CN204761537U - Implement mobile communication anti -eavesdrop system of encryption and decryption in bluetooth headset end - Google Patents

Implement mobile communication anti -eavesdrop system of encryption and decryption in bluetooth headset end Download PDF

Info

Publication number
CN204761537U
CN204761537U CN201520475535.4U CN201520475535U CN204761537U CN 204761537 U CN204761537 U CN 204761537U CN 201520475535 U CN201520475535 U CN 201520475535U CN 204761537 U CN204761537 U CN 204761537U
Authority
CN
China
Prior art keywords
code
bluetooth earphone
encrypt
unit
bluetooth
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201520475535.4U
Other languages
Chinese (zh)
Inventor
余俊德
余佳倩
游政贤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HAPPY HABITAT FORMOSA Co Ltd
Original Assignee
HAPPY HABITAT FORMOSA Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HAPPY HABITAT FORMOSA Co Ltd filed Critical HAPPY HABITAT FORMOSA Co Ltd
Priority to CN201520475535.4U priority Critical patent/CN204761537U/en
Application granted granted Critical
Publication of CN204761537U publication Critical patent/CN204761537U/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The utility model discloses an implement mobile communication anti -eavesdrop system of encryption and decryption in bluetooth headset end, the communication both sides all use bluetooth headset device and intelligent mobile telephone device, and wherein, the bluetooth headset device has one and encrypts and decrypt the unit to encrypt and decrypt, should encrypt and convey encrypted voice data to this intelligence mobile telephone device with the deciphering unit, and will come from this intelligence mobile telephone device and through black voice data deciphering, the voice data after the deciphering exports via the speaker.

