CN107204186A - A kind of osteoacusis communication system and the means of communication based on Internet of Things - Google Patents
A kind of osteoacusis communication system and the means of communication based on Internet of Things Download PDFInfo
- Publication number
- CN107204186A CN107204186A CN201710339399.XA CN201710339399A CN107204186A CN 107204186 A CN107204186 A CN 107204186A CN 201710339399 A CN201710339399 A CN 201710339399A CN 107204186 A CN107204186 A CN 107204186A
- Authority
- CN
- China
- Prior art keywords
- pixel
- data
- signal
- module
- voice
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004891 communication Methods 0.000 title claims abstract description 58
- 238000013523 data management Methods 0.000 claims abstract description 8
- 230000006835 compression Effects 0.000 claims abstract description 7
- 238000007906 compression Methods 0.000 claims abstract description 7
- 239000003990 capacitor Substances 0.000 claims description 54
- 239000004973 liquid crystal related substance Substances 0.000 claims description 24
- 230000005540 biological transmission Effects 0.000 claims description 12
- 238000000034 method Methods 0.000 claims description 8
- 238000004458 analytical method Methods 0.000 claims description 6
- 238000004364 calculation method Methods 0.000 claims description 6
- 238000007726 management method Methods 0.000 claims description 6
- 241001517610 Funa Species 0.000 claims description 3
- 238000001514 detection method Methods 0.000 claims description 3
- 230000005611 electricity Effects 0.000 claims description 3
- 238000004519 manufacturing process Methods 0.000 claims description 3
- 230000000737 periodic effect Effects 0.000 claims description 3
- 230000005236 sound signal Effects 0.000 claims description 3
- 239000011159 matrix material Substances 0.000 claims 1
- 210000000988 bone and bone Anatomy 0.000 abstract description 12
- 230000000712 assembly Effects 0.000 description 6
- 238000000429 assembly Methods 0.000 description 6
- 238000010276 construction Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000000686 essence Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/70—Information retrieval; Database structures therefor; File system structures therefor of video data
- G06F16/74—Browsing; Visualisation therefor
- G06F16/743—Browsing; Visualisation therefor a collection of video files or sequences
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L15/00—Speech recognition
- G10L15/22—Procedures used during a speech recognition process, e.g. man-machine dialogue
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L19/00—Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
- G10L19/02—Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis using spectral analysis, e.g. transform vocoders or subband vocoders
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Human Computer Interaction (AREA)
- Health & Medical Sciences (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Computational Linguistics (AREA)
- Acoustics & Sound (AREA)
- Theoretical Computer Science (AREA)
- Spectroscopy & Molecular Physics (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention belongs to technical field of data processing, a kind of osteoacusis communication system based on Internet of Things and the means of communication are disclosed, system includes:Headset unit, voice controller, signal receiving module, encrypting module, radio receiving transmitting module, data management module, mobile terminal;The means of communication include:The earphone signal for providing microphone signal by headset unit and providing controller described in voice is converted into corresponding voice;The microphone signal that headset unit is transmitted is controlled by voice controller, detect, communicated;Data signal is converted the signal into, Real Time Compression is carried out, becomes the small data of data volume, be sent to by communication system main etc..It is single that the present invention solves existing digital acoustic control bone conduction earphone systemic-function, it is impossible to is changed desired content automatically according to customer demand;The problem of intercom or other communication apparatus realize reliable and flexible communication can not be coordinated.
Description
Technical field
The invention belongs to technical field of data processing, more particularly to a kind of osteoacusis communication system based on Internet of Things and logical
Communication method.
Background technology
At present, earphone or bone conduction earphone are all the working conditions using manually operated control earphone, cause use occasion
Limitation, in addition manual switch new requirement is proposed to industry also to very not convenient using bringing.
In the prior art:Acoustic control bone conduction earphone, including a bone conduction earphone and be connected with bone conduction earphone PTT control
Component, in addition to a sound-controlled apparatus, the sound-controlled apparatus communicate to connect with PTT control assemblies and control osteoacusis through PTT control assemblies
The break-make of earphone.Described PTT control assemblies are wireless PTT control assemblies, and it is connected with bone conduction earphone wireless telecommunications.It is described
PTT control assemblies be wired PTT control assemblies, it is into a single integrated structure with bone conduction earphone and is electrically connected with;Described acoustic control
Device is into a single integrated structure with bone conduction earphone.
In summary, the problem of prior art is present be:Existing digital acoustic control bone conduction earphone systemic-function is single, it is impossible to
Changed desired content automatically according to customer demand;Intercom or other communication apparatus can not be coordinated to realize reliable and flexible
Communication;And control of the existing communication system without safety and secrecy, there will be the hidden danger of classified information leakage.
The content of the invention
To solve the problem of prior art is present, the present invention provides a kind of osteoacusis communication system based on Internet of Things and logical
Communication method.
The present invention is achieved in that a kind of osteoacusis communication system based on Internet of Things, the bone based on Internet of Things
Conductive communication system includes:
Headset unit, the earphone for providing microphone signal for voice controller and providing controller described in voice is believed
Number it is converted into corresponding voice;
Voice controller, the control of the microphone signal transmitted for headset unit, detection, communication task;Signal is turned
Change data signal into, carry out Real Time Compression, become the small data of data volume, main frame is sent to by communication system;
The encryption method of the voice controller specifically includes following steps:
Step 1: defining random function funA, according to the length of video file, generation is some to random integers (x, y), deposits
Enter in set S { }, and set S is saved in database in corresponding video file attributes field, control generation video-encryption
The Y value of file size<10;
Step 2: reading video file stream by byte, the information from database according to video file reads the collection of deposit
S { } is closed, all random numbers pair are obtained;
Step 3: according to data to (x, y), the X position in file stream writes the random string of Y length, by file
In stream write-in encrypted video file stream;
Step 4: repeat step three, until file read-write is completed;
Signal receiving module, and the headset unit, voice controller data cube computation, for receiving voice signal;
Encrypting module is connected with the signal receiving module, for voice signal to be encrypted;
The encryption method of the encrypting module includes:
1) CA initialization modules, run Setup_CA (1λ);
Select security parameter 1λ, and selecting rank to be prime number p, the group G that generation member is g defines a bilinear map e:G×
G→G1, it is allowed to meet bilinearity, non-degeneracy and computability.Select a hash function H:{ 0,1 }*→G.Determine system
The set I of middle all properties;Token tree is initialized according to attribute authority (aa) AA number, is that each attribute authority (aa) AA determines private key
SK, and SKWith the random key RK of the leaf node of token treejMap one by one.Minimum vertex-covering key set MCKS is determined, G (x) generations are made
AA of the table comprising attribute x set, φ (x) is the set of leaf node corresponding with AA in attribute group G (x) in token tree,For the set of minimum vertex-covering φ (x) nodes in token tree, then minimum vertex-covering key set MCKSxRepresentIn all sections
The combination of corresponding random key is put, then MCKS={ MCKSx}x∈I.Token chain collection TCS is determined, n is madeiFor certain leaf in token tree
Node, then TCSiRepresent niThe set of all tokens passed through to root node, TCS={ TCSi}i∈I.For each attribute x ∈ I,
Determine a trapdoor TDx, with minimum vertex-covering key set MCKSxThe key of the inside encrypts trapdoor, obtains the corresponding trapdoors of attribute x
Information TDMx, generate trapdoor public key β∈zP, publish PP={ e (g, g)α, TCS, gβ,gα,
GTDM, H }, retain master key MSK=(α, β, { TDx}x∈I);
③AAKRegistered to CA, CA operation AA_Reg_CA () are specific as follows:CA verifies AAKIdentity information, verify into
Work(, then by AAKThe key of corresponding leaf node, the attribute set I of managementK, and the corresponding trap door information of attributeBy what is obtainedIt is sent to AAK。
4. user registers to CA, CA operation User_Reg_CA (ID), and the true identity ID of user is after ca authentication, by this
After the starting termination time and the identity of user that user authorizes sign through CA, obtain certificate Cert and certificate is returned into user
(wherein Cert=ID | | tb | | te | | SKCA(ID||tb||te));
3) AA initialization modules, run AA_Setup () function, described in detail below:Select the broadcast enciphering based on group
Scheme is rightAAKFor each attribute x, a group is determined.By its corresponding trap door information of management attribute attributeWith attribute private key ATx,KTDM is obtained after encryptionX, version 1, send it to CSP, AAKFor its managed it is every
One attribute is calculated
3) key production module, when there is user ujDuring registration, AAKRun Key_Gen (Cert) function;Specifically such as
Under:AAKIts certificate is verified, if being u after correctjEach attribute x randomly selectCalculateAndObtain private key for user skj,k,
By skj,kUser is sent to, wherein
4) encrypting module, input clear-text message m, system common parameter PP, data owner's operation Encrypt (PP, m),
It is specific as follows:
Symmetric cryptographic key k is selected, E is obtained to confidential information m symmetric cryptographiesK(m);Construction access control policy Γ=
(M, ρ), wherein M are l × d matrixes, and symmetric cryptographic key k is carried out into encryption attribute.Randomly select s ∈ zp, note vectorThenCalculate C=ke (g, g)αs, to all category being related in access control policy
Property, its corresponding attribute public key GTDM is obtained, and calculate(IACharacterize in access control policy
The whole attributes being related to), ciphertext CT is finally obtained, and Cloud Server CSP is sent it to, wherein
Radio receiving transmitting module is connected with voice controller, for digital signal data transmitting-receiving;
Data management module, for stored voice message;
Mobile terminal, is connected with voice controller, believes for receiving the numeral that voice controller is sent by communication system
Number and with main frame carry out data sharing.
Further, frequency analysis unit built in the voice controller, phase curve computing unit, error calculation unit,
Voice signal recognition unit;
Described frequency analysis unit, analyzes the frequency signal of voice signal;
Described phase curve computing unit, calculates the phase approximate with the time change progress of the phase of the frequency signal
Position curve;
Described error calculation unit, is counted to the error between the phase of the phase curve and the frequency signal
Calculate;
Described voice signal recognition unit, based on the error to the voice signal whether be periodic sound signal
It is identified.
Further, the main frame includes:
First sound channel terminal, second sound channel terminal and microphone terminal;
Data transmission blocks, the data transmission blocks are electrically connected with the microphone terminal, to be sent to mobile terminal
Data;
Data reception module, the data reception module is electrically connected with the second sound channel terminal, to receive from described
The data of mobile terminal;
Security authentication module, the security authentication module is electrically connected with the data transmission blocks and the data reception module
Connect,
Electricity-fetching module, the input of the electricity-fetching module is electrically connected with the first sound channel terminal;The electricity-fetching module
Output end is powered to the data transmission blocks, data reception module, security authentication module.
Further, the data scanning line of voice controller includes data wire, scan line and pixel;
Pixel, is formed at data wire and the infall of scan line, including the first sub-pixel, the second sub-pixel, the 3rd sub- picture
Element, the 4th sub-pixel;
First sub-pixel includes first switch, the first liquid crystal capacitance and the first storage capacitors, and the first end of first switch connects
Scan line is connected to, the second end of first switch is connected to data wire, and the three-terminal link of first switch is in the first liquid crystal capacitance
The first end of first end and the first storage capacitors;
Second sub-pixel includes second switch, the second liquid crystal capacitance and the second storage capacitors, and the first end of second switch connects
Scan line is connected to, the second end of second switch is connected to data wire, and the three-terminal link of second switch is in the second liquid crystal capacitance
The first end of first end and the second storage capacitors, the second capacitor storage beam electrically connects the second end of second storage capacitors;
3rd sub-pixel includes the 3rd switch, the 3rd liquid crystal capacitance and the 3rd storage capacitors, and the first end of the 3rd switch connects
Scan line is connected to, the second end of the 3rd switch is connected to data wire, and a three-terminal link of the 3rd switch is in the 3rd liquid crystal capacitance
First end and the 3rd storage capacitors first end, the second capacitor storage beam electrically connects the second end of the 3rd storage capacitors;
4th sub-pixel includes the 4th switch, the 4th liquid crystal capacitance and the 4th storage capacitors, and the first end of the 4th switch connects
Scan line is connected to, the 4th end of the 4th switch is connected to data wire, and the three-terminal link of the 4th switch is in the 4th liquid crystal capacitance
The first end of first end and the 4th storage capacitors, the first capacitor storage beam electrically connects the second end of the 4th storage capacitors;
When scanning linear enable, first switch component, second switch component, the 3rd switch module and the 4th switch module are
Conducting, so that incoming first sub-pixel of the signal of data wire, the second sub-pixel, the 3rd sub-pixel and the 4th sub-pixel, when this is swept
Take aim at after line solution energy, the first capacitor storage beam, the second capacitor storage beam, the level of the 3rd capacitor storage beam and the 4th capacitor storage beam
Change respectively, to cause the pixel voltage of the first sub-pixel to have the first offset voltage, the pixel of the second sub-pixel with input voltage
Voltage has the offset voltage with input voltage, and pixel voltage and the input voltage of the 3rd sub-pixel have the 3rd offset voltage, the 4th
The pixel voltage of sub-pixel has the 4th offset voltage with input voltage, to cause pixel voltage, the second sub- picture of the first sub-pixel
The pixel voltage of element, the pixel voltage of the pixel voltage and the 4th sub-pixel of the 3rd sub-pixel are different, and the first skew electricity
Pressure, the second offset voltage, the 3rd offset voltage and the 4th offset voltage are different.
Another object of the present invention is a kind of osteoacusis means of communication based on Internet of Things of offer, including:
The earphone signal for providing microphone signal by headset unit and providing controller described in voice is converted into accordingly
Voice;
The microphone signal that headset unit is transmitted is controlled by voice controller, detect, communicated;Signal is changed
Into data signal, Real Time Compression is carried out, becomes the small data of data volume, main frame is sent to by communication system;
Voice signal is received by signal receiving module;
Voice signal is encrypted by encrypting module;
Digital signal data transmitting-receiving is carried out by radio receiving transmitting module;
Stored voice message is carried out by data management module;
By mobile terminal to receiving data signal and main frame progress data that voice controller is sent by communication system
It is shared.
Osteoacusis communication system based on Internet of Things and the means of communication that the present invention is provided, solve existing radio communication
The problem of communication system can not being encrypted in system, while solving existing digital acoustic control bone conduction earphone systemic-function list
One, it is impossible to changed desired content automatically according to customer demand;Intercom or other communication apparatus can not be coordinated to realize can
The problem of by with flexible communication.
The intrusion of invalid radio signal in the Internet of Things is effectively protected, radio signals are protected,
The position of radio mobile terminal can in real time be monitored, and combine encryption system and rower is entered to the position of external entering signal
Note, it is to avoid unnecessary loss.The control system is easy to operate, with good applicability.
Brief description of the drawings
Fig. 1 is the osteoacusis communication system schematic diagram provided in an embodiment of the present invention based on Internet of Things.
In figure:1st, headset unit;2nd, voice controller;3rd, signal receiving module;4th, encrypting module;5th, wireless receiving and dispatching mould
Block;6th, data management module;7th, mobile terminal.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to embodiments, to the present invention
It is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not used to
Limit the present invention.
