CN103079196B - Encryption call method and terminal - Google Patents

Encryption call method and terminal Download PDF

Info

Publication number
CN103079196B
CN103079196B CN201310011336.3A CN201310011336A CN103079196B CN 103079196 B CN103079196 B CN 103079196B CN 201310011336 A CN201310011336 A CN 201310011336A CN 103079196 B CN103079196 B CN 103079196B
Authority
CN
China
Prior art keywords
waveform
call
frequency range
voice
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310011336.3A
Other languages
Chinese (zh)
Other versions
CN103079196A (en
Inventor
曾元清
游文权
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201310011336.3A priority Critical patent/CN103079196B/en
Publication of CN103079196A publication Critical patent/CN103079196A/en
Application granted granted Critical
Publication of CN103079196B publication Critical patent/CN103079196B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a kind of encryption call method, comprise the following steps: pre-set amplification ratio n and obscure sound wave shape; The call voice that acquisition need be encrypted also extracts any frequency range waveform of described call voice; Arbitrary described frequency range waveform is multiplied by described amplification ratio n decompose waveform to form encrypted speech and/or arbitrary described frequency range waveform to be decomposed into T section and obscure sound wave shape insert described decomposition waveform to form encrypted speech, wherein T >=2 by described.Compared with prior art, encryption call method of the present invention achieves between both call sides the encryption of call voice, the fail safe that improve call improve Consumer's Experience.The present invention discloses a kind of call encryption terminal.

Description

Encryption call method and terminal
Technical field
The present invention relates to communication encryption technical field, relate more specifically to a kind of encryption call method and terminal.
Background technology
At present, handheld device has become means of communication the most universal, and the life that the use of handheld device is people brings great convenience.But, along with the progress of science and technology, network intercepts, the appearance of hacker makes terminal there is larger potential safety hazard, as long as carry out in our operating frequency with same class receiving equipment supervising the dialog context just can intercepting and capturing us, therefore safety issue is the difficult problem that people face.And in communication process, often relate to some private informations needing to guarantee fail safe.
Therefore, be badly in need of a kind of can be encrypted dialog context thus improve call fail safe call encryption method to overcome above-mentioned defect.
Summary of the invention
The object of this invention is to provide a kind of encryption call method, thus guarantee the information security of both call sides and improve Consumer's Experience.
Another object of the present invention is to provide a kind of call encryption terminal, thus guarantees the information security of both call sides and improve Consumer's Experience.
For achieving the above object, the invention provides a kind of method that call voice is encrypted, comprise the following steps:
Pre-set amplification ratio n and obscure sound wave shape;
The call voice that acquisition need be encrypted also extracts any frequency range waveform of described call voice;
Arbitrary for institute frequency range waveform of stating is decomposed into T section and decomposes waveform and obscure sound wave shape insert described decomposition waveform to form encrypted speech, wherein T >=2 by described; Arbitrary described frequency range waveform comprises m1 unit waveform, and each section of described decomposition waveform comprises m2 unit waveform, and m1 >=2, m2 >=1; Described obscure sound wave shape insert first described unit waveform that the position of described decomposition waveform is described decomposition waveform before, after unit waveform described in last or between any two described unit waveforms.
Preferably, after " obtain the call voice that need encrypt and extract any frequency range waveform of described call voice ", also step is comprised: arbitrary described frequency range waveform is multiplied by described amplification ratio n to form encrypted speech.
Compared with prior art, first encryption call method of the present invention arranges amplification ratio n and obscures sound wave shape, obtain the call voice any frequency range waveform extracting described call voice that need encryption afterwards, then arbitrary described frequency range waveform is multiplied by described amplification ratio n decompose waveform to form encrypted speech and/or arbitrary described frequency range waveform to be decomposed into T section and obscure sound wave shape insert described decomposition waveform to form encrypted speech by described, wherein T >=2, thus the encryption achieved call voice, ensure that the information security of both call sides and improve Consumer's Experience.
Particularly, described " arbitrary described frequency range waveform being multiplied by described amplification ratio n to form encrypted speech " is specially: the amplitude of arbitrary described frequency range waveform and/or frequency are multiplied by described amplification ratio n to form encrypted speech.
Preferably, described amplification ratio n meets n > Fmax/Fmin, and wherein Fmax is the peak frequency of voice, Fmin is the minimum frequency of voice.
Correspondingly, present invention also offers a kind of call encryption terminal, comprising:
Module is set, for pre-setting amplification ratio n and obscuring sound wave shape;
Voice acquisition module, for obtaining the call voice that need encrypt and extracting any frequency range waveform of described call voice;
Encrypting module, decomposes waveform for arbitrary described frequency range waveform being decomposed into T section and obscuring sound wave shape insert described decomposition waveform to form encrypted speech, wherein T >=2 by described; Arbitrary described frequency range waveform comprises m1 unit waveform, and each section of described decomposition waveform comprises m2 unit waveform, and m1 >=2, m2 >=1; Described obscure sound wave shape insert first described unit waveform that the position of described decomposition waveform is described decomposition waveform before, after unit waveform described in last or between any two described unit waveforms.
Preferably, described encrypting module is also for being multiplied by described amplification ratio n to form encrypted speech by described any frequency range waveform.
Preferably, described amplification ratio n meets n > Fmax/Fmin, and wherein Fmax is the peak frequency of voice, Fmin is the minimum frequency of voice.
By following description also by reference to the accompanying drawings, the present invention will become more clear, and these accompanying drawings are for explaining embodiments of the invention.
Accompanying drawing explanation
Fig. 1 is the flow chart of encryption call method one embodiment of the present invention.
Fig. 2 is the structured flowchart of call encryption terminal one embodiment of the present invention.
Embodiment
With reference now to accompanying drawing, describe embodiments of the invention, element numbers similar in accompanying drawing represents similar element.As mentioned above, first encryption call method of the present invention arranges amplification ratio n and obscures sound wave shape, obtain the call voice any frequency range waveform extracting described call voice that need encryption afterwards, then arbitrary described frequency range waveform is multiplied by described amplification ratio n decompose waveform to form encrypted speech and/or arbitrary described frequency range waveform to be decomposed into T section and obscure sound wave shape insert described decomposition waveform to form encrypted speech by described, wherein T >=2, thus the encryption achieved call voice, ensure that the information security of both call sides and improve Consumer's Experience.
Please refer to Fig. 1, describe the flow chart of encryption call method one embodiment of the present invention.As shown in Figure 1, comprise the following steps:
Step S101, pre-sets amplification ratio n and obscures sound wave shape; Wherein amplification ratio n is the arbitrary value except 0, and n meets n > Fmax/Fmin in the present embodiment, and wherein Fmax is the peak frequency of voice, Fmin is the minimum frequency of voice, obscures the waveform that sound wave shape is setting arbitrarily;
Step S102, judges whether to be encrypted call voice, if so, then performs step S104, otherwise, perform step S103; Wherein, if be encrypted call voice, then the dialog context from the moment after determining to be encrypted is encrypted, only just start encryption function by user when running into the content needing encryption, instead of all dialog contexts are encrypted automatically, thus improve data transmission efficiency and save resource;
Step S103, is not encrypted;
Step S104, obtains the call voice any frequency range waveform extracting described call voice that need encryption; As: frequency range corresponding to call voice needing encryption is 100-800Hz, then can extract 100-200Hz, 150-800Hz or 100-800Hz etc. and be included in arbitrarily any frequency range waveform within the scope of 100-800Hz;
Step S105, is multiplied by amplification ratio n and decomposes waveform to form encrypted speech and/or any frequency range waveform to be decomposed into T section and will obscure sound wave shape insertion decomposition waveform to form encrypted speech, wherein T >=2 by any frequency range waveform of extraction; Be specially, the amplitude of frequency range waveform and/or frequency be multiplied by amplification ratio n to form encrypted speech;
Concrete, can only carry out following encryption to any frequency range waveform and obtain encrypted speech, as: arrange amplification ratio n=2*Fmax/Fmin, the encrypted speech obtained after the frequency of any frequency range waveform is multiplied by amplification ratio n is no longer the sound of the mankind, thus ensure that call safety, or the amplitude of any frequency range waveform is multiplied by amplification ratio n, or the frequency of any frequency range waveform and amplitude are multiplied by amplification ratio n simultaneously, also only following encryption can be carried out to any frequency range waveform, as: any frequency range waveform is decomposed into T (as T=4) section and decomposes waveform, then will obscure sound wave shape inserts in these 4 sections decomposition waveforms, wherein every section of decomposition waveform comprises m2 unit waveform, m2 >=1, any frequency range waveform comprises m1 unit waveform, then m1 and m2 meets following relation: m1=T*m2, concrete insert the position of decomposing waveform by obscuring sound wave shape be: all insert in every section of anterior locations of decomposing waveform and back location and obscure sound wave shape, namely insert before first the unit waveform decomposing waveform and after last unit waveform and obscure sound wave shape, or insert between any two unit waveforms that every section is decomposed waveform and obscure sound wave shape, as: every section is decomposed waveform and comprises 3 unit waveforms, then can decompose to insert between first unit waveform in waveform and second unit waveform at every section and obscure sound wave shape, realize the encryption of voice thus obtain encrypted speech, certainly, the above two kinds can also be carried out to any frequency range waveform operate thus obtain encrypted speech simultaneously, as: first amplification ratio n is multiplied by the amplitude of any frequency range waveform, afterwards arbitrary described frequency range waveform is decomposed into T section decompose waveform and sound wave shape insertion decomposition waveform will be obscured to form encrypted speech, thus encrypted speech changes dialog context, only after deciphering accordingly, just can obtain correct dialog context, ensure that call safety,
Step S106, is sent to call opposite end thus complete a ciphering process by encrypted speech, receive encrypted speech that call opposite end sends over and the process be decrypted is the inverse process corresponding with ciphering process.
Please refer to Fig. 2, describe the structured flowchart of call encryption terminal 100 1 embodiment of the present invention.
As shown in Figure 2, call encryption terminal 100 comprises and arranges module 10, voice acquisition module 11 and encrypting module 12.Module 10 is set for pre-setting amplification ratio n and obscuring sound wave shape; Voice acquisition module 11 is for obtaining the call voice that need encrypt and extracting any frequency range waveform of described call voice; Encrypting module 12 with module 10 is set and voice acquisition module 11 is connected, decompose waveform for arbitrary described frequency range waveform being multiplied by described amplification ratio n to form encrypted speech and/or arbitrary described frequency range waveform to be decomposed into T section and obscure sound wave shape insert described decomposition waveform to form encrypted speech, wherein T >=2 by described.Concrete, amplification ratio n meets n > Fmax/Fmin, and wherein Fmax is the peak frequency of voice, Fmin is the minimum frequency of voice; By " arbitrary described frequency range waveform is multiplied by amplification ratio n to form encrypted speech " can be wherein the amplitude of arbitrary described frequency range waveform is multiplied by amplification ratio n, frequency is multiplied by amplification ratio n or amplitude and frequency and is multiplied by amplification ratio n simultaneously; Wherein any frequency range waveform comprises m1 unit waveform, every lst-stage precipitation waveform comprises m2 unit waveform, and m1 >=2, m2 >=1, in encrypting module 12 by the position of obscuring sound wave shape insertion decomposition waveform is: before decomposing first unit waveform of waveform, after last unit waveform or between any two unit waveforms.
As can be seen from the above description, call encryption terminal 100 of the present invention pre-sets amplification ratio n by arranging module 10 and obscures sound wave shape, obtain by voice acquisition module 11 call voice that need encrypt again and extract any frequency range waveform of call voice, call finally by encrypting module 12 and module 10 is set and voice acquisition module 11 pairs of call voices are encrypted, thus achieve the object of speech scrambling voice, ensure that the information security of both call sides and improve Consumer's Experience.
More than in conjunction with most preferred embodiment, invention has been described, but the present invention is not limited to the embodiment of above announcement, and should contain various carry out according to essence of the present invention amendment, equivalent combinations.

