CN115643014B - Secret voice transmission method in earphone set and encrypted earphone - Google Patents

Secret voice transmission method in earphone set and encrypted earphone Download PDF

Info

Publication number
CN115643014B
CN115643014B CN202211277072.1A CN202211277072A CN115643014B CN 115643014 B CN115643014 B CN 115643014B CN 202211277072 A CN202211277072 A CN 202211277072A CN 115643014 B CN115643014 B CN 115643014B
Authority
CN
China
Prior art keywords
voice
key
earphone
ciphertext
security chip
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211277072.1A
Other languages
Chinese (zh)
Other versions
CN115643014A (en
Inventor
范犇
田阳柱
徐红星
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changjiang Quantum Wuhan Technology Co ltd
Original Assignee
Changjiang Quantum Wuhan Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changjiang Quantum Wuhan Technology Co ltd filed Critical Changjiang Quantum Wuhan Technology Co ltd
Priority to CN202211277072.1A priority Critical patent/CN115643014B/en
Publication of CN115643014A publication Critical patent/CN115643014A/en
Application granted granted Critical
Publication of CN115643014B publication Critical patent/CN115643014B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

According to the secret voice transmission method in the earphone set and the encryption earphone, the safety chip is arranged in the earphone, voice is encrypted by using the local key formed by the quantum key filled by the safety chip, and the encrypted voice cannot be cracked due to the true random characteristic of the quantum key; the local key for implementing encryption and the local key for implementing decryption are formed based on the same key handle, and a symmetric encryption mode is adopted, so that the encryption speed is high, and the communication speed can be improved compared with asymmetric encryption when the local key is applied to earphone communication; in addition, the secret key is not required to be transmitted through a wireless network, but is preset in the earphone, so that illegal theft is avoided, and the communication safety is further ensured; before use, the earphone of the two communication parties does not need to be paired to acquire the public key, so that the voice secret transmission operation is convenient.

Description

Secret voice transmission method in earphone set and encrypted earphone
Technical Field
The invention relates to the technical field of quantum encryption communication, in particular to a voice secret transmission method in an earphone set and an encryption earphone.
Background
The voice secret transmission method for the earphone disclosed in the prior art is that the calling-end earphone and the receiving-end earphone are paired to enable the two parties to obtain a public key related to the ID of the opposite party, the calling-end earphone encrypts a voice call by using the public key, the voice call is sent to the receiving-end earphone through a smart phone connected with the two parties, and the receiving-end earphone decrypts the voice call by using a prestored private key to obtain a call plaintext, so that voice secret transmission is realized. According to the method, the public key is obtained, the earphone of the two communication parties is required to be paired in advance, so that voice secret transmission operation is complex, an asymmetric encryption algorithm is complex, and the problem of communication delay is easy to occur when the method is applied to earphone communication.
Disclosure of Invention
The invention provides a secret voice transmission method in a headset and an encryption earphone.A safety chip is arranged in the earphone, voice is encrypted by a local key formed by a quantum key filled by the safety chip, and the encrypted voice cannot be cracked due to the true random characteristic of the quantum key; the encryption mode of symmetric encryption is adopted, so that the encryption speed is high, and compared with asymmetric encryption, the communication speed can be improved when the method is applied to earphone communication; the secret key is not required to be transmitted through a wireless network, so that illegal stealing is avoided, and the communication safety is ensured; the secret key is preset in the earphone, and the public key is acquired without pairing the earphone of the two parties before use, so that voice secret transmission operation is convenient and fast.
The first aspect of the present invention provides a secret voice transmission method in an earphone set, where the earphone set includes a first earphone and a second earphone, the first earphone is internally provided with a first security chip pre-filled with a first quantum key, the second earphone is internally provided with a second security chip pre-filled with a second quantum key, and the first quantum key and the second quantum key are different; the voice secret transmission method comprises the following steps:
s101: inputting the voice through the first earphone, forming a first voice ciphertext after being encrypted by the first security chip, and transmitting the first voice ciphertext to a server;
s102: after decrypting the first voice ciphertext, forming a third local key according to a second key handle associated with the second security chip, and encrypting the voice by using the third local key to form a second voice ciphertext;
s103: and transmitting the second voice ciphertext to the second earphone, decrypting the fourth local key generated by the second security chip, and then broadcasting the decrypted fourth local key to the user.
Further, the step S101 specifically includes:
s1011: the first security chip receives the voice to generate a first key handle, and writes the first key handle into the data head or the data tail of the voice data packet;
s1012: the first security chip forms a first local key based on the first quantum key according to the first key handle, encrypts a data part of the voice data packet by using the first local key to form the first voice ciphertext, and transmits the first voice ciphertext to the server.
Further, the server is connected with a cryptographic engine, and the cryptographic engine at least stores the corresponding relation between the first security chip and the first quantum key and the corresponding relation between the second security chip and the second quantum key; the step S102 specifically includes:
s1021: the server sends the first voice ciphertext to the password management machine;
s1022: the cryptographic engine forms a second local key according to the first key handle, and decrypts the first voice ciphertext by using the second local key;
s1023: the cryptographic engine generates the second key handle, forms the third local key based on the second quantum key according to the second key handle, encrypts the voice by using the third local key to form the second voice ciphertext, and transmits the second voice ciphertext back to the server.
Further, the step S103 specifically includes:
s1031: the second security chip obtains the second key handle and forms the fourth local key according to the second key handle;
s1032: and after decrypting the second voice ciphertext by using the fourth local key, broadcasting the voice to the user.
Further, the server stores at least the correspondence between the first security chip and the first quantum key, and the correspondence between the second security chip and the second quantum key; the step S102 specifically includes:
s1025: the server forms a second local key according to the first key handle, and decrypts the first voice ciphertext by using the second local key;
s1026: the server generates the second key handle, forms the third local key based on the second quantum key according to the second key handle, encrypts the voice using the third local key to form the second voice ciphertext.
Further, the first earphone is in communication connection with a first terminal, and the first voice ciphertext is wirelessly transmitted to the server through the first terminal;
the second earphone is in communication connection with a second terminal, and the second voice ciphertext is transmitted to the second earphone through the second terminal.
Further, the first terminal and the second terminal are both provided with encryption programs, the encryption programs are operated, the earphone set executes a secret communication mode, and otherwise, the earphone set executes a common communication mode.
Further, in the secure communication mode, before the first terminal and the second terminal communicate by voice, the second terminal is added to a communication object list in an encryption program of the first terminal.
Further, the step S101 specifically includes:
s1013: the first security chip receives the voice to generate a first key handle;
s1014: the first security chip generates a first local key based on the first quantum key according to the first key handle, and encrypts the voice data packet by using the first local key to form the first voice ciphertext;
s1015: and packaging the first key handle and the first code of the first security chip into a first data packet, and transmitting the first voice ciphertext and the first data packet to the server.
The second aspect of the present invention provides an encryption earphone, at least comprising a communication interface, an acquisition unit, a storage unit, a security chip and a processing unit, wherein the communication interface is used for being in communication connection with a terminal, the acquisition unit is used for acquiring user voice, the storage unit is used for storing an encryption program, the security chip is used for storing a quantum key and processing encryption and decryption of the voice, and the processing unit is used for implementing the steps of the voice secret transmission method when executing the encryption program.
According to the secret voice transmission method in the earphone set and the encryption earphone, the safety chip is arranged in the earphone, voice is encrypted by using the local key formed by the quantum key filled by the safety chip, and the encrypted voice cannot be cracked due to the true random characteristic of the quantum key; the local key for implementing encryption and the local key for implementing decryption are formed based on the same key handle, and the symmetric encryption mode is adopted, so that the encryption speed is high, and the communication speed can be improved compared with asymmetric encryption when the method is applied to earphone communication; in addition, the secret key is not required to be transmitted through a wireless network, but is preset in the earphone, so that illegal theft is avoided, and the communication safety is further ensured; before use, the earphone of the two communication parties does not need to be paired to acquire the public key, so that the voice secret transmission operation is convenient.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions of the prior art, the drawings which are used in the description of the embodiments or the prior art will be briefly described, it being obvious that the drawings in the description below are only some embodiments of the invention, and that other drawings can be obtained according to these drawings without inventive faculty for a person skilled in the art.
FIG. 1 is a flow chart of a voice secure transmission method according to an embodiment of the invention.
Fig. 2 is a flowchart of step S101 of the voice secure transmission method according to an embodiment of the present invention.
Fig. 3 is a flowchart of step S102 of the voice secure transmission method according to an embodiment of the present invention.
Fig. 4 is a flowchart of step S103 of the voice secure transmission method according to an embodiment of the present invention.
Fig. 5 is a flowchart of step S102 of the voice secure transmission method according to another embodiment of the present invention.
Fig. 6 is a flowchart of step S101 of the voice secure transmission method according to another embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
In the description of the present specification, the terms "first," "second," and the like are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include one or more such feature.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used herein in the description of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention.
The first aspect of the present invention provides a method for securely transmitting voice in an earphone set, where the earphone set includes a first earphone and a second earphone, the first earphone is internally provided with a first security chip pre-filled with a first quantum key, the second earphone is internally provided with a second security chip pre-filled with a second quantum key, and the first quantum key and the second quantum key are different. The first quantum key and the second quantum key are generated by the quantum random number generator and are filled into the security chip through the key filling machine, and when the key is filled, the secret management machine connected with the quantum random number generator records the corresponding relation between the filled quantum key and the security chip, for example, the secret management machine at least records the corresponding relation between the first quantum key and the first identity code of the first security chip and the corresponding relation between the second quantum key and the second identity code of the second security chip. Because the quantum random number generator generates true random numbers based on the quantum physical principle, the true random numbers form a quantum key, and therefore the quantum key has true random characteristics, and the quantum keys filled by different security chips are different. The first security chip and the second security chip are also internally provided with the same symmetric encryption and decryption algorithm, such as SM4, and when data encryption or decryption is needed, data characters and quantum keys are substituted into the symmetric encryption and decryption algorithm to realize.
The earphone set has two modes of secret communication and common communication, the first earphone is in communication connection with the first terminal, the second earphone is in communication connection with the second terminal, the first terminal and the second terminal are both provided with encryption programs, the encryption programs are operated, the earphone set executes the secret communication mode, and otherwise, the earphone set executes the common communication mode. Specifically, for the secret communication mode, the first earphone is connected with the first terminal through bluetooth, an encryption program is started at the first terminal, the first terminal obtains the equipment code of the first earphone and displays the equipment code on a login interface of the encryption program, when a user correctly inputs the login code, the equipment code of the earphone can be identical to the identity code of the encryption chip, and then the equipment code of the first earphone enters a function interface of the encryption program. Before the first terminal and the second terminal carry out voice secret communication, the second terminal is added to a communication object list in an encryption program of the first terminal, and the first earphone can only establish secret communication with a second earphone connected with the second terminal in the list. In the voice secret communication process, both communication parties need to wear the earphone in the invention, otherwise, the data encrypted by the earphone of one party cannot be decrypted and output to the other party. For the common communication mode, after the first earphone is connected with the first terminal Bluetooth, the first earphone can perform voice communication with a communication object added in any setting of the first terminal without running an encryption program, and in the mode, voice data is not encrypted in the transmission process. The first earphone and the second earphone in the invention can be wireless earphone, such as Bluetooth earphone, and also can be wired earphone. The earphone set provided by the invention has two modes of secret communication and common communication, so that the use requirements of users in multiple scenes are fully met.
As shown in fig. 1 to 6, the voice secret transmission method includes:
step S101: inputting the voice through the first earphone, forming a first voice ciphertext after being encrypted by the first security chip, and transmitting the first voice ciphertext to a server;
in a specific embodiment, as shown in fig. 2, step S101 includes:
s1011: the user inputs voice through the first earphone, the voice is sent to the first security chip after analog-to-digital conversion, the first security chip receives the voice to generate a first key handle, and the first key handle is written into the data head or the data tail of the voice data packet. It will be appreciated that the data packet generally includes a data header and a data portion, or includes a data header, a data portion and a data trailer, with encryption and decryption operations being performed on the data portion;
s1012: the first security chip obtains a first key handle from a data head or a data tail, forms a first local key based on the first quantum key according to the first key handle, records at least a key offset, if the key offset is 8, the first security chip intercepts 128 bits from the 9 th bit of the first quantum key to form a first local key, encrypts a data part of the voice data packet by using the first local key, and the data part of the voice data packet and the data head, or splices the data part of the voice data packet, the data head and the data tail to form the first voice ciphertext and transmits the first voice ciphertext to the server. In practice, the first identity code may be encapsulated into a data packet while the first voice ciphertext is transmitted, and the data packet may be transmitted to the server via the first terminal wirelessly, or may be directly transmitted to the server.
In other embodiments, as shown in fig. 6, step S101 may also be implemented as:
