Method and terminal that a kind of speech message is encrypted after readding
Technical field
The invention belongs to end message secrecy technology field and in particular to a kind of speech message read after encryption method and end
End.
Background technology
Network is more and more flourishing at present, and flow rate are more and more cheap, and voice communication chat is more convenient, uses
Frequency is very high, and voice-enabled chat will also result in the leakage of individual privacy, in order to not obtained individual privacy easily by other people, takes herein
The method protection privacy of voice encryption;After user receives speech message, when user clicks on voice messaging with finger, software
Sample finger print as the key of encryption, when voice messaging is play using the encrypting fingerprint of firm sampling;Read other later
Speech message also can facilitate user to remember with the encrypting fingerprint of sampling for the first time;When playing again only with sampling
Finger print information coupling could obtain broadcasting voice;Burn-after-reading on existing mobile phone is will to delete for after pictorial information reading
Remove, and voice messaging may comprise critically important privacy information, if user is not intended to delete at once, need reading voice to disappear
Encrypt immediately after breath, both can protect and not allow other people check, facilitate user to use again.
Content of the invention:
In order to overcome the defect of above-mentioned background technology, method and end that a kind of present invention speech message of offer is encrypted after readding
End, on the premise of not deleting and readding speech message, both can protect and not allow other people check, facilitate user's use again
The technical scheme being adopted in order to solve the above-mentioned technical problem present invention is:
The present invention provides a kind of method that speech message is encrypted after readding:First after played voice message, use first key
Speech message is encrypted;Need to be decrypted with first key before playing encrypted speech message again, if deciphering is correct,
Then played voice message, if decipher incorrect, not played voice message.
It is preferred that when speech message being encrypted with first key, it is first determined whether there is generation first is close
Key, is if so, then directly encrypted using first key, if it is not, then generating a first key and being encrypted.
It is preferred that when being decrypted with first key, if deciphering is incorrect, cumulative error number of times is added 1, when accumulative mistake
When number of times reaches pre-set limit by mistake, start the second key and verified, if being proved to be successful, played voice message simultaneously supplements first with money
Key, if checking is unsuccessful, not played voice message quitting a program.
It is preferred that first key includes fingerprint key, the second key includes safety problem.
It is preferred that after speech message being encrypted with first key, with encryption picture display speech message, encrypting picture
Including locking picture.
The terminal that the present invention encrypts after also providing a kind of speech message to read, including the broadcasting mould for played voice message
Block, also includes:
Encrypting module, for being encrypted to speech message with first key after played voice message first;
First authentication module, for the solution before playing encrypted speech message again, to the first key of user input
Whether confidential information is correctly verified, if so, then played voice message, if it is not, then not played voice message.
Memory module, for storing first key.
It is preferred that encrypting module includes:
First key search unit, for searching for whether memory module has the first key pre-setting, if so, then will
First key is delivered to first key ciphering unit, if it is not, then sending enabling signal to first key signal generating unit;
First key signal generating unit, for generating first key, and first key is delivered to first key ciphering unit;
First key ciphering unit, for being encrypted to speech message using first key.
It is preferred that the first authentication module includes:
First decryption information acquiring unit, for obtaining the decryption information of the first key of user input;
First decryption verification unit, for whether correctly verifying to decryption information, if so, then played voice message,
If it is not, then not played voice message, and rub-out signal is sent to counting unit;
Counting unit, for when receiving rub-out signal, cumulative number plus 1;
Judging unit, whether the cumulative number for judging counting unit reaches pre-set limit, if so, then to the second checking
Module sends enabling signal;
Terminal also includes the second authentication module, and the second authentication module is used for the checking information of the second key to user input
Whether correctly verified, if so, then played voice message, if it is not, then not played voice message quitting a program, the second key
Storage is in a storage module.
It is preferred that first key includes fingerprint key, the second key includes safety problem, the first decryption information acquiring unit
Including fingerprint device.
It is preferred that encrypting module also includes picture replacement unit, for first key ciphering unit to speech message plus
After close, with encryption picture display speech message, encrypt picture and include locking picture.
The beneficial effects of the present invention is:Once after certain speech message was play by user, carrying out to it immediately adding
Close, the secure fashion of direct deletion different from the past.The secrecy effect reaching, aligns after can not affecting user again again
Carry out reading and play.If desired play out again, be decrypted successfully by key.Speech message is encrypted
Process, being first had to judge whether there is a first key, being if so, then directly encrypted using it, if it is not, then needing
Generate a first key to be encrypted again.In order to reach the more preferable purpose protecting user's access right, increased the second key
Verification mode, first key authentication failed reach preset times limit in the case of, the scheme enabling the second key is carried out
Checking, has reached the purpose ensureing user's access right, safer reasonable.The preferred fingerprint authentication of first key, the second key is tested
The safety problem that card preferred, users pre-set in the terminal is carried out, such as, in the case that user's finger is injured, can pass through
This kind of mode is verified further.And in putting into practice, first key and the second key all have a lot of replacement schemes, such as sound
Checking, password authentification etc..After encryption speech message, original display packing is replaced by locking picture, point out this message of user
Read and encrypt.The present invention do not delete read speech message on the premise of reach and protect user speech message not compromised
Purpose, reach the more preferable purpose protecting user's access right for providing multiple-authentication simultaneously.
Brief description
Fig. 1 is the method flow diagram of the embodiment of the present invention one;
Fig. 2 is that the embodiment of the present invention one adds the method flow diagram judging whether to have after first key scheme;
Fig. 3 is the method flow diagram that the embodiment of the present invention one adds after the second cipher key scheme;
Fig. 4 is the embodiment of the present invention two terminal structure schematic diagram;
Fig. 5 is the structural representation of the embodiment of the present invention two encrypting module;
Fig. 6 is the structural representation of the embodiment of the present invention 2 first authentication module;
Fig. 7 is the terminal structure schematic diagram that the embodiment of the present invention two adds after the second authentication module;
Fig. 8 is the structural representation of the embodiment of the present invention 2 second authentication module;
Fig. 9 is the structural representation of encrypting module after the embodiment of the present invention two picture replacement unit.
Specific embodiment
The present invention is described further with reference to the accompanying drawings and examples.
Embodiment one
A kind of method that speech message is encrypted after readding:First after played voice message, with first key to speech message
It is encrypted;Need to be decrypted with first key before playing encrypted speech message again, if deciphering is correct, play described
Speech message, if deciphering is incorrect, does not play described speech message, as shown in figure 1, its concrete steps includes:
Step 1, judges speech message to be played whether unencryption, if so, then enters step 2, if it is not, then entering step 3;
Step 2, played voice message, with first key, speech message is encrypted afterwards;
Whether step 3, correctly verify to the decryption information of the first key of user input, if so, then plays voice
Message, if it is not, then not played voice message.
Once after certain speech message was play by user, being encrypted to it immediately, direct deletion different from the past
Secure fashion.The secrecy effect reaching, carries out to it reading playing after can not affecting user again again.If desired again
Secondary play out, be decrypted successfully by key.
As one kind improvement of the present embodiment, when speech message being encrypted with first key, it is first determined whether depositing
In the first key of generation, if so, then directly it is encrypted using first key, if it is not, then generating a first key simultaneously
It is encrypted.
As shown in Fig. 2 its concrete steps includes:
Step 1, judges speech message to be played whether unencryption, if so, then enters step 2, if it is not, then entering step 3;
Step 2, played voice message, judge whether the first key of generation, if so, then directly close using first
Key is encrypted to speech message, if it is not, then generating a first key, and speech message is encrypted;
Whether step 3, correctly verify to the decryption information of the first key of user input, if so, then plays voice
Message, if it is not, then not played voice message.
The process that speech message is encrypted, first has to judge whether there is a first key, if so, then straight
Connect and be encrypted using it, if it is not, then need to produce a first key being encrypted again.
As one kind improvement of the present embodiment, when being decrypted with first key, if deciphering is correct, plays voice and disappear
Breath, if deciphering incorrect, not played voice message, and cumulative error number of times is added 1;When cumulative error number of times reaches pre- limiting
During value, start the second key and verified.Pre-set limit in the present embodiment is 3 times.As shown in figure 3, its concrete steps includes:
Step 1, judges speech message to be played whether unencryption, if so, then enters step 2, if it is not, then entering step 3;
Step 2, played voice message, judge whether the first key of generation, if so, then directly close using first
Key is encrypted to speech message, if it is not, then generating a first key, and speech message is encrypted;
Step 3, obtains the decryption information of the first key of user input;
Whether step 4, correctly verify to the decryption information of the first key of user input, if so, then plays voice
Message, if it is not, then not played voice message, and enter step 5;
Step 5, cumulative error number of times adds 1;
Step 6, judges whether described cumulative error number of times reaches 3 times, if so, then enters step 7, if it is not, then returning to step
Rapid 3;
Step 7, obtains the checking information of the second key of user input;
Step 8, judges the second key authentication whether success, if so, then played voice message, and enters step 9, if it is not,
Then do not play described speech message, and quit a program.
Step 9, resets described first key.For example obtain user fingerprints information again and be stored in institute as first key
State memory module.
In order to reach the more preferable purpose protecting user's access right, increased the verification mode of the second key, close first
In the case that key authentication failed reaches preset times restriction, the scheme enabling the second key is verified, has reached guarantee user
The purpose of access right, safer reasonable.
A kind of preferred as the present embodiment, first key selects fingerprint key, and user receives a speech message, handss
Refer to touch speech message region, judge whether system had generated fingerprint key, without if then sample Fingers
Stricture of vagina information generates key, if key has existed, subsequently all can use this key;When user clicks on encrypted voice
During message, by present sample finger print information and the fingerprint key contrast generating, if if fingerprint key contrast success, play
Voice messaging.
Second key selects safety problem.Owner can be after opening speech message encryption function of the present invention, thing
First a security permission problem is set, if in the case that fingerprint key contrast unsuccessfully, adds up to contrast unsuccessfully after three times, ejection one
Individual dialog box, the correct problem answering owner's setting can also play voice it is ensured that the highest authority of owner, and what owner set asks
Topic can reset fingerprint key after being verified.
The preferred fingerprint authentication of first key, the safety problem that the second key authentication preferred, users pre-set in the terminal is entered
OK, for example, in the case that user's finger is injured, can be verified further by this kind of mode.And in putting into practice, first is close
Key and the second key all have a lot of replacement schemes, such as voice authentication, password authentification etc..
As one kind improvement of the present embodiment, after speech message being encrypted with first key, shown with encryption picture
Speech message, encryption picture includes locking picture.One lock picture prompting user is added after playback ends on speech message.Plus
After close speech message, original display packing is replaced by locking picture, point out this message of user to read and encrypted.
Embodiment two
The terminal that a kind of speech message is encrypted after readding, as shown in figure 4, include:
Playing module, for played voice message:
Encrypting module, for being encrypted to speech message with first key after played voice message first;
First authentication module, for the solution before playing encrypted speech message again, to the first key of user input
Whether confidential information is correctly verified, if so, then played voice message, if it is not, then not played voice message.
Memory module, for storing first key.
The working method of the present embodiment is encrypted to speech message with first key for after played voice message first;
Need to be decrypted with first key before playing encrypted speech message again, if deciphering is correct, play described speech message,
If deciphering is incorrect, do not play described speech message.That is, first having to judge speech message to be played whether unencryption, if
It is, then played voice message with first key, speech message to be encrypted afterwards;If it is not, it is then close to the first of user input
Whether the decryption information of key is correctly verified, if so, then played voice message, if it is not, then not played voice message.User's point
Commence play out voice after hitting, if only wall scroll speech message, just encrypted with the key of above-mentioned generation when playing voice and starting,
When continuously playing if there are a plurality of speech message, when one speech message of broadcasting, then backstage encrypts one with the key of above-mentioned generation
Bar, midway stops playing and which bar speech message to be then encrypted into that when.
Once after certain speech message of the present embodiment was play by user, being encrypted to it immediately, different from the past
The secure fashion directly deleted.The secrecy effect reaching, carries out to it reading playing after can not affecting user again again.
If desired play out again, be decrypted successfully by key.
As one kind improvement of the present embodiment, as shown in figure 5, encrypting module includes:
First key search unit, for searching for whether memory module has the first key pre-setting, if so, then will
First key is delivered to first key ciphering unit, if it is not, then sending enabling signal to first key signal generating unit;
First key signal generating unit, for generating first key, and first key is delivered to first key ciphering unit;
First key ciphering unit, for being encrypted to speech message using first key.
Specifically working method is:First determine whether speech message to be played whether unencryption, if speech message unencryption,
Played voice message, is judged whether the first key of generation, if so, then directly using first key, speech message is entered
Row encryption, if it is not, then generating a first key, and is encrypted to speech message;If speech message is encrypted, defeated to user
Whether the decryption information of the first key entering correctly is verified, if so, then played voice message, if it is not, then not playing voice
Message.
Provide a kind of process preferably speech message being encrypted, first have to judge whether to have existed one the
One key, is if so, then directly encrypted using it, if it is not, then need to produce a first key being encrypted again.
As one kind improvement of the present embodiment,
As shown in fig. 6, the first authentication module includes:
First decryption information acquiring unit, for obtaining the decryption information of the first key of user input;
First decryption verification unit, for whether correctly verifying to decryption information, if so, then played voice message,
If it is not, then not played voice message, and rub-out signal is sent to counting unit;
Counting unit, for when receiving rub-out signal, cumulative number plus 1;
Judging unit, whether the cumulative number for judging counting unit reaches pre-set limit, if so, then to the second checking
Module sends enabling signal;
As shown in fig. 7, terminal also includes the second authentication module, the second authentication module is used for the second key to user input
Checking information whether correctly verified, if so, then played voice message, if it is not, then not played voice message exit journey
Sequence, the second key storage is in a storage module.As shown in figure 8, the second authentication module includes:
Second checking information acquiring unit, for obtaining the second checking information of user input;
Second authentication unit, whether the second checking information for judging user input is correct, if so, then plays voice and disappears
Breath, if it is not, then not played voice message, and quit a program;
First key reset cell, for resetting first key.
Present solution provides second authentication module, to reaching the more preferable purpose ensureing user's access right.With
When first key is decrypted, if deciphering is correct, played voice message, if deciphering incorrect, not played voice message, and
Cumulative error number of times is added 1;When cumulative error number of times reaches pre-set limit 3 times, start the second key and verified.
First determine whether speech message to be played whether unencryption, if speech message unencryption, played voice message, judge
With the presence or absence of the first key of generation, if so, then directly using first key, speech message is encrypted, if it is not, then giving birth to
Become a first key, and speech message is encrypted;If speech message is encrypted, obtain the first key of user input
Decryption information;
Then whether the decryption information of the first key of user input is correctly verified, if the solution secret letter of first key
Breath is correct, then played voice message, if the decryption information of first key is incorrect, not played voice message, and will add up
Errors number adds 1;
Point out the checking information of the second key of user input when whether cumulative error number of times reaches 3 times;Judge second
Whether key authentication is successful, if the second key authentication success, played voice message, and resets described first key.For example again
Secondary acquisition user fingerprints information is simultaneously stored in described memory module as first key.If the second key authentication is unsuccessful, no
Play described speech message, and quit a program.
This programme, in order to reach the more preferable purpose protecting user's access right, increased the verification mode of the second key,
In the case that first key authentication failed reaches preset times restriction, the scheme enabling the second key is verified, has reached guarantor
The purpose of barrier user's access right, safer reasonable.
A kind of preferred as the present embodiment, first key includes fingerprint key, and the second key includes safety problem, and first
Decryption information acquiring unit includes fingerprint device.The preferred fingerprint authentication of first key, the second key authentication preferred, users pre-set
Safety problem in the terminal is carried out, such as, in the case that user's finger is injured, can be carried out further by this kind of mode
Checking.And in putting into practice, first key and the second key all have a lot of replacement schemes, such as voice authentication, password authentification etc..
First key selects fingerprint more convenient and safety.
As one kind improvement of the present embodiment, as shown in figure 9, encrypting module also includes picture replacement unit, for the
After one secret key encryption unit is to speech message encryption, with encryption picture display speech message, encrypts picture and include locking picture.Plus
After close speech message, original display packing is replaced by locking picture, point out this message of user to read and encrypted.
It should be appreciated that for those of ordinary skills, can be improved according to the above description or be converted,
And all these modifications and variations all should belong to the protection domain of claims of the present invention.