The application principle of the present invention is described in detail below in conjunction with the accompanying drawings.
As shown in figure 1, the osteoacusis communication system provided in an embodiment of the present invention based on Internet of Things, including:
Headset unit 1, for the earphone for providing microphone signal for voice controller and providing controller described in voice
Signal is converted into corresponding voice;
Voice controller 2, the control of the microphone signal transmitted for headset unit, detection, communication task;Signal is turned
Change data signal into, carry out Real Time Compression, become the small data of data volume, main frame is sent to by communication system;
Signal receiving module 3, and the headset unit, voice controller data cube computation, for receiving voice signal;
Encrypting module 4, is connected with the signal receiving module, for voice signal to be encrypted;
Radio receiving transmitting module 5, is connected with voice controller, for digital signal data transmitting-receiving;
Data management module 6, for stored voice message;
Mobile terminal 7, is connected with voice controller, believes for receiving the numeral that voice controller is sent by communication system
Number and with main frame carry out data sharing.
The encryption method of the voice controller 2 specifically includes following steps:
Step 1: defining random function funA, according to the length of video file, generation is some to random integers (x, y), deposits
Enter in set S { }, and set S is saved in database in corresponding video file attributes field, control generation video-encryption
The Y value of file size<10;
Step 2: reading video file stream by byte, the information from database according to video file reads the collection of deposit
S { } is closed, all random numbers pair are obtained;
Step 3: according to data to (x, y), the X position in file stream writes the random string of Y length, by file
In stream write-in encrypted video file stream;
Step 4: repeat step three, until file read-write is completed.
The encryption method of the encrypting module 4 includes:
1) CA initialization modules, run Setup_CA (1λ);
Select security parameter 1λ, and selecting rank to be prime number p, the group G that generation member is g defines a bilinear map e:G×
G→G1, it is allowed to meet bilinearity, non-degeneracy and computability.Select a hash function H:{ 0,1 }*→G.Determine system
The set I of middle all properties;Token tree is initialized according to attribute authority (aa) AA number, is that each attribute authority (aa) AA determines private key
SK, and SKWith the random key RK of the leaf node of token treejMap one by one.Minimum vertex-covering key set MCKS is determined, G (x) generations are made
AA of the table comprising attribute x set, φ (x) is the set of leaf node corresponding with AA in attribute group G (x) in token tree,For the set of minimum vertex-covering φ (x) nodes in token tree, then minimum vertex-covering key set MCKSxRepresentIn all sections
The combination of corresponding random key is put, then MCKS={ MCKSx}x∈I.Token chain collection TCS is determined, n is madeiFor certain leaf in token tree
Node, then TCSiRepresent niThe set of all tokens passed through to root node, TCS={ TCSi}i∈I.For each attribute x ∈ I,
Determine a trapdoor TDx, with minimum vertex-covering key set MCKSxThe key of the inside encrypts trapdoor, obtains the corresponding trapdoors of attribute x
Information TDMx, generate trapdoor public key β∈zP, publish PP={ e (g, g)α, TCS, gβ,gα,
GTDM, H }, retain master key MSK=(α, β, { TDx}x∈I);
⑤AAKRegistered to CA, CA operation AA_Reg_CA () are specific as follows:CA verifies AAKIdentity information, verify into
Work(, then by AAKThe key of corresponding leaf node, the attribute set I of managementK, and the corresponding trap door information of attributeBy what is obtainedIt is sent to AAK。
6. user registers to CA, CA operation User_Reg_CA (ID), and the true identity ID of user is after ca authentication, by this
After the starting termination time and the identity of user that user authorizes sign through CA, obtain certificate Cert and certificate is returned into user
(wherein Cert=ID | | tb | | te | | SKCA(ID||tb||te));
4) AA initialization modules, run AA_Setup () function, described in detail below:Select the broadcast enciphering based on group
Scheme is rightAAKFor each attribute x, a group is determined.By its corresponding trap door information of management attribute attributeWith attribute private key ATx,KTDM is obtained after encryptionX, version 1, send it to CSP, AAKFor its managed it is every
One attribute is calculated
3) key production module, when there is user ujDuring registration, AAKRun Key_Gen (Cert) function;It is specific as follows:
AAKIts certificate is verified, if being u after correctjEach attribute x randomly selectCalculateAndObtain private key for user skj,k,
By skj,kUser is sent to, wherein
4) encrypting module, input clear-text message m, system common parameter PP, data owner's operation Encrypt (PP, m),
It is specific as follows:
Symmetric cryptographic key k is selected, E is obtained to confidential information m symmetric cryptographiesK(m);Construction access control policy Γ=
(M, ρ), wherein M are l × d matrixes, and symmetric cryptographic key k is carried out into encryption attribute.Randomly select s ∈ zp, note vectorThenCalculate C=ke (g, g)αs, to all category being related in access control policy
Property, its corresponding attribute public key GTDM is obtained, and calculate(IACharacterize access control policy
In whole attributes for being related to), finally obtain ciphertext CT, and send it to Cloud Server CSP, wherein
Frequency analysis unit, phase curve computing unit, error calculation unit, sound letter built in the voice controller 2
Number recognition unit;
Described frequency analysis unit, analyzes the frequency signal of voice signal;
Described phase curve computing unit, calculates the phase approximate with the time change progress of the phase of the frequency signal
Position curve;
Described error calculation unit, is counted to the error between the phase of the phase curve and the frequency signal
Calculate;
Described voice signal recognition unit, based on the error to the voice signal whether be periodic sound signal
It is identified.
The main frame includes:
First sound channel terminal, second sound channel terminal and microphone terminal;
Data transmission blocks, the data transmission blocks are electrically connected with the microphone terminal, to be sent to mobile terminal
Data;
Data reception module, the data reception module is electrically connected with the second sound channel terminal, to receive from described
The data of mobile terminal;
Security authentication module, the security authentication module is electrically connected with the data transmission blocks and the data reception module
Connect,
Electricity-fetching module, the input of the electricity-fetching module is electrically connected with the first sound channel terminal;The electricity-fetching module
Output end is powered to the data transmission blocks, data reception module, security authentication module.
The data scanning line of voice controller includes data wire, scan line and pixel;
Pixel, is formed at data wire and the infall of scan line, including the first sub-pixel, the second sub-pixel, the 3rd sub- picture
Element, the 4th sub-pixel;
First sub-pixel includes first switch, the first liquid crystal capacitance and the first storage capacitors, and the first end of first switch connects
Scan line is connected to, the second end of first switch is connected to data wire, and the three-terminal link of first switch is in the first liquid crystal capacitance
The first end of first end and the first storage capacitors;
Second sub-pixel includes second switch, the second liquid crystal capacitance and the second storage capacitors, and the first end of second switch connects
Scan line is connected to, the second end of second switch is connected to data wire, and the three-terminal link of second switch is in the second liquid crystal capacitance
The first end of first end and the second storage capacitors, the second capacitor storage beam electrically connects the second end of second storage capacitors;
3rd sub-pixel includes the 3rd switch, the 3rd liquid crystal capacitance and the 3rd storage capacitors, and the first end of the 3rd switch connects
Scan line is connected to, the second end of the 3rd switch is connected to data wire, and a three-terminal link of the 3rd switch is in the 3rd liquid crystal capacitance
First end and the 3rd storage capacitors first end, the second capacitor storage beam electrically connects the second end of the 3rd storage capacitors;
4th sub-pixel includes the 4th switch, the 4th liquid crystal capacitance and the 4th storage capacitors, and the first end of the 4th switch connects
Scan line is connected to, the 4th end of the 4th switch is connected to data wire, and the three-terminal link of the 4th switch is in the 4th liquid crystal capacitance
The first end of first end and the 4th storage capacitors, the first capacitor storage beam electrically connects the second end of the 4th storage capacitors;
When scanning linear enable, first switch component, second switch component, the 3rd switch module and the 4th switch module are
Conducting, so that incoming first sub-pixel of the signal of data wire, the second sub-pixel, the 3rd sub-pixel and the 4th sub-pixel, when this is swept
Take aim at after line solution energy, the first capacitor storage beam, the second capacitor storage beam, the level of the 3rd capacitor storage beam and the 4th capacitor storage beam
Change respectively, to cause the pixel voltage of the first sub-pixel to have the first offset voltage, the pixel of the second sub-pixel with input voltage
Voltage has the offset voltage with input voltage, and pixel voltage and the input voltage of the 3rd sub-pixel have the 3rd offset voltage, the 4th
The pixel voltage of sub-pixel has the 4th offset voltage with input voltage, to cause pixel voltage, the second sub- picture of the first sub-pixel
The pixel voltage of element, the pixel voltage of the pixel voltage and the 4th sub-pixel of the 3rd sub-pixel are different, and the first skew electricity
Pressure, the second offset voltage, the 3rd offset voltage and the 4th offset voltage are different.
The embodiment of the present invention provides a kind of osteoacusis means of communication based on Internet of Things, including:
The earphone signal for providing microphone signal by headset unit and providing controller described in voice is converted into accordingly
Voice;
The microphone signal that headset unit is transmitted is controlled by voice controller, detect, communicated;Signal is changed
Into data signal, Real Time Compression is carried out, becomes the small data of data volume, main frame is sent to by communication system;
Voice signal is received by signal receiving module;
Voice signal is encrypted by encrypting module;
Digital signal data transmitting-receiving is carried out by radio receiving transmitting module;
Stored voice message is carried out by data management module;
By mobile terminal to receiving data signal and main frame progress data that voice controller is sent by communication system
It is shared.
Osteoacusis communication system based on Internet of Things and the means of communication that the present invention is provided, solve existing radio communication
The problem of communication system can not being encrypted in system, while solving existing digital acoustic control bone conduction earphone systemic-function list
One, it is impossible to changed desired content automatically according to customer demand;Intercom or other communication apparatus can not be coordinated to realize can
The problem of by with flexible communication.The intrusion of invalid radio signal in the Internet of Things is effectively protected, to effective radio
Signal is protected, and the position of radio mobile terminal can be monitored in real time, and combine encryption system to external entering signal
Position be marked, it is to avoid unnecessary loss.The control system is easy to operate, with good applicability.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention
Any modifications, equivalent substitutions and improvements made within refreshing and principle etc., should be included in the scope of the protection.
Claims (5)
1. a kind of osteoacusis communication system based on Internet of Things, it is characterised in that the osteoacusis communication system based on Internet of Things
System includes:
Headset unit, the earphone signal for providing microphone signal for voice controller and providing controller described in voice turns
Change corresponding voice into;
Voice controller, the control of the microphone signal transmitted for headset unit, detection, communication task;Convert the signal into
Data signal, carries out Real Time Compression, becomes the small data of data volume, main frame is sent to by communication system;
The encryption method of the voice controller specifically includes following steps:
Step 1: defining random function funA, according to the length of video file, produce some to random integers (x, y), deposit collection
Close in S { }, and set S is saved in database in corresponding video file attributes field, control generation video-encryption file
The Y value of size<10;
Step 2: reading video file stream by byte, the information from database according to video file reads the set S of deposit
{ }, obtains all random numbers pair;
Step 3: according to data to (x, y), the X position in file stream writes the random string of Y length, file stream is write
Enter in encrypted video file stream;
Step 4: repeat step three, until file read-write is completed;
Signal receiving module, and the headset unit, voice controller data cube computation, for receiving voice signal;
Encrypting module is connected with the signal receiving module, for voice signal to be encrypted;
The encryption method of the encrypting module includes:
1) CA initialization modules, run Setup_CA (1λ);
Select security parameter 1λ, and selecting rank to be prime number p, the group G that generation member is g defines a bilinear map e:G×G→
G1, it is allowed to meet bilinearity, non-degeneracy and computability.Select a hash function H:{ 0,1 }*→G.Determine in system
The set I of all properties;Token tree is initialized according to attribute authority (aa) AA number, is that each attribute authority (aa) AA determines private key
SK, and SKWith the random key RK of the leaf node of token treejMap one by one.Minimum vertex-covering key set MCKS is determined, G (x) generations are made
AA of the table comprising attribute x set, φ (x) is the set of leaf node corresponding with AA in attribute group G (x) in token tree,For the set of minimum vertex-covering φ (x) nodes in token tree, then minimum vertex-covering key set MCKSxRepresentIn all sections
The combination of corresponding random key is put, then MCKS={ MCKSx}x∈I.Token chain collection TCS is determined, n is madeiFor certain leaf in token tree
Node, then TCSiRepresent niThe set of all tokens passed through to root node, TCS={ TCSi}i∈I.For each attribute x ∈ I,
Determine a trapdoor TDx, with minimum vertex-covering key set MCKSxThe key of the inside encrypts trapdoor, obtains the corresponding trapdoors of attribute x
Information TDMx, generate trapdoor public key Publish PP={ e (g, g)α, TCS, gβ,gα, GTDM, H }, retain master key MSK=(α, β, { TDx}x∈I);
①AAKRegistered to CA, CA operation AA_Reg_CA () are specific as follows:CA verifies AAKIdentity information, be proved to be successful, then will
AAKThe key of corresponding leaf node, the attribute set I of managementK, and the corresponding trap door information of attributeIt will obtain
'sIt is sent to AAK。
2. user registers to CA, CA operation User_Reg_CA (ID), and the true identity ID of user is after ca authentication, by the user
After the starting termination time of mandate and the identity of user are signed through CA, obtain certificate Cert and certificate is returned into user (wherein
Cert=ID | | tb | | te | | SKCA(ID||tb||te));
2) AA initialization modules, run AA_Setup () function, described in detail below:Select the broadcast enciphering side based on group
Case is rightAAKFor each attribute x, a group is determined.By its corresponding trap door information of management attribute attributeWith attribute private key ATx,KTDM is obtained after encryptionX, version 1, send it to CSP, AAKFor its managed it is every
One attribute is calculated
3) key production module, when there is user ujDuring registration, AAKRun Key_Gen (Cert) function;Specifically such as
Under:AAKIts certificate is verified, if being u after correctjEach attribute x randomly selectCalculate AndObtain private key for user skj,k,
By skj,kUser is sent to, wherein
4) encrypting module, and input clear-text message m, system common parameter PP, data owner's operation Encrypt (PP, m), specifically
It is as follows:
Symmetric cryptographic key k is selected, E is obtained to confidential information m symmetric cryptographiesK(m);Access control policy Γ=(M, ρ) is constructed,
Wherein M is l × d matrix, and symmetric cryptographic key k is carried out into encryption attribute.Randomly select s ∈ zp, note vectorThenCalculate C=ke (g, g)αs, to all category being related in access control policy
Property, its corresponding attribute public key GTDM is obtained, and calculate(IACharacterize access control policy
In whole attributes for being related to), finally obtain ciphertext CT, and send it to Cloud Server CSP, wherein
Radio receiving transmitting module is connected with voice controller, for digital signal data transmitting-receiving;
Data management module, for stored voice message;
Mobile terminal, is connected with voice controller, and the data signal sent for receiving voice controller by communication system is simultaneously
Data sharing is carried out with main frame.
2. the osteoacusis communication system as claimed in claim 1 based on Internet of Things, it is characterised in that in the voice controller
Put frequency analysis unit, phase curve computing unit, error calculation unit, voice signal recognition unit;
Described frequency analysis unit, analyzes the frequency signal of voice signal;
Described phase curve computing unit, calculates the phase approximate with the time change progress of the phase of the frequency signal bent
Line;
Described error calculation unit, is calculated the error between the phase of the phase curve and the frequency signal;
Described voice signal recognition unit, based on the error to the voice signal whether be periodic sound signal carry out
Identification.
3. the osteoacusis communication system as claimed in claim 1 based on Internet of Things, it is characterised in that the main frame includes:
First sound channel terminal, second sound channel terminal and microphone terminal;
Data transmission blocks, the data transmission blocks are electrically connected with the microphone terminal, to send data to mobile terminal;
Data reception module, the data reception module is electrically connected with the second sound channel terminal, and the movement is come to receive
The data of terminal;
Security authentication module, the security authentication module is electrically connected with the data transmission blocks and the data reception module,
Electricity-fetching module, the input of the electricity-fetching module is electrically connected with the first sound channel terminal;The output of the electricity-fetching module
Hold to the data transmission blocks, data reception module, security authentication module and power.
4. the osteoacusis communication system as claimed in claim 1 based on Internet of Things, it is characterised in that the data of voice controller
Scan line includes data wire, scan line and pixel;
Pixel, is formed at data wire and the infall of scan line, including the first sub-pixel, the second sub-pixel, the 3rd sub-pixel,
Four sub-pixels;
First sub-pixel includes first switch, the first liquid crystal capacitance and the first storage capacitors, and the first end of first switch is connected to
Scan line, the second end of first switch is connected to data wire, and the three-terminal link of first switch is in the first of the first liquid crystal capacitance
End and the first end of the first storage capacitors;
Second sub-pixel includes second switch, the second liquid crystal capacitance and the second storage capacitors, and the first end of second switch is connected to
Scan line, the second end of second switch is connected to data wire, and the three-terminal link of second switch is in the first of the second liquid crystal capacitance
End and the first end of the second storage capacitors, the second capacitor storage beam electrically connect the second end of second storage capacitors;
3rd sub-pixel includes the 3rd switch, the 3rd liquid crystal capacitance and the 3rd storage capacitors, and the first end of the 3rd switch is connected to
Scan line, the second end of the 3rd switch is connected to data wire, a three-terminal link of the 3rd switch in the 3rd liquid crystal capacitance the
One end and the first end of the 3rd storage capacitors, the second capacitor storage beam electrically connect the second end of the 3rd storage capacitors;
4th sub-pixel includes the 4th switch, the 4th liquid crystal capacitance and the 4th storage capacitors, and the first end of the 4th switch is connected to
Scan line, the 4th end of the 4th switch is connected to data wire, and the three-terminal link of the 4th switch is in the first of the 4th liquid crystal capacitance
End and the first end of the 4th storage capacitors, the first capacitor storage beam electrically connect the second end of the 4th storage capacitors;
When scanning linear enable, first switch component, second switch component, the 3rd switch module and the 4th switch module are to lead
It is logical, so that incoming first sub-pixel of the signal of data wire, the second sub-pixel, the 3rd sub-pixel and the 4th sub-pixel, when this is scanned
After line solution energy, the first capacitor storage beam, the second capacitor storage beam, the level point of the 3rd capacitor storage beam and the 4th capacitor storage beam
Do not change, to cause the pixel voltage of the first sub-pixel to have the first offset voltage, the pixel electricity of the second sub-pixel with input voltage
Pressure has the offset voltage with input voltage, and pixel voltage and the input voltage of the 3rd sub-pixel have the 3rd offset voltage, the 4th son
The pixel voltage of pixel has the 4th offset voltage with input voltage, to cause pixel voltage, the second sub-pixel of the first sub-pixel
Pixel voltage, the pixel voltage and the 4th sub-pixel of the 3rd sub-pixel pixel voltage it is different, and the first offset voltage,
Second offset voltage, the 3rd offset voltage and the 4th offset voltage are different.
5. a kind of means of communication of the osteoacusis communication system as claimed in claim 1 based on Internet of Things, its feature exists, described
The osteoacusis means of communication based on Internet of Things include:
The earphone signal for providing microphone signal by headset unit and providing controller described in voice is converted into corresponding voice;
The microphone signal that headset unit is transmitted is controlled by voice controller, detect, communicated;Convert the signal into number
Word signal, carries out Real Time Compression, becomes the small data of data volume, main frame is sent to by communication system;
Voice signal is received by signal receiving module;
Voice signal is encrypted by encrypting module;
Digital signal data transmitting-receiving is carried out by radio receiving transmitting module;
Stored voice message is carried out by data management module;
By mobile terminal to receiving the data signal and main frame progress data sharing that voice controller is sent by communication system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710339399.XA CN107204186A (en) | 2017-05-15 | 2017-05-15 | A kind of osteoacusis communication system and the means of communication based on Internet of Things |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710339399.XA CN107204186A (en) | 2017-05-15 | 2017-05-15 | A kind of osteoacusis communication system and the means of communication based on Internet of Things |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107204186A true CN107204186A (en) | 2017-09-26 |
Family
ID=59905273
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710339399.XA Pending CN107204186A (en) | 2017-05-15 | 2017-05-15 | A kind of osteoacusis communication system and the means of communication based on Internet of Things |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107204186A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109451254A (en) * | 2018-12-14 | 2019-03-08 | 广州市科虎电子有限公司 | A kind of smart television digital receiver |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101272154A (en) * | 2008-05-06 | 2008-09-24 | 梁怡 | Anti-noise wireless communication ear shield device |
CN105381556A (en) * | 2015-11-19 | 2016-03-09 | 宁波祖创电子科技有限公司 | Intelligent wearable type air purifier |
CN205160743U (en) * | 2015-11-12 | 2016-04-13 | 范伏清 | Multi -functional osteoacusis bluetooth headset |
CN105574966A (en) * | 2015-12-15 | 2016-05-11 | 宁波保众应急科技有限公司 | Intelligent mobile phone door lock |
CN105592100A (en) * | 2016-01-26 | 2016-05-18 | 西安电子科技大学 | Government services cloud access control method based on attribute encryption |
CN106254895A (en) * | 2016-07-21 | 2016-12-21 | 重庆科技学院 | A kind of for audio frequency and video Mp4 file encryption decryption system |
CN106302890A (en) * | 2016-08-09 | 2017-01-04 | 苏州倍声声学技术有限公司 | A kind of bone conduction talkback system |
-
2017
- 2017-05-15 CN CN201710339399.XA patent/CN107204186A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101272154A (en) * | 2008-05-06 | 2008-09-24 | 梁怡 | Anti-noise wireless communication ear shield device |
CN205160743U (en) * | 2015-11-12 | 2016-04-13 | 范伏清 | Multi -functional osteoacusis bluetooth headset |
CN105381556A (en) * | 2015-11-19 | 2016-03-09 | 宁波祖创电子科技有限公司 | Intelligent wearable type air purifier |
CN105574966A (en) * | 2015-12-15 | 2016-05-11 | 宁波保众应急科技有限公司 | Intelligent mobile phone door lock |
CN105592100A (en) * | 2016-01-26 | 2016-05-18 | 西安电子科技大学 | Government services cloud access control method based on attribute encryption |
CN106254895A (en) * | 2016-07-21 | 2016-12-21 | 重庆科技学院 | A kind of for audio frequency and video Mp4 file encryption decryption system |
CN106302890A (en) * | 2016-08-09 | 2017-01-04 | 苏州倍声声学技术有限公司 | A kind of bone conduction talkback system |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109451254A (en) * | 2018-12-14 | 2019-03-08 | 广州市科虎电子有限公司 | A kind of smart television digital receiver |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108270571B (en) | Internet of Things identity authorization system and its method based on block chain | |
CN106789047B (en) | A kind of block chain identification system | |
Srinivas et al. | Anonymous lightweight chaotic map-based authenticated key agreement protocol for industrial Internet of Things | |
CN107017993A (en) | A kind of multi-party joint key is produced and digital signature method and system | |
CN103931220B (en) | For the cipher key derivation function of network communication | |
CN109936547A (en) | Identity identifying method, system and calculating equipment | |
CN106878318A (en) | A kind of block chain real time polling cloud system | |
CN109086615A (en) | A kind of support multiple key search public key encryption method of anti-keyword guessing attack | |
CN106059757A (en) | Audio and video monitoring device, data encryption and decryption method, and audio and video display device | |
CN109495250A (en) | Anti- quantum calculation wired home communication means based on key card | |
CN104994110A (en) | Method for assigning verifier for auditing cloud storage data | |
US20120014520A1 (en) | Biometric encryption and key generation | |
CN105978695A (en) | Batch self-auditing method for cloud storage data | |
CN102594551B (en) | Method for reliable statistics of privacy data on radio frequency identification (RFID) tag | |
CN103634796A (en) | Space information network roaming and trusted security access method | |
CN105610773A (en) | Communication encryption method of electric energy meter remote meter reading | |
CN109951513A (en) | Anti- quantum calculation wired home quantum cloud storage method and system based on quantum key card | |
CN104602015A (en) | Real-time video monitoring encryption and authentication method | |
CN105141419B (en) | The attribute base endorsement method and system in large attribute domain | |
CN105635135A (en) | Encryption system based on attribute sets and relational predicates and access control method | |
CN107493168A (en) | Quanta identity authentication method and its application process during quantum key distribution | |
CN110972136A (en) | Internet of things safety communication module, terminal, safety control system and authentication method | |
CN112597542B (en) | Aggregation method and device of target asset data, storage medium and electronic device | |
CN105897784A (en) | Internet of things terminal equipment encryption communication method and device | |
CN110402560A (en) | System and method in the authentication key exchange scheme of identity-based with forward security for calculating publicly-owned session key |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170926 |
|
WD01 | Invention patent application deemed withdrawn after publication |