CN102811439A - Method and system for voice processing - Google Patents
Method and system for voice processing Download PDFInfo
- Publication number
- CN102811439A CN102811439A CN2011101472364A CN201110147236A CN102811439A CN 102811439 A CN102811439 A CN 102811439A CN 2011101472364 A CN2011101472364 A CN 2011101472364A CN 201110147236 A CN201110147236 A CN 201110147236A CN 102811439 A CN102811439 A CN 102811439A
- Authority
- CN
- China
- Prior art keywords
- text
- voice
- encryption
- information
- carried out
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
Abstract
The invention provides a method and a system for voice processing. The method includes receiving inputted voice; encrypting the voice if the volume of the voice is lower than a preset threshold value; and sending the encrypted information. With the above method and system for voice processing, personal information can be effectively prevented from revealing, and accordingly the purpose of protecting the information is achieved.
Description
Technical field
The present invention relates to the voice communication secrecy technology, relate in particular to a kind of method of speech processing and system.
Background technology
Along with the fast development of the communication technology, the voice communication technology also from strength to strength, voice communication safety thereupon also more and more comes into one's own.
The user comprises individual privacy, bank account, ID card No. etc. carry out often relating to some personal information in the process of voice communication through the terminal.These information are easy to reveal in the following manner in communication process: the one, and the voice call volume is bigger, is obtained by the people of close together; The 2nd, in the process of voice messaging transmission, monitored or intercepting and capturing.And the leakage of these information all can produce unsafe problems.
In communication process, utilize secrecy technology to solve information leakage at present and have some technical schemes, the realization thinking of these schemes all is manually to trigger function of keeping secret by the user basically, and the input information of user on the terminal is hiding or alternative with specific character.
Technique scheme needs the user manually to trigger, and degree of intelligence is not high, and the such scheme fail safe is not high.
Summary of the invention
The invention provides a kind of method of speech processing and system, the existing degree of intelligence that prevents information leakage technology is low to overcome, the problem of poor stability.
The invention provides a kind of method of speech processing, this method comprises:
Receive the voice of input;
When the volume of said voice during, said voice are carried out encryption less than predetermined threshold value; And
Information after the transmission encryption.
Preferably, saidly said voice carried out encryption comprise:
With said speech conversion is text, and said text is carried out encryption.
Preferably, saidly said text carried out encryption comprise:
Save as text at every text after will changing when reaching preset duration, said text is carried out encryption.
Preferably, the information after the said transmission encryption comprises:
With the information after the one or more way of short messages transmission encryption.
Preferably, said method also comprises: the text to receiving is deciphered.
The present invention also provides a kind of speech processing system, and this system comprises:
Receiving system is used to receive the voice of input;
Processing unit when being used for volume when said voice less than predetermined threshold value, carries out encryption to said voice; And
Dispensing device is used to send the information after the encryption.
Preferably, said processing unit is to be used for said speech conversion to be text, said text is carried out encryption.
Preferably, said processing unit is that being used for said speech conversion is text, and saves as text at every text after will changing when reaching preset duration, and said text is carried out encryption.
Preferably, said dispensing device is the information that is used for after the one or more way of short messages transmission encryption.
Preferably, said system also comprises: decryption device is used for the text that receives is deciphered.
Above-mentioned method of speech processing and system can prevent leakage of personal information effectively, reach the purpose of protection information.
Description of drawings
Fig. 1 is the flow chart of secret telephony embodiment of the present invention;
Fig. 2 is the flow chart of voice encryption process of transmitting embodiment of the present invention.
Embodiment
For making the object of the invention, technical scheme and advantage clearer, hereinafter will combine accompanying drawing that embodiments of the invention are elaborated.Need to prove that under the situation of not conflicting, embodiment among the application and the characteristic among the embodiment be combination in any each other.
The present invention has adopted technological means such as speech detection, speech conversion, text encryption in carrying out the voice call process, user's voice information was encrypted in the specific time.In whole communication process; The user does not need handoff calls pattern (being common call mode and speech scrambling pattern) on one's own initiative; The terminal just can be discerned and security information transmitted automatically, and receiving terminal only need use the decryption method of appointing in advance just can get access to the security information that transmit leg sends.
The invention provides a kind of method of speech processing, this method is described from the transmitting terminal angle, and this method comprises:
The voice of step 1, reception input;
Transmitting terminal receives the voice of user's input;
Step 2, when the volume of said voice during less than predetermined threshold value, said voice are carried out encryption;
Above-mentioned predetermined threshold value can dynamically arrange as required;
Language is carried out encryption to be comprised: after directly language being carried out encryption and language conversion being text, text is carried out encryption; Saidly said text is carried out encryption comprise: save as text at every text after will changing when reaching preset duration, said text is carried out encryption.
This method can also comprise: when the volume of said voice greater than predetermined threshold value, said voice are directly sent to receiving terminal.
Information after step 3, the transmission encryption.
With the information after the one or more way of short messages transmission encryption.
In addition, said method can also comprise: the text to receiving is deciphered.
The present invention also provides a kind of speech processing system, and this system comprises receiving system, processing unit and dispensing device, wherein:
Receiving system is used to receive the voice of input;
Processing unit when being used for volume when said voice less than predetermined threshold value, carries out encryption to said voice;
Dispensing device is used to send the information after the encryption.
This system can also comprise checkout gear, and the speech detection module in this checkout gear can detect the volume of voice.
Particularly, said processing unit is to be used for said speech conversion to be text, said text is carried out encryption.
Preferably, said processing unit is that being used for said speech conversion is text, and saves as text at every text after will changing when reaching preset duration, and said text is carried out encryption.Send the information after the encryption through dispensing device with one or more way of short messages then.
Further, the above-mentioned functions of this processing unit can be accomplished by voice conversion module, text encryption module and text sending module; Wherein, voice conversion module is a text with said speech conversion; The text encryption module is encrypted said text; Text after the text sending module will be encrypted sends to receiving terminal, and is to send to receiving terminal with way of short messages.
In addition, said system also comprises decryption device, and this decryption device is used for the text that receives is deciphered.Particularly, be to decipher through the text deciphering module in the decryption device.
Further, when said processing unit can also be used for volume when said voice greater than predetermined threshold value, send said voice.
Said system can effectively prevent the leakage of information in the voice call process, and its implementation procedure can repeat no more referring to Fig. 1 and Fig. 2 here.
With the mode of embodiment secret telephony process of the present invention is described below, said system can be arranged in the terminal, and this terminal has following function:
1, voice call function: can carry out voice call through network, this is the prerequisite of log-on message function of keeping secret;
2, voice detection function: can detect the volume of phonetic entry, and start or close the speech security function according to volume;
3, speech conversion function: can convert the voice messaging of user's input into text message;
4, text encryption function: can use the encryption method of appointment that text message is encrypted;
5, text sending function: can the text after encrypting be sent with way of short messages;
6, text decipher function: can decipher the text message of encrypting according to the decryption method of prior agreement.
As shown in Figure 1, be the flow chart of secret telephony embodiment of the present invention, this process comprises:
After step 102, voice call were set up, the speech detection module started;
This threshold value is on the terminal, to set in advance;
These voice are being carried out encryption, and after sending to the opposite end with way of short messages, decryption processing is carried out to the information that receives in the opposite end, short message content can be checked according to the needs of oneself in the opposite end while conversing, also can behind end of conversation, check short message content.
In the process of whole voice call, according to the size of speech volume, open or close security module, the user does not need manually to be provided with, and avoids information leakage to give the people of close together simultaneously yet.
As shown in Figure 2, be the flow chart of voice encryption process of transmitting embodiment of the present invention, this process comprises:
This moment the voice call module input information (be user's voice input) of voice conversion module after opening of not redispatching;
The Preset Time threshold value is to set at the terminal in advance, and certainly, this Preset Time threshold value can be adjusted as required;
If information is bigger, then can be divided into many notes and sends.
Carry out said process, up to the text encryption module with the text sending module is closed and the encrypt file transmission finish.
Compare with existing technical scheme, the present invention triggers the method intelligent more (through detecting the size of input volume, switching security schema at any time) of encryption function, has also avoided information leakage to give the people of close together simultaneously; On the object of encrypting, be that the voice in the communication process are encrypted; On the opportunity of security information, just encrypt at information input terminal, can prevent the leakage of information in network transmission process; On cipher mode, the mode of using text to encrypt is compared voice encryption, and selectable encryption technology is more and safer.