s1013: the first security chip receives the voice to generate a first key handle;
s1014: the first security chip generates a first local key based on the first quantum key according to the first key handle, encrypts the voice data packet by using the first local key to form the first voice ciphertext, and can encrypt only a data part of the data packet or encrypt the whole data packet at the moment;
s1015: and packaging the first key handle and the first code of the first security chip into a first data packet, and transmitting the first voice ciphertext and the first data packet to the server.
This embodiment differs from the previous embodiment in that the embodiment does not write the first key handle to the voice data packet, but rather is packaged separately into a data packet. Both embodiments enable the process of encrypting speech using a local key.
Step S102: after decrypting the first voice ciphertext, forming a third local key according to a second key handle associated with the second security chip, and encrypting the voice by using the third local key to form a second voice ciphertext;
in a specific embodiment, the server is connected to a cryptographic engine, as shown in fig. 3, and step S102 specifically includes:
s1021: the server receives a first voice ciphertext and sends the first voice ciphertext to the password management machine;
s1022: because the data packet for packaging the first identity code is not encrypted, the encryption management machine obtains the first identity code, positions the first identity code to the first quantum key content, forms a second local key according to the first key handle recorded by the data head or the data tail which is not encrypted, and decrypts the first voice ciphertext by using the second local key to obtain the voice plaintext. It can be understood that the first local key and the second local key are formed based on the first quantum key and the first key handle, so that the first quantum key and the second quantum key are the same, and can mutually realize the reciprocal operation of encryption and decryption, namely, the invention adopts a symmetrical encryption mode, and has high encryption speed and high communication speed;
s1023: after the encryption pipe machine obtains the voice plaintext, a second key handle is generated, the second key handle is written into the data head or the data tail of the voice data packet, the third local key is formed based on the second quantum key according to the second key handle, the data part of the voice data packet and the data head of the voice data packet or the data part of the voice data packet, the data head and the data tail are spliced to form the second voice ciphertext, and the second voice ciphertext and the second identity coding data packet are transmitted back to the server. In other cases, the second key handle and the second identity code may be packaged as separate data packets, and transmitted back to the server together with the second voice ciphertext.
In other embodiments, the voice secret transmission method is implemented without a secret manager, and the server stores at least the correspondence between the first security chip and the first quantum key and the correspondence between the second security chip and the second quantum key, as shown in fig. 5, in this embodiment, the S102 is specifically implemented as:
s1025: the server receives the first voice ciphertext, forms a second local key based on the first quantum key according to the first key handle recorded by the data head or the data tail, and decrypts the first voice ciphertext by using the second local key.
S1026: the server generates the second key handle, forms the third local key based on the second quantum key according to the second key handle, encrypts the voice using the third local key to form the second voice ciphertext.
Step S103: and the server transmits the second voice ciphertext to the second earphone, and the fourth local key generated by the second security chip is decrypted and then is broadcast to the user.
In a specific embodiment, as shown in fig. 4, step S103 includes:
s1031: the server may transmit the second voice ciphertext to the second terminal, and then the second terminal transmits the second voice ciphertext to the second earphone, or may directly transmit the second voice ciphertext to the second earphone, where the second key handle may be written in a data header or a data tail of the voice data packet, and when the second voice ciphertext is transmitted, the second key handle may be transmitted to the second earphone, or may be separately packaged into a data packet or packaged together with the second identity code to form a data packet, and when the second voice ciphertext is transmitted, the second security chip inside the second earphone receives the second voice ciphertext, obtains the second key handle from the data header or the data tail of the second voice ciphertext, and locates to the second quantum key content based on the second identity code, and forms the fourth local key according to the second key handle, and in other cases, the second security chip may further obtain the second key handle from the data packet.
S1032: and after decrypting the second voice ciphertext by using the fourth local key, broadcasting the voice to the user. It will be appreciated that the third local key and the fourth local key are each formed based on the second quantum key and the second key handle, and thus are identical, enabling reciprocal operations of encryption and decryption to be performed.
According to the secret voice transmission method in the earphone set, the safety chip is arranged in the earphone, voice is encrypted by using the local key formed by the quantum key filled by the safety chip, and the encrypted voice cannot be cracked due to the true random characteristic of the quantum key; the local key for implementing encryption and the local key for implementing decryption are formed based on the same key handle, and the symmetric encryption mode is adopted, so that the encryption speed is high, and the communication speed can be improved compared with asymmetric encryption when the method is applied to earphone communication; in addition, the secret key is not required to be transmitted through a wireless network, but is preset in the earphone, so that illegal theft is avoided, and the communication safety is further ensured; before use, the earphone of the two communication parties does not need to be paired to acquire the public key, so that the voice secret transmission operation is convenient.
The second aspect of the present invention provides an encryption earphone, at least comprising a communication interface, an acquisition unit, a storage unit, a security chip and a processing unit, wherein the communication interface is used for being in communication connection with a terminal, the acquisition unit is used for acquiring user voice, the storage unit is used for storing an encryption program, the security chip is used for storing a quantum key and processing encryption and decryption of the voice, and the processing unit is used for implementing the steps of the voice secret transmission method when executing the encryption program.
It should be noted that, step numbers S101 to S103, S1011 to S1012, S1021 to S1023, S1031 to S1032, S1025 to S1026, and S1013 to S1015 are only used to indicate a part of the operation of the voice secret transmission method, and the execution sequence is not limited to be executed in the described sequence.
The encryption and decryption implemented by using the key mentioned in the present invention actually means that the character and the key of the data to be encrypted are substituted into a preset encryption and decryption algorithm.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present invention, and not for limiting the same; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the invention.

Claims (4)

1. The method for secret transmission of voice in the earphone set is characterized in that the earphone set comprises a first earphone and a second earphone, the first earphone is in communication connection with a first terminal, the second earphone is in communication connection with a second terminal, the first terminal and the second terminal are both provided with encryption programs, the encryption programs are operated, the earphone set executes a secret communication mode, otherwise, a common communication mode is executed, and in the secret communication mode, before the first terminal and the second terminal are in voice communication, the second terminal is added to a communication object list in the encryption programs of the first terminal; wherein, the liquid crystal display device comprises a liquid crystal display device,
the first earphone is internally provided with a first security chip pre-filled with a first quantum key, the second earphone is internally provided with a second security chip pre-filled with a second quantum key, the first quantum key and the second quantum key are different, a server in communication connection with the earphone set at least stores the corresponding relation between the first security chip and the first quantum key and the corresponding relation between the second security chip and the second quantum key, or the server is connected with a secret pipe machine which at least stores the corresponding relation between the first security chip and the first quantum key and the corresponding relation between the second security chip and the second quantum key; the voice secret transmission method comprises the following steps:
s101: inputting the voice through the first earphone, receiving the voice by the first security chip to generate a first key handle, forming a first local key based on the first quantum key according to the first key handle, writing the first key handle into a data head or a data tail of the voice data packet, encrypting a data part of the voice data packet by using the first local key to form a first voice ciphertext, and transmitting the first voice ciphertext to a server through the first terminal in a wireless manner, or packaging the first key handle and a first code of the first security chip into a first data packet, encrypting the voice data packet by using the first local key to form the first voice ciphertext, and transmitting the first voice ciphertext and the first data packet to the server through the first terminal;
s102: after the server decrypts the first voice ciphertext, or the server sends the first voice ciphertext to the cryptographic engine, after the cryptographic engine decrypts the first voice ciphertext, the server or the cryptographic engine forms a third local key according to a second key handle associated with the second security chip, and encrypts the voice by using the third local key to form a second voice ciphertext;
s103: and the second voice ciphertext is transmitted to the second earphone through the second terminal, the second security chip acquires the second key handle, forms a fourth local key based on the second quantum key according to the second key handle, decrypts the second voice ciphertext by using the fourth local key, and broadcasts the voice to the user.
2. The voice secret transmission method according to claim 1, wherein if the server is connected to the cryptographic engine, the step S102 specifically includes:
s1021: the server sends the first voice ciphertext to the password management machine;
s1022: the cryptographic engine forms a second local key according to the first key handle, and decrypts the first voice ciphertext by using the second local key;
s1023: the cryptographic engine generates the second key handle, forms the third local key based on the second quantum key according to the second key handle, encrypts the voice by using the third local key to form the second voice ciphertext, and transmits the second voice ciphertext back to the server.
3. The voice secure transmission method according to claim 1, wherein if the server is not connected to the cryptographic engine, the step S102 specifically includes:
s1025: the server forms a second local key according to the first key handle, and decrypts the first voice ciphertext by using the second local key;
s1026: the server generates the second key handle, forms the third local key based on the second quantum key according to the second key handle, encrypts the voice using the third local key to form the second voice ciphertext.
4. An encrypted earphone, comprising at least a communication interface, an acquisition unit, a storage unit, a security chip and a processing unit, wherein the communication interface is used for being in communication connection with a terminal, the acquisition unit is used for acquiring user voice, the storage unit is used for storing an encryption program, the security chip is used for storing a quantum key and processing encryption and decryption of the voice, and the processing unit is used for realizing the steps of the voice secret transmission method according to any one of claims 1 to 3 when executing the encryption program.
CN202211277072.1A 2022-10-18 2022-10-18 Secret voice transmission method in earphone set and encrypted earphone Active CN115643014B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211277072.1A CN115643014B (en) 2022-10-18 2022-10-18 Secret voice transmission method in earphone set and encrypted earphone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211277072.1A CN115643014B (en) 2022-10-18 2022-10-18 Secret voice transmission method in earphone set and encrypted earphone

Publications (2)

Publication Number Publication Date
CN115643014A CN115643014A (en) 2023-01-24
CN115643014B true CN115643014B (en) 2023-06-06

Family

ID=84944463

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211277072.1A Active CN115643014B (en) 2022-10-18 2022-10-18 Secret voice transmission method in earphone set and encrypted earphone

Country Status (1)

Country Link
CN (1) CN115643014B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108667608A (en) * 2017-03-28 2018-10-16 阿里巴巴集团控股有限公司 The guard method of data key, device and system
CN112583580A (en) * 2019-09-27 2021-03-30 科大国盾量子技术股份有限公司 Quantum key processing method and related equipment

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2175579B1 (en) * 2008-10-13 2012-07-25 Adeya SA Encryption and decryption device and method for voice communications
CN106412812A (en) * 2016-11-23 2017-02-15 建荣半导体(深圳)有限公司 Bluetooth voice communication method, Bluetooth voice communication system and Bluetooth headset

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108667608A (en) * 2017-03-28 2018-10-16 阿里巴巴集团控股有限公司 The guard method of data key, device and system
CN112583580A (en) * 2019-09-27 2021-03-30 科大国盾量子技术股份有限公司 Quantum key processing method and related equipment

Also Published As

Publication number Publication date
CN115643014A (en) 2023-01-24

Similar Documents

Publication Publication Date Title
US9032208B2 (en) Communication terminal, communication system, communication method and communication program
CN108574569B (en) Authentication method and authentication device based on quantum key
CN108965302A (en) Media data transmission system, method, apparatus and storage medium
CN101335615B (en) Method used in key consultation of USB KEY audio ciphering and deciphering device
US10341305B2 (en) Encrypted communications method and communications terminal, and computer storage medium
CN110138795B (en) Multi-step mixed encryption and decryption method in communication process
CN110753321A (en) Safe communication method for vehicle-mounted TBOX and cloud server
CN106411926A (en) Data encryption communication method and system
CN109194701B (en) Data processing method and device
CN104901803A (en) Data interaction safety protection method based on CPK identity authentication technology
CN112672342B (en) Data transmission method, device, equipment, system and storage medium
CN115348579B (en) Voice encryption method applied to wireless earphone and encryption type wireless earphone
JP2020532177A (en) Computer-implemented systems and methods for advanced data security, high-speed encryption, and transmission
CN104579680A (en) Method for safe distribution of seed
CN104767766A (en) Web Service interface verification method, Web Service server and client side
KR101424972B1 (en) Method for using contents with a mobile card, host device, and mobile card
CN115334497A (en) Satellite terminal key distribution method, device and system
CN114697008A (en) Communication system and method based on quantum security SIM card, quantum security SIM card and key service platform
CN115643014B (en) Secret voice transmission method in earphone set and encrypted earphone
JP2005012466A (en) Message authentication method and system
CN111510282A (en) Information encryption algorithm and device, information decryption algorithm and device and communication method
CN111212044B (en) Data transmission method, device and storage medium
CN104243291A (en) Instant messaging method and system thereof capable of guaranteeing safety of user communication content
CN114499857A (en) Method for realizing data correctness and consistency in big data quantum encryption and decryption
CN114285557A (en) Communication encryption method, system and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant