CN103079196B - Encryption call method and terminal - Google Patents
Encryption call method and terminal Download PDFInfo
- Publication number
- CN103079196B CN103079196B CN201310011336.3A CN201310011336A CN103079196B CN 103079196 B CN103079196 B CN 103079196B CN 201310011336 A CN201310011336 A CN 201310011336A CN 103079196 B CN103079196 B CN 103079196B
- Authority
- CN
- China
- Prior art keywords
- waveform
- call
- frequency range
- voice
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 20
- 230000003321 amplification Effects 0.000 claims abstract description 39
- 238000003199 nucleic acid amplification method Methods 0.000 claims abstract description 39
- 238000000354 decomposition reaction Methods 0.000 claims abstract description 25
- 239000000284 extract Substances 0.000 claims abstract description 7
- 230000006854 communication Effects 0.000 description 3
- 238000003780 insertion Methods 0.000 description 3
- 230000037431 insertion Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 238000001556 precipitation Methods 0.000 description 1
Landscapes
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses a kind of encryption call method, comprise the following steps: pre-set amplification ratio n and obscure sound wave shape; The call voice that acquisition need be encrypted also extracts any frequency range waveform of described call voice; Arbitrary described frequency range waveform is multiplied by described amplification ratio n decompose waveform to form encrypted speech and/or arbitrary described frequency range waveform to be decomposed into T section and obscure sound wave shape insert described decomposition waveform to form encrypted speech, wherein T >=2 by described.Compared with prior art, encryption call method of the present invention achieves between both call sides the encryption of call voice, the fail safe that improve call improve Consumer's Experience.The present invention discloses a kind of call encryption terminal.
Description
Technical field
The present invention relates to communication encryption technical field, relate more specifically to a kind of encryption call method and terminal.
Background technology
At present, handheld device has become means of communication the most universal, and the life that the use of handheld device is people brings great convenience.But, along with the progress of science and technology, network intercepts, the appearance of hacker makes terminal there is larger potential safety hazard, as long as carry out in our operating frequency with same class receiving equipment supervising the dialog context just can intercepting and capturing us, therefore safety issue is the difficult problem that people face.And in communication process, often relate to some private informations needing to guarantee fail safe.
Therefore, be badly in need of a kind of can be encrypted dialog context thus improve call fail safe call encryption method to overcome above-mentioned defect.
Summary of the invention
The object of this invention is to provide a kind of encryption call method, thus guarantee the information security of both call sides and improve Consumer's Experience.
Another object of the present invention is to provide a kind of call encryption terminal, thus guarantees the information security of both call sides and improve Consumer's Experience.
For achieving the above object, the invention provides a kind of method that call voice is encrypted, comprise the following steps:
Pre-set amplification ratio n and obscure sound wave shape;
The call voice that acquisition need be encrypted also extracts any frequency range waveform of described call voice;
Arbitrary for institute frequency range waveform of stating is decomposed into T section and decomposes waveform and obscure sound wave shape insert described decomposition waveform to form encrypted speech, wherein T >=2 by described; Arbitrary described frequency range waveform comprises m1 unit waveform, and each section of described decomposition waveform comprises m2 unit waveform, and m1 >=2, m2 >=1; Described obscure sound wave shape insert first described unit waveform that the position of described decomposition waveform is described decomposition waveform before, after unit waveform described in last or between any two described unit waveforms.
Preferably, after " obtain the call voice that need encrypt and extract any frequency range waveform of described call voice ", also step is comprised: arbitrary described frequency range waveform is multiplied by described amplification ratio n to form encrypted speech.
Compared with prior art, first encryption call method of the present invention arranges amplification ratio n and obscures sound wave shape, obtain the call voice any frequency range waveform extracting described call voice that need encryption afterwards, then arbitrary described frequency range waveform is multiplied by described amplification ratio n decompose waveform to form encrypted speech and/or arbitrary described frequency range waveform to be decomposed into T section and obscure sound wave shape insert described decomposition waveform to form encrypted speech by described, wherein T >=2, thus the encryption achieved call voice, ensure that the information security of both call sides and improve Consumer's Experience.
Particularly, described " arbitrary described frequency range waveform being multiplied by described amplification ratio n to form encrypted speech " is specially: the amplitude of arbitrary described frequency range waveform and/or frequency are multiplied by described amplification ratio n to form encrypted speech.
Preferably, described amplification ratio n meets n > Fmax/Fmin, and wherein Fmax is the peak frequency of voice, Fmin is the minimum frequency of voice.
Correspondingly, present invention also offers a kind of call encryption terminal, comprising:
Module is set, for pre-setting amplification ratio n and obscuring sound wave shape;
Voice acquisition module, for obtaining the call voice that need encrypt and extracting any frequency range waveform of described call voice;
Encrypting module, decomposes waveform for arbitrary described frequency range waveform being decomposed into T section and obscuring sound wave shape insert described decomposition waveform to form encrypted speech, wherein T >=2 by described; Arbitrary described frequency range waveform comprises m1 unit waveform, and each section of described decomposition waveform comprises m2 unit waveform, and m1 >=2, m2 >=1; Described obscure sound wave shape insert first described unit waveform that the position of described decomposition waveform is described decomposition waveform before, after unit waveform described in last or between any two described unit waveforms.
Preferably, described encrypting module is also for being multiplied by described amplification ratio n to form encrypted speech by described any frequency range waveform.
Preferably, described amplification ratio n meets n > Fmax/Fmin, and wherein Fmax is the peak frequency of voice, Fmin is the minimum frequency of voice.
By following description also by reference to the accompanying drawings, the present invention will become more clear, and these accompanying drawings are for explaining embodiments of the invention.
Accompanying drawing explanation
Fig. 1 is the flow chart of encryption call method one embodiment of the present invention.
Fig. 2 is the structured flowchart of call encryption terminal one embodiment of the present invention.
Embodiment
With reference now to accompanying drawing, describe embodiments of the invention, element numbers similar in accompanying drawing represents similar element.As mentioned above, first encryption call method of the present invention arranges amplification ratio n and obscures sound wave shape, obtain the call voice any frequency range waveform extracting described call voice that need encryption afterwards, then arbitrary described frequency range waveform is multiplied by described amplification ratio n decompose waveform to form encrypted speech and/or arbitrary described frequency range waveform to be decomposed into T section and obscure sound wave shape insert described decomposition waveform to form encrypted speech by described, wherein T >=2, thus the encryption achieved call voice, ensure that the information security of both call sides and improve Consumer's Experience.
Please refer to Fig. 1, describe the flow chart of encryption call method one embodiment of the present invention.As shown in Figure 1, comprise the following steps:
Step S101, pre-sets amplification ratio n and obscures sound wave shape; Wherein amplification ratio n is the arbitrary value except 0, and n meets n > Fmax/Fmin in the present embodiment, and wherein Fmax is the peak frequency of voice, Fmin is the minimum frequency of voice, obscures the waveform that sound wave shape is setting arbitrarily;
Step S102, judges whether to be encrypted call voice, if so, then performs step S104, otherwise, perform step S103; Wherein, if be encrypted call voice, then the dialog context from the moment after determining to be encrypted is encrypted, only just start encryption function by user when running into the content needing encryption, instead of all dialog contexts are encrypted automatically, thus improve data transmission efficiency and save resource;
Step S103, is not encrypted;
Step S104, obtains the call voice any frequency range waveform extracting described call voice that need encryption; As: frequency range corresponding to call voice needing encryption is 100-800Hz, then can extract 100-200Hz, 150-800Hz or 100-800Hz etc. and be included in arbitrarily any frequency range waveform within the scope of 100-800Hz;