One of ordinary skill in the art will appreciate that all or part of step in the said method can instruct related hardware to accomplish through program, said procedure can be stored in the computer-readable recording medium, like read-only memory, disk or CD etc.Alternatively, all or part of step of the foregoing description also can use one or more integrated circuits to realize.Correspondingly, each the module/unit in the foregoing description can adopt the form of hardware to realize, also can adopt the form of software function module to realize.The present invention is not restricted to the combination of the hardware and software of any particular form.
Above embodiment is only unrestricted in order to technical scheme of the present invention to be described, only with reference to preferred embodiment the present invention is specified.Those of ordinary skill in the art should be appreciated that and can make amendment or be equal to replacement technical scheme of the present invention, and do not break away from the spirit and the scope of technical scheme of the present invention, all should be encompassed in the middle of the claim scope of the present invention.
Claims (10)
1. method of speech processing, this method comprises:
Receive the voice of input;
When the volume of said voice during, said voice are carried out encryption less than predetermined threshold value; And
Information after the transmission encryption.
2. method according to claim 1 is characterized in that:
Saidly said voice carried out encryption comprise:
With said speech conversion is text, and said text is carried out encryption.
3. method according to claim 2 is characterized in that:
Saidly said text carried out encryption comprise:
Save as text at every text after will changing when reaching preset duration, said text is carried out encryption.
4. according to claim 2 or 3 described methods, it is characterized in that:
Information after the said transmission encryption comprises:
With the information after the one or more way of short messages transmission encryption.
5. method according to claim 4 is characterized in that, said method also comprises:
Text to receiving is deciphered.
6. speech processing system, this system comprises:
Receiving system is used to receive the voice of input;
Processing unit when being used for volume when said voice less than predetermined threshold value, carries out encryption to said voice; And
Dispensing device is used to send the information after the encryption.
7. system according to claim 6 is characterized in that:
Said processing unit is to be used for said speech conversion to be text, said text is carried out encryption.
8. system according to claim 7 is characterized in that:
Said processing unit is that being used for said speech conversion is text, and saves as text at every text after will changing when reaching preset duration, and said text is carried out encryption.
9. according to claim 7 or 8 described systems, it is characterized in that:
Said dispensing device is the information that is used for after the one or more way of short messages transmission encryption.
10. system according to claim 9 is characterized in that, said system also comprises:
Decryption device is used for the text that receives is deciphered.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011101472364A CN102811439A (en) | 2011-06-02 | 2011-06-02 | Method and system for voice processing |
PCT/CN2012/072195 WO2012163127A1 (en) | 2011-06-02 | 2012-03-12 | Speech processing method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011101472364A CN102811439A (en) | 2011-06-02 | 2011-06-02 | Method and system for voice processing |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102811439A true CN102811439A (en) | 2012-12-05 |
Family
ID=47234988
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011101472364A Pending CN102811439A (en) | 2011-06-02 | 2011-06-02 | Method and system for voice processing |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN102811439A (en) |
WO (1) | WO2012163127A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105743912A (en) * | 2016-03-31 | 2016-07-06 | 宇龙计算机通信科技(深圳)有限公司 | Voice encryption method and voice sending terminal |
CN105871842A (en) * | 2016-03-31 | 2016-08-17 | 宇龙计算机通信科技(深圳)有限公司 | Voice encryption and decryption methods, voice encryption and decryption devices and terminals |
CN114839891A (en) * | 2022-05-11 | 2022-08-02 | 海南创兴高科技有限公司 | Intelligent bedside table control method based on Internet of things, computer and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1825865A (en) * | 2006-03-10 | 2006-08-30 | 深圳市杰特电信控股有限公司 | Automatic recording method and apparatus for communication terminal |
WO2007135475A1 (en) * | 2006-05-24 | 2007-11-29 | Al Hallami, Omran | Voice transmission application via short message service (sms), multimedia messaging service (mms) and/or general packet radio service (gprs) |
CN101951601A (en) * | 2010-08-25 | 2011-01-19 | 中兴通讯股份有限公司 | Method and system for encrypting voice calls in mobile communication network, terminal and network side |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7236580B1 (en) * | 2002-02-20 | 2007-06-26 | Cisco Technology, Inc. | Method and system for conducting a conference call |
CN102065169A (en) * | 2011-01-10 | 2011-05-18 | 长春卓尔信息安全产业股份有限公司 | Method and device for encrypting telephone |
-
2011
- 2011-06-02 CN CN2011101472364A patent/CN102811439A/en active Pending
-
2012
- 2012-03-12 WO PCT/CN2012/072195 patent/WO2012163127A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1825865A (en) * | 2006-03-10 | 2006-08-30 | 深圳市杰特电信控股有限公司 | Automatic recording method and apparatus for communication terminal |
WO2007135475A1 (en) * | 2006-05-24 | 2007-11-29 | Al Hallami, Omran | Voice transmission application via short message service (sms), multimedia messaging service (mms) and/or general packet radio service (gprs) |
CN101951601A (en) * | 2010-08-25 | 2011-01-19 | 中兴通讯股份有限公司 | Method and system for encrypting voice calls in mobile communication network, terminal and network side |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105743912A (en) * | 2016-03-31 | 2016-07-06 | 宇龙计算机通信科技(深圳)有限公司 | Voice encryption method and voice sending terminal |
CN105871842A (en) * | 2016-03-31 | 2016-08-17 | 宇龙计算机通信科技(深圳)有限公司 | Voice encryption and decryption methods, voice encryption and decryption devices and terminals |
WO2017166420A1 (en) * | 2016-03-31 | 2017-10-05 | 宇龙计算机通信科技(深圳)有限公司 | Voice encryption method and voice transmission terminal |
WO2017166556A1 (en) * | 2016-03-31 | 2017-10-05 | 宇龙计算机通信科技(深圳)有限公司 | Voice encryption and decryption method, encryption and decryption device, and terminal |
CN105743912B (en) * | 2016-03-31 | 2020-04-07 | 宇龙计算机通信科技(深圳)有限公司 | Voice encryption method and voice sending terminal |
CN105871842B (en) * | 2016-03-31 | 2020-04-07 | 宇龙计算机通信科技(深圳)有限公司 | Voice encryption and decryption method, encryption and decryption device and terminal |
CN114839891A (en) * | 2022-05-11 | 2022-08-02 | 海南创兴高科技有限公司 | Intelligent bedside table control method based on Internet of things, computer and storage medium |
Also Published As
Publication number | Publication date |
---|---|
WO2012163127A1 (en) | 2012-12-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8467512B2 (en) | Method and system for authenticating telephone callers and avoiding unwanted calls | |
CN106100980A (en) | Instant messaging communication means end to end and device | |
US5696880A (en) | Communication system user authentication method | |
CN104065648B (en) | A kind of data processing method of voice call | |
CN107276884A (en) | A kind of autonomous encrypting and deciphering system of social software based on intelligent terminal | |
CN105553669A (en) | Identity authentication based information encryption transmission apparatus, method, and control method | |
CN200990610Y (en) | Communication ciphered cell phone | |
CN103973543B (en) | Instant communicating method and device | |
CN104468988B (en) | A kind of mobile terminal and the telephone receiving method and apparatus under non-security mode thereof | |
CN102811439A (en) | Method and system for voice processing | |
CN104284328A (en) | Method and device for encrypting mobile phone communication content | |
CN105049201A (en) | Mobile equipment secret communication system based on quantum cryptography and mobile equipment secret communication method based on quantum cryptography | |
CN105262759B (en) | A kind of method and system of coded communication | |
CN104954951A (en) | Bluetooth headset with voice encryption function and voice encryption method of Bluetooth headset | |
CN106211144B (en) | Communication method of mobile terminal and mobile terminal | |
CN108270917B (en) | Encrypted smart phone | |
US9467428B2 (en) | Information security attachment device for voice communication and information security method for voice communication using the same | |
CN105282239A (en) | Encryption method and system based on Web Service | |
CN102413462B (en) | Method and system for improving safety of voice communication of mobile terminal system based on safety micro secure digital (TF) card | |
CN101951554A (en) | Method and system for realizing pre-access of encrypted conference call | |
CN204836595U (en) | Cell -phone with pronunciation encryption function | |
US20230070408A1 (en) | Secure communication device equipped with quantum encryption chip based quantum random number and method of providing secure communication service using the same | |
CN104581711A (en) | Mobile terminal with communication encryption function as well as communication encryption method thereof | |
CN105577631B (en) | data transmission method and terminal | |
CN103986640A (en) | Instant messaging method and system capable of guaranteeing safety of user communication content |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20121205 |