CN102811439A - Method and system for voice processing - Google Patents

Method and system for voice processing Download PDF

Info

Publication number
CN102811439A
CN102811439A CN2011101472364A CN201110147236A CN102811439A CN 102811439 A CN102811439 A CN 102811439A CN 2011101472364 A CN2011101472364 A CN 2011101472364A CN 201110147236 A CN201110147236 A CN 201110147236A CN 102811439 A CN102811439 A CN 102811439A
Authority
CN
China
Prior art keywords
text
voice
encryption
information
carried out
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011101472364A
Other languages
Chinese (zh)
Inventor
王冲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN2011101472364A priority Critical patent/CN102811439A/en
Priority to PCT/CN2012/072195 priority patent/WO2012163127A1/en
Publication of CN102811439A publication Critical patent/CN102811439A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones

Abstract

The invention provides a method and a system for voice processing. The method includes receiving inputted voice; encrypting the voice if the volume of the voice is lower than a preset threshold value; and sending the encrypted information. With the above method and system for voice processing, personal information can be effectively prevented from revealing, and accordingly the purpose of protecting the information is achieved.

Description

Method of speech processing and system
Technical field
The present invention relates to the voice communication secrecy technology, relate in particular to a kind of method of speech processing and system.
Background technology
Along with the fast development of the communication technology, the voice communication technology also from strength to strength, voice communication safety thereupon also more and more comes into one's own.
The user comprises individual privacy, bank account, ID card No. etc. carry out often relating to some personal information in the process of voice communication through the terminal.These information are easy to reveal in the following manner in communication process: the one, and the voice call volume is bigger, is obtained by the people of close together; The 2nd, in the process of voice messaging transmission, monitored or intercepting and capturing.And the leakage of these information all can produce unsafe problems.
In communication process, utilize secrecy technology to solve information leakage at present and have some technical schemes, the realization thinking of these schemes all is manually to trigger function of keeping secret by the user basically, and the input information of user on the terminal is hiding or alternative with specific character.
Technique scheme needs the user manually to trigger, and degree of intelligence is not high, and the such scheme fail safe is not high.
Summary of the invention
The invention provides a kind of method of speech processing and system, the existing degree of intelligence that prevents information leakage technology is low to overcome, the problem of poor stability.
The invention provides a kind of method of speech processing, this method comprises:
Receive the voice of input;
When the volume of said voice during, said voice are carried out encryption less than predetermined threshold value; And
Information after the transmission encryption.
Preferably, saidly said voice carried out encryption comprise:
With said speech conversion is text, and said text is carried out encryption.
Preferably, saidly said text carried out encryption comprise:
Save as text at every text after will changing when reaching preset duration, said text is carried out encryption.
Preferably, the information after the said transmission encryption comprises:
With the information after the one or more way of short messages transmission encryption.
Preferably, said method also comprises: the text to receiving is deciphered.
The present invention also provides a kind of speech processing system, and this system comprises:
Receiving system is used to receive the voice of input;
Processing unit when being used for volume when said voice less than predetermined threshold value, carries out encryption to said voice; And
Dispensing device is used to send the information after the encryption.
Preferably, said processing unit is to be used for said speech conversion to be text, said text is carried out encryption.
Preferably, said processing unit is that being used for said speech conversion is text, and saves as text at every text after will changing when reaching preset duration, and said text is carried out encryption.
Preferably, said dispensing device is the information that is used for after the one or more way of short messages transmission encryption.
Preferably, said system also comprises: decryption device is used for the text that receives is deciphered.
Above-mentioned method of speech processing and system can prevent leakage of personal information effectively, reach the purpose of protection information.
Description of drawings
Fig. 1 is the flow chart of secret telephony embodiment of the present invention;
Fig. 2 is the flow chart of voice encryption process of transmitting embodiment of the present invention.
Embodiment
For making the object of the invention, technical scheme and advantage clearer, hereinafter will combine accompanying drawing that embodiments of the invention are elaborated.Need to prove that under the situation of not conflicting, embodiment among the application and the characteristic among the embodiment be combination in any each other.
The present invention has adopted technological means such as speech detection, speech conversion, text encryption in carrying out the voice call process, user's voice information was encrypted in the specific time.In whole communication process; The user does not need handoff calls pattern (being common call mode and speech scrambling pattern) on one's own initiative; The terminal just can be discerned and security information transmitted automatically, and receiving terminal only need use the decryption method of appointing in advance just can get access to the security information that transmit leg sends.
The invention provides a kind of method of speech processing, this method is described from the transmitting terminal angle, and this method comprises:
The voice of step 1, reception input;
Transmitting terminal receives the voice of user's input;
Step 2, when the volume of said voice during less than predetermined threshold value, said voice are carried out encryption;
Above-mentioned predetermined threshold value can dynamically arrange as required;
Language is carried out encryption to be comprised: after directly language being carried out encryption and language conversion being text, text is carried out encryption; Saidly said text is carried out encryption comprise: save as text at every text after will changing when reaching preset duration, said text is carried out encryption.
This method can also comprise: when the volume of said voice greater than predetermined threshold value, said voice are directly sent to receiving terminal.
Information after step 3, the transmission encryption.
With the information after the one or more way of short messages transmission encryption.
In addition, said method can also comprise: the text to receiving is deciphered.
