WO2017166420A1 - Voice encryption method and voice transmission terminal - Google Patents
Voice encryption method and voice transmission terminal Download PDFInfo
- Publication number
- WO2017166420A1 WO2017166420A1 PCT/CN2016/084080 CN2016084080W WO2017166420A1 WO 2017166420 A1 WO2017166420 A1 WO 2017166420A1 CN 2016084080 W CN2016084080 W CN 2016084080W WO 2017166420 A1 WO2017166420 A1 WO 2017166420A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- string information
- user
- voice
- dictation
- call
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
Definitions
- the present invention relates to the field of communications technologies, and in particular, to a voice encryption method and a voice transmitting terminal.
- the voice signal is encrypted before it enters the mobile communication network, and the voice receiving terminal can decrypt the original voice signal after receiving the encrypted signal, and the eavesdropper can only hear the noise or noise caused by the voice decryption error.
- the present invention provides a voice encryption method and a voice transmission terminal to improve voice communication security.
- a voice encryption method is applied to a voice transmitting terminal, and the method includes:
- the encrypted string information is input to the mobile communication network.
- the determining whether the user wants to start the dictation string information during the call includes: determining, by using a voice recognition manner, whether the user starts the dictation string information during the call.
- the determining whether the user starts to start the dictation string information during the call includes: determining whether a manual trigger signal is received.
- the encryption algorithm includes: re-charging each character in the string information dictated by the user. arrangement.
- the encryption algorithm includes: replacing all or part of characters in the string information dictated by the user with other characters.
- a voice transmitting terminal includes:
- a determining unit configured to determine whether the user wants to start dictation string information during the call
- An encryption unit configured to: when the determining unit determines that the user wants to start the dictation string information, start an encryption algorithm, and encrypt the character string information dictated by the user into another character string information;
- An output unit configured to input the encrypted string information into a mobile communication network.
- the determining unit is specifically configured to determine, by using a voice recognition manner, whether the user starts the dictation string information during the call.
- the determining unit is specifically configured to determine whether a manual trigger signal is received; when receiving the manual trigger signal, determine that the user wants to start dictating the string information.
- the encryption unit is specifically configured to: when the determining unit determines that the user wants to start the dictation string information, initiate an encryption algorithm for rearranging each character in the string information dictated by the user, and dictating the user
- the string information is encrypted into another string information.
- the encryption unit is specifically configured to: when the determining unit determines that the user wants to start the dictation string information, initiate an encryption algorithm for replacing all or part of the characters in the string information dictated by the user with other characters.
- the string information dictated by the user is encrypted into another string information.
- the present invention only encrypts the voice signal whose content is string information, and the encrypted signal is still normal voice, which is not easy to attract the attention of the attacker, thereby improving the security of the voice communication.
- the present invention does not encrypt the voice call content in full, and thus reduces the decryption burden of the voice receiving terminal.
- FIG. 1 is a flowchart of a voice encryption method according to an embodiment of the present invention
- FIG. 2 is a schematic structural diagram of a voice sending terminal according to an embodiment of the present invention.
- FIG. 3 is a schematic structural diagram of another voice sending terminal according to an embodiment of the present invention.
- an embodiment of the present invention discloses a voice encryption method, which is applied to a voice sending terminal to improve voice communication security.
- the method includes:
- Step 101 Determine whether the user wants to start the dictation string information during the call; when it is determined that the user wants to start the dictation string information, the process proceeds to step 102; otherwise, the character string information dictated by the user is directly input into the mobile communication network. And on this basis, perform step 101 again;
- Step 102 Start an encryption algorithm, and encrypt the string information dictated by the user into another string information.
- Step 103 Input the encrypted character string information into the mobile communication network; at this point, the current round of voice encryption process is completed, and then return to step 101 to start the next round of voice encryption process.
- the string information may be sensitive information such as a bank card number and password, a personal mailbox user name and a password, and is not limited. From the point of view of the contents of the string, the string information may be a sequence of numbers containing a number of digital numbers and/or a number of letter numbers.
- the voice transmitting terminal may use the manual trigger signal as a criterion for determining whether the user wants to start the dictation string information during the call. For example, the voice transmitting terminal user communicates the bank card number and password to the mobile communication network. Before the voice receiving terminal user, the user may first press a certain control on the voice sending terminal to prompt the voice transmitting terminal to start entering the string information. After receiving the prompt, the voice sending terminal automatically starts the encryption algorithm to dictate the string information of the user. Encrypted into another string of information.
- the voice transmitting terminal may also determine whether the user wants to start the dictation string information by using a voice recognition manner. For example, when the voice transmitting terminal user says “bank card number is” and “password is” during the voice call, The voice transmitting terminal will automatically start the encryption algorithm to put the user port. The string information described is encrypted into another string information.
- the speech signal is encrypted into noise or noise and its language intelligibility is reduced (so-called language intelligibility, which is one or several speakers, and can be listened to by one or several voices through the communication system.
- language intelligibility which is one or several speakers, and can be listened to by one or several voices through the communication system.
- the number of linguistic units that people have identified as meaningful is zero, with obvious encryption features, which is easy to attract the attention of attackers.
- this embodiment keeps the language intelligibility of the voice signal before and after encryption (that is, the eavesdropper hears Normal voice), which makes the voice signal not show any encryption features after encryption, and is excellent in camouflage. It is difficult to be aware that the voice signal has been encrypted and is not easy to attract the attention of the attacker.
- the voice receiving end can automatically decrypt the original voice signal, but compared with the prior art, the present embodiment does not encrypt the voice call content in full, thereby reducing the decryption burden of the voice receiving terminal. Moreover, since the encrypted signal is still normal voice, it is convenient for the voice receiving end user to record, so the voice receiving end can also not decrypt, but the voice receiving end user performs manual processing on the pre-recorded normal voice according to the agreed decryption algorithm. Decryption, which further reduces the decryption burden on the voice receiving end.
- the encryption algorithm for encrypting the character string information of the user to another string information may be to rearrange the characters in the string information of the user's dictation.
- the specific implementation manner may be: performing string information sent by the user. Speech recognition, and separately storing each character information, and then rearranging the currently stored character information in a preset order to obtain the encrypted string information; or, performing voice recognition on the string information sent by the user, and
- the pre-stored character voice packet finds the character information corresponding to each character information, and then rearranges the currently found character information according to the preset order, thereby obtaining the encrypted character string information; of course, it is not limited. In these two specific implementations.
- the encryption effect of the encryption algorithm is exemplified: for the password of the bank card that the user of the voice transmission terminal inputs is "xyz13588660517", the voice transmitting terminal can encrypt it as "813x0y571z8665", and the voice content sent is the same user.
- the encryption algorithm for encrypting the string information of the user's dictation into another string information may also replace all or part of the characters in the string information dictated by the user with other characters, and the specific implementation may be:
- the character string information is used for voice recognition, and character information corresponding to each character information is searched in a pre-stored character voice packet, and then all or part of the character information currently found is replaced with other content in the character voice packet.
- an encryption effect of the encryption algorithm is exemplified: for the bank card password of the content of the "xyz13588660517" entered by the voice transmitting terminal user, the voice transmitting terminal can encrypt it as "2a5764b32c8943", and the voice content sent is A combination of characters that are actually pronounced by the same user, or a combination of characters in a non-user pre-recorded voice package.
- the two encryption algorithms can be combined as a new encryption algorithm.
- an embodiment of the present invention further discloses a voice sending terminal to improve voice communication security, including:
- the determining unit 100 is configured to determine whether the user wants to start the dictation string information during the call;
- the encryption unit 200 is configured to: when the determining unit 100 determines that the user wants to start the dictation string information, start the encryption algorithm, and encrypt the character string information dictated by the user into another character string information;
- the output unit 300 is configured to input the encrypted string information into the mobile communication network.
- the determining unit 100 is specifically configured to determine, by using a voice recognition manner, whether the user wants to start dictation string information during a call.
- the determining unit 100 is specifically configured to determine whether a manual trigger signal is received; when the manual trigger signal is received, it is determined that the user wants to start the dictation string information.
- the encryption unit 200 is specifically configured to: when the determining unit determines that the user wants to start the dictation string information, activate an encryption algorithm for rearranging each character in the character string information dictated by the user, and dictate the character of the user.
- the string information is encrypted into another string information.
- the encryption unit 200 is specifically configured to: when the determining unit determines that the user wants to start the dictation string information, initiate an encryption algorithm for rearranging each character in the string information dictated by the user, and dictate the character of the user.
- the string information is encrypted into another string information.
- the present invention encrypts only the voice signal whose content is string information, and the encrypted signal is still normal voice, which is not easy to attract the attention of an attacker, thereby improving the security of voice communication.
- the present invention does not encrypt the voice call content in full, and thus reduces the decryption burden of the voice receiving terminal.
- the terminal 7 may include: at least one processor 71, such as a CPU, at least one communication bus 72, and a memory 73;
- the communication bus 72 is used to implement connection communication between these components;
- the memory 73 may be a high speed RAM memory or a non-volatile memory such as at least one disk memory.
- a set of program codes is stored in the memory 73, and the processor 71 is configured to call the program code stored in the memory 73 for performing the following operations:
- the encrypted string information is input to the mobile communication network.
- the processor 71 performs the following operations when performing the determination of whether the user wants to start the dictation string information during the call:
- the voice recognition method is used to determine whether the user wants to start dictation string information during the call.
- the processor 71 performs the following operations when performing the determination of whether the user wants to start the dictation string information during the call:
- the encryption algorithm includes: rearranging characters in the string information dictated by the user.
- the encryption algorithm includes: replacing all or part of characters in the string information dictated by the user with other characters.
- the present invention encrypts only the voice signal whose content is string information, and the encrypted signal is still normal voice, which is not easy to attract the attention of an attacker, thereby improving the security of voice communication.
- the present invention does not encrypt the voice call content in full, and thus reduces the decryption burden of the voice receiving terminal.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Disclosed in the present application are a voice encryption method and voice transmission terminal, said method being used for said voice transmission terminal, and said method comprising: determining whether to start oral character-string information during a call; if so, then launching an encryption algorithm and encrypting a user's oral character-string information into another character-string information; inputting the encrypted character-string information to a mobile communication network, thereby improving voice-communication security.
Description
本申请要求于2016年3月31日提交中国专利局,申请号为201610197555.9、发明名称为“一种语音加密方法和语音发送终端”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims priority to Chinese Patent Application No. 201610197555.9, entitled "A Voice Encryption Method and Voice Transmission Terminal", filed on March 31, 2016, the entire contents of which are incorporated herein by reference. In the application.
本发明涉及通信技术领域,更具体地说,涉及一种语音加密方法和语音发送终端。The present invention relates to the field of communications technologies, and in particular, to a voice encryption method and a voice transmitting terminal.
