CN114867012A - Encryption earphone and voice communication method thereof - Google Patents
Encryption earphone and voice communication method thereof Download PDFInfo
- Publication number
- CN114867012A CN114867012A CN202210619582.6A CN202210619582A CN114867012A CN 114867012 A CN114867012 A CN 114867012A CN 202210619582 A CN202210619582 A CN 202210619582A CN 114867012 A CN114867012 A CN 114867012A
- Authority
- CN
- China
- Prior art keywords
- key
- voice
- module
- headset
- key factor
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004891 communication Methods 0.000 title claims abstract description 41
- 238000000034 method Methods 0.000 title claims description 24
- 230000005236 sound signal Effects 0.000 claims abstract description 16
- 108010094028 Prothrombin Proteins 0.000 claims abstract description 15
- AGVAZMGAQJOSFJ-WZHZPDAFSA-M cobalt(2+);[(2r,3s,4r,5s)-5-(5,6-dimethylbenzimidazol-1-yl)-4-hydroxy-2-(hydroxymethyl)oxolan-3-yl] [(2r)-1-[3-[(1r,2r,3r,4z,7s,9z,12s,13s,14z,17s,18s,19r)-2,13,18-tris(2-amino-2-oxoethyl)-7,12,17-tris(3-amino-3-oxopropyl)-3,5,8,8,13,15,18,19-octamethyl-2 Chemical compound [Co+2].N#[C-].[N-]([C@@H]1[C@H](CC(N)=O)[C@@]2(C)CCC(=O)NC[C@@H](C)OP(O)(=O)O[C@H]3[C@H]([C@H](O[C@@H]3CO)N3C4=CC(C)=C(C)C=C4N=C3)O)\C2=C(C)/C([C@H](C\2(C)C)CCC(N)=O)=N/C/2=C\C([C@H]([C@@]/2(CC(N)=O)C)CCC(N)=O)=N\C\2=C(C)/C2=N[C@]1(C)[C@@](C)(CC(N)=O)[C@@H]2CCC(N)=O AGVAZMGAQJOSFJ-WZHZPDAFSA-M 0.000 claims abstract description 15
- BTCSSZJGUNDROE-UHFFFAOYSA-N gamma-aminobutyric acid Chemical compound NCCCC(O)=O BTCSSZJGUNDROE-UHFFFAOYSA-N 0.000 claims abstract description 5
- 238000010295 mobile communication Methods 0.000 claims description 23
- 238000005516 engineering process Methods 0.000 abstract description 6
- 238000010586 diagram Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 230000011664 signaling Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04R—LOUDSPEAKERS, MICROPHONES, GRAMOPHONE PICK-UPS OR LIKE ACOUSTIC ELECTROMECHANICAL TRANSDUCERS; DEAF-AID SETS; PUBLIC ADDRESS SYSTEMS
- H04R1/00—Details of transducers, loudspeakers or microphones
- H04R1/10—Earpieces; Attachments therefor ; Earphones; Monophonic headphones
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04R—LOUDSPEAKERS, MICROPHONES, GRAMOPHONE PICK-UPS OR LIKE ACOUSTIC ELECTROMECHANICAL TRANSDUCERS; DEAF-AID SETS; PUBLIC ADDRESS SYSTEMS
- H04R5/00—Stereophonic arrangements
- H04R5/033—Headphones for stereophonic communication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses an encryption earphone, which comprises a sound transceiving module, a voice receiving module and a voice processing module, wherein the sound transceiving module is used for receiving and outputting voice; the key generation module is used for generating a key according to a key generation strategy; the voice encryption module is used for encrypting the audio signal; the voice decryption module is used for decrypting the encrypted audio signal; the communication transceiving module is used for transmitting and receiving voice data; the key generation module comprises a key factor generation submodule and a key factor generation submodule, wherein the key factor generation submodule is used for generating a binary code according to a password input by a user, and the binary code is used as a key factor I; the key factor II generation submodule is used for generating a key factor II according to a plurality of groups of mass random keys; and the key generation submodule is used for carrying out XOR operation on the key factor I and the key factor II to obtain a key. The invention realizes digital coding, encryption and modulation of the sound source by combining the narrowband speech coding technology and the universal password technology, and is applied to the encryption earphone.