Description

A kind of encrypting and decrypting of implementing is in the mobile communication anti-eavesdrop system of bluetooth earphone end
Technical field
The utility model relates to a kind of mobile communication anti-eavesdrop system digital voice encryption method being implemented on Bluetooth earphone device, and during by encryption method to realize mobile communication, the effect of anti-eavesdrop, belongs to Bluetooth communication and mobile communication technical field.
Background technology
General mobile phone prison (stealing) mode of listening has two kinds, for Jian Tiao unit of government, foreign Information Institutions or corporate espionage etc. are in order to its specific purposes are in switching center's machine room or set up a communication intercept system etc. voluntarily and carry out a conversation monitoring to the phone number (door number) of destination object, this kind of monitoring situation cellie cannot discover; Another kind of is private monitoring, normally mobile phone is mounted (invasion) monitoring software, common methods is for when this target mobile phones communicates, and its dialog context stealthily recorded down by this monitoring software, recording substance is reached specified mobile phone number again when stopping call or reaches in appointed website.
China's Mainland utility model patent CN102307346B (hereinafter referred to as front case) discloses a kind of mobile communication time slot scrambling and secret mobile phone, as follows from the difference of this case: structure and method this case is different, front case is implemented on mobile device inside, and this case technology is then implemented on an external bluetooth earphone inside and the mobile device one dialing application program APP that arranges in pairs or groups; The encryption technology that front case is implemented is for using circumference ratio unlimited decimal enciphered method, therefore its enciphered method only has one, this case is then that hybrid parameter method and time slot become code method Hybrid Encryption transmission, its encryption permutation and combination can reach 3, more than 400 trillion kinds, both structures and encryption, decryption method are also completely different.Therefore front case has following deficiency because being implemented on interior of mobile phone:
(1) because its encrypt and decrypt method only has one, therefore easily decrypted.
(2) compatibling problem, if first speaker is talked about to hold with receipts use different brands mobile phone, cannot implement coded communication.
(3) front case technology is implemented on mobile device internal circuit, and when user upgrades mobile device, then new cell-phone device does not have a cipher round results, and therefore consumer uses wish low.Because technology is implemented in mobile phone hardware circuit, also therefore technology cannot upgrade (Upgrade).
(4) front case does not have debug effect.
Utility model content
For effectively solving the problem, one of principal character of the present utility model has 3 for providing one, the encryption technology of more than 400 trillion kinds encrypted combination schemes, and listener is felt simply helpless; The utility model another feature is that communicating pair is sent encryption at random and checked code, even if listener employs mobile phone in the utility model and Bluetooth earphone device, this device also can send warning message, therefore, can guarantee that communication security ensures the freedom of correspondence of the people further.
An embodiment of the present utility model provides a kind of communication system, and communicating pair uses smart mobile phone in the utility model and Bluetooth earphone device, and Bluetooth earphone device is for performing encrypt voice data and decryption work.Therefore smart mobile phone need not perform encrypt voice data and decryption work, to make encrypt voice data, decryption work can be more motor-driven.
An embodiment of the present utility model discloses a kind of hybrid enciphered digital voice communication method, this method becomes the used in combination of code method for parameter enciphered method and time slot, and wherein parameter enciphered method/time slot becomes the parameter encryption mode and time slot constant value that code declaration code is this communication of first speaker notice person who accepts.
An embodiment of the present utility model provides a kind of encrypting and decrypting of implementing in the mobile communication anti-eavesdrop system of bluetooth earphone end, this system comprises first-hand machine and the first Bluetooth earphone device, wherein, this first-hand machine is the smart-phone device having bluetooth module in, this first Bluetooth earphone device comprises: a lithium ion battery, to provide electric energy needed for Bluetooth earphone device, one Bluetooth control unit, in order to be coupled to the built-in bluetooth module of this first-hand machine to transmit data, one encrypt and decrypt unit, for performing encrypt and decrypt, one the first terminal of this encrypt and decrypt unit couples this Bluetooth control unit, one second terminal couples a pickup and A/D unit, one the 3rd terminal couples a D/A and defeated sound device unit, wherein, one first encrypt voice data that this pick-up and A/D unit export by this encrypt and decrypt unit, this first speech data after encryption is sent to this first-hand machine through this Bluetooth control unit, and this Bluetooth control unit received come from this first-hand machine and an encrypted second speech data deciphering, this second speech data after deciphering exports through this D/A and defeated sound device.
In one embodiment, this mobile device sends one group of pass code to this Bluetooth earphone device, and this Bluetooth earphone device stores this mobile phone pass code and this Bluetooth earphone device product serial number code to match this mobile device and this Bluetooth earphone device.
In one embodiment, this mobile device uses at least one in following wireless technology: GSM, CDMA, CDMA2000, WCDMA, TD-SCDMA and LTE.
In one embodiment, this mobile device sends an encrypted instruction and a real-time time code to this Bluetooth earphone device, after this encrypt and decrypt unit receives this encrypted instruction, random generation one parameter enciphered method and a time slot constant are also sent one and are checked code and one enciphered method/time slot constant declarations, and export this mobile device to after being encrypted by voice input signal.
In one embodiment, this checks that code comprises synchronous code, checks the declaration of code encryption method, pass code, timing code and this Bluetooth earphone device serial number.
In one embodiment, this Bluetooth control unit can integrate this encrypt and decrypt unit is an integrated component.
In one embodiment, this encrypt and decrypt unit is a chip, and this chip comprises hardware designs to be encrypted and deciphering, and wherein this encryption method and decryption method comprise parameter enciphered method and time slot becomes code method.
Accompanying drawing explanation
Fig. 1 is the system configuration schematic diagram of the utility model first preferred embodiment;
Fig. 2 is that one in the utility model first preferred embodiment checks code data structural representation;
Fig. 3 A ~ Fig. 3 B is the data structure schematic diagram in the encrypted voice data air transmission in the utility model first preferred embodiment;
Fig. 4 checks a yard Establishing process schematic diagram in the utility model first preferred embodiment;
Fig. 5 is the enciphered digital voice communication schematic flow sheet in the utility model first preferred embodiment;
Fig. 6 is the structure chart of the encrypt and decrypt unit in Bluetooth earphone device.
Description of reference numerals: 1-first cell phone system; 2-second cell phone system; The first-hand machine of 10-; 20-second-hand's machine; 101-first dial-up program APP; 201-second dial-up program APP; The built-in bluetooth module of 102-first; The built-in bluetooth module of 202-second; 30-switching center; 11-first Bluetooth earphone device; 21-second Bluetooth earphone device; 111-first Bluetooth control unit; 211-second Bluetooth control unit; 112-first encrypt and decrypt unit; 212-second encrypt and decrypt unit; 113-first pickup and A/D unit; 11211-command process unit; 11212-checks code encryption method generator; 11213-checks code decoder; 11214-encrypt voice data method generator; 11215-enciphered digital speech data decoder; 213-second pickup and A/D unit; 114-the one D/A and loudspeaker unit; 214-the 2nd D/A and loudspeaker unit; 115-first power circuit; 215-second source circuit; 250-synchronous code; 251-checks the declaration of code encryption method; 252-pass code; 253-timing code; 254-bluetooth earphone product serial number code.
Embodiment
Fig. 1 is communication system architecture figure of the present utility model, communicating pair uses the Bluetooth earphone device 11 and 21 in the utility model, be encrypted, decipher the smart mobile phone with transfer of data and use with built-in bluetooth earphone module 102 and 202 and can carry out voice encryption data communication, in the middle of, if either party does not use this Bluetooth earphone device, then only generally can communicate, there is no cipher round results.Such system configuration is one of feature of the present utility model, compared to front case structure, this case all has compatibility very to any Digital Speech Communication mobile phone (after second generation mobile phone), no matter whether user both sides use the mobile phone of same brand, whether use identical chip for cell phone group, whether identical mobile phone operating system always compatible, compared to prior art the utility model tool novelty with creative.Dial-up program APP101 and 201 is for being executed in the application program on mobile phone, its main function comprises the address book reading and be stored in mobile phone, with one's own side's Bluetooth earphone device to sending mobile phone holder pass code during PING to one's own side's bluetooth earphone, with communication counterpart to PING, select be whether coded communication and when either party bluetooth earphone of communicating pair finds to check code exception etc. the message notice mobile phone holder etc. that gives a warning.
Fig. 1 comprises the first bluetooth earphone 11 internal structure block schematic diagram, second bluetooth earphone 21 has the structure identical with the first bluetooth earphone, comprise: a power circuit 115 and 215, power circuit comprises a lithium ion battery to provide electric energy needed for the work of bluetooth earphone internal circuit.One Bluetooth control unit 111 and 211, be the main control unit of bluetooth earphone, inside comprises a control firmware, radio frequency and antenna element etc., and its work is carry out information exchange with the built-in bluetooth module 102 and 202 of mobile device.One first encrypt and decrypt unit 112 is couple to Bluetooth control unit 111, first encrypt and decrypt unit 112 and is coupled to pick-up and A/D (analog signal turns digital signal) unit 113 and D/A (digital signal revolving die analog signal) and loudspeaker unit 114.First encrypt and decrypt unit 112 is that a single-chip controller includes firmware 1121 and 2121.The main function of first encrypt and decrypt unit 112 is: when (one) gives orders or instructions, accept the instruction that one's own side's mobile device 10 dial-up program APP101 sends, and determines that this call is for coded communication or generally communicate, if coded communication is then sent check code.This check code contain user input and be stored in timing code on user's pass code of the first encrypt and decrypt unit 112, mobile phone, this bluetooth earphone product serial number code and check the preposition synchronous code etc. of code; Then send enciphered digital speech data, the transfer approach of these data transmits in time slot (TimeSlot) mode in batches.These voice encryption data are from the digitized voice signal of pick-up and A/D (analog signal turns digital signal) unit 113, and this digitized voice signal is become enciphered digital voice signal with the encryption of hybrid parameter method by the first encrypt and decrypt unit 112 again.(2), when receiving words, what accept that first speaker sends here checks code and enciphered digital speech data, exports after decoding through D/A (digital signal revolving die analog signal) with loudspeaker unit 114.When the first encrypt and decrypt unit 112 receives checking yard of the other side, the other side deciphering then comparison internal memory in advance checks code data, if coincide, then that sends one's own side checks code, confirms status each other again to make communicating pair; If if do not meet after being checked when the first encrypt and decrypt unit 112 receives checking yard of the other side, then send information warning via one's own side's mobile device dial-up program 101 or 201 immediately.Above-mentionedly check code structure, hybrid parameter method enciphered method, time slot become code method and receive the discovery of words end check code incorrect time send information warning etc. and be feature of the present utility model.
Both sides, before formal communication, first must complete two actions, and first element is the action that one's own side's mobile device and one's own side's Bluetooth earphone device must carry out PING.When PING, cellphone subscriber must use dial-up program APP101 and 201 and set one group of pass code, the first encrypt and decrypt unit 112 inside in bluetooth earphone also containing one group of bluetooth earphone product serial number, the first encrypt and decrypt unit 112 of these two groups of data in bluetooth earphone form one's own side check code major part and stored in the first encrypt and decrypt unit 112 in bluetooth earphone.Second action is the action that communicating pair first cell phone system 1 and the second cell phone system 2 perform to PING.During execution, both sides are also by the dial-up program APP on mobile phone, and the Bluetooth earphone device of communicating pair sends checking code and being recorded in the first encrypt and decrypt unit 112 in one's own side's bluetooth earphone and the second encrypt and decrypt unit 212 by the code that checks each other each other.In brief, before the formal coded communication of both sides, what the first encrypt and decrypt unit 112 in the bluetooth earphone of both sides and the second encrypt and decrypt unit 212 first must set up both sides checks code.
In one embodiment, this encrypt and decrypt unit 112 in this Bluetooth earphone device is a chip, and this chip comprises hardware designs to be encrypted and deciphering, and wherein this encryption method and decryption method comprise parameter enciphered method and time slot becomes code method.
Both sides' operation sequence when formal communication is as follows:
One, first-hand machine 10 (first speaker) is sent one's own side and is checked code; And second-hand's machine receives, comparison first speaker checks code.When starting to communicate, dial-up program on first-hand machine 10 reads address book, user dials number after selecting called party phone number and encryption setting, now on mobile phone, next encrypted command and real-time time code are sent to the first Bluetooth earphone device 11 by dial-up program, the first encrypt and decrypt unit 112 in first Bluetooth earphone device 11 is sent and is checked code, check code after the built-in bluetooth module of the first mobile phone receives again by antenna for mobile phone through sending in the air.Check code and comprise pass code that first-hand machine 10 user sets up, the product serial number code of the first bluetooth earphone and real-time time, and check the declaration of code encryption method and be combined into according to random generation and check code.
What two, second-hand's machine 20 received that first-hand machine 10 sends here check, and code sends one's own side after the data verification of comparison internal memory is errorless checks code, and first-hand machine then receives subsequently, comparison first speaker checks code.Step 2 is identical with step one program, and step one and step 2 complete the first critical action of enciphoring voice telecommunication, confirm identity each other.If wherein either party to check result wrong, via the dial-up program APP101 on mobile phone and 201 return warning message.
Three, communicating pair is sent and is received enciphered digital speech data, and its program is:
(1) enciphered digital voice transfer.A voice analog signal on first Bluetooth earphone device 11 is via after microphone pickup, sound is converted to digital voice data through pickup and A/D unit 113, this digital voice data exports the first encrypt and decrypt unit 112 to, this the first encrypt and decrypt unit 112 selectes parameter enciphered method at random (such as from 1 to 12, get 1 at random for 288 kinds) in an encryption, and random generation one time slot constant (such as getting 1 at random from 1 to 60), be sent to this Bluetooth control unit 111.This Bluetooth control unit 111 is sent to the built-in bluetooth module 102 of the first mobile phone by checking code, enciphered method/time slot constant value and enciphered digital speech data, data spread out of after first-hand machine 10 reads above-mentioned data via chip for cell phone again.
(2) enciphered digital speech data receives, phonetic incepting and voice transfer path just in time rightabout, after second-hand's machine 20 receives this enciphered digital speech data, this enciphered digital speech data is reached the second Bluetooth earphone device 21 via the built-in bluetooth module 202 of second in mobile phone, Bluetooth control unit 211 in second Bluetooth earphone device 21 imports enciphered digital speech data into second encrypt and decrypt unit 212, second encrypt and decrypt unit 212 obtains digital voice data by after its decoding, change into analog signal finally by by D/A and loudspeaker unit 214 and play back.
When intercommunication, when first time slot of communication each time starts, communicating pair all can send enciphered method/time slot constant declarations to the other side, wherein time slot constant declarations is in order to notify the time slot units time of this communication of the other side, encryption rule is the encryption rule numbering notified in this time slot of the other side, so that the other side deciphers according to rule.When intercommunication, send and check code during the first time slot, time slot (after the second time slot) is then sent at random and is checked code afterwards, in order to check both sides' identity at any time.The first encrypt and decrypt unit 112 in the bluetooth earphone of communicating pair and the second encrypt and decrypt unit 212 perform and check code and verify action, when have abnormal check code picked up know time, this bluetooth earphone gives a warning to this mobile device holder via mobile phone A PP.
Enciphered method of the present utility model is combined type encryption mode, and following schematic illustration does not limit the derivative change of encryption calculation of the present utility model.Substantially, the utility model is in speech scrambling each time, and on the whole the pattern of encryption comprises two parts, and Part I is parameter enciphered method, and Part II is that time slot becomes code method.
Another feature of the present utility model is in digital voice data transmitting procedure, and communicating pair all can be sent one's own side's communication and check code.In call each time, either party all can send and repeatedly check code and require that the other side checks, and wherein must comprise one at the first time slot and check code, other time slots are then sent at random, such as, do not send not etc. at the 2nd, 5 or 8 time slots.Fig. 2 is the data structure checking code, comprises five parts, is respectively synchronous code, checks the declaration of code encryption pattern, the pass code of first speaker, first speaker bluetooth earphone product serial number code and timing code etc.Wherein, synchronous code is the fixed data of 3 bytes, and such as 11h, EEh and 55h composition checks the preposition synchronous code of code.
The above-mentioned code encryption pattern that checks is declared to be defined as when the secondary coded system notice checking code, inform that the other side need check code encryption mode code content according to this and give decoding, in other words, once in call, it is not identical that what each time slot was sent check code data content, have different encryption methods each time, yard total length that checks of generation also can not be the same.After listener receives and checks code, through decoding, if timing code, pass code and bluetooth earphone serial number all conform to the record of encrypt and decrypt unit in one's own side's bluetooth earphone, then loopback one's own side check code to the other side, complete shake hands (Handshake), if the timing code after decoding, pass code, bluetooth earphone serial number and record or present time inconsistent, then immediately by the dial-up program APP warning on one's own side's mobile device.
According to above-mentioned, if listener buys the utility model Bluetooth earphone device and mobile phone, and have listener's SIM card of duplicate numbers, when monitoring, this Bluetooth earphone device can automatically be sent one's own side and check code, what therefore first speaker end just can receive " many one " checks code, and first speaker can receive information warning naturally.
Fig. 1 is the system configuration schematic diagram of the utility model first preferred embodiment, and system comprises the first cell phone system 1, second cell phone system and switching center 30 and the second cell phone system 2; This first cell phone system comprises first-hand machine 10 and the first Bluetooth earphone device 11; This second cell phone system comprises second-hand's machine 20 and the second Bluetooth earphone device 21.Preferred embodiment according to institute's accompanying drawings is explained by the characteristic on structure and fuction of the present utility model.This first-hand machine 10, this second-hand's machine 20 have bluetooth module 102 and 202 in being and have the smart mobile phone of Digital Speech Communication function, and comprise a dial-up program APP101 and 201; This switching center is that a mobile telecommunications network has one of communication systems such as GSM, CDMA, CDMA2000, WCDMA and TD-SCDMA and LTE, in order to exchange the audio digital signals between first-hand machine and second-hand's machine.This first Bluetooth earphone device 11, second Bluetooth earphone device 21 comprises: a power circuit 105 and 205, comprises a lithium ion battery 115 and 215 to provide the electric power needed for Bluetooth earphone circuit.One Bluetooth control unit 111 and 211 is coupled to the first encrypt and decrypt unit 112 and the second encrypt and decrypt unit 212, does information exchange with first-hand machine 10,20.The first encrypt and decrypt unit 112 is reached and the second encrypt and decrypt unit 212 processes and the information that the first encrypt and decrypt unit 112 received and the second encrypt and decrypt unit 212 tendency to develop go out spread out of after this Bluetooth control unit 111 and 211 receives information.Transmit with the packets of information received containing checking code, enciphered method/time slot constant declarations and enciphered digital voice signal.First encrypt and decrypt unit 112 and the second encrypt and decrypt unit 212 are respectively one and include the single chip microcomputer controlling firmware 1121, first encrypt and decrypt unit 112 1 terminal couples Bluetooth control unit 111, first encrypt and decrypt unit 112 second terminal couples a pickup and D/A unit 113, first encrypt and decrypt unit 112 the 3rd terminal couples a D/A and loudspeaker unit 114; Second encrypt and decrypt unit 212 1 terminal couples Bluetooth control unit 211, second encrypt and decrypt unit 212 second terminal and couples a pickup and D/A unit 213, second encrypt and decrypt unit 212 the 3rd terminal couples a D/A and loudspeaker unit 214;
The transmission path of the enciphered digital speech data in the utility model is as follows: information efferent pathway obtains digital voice data for this first encrypt and decrypt unit 112 from this pick-up and D/A unit 113, to be sent to the bluetooth module 102 in first-hand machine 10 after the encryption of parameter enciphered method through Bluetooth control unit 111; Information afferent pathway is the Bluetooth control unit 111 that the information received is reached in the first blue-tooth device 11 by the bluetooth module in this mobile device, finally reach the first encrypt and decrypt unit 112, and decrypts information is export through D/A and loudspeaker unit 114 after audio digital signals by the first encrypt and decrypt unit 112;
Fisrt feature of the present utility model be this first-hand machine 10 and first Bluetooth earphone device 11 couples of PING time, this dial-up program APP101 sends one group of pass code and is stored in the first encrypt and decrypt unit 112 to this first Bluetooth earphone device 11; When this second-hand's machine 20 and second Bluetooth earphone device 21 couples of PING, this dial-up program APP201 sends one group of pass code to this second Bluetooth earphone device 21 and is stored in the second encrypt and decrypt unit 212.
When second feature of the present utility model is this first cell phone system (mobile device and Bluetooth earphone device) with this second cell phone system (mobile device and Bluetooth earphone device) to PING, both sides respectively send one group and check code, and this checks code and comprises synchronous code, checks the declaration of code encryption method, pass code, timing code and bluetooth earphone serial number.
Third feature of the present utility model is the first cell phone system and this second mobile phone System Implementation coded communication, as shown in Figure 5.When being characterized as communication, this dial-up program APP101 to send in an encrypted instruction, real-time time code to the first Bluetooth earphone device 11; This first Bluetooth earphone device 11 is sent first and is checked code, the first enciphered method/time slot constant declarations, and exports after voice input signal encryption; This dial-up program APP101 in this first-hand machine 10 sends an encrypted instruction, a real-time time code in this first Bluetooth earphone device 11; This first Bluetooth earphone device 11 produces at random a parameter enciphered method, a time slot constant send and check code, one enciphered method/time slot constant declarations, and exports after voice input signal encryption.This second mobile phone system acceptance this first check code and check, by output sound after the deciphering of this enciphered digital voice signal after correct; This second Bluetooth earphone device 21 produces at random a parameter enciphered method and a time slot constant and sends one second and checks code and second enciphered method/time slot constant declarations, and will voice input signal encrypt after export second-hand's machine 20 to after export.
Its method of the utility model third feature is further:
This first encrypt and decrypt unit 112 in this first Bluetooth earphone device 11 reads this pickup and A/D unit 113 voice input signal; This first encrypt and decrypt unit 112 in this first Bluetooth earphone device 11 exports this first Bluetooth control unit 111 to according to after the encryption of this parameter enciphered method; This first Bluetooth control unit 111 in this first Bluetooth earphone device 11 exports this enciphered digital voice signal; The first bluetooth module 102 in this first-hand machine 10 receives this enciphered digital voice signal and exports through this first-hand machine; This second cell phone system is by output sound after the deciphering of this enciphered digital voice signal, and its method is further: this second encrypt and decrypt unit 212 in this second blue-tooth device reads this and first checks code, this enciphered method/time slot constant declarations produce deciphering method; This second encrypt and decrypt unit 212 reaches this D/A and loudspeaker unit output sound after being deciphered according to deciphering method after this enciphered digital voice signal.This second cell phone system receives and checks code and check, after correct, this second Bluetooth earphone device produces a parameter enciphered method, a time slot constant send and check code, one enciphered method/time slot constant declarations at random, and export after voice input signal encryption, its method is further: this second encrypt and decrypt unit in this second Bluetooth earphone device reads this pickup and A/D unit voice input signal; This second encrypt and decrypt unit in this second Bluetooth earphone device exports this Bluetooth control unit to according to after the encryption of this parameter enciphered method; This Bluetooth control unit in this second Bluetooth earphone device exports this enciphered digital voice signal; This second bluetooth module in this second-hand's machine receives this enciphered digital voice signal and exports through this second-hand's machine; Warning message is sent when either party discovery of this communication checks code mistake.
Fourth feature of the present utility model is that this first-hand machine upgrades the second encrypt and decrypt unit enciphered method in this first Bluetooth earphone device; This second-hand's machine upgrades the second encrypt and decrypt unit enciphered method in this second Bluetooth earphone device.After this dial-up program APP sends the instruction of Bluetooth encryption program updates, send in a group encryption and decryption unit program code to the second encrypt and decrypt unit.Pick-up and D/A unit 113 audio digital signals is read after the second encrypt and decrypt unit 112 in this first bluetooth earphone 11 receives encrypted instruction and real-time time, encrypt and export the first bluetooth module 102 in first-hand machine 10 to, after reach switching center 30 by first-hand machine 10; This second mobile phone 20 receives the enciphered digital voice signal that switching center sends here and reaches the second Bluetooth earphone device 21 through the second bluetooth module 202; The second encrypt and decrypt unit 212 in second Bluetooth earphone device 21 receive enciphered digital voice signal deciphering after by D/A and loudspeaker unit 214 output sound; First mobile phone 10, first bluetooth earphone 11 is that the standard of one of communicating pair is equipped with; Second mobile phone 20, second bluetooth earphone 21 is that the standard of the opposing party of communicating pair is equipped with.The new spec mobile phone that first mobile phone 10 and the second mobile phone 20 are 3G mobile, 3.5G mobile phone or 4G and develop afterwards; The all built-in bluetooth module of above-mentioned first mobile phone, the second mobile phone, to communicate with outside bluetooth earphone; Above-mentioned mobile phone comprises the dial-up program APP (101 and 201) in the utility model, the operating system be executed on mobile phone is the WindowsPhone etc. as the iOS of Apple, the Android of Google and Microsoft.First bluetooth earphone 11 comprises Bluetooth control unit 111, first encrypt and decrypt unit (encryption/decryption element) 112, MIC and A/D unit 113, D/A and loudspeaker unit 114 and power circuit.
Fisrt feature of the present utility model is these first-hand machine 10 and the first Bluetooth earphone device 11 couples of PING; These first-hand machine 10 and the first Bluetooth earphone device 11 couples of PING.Its better implementation method be this first-hand machine 10 and first Bluetooth earphone device 11 couples of PING time, this dial-up program APP101 sends one group of pass code to this first Bluetooth earphone device 11, is stored in the first encrypt and decrypt unit 112; When this second-hand's machine 20 and second Bluetooth earphone device 21 couples of PING, this dial-up program APP201 sends one group of pass code to this second Bluetooth earphone device 21, is stored in the second encrypt and decrypt unit 212.
Fig. 2 is that one of the utility model first preferred embodiment checks code data structural representation.Check code data to send order and be synchronous code 250, check code encryption method declaration 251, pass code 252, timing code 253 and bluetooth earphone product serial number code 254.Check the declaration of code encryption pattern and comprise 4 byte datas, represent timing code, pass code, each coding method of bluetooth earphone serial number and the ordering relation of this three respectively.Such as 41h, 08h, F5h and 39h can represent:
41h: the front and back ranking method of timing code, pass code, bluetooth earphone serial number three, totally 3 kinds.4 represent that timing code length is 4 bytes;
08h: the encryption mode of timing code is the 8th kind;
F5h: the encryption mode of pass code is the 245th kind;
39h: bluetooth earphone serial number encryption mode is the 39th kind;
The permutation and combination checking code encryption is added up to have 3x256x256x256=50,331,648, about 5,000 ten thousand kinds of encryption changes.Certainly, more kinds of permutation and combination can also be had, such as, timing code be done different sequences, as week, day, year, the moon, time, point etc. even use the lunar calendar and Chinese era etc., separately do not repeat.
Timing code is the ASCII character of 4 to 10 bytes, represent year, month, day in Christian era, week, time, point etc.When secondary call duration time code uses how many bytes, the encryption method of timing code and the sequence that timing code is checking code declare random decision by the above-mentioned code encryption pattern that checks.Because the time changes at any time, even if therefore listener " what replicate previous communication checks code " sent when this is monitored and check code, still (because many one group check code) that be easy to be found, and the timing code copied also may " expire " and be detected.
Pass code (first speaker) is the ASCII character that the numeral of 8 to 16 yards and English alphabet form, and therefore the setting of its pass code of each first speaker is neither identical, and the encryption mode of pass code also has 256 kinds.
First speaker bluetooth earphone product serial number code is the built-in sequence number of the utility model bluetooth earphone product, be the English alphabet of 36 bytes and the product serial number of Arabic numerals composition, each Bluetooth earphone device all has its unique Product sequence number, and its encryption mode also has 256 kinds.
Therefore, check code disclosed in the utility model and there is following technical characteristic:
(1) check code for send at random, except the first time slot must send, other time slots then send at random, and once send and check code, and what person who accepts must send person who accepts end checks code, therefore can reach the anti-object monitored.
(2) the data total length checking code changes at random.
(3) there is different timing codes the different time, naturally checks code each time also not identical.
(4) check three parts of code, timing code, pass code and bluetooth earphone product serial number code all respectively have encryption method in self 256.
Check the data structure of code, cipher mode and send at random and require reply technical characteristic, all comparatively, case tool novelty is with creative, the bluetooth earphone in the utility model is used to monitor even if that is exactly listener, also can because of be required to reply send one's own side check code, therefore behavior of monitoring is found immediately, even if keep " monitoring of mourning in silence " also of no avail.
Another principal character of the utility model is on digital voice data, disclose a kind of hybrid enciphered digital voice communication method, this method becomes the used in combination of code method for parameter enciphered method and time slot, and wherein parameter enciphered method/time slot becomes the parameter encryption mode and time slot constant value that code declaration code is this communication of first speaker notice person who accepts.This declaration code is that the data structure of one group of 4 byte adds preposition synchronous code, and such as enciphered method/time slot constant declarations code is 69h, 31h, and 01,0Fh then represents:
69h, representing that source code adds code value is 69h, in other words must subtract 69h during receiving end decoding;
31h, represent random number raise the price byte be 3 and for the first arrange, such as 34h, 56h, F3h, 06h, wherein only have 34h to be real source code, all the other are random mess code.
21h, 1 represents Nibble-swap, in other words needs position 0-3 and position 4-7 to exchange during decoding, such as, should be decoded as 43h when receiving 34h; Wherein 2 represent source code raise the price/sequence that random number adds yardage/Nibble-Swap three is the 0Fh of the second, for time slot constant, unit is second, 0Fh then represents 15 seconds, that is each slot time length is 15 seconds, that is the parameter enciphered method of once giving orders or instructions can be changed every 15 seconds first speakers, therefore, if the air time is 1 minute, have 4 encryptions.
Parameter enciphered method changes.Same, the time slot constant of self also can be sent in other one end of communication.
Synchronous code is divided into three kinds, is placed in respectively and checks a yard front end, enciphered method/time slot constant declarations code front end and enciphered digital speech data front end.Three kinds of synchronous codes are 3 bytes (Byte) and are respectively:
Check a yard synchronous code: 11h, EEh, AAh
Enciphered method/time slot constant declarations code synchronous code: 33h, CCh, AAh
Enciphered digital speech data synchronous code: 55h, AAh, 55h
The definition of time slot (Time-Slot), when the voice encryption data of this case transmit beginning, encrypt and decrypt unit in the bluetooth earphone of transmission end can random definition one integer second be unit, such as 10 seconds or 15 seconds, within these 10 seconds or 15 seconds, be called a time slot, in brief, the unit interval of time slot is second, and the time of each time slot can be the one between 1 second to 60 seconds.
The encrypt and decrypt work of the utility model one embodiment all the customization first encrypt and decrypt unit of bluetooth earphone and 112 and second encrypt and decrypt unit 212 inside carry out.The encryption method of the utility model one embodiment is called that parameter and time slot become the combined type enciphered method of pattern, uses a kind of parameter enciphered method, then use another parameter enciphered method at another one time slot in each time slot.In parameter enciphered method, at least comprise source code the raise the price combination of method and Nibble-Swap tri-kinds of methods of method, random number of raising the price formed, have 2048 kinds of change combinations, sort before and after three kinds of methods if further consider, then total 2048x6=12,288 kinds of permutation and combination:
1. source code is raised the price method.Source code is raised the price, by the raw tone digitalized data of a byte (Byte) from adding 0, adding 1 ... to adding 255, adding up to and having 256 kinds of changes.Such as source code is 23h, if raise the price 1Ah, source code becomes 3Dh etc., if the numerical value that method is new after raising the price if source code is raised the price is more than FFh, then carry disregards still only reservation byte (Byte) length.In addition, so-called source code refers to receive from digital microphone the ground floor digital speech code that the input of talker's analog voice changes into through digitlization.
2. random number is raised the price method.The random number method of raising the price is defined as the random mess code of the multiple bytes (Byte) with each source code, if if it is 3 that the random number method of raising the price adds yardage, then have 4 kinds of changes:
Nature, not limiting the random number method of raising the price during actual enforcements of this case, to add yardage be 3, and actual product may be 5, be 7 or be that other are digital.
3. source code is Nibbleswap, and be defined as and the 1 to 4 byte of source code and the 5th to the 8th byte exchanged, have 2 kinds of changes, such as source code is that D7h becomes 7Dh etc. after Nibbleswap.
The brief summary of parameter enciphered method, adds up to above-mentioned three kinds of methods can produce 256x4x2=2 altogether, 048 kind of parameter enciphered method change number, if comprise the sequence of above-mentioned three, then have 2,048x6=12,288 kinds of permutation and combination, if correctly do not deciphered, then what listener was heard is noise.
Time slot becomes the encrypted in units time setting of code method.Time slot becomes the definition of code method, one of the utility model feature becomes code technology for disclosing a kind of time slot, " time slot " is defined as time several seconds being less than one minute, within such as 10 seconds, 15 seconds, equal time all can be described as a time slot, and time slot becomes code method into using a kind of parameter enciphered method in each time slot, so " time slot " also can be described as " time package ", both sides' number of seconds that setting one is fixing separately at random in each call.Such as in once communicating, bluetooth earphone sets every 30 seconds is at random a time slot, the 1st second then starting to converse used a kind of parameter enciphered method at the beginning at the end of the 30th second, and the 31st second used another parameter enciphered method at the beginning at the end of the 60th second, in other words, if the whole air time is 60 seconds, in one minute, adopt the parameter enciphered method that 2 kinds different altogether, therefore 12 are had in above-mentioned parameter enciphered method, 288 kinds of parameter encryption changes, then be mixed with after time slot becomes code method and have 12, the 2 power kind enciphered methods of 288, namely 12, 288x12, 288=150, 994, 944 about have 100,000,000 5 thousand ten thousand kinds of changes.Further, if " time slot constant " is set as 20 seconds, then can have 12 within 60 second air time, 3 powers of 288, have 1,855,425,871, and 872 about 1,000,000 8, more than 0,000,000 plant permutation and combination, therefore can determine anyly cannot to decipher per capita.Further, the both sides of communication all can use the parameter enciphered method of self and time slot to become code method, so only in the call of a minute, be exactly Zong two powers of permutation and combination number 1,010,000 kinds of permutation and combination of its encryption kind, be about 3,400 trillion kinds of permutation and combination, in other words as an astronomical figure.
Decryption method in the utility model is the reverse operating of encryption method, but but another feature of the present utility model encrypts kind exactly that can to reach infinitely multiple encrypt and decrypt technology easily simple especially.
