmission of voice communication include so-called software encryption of communication, when the content of communication is encrypted by a software operating directly in a communication device that is running on the operating system. The disadvantage of such solution is that the operating system or some application can be modified in order to make possible infiltration of the communication device and misuse of the communication content. The consequence of these disadvantages is that a potential attacker can easily disrupt such communication using specific technical means, which can lead to tracking of the content of communication and subsequent misuse of the content of communication. Another risk factor is the loss of one of the devices, which can result in that the identity of the participant of communication can be changed and such change can be used to obtain the content of communication.

Disclosure of the Invention

The above mentioned disadvantages are considerably eliminated by a system for secure transmission of voice communication via a communication network and method of secure transmission of voice communication according to this invention.

The secure transmission refers to protection of transmitted data against their misuse by unauthorized person.

The system for secure transmission of voice communication via a communication network comprises at least: a wireless communication device of a calling participant, a network communication device of the calling participant, a central control unit, a network communication device of a called participant and a wireless communication device of the called participant. The wireless communication devices of the calling participant and of the called participant are able to encrypt and/or decrypt the communication. At least three memory registers are in each wireless communication device. The wireless communication device of the calling participant is able to encrypt the voice communication by means of a public encryption key of the called participant. The wireless communication device of the called participant is able to decrypt the voice communication by means of a private encryption key of the called participant. The wireless communication device of the calling participant is connected via the communication network to the network communication device of the calling participant. The wireless communication device of the called participant is connected via the communication network to the network communication device of the called participant. The network communication devices of the calling participant and the called participant are each connected via the communication network to the central control unit. In the network communication devices is a software serving for verifying the identity of the participant of the communication network when the connection to the central control unit via the communication network is created. A private encryption key of the calling participant is stored in a memory register for the private encryption key of the calling participant in the wireless communication device of the calling participant. A public encryption key of the calling participant is stored in a memory register for the public encryption key of the calling participant in the wireless communication device of the calling participant. The public encryption key of the calling participant is also stored in a memory register for the public encryption key of the calling participant in the wireless communication device of the called participant. The private encryption key of the called participant is stored in a memory register for the private encryption key of the called participant in the wireless communication device of the called participant. The public encryption key of the called participant is stored in a memory register for the public encryption key of the called participant in the wireless communication device of the called participant. The public encryption key of the called participant is also stored in a memory register for the public encryption key of the called participant in the wireless communication device of the calling participant. During communication, encryption and decryption keys can be changed at any time at the request of the participants.

Preferably, each wireless communication device has its own authentication code that is stored in a register for the authentication code. By means of the authentication code that is unique for each wireless communication device, it is possible to identify each wireless communication device connected to the network communication device, and thereby also within the communication network. The authentication code also serves to block the specific wireless communication device when accessing the communication network in case of its loss or theft. The use authentication code increases the overall security of the system according to this invention, since it represents another type of identification of the user of the communication network.

The wireless communication devices of the calling participant and the called participant comprise a central processing unit, a microphone, an ADC/DAC converter, a loud-speaker, a wireless module, the memory register for the public encryption key of the called participant, the memory register for the public encryption key of the calling participant, and the memory register for the private encryption key of the calling participant. In one preferred embodiment, the wireless communication device of the calling participant includes also a memory register for the authentication code of the calling participant.

The wireless communication device of the called participant comprises a central processing unit, a microphone, an ADC/DAC converter, a loud-speaker, a wireless module, the memory register for the public encryption key of the calling participant, the memory register for the public encryption key of the called participant, and the memory register for the private encryption key of the called participant. In one preferred embodiment, the wireless communication device of the called participant includes also a memory register for the authentication code of the called participant.

Preferably, the communication network between the control unit and the network communication devices may be technically different from the communication network created between the wireless communication device and the network communication device of the same participant. Technological nature of the communication network between the wireless communication device and network communication device of the same participant is inalterable, but as the communication network between the control unit and the network communication devices, any wireless network allowing data transmission and meeting the required communication parameters can be used, which is a great advantage of this invention.

Further are described in detail functions of the three types of devices that are the part of the system for secure transmission of voice communication.

The first type is the wireless communication device the main functions of which are encryption and decryption of the content of the voice communication, wireless transmission of encrypted digital signal into the network communication device, wireless reception of encrypted digital signal from the network communication device, creation and storing of a new pair of encryption keys. Other functions include transformation of audio signal into digital signal, transformation of digital signal into audio signal.

The second type of the device is the network communication device. Its main functions include maintenance of communication link with the central control unit, wireless reception of encrypted digital signal from and into the wireless communication device. Other functions of the network communication device software include storing information about all participants of the communication network, such as the name of the participant, status of the participant (connected or not connected to the communication network) and the status of the wireless communication device of the participant (connected or not connected to the network communication device). Required functions of this type of device are available by means of specially designed and implemented the software, the function of which is also verifying the identity of the wireless communication module realized by means of entering the login data by the user into the software of the network communication device.

The third type of the device is the central control unit, the main functions of which are storing data about all participants of the communication network, such as name of the participant, status of the participant (connected or not connected to the communication network), status of the wireless communication device of the participant (connected or not connected to the network communication device), login data of the participant, authentication code of each wireless communication device in the communication network.

Any number of the individual devices can be used, the only limitation is bandwidth of the communication network through which communication between the network communication devices of the calling participant and the called participant is performed and the ability of the central control unit to operate the required number of devices simultaneously in real time. All devices in said system are able to communicate bidirectionally and in real time.

A method of secure transmission of voice communication in the system for secure transmission of voice communication according to this invention comprises the following steps:

- authentication of the participant when entering the communication network, whether authentication data (user name and password) entered by the participant are identical to the authentication data stored on the central control unit;

- verification by the central control unit whether the wireless communication device is connected to the network communication device via the communication network and verification whether the authentication code stored on the wireless communication device and the authentication code assigned to the login data of the user stored on the central control unit are identical;

- connection of the participant to the communication network between the central control unit and network communication devices, if the authentication of the participant is successful, the wireless communication device is connected to the network communication device and the authentication codes are identical, or not connecting the participant to the communication network if the authentication of the participant is not successful, the wireless communication device is not connected to the network communication device or the authentication codes are not identical;

- after sending a request of the calling participant for creation of the transmission of voice communication to the called participant via the central control unit, verification of availability of the network communication device in the communication network and of connection of the wireless communication device of the called participant to the network communication device of the called participant via the communication network between the wireless communication device and the network communication device of the same participant by the central control unit; - sending of a request for generation of the new pair of encryption keys by the central control unit via the network communication device of the calling participant to the wireless communication device of the calling participant;

- creation of a new private key and a new public key of the calling participant and storing them in the memory registers of the wireless communication device of the calling participant;

- sending of a request for generation of the new pair of encryption keys by the central control unit via the network communication device of the called participant to the wireless communication device of the called participant;

- creation of a new private key and a new public key of the called participant and storing them them in memory registers of the wireless communication device of the called participant;

- in the case of creating the new pair of encryption keys of the both participants of the communication, sending of the public encryption key of the calling participant from the memory register of the wireless communication device of the calling participant via the network communication device of the calling participant through the network communication device of the called participant to the wireless communication device of the called participant, where it is saved to the memory register, and subsequently sending of the public encryption key of the called participant from the memory register of the wireless communication device of the called participant via the network communication device of the called participant through the network communication device of the calling participant to the wireless communication device of the calling participant, where it is saved to the memory register,

- after successful generation of the new pair of encryption keys and successful exchange of the public encryption keys and their saving to the wireless communication devices, creation of the secure connection between the network communication device of the calling participant and the network communication device of the called participant.

The encrypted signal from the network communication device of the calling participant is further transmitted to the network communication device of the called participant. If the connection between the network communication device of the called participant and the wireless communication device of the called participant via the communication network is created, the encrypted signal is transmitted via this communication network to the wireless communication device of the called participant. The encrypted signal is then processed by the central processing unit, which decrypts it by means of the private encryption key of the called participant. The decrypted digital signal is transmitted to the ADC/DAC converter on the wireless communication device of the called participant, where it is converted to audio signal.

Transmission is performed in a similar manner also in the opposite direction - from the called participant to the calling participant.

The main advantage of the present invention lies in a higher level of security as the central control unit does not store any main decryption key, but the decryption keys are stored only on the individual wireless communication devices of the calling participant and of the called participant.

The whole process of secure transmission of voice communication via the system according to this invention takes place bidirectionally in real time, wherein it is not dependent on the type of the communication network between the network communication devices of the calling participant and the called participant and the central control unit.

Brief Description of Drawings

The invention is explained in more detail by figures.

On Fig. 1 is shown a simplified scheme of the system for secure transmission of voice communication, which contains only devices of one calling participant and one called participant of communication.

On Fig. 2 is schematically shown the wireless communication device of the calling participant.

On Fig. 3 is schematically shown the wireless communication device of the called participant.

Examples of Embodiments Example 1

The system for secure transmission of voice communication via the communication network according to this invention was constructed, the system comprises the wireless communication device AJ, of the calling participant, the network communication device Bl of the calling participant, the central control unit C, the network communication device B2 of the called participant and the wireless communication device A2 of the called participant. Four memory registers 106, 107, 108, 109; 206, 207, 208, 209 are in each wireless communication device AJ_ of the calling participant and each wireless communication device A2 of the called participant. The wireless communication device Al of the calling participant and the wireless communication device A2 of the called participant are equipped with the encryption and/or decryption key and are able to encrypt and/or decrypt the communication. The wireless communication device Al of the calling participant is able to encrypt the voice communication by means of the public encryption key of the called participant. The wireless communication device A2 of the called participant is able to decrypt the voice communication by means of the private encryption key of the called participant. The wireless communication device AJ_ of the calling participant is connected via the communication network S2 with the network communication device BJ_ of the calling participant. The wireless communication device A2 of the called participant is connected via the communication network S2 with the network communication device B2 of the called participant. The network communication devices Bl , B2 of the calling participant and the called participant are connected via the communication network Si with the central control unit C. In the network communication devices BJ_, B2 of the calling participant and the called participant is a software for verifying the identity when the connection with the central control unit C via the communication network S2 is created. The private encryption key of the calling participant is stored in the memory register 108 of the wireless communication device AJ_ of the calling participant. The public encryption key of the calling participant is stored in the memory register 107 of the wireless communication device Al of the calling participant. The private encryption key of the called participant is stored in the memory register 208 of the wireless communication device A2 of the called participant. The public encryption key of the called participant is stored in the memory register 207 of the wireless communication device A2 of the called participant. The public encryption key of the calling participant is also stored in the memory register 206 of the wireless communication device A2 of the called participant. The public encryption key of the called participant is also stored in the memory register 106 of the wireless communication device AJ_ of the calling participant. The private encryption key of the calling participant, the public encryption key of the calling participant, the private encryption key of the called participant and the public encryption key of the called participant can be changed at any time.

The wireless communication device Al of the calling participant has its own authentication code of the calling participant, which is stored in the memory register 109 for the authentication code of the calling participant and also in the memory registers of the central control unit C. The wireless communication device A2 of the called participant has its own authentication code, which is stored in the memory register 209 for the authentication code of the called participant and also in the memory registers of the central control unit C. The wireless communication device AJ_ of the calling participant comprises the central processing unit 101, the microphone 102, the ADC/DAC converter 103, the loud-speaker 104, the wireless module 105, the memory register 106 for the public encryption key of the called participant, the memory register 107 for the public encryption key of the calling participant, and the memory register 108 for the private encryption key of the calling participant, and the memory register 109 for the authentication code of the calling participant.

The wireless communication device A2 of the called participant comprises the central processing unit 201, the microphone 202, the ADC/DAC converter 203, the loud-speaker 204, the wireless module 205, the memory register 206 for the public encryption key of the calling participant, the memory register 207 for the public encryption key of the called participant, the memory register 208 for the private encryption key of the called participant, and the memory register 209 for the authentication code of the called participant.

The communication network SJ. is wireless and is technologically different from the communication network S2 which is also wireless. The communication network Si is realized by Bluetooth technology and the communication network S2 is realized by HSDPA mobile network.

The authentication code of the calling participant is also used to block the wireless communication device AJ_ of the calling participant when accessing the communication network Si via the network communication device BJ_ of the calling participant and the authentication code of the called participant is also used to block the wireless communication device A2 of the called participant when accessing the communication network SJ_ via the network communication device B2 of the called participant. This function can be used in case of loss or theft of the wireless communication device Al of the calling participant or the wireless communication device A2 of the called participant.

Example 2

The system for secure transmission of voice communication via the communication network according to Example 1 was constructed.

The secure transmission of voice communication via the communication network begins by authentication of the participant when accessing the communication network Si, regardless of whether it is the calling participant or the called participant. The calling participant enters his/her login data (username and password) into the software on the network communication device Bl of the calling participant. These login data are sent via the communication network SI to the memory registers of the central control unit C, which verifies the participant by comparing login data entered by the user into the software on the network communication device ΕΠ of the calling participant with the login data stored in the central control unit C. If the compared login data are identical, the central control unit C will allow access and communication of the participant, or the network communication device Bi of the calling participant or the network communication device B2 of the called participant, to the communication network Si or S2.

When the participant has access to the communication network SJ_ and the wireless communication device Al of the calling participant is connected to the network communication device BJ_ of the calling participant or the wireless communication device A2 of the called participant is connected to the network communication device B2 of the called participant, the authentication code of the calling participant or of the called participant is sent via the communication network S2 from the wireless communication device Al of the calling participant or the wireless communication device A2 of the called participant through the network communication device BJ_ of the calling participant or the of the network communication device B2 of the called participant and via the communication network Si to the central control unit C which verifies whether it is identical to the authentication code assigned to the login data of the user stored on the central unit C. When the authentication code is identical, the participant connected to the communication network SI can communicate with other network participants in secure manner.

When the wireless communication device Ai of the calling participant or the wireless communication device A2 of the called participant is not connected to the network communication device B_i of the calling participant or to the network communication device B2 of the called participant, respectively, via the communication network S2 or the authentication code stored on the wireless communication device A_j_ of the calling participant or on the wireless communication device A2 of the called participant and the authentication code assigned to the user login data stored on the central unit C are not identical, the central control unit C will not allow communication of the participant with other network participants in secure manner.

The secure transmission of voice communication itself begins when the calling participant selects the called participant in the contact list on the network communication device BI of the calling participant and presses a button to initiate voice communication. The software on the network communication device BJ_ of the calling participant sends the request for creation of transmission of voice communication to the called participant through the central control unit C. If the network communication device B2 of the called participant is available in the communication network Si and the wireless communication device A2 of the called participant is connected via the communication network S2 with the network communication device B2 of the called participant, then, as the first step, the central control unit C sends the request for generation of the new pair of encryption keys via the network communication device Bl of the calling participant to the wireless communication device Al of the calling participant. The wireless communication device Al of the calling participant generates simultaneously the new private key of the calling participant, which is saved to the memory register 108, and also the new public key of the calling participant, which is saved to the memory register 107, and the new public key of the calling participant is sent through the network communication device Bl of the calling participant via the communication network Si to the network communication device B2 of the called participant, and from there to the wireless communication device A2 of the called participant, where the new public key of the calling participant is saved to the memory register 206.

In the second step, the central control unit C sends the request for generation of the new pair of encryption keys via the network communication device B2 of the called participant to the wireless communication device A2 of the called participant. The wireless communication device A2 of the called participant generates simultaneously the new private key of the called participant, which is saved to the memory register 208, and also the new public key of the called participant, which is saved to the memory register 207. and the new public key of the called participant is sent through the network communication device B2 of the called communication participant via the communication network SJ_ to the network communication device BJ_ of the calling participant and from there to the wireless communication device Al of the calling participant, where the new public key of the called participant is saved to the memory register 106.

If the new pairs of encryption keys of both communication participants are saved to the memory registers 106 or 206 on the wireless communication devices Al or A2 of the calling participant and the called participant, respectively, the central control unit C creates the connection between the network communication device BJ_ of the calling participant and the network communication device B2 of the called participant, which is manifested by visual change on the display of the network communication device BJ_ of the calling participant and of the network communication device B2 of the called participant, and also in activating the microphone 102 and the loud-speaker 104 on the wireless communication device AJ_ of the calling participant and activating the microphone 202 and the loud-speaker 204 on the wireless communication device A2 of the called participant. If the mutual connection between the network communication devices BJ_ and B2 of the calling participant and of the called participant is created and if the connection between the network communication device Bi of the calling participant and the wireless communication device AJ_ of the calling participant is created and also if the connection between the network communication device B2 of the called participant and the wireless communication device A2 of the called participant is created, then the audio signal received by the microphone 102 on the wireless communication device Al_ of the calling participant is transmitted to the ADC/DAC converter 103, where it is converted to digital signal. This digital signal is further processed by the central processing unit 101 on the wireless communication device AJ_ of the calling participant, where it is encrypted by means of the encryption algorithm which uses for this purpose the public encryption key of the called participant stored in the memory register 106. The digital signal encrypted in this way is sent through the wireless module 105 of the wireless communication device AJ_ of the calling participant via the communication network S2 to the wireless module of the network communication device ΕΠ of the calling participant.

The network communication device BJ_ of the calling participant transmits the encrypted digital signal via the communication network SI to the network communication device B2 of the called participant.

If connection is created between the network communication device B2 of the called participant and the wireless communication device A2 of the called participant by means of the communication network S2, the encrypted digital signal is transmitted via the communication network S2 to the wireless module 205 of the wireless communication device A2 of the called participant.

If no connection is created between the network communication device B2 of the called participant and the wireless communication device A2 of the called participant, the software of the network communication device B2 of the called participant sends a message to the central control unit C, which sends it further to the network communication device BJ_ of the calling participant and the software visually notifies the calling participant that it is not possible to create secure transmission of voice communication content.

If the encrypted digital signal is transmitted to the wireless communication device A2 of the called participant, it is processed by the central processing unit 201, which decrypts it by means of the private encryption key of the called participant from the memory register 208. This decrypted digital signal is transmitted to the ADC/DAC converter 203 on the wireless communication device A2 of the called participant, where it is converted to audio signal that is reproduced to the called participant by means of the loud-speaker 204. Example 3

The system for secure transmission of voice communication via the communication network according to Example 1 was constructed. The transmission of voice communication in the direction from the called participant to the calling participant is performed in a similar manner as in Example 2.

Industrial Applicability

The system for secure transmission of voice communication via the communication network according to this invention can be used mainly for voice communication in the field of telecommunications. The invention can be used mainly in voice communication of devices that communicate via the mobile communication network, but also for devices communicating via any other communication network.