CN104092695B - It is a kind of to improve the method that vocal print encrypts File Upload and Download - Google Patents

It is a kind of to improve the method that vocal print encrypts File Upload and Download Download PDF

Info

Publication number
CN104092695B
CN104092695B CN201410345311.1A CN201410345311A CN104092695B CN 104092695 B CN104092695 B CN 104092695B CN 201410345311 A CN201410345311 A CN 201410345311A CN 104092695 B CN104092695 B CN 104092695B
Authority
CN
China
Prior art keywords
file
user
voice print
print database
upload
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410345311.1A
Other languages
Chinese (zh)
Other versions
CN104092695A (en
Inventor
张小松
牛伟纳
鲍凯
陈瑞东
王东
罗荣森
徐浩然
柯明敏
李�杰
赖特
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN201410345311.1A priority Critical patent/CN104092695B/en
Publication of CN104092695A publication Critical patent/CN104092695A/en
Application granted granted Critical
Publication of CN104092695B publication Critical patent/CN104092695B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The method that vocal print encrypts File Upload and Download is improved the invention discloses a kind of, belongs to information security field.This method is based on vocal print encryption, for keeping the safety of file to transmit during File Upload and Download.Mainly there are two modules, Application on Voiceprint Recognition acquisition module and encryption File Upload and Download module.Wherein, Application on Voiceprint Recognition acquisition module is used to gathering and recognizing voice print database, and is stored on voice print database processing server;Encryption File Upload and Download module is used to uploading and downloading encryption file, and completes the ciphering process and decrypting process to file, finally successfully completes required operation.The present invention realizes the process improvement that file is encrypted to vocal print, and reliability is high, can improve the security of File Upload and Download process and greatly eliminate the risk that key is lost.

Description

It is a kind of to improve the method that vocal print encrypts File Upload and Download
Technical field
The present invention proposes a kind of method for improving vocal print encryption File Upload and Download, is based on right on the basis of vocal print encryption The improvement of File Upload and Download method, the invention belongs to field of computer information security.
Background technology
With information-based high speed development, people come one after another to the demand of information security, talent competition, market competition, Financial crisis, enemy spy mechanism etc. all bring great risk to the development of enterprises and institutions, and inside is stolen secret information, assault, unconscious The means of stealing secret information such as divulge a secret become between men, between enterprise and enterprise, inter-State potential safety hazard.
Information security is the problem of any country, government, department, industry must all be attached great importance to, and is one and can not be ignored National Security Strategy.File encryption is the method for protection information safety the most frequently used at present, right using transparent encryption and decryption technology Data carry out pressure encryption, do not change the original use habit of user;This technology either departs from operation to data self-encryption System, or illegally depart from security context, user data itself is all safe, and the dependence to environment is smaller.On the market The main technology of file encryption be divided into several technologies such as disk encryption, application layer encryption, driving stage encryption, current trend RSA and AES encryption algorithm are all full disclosures, and a side obtains the data encrypted, even if AES is known, if not having There is the key of encryption, the information of encrypted protection can not be opened.
But certain limitation is returned by traditional encryption side, key is typically not easy to be remembered, once forgetting, recovers Get up extremely difficult, present trend uses sign information (such as fingerprint) as encryption foundation, and vocal print is equally as fingerprint Belong to one kind of biological identification technology.Vocal print is the sound wave spectrum for the carrying verbal information that electricity consumption acoustic instrument is shown.Mankind's language The generation of speech is a complicated physiology physical process between Body Languages maincenter and vocal organs, the hair that people uses in speech Sound organ -- tongue, tooth, larynx, lung, nasal cavity everyone widely different in terms of size and form, so any two people Voiceprint map is all variant, in general, and people can distinguish the sound of different people by vocal print, therefore pass through sound Line encryption file is also a kind of feasible encryption method, but still has certain limitation now with vocal print encryption file, specially One kind is proposed in sharp " a kind of method for encrypting and deciphering digital camera picture (application number CN200810162156) based on vocal print " Using the method for voice print database information encrypting and decrypting pictorial information, but this mode is also to have shortcoming:File can only be by same Individual carrys out encrypting and decrypting and used, and is unfavorable for many people strange lands and reads file content.
In addition, being proposed in patent " file encryption and decryption method (application number CN201110003202.8) based on vocal print " Using vocal print encrypted document and decrypted document, vocal print can be obtained from voice, the data that easily can be produced using vocal print Carry out encryption and decryption document.But document can only be encrypted and decrypted by same user, the upload of document, which is downloaded, is used in distribution To be unusual difficulty on network, and security is also very low.
The content of the invention
For the defect of above-mentioned prior art, it is an object of the invention to propose that a kind of improve descends on vocal print encryption file Safety issue is downloaded in a kind of method of load, it is intended to propose new method, the upload for solving vocal print encryption file.
To solve the above problems, the present invention is adopted the following technical scheme that
It is a kind of to improve the method that vocal print encrypts File Upload and Download, be divided into two modules, Application on Voiceprint Recognition acquisition module and Encrypt File Upload and Download module.
Application on Voiceprint Recognition acquisition module is concretely comprised the following steps:
1) in the case of user's sign state is normal, the multiple random acquisition user sample sound of round-the-clock 24 hours, And carry out sample name mark.
2) voice data being collected into is handled by application on voiceprint recognition equipment and is converted into voice print database.
3) voice print database is converted into binary data by necessarily handling again.
4) voice print database processing server is set, the corresponding binary data of voice print database is corresponded and stored Come.
5) above step is followed successively, collects the voice print database and corresponding binary data of user.
6) on voice print database processing server, the trust region of each user is set up, including user name and can courier With the phase (period that voice print database can be called).
Encryption File Upload and Download module is concretely comprised the following steps:
1) user A produces voice print database and corresponding two entered by application on voiceprint recognition equipment in the case of sign is normal Data processed.
2) voice print database of generation is carried out with being reserved in voice print database reserved user A in voice print database processing server Compare.
If 3) compared successfully, A identity information can confirm that.
If 4) repeatedly compare unsuccessful, it not can determine that A true identity or A sign state may not be normal State.
5) it is correspondence binary data by the file translations for needing to upload.
6) the corresponding binary data of voice print database binary data corresponding with file is carried out to the XOR of step-by-step successively Computing, or other logical operation, but the logical operation that uses of encryption with the logical operation of decryption use should be it is corresponding, Namely use same logical operation.
7) so file has obtained a vocal print encryption and has formd encryption file, stamps trusted timestamp.
8) user A uploads file data to file server, and the user name and credible validity period that will download this segment data Upload on voice print database processing server.
9) user B downloads to the file data of user A uploads on file server.
10) user B is producing voice print database by application on voiceprint recognition equipment, and recognizes oneself in voice print database processing server Identity information.
11) user B file data is downloaded to, XOR (secondary encryption) is carried out by user B voice print database again, And trusted timestamp is stamped, finally upload to voice print database processing server.
12) on voice print database processing server, search user A trust region search whether there is user B, if depositing , then user A and user B trusted timestamp is carried out to the computing of absolute difference, if in credible validity period, by user B The file data of upload binary data corresponding with user A voice print database carries out XOR (once decrypting).
13) user B is downloaded to from voice print database processing server by treated file data, and uses oneself The corresponding binary data of voice print database carries out XOR (secondary decryption).
14) user B receives the file of user A uploads, and the upload for completing encryption file is downloaded.
Compared with prior art, this method has following advantage:
First, key will not lose forgetting, and everyone voice print database is to be stabilized in the period of one section very long, Ke Yichang Phase is used to extract identification operation, and need not actively remove the irregular tediously long key of memory.
2nd, gather succinct convenient, it is only necessary to say arbitrarily or deliberately one section of word and can just complete the collection of voice print database.
3rd, encrypting and decrypting process is easy and effective, by secondary encryption and the logical operation of secondary decryption, completes file and exists Upload downloads each process and is at encrypted state, and encrypting and decrypting is all the voice print database existed using itself, and itself Voice print database also do not leak out.
Brief description of the drawings
Fig. 1 is Application on Voiceprint Recognition acquisition module;
Fig. 2 is encryption File Upload and Download module.
Embodiment
All features disclosed in this specification, can be with any in addition to mutually exclusive feature and/or step Mode is combined.
The present invention is elaborated with reference to Fig. 1, Fig. 2.Below in conjunction with the drawings and the specific embodiments to we Method is further described.
This method is divided into two modules, Application on Voiceprint Recognition acquisition module and encryption File Upload and Download module
Application on Voiceprint Recognition acquisition module concrete operation step is:
1. in the case of user's sign state is normal, the multiple random acquisition user sample sound of round-the-clock 24 hours, And carry out sample name mark.
2. the voice data being collected into is handled by application on voiceprint recognition equipment and is converted into voice print database.
3. voice print database is converted into binary data by necessarily handling again.
4. setting voice print database processing server, the corresponding binary data of voice print database is corresponded and stored Come.
5. following above step successively, the voice print database and corresponding binary data of user are collected.
6. on voice print database processing server, the trust region of each user is set up, including user name and can courier With the phase (period that voice print database can be called).
Encryption File Upload and Download module is concretely comprised the following steps:
1. user A, by application on voiceprint recognition equipment, produces voice print database and corresponding two in the case of sign is normal Binary data.
2. by the voice print database of generation and it is reserved in the reserved voice print database progress of user A in voice print database processing server Compare.
If 3. comparing successfully, can confirm that A identity information.
If 4. repeatedly comparing unsuccessful, not can determine that A true identity or A sign state may not be normal State.
5. it is correspondence binary data by the file translations for needing to upload.
6. the corresponding binary data of voice print database binary data corresponding with file is carried out to the XOR of step-by-step successively Computing, or other logical operation, but the logical operation that uses of encryption with the logical operation of decryption use should be it is corresponding, Namely use same logical operation.
7. such file has obtained a vocal print encryption and formd encryption file, trusted timestamp is stamped.
8. user A uploads file data to file server, and the user name and credible validity period that will download this segment data Upload on voice print database processing server.
9. user B downloads to the file data of user A uploads on file server.
10. user B is producing voice print database by application on voiceprint recognition equipment, and recognizes oneself in voice print database processing server Identity information.
11. downloading to user B file data, XOR (secondary encryption) is carried out by user B voice print database again, And trusted timestamp is stamped, finally upload to voice print database processing server.
12. on voice print database processing server, search user A trust region search whether there is user B, if depositing , then user A and user B trusted timestamp is carried out to the computing of absolute difference, if in credible validity period, by user B The file data of upload binary data corresponding with user A voice print database carries out XOR (once decrypting).
13. user B is downloaded to from voice print database processing server by treated file data, and uses oneself The corresponding binary data of voice print database carries out XOR (secondary decryption).
User B receives the file of user A uploads, and the upload for completing encryption file is downloaded.

Claims (1)

1. a kind of improve the method that vocal print encrypts File Upload and Download, it is characterised in that including vocal print acquisition and storage method and Vocal print encrypts File Upload and Download method,
Described vocal print acquisition and storage method is concretely comprised the following steps:
The first step, multiple random acquisition acoustic information, is switched to voice print database;
Second step, correspondence binary data is converted into by voice print database;
3rd step, by the binary data storage of the corresponding conversion of voice print database on voice print database processing server;
On voice print database processing server, the trust region of each user is set up, the trust region of each user includes user Name and credible validity period;
Described vocal print encryption File Upload and Download method is concretely comprised the following steps:
The first step, carries out a vocal print encryption for the file of upload, stamps trusted timestamp, and upload file server;Tool Body step is as follows:
(11) user A produces voice print database and corresponding binary system by application on voiceprint recognition equipment in the case of sign is normal Data;
(12) voice print database of generation is compared with being reserved in voice print database reserved user A in voice print database processing server It is right;
(13) identity information for successfully confirming A is compared;
Repeatedly compare unsuccessful, then A true identity is uncertain or sign state of A is abnormal;
(14) it is correspondence binary data by the file translations for needing to upload;
The corresponding binary data of voice print database binary data corresponding with file is subjected to logical operation successively, one obtained Secondary vocal print encrypts the encryption file to be formed, and stamps trusted timestamp;The logical operation used and the logic that decryption is used is encrypted to transport Calculation should be corresponded to, using same logical operation;
(15) user A uploads file data to file server, and will download in the user name and credible validity period of this segment data Pass on voice print database processing server;
Second step, the file encrypted once is downloaded from file server, carries out secondary cryptographic operation, and upload to voice print database Processing server, is comprised the following steps that:
(21) user B downloads to the file data of user A uploads on file server;
(22) user B produces voice print database by application on voiceprint recognition equipment, and recognizes the body of oneself in voice print database processing server Part information;
(23) user B file data will be downloaded to, XOR is carried out by user B voice print database, secondary encryption is completed, And trusted timestamp is stamped, finally upload to voice print database processing server;
3rd step, the checking of the uploader and download person's identity of the enterprising style of writing part of voice print database processing server, confirmation is one by one Correspondence, then carry out decryption oprerations first;
I.e. on voice print database processing server, user B is searched in user A trust region, if in the presence of by user A with using Family B trusted timestamp carries out the computing of absolute difference, if in credible validity period, the file data that user B is uploaded with The user A corresponding binary data of voice print database carries out XOR, and completion is once decrypted;
4th step, downloads the file of decryption oprerations from voice print database processing server, and obtained file is downloaded in secondary decryption, It is final to obtain file;
User B is downloaded to from voice print database processing server by treated file data, and uses user B vocal print number XOR is carried out according to corresponding binary data, secondary decryption is completed;The file that user A is uploaded is obtained, encryption file is completed Upload download.
CN201410345311.1A 2014-07-21 2014-07-21 It is a kind of to improve the method that vocal print encrypts File Upload and Download Active CN104092695B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410345311.1A CN104092695B (en) 2014-07-21 2014-07-21 It is a kind of to improve the method that vocal print encrypts File Upload and Download

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410345311.1A CN104092695B (en) 2014-07-21 2014-07-21 It is a kind of to improve the method that vocal print encrypts File Upload and Download

Publications (2)

Publication Number Publication Date
CN104092695A CN104092695A (en) 2014-10-08
CN104092695B true CN104092695B (en) 2017-09-26

Family

ID=51640376

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410345311.1A Active CN104092695B (en) 2014-07-21 2014-07-21 It is a kind of to improve the method that vocal print encrypts File Upload and Download

Country Status (1)

Country Link
CN (1) CN104092695B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108123801A (en) * 2017-12-29 2018-06-05 重庆小犀智能科技有限公司 A kind of block chain wallet uses audio encryption private key system and method
CN109802942B (en) * 2018-12-17 2021-06-25 西安电子科技大学 Voiceprint authentication method with privacy protection function
CN113158213B (en) * 2021-04-30 2022-11-29 重庆市科学技术研究院 Data transmission method and system based on in-vivo verification

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102473210A (en) * 2009-07-01 2012-05-23 芒达·帕蒂尔 Method for remotely controlling and monitoring the data produced on desktop on desktop software
CN103166958A (en) * 2013-02-26 2013-06-19 深圳创维数字技术股份有限公司 Protection method and protection system of file
CN103391201A (en) * 2013-08-05 2013-11-13 公安部第三研究所 System and method for realizing smart card authentication based on voiceprint recognition

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8392580B2 (en) * 2008-02-20 2013-03-05 Research In Motion Limited Methods and systems for facilitating transfer of sessions between user devices

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102473210A (en) * 2009-07-01 2012-05-23 芒达·帕蒂尔 Method for remotely controlling and monitoring the data produced on desktop on desktop software
CN103166958A (en) * 2013-02-26 2013-06-19 深圳创维数字技术股份有限公司 Protection method and protection system of file
CN103391201A (en) * 2013-08-05 2013-11-13 公安部第三研究所 System and method for realizing smart card authentication based on voiceprint recognition

Also Published As

Publication number Publication date
CN104092695A (en) 2014-10-08

Similar Documents

Publication Publication Date Title
US11263415B2 (en) Transferring data files using a series of visual codes
US11108546B2 (en) Biometric verification of a blockchain database transaction contributor
CN110414203B (en) Internet medical identity authentication method based on block chain technology
CN107332659B (en) Identity authentication method, storage medium and system based on biological characteristics
CN109803142B (en) Encrypted domain image reversible data hiding method based on neighborhood prediction
CN104408356B (en) A kind of fingerprint verification method and system, fingerprint template encryption device
Cavoukian et al. Advances in biometric encryption: Taking privacy by design from academic research to deployment
CN101221612A (en) Method for enciphering and deciphering electric document file by face recognition
WO2018165811A1 (en) Method for saving and verifying biometric template, and biometric recognition apparatus and terminal
KR20190038938A (en) SYSTEM, METHOD, AND SERVER COMPUTER SYSTEM FOR IMPLEMENTING CONVERTING ONE entity in a heterogeneous communication network environment to a verifiably authenticated entity
CN104092695B (en) It is a kind of to improve the method that vocal print encrypts File Upload and Download
Pan et al. Machine learning for wireless multimedia data security
CN102194066A (en) Method for taking fingerprint information as key
CN105337742B (en) LFSR file encryption and decryption method based on facial image feature and GPS information
CN111242611A (en) Method and system for recovering digital wallet key
CN106921489A (en) A kind of data ciphering method and device
CN107231240A (en) A kind of higher dual identity recognition methods of security
CN113055153B (en) Data encryption method, system and medium based on fully homomorphic encryption algorithm
CN109039650A (en) A kind of method and its system merging the online information trustship of biological feature encryption technology
CN116340918A (en) Full-secret-text face comparison method, device, equipment and storage medium
CN110427906A (en) In conjunction with the Hybrid Encryption recognition methods of fingerprint and finger vein biometric feature
US20160301696A1 (en) Method and device for protecting access to a message
CN109492407A (en) Data protection, data solution protect method, terminal and computer readable storage medium
CN105893819A (en) Improved fingerprint recognition method and system based on redundancy out-of-sequence ordering algorithm
CN109657536A (en) A kind of identity identifying method and system merging bio-identification and cryptographic technique

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant