CN112035862A - Method and device for protecting audio data and storage medium - Google Patents

Method and device for protecting audio data and storage medium Download PDF

Info

Publication number
CN112035862A
CN112035862A CN202010931473.9A CN202010931473A CN112035862A CN 112035862 A CN112035862 A CN 112035862A CN 202010931473 A CN202010931473 A CN 202010931473A CN 112035862 A CN112035862 A CN 112035862A
Authority
CN
China
Prior art keywords
audio data
authentication
reading
file
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010931473.9A
Other languages
Chinese (zh)
Inventor
沈忱
梁志婷
李健
王玉好
徐浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Minglue Artificial Intelligence Group Co Ltd
Original Assignee
Shanghai Minglue Artificial Intelligence Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Minglue Artificial Intelligence Group Co Ltd filed Critical Shanghai Minglue Artificial Intelligence Group Co Ltd
Priority to CN202010931473.9A priority Critical patent/CN112035862A/en
Publication of CN112035862A publication Critical patent/CN112035862A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Storage Device Security (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)

Abstract

The invention discloses a method and a device for protecting audio data and a storage medium. Wherein, the method comprises the following steps: when detecting that the target recording equipment is accessed to the reading equipment and the reading equipment initiates a reading instruction, initiating an authentication instruction to authenticate the reading equipment; displaying a first file for the reading device to read the first audio data under the condition that the authentication information fed back by the reading device indicates that the authentication is passed; and under the condition that the authentication information fed back by the reading equipment indicates that the authentication is not passed, displaying a second file for the reading equipment to read second audio data, wherein the file name of the second file is the same as that of the first file, and the second audio data is different from the first audio data. The invention solves the technical problem of low protection strength of the audio data.

