CN103079196A - Call encryption method and terminal - Google Patents

Call encryption method and terminal Download PDF

Info

Publication number
CN103079196A
CN103079196A CN2013100113363A CN201310011336A CN103079196A CN 103079196 A CN103079196 A CN 103079196A CN 2013100113363 A CN2013100113363 A CN 2013100113363A CN 201310011336 A CN201310011336 A CN 201310011336A CN 103079196 A CN103079196 A CN 103079196A
Authority
CN
China
Prior art keywords
waveform
frequency range
voice
arbitrary
call
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013100113363A
Other languages
Chinese (zh)
Other versions
CN103079196B (en
Inventor
曾元清
游文权
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201310011336.3A priority Critical patent/CN103079196B/en
Publication of CN103079196A publication Critical patent/CN103079196A/en
Application granted granted Critical
Publication of CN103079196B publication Critical patent/CN103079196B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a call encryption method comprising the following steps of presetting an amplification percentage n and a confusion sound waveform; acquiring a call voice to be encrypted and extracting any frequency range waveform of the call voice; multiplying any frequency range waveform by the amplification percentage n to form an encryption voice and/or breaking any of the frequency range waveforms down into T sections of decomposition waveforms and inserting the confusion sound waveform into the decomposition waveforms to form the encryption voice, wherein T is bigger than or equal to 2. Compared to the prior art, according to the call encryption method disclosed by the invention, the encryption of call voices between two parties is achieved, the security of the call is improved, and the user experience is enhanced. The invention further discloses a call encryption terminal.

Description

Encryption call method and terminal
Technical field
The present invention relates to the communication encryption technical field, relate more specifically to a kind of encryption call method and terminal.
Background technology
At present, handheld device has become the means of communication of popularizing the most, and the life as people of using of handheld device brings great convenience.Yet, progress along with science and technology, network intercepting, hacker's appearance is so that terminal exists larger potential safety hazard, as long as supervise the dialog context that just can intercept and capture us in our operating frequency with the same class receiving equipment, so safety issue is the difficult problem that people face.And in communication process, tend to relate to the private information that some need to guarantee fail safe.
Therefore, thus be badly in need of a kind ofly can being encrypted the conversation encryption method that improves the conversation fail safe to dialog context and overcoming defects.
Summary of the invention
The purpose of this invention is to provide a kind of encryption call method, thereby guarantee the information security of both call sides and improve user's experience.
Another object of the present invention provides a kind of speech scrambling terminal, thereby guarantees the information security of both call sides and improve user's experience.
For achieving the above object, the invention provides a kind of method that call voice is encrypted, may further comprise the steps:
Set in advance amplification ratio n and obscure sound wave shape;
Obtain the arbitrary frequency range waveform that needs the call voice of encrypting and extract described call voice;
Arbitrary described frequency range waveform be multiply by described amplification ratio n to form encrypted speech and/or the arbitrary frequency range waveform of stating of institute is decomposed into the T section and decomposes waveform and obscure sound wave shape and insert described decomposition waveform with formation encrypted speech, wherein T 〉=2 described.
Compared with prior art, encryption call method of the present invention at first arranges amplification ratio n and obscures sound wave shape, obtain afterwards the arbitrary frequency range waveform that needs the call voice of encrypting and extract described call voice, then arbitrary described frequency range waveform being multiply by described amplification ratio n decomposes waveform and obscures sound wave shape and insert described decomposition waveform with the formation encrypted speech described to form encrypted speech and/or will arbitrary described frequency range waveform to be decomposed into the T section, T 〉=2 wherein, thereby realized the encryption to call voice, guaranteed the information security of both call sides and improved user's experience.
Particularly, described " arbitrary described frequency range waveform be multiply by described amplification ratio n to form encrypted speech " is specially: amplitude and/or the frequency of arbitrary described frequency range waveform be multiply by described amplification ratio n to form encrypted speech.
Preferably, described amplification ratio n satisfies n〉Fmax/Fmin, wherein Fmax is that peak frequency, the Fmin of voice are the minimum frequency of voice.
Preferably, arbitrary described frequency range waveform comprises m1 unit waveform, and the described decomposition waveform of each section comprises m2 unit waveform, and m1 〉=2, m2 〉=1.
Preferably, describedly obscure before first described unit waveform that position that sound wave shape inserts described decomposition waveform is described decomposition waveform, after last described unit waveform or between any two described unit waveforms.
Correspondingly, the present invention also provides a kind of speech scrambling terminal, comprising:
Module is set, is used for setting in advance amplification ratio n and obscuring sound wave shape;
The voice acquisition module is used for obtaining the arbitrary frequency range waveform that needs the call voice of encrypting and extract described call voice;
Encrypting module, being used for will arbitrary described frequency range waveform multiply by described amplification ratio n decomposes waveform and also obscures sound wave shape and insert described decomposition waveform with formation encrypted speech, wherein T 〉=2 described to form encrypted speech and/or will arbitrary described frequency range waveform to be decomposed into the T section.
Preferably, described amplification ratio n satisfies n〉Fmax/Fmin, wherein Fmax is that peak frequency, the Fmin of voice are the minimum frequency of voice.
Preferably, arbitrary described frequency range waveform comprises m1 unit waveform, and the described decomposition waveform of each section comprises m2 unit waveform, and m1 〉=2, m2 〉=1.
Preferably, describedly obscure before first described unit waveform that position that sound wave shape inserts described decomposition waveform is described decomposition waveform, after last described unit waveform or between any two described unit waveforms.
By following description also by reference to the accompanying drawings, it is more clear that the present invention will become, and these accompanying drawings are used for explaining embodiments of the invention.
Description of drawings
Fig. 1 is the flow chart of encryption call method one embodiment of the present invention.
Fig. 2 is the structured flowchart of speech scrambling terminal one embodiment of the present invention.
Embodiment
With reference now to accompanying drawing, describe embodiments of the invention, similar element numbers represents similar element in the accompanying drawing.As mentioned above, encryption call method of the present invention at first arranges amplification ratio n and obscures sound wave shape, obtain afterwards the arbitrary frequency range waveform that needs the call voice of encrypting and extract described call voice, then arbitrary described frequency range waveform being multiply by described amplification ratio n decomposes waveform and obscures sound wave shape and insert described decomposition waveform with the formation encrypted speech described to form encrypted speech and/or will arbitrary described frequency range waveform to be decomposed into the T section, T 〉=2 wherein, thereby realized the encryption to call voice, guaranteed the information security of both call sides and improved user's experience.
Please refer to Fig. 1, described the flow chart of encryption call method one embodiment of the present invention.As shown in Figure 1, may further comprise the steps:
Step S101 sets in advance amplification ratio n and obscures sound wave shape; Wherein amplification ratio n is the arbitrary value except 0, and n satisfies n in the present embodiment〉Fmax/Fmin, wherein Fmax is that peak frequency, the Fmin of voice are the minimum frequency of voice, obscures the waveform that sound wave shape is Set arbitrarily;
Step S102 judges whether call voice is encrypted, if, execution in step S104 then, otherwise, execution in step S103; Wherein, if call voice is encrypted, the dialog context that then moment after determining to be encrypted is begun is encrypted processing, only when running into the content that needs encryption, just start encryption function by the user, rather than all dialog contexts have been encrypted automatically, thereby improved data transmission efficiency and saved resource;
Step S103 is not encrypted processing;
Step S104 obtains the arbitrary frequency range waveform that needs the call voice of encrypting and extract described call voice; As: the frequency range corresponding to call voice of need encrypting is 100-800Hz, then can extract 100-200Hz, 150-800Hz or 100-800Hz etc. and be included in arbitrarily arbitrary frequency range waveform in the 100-800Hz scope;
Step S105 multiply by amplification ratio n with the arbitrary frequency range waveform that extracts and decomposes waveform and will obscure sound wave shape and insert and decompose waveform to form encrypted speech, wherein T 〉=2 to form encrypted speech and/or arbitrary frequency range waveform is decomposed into the T section; Be specially, the amplitude of frequency range waveform and/or frequency be multiply by amplification ratio n to form encrypted speech;
Concrete, can only carry out following encryption to arbitrary frequency range waveform and obtain encrypted speech, as: amplification ratio n=2*Fmax/Fmin is set, and it no longer is human sound that the frequency of arbitrary frequency range waveform be multiply by the encrypted speech that obtains after the amplification ratio n, thereby has guaranteed conversation safety; Perhaps the amplitude with arbitrary frequency range waveform multiply by amplification ratio n, or frequency and the amplitude of arbitrary frequency range waveform be multiply by amplification ratio n simultaneously; Also can only carry out following encryption to arbitrary frequency range waveform, as: arbitrary frequency range waveform is decomposed into T(such as T=4) section decomposition waveform, then will obscure sound wave shape inserts in these the 4 sections decomposition waveforms, wherein every section decomposition waveform comprises m2 unit waveform, m2 〉=1, arbitrary frequency range waveform comprises m1 unit waveform, then m1 and m2 satisfy following relation: m1=T*m2, concrete will obscure sound wave shape and insert the position of decomposing waveform and be: all insert at every section anterior locations of decomposing waveform and back location and obscure sound wave shape, namely insert before first unit waveform that decomposes waveform and after last unit waveform and obscure sound wave shape, perhaps between any two unit waveforms of every section decomposition waveform, insert and obscure sound wave shape, as: every section is decomposed waveform and comprises 3 unit waveforms, then can decompose to insert between first unit waveform in the waveform and second the unit waveform at every section and obscure sound wave shape, thereby realize the encryption of voice is obtained encrypted speech; Certainly, thereby can also carry out simultaneously the above two kinds to arbitrary frequency range waveform operates and obtains encrypted speech, as: at first the amplitude of arbitrary frequency range waveform be multiply by amplification ratio n, afterwards arbitrary described frequency range waveform being decomposed into the T section decomposes waveform and will obscure sound wave shape insertion decomposition waveform to form encrypted speech, thereby encrypted speech has changed dialog context, only after deciphering accordingly, just can obtain correct dialog context, guarantee conversation safety;
Step S106 finishes ciphering process one time thereby encrypted speech is sent to the conversation opposite end, and the encrypted speech that reception conversation opposite end sends over and the process that is decrypted are the inverse process corresponding with ciphering process.
Please refer to Fig. 2, described the structured flowchart of speech scrambling terminal 100 1 embodiment of the present invention.
As shown in Figure 2, speech scrambling terminal 100 comprises module 10, voice acquisition module 11 and encrypting module 12 is set.Module 10 is set to be used for setting in advance amplification ratio n and obscuring sound wave shape; Voice acquisition module 11 is used for obtaining the arbitrary frequency range waveform that needs the call voice of encrypting and extract described call voice; Encrypting module 12 with module 10 and voice acquisition module 11 are set are connected, are used for will arbitrary described frequency range waveform to multiply by described amplification ratio n and decompose waveform and also obscure sound wave shape and insert described decomposition waveform with formation encrypted speech, wherein T 〉=2 described to form encrypted speech and/or will arbitrary described frequency range waveform to be decomposed into the T section.Concrete, amplification ratio n satisfies n〉Fmax/Fmin, wherein Fmax is that peak frequency, the Fmin of voice are the minimum frequency of voice; Wherein will " arbitrary described frequency range waveform multiply by amplification ratio n to form encrypted speech " can be that amplitude with arbitrary described frequency range waveform multiply by amplification ratio n, frequency multiply by amplification ratio n or amplitude and frequency and multiply by simultaneously amplification ratio n; Wherein arbitrary frequency range waveform comprises m1 unit waveform, each section decomposes waveform and comprises m2 unit waveform, and m1 〉=2, m2 〉=1, the position that will obscure sound wave shape insertion decomposition waveform in the encrypting module 12 is: before first unit waveform of decomposition waveform, after last unit waveform or between any two unit waveforms.
As can be seen from the above description, speech scrambling terminal 100 of the present invention sets in advance amplification ratio n and obscures sound wave shape by module 10 is set, obtain the arbitrary frequency range waveform that needs the call voice of encrypting and extract call voice by voice acquisition module 11 again, call by encrypting module 12 at last and module 10 is set and 11 pairs of call voices of voice acquisition module are encrypted, thereby realized the purpose of speech scrambling voice, guaranteed the information security of both call sides and improved user's experience.
Above invention has been described in conjunction with most preferred embodiment, but the present invention is not limited to the embodiment of above announcement, and should contain various modification, equivalent combinations of carrying out according to essence of the present invention.

Claims (9)

1. an encryption call method is characterized in that, may further comprise the steps:
Set in advance amplification ratio n and obscure sound wave shape;
Obtain the arbitrary frequency range waveform that needs the call voice of encrypting and extract described call voice;
Arbitrary described frequency range waveform be multiply by described amplification ratio n to be decomposed waveform and obscures sound wave shape and insert described decomposition waveform with formation encrypted speech, wherein T 〉=2 described to form encrypted speech and/or will arbitrary described frequency range waveform to be decomposed into the T section.
2. encryption call method as claimed in claim 1, it is characterized in that, described " arbitrary described frequency range waveform be multiply by described amplification ratio n to form encrypted speech " is specially: amplitude and/or the frequency of arbitrary described frequency range waveform be multiply by described amplification ratio n to form encrypted speech.
3. encryption call method as claimed in claim 1 is characterized in that, described amplification ratio n satisfies n〉Fmax/Fmin, wherein Fmax is that peak frequency, the Fmin of voice are the minimum frequency of voice.
4. encryption call method as claimed in claim 1 is characterized in that, arbitrary described frequency range waveform comprises m1 unit waveform, and the described decomposition waveform of each section comprises m2 unit waveform, and m1 〉=2, m2 〉=1.
5. encryption call method as claimed in claim 4, it is characterized in that, describedly obscure before first described unit waveform that position that sound wave shape inserts described decomposition waveform is described decomposition waveform, after last described unit waveform or between any two described unit waveforms.
6. a speech scrambling terminal is characterized in that, comprising:
Module is set, is used for setting in advance amplification ratio n and obscuring sound wave shape;
The voice acquisition module is used for obtaining the arbitrary frequency range waveform that needs the call voice of encrypting and extract described call voice;
Encrypting module, being used for will described arbitrary frequency range waveform multiply by described amplification ratio n decomposes waveform and also obscures sound wave shape and insert described decomposition waveform with formation encrypted speech, wherein T 〉=2 described to form encrypted speech and/or will described arbitrary frequency range waveform to be decomposed into the T section.
7. speech scrambling terminal as claimed in claim 6 is characterized in that, described amplification ratio n satisfies n〉Fmax/Fmin, wherein Fmax is that peak frequency, the Fmin of voice are the minimum frequency of voice.
8. speech scrambling terminal as claimed in claim 6 is characterized in that, arbitrary described frequency range waveform comprises m1 unit waveform, and the described decomposition waveform of each section comprises m2 unit waveform, and m1 〉=2, m2 〉=1.
9. speech scrambling terminal as claimed in claim 8, it is characterized in that, describedly obscure before first described unit waveform that position that sound wave shape inserts described decomposition waveform is described decomposition waveform, after last described unit waveform or between any two described unit waveforms.
CN201310011336.3A 2013-01-11 2013-01-11 Encryption call method and terminal Expired - Fee Related CN103079196B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310011336.3A CN103079196B (en) 2013-01-11 2013-01-11 Encryption call method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310011336.3A CN103079196B (en) 2013-01-11 2013-01-11 Encryption call method and terminal

Publications (2)

Publication Number Publication Date
CN103079196A true CN103079196A (en) 2013-05-01
CN103079196B CN103079196B (en) 2016-02-10

Family

ID=48155580

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310011336.3A Expired - Fee Related CN103079196B (en) 2013-01-11 2013-01-11 Encryption call method and terminal

Country Status (1)

Country Link
CN (1) CN103079196B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105391675A (en) * 2014-09-05 2016-03-09 深圳市同盛绿色科技有限公司 Voice signal transmission method, terminal and system
CN108702352A (en) * 2016-11-01 2018-10-23 华为技术有限公司 A kind of method, terminal and the storage medium of determining audio, video data code rate
CN111506913A (en) * 2020-04-21 2020-08-07 上海明略人工智能(集团)有限公司 Audio encryption method and device, storage medium and electronic device
WO2021227730A1 (en) * 2020-05-14 2021-11-18 腾讯科技(深圳)有限公司 Audio signal post-processing method and apparatus, storage medium, and electronic device
CN115249482A (en) * 2022-01-15 2022-10-28 王迪 Audio data encryption method and decryption method based on artificial intelligence and Internet of things

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1249517A (en) * 1998-09-29 2000-04-05 国际商业机器公司 System for insertion of additional information in audio data
CN101329869A (en) * 2008-07-31 2008-12-24 中国电信股份有限公司 System and method for encrypting acoustic source of speech encoding for vector quantization
WO2009104234A1 (en) * 2008-02-18 2009-08-27 学校法人同志社 Wireless device, wireless system, and method for confidential communication
CN102624518A (en) * 2012-03-05 2012-08-01 华中科技大学 Voice encryption and decryption method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1249517A (en) * 1998-09-29 2000-04-05 国际商业机器公司 System for insertion of additional information in audio data
WO2009104234A1 (en) * 2008-02-18 2009-08-27 学校法人同志社 Wireless device, wireless system, and method for confidential communication
CN101329869A (en) * 2008-07-31 2008-12-24 中国电信股份有限公司 System and method for encrypting acoustic source of speech encoding for vector quantization
CN102624518A (en) * 2012-03-05 2012-08-01 华中科技大学 Voice encryption and decryption method

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105391675A (en) * 2014-09-05 2016-03-09 深圳市同盛绿色科技有限公司 Voice signal transmission method, terminal and system
WO2016033821A1 (en) * 2014-09-05 2016-03-10 深圳市同盛绿色科技有限公司 Speech signal transmission method, device and system
CN108702352A (en) * 2016-11-01 2018-10-23 华为技术有限公司 A kind of method, terminal and the storage medium of determining audio, video data code rate
CN111506913A (en) * 2020-04-21 2020-08-07 上海明略人工智能(集团)有限公司 Audio encryption method and device, storage medium and electronic device
CN111506913B (en) * 2020-04-21 2024-03-15 上海明略人工智能(集团)有限公司 Audio encryption method and device, storage medium and electronic device
WO2021227730A1 (en) * 2020-05-14 2021-11-18 腾讯科技(深圳)有限公司 Audio signal post-processing method and apparatus, storage medium, and electronic device
US12002484B2 (en) 2020-05-14 2024-06-04 Tencent Technology (Shenzhen) Company Limited Method and apparatus for post-processing audio signal, storage medium, and electronic device
CN115249482A (en) * 2022-01-15 2022-10-28 王迪 Audio data encryption method and decryption method based on artificial intelligence and Internet of things
CN115249482B (en) * 2022-01-15 2023-10-31 江苏怀业信息技术股份有限公司 Audio data encryption method and decryption method based on artificial intelligence and Internet of things

Also Published As

Publication number Publication date
CN103079196B (en) 2016-02-10

Similar Documents

Publication Publication Date Title
CN103079196B (en) Encryption call method and terminal
CN107454038B (en) Method for encrypting and transmitting data through two-dimensional code
EP2355443A3 (en) Network authentication method and device for implementing the same
EP3337088A1 (en) Data encryption method, decryption method, apparatus, and system
WO2006020329A3 (en) Method and apparatus for determining authentication capabilities
CA2818955A1 (en) Method for authorizing access to protected content
SG11201900367SA (en) Method and device for providing and obtaining graphic code information, and terminal
EP2317457A3 (en) User authentication system and method
EP1560120A4 (en) Access method
CN104767746A (en) Push message receiving method, message pushing method, client and server
HK1079926A1 (en) System and method for using acoustic digital signature generator as oracle
Habib et al. Secure speech communication algorithm via DCT and TD-ERCS chaotic map
EP4273817A3 (en) Method for occupying device and electronic device
CN103701586A (en) Method and device for acquiring secret key
CN110380856A (en) Terminal device and its voice information processing method, device and storage medium
CN105227300B (en) A kind of acquisition methods and system of key
CN107508819B (en) Encryption method and encryption device
EP4301019A3 (en) Techniques for call authentication
CN104796446B (en) A kind of data transmission method based on Audiotechnica, apparatus and system
CN112839044B (en) Audio processing method and device
EP1329790A3 (en) Mobile communications terminal and data transmitting method
CN105813065A (en) Audio dynamic spectrum encryption device and encryption method
CN104994500B (en) A kind of speech security transmission method and device for mobile phone
CN112767944A (en) Voiceprint recognition method and device
Chen et al. End-to-end speech encryption algorithm based on speech scrambling in frequency domain

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160210