CN104092695B - It is a kind of to improve the method that vocal print encrypts File Upload and Download - Google Patents
It is a kind of to improve the method that vocal print encrypts File Upload and Download Download PDFInfo
- Publication number
- CN104092695B CN104092695B CN201410345311.1A CN201410345311A CN104092695B CN 104092695 B CN104092695 B CN 104092695B CN 201410345311 A CN201410345311 A CN 201410345311A CN 104092695 B CN104092695 B CN 104092695B
- Authority
- CN
- China
- Prior art keywords
- file
- user
- voice print
- print database
- upload
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The method that vocal print encrypts File Upload and Download is improved the invention discloses a kind of, belongs to information security field.This method is based on vocal print encryption, for keeping the safety of file to transmit during File Upload and Download.Mainly there are two modules, Application on Voiceprint Recognition acquisition module and encryption File Upload and Download module.Wherein, Application on Voiceprint Recognition acquisition module is used to gathering and recognizing voice print database, and is stored on voice print database processing server;Encryption File Upload and Download module is used to uploading and downloading encryption file, and completes the ciphering process and decrypting process to file, finally successfully completes required operation.The present invention realizes the process improvement that file is encrypted to vocal print, and reliability is high, can improve the security of File Upload and Download process and greatly eliminate the risk that key is lost.
Description
Technical field
The present invention proposes a kind of method for improving vocal print encryption File Upload and Download, is based on right on the basis of vocal print encryption
The improvement of File Upload and Download method, the invention belongs to field of computer information security.
Background technology
With information-based high speed development, people come one after another to the demand of information security, talent competition, market competition,
Financial crisis, enemy spy mechanism etc. all bring great risk to the development of enterprises and institutions, and inside is stolen secret information, assault, unconscious
The means of stealing secret information such as divulge a secret become between men, between enterprise and enterprise, inter-State potential safety hazard.
Information security is the problem of any country, government, department, industry must all be attached great importance to, and is one and can not be ignored
National Security Strategy.File encryption is the method for protection information safety the most frequently used at present, right using transparent encryption and decryption technology
Data carry out pressure encryption, do not change the original use habit of user;This technology either departs from operation to data self-encryption
System, or illegally depart from security context, user data itself is all safe, and the dependence to environment is smaller.On the market
The main technology of file encryption be divided into several technologies such as disk encryption, application layer encryption, driving stage encryption, current trend
RSA and AES encryption algorithm are all full disclosures, and a side obtains the data encrypted, even if AES is known, if not having
There is the key of encryption, the information of encrypted protection can not be opened.
But certain limitation is returned by traditional encryption side, key is typically not easy to be remembered, once forgetting, recovers
Get up extremely difficult, present trend uses sign information (such as fingerprint) as encryption foundation, and vocal print is equally as fingerprint
Belong to one kind of biological identification technology.Vocal print is the sound wave spectrum for the carrying verbal information that electricity consumption acoustic instrument is shown.Mankind's language
The generation of speech is a complicated physiology physical process between Body Languages maincenter and vocal organs, the hair that people uses in speech
Sound organ -- tongue, tooth, larynx, lung, nasal cavity everyone widely different in terms of size and form, so any two people
Voiceprint map is all variant, in general, and people can distinguish the sound of different people by vocal print, therefore pass through sound
Line encryption file is also a kind of feasible encryption method, but still has certain limitation now with vocal print encryption file, specially
One kind is proposed in sharp " a kind of method for encrypting and deciphering digital camera picture (application number CN200810162156) based on vocal print "
Using the method for voice print database information encrypting and decrypting pictorial information, but this mode is also to have shortcoming:File can only be by same
Individual carrys out encrypting and decrypting and used, and is unfavorable for many people strange lands and reads file content.
In addition, being proposed in patent " file encryption and decryption method (application number CN201110003202.8) based on vocal print "
Using vocal print encrypted document and decrypted document, vocal print can be obtained from voice, the data that easily can be produced using vocal print
Carry out encryption and decryption document.But document can only be encrypted and decrypted by same user, the upload of document, which is downloaded, is used in distribution
To be unusual difficulty on network, and security is also very low.
The content of the invention
For the defect of above-mentioned prior art, it is an object of the invention to propose that a kind of improve descends on vocal print encryption file
Safety issue is downloaded in a kind of method of load, it is intended to propose new method, the upload for solving vocal print encryption file.
To solve the above problems, the present invention is adopted the following technical scheme that
It is a kind of to improve the method that vocal print encrypts File Upload and Download, be divided into two modules, Application on Voiceprint Recognition acquisition module and
Encrypt File Upload and Download module.
Application on Voiceprint Recognition acquisition module is concretely comprised the following steps:
1) in the case of user's sign state is normal, the multiple random acquisition user sample sound of round-the-clock 24 hours,
And carry out sample name mark.
2) voice data being collected into is handled by application on voiceprint recognition equipment and is converted into voice print database.
3) voice print database is converted into binary data by necessarily handling again.
4) voice print database processing server is set, the corresponding binary data of voice print database is corresponded and stored
Come.
5) above step is followed successively, collects the voice print database and corresponding binary data of user.
6) on voice print database processing server, the trust region of each user is set up, including user name and can courier
With the phase (period that voice print database can be called).
Encryption File Upload and Download module is concretely comprised the following steps:
1) user A produces voice print database and corresponding two entered by application on voiceprint recognition equipment in the case of sign is normal
Data processed.
2) voice print database of generation is carried out with being reserved in voice print database reserved user A in voice print database processing server
Compare.
If 3) compared successfully, A identity information can confirm that.
If 4) repeatedly compare unsuccessful, it not can determine that A true identity or A sign state may not be normal
State.
5) it is correspondence binary data by the file translations for needing to upload.
6) the corresponding binary data of voice print database binary data corresponding with file is carried out to the XOR of step-by-step successively
Computing, or other logical operation, but the logical operation that uses of encryption with the logical operation of decryption use should be it is corresponding,
Namely use same logical operation.
7) so file has obtained a vocal print encryption and has formd encryption file, stamps trusted timestamp.
8) user A uploads file data to file server, and the user name and credible validity period that will download this segment data
Upload on voice print database processing server.
9) user B downloads to the file data of user A uploads on file server.
10) user B is producing voice print database by application on voiceprint recognition equipment, and recognizes oneself in voice print database processing server
Identity information.
11) user B file data is downloaded to, XOR (secondary encryption) is carried out by user B voice print database again,
And trusted timestamp is stamped, finally upload to voice print database processing server.
12) on voice print database processing server, search user A trust region search whether there is user B, if depositing
, then user A and user B trusted timestamp is carried out to the computing of absolute difference, if in credible validity period, by user B
The file data of upload binary data corresponding with user A voice print database carries out XOR (once decrypting).
13) user B is downloaded to from voice print database processing server by treated file data, and uses oneself
The corresponding binary data of voice print database carries out XOR (secondary decryption).
14) user B receives the file of user A uploads, and the upload for completing encryption file is downloaded.
Compared with prior art, this method has following advantage:
First, key will not lose forgetting, and everyone voice print database is to be stabilized in the period of one section very long, Ke Yichang
Phase is used to extract identification operation, and need not actively remove the irregular tediously long key of memory.
2nd, gather succinct convenient, it is only necessary to say arbitrarily or deliberately one section of word and can just complete the collection of voice print database.
3rd, encrypting and decrypting process is easy and effective, by secondary encryption and the logical operation of secondary decryption, completes file and exists
Upload downloads each process and is at encrypted state, and encrypting and decrypting is all the voice print database existed using itself, and itself
Voice print database also do not leak out.
Brief description of the drawings
Fig. 1 is Application on Voiceprint Recognition acquisition module;
Fig. 2 is encryption File Upload and Download module.
Embodiment
All features disclosed in this specification, can be with any in addition to mutually exclusive feature and/or step
Mode is combined.
The present invention is elaborated with reference to Fig. 1, Fig. 2.Below in conjunction with the drawings and the specific embodiments to we
Method is further described.
This method is divided into two modules, Application on Voiceprint Recognition acquisition module and encryption File Upload and Download module
Application on Voiceprint Recognition acquisition module concrete operation step is:
1. in the case of user's sign state is normal, the multiple random acquisition user sample sound of round-the-clock 24 hours,
And carry out sample name mark.
2. the voice data being collected into is handled by application on voiceprint recognition equipment and is converted into voice print database.
3. voice print database is converted into binary data by necessarily handling again.
4. setting voice print database processing server, the corresponding binary data of voice print database is corresponded and stored
Come.
5. following above step successively, the voice print database and corresponding binary data of user are collected.
6. on voice print database processing server, the trust region of each user is set up, including user name and can courier
With the phase (period that voice print database can be called).
Encryption File Upload and Download module is concretely comprised the following steps:
1. user A, by application on voiceprint recognition equipment, produces voice print database and corresponding two in the case of sign is normal
Binary data.
2. by the voice print database of generation and it is reserved in the reserved voice print database progress of user A in voice print database processing server
Compare.
If 3. comparing successfully, can confirm that A identity information.
If 4. repeatedly comparing unsuccessful, not can determine that A true identity or A sign state may not be normal
State.
5. it is correspondence binary data by the file translations for needing to upload.
6. the corresponding binary data of voice print database binary data corresponding with file is carried out to the XOR of step-by-step successively
Computing, or other logical operation, but the logical operation that uses of encryption with the logical operation of decryption use should be it is corresponding,
Namely use same logical operation.
7. such file has obtained a vocal print encryption and formd encryption file, trusted timestamp is stamped.
8. user A uploads file data to file server, and the user name and credible validity period that will download this segment data
Upload on voice print database processing server.
9. user B downloads to the file data of user A uploads on file server.
10. user B is producing voice print database by application on voiceprint recognition equipment, and recognizes oneself in voice print database processing server
Identity information.
11. downloading to user B file data, XOR (secondary encryption) is carried out by user B voice print database again,
And trusted timestamp is stamped, finally upload to voice print database processing server.
12. on voice print database processing server, search user A trust region search whether there is user B, if depositing
, then user A and user B trusted timestamp is carried out to the computing of absolute difference, if in credible validity period, by user B
The file data of upload binary data corresponding with user A voice print database carries out XOR (once decrypting).
13. user B is downloaded to from voice print database processing server by treated file data, and uses oneself
The corresponding binary data of voice print database carries out XOR (secondary decryption).
User B receives the file of user A uploads, and the upload for completing encryption file is downloaded.
Claims (1)
1. a kind of improve the method that vocal print encrypts File Upload and Download, it is characterised in that including vocal print acquisition and storage method and
Vocal print encrypts File Upload and Download method,
Described vocal print acquisition and storage method is concretely comprised the following steps:
The first step, multiple random acquisition acoustic information, is switched to voice print database;
Second step, correspondence binary data is converted into by voice print database;
3rd step, by the binary data storage of the corresponding conversion of voice print database on voice print database processing server;
On voice print database processing server, the trust region of each user is set up, the trust region of each user includes user
Name and credible validity period;
Described vocal print encryption File Upload and Download method is concretely comprised the following steps:
The first step, carries out a vocal print encryption for the file of upload, stamps trusted timestamp, and upload file server;Tool
Body step is as follows:
(11) user A produces voice print database and corresponding binary system by application on voiceprint recognition equipment in the case of sign is normal
Data;
(12) voice print database of generation is compared with being reserved in voice print database reserved user A in voice print database processing server
It is right;
(13) identity information for successfully confirming A is compared;
Repeatedly compare unsuccessful, then A true identity is uncertain or sign state of A is abnormal;
(14) it is correspondence binary data by the file translations for needing to upload;
The corresponding binary data of voice print database binary data corresponding with file is subjected to logical operation successively, one obtained
Secondary vocal print encrypts the encryption file to be formed, and stamps trusted timestamp;The logical operation used and the logic that decryption is used is encrypted to transport
Calculation should be corresponded to, using same logical operation;
(15) user A uploads file data to file server, and will download in the user name and credible validity period of this segment data
Pass on voice print database processing server;
Second step, the file encrypted once is downloaded from file server, carries out secondary cryptographic operation, and upload to voice print database
Processing server, is comprised the following steps that:
(21) user B downloads to the file data of user A uploads on file server;
(22) user B produces voice print database by application on voiceprint recognition equipment, and recognizes the body of oneself in voice print database processing server
Part information;
(23) user B file data will be downloaded to, XOR is carried out by user B voice print database, secondary encryption is completed,
And trusted timestamp is stamped, finally upload to voice print database processing server;
3rd step, the checking of the uploader and download person's identity of the enterprising style of writing part of voice print database processing server, confirmation is one by one
Correspondence, then carry out decryption oprerations first;
I.e. on voice print database processing server, user B is searched in user A trust region, if in the presence of by user A with using
Family B trusted timestamp carries out the computing of absolute difference, if in credible validity period, the file data that user B is uploaded with
The user A corresponding binary data of voice print database carries out XOR, and completion is once decrypted;
4th step, downloads the file of decryption oprerations from voice print database processing server, and obtained file is downloaded in secondary decryption,
It is final to obtain file;
User B is downloaded to from voice print database processing server by treated file data, and uses user B vocal print number
XOR is carried out according to corresponding binary data, secondary decryption is completed;The file that user A is uploaded is obtained, encryption file is completed
Upload download.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410345311.1A CN104092695B (en) | 2014-07-21 | 2014-07-21 | It is a kind of to improve the method that vocal print encrypts File Upload and Download |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410345311.1A CN104092695B (en) | 2014-07-21 | 2014-07-21 | It is a kind of to improve the method that vocal print encrypts File Upload and Download |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104092695A CN104092695A (en) | 2014-10-08 |
CN104092695B true CN104092695B (en) | 2017-09-26 |
Family
ID=51640376
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410345311.1A Active CN104092695B (en) | 2014-07-21 | 2014-07-21 | It is a kind of to improve the method that vocal print encrypts File Upload and Download |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104092695B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108123801A (en) * | 2017-12-29 | 2018-06-05 | 重庆小犀智能科技有限公司 | A kind of block chain wallet uses audio encryption private key system and method |
CN109802942B (en) * | 2018-12-17 | 2021-06-25 | 西安电子科技大学 | Voiceprint authentication method with privacy protection function |
CN113158213B (en) * | 2021-04-30 | 2022-11-29 | 重庆市科学技术研究院 | Data transmission method and system based on in-vivo verification |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102473210A (en) * | 2009-07-01 | 2012-05-23 | 芒达·帕蒂尔 | Method for remotely controlling and monitoring the data produced on desktop on desktop software |
CN103166958A (en) * | 2013-02-26 | 2013-06-19 | 深圳创维数字技术股份有限公司 | Protection method and protection system of file |
CN103391201A (en) * | 2013-08-05 | 2013-11-13 | 公安部第三研究所 | System and method for realizing smart card authentication based on voiceprint recognition |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8392580B2 (en) * | 2008-02-20 | 2013-03-05 | Research In Motion Limited | Methods and systems for facilitating transfer of sessions between user devices |
-
2014
- 2014-07-21 CN CN201410345311.1A patent/CN104092695B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102473210A (en) * | 2009-07-01 | 2012-05-23 | 芒达·帕蒂尔 | Method for remotely controlling and monitoring the data produced on desktop on desktop software |
CN103166958A (en) * | 2013-02-26 | 2013-06-19 | 深圳创维数字技术股份有限公司 | Protection method and protection system of file |
CN103391201A (en) * | 2013-08-05 | 2013-11-13 | 公安部第三研究所 | System and method for realizing smart card authentication based on voiceprint recognition |
Also Published As
Publication number | Publication date |
---|---|
CN104092695A (en) | 2014-10-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11263415B2 (en) | Transferring data files using a series of visual codes | |
US11108546B2 (en) | Biometric verification of a blockchain database transaction contributor | |
CN110414203B (en) | Internet medical identity authentication method based on block chain technology | |
CN107332659B (en) | Identity authentication method, storage medium and system based on biological characteristics | |
CN109803142B (en) | Encrypted domain image reversible data hiding method based on neighborhood prediction | |
CN104408356B (en) | A kind of fingerprint verification method and system, fingerprint template encryption device | |
Cavoukian et al. | Advances in biometric encryption: Taking privacy by design from academic research to deployment | |
CN101221612A (en) | Method for enciphering and deciphering electric document file by face recognition | |
WO2018165811A1 (en) | Method for saving and verifying biometric template, and biometric recognition apparatus and terminal | |
KR20190038938A (en) | SYSTEM, METHOD, AND SERVER COMPUTER SYSTEM FOR IMPLEMENTING CONVERTING ONE entity in a heterogeneous communication network environment to a verifiably authenticated entity | |
CN104092695B (en) | It is a kind of to improve the method that vocal print encrypts File Upload and Download | |
Pan et al. | Machine learning for wireless multimedia data security | |
CN102194066A (en) | Method for taking fingerprint information as key | |
CN105337742B (en) | LFSR file encryption and decryption method based on facial image feature and GPS information | |
CN111242611A (en) | Method and system for recovering digital wallet key | |
CN106921489A (en) | A kind of data ciphering method and device | |
CN107231240A (en) | A kind of higher dual identity recognition methods of security | |
CN113055153B (en) | Data encryption method, system and medium based on fully homomorphic encryption algorithm | |
CN109039650A (en) | A kind of method and its system merging the online information trustship of biological feature encryption technology | |
CN116340918A (en) | Full-secret-text face comparison method, device, equipment and storage medium | |
CN110427906A (en) | In conjunction with the Hybrid Encryption recognition methods of fingerprint and finger vein biometric feature | |
US20160301696A1 (en) | Method and device for protecting access to a message | |
CN109492407A (en) | Data protection, data solution protect method, terminal and computer readable storage medium | |
CN105893819A (en) | Improved fingerprint recognition method and system based on redundancy out-of-sequence ordering algorithm | |
CN109657536A (en) | A kind of identity identifying method and system merging bio-identification and cryptographic technique |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |