[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN105743912A - Voice encryption method and voice sending terminal - Google Patents

Voice encryption method and voice sending terminal Download PDF

Info

Publication number
CN105743912A
CN105743912A CN201610197555.9A CN201610197555A CN105743912A CN 105743912 A CN105743912 A CN 105743912A CN 201610197555 A CN201610197555 A CN 201610197555A CN 105743912 A CN105743912 A CN 105743912A
Authority
CN
China
Prior art keywords
character string
string information
user
oral account
voice
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610197555.9A
Other languages
Chinese (zh)
Other versions
CN105743912B (en
Inventor
陈涌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201610197555.9A priority Critical patent/CN105743912B/en
Priority to PCT/CN2016/084080 priority patent/WO2017166420A1/en
Publication of CN105743912A publication Critical patent/CN105743912A/en
Application granted granted Critical
Publication of CN105743912B publication Critical patent/CN105743912B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a voice encryption method and a voice sending terminal. The method is applied in the voice sending terminal. The method comprises following steps of judging whether a user starts dictating character string information or not in a call process; if the user starts dictating the character string information, encrypting the user dictated character string information into another piece of character string information; and inputting the encrypted character string information in a mobile communication network. According to the method and the terminal, the voice communication security is improved.

Description

A kind of speech ciphering method and voice send terminal
Technical field
The present invention relates to communication technical field, more particularly, it relates to a kind of speech ciphering method and voice send terminal.
Background technology
The public enjoy that voice communication brings various simultaneously easily, the safety problem that to be also subjected in voice communication very important, wherein most commonly seen to eavesdrop bank card number and password, it is therefore desirable to voice call content is encrypted, particularly as follows: it is encrypted before voice signal enters mobile radio communication, phonetic incepting terminal can decrypt original voice signal after receiving coded signal, and listener-in can only hear the noise owing to voice decryption error causes or noise.
But for geek, when intercepting a piece of noise or noise, easily cracking coded signal is not difficult matter, therefore voice communication remains safely a very stubborn problem.
Summary of the invention
In view of this, the present invention provides a kind of speech ciphering method and voice to send terminal, to improve voice communication safety.
A kind of speech ciphering method, is applied to voice and sends terminal, and described method includes:
Judge whether user starts to give an oral account character string information in communication process;
If so, then start AES, the character string information that user gives an oral account is encrypted to another character string information;
Character string information after encryption is input in mobile radio communication.
Wherein, whether the described user of judgement starts to give an oral account character string information in communication process, including: judge whether user starts to give an oral account character string information in communication process by voice recognition mode.
Wherein, whether the described user of judgement starts to give an oral account character string information in communication process, including: judge whether to receive and manually trigger signal.
Wherein, described AES includes: each character in the character string information of user's oral account is rearranged.
Wherein, described AES includes: all or part of character in the character string information give an oral account user replaces to other characters.
A kind of voice sends terminal, including:
Judging unit, is used for judging whether user starts to give an oral account character string information in communication process;
Ciphering unit, for when described judging unit judges that obtaining user to start to give an oral account character string information, starting AES, the character string information that user gives an oral account be encrypted to another character string information;
Output unit, for being input to the character string information after encryption in mobile radio communication.
Wherein, by voice recognition mode, described judging unit is specifically for judging whether user starts to give an oral account character string information in communication process.
Wherein, described judging unit manually triggers signal specifically for judging whether to receive;When receiving manually triggering signal, it is determined that user to start to give an oral account character string information.
Wherein, described ciphering unit is specifically for when described judging unit judges that obtaining user to start to give an oral account character string information, start the AES that each character being used in the character string information to user's oral account rearranges, the character string information that user gives an oral account is encrypted to another character string information.
Wherein, described ciphering unit is specifically for when described judging unit judges that obtaining user to start to give an oral account character string information, start all or part of character in the character string information being used for user being given an oral account and replace to the AES of other characters, the character string information that user gives an oral account is encrypted to another character string information.
