System and method for performing voice encryption communication between communication terminals

A communication terminal, voice encryption technology, applied in voice analysis, wireless communication, short-distance communication services, etc., can solve the problem that the receiving end cannot be properly demodulated, weakened and cut off processing, etc., to reduce complexity and cost, and reduce communication errors. bit rate effect

Pending Publication Date: 2019-02-15
蒋全珍
View PDF12 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is that there are weakening and cutting processes in the prior art, resulting in the technical problem that the receiving end cannot be demodulated correctly

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for performing voice encryption communication between communication terminals
  • System and method for performing voice encryption communication between communication terminals
  • System and method for performing voice encryption communication between communication terminals

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] This embodiment provides a voice encryption communication system between communication terminals, such as figure 1 , the mobile terminal has audio interfaces such as Bluetooth audio interface or 3.5mm analog audio interface or TYPE-C audio interface or Lightning audio interface, and the voice encryption communication system is set on the mobile terminal, including:

[0044] Speech coder (CODEC) A: converts the analog audio signal collected by the microphone into an audio data stream, and transmits the data to the application processor through the I2S interface after encoding. The audio data stream sent by the application processor is received through the I2S interface, and after decoding, the audio data stream is converted into an analog audio signal and sent to the speaker for playback.

[0045] Speech coder (CODEC) B: Receive the modulated data stream through the I2S interface, decode it into an analog audio signal, and send the decoded analog signal to the communicat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a system and method for performing voice encryption communication between communication terminals and aims to solve a technical problem that correct demodulation can not be performed at a receiving end due to weakening and cutting processing. Through employing a first voice coding codec, an application processor and a second voice codec sequentially connected with an audiointerface of a mobile terminal, the second voice codec is connected with the communication terminals, the application processor includes a noise reduction module, a voice characteristic extraction / synthesis module, an encryption / decryption module and a modem module sequentially connected with the first voice codec, and the modem module is used for modulating data flows after compression and demodulating encrypted data flows. The modulated data flows can pass through a voice channel, the problem is better solved, and the system is applied to the voice communication technology.

Description

technical field [0001] The invention relates to the technical field of voice communication, in particular to a system and method for voice encryption communication between communication terminals. Background technique [0002] With people's increasing demand for communication security, a variety of mobile communication encryption schemes have been proposed. Existing communication encryption schemes include channel encryption schemes, VoIP encryption schemes, source scrambling schemes, and source encryption schemes based on complex modulation techniques. [0003] The above-mentioned solutions all have different degrees of disadvantages, such as: first, limited by the communication network, the communication background needs to participate in the encrypted communication. This solution directly leads to an increase in operating costs, and the cycle of technology development and technology upgrade is long and the workload is high. Large, unable to adapt to the social status quo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G10L19/04G10L19/16G10L21/0208H04W4/80H04W12/02H04W12/04H04W12/033
CPCH04W4/80H04W12/02H04W12/04G10L19/04G10L19/16G10L21/0208
Inventor 王秉玉王睿崔爱东
Owner 蒋全珍
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products