公众在享受语音通信带来的各种便利的同时,也承受着语音通信中不可忽视的安全问题,其中以窃听银行卡卡号和密码最为常见,因此有必要对语音通话内容进行加密,具体为:在语音信号进入移动通信网之前对其进行加密,语音接收终端在接收到加密信号后能够解密出原始的语音信号,而窃听者只能听到由于语音解密错误造成的噪音或杂音。While enjoying the convenience brought by voice communication, the public also bears the security problems that cannot be ignored in voice communication. Among them, it is most common to eavesdrop on bank card number and password. Therefore, it is necessary to encrypt the voice call content, specifically: The voice signal is encrypted before it enters the mobile communication network, and the voice receiving terminal can decrypt the original voice signal after receiving the encrypted signal, and the eavesdropper can only hear the noise or noise caused by the voice decryption error.
但对于计算机高手来说,在只能窃听到一片噪音或杂音的情况下,轻松破解加密信号并不是难事,因此语音通信安全仍然是一个非常棘手的问题。But for computer experts, it is not difficult to easily crack the encrypted signal when only a noise or noise is eavesdropped, so voice communication security is still a very difficult problem.
发明内容Summary of the invention
有鉴于此,本发明提供一种语音加密方法和语音发送终端,以提高语音通信安全。In view of this, the present invention provides a voice encryption method and a voice transmission terminal to improve voice communication security.
一种语音加密方法,应用于语音发送终端,所述方法包括:A voice encryption method is applied to a voice transmitting terminal, and the method includes:
判断用户在通话过程中是否要开始口述字符串信息;Determine whether the user wants to start dictation string information during the call;
若是,则启动加密算法,将用户口述的字符串信息加密成另一字符串信息;If yes, the encryption algorithm is started, and the string information dictated by the user is encrypted into another string information;
将加密后的字符串信息输入到移动通信网中。The encrypted string information is input to the mobile communication network.
其中,所述判断用户在通话过程中是否要开始口述字符串信息,包括:通过语音识别方式判断用户在通话过程中是否要开始口述字符串信息。The determining whether the user wants to start the dictation string information during the call includes: determining, by using a voice recognition manner, whether the user starts the dictation string information during the call.
其中,所述判断用户在通话过程中是否要开始口述字符串信息,包括:判断是否接收到手动触发信号。The determining whether the user starts to start the dictation string information during the call includes: determining whether a manual trigger signal is received.
其中,所述加密算法包括:对用户口述的字符串信息中的各字符进行重新
排列。The encryption algorithm includes: re-charging each character in the string information dictated by the user.
arrangement.
其中,所述加密算法包括:将用户口述的字符串信息中的全部或部分字符替换成其他字符。The encryption algorithm includes: replacing all or part of characters in the string information dictated by the user with other characters.
一种语音发送终端,包括:A voice transmitting terminal includes:
判断单元,用于判断用户在通话过程中是否要开始口述字符串信息;a determining unit, configured to determine whether the user wants to start dictation string information during the call;
加密单元,用于在所述判断单元判断得到用户要开始口述字符串信息时,启动加密算法,将用户口述的字符串信息加密成另一字符串信息;An encryption unit, configured to: when the determining unit determines that the user wants to start the dictation string information, start an encryption algorithm, and encrypt the character string information dictated by the user into another character string information;
输出单元,用于将加密后的字符串信息输入到移动通信网中。An output unit, configured to input the encrypted string information into a mobile communication network.
其中,所述判断单元具体用于通过语音识别方式判断用户在通话过程中是否要开始口述字符串信息。The determining unit is specifically configured to determine, by using a voice recognition manner, whether the user starts the dictation string information during the call.
其中,所述判断单元具体用于判断是否接收到手动触发信号;当接收到手动触发信号时,判定用户要开始口述字符串信息。The determining unit is specifically configured to determine whether a manual trigger signal is received; when receiving the manual trigger signal, determine that the user wants to start dictating the string information.
其中,所述加密单元具体用于在所述判断单元判断得到用户要开始口述字符串信息时,启动用来对用户口述的字符串信息中的各字符进行重新排列的加密算法,将用户口述的字符串信息加密成另一字符串信息。The encryption unit is specifically configured to: when the determining unit determines that the user wants to start the dictation string information, initiate an encryption algorithm for rearranging each character in the string information dictated by the user, and dictating the user The string information is encrypted into another string information.
其中,所述加密单元具体用于在所述判断单元判断得到用户要开始口述字符串信息时,启动用来将用户口述的字符串信息中的全部或部分字符替换成其他字符的加密算法,将用户口述的字符串信息加密成另一字符串信息。The encryption unit is specifically configured to: when the determining unit determines that the user wants to start the dictation string information, initiate an encryption algorithm for replacing all or part of the characters in the string information dictated by the user with other characters. The string information dictated by the user is encrypted into another string information.
从上述的技术方案可以看出,本发明只对内容为字符串信息的语音信号进行加密,加密后的信号仍为正常语音,不易引起攻击者注意,从而提高了语音通信安全。此外,相较于现有技术,本发明不对语音通话内容做全程加密,因此还降低了语音接收终端的解密负担。It can be seen from the above technical solution that the present invention only encrypts the voice signal whose content is string information, and the encrypted signal is still normal voice, which is not easy to attract the attention of the attacker, thereby improving the security of the voice communication. In addition, compared with the prior art, the present invention does not encrypt the voice call content in full, and thus reduces the decryption burden of the voice receiving terminal.
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the description of the prior art will be briefly described below. Obviously, the drawings in the following description are only It is a certain embodiment of the present invention, and other drawings can be obtained from those skilled in the art without any creative work.
图1为本发明实施例公开的一种语音加密方法流程图;
FIG. 1 is a flowchart of a voice encryption method according to an embodiment of the present invention;
图2为本发明实施例公开的一种语音发送终端结构示意图;2 is a schematic structural diagram of a voice sending terminal according to an embodiment of the present invention;
图3为本发明实施例公开的另一种语音发送终端结构示意图。FIG. 3 is a schematic structural diagram of another voice sending terminal according to an embodiment of the present invention.
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The technical solutions in the embodiments of the present invention are clearly and completely described in the following with reference to the accompanying drawings in the embodiments of the present invention. It is obvious that the described embodiments are only a part of the embodiments of the present invention, but not all embodiments. All other embodiments obtained by those skilled in the art based on the embodiments of the present invention without creative efforts are within the scope of the present invention.
参见图1,本发明实施例公开了一种语音加密方法,应用于语音发送终端,以提高语音通信安全,所述方法包括:Referring to FIG. 1 , an embodiment of the present invention discloses a voice encryption method, which is applied to a voice sending terminal to improve voice communication security. The method includes:
步骤101:判断用户在通话过程中是否要开始口述字符串信息;在判断得到用户要开始口述字符串信息时,进入步骤102;否则,将用户口述的字符串信息直接输入到移动通信网中,并在此基础上再次执行步骤101;Step 101: Determine whether the user wants to start the dictation string information during the call; when it is determined that the user wants to start the dictation string information, the process proceeds to step 102; otherwise, the character string information dictated by the user is directly input into the mobile communication network. And on this basis, perform step 101 again;
步骤102:启动加密算法,将用户口述的字符串信息加密成另一字符串信息;Step 102: Start an encryption algorithm, and encrypt the string information dictated by the user into another string information.
步骤103:将加密后的字符串信息输入到移动通信网中;至此,本轮语音加密过程完成,之后返回步骤101开始下一轮语音加密过程。Step 103: Input the encrypted character string information into the mobile communication network; at this point, the current round of voice encryption process is completed, and then return to step 101 to start the next round of voice encryption process.
从字符串含义上来看,所述字符串信息可以是银行卡卡号和密码、个人邮箱用户名和密码等敏感信息,当并不局限。从字符串内容上来看,所述字符串信息可以是包含若干个数字号码和/或若干个字母号码的号码序列。From the point of view of the meaning of the string, the string information may be sensitive information such as a bank card number and password, a personal mailbox user name and a password, and is not limited. From the point of view of the contents of the string, the string information may be a sequence of numbers containing a number of digital numbers and/or a number of letter numbers.
语音发送终端可以以是否检测到手动触发信号作为用户在通话过程中是否要开始口述字符串信息的判断标准,举例说明:语音发送终端用户在利用移动通信网把自己的银行卡卡号和密码传达给语音接收终端用户前,可以先按下语音发送终端上的某一控件来提示语音发送终端自己要开始录入字符串信息,语音发送终端收到提示后自动启动加密算法来将用户口述的字符串信息加密成另一字符串信息。The voice transmitting terminal may use the manual trigger signal as a criterion for determining whether the user wants to start the dictation string information during the call. For example, the voice transmitting terminal user communicates the bank card number and password to the mobile communication network. Before the voice receiving terminal user, the user may first press a certain control on the voice sending terminal to prompt the voice transmitting terminal to start entering the string information. After receiving the prompt, the voice sending terminal automatically starts the encryption algorithm to dictate the string information of the user. Encrypted into another string of information.
或者,语音发送终端也可以通过语音识别方式判断用户是否要开始口述字符串信息,举例说明:当语音发送终端用户在语音通话过程中说到“银行卡卡号为”、“密码为”等字样时,语音发送终端就会自动启动加密算法来将用户口
述的字符串信息加密成另一字符串信息。Alternatively, the voice transmitting terminal may also determine whether the user wants to start the dictation string information by using a voice recognition manner. For example, when the voice transmitting terminal user says “bank card number is” and “password is” during the voice call, The voice transmitting terminal will automatically start the encryption algorithm to put the user port.
The string information described is encrypted into another string information.
在现有技术中,语音信号加密为噪音或杂音后其语言可懂度降(所谓语言可懂度,是指一个或几个发音人所发的、经过通信系统能被一个或几个听音人所确认为有意义的语言单位百分数)为零,具有明显的加密特征,容易引起攻击者注意,而本实施例保持语音信号加密前后的语言可懂度不变(即窃听者听到的也是正常语音),这使得语音信号加密后不表现出任何加密特征,伪装性极好,难以被察觉到语音信号已被加密,不易引起攻击者注意。In the prior art, the speech signal is encrypted into noise or noise and its language intelligibility is reduced (so-called language intelligibility, which is one or several speakers, and can be listened to by one or several voices through the communication system. The number of linguistic units that people have identified as meaningful is zero, with obvious encryption features, which is easy to attract the attention of attackers. However, this embodiment keeps the language intelligibility of the voice signal before and after encryption (that is, the eavesdropper hears Normal voice), which makes the voice signal not show any encryption features after encryption, and is excellent in camouflage. It is difficult to be aware that the voice signal has been encrypted and is not easy to attract the attention of the attacker.
语音接收端可以自动解密出原始的语音信号,但相较于现有技术,本实施例不对语音通话内容做全程加密,因此降低了语音接收终端的解密负担。并且,由于加密后的信号仍是正常语音,方便语音接收端用户记录,因此语音接收端也可以不做解密,而是由语音接收端用户根据约定的解密算法对预先记录下的正常语音进行人工解密,这进一步降低语音接收端的解密负担。The voice receiving end can automatically decrypt the original voice signal, but compared with the prior art, the present embodiment does not encrypt the voice call content in full, thereby reducing the decryption burden of the voice receiving terminal. Moreover, since the encrypted signal is still normal voice, it is convenient for the voice receiving end user to record, so the voice receiving end can also not decrypt, but the voice receiving end user performs manual processing on the pre-recorded normal voice according to the agreed decryption algorithm. Decryption, which further reduces the decryption burden on the voice receiving end.
其中,将用户口述的字符串信息加密成另一字符串信息的加密算法可以是对用户口述的字符串信息中的各字符进行重新排列,具体实现方式可以是,对用户发出的字符串信息进行语音识别,并分别存储每一个字符信息,然后按照预设顺序重新排列当前存储的各字符信息,从而得到加密后的字符串信息;或者是,对用户发出的字符串信息进行语音识别,并在预先存储的字符语音包中查找出与每一个字符信息分别对应的字符信息,然后按照预设顺序重新排列当前查找出的各字符信息,从而得到加密后的字符串信息;当然,也并不局限于这两种具体实现方式。下面,举例说明这种加密算法的加密效果:对于语音发送终端用户录入的内容为“xyz13588660517”的银行卡密码,语音发送终端可以将其加密为“813x0y571z8665”,并且发出的语音内容即为同一用户所真实发音的字符的重新组合,或者是语音包中的相应字符的重新组合。The encryption algorithm for encrypting the character string information of the user to another string information may be to rearrange the characters in the string information of the user's dictation. The specific implementation manner may be: performing string information sent by the user. Speech recognition, and separately storing each character information, and then rearranging the currently stored character information in a preset order to obtain the encrypted string information; or, performing voice recognition on the string information sent by the user, and The pre-stored character voice packet finds the character information corresponding to each character information, and then rearranges the currently found character information according to the preset order, thereby obtaining the encrypted character string information; of course, it is not limited. In these two specific implementations. In the following, the encryption effect of the encryption algorithm is exemplified: for the password of the bank card that the user of the voice transmission terminal inputs is "xyz13588660517", the voice transmitting terminal can encrypt it as "813x0y571z8665", and the voice content sent is the same user. The recombination of the characters actually spoken, or the recombination of the corresponding characters in the voice packet.
或者,将用户口述的字符串信息加密成另一字符串信息的加密算法也可以是将用户口述的字符串信息中的全部或部分字符替换成其他字符,具体实现方式可以是,对用户发出的字符串信息进行语音识别,在预先存储的字符语音包中查找出与每一个字符信息分别对应的字符信息,然后将当前查找出的全部或部分字符信息替换成该字符语音包中的其他内容的字符信息,从而得到加密后的字符串信息;当然,该预先存储的字符语音包既可以是用户预先录制的,也
可以是从其他途径获得的(如从互联网上下载的)。下面,举例说明这种加密算法的一种加密效果:对于语音发送终端用户录入的内容为“xyz13588660517”的银行卡密码,语音发送终端可以将其加密为“2a5764b32c8943”,并且发出的语音内容即为同一用户所真实发音的字符组合,或者是非用户预先录制语音包中的字符组合。或者,也可以将这两种加密算法结合起来作为一种新的加密算法。Alternatively, the encryption algorithm for encrypting the string information of the user's dictation into another string information may also replace all or part of the characters in the string information dictated by the user with other characters, and the specific implementation may be: The character string information is used for voice recognition, and character information corresponding to each character information is searched in a pre-stored character voice packet, and then all or part of the character information currently found is replaced with other content in the character voice packet. Character information, thereby obtaining encrypted string information; of course, the pre-stored character voice packet can be pre-recorded by the user,
It can be obtained from other sources (such as downloaded from the Internet). In the following, an encryption effect of the encryption algorithm is exemplified: for the bank card password of the content of the "xyz13588660517" entered by the voice transmitting terminal user, the voice transmitting terminal can encrypt it as "2a5764b32c8943", and the voice content sent is A combination of characters that are actually pronounced by the same user, or a combination of characters in a non-user pre-recorded voice package. Alternatively, the two encryption algorithms can be combined as a new encryption algorithm.
由上述描述可以看出,本实施例只对内容为字符串信息的语音信号进行加密,加密后的信号仍为正常语音,不易引起攻击者注意,从而提高了语音通信安全。此外,由于本实施例不对语音通话内容做全程加密,因此降低了语音接收终端的解密负担。As can be seen from the above description, in this embodiment, only the voice signal whose content is string information is encrypted, and the encrypted signal is still normal voice, which is not easy to attract attention of the attacker, thereby improving the security of voice communication. In addition, since the present embodiment does not perform full-process encryption on the voice call content, the decryption burden of the voice receiving terminal is reduced.
此外,参见图2,本发明实施例还公开了一种语音发送终端,以提高语音通信安全,包括:In addition, referring to FIG. 2, an embodiment of the present invention further discloses a voice sending terminal to improve voice communication security, including:
判断单元100,用于判断用户在通话过程中是否要开始口述字符串信息;The determining unit 100 is configured to determine whether the user wants to start the dictation string information during the call;
加密单元200,用于在判断单元100判断得到用户要开始口述字符串信息时,启动加密算法,将用户口述的字符串信息加密成另一字符串信息;The encryption unit 200 is configured to: when the determining unit 100 determines that the user wants to start the dictation string information, start the encryption algorithm, and encrypt the character string information dictated by the user into another character string information;
输出单元300,用于将加密后的字符串信息输入到移动通信网中。The output unit 300 is configured to input the encrypted string information into the mobile communication network.
其中,判断单元100具体用于通过语音识别方式判断用户在通话过程中是否要开始口述字符串信息。The determining unit 100 is specifically configured to determine, by using a voice recognition manner, whether the user wants to start dictation string information during a call.
或者,判断单元100具体用于判断是否接收到手动触发信号;当接收到手动触发信号时,判定用户要开始口述字符串信息。Alternatively, the determining unit 100 is specifically configured to determine whether a manual trigger signal is received; when the manual trigger signal is received, it is determined that the user wants to start the dictation string information.
其中,加密单元200具体用于在所述判断单元判断得到用户要开始口述字符串信息时,启动用来对用户口述的字符串信息中的各字符进行重新排列的加密算法,将用户口述的字符串信息加密成另一字符串信息。The encryption unit 200 is specifically configured to: when the determining unit determines that the user wants to start the dictation string information, activate an encryption algorithm for rearranging each character in the character string information dictated by the user, and dictate the character of the user. The string information is encrypted into another string information.
或者,加密单元200具体用于在所述判断单元判断得到用户要开始口述字符串信息时,启动用来对用户口述的字符串信息中的各字符进行重新排列的加密算法,将用户口述的字符串信息加密成另一字符串信息。
Alternatively, the encryption unit 200 is specifically configured to: when the determining unit determines that the user wants to start the dictation string information, initiate an encryption algorithm for rearranging each character in the string information dictated by the user, and dictate the character of the user. The string information is encrypted into another string information.
综上所述,本发明只对内容为字符串信息的语音信号进行加密,加密后的信号仍为正常语音,不易引起攻击者注意,从而提高了语音通信安全。此外,相较于现有技术,本发明不对语音通话内容做全程加密,因此还降低了语音接收终端的解密负担。In summary, the present invention encrypts only the voice signal whose content is string information, and the encrypted signal is still normal voice, which is not easy to attract the attention of an attacker, thereby improving the security of voice communication. In addition, compared with the prior art, the present invention does not encrypt the voice call content in full, and thus reduces the decryption burden of the voice receiving terminal.
图3示出了根据本发明的又一个实施例的语音发送终端的框图,如图3所示,该终端7可以包括:至少一个处理器71,例如CPU,至少一个通信总线72以及存储器73;通信总线72用于实现这些组件之间的连接通信;存储器73可以是高速RAM存储器,也可以是非易失性存储器(non-volatile memory),例如至少一个磁盘存储器。存储器73中存储一组程序代码,且处理器71用于调用存储器73中存储的程序代码,用于执行以下操作:3 shows a block diagram of a voice transmitting terminal according to still another embodiment of the present invention. As shown in FIG. 3, the terminal 7 may include: at least one processor 71, such as a CPU, at least one communication bus 72, and a memory 73; The communication bus 72 is used to implement connection communication between these components; the memory 73 may be a high speed RAM memory or a non-volatile memory such as at least one disk memory. A set of program codes is stored in the memory 73, and the processor 71 is configured to call the program code stored in the memory 73 for performing the following operations:
判断用户在通话过程中是否要开始口述字符串信息;Determine whether the user wants to start dictation string information during the call;
若是,则启动加密算法,将用户口述的字符串信息加密成另一字符串信息;If yes, the encryption algorithm is started, and the string information dictated by the user is encrypted into another string information;
将加密后的字符串信息输入到移动通信网中。The encrypted string information is input to the mobile communication network.
其中,所述处理器71在执行判断用户在通话过程中是否要开始口述字符串信息时,具体执行以下操作:The processor 71 performs the following operations when performing the determination of whether the user wants to start the dictation string information during the call:
通过语音识别方式判断用户在通话过程中是否要开始口述字符串信息。The voice recognition method is used to determine whether the user wants to start dictation string information during the call.
其中,所述处理器71在执行判断用户在通话过程中是否要开始口述字符串信息时,具体执行以下操作:The processor 71 performs the following operations when performing the determination of whether the user wants to start the dictation string information during the call:
判断是否接收到手动触发信号。Determine if a manual trigger signal is received.
其中,所述加密算法包括:对用户口述的字符串信息中的各字符进行重新排列。The encryption algorithm includes: rearranging characters in the string information dictated by the user.
其中,所述加密算法包括:将用户口述的字符串信息中的全部或部分字符替换成其他字符。The encryption algorithm includes: replacing all or part of characters in the string information dictated by the user with other characters.
综上所述,本发明只对内容为字符串信息的语音信号进行加密,加密后的信号仍为正常语音,不易引起攻击者注意,从而提高了语音通信安全。此外,相较于现有技术,本发明不对语音通话内容做全程加密,因此还降低了语音接收终端的解密负担。In summary, the present invention encrypts only the voice signal whose content is string information, and the encrypted signal is still normal voice, which is not easy to attract the attention of an attacker, thereby improving the security of voice communication. In addition, compared with the prior art, the present invention does not encrypt the voice call content in full, and thus reduces the decryption burden of the voice receiving terminal.
本说明书中各个实施例采用递进的方式描述,每个实施例重点说明的都是
与其他实施例的不同之处,各个实施例之间相同相似部分互相参见即可。对于实施例公开的语音发送终端而言,由于其与实施例公开的方法相对应,所以描述的比较简单,相关之处参见方法部分说明即可。The various embodiments in this specification are described in a progressive manner, and each embodiment focuses on
Different from the other embodiments, the same similar parts between the various embodiments can be referred to each other. For the voice transmitting terminal disclosed in the embodiment, since it corresponds to the method disclosed in the embodiment, the description is relatively simple, and the related parts can be referred to the method part.
对所公开的实施例的上述说明,使本领域专业技术人员能够实现或使用本发明。对这些实施例的多种修改对本领域的专业技术人员来说将是显而易见的,本文中所定义的一般原理可以在不脱离本发明实施例的精神或范围的情况下,在其它实施例中实现。因此,本发明实施例将不会被限制于本文所示的这些实施例,而是要符合与本文所公开的原理和新颖特点相一致的最宽的范围。
The above description of the disclosed embodiments enables those skilled in the art to make or use the invention. Various modifications to these embodiments will be apparent to those skilled in the art, and the general principles defined herein may be implemented in other embodiments without departing from the spirit or scope of the embodiments of the invention. . Therefore, the embodiments of the present invention are not to be limited to the embodiments shown herein, but the scope of the invention is to be accorded
Claims (10)
- 一种语音加密方法,应用于语音发送终端,其特征在于,所述方法包括:A voice encryption method is applied to a voice transmitting terminal, and the method includes:判断用户在通话过程中是否要开始口述字符串信息;Determine whether the user wants to start dictation string information during the call;若是,则启动加密算法,将用户口述的字符串信息加密成另一字符串信息;If yes, the encryption algorithm is started, and the string information dictated by the user is encrypted into another string information;将加密后的字符串信息输入到移动通信网中。The encrypted string information is input to the mobile communication network.
- 根据权利要求1所述的方法,其特征在于,所述判断用户在通话过程中是否要开始口述字符串信息,包括:The method according to claim 1, wherein the determining whether the user wants to start dictation string information during a call comprises:通过语音识别方式判断用户在通话过程中是否要开始口述字符串信息。The voice recognition method is used to determine whether the user wants to start dictation string information during the call.
- 根据权利要求1所述的方法,其特征在于,所述判断用户在通话过程中是否要开始口述字符串信息,包括:The method according to claim 1, wherein the determining whether the user wants to start dictation string information during a call comprises:判断是否接收到手动触发信号。Determine if a manual trigger signal is received.
- 根据权利要求1所述的方法,其特征在于,所述加密算法包括:对用户口述的字符串信息中的各字符进行重新排列。The method according to claim 1, wherein the encryption algorithm comprises: rearranging characters in the character string information dictated by the user.
- 根据权利要求1所述的方法,其特征在于,所述加密算法包括:将用户口述的字符串信息中的全部或部分字符替换成其他字符。The method according to claim 1, wherein the encryption algorithm comprises: replacing all or part of characters in the string information dictated by the user with other characters.
- 一种语音发送终端,其特征在于,包括:A voice transmitting terminal, comprising:判断单元,用于判断用户在通话过程中是否要开始口述字符串信息;a determining unit, configured to determine whether the user wants to start dictation string information during the call;加密单元,用于在所述判断单元判断得到用户要开始口述字符串信息时,启动加密算法,将用户口述的字符串信息加密成另一字符串信息;An encryption unit, configured to: when the determining unit determines that the user wants to start the dictation string information, start an encryption algorithm, and encrypt the character string information dictated by the user into another character string information;输出单元,用于将加密后的字符串信息输入到移动通信网中。An output unit, configured to input the encrypted string information into a mobile communication network.
- 根据权利要求6所述的语音发送终端,其特征在于,所述判断单元具体用于通过语音识别方式判断用户在通话过程中是否要开始口述字符串信息。The voice transmitting terminal according to claim 6, wherein the determining unit is specifically configured to determine, by using a voice recognition manner, whether the user wants to start dictation string information during a call.
- 根据权利要求6所述的语音发送终端,其特征在于,所述判断单元具体用于判断是否接收到手动触发信号;当接收到手动触发信号时,判定用户要开始口述字符串信息。The voice transmitting terminal according to claim 6, wherein the determining unit is specifically configured to determine whether a manual trigger signal is received; and when receiving the manual trigger signal, determine that the user wants to start dictation string information.
- 根据权利要求6所述的语音发送终端,其特征在于,所述加密单元具体用于在所述判断单元判断得到用户要开始口述字符串信息时,启动用来对用户口述的字符串信息中的各字符进行重新排列的加密算法,将用户口述的字符 串信息加密成另一字符串信息。The voice transmitting terminal according to claim 6, wherein the encrypting unit is specifically configured to: when the determining unit determines that the user wants to start the dictation string information, start the character string information used for dictating the user An encryption algorithm that rearranges characters to dictate the characters of the user The string information is encrypted into another string information.
- 根据权利要求6所述的语音发送终端,其特征在于,所述加密单元具体用于在所述判断单元判断得到用户要开始口述字符串信息时,启动用来将用户口述的字符串信息中的全部或部分字符替换成其他字符的加密算法,将用户口述的字符串信息加密成另一字符串信息。 The voice transmitting terminal according to claim 6, wherein the encrypting unit is specifically configured to: when the determining unit determines that the user wants to start the dictation string information, start the character string information used to dictate the user An encryption algorithm that replaces all or part of the characters with other characters, and encrypts the string information dictated by the user into another string information.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610197555.9A CN105743912B (en) | 2016-03-31 | 2016-03-31 | Voice encryption method and voice sending terminal |
CN201610197555.9 | 2016-03-31 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017166420A1 true WO2017166420A1 (en) | 2017-10-05 |
Family
ID=56253159
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2016/084080 WO2017166420A1 (en) | 2016-03-31 | 2016-05-31 | Voice encryption method and voice transmission terminal |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN105743912B (en) |
WO (1) | WO2017166420A1 (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102333042A (en) * | 2011-10-31 | 2012-01-25 | 深信服网络科技(深圳)有限公司 | Method, security gateway and system for preventing data leakage |
CN102761867A (en) * | 2011-04-29 | 2012-10-31 | 德信智能手机技术(北京)有限公司 | Method for increasing session safety and session equipment |
CN102811439A (en) * | 2011-06-02 | 2012-12-05 | 中兴通讯股份有限公司 | Method and system for voice processing |
CN103516915A (en) * | 2012-06-27 | 2014-01-15 | 百度在线网络技术(北京)有限公司 | Method, system and device for replacing sensitive words in call process of mobile terminal |
CN103595844A (en) * | 2013-11-15 | 2014-02-19 | 深圳市中兴移动通信有限公司 | Processing method and device for dual-tone multi-frequency number |
WO2015115798A1 (en) * | 2014-01-29 | 2015-08-06 | Samsung Electronics Co., Ltd. | User terminal device and secured communication method thereof |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2863443B1 (en) * | 2003-12-05 | 2006-03-03 | Sagem | METHOD OF SAVING DATA OF A MOBILE TELEPHONE |
CN101014060B (en) * | 2007-02-02 | 2010-05-19 | 东南大学 | Voice encryption method for GSM handset with anti longterm prediction rule pulse excitation compression coding |
CN101631304B (en) * | 2009-07-23 | 2012-05-23 | 东南大学 | Anti-adaptive multi-rate coding third-generation mobile communication end-to-end voice encryption method |
CN101909290A (en) * | 2010-08-25 | 2010-12-08 | 中兴通讯股份有限公司 | Method, system and mobile terminal for encrypting voice call |
CN105357007B (en) * | 2014-08-21 | 2019-05-31 | 深圳市中兴微电子技术有限公司 | Encryption communication method and communication terminal |
CN104378198A (en) * | 2014-10-16 | 2015-02-25 | 南京中科龙脉物联网技术有限公司 | Voice encryption method based on block cipher system |
CN104994500B (en) * | 2015-05-22 | 2018-07-06 | 南京科烁志诺信息科技有限公司 | A kind of speech security transmission method and device for mobile phone |
CN105050082B (en) * | 2015-09-11 | 2019-10-25 | 成都汇研科技有限公司 | Voice communication method and device |
-
2016
- 2016-03-31 CN CN201610197555.9A patent/CN105743912B/en active Active
- 2016-05-31 WO PCT/CN2016/084080 patent/WO2017166420A1/en active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102761867A (en) * | 2011-04-29 | 2012-10-31 | 德信智能手机技术(北京)有限公司 | Method for increasing session safety and session equipment |
CN102811439A (en) * | 2011-06-02 | 2012-12-05 | 中兴通讯股份有限公司 | Method and system for voice processing |
CN102333042A (en) * | 2011-10-31 | 2012-01-25 | 深信服网络科技(深圳)有限公司 | Method, security gateway and system for preventing data leakage |
CN103516915A (en) * | 2012-06-27 | 2014-01-15 | 百度在线网络技术(北京)有限公司 | Method, system and device for replacing sensitive words in call process of mobile terminal |
CN103595844A (en) * | 2013-11-15 | 2014-02-19 | 深圳市中兴移动通信有限公司 | Processing method and device for dual-tone multi-frequency number |
WO2015115798A1 (en) * | 2014-01-29 | 2015-08-06 | Samsung Electronics Co., Ltd. | User terminal device and secured communication method thereof |
Also Published As
Publication number | Publication date |
---|---|
CN105743912A (en) | 2016-07-06 |
CN105743912B (en) | 2020-04-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2020155767A1 (en) | Mobile terminal-based passwordless login method and apparatus, device, and storage medium | |
JP6307665B2 (en) | System and method for non-reproducible communication session | |
US10103891B2 (en) | Method of generating a deniable encrypted communications via password entry | |
US9032219B2 (en) | Securing speech recognition data | |
CN109450777B (en) | Session information extraction method, device, equipment and medium | |
US20160197895A1 (en) | Method of deniable encrypted communications | |
CN104767746A (en) | Push message receiving method, message pushing method, client and server | |
US11245530B2 (en) | System and method for secure communication | |
JP2009237774A (en) | Authentication server, service providing server, authentication method, communication terminal, and log-in method | |
CN110380856B (en) | Terminal device and voice information processing method and device thereof, and storage medium | |
CN107533598B (en) | Input method and device of login password of application program and terminal | |
WO2016062153A1 (en) | Method, system, and terminal for secure transmission of audio data | |
CN108965785B (en) | Video conference recording method, video recording device, control center and terminal | |
US11941154B2 (en) | Securing personally identifiable and private information in conversational AI-based communication | |
JP5691586B2 (en) | Secret communication system, apparatus and program | |
WO2016150363A1 (en) | Method and apparatus for managing graded cipher | |
KR101721582B1 (en) | System, method and computer program for non-face-to-face verification of user using voice data | |
WO2017166420A1 (en) | Voice encryption method and voice transmission terminal | |
US20190138605A1 (en) | Translational bot for group communication | |
WO2022038845A1 (en) | Encryption method, terminal device, encryption system, and program | |
Fazeen et al. | Context-aware multimedia encryption in mobile platforms | |
CN112767944A (en) | Voiceprint recognition method and device | |
CN114338156A (en) | Data processing method, device and storage medium | |
KR101268289B1 (en) | Otp key generation module and method using the voice and communication apparatus thereof | |
CN111065094B (en) | Address book transmission method and device, storage medium and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16896194 Country of ref document: EP Kind code of ref document: A1 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 16896194 Country of ref document: EP Kind code of ref document: A1 |