Description

Method and device for protecting audio data and storage medium
Technical Field
The invention relates to the field of computers, in particular to a method and a device for protecting audio data and a storage medium.
Background
In recent years, the application of recording equipment is more extensive, but the recording equipment is used in public places, and when the recording equipment leaves, the recording equipment is placed in a public area to upload data or charge, and at the moment, a user leaves the recording equipment, so that the problem that personal voice data is stolen and used disorderly is faced. In the prior art, a relatively strong anti-theft means is often set in the face of the above problems, so that a thief is caused to be in a hurry, recording data is forcibly stolen by the more strong stealing means, and even recording equipment is damaged. Therefore, there is a problem that the protection of the audio data is low.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
The embodiment of the invention provides a method and a device for protecting audio data and a storage medium, which at least solve the technical problem of low protection strength of the audio data.
According to an aspect of the embodiments of the present invention, there is provided a method for protecting audio data, including: the method comprises the steps that when it is detected that a target recording device is connected to a reading device and the reading device initiates a reading instruction, an authentication instruction is initiated to authenticate the reading device, wherein the reading instruction is used for reading first audio data in the target recording device; under the condition that the authentication information fed back by the reading equipment indicates that the authentication is passed, displaying a first file for the reading equipment to read the first audio data; and displaying a second file for the reading device to read second audio data under the condition that the authentication information fed back by the reading device indicates that the authentication is not passed, wherein the file name of the second file is the same as that of the first file, and the second audio data is different from the first audio data.
As an optional solution, after the initiating the authentication instruction, the method includes: and acquiring a key sent by the reading device, wherein the key is used for legally reading the first audio data from the target recording device, and the key is input through a key input area displayed in a display area of the reading device.
As an optional scheme, after the obtaining the key sent by the reading device, the method further includes: determining that the authentication information is not authenticated under the condition that the key is detected to be different from a target key, wherein the target key is a verification key used for legally reading the first audio data in the target recording device; and displaying first target information, wherein the first target information is used for indicating that the authentication information passes the authentication.
As an optional solution, the displaying the first file for the reading device to read the first audio data includes: determining that the authentication information passes the authentication when the key is detected to be the same as the target key; and displaying second target information, wherein the second target information is used for indicating that the authentication information passes the authentication, and the display form of the first target information is different from that of the second target information.
As an optional solution, before the initiating the authentication instruction, the method includes: and displaying a third file, wherein the file name of the third file is the same as that of the first file, and the third file is used for triggering the authentication command.
As an alternative, the method comprises the following steps: and generating a target log, wherein the target log is used for recording that the reading device reads the target sound recording device under the condition that the reading device is not authorized.
According to another aspect of the embodiments of the present invention, there is also provided an apparatus for protecting audio data, including: the device comprises an authentication unit, a processing unit and a processing unit, wherein the authentication unit is used for initiating an authentication instruction to authenticate a reading device under the condition that a target recording device is detected to be accessed to the reading device and the reading device initiates a reading instruction, and the reading instruction is used for reading first audio data in the target recording device; a first display unit, configured to display a first file for the reading device to read the first audio data when the authentication information fed back by the reading device indicates that the authentication is passed; and a second display unit, configured to display a second file for the reading device to read second audio data when the authentication information fed back by the reading device indicates that the authentication is not passed, where a file name of the second file is the same as a file name of the first file, and the second audio data is different from the first audio data.
As an alternative, the method comprises the following steps: an obtaining unit, configured to obtain, after the authentication instruction is initiated, a key sent by the reading device, where the key is used to legally read the first audio data from the target audio recording device, and the key is input through a key input area displayed in a display area of the reading device.
As an optional solution, the first display unit further includes: a first determining module, configured to determine that the authentication information is not authenticated when detecting that the key is different from a target key, where the target key is a verification key used for legitimately reading the first audio data in the target audio recording device; the first display module is used for displaying first target information, wherein the first target information is used for indicating that the authentication information passes the authentication.
As an alternative, the first display unit includes: a second determining module, configured to determine that the authentication information passes the authentication when it is detected that the key is the same as the target key; and a second display module, configured to display second target information, where the second target information is used to indicate that the authentication information passes the authentication, and a display form of the first target information is different from a display form of the second target information.
As an alternative, the method comprises the following steps: and a third display unit, configured to display a third file before the authentication instruction is initiated, where a file name of the third file is the same as a file name of the first file, and the third file is used to trigger the authentication instruction.
As an alternative, the method comprises the following steps: and the generating module is used for generating a target log, wherein the target log is used for recording that the reading equipment reads the target recording equipment under the condition that the reading equipment is not authorized.
According to another aspect of the embodiments of the present invention, there is also provided a computer-readable storage medium, in which a computer program is stored, where the computer program is configured to execute the above protection method for audio data when running.
According to another aspect of the embodiments of the present invention, there is also provided an electronic apparatus, including a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor executes the method for protecting audio data through the computer program.
In the embodiment of the present invention, when it is detected that a target recording device has accessed a reading device and the reading device initiates a reading instruction, an authentication instruction is initiated to authenticate the reading device, where the reading instruction is used to read first audio data in the target recording device; under the condition that the authentication information fed back by the reading equipment indicates that the authentication is passed, displaying a first file for the reading equipment to read the first audio data; displaying a second file for the reading device to read second audio data under the condition that the authentication information fed back by the reading device indicates that the authentication is not passed, wherein the file name of the second file is the same as the file name of the first file, the second audio data is different from the first audio data, and the authentication is performed to identify whether the reading operation applied currently is legal, and provides confusing false data for the operation under the condition that the operation is determined to be illegal, so that a user who performs illegal operation can assume that the user has taken the correct data and does not obtain the correct data by other illegal means, and then reached and suspended the purpose that the illegal damage audio data protected in advance to the effect that has realized improving the protection dynamics of audio data, and then solved the lower technical problem of the protection dynamics of audio data.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
FIG. 1 is a schematic diagram of a flow chart of an alternative method of safeguarding audio data in accordance with an embodiment of the present invention;
FIG. 2 is a schematic diagram of an alternative method of safeguarding audio data in accordance with embodiments of the present invention;
FIG. 3 is a schematic diagram of an alternative method of safeguarding audio data in accordance with an embodiment of the present invention;
FIG. 4 is a schematic diagram of an alternative method of safeguarding audio data in accordance with an embodiment of the present invention;
FIG. 5 is a schematic diagram of an alternative audio data guard in accordance with an embodiment of the present invention;
FIG. 6 is a schematic diagram of an alternative audio data guard according to an embodiment of the present invention;
FIG. 7 is a schematic diagram of an alternative audio data guard according to an embodiment of the present invention;
FIG. 8 is a schematic diagram of an alternative audio data guard according to an embodiment of the present invention;
FIG. 9 is a schematic diagram of an alternative audio data guard according to an embodiment of the present invention;
fig. 10 is a schematic structural diagram of an alternative electronic device according to an embodiment of the invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Optionally, as an optional implementation manner, as shown in fig. 1, the method for protecting audio data includes:
s102, when it is detected that the target recording device has accessed the reading device and the reading device initiates a reading instruction, initiating an authentication instruction to authenticate the reading device, wherein the reading instruction is used for reading first audio data in the target recording device;
s104, displaying a first file for the reading device to read the first audio data under the condition that the authentication information fed back by the reading device indicates that the authentication is passed;
and S106, under the condition that the authentication information fed back by the reading equipment indicates that the authentication is not passed, displaying a second file for the reading equipment to read second audio data, wherein the file name of the second file is the same as that of the first file, and the second audio data is different from the first audio data.
Optionally, the protection method for audio data may be applied, but not limited, in a scenario of protecting audio data in a recording device. Optionally, the target sound recording device may be but not limited to a sound recording device that can be carried around, and the target sound recording device may also be but not limited to a sound recording device that has a small memory and needs to upload data to other devices at regular or irregular time. The reading device may be, but is not limited to, other devices having a reading function, such as a personal computer and the like. The second file may be, but is not limited to, an empty folder without audio data to save storage space of the target sound recording device.
It should be noted that, when it is detected that the target recording device has accessed the reading device and the reading device initiates a reading instruction, an authentication instruction is initiated to authenticate the reading device, where the reading instruction is used to read first audio data in the target recording device; displaying a first file for the reading device to read the first audio data under the condition that the authentication information fed back by the reading device indicates that the authentication is passed; and under the condition that the authentication information fed back by the reading equipment indicates that the authentication is not passed, displaying a second file for the reading equipment to read second audio data, wherein the file name of the second file is the same as that of the first file, and the second audio data is different from the first audio data. Optionally, the disk in the target sound recording device executes the initiation of the authentication instruction through a special interface, for example, a USB composite device serial port of a custom protocol.
For further example, as shown in fig. 2, the optional recording device 202 and the reading device 204 may be included, and the specific steps are as follows:
step S202, the reading device 204 applies for reading the audio data in the target recording device 202;
step S204, the target sound recording device 202 initiates reading authentication to verify whether the reading application of the reading device 204 is legal;
step S206, the reading device 204 feeds back the authentication information to the target sound recording device 202;
in step S208, the target sound recording device 202 provides different audio data according to the authentication feedback, for example, false audio data (or blank file) is provided if the authentication fails, and true audio data is provided if the authentication succeeds.
According to the embodiment provided by the application, an authentication instruction is initiated to authenticate the reading device under the condition that the target recording device is detected to be accessed to the reading device and the reading device initiates a reading instruction, wherein the reading instruction is used for reading first audio data in the target recording device; displaying a first file for the reading device to read the first audio data under the condition that the authentication information fed back by the reading device indicates that the authentication is passed; under the condition that the authentication information fed back by the reading equipment indicates that the authentication is not passed, displaying a second file for the reading equipment to read second audio data, wherein the file name of the second file is the same as that of the first file, and the second audio data is different from that of the first audio data.
As an optional scheme, after initiating the authentication instruction, the method includes:
and acquiring a key sent by the reading device, wherein the key is used for legally reading the first audio data from the target sound recording device, and the key is input through a key input area displayed in a display area of the reading device.
Optionally, the key may be, but not limited to, used to verify whether the current reading application of the reading device is legal, and may be, but not limited to, in the form of a fixed or unfixed password, such as a randomly generated data and/or a password of a combination of letters and/or symbols, and the like, and the key input by the key input area displayed in the display area by the reading device may be, but is not limited to, a random key received by a terminal pre-bound to the target recording device, and may also be, but is not limited to, a fixed password.
It should be noted that, a key sent by the reading device is obtained, where the key is used for legally reading the first audio data from the target audio recording device, and the key is a key input through a key input area displayed in a display area of the reading device.
Further by way of example, an alternative example is shown in fig. 3, which includes a reading device 302, and a key input area 304 displayed on the reading device 302, where the key input area 304 is used to obtain an authentication password input by a user currently using the reading device 302 to authenticate whether a current reading application is legal.
According to the embodiment provided by the application, the key sent by the reading device is obtained, wherein the key is used for legally reading the first audio data from the target recording device, and the key is input through the key input area displayed in the display area of the reading device, so that the purpose of flexibly verifying whether reading is legal is achieved, and the effect of improving the flexibility of reading legal verification is achieved.
As an optional scheme, after acquiring the key sent by the reading device, the method further includes:
s1, under the condition that the key is detected to be different from the target key, the authentication information is determined not to pass the authentication, and the target key is a verification key used for legally reading the first audio data in the target sound recording device;
s2, displaying the first target information, wherein the first target information is used for indicating that the authentication information passes the authentication.
It should be noted that, in the case that the key is detected to be different from the target key, it is determined that the authentication information does not pass the authentication, and the target key is a verification key used for legally reading the first audio data in the target audio recording device; and displaying first target information, wherein the first target information is used for indicating that the authentication information passes the authentication.
Further exemplifying, it is optional to determine that the authentication information is not authenticated, for example, in a case where a key different from the target key is detected, and provide confusingly high information indicating that "the authentication information is authenticated", and provide it with false audio data.
According to the embodiment provided by the application, under the condition that the key is detected to be different from the target key, the authentication information is determined not to pass the authentication, and the target key is a verification key used for legally reading the first audio data in the target sound recording equipment; and displaying the first target information, wherein the first target information is used for indicating that the authentication information passes the authentication, so that the purpose of improving the confusion of the authentication information is achieved, and the effect of improving the authentication strength is realized.
As an alternative, displaying a first file for a reading device to read first audio data includes:
s1, determining that the authentication information passes the authentication under the condition that the key is detected to be the same as the target key;
and S2, displaying second target information, wherein the second target information is used for indicating that the authentication information passes the authentication, and the display form of the first target information is different from that of the second target information.
It should be noted that, in the case that the key is detected to be the same as the target key, it is determined that the authentication information passes the authentication; and displaying second target information, wherein the second target information is used for indicating that the authentication information passes the authentication, and the display form of the first target information is different from that of the second target information.
Further, for example, optionally, in a case that it is detected that the key is the same as the target key, determining that the authentication information is authenticated, providing correct audio data for the reading device that currently reads the audio data, and simultaneously displaying the authenticated information for the reading device, where, because the true authentication passing information and the false authentication passing information are different in form, the user can know whether the authentication passes according to the difference in form, so as to prevent confusion of a legal reading operation of a legal user.
Through the embodiment provided by the application, the authentication information is determined to pass the authentication under the condition that the key is detected to be the same as the target key; and displaying second target information, wherein the second target information is used for indicating that the authentication information passes the authentication, the display forms of the first target information and the second target information are different, the condition that a legal user has misoperation is considered, and different forms of authentication passing information are set, so that the aim of improving the flexibility of information display is fulfilled, and the effect of reducing the probability of misoperation is realized.
As an optional scheme, before initiating the authentication instruction, the method includes:
and displaying a third file, wherein the file name of the third file is the same as that of the first file, and the third file is used for triggering an authentication instruction.
It should be noted that a third file is displayed, where a file name of the third file is the same as a file name of the first file, and the third file is used for triggering the authentication instruction.
Further by way of example, as shown in fig. 4, optionally, the audio playback device includes a target recording device 402 and a reading device 404, where when the target recording device 402 is connected to the reading device 404, a folder preset by the target recording device 402 is displayed on a reading interface of the reading device 404, where audio data is not stored in the folder, but when the folder is triggered to read an instruction, a reading instruction for the target recording device 402 is triggered at the same time, and then an illegal reader is mistakenly considered to have broken through a protection means of the target recording device 402 by setting a folder for triggering, so as to improve confusion of protection, and the specific steps are as follows:
step S402, when the target sound recording device 402 is connected to the reading device 404, displaying a folder preset by the target sound recording device 402 on a reading interface of the reading device 404;
in step S404, when it is detected that a folder preset by the target sound recording device 402 has a reading instruction, a reading instruction for an audio device in the target sound recording device 402 is triggered.
Through the embodiment provided by the application, the third file is displayed, wherein the file name of the third file is the same as that of the first file, and the third file is used for triggering the authentication instruction, so that the purpose of improving the confusion of audio protection is achieved, and the effect of improving the protection strength of audio data is realized.
As an alternative, the method comprises the following steps:
and generating a target log, wherein the target log is used for recording that the reading device reads the target sound recording device under the condition that the reading device is not authorized.
Optionally, the target log may be, but is not limited to, used to record all operation records in the process of reading the target sound recording device, and may also be, but is not limited to, based on the consideration of reducing the storage space, only record operation records read from the target sound recording device without authorization, where the operation records may include, but are not limited to, a device number, a device address, an operation mode, and the like of a reading device currently reading the target sound recording device.
It should be noted that a target log is generated, where the target log is used for recording that the reading device reads the target sound recording device without obtaining authorization.
For further illustration, it is optional to provide valid evidence for legal disputes that may occur later, for example, by logging the operation into a hidden log after an illegal user copies the file.
According to the embodiment provided by the application, the target log is generated, wherein the target log is used for recording that the reading equipment reads the target recording equipment under the condition that the reading equipment is not authorized, the aim of recording illegal reading audio data in time is achieved, and the comprehensive protection effect of illegal reading audio data is achieved.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required by the invention.
According to another aspect of the embodiment of the present invention, there is also provided an audio data protection apparatus for implementing the above audio data protection method. As shown in fig. 5, the apparatus includes:
the authentication unit 502 is configured to initiate an authentication instruction to authenticate the reading device when it is detected that the target audio recording device has accessed the reading device and the reading device initiates a reading instruction, where the reading instruction is used to read first audio data in the target audio recording device;
a first display unit 504, configured to display a first file for the reading device to read the first audio data if the authentication information fed back by the reading device indicates that the authentication is passed;
and a second display unit 506, configured to display a second file for the reading device to read second audio data when the authentication information fed back by the reading device indicates that the authentication is not passed, where a file name of the second file is the same as a file name of the first file, and the second audio data is different from the first audio data.
Optionally, the protection device for audio data may be, but is not limited to, applied in a scenario of protecting audio data in a recording device. Optionally, the target sound recording device may be but not limited to a sound recording device that can be carried around, and the target sound recording device may also be but not limited to a sound recording device that has a small memory and needs to upload data to other devices at regular or irregular time. The reading device may be, but is not limited to, other devices having a reading function, such as a personal computer and the like. The second file may be, but is not limited to, an empty folder without audio data to save storage space of the target sound recording device.
It should be noted that, when it is detected that the target recording device has accessed the reading device and the reading device initiates a reading instruction, an authentication instruction is initiated to authenticate the reading device, where the reading instruction is used to read first audio data in the target recording device; displaying a first file for the reading device to read the first audio data under the condition that the authentication information fed back by the reading device indicates that the authentication is passed; and under the condition that the authentication information fed back by the reading equipment indicates that the authentication is not passed, displaying a second file for the reading equipment to read second audio data, wherein the file name of the second file is the same as that of the first file, and the second audio data is different from the first audio data. Optionally, the disk in the target sound recording device executes the initiation of the authentication instruction through a special interface, for example, a USB composite device serial port of a custom protocol.
For further example, as shown in fig. 2, the optional recording device 202 and the reading device 204 may be included, and the specific steps are as follows:
step S202, the reading device 204 applies for reading the audio data in the target recording device 202;
step S204, the target sound recording device 202 initiates reading authentication to verify whether the reading application of the reading device 204 is legal;
step S206, the reading device 204 feeds back the authentication information to the target sound recording device 202;
in step S208, the target sound recording device 202 provides different audio data according to the authentication feedback, for example, false audio data (or blank file) is provided if the authentication fails, and true audio data is provided if the authentication succeeds.
According to the embodiment provided by the application, an authentication instruction is initiated to authenticate the reading device under the condition that the target recording device is detected to be accessed to the reading device and the reading device initiates a reading instruction, wherein the reading instruction is used for reading first audio data in the target recording device; displaying a first file for the reading device to read the first audio data under the condition that the authentication information fed back by the reading device indicates that the authentication is passed; under the condition that the authentication information fed back by the reading equipment indicates that the authentication is not passed, displaying a second file for the reading equipment to read second audio data, wherein the file name of the second file is the same as that of the first file, and the second audio data is different from that of the first audio data.
As an alternative, as shown in fig. 6, the method includes:
an obtaining unit 602, configured to obtain, after initiating the authentication instruction, a key sent by the reading device, where the key is used for legitimately reading the first audio data from the target audio recording device, and the key is a key input through a key input area displayed in a display area of the reading device.
Optionally, the key may be, but not limited to, used to verify whether the current reading application of the reading device is legal, and may be, but not limited to, in the form of a fixed or unfixed password, such as a randomly generated data and/or a password of a combination of letters and/or symbols, and the like, and the key input by the key input area displayed in the display area by the reading device may be, but is not limited to, a random key received by a terminal pre-bound to the target recording device, and may also be, but is not limited to, a fixed password.
It should be noted that, a key sent by the reading device is obtained, where the key is used for legally reading the first audio data from the target audio recording device, and the key is a key input through a key input area displayed in a display area of the reading device.
Further by way of example, an alternative example is shown in fig. 3, which includes a reading device 302, and a key input area 304 displayed on the reading device 302, where the key input area 304 is used to obtain an authentication password input by a user currently using the reading device 302 to authenticate whether a current reading application is legal.
According to the embodiment provided by the application, the key sent by the reading device is obtained, wherein the key is used for legally reading the first audio data from the target recording device, and the key is input through the key input area displayed in the display area of the reading device, so that the purpose of flexibly verifying whether reading is legal is achieved, and the effect of improving the flexibility of reading legal verification is achieved.
As an alternative, as shown in fig. 7, the first display unit 504 further includes:
a first determining module 702, configured to determine that the authentication information is not authenticated under the condition that the key is detected to be different from a target key, where the target key is a verification key used for legally reading the first audio data in the target audio recording device;
a first display module 704, configured to display first target information, where the first target information is used to indicate that the authentication information passes the authentication.
It should be noted that, in the case that the key is detected to be different from the target key, it is determined that the authentication information does not pass the authentication, and the target key is a verification key used for legally reading the first audio data in the target audio recording device; and displaying first target information, wherein the first target information is used for indicating that the authentication information passes the authentication.
Further exemplifying, it is optional to determine that the authentication information is not authenticated, for example, in a case where a key different from the target key is detected, and provide confusingly high information indicating that "the authentication information is authenticated", and provide it with false audio data.
According to the embodiment provided by the application, under the condition that the key is detected to be different from the target key, the authentication information is determined not to pass the authentication, and the target key is a verification key used for legally reading the first audio data in the target sound recording equipment; and displaying the first target information, wherein the first target information is used for indicating that the authentication information passes the authentication, so that the purpose of improving the confusion of the authentication information is achieved, and the effect of improving the authentication strength is realized.
As an alternative, as shown in fig. 8, the first display unit 504 includes:
a second determining module 802, configured to determine that the authentication information passes the authentication when it is detected that the key is the same as the target key;
a second display module 804, configured to display second target information, where the second target information is used to indicate that the authentication information passes the authentication, and a display form of the first target information is different from a display form of the second target information.
It should be noted that, in the case that the key is detected to be the same as the target key, it is determined that the authentication information passes the authentication; and displaying second target information, wherein the second target information is used for indicating that the authentication information passes the authentication, and the display form of the first target information is different from that of the second target information.
Further, for example, optionally, in a case that it is detected that the key is the same as the target key, determining that the authentication information is authenticated, providing correct audio data for the reading device that currently reads the audio data, and simultaneously displaying the authenticated information for the reading device, where, because the true authentication passing information and the false authentication passing information are different in form, the user can know whether the authentication passes according to the difference in form, so as to prevent confusion of a legal reading operation of a legal user.
Through the embodiment provided by the application, the authentication information is determined to pass the authentication under the condition that the key is detected to be the same as the target key; and displaying second target information, wherein the second target information is used for indicating that the authentication information passes the authentication, the display forms of the first target information and the second target information are different, the condition that a legal user has misoperation is considered, and different forms of authentication passing information are set, so that the aim of improving the flexibility of information display is fulfilled, and the effect of reducing the probability of misoperation is realized.
As an alternative, as shown in fig. 9, the method includes:
a third display unit 902, configured to display a third file before initiating the authentication instruction, where a file name of the third file is the same as a file name of the first file, and the third file is used to trigger the authentication instruction.
It should be noted that a third file is displayed, where a file name of the third file is the same as a file name of the first file, and the third file is used for triggering the authentication instruction.
Further by way of example, as shown in fig. 4, optionally, the audio playback device includes a target recording device 402 and a reading device 404, where when the target recording device 402 is connected to the reading device 404, a folder preset by the target recording device 402 is displayed on a reading interface of the reading device 404, where audio data is not stored in the folder, but when the folder is triggered to read an instruction, a reading instruction for the target recording device 402 is triggered at the same time, and then an illegal reader is mistakenly considered to have broken through a protection means of the target recording device 402 by setting a folder for triggering, so as to improve confusion of protection, and the specific steps are as follows:
step S402, when the target sound recording device 402 is connected to the reading device 404, displaying a folder preset by the target sound recording device 402 on a reading interface of the reading device 404;
in step S404, when it is detected that a folder preset by the target sound recording device 402 has a reading instruction, a reading instruction for an audio device in the target sound recording device 402 is triggered.
Through the embodiment provided by the application, the third file is displayed, wherein the file name of the third file is the same as that of the first file, and the third file is used for triggering the authentication instruction, so that the purpose of improving the confusion of audio protection is achieved, and the effect of improving the protection strength of audio data is realized.
As an alternative, the method comprises the following steps:
the generating module is used for generating a target log, wherein the target log is used for recording that the reading device reads the target sound recording device under the condition that the reading device is not authorized.
Optionally, the target log may be, but is not limited to, used to record all operation records in the process of reading the target sound recording device, and may also be, but is not limited to, based on the consideration of reducing the storage space, only record operation records read from the target sound recording device without authorization, where the operation records may include, but are not limited to, a device number, a device address, an operation mode, and the like of a reading device currently reading the target sound recording device.
It should be noted that a target log is generated, where the target log is used for recording that the reading device reads the target sound recording device without obtaining authorization.
For further illustration, it is optional to provide valid evidence for legal disputes that may occur later, for example, by logging the operation into a hidden log after an illegal user copies the file.
According to the embodiment provided by the application, the target log is generated, wherein the target log is used for recording that the reading equipment reads the target recording equipment under the condition that the reading equipment is not authorized, the aim of recording illegal reading audio data in time is achieved, and the comprehensive protection effect of illegal reading audio data is achieved.
According to another aspect of the embodiment of the present invention, there is also provided an electronic device for implementing the method for protecting audio data, as shown in fig. 10, the electronic device includes a memory 1002 and a processor 1004, the memory 1002 stores a computer program, and the processor 1004 is configured to execute the steps in any one of the method embodiments through the computer program.
Optionally, in this embodiment, the electronic apparatus may be located in at least one network device of a plurality of network devices of a computer network.
Optionally, in this embodiment, the processor may be configured to execute the following steps by a computer program:
s1, when it is detected that the target recording device has accessed the reading device and the reading device initiates a reading instruction, initiating an authentication instruction to authenticate the reading device, wherein the reading instruction is used for reading first audio data in the target recording device;
s2, displaying a first file for the reading device to read the first audio data under the condition that the authentication information fed back by the reading device indicates that the authentication is passed;
and S3, in the case that the authentication information fed back by the reading device indicates that the authentication is not passed, displaying a second file for the reading device to read second audio data, wherein the file name of the second file is the same as that of the first file, and the second audio data is different from the first audio data.
Alternatively, it can be understood by those skilled in the art that the structure shown in fig. 10 is only an illustration, and the electronic device may also be a terminal device such as a smart phone (e.g., an Android phone, an iOS phone, etc.), a tablet computer, a palm computer, a Mobile Internet Device (MID), a PAD, and the like. Fig. 10 is a diagram illustrating a structure of the electronic device. For example, the electronic device may also include more or fewer components (e.g., network interfaces, etc.) than shown in FIG. 10, or have a different configuration than shown in FIG. 10.
The memory 1002 may be used to store software programs and modules, such as program instructions/modules corresponding to the method and apparatus for protecting audio data in the embodiment of the present invention, and the processor 1004 executes various functional applications and data processing by running the software programs and modules stored in the memory 1002, that is, implementing the method for protecting audio data. The memory 1002 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 1002 may further include memory located remotely from the processor 1004, which may be connected to the terminal over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof. The memory 1002 may be specifically, but not limited to, used for storing information such as first audio data, second audio data, a first file, and a second file. As an example, as shown in fig. 10, the memory 1002 may include, but is not limited to, the authentication unit 502, the first display unit 504, and the second display unit 506 in the protection device including the audio data. In addition, the protection device may further include, but is not limited to, other module units in the protection device for audio data, which is not described in detail in this example.
Optionally, the above-mentioned transmission device 1006 is used for receiving or sending data via a network. Examples of the network may include a wired network and a wireless network. In one example, the transmission device 1006 includes a Network adapter (NIC) that can be connected to a router via a Network cable and other Network devices so as to communicate with the internet or a local area Network. In one example, the transmission device 1006 is a Radio Frequency (RF) module, which is used for communicating with the internet in a wireless manner.
In addition, the electronic device further includes: a display 1008 for displaying information such as the first audio data, the second audio data, the first file, and the second file; and a connection bus 1010 for connecting the respective module parts in the above-described electronic apparatus.
According to a further aspect of an embodiment of the present invention, there is also provided a computer-readable storage medium having a computer program stored thereon, wherein the computer program is arranged to perform the steps of any of the above method embodiments when executed.
Alternatively, in the present embodiment, the above-mentioned computer-readable storage medium may be configured to store a computer program for executing the steps of:
s1, when it is detected that the target recording device has accessed the reading device and the reading device initiates a reading instruction, initiating an authentication instruction to authenticate the reading device, wherein the reading instruction is used for reading first audio data in the target recording device;
s2, displaying a first file for the reading device to read the first audio data under the condition that the authentication information fed back by the reading device indicates that the authentication is passed;
and S3, in the case that the authentication information fed back by the reading device indicates that the authentication is not passed, displaying a second file for the reading device to read second audio data, wherein the file name of the second file is the same as that of the first file, and the second audio data is different from the first audio data.
Alternatively, in this embodiment, a person skilled in the art may understand that all or part of the steps in the methods of the foregoing embodiments may be implemented by a program instructing hardware associated with the terminal device, where the program may be stored in a computer-readable storage medium, and the storage medium may include: flash disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
The integrated unit in the above embodiments, if implemented in the form of a software functional unit and sold or used as a separate product, may be stored in the above computer-readable storage medium. Based on such understanding, the technical solution of the present invention may be substantially or partially implemented in the prior art, or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium, and including instructions for causing one or more computer devices (which may be personal computers, servers, or network devices) to execute all or part of the steps of the method according to the embodiments of the present invention.
In the above embodiments of the present invention, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed client may be implemented in other manners. The above-described embodiments of the apparatus are merely illustrative, and for example, a division of a unit is merely a division of a logic function, and an actual implementation may have another division, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
Units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The foregoing is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present invention, and these modifications and decorations should also be regarded as the protection scope of the present invention.

Claims (10)

1. A method for protecting audio data, comprising:
the method comprises the steps that when it is detected that a target sound recording device is connected to a reading device and the reading device initiates a reading instruction, an authentication instruction is initiated to authenticate the reading device, wherein the reading instruction is used for reading first audio data in the target sound recording device;
displaying a first file for the reading device to read the first audio data under the condition that the authentication information fed back by the reading device indicates that the authentication is passed;
and displaying a second file for the reading device to read second audio data under the condition that the authentication information fed back by the reading device indicates that the authentication is not passed, wherein the file name of the second file is the same as that of the first file, and the second audio data is different from the first audio data.
2. The method of claim 1, after the initiating authentication instruction, comprising:
and acquiring a key sent by the reading device, wherein the key is used for legally reading the first audio data from the target sound recording device, and the key is input through a key input area displayed in a display area of the reading device.
3. The method of claim 2, wherein displaying a first file for the reading device to read the first audio data further comprises:
determining that the authentication information is not authenticated under the condition that the key is detected to be different from a target key, wherein the target key is a verification key used for legally reading the first audio data in the target sound recording device;
displaying first target information, wherein the first target information is used for indicating that the authentication information passes the authentication.
4. The method of claim 3, wherein displaying the first file for the reading device to read the first audio data comprises:
determining that the authentication information passes authentication under the condition that the key is detected to be the same as the target key;
and displaying second target information, wherein the second target information is used for indicating that the authentication information passes the authentication, and the display form of the first target information is different from that of the second target information.
5. The method of claim 1, prior to the initiating authentication instruction, comprising:
and displaying a third file, wherein the file name of the third file is the same as that of the first file, and the third file is used for triggering the authentication instruction.
6. The method according to any one of claims 1 to 5, comprising:
and generating a target log, wherein the target log is used for recording that the reading device reads the target sound recording device under the condition that the reading device is not authorized.
7. An apparatus for protecting audio data, comprising:
the device comprises an authentication unit and a processing unit, wherein the authentication unit is used for initiating an authentication instruction to authenticate a reading device under the condition that a target sound recording device is detected to be accessed to the reading device and the reading device initiates a reading instruction, and the reading instruction is used for reading first audio data in the target sound recording device;
the first display unit is used for displaying a first file for the reading device to read the first audio data under the condition that the authentication information fed back by the reading device indicates that the authentication is passed;
and the second display unit is used for displaying a second file for the reading device to read second audio data under the condition that the authentication information fed back by the reading device indicates that the authentication is not passed, wherein the file name of the second file is the same as that of the first file, and the second audio data is different from the first audio data.
8. The apparatus of claim 7, comprising:
an obtaining unit, configured to obtain, after the authentication instruction is initiated, a key sent by the reading device, where the key is used to legally read the first audio data from the target audio recording device, and the key is input through a key input area displayed in a display area of the reading device.
9. A computer-readable storage medium comprising a stored program, wherein the program when executed performs the method of any of claims 1 to 6.
10. An electronic device comprising a memory and a processor, characterized in that the memory has stored therein a computer program, the processor being arranged to execute the method of any of claims 1 to 6 by means of the computer program.
CN202010931473.9A 2020-09-07 2020-09-07 Method and device for protecting audio data and storage medium Pending CN112035862A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010931473.9A CN112035862A (en) 2020-09-07 2020-09-07 Method and device for protecting audio data and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010931473.9A CN112035862A (en) 2020-09-07 2020-09-07 Method and device for protecting audio data and storage medium

Publications (1)

Publication Number Publication Date
CN112035862A true CN112035862A (en) 2020-12-04

Family

ID=73585355

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010931473.9A Pending CN112035862A (en) 2020-09-07 2020-09-07 Method and device for protecting audio data and storage medium

Country Status (1)

Country Link
CN (1) CN112035862A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114442951A (en) * 2022-01-24 2022-05-06 珠海泰芯半导体有限公司 Method, device, storage medium and electronic equipment for transmitting multi-channel data

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103839018A (en) * 2014-01-17 2014-06-04 青岛丽雯互联信息有限公司 Data transmission method and device based on audio input and output interface
US20150186823A1 (en) * 2013-12-26 2015-07-02 Infosys Limited Methods, systems and computer-readable media for componentizing a business requirement
CN111209576A (en) * 2019-12-30 2020-05-29 秒针信息技术有限公司 Voice data protection method, device and system
CN111586050A (en) * 2020-05-08 2020-08-25 上海明略人工智能(集团)有限公司 Audio file transmission method and device, storage medium and electronic equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150186823A1 (en) * 2013-12-26 2015-07-02 Infosys Limited Methods, systems and computer-readable media for componentizing a business requirement
CN103839018A (en) * 2014-01-17 2014-06-04 青岛丽雯互联信息有限公司 Data transmission method and device based on audio input and output interface
CN111209576A (en) * 2019-12-30 2020-05-29 秒针信息技术有限公司 Voice data protection method, device and system
CN111586050A (en) * 2020-05-08 2020-08-25 上海明略人工智能(集团)有限公司 Audio file transmission method and device, storage medium and electronic equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114442951A (en) * 2022-01-24 2022-05-06 珠海泰芯半导体有限公司 Method, device, storage medium and electronic equipment for transmitting multi-channel data

Similar Documents

Publication Publication Date Title
KR102307665B1 (en) identity authentication
JP5613855B1 (en) User authentication system
CN104601324B (en) A kind of verification method, terminal and system for application
KR102258430B1 (en) Method and apparatus for identity authentication
CN105530356B (en) Communication terminal and its data guard method and device
US10231124B2 (en) Anti-theft method and client for a mobile terminal
CN109286638B (en) Automobile diagnosis equipment authentication method and related device
KR101070978B1 (en) Secure electric anti-theft device anti-theft system comprising one such device and method of matching electric devices
CN108256302B (en) Data security access method and device
CN109977039B (en) Hard disk encryption key storage method, device, equipment and readable storage medium
CN103312519A (en) Dynamic password device and working method thereof
CN108259163B (en) Authorization method of terminal equipment
CN112035862A (en) Method and device for protecting audio data and storage medium
CN110633172A (en) USB flash disk and data synchronization method thereof
CN107862192B (en) Login interface unlocking method and device, computer equipment and storage medium
CN110807186B (en) Method, device, equipment and storage medium for safe storage of storage equipment
US7724923B2 (en) Removable swipe-imaging device and method for identifying same
CN108985075A (en) A kind of image file disk encryption system and method for lightweight
WO2017197689A1 (en) Sim card processing method and apparatus, terminal, and esam chip
CN108259424B (en) Authorization verification method of terminal equipment
CN109086624A (en) login method and device
CN114357398A (en) Terminal access right processing method and device and electronic equipment
CN110110533B (en) Method, system and medium for batch encryption and unloading of electronic files with automatic identity identification
CN114254342A (en) Communication connection method, system, device, storage medium and processor
CN110740043B (en) Intelligent key device and verification method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination