CN111641630A - Encrypted transmission method and device, electronic equipment and storage medium - Google Patents

Encrypted transmission method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN111641630A
CN111641630A CN202010466414.9A CN202010466414A CN111641630A CN 111641630 A CN111641630 A CN 111641630A CN 202010466414 A CN202010466414 A CN 202010466414A CN 111641630 A CN111641630 A CN 111641630A
Authority
CN
China
Prior art keywords
transmitted
transmission
audio file
server
characteristic information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010466414.9A
Other languages
Chinese (zh)
Other versions
CN111641630B (en
Inventor
黄照
徐世超
徐浩
梁志婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Minglue Artificial Intelligence Group Co Ltd
Original Assignee
Shanghai Minglue Artificial Intelligence Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Minglue Artificial Intelligence Group Co Ltd filed Critical Shanghai Minglue Artificial Intelligence Group Co Ltd
Priority to CN202010466414.9A priority Critical patent/CN111641630B/en
Publication of CN111641630A publication Critical patent/CN111641630A/en
Application granted granted Critical
Publication of CN111641630B publication Critical patent/CN111641630B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application provides an encryption transmission method, an encryption transmission device, electronic equipment and a storage medium, which are applied to recording equipment, wherein the method comprises the following steps: acquiring an audio file to be transmitted and first characteristic information corresponding to the audio file to be transmitted; generating a transmission request according to the first characteristic information, and sending the transmission request to a server; receiving a transmission public key corresponding to the audio file to be transmitted, which is returned by the server, wherein the transmission public key is a public key in a transmission key pair generated by the server for the first characteristic information; encrypting the audio file to be transmitted by using the transmission public key to obtain the encrypted audio file to be transmitted; and sending the encrypted audio file to be transmitted to the server. According to the method and the device, the server generates a set of public and private keys for each audio file to be transmitted, and therefore the audio file to be transmitted is encrypted by the recording equipment through the transmission public key corresponding to the audio file to be transmitted, and the safety of different audio files in the transmission process can be guaranteed.

Description

Encrypted transmission method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of audio transmission, and in particular, to an encryption transmission method, apparatus, electronic device, and storage medium.
Background
After audio is collected by the recording hardware equipment, a recording file needs to be uploaded to a cloud server, and in order to guarantee the privacy and the safety of audio data transmission, the voice file needs to be encrypted in the transmission process.
In the prior art, in the process of transmitting audio files, a recording device usually sends a public key to a server, encrypts the audio by using a private key of the recording device and uploads the audio to the server, and the server stores the audio after receiving the audio. Once the public key of the server is cracked, the security of the audio file transmitted to the recording device cannot be guaranteed.
Disclosure of Invention
An object of the embodiments of the present application is to provide an encrypted transmission method, an encrypted transmission device, an electronic device, and a storage medium, so as to improve the security of an audio file during transmission.
In a first aspect, an embodiment provides an encrypted transmission method applied to a sound recording device, including: acquiring an audio file to be transmitted and first characteristic information corresponding to the audio file to be transmitted; generating a transmission request according to the first characteristic information, and sending the transmission request to a server, wherein the transmission request comprises the first characteristic information; receiving a transmission public key corresponding to the audio file to be transmitted, which is returned by the server, wherein the transmission public key is a public key in a transmission key pair generated by the server for the first characteristic information; encrypting the audio file to be transmitted by using the transmission public key to obtain the encrypted audio file to be transmitted; and sending the encrypted audio file to be transmitted to the server.
According to the method and the device, the server generates a set of public and private keys for each audio file to be transmitted by sending the transmission request to the server, and therefore the audio file to be transmitted is encrypted by the recording equipment by using the transmission public key corresponding to the audio file to be transmitted, and the safety of different audio files in the transmission process can be guaranteed.
In an optional implementation manner, the generating a transmission request according to the first feature information includes: acquiring an equipment private key corresponding to the equipment identification number, wherein the equipment private key corresponds to an equipment public key stored in a server; signing the equipment identification number and the random character string by using the equipment private key to obtain a signature corresponding to the first characteristic information; and generating the transmission request according to the first characteristic information and the corresponding signature so as to enable the server to decrypt the signature by using a corresponding device public key, and verifying the identity of the recording device according to a comparison result of the decrypted signature, the device identification number and the random character string.
According to the method and the device for transmitting the audio file, before the file is uploaded to the server, the first characteristic information of the audio file to be transmitted is signed by the aid of the device private key, so that the server can verify the identity of the recording device by the aid of the device public key, the first characteristic information and the signature, and accordingly the safety of a transmission environment is guaranteed.
In an optional embodiment, the sending the transmission request to the server includes: acquiring second characteristic information of the sound recording equipment, wherein the second characteristic information comprises an equipment identification number; acquiring an equipment private key corresponding to the equipment identification number, wherein the equipment private key corresponds to an equipment public key stored in a server; signing the second characteristic information by using the device private key to obtain a signature corresponding to the second characteristic information; generating a communication request according to the second characteristic information and a signature corresponding to the second characteristic information, sending the communication request to a cloud server so that the cloud server decrypts the signature by using a corresponding device public key, verifying the identity of the recording device according to a comparison result of the decrypted signature and the second characteristic information, and if the verification is passed, allocating a server to the recording device; and receiving a server address returned by the cloud server, and sending the transmission request to a server corresponding to the server address.
The embodiment of the application can send the communication request with the second characteristic information and the signature to the cloud server in advance, so that the cloud server can firstly carry out identity verification on the recording equipment and carry out server distribution on the recording equipment when the verification is passed. Therefore, the server storing the audio file can be prevented from being attacked to a certain extent, and the pressure of the server can be reduced by distributing the server tasks.
In an optional embodiment, the obtaining an audio file to be transmitted includes: acquiring an initial audio file to be transmitted; judging whether the time length of an initial audio file to be transmitted exceeds a preset time length or not; if the time length of the initial audio file to be transmitted exceeds the preset time length, splitting the initial audio file to be transmitted according to the preset time length to obtain a plurality of audio files to be transmitted, wherein the time length of each audio file to be transmitted does not exceed the preset time length.
According to the embodiment of the application, the audio files with the time length exceeding the preset time length are split, so that the split audio files are uploaded, the blockage caused by the audio files with the time length being too long in the uploading process can be prevented, a plurality of audio files to be transmitted corresponding to the initial audio files to be transmitted can be encrypted respectively, and the safety of the audio files with the time length being longer is further guaranteed.
In a second aspect, an embodiment provides an encrypted transmission method, which is applied to a server and includes: receiving a transmission request sent by a recording device, wherein the transmission request comprises first characteristic information corresponding to an audio file to be transmitted; generating a transmission key pair corresponding to the audio file to be transmitted for the first characteristic information, wherein the transmission key pair comprises a transmission public key; sending the transmission public key to the sound recording device; and receiving the encrypted audio file to be transmitted sent by the recording equipment, and storing the encrypted audio file to be transmitted, wherein the encrypted audio file to be transmitted is obtained by encrypting the audio file to be transmitted by using the transmission public key.
According to the method and the device, the transmission request corresponding to the audio file to be transmitted is received, a set of public and private keys is generated for each audio file to be transmitted, so that the recording equipment can encrypt and upload the transmission public key corresponding to the audio file to be transmitted to the server, and the safety of different audio files in the transmission process is guaranteed.
In an optional implementation manner, the first feature information includes an apparatus identification number and a random character string, the transmission request includes first feature information and a corresponding signature, and the generating a transmission key pair corresponding to the audio file to be transmitted for the first feature information includes: finding a corresponding device public key according to the device identification number, wherein the device public key corresponds to a device private key stored in the sound recording device corresponding to the device identification number; decrypting the signature of the first characteristic information by using the private key of the equipment to obtain a decrypted signature; and if the decrypted signature is consistent with the equipment identification number and the random character string, passing the verification, and generating a transmission key pair corresponding to the audio file to be transmitted for the first characteristic information.
According to the method and the device, the signature of the first characteristic information is decrypted by using the device public key corresponding to the device identification number, and the identity of the recording device is verified by comparing the decrypted signature with the device identification number and the random character string, so that the safety of a transmission environment is ensured.
In a third aspect, an embodiment provides an encryption transmission apparatus, which is applied to a recording device, and includes: the acquisition module is used for acquiring an audio file to be transmitted and first characteristic information corresponding to the audio file to be transmitted; the request module is used for generating a transmission request according to the first characteristic information and sending the transmission request to a server, wherein the transmission request comprises the first characteristic information; the public key receiving module is used for receiving a transmission public key which is returned by the server and corresponds to the audio file to be transmitted, wherein the transmission public key is a public key in a transmission key pair generated by the server for the first characteristic information; the encryption module is used for encrypting the audio file to be transmitted by using the transmission public key to obtain the encrypted audio file to be transmitted; and the transmission module is used for sending the encrypted audio file to be transmitted to the server.
According to the method and the device, the transmission request is sent to the server through the request module, so that the server generates a set of public and private keys for each audio file to be transmitted, the audio file to be transmitted is encrypted by the recording equipment through the encryption module by using the transmission public key corresponding to the audio file to be transmitted, and the safety of different audio files in the transmission process can be guaranteed.
In a fourth aspect, an embodiment provides an encryption transmission apparatus, which is applied to a server, and includes: the request receiving module is used for receiving a transmission request sent by the sound recording equipment, wherein the transmission request comprises first characteristic information corresponding to an audio file to be transmitted; the key generation module is used for generating a transmission key pair corresponding to the audio file to be transmitted for the first characteristic information, and the transmission key pair comprises a transmission public key; a public key sending module, configured to send the transmission public key to the sound recording device; and the file receiving module is used for receiving the encrypted audio file to be transmitted sent by the recording equipment and storing the encrypted audio file to be transmitted, wherein the encrypted audio file to be transmitted is obtained by encrypting the audio file to be transmitted by using the transmission public key.
According to the embodiment of the application, the request receiving module receives the transmission request corresponding to the transmission audio file, and the key generating module is used for generating a set of public and private keys for each audio file to be transmitted, so that the recording equipment can encrypt and upload the transmission public keys corresponding to the audio files to be transmitted to the server, and the safety of different audio files in the transmission process is guaranteed.
In a fifth aspect, an embodiment provides an electronic device, including: the system comprises a processor, a memory and a bus, wherein the processor and the memory are communicated with each other through the bus; the memory stores program instructions executable by the processor, the processor being capable of executing the method of any one of the preceding embodiments when invoked by the processor.
In a sixth aspect, embodiments provide a non-transitory computer readable storage medium storing computer instructions that cause the computer to perform the method of any of the preceding embodiments.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments of the present application will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and that those skilled in the art can also obtain other related drawings based on the drawings without inventive efforts.
FIG. 1 is a schematic diagram illustrating an interaction between a recording apparatus and a server according to an embodiment of the present disclosure;
fig. 2 is an interaction flow diagram of an encryption transmission method according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an encryption transmission apparatus according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of another encryption transmission apparatus according to an embodiment of the present application;
fig. 5 is a block diagram of an electronic device applicable to the embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.
Fig. 1 is a schematic diagram of interaction between a recording apparatus and a server according to an embodiment of the present invention, and as an implementation manner, an audio security system according to an embodiment of the present invention includes a recording apparatus 100 and a server 200 that are in communication with each other. The recording device 100 may obtain an audio file to be transmitted through recording, and send the encrypted audio file to be transmitted to the server 200. After receiving the encrypted audio file to be transmitted, the server 200 may store the encrypted audio file to be transmitted and the corresponding key together, so as to decrypt the corresponding audio file to be transmitted when necessary. In this embodiment, the server 200 may generate a set of transmission public and private keys for each to-be-transmitted audio file, and the recording device 100 may encrypt the to-be-transmitted audio file with a transmission public key corresponding to the to-be-transmitted audio file to obtain an encrypted to-be-transmitted audio file. Therefore, the security of the encrypted audio file to be transmitted in the transmission process can be improved.
Fig. 2 is an interaction flow diagram of an encryption transmission method according to an embodiment of the present application; based on the same inventive concept, an encrypted transmission method is provided in the embodiments of the present application, including:
step 110: the method comprises the steps that the recording equipment obtains an audio file to be transmitted and first characteristic information corresponding to the audio file to be transmitted.
Step 120: and the sound recording equipment generates a transmission request according to the first characteristic information and sends the transmission request to a server, wherein the transmission request comprises the first characteristic information.
The audio file to be transmitted may be an audio file recorded and completed by a recording device, and the first characteristic information of the audio file to be transmitted may include: the time when the audio file to be transmitted starts recording, the time when the audio file to be transmitted finishes recording, or a set of one or more kinds of identification information such as random character strings and the like. The specific type of the first feature information is not limited, and may be defined according to the actual encryption transmission requirement.
Furthermore, in order to obtain the key corresponding to the audio file to be transmitted, the sound recording device may generate a transmission request carrying the first characteristic information and send the transmission request to the server.
Step 130: the server receives a transmission request sent by the sound recording device.
Step 140: and the server generates a transmission key pair corresponding to the audio file to be transmitted for the first characteristic information, wherein the transmission key pair comprises a transmission public key.
Step 150: and the server sends the transmission public key to the sound recording equipment.
The transmission key pair is a pair of keys obtained through an asymmetric encryption algorithm, the transmission key pair specifically comprises a transmission private key and a transmission public key, and if the public key is used for encrypting data, the data can be decrypted only by using the corresponding private key. Therefore, the server can generate a corresponding transmission key pair for each audio file to be transmitted, store the transmission private key in the transmission key pair, and send the transmission public key in the transmission key pair to the corresponding recording equipment, so that the recording equipment encrypts the corresponding audio file to be transmitted by using the transmission public key.
Meanwhile, the server can receive a plurality of transmission requests from a plurality of sound recording devices, and each transmission request carries a device identification number corresponding to the sound recording device. The server can generate transmission key pairs corresponding to the transmission requests one by one for the plurality of sound recording devices respectively, and sends transmission public keys corresponding to the transmission requests to the plurality of sound recording devices respectively according to the device identification numbers.
Step 160: and the sound recording equipment receives a transmission public key which is returned by the server and corresponds to the audio file to be transmitted.
Step 170: and the recording equipment encrypts the audio file to be transmitted by using the transmission public key to obtain the encrypted audio file to be transmitted.
Step 180: and the recording equipment sends the encrypted audio file to be transmitted to the server.
Step 190: and the server receives the encrypted audio file to be transmitted sent by the recording equipment and stores the encrypted audio file to be transmitted.
The recording equipment can encrypt the audio file to be transmitted by using a transmission public key corresponding to the audio file to be transmitted, and transmit the encrypted audio file to be transmitted to the server, so that the server stores the encrypted audio file to be transmitted.
Therefore, the encrypted audio file to be transmitted can only be decrypted through the private key which is stored by the server and corresponds to the audio file, and the safety of the audio file is effectively ensured. Compared with the traditional audio transmission mode, the embodiment of the application can prevent the situation that when a server or a transmission channel is attacked to a certain extent, all encrypted audio files are divulged after an attacker successfully decrypts one encrypted audio file.
As an embodiment of the present application, the step 110 may specifically include: acquiring an initial audio file to be transmitted; judging whether the time length of an initial audio file to be transmitted exceeds a preset time length or not; if the time length of the initial audio file to be transmitted exceeds the preset time length, splitting the initial audio file to be transmitted according to the preset time length to obtain a plurality of audio files to be transmitted, wherein the time length of each audio file to be transmitted does not exceed the preset time length.
Because the size of the audio file is often related to the duration of the audio file, in order to prevent the situation that the audio file with too large content may cause a jam when being uploaded, whether the audio file to be initially transmitted needs to be split or not can be judged in advance.
If the duration of the initial audio file to be transmitted does not exceed the preset duration, the file size of the initial audio file to be transmitted is judged to meet the preset size requirement, and the initial audio file to be transmitted can be directly used as the audio file to be transmitted. If the duration of the audio file to be transmitted exceeds the preset duration, the file size of the initial audio file to be transmitted is judged to exceed the preset size requirement, the initial audio file to be transmitted can be split according to the preset duration, and a plurality of audio files to be transmitted which meet the preset duration requirement are obtained.
And simultaneously splitting the initial audio file to be transmitted, and encrypting the multiple split audio files to be transmitted by adopting different transmission keys. In the transmission process, if one audio file to be transmitted is maliciously decoded, the possibility of leakage of the rest audio files to be transmitted corresponding to the initial audio file to be transmitted is low, and the safety of audio transmission and storage is ensured.
For example, if the duration of the initial audio file to be transmitted is 126 minutes and the preset duration is 30 minutes, the initial audio file to be transmitted may be divided into 5 audio files to be transmitted by using 30 minutes as a time node. The duration of 4 audio files to be transmitted is 30 minutes, and the duration of 1 audio file to be transmitted is 6 minutes. The preset time period may be 20 minutes, 30 minutes, 1 hour, etc., and the specific size of the preset time period is not limited, and may be adjusted according to the actual transmission requirement.
As an embodiment of the present application, step 120 may specifically include: the sound recording equipment acquires second characteristic information of the sound recording equipment, wherein the second characteristic information comprises an equipment identification number; the recording equipment acquires an equipment private key corresponding to the equipment identification number, wherein the equipment private key corresponds to an equipment public key stored in the server; the recording equipment signs the second characteristic information by using the equipment private key to obtain a signature corresponding to the second characteristic information; the recording equipment generates a communication request according to the second characteristic information and the signature corresponding to the second characteristic information, sends the communication request to a cloud server so that the cloud server decrypts the signature by using a corresponding equipment public key, verifies the identity of the recording equipment according to a comparison result of the decrypted signature and the second characteristic information, and distributes a server for the recording equipment if the verification is passed; and the sound recording equipment receives the server address returned by the cloud server and sends the transmission request to a server corresponding to the server address.
The cloud server can be a configuration server, the server can be distributed to the recording equipment, and the corresponding server address is sent to the recording equipment, so that the recording equipment can communicate with the cloud server firstly before sending a transmission request to the server to obtain the server address. Meanwhile, the cloud server stores an equipment public key corresponding to the recording equipment number, the cloud server can verify the identity of the recording equipment sending the communication request by using the equipment public key, and the server can be allocated to the recording equipment if the verification is passed. Therefore, the condition that the transmission efficiency is low due to unreasonable server tasks can be avoided while the communication safety of the server is ensured.
Moreover, the second characteristic information may include a device identification number of the sound recording device, a timestamp of the current time and a random character string, and a specific type of the second characteristic information is not limited and may be adjusted according to an actual encryption requirement. The private key of the device for encrypting the second characteristic information is the RSA private key stored in the sound recording device when the device leaves the factory, and a signature corresponding to the second characteristic information can be generated after encryption.
Meanwhile, the recording equipment can send a communication request to the cloud server when the audio file needs to be uploaded for the first time after the recording equipment is started; the communication request can also be sent to the cloud server after the recording is started and the Wi-Fi is connected, the specific sending time of the communication request is not limited, and the communication request can be adjusted according to actual transmission requirements.
For example, after the recording device is connected to the Wi-Fi, the recording device generates second characteristic information corresponding to the recording device according to a device identification number of the recording device, a current timestamp, and a randomly generated 16-bit character string, signs the second characteristic information through a device private key preset in factory shipment to form a signature corresponding to the second characteristic information, and transmits the second characteristic information and the corresponding signature together as a communication request to the cloud server. The cloud server stores the device public key corresponding to the device identification number, and checks the sent second characteristic information and the corresponding signature. And if the signature is decompressed by using the public key of the device and the obtained decompressed signature is consistent with the second characteristic information, the communication request is proved to be sent by the recording device through verification. The cloud server allocates a server for the sound recording device and sends the corresponding server address to the corresponding sound recording device.
It should be noted that after the server address is obtained, the sound recording device may send a transmission request to the server according to the server address after the audio file to be transmitted is obtained. In order to ensure the safety of transmission, the identity authentication is carried out with the server in a signature mode when a transmission request is sent each time. The specific verification process between the recording device and the server is not limited, and can be adjusted according to actual transmission requirements. The following provides an implementation manner of performing authentication with a server in a signature manner before each transmission request is sent according to an embodiment of the present application.
As an embodiment of the present application, the first feature information includes a device identification number and a random character string, and step 120 may specifically include: the recording equipment acquires an equipment private key corresponding to the equipment identification number, wherein the equipment private key corresponds to an equipment public key stored in the server; the recording equipment signs the equipment identification number and the random character string by using the equipment private key to obtain a signature corresponding to the first characteristic information; and the recording equipment generates the transmission request according to the first characteristic information and the corresponding signature so as to enable the server to decrypt the signature by using the corresponding equipment public key, and verifies the identity of the recording equipment according to the comparison result of the decrypted signature, the equipment identification number and the random character string.
The first characteristic information may include an equipment identification number and random character strings, each random character string corresponds to one audio file to be transmitted, and the random character strings corresponding to different audio files to be transmitted are different. The first characteristic information may further include identification information such as a time when the audio file to be transmitted starts to be recorded, a time when the audio file to be transmitted ends to be recorded, or a random character string, which is not described herein again.
It should be noted that, after step 110, the recording device may determine in advance whether its own state satisfies a preset state condition for subsequent audio transmission; if yes, executing step 120, and if not, after the state of the sound recording device meets the preset state condition, executing step 120. By setting the preset state condition, the condition that the audio file transmission fails due to the unstable state of the recording equipment can be effectively reduced. The preset state condition may be that the electric quantity of the recording device meets the transmission requirement, for example, the electric quantity is more than twenty percent; the recording device may also be connected to a network, for example, the recording device may be connected to a network such as bluetooth or WIFI. The specific content of the preset state condition can be adjusted according to the actual transmission requirement.
For example, after the audio file to be transmitted is acquired, and under the condition that the electric quantity of the recording device meets the transmission requirement and the recording device is connected to the WIFI, the recording device may generate the first characteristic information corresponding to the audio file to be transmitted according to the device identification number of the recording device, the current timestamp, and the randomly generated 16-bit character string. And the recording equipment signs the first characteristic information through an equipment private key preset when leaving the factory to form a signature corresponding to the first characteristic information, and generates a transmission request according to the first characteristic information and the corresponding signature and transmits the transmission request to the server.
On the basis of the foregoing embodiment, step 140 may specifically include: the server finds a corresponding equipment public key according to the equipment identification number, wherein the equipment public key corresponds to an equipment private key stored in the sound recording equipment corresponding to the equipment identification number; the server decrypts the signature of the first characteristic information by using the private key of the equipment to obtain a decrypted signature; and if the decrypted signature is consistent with the equipment identification number and the random character string, the verification is passed, and the server generates a transmission key pair corresponding to the audio file to be transmitted for the first characteristic information.
Similarly, the process of checking the signature of the transmission request by the server is similar to the process of checking the signature of the communication request by the cloud server, and is not repeated here.
For example, the server stores the device public key corresponding to the device identification number, and verifies the sent first feature information and the corresponding signature. If the signature is decompressed by the public key of the device, and the obtained decompressed signature is consistent with the first characteristic information, the transmission request is proved to be sent by the recording device through verification. The server generates a corresponding transmission key pair for the audio file to be transmitted according to the first characteristic information so as to perform subsequent encrypted transmission.
Fig. 3 is a schematic structural diagram of an encryption transmission apparatus according to an embodiment of the present application; based on the same inventive concept, the embodiment of the present application further provides an encryption transmission apparatus 200, applied to a recording device, including: the obtaining module 210 is configured to obtain an audio file to be transmitted and first feature information corresponding to the audio file to be transmitted; a request module 220, configured to generate a transmission request according to the first feature information, and send the transmission request to a server, where the transmission request includes the first feature information; a public key receiving module 230, configured to receive a transmission public key corresponding to the audio file to be transmitted, where the transmission public key is a public key in a transmission key pair generated by the server for the first feature information; the encryption module 240 is configured to encrypt the audio file to be transmitted by using the transmission public key to obtain an encrypted audio file to be transmitted; and the transmission module 250 is configured to send the encrypted audio file to be transmitted to the server.
On the basis of the foregoing embodiment, the first feature information includes an apparatus identification number and a random character string, and the request module 220 is specifically configured to: acquiring an equipment private key corresponding to the equipment identification number, wherein the equipment private key corresponds to an equipment public key stored in a server; signing the equipment identification number and the random character string by using the equipment private key to obtain a signature corresponding to the first characteristic information; and generating the transmission request according to the first characteristic information and the corresponding signature so as to enable the server to decrypt the signature by using a corresponding device public key, and verifying the identity of the recording device according to a comparison result of the decrypted signature, the device identification number and the random character string.
On the basis of the foregoing embodiment, the request module 220 is specifically configured to: acquiring second characteristic information of the sound recording equipment, wherein the second characteristic information comprises an equipment identification number; acquiring an equipment private key corresponding to the equipment identification number, wherein the equipment private key corresponds to an equipment public key stored in a server; signing the second characteristic information by using the device private key to obtain a signature corresponding to the second characteristic information; generating a communication request according to the second characteristic information and a signature corresponding to the second characteristic information, sending the communication request to a cloud server so that the cloud server decrypts the signature by using a corresponding device public key, verifying the identity of the recording device according to a comparison result of the decrypted signature and the second characteristic information, and if the verification is passed, allocating a server to the recording device; and receiving a server address returned by the cloud server, and sending the transmission request to a server corresponding to the server address.
On the basis of the foregoing embodiment, the obtaining module 210 is specifically configured to: acquiring an initial audio file to be transmitted; judging whether the time length of an initial audio file to be transmitted exceeds a preset time length or not; if the time length of the initial audio file to be transmitted exceeds the preset time length, splitting the initial audio file to be transmitted according to the preset time length to obtain a plurality of audio files to be transmitted, wherein the time length of each audio file to be transmitted does not exceed the preset time length.
Fig. 4 is a schematic structural diagram of another encryption transmission apparatus according to an embodiment of the present application; based on the same inventive concept, the embodiment of the present application further provides an encryption transmission apparatus 300, applied to a server, including: a request receiving module 310, configured to receive a transmission request sent by a sound recording device, where the transmission request includes first feature information corresponding to an audio file to be transmitted; a key generation module 320, configured to generate a transmission key pair corresponding to the audio file to be transmitted for the first feature information, where the transmission key pair includes a transmission public key; a public key sending module 330, configured to send the transmission public key to the sound recording device; the file receiving module 340 is configured to receive the encrypted audio file to be transmitted sent by the recording device, and store the encrypted audio file to be transmitted, where the encrypted audio file to be transmitted is obtained by encrypting the audio file to be transmitted by using the transmission public key.