Aforementioned have a kind of mobile phone to eavesdrop software on the market, and method of its eavesdropping is by the message registration of listened person in internal memory, in then utilize free time to be transmitted back to by the file of record phone number that listener specifies or website.This kind of monitoring technique also cannot be succeeded in the utility model technology, because in the utility model, the content transmitted between mobile phone and bluetooth earphone is digital encryption speech data, even if all numerical datas in the record to all air times of complete section of software monitored by this mobile phone, say as above-mentioned, only within one minute, data just have 3,400 trillion kinds of encryption modes, and we believe that the other side feels simply helpless to regret in vain.
Fig. 3 A is the data structure schematic diagram in the encrypted voice data air transmission in the utility model first preferred embodiment.The first half is that the first-hand machine encrypted voice data of communicating pair sends structure chart, and Lower Half then sends structure chart for other side's voice encryption data of communicating pair, and its structure is identical, is described as follows:
Fig. 3 B first half, first-hand machine 10 passes to second-hand's machine 20, the 1st time slot and the 2nd time slot is divided in figure, the time of the first time slot all comprises three parts, check code, parameter enciphered method/time slot constant declarations and enciphered digital speech data, the data of the second time slot also comprise three parts, check code, parameter enciphered method and enciphered digital speech data, the difference of the first time slot and the second time slot is at Part II, i.e. parameter enciphered method/time slot constant declarations code, time slot constant declarations has not been needed at the second time slot, other second time slot check code for send at random, in other words, in communication each time, only need declaration time slot constant declarations code when the first time slot and check code, the code that checks of all time slots that the second time slot is later is at random.The such as air time is 5 minutes, and the time slot of parameter enciphered method/time slot constant declarations code is 30 seconds, and so the call of 5 minutes is divided into 10 time slots, and each time slot is 30 seconds.In addition, in these 10 time slots, check code and at least send once.Check the object that code sends at random to be to prevent listener from " inserting and monitoring " in communication process, that is have and instead monitor effect.
Fig. 4 is that the communication in the present invention first preferred embodiment checks a yard Establishing process schematic diagram.This figure is that communicating pair sets up the operating process checking code each other:
[step 410] and [step 460] is set up for communicating pair and is checked the preposition action of code, completes one's own side's mobile device and one's own side's bluetooth earphone to PING action.[step 410] is first-hand machine 10 user and the first Bluetooth earphone device 11 couples of PING; [step 460] is second-hand's machine 20 user and the second Bluetooth earphone device 21 couples of PING.
[step 410] performs the first dial-up program APP101 for first-hand machine 10 user, and input user's pass code, after completing, this dial-up program APP101 sends pass code and timing code to the first Bluetooth earphone device 11, first Bluetooth earphone device 11 receive after pass code and timing code by pass code and timing code inner stored in the first encrypt and decrypt unit 112 together with the product serial number code of the first Bluetooth earphone device 11, and reply this pass code work of setting up of dial-up program APP101 and complete.
[step 460] performs the second dial-up program APP201 for second-hand's machine 20 user, and input user's pass code, after completing, this dial-up program APP201 sends pass code and timing code to the second Bluetooth earphone device 21, second Bluetooth earphone device 21 receive after pass code and timing code by pass code and timing code inner stored in the second encrypt and decrypt unit 212 together with the product serial number code of the second Bluetooth earphone device, and reply this pass code work of setting up of dial-up program APP201 and complete.
Second feature of the present utility model is this first cell phone system (first-hand machine 10 and the first Bluetooth earphone device 11) with this second cell phone system (second-hand's machine 20 and the second Bluetooth earphone device 21) to PING.Its better implementation method be this first cell phone system and this second cell phone system to PING time, both sides respectively send one group and check code, and this checks code and comprises synchronous code, checks the declaration of code encryption method, pass code, timing code and bluetooth earphone serial number.
[step 420], [step 470] and [step 430] for communicating pair to PING to set up the operating process checking code each other:
[step 420] performs the first dial-up program APP101 for first-hand machine 10 user, dials second-hand's machine 20 telephone number, and after phone is put through, the first Bluetooth earphone device 11 is sent and checked code, and this checks code and sends via first-hand machine 10.
[step 470] is second-hand's machine 20 ring, and after user has connect phone, receive that first-hand machine sends first checks code, and this first checks code and timing code is inner stored in the second encrypt and decrypt unit 212 in the second Bluetooth earphone device 21; This second Bluetooth earphone device 21 and send one's own side know check code after finish the work.
Import the first Bluetooth earphone device 11 into after what [step 430] first-hand machine 10 received that the second mobile phone sends check code and inner stored in encrypt and decrypt unit, terminate communicating pair and check code and set up work.
Third feature of the present utility model is this first cell phone system and this second mobile phone System Implementation coded communication.Its better implementation method to send in an encrypted instruction and real-time time code to the first Bluetooth earphone device 11 for this dial-up program APP101 during communication; In this first Bluetooth earphone device, 11 send one and check code, one enciphered method/time slot constant declarations, and export after voice input signal encryption.
Fig. 5 is the flow process that in the utility model, communicating pair performs enciphered digital voice communication:
[step 510] first-hand machine 10 end: first speaker dials number after using the first dial-up program APP101 Choice encryption communication, sends encrypted instruction and timing code to the first Bluetooth earphone device 11 simultaneously;
[step 520] first is after Bluetooth earphone device 11 receives encrypted instruction and timing code:
Random selecting encryption mode, sends one's own side and checks code;
Random selecting enciphered method/time slot constant, sends enciphered method/time slot constant declarations, prepares to give orders or instructions;
[step 550] second-hand machine 20 end: the phone sound
Second Bluetooth earphone device 21 receives the other side and checks code, checks to check code to check code correct, and the second Bluetooth earphone device 21 is sent one's own side and checked code; Second Bluetooth earphone device 21 sends the enciphered method/time slot constant declarations of this call, prepares to give orders or instructions;
Check a yard mistake, the second Bluetooth earphone device 21 is sent information warning and is notified second-hand's machine 20.
[step 530] first Bluetooth earphone device 11 start speech scrambling;
Receive the digitized voice data of pick-up and D/A unit 113, encrypted rear output according to enciphered method;
[step 540] first Bluetooth earphone device 11 terminate in the first slot time, whether next time slot of Stochastic choice is sent and is checked code;
Next time slot enciphered method of random generation (encryption of calls method), sends enciphered method
[step 541] end of conversation?
Terminate call
No, get back to step 530;
[step 560] second-hand machine 20 reads the other side's enciphered method/time slot constant declarations, prepares decoding;
Second-hand's machine 20 reads the other side's enciphered digital speech data and carries out decoding, and the audio digital signals that reduces after decoding exports D/A and loudspeaker unit 214 again to, dials sound reproduction sound.
[step 570] second-hand machine 20 is given orders or instructions:
Send one's own side's enciphered method/time slot constant declarations;
Receive the digitized voice data of pick-up and D/A unit 213, encrypted rear output, in two-way communication according to one's own side's enciphered method.
Fourth feature of the present utility model is that this first-hand machine upgrades the second encrypt and decrypt unit enciphered method in this first Bluetooth earphone device; This second-hand's machine upgrades the second encrypt and decrypt unit enciphered method in this second Bluetooth earphone device.Its preferred approach is, after this dial-up program APP101 in this first-hand machine 10 sends Bluetooth earphone device encipheror renewal instruction, send in the second encrypt and decrypt unit 112 in batch processing code to the first blue-tooth device 11; This dial-up program APP201 in this second-hand's machine 20 sends in the second encrypt and decrypt unit 212 in batch processing code to the second blue-tooth device 21 after sending Bluetooth earphone device 21 encipheror renewal instruction.
Fig. 6 is the structure chart of the encrypt and decrypt unit in Bluetooth earphone device.
Command process unit 11211: accept from dial-up program APP101 on mobile device 10,20,210 order and data processing.Check code encryption method generator 11212: random produce checking code and checking the declaration of code encryption method of this communication or this time slot.Check code decoder 11213: in the receiving mode, will check code according to the code encryption method that the checks declaration received and decipher and check whether correctly and return.Encrypt voice data method generator 11214: under transfer mode, the random digital voice data enciphered method declaration producing this time slot exports mobile device 10,20 to after exporting and being encrypted by the digital voice data of pickup and A/D unit 113,213.Enciphered digital speech data decoder 11215: in the receiving mode, is decoded as digital voice data according to the digital voice data enciphered method declaration received by enciphered digital speech data and delivers to D/A and loudspeaker unit 114,214 exports.
The foregoing is only preferred embodiment of the present utility model, but feature of the present utility model is not limited thereto, anyly be familiar with this those skilled in the art in the utility model field, can think easily and change or modification, all should be encompassed in right of the present utility model.

Claims (7)

1. implement encrypting and decrypting in a mobile communication anti-eavesdrop system for bluetooth earphone end, it is characterized in that, this system comprises first-hand machine and the first Bluetooth earphone device, wherein,
This first-hand machine is the smart-phone device having bluetooth module in;
This first Bluetooth earphone device comprises:
One lithium ion battery, to provide electric energy needed for Bluetooth earphone device;
One Bluetooth control unit, in order to be coupled to the built-in bluetooth module of this first-hand machine to transmit data;
One encrypt and decrypt unit, for performing encrypt and decrypt, one the first terminal of this encrypt and decrypt unit couples this Bluetooth control unit, one second terminal couples a pickup and A/D unit, one the 3rd terminal couples a D/A and loudspeaker unit, wherein, one first encrypt voice data that this pick-up and A/D unit export by this encrypt and decrypt unit, this first speech data after encryption is sent to this first-hand machine through this Bluetooth control unit, and this Bluetooth control unit received come from this first-hand machine and an encrypted second speech data deciphering, this second speech data after deciphering exports through this D/A and loud speaker.
2. enforcement encrypting and decrypting according to claim 1 is in the mobile communication anti-eavesdrop system of bluetooth earphone end, it is characterized in that, this mobile device sends one group of pass code to this Bluetooth earphone device, and this Bluetooth earphone device stores this mobile phone pass code and this Bluetooth earphone device product serial number code to match this mobile device and this Bluetooth earphone device.
3. enforcement encrypting and decrypting according to claim 1 is in the mobile communication anti-eavesdrop system of bluetooth earphone end, it is characterized in that, this mobile device uses at least one in following wireless technology: GSM, CDMA, CDMA2000, WCDMA, TD-SCDMA and LTE.
4. enforcement encrypting and decrypting according to claim 1 is in the mobile communication anti-eavesdrop system of bluetooth earphone end, it is characterized in that, this mobile device sends an encrypted instruction and a real-time time code to this Bluetooth earphone device, after this encrypt and decrypt unit receives this encrypted instruction, random generation one parameter enciphered method and a time slot constant are also sent one and are checked code and one enciphered method/time slot constant declarations, and export this mobile device to after being encrypted by voice input signal.
5. enforcement encrypting and decrypting according to claim 4 is in the mobile communication anti-eavesdrop system of bluetooth earphone end, it is characterized in that, this checks, and code comprises synchronous code, checks the declaration of code encryption method, pass code, timing code and this Bluetooth earphone device serial number.
6. enforcement encrypting and decrypting according to claim 4 is in the mobile communication anti-eavesdrop system of bluetooth earphone end, it is characterized in that, it is an integrated component that this Bluetooth control unit can integrate this encrypt and decrypt unit.
7. enforcement encrypting and decrypting according to claim 4 is in the mobile communication anti-eavesdrop system of bluetooth earphone end, it is characterized in that, this encrypt and decrypt unit is a chip, this chip comprises hardware designs to be encrypted and deciphering, and wherein this encryption method and decryption method comprise parameter enciphered method and time slot becomes code method.
CN201520475535.4U 2015-07-03 2015-07-03 Implement mobile communication anti -eavesdrop system of encryption and decryption in bluetooth headset end Expired - Fee Related CN204761537U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201520475535.4U CN204761537U (en) 2015-07-03 2015-07-03 Implement mobile communication anti -eavesdrop system of encryption and decryption in bluetooth headset end

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201520475535.4U CN204761537U (en) 2015-07-03 2015-07-03 Implement mobile communication anti -eavesdrop system of encryption and decryption in bluetooth headset end

Publications (1)

Publication Number Publication Date
CN204761537U true CN204761537U (en) 2015-11-11

Family

ID=54476203

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201520475535.4U Expired - Fee Related CN204761537U (en) 2015-07-03 2015-07-03 Implement mobile communication anti -eavesdrop system of encryption and decryption in bluetooth headset end

Country Status (1)

Country Link
CN (1) CN204761537U (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105681310A (en) * 2016-01-26 2016-06-15 重庆邮电大学 Bluetooth based voice source real-time voice encryption method
CN106331282A (en) * 2015-07-03 2017-01-11 幸福居福尔摩沙股份有限公司 Mobile phone communication anti-eavesdropping system for implementing encryption and decryption on Bluetooth earphone side
CN106412812A (en) * 2016-11-23 2017-02-15 建荣半导体(深圳)有限公司 Bluetooth voice communication method, Bluetooth voice communication system and Bluetooth headset

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106331282A (en) * 2015-07-03 2017-01-11 幸福居福尔摩沙股份有限公司 Mobile phone communication anti-eavesdropping system for implementing encryption and decryption on Bluetooth earphone side
CN105681310A (en) * 2016-01-26 2016-06-15 重庆邮电大学 Bluetooth based voice source real-time voice encryption method
CN106412812A (en) * 2016-11-23 2017-02-15 建荣半导体(深圳)有限公司 Bluetooth voice communication method, Bluetooth voice communication system and Bluetooth headset

Similar Documents

Publication Publication Date Title
EP0696397B1 (en) Digital radio transceiver with encrypted key storage
US10291591B2 (en) Anti-eavesdropping system for mobile phone communication
JPH0851420A (en) Method and system for privately communicating communication signal over radio communication network and communication control equipment circuit therefor
CN101375460A (en) Battery authentication in a wireless communication device
CN103973696B (en) A kind of data processing method of voice call
CN102843677A (en) Voice communication method, device and system
CN204761537U (en) Implement mobile communication anti -eavesdrop system of encryption and decryption in bluetooth headset end
WO2017140426A1 (en) Method and device for writing data into intelligent card
CN105553669A (en) Identity authentication based information encryption transmission apparatus, method, and control method
CN106412812A (en) Bluetooth voice communication method, Bluetooth voice communication system and Bluetooth headset
CN106331282A (en) Mobile phone communication anti-eavesdropping system for implementing encryption and decryption on Bluetooth earphone side
CN103974243B (en) A kind of data handling system of voice call
CN101500231A (en) Mobile terminal, audio data processing method and system
CN102983963A (en) Encryption conversation method and conversation encryption device
CN101304306A (en) Method and apparatus for safety call
CN100576856C (en) The mobile phone scrambler and the secret communication method that are suitable for multiple communication network
CN103986711B (en) A kind of data processing method of voice call
EP2809045B1 (en) Information security attachment device for voice communication and information security method for voice communication using the same
CN103974242A (en) Data processing method of voice communication
CN108270917B (en) Encrypted smart phone
CN201188646Y (en) Telephone secrecy apparatus
Chouhan et al. Real time secure end to end communication over GSM network
CN202818616U (en) Voice communication device and system
CN103986712B (en) A kind of data processing method of voice call
CN103986579B (en) A kind of data handling system of voice call

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20151111

Termination date: 20200703

CF01 Termination of patent right due to non-payment of annual fee