Claims (7)

1. an encryption call method, is characterized in that, comprises the following steps:
Pre-set amplification ratio n and obscure sound wave shape;
The call voice that acquisition need be encrypted also extracts any frequency range waveform of described call voice;
Arbitrary described frequency range waveform is decomposed into T section decompose waveform and obscure sound wave shape insert described decomposition waveform to form encrypted speech, wherein T >=2 by described; Arbitrary described frequency range waveform comprises m1 unit waveform, and each section of described decomposition waveform comprises m2 unit waveform, and m1 >=2, m2 >=1; Described obscure sound wave shape insert first described unit waveform that the position of described decomposition waveform is described decomposition waveform before, after unit waveform described in last or between any two described unit waveforms.
2. encryption call method as claimed in claim 1, it is characterized in that, after " obtain the call voice that need encrypt and extract any frequency range waveform of described call voice ", also comprise step: arbitrary described frequency range waveform is multiplied by described amplification ratio n to form encrypted speech.
3. encryption call method as claimed in claim 2, it is characterized in that, described " arbitrary described frequency range waveform being multiplied by described amplification ratio n to form encrypted speech " is specially: the amplitude of arbitrary described frequency range waveform and/or frequency are multiplied by described amplification ratio n to form encrypted speech.
4. encryption call method as claimed in claim 2, it is characterized in that, described amplification ratio n meets n > Fmax/Fmin, and wherein Fmax is the peak frequency of voice, Fmin is the minimum frequency of voice.
5. a call encryption terminal, is characterized in that, comprising:
Module is set, for pre-setting amplification ratio n and obscuring sound wave shape;
Voice acquisition module, for obtaining the call voice that need encrypt and extracting any frequency range waveform of described call voice;
Encrypting module, decomposes waveform for described any frequency range waveform being decomposed into T section and obscuring sound wave shape insert described decomposition waveform to form encrypted speech, wherein T >=2 by described; Arbitrary described frequency range waveform comprises m1 unit waveform, and each section of described decomposition waveform comprises m2 unit waveform, and m1 >=2, m2 >=1; Described obscure sound wave shape insert first described unit waveform that the position of described decomposition waveform is described decomposition waveform before, after unit waveform described in last or between any two described unit waveforms.
6. call encryption terminal as claimed in claim 5, it is characterized in that, described encrypting module is also for being multiplied by described amplification ratio n to form encrypted speech by described any frequency range waveform.
7. call encryption terminal as claimed in claim 6, it is characterized in that, described amplification ratio n meets n > Fmax/Fmin, and wherein Fmax is the peak frequency of voice, Fmin is the minimum frequency of voice.
CN201310011336.3A 2013-01-11 2013-01-11 Encryption call method and terminal Expired - Fee Related CN103079196B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310011336.3A CN103079196B (en) 2013-01-11 2013-01-11 Encryption call method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310011336.3A CN103079196B (en) 2013-01-11 2013-01-11 Encryption call method and terminal

Publications (2)

Publication Number Publication Date
CN103079196A CN103079196A (en) 2013-05-01
CN103079196B true CN103079196B (en) 2016-02-10

Family

ID=48155580

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310011336.3A Expired - Fee Related CN103079196B (en) 2013-01-11 2013-01-11 Encryption call method and terminal

Country Status (1)

Country Link
CN (1) CN103079196B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105391675A (en) * 2014-09-05 2016-03-09 深圳市同盛绿色科技有限公司 Voice signal transmission method, terminal and system
WO2018081937A1 (en) * 2016-11-01 2018-05-11 华为技术有限公司 Method for determining coding rate of audio and video data, terminal, and storage medium
CN111506913B (en) * 2020-04-21 2024-03-15 上海明略人工智能(集团)有限公司 Audio encryption method and device, storage medium and electronic device
CN111294367B (en) * 2020-05-14 2020-09-01 腾讯科技(深圳)有限公司 Audio signal post-processing method and device, storage medium and electronic equipment
CN115249482B (en) * 2022-01-15 2023-10-31 江苏怀业信息技术股份有限公司 Audio data encryption method and decryption method based on artificial intelligence and Internet of things

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1249517A (en) * 1998-09-29 2000-04-05 国际商业机器公司 System for inserting additional information in audio data
CN101329869A (en) * 2008-07-31 2008-12-24 中国电信股份有限公司 System and method for encrypting acoustic source of speech encoding for vector quantization
WO2009104234A1 (en) * 2008-02-18 2009-08-27 学校法人同志社 Wireless device, wireless system, and method for confidential communication
CN102624518A (en) * 2012-03-05 2012-08-01 华中科技大学 Voice encryption and decryption method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1249517A (en) * 1998-09-29 2000-04-05 国际商业机器公司 System for inserting additional information in audio data
WO2009104234A1 (en) * 2008-02-18 2009-08-27 学校法人同志社 Wireless device, wireless system, and method for confidential communication
CN101329869A (en) * 2008-07-31 2008-12-24 中国电信股份有限公司 System and method for encrypting acoustic source of speech encoding for vector quantization
CN102624518A (en) * 2012-03-05 2012-08-01 华中科技大学 Voice encryption and decryption method

Also Published As

Publication number Publication date
CN103079196A (en) 2013-05-01

Similar Documents

Publication Publication Date Title
CN103079196B (en) Encryption call method and terminal
SG11201900367SA (en) Method and device for providing and obtaining graphic code information, and terminal
WO2019004929A3 (en) Network slice allocation method, device and system
EP2388744A3 (en) Method and device for conducting trusted remote payment transactions
WO2013003493A3 (en) System and method for protocol fingerprinting and reputation correlation
PH12019500936A1 (en) Method and apparatus for service implementation
EP1892914A3 (en) Network system, authentication method, information processing apparatus and access processing method accompanied by outbound authentication
CN104660397A (en) Secret key managing method and system
MY201886A (en) Verification code short message processing method and terminal
CN104065648B (en) A kind of data processing method of voice call
CN103701586A (en) Method and device for acquiring secret key
CN110380856A (en) Terminal device and its voice information processing method, device and storage medium
CN102801731A (en) Method and device for protecting data
EP4301019A3 (en) Techniques for call authentication
CN107508819B (en) Encryption method and encryption device
CN104639330B (en) A kind of GOOSE message completeness certification method
CN105100116A (en) Efficient and safe power data interaction method in wireless communication mode
CN105357665A (en) Encryption method for sensitive data of mobile phone and off-line decryption method based on same
CN104506517A (en) Encryption transmission method for MIPS (Million Instructions Per Second) platform on basis of HTTP (Hyper Text Transfer Protocol)
CN103745138A (en) Method for hiding dll module derivative function
US20160173456A1 (en) Dynamic Spectrum Audio Encryption and Decryption Device
CN112839044B (en) Audio processing method and device
CN104080080B (en) A kind of data handling system of voice call
Chen et al. End-to-end speech encryption algorithm based on speech scrambling in frequency domain
KR20130109560A (en) Encryption method of database of mobile communication device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

CP01 Change in the name or title of a patent holder
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160210

CF01 Termination of patent right due to non-payment of annual fee