From above-mentioned technical scheme it can be seen that the voice signal that content is character string information is only encrypted by the present invention, the signal after encryption is still normal voice, not easily causes assailant to note, thus improve voice communication safety.Additionally, compared to prior art, voice call content is not done omnidistance encryption by the present invention, therefore also reduces the decryption burden of phonetic incepting terminal.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, the accompanying drawing used required in embodiment or description of the prior art will be briefly described below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the premise not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the disclosed a kind of speech ciphering method flow chart of the embodiment of the present invention;
Fig. 2 is that the disclosed a kind of voice of the embodiment of the present invention sends terminal structure schematic diagram.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, the every other embodiment that those of ordinary skill in the art obtain under not making creative work premise, broadly fall into the scope of protection of the invention.
Referring to Fig. 1, the embodiment of the invention discloses a kind of speech ciphering method, be applied to voice and send terminal, to improve voice communication safety, described method includes:
Step 101: judge whether user starts to give an oral account character string information in communication process;When judging that obtaining user to start to give an oral account character string information, enter step 102;Otherwise, the character string information that user gives an oral account is directly inputted in mobile radio communication, and again performs step 101 on this basis;
Step 102: start AES, is encrypted to another character string information by the character string information that user gives an oral account;
Step 103: the character string information after encryption is input in mobile radio communication;So far, epicycle voice encryption process completes, and returns step 101 afterwards and starts next round voice encryption process.
Character string implication, described character string information can be bank card number and password, individual's sensitive information such as mailbox user name and password, when not limiting to.From string content, described character string information can be the number sequence comprising several digital numbers and/or several letter numbers.
Whether voice sends terminal can detect whether manual triggering signal starts to give an oral account the criterion of character string information as user in communication process, illustrate: voice sends terminal use before utilizing mobile radio communication that oneself bank card number and password are conveyed to phonetic incepting terminal use, can first pressing voice to send a certain control in terminal and carry out suggestion voice and send terminal oneself and to start typing character string information, voice sends and automatically starts AES after terminal receives prompting the character string information that user gives an oral account is encrypted to another character string information.
Or, by voice recognition mode, voice sends terminal can also judge whether user starts to give an oral account character string information, illustrate: when mentioning the printed words such as " bank card number is ", " password is " in voice call process when voice sends terminal use, voice transmission terminal will automatically start AES and the character string information that user gives an oral account is encrypted to another character string information.
In the prior art, audio encryption is that after noise or noise, (the so-called intelligibility of speech drops in its intelligibility of speech, refer to what one or several speaker was sent out, significant linguistic unit percent can be confirmed as by one or several music-listener through communication system) it is zero, there is obvious encrypted feature, note easily caused by assailant, and the present embodiment keeps the intelligibility of speech constant (what namely listener-in heard is also normal voice) before and after audio encryption, this does not show any encrypted feature after making audio encryption, camouflage property is fabulous, it is difficult to be aware voice signal encrypted, assailant is not easily caused to note.
Phonetic incepting end can decrypt original voice signal automatically, but compared to prior art, voice call content is not done omnidistance encryption by the present embodiment, therefore reduces the decryption burden of phonetic incepting terminal.And, owing to the signal after encryption is still normal voice, facilitate phonetic incepting end subscriber record, therefore phonetic incepting end can not also be deciphered, but by phonetic incepting end subscriber decipherment algorithm according to a preconcerted arrangement, the normal voice under pre-recorded is manually deciphered, this reduces the decryption burden of phonetic incepting end further.
Wherein, the AES that the character string information that user gives an oral account is encrypted to another character string information can be that each character in the character string information to user's oral account rearranges, specific implementation can be, the character string information that user is sent carries out speech recognition, and store each character information respectively, then according to preset order rearranges currently stored each character information, thus the character string information after being encrypted;Or, the character string information that user is sent carries out speech recognition, and in the character voice packet prestored, find out the character information corresponding respectively with each character information, then according to preset order rearranges each character information that current lookup goes out, thus the character string information after being encrypted;Certainly, both specific implementations also it are not limited to.Below, illustrate the cipher round results of this AES: voice is sent to the bank card password that content is " xyz13588660517 " of terminal use's typing, voice sends terminal can be encrypted as " 813x0y571z8665 ", and the voice content sent is reconfiguring of the character that same user truly pronounces, or the reconfiguring of the respective symbols in voice packet.
Or, the AES that the character string information that user gives an oral account is encrypted to another character string information can also be that all or part of character in character string information user given an oral account replaces to other characters, specific implementation can be, the character string information that user is sent carries out speech recognition, the character voice packet prestored finds out the character information corresponding respectively with each character information, then all or part of character information gone out by current lookup replaces to the character information of the other guide in this character voice packet, thus the character string information after being encrypted;Certainly, the character voice packet that this prestores both can be that user prerecords, it is also possible to obtains (downloading as from the Internet) from other approach.Below, illustrate a kind of cipher round results of this AES: voice is sent to the bank card password that content is " xyz13588660517 " of terminal use's typing, voice sends terminal can be encrypted as " 2a5764b32c8943 ", and the voice content sent is the character combination that same user truly pronounces, or non-user prerecords the character combination in voice packet.Or, it is also possible to both AESs are combined as a kind of new AES.
By foregoing description it can be seen that the voice signal that content is character string information is only encrypted by the present embodiment, the signal after encryption is still normal voice, not easily causes assailant to note, thus improve voice communication safety.Additionally, due to voice call content is not done omnidistance encryption by the present embodiment, therefore reduce the decryption burden of phonetic incepting terminal.
Additionally, referring to Fig. 2, the embodiment of the invention also discloses a kind of voice and send terminal, to improve voice communication safety, including:
Judging unit 100, is used for judging whether user starts to give an oral account character string information in communication process;
Ciphering unit 200, for when judging unit 100 judges that obtaining user to start to give an oral account character string information, starting AES, the character string information that user gives an oral account be encrypted to another character string information;
Output unit 300, for being input to the character string information after encryption in mobile radio communication.
Wherein, it is judged that by voice recognition mode, unit 100 is specifically for judging whether user starts to give an oral account character string information in communication process.
Or, it is judged that unit 100 manually triggers signal specifically for judging whether to receive;When receiving manually triggering signal, it is determined that user to start to give an oral account character string information.
Wherein, ciphering unit 200 is specifically for when described judging unit judges that obtaining user to start to give an oral account character string information, start the AES that each character being used in the character string information to user's oral account rearranges, the character string information that user gives an oral account is encrypted to another character string information.
Or, ciphering unit 200 is specifically for when described judging unit judges that obtaining user to start to give an oral account character string information, start the AES that each character being used in the character string information to user's oral account rearranges, the character string information that user gives an oral account is encrypted to another character string information.
In sum, the voice signal that content is character string information is only encrypted by the present invention, and the signal after encryption is still normal voice, not easily causes assailant to note, thus improve voice communication safety.Additionally, compared to prior art, voice call content is not done omnidistance encryption by the present invention, therefore also reduces the decryption burden of phonetic incepting terminal.
In this specification, each embodiment adopts the mode gone forward one by one to describe, and what each embodiment stressed is the difference with other embodiments, between each embodiment identical similar portion mutually referring to.Sending for voice disclosed in embodiment for terminal, owing to it corresponds to the method disclosed in Example, so what describe is fairly simple, relevant part illustrates referring to method part.
Described above to the disclosed embodiments, makes professional and technical personnel in the field be capable of or uses the present invention.The multiple amendment of these embodiments be will be apparent from for those skilled in the art, and generic principles defined herein when without departing from the spirit or scope of the embodiment of the present invention, can realize in other embodiments.Therefore, the embodiment of the present invention is not intended to be limited to the embodiments shown herein, and is to fit to the widest scope consistent with principles disclosed herein and features of novelty.

Claims (10)

1. a speech ciphering method, is applied to voice and sends terminal, it is characterised in that described method includes:
Judge whether user starts to give an oral account character string information in communication process;
If so, then start AES, the character string information that user gives an oral account is encrypted to another character string information;
Character string information after encryption is input in mobile radio communication.
2. method according to claim 1, it is characterised in that whether the described user of judgement starts to give an oral account character string information in communication process, including:
Judge whether user starts to give an oral account character string information in communication process by voice recognition mode.
3. method according to claim 1, it is characterised in that whether the described user of judgement starts to give an oral account character string information in communication process, including:
Judge whether to receive and manually trigger signal.
4. method according to claim 1, it is characterised in that described AES includes: each character in the character string information of user's oral account is rearranged.
5. method according to claim 1, it is characterised in that described AES includes: all or part of character in the character string information give an oral account user replaces to other characters.
6. a voice sends terminal, it is characterised in that including:
Judging unit, is used for judging whether user starts to give an oral account character string information in communication process;
Ciphering unit, for when described judging unit judges that obtaining user to start to give an oral account character string information, starting AES, the character string information that user gives an oral account be encrypted to another character string information;
Output unit, for being input to the character string information after encryption in mobile radio communication.
7. voice according to claim 6 sends terminal, it is characterised in that by voice recognition mode, described judging unit is specifically for judging whether user starts to give an oral account character string information in communication process.
8. voice according to claim 6 sends terminal, it is characterised in that described judging unit manually triggers signal specifically for judging whether to receive;When receiving manually triggering signal, it is determined that user to start to give an oral account character string information.
9. voice according to claim 6 sends terminal, it is characterized in that, described ciphering unit is specifically for when described judging unit judges that obtaining user to start to give an oral account character string information, start the AES that each character being used in the character string information to user's oral account rearranges, the character string information that user gives an oral account is encrypted to another character string information.
10. voice according to claim 6 sends terminal, it is characterized in that, described ciphering unit is specifically for when described judging unit judges that obtaining user to start to give an oral account character string information, start all or part of character in the character string information being used for user being given an oral account and replace to the AES of other characters, the character string information that user gives an oral account is encrypted to another character string information.
CN201610197555.9A 2016-03-31 2016-03-31 Voice encryption method and voice sending terminal Active CN105743912B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610197555.9A CN105743912B (en) 2016-03-31 2016-03-31 Voice encryption method and voice sending terminal
PCT/CN2016/084080 WO2017166420A1 (en) 2016-03-31 2016-05-31 Voice encryption method and voice transmission terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610197555.9A CN105743912B (en) 2016-03-31 2016-03-31 Voice encryption method and voice sending terminal

Publications (2)

Publication Number Publication Date
CN105743912A true CN105743912A (en) 2016-07-06
CN105743912B CN105743912B (en) 2020-04-07

Family

ID=56253159

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610197555.9A Active CN105743912B (en) 2016-03-31 2016-03-31 Voice encryption method and voice sending terminal

Country Status (2)

Country Link
CN (1) CN105743912B (en)
WO (1) WO2017166420A1 (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1538857A2 (en) * 2003-12-05 2005-06-08 Sagem SA Method for backing up mobile telephone data
CN101014060A (en) * 2007-02-02 2007-08-08 东南大学 Voice encryption method for GoTone handset with anti longterm prediction rule pulse excitation compression coding
CN101631304A (en) * 2009-07-23 2010-01-20 东南大学 Anti-adaptive multi-rate coding third-generation mobile communication end-to-end voice encryption method
CN101909290A (en) * 2010-08-25 2010-12-08 中兴通讯股份有限公司 Method, system and mobile terminal for encrypting voice call
CN102811439A (en) * 2011-06-02 2012-12-05 中兴通讯股份有限公司 Method and system for voice processing
CN104378198A (en) * 2014-10-16 2015-02-25 南京中科龙脉物联网技术有限公司 Voice encryption method based on block cipher system
CN104994500A (en) * 2015-05-22 2015-10-21 南京科烁志诺信息科技有限公司 Voice secrecy transmission method and device used for mobile phone
CN105050082A (en) * 2015-09-11 2015-11-11 深圳市九鼎安华科技有限公司 Voice communication method and device
CN105357007A (en) * 2014-08-21 2016-02-24 深圳市中兴微电子技术有限公司 Encryption communication method and communication terminal

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102761867A (en) * 2011-04-29 2012-10-31 德信智能手机技术(北京)有限公司 Method for increasing session safety and session equipment
CN102333042A (en) * 2011-10-31 2012-01-25 深信服网络科技(深圳)有限公司 Method, security gateway and system for preventing data leakage
CN103516915A (en) * 2012-06-27 2014-01-15 百度在线网络技术(北京)有限公司 Method, system and device for replacing sensitive words in call process of mobile terminal
CN103595844A (en) * 2013-11-15 2014-02-19 深圳市中兴移动通信有限公司 Processing method and device for dual-tone multi-frequency number
WO2015115798A1 (en) * 2014-01-29 2015-08-06 Samsung Electronics Co., Ltd. User terminal device and secured communication method thereof

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1538857A2 (en) * 2003-12-05 2005-06-08 Sagem SA Method for backing up mobile telephone data
CN101014060A (en) * 2007-02-02 2007-08-08 东南大学 Voice encryption method for GoTone handset with anti longterm prediction rule pulse excitation compression coding
CN101631304A (en) * 2009-07-23 2010-01-20 东南大学 Anti-adaptive multi-rate coding third-generation mobile communication end-to-end voice encryption method
CN101909290A (en) * 2010-08-25 2010-12-08 中兴通讯股份有限公司 Method, system and mobile terminal for encrypting voice call
CN102811439A (en) * 2011-06-02 2012-12-05 中兴通讯股份有限公司 Method and system for voice processing
CN105357007A (en) * 2014-08-21 2016-02-24 深圳市中兴微电子技术有限公司 Encryption communication method and communication terminal
CN104378198A (en) * 2014-10-16 2015-02-25 南京中科龙脉物联网技术有限公司 Voice encryption method based on block cipher system
CN104994500A (en) * 2015-05-22 2015-10-21 南京科烁志诺信息科技有限公司 Voice secrecy transmission method and device used for mobile phone
CN105050082A (en) * 2015-09-11 2015-11-11 深圳市九鼎安华科技有限公司 Voice communication method and device

Also Published As

Publication number Publication date
WO2017166420A1 (en) 2017-10-05
CN105743912B (en) 2020-04-07

Similar Documents

Publication Publication Date Title
US6907123B1 (en) Secure voice communication system
JP4260896B2 (en) Method and apparatus for encrypting a transmitted signal
US9226147B2 (en) System and method of securing instant messaging sessions
US20110026699A1 (en) Method and system for authenticating telephone callers and avoiding unwanted calls
CN104767746B (en) PUSH message method of reseptance, information push method, client and server
WO2007063420A3 (en) Authentication in communications networks
WO2016062153A1 (en) Method, system, and terminal for secure transmission of audio data
CN106603504A (en) VoIP (Voice over Internet Protocol) encrypting and monitoring methods and VoIP encrypting and monitoring devices
US5696880A (en) Communication system user authentication method
CN109561056B (en) Secret communication method, system, mobile terminal and wearable device
KR20080084716A (en) Fast authentication over slow channels
CN110380856A (en) Terminal device and its voice information processing method, device and storage medium
ITTO20010321A1 (en) PROCEDURE FOR THE TRANSMISSION OF SMS MESSAGES WITH PROTECTED IDENTITY.
JP5691586B2 (en) Secret communication system, apparatus and program
US7177425B2 (en) Device and method for securing information associated with a subscriber in a communication apparatus
CN104468988A (en) Mobile terminal and telephone answering method and device in non-safe mode
US20070055861A1 (en) System and method for hyper-chaos secure communication
US7571317B1 (en) Providing user notification signals in phones that use encryption
CN105743912A (en) Voice encryption method and voice sending terminal
CN108270917B (en) Encrypted smart phone
CN103986640A (en) Instant messaging method and system capable of guaranteeing safety of user communication content
US20060003737A1 (en) User transparent registration process for secure communication
JP4856380B2 (en) Method for generating cryptosync
KR20210050318A (en) Method for identifying user using sound and apparatus therefor
WO2011157005A1 (en) Control method and system for mobile terminal, and mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant