Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption earphone and voice communication method thereof

A voice communication and earphone technology, applied in wireless communication, stereo communication earphones, handset/earphone accessories, etc., can solve the problems of important information leakage, inability to achieve security and autonomy, and inability to realize polymorphic intercommunication, so as to resist the risk of eavesdropping Effect

Pending Publication Date: 2022-08-05
北京启星微电子有限公司
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, most of the existing encryption methods used to encrypt the voice data transmission process are realized by encrypting the mobile phone or installing encryption software on the mobile phone, but there are many problems in this method, such as: 1. It is only applicable to a specific 2. In terms of security, you must rely on and trust a specific service provider, and you cannot achieve security independence; 3. Because it is encrypted by the mobile phone itself, it is very difficult It is easy to be cracked by mobile phone virus software or malicious attack programs, resulting in the leakage of important information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption earphone and voice communication method thereof
  • Encryption earphone and voice communication method thereof
  • Encryption earphone and voice communication method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments in the present invention, all other embodiments obtained by those of ordinary skill in the art fall within the protection scope of the present invention.

[0040] According to an embodiment of the present invention, an encrypted headset and a voice communication method thereof are provided.

[0041] like figure 1 As shown, an encrypted headset according to an embodiment of the present invention includes:

[0042] A sound transceiver module 101, used for receiving voice and outputting voice;

[0043] a key generation module 103, configured to generate a key according to a key generation strategy;

[0044] The voice ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encrypted earphone, which comprises a sound receiving and transmitting module used for receiving and outputting voice; the key generation module is used for generating a key according to a key generation strategy; the voice encryption module is used for encrypting the audio signal; the voice decryption module is used for decrypting the encrypted audio signal; the communication transceiving module is used for transmitting and receiving voice data; the secret key generation module comprises a first secret key factor generation sub-module and is used for generating a binary code according to a password input by a user and taking the binary code as a first secret key factor; the second key factor generation submodule is used for generating a second key factor according to the multiple groups of massive random keys; and the key generation sub-module is used for performing exclusive-or operation on the key factor I and the key factor II to obtain a key. According to the invention, digital coding, encryption and modulation of a sound source are realized through combination of a narrowband voice coding technology and a general password technology, and the method is applied to an encryption earphone.

Description

technical field [0001] The present invention relates to the technical field of earphones, and in particular, to an encrypted earphone and a voice communication method thereof. Background technique [0002] Mobile communication has become an inseparable part of people's work and life, and people's requirements for the confidentiality of voice communication are getting higher and higher. Most of the voice streams of existing communication network communication terminals are not encrypted. The mobile core network does not have the ability to encrypt communication audio data, so voice encryption is a way to achieve secure communication in the process of voice data transmission. [0003] At present, the existing encryption methods used to encrypt the voice data transmission process are mostly realized by encrypting the mobile phone or installing encryption software on the mobile phone, and there are many problems in this method, such as: 1. It is only applicable to a specific 2...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/033H04W12/041H04R1/10H04R5/033
CPCH04W12/033H04W12/041H04R1/10H04R5/033
Inventor 丁凯郭发源黄磊
Owner 北京启星微电子有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products