Step S105, is multiplied by amplification ratio n and decomposes waveform to form encrypted speech and/or any frequency range waveform to be decomposed into T section and will obscure sound wave shape insertion decomposition waveform to form encrypted speech, wherein T >=2 by any frequency range waveform of extraction; Be specially, the amplitude of frequency range waveform and/or frequency be multiplied by amplification ratio n to form encrypted speech;
Concrete, can only carry out following encryption to any frequency range waveform and obtain encrypted speech, as: arrange amplification ratio n=2*Fmax/Fmin, the encrypted speech obtained after the frequency of any frequency range waveform is multiplied by amplification ratio n is no longer the sound of the mankind, thus ensure that call safety, or the amplitude of any frequency range waveform is multiplied by amplification ratio n, or the frequency of any frequency range waveform and amplitude are multiplied by amplification ratio n simultaneously, also only following encryption can be carried out to any frequency range waveform, as: any frequency range waveform is decomposed into T (as T=4) section and decomposes waveform, then will obscure sound wave shape inserts in these 4 sections decomposition waveforms, wherein every section of decomposition waveform comprises m2 unit waveform, m2 >=1, any frequency range waveform comprises m1 unit waveform, then m1 and m2 meets following relation: m1=T*m2, concrete insert the position of decomposing waveform by obscuring sound wave shape be: all insert in every section of anterior locations of decomposing waveform and back location and obscure sound wave shape, namely insert before first the unit waveform decomposing waveform and after last unit waveform and obscure sound wave shape, or insert between any two unit waveforms that every section is decomposed waveform and obscure sound wave shape, as: every section is decomposed waveform and comprises 3 unit waveforms, then can decompose to insert between first unit waveform in waveform and second unit waveform at every section and obscure sound wave shape, realize the encryption of voice thus obtain encrypted speech, certainly, the above two kinds can also be carried out to any frequency range waveform operate thus obtain encrypted speech simultaneously, as: first amplification ratio n is multiplied by the amplitude of any frequency range waveform, afterwards arbitrary described frequency range waveform is decomposed into T section decompose waveform and sound wave shape insertion decomposition waveform will be obscured to form encrypted speech, thus encrypted speech changes dialog context, only after deciphering accordingly, just can obtain correct dialog context, ensure that call safety,
Step S106, is sent to call opposite end thus complete a ciphering process by encrypted speech, receive encrypted speech that call opposite end sends over and the process be decrypted is the inverse process corresponding with ciphering process.
Please refer to Fig. 2, describe the structured flowchart of call encryption terminal 100 1 embodiment of the present invention.
As shown in Figure 2, call encryption terminal 100 comprises and arranges module 10, voice acquisition module 11 and encrypting module 12.Module 10 is set for pre-setting amplification ratio n and obscuring sound wave shape; Voice acquisition module 11 is for obtaining the call voice that need encrypt and extracting any frequency range waveform of described call voice; Encrypting module 12 with module 10 is set and voice acquisition module 11 is connected, decompose waveform for arbitrary described frequency range waveform being multiplied by described amplification ratio n to form encrypted speech and/or arbitrary described frequency range waveform to be decomposed into T section and obscure sound wave shape insert described decomposition waveform to form encrypted speech, wherein T >=2 by described.Concrete, amplification ratio n meets n > Fmax/Fmin, and wherein Fmax is the peak frequency of voice, Fmin is the minimum frequency of voice; By " arbitrary described frequency range waveform is multiplied by amplification ratio n to form encrypted speech " can be wherein the amplitude of arbitrary described frequency range waveform is multiplied by amplification ratio n, frequency is multiplied by amplification ratio n or amplitude and frequency and is multiplied by amplification ratio n simultaneously; Wherein any frequency range waveform comprises m1 unit waveform, every lst-stage precipitation waveform comprises m2 unit waveform, and m1 >=2, m2 >=1, in encrypting module 12 by the position of obscuring sound wave shape insertion decomposition waveform is: before decomposing first unit waveform of waveform, after last unit waveform or between any two unit waveforms.
As can be seen from the above description, call encryption terminal 100 of the present invention pre-sets amplification ratio n by arranging module 10 and obscures sound wave shape, obtain by voice acquisition module 11 call voice that need encrypt again and extract any frequency range waveform of call voice, call finally by encrypting module 12 and module 10 is set and voice acquisition module 11 pairs of call voices are encrypted, thus achieve the object of speech scrambling voice, ensure that the information security of both call sides and improve Consumer's Experience.
More than in conjunction with most preferred embodiment, invention has been described, but the present invention is not limited to the embodiment of above announcement, and should contain various carry out according to essence of the present invention amendment, equivalent combinations.
Claims (7)
1. an encryption call method, is characterized in that, comprises the following steps:
Pre-set amplification ratio n and obscure sound wave shape;
The call voice that acquisition need be encrypted also extracts any frequency range waveform of described call voice;
Arbitrary described frequency range waveform is decomposed into T section decompose waveform and obscure sound wave shape insert described decomposition waveform to form encrypted speech, wherein T >=2 by described; Arbitrary described frequency range waveform comprises m1 unit waveform, and each section of described decomposition waveform comprises m2 unit waveform, and m1 >=2, m2 >=1; Described obscure sound wave shape insert first described unit waveform that the position of described decomposition waveform is described decomposition waveform before, after unit waveform described in last or between any two described unit waveforms.
2. encryption call method as claimed in claim 1, it is characterized in that, after " obtain the call voice that need encrypt and extract any frequency range waveform of described call voice ", also comprise step: arbitrary described frequency range waveform is multiplied by described amplification ratio n to form encrypted speech.
3. encryption call method as claimed in claim 2, it is characterized in that, described " arbitrary described frequency range waveform being multiplied by described amplification ratio n to form encrypted speech " is specially: the amplitude of arbitrary described frequency range waveform and/or frequency are multiplied by described amplification ratio n to form encrypted speech.
4. encryption call method as claimed in claim 2, it is characterized in that, described amplification ratio n meets n > Fmax/Fmin, and wherein Fmax is the peak frequency of voice, Fmin is the minimum frequency of voice.
5. a call encryption terminal, is characterized in that, comprising:
Module is set, for pre-setting amplification ratio n and obscuring sound wave shape;
Voice acquisition module, for obtaining the call voice that need encrypt and extracting any frequency range waveform of described call voice;
Encrypting module, decomposes waveform for described any frequency range waveform being decomposed into T section and obscuring sound wave shape insert described decomposition waveform to form encrypted speech, wherein T >=2 by described; Arbitrary described frequency range waveform comprises m1 unit waveform, and each section of described decomposition waveform comprises m2 unit waveform, and m1 >=2, m2 >=1; Described obscure sound wave shape insert first described unit waveform that the position of described decomposition waveform is described decomposition waveform before, after unit waveform described in last or between any two described unit waveforms.
6. call encryption terminal as claimed in claim 5, it is characterized in that, described encrypting module is also for being multiplied by described amplification ratio n to form encrypted speech by described any frequency range waveform.
7. call encryption terminal as claimed in claim 6, it is characterized in that, described amplification ratio n meets n > Fmax/Fmin, and wherein Fmax is the peak frequency of voice, Fmin is the minimum frequency of voice.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310011336.3A CN103079196B (en) | 2013-01-11 | 2013-01-11 | Encryption call method and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310011336.3A CN103079196B (en) | 2013-01-11 | 2013-01-11 | Encryption call method and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103079196A CN103079196A (en) | 2013-05-01 |
CN103079196B true CN103079196B (en) | 2016-02-10 |
Family
ID=48155580
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310011336.3A Expired - Fee Related CN103079196B (en) | 2013-01-11 | 2013-01-11 | Encryption call method and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103079196B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105391675A (en) * | 2014-09-05 | 2016-03-09 | 深圳市同盛绿色科技有限公司 | Voice signal transmission method, terminal and system |
WO2018081937A1 (en) * | 2016-11-01 | 2018-05-11 | 华为技术有限公司 | Method for determining coding rate of audio and video data, terminal, and storage medium |
CN111506913B (en) * | 2020-04-21 | 2024-03-15 | 上海明略人工智能(集团)有限公司 | Audio encryption method and device, storage medium and electronic device |
CN111294367B (en) * | 2020-05-14 | 2020-09-01 | 腾讯科技(深圳)有限公司 | Audio signal post-processing method and device, storage medium and electronic equipment |
CN115249482B (en) * | 2022-01-15 | 2023-10-31 | 江苏怀业信息技术股份有限公司 | Audio data encryption method and decryption method based on artificial intelligence and Internet of things |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1249517A (en) * | 1998-09-29 | 2000-04-05 | 国际商业机器公司 | System for inserting additional information in audio data |
CN101329869A (en) * | 2008-07-31 | 2008-12-24 | 中国电信股份有限公司 | System and method for encrypting acoustic source of speech encoding for vector quantization |
WO2009104234A1 (en) * | 2008-02-18 | 2009-08-27 | 学校法人同志社 | Wireless device, wireless system, and method for confidential communication |
CN102624518A (en) * | 2012-03-05 | 2012-08-01 | 华中科技大学 | Voice encryption and decryption method |
-
2013
- 2013-01-11 CN CN201310011336.3A patent/CN103079196B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1249517A (en) * | 1998-09-29 | 2000-04-05 | 国际商业机器公司 | System for inserting additional information in audio data |
WO2009104234A1 (en) * | 2008-02-18 | 2009-08-27 | 学校法人同志社 | Wireless device, wireless system, and method for confidential communication |
CN101329869A (en) * | 2008-07-31 | 2008-12-24 | 中国电信股份有限公司 | System and method for encrypting acoustic source of speech encoding for vector quantization |
CN102624518A (en) * | 2012-03-05 | 2012-08-01 | 华中科技大学 | Voice encryption and decryption method |
Also Published As
Publication number | Publication date |
---|---|
CN103079196A (en) | 2013-05-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103079196B (en) | Encryption call method and terminal | |
SG11201900367SA (en) | Method and device for providing and obtaining graphic code information, and terminal | |
WO2019004929A3 (en) | Network slice allocation method, device and system | |
EP2388744A3 (en) | Method and device for conducting trusted remote payment transactions | |
WO2013003493A3 (en) | System and method for protocol fingerprinting and reputation correlation | |
PH12019500936A1 (en) | Method and apparatus for service implementation | |
EP1892914A3 (en) | Network system, authentication method, information processing apparatus and access processing method accompanied by outbound authentication | |
CN104660397A (en) | Secret key managing method and system | |
MY201886A (en) | Verification code short message processing method and terminal | |
CN104065648B (en) | A kind of data processing method of voice call | |
CN103701586A (en) | Method and device for acquiring secret key | |
CN110380856A (en) | Terminal device and its voice information processing method, device and storage medium | |
CN102801731A (en) | Method and device for protecting data | |
EP4301019A3 (en) | Techniques for call authentication | |
CN107508819B (en) | Encryption method and encryption device | |
CN104639330B (en) | A kind of GOOSE message completeness certification method | |
CN105100116A (en) | Efficient and safe power data interaction method in wireless communication mode | |
CN105357665A (en) | Encryption method for sensitive data of mobile phone and off-line decryption method based on same | |
CN104506517A (en) | Encryption transmission method for MIPS (Million Instructions Per Second) platform on basis of HTTP (Hyper Text Transfer Protocol) | |
CN103745138A (en) | Method for hiding dll module derivative function | |
US20160173456A1 (en) | Dynamic Spectrum Audio Encryption and Decryption Device | |
CN112839044B (en) | Audio processing method and device | |
CN104080080B (en) | A kind of data handling system of voice call | |
Chen et al. | End-to-end speech encryption algorithm based on speech scrambling in frequency domain | |
KR20130109560A (en) | Encryption method of database of mobile communication device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder |
Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Patentee after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Patentee before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. |
|
CP01 | Change in the name or title of a patent holder | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20160210 |
|
CF01 | Termination of patent right due to non-payment of annual fee |