On the basis of the foregoing embodiment, the first feature information includes a device identification number and a random character string, the transmission request includes first feature information and a corresponding signature, and the key generation module 320 is specifically configured to: finding a corresponding device public key according to the device identification number, wherein the device public key corresponds to a device private key stored in the sound recording device corresponding to the device identification number; decrypting the signature of the first characteristic information by using the private key of the equipment to obtain a decrypted signature; and if the decrypted signature is consistent with the equipment identification number and the random character string, passing the verification, and generating a transmission key pair corresponding to the audio file to be transmitted for the first characteristic information.
Referring to fig. 5, fig. 5 is a block diagram illustrating a structure of an electronic device 10 applicable to the embodiment of the present application. The electronic device 10 may include a memory 101, a memory controller 102, a processor 103, a peripheral interface 104, an input-output unit 105, a display unit 107.
The memory 101, the memory controller 102, the processor 103, the peripheral interface 104, the input/output unit 105, and the display unit 107 are electrically connected to each other directly or indirectly to implement data transmission or interaction. For example, the components may be electrically connected to each other via one or more communication buses or signal lines. At least one software or firmware (firmware) is stored in the memory 101 or a software function module solidified in an Operating System (OS). The processor 103 is used to execute executable modules, software functional modules or computer programs stored in the memory 101.
The Memory 101 may be, but is not limited to, a Random Access Memory (RAM), a Read Only Memory (ROM), a Programmable Read-Only Memory (PROM), an Erasable Read-Only Memory (EPROM), an electrically Erasable Read-Only Memory (EEPROM), and the like. The memory 101 is configured to store a program, and the processor 103 executes the program after receiving an execution instruction, and the method disclosed in any of the foregoing embodiments of the present application may be applied to the processor 103, or implemented by the processor 103.
The processor 103 may be an integrated circuit chip having signal processing capabilities. The processor 103 may be a general-purpose processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; but may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor 103 may be any conventional processor or the like.
The peripheral interface 104 couples various input/output devices to the processor 103 as well as to the memory 101. In some embodiments, the peripheral interface 104, the processor 103, and the memory controller 102 may be implemented in a single chip. In other examples, they may be implemented separately from the individual chips.
The input/output unit 105 is used for providing input data to a user to enable the user to interact with the electronic device 10. The input/output unit 105 may be, but is not limited to, a mouse, a keyboard, and the like.
The display unit 107 provides an interactive interface (e.g., a user interface) between the electronic device 10 and a user or for displaying image data to a user reference. In this embodiment, the display unit 107 may be a liquid crystal display or a touch display. In the case of a touch display, the display can be a capacitive touch screen or a resistive touch screen, which supports single-point and multi-point touch operations. Supporting single-point and multi-point touch operations means that the touch display can sense touch operations simultaneously generated from one or more positions on the touch display, and the sensed touch operations are sent to the processor 103 for calculation and processing.
It will be appreciated that the configuration shown in FIG. 5 is merely illustrative and that the electronic device 10 may include more or fewer components than shown in FIG. 5 or may have a different configuration than shown in FIG. 5. The components shown in fig. 5 may be implemented in hardware, software, or a combination thereof.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working process of the apparatus described above may refer to the corresponding process in the foregoing method, and will not be described in too much detail herein.
To sum up, the embodiment of the present application provides an encrypted transmission method, an encrypted transmission device, an electronic device, and a storage medium, which are applied to a recording device, where the method includes: acquiring an audio file to be transmitted and first characteristic information corresponding to the audio file to be transmitted; generating a transmission request according to the first characteristic information, and sending the transmission request to a server, wherein the transmission request comprises the first characteristic information; receiving a transmission public key corresponding to the audio file to be transmitted, which is returned by the server, wherein the transmission public key is a public key in a transmission key pair generated by the server for the first characteristic information; encrypting the audio file to be transmitted by using the transmission public key to obtain the encrypted audio file to be transmitted; and sending the encrypted audio file to be transmitted to the server. According to the method and the device, the server generates a set of public and private keys for each audio file to be transmitted by sending the transmission request to the server, and therefore the audio file to be transmitted is encrypted by the recording equipment by using the transmission public key corresponding to the audio file to be transmitted, and the safety of different audio files in the transmission process can be guaranteed.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is merely a logical division, and there may be other ways of dividing the actual implementation, and for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or units through some communication interfaces, and may be in an electrical, mechanical or other form.
In addition, units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
Furthermore, the functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
It should be noted that the functions, if implemented in the form of software functional modules and sold or used as independent products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
In this document, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions.
The above description is only an example of the present application and is not intended to limit the scope of the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (10)

1. An encryption transmission method, applied to a recording apparatus, includes:
acquiring an audio file to be transmitted and first characteristic information corresponding to the audio file to be transmitted;
generating a transmission request according to the first characteristic information, and sending the transmission request to a server, wherein the transmission request comprises the first characteristic information;
receiving a transmission public key corresponding to the audio file to be transmitted, which is returned by the server, wherein the transmission public key is a public key in a transmission key pair generated by the server for the first characteristic information;
encrypting the audio file to be transmitted by using the transmission public key to obtain the encrypted audio file to be transmitted;
and sending the encrypted audio file to be transmitted to the server.
2. The encryption transmission method according to claim 1, wherein the first feature information includes a device identification number and a random string, and the generating of the transmission request based on the first feature information includes:
acquiring an equipment private key corresponding to the equipment identification number, wherein the equipment private key corresponds to an equipment public key stored in a server;
signing the equipment identification number and the random character string by using the equipment private key to obtain a signature corresponding to the first characteristic information;
and generating the transmission request according to the first characteristic information and the corresponding signature so as to enable the server to decrypt the signature by using a corresponding device public key, and verifying the identity of the recording device according to a comparison result of the decrypted signature, the device identification number and the random character string.
3. The encrypted transmission method according to claim 1, wherein the sending the transmission request to the server includes:
acquiring second characteristic information of the sound recording equipment, wherein the second characteristic information comprises an equipment identification number;
acquiring an equipment private key corresponding to the equipment identification number, wherein the equipment private key corresponds to an equipment public key stored in a server;
signing the second characteristic information by using the device private key to obtain a signature corresponding to the second characteristic information;
generating a communication request according to the second characteristic information and a signature corresponding to the second characteristic information, sending the communication request to a cloud server so that the cloud server decrypts the signature by using a corresponding device public key, verifying the identity of the recording device according to a comparison result of the decrypted signature and the second characteristic information, and if the verification is passed, allocating a server to the recording device;
and receiving a server address returned by the cloud server, and sending the transmission request to a server corresponding to the server address.
4. The encrypted transmission method according to claim 1, wherein the obtaining the audio file to be transmitted includes:
acquiring an initial audio file to be transmitted;
judging whether the time length of an initial audio file to be transmitted exceeds a preset time length or not;
if the time length of the initial audio file to be transmitted exceeds the preset time length, splitting the initial audio file to be transmitted according to the preset time length to obtain a plurality of audio files to be transmitted, wherein the time length of each audio file to be transmitted does not exceed the preset time length.
5. An encryption transmission method is applied to a server and comprises the following steps:
receiving a transmission request sent by a recording device, wherein the transmission request comprises first characteristic information corresponding to an audio file to be transmitted;
generating a transmission key pair corresponding to the audio file to be transmitted for the first characteristic information, wherein the transmission key pair comprises a transmission public key;
sending the transmission public key to the sound recording device;
and receiving the encrypted audio file to be transmitted sent by the recording equipment, and storing the encrypted audio file to be transmitted, wherein the encrypted audio file to be transmitted is obtained by encrypting the audio file to be transmitted by using the transmission public key.
6. The encryption transmission method according to claim 5, wherein the first feature information includes a device identification number and a random string, the transmission request includes first feature information and a corresponding signature, and the generating a transmission key pair corresponding to the audio file to be transmitted for the first feature information includes:
finding a corresponding device public key according to the device identification number, wherein the device public key corresponds to a device private key stored in the sound recording device corresponding to the device identification number;
decrypting the signature of the first characteristic information by using the private key of the equipment to obtain a decrypted signature;
and if the decrypted signature is consistent with the equipment identification number and the random character string, passing the verification, and generating a transmission key pair corresponding to the audio file to be transmitted for the first characteristic information.
7. An encryption transmission device, which is applied to a recording apparatus, comprising:
the acquisition module is used for acquiring an audio file to be transmitted and first characteristic information corresponding to the audio file to be transmitted;
the request module is used for generating a transmission request according to the first characteristic information and sending the transmission request to a server, wherein the transmission request comprises the first characteristic information;
the public key receiving module is used for receiving a transmission public key which is returned by the server and corresponds to the audio file to be transmitted, wherein the transmission public key is a public key in a transmission key pair generated by the server for the first characteristic information;
the encryption module is used for encrypting the audio file to be transmitted by using the transmission public key to obtain the encrypted audio file to be transmitted;
and the transmission module is used for sending the encrypted audio file to be transmitted to the server.
8. An encryption transmission device, applied to a server, includes:
the request receiving module is used for receiving a transmission request sent by the sound recording equipment, wherein the transmission request comprises first characteristic information corresponding to an audio file to be transmitted;
the key generation module is used for generating a transmission key pair corresponding to the audio file to be transmitted for the first characteristic information, and the transmission key pair comprises a transmission public key;
a public key sending module, configured to send the transmission public key to the sound recording device;
and the file receiving module is used for receiving the encrypted audio file to be transmitted sent by the recording equipment and storing the encrypted audio file to be transmitted, wherein the encrypted audio file to be transmitted is obtained by encrypting the audio file to be transmitted by using the transmission public key.
9. An electronic device, comprising: the system comprises a processor, a memory and a bus, wherein the processor and the memory are communicated with each other through the bus;
the memory stores program instructions executable by the processor, the processor invoking the program instructions to perform the method of any of claims 1-6.
10. A non-transitory computer-readable storage medium storing computer instructions that cause a computer to perform the method of any one of claims 1-6.
CN202010466414.9A 2020-05-28 2020-05-28 Encryption transmission method and device, electronic equipment and storage medium Active CN111641630B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010466414.9A CN111641630B (en) 2020-05-28 2020-05-28 Encryption transmission method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010466414.9A CN111641630B (en) 2020-05-28 2020-05-28 Encryption transmission method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111641630A true CN111641630A (en) 2020-09-08
CN111641630B CN111641630B (en) 2023-05-02

Family

ID=72330568

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010466414.9A Active CN111641630B (en) 2020-05-28 2020-05-28 Encryption transmission method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111641630B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111865891A (en) * 2019-12-31 2020-10-30 北京嘀嘀无限科技发展有限公司 Data transmission method, user side, electronic equipment and readable storage medium
CN112311787A (en) * 2020-10-28 2021-02-02 深圳市启望科文技术有限公司 Recording file segment encryption method and device, computer equipment and storage medium
CN113395279A (en) * 2021-06-11 2021-09-14 上海明略人工智能(集团)有限公司 Data encryption method and device, audio acquisition equipment and electronic equipment
CN115001716A (en) * 2022-08-02 2022-09-02 长沙朗源电子科技有限公司 Network data processing method and system of education all-in-one machine and education all-in-one machine
CN116226890A (en) * 2023-05-05 2023-06-06 北京华阅嘉诚科技发展有限公司 Audio file processing method and device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106059757A (en) * 2016-07-07 2016-10-26 北京信长城技术研究院 Audio and video monitoring device, data encryption and decryption method, and audio and video display device
CN108347419A (en) * 2017-01-24 2018-07-31 腾讯科技(深圳)有限公司 Data transmission method and device
CN108769052A (en) * 2018-06-12 2018-11-06 北斗巡星信息科技有限公司 Wrist strap transmits the encrypted method and device of information
CN110677418A (en) * 2019-09-29 2020-01-10 四川虹微技术有限公司 Trusted voiceprint authentication method and device, electronic equipment and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106059757A (en) * 2016-07-07 2016-10-26 北京信长城技术研究院 Audio and video monitoring device, data encryption and decryption method, and audio and video display device
CN108347419A (en) * 2017-01-24 2018-07-31 腾讯科技(深圳)有限公司 Data transmission method and device
CN108769052A (en) * 2018-06-12 2018-11-06 北斗巡星信息科技有限公司 Wrist strap transmits the encrypted method and device of information
CN110677418A (en) * 2019-09-29 2020-01-10 四川虹微技术有限公司 Trusted voiceprint authentication method and device, electronic equipment and storage medium

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111865891A (en) * 2019-12-31 2020-10-30 北京嘀嘀无限科技发展有限公司 Data transmission method, user side, electronic equipment and readable storage medium
CN111865891B (en) * 2019-12-31 2023-08-15 北京嘀嘀无限科技发展有限公司 Data transmission method, user terminal, electronic equipment and readable storage medium
CN112311787A (en) * 2020-10-28 2021-02-02 深圳市启望科文技术有限公司 Recording file segment encryption method and device, computer equipment and storage medium
CN112311787B (en) * 2020-10-28 2022-04-22 深圳市启望科文技术有限公司 Recording file segment encryption method and device, computer equipment and storage medium
CN113395279A (en) * 2021-06-11 2021-09-14 上海明略人工智能(集团)有限公司 Data encryption method and device, audio acquisition equipment and electronic equipment
CN115001716A (en) * 2022-08-02 2022-09-02 长沙朗源电子科技有限公司 Network data processing method and system of education all-in-one machine and education all-in-one machine
CN115001716B (en) * 2022-08-02 2022-12-06 长沙朗源电子科技有限公司 Network data processing method and system of education all-in-one machine and education all-in-one machine
CN116226890A (en) * 2023-05-05 2023-06-06 北京华阅嘉诚科技发展有限公司 Audio file processing method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN111641630B (en) 2023-05-02

Similar Documents

Publication Publication Date Title
CN111641630B (en) Encryption transmission method and device, electronic equipment and storage medium
US11140160B2 (en) Method and system for establishing inter-device communication
US10025912B2 (en) Information processing system, reading apparatus, information processing apparatus, and information processing method
CN108241517B (en) Software upgrading method, client and electronic equipment
US9792427B2 (en) Trusted execution within a distributed computing system
US9735962B1 (en) Three layer key wrapping for securing encryption keys in a data storage system
CN109639427B (en) Data sending method and equipment
JP5827692B2 (en) Bound data card and mobile host authentication method, apparatus and system
CN110661748B (en) Log encryption method, log decryption method and log encryption device
CN108494793B (en) Network access method, device and system
CN112953930A (en) Cloud storage data processing method and device and computer system
CN113438205A (en) Block chain data access control method, node and system
CN113630412B (en) Resource downloading method, resource downloading device, electronic equipment and storage medium
CN109960935B (en) Method, device and storage medium for determining trusted state of TPM (trusted platform Module)
CN111324912A (en) File checking method, system and computer readable storage medium
CN111368322B (en) File decryption method and device, electronic equipment and storage medium
CN110414269B (en) Processing method, related device, storage medium and system of application installation package
CN111783120A (en) Data interaction method, computing device, BMC chip and electronic device
JP2018067807A (en) Electronic signature system, electronic signature client, electronic signature program, server, and electronic signature method
CN110888716A (en) Data processing method and device, storage medium and electronic equipment
CN108154037B (en) Inter-process data transmission method and device
CN113422832B (en) File transmission method, device, equipment and storage medium
WO2022073336A1 (en) Secure payment method and apparatus, electronic device, and storage medium
WO2019037422A1 (en) Key and key handle generation method and system, and smart key security device
CN114223176B (en) Certificate management method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant