Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Bluetooth headset with voice encryption function and voice encryption method of Bluetooth headset

A voice encryption and Bluetooth headset technology, applied in transducer circuits, near-field transmission systems using transceivers, sensors, etc., can solve the problems of lossy encoding and decoding algorithms, great difficulties, and leaking calls, and simplify operations Use process, easy to use, high time synchronization effect

Active Publication Date: 2015-09-30
SHENZHEN BEIDOU COMM TECH CO
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method cannot dynamically change the key during a call, let alone switch the keys of both parties synchronously after a period of time in the call, without generating noise
Because if the method of dynamically switching the encryption key is used, a new problem will arise. During dynamic switching, the switching time of the two parties in the call needs to be synchronized with the voice transmission process, otherwise there will be noise caused by voice time misalignment or hearing brief undecipherable speech
This problem arises because the transmission of voice in the mobile communication network takes time, and the required delay time is not the same between networks in different regions, and the length of the delay will also vary during a call. If the method of switching the encryption frequency point at regular intervals is adopted, the receiving end will have already switched the encrypted signal before it arrives, which will cause the voice decryption error; and as the call time goes on, the decryption error The length of time is also constantly changing, and the phenomenon is that you will hear some noise and noise caused by decryption errors.
[0004] At the same time, if the voice is encrypted in this way and transmitted through the 2G voice channel (GSM, CDMA), the difficulty is relatively large and it is difficult to succeed. The main reason is that if the encrypted voice is received by the other party, it needs to be decrypted. The prerequisite for successful decryption is that the content of the voice data remains the same without major changes
However, when the encrypted voice is transmitted, it has been processed by the encoding and decoding algorithms of the GSM / CDMA network itself, and these encoding and decoding algorithms are inherently lossy, so the voice data received by the other party is very different from the original encrypted data. Changes, and this change has different effects in different time periods, so it is impossible to decrypt and restore the original
[0005]In addition, this method uses data channels to transmit encrypted voice data. This method is very different from the habitual process of ordinary people making and receiving calls. it will be a lot of inconvenience
The most important thing is that once the fixed encryption key is mastered by the stealer, all calls will be leaked and all equipment will be invalidated, so it has to be redesigned
[0006] Taking the built-in chip as an example, if the method of modifying the software and hardware of the mobile phone is used to achieve the purpose of encrypted calls, then many users will not be able to use their own mobile phones, and must re-purchase a specific mobile phone, which will bring a lot of problems. Funding issues are generally difficult for users to accept, and there is a greater difficulty in promotion

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bluetooth headset with voice encryption function and voice encryption method of Bluetooth headset
  • Bluetooth headset with voice encryption function and voice encryption method of Bluetooth headset

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030]In order to enable those skilled in the art to better understand the technical solution of the present invention, and to make the above-mentioned purpose, features and advantages of the present invention more obvious and understandable, the product of the present invention will be further described in detail below in conjunction with the embodiments and accompanying drawings illustrate.

[0031] Such as figure 1 Shown, a kind of bluetooth earphone with voice encryption function, comprises bluetooth control circuit, synchronous signal encoder, synchronous signal decoder, voice encryption circuit and key management circuit, described synchronous signal encoder, synchronous signal decoder, voice encryption The circuit and the button management circuit are all connected with the bluetooth control circuit.

[0032] The Bluetooth earphone also includes a SPK speaker circuit and a voice input MIC circuit, and the SPK speaker circuit and the voice input MIC circuit are connecte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a Bluetooth headset with a voice encryption function and a voice encryption method of the Bluetooth headset. The Bluetooth headset comprises a Bluetooth control circuit, a synchronizing signal encoder, a synchronizing signal decoder, a voice encryption circuit and a key management circuit, wherein the synchronizing signal encoder, the synchronizing signal decoder, the voice encryption circuit and the key management circuit are connected with the Bluetooth control circuit. The voice encryption method of the Bluetooth headset comprises processes of simulation language encryption, synchronous encryption and dynamic encryption. The Bluetooth headset with the voice encryption function and the voice encryption method of the Bluetooth headset have the characteristics of high confidentiality, high synchronicity, good convenience in use, wide application range and low cost.

Description

technical field [0001] The invention relates to the technical field of bluetooth earphones, in particular to a bluetooth earphone with a voice encryption function and a voice encryption method thereof. Background technique [0002] In recent years, with the development of communication technology, Bluetooth earphones have become more and more popular in mobile phone communication as an external accessory, and how to keep the call content confidential to avoid leakage has also attracted more and more attention. In order to improve the security function of the Bluetooth headset, external accessories or built-in chips are generally used, but there are certain problems in both. [0003] Taking external mobile phone accessories as an example, the voice data is encrypted, and then transmitted to the mobile phone through wired or wireless means, and then sent to the other party through the data channel of the mobile communication network. Similarly, the other party also uses an ex...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04R3/00H04L9/00H04B5/02H04B5/48
Inventor 吕建峰时文忠马雪曾昭凡
Owner SHENZHEN BEIDOU COMM TECH CO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products