Description
Technical Field
The invention relates to the technical field of earphones, in particular to an encryption earphone and a voice communication method thereof.
Background
Mobile communication has become an inseparable part of people's work and life, and people have higher and higher requirements for confidentiality of voice communication. Most voice streams of the existing communication network communication terminals are not encrypted. The mobile core network does not have the capability of encrypting communication audio data, so that voice encryption is a way to realize secure communication in the process of voice data transmission.
At present, most of encryption methods adopted for encrypting the voice data transmission process are realized by encrypting a mobile phone or installing encryption software on the mobile phone, and the method has a plurality of problems, such as: 1. the method is only suitable for a certain region, an operator or a communication mode, and multi-state intercommunication cannot be realized; 2. a specific service provider must be relied and trusted on safety, and safety autonomy cannot be achieved; 3. because the encryption is carried out through the mobile phone, the encryption is easily broken by mobile phone virus software or malicious attack programs, and important information is leaked.
Therefore, it is important to develop a device independent of communication equipment for encrypting voice communication data, and a mobile phone headset is a common external component of a mobile phone, and as the development of smart phones is increasing, mobile phone headsets become a common object that people often wear around. Therefore, it is an urgent need in the industry to develop an earphone that is independent of communication equipment and can encrypt voice communication data.
Disclosure of Invention
Aiming at the problems in the related art, the invention provides an encryption earphone and a voice communication method thereof.
The technical scheme of the invention is realized as follows:
according to an aspect of the present invention, there is provided an encryption headset.
The encryption earphone comprises:
the voice transceiving module is used for receiving voice and outputting the voice;
the key generation module is used for generating a key according to a key generation strategy;
the voice encryption module is used for encrypting the audio signal from the sound transceiving module by using the key;
a voice decryption module for decrypting the encrypted audio signal from the mobile communication device using the key;
the communication transceiver module is used for transmitting and receiving encrypted and unencrypted voice data;
the key generation module comprises a key factor generation submodule, a key factor two generation submodule and a key generation submodule, wherein the key factor generation submodule is used for generating 128-bit binary codes according to passwords input by a user, and the binary codes are used as key factors I; the key factor II generation submodule is used for generating a group of randomly arranged key combinations based on a clock according to a plurality of groups of prestored massive random keys and taking the key combinations as key factors II; and the key generation submodule is used for carrying out XOR operation on the key factor I and the key factor II to obtain a key.
In addition, the encryption headset further comprises: and the password input module is used for inputting passwords by a user, wherein the passwords comprise digital passwords, color combination passwords and pattern combination passwords.
In addition, the voice cryptographic module symmetrically encrypts the audio signal from the voice transceiver module using the SM4 block encryption algorithm when encrypting the audio signal from the voice transceiver module using the key.
Further, the voice decryption module decrypts the encrypted audio signal from the mobile communication device using the SM4 packet encryption algorithm when decrypting the encrypted audio signal from the mobile communication device using the key.
Optionally, the encryption headset is a wireless bluetooth headset, and the wireless bluetooth headset includes a TWS wireless bluetooth headset, a strap wireless bluetooth headset, or a head-mounted wireless bluetooth headset.
Optionally, the encryption earphone comprises an encryption earphone body and a charging bin for placing the encryption earphone body, and the password input module is located on the encryption earphone body or on the charging bin.
According to another aspect of the present invention, there is provided a voice communication method performed through a cryptographic headset. The sending party and the receiving party carry out voice communication with the mobile communication device through the encryption earphone.
The voice communication method performed by the encryption earphone comprises the following steps:
a sender receives a password input by a user and generates a 128-bit binary code as a key factor one according to the password;
generating a group of randomly arranged key combinations based on a clock according to a plurality of groups of prestored massive random keys, and taking the key combinations as a key factor II; carrying out XOR operation on the first key factor and the second key factor to obtain a key;
and encrypting the received voice by using the key, transmitting the encrypted voice data to the mobile communication device, and prompting the mobile communication device to transmit the encrypted voice data to a receiving party.
Wherein, when encrypting the received voice by using the key, the received voice is symmetrically encrypted by using the SM4 block encryption algorithm.
According to still another aspect of the present invention, there is provided a voice communication method performed through a cryptographic headset. The sender and the receiver carry out voice communication through the encryption earphone and the mobile communication device.
The voice communication method performed by the encryption earphone comprises the following steps:
a receiving party receives a password input by a user and generates a 128-bit binary code as a key factor one according to the password;
generating a group of randomly arranged key combinations based on a clock according to a plurality of groups of prestored massive random keys, and taking the key combinations as a key factor II; performing XOR operation on the first key factor and the second key factor to obtain a key;
and decrypting the encrypted voice data transmitted by the sender through the mobile communication device by using the key, and outputting voice under the condition of obtaining the decrypted voice data.
Wherein, when decrypting the encrypted voice data transmitted by the transmitting side through the mobile communication device using the key, the encrypted voice data is decrypted using the SM4 packet encryption algorithm.
Has the advantages that: the invention creates a voice encryption coding mode by combining a narrow-band voice coding technology and a universal password technology, realizes digital coding, encryption and modulation of a sound source, is applied to an encryption earphone, and provides a voice confidential product which has a completely closed safety chain, is safe, independent and controllable and can be widely applied to various areas, operators and communication modes for users. The eavesdropping risk can be resisted to the greatest extent, and the eavesdropping risk comprises line eavesdropping such as operator eavesdropping, network eavesdropping, No. 7 signaling eavesdropping and pseudo base station eavesdropping, and local eavesdropping such as mobile spyware and backdoor.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
Fig. 1 is a block diagram of a modular structure of a cryptographic headset according to an embodiment of the invention;
fig. 2 is a schematic structural diagram of a charging bin with color combination password input for an encryption headset according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a charging bin with a digital password input of an encryption headset according to an embodiment of the invention;
fig. 4 is a first flowchart illustrating a voice communication method performed by a cryptographic headset according to an embodiment of the present invention;
fig. 5 is a flowchart illustrating a voice communication method performed by the encryption headset according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments that can be derived by one of ordinary skill in the art from the embodiments given herein are intended to be within the scope of the present invention.
According to an embodiment of the invention, an encryption headset and a voice communication method thereof are provided.
As shown in FIG. 1, an encryption earphone according to an embodiment of the present invention comprises
A sound transceiver module 101 for receiving and outputting a voice;
a key generation module 103, configured to generate a key according to a key generation policy;
a voice encryption module 105 for symmetrically encrypting the audio signal from the sound transceiving module based on the SM4 packet encryption algorithm using the key;
a speech decryption module 107 for decrypting the encrypted audio signal from the mobile communication device based on the SM4 packet encryption algorithm using the key;
a communication transceiver module 109 for transmitting and receiving encrypted and unencrypted voice data;
the key generation module 103 includes a key factor one generation submodule (not shown in the figure), a key factor two generation submodule (not shown in the figure), and a key generation submodule (not shown in the figure), where the key factor one generation submodule is used to generate a 128-bit binary code according to a password input by a user, and uses the binary code as a key factor one; the key factor II generation submodule is used for generating a group of randomly arranged key combinations based on a clock according to a plurality of groups of prestored massive random keys and taking the key combinations as key factors II; and the key generation submodule is used for carrying out XOR operation on the key factor I and the key factor II to obtain a key. In addition, the encryption headset further comprises: and a password input module (not shown) for inputting a password by a user.
When the password is used specifically, the password comprises a digital password, a color combination password and a pattern combination password. The color combination password may be as shown in fig. 2, where the key 1 is red and the key 2 is black, and the password code may be any combination of red and black, such as: red, black and black (110), or red, black, red, black (1001), red, black, red, black (101100), random combinations of up to 128 bits can be achieved. And the numeric code may be a combination of 0-9 digits, as shown in fig. 3.
In addition, for convenience of use, the encryption headset of the present invention can adopt a wireless bluetooth headset, such as: a TWS wireless Bluetooth headset, a strap wireless Bluetooth headset, or a head-mounted wireless Bluetooth headset. When the wireless Bluetooth headset is not provided with the charging bin, the password input module can be arranged on the body of the wireless Bluetooth headset, such as the side surface of the wireless Bluetooth headset; and under the condition that the wireless Bluetooth headset is configured with the charging bin (as shown in fig. 2-3), the password input module can be configured on the charging bin and can be configured with the display screen for displaying.
When the wireless Bluetooth headset is a TWS wireless Bluetooth headset, key binaural synchronization can be realized by adopting a sniffer mode or a mode of forwarding from the master ear to the slave ear. Of course, in practical application, other matching functions can be configured, such as: the method comprises the steps of configuring a switching key to realize state switching, wherein the state switching comprises function switching of encrypted conversation, encrypted voice, encrypted conference and the like, specifically, prompting to enter an encrypted conversation mode if an encrypted conversation key is pressed in a non-encrypted conversation state, prompting to be in an encrypted conversation state by an indicator light, interrupting the encrypted conversation to return to a common conversation mode if the encrypted conversation key is pressed, and simultaneously turning off the indicator light of the encrypted conversation state. The mode of encryption switching can also be set on the earphone, and mode switching of encryption communication and ordinary communication, mode switching of encryption recording, encryption voice message, encryption conference and the like can be realized in any form of knocking, pressing, touching and voice assistance.
As shown in fig. 4, a voice communication method performed by an encryption headset according to an embodiment of the present invention includes:
step S401, a sender receives a password input by a user and generates a 128-bit binary code as a key factor one according to the password;
step S403, generating a group of randomly arranged key combinations based on a clock according to a plurality of groups of prestored massive random keys, and taking the key combinations as a key factor II; carrying out XOR operation on the first key factor and the second key factor to obtain a key;
step S405, encrypts the received voice based on the SM4 packet encryption algorithm using the key, and transmits the encrypted voice data to the mobile communication device, causing the mobile communication device to transmit the encrypted voice data to the receiving party.
As shown in fig. 5, a voice communication method performed by an encryption headset according to an embodiment of the present invention includes:
step S501, a receiver receives a password input by a user and generates a 128-bit binary code as a key factor one according to the password;
step S503, generating a group of randomly arranged key combinations based on a clock according to a plurality of groups of prestored massive random keys, and taking the key combinations as a key factor II; performing XOR operation on the first key factor and the second key factor to obtain a key;
step S504 is to decrypt the encrypted voice data transmitted by the transmitting side through the mobile communication apparatus based on the SM4 block encryption algorithm using the key, and to output the voice in the case of obtaining the decrypted voice data.
In summary, by means of the technical scheme of the invention, a voice encryption coding mode is created through the combination of the narrow-band voice coding technology and the universal password technology, the digital coding, encryption and modulation of the sound source are realized, and the voice encryption coding mode is applied to the encryption earphone, thereby providing a voice secrecy product which has a completely closed safety chain, is safe, independent and controllable and can be widely applied to various areas, operators and communication modes for users. The eavesdropping risk can be resisted to the greatest extent, and the eavesdropping risk comprises line eavesdropping such as operator eavesdropping, network eavesdropping, No. 7 signaling eavesdropping and pseudo base station eavesdropping, and local eavesdropping such as mobile spyware and backdoor.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.
Claims (10)
1. A cryptographic headset, comprising:
the voice transceiving module is used for receiving voice and outputting the voice;
the key generation module is used for generating a key according to a key generation strategy;
the voice encryption module is used for encrypting the audio signal from the sound transceiving module by using the key;
a voice decryption module for decrypting the encrypted audio signal from the mobile communication device using the key;
the communication transceiver module is used for transmitting and receiving encrypted and unencrypted voice data;
the key generation module comprises a key factor generation submodule, a key factor two generation submodule and a key generation submodule, wherein the key factor generation submodule is used for generating 128-bit binary codes according to passwords input by a user, and the binary codes are used as key factors I; the key factor II generation submodule is used for generating a group of randomly arranged key combinations based on a clock according to a plurality of groups of prestored massive random keys and taking the key combinations as key factors II; and the key generation submodule is used for carrying out XOR operation on the key factor I and the key factor II to obtain a key.
2. The cryptographic headset of claim 1, further comprising: and the password input module is used for inputting passwords by a user, wherein the passwords comprise digital passwords, color combination passwords and pattern combination passwords.
3. The encrypting headset of claim 1, wherein the voice cryptographic module symmetrically encrypts the audio signal from the sound transceiver module using an SM4 block encryption algorithm when encrypting the audio signal from the sound transceiver module using the key.
4. The encrypting headset of claim 1, wherein the voice decryption module decrypts the encrypted audio signal from the mobile communication device using an SM4 packet encryption algorithm when decrypting the encrypted audio signal from the mobile communication device using the key.
5. The cryptographic headset of claim 2, wherein the cryptographic headset is a wireless bluetooth headset comprising a TWS wireless bluetooth headset, a strap wireless bluetooth headset, or a head-mounted wireless bluetooth headset.
6. The encrypting earphone according to claim 5, wherein the encrypting earphone comprises an encrypting earphone body and a charging chamber for placing the encrypting earphone body, and the password input module is positioned on the encrypting earphone body or the charging chamber.
7. A voice communication method performed by a cryptographic headset, wherein a sender and a receiver perform voice communication with a mobile communication apparatus through the cryptographic headset of any one of claims 1 to 6, and the voice communication method comprises:
a sender receives a password input by a user and generates a 128-bit binary code as a key factor one according to the password;
generating a group of randomly arranged key combinations based on a clock according to a plurality of groups of prestored massive random keys, and taking the key combinations as a key factor II; carrying out XOR operation on the first key factor and the second key factor to obtain a key;
and encrypting the received voice by using the key, transmitting the encrypted voice data to the mobile communication device, and prompting the mobile communication device to transmit the encrypted voice data to a receiving party.
8. The voice communication method through the encryption headset of claim 7, wherein the received voice is symmetrically encrypted using an SM4 block encryption algorithm when being encrypted using the key.
9. A voice communication method performed by a cryptographic headset, wherein a sender and a receiver perform voice communication with a mobile communication apparatus through the cryptographic headset of any one of claims 1 to 6, and the voice communication method comprises:
a receiving party receives a password input by a user and generates a 128-bit binary code as a key factor one according to the password;
generating a group of randomly arranged key combinations based on a clock according to a plurality of groups of prestored massive random keys, and taking the key combinations as a key factor II; performing XOR operation on the first key factor and the second key factor to obtain a key;
and decrypting the encrypted voice data transmitted by the sender through the mobile communication device by using the key, and outputting voice under the condition of obtaining the decrypted voice data.
10. The voice communication method through the encryption headset according to claim 9, wherein the encrypted voice data is decrypted using an SM4 packet encryption algorithm when decrypting the encrypted voice data transmitted by the transmitting side through the mobile communication device using the key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210619582.6A CN114867012A (en) | 2022-05-30 | 2022-05-30 | Encryption earphone and voice communication method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210619582.6A CN114867012A (en) | 2022-05-30 | 2022-05-30 | Encryption earphone and voice communication method thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114867012A true CN114867012A (en) | 2022-08-05 |
Family
ID=82640649
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210619582.6A Pending CN114867012A (en) | 2022-05-30 | 2022-05-30 | Encryption earphone and voice communication method thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114867012A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115348579A (en) * | 2022-10-18 | 2022-11-15 | 长江量子(武汉)科技有限公司 | Voice encryption method applied to wireless earphone and encryption type wireless earphone |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN203537408U (en) * | 2013-05-06 | 2014-04-09 | 兰玉栋 | End-to-end voice communication privacy device with assignable secret key |
CN104301097A (en) * | 2014-10-15 | 2015-01-21 | 南京熊猫电子制造有限公司 | Method for improving transmission safety of Bluetooth data |
CN105338475A (en) * | 2015-10-14 | 2016-02-17 | 公安部第三研究所 | Bluetooth-based safety conversation system and method |
CN105357226A (en) * | 2015-12-16 | 2016-02-24 | 深圳市九鼎安华科技有限公司 | Encryption communication method based on VOIP (voice over internet phone) communication |
CN106412812A (en) * | 2016-11-23 | 2017-02-15 | 建荣半导体(深圳)有限公司 | Bluetooth voice communication method, Bluetooth voice communication system and Bluetooth headset |
CN108449178A (en) * | 2018-03-26 | 2018-08-24 | 北京豆荚科技有限公司 | The generation method of root key in a kind of secure and trusted performing environment |
CN110650160A (en) * | 2019-10-29 | 2020-01-03 | 北京天威诚信电子商务服务有限公司 | Identity authentication method and system |
-
2022
- 2022-05-30 CN CN202210619582.6A patent/CN114867012A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN203537408U (en) * | 2013-05-06 | 2014-04-09 | 兰玉栋 | End-to-end voice communication privacy device with assignable secret key |
CN104301097A (en) * | 2014-10-15 | 2015-01-21 | 南京熊猫电子制造有限公司 | Method for improving transmission safety of Bluetooth data |
CN105338475A (en) * | 2015-10-14 | 2016-02-17 | 公安部第三研究所 | Bluetooth-based safety conversation system and method |
CN105357226A (en) * | 2015-12-16 | 2016-02-24 | 深圳市九鼎安华科技有限公司 | Encryption communication method based on VOIP (voice over internet phone) communication |
CN106412812A (en) * | 2016-11-23 | 2017-02-15 | 建荣半导体(深圳)有限公司 | Bluetooth voice communication method, Bluetooth voice communication system and Bluetooth headset |
CN108449178A (en) * | 2018-03-26 | 2018-08-24 | 北京豆荚科技有限公司 | The generation method of root key in a kind of secure and trusted performing environment |
CN110650160A (en) * | 2019-10-29 | 2020-01-03 | 北京天威诚信电子商务服务有限公司 | Identity authentication method and system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115348579A (en) * | 2022-10-18 | 2022-11-15 | 长江量子(武汉)科技有限公司 | Voice encryption method applied to wireless earphone and encryption type wireless earphone |
CN115348579B (en) * | 2022-10-18 | 2023-02-17 | 长江量子(武汉)科技有限公司 | Voice encryption method applied to wireless earphone and encryption type wireless earphone |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102288899B1 (en) | Symmetric quantum cryptography key based encryption device for voice communication | |
KR100430358B1 (en) | Radio communication device and radio communication method | |
CN101909290A (en) | Method, system and mobile terminal for encrypting voice call | |
US10601586B2 (en) | Method and apparatus for key management of end encrypted transmission | |
JPH04297157A (en) | Data ciphering device | |
CN114867012A (en) | Encryption earphone and voice communication method thereof | |
CN101420689B (en) | Mobile terminal and method for implementing encoding and decoding process of audio code stream | |
CN103167494A (en) | Information sending method and information sending system | |
US20030035542A1 (en) | Apparatus and method for securing communication information in CDMA communication system | |
KR20030091239A (en) | Method and apparatus for securing contents between mobile phones and their operating method | |
JP4615128B2 (en) | Voice and data encryption method using encryption key split combiner | |
CN105827601A (en) | Data encryption application method and system of mobile device | |
EP2809045A2 (en) | Information security attachment device for voice communication and information security method for voice communication using the same | |
KR102308247B1 (en) | Encryption communication device equipped with quantum encryption chip based a quantum random number and method of providing encryption communication service using the same | |
JPH01307341A (en) | Mobile body data ciphered communication system | |
US20230070408A1 (en) | Secure communication device equipped with quantum encryption chip based quantum random number and method of providing secure communication service using the same | |
KR100572463B1 (en) | Encrypted communication method in communication between wireless communication terminals using shared encryption key | |
CN108882182A (en) | Short message ciphering and deciphering device | |
JP2000514934A (en) | Method and apparatus for enhanced security enhancement of a private key to a lookup table to improve security of wireless telephone messages | |
KR20090024860A (en) | Voice encrypted communication module for mobile communication terminal | |
KR20000054258A (en) | Method of securing shot message and the system | |
JPH09149023A (en) | Information communication processor and information communication processing method | |
CN103812652A (en) | Computer information transmission intelligent encryption method | |
JPH02195377A (en) | Ic card provided with key sharing function | |
KR20130068199A (en) | Mobile communication terminal and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20220805 |
|
RJ01 | Rejection of invention patent application after publication |