CN105681310A - Bluetooth based voice source real-time voice encryption method - Google Patents

Bluetooth based voice source real-time voice encryption method Download PDF

Info

Publication number
CN105681310A
CN105681310A CN201610053089.7A CN201610053089A CN105681310A CN 105681310 A CN105681310 A CN 105681310A CN 201610053089 A CN201610053089 A CN 201610053089A CN 105681310 A CN105681310 A CN 105681310A
Authority
CN
China
Prior art keywords
voice
bluetooth
encryption
digital signal
sco
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610053089.7A
Other languages
Chinese (zh)
Inventor
黄海辉
刘久冉
邹虹
徐光侠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing University of Post and Telecommunications
Original Assignee
Chongqing University of Post and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing University of Post and Telecommunications filed Critical Chongqing University of Post and Telecommunications
Priority to CN201610053089.7A priority Critical patent/CN105681310A/en
Publication of CN105681310A publication Critical patent/CN105681310A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0457Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply dynamic encryption, e.g. stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/60Network streaming of media packets
    • H04L65/75Media network packet handling
    • H04L65/762Media network packet handling at the source 
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Abstract

The invention provides a Bluetooth based voice source real-time voice encryption method, and relates to the technical field of voice encryption. The method comprises the following steps: pairing Bluetooth encryption equipment of a transmitting end and a receiving end with a corresponding mobile terminal Bluetooth module, and if the pairing is successful, then performing voice encryption transmission, otherwise, pairing again; collecting, quantifying, encoding and encrypting voices by the transmitting end, and ensuring that the voices are encrypted digital signals before entering a mobile communication network; and decoding and decrypting the voices by the receiving end, and ensuring that the voices are restored to original voices. The Bluetooth based voice source real-time voice encryption method provided by the invention performs voice source real-time encryption on the voices in combination with a wireless Bluetooth technology, wireless Bluetooth encryption equipment is added on the basis of traditional mobile communication, so that the voices can be guaranteed to exist in the form of ciphertexts in a whole process of mobile communication transmission, the security and reliability can be enhanced, and a foundation is provided for the voice encryption technology of the later mobile communication.

Description

A kind of speech source real-time voice encryption method based on bluetooth
Technical field
The invention belongs to voice encryption technical field, particularly to a kind of speech source real-time voice encryption method based on bluetooth.
Background technology
Nowadays society is the society of information, the especially high speed development of Internet technology, and information occupies consequence in society. The phenomenon of " leakage of information " repeatedly occurs, causes the enhancing that information security is realized by people, and associated information encryption develops rapidly. Voice in information is the basis of interpersonal exchange mutually, and it is prevent voice to be stolen, distort and the important means such as decoding that voice communication is encrypted.
For the safety problem existed in mobile communication, specifically include that design safety mechanism, development and improve security mechanism in mobile communication system; Adopt End to End Encryption method. The former is managed by operator and is encrypted by voice encryption, and key rests in operator's hands, considers and the angle of non-user from the angle of operator, and operator is in order to reduce the load of wireless channel, adopts simple AES, and safety is low; The latter is primarily directed to wireless channel and is encrypted, and with ciphertext between mobile communication terminal and base station, but is exist in clear text manner between base station and base station, it is easy to wiretaped. Now need encrypting by a kind of mobile terminal sound, voice signal exists with encrypted test mode in whole transmitting procedure, improves safety and the confidentiality of voice.
Chaos determines that the external complicated realization that the intrinsic randomness of sexual system produces, it it is a kind of seemingly random nonrandom motion, show extremely complex Nonlinear dynamic behaviors, there is interior randomness, to the high susceptibility of initial condition, long-term unpredictability, boundedness and ergodic, universality, scaling property, point dimension property, have the internal relation of interwoveness between them. Chaos encryption is the encryption method that research is relatively more recently, it is used for encrypting mapping mainly Logistic mapping, Chebyshev mapping, Henon mapping, Arnold mapping, Baker mapping, Lorenz system, Chen system and Lu system etc., and what the present invention adopted is that Logistic mapping pair voice is encrypted.
Logistic mapping model: xn+1=μ xn(1-xn), this parabolic mapping contains the basic thought that modern chaos is theoretical, including the cycle basic framework to the nonlinear theory such as chaos, bifurcation graphs. Wherein, 0 < μ < 4 is called branch parameter, xn+1∈ (0,1). As 0 < μ < μ1When=3.0, the stable solution of system is fixed point, i.e. Period 1 solution; As μ=μ1When=3.0, the stable solution of system is become the cycle 2 from the cycle 1, and this is bifurcated process; As μ=μ2When=3.449489, stable solution cycle 2 bifurcated of system is the cycle 4; As μ=μ3When=3.544090, the stable solution of system is the cycle 8 by 4 bifurcateds; When μ reaches the limit values μWhen=3.5699456, the stable solution of system is the cycle 2, namely during 3.5699456 < μ < 4, Logistic maps and presents chaos state. When μ=4, there is typical chaos characteristic.
The blue tooth voice source that the is based on encryption that the present invention adopts, was encrypted before voice transfer to mobile terminal, and whole mobile communication transmission process exists with ciphertext form; What AES adopted is Logistic mapping encrypting algorithm, it is ensured that the real-time of speech processes, reduces time delay; Combine with digital encryption, increase the security intensity of voice transfer. This invention improves the safety and reliability of voice transfer to a certain extent.
Summary of the invention
For above existing deficiency, it is proposed that one has method. . Technical scheme is as follows: a kind of speech source real-time voice encryption method based on bluetooth, and it comprises the following steps:
101, the Bluetooth encryption equipment of transmitting terminal and the mobile terminal bluetooth module of transmitting terminal match, the Bluetooth encryption equipment of receiving terminal match with the mobile terminal bluetooth module of receiving terminal, if successful matching, then carry out Voice Cryption, jump to step 102, otherwise, again match;
102, transmitting terminal, is sequentially carried out the step of sampling, quantization, coding and Logistic mapping encrypting to the analogue signal of voice, it is ensured that voice was the digital signal after encryption before entering mobile radio communication;
103, receiving terminal, carries out Logistic inverse mapping deciphering and D/A decoding, the voice before making voice return to sampling to the digital signal of voice.
Further, the Bluetooth encryption equipment of described transmitting terminal and the Bluetooth encryption equipment of receiving terminal, independent of mobile terminal, may be used on 2G/3G/4G.
Further, step 102 transmitting terminal and step 103 receiving terminal bluetooth equipment in all with the addition of encryption/decryption module, its encryption process is as follows:
401, voice enters from transmitting terminal bluetooth earphone mike, and voice analog signal is sampled, quantifies, encoded by A/D converter, and analogue signal is converted into digital signal, is stored in by digital signal in ADC_IN buffer memory;
402, KalimbaDSP digital signal processor port extracts digital signal from the buffer memory of ADC_IN port, utilizes Logistic mapping pair digital signal to be encrypted, and by the stored digital signal after encryption in the buffer memory of SCO_OUT port;
403, scrambled digital signal in SCO_OUT port being passed through radio frequency transmission to mobile terminal, scrambled digital signal is transferred to mobile communications network by mobile terminal;
404, the mobile terminal of receiving terminal receives the scrambled digital signal from mobile communications network, by radio frequency transmission to Bluetooth encryption equipment, is stored in by digital signal in the buffer memory of SCO_IN port;
405, KalimbaDSP extracts bit stream from the buffer memory of SCO_IN port, according to Logistic inverse mapping, digital signal is decrypted, and is stored in by digital signal in the buffer memory of DAC_OUT port;
406, by DAC_OUT port, the digital signal after deciphering is sent in DAC and carries out D/A decoding, digital signal is converted into analogue signal, and analogue signal is sent to speaker, play primitive sound.
Further, described bluetooth encryption/decryption module adopts the KalimbaDSP in CSR8670 that SCO voice flow is carried out encryption and decryption.
Further, four ports respectively ADC_IN, SCO_OUT, SCO_IN, DAC_OUT that KalimbaDSP is connected.
Advantages of the present invention and having the beneficial effect that:
Voice is transmit with the form of ciphertext between transmitting terminal and receiving terminal, the class voice digital signal after the signal being intercepted simply encryption, if it is not known that encryption method, is difficult to be cracked; The Bluetooth encryption equipment of step 101 transmitting terminal and receiving terminal must occur in pairs, as long as there being a side there is no Bluetooth encryption equipment, both sides cannot be carried out normal call, such as without corresponding Bluetooth encryption equipment voice digital signal it is decrypted at receiving terminal and encodes words, the voice heard from mobile terminal is noise, send both sides and cannot be carried out normal call, this prevent the safety problem wiretaped; Step 402 is encrypted for SCO bit stream, what adopt is the Logistic mapping encrypting algorithm itself with security feature, compared with traditional encryption method, simple and convenient, so can ensure that the real-time of voice transfer, low time delay, well meets ITU-T telephone service and specifies the decay time (less than or equal to 150ms) of one-way transmission voice, it is ensured that the quality of voice transfer. Therefore, it can be applied to the special dimension such as military affairs, business, promote the development of secret communication.
Accompanying drawing explanation
Fig. 1 is that the present invention provides preferred embodiment wireless blue tooth speech source real-time voice encryption and decryption transmitting procedure figure;
The port distribution figure of Fig. 2 KalimbaDSP;
The transmitting procedure figure of Fig. 3 Bluetooth encryption equipment voice flow;
Fig. 4 voice encryption/decryption procedure chart.
Fig. 5 represents the flow chart of the present invention.
Detailed description of the invention
Below in conjunction with accompanying drawing, the invention will be further described:
As shown in Figure 1, in order to existing mobile communication is carried out voice encryption, moving, for tradition, the shortcoming that end-to-end encryption method exists, in order to improve the safety and reliability of transmission voice, the present invention proposes a kind of speech source real-time voice encryption system based on bluetooth and method. The method utilizes wireless blue tooth communication technology, in conjunction with Logistic mapping encrypting algorithm, to a certain extent, under the premise ensured in voice communication safety, improves the real-time of voice communication, reduces time delay.
The present invention is on the basis of traditional mobile communication system, with the addition of wireless blue tooth encryption device, so that voice is encrypted before being transferred to mobile terminal, is transmit with the form of ciphertext in whole mobile communication transmission process. Wireless blue tooth speech source real-time voice encryption and decryption transmitting procedure is as it is shown in figure 1, include:
101, transmitting terminal, receiving terminal move equipment bluetooth module accordingly and send pairing request;
102, transmitting terminal, receiving terminal Bluetooth encryption equipment respond pairing request, if successful matching performs 103, otherwise return 101;
103, after successful matching, transmitting terminal dials, and sends call request;
104, receiving terminal accepts call request, converses;
105, the voice of transmitting terminal entered the sampling of Bluetooth encryption equipment, quantified, encoded and encryption, was launched by less radio-frequency (RF), sends mobile terminal to, and then enters mobile communications network;
106, the mobile terminal of receiving terminal receives the scrambled digital signal from mobile radio communication, is transferred to Bluetooth encryption equipment by less radio-frequency (RF), through deciphering, decoding, is spread out of by microphone.
Fig. 2, Fig. 3, Fig. 4, Fig. 5 is in Fig. 1 105, explaining in detail of the voice encryption/decryption process of 106, the encryption process of Bluetooth encryption equipment is to carry out in the KalimbaDSP in CSR8670, the port distribution figure of KalimbaDSP is as shown in Figure 2, four the port ADC_IN being connected with KalimbaDSP, SCO_OUT, SCO_IN, port corresponding for DAC_OUT is port 1. KalimbaDSP1_OUT respectively, port is KalimbaDSP1_IN 2., port is KalimbaDSP2_OUT 3., port is KalimbaDSP2_IN 4., so the long both SCO link that originally cannot interrupt can be divided into the short both SCO link in corresponding 4.
Bluetooth encryption equipment voice flow through A/D convert after, along both SCO link a, b, c, d transmission and KalimbaDSP process transmitting procedure as shown in Figure 3.
As shown in Figure 4, what enciphering and deciphering algorithm adopted is that Logistic maps and inverse mapping to the process of voice encryption/decryption, specifically includes:
401, when receiving terminal accepts call, the voice that transmitting terminal sends enters Bluetooth encryption device A/D converter by mike, entered A/D and converts, and was converted into digital signal, is stored in the buffer memory of ADC_IN;
402, KalimbaDSP port extracts digital signal from the buffer memory of ADC_IN port, utilizes Logistic mapping pair digital signal to be encrypted, and by the stored digital signal after encryption in the buffer memory of SCO_OUT port;
403, by less radio-frequency (RF), scrambled digital signal in SCO_OUT port being transferred to mobile terminal, scrambled digital signal is transferred to mobile communications network by mobile terminal;
404, the mobile terminal of receiving terminal receives the scrambled digital signal from mobile communications network, is transferred to Bluetooth encryption equipment by less radio-frequency (RF), is stored in by digital signal in the buffer memory of SCO_IN port;
405, KalimbaDSP extracts bit stream from the buffer memory of SCO_IN port, according to Logistic inverse mapping, digital signal is decrypted, and is stored in by digital signal in the buffer memory of DAC_OUT port;
406, by DAC_OUT port, the digital signal after deciphering is sent to middle DAC and carries out D/A decoding, digital signal is converted into analogue signal, and analogue signal is sent to speaker, it is possible to hear primitive sound.
The present invention utilizes the thought that voice is encrypted by bluetooth equipment as voice source, this thought is intended to before voice enters mobile terminal such as mobile phone to be encrypted, ensure that voice signal exists with the form of ciphertext in whole transmitting procedure, add the safety of voice communication; Utilize the convenience of the radio communication of bluetooth; Utilize what bluetooth itself carried to have language process function KalimbaDSP as encryption and decryption mould; Using the Logistic mapping encrypting algorithm that complexity is low, owing to the disposal ability of bluetooth self is limited, and voice is that requirement of real-time is higher, if with too complicated algorithm, speech processes will be increased time delay, the quality of voice is produced impact. Compared with existing mobile communication voice encryption method, the present invention uses voice source to encrypt, and improves the safety of voice encryption, for further mobile communication voice encryption technology being laid a solid foundation.
The above embodiment is interpreted as being merely to illustrate the present invention rather than limiting the scope of the invention.After having read the content of record of the present invention, the present invention can be made various changes or modifications by technical staff, and these equivalence changes and modification fall into the scope of the claims in the present invention equally.

Claims (5)

1. the speech source real-time voice encryption method based on bluetooth, it is characterised in that comprise the following steps:
101, the Bluetooth encryption equipment of transmitting terminal and the mobile terminal bluetooth module of transmitting terminal match, the Bluetooth encryption equipment of receiving terminal and the mobile terminal bluetooth module of receiving terminal match simultaneously, if two ends are successful matching all, then carry out Voice Cryption, jump to step 102, otherwise, again match;
102, transmitting terminal, is sequentially carried out the step of sampling, quantization, coding and Logistic mapping encrypting to voice analog signal, it is ensured that voice was the digital signal after encryption before entering mobile radio communication;
103, receiving terminal, carries out Logsitc inverse mapping deciphering and D/A decoding to voice digital signal, makes voice return to the front voice of sampling.
2. the speech source real-time voice encryption method based on bluetooth according to claim 1, it is characterised in that the Bluetooth encryption equipment of described transmitting terminal and the Bluetooth encryption equipment of receiving terminal, independent of mobile terminal, may be used on 2G/3G/4G.
3. the speech source real-time voice encryption method based on bluetooth according to claim 1 and 2, it is characterised in that all with the addition of encryption/decryption module in the bluetooth equipment with step 103 receiving terminal of step 102 transmitting terminal, its encryption process is as follows:
401, voice enters from transmitting terminal bluetooth earphone mike, and voice is sampled, quantifies, encoded by A/D converter, and the analogue signal of voice is converted into voice digital signal, is stored in by digital signal in ADC_IN buffer memory;
402, KalimbaDSP digital signal processor port extracts digital signal from the buffer memory of ADC_IN port, utilizes Logistic mapping pair digital signal to be encrypted, and by the stored digital signal after encryption in the buffer memory of SCO_OUT port;
403, scrambled digital signal in SCO_OUT port being passed through radio frequency transmission to mobile terminal, scrambled digital signal is transferred to mobile communications network by mobile terminal;
404, the mobile terminal of receiving terminal receives the scrambled digital signal from mobile communications network, by radio frequency transmission to Bluetooth encryption equipment, is stored in by digital signal in the buffer memory of SCO_IN port;
405, KalimbaDSP extracts bit stream from the buffer memory of SCO_IN port, according to Logistic inverse mapping, digital signal is decrypted, and is stored in by digital signal in the buffer memory of DAC_OUT port;
406, by DAC_OUT port, the digital signal after deciphering is sent in DAC and carries out D/A decoding, digital signal is converted into analogue signal, and analogue signal is sent to speaker, play primitive sound.
4. the speech source real-time voice encryption method based on bluetooth according to claim 3, it is characterised in that described bluetooth encryption/decryption module adopts the KalimbaDSP in CSR8670 that SCO voice flow is carried out encryption and decryption.
5. the speech source real-time voice encryption method based on bluetooth according to claim 1 and 2, it is characterised in that four ports respectively ADC_IN, SCO_OUT, SCO_IN, DAC_OUT that KalimbaDSP is connected.
CN201610053089.7A 2016-01-26 2016-01-26 Bluetooth based voice source real-time voice encryption method Pending CN105681310A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610053089.7A CN105681310A (en) 2016-01-26 2016-01-26 Bluetooth based voice source real-time voice encryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610053089.7A CN105681310A (en) 2016-01-26 2016-01-26 Bluetooth based voice source real-time voice encryption method

Publications (1)

Publication Number Publication Date
CN105681310A true CN105681310A (en) 2016-06-15

Family

ID=56302633

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610053089.7A Pending CN105681310A (en) 2016-01-26 2016-01-26 Bluetooth based voice source real-time voice encryption method

Country Status (1)

Country Link
CN (1) CN105681310A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106375079A (en) * 2016-09-22 2017-02-01 华侨大学 Chaotic encryption method for voice information
CN106412812A (en) * 2016-11-23 2017-02-15 建荣半导体(深圳)有限公司 Bluetooth voice communication method, Bluetooth voice communication system and Bluetooth headset
CN107071644A (en) * 2017-05-04 2017-08-18 惠州Tcl移动通信有限公司 A kind of radio microphone function implementation method, mobile terminal and readable storage medium storing program for executing
CN109346092A (en) * 2018-10-29 2019-02-15 王秉玉 The system and method for voice encryption communication is carried out between a kind of communication terminal
CN112954673A (en) * 2021-02-03 2021-06-11 深圳市长丰影像器材有限公司 Encryption method for wireless microphone channel
CN113328857A (en) * 2021-07-01 2021-08-31 北京创联易讯科技有限公司 Single-chip entrance guard type end-to-end voice cipher machine
CN113795023A (en) * 2021-09-26 2021-12-14 深圳市芯中芯科技有限公司 Bluetooth data transmission encryption method based on chaotic sequence and block encryption

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1747370A (en) * 2004-09-09 2006-03-15 中国电子科技集团公司第三十研究所 Apparatus and method for realizing end-to-end enciphering telecommunication based on bluetooth wireless connection
CN102137394A (en) * 2011-03-10 2011-07-27 中国科学院上海微系统与信息技术研究所 Encrypted mobile communication terminal system and method under network access
CN202003675U (en) * 2011-03-11 2011-10-05 深圳市易联盛世科技有限公司 Independent end-to-end special voice treatment communication device
CN204761537U (en) * 2015-07-03 2015-11-11 幸福居福尔摩沙股份有限公司 Implement mobile communication anti -eavesdrop system of encryption and decryption in bluetooth headset end

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1747370A (en) * 2004-09-09 2006-03-15 中国电子科技集团公司第三十研究所 Apparatus and method for realizing end-to-end enciphering telecommunication based on bluetooth wireless connection
CN102137394A (en) * 2011-03-10 2011-07-27 中国科学院上海微系统与信息技术研究所 Encrypted mobile communication terminal system and method under network access
CN202003675U (en) * 2011-03-11 2011-10-05 深圳市易联盛世科技有限公司 Independent end-to-end special voice treatment communication device
CN204761537U (en) * 2015-07-03 2015-11-11 幸福居福尔摩沙股份有限公司 Implement mobile communication anti -eavesdrop system of encryption and decryption in bluetooth headset end

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
丁然 等: "基于DSP的混沌语音加密", 《南京师大学报(自然科学版)》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106375079A (en) * 2016-09-22 2017-02-01 华侨大学 Chaotic encryption method for voice information
CN106412812A (en) * 2016-11-23 2017-02-15 建荣半导体(深圳)有限公司 Bluetooth voice communication method, Bluetooth voice communication system and Bluetooth headset
CN107071644A (en) * 2017-05-04 2017-08-18 惠州Tcl移动通信有限公司 A kind of radio microphone function implementation method, mobile terminal and readable storage medium storing program for executing
CN109346092A (en) * 2018-10-29 2019-02-15 王秉玉 The system and method for voice encryption communication is carried out between a kind of communication terminal
CN112954673A (en) * 2021-02-03 2021-06-11 深圳市长丰影像器材有限公司 Encryption method for wireless microphone channel
CN113328857A (en) * 2021-07-01 2021-08-31 北京创联易讯科技有限公司 Single-chip entrance guard type end-to-end voice cipher machine
CN113328857B (en) * 2021-07-01 2022-05-24 北京创联易讯科技有限公司 Single-chip entrance guard type end-to-end voice cipher machine
CN113795023A (en) * 2021-09-26 2021-12-14 深圳市芯中芯科技有限公司 Bluetooth data transmission encryption method based on chaotic sequence and block encryption
CN113795023B (en) * 2021-09-26 2024-03-19 深圳市芯中芯科技有限公司 Bluetooth data transmission encryption method based on chaotic sequence and packet encryption

Similar Documents

Publication Publication Date Title
CN105681310A (en) Bluetooth based voice source real-time voice encryption method
CN106790281A (en) A kind of end-to-end voice encryption device and encryption method towards intercom system
CN102843677A (en) Voice communication method, device and system
CN207234973U (en) Video conferencing system based on quantum cryptography
CN102624518B (en) Voice encryption and decryption method
CN101951601A (en) Method and system for encrypting voice calls in mobile communication network, terminal and network side
CN104219213A (en) Android system oriented end-to-end speech encryption method
CN103000181A (en) System and implement method thereof for secret communications based on public communication network voice channel
CN101287274B (en) Voice encryption system for mobile communication and encryption method thereof
CN109905367A (en) Speech ciphering method based on the air-ground call of VOIP
CN106888310A (en) Ciphering and deciphering device and method and communication terminal device
CN103002406B (en) A kind of voice encryption method being applied to arrowband radio digital communication system
CN101420689B (en) Mobile terminal and method for implementing encoding and decoding process of audio code stream
CN105338475A (en) Bluetooth-based safety conversation system and method
CN106412812A (en) Bluetooth voice communication method, Bluetooth voice communication system and Bluetooth headset
CN105992203A (en) Speech communication encryption key negotiation method and system based on same
CN104581714A (en) Method for encrypting speech on basis of TD-SCDMA (time division-synchronization code division multiple access) circuit domains
CN105120457B (en) A kind of Mobile Communication Circuit domain audio processing apparatus and method
CN1893474A (en) Method and apparatus for realizing voice enciphering in communication system
CN203537408U (en) End-to-end voice communication privacy device with assignable secret key
EP2809045B1 (en) Information security attachment device for voice communication and information security method for voice communication using the same
CN104581711A (en) Mobile terminal with communication encryption function as well as communication encryption method thereof
CN205584214U (en) Smart mobile phone of external pronunciation encryption device and constitution based on smart mobile phone
Chouhan et al. Real time secure end to end communication over GSM network
CN202818616U (en) Voice communication device and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160615

RJ01 Rejection of invention patent application after publication