The present invention also provides a kind of speech processing system, and this system comprises receiving system, processing unit and dispensing device, wherein:
Receiving system is used to receive the voice of input;
Processing unit when being used for volume when said voice less than predetermined threshold value, carries out encryption to said voice;
Dispensing device is used to send the information after the encryption.
This system can also comprise checkout gear, and the speech detection module in this checkout gear can detect the volume of voice.
Particularly, said processing unit is to be used for said speech conversion to be text, said text is carried out encryption.
Preferably, said processing unit is that being used for said speech conversion is text, and saves as text at every text after will changing when reaching preset duration, and said text is carried out encryption.Send the information after the encryption through dispensing device with one or more way of short messages then.
Further, the above-mentioned functions of this processing unit can be accomplished by voice conversion module, text encryption module and text sending module; Wherein, voice conversion module is a text with said speech conversion; The text encryption module is encrypted said text; Text after the text sending module will be encrypted sends to receiving terminal, and is to send to receiving terminal with way of short messages.
In addition, said system also comprises decryption device, and this decryption device is used for the text that receives is deciphered.Particularly, be to decipher through the text deciphering module in the decryption device.
Further, when said processing unit can also be used for volume when said voice greater than predetermined threshold value, send said voice.
Said system can effectively prevent the leakage of information in the voice call process, and its implementation procedure can repeat no more referring to Fig. 1 and Fig. 2 here.
With the mode of embodiment secret telephony process of the present invention is described below, said system can be arranged in the terminal, and this terminal has following function:
1, voice call function: can carry out voice call through network, this is the prerequisite of log-on message function of keeping secret;
2, voice detection function: can detect the volume of phonetic entry, and start or close the speech security function according to volume;
3, speech conversion function: can convert the voice messaging of user's input into text message;
4, text encryption function: can use the encryption method of appointment that text message is encrypted;
5, text sending function: can the text after encrypting be sent with way of short messages;
6, text decipher function: can decipher the text message of encrypting according to the decryption method of prior agreement.
As shown in Figure 1, be the flow chart of secret telephony embodiment of the present invention, this process comprises:
Step 101, user initiate audio call on the terminal, set up voice call and connect;
After step 102, voice call were set up, the speech detection module started;
Step 103, speech detection module judge whether to get into security schema according to the volume of user input voice, if speech volume greater than predetermined threshold value, then execution in step 104, if speech volume less than predetermined threshold value, then execution in step 105;
This threshold value is on the terminal, to set in advance;
Step 104, do not start voice encryption process of transmitting (or closing the voice encryption process of transmitting that has started), carry out normal voice call;
Step 105, start the voice encryption process of transmitting automatically.
These voice are being carried out encryption, and after sending to the opposite end with way of short messages, decryption processing is carried out to the information that receives in the opposite end, short message content can be checked according to the needs of oneself in the opposite end while conversing, also can behind end of conversation, check short message content.
In the process of whole voice call, according to the size of speech volume, open or close security module, the user does not need manually to be provided with, and avoids information leakage to give the people of close together simultaneously yet.
As shown in Figure 2, be the flow chart of voice encryption process of transmitting embodiment of the present invention, this process comprises:
Step 201, startup voice conversion module, the speech conversion that the user is imported is a text;
This moment the voice call module input information (be user's voice input) of voice conversion module after opening of not redispatching;
Step 202, judge that whether the time of speech conversion surpass the Preset Time threshold value, if execution in step 203, otherwise, turn to step 201;
The Preset Time threshold value is to set at the terminal in advance, and certainly, this Preset Time threshold value can be adjusted as required;
Step 203, text is deposited into a unique file;
Step 204, the unique file of preserving is encrypted;
Step 205, the text after will encrypting use note to send to the opposing party of voice call.
If information is bigger, then can be divided into many notes and sends.
Carry out said process, up to the text encryption module with the text sending module is closed and the encrypt file transmission finish.
Compare with existing technical scheme, the present invention triggers the method intelligent more (through detecting the size of input volume, switching security schema at any time) of encryption function, has also avoided information leakage to give the people of close together simultaneously; On the object of encrypting, be that the voice in the communication process are encrypted; On the opportunity of security information, just encrypt at information input terminal, can prevent the leakage of information in network transmission process; On cipher mode, the mode of using text to encrypt is compared voice encryption, and selectable encryption technology is more and safer.
One of ordinary skill in the art will appreciate that all or part of step in the said method can instruct related hardware to accomplish through program, said procedure can be stored in the computer-readable recording medium, like read-only memory, disk or CD etc.Alternatively, all or part of step of the foregoing description also can use one or more integrated circuits to realize.Correspondingly, each the module/unit in the foregoing description can adopt the form of hardware to realize, also can adopt the form of software function module to realize.The present invention is not restricted to the combination of the hardware and software of any particular form.
Above embodiment is only unrestricted in order to technical scheme of the present invention to be described, only with reference to preferred embodiment the present invention is specified.Those of ordinary skill in the art should be appreciated that and can make amendment or be equal to replacement technical scheme of the present invention, and do not break away from the spirit and the scope of technical scheme of the present invention, all should be encompassed in the middle of the claim scope of the present invention.

Claims (10)

1. method of speech processing, this method comprises:
Receive the voice of input;
When the volume of said voice during, said voice are carried out encryption less than predetermined threshold value; And
Information after the transmission encryption.
2. method according to claim 1 is characterized in that:
Saidly said voice carried out encryption comprise:
With said speech conversion is text, and said text is carried out encryption.
3. method according to claim 2 is characterized in that:
Saidly said text carried out encryption comprise:
Save as text at every text after will changing when reaching preset duration, said text is carried out encryption.
4. according to claim 2 or 3 described methods, it is characterized in that:
Information after the said transmission encryption comprises:
With the information after the one or more way of short messages transmission encryption.
5. method according to claim 4 is characterized in that, said method also comprises:
Text to receiving is deciphered.
6. speech processing system, this system comprises:
Receiving system is used to receive the voice of input;
Processing unit when being used for volume when said voice less than predetermined threshold value, carries out encryption to said voice; And
Dispensing device is used to send the information after the encryption.
7. system according to claim 6 is characterized in that:
Said processing unit is to be used for said speech conversion to be text, said text is carried out encryption.
8. system according to claim 7 is characterized in that:
Said processing unit is that being used for said speech conversion is text, and saves as text at every text after will changing when reaching preset duration, and said text is carried out encryption.
9. according to claim 7 or 8 described systems, it is characterized in that:
Said dispensing device is the information that is used for after the one or more way of short messages transmission encryption.
10. system according to claim 9 is characterized in that, said system also comprises:
Decryption device is used for the text that receives is deciphered.
CN2011101472364A 2011-06-02 2011-06-02 Method and system for voice processing Pending CN102811439A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN2011101472364A CN102811439A (en) 2011-06-02 2011-06-02 Method and system for voice processing
PCT/CN2012/072195 WO2012163127A1 (en) 2011-06-02 2012-03-12 Speech processing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011101472364A CN102811439A (en) 2011-06-02 2011-06-02 Method and system for voice processing

Publications (1)

Publication Number Publication Date
CN102811439A true CN102811439A (en) 2012-12-05

Family

ID=47234988

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011101472364A Pending CN102811439A (en) 2011-06-02 2011-06-02 Method and system for voice processing

Country Status (2)

Country Link
CN (1) CN102811439A (en)
WO (1) WO2012163127A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105743912A (en) * 2016-03-31 2016-07-06 宇龙计算机通信科技(深圳)有限公司 Voice encryption method and voice sending terminal
CN105871842A (en) * 2016-03-31 2016-08-17 宇龙计算机通信科技(深圳)有限公司 Voice encryption and decryption methods, voice encryption and decryption devices and terminals
CN114839891A (en) * 2022-05-11 2022-08-02 海南创兴高科技有限公司 Intelligent bedside table control method based on Internet of things, computer and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1825865A (en) * 2006-03-10 2006-08-30 深圳市杰特电信控股有限公司 Automatic recording method and apparatus for communication terminal
WO2007135475A1 (en) * 2006-05-24 2007-11-29 Al Hallami, Omran Voice transmission application via short message service (sms), multimedia messaging service (mms) and/or general packet radio service (gprs)
CN101951601A (en) * 2010-08-25 2011-01-19 中兴通讯股份有限公司 Method and system for encrypting voice calls in mobile communication network, terminal and network side

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7236580B1 (en) * 2002-02-20 2007-06-26 Cisco Technology, Inc. Method and system for conducting a conference call
CN102065169A (en) * 2011-01-10 2011-05-18 长春卓尔信息安全产业股份有限公司 Method and device for encrypting telephone

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1825865A (en) * 2006-03-10 2006-08-30 深圳市杰特电信控股有限公司 Automatic recording method and apparatus for communication terminal
WO2007135475A1 (en) * 2006-05-24 2007-11-29 Al Hallami, Omran Voice transmission application via short message service (sms), multimedia messaging service (mms) and/or general packet radio service (gprs)
CN101951601A (en) * 2010-08-25 2011-01-19 中兴通讯股份有限公司 Method and system for encrypting voice calls in mobile communication network, terminal and network side

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105743912A (en) * 2016-03-31 2016-07-06 宇龙计算机通信科技(深圳)有限公司 Voice encryption method and voice sending terminal
CN105871842A (en) * 2016-03-31 2016-08-17 宇龙计算机通信科技(深圳)有限公司 Voice encryption and decryption methods, voice encryption and decryption devices and terminals
WO2017166420A1 (en) * 2016-03-31 2017-10-05 宇龙计算机通信科技(深圳)有限公司 Voice encryption method and voice transmission terminal
WO2017166556A1 (en) * 2016-03-31 2017-10-05 宇龙计算机通信科技(深圳)有限公司 Voice encryption and decryption method, encryption and decryption device, and terminal
CN105743912B (en) * 2016-03-31 2020-04-07 宇龙计算机通信科技(深圳)有限公司 Voice encryption method and voice sending terminal
CN105871842B (en) * 2016-03-31 2020-04-07 宇龙计算机通信科技(深圳)有限公司 Voice encryption and decryption method, encryption and decryption device and terminal
CN114839891A (en) * 2022-05-11 2022-08-02 海南创兴高科技有限公司 Intelligent bedside table control method based on Internet of things, computer and storage medium

Also Published As

Publication number Publication date
WO2012163127A1 (en) 2012-12-06

Similar Documents

Publication Publication Date Title
US8467512B2 (en) Method and system for authenticating telephone callers and avoiding unwanted calls
CN106100980A (en) Instant messaging communication means end to end and device
US5696880A (en) Communication system user authentication method
CN104065648B (en) A kind of data processing method of voice call
CN107276884A (en) A kind of autonomous encrypting and deciphering system of social software based on intelligent terminal
CN105553669A (en) Identity authentication based information encryption transmission apparatus, method, and control method
CN200990610Y (en) Communication ciphered cell phone
CN103973543B (en) Instant communicating method and device
CN104468988B (en) A kind of mobile terminal and the telephone receiving method and apparatus under non-security mode thereof
CN102811439A (en) Method and system for voice processing
CN104284328A (en) Method and device for encrypting mobile phone communication content
CN105049201A (en) Mobile equipment secret communication system based on quantum cryptography and mobile equipment secret communication method based on quantum cryptography
CN105262759B (en) A kind of method and system of coded communication
CN104954951A (en) Bluetooth headset with voice encryption function and voice encryption method of Bluetooth headset
CN106211144B (en) Communication method of mobile terminal and mobile terminal
CN108270917B (en) Encrypted smart phone
US9467428B2 (en) Information security attachment device for voice communication and information security method for voice communication using the same
CN105282239A (en) Encryption method and system based on Web Service
CN102413462B (en) Method and system for improving safety of voice communication of mobile terminal system based on safety micro secure digital (TF) card
CN101951554A (en) Method and system for realizing pre-access of encrypted conference call
CN204836595U (en) Cell -phone with pronunciation encryption function
US20230070408A1 (en) Secure communication device equipped with quantum encryption chip based quantum random number and method of providing secure communication service using the same
CN104581711A (en) Mobile terminal with communication encryption function as well as communication encryption method thereof
CN105577631B (en) data transmission method and terminal
CN103986640A (en) Instant messaging method and system capable of guaranteeing safety of user communication content

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20121205